H3C S9850_6850-CMW710-R6715P01

Release time:2024-06-17
HomeSupportSwitchesS6850 SeriesSoftware DownloadS6850 Series

 

H3C S9850_6850-CMW710-R6715P01 Release Notes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

Introduction· 1

Version information· 1

Version number 1

Version history· 1

Hardware and software compatibility matrix· 2

ISSU upgrade type matrix· 4

Upgrade restrictions and guidelines· 5

Hardware feature updates· 5

R6715· 5

E6713P01· 5

E6713· 5

E6712P01· 6

E6712· 6

E6711· 6

R6710· 6

E6706· 6

E6705· 6

E6702· 6

F6701L01· 6

Software feature and command updates· 6

MIB updates· 7

Operation changes· 8

Operation changes in R6715· 8

Operation changes in E6713P01· 9

Operation changes in E6713· 9

Operation changes in E6712P01· 12

Operation changes in E6712· 12

Operation changes in E6711· 12

Operation changes in R6710· 14

Operation changes in E6706· 15

Operation changes in E6705· 16

Operation changes in E6702· 17

Operation changes in F6701L01· 17

Restrictions and cautions· 17

Restrictions· 17

Cautions· 19

Licensing· 19

About licensing· 19

Registering and installing licenses· 19

Obtaining license server software and documentation· 19

Open problems and workarounds· 20

List of resolved problems· 23

Resolved problems in R6715· 23

Resolved problems in E6713P01· 26

Resolved problems in E6713· 27

Resolved problems in E6712P01· 34

Resolved problems in E6712· 34

Resolved problems in E6711· 36

Resolved problems in R6710· 38

Resolved problems in E6706· 45

Resolved problems in E6705· 47

Resolved problems in E6702· 50

Resolved problems in F6701L01· 52

Troubleshooting resources· 52

Related documentation· 52

Documentation set 52

Obtaining documentation· 52

Technical support 53

Appendix A Feature list 54

Hardware features· 54

Software features· 56

Appendix B Fixed security vulnerabilities· 59

Fixed security vulnerabilities in R6715· 59

Fixed security vulnerabilities in E6713P01· 60

Fixed security vulnerabilities in E6713· 62

Fixed security vulnerabilities in E6712· 62

Fixed security vulnerabilities in E6711· 62

Fixed security vulnerabilities in R6710· 62

Fixed security vulnerabilities in E6705· 63

Fixed security vulnerabilities in E6702· 63

Appendix C Upgrading software· 64

System software file types· 64

System startup process· 64

Upgrade methods· 65

Upgrading from the CLI 66

Verifying device status· 66

Preparing for the upgrade· 66

Downloading software to the master switch· 68

Upgrading the software images· 70

Installing a patch package· 71

Upgrading from the Boot menu· 72

Prerequisites· 72

Accessing the Boot menu· 73

Accessing the extended Boot menu· 74

Using TFTP to upgrade software images through the management Ethernet port 76

Using FTP to upgrade software through the management Ethernet port 77

Using XMODEM to upgrade software through the console port 79

Using TFTP to upgrade Boot ROM through the management Ethernet port 83

Using FTP to upgrade Boot ROM through the management Ethernet port 85

Using XMODEM to upgrade Boot ROM through the console port 86

Managing files from the Boot menu· 90

Displaying all files· 90

Deleting files· 91

Changing the attribute of software images· 91

Handling software upgrade failures· 93



Introduction

This document describes the features, restrictions and guidelines, open problems, and workarounds for version R6715P01. Before you use this version on a live network, back up the configuration and test the version to avoid software upgrade affecting your live network.

Use this document in conjunction with H3C S9850_6850-CMW710-R6715P01 Release Notes (Software Feature Changes) and the documents listed in “Related documentation”.

Version information

Version number

H3C Comware Software, Version 7.1.070, Release 6715P01

Note: You can see the version number with the display version command in any view. Please see Note .

Version history

Table 1 Version history

Version number

Last version

Release date

Release type

Remarks

S9850_6850-CMW710-R6715P01

S9850_6850-CMW710-R6715

2024-06-15

Release version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-R6715

S9850_6850-CMW710-E6713P01

2024-03-15

Release version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6713P01

S9850_6850-CMW710-E6713

2024-01-03

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6713

S9850_6850-CMW710-E6712P01

2023-11-29

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6712P01

S9850_6850-CMW710-E6712

2023-07-20

ESS version

·        Fixed bugs.

S9850_6850-CMW710-E6712

S9850_6850-CMW710-E6711

2023-06-16

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6711

S9850_6850-CMW710-R6710

2023-04-21

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-R6710

S9850_6850-CMW710-E6706

2022-12-28

Release version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6706

S9850_6850-CMW710-E6705

2022-09-02

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6705

S9850_6850-CMW710-E6702

2022-07-11

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_6850-CMW710-E6702

S9850_6850-CMW710-F6701L01

2022-04-14

ESS version

·        Added features.

·        Modified features.

·        Fixed bugs.

S9850_S6850-CMW710-F6701L01

First release

2022-01-14

Feature version

None

 

IMPORTANT

IMPORTANT:

E6712P01 is the initial release for the S6850-56HF-IM switch, and none of the earlier versions listed in the table are supported by the S6850-56HF-IM switch.

 

 

Hardware and software compatibility matrix

CAUTION

CAUTION:

To avoid an upgrade failure, use Table 2 to verify the hardware and software compatibility before performing an upgrade.

 

Table 2 Hardware and software compatibility matrix

Item

Specifications

Product family

H3C S9850 Series and H3C S6850 Series

Hardware platform

H3C S9850-4C (with product code LS-9850-4C)

H3C S6850-56HF(with product code LS-6850-56HF)

H3C S9850-32H(with product code LS-9850-32H-A)

H3C S6850-2C(with product code LS-6850-2C)

H3C S6850-56HF(with product code LS-6850-56HF-H1) Please see Note

H3C S9850-32H (with product code LS-9850-32H-H1)

H3C S9850-4C (with product code LS-9850-4C-H1)

H3C S6850-2C(with product code LS-6850-2C-H1)

S6850-56HF-SAN

S6850-56HF-IM

H3C S6850-56HF(with product code LS-6850-56HF-H3)

H3C S6850-56HF-CP

Memory

8GB

4G (S6850-56HF, with product code LS-6850-56HF-H1)

Flash

4GB

8G (S6850-56HF-SAN)

240G (S6850-56HF-IM)

Boot ROM version

S6850-56HF (with product code LS-6850-56HF-H1): BootWare 309 or higher

S9850-32H (with product code LS-9850-32H-H1): BootWare 309 or higher

S9850-4C (with product code LS-9850-4C-H1): BootWare 309 or higher

S6850-56HF-SAN: BootWare 309 or higher

S6850-56HF (with product code LS-6850-56HF-H3): BootWare 309 or higher

S6850-56HF-CP: BootWare 309 or higher

S6850-2C (with product code LS-6850-2C-H1): BootWare 309 or higher

 

 

S6850-56HF-IM:

·        Basic BootWareVersion 101 or higher

·        Extended BootWareVersion 101 or higher

Other products:

·        Basic BootWare—Version 205 or higher

·        Extended BootWare—Version 205 or higher

(Note: Perform the command display version command in any view to view the version information. Please see Note)

Software images and their MD5 checksums

S9850_6850-CMW710-R6715.ipe:f56fb9684a420a14af06523cb738b963

iMC version

iMC PLAT 7.3 (E0710)

iMC EAD 7.3 (E0623)

iMC MVM 7.3 (E0511)

iMC QoSM 7.3 (E0506)

iMC VXLAN 7.3 (E0708P03)

iMC BIMS 7.3 (E0509H01)

UCenter SHM 7.3 (E0716)

UCenter NTA 7.3 (E0716)

iMC EIA 7.3 (E0628)

iNode version

iNode(E0595)

ADDC version

ADDC 6.5

 

Note LS-6850-XXXX represents a product code, which is printed on the lower right corner of the bar code label on the rear panel or upper panel of the device.

To display version information for the system software and Boot ROM of S6850-56HF:

<H3C>display version                                                         

H3C Comware Software, Version 7.1.070, Release 6715P01                ------- Note 

Copyright (c) 2004-2024 New H3C Technologies Co., Ltd. All rights reserved.    

H3C S6850-56HF uptime is 0 weeks, 0 days, 23 hours, 2 minutes                  

Last reboot reason : User Reboot                                               

                                                                                

 

Boot image: flash:/s9850_6850-cmw710-boot-r6715p01.bin                            

Boot image version: 7.1.070, Release 6715P01                                      

  Compiled Jun 06 2024 16:00:00                                                

System image: flash:/s9850_6850-cmw710-system-r6715p01.bin                        

System image version: 7.1.070, Release 6715P01                                      

  Compiled Jun 06 2024 16:00:00                                                 

                                                                               

MPU(S) Slot 1:                                                                 

Uptime is 0 weeks,0 days,23 hours,2 minutes                                     

H3C S6850-56HF LPU with 1 Processor(s)                                   

BOARD TYPE:         S6850-56HF                                                 

DRAM:               8192M bytes                                                 

FLASH:              3630M bytes                                                

NVRAM:              0K bytes                                                   

PCB 1 Version:      VER.A                                                      

PCB 2 Version:      VER.A                                                      

PCB 3 Version:      VER.A                                                      

Basic    BootWare Version: 205                                     ------ Note  

Extended BootWare Version: 205                                     ------ Note 

CPLD 1 Version:     002                                                        

CPLD 2 Version:     002                                                         

CPLD 3 Version:     002                                                        

CPLD 4 Version:     002                                                        

FPGA 1 Version:     001                                                        

Release Version:    H3C S6850-56HF-6715P01                                        

Patch Version:      None                                                       

Reboot Cause:       UserReboot                                                  

[SubSlot 0] 48SFP28 + 8QSFP28 + 2SFP   

ISSU upgrade type matrix

ISSU provides two upgrade types: compatible upgrade and incompatible upgrade. Table 3 provides the approved ISSU upgrade types only between the current version and the history versions within the past 18 months. This matrix does not include history versions that are 18 months earlier than the current version, for which, no ISSU upgrade verification is performed.

For more information about ISSU, see the fundamental configuration guide for the device.

 

 

NOTE:

·     To prevent routing neighbor flapping when upgrading the software from F6701L01 to E6702 by using step-by-step ISSU, use the irf mac-address persistent always command to enable the IRF bridge MAC address to be permanent.

·     When a software version earlier than R6710 is upgraded to R6710 through an ISSU, VXLAN Layer 3 traffic loss persists for longer than 2 seconds. In a lab environment, traffic loss persists for 21 seconds during a one-click upgrade and 35 seconds during a distributed upgrade.

·     Release 6710 and earlier versions does not support upgrading the switch to E6711 or later through ISSU.

 

Table 3 ISSU compatibility list

Current version

History version

ISSU upgrade method

S9850_6850-CMW710-R6715P01

S9850_6850-CMW710-R6715

Compatible

 

S9850_6850-CMW710-E6713P01

Compatible

 

S9850_6850-CMW710-E6713

Compatible

 

S9850_6850-CMW710-E6712P01

Compatible

 

S9850_6850-CMW710-E6712

Compatible

 

S9850_6850-CMW710-E6711

Compatible

 

S9850_6850-CMW710-R6710

Not support

 

S9850_6850-CMW710-E6706

Not support

 

S9850_6850-CMW710-E6705

Not support

 

S9850_6850-CMW710-E6702

Not support

 

S9850_6850-CMW710-F6701L01

Not support

 

 

Upgrade restrictions and guidelines

1.       To prevent routing neighbor flapping when upgrading the software from E6702 to E6706 by using step-by-step ISSU, use the irf mac-address persistent always command to enable the IRF bridge MAC address to be permanent.

2.       To prevent routing neighbor flapping when upgrading the software from F6701L01 to E6702 by using step-by-step ISSU, use the irf mac-address persistent always command to enable the IRF bridge MAC address to be permanent.

3.       When a software version earlier than R6710 is upgraded to R6710 through an ISSU, VXLAN Layer 3 traffic loss persists for longer than 2 seconds. In a lab environment, traffic loss persists for 21 seconds during a one-click upgrade and 35 seconds during a distributed upgrade.

4.       Release 6710 and earlier versions does not support upgrading the switch to E6711 or later through ISSU.

5.       Before you upgrade a version earlier than E6705 to Release 6710, identify whether a license has been activated or installed. If yes, the upgrade will cause the license to be lost or to fail to be installed. To avoid this issue, first uninstall the license and obtain uninstall key, and then re-activate the license (the DID file must be obtained again) in Release 6710 through license transfer.

If you upgrade to R6710HS03, you can use the boot-loader file command. The license will not be lost or fail to be installed.

6.       Before you upgrade or down upgrade a version between E6705 and Release 6710 or install or uninstall R6710HS03 or a later version, identify whether a license has been activated or installed. If yes, first uninstall the license and obtain uninstall key, and then re-activate the license (the DID file must be obtained again) in the new version through license transfer.

7.       The S6850-56HF-SAN is not supported in software versions earlier than E6711.

8.       The S6850-56HF-IM is not supported in software versions earlier than E6712P01.

9.       The S6850-56HF (with product code LS-6850-56HF-H3) and S6850-56HF-CP are not supported in software versions earlier than E6713.

10.    As from E6711, password recovery capability is enabled by default in the initial configuration instead of the factory defaults on the device.

11.    As from R6715P01, lossless related features are no longer restricted to licenses and are supported by default. The display license feature command no longer displays information about lossless related features. You can still activate and install lossless licenses, without affecting the lossless features. To roll back to the R6715 version or earlier with feature-based licensing, remove the IPCC-related settings, activate lossless licenses, and then reconfigure IPCC.

12.    The S6850-2C (with product code LS-6850-2C-H1) are not supported in software versions earlier than R6715P01.

Hardware feature updates

R6715P01

Added support for the SFP-25G-CSR-MM850 transceiver module.

Added support for the S6850-2C (with product code LS-6850-2C-H1).

R6715

Added support of S6850-56HF(product code LS-6850-56HF-H3) for FAN-40B-1-D modules.

E6713P01

None.

E6713

Added support for the S6850-56HF (with product code LS-6850-56HF-H3).

Added support for the S6850-56HF-CP.

Added support for the 25G/10G autosensing SFP-XG-SX-MM850-D transceiver module.

E6712P01

Added support for the S6850-56HF-IM switch.

Added support for the QSFP-100G-SR4-MM850-Y5 liquid cooled optical transceiver module.

Added support for the SFP-25G-D-CAB-3M-Y 3 m (9.84 ft) liquid cooled DAC cable.

Added support for the SFP-25G-D-CAB-5M-Y 5 m (16.40 ft) liquid cooled DAC cable.

E6712

The transceiver module QSFP-40G-LX4-WDM1300 was supported.

E6711

Added support for S6850-56HF-SAN.

R6710

Added support for S9850-4C (LS-9850-4C-H1).

E6706

Added support for S9850-32H (LS-9850-32H-H1).

E6705

None.

E6702

None.

F6701L01

First release.

Software feature and command updates

For more information about the software feature and command update history, see H3C S9850_6850-CMW710-R6715P01(Software Feature Changes).

MIB updates

Table 4 MIB updates

S9850_S6850-CMW710-R6715P01

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-R6715

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-E6713P01

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-E6713

New

IP mib.docx

HH3C-RRPP-MIB.docx

IP module

RRPP module

Added the IP mib.docx document.

Added information about the hh3cRrrpRingRecover, hh3cRrrpRingFail, hh3cRrrpMultiMaster, and hh3cRrrpMajorFault notification objects.

Modified

HH3C-ACL-MIB.docx

HH3C-PORT-SECURITY-MIB.docx

hh3cAclIPAclNamedBscTable

hh3cAclIPAclNamedAdvTable

hh3cSecureRalmObjects

hh3cSecurePortTable

hh3cSecureAddressTable

Modified object names to hh3cAclIPAclNamedBscTRangeName and h3cAclIPAclNamedAdvTRangeName.

Changed the value range of the hh3cSecureRalmHoldoffTime object to 1 to 3600.

The value of the hh3cSecureRalmAuthUsername object added support for spaces.

Added needToKnowAuto(9) to the value range of the hh3cSecureNeedToKnowMode object.

Changed the access permission, severity, and default status of the hh3cSecureAddrVlanID object to read-create, warning, and OFF, respectively.

S9850_S6850-CMW710-E6712P01

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-E6712

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-E6711

New

None

None

None

Modified

None

None

None

S9850_S6850-CMW710-R6710

New

First release

First release

First release

Modified

First release

First release

First release

 

Operation changes

Operation changes in R6715P01

[202402010243] Capitalized the first letter of the parameter comments for each option in hardware-resource commands

Before modification: The first letter of the parameter comments for each option in the hardware-resource commands is not capitalized.

After modification: The first letter of the parameter comments for each option in the hardware-resource commands is capitalized.

Related commands:

·         hardware-resource clock-mode

·         hardware-resource flex-mode

·         hardware-resource routing-mode

[202403270041] Lossless related features are no longer restricted to licenses and are supported by default

As from R6715P01, lossless related features are no longer restricted to licenses and are supported by default. The display license feature command no longer displays information about lossless related features. You can still activate and install lossless licenses, without affecting the lossless features. To roll back to the R6715 version or earlier with feature-based licensing, remove the IPCC-related settings, activate lossless licenses, and then reconfigure IPCC.

[202310251525] The identifier character for commands delayed to take effect is changed

Before modification: The identifier character for commands delayed to take effect is a tilde (~).

After modification: The identifier character for commands delayed to take effect is an asterisk (*).

[202406120202] In PIM-SM, traffic can still be forwarded after the ingress replication MVXLAN configuration is deleted

Before modification: After the ingress replication MVXLAN configuration is deleted, traffic cannot be forwarded in PIM-SM, but traffic can still be forwarded in PIM-SSM.

After modification: After the ingress replication MVXLAN configuration is deleted, traffic can still be forwarded in both PIM-SM and PIM-SSM.

Operation changes in R6715

[202402061133] Support for executing the lacp transparent enable command through NETCONF

Before modification: The lacp transparent enable command cannot be executed through NETCONF.

After modification: The lacp transparent enable command can be executed through NETCONF.

[202207120205]Changed the execution of the undo mac-address static source-check enable command on a Layer 2 aggregate interface configured as a peer-link interface.

Before modification: To successfully forward Layer 3 traffic over the peer link, you must manually execute the undo mac-address static source-check enable command on a Layer 2 aggregate interface configured as a peer-link interface.

After modification: After a Layer 2 aggregate interface is configured as a peer-link interface, the system automatically executes the undo mac-address static source-check enable command on it

[202402260239]Setting the maximum number of supported BFD sessions

Before modification: The device supports a maximum of 256 BFD sessions.

After modification: The device supports a maximum of 512 BFD sessions.

Remarks: In software BFD mode, set the BFD detection time to at least 300ms*5 if the number of BFD sessions is greater than 64, and set the BFD detection time to at least 400ms*5 if the number of BFD sessions is greater than 256 as a best practice. Since the BFD protocol is time-sensitive, high CPU pressure on the device can lead to BFD flapping, which affects network stability. To avoid this issue, increase the BFD detection time as much as possible to enhance network stability.

In hardware BFD mode, set the BFD detection time to at least 100ms*3 as a best practice. Additionally, the hardware BFD mode has certain usage restrictions. For more information about these restrictions, see hardware BFD configuration in the configuration guides.

[202402220271] Changed the MAC authentication specification from 8K to 2K

Before modification: The MAC authentication specification is 8K.

After modification: The MAC authentication specification is 2K.

[202210290537] ARP/ND learning  and remote MAC address learning are disabled for automatic tunnels by default in an EVPN network

Before modification: To disable ARP/ND learning for tunnels in an EVPN network, execute the vxlan tunnel arp-learning disable/vxlan tunnel nd-learning disable command. To disable remote MAC address learning for tunnels in an EVPN network, execute the vxlan tunnel mac-learning disable command.

After modification: ARP/ND learning and remote MAC address learning are disabled for automatic tunnels by default in an EVPN network.

NOTE: This change only applies to automatic tunnels in an EVPN network, and does not affect manually created VXLAN tunnels.

[202209270016] MAC address learning is disabled by default

Before modification: MAC address learning is enabled by default.

After modification: MAC address learning is disabled by default.

[202401171983] uRPF loose mode and the default route configuration

Before modification: If you enable the ip urpf loose command first, and then configure a blackhole static route or configure a default route pointing to the management interface or gateway, packets with mismatched source IPs will be forwarded through the default route.

After modification: If you enable the ip urpf loose command first, and then configure a blackhole static route or configure a default route pointing to the management interface or gateway, packets with mismatched source IPs will not be forwarded.

Operation changes in E6713P01

[202312052129]When the free-memory space decreases below 224 MB, the minor, severe, and critical alarms are triggered. When a critical alarm occurs, the device generates a log message and then restarts.

Before modification: The minor, severe, and critical free-memory thresholds are 448 MB, 224 MB, and 128 MB, respectively. When the free-memory space decreases below 224 MB, the device generates a severe alarm and then restarts. The device generates a log message only when the free-memory space decreases below the critical free-memory threshold.

After modification: All free-memory thresholds (minor, severe, critical) are set to 224 MB. When the free-memory space decreases below 224 MB, it triggers all alarms. If a critical alarm occurs, the device logs the event and then restarts.

[202310131260]gRPC sensor path buffermonitor/commbufferusages can collect the cumulative numbers of multicast and unicast packets

Before modification: The information collected by gRPC sensor path buffermonitor/commbufferusages does not contain the MulticastTransPkts (the cumulative number of multicast packets) and UnicastTransPkts (the cumulative number of unicast packets) fields.

After modification: The information collected by gRPC sensor path buffermonitor/commbufferusages has the MulticastTransPkts and UnicastTransPkts fields.

[202309151956] Interface packet rate statistics was added to the information collected by gRPC

·         Before modification: gRPC cannot collect interface packet rate statistics.

·         After modification: The interface information collected by gRPC includes interface packet rate statistics.

[202309132125] ARP fast update for MAC address moves (configured by using the mac-address mac-move fast-update command) is enabled by default

·         Before modification: ARP fast update for MAC address moves (configured by using the mac-address mac-move fast-update command) is disabled by default.

·         After modification: ARP fast update for MAC address moves (configured by using the mac-address mac-move fast-update command) is enabled by default.

Operation changes in E6713

[202303170413] hh3c-bgp4v2.mib is supported. Traps are generated upon IPv4 IPv6 or peer state changes

Before modification: hh3c-bgp4v2.mib is not supported. The system only generates traps about IPv4 peer state changes.

After modification: hh3c-bgp4v2.mib is supported. The system can generate traps about IPv4 or IPv6 peer state changes.

[202305170768] Interface traffic statistics are also displayed if the device obtains the traffic from ifInUcastPkts in the MIB

Before modification: Interface traffic statistics cannot be displayed if the device obtains the traffic from ifInUcastPkts in the MIB.

After modification: When the statistics enable command is executed in VSI view, interface traffic statistics are also displayed if the device obtains the traffic from ifInUcastPkts in the MIB.

[202306290192] Both the DRNI/Base table and MLAG/Base table of NETCONF support the ExtraVlan and ReservedVlanList fields

Before modification: The fields in the DRNI/Base table and MLAG/Base table are inconsistent in NETCONF. The DRNI/Base table contains only the ExtraVlan field. The MLAG/Base table contains only the ReservedVlanList field.

After modification: In NETCONF, both the DRNI/Base table and MLAG/Base table support the ExtraVlan and ReservedVlanList fields.

[202306290462] The MLAG/Keepalive table of NETCONF contains the TrackID attribute column

Before modification: The MLAG/Keepalive table of NETCONF does not contain the TrackID attribute column.

After modification: The MLAG/Keepalive table of NETCONF contains the TrackID attribute column.

[202307010905] Data from the device/transceivers and device/transceiverchannels sensor paths can be pushed in GPB encoding format

Before modification: When the device uses the three-layer telemetry data model architecture to push data, it does not support using GPB to encode data from the device/transceivers and device/transceiverchannels sensor paths.

After modification: When the device uses the three-layer telemetry data model architecture to push data, it supports using GPB to encode data from the device/transceivers and device/transceiverchannels sensor paths.

[202307011061] Aggregate interfaces support configuring global CRC error packet alarm parameters

Before modification: Aggregate interfaces do not support configuring global CRC error packet alarm parameters by using the ifmonitor crc-error command.

After modification: Aggregate interfaces support configuring global CRC error packet alarm parameters by using the ifmonitor crc-error command.

[202307071286] When all the specified temperature alarm thresholds are invalid, the value range for the temperature sensor number is not displayed

Before modification: When all the specified temperature alarm thresholds are invalid, the command output from the temperature-limit { hotspot | inflow | outflow } ? command displays the value range for the temperature sensor number as an invalid value.

After modification: When all the specified temperature alarm thresholds are invalid, the command output from the temperature-limit { hotspot | inflow | outflow } ? command does not display the value range for the temperature sensor number.

[202308070845] Support for statistics for all types of tunnel interfaces, including GRE, IPv4 over IPv4, and IPv4 over IPv6 tunnel interfaces

Before modification: You cannot use the display interface tunnel command to view traffic statistics for GRE, IPv4 over IPv4, and IPv4 over IPv6 tunnel interfaces.

After modification: You can use the display interface tunnel command to view traffic statistics for GRE, IPv4 over IPv4, and IPv4 over IPv6 tunnel interfaces.

[202308230421] The device restarts when a level-2 threshold is reached, and generates a log message about the restart cause

Before modification: The device does not restart when a level-2 threshold is reached.

After modification: The device restarts when a level-2 threshold is reached, and generates a log message about the restart cause.

[202309132121] The VLAN interface limit is 4K

Before modification: The VLAN interface limit is 2K.

Before modification: The VLAN interface limit is 4K.

[202309211555] Supported the [undo] snmp-agent trap enable igmp/mld commands in private-mode system view

Before modification: The [undo] snmp-agent trap enable igmp and [undo] snmp-agent trap enable mld commands cannot be executed in private-mode system view.

After modification: The [undo] snmp-agent trap enable igmp and [undo] snmp-agent trap enable mld commands can be executed in private-mode system view.

[202309211558] Supported the [undo] snmp-agent trap enable pim/pim6 commands in private-mode system view

Before modification: The [undo] snmp-agent trap enable pim and [undo] snmp-agent trap enable pim6 commands cannot be executed in private-mode system view.

After modification: The [undo] snmp-agent trap enable pim and [undo] snmp-agent trap enable pim6 commands can be executed in private-mode system view.

[202304120566] Supported a maximum of four DSCP mappings in the priority-flow-control dscp-mapping command

Before modification: A maximum of two DSCP mappings can be configured.

After modification: A maximum of four DSCP mappings can be configured.

[202303281927] The device monitors incorrect TPCE messages on ports and generates log messages and traps for notification

Before modification: The device does not monitor incorrect TPCE messages on ports.

After modification: The device monitors incorrect TPCE messages on ports, counts incorrect TPCE messages if any, and generates log messages and traps for notification.

[202307310775] Optimized health check for IRF members

Before modification: The health check feature does not include checks on MMUs of IRF members, port down, LACP selection, memory, CPLD status, and PHY status.

After modification: The health check feature adds checks for MMU of IRF members, port down, LACP selection, memory, CPLD status, and PHY status as follows:

·         MMU fault check: Checks the number of cells occupied by MMUs for all the ports on the device. When the cell count exceeds the threshold, the health value increases by 1.

·         Port down check: Checks the status of all the ports on the device. If all the ports are down during the device operation, the health value increases by 3.

·         LACP selection check: Checks the status of port LACP selection on the device. If the number of unselected ports is equal to or greater than 48, the health value increases by 1.

·         Memory check: Checks the free memory space. If the memory space is smaller than 128M, the health value increases by 1.

·         CPLD check: Checks CPLD components on the device. If an incorrect CPLD register value is incorrect, the health value increases by 1.

·         PHY check: Checks PHY components on the device. If an incorrect PHY register value is incorrect, the health value increases by 1.

[202302170010] Changed the dscp dscp-value option in the priority-flow-control dscp-mapping command from required to optional

Before modification: The dscp dscp-value option is required in priority-flow-control dscp-mapping command.

After modification: The dscp dscp-value option is optional in priority-flow-control dscp-mapping command. If this option is not specified, the DSCP value of packets is not changed.

[202302081531/202306151058] Change to the default NSR enabling status

Before modification: By default, NSR is disabled in IS-IS/OSPF/OSPFv3/RIP/RIPng/BGP/RIB/LDP view.

After modification: By default, NSR is enabled in IS-IS/OSPF/OSPFv3/RIP/RIPng/BGP/RIB/LDP view.

[202305081549] Command effect on authentication failed and fail-permit users changed

Before modification: The following commands take effect only on users passing authentication and they do not take effect on authentication failed users and fail-permit users: mac-authentication offline-detect enable, mac-authentication packet-detect enable, dot1x offline-detect enable, and dot1x packet-detect enable.

After modification: The following commands take effect on users passing authentication, authentication failed users and fail-permit users: mac-authentication offline-detect enable, mac-authentication packet-detect enable, dot1x offline-detect enable, and dot1x packet-detect enable.

Authentication failed users and fail-permit users: Users added to the critical or Auth-Fail VLAN, VSI, or microsegment after they failed the authentication on the device where dot1x critical, dot1x guest, dot1x auth-fail, mac-authentication guest, and mac-authentication critical features are configured.

[202304181578] Changes to supported algorithms in FIPS mode

Before modification: In FIPS mode, the HMAC-SHA-1 algorithm can be specified in the ntp-service authentication-keyid and sntp authentication-keyid commands for authentication.

After modification: No HMAC-SHA-1 algorithm can be specified in the ntp-service authentication-keyid and sntp authentication-keyid commands for authentication.

Operation changes in E6712P01

None.

Operation changes in E6712

[202303171926] ip binding vpn-instance command on Layer 3 interfaces with private VLANs configured

Before modification: Layer 3 interfaces with private VLAN enabled do not support the ip binding vpn-instance command.

After modification: Layer 3 interfaces with private VLAN enabled support the ip binding vpn-instance command.

[202305250499]Maximum number of supported PBR policy nodes

Before modification: The device supports configuring a maximum of 50 PBR policy nodes.

After modification: The device supports configuring a maximum of 1024 PBR policy nodes.

[202304111948] Support of switches for sampling packets according to the entered sampling rate

Before modification: A sampler supports only the sampling rate that is 2 to the nth power, where n is the entered sampling rate. One packet is sampled from every 2 to the nth power packets.

After modification: A sampler supports sampling packets according to the entered sampling rate.  For example, if you set the sampling rate to 100, one packet is sampled from every 100 packets.

[202208241350] The Instances table of MVPN NETCONF and the StaticGroups table of IGMP NETCONF changed

Before modification:

·         The PmsiTunnelType column of the Instances table cannot be configured as 5 (ingress replication MVXLAN).

·         The StaticGroups table (static group member) cannot be deployed.

After modification:

·         The PmsiTunnelType column of the Instances table can be configured as 5 (ingress replication MVXLAN).

·         The StaticGroups table (static group member) can be deployed.

Operation changes in E6711

[202208170830] Loopback testing

Before modification: Loopback testing can be enabled on an Ethernet interface by using the loopback { external | internal } command.

After modification: Loopback testing can be enabled on an Ethernet interface by using the loopback-test { external | internal } command.

[202211070131] Forwarding of unknown frames after the MAC learning limit on a Layer 2 aggregate interface is reached

Before modification: A Layer 2 aggregate interface does not support forwarding unknown frames after the MAC learning limit on the Layer 2 aggregate interface is reached.

After modification: The mac-address max-mac-count enable-forwarding command is added in Layer 2 aggregate interface view. A Layer 2 aggregate interface supports forwarding unknown frames after the MAC learning limit on the Layer 2 aggregate interface is reached.

[202208060328] Support for IP precedence marking actions in an outbound QoS policy

Before modification: The IP precedence marking action (remark ip-precedence) is not supported in a QoS policy applied to the outbound direction of an interface.

After modification: The IP precedence marking action (remark ip-precedence) is supported in a QoS policy applied to the outbound direction of an interface.

[202208081419] Support for applying a QoS policy to the outbound direction of a Layer 3 aggregate subinterface

Before modification: A QoS policy cannot be applied to the outbound direction of a Layer 3 aggregate subinterface.

After modification: A QoS policy can be applied to the outbound direction of a Layer 3 aggregate subinterface.

[202211241281] Support of NETCONF for the bgp as-path-relax ebgp/ibgp command

Before modification: In NETCONF mode, the bgp as-path-relax ebgp and bgp as-path-relax ibgp commands are not supported. You cannot use only EBGP or IBGP routes for BGP load sharing.

After modification: In NETCONF mode, the bgp as-path-relax ebgp and bgp as-path-relax ibgp commands are supported. You use only EBGP or IBGP routes for BGP load sharing.

[202302031073] Traffic statistics collection for Layer 3 Ethernet subinterfaces in inbound and outbound directions

Before modification: Layer 3 Ethernet subinterfaces do not support inbound or outbound traffic statistics collection. The counts in the input and output traffic statistics are 0 in the output from the display interface command.

After modification: Layer 3 Ethernet subinterfaces support inbound and outbound traffic statistics collection. The display interface command can display traffic statistics in both the inbound and outbound directions.

[202209240884] Support for the rewrite inbound tag remark 1-to-2 command

Before modification: The rewrite inbound tag remark 1-to-2 command is not supported in Ethernet service instance view.

After modification: The rewrite inbound tag remark 1-to-2 command is supported in Ethernet service instance view.

[202212030374] Support for enabling IPv6 PIM snooping in VSI view

Before modification: The ipv6 pim-snooping enable command is not supported in VSI view.

After modification: The ipv6 pim-snooping enable command is supported in VSI view.

[202212050036] Aging mechanism for ND flood suppression entries

Before modification: Before an ND flood suppression entry ages out, the device will send an NS message. If the IPv6 address of the involved VSI interface is not on the same subnet as the IPv6 address in the ND flood suppression entry, or if the VSI is not associated with a VSI gateway interface, the source IPv6 address in the NS message will be an all-zero IPv6 address. If the receiving end is a third-party device, it might mistakenly identify the NS message as an address conflict.

After modification: If the IPv6 address of a VSI interface is not on the same subnet as the IPv6 address in an ND flood suppression entry, or if a VSI is not associated with a VSI gateway interface, the device does not send an NS message before the entry ages out. The entry will be learned again from subsequent ND messages.

[202302070640] Support for NETCONF deployment of stp transparent enable/lldp transparent enable

Before modification: The stp transparent enable and lldp transparent enable commands do not support NETCONF deployment .

After modification: The stp transparent enable and lldp transparent enable commands support NETCONF deployment.

[202209160614] Support of DCI Layer 3 multicast for the SSM group address

Before modification: DCI Layer 3 multicast does not support SSM group address 232.0.0.0/8.

After modification: DCI Layer 3 multicast supports SSM group address 232.0.0.0/8.

[202301121136] Password recovery capability is enabled by default in the initial configuration instead of the factory defaults on the device.

Before modification: Password recovery capability is enabled by default in the factory defaults on the device. You can use display default-configuration, display current-configuration, and display current-configuration all to view the configuration of password recovery capability.

After modification: Password recovery capability is enabled by default in the initial configuration on the device. You can use only display current-configuration all to view the configuration of password recovery capability.

[202208111132] Changes to supported commands in FIPS mode

Before modification:

·         In FIPS mode, the following commands are supported:

¡  ntp-service multicast-client

¡  ntp-service multicast-server

¡  ntp-service ipv6 multicast-client

¡  ntp-service ipv6 multicast-server

¡  ntp-service broadcast-client

¡  ntp-service broadcast-server

·         In FIPS mode, the MD5 algorithm can be specified in the ntp-service authentication-keyid and sntp authentication-keyid commands for authentication.

·         In FIPS mode, the value range for the version number parameter in the ntp-service unicast-peer, ntp-service unicast-server, and sntp unicast-server commands is 1 to 4.

After modification:

·         The following commands are not supported in FIPS mode:

¡  ntp-service multicast-client

¡  ntp-service multicast-server

¡  ntp-service ipv6 multicast-client

¡  ntp-service ipv6 multicast-server

¡  ntp-service broadcast-client

¡  ntp-service broadcast-server

·         In FIPS mode, no MD5 algorithm can be specified in the ntp-service authentication-keyid and sntp authentication-keyid commands for authentication.

·         In FIPS mode, the value for the version number parameter in the ntp-service unicast-peer, ntp-service unicast-server, and sntp unicast-server commands is 3 or 4.

Operation changes in R6710

[202211111499]Added information for troubleshooting unexpected reboots due to Intel C3XXX CPU microcode

The device records Machine Check Error  (MCE) register information for troubleshooting when it reboots due to Intel C3XXX CPU microcode.

[202209280283] The S9850-32H switch added support for automatic saving of power supply monitoring/power-on sequence controller fault information

Before modification: Fault information of the power supply monitoring/power-on sequence controller cannot be obtained.

After modification: The following probe commands are available for obtaining fault information of the power supply monitoring/time sequence controller. The device will save fault information of the power supply monitoring/ power-on sequence controller to the flash once every day automatically to facilitate fault locating.

The following probe commands (executed in probe view) were added:

·         debug system blackbox-info slot slot-number current: Reads fault information of the power supply monitoring/power-on sequence controller.

·         debug system blackbox-info slot slot-number flash: Reads fault information of the power supply monitoring/power-on sequence controller stored in flash.

[202212071604] Added support for NETCONF/gRPC collection of the system power consumption in real time

Before modification: The chassis and boards data collected through NETCONF/gRPC does not include the total power, residual power, and nominal power data.

After modification: The chassis and boards data collected through NETCONF/gRPC includes the total power, residual power, and nominal power data.

[202207130194]Changed the BGP VPNv4 route advertisement behavior when the peer next-hop-vpn and advertise l3vpn route are executed

Before modification: BGP VPNv4 routes are not advertised through the BGP EVPN address family even if the peer next-hop-vpn and advertise l3vpn route are executed.

After modification: BGP VPNv4 routes are advertised through the BGP EVPN address family if the peer next-hop-vpn and advertise l3vpn route are executed.

 [202209211687] Added support for secure BootWare

R6710 added support for secure BootWare, which prevents attackers from tampering with BootWare or planting malicious software to control/damage device software. When installing R6710, the device will automatically upgrade Bootware to a version that supports secure Bootware. A message "PKT_CheckFileHead failedFailed" (indicating an illegitimate upgrade file) will be displayed during device startup. This message is displayed because a related set bit flag has not been used before and has an initial value. This message will not be generated when versions that support secure Bootware are upgraded later.

[202209051705] The displayed IPv6 peers in the display bgp peer command output are too long and so they are displayed in multiple lines

Before modification: A peer IP address exceeding 15 characters will be displayed in multiple lines.

After modification: A peer IP address is displayed in one line.

[202210171050]Restrictions for an interface to join a Layer 2 aggregation group

Before modification:

·         An interface can join a Layer 2 aggregation group only when the interface meets the following requirements:

¡  It uses default VLAN configuration.

¡  Its port isolation configuration is the same as that on the aggregate interface.

·         After leaving a Layer 2 aggregation group, an interface restores its VLAN configuration to the default.

After modification:

·         An interface cannot join a Layer 2 aggregation group if it has different attribute configurations from the aggregate interface.

·         After leaving a Layer 2 aggregation group, an interface retains the VLAN configuration inheriting from the aggregate interface.

[202406121103] Changed the conditions for the L3VNI VSI interface packet statistics feature to take effect

Before modification: The VSI interfaces of L3VNIs support interface statistics by default. You can use the display l2vpn vsi verbose and display interface vsi commands to obtain the statistics.

After modification: The VSI interfaces of L3VNIs do not support interface statistics by default. To enable the statistics feature, execute the l2vpn statistics vsi l3-vni command.

Operation changes in E6706

[202207121259] Changed the maximum MTU allowed for an interface to 9216 bytes 

Before modification: The maximum MTU allowed for an interface is 9008 bytes.

After modification: The maximum MTU allowed for an interface is 9216 bytes.

[202208151044]Changed the traffic forwarding behavior for link aggregation management VLANs

Before modification: The unicast packets, ARP packets, or DHCP packets are load shared across the Selected ports of the aggregation group even if link aggregation management VLANs are configured.

After modification: The unicast packets, ARP packets, or DHCP packets are forwarded through only the management port if link aggregation management VLANs are configured.

Operation changes in E6705

[202112171336] Modified feature: Displaying kernel information upon power cycling of a device

Before modification: After you execute the reboot command to reboot the device, the device can display kernel-related commands. After you power cycle the device, the device cannot display kernel-related commands.

After modification: After you power cycle the device, the device cannot display the following kernel-related commands:

·         display kernel deadloop: Displays kernel thread deadloop information.

·         display kernel exception: Displays kernel thread exception information.

·         display kernel reboot: Displays reboot information for the device.

·         display kernel starvation: Displays kernel thread starvation information.

[202201190744/202204191564] Modified feature: Optimizing downlink interface state switchover time for Monitor Link

Before modification: In a monitor link group, when the uplink interfaces go down, the state switchover for all downlink interfaces takes a relatively long time.

After modification: In a monitor link group, when the uplink interfaces go down, the state switchover for all downlink interfaces takes less than 5 seconds.

[202203071738] Restrictions for an interface to join a Layer 2 aggregation group

Before modification:

·         An interface cannot join a Layer 2 aggregation group if it has different attribute configurations from the aggregate interface.

·         After leaving a Layer 2 aggregation group, an interface retains the VLAN configuration inheriting from the aggregate interface.

After modification:

·         An interface can join a Layer 2 aggregation group only when the interface meets the following requirements:

¡ It uses default VLAN configuration.

¡ Its port isolation configuration is the same as that on the aggregate interface.

·         After leaving a Layer 2 aggregation group, an interface restores its VLAN configuration to the default.

[202205301755]Modified the value range for the default CPU MAC address of a device

Before modification: The default CPU MAC address of a device is 00E0-FC00-XXXX.

After modification: The default CPU MAC address of a device is a MAC address in the range of F010-90DB-7400 to F010-90DB-740F.

[202205301735] Adjusted the limit on the MAC addresses assigned to VSI interfaces

Before modification: A maximum of 1000 MAC addresses different from the default MAC address can be assigned to VSI interfaces. Two VSI interfaces are considered to use two MAC addresses even through you assign the same MAC address to them.

After modification: A maximum of 1000 MAC addresses different from the default MAC address can be assigned to VSI interfaces. Multiple VSI interfaces are considered to use one MAC address if you assign the same MAC address to them. When Layer 3 traffic is forwarded to a VXLAN network, the traffic matches MAC addresses of VSI interfaces instead of VSIs. Therefore, Layer 3 traffic might be sent to an incorrect VSI.

Operation changes in E6702

[202202280302]Sent SNMP traps when uncorrectable parity errors occur on memory management entries

Before modification: Only logs are printed when uncorrectable parity errors occur on memory management entries.

After modification: Logs are printed and SNMP traps are sent when uncorrectable parity errors occur on memory management entries.

NOTE: The node ID for SNMP traps is 1.3.6.1.4.1.25506.8.35.12.3.0.44 (hh3cMMUParityError). SNMPv2 and later versions support this node.

Operation changes in F6701L01

First release.

Restrictions and cautions

Restrictions

1.       When you use 40-GE QSFP+ cables to connect IRF physical interfaces, follow these rules:

·         Make sure ports at both ends of a link are fixed ports or ports on interface modules.

·         If you use ports on interface modules as IRF physical interfaces, make sure the ports at both ends of a link reside on interface modules of the same model.

·         If you use a fixed QSFP28 port on the S6850-2C rear panel as an IRF physical interface, make sure the port at the other end is also a fixed QSFP28 port on the S6850-2C rear panel.

2.       ISSU is not supported on an IRF fabric that uses 40-GE QSFP+ cables for IRF link connections. To perform ISSU on the IRF fabric, replace the cables with 100-GE or 40-GE transceiver modules or cables.

3.       When you enter interface range view by using the interface range command and then bulk configure interfaces, the device does not output prompt or alarm messages. Make sure you are fully aware of the impacts of the configuration.

4.       If an IRF member device receives packets from another IRF member device and then forwards them out of a VSI interface, the packet filtering or QoS policy configuration applied in the outbound direction of the VSI interface cannot match these packets.

5.       If the QoS and ACL resource hardware mode is set to outbound-vlan-enhanced, do not apply a QoS policy that matches SVLANs to the outbound direction or apply a QoS policy to a VLAN.

6.       When the clock node type of the device is configured as E2ETC or P2PTC, up to 10 synchronization devices can be attached to the device.

7.       When an SFP28 or SFP+ interface uses an SFP transceiver module to connect to a peer interface, you must disable autonegotiation on the peer interface.

8.       Executing the following commands will cause traffic interruption on interfaces BFD flapping, and LLDP flapping:

¡  buffer apply

¡  buffer egress cell queue shared

¡  qos wred apply

¡  qos wrr weight

¡  qos wrr group weight

¡  priority-flow-control no-drop dot1p

9.       After the switch is upgraded from a DRNI version (version earlier than E6705) to an M-LAG version (E6705 or later), all drni keywords are automatically replace with m-lag keywords. The switch cannot automatically replace keywords after an M-LAG version is rolled back to a DRNI version. You must prepare a configuration file with drni keywords, specify it as the startup configuration file, and reboot the switch.

An M-LAG version cannot be rolled back to a DRNI version by using the configuration replace file command. To roll back, you must prepare a configuration file with drni keywords, specify it as the startup configuration file, and reboot the switch.

The name and terms were changed for the DRNI feature as follows:

¡  The feature name was changed to M-LAG.

¡  The drni keyword was changed to m-lag or mlag.

¡  The intra-portal-port keyword was changed to peer-link.

¡  The ipp keyword was changed to peer-link.

¡  The dr keyword was changed to m-lag-interface.

For more information, see H3C S9850_6850-CMW710-E6705 Release Notes (Software Feature Changes).

10.     In version E67xx/F67xx, the user-defined ACL rules configured by using the rule command do not support matching GRE packets with the specified flags. That is, the udf-format argument does not support the following values:

¡  gre-c0r0k1: Matches GRE packets with c=0, r=0, and k=1.

¡  gre-c1r0k1: Matches GRE packets with c=1, r=0, and k=1.

¡  gre-k1r1: Matches GRE packets with k=1 and r=1.

11.     As from version F6612, when an aggregate interface is configured as an IPP (peer link interface), the following configuration in grey is automatically deployed. During the software upgrade process, if the DR system member devices (M-LAG member devices) on both ends have different software versions, the IPPs (peer-link interfaces) on both ends will have different configurations. As a result, the IPPs (peer-link interfaces) cannot come up, and the DR system (M-LAG system) cannot operate normally.  Before you upgrade a DR system running a version earlier than F6612 to F6612 or later, you must deploy the following configuration in grey or other configuration as needed to the IPPs (peer-link interfaces) to ensure that the configuration is the same on IPPs (peer-link interfaces) on both ends. In this way, you can avoid DR system exceptions during the upgrade process.

    [H3C-Bridge-Aggregation11]display this

    #

    Interface Bridge-Aggregation11

    port link-type trunk

    port trunk permit vlan all

    port drni intra-portal-port 1

    #

    return

    [H3C-Bridge-Aggregation11]

12.     A 100G port on the device might fail to come up when a 100G DAC cable is used to connect the port to an Intel network card, for example, Intel (rainbow) Eth E810-CQDA2. As a best practice, use an AOC cable or transceiver module for connection to the Intel network card.

13.     When a software version earlier than R6710 is upgraded to R6710 through an ISSU, VXLAN Layer 3 traffic loss persists for longer than 2 seconds. In a lab environment, traffic loss persists for 21 seconds during a one-click upgrade and 35 seconds during a distributed upgrade.

14.     Mirroring outgoing VXLAN packets of a port is supported only when the first mirroring group is configured to mirror outgoing packets of that port. In other cases, if the first mirroring group is configured to mirror both incoming and outgoing packets of a port, or any non-first mirroring group is configured to mirror both incoming and outgoing packets or outgoing packets of a port, mirroring outgoing VXLAN packets of that port is not supported.

15.     To issue PFC commands to an interface range, make sure all interfaces in the interface range are of the same type.

Cautions

1.       The following interfaces cannot be split:

¡  Interface numbered 31 on the S6850-56HF.

¡  All interfaces on the LSWM116Q interface module.

¡  Interface numbered 7 on the LSWM18CQ or LSWM18CQMSEC expansion card installed in expansion slot 2 of the S985-4C.

¡  Interface numbered 8 on the LSWM18QC expansion card installed in expansion slot 2 of the S9850-4C switch.

¡  Interface numbered 25 on the LSWM124XGT2Q, LSWM124TG2H, LSWM124XG2QFC, LSWM124XG2Q, or LSWM124XG2QL expansion card installed in expansion slot 2 of the S9850-4C switch.

¡  The interface numbered 31 on an S9850-32H switch cannot be split by default. To split this interface, first enable the hardware resource flex mode for the device by using the hardware-resource flex-mode enable command. .

2.       The S6850-56HF (product code LS-6850-56HF-H3) and S6850-56HF-CP switches support the SW-A-PSR550-12A-B and SW-B-PSR550-12A-B power supplies, and the two types of power supplies cannot be mixed up.

Licensing

About licensing

H3C offers licensing options for you to deploy features and expand resource capacity on an as needed basis. To use license-based features, purchase licenses from H3C and install the licenses. For more information about the license-based features and licenses available for them, see H3C Switches License Matrixes.

Registering and installing licenses

To register and transfer licenses, access H3C license services at http://www.h3c.com/en/License.

For information about registering licenses, installing activation files, and transferring licenses, see H3C Switches and Routers Licensing Guide.

Obtaining license server software and documentation

To perform remote licensing, first download and install the H3C license server software.

·         To obtain the H3C license server software package, click

H3C license server software package

·         To obtain H3C license server documentation, click

H3C license server documentation

Open problems and workarounds

202204210001

·         Symptom: Two EDs form a DR system. After the uplink or downlink on one ED fails, its traffic fails over to the other ED through the IPL. As a result, the other ED reflects the traffic back to the sender data center site and forwards multiple replicas of the traffic.

·         Condition: This symptom might occur if an uplink or downlink fails and traffic fails over between the EDs through the IPL.

·         Workaround: None.

202205091692

·         Symptom: The device erroneously deletes outgoing Layer 3 Ethernet interfaces from the multicast forwarding entries of a multicast group after an interface leaves the multicast group and joins another one.

·         Condition: This symptom might occur if the following events occur:

a.    Fast-leave processing is enabled on Layer 2 and Layer 3 Ethernet interfaces.

b.    Multiple interfaces join multicast group 1.

c.    An interface leaves multicast group 1 and then joins multicast group 2, and the report message for joining multicast group 2 and the leave message for leaving multicast group 1 are encapsulated into one packet.

·         Workaround: Do not execute the igmp fast-leave command on Layer 3 Ethernet interfaces.

202208181547

·         Symptom: The same gRPC packet type has different packet formats in different software versions (for example, R6635 and E6706).

·         Condition: This symptom occurs if two switches loaded with different software version are configured to send gRPC packets of the same type to a gRPC server.

·         Workaround: Configure the gRPC server to accept different packet formats of the same gRPC packet type.

202209212126

·         Symptom: The PVST state is abnormal. As a result, traffic cannot be forwarded.

·         Condition: This symptom occurs if Device A and Device B are interconnected and run PVST, the private VLAN feature is configured on Device A, and the port private-vlan trunk secondary command is executed on the interface connecting Device A to Device B.

·         Workaround: Do not execute the port private-vlan trunk secondary command on a PVST network.

202303250552

·         Symptom: On an M-LAG system, a small number of packets are loss during a GIR upgrade.

·         Condition: This symptom occurs if traffic is present on the AC on the M-LAG interface.

·         Workaround: None.

202305260415

·         Symptom: After a device is rebooted, the subcard configuration is lost.

·         Condition: This symptom occurs if an IRF member device with subcards is rebooted, the subcards are unplugged during the reboot process, and the subcards are plugged again after the device is rebooted.

·         Workaround: Do not unplug subcards during the reboot process.

202403111706

·         Symptom: Ports on the LSWM116FC interface module cannot be connected.

·         Condition: This symptom occurs if you switch the interface type from Ethernet to FC for ports on the LSWM116FC interface module, and then switch the interface type back to Ethernet.

·         Workaround: None.

202401040403

·         Symptom: If you execute the shutdown command on the VLAN interface, hardware BFD cannot detect that the interface state has changed to down.

·         Condition: This symptom occurs if you use an IP address to configure a hardware BFD session on a VLAN interface, and then execute the shutdown command on the VLAN interface to shut it down.

·         Workaround: Use software BFD to replace hardware BFD for detecting state changes of the VLAN interface.

202312190713

·         Symptom: Outbound flow mirroring does not take effect.

·         Condition: This symptom occurs if you configure outbound flow mirroring to mirror traffic to another member device after forming an IRF fabric by using LS-6850-56HF-H1 and LS-6850-56HF-H3 switches.

·         Workaround: Do not use the LS-6850-56HF-H1 and LS-6850-56HF-H3 switches to form an IRF fabric, or configure the flow mirroring destination interfaces on the same device.

202402030162

·         Symptom: The dhcp snooping trust command cannot take effect on a VSI.

·         Condition: This symptom occurs if you perform the following operations:

a.    Configure the dhcp snooping trust command in a VSI and on an AC port.

b.    Undo the dhcp snooping trust command on the AC port. This operation mistakenly removes the related flag from the VSI, causing the symptom.

·         Workaround: Undo the dhcp snooping trust command in the VSI, and then reconfigure the command.

202402041660

·         Symptom: On the 6850 or 9850 device, even when loose uRPF check is enabled and a default route is configured with a reachable next hop, traffic forwarding may still encounter issues.

·         Condition: This symptom occurs if you enable loose uRPF check on the 6850/9850 device and manually set the next hop of the default route to the CPU.

·         Workaround: Ensure that the manually configured default route's next hop is valid and does not point to the CPU or a blackhole address.

202401290949

·         Symptom: Duplicate traffic exists in the network.

·         Condition: This symptom occurs if FRR is enabled and it affects broadcast traffic in an ES network.

·         Workaround: Use unicast forwarding.

202310301520

·         Symptom: BFD flapping occurs with a certain probability.

·         Condition: This symptom occurs in an M-LAG network where devices that support hardware BFD are configured. If you shut down the physical interface directly connected to a downlink device to have the reachable path traverse the IPL, BFD flapping occurs.

·         Workaround: None.

202402200464

·         Symptom: The device experiences an abnormal reboot.

·         Condition: This symptom occurs when multiple interfaces on the device are configured with sFlow sampling and the interfaces receive a large amount of traffic.

·         Workaround: In interface view, configure a higher sFlow packet sampling rate to reduce the number of packets sampled by sFlow.

202403070954

·         Symptom: When both arp snooping and arp suppression are configured on a VSI, the local ARP flood suppression entries migrate from the M-LAG interface to the peer-link interface, and static ARP snooping entries are generated. As a result, ARP entries do not have outgoing interfaces. The same situation can also occur with the ND protocol.

·         Condition: This symptom occurs if arp snooping and arp suppression are configured, and endpoint migrate from the M-LAG interface to the single-homed mode on an EVPN+M-LAG network.

·         Workaround: Disable ARP snooping, or prevent endpoints from switching to the single-homed mode.

202403090085

·         Symptom: Traffic is interrupted on the M-LAG interface due to the dispute guard feature.

·         Condition: This symptom occurs if the following conditions exist:

¡  In the network configured with both the spanning tree protocol and M-LAG, upgrade the M-LAG system by using the traditional method: first upgrade the secondary member device, and then disable the downlink interfaces on the primary member device.

¡  The rlink reliability settings are different between versions before and after upgrade.

·         Workaround: Before upgrade, execute the undo stp dispute-protection command to disable the dispute guard feature on the M-LAG device.

202401051728

·         Symptom: When an FTP client copies a file from the device, the following RAS alarm is generated: EEPROM read/write failed.

·         Condition: This symptom occurs if the device acts as an FTP server and the connection is established for the first time.

·         Workaround: None.

202403181643

·         Symptom: Failed to log in to the device through Telnet.

·         Condition: This symptom might occur if you enter ASCII code 19 in decimal notation (default stop character for PTY) in the password for Telnet login, which causes login timeout and failure to close the Telnet connection.

·         Workaround: Do not enter ASCII code 19 in decimal notation when you enter a password for login.

202404130067

·         Symptom: If ECMP contains 128 next hops, and you shut down one or multiple interfaces, a number of 2 to 10 packets might be lost.

·         Condition: This symptom occurs if ECMP contains 128 next hops, and you shut down one or multiple interfaces.

·         Workaround: If ECMP contains too many next hops, do not shut down interfaces.

202405060191

·         Symptom: The Ethernet link aggregation mode LBN group feature does not take effect when the following conditions are met:

¡  Both the ECMP-mode LBN group feature and the Ethernet link aggregation mode LBN group feature are configured.

¡  LBN group member interface delete actions are performed (such as Layer 2/3 mode switching, port split and combination, and removal of LBN group member interfaces).

·         Condition: This symptom might occur when the following conditions are met:

¡  Both the ECMP-mode LBN group feature and the Ethernet link aggregation mode LBN group feature are configured.

¡  LBN group member interface delete actions are performed (such as Layer 2/3 mode switching, port split and combination, and removal of LBN group member interfaces).

·         Workaround: Do not configure both the ECMP-mode LBN group feature and the Ethernet link aggregation mode LBN group feature or perform LBN group member interface delete actions such as Layer 2/3 mode switching, port split and combination, and removal of LBN group member interfaces.

202406200682

·         Symptom: The switch reboots due to memory exhaustion after the buffer transient-capture enable command is executed on an interface.

·         Condition: This symptom occurs if you specify an ACL in the command and the captured packets are not TCP or UDP packets.

·         Workaround: Do not specify an ACL in the buffer transient-capture enable command if the captured packets are not TCP or UDP packets.

202406261321

·         Symptom: In a multicast VXLAN, the switch fails to forward multicast traffic.

·         Condition: This symptom occurs if the following operations are performed:

a.    Execute the reset multicast forwarding-table command or stop traffic forwarding after traffic is switched to the data group.

b.    Forward traffic again when multicast forwarding entries are cleared.

·         Workaround: Do not configure a data group.

202406190225

·         Symptom: In a multicast VXLAN, the switch fails to forward traffic from the source to a receiver.

·         Condition: This symptom occurs if the following conditions exist:

¡  An L3 VXLAN ID is configured for the public instance.

¡  Multicast VXLAN is not configured for the public instance.

·    Workaround: Configure Multicast VXLAN for the public instance.

List of resolved problems

Resolved problems in R6715P01

202401161819

·         Symptom: A device fails to roll back BGP configuration.

·         Condition: This symptom occurs if the AS number of a BGP peer changes after BGP configuration rollback.

202302141258

·         Symptom: On an EVPN M-LAG system, learned dynamic ND entries never age.

·         Condition: This symptom occurs after an M-LAG member device is rebooted.

202312271152

·         Symptom: The BFD session flaps once if the statistics l3-packet enable inbound command is configured on a network enabled with BFD.

·         Condition: This symptom might occur if the statistics l3-packet enable inbound command is configured on a network enabled with BFD.

202401050745

·         Symptom: The M-LAG table reports an error.

·         Condition: This symptom occurs if you read MIB node information.

202401151855

·         Symptom: After you configure an inband management VLAN by using the in-band management vlan command, packets on the corresponding VLAN interface should only pass through hardware forwarding. However, ARP packets are actually copied and sent to the controller during hardware forwarding.

·         Condition: This symptom occurs if two OpenFlow instances on the device both match packets of the specified VLAN interface, and the corresponding VLAN is configured as the inband management VLAN for one instance.

202402020349

·         Symptom: Broadcast packets passing through a real tunnel are not dropped.

·         Condition: This symptom occurs if broadcast packets pass through a real tunnel in an M-LAG VXLAN network.

202312011980

·         Symptom: The device restarts abnormally.

·         Condition: This symptom might occur if a large amount of route oscillation occurs.

202404021174

·         Symptom: No output is displayed after you execute the display transceiver power command.

·         Condition: This symptom might occur if you execute the display transceiver power command to power information for transceiver modules.

202403080772

·         Symptom: The device restarts abnormally.

·         Condition: This symptom might occur in the following conditions:

¡  The device uses gRPC to subscribe to RoCEv2 traffic events and reports flow tables containing generated RoCEv2 traffic via gRPC.

¡  The gRPC process restarts abnormally.

202403120391

·         Symptom: The if-match any command in a class-behavior association cannot match IPv4 packets in a QoS policy applied to the outbound direction.

·         Condition: This symptom occurs if the following operations are performed:

a.    Configure a QoS policy with three class-behavior associations. The first class-behavior association is used to match any packets (if-match any), the second class-behavior association is used to match IPv4 packets, and the third class-behavior association is used to match IPv6 packets.

b.    Enable statistics collection for outgoing Layer 3 packets on an interface and apply the QoS policy to the outbound direction of the interface.

c.    Delete the second class-behavior association.

202402060902

·         Symptom: Failed to deploy a static ARP entry that contains a VSI. However, when the device starts with the configuration, the configuration succeeds but does not take effect.

·         Condition: This symptom occurs if you configure a static ARP entry that contains a VSI not bound to a tunnel interface.

202402260716

·         Symptom: After you execute the arp route-direct advertise tag tag-value command on an interface and ARP advertises ARP entries to generate direct routes, ARP does not update route management information if you edit the route tag or preference for the ARP-advertised direct routes.

·         Condition: This symptom occurs if you edit the route tag or preference for the ARP-advertised direct routes after you configure ARP direct route advertisement on an interface.

202401111026

·         Symptom: If you repeatedly use the evpn edge group command to configure and delete the virtual ED address, tunnel address information might be incorrect.

·         Condition: This symptom might occur if the following conditions exist:

¡  In an EVPN VXLAN network, BGP is configured with multiple RR-oriented peers. The source addresses used for peer session establishment are not specified on those peers.

¡  The evpn edge group command is repeatedly use to configure and delete the virtual ED address.

202401311793

·         Symptom: The sysmand process abnormally quits and the device generates core files.

·         Condition: This symptom might occur is a corrupted .bin file is uploaded to the device.

202401230998

·         Symptom: MAC learning does not take effect on an interface.

·         Condition: This symptom might occur if you disable MAC learning globally, perform port splitting or merging, and then enable MAC learning globally.

202402211655

·         Symptom: Ports on the device do not recognize Alibaba or ACT 100G ZR4 modules.

·         Condition: This symptom occurs if you install an Alibaba or ACT 100G ZR4 module on a port of the device.

202403130948

·         Symptom: After running for a period of time, the PTP loses clock and fails to synchronize the time, with an offset exceeding 400,000 ns per second if the frequency offset remains below 10 ns after PTP convergence and clock source lock.

·         Condition: This symptom might occur if the frequency offset remains below 10 ns after PTP convergence and clock source lock.

·         Remarks: After the clock converges to a narrow range of accuracy, frequency offset adjustments fail to take effect. This causes abnormal accumulations of frequency values, which continuously build up and eventually trigger a frequency reset callback. This causes the clock to become unlocked and unable to recover.

202402201209

·         Symptom: The multicast packets with a group address in the 224.0.0.0 or 224.0.1.0 network are dropped in a VLAN.

·         Condition: This symptom occurs if dropped unknown multicast data packets is enabled for the VLAN.

202404130541

·         Symptom: An interface is always up and cannot switch between Layer 2 mode and Layer 3 mode.

·         Condition: This symptom might occur if a 10G fiber interface is inserted with a fiber-to-copper transceiver module and the loopback-test internal command is executed on that interface.

202403211980

·         Symptom: An interface failed to come up on the device.

·         Condition: This symptom might occur if the device is inserted with a third-party 100G LR4 long-reach transceiver module.

·         Remarks: The impacted modules include LR4, ER4L, DWDM2, ZR4, DR1, LR1, and FR1.

202208050810

·         Symptom: The protocol queue on the device is congested and has packet loss, causing frequent IS-IS flapping

·         Condition: This symptom occurs if the following conditions exist:

a.    The controller has issued an ACL to filter DHCP messages sent to the controller.

b.    A large number of packets with unreachable destination IPs are received from the VXLAN tunnel interface.

202404291067

·         Symptom: ND/IGMP protocol packets are forwarded abnormally on blocked ports.

·         Condition: This symptom occurs if the following conditions exist on the overlay network:

a.    The spanning tree protocol is enabled globally and an AC interface is created on the device.

b.    An interface or aggregate interface is blocked by STP.

202404090532

·         Symptom: The ND outgoing interface learned by the gateways on both M-LAG member devices is the peer-link interface. As a result, a traffic loop is generated and traffic fails to be forwarded.

·         Condition: This symptom occurs if the following operations are performed in a VLAN M-LAG network:

a.    The gateways on both M-LAG member devices have local ND proxy enabled.

b.    An M-LAG member device initiates ND detection to an unknown IPv6 host.

202404291194

·         Symptom: Failed to bind a VSI to a VXLAN ID, but no log indicating a failure caused by hash conflict is printed.

·         Condition: This symptom might occur when you configure a large number of ACs or VSIs.

202404100492

·         Symptom: When you configure the ip load-sharing mode per-flow command, you can specify the algorithm, tunnel, and five-tuple parameters together. However, if you delete the algorithm, tunnel, or five-tuple configuration, the other per-flow configurations will also be deleted. For example, after you execute the undo ip load-sharing mode per-flow algorithm command, the other per-flow configurations will be deleted, including the tunnel and five-tuple configurations.

·         Condition: This symptom might occur when you delete the configuration of any parameter in the ip load-sharing mode per-flow command.

202404220719

·         Symptom: Traffic forwarding based on ECMP routes fail.

·         Condition: This symptom might occur if IPv6 routes with prefixes longer than 64 bits form ECMP routes when the hardware resource mode is IPv6-64.

202405061402

·         Symptom: LBN configuration fails to take effect after upgrading the primary and backup in an IRF environment.

·         Condition: This symptom might occur if the interfaces acting as group members are Layer 3 interfaces.

·         Remarks: If this issue occurs after the device is upgraded from R6715 or an earlier version to R6715P01, you can delete the LBN configuration, and then re-configure LBN configuration.

202401041128

·         Symptom: After the external egress recovers from a fault, multicast traffic is interrupted for a long period of time when the primary border device resumes carrying multicast traffic.

·         Condition: This symptom occurs if the following operations are performed:

¡  Multicast traffic from an external source is forwarded to leaf devices through the border devices of two DCs in a cross-DC EVPN network. In normal conditions, multicast traffic is forwarded through the primary border device.

¡  When the external egress on the primary border device experiences a fault, multicast traffic is forwarded to the leaf devices through the secondary border device and the ED DCI path.

202406121282

·         Symptom: After you configure flow sampling on an interface to sample the inbound packets and configure the sampling rate, the outbound packets of the interface are also sampled.

·         Condition: This symptom occurs if you configure sFlow to sample the inbound packets of an interface.

202406121195

·         Symptom: The received VLAN-tagged packets do not carry VLAN tags after they are sampled by sFlow.

·         Condition: This symptom occurs if you configure sFlow sampling on a main Layer 3 Ethernet interface and configure IP addresses for its Layer 3 Ethernet subinterfaces.

202405060248

·         Symptom: In an M-LAG network, when the peer-link flaps, messages about configuration inconsistency are reported, but the display m-lag consistency command shows no relevant information.

·         Condition: This symptom might occur when the M-LAG interface does not exist or is not associated with a VSI and the peer-link interface flaps.

202405292207

·         Symptom: In an EVPN+IRF network, two leaf nodes use the same MAC address. As a result, the MAC address entries of the other leaf nodes point to incorrect destinations.

·         Condition: This symptom occurs if the MAC address synchronized from the EVPN remote device is overridden when the subordinate IRF member device synchronizes its MAC address to the master IRF member device. As a result, the deletion and addition of the local MAC address might not be timely reported.

202405131762

·         Symptom: Peer device Leaf2 did not correctly record the proxy status of Leaf1, leading to the erroneous forwarding of IGMP general query packets to Leaf1, resulting in superfluous packets.

·         Condition: This symptom might occur when you first set up an EVPN network, and then execute the igmp-snooping proxy enable command on Leaf1.

202405060900

·         Symptom: The information about dual-blade fans is displayed incorrectly.

·         Condition: This symptom might occur if you execute the display key-component command to view speed information about other dual-blade fans after you remove a dual-blade fan.

202406111529

·         Symptom: After you execute the restore factory-default command to restore a device to factory defaults, the system generates the PKT_CheckFileHead failedFailed message during the device restart.

·         Condition: This symptom might occur if you execute the restore factory-default command to restore a device to factory defaults, and then restart that device.

202403270738

·         Symptom: A CRC error packet occurs on an interface.

·         Condition: This symptom might occur if MACsec is enabled on an interface on the LSWM18CQMSEC interface card and the interface forwards traffic at a speed that exceeds the limit.

202401250136

·         Symptom: The device might fail to withdraw routes on a peer.

·         Condition: This symptom occurs if the following conditions exist:

a.    First-AS-number check is enabled for EBGP routes on the device by the peer-as-check enable command, and the device has multiple peers.

b.    The device updates and withdraws BGP routes simultaneously.

Resolved problems in R6715

202306160638

·         Symptom: VRRP cannot learn unicast ARP entries with the destination MAC addresses as VRRP virtual MAC addresses.

·         Condition: This symptom occurs on an M-LAG+VRRP network.

202306070923

·         Symptom: After you execute the undo ospf command on a device in a certain large-scale network, the kernel of the device gets stuck, and the device reboots unexpectedly.

·         Condition: This symptom occurs if the following operations are performed on a certain large-scale network with a large number of devices interconnected by using IGP:

a.    Establish BGP and IBGP neighbors among these devices through BGP RRs.

b.    Enable the label capability and labeled routes.

c.    Execute the undo ospf command.

202212221227

·         Symptom: A security risk exists on the switch.

·         Condition: This symptom occurs if a self-signed certificate is saved in the PKCS#12 certificate file format without an encryption password and can be parsed by a third-party tool.

202305291896

·         Symptom: During a step-by-step ISSU on an IRF fabric, the convergence time of some traffic is 2 seconds.

·         Condition: This symptom occurs if the configuration file of a member device include EVPN and VXLAN settings.

202310161033

·         Symptom: The device reboots unexpectedly.

·         Condition: This symptom might occur if the vxlan default-decapsulation source command is executed after the MPLS hardware resource entry limit is exceeded.

202309280817

·         Symptom: Aggregation management interfaces are configured. After the device reboots with saved running configuration, the aggregation management interfaces do not take effect.

·         Condition: This symptom might occur if aggregation management interfaces are configured, the running configuration is saved, and the device is rebooted.

202312270219

·         Symptom: When the physical status of a port changes to Down, the logical status of that port remains Up at the underlying layer, and the port can send and receive packets normally.

·         Condition: This symptom might occur if STP is disabled and a firmware failure interrupts physical port status detection on the device.

202312150636

·         Symptom: The function to disable MAC address learning on new ports does not take effect.

·         Condition: This symptom might occur if the following conditions exist:

a.    MAC address learning is disabled globally.

b.    Port splitting or merging is performed.

202312221597

·         Symptom: The traffic on the main interface is dropped after a QoS policy with a deny action is applied to a Layer 3 aggregate subinterface.

·         Condition: This symptom occurs if you apply a QoS policy with a deny action to a Layer 3 aggregate subinterface.

202312062097

·         Symptom: Network congestion occurs when inter-VPN traffic is repeatedly forwarded by the device-internal loopback interface.

·         Condition: This symptom might occur if traffic matching static route configuration is forwarded through repeated routing table lookups in two VPN instances on the same device. Because the TTL of packets is not decreased by 1 when they pass through a loopback interface, traffic loop forwarding occurs, resulting in congestion.

202401080838

·         Symptom: The class-based accounting action in a QoS policy cannot count IPv6 traffic.

·         Condition: This symptom occurs if the if-match any clause is configured in the traffic class.

202401101931

·         Symptom: Next hop loss occurs after a refresh of the tunnel next hop.

·         Condition: The symptom occurs if you configure link-delay on the tunnel-side interface, which causes the interface to disconnect and then triggers a tunnel next hop refresh.

202402061134

·         Symptom: Authentication-related configuration fails to deploy.

·         Condition: This symptom occurs when you use NETCONF to configure authentication settings.

202402061677

·         Symptom: IPv4 traffic fails to be forwarded correctly.

·         Condition: This symptom occurs if the following conditions exist on an MVXLAN network:

¡  Configurations exist in both MVXLAN IPv4 address family view and MVXLAN IPv6 address family view.

¡  When IPv4 and IPv6 traffic is forwarded correctly, delete the configuration in MVXLAN IPv6 address family view.

202402060953

·         Symptom: The configured static ARP entry fails the check.

·         Condition: This symptom occurs if you specify a VSI and a tunnel interface when configuring a static ARP entry but no binding exists between them.

202309110615

·         Symptom: BGP flaps on a device.

·         Condition: This symptom occurs if the following conditions exist on the device:

a.    The device receives a large number of ipv4 BGP attack packets with TTL=1.

b.    The rate of delivering BGP packets to the CPU exceeds the upper hardware limit.

202310100263

·         Symptom: After the m-lag extra-vlan command is executed, the M-LAG member devices cannot synchronize ARP or ND entries for the extra VLANs through the peer-link interface.

·         Condition: This symptom might occur if some M-LAG interfaces are not assigned to the extra VLANs, and the device is rebooted or the peer-link interface flaps.

202307201560

·         Symptom: After the IS-IS route advertisement mode is changed from single-source to multi-source, route calculation errors occur, causing incorrect traffic forwarding.

·         Condition: This symptom might occur if the following conditions exist:

¡  FRR is enabled for IS-IS on the device.

¡  IS-IS routes have multiple advertisement sources, each with equal-cost output interfaces.

202211300042

·         Symptom: With NSR disabled, BGP performs active/standby switchover on the local device after GR capacity negotiation with a peer. However, the peer does not terminate the related peer session during active/standby switchover, because it is unaware of the abnormal TCP connection with the local device. After active/standby switchover, the local device cannot establish a BGP session to the peer unless the peer session to the local device times out on the peer side.

·         Condition: This symptom might occur if the following conditions exist:

¡  NSR is disabled, but BGP performs active/standby switchover on the local device after GR capacity negotiation with a peer.

¡  The previous peer retains the BGP peer session to the local device during active/standby switchover.

202309090022

·         Symptom: When NETCONF is used for device management and configuration, no information is displayed when you perform the operation of reading all device configurations.

·         Condition: This symptom occurs if only automatic tunnels exist and you execute the get-bulk operation to obtain the tunnel configuration.

Resolved problems in E6713P01

202312260590

·         Symptom: Obtaining the full device configuration through NETCONF timed out.

·         Condition: This symptom occurs after you obtain the full device configuration through NETCONF for more than 1000 times.

202311230241

·         Symptom: The following problems might occur with a low probability:

¡  The PVID of an aggregate interface is 1. However, VLAN 1 is not permitted on the aggregate interface, and the VLANs in STG 1 are not permitted either.

¡  The state of an aggregate interface is forwarding in the display stp brief command output, but the state of the corresponding aggregation member ports is block in STG 1 in the hardware.

¡  An AC created on an aggregate interface cannot forward traffic.

·         Condition: This symptom occurs if the PVID of the aggregate interface is in STG instance 1 and the aggregate interface does not permit any VLANs in STG instance 1.

202310230059

·         Symptom: For the C2000 device, the flash file system changes to read-only with a low probability, which might cause configuration file saving failures.

·         Condition: This symptom might occur if USB2244 is faulty, which causes the flash file system to change to read-only.

202311040370

·         Symptom: The interface information on the S6850-56HF device displays GE 1/0/58, but the GE 1/0/58 interface has been deleted.

·         Condition: This symptom might occur if the S6850-56HF device in the extended operating mode is restarted.

202309111514

·         Symptom: On an EVPN network, rule ARP entries are incorrectly deleted.

·         Condition: This symptom might occur in one of the following conditions:

¡  The number of ARP entries has reached the upper limit and the device cannot learn new ARP entries.

¡  In an M-LAG overlay scenario, ARP packets are received by peer-link interfaces. ARP learning fails because the M-LAG interfaces take priority to learn ARP entries.

¡  If you have configured ARP attack protection features on the device, these features might incorrectly delete valid ARP entries.

¡  Gratuitous ARP packets are injected to the device with gratuitous ARP packet learning unconfigured.

¡  The source and destination IP addresses in the ARP packets reside on different network segments and proxy ARP is not configured.

202212010143

·         Symptom: Member devices in an EVPN M-LAG system do not synchronize ARP flood suppression entries.

·         Condition: This symptom might occur if ARP flood suppression entries move from a remote VTEP to a single-homed interface of an M-LAG member device.

202305311737

·         Symptom: The mac-address mac-learning pdu command fails to be configured if interface splitting is configured first after the device starts up and then the mac-address mac-learning pdu command is configured.

·         Condition: This symptom might occur if interface splitting is configured first after the device starts up and then the mac-address mac-learning pdu command is configured.

202309271663

·         Symptom: After the ND detection feature is enabled in VLAN view and global static IPSG bindings are configured, ND messages from the VLAN cannot be forwarded.

·         Condition: This symptom might occur if global static IPSG bindings are configured and no permit rules are configured on the related VLAN interface.

202204121359

·         Symptom: During a step-by-step ISSU, the OSPFv3 neighbor of a Layer 3 aggregate interface flaps.

·         Condition: This symptom occurs if the following conditions exist:

¡  The upgrade is from F6701L01 to E6702.

¡  The irf mac-address persistent timer command is executed.

202311171824

·         Symptom: The device restarts because the ports on the device fail to come up properly.

·         Condition: This symptom might occur if a module is inserted during the device operation.

202309260387

·         Symptom: The ovsdb-server process abnormally exits with a low probability.

·         Condition: This symptom might occur if the controller deploys the configuration.

202309132118

·         Symptom: The S6850-56HF and S9820-8C devices restart due to a power outage.

·         Condition: This symptom might occur if the fluctuation of the secondary power voltage and interference with power-on control signals can trigger the ADM1166 device to mistakenly shut down.

Resolved problems in E6713

202208050065

·         Symptom: On an LSWM124XG2Q card, the MACsec protocol is down, and the interface is down.

·         Condition: This symptom occurs if the following operations are performed:

a.    Install an SFP-GE-T or SFP-GE-T-D module into the interface on the LSWM124XG2Q card and connect it to an interface on an LSWM124XGT2Q card to establish an MKA session.

b.    Disable MACsec on the interface of the LSWM124XG2Q card.

202209230460

·         Symptom: If multiple dial-in sessions in gRPC gNMI mode issue subscriptions concurrently, a session might fail to receive data.

·         Condition: This symptom occurs if multiple dial-in sessions in gRPC gNMI mode issue subscriptions concurrently.

202211140499

·         Symptom: OSPF BFD sessions flap repeatedly.

·         Condition: This symptom occurs if you use borrowed loopback interface addresses to establish OSPF neighbor relationships, configure BFD for OSPF, and then reboot the device.

202304120566

·         Symptom: Only a maximum of two DSCP mappings in one priority-flow-control dscp-mapping command can take effect.

·         Condition: This symptom occurs when you configure more than two DSCP mappings in one priority-flow-control dscp-mapping command.

202110191607

·         Symptom: When the initialization of the CPU management port fails on the S6850, S9850, S9820, S9820-8C, or S6805 device, the output from the display interface command still shows inbound statistics and CRC errors.

·         Condition: This symptom might occur if the initialization of the CPU management port on the S6850, S9850, S9820, S9820-8C, or S6805 device has failed.

202303020270

·         Symptom: When the speed of a 25G interface is set to 10000 Mbps, the FEC mode configured for that interface does not take effect and is none by default.

·         Condition: This symptom might occur if the FEC mode is set for a 25G interface after the speed of that interface is set to 10000 Mbps.

202303250672

·         Symptom: After the vxlan vlan-based command is executed, a Layer 2 aggregate interface of the access type is moved between VLANs. As a result, ACs cannot be created on the aggregation member ports based on the new VLAN ID.

·         Condition: This symptom might occur if the following conditions exist:

¡  The vxlan vlan-based command is executed.

¡  The link type of the Layer 2 aggregate interface is access.

¡  The Layer 2 aggregate interface is configured as an edge port with the lacp edge-port command.

¡  Member ports of the Layer 2 aggregate interface are in individual state.

202305290148

·         Symptom: The device cannot forward untagged traffic correctly on a VXLAN network.

·         Condition: This symptom might occur if VXLAN is configured and the dhcp snooping trust tunnel command is executed.

202306021684

·         Symptom: The hh3cStackBoardRole node in the MIB Browser can obtain only one role from all member devices in an IRF fabric.

·         Condition: This symptom occurs when you use the MIB Browser to view the information of the hh3cStackBoardRole node for the IRF fabric.

202306082492

·         Symptom: After the configuration of the device is rolled back or the device is rebooted with configuration, ARP requests will be broadcast and Layer 3 unicast packets will be transparently transmitted.

·         Condition: This symptom occurs if a large number of Layer 3 Ethernet interfaces exist on the device when the configuration of the device is rolled back or the device is rebooted with configuration.

202306131838

·         Symptom: The device generates the following alarm message: Operation failed. The minimum interval between IRF bridge MAC address modifications is 30 seconds. Please try again later.

·         Condition: This symptom occurs when you execute the irf mac-address command to configure the IRF bridge MAC address.

202306141412

·         Symptom: The controller disconnects from the device during patch installation and the NETCONF over SOAP configuration on the device is lost.

·         Condition: This symptom occurs when you install a patch by using the controller, which restarts the xmlcfgd process.

202306161118

·         Symptom: After a Layer 2 interface is rolled back to a member port of a Layer 3 aggregation group enabled with PIM-SM, it fails to forward to multicast traffic because no VFP ACL is deployed to it.

·         Condition: This symptom occurs after a Layer 2 interface is rolled back to a member port of a Layer 3 aggregation group enabled with PIM-SM.

202306190397

·         Symptom: Traffic forwarding exceptions occur on a 1G interface or an interface negotiated to 1G.

·         Condition: This symptom might occur on a 1G interface or an interface negotiated to 1G.

202307041942

·         Symptom: No prompt message is displayed when you configure multiport ARP entries or multiport MAC entries without specifying a service loopback interface on an underlay network. The entries cannot be deployed to the hardware.

·         Condition: This symptom occurs if you do not specify a service loopback interface when you configure multiport ARP entries or multiport MAC address entries.

202307061934

·         Symptom: ARP messages are broadcasted instantaneously.

·         Condition: This symptom might occur if the device restarts or a subcard is re-installed.

202307111015

·         Symptom: A QoS policy applied to an aggregate interface does not take effect on new member ports that join the aggregation group.

·         Condition: This symptom occurs if you apply a QoS policy to an aggregate interface and then add new ports to the aggregation group.

202307111828

·         Symptom: The arp snooping enable command failed to be executed in VLAN view on some products and the system prompted an operation failure.

·         Condition: This symptom occurs when you execute the arp snooping enable in VLAN view on some products. The command has a command word that specifies RARP packet redirection to the CPU, which is not supported by some products.

202307210952

·         Symptom: On an M-LAG system with VRRP configured, the backup device in a VRRP group cannot learn ARP entries.

·         Condition: This symptom might occur if the backup device receives ARP unicast packets.

202308110863

·         Symptom: After sending ICMP redirect messages and sending ICMPv6 redirect messages are enabled synchronously, they always function even if you disable them.

·         Condition: This symptom might occur if both the ip redirects enable command and the ipv6 redirects enable command are executed synchronously to enable sending ICMP and ICMPv6 redirect messages.

202308141250

·         Symptom: When DHCPv6 relay agent features are configured on a device, the device delivers traversing unicast IPv6 DHCP packets to its CPU, causing packet loss.

·         Condition: This symptom might occur if DHCPv6 relay agent features are configured on the device.

202309041408

·         Symptom: The device reboots repeatedly and cannot start up correctly.

·         Condition: This symptom occurs if you perform the following operations:

a.    Configure PTP in INT-PTP mode and then save the configuration and reboot the device.

b.    Modify the hardware-resource firmware mode to INT-BFD.

202309042691

·         Symptom: A BFD session flapping occurs.

·         Condition: This symptom occurs with a certain probability if you bring up a device interface with the undo shutdown command to perform bulk software BFD negotiation and bring up the BFD session. The BFD session might come up after a flapping.

202309071510

·         Symptom: The primary device and the secondary device in an M-LAG system have different DHCP snooping entries within a period.

·         Condition: This symptom occurs if DHCP snooping is disabled when the peer-link interfaces are flapping and is enabled after peer-link interface flapping.

202309071523

·         Symptom: DHCPv6 commands fail to be deployed after users come online and the DHCP process starts

·         Condition: This symptom occurs if the address pool uses the prefix configured by the ipv6 prefix command and the network prefix command is configured in the address pool.

202309110535

·         Symptom: When an IRF fabric forwards traffic across member devices, it cannot obtain outbound traffic statistics for a GRE tunnel interface even if that interface is configured with the statistics l3-packet enable outbound command.

·         Condition: This symptom occurs if the IRF fabric forwards traffic across member devices and cannot match the next hop class ID of the output interface for collecting outbound statistics for tunneled traffic.

202309110575

·         Symptom: An IPv4 ACL will be deployed if a traffic class in a QoS policy applied to the outbound direction is configured to match the EtherType.

·         Condition: This symptom occurs if a traffic class in a QoS policy applied to the outbound direction is configured to match the EtherType.

202309111302

·         Symptom: The device sends ICMP error packets if only Layer 2 multicast is configured.

·         Condition: This symptom occurs if you enable only Layer 2 multicast, enable the IGMP snooping querier, and enable sending ICMP destination unreachable messages.

202309120444

·         Symptom: On an IRF fabric, a host still receives multicast data from an output interface after sending a leave message.

·         Condition: This symptom occurs if the output interface is an aggregate interface.

202309132177

·         Symptom: After an IRF master/subordinate switchover, the MAC address of a VLAN interface repeatedly moves among the physical interfaces in that VLAN if BFD MAD is enabled on that VLAN interface.

·         Condition: This symptom occurs if you enable MAC move on an IRF fabric.

202309261948

·         Symptom: Statistics about ECMP resources are incorrect.

·         Condition: This symptom might occur if ECMP flaps.

202306060568

·         Symptom: Other routers cannot learn the OSPF external routes and default routes advertised by a device.

·         Condition: This symptom might occur if no interfaces are added into the OSPF process on the device and the nssa default-route-advertise command is configured in the OSPF process.

202305091145

·         Symptom: The ARP entries learned through LLDP on the local device are refreshed, which might cause route flapping.

·         Condition: This symptom occurs when the description information of the peer device, such as the system name, is changed.

202305190212

·         Symptom: A new switch ID does not take effect after modification.

·         Condition: This symptom might occur if the mirror-to interface command is executed with the erspanv3 and sampler keywords to modify the switch ID in ERSPANv3 mirroring packets.

202306072180

·         Symptom: On a physical interface of a DCI ED, cross-subnet rate limiting does not take effect on traffic that carries an unknown inner source MAC address.

·         Condition: This symptom might occur if L2VPN is enabled, tunneled traffic with an unknown inner source MAC address is received, and cross-subnet rate limiting is configured on a physical interface.

202307131776

·         Symptom: In the IRF environment, the BFD session established on the backup card interface repeatedly flaps,

·         Condition: This symptom occurs if you reboot the device after configuring BFD session parameters in the IRF environment.

202307211459

·         Symptom: CFD packets are not forwarded correctly.

·         Condition: This symptom occurs if you execute the cfd enable command globally, and then execute the undo cfd enable command for the device.

202307260983

·         Symptom: The virtual IP address of the IPv4 VRRP group configured on a VLAN interface cannot be pinged.

·         Condition: This symptom occurs with a low probability if you repeatedly enable and disable the spanning tree protocol globally when the spanning tree operates in PVST mode in a network configured with M-LAG and VRRP.

202309121717

·         Symptom: The spanning tree status displayed in the output from the display stp command is inconsistent with the actual condition.

·         Condition: This symptom occurs if you add a port that does not belong to any STG to the M-LAG aggregation group.

202207071638

·         Symptom: When the device is enabled with BGP Graceful Restart (GR) capability and has BGP sessions to non-H3C devices, the GR feature does not take effect.

·         Condition: This symptom occurs when the following conditions exist:

¡  The device is enabled with BGP GR capability and has established BGP sessions to non-H3C devices.

¡  The value for the Forwarding State(F) field is 0 in the OPEN messages from those non-H3C devices. In this situation, if you use the display bgp peer verbose command on the local device, the Forwarding State preserved by Peer for following Address families field in the command output is empty.

202212010145

·         Symptom: Member devices in an EVPN M-LAG system do not synchronize ARP flood suppression entries.

·         Condition: This symptom might occur if ARP flood suppression entries move from a remote VTEP to a single-homed interface of an M-LAG member device.

202303131032

·         Symptom: In the output of the display ipv6 interface command, the IPv6 address, interface name, and VPN fields are displayed on different lines, which should be displayed on the same line.

·         Condition: This symptom occurs if you execute the display ipv6 interface command.

202304100930

·         Symptom: Packets matching a QoS policy applied to the outbound direction of a VSI interface are mistakenly dropped.

·         Condition: This symptom might occur if the following operations are performed:

a.    Apply QoS policies to the outbound direction of two or more VSI interfaces.

b.    Apply a QoS policy to the outbound direction of a physical interface.

202304141939

·         Symptom: A network interruption occurs on the S9820-8C-SAN or S6850-56HF-SAN device during the process of transferring a large file via FTP.

·         Condition: This symptom might occur if the device uses FTP to transfer large files.

202304191794

·         Symptom: BFD flapping occurs on the device with a low probability.

·         Condition: This symptom occurs if a VSI interface receives a large number of ARP or RARP packets in an EVPN network, and VSIs or VSI configuration is changed.

202305110201

·         Symptom: On a multicast VXLAN network, multicast traffic cannot be forwarded.

·         Condition: This symptom occurs if the device starts with the factory defaults and then you configure multicast VXLAN in the following order: first configure tunnels and VSIs, and then configure multicast.

202305200097

·         Symptom: The xmlcfgd process on the device has exceptions after a patch is loaded on the device. Then, the controller cannot be reconnected to the device or the NETCONF feature has exceptions.

·         Condition: This symptom might occur if a patch for the xmlcfgd process is loaded on the controller connected to the device.

202306152032

·         Symptom: Static MAC address entries are configured for overlay MAC addresses that have been dynamically learned by an M-LAG member device, and the static MAC address entries cannot be synchronized to the M-LAG peer.

·         Condition: This symptom might occur if static MAC address entries are configured for overlay MAC addresses that have been dynamically learned by the M-LAG member device.

202307181232

·         Symptom: The peer-link interface incorrectly learns ARP entries. As result, remote IP addresses on the same subnet might fail to be accessed.

·         Condition: This symptom occurs if proxy ARP is configured for the M-LAG dual-active VLAN gateways or VRRP, and automatic ARP scanning is enabled by using the arp scan auto enable command.

202307200892

·         Symptom: Due to hash conflicts, the creation of AC-attached interfaces fails without any log prompts on the device.

·         Condition: This symptom might occur if a large number of AC-attached interfaces are configured on the device.

202307210976

·         Symptom: After you configure the network command in OSPF view, OSPF neighbor relationship establishment fails.

·         Condition: This symptom might occur if you perform the following operations:

a.    Add or remove the ospf 1 area and ospf network-type configurations.

b.    Configure the network command in OSPF view.

202309041301

·         Symptom:On an M-LAG system, packets received on an M-LAG interface are forwarded over the peer link and then forwarded out of the M-LAG interface in the same M-LAG group.

·         Condition:This symptom might occur if an M-LAG aggregation group flaps.

202309090399

·         Symptom: After the speed or duplex mode is changed for the copper management Ethernet interface of an S6850-56HF-SAN switch, the device fails to be pinged.

·         Condition: This symptom might occur if you change the speed or duplex mode for the copper management Ethernet interface of an S6850-56HF-SAN switch.

Resolved problems in E6712P01

None.

Resolved problems in E6712

202305041124

·         Symptom: The switch cannot obtain an IPv6 address after it is rebooted, and IPv6 automatic deployment fails.

·         Condition: This symptom occurs if the controller deploys the configuration to change the hardware resource mode during automatic deployment and the controller does not assign a fixed IPv6 address.

202305101923

·         Symptom: The system sends probe packets out of the VSI interface to the IP address in an aging ARP suppression entry even if the interface has been down.

·         Condition: This symptom might occur if you enable ARP suppression for a VSI and the VSI interface is down.

202305120015

·         Symptom: Packets matching a QoS policy applied to the outbound direction of a VSI interface are mistakenly dropped.

·         Condition: This symptom might occur if the following operations are performed:

a.    Apply QoS policies to the outbound direction of two or more VSI interfaces.

b.    Apply a QoS policy to the outbound direction of a physical interface.

202305180008

·         Symptom: In an EVPN or VXLAN distributed gateway network, when the device receives a tunneled packet with a source IP address the same as a VSI interface address, the device will reply with a gratuitous ARP response, which can lead to high CPU usage.

·         Condition: This symptom might occur if the distributed gateways perform ARP probing in response to traffic.

202305120953

·         Symptom: In a VXLAN network, VXLAN tunnel interfaces are not outgoing interfaces in multicast forwarding entries, and multicast forwarding fails.

·         Condition: This symptom might occur if VXLAN tunnels and VSIs are configured prior to multicast forwarding.

202305122075

·         Symptom: In a VXLAN network, traffic loss persists for longer than 2 seconds during an ISSU load.

·         Condition: This symptom might occur if an ISSU load or active/standby MPU switchover occurs in a VXLAN network.

202305041113

·         Symptom: The BFD session cannot come up.

·         Condition: This symptom occurs if frequent flapping occurs for the physical interfaces attached to the link associated with the BFD session.

202305220010

·         Symptom: In an EVPN network, the CPU usage of a leaf device is very high.

·         Condition: This symptom occurs if attached devices move between leaf devices, and the leaf device is enabled with ARP suppression.

202305232222

·         Symptom: Packets that enter the device from an AC on a Layer 2 aggregate interface cannot be forwarded out through the Layer 2 aggregate interface.

·         Condition: This symptom occurs if the aggregate interface has multiple member ports and the Selected states the member ports change when the AC is configured.

202304070641

·         Symptom: In the display mac-address statistics command output, the Total Multicast and Multiport MAC Addresses Available field displays 4000.

·         Condition: This symptom occurs if you execute the display mac-address statistics command to display MAC address table statistics after the device is rebooted.

202304060743

·         Symptom: A MAC authentication user is still online and cannot go offline after the offline detection timer expires.

·         Condition: This symptom occurs if a MAC authentication user stops sending traffic after coming online successfully. After the offline detection timer expires, execute the display mac-authentication command to identify whether the MAC authentication user is offline.

202305041120

·         Symptom: With VLAN-based VXLAN assignment enabled, after the permitted VLAN is modified on a Layer 2 aggregate interface of the access type, the Ethernet service instance corresponding to the VLAN cannot be generated.

·         Condition: This symptom occurs if you modify the permitted VLAN on the Layer 2 aggregate interface of the access type that is configured as an edge aggregate interface.

202305200364

·         Symptom: In the configuration file, the key for BGP MD5 authentication is displayed in plain text.

·         Condition: This symptom occurs if the value for the PasswordType field in the BGP CfgSession table is 2.

202305180009

·         Symptom: Route flapping occurs when ARP entries are updated due to LLDP information modification.

·         Condition: This symptom occurs if the LLDP packet length changes on the peer. For example, the sysname of the peer is edited.

Resolved problems in E6711

202212050034

·         Symptom: In an EVPN VXLAN network, a third-party device with an AC attached reports IPv6 address conflicts.

·         Condition: This symptom might occur if the peer H3C device has ND flood suppression enabled for the related VSI and no VSI interface is assigned to the VSI.

202207011235

·         Symptom: When MVXLAN supports M-LAG, the packets sent out of an M-LAG device are more than those received.

·         Condition: This symptom occurs if a large number of entries are configured on the M-LAG device, and the DCI and source configurations repeatedly change.

202208190593

·         Symptom: A QoS policy fails to be applied to a Layer 2 aggregate interface.

·         Condition: This symptom occurs if the traffic behavior is configured with a traffic policing action.

202208050810

·         Symptom: The Effective count field is always displaying 0 in the output from the display grpc verbose command.

·         Condition: This symptom might occur if you execute the display grpc verbose command after configuring periodical sampling in gRPC dial-out mode.

202302130821

·         Symptom: When an aggregation member port comes up,  its state will transition to Selected, then Unselected, and finally back to Selected again.

·         Condition: This symptom occurs if the following operations are performed:

a.    Configure the short LACP timeout interval on the port.

b.    Execute the link-delay down 5 command to configure the link state change suppression interval as 5 seconds on the port.

c.    Bring up the port.

202302140214

·         Symptom: Packets that are flow-mirrored to an interface are encapsulated abnormally.

·         Condition: This symptom occurs if you specify the IPv6 encapsulation method and configure a sampler when you configure flow-mirroring traffic to an interface.

202302090664

·         Symptom: In an M-LAG system, the peer-link interface learns MAC addresses incorrectly, leading to generation of abnormal forwarding entries.

·         Condition: This symptom might occur if one of the following conditions exists:

¡  The telemetry ifa device-id x.x.x.x command is executed on an S6850-56HF or S6850-2C device, and the LPORT value of a physical member interface of the peer link and the port number reserved for an internal loopback interface of INT are the same.

¡  Residual IRF physical interface configurations exist on the device, and the internal port number of the IRF physical interface is the same as the LPORT value of a physical member interface of the peer link.

202302131035

·         Symptom: Data collected in the ifmgr/trafficstatistics/interfaces path is abnormal. The collected data at the NMS side displays a jagged line in the data chart.

·         Condition: This symptom might occur when you specify the ifmgr/trafficstatistics/interfaces data collection path in gRPC dial-out mode.

202301170521

·         Symptom: Lower-layer ACL entries of OpenFlow entries are lost after VMs migrate, and some traffic fails to be forwarded.

·         Condition: This symptom might occur if VMs migrate.

202302031011

·         Symptom: The buffer apply command does not take effect on interfaces on a subcard or new breakout interfaces.

·         Condition: This symptom occurs if you insert a subcard or split an interface after executing the buffer apply command.

202302200113

·         Symptom: In an M-LAG system, after an ND entry migrates between the member devices, its outgoing interface becomes incorrect, and traffic interruption occurs.

·         Condition: This symptom might occur if an M-LAG member device reboots and synchronizes the ND entries of the M-LAG peer, and then an ND entry migrates.

202302070374

·         Symptom: After an IRF member device is rebooted, the ports on the device fail to come up.

·         Condition: This symptom might occur if the following conditions exist on the rebooted IRF member device:

¡  The 25-GE ports on LSWM124TG2H interface modules in the S6850-56HF, S6850-2C, or S9850-4C switch are configured to operate at 10 Gbps. The duplex full command is executed on a port in a port group. (Every four ports in ascending order of port number are organized into one group.)

¡  A large number of ports have modules installed but do not come up or have the shutdown command executed.

202209291014

·         Symptom: Duplicate multicast packets exist after one of the two outgoing tunnels for a static multicast group is flapped.

·         Condition: This symptom occurs if the static multicast group has more than 128 VSI interfaces as the outgoing interfaces and the actual outgoing interface is a tunnel interface.

202301120577

·         Symptom: After an incremental patch is uninstalled, the display boot-loader command does not display information about a non-incremental patch.

·         Condition: This symptom occurs if both an incremental patch and a non-incremental patch are installed.

202301150100

·         Symptom: Failed to apply ERSPAN-type QoS policies due to insufficient resources.

·         Condition: This symptom occurs if you apply a ERSPAN-type QoS policy to the inbound direction globally or apply ERSPAN-type QoS policies to the inbound direction of more than four interfaces.

202302090611

·         Symptom: The log file fabric.log generated by VCF fabric exhausts the memory.

·         Condition: This symptom occurs if the automated deployment scenario of VCF fabric runs for a long period of time or interfaces flap.

Resolved problems in R6710

202208241285

·         Symptom: A QoS policy applied to a control plane cannot filter the protocol packets to the control plane

·         Condition: This symptom occurs when you apply a QoS policy to a control plane to filter protocol packets.

202209211461

·         Symptom: A port that should be down periodically, repeatedly comes up and goes down.

·         Condition: This symptom occurs if the following conditions exist:

¡  The speed 1000 command is executed on a 10-GE port.

¡  The port has an SFP-GE-T/SFP-GE-T-D transceiver module installed.

¡  The shutdown command is not executed on the port.

202302070183

·         Symptom: After the igmp-snooping router-port-discard command is executed in a VLAN, the switch cannot forward IGMP protocol packets to the router ports in the VLAN.

·         Condition: This symptom occurs if the igmp-snooping router-port-discard command is executed in a VLAN.

202210202895

·         Symptom: IPv6 autoconfiguration fails on a device.

·         Condition: This symptom might occur when the device uses a third-party DHCPv6 server for IPv6 autoconfiguration and the DHCPv6 server checks the DUID in Option 1.

202211301422

·         Symptom: The device does not respond or reboots unexpectedly because the Intel C3XXX CPU is faulty.

·         Condition: This symptom occurs with a low probability when the system runs for a long time.

202212190854

·         Symptom: Multicast traffic cannot be broadcast in a VLAN when the hardware resource operating mode of the switch is ARP or MAC.

·         Condition: This symptom occurs if the hardware resource operating mode of the switch is ARP or MAC.

202207011516

·         Symptom: The link-delay down setting is configured on both ends of a link, and the link traverses an optical transmission device. After an optical link switchover occurs on the optical transmission device, the link-delay down setting does not take effect.

·         Condition: This symptom occurs if an optical link switchover occurs on the optical transmission device.

202207060567

·         Symptom: In the outbound direction of an interface, mirroring traffic to the CPU and packet capturing do not take effect.

·         Condition: This symptom occurs if you configure mirroring traffic to the CPU and packet capturing in the outbound direction of an interface.

202209130556

·         Symptom: Memory leaks occur.

·         Condition: This symptom occurs if the following conditions exist:

¡  The device uses a large number of VLAN interfaces and Layer 2 interfaces to forward multicast traffic.

¡  The device receives multicast traffic of different source-group pairs after multicast entries age out.

202208030541

·         Symptom: The MACsec protocol flaps on a subcard, and packet loss occurs.

·         Condition: This symptom occurs if another subcard configured with MACsec is removed and reinserted.

202208031661

·         Symptom: The LED for the master's IRF physical interface is on, and the LEDs for the subordinates' IRF physical interfaces are off.

·         Condition: This symptom might occur if the switch loads BootWare in full startup mode and performs system inspection.

202208161569

·         Symptom: The shutdown configuration on an interface of a subcard in a slot is lost after a subcard in another slot is removed and reinserted.

·         Condition: This symptom occurs if a subcard in another slot is removed and reinserted after the switch is deployed automatically.

202209010367

·         Symptom: The traffic rate of the ifmgr/statistics node appears as a saw-tooth in Grafana.

·         Condition: This symptom occurs if the following conditions exist:

¡  The json row-timestamp enable command is executed to enable per-row time-stamping for JSON-encoded subscription data.

¡  The switch uses gRPC to report the ifmgr/statistics node data at 5-second intervals.

202209270925

·         Symptom: If the buffer egress/ingress command is executed on an interface and then the operating mode of the interface is switched between Layer 2 and Layer 3, the buffer egress/ingress command configuration in the configuration file is lost. However, the configuration still takes effect.

·         Condition: This symptom occurs if the buffer egress/ingress command is executed on an interface and then the operating mode of the interface is switched between Layer 2 and Layer 3.

202210211599

·         Symptom: The switch gets stuck when the NETCONF <get-config> operation is used to retrieve information about the Ifmgr/Suppression table. The switch remains stuck until the set timeout time expires.

·         Condition: This symptom occurs when the NETCONF <get-config> operation is used to retrieve information about the Ifmgr/Suppression table.

202210191104

·         Symptom: VXLAN default decapsulation can be deployed from the CLI. When this feature is deployed through NETCONF, the device reports deployment success even through the deployment fails.

·         Condition: This symptom might occur if VXLAN default decapsulation is deployed through NETCONF.

202210171204

·         Symptom: A VSI with the igmp-snooping drop-unknown setting configured still can forward unknown multicast traffic in a VXLAN Layer 2 multicast environment.

·         Condition: This symptom might occur if the igmp-snooping drop-unknown command is executed in VSI view in a VXLAN Layer 2 multicast environment.

202210141248

·         Symptom: The BGP process is abnormal.

·         Condition: This symptom might occur if FRR is enabled globally for EVPN VXLAN.

202210110425

·         Symptom: The switch reboots after you apply a QoS policy to an interface and delete all actions in the traffic behavior in the QoS policy.

·         Condition: This symptom occurs if you apply a QoS policy to an interface and delete all actions in the traffic behavior in the QoS policy.

202210100072

·         Symptom: The switch cannot ping a directly connected device.

·         Condition: This symptom occurs if you use a physical port with a port ID greater than 127 on the switch for the ping operation. The port ID refers to the value of the Port field in the debug port mapping slot command.

202209261332

·         Symptom: When a device is cold or warm rebooted, the MIB nodes hh3cSysColdStartTrap and hh3cSysWarmStartTrap do not normally report traps.

·         Condition: This symptom occurs if the device is configured with SNMP and then rebooted.

202210090116

·         Symptom: On an EVPN VXLAN network, the outgoing traffic of an AC is forwarded in queue 2 by default, which is different from the queue to which the 802.1p priority is mapped.

·         Condition: This symptom occurs if the incoming port of an AC trusts the 802.1p priority of packets and the access mode of the AC is VLAN on an EVPN VXLAN network.

202211150761

·         Symptom: The CPU usage of a device is high.

·         Condition: This symptom occurs if a port is installed with an SFP copper port module SFP-GE-T/SFP-GE-T-D and the shutdown command is executed to shut down the port.

202210210266

·         Symptom: A MAC address might fail to move between IRF member devices.

·         Condition: This symptom occurs if a device attached to an IRF fabric moves between IRF member device and sends Layer 3 traffic to the IRF fabric.

202211100661

·         Symptom: On an EVPN VXLAN network, some routes cannot guide traffic forwarding.

·         Condition: This symptom occurs if multiple VPN instances exist on an EVPN VXLAN network and the automatically created VPN routes sent for the first time are withdrawn.

202210270699

·         Symptom: On a VXLAN network, broadcast traffic cannot be forwarded.

·         Condition: This symptom occurs if VSIs are repeatedly added and deleted on the device and the VFI entry index in the hardware exceeds 4095.

202211181011

·         Symptom: On a DRNI+EVPN network, a MAC address is migrated from an IPP to a single-homed interface, and the single-homed interface is shut down by the shutdown command. However, the ARP entries learned by the single-homed interface are not deleted.

·         Condition: This symptom occurs if the device MAC address is migrated from an IPP to a single-homed interface, and the single-homed interface is shut down by the shutdown command.

202211161812

·         Symptom: ARP packets cannot be flooded to different AC ports and tunnels in the same VSI.

·         Condition: This symptom occurs if the following steps are performed:

a.    Execute the arp suppression enable command to enable ARP suppression in a VSI view.

b.    Execute the gateway vsi-interface command to specify a gateway interface for the VSI, and then delete this setting.

c.    Remove ARP suppression settings.

202211090166

·         Symptom: When a 1-Gbps transceiver module is installed into an interface of an LSWM124TG2H subcard and the interface is configured with the speed 1000 command, the interface cannot come up.

·         Condition: This symptom occurs if the following operates are performed:

a.    A 1-Gbps transceiver module is installed into an interface of an LSWM124TG2H subcard and the interface is configured with the speed 1000 command.

b.    Then the speed 25000 or speed auto command is executed.

c.    The speed 1000 command is executed at last.

202211300367

·         Symptom: After you use the ecmp mode enhanced command to enable the enhanced ECMP mode, the hash consistency of ECMP routes will be affected by the flapping of next hops of unrelated routes.

·         Condition: This symptom occurs if you use the ecmp mode enhanced command to enable the enhanced ECMP mode and the next hops of multiple unrelated routes flap.

202211110382

·         Symptom: The display mac-address command does not display the dynamic secure MAC address entries and static secure MAC address entries of an aggregate interface.

·         Condition: This symptom occurs if the display mac-address command is executed on the device to display the MAC address entries of an aggregate interface.

202211171005

·         Symptom: After the device is rebooted, the mirroring configuration is lost, but the hardware resources in the underlayer remain. As a result, the later mirroring configuration fails.

·         Condition: This symptom occurs if the following operations are performed:

a.    Configure port mirroring.

b.    Specify multiple mirroring source ports for a mirroring group. First configure the member ports of an aggregate interface as mirroring source ports, and then configure the aggregate interface as a mirroring source port. 

c.    Save the configuration and reboot the device.

202212011911

·         Symptom: On an EVPN M-LAG network, the device cannot forward ARP requests from endpoints and cannot send ARP replies with the gateway address to the endpoints.

·         Condition: This symptom occurs if the VSI interface with ARP flood suppression enabled and acting as the gateway is down. 

202209120036

·         Symptom: A QoS policy has multiple class-behavior (CB) associations (for example, CB associations 1 and 2). Typically, only CB association 1 takes effect on traffic matching both CB associations 1 and 2. If you modify the actions in CB association 1, CB association 2 might take effect on the traffic matching both CB associations with a low probability.

·         Condition: This symptom occurs if the following operations are performed:

a.    In a QoS policy applied, the accounting or CAR action exists in a behavior.

b.    Modify the actions in any behavior or modify the match criteria in any class of the QoS policy, or apply the QoS policy again.

202209070077

·         Symptom: A DCI tunnel flaps or multiple next hops of a DCI tunnel switch. As a result, traffic matching the PBR policy cannot be forwarded.

·         Condition: This symptom occurs if the next hop of the PBR policy is a DCI tunnel, and the DCI tunnel flaps or multiple next hops of the DCI tunnel switch.

202209160292

·         Symptom: The device might not send some routes to peers.

·         Condition: This symptom occurs if the device filters the route receivers based on the first AS number in EBGP routes (configurable with the peer-as-check enable command) and exchange routes with multiple EBGP peers.

202209200263

·         Symptom: On an EVPN network, another device might fail to ping the IPv4 or IPv6 address of the local device.

·         Condition: This symptom occurs if microsegments are applied on the EVPN network.

202208050116

·         Symptom: When you modify the parameters for WRR queuing or WFQ queuing, packets will be dropped transiently.

·         Condition: This symptom occurs if you modify the parameters for WFQ queuing or WRR queuing.

202208090444

·         Symptom: The switch disconnects from the BMP server frequently.

·         Condition: This symptom occurs if the number of messages sent over the TCP connection between the switch and the BMP server exceeds the limit allowed by the buffer.

·         Remarks: When the switch detects that the number of messages sent over the TCP connection exceeds the limit allowed by the buffer, it prints the following log message: BGP BGP instance name: Disconnected from BMP Server BMP server number for maximum limit of sending buffer reached. To resolve the issue, configure the BMP server to use the asynchronous receive mode. If the issue persists, configure the BMP server to receive messages faster or contact H3C Support.

202208090448

·         Symptom: BFD sessions flap after the multicast routing command is executed.

·         Condition: This symptom occurs if the multicast routing command is executed.

202206240525

·         Symptom: The flow mirroring configuration affects the PBR function.

·         Condition: This symptom occurs if both flow mirroring and PBR are configured.

202208050141

·         Symptom: In an M-LAG system configured with multicast settings, ICMPv6 packets are matched by an IPv4 ACL.

·         Condition: This symptom occurs if the ICMPv6 packets have a specific format.

202207050544

·         Symptom: In an EVPN-DCI network, an ED device fails to forward IP unicast packets at Layer 2.

·         Condition: This symptom might occur if the ED device removes VXLAN encapsulation from the IP unicast packets whose inner TTL is 1 and forwards the packets at Layer 2.

202208021466

·         Symptom: Some behaviors do not take effect in a QoS policy that contains multiple class-behavior associations.

·         Condition: This symptom occurs if the class of the first class-behavior association is configured to match an IPv4 ACL and Layer 2 attributes.

202206120009

·         Symptom: The value of the IGMPv3 specific queries field in the display igmp-snooping statistics command output is incorrect.

·         Condition: This symptom occurs if an IGMPv3 leave message with the multicast group as the Exclude mode triggers the sending of IGMPv3 last member queries.

202206060838

·         Symptom: On a multicast network that supports multiple levels of DR systems, IGMP packets form a loop between DR interfaces.

·         Condition: This symptom occurs if DR interfaces receive IGMP group-specific query packets on a multicast network that supports multiple levels of DR systems.

202207050871

·         Symptom: Executing the undo mac-address mac-learning enable command in system view or executing the undo mac-learning enable command in VSI view cannot disable MAC address learning in the corresponding view.

·         Condition: This symptom occurs when you execute the undo mac-address mac-learning enable command in system view or execute the undo mac-learning enable command in VSI view.

202208190680

·         Symptom: In an M-LAG system that use VLAN interfaces to act as dual-active gateways for the same VLAN, an M-LAG member device cannot successfully ping an endpoint.

·         Condition: This symptom occurs if the other M-LAG member device receives ICMP replay packets.

202206230765

·         Symptom: The switch prompts the Permission denied. error message.

·         Condition: This symptom occurs if the following operations are performed:

a.    Enable command authorization.

b.    Repeat a command in the command history buffer for more than 1000 times.

202208221073

·         Symptom: Loop detection is enabled and the loop protection action is set to block on an interface.  When the interface detects a loop, it stays in forwarding state, and the loop is not removed.

·         Condition: This symptom might occur if loop detection is enabled and the loop protection action is set to block by using the loopback-detection action block command on an interface.

202209131298

·         Symptom: When an interface is shut down by M-LAG MAD, the Current state field displays DRNI MAD down, which should be M-LAG MAD down, for the interface in the display interface command output.

·         Condition: This symptom occurs if you use the display interface command to display interface information when an interface is shut down by M-LAG MAD.

202208311310

·         Symptom: Auto configuration is interrupted during IPv6 auto deployment of the switch, and IPv6 auto deployment fails.

·         Condition: This symptom occurs when the switch performs IPv6 auto deployment.

202208261550

·         Symptom: In an EVPN VXLAN network where Layer 3 multicast traffic is forwarded over DCI tunnels, traffic loss lasts for a significant period of time before new traffic flows are forwarded correctly.

·         Condition: This symptom might occur if Layer 3 multicast traffic is forwarded over DCI tunnels in an EVPN VXLAN network and new traffic flows are forwarded in the network.

202209010441

·         Symptom: An M-LAG member device cannot ping the single-homed device on the other member device through the M-LAG interface.

·         Condition: This symptom occurs if the M-LAG R interface and the single-homed device are in the same VLAN.

202208270465

·         Symptom: Layer 3 multicast packets cannot be forwarded through a GRE tunnel.

·         Condition: This symptom occurs if you enable Layer 3 multicast and specify the tunnel mode of the outgoing interface as GRE.

202208310792

·         Symptom: VRRP flaps on a DR system collocated with VRRP gateways.

·         Condition: This symptom occurs if VRRP gateways are configured on a DR system, the gateways receive a large number of ARP requests, ARP replies, ND packets, or NS packets, and the IPL is used to synchronize a large number of ARP and ND entries.

202209191590

·         Symptom: On a multicast VXLAN network, the multicast routing entries of the PIM protocol on the public network remain.

·         Condition: This symptom occurs if the following operations are performed:

a.    The MVXLAN IPv4 address family and the MVXLAN IPv6 address family are created at the same time.

b.    The MVXLAN IPv4 address family is deleted.

c.    The MVXLAN IPv6 address family is deleted.

202208250185

·         Symptom: PBR uses an invalid next hop, which cause traffic steering exceptions.

·         Condition: This symptom occurs if you set the action to be taken on a node to apply next-hop or apply default-next-hop for PBR, but one of the following situations exists:

¡  The outgoing interfaces of the next hops or default next hops update.

¡  The route status changes rapidly and frequently.

For example, the action to be taken on a node is apply next-hop 1.1.1.1, but the outgoing interface for 1.1.1.1 updates or the route status changes rapidly and frequently.

202209130044

·         Symptom: The device forwards passing MPLS packets or VXLAN packets out of other Layer 3 Ethernet interfaces, which causes a broadcast storm.

·         Condition: This symptom occurs if the following conditions exist:

¡  All physical interfaces of the device are configured as Layer 3 Ethernet interfaces.

¡  The destination MAC address in the outer header of received passing MPLS packets or VXLAN packets is an unknown MAC address.

202209170584

·         Symptom: On a VXLAN DR system, a VSI interface is disassociated from a VSI, and DR-synchronized ARP entries are also deleted for other VSIs.

·         Condition: This symptom occurs if no VXLAN ID is assigned to the VSI from which a VSI interface is disassociated.

Resolved problems in E6706

202204011571

·         Symptom: In an MVXLAN, the leaf device connected to the multicast source does not have output interfaces for some hardware entries.

·         Condition: This symptom might occur if you clear multicast route entries on the leaf device and then reset BGP sessions on the device.

202207080423

·         Symptom: A MAC authentication user goes offline and comes online repeatedly eight minutes after it comes online on an aggregate interface.

·         Condition: This symptom occurs if MAC authentication offline detection is enabled.

·         Workaround: Disable MAC authentication offline detection by using the undo mac-authentication offline-detect enable command.

202207081486

·         Symptom: The bgpd process becomes abnormal when a gateway interface is specified for a VSI.

·         Condition: This symptom occurs if the VSI has been bound to an EVPN instance by using the evpn encapsulation vxlan binding instance command.

202205050433

·         Symptom: The function of forcibly bringing up a fiber Ethernet port is mutually exclusive with the function of assigning the fiber Ethernet port to an aggregation group.

·         Condition: This symptom occurs if you attempt to configure both functions.

202207261804

·         Symptom: After the switch cannot encapsulate incoming packets as VXLAN packets and send them to a downstream device, the downstream device cannot load balance the VXLAN packets.

·         Condition: This symptom occurs if the following conditions exist:

¡  The link-aggregation global load-sharing mode destination-ip source-ip destination-port source-port command is executed on the switch.

¡  The source IP address and destination IP address of the incoming packets do not change.

202206291177

·         Symptom: The device does not learn an ND entry when receiving an NA message without the target link-layer address (TLLA) field.

·         Condition: This symptom occurs if the device receives an NA message without the TLLA field.

202208090428

·         Symptom: On a VXLAN-enabled IRF fabric, packet loss persists after an ISSU from F6623 or earlier to a version later than F6623.

·         Condition: This symptom occurs if IRF subordinate members receive ARP packets on aggregate links during the upgrade process.

202208081526

·         Symptom: The switch does not forward incoming GRE packets with the dscp field as 0x10 from the correct queue on the output interface. The GRE packets are sent out from queue 2 instead of queue 5 according to the priority map.

·         Condition: This symptom occurs if the qos trust dscp command is executed on the input interface.

202205191660

·         Symptom: A multicast tunnel interface of MVXLAN might be down.

·         Condition: This symptom might occur if MVXLAN is configured and then PIM is enabled on interfaces in a VPN instance.

202204210918

·         Symptom: The files in the flash memory are lost, the flash memory cannot be written to, and the flash memory size is 0 KB in the display version command output.

·         Condition: None. This symptom occurs with a very low probability.

·         Remarks: This patch can only collect information on devices with the C35xx CPU for flash troubleshooting. If the problem has occurred, contact H3C Support for problem location.

202203170583

·         Symptom: The aggregate interface isolation feature takes effect on IPPs unexpectedly. As a result, the member ports of IPPs cannot become Selected.

·         Condition: This symptom occurs if you first configure the aggregate interface isolation feature and then configure aggregate interfaces as IPPs.

202203170584

·         Symptom: The aggregate interface isolation feature takes effect on static aggregate interfaces unexpectedly. As a result, the member ports of static aggregate interfaces cannot become Selected.

·         Condition: This symptom occurs if you first configure the aggregate interface isolation feature and then change dynamic aggregate interfaces to static aggregate interfaces.

202107050021

·         Symptom: On a VXLAN network, the route convergence time is long.

·         Condition: This symptom occurs if the device is in an IRF fabric and several aggregate interfaces are shut down on the device. As a result, the number of load sharing links is reduced.

Resolved problems in E6705

202204090439

·         Symptom: The console gets stuck after repeated execution of the port-security enable or port-security port-mode command.

·         Condition: This symptom occurs if the port-security enable or port-security port-mode command is repeatedly executed.

202204090268

·         Symptom: An interface bound to VPN 1 receives packets destined for an IP address in VPN 2 and forwards the packets in VPN 2 even though the operation type for the MPLS label in the packets is POP in the forwarding table of VPN 2.

·         Condition: This symptom might occur if the single-labeled MPLS packets received on an interface in one subnet are forwarded out of an interface in another subnet.

202203260366

·         Symptom: In an MVXLAN, a leaf device connected to a multicast receiver cannot forward multicast traffic.

·         Condition: This symptom occurs after you repeatedly add and delete VSI settings on the leaf device.

·         Workaround: Do not repeatedly add and delete VSIs bound to the same VSI interface.

202112071015

·         Symptom: In an M-LAG system that acts as a leaf node, packet loss lasts for 961 milliseconds after all uplink interfaces on one member device are shut down.

·         Condition: This symptom occurs if the M-LAG system has two member devices and a server is connected to the M-LAG system in single-homing mode.

202112070974

·         Symptom: In an M-LAG system that acts as a leaf node, packet loss lasts for 602 milliseconds after all uplink interfaces on one member device are shut down.

·         Condition: This symptom occurs if the M-LAG system has two member devices and a server is connected to the M-LAG system in Bond4 mode.

202105150186

·         Symptom: After an aggregate interface authenticates a MAC authentication user, an IRF master/subordinate switchover occurs, and the user goes offline 10 minutes later.

·         Condition: This symptom occurs if an aggregate interface authenticates a MAC authentication user and an IRF master/subordinate switchover occurs.

202206240523

·         Symptom: A downstream device attached to an M-LAG EVPN system cannot ping the gateway.

·         Condition: This symptom occurs if the VSI interfaces acting as gateways are assigned different IP addresses and the downstream device pings one gateway address.

202205260946

·         Symptom: On the LSWM124TG2H module, each four consecutive ports are assigned to a port group, starting from the lowest numbered port. After a port in a port group goes down unexpectedly, the other up ports flap in 10 seconds.

·         Condition: This symptom occurs if 10G transceiver modules are installed on all ports in the port group, the device is rebooted, and one of the ports goes down unexpectedly.

202206010902

·         Symptom: BFD MAD flaps.

·         Condition: This symptom occurs if BFD MAD is enabled on a VLAN interface on two IRF fabrics and one IRF fabric has a master/subordinate switchover.

202204151727

·         Symptom: In an MPLS VPLS network, the PE device cannot transparently transmit IGMP packets when multicast features are enabled on the PE device.

·         Condition: This symptom occurs when the device acts as a PE of an MPLS VPLS network, and Layer 2 or Layer 3 multicast features are enabled on the device.

202204201063

·         Symptom: The input errors value in the display interface command output is different from that obtained through SNMP.

·         Condition: This symptom occurs if an interface receives packets smaller than 64 bytes.

202205030067

·         Symptom: Some member ports in an aggregation group do not forward traffic, and traffic is unevenly distributed among the member links.

·         Condition: This symptom might occur if the following conditions exist:

¡  Member ports of the aggregation group are located on multiple IRF member devices.

¡  The aggregate interface is one of the outgoing interfaces for a VXLAN tunnel.

¡  The member ports on one IRF member device flap.

202204230201

·         Symptom: MAC address moves might not trigger ND entry moves on a DR system.

·         Condition: This symptom might occur if the mac-address mac-move fast-update command is executed and MAC addresses move in the underlay network.

202205171718

·         Symptom: When identical static ARP entries are configured on the DR member devices in a DR system, configuration fails on one DR member device.

·         Condition: This symptom might occur if identical static ARP entries are configured on the DR member devices in a DR system.

202112060445

·         Symptom: The storm-constrain control block command does not take effect.

·         Condition: This symptom occurs if the storm-constrain control block command is executed on an interface to configure the interface to suspend sending unknown unicast, known unicast, multicast, or broadcast packets when the packets exceed the upper threshold.

202111091341

·         Symptom: When a MIB browser tool is used to read the entPhysicalVendorType node value of an absent power supply, the value is all-Fs, which should fail to be read.

·         Condition: This symptom occurs if a MIB browser tool is used to read the entPhysicalVendorType node value of an absent power supply.

202203141354

·         Symptom: After the device is rebooted, the detection interval configured for the BFD echo session does not take effect, and is displayed as the default value.

·         Condition: This symptom occurs if the following operations are performed on a DRNI network:

a.    Configure a static BFD echo session with a detection interval different from that configured for the BFD echo session on an interface. The session can be negotiated as up.

b.    Save the configuration, and then reboot the device.

202204130096

·         Symptom: When the DR aggregate interface and IPL aggregate interface are deleted from a device, traffic cannot be forwarded at Layer 2 between physical interfaces in the original DR aggregate interface and IPL aggregate interface.

·         Condition: This symptom occurs if the following operations are performed:

a.    On an EVPN+DRNI network, configure ACs on a DR aggregate interface.

b.    Delete the DR aggregate interface and IPL aggregate interface in sequence on a DR member device.

202205091702

·         Symptom: On an EVPN DRNI network, packets are dropped unexpectedly.

·         Condition: This symptom occurs if packets are received on an AC, the packets are VXLAN-encapsulated, and the packets carry the PVID VLAN tag of the interface hosting the AC.

202109040928

·         Symptom: The device might reboot unexpectedly with a low probability when a subcard is unplugged and plugged.

·         Condition: This symptom occurs if MACsec is configured on interfaces of a LSWM18CQMSEC subcard and then the subcard is unplugged and plugged.

202205060729

·         Symptom: You cannot configure both sFlow and the INT transit node on a device.

·         Condition: None.

202205091696

·         Symptom: The reply to an HTTP request on a device carries the server:HTTPD field, which is used to identify the server information. The vulnerability scanners consider that the server field might disclose the server information and result in attacks.

·         Condition: This symptom occurs if the device receives HTTP requests.

202205091688

·         Symptom: The memory leaks for the routed module.

·         Condition: This symptom occurs if you configure a gRPC sensor path to collect route information, and then make routes on the device flap.

202205091701

·         Symptom: When ARP/ND traffic exists on an EVPN+DRNI network, if you repeatedly shut down and bring up the IPL aggregate interface of a DR member device, the device will reboot unexpectedly.

·         Condition: This symptom occurs if you repeatedly shut down and bring up the IPL aggregate interface of a DR member device when ARP/ND traffic exists on an EVPN+DRNI network.

202204251521

·         Symptom: EVPN VXLAN does not load share traffic as expected.

·         Condition: This symptom might occur if the cost type is set to wide and fast reroute is enabled for IS-IS on the underlay network and one of the ECMP links for a VXLAN tunnel flaps.

202205110059

·         Symptom: On an EVPN network, the number of L3 entries in the software is different from that in the hardware.

·         Condition: This symptom occurs if you add and delete L3VNIs on a VSI interface.

202109040999

·         Symptom: After an LSWM18CQMSEC subcard is rebooted, the mka enable command on breakout interfaces is lost. When you execute the command again on a breakout interface, the system prompts that the command is not supported.

·         Condition: This symptom occurs if an interface of an LSWM18CQMSEC subcard is split into 25-GE breakout interfaces and has MACsec configured, and then the subcard is unplugged and plugged.

202205311336

·         Symptom: S6850-2C switches failed to form an IRF fabric.

·         Condition: This symptom occurs if the two QSFP28 ports on the rear panel of each S6850-2C switch are used to configure IRF.

202206160012

·         Symptom: A multichassis aggregate interface is configured on an IRF fabric. When the selected ports on IRF member device 1 leave the aggregation group, the endpoints attached to those ports cannot communicate with the endpoints attached to the aggregation member ports on IRF member device 2.

·         Condition: This symptom might occur if the following conditions exist:

¡  A multichassis aggregate interface is configured on an IRF fabric. The aggregation member ports on IRF member device 1 are selected, and the aggregation member ports on IRF member device 2 are unselected.

¡  The aggregation member pots on IRF member device 1 have the same port IDs as those on IRF member device 2. To view the port IDs, use the debug port mapping command.

¡  The aggregation member ports on IRF member device 1 leave the aggregation group.

Resolved problems in E6702

202201071324

·         Symptom: Member ports are removed from an aggregation group after an ISSU is performed.

·         Condition: This symptom occurs with a low probability after an ISSU is performed.

202201260817

·         Symptom: The console is stuck when the undo subscription command is executed.

·         Condition: This symptom occurs if the tcb/tcbpacketinfoevent and tcb/tcbrawpacketinfoevent events are subscribed to by using gRPC and the device experiences continuous packet loss.

202201240324

·         Symptom: The device fails to be deployed automatically.

·         Condition: This symptom occurs in a controller environment if the deployment template is a patch version file.

202202140954

·         Symptom: The controller cannot detect online endpoints through ICMP radar detection.

·         Condition: This symptom occurs if the controller detects online endpoints through ICMP radar detection.

202111050666

·         Symptom: The interface name in the display bfd session command output will be displayed in two lines. This affects information collection.

·         Condition: This symptom occurs if the interface name is long.

202201261215

·         Symptom: After the preference or tag value is modified for ND-advertised direct routes, the routing module does not update the ND-advertised direct routes.

·         Condition: This symptom occurs if the following operations are performed:

a.    Use the ipv6 nd route-direct advertise command to enable ND direct route advertisement.

b.    Configure the routing module to advertise direct routes.

c.    Use the ipv6 nd route-direct advertise to modify the value for the preference preference-value or tag tag-value parameter.

202112140190

·         Symptom: Failed to use the archive configuration command to back up the configuration file to the SCP server.

·         Condition: This symptom occurs if the SCP server version is openssh8.0 or later.

202111260089

·         Symptom: On a DRNI+EVPN network, if ARP/ND flood suppression or local proxy ARP/ND is enabled, VMs attached to different leaf devices might fail to communicate.

·         Condition: This symptom occurs if ARP/ND flood suppression or local proxy ARP/ND is enabled on a DRNI+EVPN network.

202101050384

·         Symptom: After the device receives a packet with the IP header checksum as all-Fs and forwards the packet at Layer 3, the IP header checksum is still all-Fs.

·         Condition: This symptom occurs if the device receives a packet with the IP header checksum as all-Fs and forwards the packet at Layer 3.

202201041121

·         Symptom: After a device is connected to an OpenFlow controller, the device reboots unexpectedly.

·         Condition: This symptom occurs if the controller deletes the OpenFlow instance configuration and the driver sends packets to the CPU at the same time.

202103231364

·         Symptom: After the device is rebooted, the DRNI keepalive link might go down.

·         Condition: This symptom occurs if the UDP port number used by the DRNI keepalive link is used by another service during the device reboot process.

Resolved problems in F6701L01

First release.

Troubleshooting resources

To obtain troubleshooting resources for the product:

1.       Access Technical Documents at http://www.h3c.com/en/Technical_Documents.

2.       Select the device category and model.

3.       Select the Maintain or Maintenance menu.

Related documentation

Documentation set

·           H3C S6850 & S9850 Switch Series Installation Guide

·           H3C S6850-56HF-IM Immersion-Cooled Switch Installation Guide

·           H3C S6850-56HF-产品 Immersion-Cooled Switch Installation Guide

·           H3C S6850-56HF Switch Installation Quick Start

·           H3C S6850-56HF-IM Immersion-Cooled Switch Installation Quick Start

·           H3C S6850-56HF-产品 Immersion-Cooled Switch Installation Quick Start

·           H3C S9850-4C Switch Installation Quick Start

·           H3C S6850-2C Switch Installation Quick Start

·           H3C S9850-32H Switch Installation Quick Start

·           H3C LSWM1FANSA_LSWM1FANSAB Fan Trays User Guide

·           H3C LSWM1BFANSC & LSWM1BFANSCB Fan Trays User Guide

·           H3C LSVM1AC650 & LSVM1DC650 Power Module User Manual

·           H3C LSWM18CQ interface card user manual

·           H3C LSWM124TG2H interface card user manual

·           H3C LSWM116Q interface card user manual

·           H3C LSWM124XGT2Q interface card user manual

·           H3C LSWM18CQMSEC interface card user manual

·           H3C LSWM18QC interface card user manual

·           H3C LSWM124XG2Q & LSWM124XG2QL interface card user manual

·           H3C LSWM124XG2QFC interface card user manual

·           H3C S6805 & S6825 & S6850 & S9850 Switch Series Configuration Guide-Release 671x

·           H3C S6805 & S6825 & S6850 & S9850 Switch Series Command References-Release 671x

Obtaining documentation

To obtain the related documents from the H3C website at http://www.h3c.com.hk/:

1.       Click http://www.h3c.com.hk/Technical_Documents.

2.       Choose the desired product category and model.

Technical support

[email protected]

http://www.h3c.com.hk/


Appendix A Feature list

Hardware features

Table 5 S9850_6850 series hardware features

Item

S6850-56HF/S6850-56HF-SAN

S9850-4C

S9850-32H

S6850-2C

Dimensions (H × W × D)

S6850-56HF(with product code LS-6850-56HF-H3):

44×440×400 (1.73 × 17.32 × 15.75 in)

Other products:

43.6×440×460 (1.72 × 17.32 × 18.11 in)

88.1×440×660 (1.72 × 17.32 × 25.98 in)

43.6×440×460(1.72 × 17.32 × 18.11 in)

44.2×440×660 (1.72 × 17.32 × 18.11 in)

Weight

≤ 15kg (33.07 lb)

≤ 27kg (59.52 lb)

≤ 15kg (33.07 lb)

≤ 16kg (35.27 lb)

Console ports

 

 

 

 

Mini USB(Console)

S6850-56HF(with product code LS-6850-56HF-H3): N/A

Other products: 1

Management Ethernet ports

S6850-56HF(with product code LS-6850-56HF-H3):

·        10M/100M/1000M Base-T copper port: 1

Other products:

10M/100M/1000M Base-T copper port: 1

·        SFP port: 1

USB ports

 

 

 

 

SFP ports

S6850-56HF(with product code LS-6850-56HF-H3): N/A

Other products: 2

2

2

N/A

SFP28 ports

 

N/A

N/A

N/A

QSFP28 ports

 

N/A

32

2

Expansion cards

 

LSWM18CQ

LSWM124TG2H

LSWM116Q

LSWM124XGT2Q

LSWM124XG2QFC

LSWM18QC

LSWM124XG2Q

LSWM124XG2QL

LSWM18CQMSEC

N/A

LSWM18CQ

LSWM124TG2H

LSWM116Q

LSWM124XGT2Q

LSWM124XG2QFC

LSWM18QC

LSWM124XG2Q

LSWM124XG2QL

LSWM18CQMSEC

Fan tray slots

5

2

5

5

Fan trays

S6850-56HF(with product code LS-6850-56HF-H3):

FAN-40B-1-C

FAN-40F-1-D

FAN-40B-1-D

Other products:

LSWM1FANSA

LSWM1FANSAB

LSWM1BFANSC

LSWM1BFANSCB

LSWM1FANSA

LSWM1FANSAB

LSWM1FANSA

LSWM1FANSAB

Power modules

S6850-56HF(with product code LS-6850-56HF-H3):

SW-A-PSR550-12A-B

SW-B-PSR550-12A-B

Other products:

LSVM1AC650

LSVM1DC650

AC-input voltage

 

DC-input voltage

Rated voltage: –48 VDC to –60 VDC

Max voltage: –40 VDC to –72 VDC

Minimum power consumption

S6850-56HF(with product code LS-6850-56HF-H3):

Single-AC: 143W

Dual-AC: 150W

Other products:

Single-AC: 167W

Dual-AC: 179W

Single-DC: 154W

Dual-DC: 174W

Dual-AC: 152W

Triple AC: 169W

Quadruple AC: 185W

Dual-DC: 159W

Triple DC: 174W

Quadruple DC: 185W

Single-AC:154W

Dual-AC: 166W

Single-DC: 154W

Dual-DC: 163W

Single-AC: 136W

Dual-AC: 148W

Single-DC: 132W

Dual-DC: 146W

Maximum power consumption

6850-56HF(with product code LS-6850-56HF-H3):

Single-AC: 424W

Dual-AC: 429W

Other products:

Single-AC: 405W

Dual-AC: 413W

Single-DC: 400W

Dual-DC: 408W

Dual-AC: 665W

Triple AC: 671W

Quadruple AC: 688W

Dual-DC: 663W

Triple DC: 665W

Quadruple DC: 666W

Single-AC: 376W

Dual-AC: 385W

Single-DC: 373W

Dual-DC: 377W

Single-AC: 408W

Dual-AC: 421W

Single-DC: 404W

Dual-DC: 411W

Chassis leakage current compliance

 

Operating temperature

 

Operating humidity

 

Fire resistance compliance

 

 

Software features

Table 6 Software features of the S6850&S9850 series

Feature

S6850-56HF/S6850-56HF-SAN/ S6850-56HF-IM/ S6850-56HF-CP

S9850-4C

S9850-32H

S6850-2C

Full duplex Wire speed L2 switching capacity

4000Gbps

6400Gbps

6400Gbps

3600Gbps

Whole system Wire speed L2 switching Packet forwarding rate

2024Mpps

2024Mpps

2024Mpps

2024Mpps

Forwarding mode

Store-forward and cut-through

IRF

·        Ring topology

·        Daisy-chain topology

·        LACP MAD

·        ARP MAD

·        ND MAD

·        BFD MAD

·        ISSU

Link aggregation

·        Aggregation of 10-GE ports

·        Aggregation of 25-GE ports

·        Aggregation of 40-GE ports

·        Aggregation of 100-GE ports

·        Static link aggregation

·        Dynamic link aggregation

·        When stacked, supports up to 1024 aggregation groups, each supporting up to 32 ports

Flow control

IEEE 802.3x flow control and back pressure

Data center features

·        PFC

·        DCBX

·        VxLAN

·        OpenFlow

·        RDMA

·        gRPC

·        INT

·        M-LAG

Jumbo Frame

Supports maximum frame size of 9416

MAC address table

·        288K MAC addresses

·        8K static MAC addresses

·        Blackhole MAC addresses

·        MAC address learning limit on a port

VLAN

·        Port-based VLANs (4094 VLANs)

QinQ

·        Supported

VLAN Mapping

·        1:1 VLAN Mapping

·        N:1 VLAN Mapping

·        1:2 VLAN Mapping

·        2:2 VLAN Mapping

ARP

·        Up to 272K entries

·        1K static entries

·        Gratuitous ARP

·        Standard proxy ARP and local proxy ARP

·        ARP source suppression

·        ARP black hole

·        ARP detection (based on DHCP snooping entries/802.1x security entries/static IP-to-MAC bindings)

ND

·        Up to 136K entries

·        1K static entries

VLAN virtual interface

4K

DHCP

·        DHCP client

·        DHCP snooping

·        DHCP relay agent

·        DHCP server

·        DHCPv6 server

UDP helper

Supported

DNS

·        Dynamic domain name resolution

·        Dynamic domain name resolution client

·        IPv4/IPv6 addresses

IPv4 routing

·        4K static routes

·        RIP(Routing Information Protocol) v1/2; up to 4K IPv4 routes

·        OSPF (Open Shortest Path First) v1/v2; up to 324K IPv4 routes

·        IS-IS(Intermediate System to Intermediate system); up to 324K IPv4 routes

·        BGP (Border Gateway Protocol); up to 324K IPv4 routes

·        Up to 4K ECMP routes; each ECMP route supports up to 128 next hops

·        Routing policy

·        VRRP

·        PBR

IPv6 routing

·        2K static routes

·        RIPng: Supports up to 2K IPv6 routes

·        OSPF v3: Supports up to 168K IPv6 routes

·        IPv6 IS-IS: Supports up to 168K IPv6 routes

·        BGP4+: Supports up to 168K IPv6 routes

·        Up to 4K ECMP routes; each ECMP route supports up to 128 next hops

·        Routing policy

·        VRRP

·        PBR

uRPF

·        Strict uRPF check

·        Loose uRPF check

MCE

·        Supported

BFD

·        RIP/RIPng

·        OSPF/OSPFv3

·        IS-IS/IPv6 IS-IS

·        BGP/BGP4+

·        Static route/IPv6 static route

Tunnel

·        IPv4 over IPv4 tunnel

·        IPv4 over IPv6 tunnel

·        IPv6 over IPv4 manual tunnel

·        IPv6 over IPv4 6to4 tunnel

·        IPv6 over IPv4 ISATAP tunnel

·        IPv6 over IPv6 tunnel

·        GRE tunnel

Multicast

·        IGMP snooping

·        MLD snooping

·        IPv4 and IPv6 multicast VLAN

·        IPv4 and IPv6 PIM snooping

·        IGMP and MLD

·        PIM and IPv6 PIM

·        MSDP

Broadcast/multicast/unknown unicast storm suppression

·        ratio

·        PPS

·        kbps

MSTP

·        STP/RSTP/MSTP protocol

·        STP Root Guard

·        BPDU Guard

QoS/ACL

·        Restriction of the rates at which a port sends and receives packets, with a granularity of 8 kbps.

·        Packet redirect

·        Committed access rate (CAR), with a granularity of traffic limit 8 kbps.

·        Eight output queues for each port

·        Flexible queue scheduling algorithms based on port and queue, including strict priority (SP), Weighted Deficit Round Robin (WDRR), Weighted Fair Queuing (WFQ), SP + WDRR, and SP + WFQ.

·        Remarking of 802.1p and DSCP priorities

·        Packet filtering at L2 (Layer 2) through L4 (Layer 4); flow classification based on source MAC address, destination MAC address, source IP (IPv4/IPv6) address, destination IP (IPv4/IPv6) address, port, protocol, and VLAN.

·        Time range

·        Weighted Random Early Detection (WRED)

·        Queue shaping

·        User profile

·        COPP

·        Explicit Congestion Notification (ECN)

Mirroring

·        Flow mirroring

·        Port mirroring

·        Multiple mirror observing port

Remote mirroring

·        Port remote mirroring (RSPAN)

Security

·        Hierarchical management and password protection of users

·        AAA authentication

·        RADIUS

·        HWTACACS

·        SSH 2.0

·        PKI

·        SSL

·        HTTPs

·        Attack detection and prevention

·        IP Source Guard

·        Keychain

Traffic Management

·        sFlow

Loading and upgrading

·        Loading and upgrading through XModem protocol

·        Loading and upgrading through FTP

·        Loading and upgrading through the trivial file transfer protocol (TFTP)

Management

·        Configuration at the command line interface

·        Remote configuration through Telnet

·        Configuration through Console port

·        Simple network management protocol (SNMP)

·        System log

·        Hierarchical alarms

·        NTP

·        Power supply alarm function

·        Fan and temperature alarms

Maintenance

·        Debugging information output

·        Ping and Tracert

·        Remote maintenance through Telnet

·        DLDP

·        File download and upload through USB port

 

Appendix B Fixed security vulnerabilities

Fixed security vulnerabilities in R6715P01

CVE-2023-33953

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0&#8217;s can be added at the start of an integer. gRPC&#8217;s hpack parser needed to read all of them before concluding a parse. - gRPC&#8217;s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc&#8230;

CVE-2023-32732

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

CVE-2024-0727

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

CVE-2023-5678

Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

CVE-2023-40217

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

Fixed security vulnerabilities in R6715

CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

CVE-2023-3446

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Fixed security vulnerabilities in E6713P01

CVE-2023-2650

Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.

CVE-2023-0465

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0286

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

CVE-2023-0215

The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.

CVE-2022-32221

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

Fixed security vulnerabilities in E6713

CVE-2023-24329

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

Fixed security vulnerabilities in E6712

 CVE-2017-1000100

When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.

Fixed security vulnerabilities in E6711

CVE-2015-7979

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.

CVE-2022-1292

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

Fixed security vulnerabilities in R6710

CVE-2020-7469

In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.

CVE-2021-22924

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

Fixed security vulnerabilities in E6705

CVE-2022-0778

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Fixed security vulnerabilities in E6702

CVE-2013-2566

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

CVE-2015-2808.

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVE-2015-0204

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations

CVE-2020-10188

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.


Appendix C Upgrading software

The following information describes how to upgrade software while the router is operating normally or when the router cannot correctly start up.

System software file types

Software required for starting up the switch includes:

·         Boot ROM image—A .bin file that comprises a basic section and an extended section. The basic section is the minimum code that bootstraps the system. The extended section enables hardware initialization and provides system management menus. You can use these menus to load software and the startup configuration file or manage files when the switch cannot correctly start up.

·         Software images—Includes boot images and system images.

¡  Boot image—A .bin file that contains the operating system kernel. It provides process management, memory management, file system management, and the emergency shell.

¡  System image—A .bin file that contains the main application code required for device operation.  This includes device management, interface management, configuration management, and routing management.

The software images that have been loaded are called "current software images." The software images specified to load at next startup are called "startup software images."

These images might be released separately or as a whole in one .ipe package file. If an .ipe file is used, the system automatically decompresses the file, loads the .bin boot and system images in the file and sets them as startup software images. Typically, the Boot ROM and software images for this switch series are released in an .ipe file named main.ipe.

In addition to these images, H3C irregularly releases patch packages for you to fix bugs without rebooting the switch. A patch package does not add new features or functions.

System startup process

Upon power-on, the Boot ROM image runs to initialize hardware and then the software images run to start up the entire system, as shown in Figure 1.

Figure 1 System startup process

 

Upgrade methods

You can upgrade system software by using one of the following methods:

 

Upgrading method

Software types

Remarks

Upgrading from the CLI

Software images

·        You must reboot the switch to complete the upgrade.

·        This method can interrupt ongoing network services.

Patch packages

The upgrade does not interrupt ongoing services.

Make sure the patch packages match the current software images. A patch package can fix bugs only for its matching software image version.

Upgrading from the Boot menu

·        Boot ROM image

·        Software images

Use this method when the switch cannot correctly start up.

CAUTION CAUTION:

Upgrading an IRF fabric from the CLI rather than the Boot menu.

The Boot menu approach requires that you upgrade the member switches one by one and has larger impact on services than the CLI approach.

 

The output in this document is for illustration only and might vary with software releases. For example, this document uses boot.bin and system.bin to represent boot and system image names, whereas the actual software image name format is chassis_software platform version_image type_release, for example, s9850_6850-cmw710-boot-r6715p01.bin and s9850_6850-cmw710-system-r6715p01.bin.

Upgrading from the CLI

This section uses a two-member IRF fabric as an example to describe how to upgrade software from the CLI. If you have more than two subordinate switches, repeat the steps for the subordinate switch to upgrade their software. If you are upgrading a standalone switch, ignore the steps for upgrading the subordinate switch.

Verifying device status

 

IMPORTANT

IMPORTANT:

Before you perform an IRF master/subordinate switchover, verify that the device is in stable state.

 

1.       Verify that the system state, redundancy state, and state of each slot are stable.

<Sysname> display system stable state

System state     :Stable

Redundancy state :Stable

  Slot    CPU    Role     State

  1       0      Active   Stable

  2       0      Standby  Stable

2.       If the device is unstable, use the following commands to troubleshoot the issue:

¡  Use the display device command to verify that the device is operating correctly.

¡  Use the display ha service-group command to verify that bulk backup has been finished for all modules.

¡  Use the display system internal process state command in probe view to verify that services are running correctly.

3.       If a slot persists in unstable state or there are other unrecoverable issues, contact the technical support.

Preparing for the upgrade

Before you upgrade software, complete the following tasks:

1.       Log in to the IRF fabric through Telnet or the console port (details not shown).

2.       Perform the display irf command in any view to identify the number of IRF members, each member switch’s role and IRF member ID.

<Sysname> display irf

MemberID   Role   Priority  CPU-Mac         Description

 *+1      Master  5         0023-8927-afdc  ---

   2      Standby 1         0023-8927-af43  ---

--------------------------------------------------

 * indicates the device is the master.

 + indicates the device through which the user logs in.

 

 The Bridge MAC of the IRF is: 0023-8927-afdb

 Auto upgrade                : no

 Mac persistent              : 12 min

 Domain ID                   : 0 

3.       Perform the dir command in user view to identify the free storage space of each member switch.

4.       Identify the free Flash space of the master switch.

<Sysname> dir

Directory of flash:

     0      -rw-       41424  Aug 23 2013 00:33:57     startup.mdb

     1      -rw-        3792  Aug 23 2013 00:33:56     startup.cfg

     2      -rw-    53555200  Aug 23 2013 16:04:08     system.bin

     3      drw-           -  Aug 23 2013 00:03:07     seclog

     4      drw-           -  Aug 23 2013 00:03:07     diagfile

     5      drw-           -  Aug 23 2013 00:03:07     logfile

     6      -rw-     9959424  Aug 23 2013 16:04:08     boot.bin

     7      -rw-     9012224  Aug 21 2013 09:54:27     backup.bin

 

1048576 KB total (977704 KB free) 

5.       Identify the free Flash space of each subordinate switch, for example, switch 2.

<Sysname> dir slot2#flash:/

Directory of slot2#flash:/

     0      -rw-       41424  Aug 23 2013 00:33:57     startup.mdb

     1      -rw-        3792  Aug 23 2013 00:33:56     startup.cfg

     2      -rw-    93871104  Aug 23 2013 16:00:08     system.bin

     3      drw-           -  Aug 23 2013 00:03:07     seclog

     4      drw-           -  Aug 23 2013 00:03:07     diagfile

     5      drw-           -  Aug 23 2013 00:03:07     logfile

     6      -rw-    13611008  Aug 23 2013 15:59:00     boot.bin

     7      -rw-     9012224  Aug 21 2013 09:54:27     backup.bin

 

1048576 KB total (934767 KB free)

6.       Compare the free Flash space of each member switch with the size of the software file to load. If the space is sufficient, start the upgrade process. If not, go to the next step.

7.       Delete obsolete files in Flash to free space:

 

CAUTION

CAUTION:

·     To avoid data loss, do not delete the current configuration file. For information about the current configuration file, perform the display startup command. Hewlett Packard Enterprise recommends that you preferentially delete obsolete software images. To avoid inadvertent delete of the current software images, perform the display boot-loader command in any view to identify them.

·     The delete /unreserved file command deletes a file permanently and the action cannot be undone.

·     The delete file command moves a file to the recycle bin and the file still occupies storage space. To permanently delete the file from the recycle bin, first perform the undelete command to restore the file and then perform the delete /unreserved file command.

 

8.       Delete obsolete files from the Flash memory of the master switch.

<Sysname> delete /unreserved flash:/backup.bin

The file cannot be restored. Delete flash:/backup.bin?[Y/N]:y

Deleting the file permanently will take a long time. Please wait...

Deleting file flash:/backup.bin...Done.

9.       Delete obsolete files from the Flash memory of the subordinate switch.

<Sysname> delete /unreserved slot2#flash:/backup.bin

The file cannot be restored. Delete slot2#flash:/backup.bin?[Y/N]:y

Deleting the file permanently will take a long time. Please wait...

Deleting file slot2#flash:/backup.bin...Done.

Downloading software to the master switch

Before you start upgrading software images or patch packages, make sure you have downloaded the upgrading software files to the root directory in Flash memory. This section describes downloading an .ipe software file as an example.

The following are ways to download, upload, or copy files to the master switch:

·         FTP download from a server

·         FTP upload from a client

·         TFTP download from a server

·         Copying files from a USB flash drive

Prerequisites

If FTP or TFTP is used, the IRF fabric and the PC working as the FTP/TFTP server or FTP client can reach each other.

Prepare the FTP server or TFTP server program yourself for the PC. The switch series does not come with these software programs.

FTP download from a server

You can use the switch as an FTP client to download files from an FTP server.

To download a file from an FTP server, for example, the server at 10.10.110.1:

1.       Run an FTP server program on the server, configure an FTP username and password, specify the working directory and copy the file, for example, newest.ipe, to the directory.

2.       Perform the ftp command in user view on the IRF fabric to access the FTP server.

<Sysname> ftp 10.10.110.1

Trying 10.10.110.1...

Press CTRL+K to abort

Connected to 10.10.110.1

220 FTP service ready.

User(10.10.110.1:(none)):username

331 Password required for username.

Password:

230 User logged in

3.       Enable the binary transfer mode.

ftp> binary

  200 Type set to I.

4.       Perform the get command in FTP client view to download the file from the FTP server.

ftp> get newest.ipe

  227 Entering Passive Mode (10,10,110,1,17,97).

  125 BINARY mode data connection already open, transfer starting for /newest.ipe

  226 Transfer complete.

  63521792 bytes received in 35 seconds (896. 0 kbyte/s)

ftp> bye

221 Server closing.

FTP upload from a client

You can use the IRF fabric as an FTP server and upload files from a client to the IRF fabric.

To FTP upload a file from a client:

1.       On the IRF fabric:

2.       Enable FTP server.

<Sysname> system-view

[Sysname] ftp server enable

3.       Add a local FTP user account, set its password and access service type, and assign it to the user role network-admin for uploading file to the working directory of the server.

[Sysname] local-user abc

[Sysname-luser-manage-abc] password simple pwd

[Sysname-luser-manage-abc] service-type ftp

[Sysname-luser-manage-abc] authorization-attribute user-role network-admin

[Sysname-luser-manage-abc] quit

[Sysname] quit

4.       On the PC:

5.       FTP to the IRF fabric (the FTP server).

c:\> ftp 1.1.1.1

Connected to 1.1.1.1.

220 FTP service ready.

User(1.1.1.1:(none)):abc                              

331 Password required for abc.

Password:                                             

230 User logged in.

6.       Enable the binary file transfer mode.

ftp> binary

200 TYPE is now 8-bit binary.

7.       Upload the file (for example, newest.ipe) to the root directory in the Flash memory of the master switch.

ftp> put newest.ipe

200 PORT command successful

150 Connecting to port 10002

226 File successfully transferred

ftp: 63521792 bytes sent in 64.58 secs (497.60 Kbytes/sec).

TFTP download from a server

To download a file from a TFTP server, for example, the server at 10.10.110.1:

1.       Run a TFTP server program on the server, specify the working directory, and copy the file, for example, newest.ipe, to the directory.

2.       On the IRF fabric, perform the tftp command in user view to download the file to the root directory in the Flash memory of the master switch.

<Sysname> tftp 10.10.110.1 get newest.ipe

Press CTRL+C to abort.

  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current

                                 Dload  Upload   Total   Spent    Left  Speed

100 60.5M    0 60.5M    0     0   143k      0 --:--:--  0:03:38 --:--:--  142k

Copying files from a USB flash drive

Every switch provides a USB port for you to copy files from a USB flash drive.

To copy a file from a USB flash drive to the Flash memory of the master switch:

1.       Plug the USB flash drive in the USB port of the switch.

2.       Copy the file (for example, newest.ipe) to the Flash memory of the switch.

<Sysname> cd usba:

<Sysname> copy usba:/newest.ipe newest.ipe

Copy usba:/newest.ipe to flash:/newest.ipe?[Y/N]:y

Start to copy usba:/newest.ipe to flash:/newest.ipe... Done.

Upgrading the software images

To upgrade the software images:

1.       Specify the upgrading image file (newest.ipe in this example) used at the next startup for the master switch, and assign the M attribute to the boot and system images in the file.

<Sysname> boot-loader file flash:/newest.ipe slot 1 main

Verifying the file flash:/newest.ipe on slot 1....Done..

Images in IPE:

  boot.bin

  system.bin

Decompressing file boot.bin to flash:/boot.bin................Done.

Decompressing file system.bin to flash:/system.bin.............................Done.

Decompression completed.

You are recommended to delete the .ipe file after you set startup software images for all slots.

Do you want to delete flash:/newest.ipe now? [Y/N]:n

Verifying the file flash:/boot.bin on slot 1...Done.

Verifying the file flash:/system.bin on slot 1...Done.

The images that have passed all examinations will be used as the backup startup software images at the next reboot on slot 1

2.       Specify the upgrading image file used at next startup for the subordinate switch, and assign the M attribute to the boot and system images in the file. (As a result, the subordinate switch automatically copies the file to the root directory in its Flash memory.)

<Sysname> boot-loader file flash:/newest.ipe slot 2 main

Verifying the file flash:/newest.ipe on slot 2....Done..

Images in IPE:

  boot.bin

  system.bin

Decompressing file boot.bin to flash:/boot.bin................Done.

Decompressing file system.bin to flash:/system.bin.............................Done.

Decompression completed.

You are recommended to delete the .ipe file after you set startup software images for all slots.

Do you want to delete flash:/newest.ipe now? [Y/N]:n

Verifying the file flash:/boot.bin on slot 2...Done.

Verifying the file flash:/system.bin on slot 2...Done.

The images that have passed all examinations will be used as the backup startup software images at the next reboot on slot 2

3.       (Optional) If the IRF fabric size has a lot of members, enable the software auto-update function.

<Sysname> system-view

[Sysname] irf auto-update enable

[Sysname] quit

Software auto-update is typically used for synchronizing the software images of the master switch to new member switches when you expand the IRF fabric. This function enables a subordinate switch to compare its main startup software image version with that of the IRF master. If the versions are different, the subordinate switch automatically downloads the current software images from the master, sets the downloaded images as the main software images at the next reboot, and automatically reboots with the new images to re-join the IRF fabric. In this upgrade process, the function avoids the failure of assign all the subordinate switch the same main software image file as the master switch causing an upgrade failure.

4.       Save the current configuration in any view to prevent data loss.

<Sysname> save

The current configuration will be written to the device. Are you sure? [Y/N]:y

Please input the file name(*.cfg)[flash:/startup.cfg]

(To leave the existing filename unchanged, press the enter key):

flash:/startup.cfg exists, overwrite? [Y/N]:y

Validating file. Please wait.................

Saved the current configuration to mainboard device successfully.

Slot 2:

Save next configuration file successfully.

5.       Reboot the IRF fabric to complete the upgrade.

<Sysname> reboot

Start to check configuration with next startup configuration file, please wait.

........DONE!

This command will reboot the device. Continue? [Y/N]:y

 Now rebooting, please wait...

The system automatically loads the .bin boot and system images in the .ipe file and sets them as the startup software images.

6.       Perform the display version command in any view to verify that the current main software images have been updated (details not shown).

 

 

NOTE:

The system automatically checks the compatibility of the Boot ROM image and the boot and system images during the reboot. If you are prompted that the Boot ROM image in the upgrading image file is different than the current Boot ROM image, upgrade both the basic and extended sections of the Boot ROM image for compatibility. If you choose to not upgrade the Boot ROM image, the system will ask for an upgrade at the next reboot performed by powering on the switch or rebooting from the CLI (promptly or as scheduled). If you fail to make any choice in the required time, the system upgrades the entire Boot ROM image.

 

Installing a patch package

To install a patch package, for example, system-patch.bin:

1.       Activate the patch package on the master switch and the subordinate switch.

<Sysname> install activate patch flash:/system-patch.bin slot 1

<Sysname> install activate patch flash:/system-patch.bin slot 2

2.       Verify that the patch package has been activated.

<Sysname> display install active

Active packages on slot 1:

  flash:/boot.bin

  flash:/system.bin

  flash:/system-patch.bin

Active packages on slot 2:

  flash:/boot.bin

  flash:/system.bin

  flash:/system-patch.bin

3.       Commit the installation so the patch package continues to take effect after a reboot.

<Sysname> install commit

4.       Verify that the patch package installation has been committed.

<Sysname> display install committed

Committed packages on slot 1:

  flash:/boot.bin

  flash:/system.bin

  flash:/system-patch.bin

Committed packages on slot 2:

  flash:/boot.bin

  flash:/system.bin

  flash:/system-patch.bin

For more information about installing patch packages, see H3C S6805 & S6825 & S6850 & S9850 Switch Series Fundamentals Configuration Guide.

Upgrading from the Boot menu

You can upgrade the Boot ROM image and software images but not patch packages from the Boot menu.

In this approach, you must access the Boot menu of each member switch to upgrade their software one by one. If you are upgrading software images for an IRF fabric, using the CLI is a better choice.

The following sections describe the methods of upgrading software images:

·         Using TFTP to upgrade software images through the management Ethernet port

·         Using FTP to upgrade software through the management Ethernet port

·         Using XMODEM to upgrade software through the console port

The following sections describe the methods of upgrading Boot ROM images:

·         Using TFTP to upgrade Boot ROM through the management Ethernet port

·         Using FTP to upgrade Boot ROM through the management Ethernet port

·         Using XMODEM to upgrade Boot ROM through the console port

 

TIP

TIP:

Upgrading through an Ethernet port is faster than through the console port.

 

Prerequisites

Make sure that the prerequisites are met before you start upgrading software from the Boot menu.

Upgrading environment

Use a console cable to connect the console terminal, for example, a PC, to the console port on the switch. Run a terminal emulator program on the console terminal and set the following terminal settings:

·         Bits per second—9,600

·         Data bits—8

·         Parity—None

·         Stop bits—1

·         Flow control—None

·         Emulation—VT100

TFTP/FTP download

To use TFTP or FTP:

·         Run a TFTP or FTP server program on the file server or the console terminal.

·         Copy the upgrade file to the file server.

·         Correctly set the working directory on the TFTP or FTP server.

·         Make sure that the file server and the switch can reach each other.

Storage space

Make sure that sufficient space is available for the upgrading software file. If no sufficient space is available, delete obsolete files as described in "Managing files from the Boot menu."

Upgrading time

Make sure that the upgrade has minimal impact on the network services. During the upgrade, the switch cannot provide any services.

Accessing the Boot menu

System is Starting...                                                                                                               

Press Ctrl+D Into xmodem mode                                                                                                      

Press Ctrl+T to start memory test                                                                                                   

Booting Normal Extend Bootware                                                                                                     

Press Ctrl+V to start heavy memory test                                                                                             

                                                                                                                                   

********************************************************************************

*                                                                              *

*                     H3C S6850-56HF BOOTROM, Version 201                      *

*                                                                              *

********************************************************************************

Copyright (c) 2004-2023 New H3C Technologies Co., Ltd.                         

                                                                               

Creation Date       : Jun 16 2023 11:08:58                                     

CPU Type            : C2538                                                    

CPU Clock Speed     : 2400MHz                                                  

Memory Type         : DDR3 SDRAM                                               

Memory Size         : 8192MB                                                   

Memory Speed        : 1333MHz                                                  

Flash Size          : 3630MB                                                   

CPLD Version        : 2.0                                                      

PCB Version         : Ver.A                                                    

Mac Address         : 000FE2000005                                                                                                  

                                                                                                                                   

                                                                                                                                    

BootRom Validating...                                                                                                              

Press Ctrl+B to access EXTENDED BOOT MENU...5

Press one of the shortcut key combinations at prompt.

Table 7 Shortcut keys

Shortcut keys

Prompt message

Function

Remarks

Ctrl+B

Press Ctrl+B to enter Extended Boot menu...

Accesses the extended Boot menu.

Press the keys within 1 second (in fast startup mode) or 5 seconds (in full startup mode) after the message appears.

You can upgrade and manage system software and Boot ROM from this menu.

Ctrl+D

Press Ctrl+D to access BASIC BOOT MENU

Accesses the basic Boot menu.

Press the keys within 1 seconds after the message appears.

You can upgrade Boot ROM or access the extended Boot ROM segment from this menu.

Ctrl+T

Press Ctrl+T to start heavy memory test

Performs a RAM pressure test.

Press the keys within 1 second after the message appears.

 

 

Accessing the extended Boot menu

Press Ctrl+B within 1 second (in fast startup mode) or 5 seconds (in full startup mode) after the "Press Ctrl-B to enter Extended Boot menu..." prompt message appears. If you fail to do this, the system starts decompressing the system software.

Alternatively, you can enter 4 in the basic Boot menu to access the extended Boot menu.

The "Password recovery capability is enabled." or "Password recovery capability is disabled." message appears, followed by the extended Boot menu. Availability of some menu options depends on the state of password recovery capability (see Table 8).

Password recovery capability is enabled.

 

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9):

 

Table 8 Extended Boot ROM menu options

Option

Tasks

1. Download image to flash

Download a software image file to the flash.

2. Select image to boot

·        Specify the main and backup software image file for the next startup.

·        Specify the main and backup configuration files for the next startup. This task can be performed only if password recovery capability is enabled.

3. Display all files in flash

Display files on the flash.

4. Delete file from flash

Delete files to free storage space.

5. Restore to factory default configuration

Delete the current next-startup configuration files and restore the factory-default configuration.

This option is available only if password recovery capability is disabled.

6. Enter BootRom upgrade menu

Access the Boot ROM upgrade menu.

7. Skip current system configuration

Start the switch without loading any configuration file.

This is a one-time operation and takes effect only for the first system boot or reboot after you choose this option.

This option is available only if password recovery capability is enabled.

8. Set switch startup mode

Set the startup mode to fast startup mode or full startup mode.

9. Set default boot storage medium

Specify the default storage medium from which the device obtains startup images during the booting process.

0. Reboot

Reboot the switch.

Ctrl+F: Format file system

Format the current storage medium.

Ctrl+P: Change authentication for console login

Skip the authentication for console login.

This is a one-time operation and takes effect only for the first system boot or reboot after you choose this option.

This option is available only if password recovery capability is enabled.

Ctrl+R: Download image to SDRAM and run

Download a system software image and start the switch with the image.

This option is available only if password recovery capability is enabled.

Ctrl+C: Display Copyright

Display copyright information.

 

 

Using TFTP to upgrade software images through the management Ethernet port

1.       Enter 1 in the Boot menu to access the file transfer protocol submenu.

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 1 to set the TFTP parameters.

Load File Name      :update.ipe

Server IP Address   :192.168.0.3

Local IP Address    :192.168.0.2

Subnet Mask         :255.255.255.0

Gateway IP Address  :0.0.0.0

Table 9 TFTP parameter description

Item

Description

Load File Name

Name of the file to download (for example, update.ipe).

Server IP Address

IP address of the TFTP server (for example, 192.168.0.3).

Local IP Address

IP address of the switch (for example, 192.168.0.2).

Subnet Mask

Subnet mask of the switch (for example, 255.255.255.0).

Gateway IP Address

IP address of the gateway (in this example, no gateway is required because the server and the switch are on the same subnet).

 

 

NOTE:

·     To use the default setting for a field, press Enter without entering any value.

·     If the switch and the server are on different subnets, you must specify a gateway address for the switch.

 

3.       Enter all required parameters, and enter Y to confirm the settings. The following prompt appears:

Are you sure to download file to flash? Yes or No (Y/N):Y

4.       Enter Y to start downloading the image file. To return to the Boot menu, enter N.

Loading.........................................................................

................................................................................

................................................................................

................................................................Done!

5.       Enter the M (main), B (backup), or N (none) attribute for the images. In this example, assign the main attribute to the images.

Please input the file attribute (Main/Backup/None) M

Image file boot.bin is self-decompressing...

Free space: 534980608 bytes

Writing flash...................................................................

................................................................................

...................................................................Done!

Image file system.bin is self-decompressing...

Free space: 525981696 bytes

Writing flash...................................................................

................................................................................

................................................................................

................................................................................

................................................................................

................................................................................

.......................................................................Done!

 

 

NOTE:

·     The switch always attempts to boot first with the main images, and if the attempt fails, for example, because the main images are not available, the switch tries to boot with the backup images. An image with the none attribute is just stored in Flash memory for backup and you must change its attribute to make it usable at reboot.

·     If an image with the same attribute as the image you are loading is already in Flash memory, the attribute of the old image changes to none after the new image becomes valid.

 

6.       Enter 0 in the Boot menu to reboot the switch with the new software images.

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9):0

Using FTP to upgrade software through the management Ethernet port

1.       Enter 1 in the Boot menu to access the file transfer protocol submenu.

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 2 to set the FTP parameters.

Load File Name      :update.ipe

Server IP Address   :192.168.0.3

Local IP Address    :192.168.0.2

Subnet Mask         :255.255.255.0

Gateway IP Address  :0.0.0.0

FTP User Name       :switch

FTP User Password   :***

Table 10 FTP parameter description

Item

Description

Load File Name

Name of the file to download (for example, update.ipe).

Server IP Address

IP address of the FTP server (for example, 192.168.0.3).

Local IP Address

IP address of the switch (for example, 192.168.0.2).

Subnet Mask

Subnet mask of the switch (for example, 255.255.255.0).

Gateway IP Address

IP address of the gateway (in this example, no gateway is required because the server and the switch are on the same subnet).

FTP User Name

Username for accessing the FTP server, which must be the same as configured on the FTP server.

FTP User Password

Password for accessing the FTP server, which must be the same as configured on the FTP server.

 

 

NOTE:

·     To use the default setting for a field, press Enter without entering any value.

·     If the switch and the server are on different subnets, you must specify a gateway address for the switch.

 

3.       Enter all required parameters, and enter Y to confirm the settings. The following prompt appears:

Are you sure to download file to flash? Yes or No (Y/N):Y

4.       Enter Y to start downloading the image file. To return to the Boot menu, enter N.

Loading.........................................................................

................................................................................

................................................................................

................................................................Done!

5.       Enter the M (main), B (backup), or N (none) attribute for the images. In this example, assign the main attribute to the images.

Please input the file attribute (Main/Backup/None) M

Image file boot.bin is self-decompressing...

Free space: 534980608 bytes

Writing flash...................................................................

................................................................................

...................................................................Done!

Image file system.bin is self-decompressing...

Free space: 525981696 bytes

Writing flash...................................................................

................................................................................

................................................................................

................................................................................

................................................................................

................................................................................

.......................................................................Done!

 

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9):0

 

 

NOTE:

·     The switch always attempts to boot first with the main images, and if the attempt fails, for example, because the main images not available, the switch tries to boot with the backup images. An image with the none attribute is just stored in Flash memory for backup and you must change its attribute to make it usable at reboot.

·     If an image with the same attribute as the image you are loading is already in Flash memory, the attribute of the old image changes to none after the new image becomes valid.

 

6.       Enter 0 in the Boot menu to reboot the switch with the new software images.

Using XMODEM to upgrade software through the console port

XMODEM download through the console port is slower than TFTP or FTP download through the management Ethernet port. To save time, use the management Ethernet port as long as possible.

1.       Enter 1 in the Boot menu to access the file transfer protocol submenu.

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 3 to set the XMODEM download baud rate.

Please select your download baudrate:

1.* 9600

2.  19200

3.  38400

4.  57600

5.  115200

0.  Return to boot menu

 

Enter your choice(0-5):5

3.       Select an appropriate download rate, for example, enter 5 to select 115200 bps.

Download baudrate is 115200 bps                              

Please change the terminal's baudrate to 115200 bps and select XMODEM protocol

Press enter key when ready

4.       Set the serial port on the terminal to use the same baud rate and protocol as the console port. If you select 9600 bps as the download rate for the console port, skip this task.

5.       Select Call > Disconnect in the HyperTerminal window to disconnect the terminal from the switch.

Figure 2 Disconnecting the terminal from the switch

 

6.       Select File > Properties, and in the Properties dialog box, click Configure.

Figure 3 Properties dialog box

 

7.       Select 115200 from the Bits per second list and click OK.

Figure 4 Modifying the baud rate

 

8.       Select Call > Call to reestablish the connection.

Figure 5 Reestablishing the connection

 

9.       Press Enter. The following prompt appears:

Are you sure to download file to flash? Yes or No (Y/N):Y

10.     Enter Y to start downloading the file. (To return to the Boot menu, enter N.)

Now please start transfer file with XMODEM protocol

If you want to exit, Press <Ctrl+X>

Loading ...CCCCCCCCCCCCCCCCCCCCCCCCC 

11.     Select Transfer > Send File in the HyperTerminal window.

Figure 6 Transfer menu

 

12.     In the dialog box that appears, click Browse to select the source file, and select Xmodem from the Protocol list.

Figure 7 File transmission dialog box

 

13.     Click Send. The following dialog box appears:

Figure 8 File transfer progress

 

14.     Enter the M (main), B (backup), or N (none) attribute for the images. In this example, assign the main attribute to the images.

Please input the file attribute (Main/Backup/None) m

The boot.bin image is self-decompressing...

At the Load File name prompt, enter a name for the Boot image to be saved to Flash memory.

Load File name  : default_file boot-update.bin      

Free space: 470519808 bytes

Writing flash...................................................................

.............Done!

The system-update.bin image is self-decompressing...

At the Load File name prompt, enter a name for the system image to be saved to Flash memory.

Load File name  : default_file system-update.bin     

Free space: 461522944 bytes

Writing flash...................................................................

.............Done!

Your baudrate should be set to 9600 bps again!

Press enter key when ready

 

 

NOTE:

·     The switch always attempts to boot first with the main images, and if the attempt fails, for example, because the main images not available, the switch tries to boot with the backup images. An image with the none attribute is just stored in Flash memory for backup and you must change its attribute to make it usable at reboot.

·     If an image with the same attribute as the image you are loading is already in Flash memory, the attribute of the old image changes to none after the new image becomes valid.

 

15.     If the baud rate of the HyperTerminal is not 9600 bps, restore it to 9600 bps. If the baud rate is 9600 bps, skip this step.

To access the switch through the console port after a reboot, you must perform this step, because the console port rate reverts to 9600 bps at a reboot.

16.     Press Enter to access the Boot menu.

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9):0

17.     Enter 0 to reboot the system with the new software images.

Using TFTP to upgrade Boot ROM through the management Ethernet port

1.       Enter 6 in the Boot menu to access the Boot ROM update menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 1 in the Boot ROM update menu to upgrade the full Boot ROM.

The file transfer protocol submenu appears:

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

3.       Enter 1 to set the TFTP parameters.

Load File Name      :update.btm

Server IP Address   :192.168.0.3

Local IP Address    :192.168.0.2

Subnet Mask         :255.255.255.0

Gateway IP Address  :0.0.0.0

Table 11 TFTP parameter description

Item

Description

Load File Name

Name of the file to download (for example, update.btm).

Server IP Address

IP address of the TFTP server (for example, 192.168.0.3).

Local IP Address

IP address of the switch (for example, 192.168.0.2).

Subnet Mask

Subnet mask of the switch (for example, 255.255.255.0).

Gateway IP Address

IP address of the gateway (in this example, no gateway is required because the server and the switch are on the same subnet).

 

 

NOTE:

·     To use the default setting for a field, press Enter without entering any value.

·     If the switch and the server are on different subnets, you must specify a gateway address for the switch.

 

4.       Enter all required parameters and press Enter to start downloading the file.

Loading.................................................Done! 

5.       Enter Y at the prompt to upgrade the basic Boot ROM section.

Will you Update Basic BootRom? (Y/N):Y

Updating Basic BootRom...........Done.

6.       Enter Y at the prompt to upgrade the extended Boot ROM section.

Updating extended BootRom? (Y/N):Y

Updating extended BootRom.........Done.

7.       Enter 0 in the Boot ROM update menu to return to the Boot menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

8.       Enter 0 in the Boot menu to reboot the switch with the new Boot ROM image.

Using FTP to upgrade Boot ROM through the management Ethernet port

1.       Enter 6 in the Boot menu to access the Boot ROM update menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 1 in the Boot ROM update menu to upgrade the full Boot ROM.

The file transfer protocol submenu appears:

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

3.       Enter 2 to set the FTP parameters.

Load File Name     :update.btm

Server IP Address  :192.168.0.3

Local IP Address   :192.168.0.2

Subnet Mask        :255.255.255.0

Gateway IP Address :0.0.0.0

FTP User Name      :switch

FTP User Password  :***

Table 12 FTP parameter description

Item

Description

Load File Name

Name of the file to download (for example, update.btm).

Server IP Address

IP address of the FTP server (for example, 192.168.0.3).

Local IP Address

IP address of the switch (for example, 192.168.0.2).

Subnet Mask

Subnet mask of the switch (for example, 255.255.255.0).

Gateway IP Address

IP address of the gateway (in this example, no gateway is required because the server and the switch are on the same subnet).

FTP User Name

Username for accessing the FTP server, which must be the same as configured on the FTP server.

FTP User Password

Password for accessing the FTP server, which must be the same as configured on the FTP server.

 

 

NOTE:

·     To use the default setting for a field, press Enter without entering any value.

·     If the switch and the server are on different subnets, you must specify a gateway address for the switch.

 

4.       Enter all required parameters and press Enter to start downloading the file.

Loading.................................................Done! 

5.       Enter Y at the prompt to upgrade the basic Boot ROM section.

Will you Update Basic BootRom? (Y/N):Y

Updating Basic BootRom...........Done.

6.       Enter Y at the prompt to upgrade the extended Boot ROM section.

Updating extended BootRom? (Y/N):Y

Updating extended BootRom.........Done.

7.       Enter 0 in the Boot ROM update menu to return to the Boot menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

8.       Enter 0 in the Boot menu to reboot the switch with the new Boot ROM image.

Using XMODEM to upgrade Boot ROM through the console port

XMODEM download through the console port is slower than TFTP or FTP download through the management Ethernet port. To save time, use the management Ethernet port as long as possible.

1.       Enter 6 in the Boot menu to access the Boot ROM update menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

2.       Enter 1 in the Boot ROM update menu to upgrade the full Boot ROM.

The file transfer protocol submenu appears:

1. Set TFTP protocol parameters

2. Set FTP protocol parameters

3. Set XMODEM protocol parameters

0. Return to boot menu

 

Enter your choice(0-3):

3.       Enter 3 to set the XMODEM download baud rate.

Please select your download baudrate:

1.* 9600

2.  19200

3.  38400

4.  57600

5.  115200

0.  Return to boot menu

 

Enter your choice(0-5):5

4.       Select an appropriate download rate, for example, enter 5 to select 115200 bps.

Download baudrate is 115200 bps                              

Please change the terminal's baudrate to 115200 bps and select XMODEM protocol

Press enter key when ready

5.       Set the serial port on the terminal to use the same baud rate and protocol as the console port. If you select 9600 bps as the download rate for the console port, skip this task.

6.       Select Call > Disconnect in the HyperTerminal window to disconnect the terminal from the switch.

Figure 9 Disconnecting the terminal from the switch

 

7.       Select File > Properties, and in the Properties dialog box, click Configure.

Figure 10 Properties dialog box

 

8.       Select 115200 from the Bits per second list and click OK.

Figure 11 Modifying the baud rate

 

9.       Select Call > Call to reestablish the connection.

Figure 12 Reestablishing the connection

 

10.     Press Enter to start downloading the file.

Now please start transfer file with XMODEM protocol

If you want to exit, Press <Ctrl+X>

Loading ...CCCCCCCCCCCCCCCCCCCCCCCCC 

11.     Select Transfer > Send File in the HyperTerminal window.

Figure 13 Transfer menu

 

12.     In the dialog box that appears, click Browse to select the source file, and select Xmodem from the Protocol list.

Figure 14 File transmission dialog box

 

13.     Click Send. The following dialog box appears:

Figure 15 File transfer progress

 

14.     Enter Y at the prompt to upgrade the basic Boot ROM section.

Loading ...CCCCCCCCCCCCCC  ...Done! 

Will you Update Basic BootRom? (Y/N):Y

Updating Basic BootRom...........Done.

15.     Enter Y at the prompt to upgrade the extended Boot ROM section.

Updating extended BootRom? (Y/N):Y

Updating extended BootRom.........Done.

16.     If the baud rate of the HyperTerminal is not 9600 bps, restore it to 9600 bps at the prompt. If the baud rate is 9600 bps, skip this step.

Please change the terminal's baudrate to 9600 bps, press ENTER when ready.

To access the switch through the console port after a reboot, you must perform this step, because the console port rate reverts to 9600 bps at a reboot.

17.     Press Enter to access the Boot ROM update menu.

18.     Enter 0 in the Boot ROM update menu to return to the Boot menu.

1. Update full BootRom

2. Update extended BootRom

3. Update basic BootRom

0. Return to boot menu

 

Enter your choice(0-3):

19.     Enter 0 in the Boot menu to reboot the switch with the new Boot ROM image.

Managing files from the Boot menu

From the Boot menu, you can display files in Flash memory to check for obsolete files, incorrect files, or space insufficiency, delete files to release storage space, or change the attributes of software images.

Displaying all files

Enter 3 in the Boot menu to display all files in Flash memory and identify the free space size.

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9): 3

The following is a sample output:

Display all file(s) in flash:

 

File Number    File Size(bytes)     File Name

================================================================================

1              8177                 flash:/testbackup.cfg

2(*)           53555200             flash:/system.bin

3(*)           9959424              flash:/boot.bin

4              3678                 flash:/startup.cfg_backup

5              30033                flash:/default.mdb

6              42424                flash:/startup.mdb

7              18                   flash:/.pathfile

8              232311               flash:/logfile/logfile.log

9              5981                 flash:/startup.cfg_back

10(*)          6098                 flash:/startup.cfg

11             20                   flash:/.snmpboots

Free space: 1009906637 bytes

The current image is boot.bin

(*)-with main attribute

(b)-with backup attribute

(*b)-with both main and backup attribute

Deleting files

If storage space is insufficient, delete obsolete files to free up storage space.

To delete files:

1.       Enter 4 in the Boot menu:

Deleting the file in flash:

 

File Number    File Size(bytes)     File Name

================================================================================

1              8177                 flash:/testbackup.cfg

2(*)           53555200             flash:/system.bin

3(*)           9959424              flash:/boot.bin

4              3678                 flash:/startup.cfg_backup

5              30033                flash:/default.mdb

6              42424                flash:/startup.mdb

7              18                   flash:/.pathfile

8              232311               flash:/logfile/logfile.log

9              5981                 flash:/startup.cfg_back

10(*)          6098                 flash:/startup.cfg

11             20                   flash:/.snmpboots

Free space: 1009906637 bytes

The current image is boot.bin

(*)-with main attribute

(b)-with backup attribute

(*b)-with both main and backup attribute

2.       Enter the number of the file to delete. For example, enter 1 to select the file testbackup.cfg.

Please input the file number to change: 1

3.       Enter Y at the confirmation prompt.

The file you selected is testbackup.cfg,Delete it? (Y/N):Y

Deleting....................................Done!

Changing the attribute of software images

Software image attributes include main (M), backup (B), and none (N). System software and boot software can each have multiple none-attribute images but only one main image and one backup image on the switch. You can assign both the M and B attributes to one image. If the M or B attribute you are assigning has been assigned to another image, the assignment removes the attribute from that image. If the removed attribute is the sole attribute of the image, its attribute changes to N.

For example, the system image system.bin has the M attribute and the system image system-update.bin has the B attribute. After you assign the M attribute to system-update.bin, the attribute of system-update.bin changes to M+B and the attribute of system.bin changes to N.

To change the attribute of a system or boot image:

1.       Enter 2 in the Boot menu.

   EXTENDED BOOT MENU

 

1. Download image to flash

2. Select image to boot

3. Display all files in flash

4. Delete file from flash

5. Restore to factory default configuration

6. Enter BootRom upgrade menu

7. Skip current system configuration

8. Set switch startup mode

9. Set default boot storage medium

0. Reboot

Ctrl+Z: Access EXTENDED ASSISTANT MENU

Ctrl+F: Format file system

Ctrl+P: Change authentication for console login

Ctrl+R: Download image to SDRAM and run

 

Enter your choice(0-9): 2

 

2.       Enter 1 or 2 at the prompt to set the attribute of a software image. (The following output is based on the option 2. To set the attribute of a configuration file, enter 3.)

1. Set image file

2. Set bin file

3. Set configuration file

0. Return to boot menu

 

Enter your choice(0-3): 2

 

File Number    File Size(bytes)     File Name

================================================================================

1(*)              53555200              flash:/system.bin

2(*)              9959424              flash:/boot.bin

3                 13105152              flash:/boot-update.bin

4                 91273216             flash:/system-update.bin

Free space: 905848832 bytes

(*)-with main attribute

(b)-with backup attribute

(*b)-with both main and backup attribute

Note:Select .bin files. One but only one boot image and system image must be included.

3.       Enter the number of the file you are working with. For example, enter 3 to select the boot image boot-update.bin and enter 4 to select the system image system-update.bin.

Enter file No.(Allows multiple selection):3

Enter another file No.(0-Finish choice):4

4.       Enter 0 to finish the selection.

Enter another file No.(0-Finish choice):0

You have selected:

flash:/boot-update.bin

flash:/system-update.bin

5.       Enter M or B to change its attribute to main or backup. If you change its attribute to M, the attribute of boot.bin changes to none.

Please input the file attribute (Main/Backup) M

This operation may take several minutes. Please wait....

Next time, boot-update.bin will become default boot file!

Next time, system-update.bin will become default boot file! 

Set the file attribute success!

Handling software upgrade failures

If a software upgrade fails, the system runs the old software version.

To handle a software upgrade failure:

1.       Verify that the software release is compatible with the switch model and the correct file is used.

2.       Verify that the software release and the Boot ROM release are compatible. For software and Boot ROM compatibility, see the hardware and software compatibility matrix in the correct release notes.

3.       Check the physical ports for a loose or incorrect connection.

4.       If you are using the console port for file transfer, check the HyperTerminal settings (including the baud rate and data bits) for any wrong setting.

5.       Check the file transfer settings:

¡  If XMODEM is used, you must set the same baud rate for the terminal as for the console port.

¡  If TFTP is used, you must enter the same server IP addresses, file name, and working directory as set on the TFTP server.

¡  If FTP is used, you must enter the same FTP server IP address, source file name, working directory, and FTP username and password as set on the FTP server.

6.       Check the FTP or TFTP server for any incorrect setting.

7.       Check that the storage device has sufficient space for the upgrade file.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网