0% found this document useful (0 votes)
713 views126 pages

ExtremeXOS 21.1.5-Patch1-2 RelNotes

Extreme XOS 21.1.5 Patch 1-2 Release Notes

Uploaded by

DD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
713 views126 pages

ExtremeXOS 21.1.5-Patch1-2 RelNotes

Extreme XOS 21.1.5 Patch 1-2 Release Notes

Uploaded by

DD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 126

ExtremeXOS Release Notes

Software Version ExtremeXOS 21.1.5 Patch 1-2

121212-01

Published June 2018


Copyright © 2018 All rights reserved.

Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.

Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks

Software Licensing
Some software files have been licensed under certain open source or third-party licenses. End-
user license agreements and open source declarations can be found at:
www.extremenetworks.com/support/policies/software-licensing

Support
For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408
(toll-free in U.S. and Canada) or +1-408-579-2826. For the support phone number in other
countries, visit: http://www.extremenetworks.com/support/contact/
For product documentation online, visit: https://www.extremenetworks.com/documentation/
Table of Contents
Preface......................................................................................................................................... 5
Conventions............................................................................................................................................................................. 5
Providing Feedback to Us................................................................................................................................................ 6
Getting Help............................................................................................................................................................................ 6
Related Publications............................................................................................................................................................ 7

Chapter 1: Overview................................................................................................................... 8
New and Corrected Features in ExtremeXOS 21.1.5-Patch1-2......................................................................... 8
New and Corrected Features in ExtremeXOS 21.1.3-Patch1-4.........................................................................9
New and Corrected Features in 21.1............................................................................................................................ 13
New Hardware Supported in ExtremeXOS 21.1....................................................................................................43
Hardware No Longer Supported................................................................................................................................44
VLAN Option Formatting in Commands................................................................................................................44
Circuit Emulation Service (CES) No Longer Supported.................................................................................44
OpenFlow and SSH Included in ExtremeXOS Base Image........................................................................... 44
ExtremeXOS SSH Server Upgraded with OpenSSH v6.5...............................................................................45
CLI Command Output Format of Ports Lists....................................................................................................... 45
Extreme Hardware/Software Compatibility and Recommendation Matrices......................................45
Compatibility with ExtremeManagement (Formerly NetSight)..................................................................45
Upgrading ExtremeXOS..................................................................................................................................................45
Supported MIBs.................................................................................................................................................................. 46
Tested Third-Party Products.........................................................................................................................................46
Extreme Switch Security Assessment..................................................................................................................... 47
Service Notifications......................................................................................................................................................... 47

Chapter 2: Limits......................................................................................................................48
Chapter 3: Open Issues, Known Behaviors, and Resolved Issues.....................................78
Open Issues........................................................................................................................................................................... 78
Known Behaviors................................................................................................................................................................. 81
Resolved Issues in ExtremeXOS 21.1.5-Patch1-2...................................................................................................83
Resolved Issues in ExtremeXOS 21.1.5...................................................................................................................... 85
Resolved Issues in ExtremeXOS 21.1.4-Patch1-7.................................................................................................. 86
Resolved Issues in ExtremeXOS 21.1.4-Patch1-6.................................................................................................. 87
Resolved Issues in ExtremeXOS 21.1.4-Patch1-3.................................................................................................. 89
Resolved Issues in ExtremeXOS 21.1.4....................................................................................................................... 91
Resolved Issues in ExtremeXOS 21.1.3-Patch1-7.................................................................................................. 94
Resolved Issues in ExtremeXOS 21.1.3-Patch1-4.................................................................................................. 97
Resolved Issues in ExtremeXOS 21.1.3.................................................................................................................... 100
Resolved Issues in ExtremeXOS 21.1.2-Patch1-2.................................................................................................104
Resolved Issues in ExtremeXOS 21.1.2.................................................................................................................... 106
Resolved Issues in ExtremeXOS 21.1.1-Patch1-5................................................................................................... 110
Resolved Issues in ExtremeXOS 21.1.1-Patch1-2....................................................................................................113
Resolved Issues in ExtremeXOS 21.1..........................................................................................................................115

Chapter 4: ExtremeXOS Document Corrections................................................................125


configure pim dense-neighbor-check.....................................................................................................................125
SummitStack Topologies...............................................................................................................................................126
Zero Touch Provisioning (ZTP) and Stacking..................................................................................................... 126

ExtremeXOS Release Notes for version 21.1.5 3


Table of Contents

LACP Fallback.....................................................................................................................................................................126

ExtremeXOS Release Notes for version 21.1.5 4


Preface
This section discusses the conventions used in this guide, ways to provide feedback, additional help, and
other Extreme Networks publications.

Conventions
This section discusses the conventions used in this guide.

Text Conventions
The following tables list text conventions that are used throughout this guide.

Table 1: Notice Icons


Icon Notice Type Alerts you to...
General Notice Helpful tips and notices for using the product.

Note Important features or instructions.

Caution Risk of personal injury, system damage, or loss of data.

Warning Risk of severe personal injury.

New! New Content Displayed next to new content. This is searchable text within the PDF.

Table 2: Text Conventions


Convention Description
Screen displays This typeface indicates command syntax, or represents information as it appears on the
screen.
The words enter and When you see the word “enter” in this guide, you must type something, and then press
type the Return or Enter key. Do not press the Return or Enter key when an instruction
simply says “type.”
[Key] names Key names are written with brackets, such as [Return] or [Esc]. If you must press two
or more keys simultaneously, the key names are linked with a plus sign (+). Example:
Press [Ctrl]+[Alt]+[Del]
Words in italicized type Italics emphasize a point or denote new terms at the place where they are defined in
the text. Italics are also used when referring to publication titles.

ExtremeXOS Release Notes for version 21.1.5 5


Preface

Platform-Dependent Conventions
Unless otherwise noted, all information applies to all platforms supported by ExtremeXOS software,
which are the following:
• ExtremeSwitching® switches
• Summit® switches
• SummitStack™

When a feature or feature implementation applies to specific platforms, the specific platform is noted in
the heading for the section describing that implementation in the ExtremeXOS command
documentation (see the Extreme Documentation page at www.extremenetworks.com/
documentation/). In many cases, although the command is available on all platforms, each platform
uses specific keywords. These keywords specific to each platform are shown in the Syntax Description
and discussed in the Usage Guidelines sections.

Terminology
When features, functionality, or operation is specific to a switch family, such as ExtremeSwitching™ or
Summit™, the family name is used. Explanations about features and operations that are the same across
all product families simply refer to the product as the switch.

Providing Feedback to Us
We are always striving to improve our documentation and help you work better, so we want to hear
from you! We welcome all feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team about
this document, please contact us using our short online feedback form. You can also email us directly at
documentation@extremenetworks.com.

Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
• GTAC (Global Technical Assistance Center) for Immediate Support
• Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
• Email: support@extremenetworks.com. To expedite your message, enter the product name or
model number in the subject line.
• Extreme Portal — Search the GTAC knowledge base, manage support cases and service contracts,
download software, and obtain product licensing, training, and certifications.
• The Hub — A forum for Extreme Networks customers to connect with one another, answer
questions, and share ideas and feedback. This community is monitored by Extreme Networks
employees, but is not intended to replace specific guidance from GTAC.

Before contacting Extreme Networks for technical support, have the following information ready:

ExtremeXOS Release Notes for version 21.1.5 6


Preface

• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers

Related Publications

ExtremeXOS Publications
• ACL Solutions Guide
• ExtremeXOS 21.1 Command Reference Guide
• ExtremeXOS 21.1 EMS Messages Catalog
• ExtremeXOS 21.1 Feature License Requirements
• ExtremeXOS 21.1 User Guide
• ExtremeXOS OpenFlow User Guide
• ExtremeXOS Quick Guide
• ExtremeXOS Legacy CLI Quick Reference Guide
• ExtremeXOS Release Notes
• Extreme Hardware/Software Compatibility and Recommendation Matrices
• Switch Configuration with Chalet for ExtremeXOS 21.1 and Later
• Using AVB with Extreme Switches

Open Source Declarations


Some software files have been licensed under certain open source licenses. More information is
available at: www.extremenetworks.com/support/policies/software-licensing/.

ExtremeXOS Release Notes for version 21.1.5 7


1 Overview
New and Corrected Features in ExtremeXOS 21.1.5-Patch1-2
New and Corrected Features in ExtremeXOS 21.1.3-Patch1-4
New and Corrected Features in 21.1
New Hardware Supported in ExtremeXOS 21.1
Hardware No Longer Supported
VLAN Option Formatting in Commands
Circuit Emulation Service (CES) No Longer Supported
OpenFlow and SSH Included in ExtremeXOS Base Image
ExtremeXOS SSH Server Upgraded with OpenSSH v6.5
CLI Command Output Format of Ports Lists
Extreme Hardware/Software Compatibility and Recommendation Matrices
Compatibility with ExtremeManagement (Formerly NetSight)
Upgrading ExtremeXOS
Supported MIBs
Tested Third-Party Products
Extreme Switch Security Assessment
Service Notifications

These release notes document ExtremeXOS 21.1.5 Patch 1-2, which adds a command and resolves
software deficiencies.
• New and Corrected Features in 21.1 on page 13
• New Hardware Supported in ExtremeXOS 21.1 on page 43
• Limits on page 48
• Open Issues, Known Behaviors, and Resolved Issues on page 78

New and Corrected Features in ExtremeXOS 21.1.5-Patch1-2


This section lists the new and corrected features supported in the ExtremeXOS 21.1.5-Patch1-2 software:

NEW! configure stpd multicast send-query


configure stpd multicast send-query [on | off]

Description
Configures suppressing - and MLD-triggered queries when topology changes are received.

ExtremeXOS Release Notes for version 21.1.5 8


Overview

Syntax Description

multicast Specifies multicast options.

send-query For VLANs associated with STPD, when topology changes occur, send or
suppress IGMP or MLD queries.
on Send IGMP or MLD queries (default).

off Do not send IGMP or MLD queries.

Default
Sending IGMP or MLD queries is on.

Usage Guidelines
Whenever STP topology changes are received on a port, the switch sends triggered queries that mark
the peer port as a router port and floods all multicast packets towards this port. This can cause
unnecessary bandwidth usage. This command allows you to allow or suppress this forwarding.

Example
The following example turns off IGMP and MLD queries:
# configure stpd multicast send-query off

History
This command was first available in ExtremeXOS 21.1.5-Patch1-2.

Platform Availability
This command is available on the Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching
X440-G2, X620 series switches.

New and Corrected Features in ExtremeXOS 21.1.3-Patch1-4


This section lists the new and corrected features supported in the ExtremeXOS 21.1.3-Patch1-4 software:

Multi-switch Link Aggregation Group (MLAG) Port Reload-Delay Timer


On certain platforms, it takes few seconds between the first port and last port to come up. When lower
numbered ports are used as Multi-switch Link Aggregation Group (MLAG) ports and higher numbered
ports are used as inter-switch connection (ISC) ports, MLAG ports come up first before the ISC ports. In
such cases, traffic from the servers MLAGed to the peers that traverse the ISC can be lost during the
duration when the traffic hashes to the MLAG peer while the ISC is still not up.

This feature introduces a timer that keeps MLAG ports disabled for the configured duration while the
switch configuration is loading. This timer is also useful for cases where network-facing Layer 3
protocols, like OSPF, are yet to converge on the node that has just come up. This feature is disabled by
default.

This feature has three commands:


• configure mlag ports reload-delay on page 10

ExtremeXOS Release Notes for version 21.1.5 9


Overview

• enable mlag port reload-delay on page 10


• disable mlag port reload-delay on page 11

Additionally, the show mlag ports on page 12 is changed to show the status of this feature.

configure mlag ports reload-delay


configure mlag ports reload-delay reload-delay

Description
This command configures a reload delay on Multi-switch Link Aggregation Group (MLAG) ports.

Syntax Description

reload-delay Specifies creating a reload delay on MLAG ports.


reload-delay Specifies the MLAG port reload-delay timer in seconds (range = 1–1,200
seconds). The default is 30 seconds.

Default
The default reload-delay timer interval is 30 seconds.

Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command allows you to configure a time delay for MLAG ports providing
enough time for ISC ports/neighborship of other Layer 3 protocols to come up. To have this delay timer
take effect, you need to issue the enable mlag port reload-delay on page 10 command.

Example
The following example sets the reload-delay to 60 seconds:
configure mlag ports reload-delay 60

History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.

Platform Availability
This command is available on standalone and stacking switches that support the MLAG.

enable mlag port reload-delay


enable mlag port reload-delay

Description
This command enables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.

Syntax Description
This command has no arguments or variables.

ExtremeXOS Release Notes for version 21.1.5 10


Overview

Default
MLAG reload-delay is disabled by default.

Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. After using the configure mlag ports reload-delay on page 10 command to
configure a time delay for MLAG ports that provides enough time for ISC ports/neighborship of other
Layer 3 protocols to come up, you have to issue this command to enable the timer.

Example
The following example enables the MLAG reload-delay timer:
enable mlag port reload-delay

History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.

Platform Availability
This command is available on standalone and stacking switches that support the MLAG.

disable mlag port reload-delay


enable mlag port reload-delay

Description
This command disables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.

Syntax Description
This command has no arguments or variables.

Default
MLAG reload-delay is disabled by default.

Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command disables this timer feature.

Example
The following example disables the MLAG reload-delay timer:
disable mlag port reload-delay

History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.

Platform Availability
This command is available on standalone and stacking switches that support the MLAG.

ExtremeXOS Release Notes for version 21.1.5 11


Overview

show mlag ports


show mlag ports {port_list}

Description
Displays information about each MLAG group.

Syntax Description
port_list Specifies one or more ports.

Default
N/A.

Usage Guidelines
Use this command to display information about each MLAG group including local port number, local
port status, remote MLAG port state, MLAG peer name, MLAG peer status, local port failure count,
remote MLAG port failure count.

Local and remote link state and fail counts reflect the status of the entire LAG when a LAG is used in
conjunction with an MLAG. For example, if 1 and 2 ports in a local LAG on the switch associated with an
MLAG is down, the local link state will still show as ready and the associated local fail count will be
incremented. The remote fail count shown at MLAG neighboring switch will also be incremented.

Example
The following command displays information for an MLAG group:
# show mlag ports

Following is sample output for the command:

Local Local Remote


MLAG Local Link Remote Peer Fail Fail
Id Port State Link Peer Status Count Count
============================================================================
2 1:1 A Up leftBD8K Up 0 0
1 1:2 A Up leftBD8K Up 0 0
============================================================================
Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present
Remote Link : Up - One or more links are active on the remote switch,
Down - No links are active on the remote switch,
N/A - The peer has not communicated link state for this MLAG
port
Number of Multi-switch Link Aggregation Groups : 2
Convergence control : Fast
Reload Delay Interval : 30 seconds
Reload Delay : Enabled

The following command displays information about an MLAG group on ports 1 and 2:

show mlag port 1,2

Following is sample output for the command:

Local Local Remote

ExtremeXOS Release Notes for version 21.1.5 12


Overview

MLAG Local Link Remote Peer Fail Fail


Id Port State Link Peer Status Count Count
==========================================================================
100 1 A Up switch101 Up 0 2
101 2 A Down switch101 Up 0 1
==========================================================================
Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present
Remote Link: Up - One or more links are active on the remote switch,
Down - No links are active on the remote switch,
N/A - The peer has not communicated link state for this MLAG
group
Number of Multi-switch Link Aggregation Groups: 2
Convergence Control : Conserve Access Lists
Reload Delay Interval : 30 seconds
Reload Delay : Enabled

History
This command was first available in ExtremeXOS 12.5.

Reload-delay feature information was added in ExtremeXOS 21.1.3-Patch1-4.

Platform Availability
This command is available on standalone and stacking switches that support the MLAG.

New and Corrected Features in 21.1


This section lists the new and corrected features supported in the ExtremeXOS 21.1 software:

Virtual Extensible LAN (VXLAN) Gateway


Virtual Extensible LAN (VXLAN) is a layer 2 overlay scheme over a layer 3 network. Overlays are called
VXLAN segments, and only virtual machines (VMs) within the same segment have Layer 2 connectivity.
VXLAN segments are uniquely identified using an identifier called the VXLAN Network Identifier (VNI).
The VNI is a 24-bit identifier; therefore, an administrative domain can support up to 16 million overlay
networks.

As the scope of the MAC addresses originated by tenant VMs is restricted by the VNI, overlapping MAC
addresses across segments can be supported without traffic leaking between tenant segments. When a
tenant frame traverses a VXLAN overlay network, it is encapsulated by a VXLAN header that contains
the VNI. This frame is further encapsulated in a UDP header and L2/L3 headers.

VXLAN can add up to a 54-byte header to the tenant VM’s frame. For VXLAN to work correctly, this
requires that the IP MTU be set to at least 1554 bytes on the network-side interfaces, and on all transit
nodes which carry VXLAN traffic.

The role to encapsulate/decapsulate a frame is performed by a VXLAN Tunnel Endpoint (VTEP), also
referred to as VXLAN gateway. A VXLAN gateway can be a Layer 2 gateway or Layer 3 gateway
depending on its capacity. A Layer 2 gateway acts as a bridge connecting VXLAN segments to VLAN

ExtremeXOS Release Notes for version 21.1.5 13


Overview

segments. A Layer 3 gateway performs all that of Layer 2 gateway, and capable of routing traffic
between tenant VLANs.

Note
This feature implements only Layer 2 gateway.

At tunnel initiation, a gateway looks up the destination MAC address of the frame received from the
tenant VM. If the MAC address to remote VTEP IP binding is known, the gateway adds the VXLAN
header and the IP/UDP header to the frame and forwards toward the DC network. A gateway node that
terminates a tunnel removes the encapsulation headers from the packet and determines the bridge
domain of the inner frame by examining the VNID received in the VXLAN header. The gateway then
looks up the inner MAC destination address (DA) in the tenant VLAN's filtering database and decides
either to flood or forward the frame to tenant ports.

The VXLAN segments with the same virtual network ID form a virtual network with one Ethernet
broadcast domain.

In multicast VXLAN, the VNI is mapped to a multicast group and multicast tunnels are used to distribute
broadcast, unknown unicast and multicast (BUM) tenant traffic to remote endpoints (VTEPs). This
requires that the Layer 3 network should support multicast. Unicast VXLAN uses unicast tunnels, and
the BUM traffic is head-end replicated at each of the remote endpoints.

Note
This feature implements only unicast VXLAN.

Supported Platforms
Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.

Limitations
The following capabilities are not supported in ExtremeXOS 21.1:
• Layer 3 gateways
• Multicast VXLAN
• Ability to assign more than one VNI to a virtual network
• IPv6 addresses for local and remote VTEPs
• Assigning source IP addresses for VXLAN gateway encapsulation:
• Per virtual router
• Per virtual network or VNI
• Support for adding more than one tenant VLAN per VNI
• A physical port being part of both a tenant VLAN and an underlay (network) VLAN
• Routing in and out of tunnels
• Integration with any controllers
• Support for heterogeneous stack environments where at least one of the stack nodes is not VXLAN
capable
• More than one next hop per (network) hop
• Tagged and untagged tenant VLANs on the same port

ExtremeXOS Release Notes for version 21.1.5 14


Overview

• Multicast underlay IP network, including PIM-Bidir


• Multiple VRs

New CLI Commands


create virtual-network vn_name {flooding [standard | explicit-remotes]}

configure virtual-network vn_name vxlan vni [ vni | none]

configure virtual-network vn_name [add | delete] [{vlan} vlan_name |


vman vman_name]

configure virtual-network local-endpoint [ ipaddress ipaddress { vr


vr_name } | none ]

create virtual-network remote-endpoint vxlan ipaddress ipaddress {vr


vr_name}

delete virtual-network remote-endpoint vxlan ipaddress ipaddress {vr


vr_name}

configure virtual-network vn_name [add | delete] remote-endpoint vxlan


ipaddress ipaddress {vr vr_name}

enable learning {forward-packets | drop-packets}] vxlan {vr vr_name}


ipaddress remote_ipaddress

disable learning {forward-packets | drop-packets}] vxlan {vr vr_name}


ipaddress remote_ipaddress

show virtual-network { vn_name | vxlan vni vni | [vlan vlan_name | vman


vman_name]}

show virtual-network {vn_name} remote-endpoint vxlan {vni vni}


{ipaddress ipaddress { vr vr_name } }

configure fdb {mac_addr | broadcast | unknown-unicast | unknown-


multicast} vlan vlan_name [ add | delete ] vxlan {vr vr_name}
{ipaddress} remote_ipaddress

configure virtual-network remote-endpoint vxlan ipaddress ipaddress {vr


vr_name} monitor [on | off]

show virtual-network { vn_name | remote-endpoint vxlan {ipaddress


ipaddress} {vr vr_name}} statistics {no-refresh}

clear counters virtual-network remote-endpoint vxlan [all | ipaddress


ipaddress]

configure virtual-network vn_name monitor [on |off ]

show virtual-network {vn_name | remote-endpoint remote-endpoint vxlan


{ipaddress ipaddress} {vr vr_name}} statistics {no-refresh}

ExtremeXOS Release Notes for version 21.1.5 15


Overview

clear counters virtual-network [all | vn_name]

Changed CLI Commands


Changes are underlined.

[create | delete] fdb [mac_addr vlan vlan_name [ports port_list |


blackhole |vxlan {vr vr_name } {ipaddress} remote_ipaddress ] |
broadcast vlan vlan_name vxlan { vr vr_name } {ipaddress}
remote_ipaddress |unknown-multicast vlan vlan_name vxlan {vr vr_name }
{ipaddress} remote_ipaddress |unknown-unicast vlan vlan_name vxlan {vr
vr_name } {ipaddress} remote_ipaddress]

show fdb { {mac_addr | blackhole |permanent | {vlan} vlan_name |ports


port_list} {netlogin [all |mac-based-vlans]} | {vpls} {vpls_name} |
openflow |rbridge {nickname} |vxlan {vni } |virtual-network vn_name}

create vlan vlan-name {vr vr-name} {description vlan-desc} {tag [tag |


none ]}

configure {vlan} vlan-name {tag [tag {remote-mirroring} |none] }

configure {vlan} vlan_name add ports [port_list | all] {tagged {tag {-


end_tag}} |untagged | private-vlan translated}

configure {vlan} vlan_name delete ports [port_list | all] {tagged {tag}


{- end_tag}}

Open Shortest Path First (OSPF) Exchanging Information for Virtual Extensible LAN (VXLANs)
ExtremeXOS leverages Open Shortest Path First (OSPF) to advertise and learn VTEPs dynamically in a
VXLAN network. OSPFv2 advertises the triplet of VNI/Endpoint IP Address/Advertising Router ID
through OSPFv2 domain using type 11 opaque link state advertisements (LSAs). The OSPFv2 VXLAN
LSA link state ID uses opaque type 128. The remaining 24 bits of the field are set to the VXLAN VNI.
Each locally configured VNI corresponds to a single opaque LSA advertised by the router. The OSPFv2
VXLAN LSA payload contains one top level TLV that specifies the locally configured IPv4 endpoint
address on the advertising router.

Note
• The remote endpoints learned using OSPF are not saved to the configuration.
• The OSPFv2 VXLAN opaque LSA is only advertised if OSPF VXLAN extensions are
enabled.
• OSPF VXLAN extensions can only be enabled when OSPFv2 is disabled.
• Local endpoint address can only be IPv4. IPv6 is not supported.

Supported Platforms

Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.

ExtremeXOS Release Notes for version 21.1.5 16


Overview

New CLI Commands


enable ospf vxlan-extensions

disable ospf vxlan-extensions

Changed CLI Commands

The show ospf command output has been changed (shown in bold):

show ospf

OSPF : Enabled MPLS LSP as Next-Hop: No


RouterId : 192.168.170.60 RouterId Selection : Automatic
ASBR : No ABR : No
ExtLSA : 0 ExtLSAChecksum : 0x0
OriginateNewLSA : 190 ReceivedNewLSA : 102
SpfHoldTime : 3 Lsa Batch Interval : 30s
CapabilityOpaqueLSA : Enabled
10M Cost : 10 100M Cost : 5
1000M Cost (1G) : 4 10000M Cost (10G) : 2
40000M Cost (40G) : 2
100000M Cost (100G) : 1
Router Alert : Disabled Import Policy File :
ASExternal LSALimit : Disabled Timeout (Count) : Disabled (0)
Originate Default : Disabled
SNMP Traps : Disabled
VXLAN Extensions : Enabled
Redistribute:
Protocol Status cost Type Tag Policy
direct Disabled 0 0 0 None
static Disabled 0 0 0 None
rip Disabled 0 0 0 None
e-bgp Disabled 0 0 0 None
i-bgp Disabled 0 0 0 None
isis-level-1 Disabled 0 0 0 None
isis-level-2 Disabled 0 0 0 None
isis-level-1-external Disabled 0 0 0 None
isis-level-2-external Disabled 0 0 0 None

ONEPolicy Now Supported on New ExtremeSwitching X440-G2 and X620


Series Switches
ONEPolicy, which was released in ExtremexXOS 16.1, allows you create profiles for securing and
provisioning network resources based upon the role the user or device plays within the enterprise. By
first defining the user or device role, network resources can be tailored to a specific user, system,
service, or port-based context by configuring and assigning rules to the policy role. A policy role can be
configured for any combination of Class of Service, VLAN assignment, classification rule precedence, or
default behavior based upon L2, L3, and L4 packet fields. Hybrid authentication allows either policy or
dynamic VLAN assignment, or both, to be applied through RADIUS authorization.

This feature is now supported on the new ExtremeSwitching X440-G2 and X620 series switches.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

ExtremeXOS Release Notes for version 21.1.5 17


Overview

Limitations
• When stacking switches that have different capacities, the stack goes to the lowest common level of
capacities and functionality when possible. If the stack already has an existing configuration that
exceeds the new lower capacity, policy disallows the ports on the new switch to become policy-
enabled.
• Only 'macdest', 'macsource', or 'port' policy rules can be applied to QinQ (that is, double-tagged)
packets received on an untagged VMAN port.

Cisco Discovery Protocol (CDPv2)


Support for Cisco Discovery Protocol (CDPv1) was added in ExtremeXOS 15.4.This update to the feature
adds support for Cisco Discovery Protocol (CDPv2). CDPv2 is a proprietary protocol designed by Cisco
to help administrators collect information about nearby, and directly connected, devices. Support of
listening, lifting, processing, and periodic transmitting of the CDPv1/v2 control packets on a per-port
basis is implemented in this release.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• SNMP is not supported.

Changed CLI Commands


Changes are underlined.

configure cdp voip-vlan [vlan_name | vlan_id | dot1p | untagged | none]


ports [port_list | all]

configure cdp trust-extend [untrusted | trusted] ports [port_list | all]

configure cdp cos-extend cos_value ports [port_list | all]

show cdp ports {port_list} {configuration}

configure cdp power-available [advertise | no-advertise] ports


[port_list | all]

The output of the following show commands is changed (shown in bold):


X460-48t.1 # show cdp
CDP Transmit time : 60 seconds
CDP Hold time : 180 seconds
CDP Device ID : 00:04:96:8B:C2:CA
CDP Enabled ports : 1-2, 7
Power Available TLV Enabled ports: 1-2,23

X460-48t.23 # show cdp ports


Neighbor Information
--------------------
Port Device-Id Hold time Remote CDP Port ID
Version
---- --------- --------- ---------- --------------------

ExtremeXOS Release Notes for version 21.1.5 18


Overview

1 Eni-Extreme-x440-sw> 149 Version-1 Slot: 1, Port: 1


2 00:04:96:8B:9D:B0 160 Version-2 Slot: 1, Port: 2
7 00:04:96:8B:C1:ED 138 Version-2 Slot: 1, Port: 7
> indicates that the value was truncated to the column size in the output.
Use the "show cdp neighbor detail" command to see the complete value.

X460-48t.3 # show cdp neighbor


Device Id Local Hold Capability Platform Port Id
Interface Time
--------------------------------------------------------------------------------
Eni-Extreme-x440-sw> 1 150 T X440-24t-10G Slot: 1, P>
00:04:96:8B:9D:B0 2 171 T X440-48t Slot: 1, P>
00:04:96:8B:C1:ED 7 134 T X460-48t Slot: 1, P>
---------------------------------------------------------------------------------
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge,
S - Switch, H - Host, I - IGMP, r - Repeater
> indicates that the value was truncated to the column size in the output.
Use the "detail" option to see the complete value.

X460-48t.7 # show cdp neighbor detail


---------------------------------------------------------------------------
Device ID : Eni-Extreme-x440-switch-1
Port ID (outgoing port) : Slot: 1, Port: 1
Advertisement Version : 2
IP Addresses : 10.10.10.2
Platform : X440-24t-10G
Interface : 1
Holdtime : 173

Version :
ExtremeXOS version 15.7.0.22 fixes_v1570b9 by kosharma
on Tue Feb 24 11:53:33 IST 2015

Native VLAN : 1
Duplex : Full
SysName : X440-24t-10G
Location : Chennai
Power Request Id : 24333
Power Management Id : 2
Power Drawn : 1500 mW
Power Consumed : 3454 mW

X460-48t.11 # show cdp ports configuration


Local Port Information
----------------------
Port Trust COS Voice-VLAN
---- ---------- ---- --------------------
1 Trusted 0 none
2 Untrusted 4 none
7 Untrusted 0 Default

Virtual Router Redundancy Protocol (VRRP) Fabric Routing


Virtual Router Redundancy Protocol (VRRP) has one master router that does L3 routing and one or
more backup routers that perform L2 forwarding of packets toward the master router, as per VRRP RFC
specification. With this method, L3 routing capability of backup router goes unused. This also causes
loss of bandwidth in the links that connect master and backup routers. This issue is present in any
topology where host traffic is flowing using the backup routers. With multiple backup routers, traffic
from hosts attached to some backup routers have to traverse multiple links to reach the master router.
This causes loss of bandwidth in multiple links toward the master.

ExtremeXOS Release Notes for version 21.1.5 19


Overview

This feature allows backup routers to take part in L3 routing for the packets it receives with the
destination address equal to VMAC. Backup routers enabled with this feature are called Fabric Routing
Enabled Backup (FREB) routers. This feature allows
• Load sharing of traffic between VRRP routers
• Saves bandwidth on the links connecting master and backup routers
This solution is applicable for all topologies, such as MLAG, EAPS, or STP.

Platform
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• Fabric Routing feature will not be supported for VRRP VR for which Virtual IP is same as interface IP
(owned IP).
• Traffic sent from host destined for VIP, will be L3 forwarded by FREB router if FREB router sits in
between, even though both are in same subnet. VIP cannot be used to run protocols between host
and VRRP router which will expect TTL value not be decremented, for example BFD.
• PVLAN configuration is not supported in this release.
• VLAN Aggregation configuration is not supported in this release.

New CLI Commands


configure vrrp {vlan vlan_name vr vr_id | all} fabric-route-mode [on |
off]

Virtual Router Redundancy Protocol (VRRP) Host Mobility


The Virtual Router Redundancy Protocol (VRRP) Host mobility feature solves the Asymmetric routing
problem associated with VRRP where the path to return to an end host may be different and longer
than necessary. This feature uses host-routes to indicate where in the network an end host resides.
Using other routing protocols such as OSPF, other routers then pick the shortest path back to the end
host when multiple paths are available using Equal Cost Multi Path (ECMP) route entries.

Platform
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• Bound to FDB’s ARP limitations
• Bound to Route Manager’s entry limitations

Changed CLI Commands


Changes are underlined.

configure vrrp {vlan} vlan_name vrid vridval host-mobility [{on | off}


{exclude-ports [add | delete] port_list}]

configure iproute {ipv4} priority [static | blackhole | rip | bootp |


icmp | ospf-intra | ospf-inter | ospf-as-external| ospf-extern1 | ospf-

ExtremeXOS Release Notes for version 21.1.5 20


Overview

extern2 | ebgp | ibgp | mpls | isis | isis-level-1 | isis-level-2 |


isis-level-1-external | isis-level-2-external | host-mobility] priority
{vr vrname}

unconfigure iproute {ipv4} priority [static | blackhole | rip | bootp |


icmp | ospf-intra | ospf-inter | ospf-as-external | ospf-extern1 | ospf-
extern2 | ebgp | ibgp | mpls | isis | isis-level-1 | isis-level-2 |
isis-level-1-external | isis-level-2-external | host-mobility | all ]
{vr vrname}

configure iproute ipv6 priority [static | blackhole | ripng | icmp |


ospfv3-intra | ospfv3-inter | ospfv3-as-external| ospfv3-extern1 |
ospfv3-extern2 | isis | isis-level-1 | isis-level-2 | isis-level-1-
external | isis-level-2-external | host-mobility] priority {vr vrname}

unconfigure iproute ipv6 priority [static | blackhole | ripng | icmp |


ospfv3-intra | ospfv3-inter | ospfv3-as-external | ospfv3-extern1 |
ospfv3-extern2 | isis | isis-level-1 | isis-level-2 | isis-level-1-
external| isis-level-2-external | host-mobility | all ] {vr vrname}

The existing enable ospf export, disable ospf export, and configure ospf export
commands are expanded to allow a new route type of "host-mobility". Configuring host-mobility to be
exported causes OSPF to redistribute host-mobility routes.

The existing enable ospfv3 export and disable ospfv3 commands are expanded to allow a
new route type of "host-mobility". Configuring host-mobility to be exported causes OSPFv3 to
redistribute host-mobility routes.

The output of the following show commands is changed (shown in bold):


# show vrrp detail
VLAN: vlan23 VRID: 1 VRRP: Disabled State: INIT
Virtual Router: VR-Default
Priority: 100(backup) Advertisement Interval: 1 sec
Version: v3-v2 Preempt: Yes Preempt Delay: 0 sec
Virtual IP Addresses:
Accept mode: Off
Host-Mobility: On
Host-Mobility Exclude-Ports: 1, 10
Checksum: Include pseudo-header
Tracking mode: ALL
Tracked Pings: -
Tracked IP Routes: -
Tracked VLANs: -
Fabric Routing: Off

# show ospf
OSPF : Disabled MPLS LSP as Next-Hop: No
RouterId : 0.0.0.0 RouterId Selection : Automatic
ASBR : No ABR : No
ExtLSA : 0 ExtLSAChecksum : 0x0
OriginateNewLSA : 0 ReceivedNewLSA : 0
SpfHoldTime : 3 Lsa Batch Interval : 30s
CapabilityOpaqueLSA : Enabled
10M Cost : 10 100M Cost : 5
1000M Cost (1G) : 4 10000M Cost (10G) : 2
40000M Cost (40G) : 2

ExtremeXOS Release Notes for version 21.1.5 21


Overview

100000M Cost (100G) : 1


Router Alert : Disabled Import Policy File :
ASExternal LSALimit : Disabled Timeout (Count) : Disabled (0)
Originate Default : Disabled
SNMP Traps : Disabled
VXLAN Extensions : Disabled
Redistribute:
Protocol Status cost Type Tag Policy
direct Disabled 0 0 0 None
static Disabled 0 0 0 None
rip Disabled 0 0 0 None
e-bgp Disabled 0 0 0 None
i-bgp Disabled 0 0 0 None
isis-level-1 Disabled 0 0 0 None
isis-level-2 Disabled 0 0 0 None
isis-level-1-external Disabled 0 0 0 None
isis-level-2-external Disabled 0 0 0 None
host-mobility Enabled 0 2 0 None

# show ospfv3
OSPFv3 : Disabled RouterId : 0.0.0.0
RouterId Selection : Automatic ASBR : No
ABR : No ExtLSAs : 0
ExtLSAChecksum : 0x0 OriginateNewLSAs : 0
ReceivedNewLSAs : 0 SpfHoldTime : 3s
Num of Areas : 1 LSA Batch Interval : 0s
10M Cost : 100 100M Cost : 50
1000M Cost (1G) : 40 10000M Cost (10G) : 20
40000M Cost (40G) : 20 100000M Cost (100G) : 10
Graceful Restart : None Grace Period : 120s
Import Policy File : none
Redistribute:
Protocol Status Cost Type Tag Policy
direct Disabled 20 2 --- none
e-bgp Disabled 20 2 --- none
i-bgp Disabled 20 2 --- none
ripng Disabled 20 2 --- none
static Disabled 20 2 --- none
isis-level-1 Disabled 20 2 --- none
isis-level-2 Disabled 20 2 --- none
isis-level-1-external Disabled 20 2 --- none
isis-level-2-external Disabled 20 2 --- none
host-mobility Enabled 0 2 --- none

show iproute
Ori Destination Gateway Mtr Flags VLAN Duration
d 192.168.24.0/24 192.168.24.44 1 -------um---- vlan24 0d:4h:20m:48s
*hm 192.168.23.1/32 192.168.23.1 1 UGHD---u---f- vlan23 0d:0h:16m:5s

(mo) MOSPF (o) OSPF, (o1) OSPFExt1, (o2) OSPFExt2,


(oa) OSPFIntra, (oe) OSPFAsExt, (or) OSPFInter, (pd) PIM-DM, (ps) PIM-SM,
(r) RIP, (ra) RtAdvrt, (s) Static, (sv) SLB_VIP, (hm) Host-mobility, (un) UnKnown,
(*) Preferred unicast route (@) Preferred multicast route,
(#) Preferred unicast and multicast route.

Flags: (b) BFD protection requested, (B) BlackHole, (c) Compressed, (D) Dynamic,
(f) Provided to FIB, (G) Gateway, (H) Host Route, (l) Calculated LDP LSP,
(L) Matching LDP LSP, (m) Multicast, (p) BFD protection active, (P) LPM-routing,
(R) Modified, (s) Static LSP, (S) Static, (t) Calculated RSVP-TE LSP,
(T) Matching RSVP-TE LSP, (u) Unicast, (U) Up, (3) L3VPN Route.

MPLS Label: (S) Bottom of Label Stack


Mask distribution:
1 routes at length 24

ExtremeXOS Release Notes for version 21.1.5 22


Overview

Route Origin distribution:


1 routes from Direct

Total number of routes = 1


Total number of compressed routes = 0

# show iproute ipv6


Ori Destination Mtr Flags Duration
Gateway Interface
*hm 2000::/128 1 UGHD---u---f- 0d:0h:0m:7s
2000::2 vlan23
#d 2000::/64 1 U------um--f- 0d:20h:19m:46s
2000::1 vlan23
#d fe80::%vlan23/64 1 U------um--f- 0d:20h:19m:46s
fe80::204:96ff:fe51:f96d vlan23

Origin(Ori):(b) BlackHole, (be) EBGP, (bg) BGP, (bi) IBGP, (bo) BOOTP,
(ct) CBT, (d) Direct, (df) DownIF, (dv) DVMRP, (e1) ISISL1Ext,
(e2) ISISL2Ext, (h) Hardcoded, (i) ICMP, (i1) ISISL1 (i2) ISISL2,
(is) ISIS, (mb) MBGP, (mbe) MBGPExt, (mbi) MBGPInter, (ma) MPLSIntra,
(mr) MPLSInter, (mo) MOSPF (o) OSPFv3, (o1) OSPFv3Ext1, (o2) OSPFv3Ext2,
(oa) OSPFv3Intra, (oe) OSPFv3AsExt, (or) OSPFv3Inter, (pd) PIM-DM, (ps) PIM-
SM,
(r) RIPng, (ra) RtAdvrt, (s) Static, (sv) SLB_VIP, (hm) Host-mobility, (un)
UnKnown,
(*) Preferred unicast route (@) Preferred multicast route,
(#) Preferred unicast and multicast route.

Flags: (b) BFD protection requested, (B) BlackHole, (c) Compressed Route,
(D) Dynamic, (f) Provided to FIB, (G) Gateway, (H) Host Route,
(l) Calculated LDP LSP, (L) Matching LDP LSP, (m) Multicast,
(p) BFD protection active, (P) LPM-routing, (R) Modified, (s) Static LSP,
(S) Static, (t) Calculated RSVP-TE LSP, (T) Matching RSVP-TE LSP,
(u) Unicast, (U) Up, (3) L3VPN Route.

Mask distribution:
2 routes at length 64

Route Origin distribution:


2 routes from Direct

Total number of routes = 3


Total number of compressed routes = 0

# show iproute priority


Direct 10
MPLS 20
Blackhole 50

Static 1100
HostMobility 1150
ICMP 1200
EBGP 1700
IBGP 1900
OSPFIntra 2200
OSPFInter 2300
Isis 2350
IsisL1 2360
IsisL2 2370
RIP 2400
OSPFAsExt 3100
OSPFExt1 3200
OSPFExt2 3300

ExtremeXOS Release Notes for version 21.1.5 23


Overview

IsisL1Ext 3400
IsisL2Ext 3500
Bootp 5000

# show iproute ipv6 priority


Direct 10
Blackhole 50

Static 1100
HostMobility 1150
ICMP 1200
EBGP 1700
IBGP 1900
OSPFv3Intra 2200
OSPFv3Inter 2300
Isis 2350
IsisL1 2360
IsisL2 2370
RIPng 2400
OSPFv3AsExt 3100
OSPFv3Ext1 3200
OSPFv3Ext2 3300
IsisL1Ext 3400

Internet Protocol Flow Information Export (IPFIX) Mirroring Enhancement


This feature enhances the mirroring capabilities in ExtremeXOS by adding IPFIX flow traffic support, in
addition to the previously supported port and VLAN traffic. With the ability to mirror IPFIX flow traffic,
you can leverage the combined capabilities of Internet Protocol Flow Information Export (IPFIX) and
Purview to provide additional information about flows. IPFIX can detect flows and collect flow statistics,
but it cannot do deep packet payload inspections. Purview, however, can do deep packet inspection
beyond Layer 4, if it is provided with a copy of the packet payload. This feature mirrors the first 15
packets of any IPFIX flow to a port where Purview is able to receive the packets for deep packet
inspection.

Supported Platforms
Summit X460-G2 series switches

Changed CLI Commands


Changes are underlined.

configure mirror {mirror_name | mirror_name_li} add | delete [vlan name


{ingress | port port {ingress} } |ip-fix | port port {vlan name
{ingress} | ingress | egress | ingress-and-egress | anomaly}]

The output of the following show command is changed (shown in bold):


# show mirror

DefaultMirror (Disabled)
Description: Default Mirror Instance, created automatically
Mirror to port: -

MyMirror (Disabled)
Description:
Mirror to port: 2:1

ExtremeXOS Release Notes for version 21.1.5 24


Overview

Source filters configured :


Ports 2:2-3, all vlans, ingress and egress
Port 2:5, ip-fix

Border Gateway Protocol (BGP) Data Center Enhancements


The following Border Gateway Protocol (BGP) data center enhancements are now available:
• Sixty-four equal cost (ECMP) paths for BGP (previously eight).
• Support for maximum autonomous system path (AS-path) length filtering of BGP route updates.
• IPv4 peering sessions can carry IPv6 routes, and IPv6 peering sessions can carry IPv4 routes for the
Unicast and Multicast sub-address families.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• Support for maximum AS-Path length is on a BGP instance basis, not per peer.
• Enabling the capability to carry IPv6 Network Layer Reachability Information (NLRI) over IPv4
peering sessions and IPv4 NLRI over IPv6 sessions does not include the ability to have mismatching
next-hops. You must use outbound route-policy to specify the BGP next-hop value to be a reachable
subnet for the remote router or the remote router must have a means to reach the next-hop. For
IPv6 NLRI carried over IPv4 peering sessions, in the absence of route policy to set the next-hop, the
next-hop is automatically set to the mapped IPv6 address based on the IPv4 address of the
outgoing interface. You should either override this with policy or program the downstream router
with a static route to reach the mapped address. In either case, it is assumed the VLAN interface
used for peering is configured with both IPv4 and IPv6 addresses.
• The ability to carry mismatching NLRI applies to the Unicast, Multicast, and VPNv4 Sub-Address-
Families (SAFIs). The VPNv6 SAFI is not supported.

New CLI Commands


configure bgp maximum-as-path-length max-as-path

Changed CLI Commands


The following command now accepts 64 ECMP paths for max-paths:

configure bgp maximum-paths max-paths

The following commands now allows you to enable the capability to carry NLRI of address family
indicator (AFI)/SAFI combinations even if the specified AFI does not match the address family of the
peering sessions:

enable bgp neighbor ipv4 capability ipv6-unicast

enable bgp neighbor ipv6 capability ipv4-unicast

ExtremeXOS Release Notes for version 21.1.5 25


Overview

Bidirectional Forwarding Detection (BFD) for the Border Gateway Protocol


(BGP)
Bidirectional Forwarding Detection (BFD) protection of Border Gateway Protocol (BGP) peering
sessions allows for the rapid detection of link failures such that peering sessions can be taken out of the
"established" state within fractions of a second. This allows the protocol to select an alternate path (if
available) to a destination immediately after the link failure, rather than waiting until the BGP hold timer
expires (180 seconds by default). This feature applies to both IPv4 and IPv6 peering sessions. Both IPv6
global and link local peering sessions are supported.

Supported Platforms
Summit X460-G2, X670-G2, X770 series switches, with Core License or above.

Limitations
• The BFD setting can be applied on a per-peer basis, but the ability to set BFD on a peer-group or
address-family basis is not currently supported.
• The BGP peer must be in the disabled admin state to modify its BFD setting.
• While BFD can be enabled on any BGP peering session, protection is only provided for directly
connected EBGP peering sessions.

New CLI Commands


configure bgp {neighbor [all|remoteaddr]} {bfd [on | off]}

Changed CLI Commands


The show bgp neighbor command now shows BFD information (shown in bold):

show bgp neighbor 192.168.24.2


Peer Description :
EBGP Peer : 192.168.24.2 AS : 300
Enabled : Yes OperStatus : Up
Weight : 1 Shutdown-Priority : 1024
ConnectRetry : 120 MinAsOrig : 30
HoldTimeCfg : 180 KeepaliveCfg : 60
Source Interface : Not configured RRClient : No
EBGP-Multihop : No Remove Private AS : No
BFD : Off BFD Status : Inactive

Ethernet Ring Protection Switching (ERPS) Management Information Base


(MIB) Support
Managed objects for Ethernet Ring Protection Switching (ERPS) Management Information Base (MIB)
are defined in ExtremeXOS 21.1. ExtremeXOS 21.1 implements:
• extremeErpsProtectedVlanTable—contains the grouping of set of protected VLANs
• extremeErpsRingTable—each entry in extremeErpsRingTable has information about one ring in the
switch
• extremeErpsStatsTable—contains statistics information for each of the rings present in the switch
• extremeErpsGlobalInfo—contains the information of ERPS configured globally in the switch
• extremeErpsNotification—contains two types of traps, extremeErpsStateChangeTrap and
extremeErpsFailureTrap

ExtremeXOS Release Notes for version 21.1.5 26


Overview

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
Groups and tables are implemented as read only.

ExtremeCFM Management Information Base (MIB)


This feature introduces the proprietary ExtremeCFM Management Information Base (MIB) that provides
information about the Connectivity Fault Management (CFM) Group. This is an extension to IEEE8021-
CFM-MIB.

The following objects are defined in the CFM Group MIB module:
• extremeCfmNotifications
• extremeCfmMibObjects
• extremeCfmMibConformance
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Link Aggregation Control Protocol (LACP) Fallback Option


Preboot Execution Environment (PXE) is an industry standard client/server environment that allows
workstations to boot from the server before their full operating system is up and running. PXE images
are too small to take advantage of Link Aggregation Control Protocol (LACP) functionality, and
therefore it is up to the administrator to statically configure the switch for correct connectivity. This also
means that after the full operating system is up and running, the switch needs to be reconfigured for
LACP. The LACP Fallback option automates this process.

The LACP Fallback feature lets you select a single port that is automatically added to the aggregator if
LACP data units (LACPDUs) do not appear on any of the member ports within the specified period of
time. If LACPDUs are exchanged before this timeout expires, an aggregator is formed using traditional
means. If LACPDUs are not received, an active port with the lowest priority value is automatically added
to the aggregator (enters fallback state). If ports have the same priority value, the lowest port number
on the lowest slot number is chosen.

The selected port stays in the fallback state until fallback is disabled or until LACPDUs are received on
any of the member ports, at which point the old aggregator is removed and a new one is selected
based on information propagated in the LACPDUs. The new fallback port may also be re-elected if the
existing fallback port changes its state (for example, port priority change, link bounce, port disable/
enable, etc.).

The LACP fallback option configuration consists of:


• Selecting a fallback port by setting its LACP port priority (optional)
• Configuring the fallback timeout (optional)
• Enabling fallback (mandatory)

ExtremeXOS Release Notes for version 21.1.5 27


Overview

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
When using LACP fallback with MLAG, fallback port is selected only on the LACP master.

New CLI Commands


configure sharing port lacp fallback [enable | disable]

Changed CLI Commands


The show lacp lag group-id detail command now shows fallback information (shown in
bold):
# show lacp lag 17 detail

Lag Actor Actor Partner Partner Partner Agg Actor


Sys-Pri Key MAC Sys-Pri Key Count MAC
--------------------------------------------------------------------------------
17 0 0x03f9 00:00:00:00:00:00 0 0x0000 1 00:04:96:6d:55:13

Enabled : Yes
LAG State : Up
Unack count : 0
Wait-for-count : 0
Current timeout : Long
Activity mode : Active
Defaulted Action : Delete
Fallback : Enabled
Fallback timeout : 40 seconds
Receive state : Enabled
Transmit state : Enabled
Minimum active : 1
Selected count : 1
Standby count : 0
LAG Id flag : Yes
S.pri:0 , S.id:00:04:96:6d:55:13, K:0x03f9
T.pri:0 , T.id:00:00:00:00:00:00, L:0x0000

Port list:

Member Port Rx Sel Mux Actor Partner


Port Priority State Logic State Flags Port
--------------------------------------------------------------------------------
17 10 Initialize Unselected Detached A-G----- 0
18 5 Initialize Fallback Collect-Dist A-GSCD-- 1018
19 5 Idle Unselected Detached -------- 0
========================================================================
Actor Flags: A-Activity, T-Timeout, G-Aggregation, S-Synchronization
C-Collecting, D-Distributing, F-Defaulted, E-Expired

The show lacp member-port port detail command now shows fallback information (shown
in bold):
# show lacp member-port 18 detail

Member Port Rx Sel Mux Actor Partner


Port Priority State Logic State Flags Port
--------------------------------------------------------------------------------

ExtremeXOS Release Notes for version 21.1.5 28


Overview

18 5 Initialize Fallback Collect-Dist A-GSCD-- 1018


Up : Yes
Enabled : Yes
Link State : Up
Actor Churn : False
Partner Churn : True
Ready_N : Yes
Wait pending : No
Ack pending : No
LAG Id:
S.pri:0 , S.id:00:04:96:6d:55:13, K:0x03f9, P.pri:65535, P.num:1018
T.pri:0 , T.id:00:00:00:00:00:00, L:0x0000, Q.pri:65535, Q.num:1018
Stats:
Rx - Accepted : 0
Rx - Dropped due to error in verifying PDU : 0
Rx - Dropped due to LACP not being up on this port : 0
Rx - Dropped due to matching own MAC : 0

Tx - Sent successfully : 1162


Tx - Transmit error : 0
=======================================================================
Actor Flags: A-Activity, T-Timeout, G-Aggregation, S-Synchronization
C-Collecting, D-Distributing, F-Defaulted, E-Expired

Hardware Assisted Bidirectional Forwarding Detection (BFD)


The hardware assisted Bidirectional Forwarding Detection (BFD) feature expands on the existing
ExtremeXOS BFD capabilities.

Bidirectional Forwarding Detection (BFD) hardware assist support provides the functionality to run a
BFD session in hardware. Effective failure detection requires BFD to run at high frequencies (using
aggressive timers as low as 3 ms), which is not possible in the software mode because of CPU and
ExtremeXOS restrictions.

To make BFD sessions run in the hardware, the following configuration is required.
• Unused front panel port (not available for switching the user data traffic) configured as a loopback
port. The port is used internally by the BFD hardware to send control packets.
• IPforwarding is enabled on the BFD interfaces.
• Nexthop MAC address of neighbor should be known for the session creation. BFD process triggers
ARP to resolve the next hop MAC address, if not configured statically.

Supported Platforms
• Summit X460-G2 series switches, standalone only

New CLI Commands


configure bfd hardware-assist [primary | secondary] loopback-port [port
|none]

Changed CLI Commands


The following show commands are changed to show the hardware assist information (shown in bold):
#show bfd
Number of sessions : 0
Sessions in Init State : 0

ExtremeXOS Release Notes for version 21.1.5 29


Overview

Sessions in Down State : 0


Sessions in Admin Down State : 0
Sessions in Up State : 0

SNMP Traps for session-down : Disabled


SNMP Traps for session-up : Disabled
SNMP Traps for Batch Delay : 1000 ms
Hardware Assist Operational State : Disabled(Loopback port not configured)
Hardware Assist Primary Loopback Port : 1
Hardware Assist Secondary Loopback Port : None
Maximum # of Hardware Assist Sessions : 900

# show bfd session detail vr all


Neighbour : 10.10.10.1 Local : 10.10.10.2
Vr-Name : bfd_vr10 Interface : bfd_vlan10
Session Type : Single Hop State : Up

Up Count : 1
Last Valid Packet Rx : 00:51:49.300000
Last Packet Tx : 00:51:48.8200000
Hardware Assist : Yes

Neighbour : 10.10.11.1 Local : 10.10.11.2


Vr-Name : bfd_vr10 Interface : bfd_vlan11
Session Type : Single Hop State : Up

Up Count : 1
Last Valid Packet Rx : 00:51:49.300000
Last Packet Tx : 00:51:48.8200000
Hardware Assist : Yes

OpenSSL Federal Information Processing Standards (FIPS) Object Module


v2.0
The feature adds Federal Information Processing Standards (FIPS) compliance Object Module v2.0 (an
open source library named openssl-fips-ecp-2.0.9).

OpenSSL is a software library used in applications to secure communications against eavesdropping or


to ascertain the identity of the party at the other end. This feature does not validate the OpenSSL
module itself, but instead implements a new software component called the OpenSSL FIPS Object
Module.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

New CLI Commands


configure security fips-mode [on | off]

show security fips-mode

CE2.0 Certification Additions


This features adds CE2.0 (previously known as MEF) certification. This certification involves the
following changes:

ExtremeXOS Release Notes for version 21.1.5 30


Overview

• Removal of the preamble and interframe gap (IFG) overhead for the rate policing and shaping
functions
• Support for meter out-of-profile action for setting a specified 802.1p value
• Support for ACL match criteria “ccos” for matching customer 802.1p on UNI or NNI ports

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

New CLI Commands


configure forwarding rate-limitoverhead-bytes overhead_bytes

Changed CLI Commands


Changes are underlined.

configure metermetername [{committed-rate circommitted-rate-unit {max-


burst-size burst-size [Kb | Mb | Gb | packets]}] {out-actions [{disable-
port} {drop | set-drop-precedence {dscp [dscp-value | none]} {dot1p
[dot1p-value | none]}} {log} {trap}]} {ports [port_group | port_list]}

The output of the show forwarding configuration command now shows rate limit information
(shown in bold):
# show forwarding configuration
L2 and L3 Forwarding table hash algorithm:
Configured hash algorithm: crc32
Current hash algorithm: crc32
L3 Dual-Hash configuration: (Applies to "c", "xl"-series and 8900-40GX-xm)
Configured setting: on
Current setting: on
Dual-Hash Recursion Level: 1
Hash criteria for IP unicast traffic for L2 load sharing and ECMP route sharing
Sharing criteria: L3_L4
IP multicast:
Group Table Compression: on
Local Network Forwarding: slow-path
Lookup-Key: (SourceIP, GroupIP, VlanId)
External lookup tables:
Configured Setting: l2-and-l3
Current Setting: l2-and-l3
Switch Settings:
Switching mode: store-and-forward
L2 Protocol:
Fast convergence: on

Rate Limit:
Overhead Bytes: 20
Fabric Flow Control:
Fabric Flow Control: auto

Link Aggregation Group (LAG) Support for Audio Video Bridging (AVB)
This feature completes the capability to use Link Aggregation Group (LAG) ports with Audio Video
Bridging (AVB) by adding support for LAG ports with Multiple Stream Reservation Protocol (MSRP).

ExtremeXOS Release Notes for version 21.1.5 31


Overview

This feature adds two modes for how MSRP calculates the available bandwidth of a LAG for use in
making stream reservations:
• Single-port mode simply provides link redundancy and the LAG effective bandwidth is the same as
the bandwidth of a single member port.
• Cumulative mode allows bandwidth aggregation and the LAG effective bandwidth is set to a
configurable percent of aggregate bandwidth of the member ports in the LAG. This feature also
adds generalized Precision Time Protocol (gPTP) configuration support at the LAG level. Only the
LAG master port need be specified when making gPTP configurations. However, the protocol is still
running on each member port at the physical port level.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Changed CLI Commands


show msrp ports {port_list} detail

For the preceding command, with LAG support, the port speed is replaced with “effective speed”. For
physical ports, the effective speed is equivalent to the port speed (shown in bold).
Port Enabled Oper Effectv Dplx Jumbo Jumbo Cls Bndry State Sr-Pvid
Speed Size App/Reg
---- ------- ------ ------ ---- ----- ----- --- ----- ------- -------
*2g Y Up 150 M Full N 9216 A N QA/IN 2
B N QA/IN 2
*48 Y Up 1000 M Full N 9216 A N QA/IN 2
B N QA/IN 2

With the detail option, and if the port is a LAG, additional information appears:

Load sharing ports:


Port Port BW Mode Percentage
Speed
---- ------ ----------- ----------
*2g 200 M Cumulative 40%

Event Management System (EMS) IPv6 Syslog Server Support


This feature adds support for the Event Management System (EMS) to send log messages to Syslog
servers having IPv6 addresses.

The Event Management System supports the logging of event occurrences to external Syslog server
targets. Each Syslog server target is identified by its IP address, UDP port, VRID, and local use facility
(for example: “local0” through “local7”). Previously, the IP address of a Syslog server target was limited
to the IPv4 address family; but with this feature it can be of the IPv6 address family.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Changed CLI Commands


The existing EMS (“log”) commands relevant to Syslog server targets now support IPv6 server (and
source, as applicable) addresses:

ExtremeXOS Release Notes for version 21.1.5 32


Overview

configure syslog add [ipaddress {udp-port udp_port} |ipPort] {vr


vr_name} [local0...local7]

configure syslog delete [all | ipaddress {udp-port udp_port} |ipPort]


{vr vr_name}{local0...local7}

configure log target syslog [all | ipaddress {udp-port udp_port} |


ipPort] {vr vr_name} {local} from source-ip-address

[enable|disable] log target [ . . . | syslog [[all | ipaddress {udp-port


udp_port} | ipPort] {vr vr_name} {local}]]

configure log target syslog [ipaddress {udp-port udp_port} | ipPort] {vr


vr_name} [local] severity severity {only}

configure syslog [ipaddress {udp-port udp_port} | ipPort] {vr vr_name}


[local] severity severity {only}

configure log target [ . . . | syslog [all | ipaddress {udp-port


udp_port} | ipPort] {vr vr_name} {local}] match {any | regex}

configure log target syslog [all | ipaddress {udp-port udp_port} |


ipPort] {vr vr_name} {local} format

unconfigure log target [ . . . | syslog [all | ipaddress {udp-port


udp_port} | ipPort] {vr vr_name} {local} | . . . ] format

show log configuration {target { . . . | syslog {ipaddress {udp-port


udp_port} | ipPort} {vr vr_name} {local} } | filter {filter-name}}

MAC Authentication Delay


Currently, when both dot1x and MAC authentication method is enabled on a port, a new MAC address
detection triggers ExtremeXOS to send a RADIUS request to authenticate the new client on that port
using MAC-based authentication. This feature allows you delay/bypass the MAC authentication by
configuring a MAC authentication delay period on a per port basis. The MAC authentication delay
period’s default value is 0 seconds for backward compatibility, with a permissible range of 0 to 120
seconds.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Changed CLI Commands


Changes are underlined.

configure netlogin mac ports [port_list | all] timers [{reauth-period


[reauth_period]} {reauthentication [on | off]} {delay [delay]}]

The output of the show netlogin command now includes the authentication delay period value
(shown in bold):

ExtremeXOS Release Notes for version 21.1.5 33


Overview

NetLogin Authentication Mode : web-based DISABLED; 802.1x DISABLED; mac-based DISABLED


NetLogin VLAN : Not Configured
NetLogin move-fail-action : Deny
NetLogin Client Aging Time : 5 minutes
Dynamic VLAN Creation : Disabled
Dynamic VLAN Uplink Ports : None
Authentication Protocol Order: 802.1x, web-based, mac-based (default)
SNIPPED
------------------------------------------------
MAC Mode Global Configuration
------------------------------------------------
Re-authentication period : 0 (Re-authentication disabled)
Authentication Database : Radius, Local-User database
Authentication Delay Period : 0 (Default)
------------------------------------------------
Number of Clients Authenticated : 0

Configurable per Slot Link Aggregation Group (LAG) Member Port


Distribution
Previously, ExtremeXOS switches would always distribute to all active members in a link aggregation
group (LAG). This enhancement provides two options for specifying a subset of the active member
ports as eligible for distribution on a per slot basis: “local slot distribution” and “distribution port lists”.
The specific choice of configuration is described in the command line syntax as a “distribution-mode”.
The choice of distribution mode is configurable per LAG. You may dynamically switch between
distribution modes using the configure sharing distribution-mode command.

Local Slot Distribution


The “local-slot” distribution mode restricts distribution of unicast packets to the active LAG members
on the same slot where the packet was received. If no active LAG members are present on the slot
where the packet was received, all active LAG member ports are included in the distribution algorithm.

The “local-slot” distribution mode is useful for reducing the fabric bandwidth load of a switch. Reducing
fabric bandwidth may be especially important for a SummitStack, which has significantly less fabric
(inter-slot) bandwidth available in comparison to chassis switches. In many chassis or SummitStack
hardware configurations, the “local-slot” distribution mode may reduce the switching latency of some
flows distributed to a LAG.

Distribution Port Lists


The “port-lists” distribution mode configures one or more LAG member ports to be eligible for unicast
LAG distribution on each slot in a switch. If a slot does not have a distribution port list configured or if
none of the configured member ports is active in the LAG, all active member ports are eligible for
unicast distribution.

The use of the “port-lists” distribution mode should be taken into consideration when adding ports to a
LAG with the configure sharing command. Any newly added port on a LAG is not available for
unicast distribution unless it is also added to the distribution port list of at least one slot.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

ExtremeXOS Release Notes for version 21.1.5 34


Overview

Limitations
The distribution modes affect only the distribution of known unicast packets on a LAG. Non-unicast
packets are distributed among all active members of a LAG.

Changed CLI Commands


Changes are underlined.

enable sharing master_port grouping member_port_list {algorithm


[address-based {L2 | L3 | L3_L4 | custom} | port-based]} {distribution-
mode [all |local-slot |port-lists]} {lacp | health-check}

configure sharing master_port distribution-mode [all| local-slot |port-


lists]

configure sharing master_port slot slot distributionlist [port_list |add


port_list |delete [port_list] | all]]

The show sharing and show ports port_list sharing commands now display the
distribution mode for a LAG under the “Flag” column:

Distribution Mode Flags:

A - All: Distribute to all members

L - Local: Distribute to members local to ingress slot

P - Port Lists: Distribute to per-slot configurable subset of members

The show sharing and show ports port_list sharing commands now display the
configured distribution mode and distribution port lists for LAGs:

show {ports port_list} sharing {distribution configuration}

Config Distribution Distribution


Master Mode Lists
=================================================================
1:1 Port Lists Slot 1: 1:1-10, 1:15
Slot 5: 1:11-22
1:25 Local Slot Slot 1: 1:25
Slot 5: 1:26
5:1 Port Lists
5:10 All Slot 1: 5:11
Slot 5: 5:10

Port Customer VLAN ID (CVID) on Port-Based or Customer Edge Port (CEP)


VMAN Service
This feature introduces an optional port customer VLAN ID (CVID) parameter to the existing untagged
and CEP VMAN port configuration options. When present, any untagged packet received on the port is
double tagged with the configured port CVID and the SVID associated with the VMAN. If the port is
untagged, packets received with a single CID still have the SVID added. If the port is CEP, only untagged
and any specifically configured CVIDs are allowed. As double tagged ports are received from tagged
VMAN ports and forwarded to untagged VMAN ports, the SVID associated with the VMAN is stripped.

ExtremeXOS Release Notes for version 21.1.5 35


Overview

Additionally, the CVID associated with the configured port CVID is also stripped in the same operation.
If the port is CEP and CEP egress filtering in enabled, only the specified port CVID and CVIDs are
allowed to egress.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• Any limitations that currently exist with untagged VMAN ports also exist when the Port VLAN ID
element is additionally applied.
• VPLS service VMANs are not allowed to have port-cvid configurations.

Changed CLI Commands


Changes are underlined.

configure vman vman_name add ports [port_list | all] {tagged | untagged


{port-cvid port_cvid} | cep [cvid cvid_first { - cvid_last } {translate
cvid_first_xlate { - cvid_last_xlate } } |port-cvid port_cvid]}

configure vman vman_name ports [port_list |all]add [cvid cvid_first { -


cvid_last } {translate cvid_first_xlate { - cvid_last_xlate}} |port-cvid
port_cvid]

configure vman vman_name ports [port_list |all] delete [cvid cvid_first


{ - cvid_last } |port-cvid port_cvid]

configure vman vman_id add ports [port_list |all] {tagged | untagged


{port-cvid port_cvid} | cep [cvid cvid_first { - cvid_last } {translate
cvid_first_xlate { - cvid_last_xlate } } |port-cvid port_cvid]}

configure vman vman_id ports [port_list |all] add [cvid cvid_first { -


cvid_last } {translate cvid_first_xlate { - cvid_last_xlate}} |port-cvid
port_cvid]

configure vman [vman_id | vman_list]ports [port_list |all]delete [cvid


cvid_first { - cvid_last } |port-cvid port_cvid]

Resilient Hashing
Resilient Hashing is a hardware-based capability that minimizes the remapping of flows to aggregator
member ports during aggregator member changes.

In conventional hashing, physical links are used to form fat logical pipes. The static hash scheme
associates a flow with a physical link. When a link fails, even flows that did not originally flow through
the failed link may be assigned to a new link. This reassignment may temporarily result in out-of-order
packet deliver even for the flows that were not using the failed link. In contrast, a resilient hashing
scheme associates flows with physical ports. When a link fails, only the affected flows are redistributed
uniformly across the remaining good physical links. Flows using functioning links remain unaffected and
are not reassigned to new links.

ExtremeXOS Release Notes for version 21.1.5 36


Overview

Supported Platforms
Summit X770 and X670-G2, and on SummitStacks when at least one of the supported switches is
included in the stack.

On SummitStacks, configuration of resilient hashing is not allowed unless at least one node in the stack
supports resilient hashing. In a stack where one or more nodes support resilient hashing and one or
more nodes do not support resilient hashing, resilient hashing is only in effect for flows received on
ports on nodes where resilient hashing is supported by the hardware.

Limitations
• Resilient hashing is available only on LAGs configured to use the “custom” distribution algorithm.
• Resilient Hashing applies only to the distribution of known unicast traffic.
• Traffic originating or forwarded by the system CPU is not distributed using Resilient Hashing.

New CLI Commands


configure sharing master_port resilient-hashing [on | off]

Changed CLI Commands


Changes are underlined.

enable sharing master_port grouping member_port_list {algorithm


[address-based {L2 | L3 | L3_L4 | custom} | port-based]} {distribution-
mode [all | local-slot | port-lists]} {resilient-hashing [on | off]}
{lacp | health-check}

Graceful Restart and Not-So-Stubby Area (NSSA) Supported for Open


Shortest Path First (OSPFv3)
This feature upgrades Open Shortest Path First (OSPFv3) to support graceful restart and Not-So-
Stubby Area (NSSA):
• Graceful OSPFv3 Restart—RFC 5187 describes a way for OSPFv3 control functions to restart without
disrupting traffic forwarding. Without graceful restart, adjacent routers assume that information
previously received from the restarting router is stale and should not be used to forward traffic to
that router. However, in many cases, two conditions exist that allow the router restarting OSPFv3 to
continue to forward traffic correctly. The first condition is that forwarding can continue while the
control function is restarted. Most modern router system designs separate the forwarding function
from the control function so that traffic can still be forwarded independent of the state of the
OSPFv3 function. Routes learned through OSPFv3 remain in the routing table and packets continue
to be forwarded. The second condition required for graceful restart is that the network remain stable
during the restart period. If the network topology is not changing, the current routing table remains
correct. Often, networks can remain stable during the time for restarting OSPFv3.
• NSSA—NSSA is an extension of OSPFv3 stub area. External routes originating from an ASBR
connected to an NSSA can be advertised within the area and can be advertised to other areas as AS-
external LSAs.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

ExtremeXOS Release Notes for version 21.1.5 37


Overview

New CLI Commands


configure ospfv3 lsa-batch-interval seconds

configure ospfv3 area area-identifier nssa [nosummary | summary] stub-


defaultcost cost {translate}

configure ospfv3 restart [none | planned | unplanned | both]

configure ospfv3 restart grace-period seconds

configure ospfv3 [[vlan | tunnel] all | {vlan} vlan-name | {tunnel}


tunnel-name | area area-identifier] restart-helper [none | planned |
unplanned | both]

enable ospfv3 [[vlan | tunnel] all | {vlan} vlan-name | {tunnel} tunnel-


name | area area-identifier] restart-helper-lsa-check

disable ospfv3 [[vlan | tunnel] all | {vlan} vlan-name | {tunnel}


tunnel-name | area area-identifier] restart-helper-lsa-check

enable ospfv3 virtual-link {routerid} router-identifier {area} area-


identifier restart-helper-lsa-check

disable ospfv3 virtual-link {routerid} router-identifier {area} area-


identifier restart-helper-lsa-check

Changed CLI Commands


Changes are underlined.

configure ospfv3 area area_identifier add range ipv6netmask [advertise |


noadvertise] [inter-prefix | nssa]

configure ospfv3 area area-identifier delete range ipv6Netmask [inter-


prefix | nssa]

configure ospfv3 virtual-link {routerid} router-identifier {area} area-


identifier restart-helper [none | planned | unplanned | both]

The following show commands now display additional information (shown in bold):
show ospfv3

OSPFv3 : Enabled RouterId : 10.1.1.1


RouterId Selection : Configured ASBR : No
ABR : No ExtLSAs : 0
ExtLSAChecksum : 0x0 OriginateNewLSAs : 3
ReceivedNewLSAs : 0 SpfHoldTime : 10s
Num of Areas : 1 10M Cost : 100
100M Cost : 50 1000M Cost (1G) :
40
10000M Cost (10G) : 20 40000M Cost (40G) : 20
100000M Cost (100G) : 10
Num of Areas : 1 LSA Batch Interval : 30s
10M Cost : 100 100M Cost : 50
1000M Cost (1G) : 40 10000M Cost (10G) : 20

ExtremeXOS Release Notes for version 21.1.5 38


Overview

40000M Cost (40G) : 20 100000M Cost (100G) : 10


Router Alert : Disabled
ASExternal LSALimit : Disabled Timeout (Count) : Disabled (0)
Originate Default : Disabled
Graceful Restart : Both Grace Period : 120s
Restart Status : None
Last Restart Exit Reason: None
Import Policy File : none
Redistribute:
Protocol Status Cost Type Tag Policy
direct Disabled 20 2 --- none
e-bgp Disabled 20 2 --- none
i-bgp Disabled 20 2 --- none
ripng Disabled 20 2 --- none
static Disabled 20 2 --- none
isis-level-1 Disabled 20 2 --- none
isis-level-2 Disabled 20 2 --- none
isis-level-1-external Disabled 20 2 --- none
isis-level-2-external Disabled 20 2 --- none

show ospfv3 interfaces detail

Interface : v100 Enabled : ENABLED


Router : ENABLED AreaID : 0.0.0.0
RouterID : 10.1.1.2 Link Type : point-to-point
Passive : No Cost : 40/A
Priority : 1 Transit Delay : 1s
Hello Interval : 10s Rtr Dead Time : 40s
Retransmit Interval : 5s Wait Timer : 40s
Interface ID : 19 Instance ID : 0
State : P2P Number of state chg : 1
Hello due in : 7s Number of events : 2
Total Num of Nbrs : 1 Nbrs in FULL State : 1
Hellos Rxed : 127733 Hellos Txed : 127739
DB Description Rxed : 4 DB Description Txed : 3
LSA Request Rxed : 1 LSA Request Txed : 1
LSA Update Rxed : 2121 LSA Update Txed : 6156
LSA Ack Rxed : 5962 LSA Ack Txed : 2121
In Discards : 0
DR RtId : 0.0.0.0 BDR RtId : 0.0.0.0
Restart Helper : Both
Restart Helper Strict LSA Checking: Enabled
BFD Protection : Off

show ospfv3 area detail

Area Identifier : 1.0.0.0 Type : NORM


Router ID : 10.1.1.2 Num of Interfaces : 1
Spf Runs : 7 Num ABRs : 1
Num ASBRs : 0 Num DC-Bit LSAs : 0
Num Indication LSAs : 0 Num of DoNotAge LSAs: 0
Num LSAs : 8 LSA Chksum : 0x4d0f7
Num ASBRs : 1 Num LSAs : 2
Num Rtr LSAs : 1 Num Net LSAs : 0
Num Inter-pref LSAs : 0 Num Inter-rtr LSAs : 0
Num Intra-pref LSAs : 1 Num NSSA LSAs : 0
LSA Chksum : 0xbe09
Num of Nbrs : 1 Num of Virtual Nbrs : 1
Interfaces:
Interface Name Ospf State DR ID BDR ID
vlan101 E BDR 3.0.0.0 2.0.0.0
Inter-Area route Filter: none
External route Filter : none
Configured Address Ranges:

ExtremeXOS Release Notes for version 21.1.5 39


Overview

Area: 0.0.0.1 Addr: 3100::/64 Type: 3 Advt: Yes


Addr: 3100::/64 Type: inter-prefix Advt: Yes
Addr: 3200::/64 Type: nssa Advt: No

show ospfv3 area detail

Area Identifier : 2.0.0.0 Type : NSSA


Summary : Yes Default Metric : 10
Translate : Candidate (Elected)
Router ID : 10.1.4.1 Num of Interfaces : 1
Spf Runs : 14 Num ABRs : 1
Num ASBRs : 2 Num LSAs : 10
Num Rtr LSAs : 2 Num Net LSAs : 1
Num Inter-pref LSAs : 4 Num Inter-rtr LSAs : 0
Num Intra-pref LSAs : 1 Num NSSA LSAs : 2
LSA Chksum : 0x3b142
Num of Nbrs : 1 Num of Virtual Nbrs : 0
Interfaces:
Interface Name Ospf State DR ID BDR ID
vlan400 E BDR 0.0.0.4 0.0.0.3
Inter-Area route Filter: none
External route Filter : none

show ospfv3 lsdb area 0.0.0.2


Router LSA for Area 0.0.0.2
Link State ID ADV Router Seq# Age Checksum #Links
--------------------------------------------------------------------
0.0.0.0 0.0.0.3 0x80000004 835 0x9b19 1
0.0.0.0 0.0.0.4 0x80000004 837 0x8431 1

Network LSA for Area 0.0.0.2

Link State ID ADV Router Seq# Age Checksum


------------------------------------------------------------
0.15.66.70 0.0.0.4 0x80000003 837 0x423c

Inter Area Prefix LSA for Area 0.0.0.2

Link State ID ADV Router Seq# Age Checksum


-----------------------------------------------------------
0.0.0.2 0.0.0.3 0x80000003 829 0x734d
0.0.0.3 0.0.0.3 0x80000003 829 0x5521
0.0.0.4 0.0.0.3 0x80000003 829 0x543
0.0.0.5 0.0.0.3 0x80000003 808 0x4560

NSSA LSA for Area 0.0.0.2

Link State ID ADV Router Seq# Age Checksum MetricType


------------------------------------------------------------------------
0.0.0.2 0.0.0.3 0x80000003 839 0x728f type-1
0.0.0.8 0.0.0.4 0x80000003 898 0x5d7f type-1

Intra Area Prefix LSA for Area 0.0.0.2

Link State ID ADV Router Seq# Age Checksum #Prefix Reference


----------------------------------------------------------------------------------
0.1.0.0 0.0.0.4 0x80000005 838 0x6c9d 1 Network-LSA

show ospfv3 lsdb stats


Interface vlan100
------------------------
LSA Type Count
------------------------
Link 2

ExtremeXOS Release Notes for version 21.1.5 40


Overview

Unknown 0

Interface v1
------------------------
LSA Type Count
------------------------
Link 0
Unknown 0

Area ID 0.0.0.0
------------------------
LSA Type Count
------------------------
Router 3
Network 1
Inter-Area-Prefix 7
Inter-Area-Router 1
NSSA 0
Intra-Area-Prefix 1
Unknown 0

Global
------------------------
LSA Type Count
------------------------
AS External 1
Unknown 0

show ospfv3 lsdb stats lstype router

Area ID 0.0.0.0
------------------------
LSA Type Count
------------------------
Router 3
Network 0
Inter-Area-Prefix 0
Inter-Area-Router 0
Intra-Area-Prefix 0
Unknown 0

Deleted CLI Commands


show ospfv3 memory {detail | memoryType}

Secure Shell (SSH) Server Upgrade


OpenSSH server listens for incoming connections. After authenticating, the server provides the client
either shell access or access to the CLI, or performs a file transfer of configuration files. The server uses
various services in ExtremeXOS including AAA for authentication, Policy Manager for access control,
Session Manager for session reporting, and EMS for logging.

SSHServer is migrated from SSH toolkit to OpenSSH, where the SSH server is added as part of the
exsshd process. ExtremeXOS 21.1 supports SSH protocol version 2 from OpenSSH. Although the SSH
server is added to exsshd, the key generation is not performed by exsshd. This is done separately by
another module from OpenSSH, ssh-keyGen, which is invoked from exsshd. The generated key is stored
in /etc/ssh/ssh_host_dsa_key and /etc/ssh/ssh_host_dsa_key.pub. The same format
is used for any keys that are imported to OpenSSH.

ExtremeXOS Release Notes for version 21.1.5 41


Overview

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

Limitations
• Keyboard interactive authentication is not supported.
• Host key algorithms are not configurable.

ExtremeXOS Applications Environment


ExtremeXOS 21.1 introduces an environment that allows management applications, controllable through
a web interface, that communicate directly with other switch management applications.

Applications are management software modules that manage, configure, or monitor specific functions
within a switch. The applications leverage existing ExtremeXOS capabilities and protocols to simplify
complex tasks. You may download applications to a switch independently from an ExtremeXOS release
(see ezServiceablity (File Upload/Download) on page 43).

Figure 1: Application Environment Block Diagram


The HTTP interface is now a Python application based on CherryPy (3.7.0). This environment includes
the following previously available interfaces:
• Web interface (Chalet)
• SOAP/XML interface
Additionally, the following new capabilities have been introduced with ExtremeXOS 21.1:
• Service applications.
• File upload/download (see ezServiceablity (File Upload/Download) on page 43)
• JSONRPC—provides a management automation interface (http://www.jsonrpc.org/specification).
The JSONRPC implementation supports two methods:
• CLI method—issues CLI commands to ExtremeXOS show commands and returns JSON data
instead of formatted CLI data.

ExtremeXOS Release Notes for version 21.1.5 42


Overview

• Python method—allows the remote system to send inline Python scripts to run on a switch. You
can use inline Python scripting to perform complex tasks not available using the ExtremeXOS
CLI.
• Configuration Applications.
• Application manager—provides the ability to dynamically add management applications at run time.
Applications may be developed independently from the ExtremeXOS release cycle.
• ezMLAG—works with Chalet web screens and peer switches. It can communicate with peer switches
to perform the complex task of setting up and maintaining MLAG configurations.
• VXLAN—works with Chalet to manage VXLAN configuration coordination across multiple switches.

Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches

ezServiceablity (File Upload/Download)


ezServiceablity is a web application that enables you to upload and download files to and from a switch
instead of setting up a separate TFTP server. You can use this feature to push a new ExtremeXOS image
to a switch directly when upgrading.
• The app/file/<path> URL provides the ability to send, retrieve, or delete files on a switch. The
<path> parameter accepts the ExtremeXOS paths:
• /usr/local/cfg
• /usr/local/tmp
• /usr/local/ext—Files located on a USB memory stick, if present.

The allowed file extensions for <path> are: ,pol, cfg, xsf, py, pkt, and xml.
• The app/file/cfg URL is a shortcut for files in the /usr/local/cfg directory.

For example, http://<ip>/app/file/usr/local/cfg/myfile.py is equivalent to


http://<ip>/app/file/cfg/myfile.py. Upgrading a switch with a new ExtremeXOS image
is covered using the app/upload interface. Use this interface in concert with the app/filelist,
which provides the following capabilities:
• Obtain the list of files on the switch.
• Determine which file operations are supported for each file.
This interface is useful for:
• Sending policy, script, or config files to a switch directly from a web browser.
• Retrieving files from a switch directly to a web browser, such as configuration files.
• Retrieves/edits/returns files to a switch (provides a user-friendly way of editing files).
• Deleting files on a switch.

New Hardware Supported in ExtremeXOS 21.1


This section lists the new hardware supported in ExtremeXOS 21.1:
• ExtremeSwitching X440-G2 series switches:

ExtremeXOS Release Notes for version 21.1.5 43


Overview

X440-G2-24t-10GE4, X440-G2-24t-10GE4-DC, X440-G2-24p-10GE4, X440-G2-48t-10GE4, X440-


G2-48t-10GE4-DC, X440-G2-48p-10GE4, X440-G2-12t-10GE4, X440-G-12p-10GE4, X440-
G2-24x-10GE4, X440-G2-24fx-GE4, X440-G2-12t8fx-GE4, X440-G2-24t-GE4

Note
ExtremeSwitching X440-G2 10 Gigabit model switches require a license to upgrade the
four SFP 1GbE ports to 10G. For more information, see ExtremeXOS 21.1 Feature License
Requirements.

• ExtremeSwitching X620 series switches:

X620-10X, X620-8T-2X, X620-16X, X620-16T

Hardware No Longer Supported


The following hardware is no longer supported in ExtremeXOS 21.1:
• Summit X430, X440, X460, X480, and X670 series switches
• E4G-200 and E4G-400 cell site routers
• BlackDiamond X8 and 8800 series switches

Note
These hardware platforms are supported in the ExtremeXOS 16.x software.

VLAN Option Formatting in Commands


For commands with a vlan_list option, the input into this option must not contain spaces.

Example
The enable stpd auto-bind command VLAN ID input should be entered as:
enable stpd auto-bind vlan 10,20-30

Not:
enable stpd auto-bind vlan 10, 20-30

Circuit Emulation Service (CES) No Longer Supported


Starting with ExtremeXOS 21.1, circuit emulation service (CES) is no longer supported.

OpenFlow and SSH Included in ExtremeXOS Base Image


OpenFlow and SSH are now included in the ExtremeXOS base image starting with ExtremeXOS 21.1. A
separate XMOD file is no longer required.

ExtremeXOS Release Notes for version 21.1.5 44


Overview

ExtremeXOS SSH Server Upgraded with OpenSSH v6.5


ExtremeXOS 16.1 and earlier versions generated DSA-2048 keys using ssh keygen provided by the
SSH-Toolkit library. Starting with ExtremeXOS 21.1, ExtremeXOS generates more secure RSA-2048 keys
due to switching to using the OpenSSH library, which does not support DSA-2048.

When upgrading to ExtremeXOS 21.1 and later, SSH keys generated by ExtremeXOS versions 16.1 and
earlier are compatible and do not need to be re-generated.

Note
If a switch is downgraded from ExtremeXOS 21.1 or later to previous releases, with RSA key
saved, the key becomes invalid.

CLI Command Output Format of Ports Lists


For ExtremeXOS 16.1 and later, the output of CLI commands showing ports lists does not display spaces
between commas.

For example: “3:1,7:13” instead of “3:1, 7:13”

Extreme Hardware/Software Compatibility and Recommendation


Matrices
The Extreme Hardware/Software Compatibility and Recommendation Matrices provide information
about the minimum version of ExtremeXOS software required to support switches, as well as pluggable
transceivers and cables.

This guide also provides information about which optics are supported on which hardware platforms,
and the minimum software version required.

The latest version of this and other ExtremeXOS guides are at: www.extremenetworks.com/
documentation/

Compatibility with ExtremeManagement (Formerly NetSight)


ExtremeXOS 21.1 is compatible with ExtremeManagement (formerly NetSight) version 7.0 and later.

Upgrading ExtremeXOS
For instructions about upgrading ExtremeXOS software, see "Software Upgrade and Boot Options" in
the ExtremeXOS 22.3 User Guide.

Beginning with ExtremeXOS 12.1, an ExtremeXOS core image (.xos file) must be downloaded and
installed on the alternate (non-active) partition. If you try to download to an active partition, the error
message Error: Image can only be installed to the non-active partition.
appears. An ExtremeXOS modular software package (.xmod file) can still be downloaded and installed
on either the active or alternate partition.

ExtremeXOS Release Notes for version 21.1.5 45


Overview

Supported MIBs
The Extreme Networks MIBs are located at www.extremenetworks.com/support/policies/mibs/.

You need to provide your serial number or agreement number, and then the MIBs are available under
each release.

For detailed information on which MIBs and SNMP traps are supported, see the Extreme Networks
Proprietary MIBs and MIB Support Details sections in the ExtremeXOS 21.1 User Guide.

Tested Third-Party Products


This section lists the third-party products tested for ExtremeXOS 21.1.5 Patch 1-2.

Tested RADIUS Servers


The following RADIUS servers are fully tested:
• Microsoft—Internet Authentication Server
• Meetinghouse
• FreeRADIUS

Tested Third-Party Clients


The following third-party clients are fully tested:
• Windows 7
• Windows Vista
• Linux (IPv4 and IPv6)
• Windows XP (IPv4)

PoE Capable VoIP Phones


The following PoE capable VoIP phones are fully tested:
• Avaya 4620
• Avaya 4620SW IP telephone
• Avaya 9620
• Avaya 4602
• Avaya 9630
• Avaya 4621SW
• Avaya 4610
• Avaya 1616
• Avaya one-X
• Cisco 7970
• Cisco 7910
• Cisco 7960
• ShoreTel ShorePhone IP 212k

ExtremeXOS Release Notes for version 21.1.5 46


Overview

• ShoreTel ShorePhone IP 560


• ShoreTel ShorePhone IP 560g
• ShoreTel ShorePhone IP 8000
• ShoreTel ShorePhone IP BB 24
• Siemens OptiPoint 410 standard–2
• Siemens OpenStage 20
• Siemens OpenStage 40
• Siemens OpenStage 60
• Siemens OpenStage 80

Extreme Switch Security Assessment

DoS Attack Assessment


Tools used to assess DoS attack vulnerability:
• Network Mapper (NMAP)

ICMP Attack Assessment


Tools used to assess ICMP attack vulnerability:
• SSPing
• Twinge
• Nuke
• WinFreeze

Port Scan Assessment


Tools used to assess port scan assessment:
• Nessus

Service Notifications
To receive proactive service notification about newly released software or technical service
communications (for example, field notices, product change notices, etc.), please register at:
www.extremenetworks.com/support/service-notification-form

ExtremeXOS Release Notes for version 21.1.5 47


2 Limits
This chapter summarizes the supported limits in ExtremeXOS 21.1.5 Patch 1-2.

Table 3 summarizes tested metrics for a variety of features, as measured in a per-system basis unless
otherwise noted. These limits may change, but represent the current status. The contents of this table
supersede any values mentioned in the ExtremeXOS books.

The scaling and performance information shown in Table 3 is provided for the purpose of assisting with
network design. It is recommended that network architects and administrators design and manage
networks with an appropriate level of network scaling “head room.” The scaling and performance
figures provided have been verified using specific network topologies using limited switch
configurations. There is no guarantee that the scaling and performance figures shown are applicable to
all network topologies and switch configurations and are provided as a realistic estimation only. If you
experience scaling and performance characteristics that you feel are sufficiently below what has been
documented, contact Extreme Networks technical support for additional assistance.

The route limits shown in Table 3 for IPv4 and IPv6 routing protocols are software limits only. The actual
hardware limits may be higher or lower than the software limits, based on platform. The hardware limits
for specific platforms are specified as "IPv4/IPv6 routes (LPM entries in hardware)" in the following
table.

It is not advised to have greater than 25,000 total IP routes from all routing protocols. Adverse effects
can occur with routing tables larger than this, especially when a single network event or CLI command
affects a significant number of routes. For example, just after such a network event, the added system
load will cause a save configuration command to time out.

Table 3: Supported Limits


Metric Product Limit
AAA (local)—maximum All platforms 8
number of admin and local
user accounts.
Access lists (meters)— ExtremeSwitching X620, X440-G2 1,024 ingress,
maximum number of meters. 256 egress
Summit X770, X670-G2 1,024 ingress, 512
egress
Access lists (policies)— All platforms 300,000
suggested maximum number
of lines in a single policy file.
Access lists (policies)— Summit X460-G2, X450-G2, X770, X670-G2 4,096 ingress,
maximum number of rules in a 1,024 egress
single policy file. a
ExtremeSwitching X620, X440-G2 2,048 ingress,
512 egress

ExtremeXOS Release Notes for version 21.1.5 48


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Access lists (policies)— Summit X450-G2, X460-G2 2,048 ingress
maximum number of rules in a only
single policy file in first stage Summit X670-G2, X770 1,024 ingress
(VFP). only
ExtremeSwitching X620, X440-G2 512 ingress only
Access lists (slices)—number Summit X460-G2, X450-G2 16 ingress, 4
of ACL slices. egress
Summit X770, X670-G2 12 ingress, 4
egress
ExtremeSwitching X440-G2, X620 8 ingress, 4
egress
Access lists (slices)—number Summit X450-G2, X460-G2, X670-G2, X770, and 4 ingress only
of ACL slices in first stage ExtremeSwitching X620, X440-G2
(VFP).
ACL Per Port Meters—number Summit X450-G2, X460-G2, X670-G2, X770, and 16
of meters supported per port. ExtremeSwitching X620, X440-G2
Meters Packets-Per-Second Summit X450-G2, X460-G2, X670-G2, X770, and Yes
Capable ExtremeSwitching X620, X440-G2
AVB (audio video bridging)— Summit X450-G2, X460-G2, X770, and ExtremeSwitching 1,024
maximum number of active X620, X440-G2 4,096
streams. Summit X670-G2
BFD sessions (Software Mode) Summit X460-G2, X670-G2, X450-G2, X770 (default timers—1 512
—maximum number of BFD sec) 10 c
sessions. Summit X460-G2, X670-G2, X450-G2, X770 (minimal timers—
100 msec)
BFD sessions (Hardware Summit X460-G2 900 (PTP not
Assisted)—maximum number enabled)
of BFD sessions. 425 (PTP
enabled)
256 (with 3 ms
transmit interval)
BGP (aggregates)—maximum Summit X460-G2, X670-G2, X770 with Core license or higher 256
number of BGP aggregates. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGP (networks)—maximum Summit X460-G2, X670-G2, X770 with Core license or higher 1,024
number of BGP networks. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGP (peers)—maximum Summit X460-G2, X670-G2, X770 with Core license or higher 128*
number of BGP peers. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported

Note:: *With default keepalive


and hold timers.

BGP (peer groups)—maximum Summit X460-G2, X670-G2, X770 with Core license or higher 64
number of BGP peer groups. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGP (policy entries)— Summit X460-G2, X670-G2, X770 with Core license or higher 256
maximum number of BGP Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
policy entries per route policy.

ExtremeXOS Release Notes for version 21.1.5 49


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
BGP (policy statements)— Summit X460-G2, X670-G2, X770 with Core license or higher 1,024
maximum number of BGP Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
policy statements per route
policy.
BGP multicast address-family Summit X460-G2, X670-G2, X770 25,000
routes—maximum number of Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
multicast address-family
routes.
BGP (unicast address-family Summit X460-G2, X670-G2, X770 25,000
routes)—maximum number of Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
unicast address-family routes.
BGP (non-unique routes)— Summit X460-G2, X670-G2, X770 25,000
maximum number of non- Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
unique BGP routes.
BGP ECMP—maximum Summit X460-G2, X670-G2, X770 2, 4, or 8
number of equalcost multipath Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
for BGP and BGPv6.
BGPv6 (unicast address-family Summit X460-G2 6,000
routes)—maximum number of Summit X670-G2, X770 8,000
unicast address family routes. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGPv6 (non-unique routes)— Summit X460-G2 18,000
maximum number of non- Summit X670-G2, X770 24,000
unique BGP routes. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BOOTP/DHCP relay— Summit X460-G2, X670-G2, X770, X450-G2, and 4
maximum number of BOOTP ExtremeSwitching X440-G2*, X620*
or DHCP servers per virtual
router.

Note:: User VRs not supported.

BOOTP/DHCP relay— Summit X460-G2, X670-G2, X770, X450-G2, and 4


maximum number of BOOTP ExtremeSwitching X440-G2, X620
or DHCP servers per VLAN.
Connectivity fault Summit X460-G2, X670-G2, X770, X450-G2, and 8
management (CFM)— ExtremeSwitching X440-G2, X620
maximum number or CFM
domains.

Note:: With Advanced Edge


license or higher.

CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 256


CFM associations. ExtremeSwitching X440-G2, X620

Note:: With Advanced Edge


license or higher.

ExtremeXOS Release Notes for version 21.1.5 50


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 32
CFM up end points. ExtremeSwitching X440-G2, X620

Note:: With Advanced Edge


license or higher.

CFM—maximum number of Summit X670-G2, X770, X450-G2, and ExtremeSwitching 32


CFM down end points. X440-G2, X620 256 (non-load
Summit X460-G2 shared ports)
Note:: With Advanced Edge 32 (load shared
license or higher. ports)

CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 2,000


CFM remote end points per ExtremeSwitching X440-G2, X620
up/down end point.

Note:: With Advanced Edge


license or higher.

CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 128


dot1ag ports. ExtremeSwitching X440-G2, X620

Note:: With Advanced Edge


license or higher.

CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 1,000


CFM segments. ExtremeSwitching X440-G2, X620

Note:: With Advanced Edge


license or higher.

CFM—maximum number of Summit X460-G2, X670-G2, X770, X450-G2, and 256


MIPs. ExtremeSwitching X620, X440-G2

Note:: With Advanced Edge


license or higher.

CLEAR-Flow—total number of Summit X460-G2, X770, X670-G2, X450-G2 4,094


rules supported. The ACL rules ExtremeSwitching X440-G2, X620 1,024
plus CLEAR-Flow rules must
be less than the total number
of supported ACLs.
Data Center Bridging Summit X460-G2, X670-G2, X770, X450-G2, and 8
eXchange (DCBX) protocol ExtremeSwitching X440-G2, X620
Type Length Value (TLVs)—
maximum number of DCBX
application TLVs.

ExtremeXOS Release Notes for version 21.1.5 51


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
DHCPv6 Prefix Delegation Summit X460-G2, X670-G2, X770, X450-G2, and 256 (with
Snooping—Maximum number ExtremeSwitching X620, X440-G2 Underlying
of DHCPv6 prefix delegation Protocol Ripng)
snooped entries. 128 (with
Underlying
protocol
OSPFv3)
1,024 (with static
routes)
DHCP snooping entries— Summit X460-G2, X670-G2, X770, X450-G2, and 2,048
maximum number of DHCP ExtremeSwitching X620, X440-G2
snooping entries.
Dynamic ACLs—maximum Summit X450-G2, X460-G2, X670-G2, X770, and
number of ACLs processed per ExtremeSwitching X620, X440-G2 10
second. 5
with 50 DACLs
Note:: Limits are load with 500 DACLs
dependent.

EAPS domains—maximum Summit X670-G2, X450-G2, and X770 64


number of EAPS domains. Summit X460-G2, and ExtremeSwitching X440-G2, X620 32

Note:: An EAPS ring that is


being spatially reused cannot
have more than four
configured EAPS domains.

EAPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
EAPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620 Not supported
protected VLANs. ExtremeSwitching X440-G2
ELSM (vlan-ports)—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 5,000
number of VLAN ports. ExtremeSwitching X620
ERPS domains—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 32
number of ERPS domains ExtremeSwitching X620
without CFM configured.
ERPS domains—maximum Summit X450-G2, X670-G2, X770, and ExtremeSwitching 16
number of ERPS domains with X620 32
CFM configured. Summit X460-G2
ERPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ERPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ESRP groups—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 31
number of ESRP groups. ExtremeSwitching X440-G2, X620

ExtremeXOS Release Notes for version 21.1.5 52


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
ESRP domains—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 64
number of ESRP domains. ExtremeSwitching X620, X440-G2
ESRP L2 VLANs—maximum Summit X450-G2, X460-G2, X670- G2, X770, and 1,000
number of ESRP VLANs ExtremeSwitching X620, X440-G2
without an IP address
configured.
ESRP L3 VLANs—maximum Summit X450-G2, X460-G2, X670- G2, X770, and 511
number of ESRP VLANs with ExtremeSwitching X620, X440-G2
an IP address configured.
ESRP (maximum ping tracks) Summit X450-G2, X460-G2, X670-G2, X770, and 8
—maximum number of ping ExtremeSwitching X620, X440-G2
tracks per VLAN.
ESRP (IP route tracks)— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum IP route tracks per ExtremeSwitching X620, X440-G2
VLAN.
ESRP (VLAN tracks)— Summit X450-G2, X460-G2, X670-G2, X770, and 1
maximum number of VLAN ExtremeSwitching X620, X440-G2
tracks per VLAN.
Forwarding rate—maximum L3 Summit X770 11,000 pps
software forwarding rate. Summit X670-G2 21,000 pps
Summit X460-G2 25,000 pps
Summit X450-G2 24,000 pps
ExtremeSwitching X440-G2 21,000 pps
ExtremeSwitching X620 23,000 pps
FDB (unicast blackhole Summit X460-G2 49,152 f
entries)—maximum number of Summit X770, X670-G2 294,912 f
unicast blackhole FDB entries. Summit X450-G2 34,816 f
ExtremeSwitching X620, X440-G2 16,384 f
FDB (multicast blackhole Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, 1,024
entries)—maximum number of X620 4,096
multicast blackhole FDB Summit X770, X670-G2
entries.
FDB (maximum L2 entries)— Summit X670-G2 294,912 f
maximum number of MAC Summit X460-G2 98,300 f
addresses. Summit X770 294,912 f
Summit X450-G2 68,000 f
ExtremeSwitching X620, X440-G2 16,384 f
FDB (Maximum L2 entries)— Summit X770, X670-G2 4,096
maximum number of multicast Summit X450-G2, X460-G2, and ExtremeSwitching X620, 1,024
FDB entries. X440-G2
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 512
maximum number of Blacklist ExtremeSwitching X620, X440-G2
entries.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 512
maximum number of Whitelist ExtremeSwitching X620, X440-G2
entries.

ExtremeXOS Release Notes for version 21.1.5 53


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 64
maximum number of roles that ExtremeSwitching X620, X440-G2
can be created.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 5
maximum role hierarchy depth ExtremeSwitching X620, X440-G2
allowed.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 16
maximum number of attribute ExtremeSwitching X620, X440-G2
value pairs in a role match
criteria.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum of child roles for a ExtremeSwitching X620, X440-G2
role.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of policies/ ExtremeSwitching X620, X440-G2
dynamic ACLs that can be
configured per role.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of LDAP ExtremeSwitching X620, X440-G2
servers that can be configured.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 20
maximum number of Kerberos ExtremeSwitching X620, X440-G2
servers that can be configured.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 512
maximum database memory- ExtremeSwitching X620, X440-G2
size.
Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 100
recommended number of ExtremeSwitching X620, X440-G2
identities per switch.

Note:: Number of identities per


switch is for a default identity
management database size
(512 Kbytes) across all
platforms.

Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 20


recommended number of ACL ExtremeSwitching X620, X440-G2
entries per identity.

Note:: Number of ACLs per


identity based on system ACL
limitation.

Identity management— Summit X450-G2, X460-G2, X670-G2, X770, and 500


maximum number of dynamic ExtremeSwitching X620, X440-G2
ACL entries configured as an
individual dynamic rule, or as
an ACL entry in a policy file.

ExtremeXOS Release Notes for version 21.1.5 54


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IGMP snooping per VLAN Summit X460-G2 1,500
filters—maximum number of Summit X450-G2 2,048
VLANs supported in per-VLAN Summit X770, X670-G2 2,000
IGMP snooping mode. ExtremeSwitching X620, X440-G2 1,000
IGMPv1/v2 SSM-map entries— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620, X440-G2
IGMPv1/v2 SSM mapping
entries.
IGMPv1/v2 SSM-map entries— Summit X450-G2, X460-G2, X670-G2, X770, and 50
maximum number of sources ExtremeSwitching X620, X440-G2
per group in IGMPv1/v2 SSM
mapping entries.
IGMPv2 subscriber—maximum Summit X770, X670-G2, X460-G2, X450-G2 4,000
number of IGMPv2 subscribers ExtremeSwitching X440-G2, X620 3,500
per port. n
IGMPv2 subscriber—maximum Summit X770, X670-G2 30,000
number of IGMPv2 subscribers Summit X460-G2, X450-G2 20,000
per switch. n ExtremeSwitching X620, X440-G2 17,500
IGMPv3 maximum source per Summit X450-G2, X460-G2, X670-G2, X770, and 250
group—maximum number of ExtremeSwitching X620, X440-G2
source addresses per group.
IGMPv3 subscriber—maximum Summit X770, X670-G2, X460-G2, X450-G2 4,000
number of IGMPv3 subscribers ExtremeSwitching X440-G2, X620 3,500
per port. n
IGMPv3 subscriber—maximum Summit X460-G2, X450-G2 20,000
number of IGMPv3 subscribers Summit X770, X670-G2 30,000
per switch. n ExtremeSwitching X620, X440-G2 17,500
IP ARP entries in software— Summit X670-G2, X770 131,072 (up to) h
maximum number of IP ARP Summit X460-G2 57,344 (up to) h
entries in software. Summit X450-G2 47,000 (up to) h
ExtremeSwitching X440-G2, X620 20,480
Note:: May be limited by
hardware capacity of FDB
(maximum L2 entries).

IPv4 ARP entries in hardware Summit X460-G2 50,000 (up to) h


with minimum LPM routes— Summit X770, X670-G2 108,000 (up to) h
maximum recommended Summit X450-G2 39,000 (up to) h
number of IPv4 ARP entries in ExtremeSwitching X620 1,500
hardware, with minimum LPM ExtremeSwitching X440-G2 1,000
routes present. Assumes
number of IP route reserved
entries is 100 or less.

ExtremeXOS Release Notes for version 21.1.5 55


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IPv4 ARP entries in hardware Summit X460-G2 43,000 (up to) h
with maximum LPM routes— Summit X770, X670-G2 98,000 (up to) h
maximum recommended Summit X450-G2 29,000 (up to) h
number of IPv4 ARP entries in ExtremeSwitching X620 1,500
hardware, with maximum LPM ExtremeSwitching X440-G2 1,000
routes present. Assumes
number of IP route reserved
entries is “maximum.”
IP flow information export Summit X460-G2 2,048 ingress
(IPFIX)—number of 2,048 egress
simultaneous flows.
Summit X450-G2, X670-G2, X770, and ExtremeSwitching N/A
X620, X440-G2
IPv4 remote hosts in hardware Summit X460-G2 73,000 h
with zero LPM routes— Summit X770, X670-G2 176,000 (up to) h
maximum recommended Summit X450-G2 61,000 (up to) h
number of IPv4 remote hosts ExtremeSwitching X440-G2, X620 3,500
(hosts reachable through a
gateway) in hardware when
LPM routing is not used.
Assumes number of IP route
reserved entries is 0, and
number of IPv4 ARP entries
present is 100 or less.
IPv4 routes—maximum Summit X670-G2, X460-G2, X450-G2, X440-G2, X620 25,000
number of IPv4 routes in
software (combination of
unicast and multicast routes).
IPv4 routes (LPM entries in Summit X460-G2 12,000
hardware)— number of IPv4 Summit X770, X670-G2, X450-G2 16,000
routes in hardware. ExtremeSwitching X620, X440-G2 480
IPv6 addresses on an interface Summit X450-G2, X460-G2, X670-G2, X770, and 255
—maximum number of IPv6 ExtremeSwitching X620, X440-G2
addresses on an interface.
IPv6 addresses on a switch— Summit X770, X670-G2, X460-G2, X450-G2 2,048
maximum number of IPv6 ExtremeSwitching X620, X440-G2 510
addresses on a switch.
IPv6 host entries in hardware— Summit X770, X670-G2 36,750 i
maximum number of IPv6 Summit X460-G2 22,000 i
neighbor entries in hardware. Summit X450-G2 12,000 i
ExtremeSwitching X440-G2 1,000
ExtremeSwitching X620 1,500
IPv6 routes (LPM entries in Summit X460-G2 6,000
hardware)—maximum number Summit X670-G2, X770, X450-G2 8,000
of IPv6 routes in hardware. ExtremeSwitching X620, X440-G2 240

ExtremeXOS Release Notes for version 21.1.5 56


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IPv6 routes with a mask Summit X450-G2, X460-G2, X670-G2, X770, and 256
greater than 64 bits in ExtremeSwitching X620, X440-G2
hardware—maximum number
of such IPv6 LPM routes in
hardware.
IPv6 route sharing in hardware Summit X460-G2, X670-G2, X770, X450-G2, and 0–64 *
—route mask lengths for which ExtremeSwitching X620 Not supported
ECMP is supported in ExtremeSwitching X440-G2
hardware.

Note:: * >64 single path only

IPv6 routes in software— Summit X450-G2, X460-G2, X670-G2, X770, and 25,000
maximum number of IPv6 ExtremeSwitching X620, X440-G2
routes in software.
IP router interfaces—maximum Summit X460-G2, X770, X670-G2, X450-G2 2,048
number of VLANs performing ExtremeSwitching X620, X440-G2 510
IPv4 and/or IPv6 routing.
Excludes sub-VLANs.
IP multicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of
permanent multicast IP routes.
IP unicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of ExtremeSwitching X620, X440-G2 480
permanent IP unicast routes.
IP route sharing (maximum Summit X460-G2, X670-G2, X450-G2, X770, and 2, 4, 8, 16, or 32
gateways)—Configurable ExtremeSwitching X620 N/A
maximum number of gateways ExtremeSwitching X440-G2
used by equal cost multipath
OSPF, BGP, IS-IS, static routes,
or L2VPNs. Routing protocol
OSPF is limited to 16 ECMP
gateways per destination.
Routing protocols BGP is
limited to 64 ECMP gateways
per destination, while and IS-IS
is limited to 8. Static routes are
limited to 32 next-hops.
L2VPNs are limited to 16 LSPs
per pseudowire on platforms
that support 32 gateways, and
64 LSPs per pseudowire on
platforms that support 64
gateways.

ExtremeXOS Release Notes for version 21.1.5 57


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IP route sharing (total Summit X670-G2, X770, X450-G2 16,352
destinations)—maximum Summit X460-G2 12,256
number of unique destinations ExtremeSwitching X620 480
used by multipath OSPF, ExtremeSwitching X440-G2 N/A
OSPFv3, BGP, IS-IS, or static
routes. Note::
For platforms with limit of 524,256 or higher, the total number
of "destination+gateway" pairs is limited to 2,097,024. For
example, if the number of unique destinations is 524,256, only
2 gateways per destination is supported.
For other platforms, each limit is based on up to 8 gateways
per destination for BGP and IS-IS routing protocols, up to 16
gateways per destination for OSPF, or up to 32 gateways per
destination for static routes.

IP route sharing (total Summit X670-G2, X770 1,022


combinations of gateway sets) 1,022
default maximum gateways of 4
—maximum number of 1,022
combinations of sets of if maximum gateways is 2 1,022
adjacent gateways used by if maximum gateways is 8 510
multipath OSPF, BGP, IS-IS, or if maximum gateways is 16 254
static routes. if maximum gateways is 32
if maximum gateways is 64 1,022
1,022
510
Summit X460-G2, X450-G2 254
default maximum gateways of 4 126
if maximum gateways is 2 62
if maximum gateways is 8
126
if maximum gateways is 16
126
if maximum gateways is 32 126
if maximum gateways is 64 126
62
ExtremeSwitching X620 30

default maximum gateways of 4 N/A


if maximum gateways is 2
if maximum gateways is 8
if maximum gateways is 16
if maximum gateways is 32
if maximum gateways is 64

ExtremeSwitching X440-G2
IP multinetting (secondary IP Summit X450-G2, X460-G2, X670-G2, X770, and 255
addresses)—maximum ExtremeSwitching X620, X440-G2
number of secondary IP
addresses per VLAN.
IS-IS adjacencies—maximum Summit X460-G2, X670-G2, X770 128
number of supported IS-IS Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
adjacencies.

ExtremeXOS Release Notes for version 21.1.5 58


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IS-IS ECMP—maximum Summit X450-G2, X670-G2, X770, X460-G2 2, 4, or 8
number of equal cost ExtremeSwitching X620, X440-G2 N/A
multipath for IS-IS.
IS-IS interfaces—maximum Summit X450-G2, X670-G2, X770, X460-G2 255
number of interfaces that can ExtremeSwitching X620, X440-G2 N/A
support IS-IS.
IS-IS routers in an area— Summit X450-G2, X670-G2, X770, X460-G2 256
recommended maximum ExtremeSwitching X620, X440-G2 N/A
number of IS-IS routers in an
area.
IS-IS route origination— Summit X450-G2, X460-G2, X670-G2, X770 20,000
recommended maximum ExtremeSwitching X620, X440-G2 N/A
number of routes that can be
originated by an IS-IS node.
IS-IS IPv4 L1 routes in an L1 Summit X450-G2, X460-G2, X670-G2, X770 25,000
router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in a Level 1 IS-IS
router.
IS-IS IPv4 L2 routes— Summit X450-G2, X460-G2, X670-G2, X770 25,000
recommended maximum ExtremeSwitching X620, X440-G2 N/A
number of IS-IS Level 2 routes.
IS-IS IPv4 L1 routes in an L1/L2 Summit X450-G2, X460-G2, X670-G2. X770 20,000
router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in an L1/L2 IS-IS
router.
IS-IS IPv6 L1 routes in an L1 Summit X450-G2, X460-G2, X670-G2, X770 10,000
router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in a Level 1 IS-IS
router.
IS-IS IPv6 L2 routes— Summit X450-G2, X460-G2, X670-G2, X770 10,000
recommended maximum ExtremeSwitching X620, X440-G2 N/A
number of IS-IS Level 2 routes.
IS-IS IPv6 L1 routes in an L1/L2 Summit X450-G2, X460-G2, X670-G2, X770 10,000
router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in a L1/l2 router.
IS-IS IPv4/IPv6 L1 routes in an Summit X450-G2, X460-G2, X670-G2. X770 20,000
L1 router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in a Level 1 IS-IS
router. The numbers
documented are based on
50% IPv4 routes and 50% IPv6
routes.

ExtremeXOS Release Notes for version 21.1.5 59


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
IS-IS IPv4/IPv6 L2 routes in an Summit X450-G2, X460-G2, X670-G2, X770 20,000
L2 router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 2 routes in a Level 2 IS-IS
router. The numbers
documented are based on
50% IPv4 routes and 50% IPv6
routes.
IS-IS IPv4/IPv6 L1 routes in an Summit X450-G2, X460-G2, X670-G2, X770 20,000
L1/L2 router—recommended ExtremeSwitching X620, X440-G2 N/A
maximum number of IS-IS
Level 1 routes in a Level 1/
Level2 IS-IS router. The
numbers documented are
based on 50% IPv4 routes and
50% IPv6 routes.
Jumbo frames—maximum size Summit X450-G2, X460-G2, X670-G2, X770, and 9,216
supported for jumbo frames, ExtremeSwitching X620, X440-G2
including the CRC.
L2 VPN: VCCV (pseudowire Summit X460-G2, X670-G2, X770 16
Virtual Circuit Connectivity Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
Verification) VPNs per switch—
maximum number of VCCV
enabled VPLS VPNs.
L2 VPN: VPLS MAC addresses Summit X770 128,000
—maximum number of MAC Summit X670-G2 140,000
addresses learned by a switch. Summit X460-G2 55,000
Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
L2 VPN: VPLS VPNs— Summit X460-G2, X770, X670-G2 1,023
maximum number of VPLS Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
virtual private networks per
switch.
L2 VPN: VPLS peers— Summit X770, X670-G2, X460-G2 64
maximum number of VPLS Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
peers per VPLS instance.
L2 VPN: LDP pseudowires— Summit X770 7,800
maximum number of Summit X670-G2 7,000
pseudowires per switch. Summit X460-G2 7,116
Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
L2 VPN: static pseudowires— Summit X770 15,308
maximum number of static Summit X670-G2, X460-G2 7,000
pseudowires per switch. Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
L2 VPN: Virtual Private Wire Summit X770 4,000
Service (VPWS) VPNs— Summit X670-G2 4,090
maximum number of virtual Summit X460-G2 1,023
private networks per switch. Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A

ExtremeXOS Release Notes for version 21.1.5 60


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Layer-2 IPMC forwarding Summit X770, X670-G2 73,000
caches—(IGMP/MLD/PIM Summit X460-G2 24,000
snooping) in mac-vlan mode. Summit X450-G2 14,000
ExtremeSwitching X620, X440-G2 5,000
Note::
• The internal lookup table
configuration used is "l2-
and-l3”.
• IPv6 and IPv4 L2 IPMC
scaling is the same for this
mode.
• Layer-2 IPMC forwarding
cache limits—
(IGMP/MLD/PIM snooping)
in mixed-mode are same.

Layer-3 IPv4 Multicast— Summit X460-G2 26,000


maximum number of <S,G,V> Summit X450-G2 21,000
entries installed in the Summit X770, X670-G2 77,500
hardware (IP multicast ExtremeSwitching X620, X440-G2 1,500
compression enabled).

Note::
• Limit value same for MVR
senders, PIM Snooping
entries. PIM SSM cache,
IGMP senders, PIM cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.
• Layer 3 IPMC cache limit in
mixed mode also has the
same value.

ExtremeXOS Release Notes for version 21.1.5 61


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Layer-3 IPv6 Multicast— Summit X770, X670-G2 30,000
maximum number of <S,G,V> Summit X460-G2 14,000
entries installed in the Summit X450-G2 10,000
hardware (IP multicast ExtremeSwitching X620, X440-G2 700
compression enabled).

Note::
• Limit value same for MLD
sender per switch,PIM IPv6
cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.

Load sharing—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 128


number of load sharing ExtremeSwitching X620, X440-G2
groups.

Note:: The actual number of


load-sharing groups that can
be configured is limited by the
number of physical ports
present in the switch or
SummitStack.

Load sharing—maximum ExtremeSwitching X620, X440-G2 (standalone and stacked) 8


number of ports per load-
sharing group. Summit X770 (standalone) 32
Summit X670-G2 (standalone)
Summit X460-G2 (standalone)
Summit X450-G2 (standalone)
Summit X770 (stacked) 64
Summit X670-G2 (stacked)
Summit X460-G2 (stacked)
Summit X450-G2 (stacked)
Summit X670-G2
Logged messages—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 20,000
number of messages logged ExtremeSwitching X620, X440-G2
locally on the system.
MAC-based security— Summit X450-G2, X460-G2, X670-G2, X770, and 1,024
maximum number of MAC- ExtremeSwitching X620, X440-G2
based security policies.
MAC Locking—Maximum Summit X450-G2, X460-G2, X670-G2, X770, and 64 (static MAC
number of MAC locking ExtremeSwitching X620, X440-G2 locking stations)
stations that can be learned on 600 (first arrival
a port. MAC locking
stations)

ExtremeXOS Release Notes for version 21.1.5 62


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Meters—maximum number of Summit X460-G2, X450-G2, X670-G2, X770 2,048
meters supported. ExtremeSwitching X440-G2, X620 N/A
Maximum mirroring instances Summit X450-G2, X460-G2, X670-G2, X770, and 16 (including
ExtremeSwitching X620, X440-G2 default mirroring
instance)
Note:: Only two or four mirroring instance will be active at a
time depending on the mirroring filter added to it. There are
four hardware resource slots. Each single instance uses one
such slot, while each ingress plus egress instance uses two
slots. So this allows the you to use a total of four slots, while
there are no more then two egress instances. The maximum
possible combination for mirroring instances:

1 4 ingress
2 3 ingress + 1 egress
3 2 ingress + 2 egress
4 2 (ingress + egress)
5 1 (ingress + egress) + 2 ingress
6 1 (ingress + egress) + 1 egress + 1 ingress

Mirroring (filters)—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 128


number of mirroring filters. ExtremeSwitching X620, X440-G2

Note:: This is the number of


filters across all the active
mirroring instances.

Mirroring, one-to-many (filters) Summit X450-G2, X460-G2, X670-G2, X770, and 128
—maximum number of one-to- ExtremeSwitching X620, X440-G2
many mirroring filters.

Note:: This is the number of


filters across all the active
mirroring instances

Mirroring, one-to-many Summit X450-G2, X460-G2, X670-G2, X770, and 16


(monitor port)—maximum ExtremeSwitching X620, X440-G2
number of one-to-many
monitor ports.
MLAG ports—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 768
number of MLAG ports ExtremeSwitching X620, X440-G2
allowed.
MLAG peers—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 2
number of MLAG peers ExtremeSwitching X620, X440-G2
allowed.
MPLS RSVP-TE interfaces— Summit X460-G2, X670-G2, X770 32
maximum number of Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
interfaces.

ExtremeXOS Release Notes for version 21.1.5 63


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
MPLS RSVP-TE ingress LSPs— Summit X460-G2, X670-G2, X770 2,000
maximum number of ingress Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
LSPs.
MPLS RSVP-TE egress LSPs— Summit X460-G2, X670-G2, X770 2,000
maximum number of egress Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
LSPs.
MPLS RSVP-TE transit LSPs— Summit X460-G2, X670-G2, X770 2,000
maximum number of transit Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
LSPs.
MPLS RSVP-TE paths— Summit X460-G2, X770 1,000
maximum number of paths. Summit X670-G2 2,000
Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS RSVP-TE profiles— Summit X460-G2, X770 1,000
maximum number of profiles. Summit X670-G2 2,000
Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS RSVP-TE EROs— Summit X460-G2, X670-G2, X770 64
maximum number of EROs per Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
path.
MPLS LDP peers—maximum Summit X770 64
number of MPLS LDP peers Summit X670-G2, X460-G2 128
per switch. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS LDP adjacencies— Summit X460-G2 50
maximum number of MPLS Summit X770, X670-G2 64
LDP adjacencies per switch. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS LDP ingress LSPs— Summit X770, X670-G2 2,048
maximum number of MPLS Summit X460-G2 4,000
LSPs that can originate from a Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
switch.
MPLS LDP-enabled interfaces Summit X770 64
—maximum number of MPLS Summit X670-G2, X460-G2 128
LDP configured interfaces per Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
switch.
MPLS LDP Sessions— Summit X770 64
maximum number of MPLS Summit X670-G2, X460-G2 128
LDP sessions. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS LDP transit LSPs— Summit X770, X670-G2, X460-G2 4,000
maximum number of MPLS Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
transit LSPs per switch.
MPLS LDP egress LSPs— Summit X770 8,000
maximum number of MPLS Summit X670-G2, X460-G2 4,000
egress LSPs that can terminate Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
on a switch.
MPLS static egress LSPs— Summit X460-G2 7,116
maximum number of static Summit X770 8,000
egress LSPs. Summit X670-G2 15,308
Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A

ExtremeXOS Release Notes for version 21.1.5 64


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
MPLS static ingress LSPs— Summit X460-G2 4,000
maximum number of static Summit X770, X670-G2 2,048
ingress LSPs. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MPLS static transit LSPs— Summit X770, X670-G2, X460-G2 4,000
maximum number of static Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
transit LSPs
MSDP active peers—maximum Summit X770, X670-G2, X460-G2 64
number of active MSDP peers. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MSDP SA cache entries— Summit X670-G2, X770 14,000
maximum number of entries in Summit X460-G2 10,000
SA cache. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
MSDP maximum mesh groups Summit X770, X670-G2, X460-G2 16
—maximum number of MSDP Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
mesh groups.
Multicast listener discovery Summit X460-G2 1,200
(MLD) snooping per-VLAN Summit X770, X670-G2 1,200
filters—maximum number of Summit X450-G2 512
VLANs supported in per-VLAN ExtremeSwitching X620, X440-G2 600
MLD snooping mode.
Multicast listener discovery Summit X770, X670-G2, X450-G2, X460-G2 4,000
(MLD)v1 subscribers— ExtremeSwitching X620, X440-G2 3,500
maximum number of MLDv1
subscribers per port. n
Multicast listener discovery Summit X460-G2, X450-G2 10,000
(MLD)v1 subscribers— Summit X770, X670-G2 30,000
maximum number of MLDv1 ExtremeSwitching X620, X440-G2 10,000
subscribers per switch. n
Multicast listener discovery Summit X450-G2 4,000
(MLD)v2 subscribers— SummitStack 2,000
maximum number of MLDv2 Summit X770, X670-G2, X460-G2 4,000
subscribers per port. n ExtremeSwitching X620, X440-G2 3,500
Multicast listener discovery SummitStack 5,000
(MLD)v2 subscribers— Summit X460-G2, X450-G2 10,000
maximum number of MLDv2 Summit X770, X670-G2 30,000
subscribers per switch. n ExtremeSwitching X620, X440-G2 10,000
Multicast listener discovery Summit X450-G2, X460-G2, X670-G2, X770, and 200
(MLD)v2 maximum source per ExtremeSwitching X620, X440-G2
group—maximum number of
source addresses per group.
Multicast listener discovery Summit X450-G2, X460-G2, X670-G2, X770 500
(MLD) SSM-map entries— ExtremeSwitching X440-G2, X620 50
maximum number of MLD SSM
mapping entries.

ExtremeXOS Release Notes for version 21.1.5 65


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Multicast listener discovery Summit X450-G2, X460-G2, X670-G2, X770, and 50
(MLD) SSM-MAP entries— ExtremeSwitching X620, X440-G2
maximum number of sources
per group in MLD SSM
mapping entries.
Network login—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 1,024
number of clients being ExtremeSwitching X620, X440-G2
authenticated on MAC-based
VLAN enabled ports.
Network login—maximum Summit X450-G2, X460-G2 1,024
number of clients being Summit X670-G2, X770 512
authenticated with policy ExtremeSwitching X620, X440-G2 256
mode enabled.
Network login—maximum Summit X460-G2, X450-G2, X670-G2, X770 2,000
number of dynamic VLANs. ExtremeSwitching X440-G2, X620 1,024
Network login VLAN VSAs— Summit X450-G2, X460-G2, X670-G2, X770, and 10
maximum number of VLANs a ExtremeSwitching X620, X440-G2
client can be authenticated on
at any given time.
ONEPolicy Roles/Profiles— Summit X450-G2, X460-G2, X670-G2, X770 63
maximum number of policy ExtremeSwitching X620, X440-G2 64
roles/profiles.
ONEPolicy Rules per Role/ Summit X450-G2 IPv6 rules: 256
Profile—maximum number of IPv4 rules: 256
rules per role/policy. L2 Rules: 184
MAC Rules: 256
Summit X460-G2 IPv6 Rules: 512
IPv4 Rules: 512
L2 Rules: 440
MAC Rules: 512
Summit X670-G2, X770 IPv6 Rules: 256
L2 Rules: 184
MAC Rules: 256
IPv4 Rules: 256
ExtremeSwitching X620, X440-G2 IPv6 and Mac
Rules: 0
Ipv4 Rules: 256
(per switch)
L2 Rules: 184
(per switch)
ONEPolicy Authenticated Summit X450-G2, X460-G2 Up to 1,024
Users per Switch—maximum Summit X670-G2, X770 Up to 512
number of authenticated users ExtremeSwitching X620, X440-G2 Up to 256
per switch.

ExtremeXOS Release Notes for version 21.1.5 66


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
ONEPolicy Authenticated Summit X450-G2, X460-G2 682–1,022
Users— maximum Summit X670-G2, X770 341–510
authenticated users with a ExtremeSwitching X620, X440-G2 TCI disabled: 170
combination of TCI disabled/ TCI enabled: 256
enabled profiles.
ONEPolicy Authenticated Summit X450-G2, X460-G2 Unlimited up to
Users per Port—maximum 1,024
number of authenticated users Summit X670-G2, X770 Unlimited up to
per port. 512
ExtremeSwitching X620, X440-G2 Unlimited up to
256
ONEPolicy Permit/Deny Traffic Summit X450-G2, X460-G2, X670-G2, X770 952
Classification Rules Types— ExtremeSwitching X620, X440-G2 440
total maximum number of
unique permit/deny traffic
classification rules types
(system/stack).
ONEPolicy Permit/Deny Traffic Summit X450-G2, X460-G2, X670-G2, X770 256
Classification Rules Types— ExtremeSwitching X620, X440-G2 N/A
maximum number of unique
MAC permit/deny traffic
classification rules types
(macsource/macdest).
ONEPolicy Permit/Deny Traffic Summit X450-G2, X460-G2, X670-G2, X770 256
Classification Rules Types— ExtremeSwitching X620, X440-G2 N/A
maximum number of unique
IPv6 permit/deny traffic
classification rules types
(ipv6dest).
ONEPolicy Permit/Deny Traffic Summit X450-G2, X460-G2, X670-G2, X770 256
Classification Rules Types— ExtremeSwitching X620, X440-G2 256
maximum number of unique
IPv4 permit/deny traffic
classification rules
(typesipsource / ipdest /
ipfrag / udpsourceportIP /
udpdestportIP /
tcpsourceportIP /
tcpdestportIP / ipttl / iptos /
iptype).
ONEPolicy Permit/Deny Traffic Summit X450-G2, X460-G2, X670-G2, X770 184
Classification Rules Types— ExtremeSwitching X620, X440-G2 184
maximum number of unique
Layer 2 permit/deny traffic
classification rules (ethertype/
port).
OSPFv2/v3 ECMP—maximum Summit X460-G2, X670-G2, X770 16
number of equal cost Summit X450-G2, and ExtremeSwitching X440-G2, X620 4
multipath OSPFv2 and
OSPFv3.

ExtremeXOS Release Notes for version 21.1.5 67


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
OSPFv2 areas—as an ABR, Summit X460-G2, X670-G2, X770 8
how many OSPF areas are Summit X450-G2, ExtremeSwitching X440-G2, X620 4
supported within the same
switch.
OSPFv2 external routes— Summit X770, X670-G2, X460-G2, X450-G2 5,000
recommended maximum ExtremeSwitching X440-G2, X620 2,400
number of external routes
contained in an OSPF LSDB.
OSPFv2 inter- or intra-area Summit X670-G2, X460-G2, X770 2,000
routes—recommended Summit X450-G2, and ExtremeSwitching X440-G2, X620 1,000
maximum number of inter- or
intra-area routes contained in
an OSPF LSDB with one ABR
in OSPF domain.
OSPFv2 interfaces— Summit X450-G2, X460-G2, X670-G2, X770, and 4 (with
recommended maximum ExtremeSwitching X620, X440-G2 Advanced Edge
number of OSPF interfaces on licence)
a switch (active interfaces
only). Summit X450-G2, X460-G2, X670-G2, X770 400 (with Core
license or higher)
OSPFv2 links—maximum Summit X460-G2, X670-G2 400
number of links in the router Summit X450-G2, and ExtremeSwitching X620, X440-G2 4
LSA. Summit X770 419
OSPFv2 neighbors—maximum Summit X770, X670-G2, X460-G2 128
number of supported OSPF Summit X450-G2, and ExtremeSwitching X440-G2, X620 4
adjacencies.
OSPFv2 routers in a single area Summit X770, X670-G2, X460-G2 50
—recommended maximum Summit X450-G2, ExtremeSwitching X440-G2, X620 4
number of routers in a single
OSPF area.
OSPFv2 virtual links— Summit X460-G2, X670-G2, X770 32
maximum number of Summit X450-G2, and ExtremeSwitching X440-G2, X620 4
supported OSPF virtual links.
OSPFv3 areas—as an ABR, the Summit X460-G2, X670-G2, X770 16
maximum number of Summit X450-G2, ExtremeSwitching X440-G2, X620 4
supported OSPFv3 areas.
OSPFv3 external routes— Summit X770, X670-G2, X460-G2, X450-G2 10,000
recommended maximum ExtremeSwitching X440-G2, X620 1,200
number of external routes.
OSPFv3 inter- or intra-area Summit X770, X670-G2, X460-G2 3,000
routes—recommended Summit X450-G2, ExtremeSwitching X440-G2, X620 500
maximum number of inter- or
intra-area routes.

ExtremeXOS Release Notes for version 21.1.5 68


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
OSPFv3 interfaces—maximum Summit X770, X670-G2, X460-G2, X450-G2 4
number of OSPFv3 interfaces. ExtremeSwitching X440-G2, X620 N/A

Note:: Active interfaces limit, with Advanced Edge license.


(See below for Core license limits.)

Summit X770 128


Summit X670-G2, X460-G2 256
Summit X450-G2, ExtremeSwitching X440-G2, X620 4

Note:: With Core license or higher. (See above for Advanced


Edge license limits.)

OSPFv3 neighbors—maximum Summit X770, X670-G2, X460-G2 64


number of OSPFv3 neighbors. Summit X450-G2, ExtremeSwitching X440-G2, X620 4
OSPFv3 virtual links— Summit X770, X670-G2, X460-G2 with Core license or higher 16
maximum number of OSPFv3 Summit Summit X450-G2, ExtremeSwitching X440-G2, X620
virtual links supported. 4
PIM IPv4 (maximum Summit X460-G2, X670-G2, X770 512
interfaces)—maximum number Summit X450-G2, and ExtremeSwitching X440-G2, X620, 4
of PIM active interfaces. (Advanced Edge License)
PIM IPv4 (maximum Summit X450-G2, X460-G2, X670-G2, X770, and 512
interfaces)—maximum number ExtremeSwitching X620, X440-G2
of PIM-snooping enabled
interfaces.
PIM IPv4 Limits—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 180
number of multicast groups ExtremeSwitching X620, X440-G2
per rendezvous point.
PIM IPv4 Limits—maximum Summit X460-G2, X670-G2, X770, X450-G2 5,000
number of multicast sources ExtremeSwitching X440-G2, X620 1,500
per group.
PIM IPv4 Limits—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 145
number of dynamic ExtremeSwitching X620, X440-G2
rendezvous points per
multicast group.
PIM IPv4 Limits—static Summit X450-G2, X460-G2, X670-G2, X770, and 32
rendezvous points. ExtremeSwitching X620, X440-G2
PIM IPv6 (maximum Summit X460-G2, X670-G2, X770 512
interfaces)—maximum number Summit X450-G2, and ExtremeSwitching X440-G2, X620 4
of PIM active interfaces. (Advanced Edge License)
PIM IPv6 Limits—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 70
number of multicast groups ExtremeSwitching X620, X440-G2
per rendezvous point.
PIM IPv6 Limits—maximum Summit X460-G2, X670-G2 2,500
number of multicast sources Summit X450-G2 2,000
per group. Summit X770 2,500
ExtremeSwitching X440-G2, X620 550

ExtremeXOS Release Notes for version 21.1.5 69


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
PIM IPv6 Limits—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 64
number of dynamic ExtremeSwitching X620, X440-G2
rendezvous points per
multicast group.
PIM IPv6 Limits—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 70
number of secondary address ExtremeSwitching X620, X440-G2
per interface.
PIM IPv6 Limits—static Summit X450-G2, X460-G2, X670-G2, X770, and 32
rendezvous points. ExtremeSwitching X620, X440-G2
Policy-based routing (PBR) Summit X450-G2, X460-G2, X670-G2, X770, and 256 o
redundancy—maximum ExtremeSwitching X620, X440-G2
number of flow-redirects.
Policy-based routing (PBR) Summit X450-G2, X460-G2, X670-G2, X770, and 32 o
redundancy—maximum ExtremeSwitching X620, X440-G2
number of next hops per each
flow-direct.
Port-specific VLAN tags— Summit X460-G2, X670-G2, X770 1,023
maximum number of port- Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
specific VLAN tags.
Port-specific VLAN tags— Summit X770, X670-G2 6,400
maximum number of port- Summit X460-G2 4,000
specific VLAN tag ports. Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
Private VLANs—maximum Summit X770 103
number of subscribers. Summit X670-G2 63
Assumes a minimum of one Summit X460-G2 53
port per network and Summit X450-G2 51
subscriber VLAN. ExtremeSwitching X440-G2 47
ExtremeSwitching X620 15
Private VLANs—maximum Summit X770, X670-G2, X460-G2, X450-G2 1,024
number of private VLANs with ExtremeSwitching X440-G2 255
an IP address on the network ExtremeSwitching X620 510
VLAN.

Note:: This limit is dependent


on the maximum number of
private VLANs in an L2-only
environment if the
configuration has tagged and
translated ports.

Private VLANs—maximum Summit X770, X670-G2, X460-G2, X450-G2 1,280


number of private VLANs in an ExtremeSwitching X440-G2, X620 255
L2-only environment.
PTP/1588v2 Clock Ports Summit X770, X460-G2, X670-G2 32 for boundary
ExtremeSwitching X440-G2, X620 clock
1 for ordinary
clock
N/A

ExtremeXOS Release Notes for version 21.1.5 70


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
PTP/1588v2 Clock Instances Summit X770, X670-G2, X460-G2 2 combinations:
• Transparent
ExtremeSwitching X440-G2, X620 clock +
ordinary
clock
• Transparent
clock +
boundary
clock

N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 40 entries per
Slaves clock port
ExtremeSwitching X440-G2, X620 N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 10 entries per
Masters clock type
ExtremeSwitching X440-G2, X620 N/A
Route policies—suggested Summit X460-G2, X670-G2, X770, and ExtremeSwitching 10,000
maximum number of lines in a X620, X440-G2
route policy file.
RIP Learned Routes— Summit X770, X670-G2, X460-G2, and ExtremeSwitching 10,000
maximum number of RIP X440-G2, X620
routes supported without
aggregation.
RIP interfaces on a single Summit X670-G2, X460-G2 256
router—recommended Summit X770, X450-G2 256
maximum number of RIP ExtremeSwitching X440-G2, X620 128
routed interfaces on a switch.
RIPng learned routes— Summit X670-G2, X460-G2, X770, X450-G2 3,000
maximum number of RIPng ExtremeSwitching X440-G2, X620 N/A
routes.
Spanning Tree (maximum Summit X450-G2, X770, X670-G2, X460-G2, and 64
STPDs)—maximum number of ExtremeSwitchingX620 32
Spanning Tree Domains on ExtremeSwitching X440-G2
port mode EMISTP.

ExtremeXOS Release Notes for version 21.1.5 71


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Spanning Tree PVST+— Summit X770, X670-G2, and ExtremeSwitching X620 256
maximum number of port Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2 128
mode PVST domains.

Note:: For all platforms, the


maximum number of active
ports per PVST domain
depends on the maximum
number of spanning tree ports
supported on a given platform.
For example, Summit X670-G2
supports 256 PVST domains
(maximum) and 4,096 STP
ports (maximum), so the
maximum number of active
ports per PVST domain is 16
ports (4096 ÷ 256).

Spanning Tree—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 64


number of multiple spanning ExtremeSwitching X620 32
tree instances (MSTI) domains. ExtremeSwitching X440-G2
Spanning Tree—maximum Summit X770, X670-G2 500
number of VLANs per MSTI. Summit X460-G2, X450-G2 600
ExtremeSwitching X440-G2 256
Note:: Maximum number of 10 ExtremeSwitching X620 600
active ports per VLAN when all
500 VLANs are in one MSTI.

Spanning Tree—maximum Summit X770 1,024


number of VLANs on all MSTP Summit X670-G2 1,000
instances. Summit X460-G2, X450-G2 1,024
ExtremeSwitching X440-G2 512
ExtremeSwitching X620 1,024
Spanning Tree (802.1d Summit X450-G2, X460-G2, X670-G2, X770, and 1
domains)—maximum number ExtremeSwitching X620, X440-G2
of 802.1d domains per port.
Spanning Tree (number of Summit X450-G2, X460-G2, X670-G2, X770, and 4,096
ports)—maximum number of ExtremeSwitching X620 2,048
ports including all Spanning Summit X440-G2
Tree domains.
Spanning Tree (maximum Summit X770, and ExtremeSwitching X620 1,024
VLANs)—maximum number of Summit X670-G2 560
STP-protected VLANs (dot1d Summit X460-G2, X450-G2 600
and dot1w). ExtremeSwitching X440-G2 500
SSH (number of sessions)— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of ExtremeSwitching X620, X440-G2
simultaneous SSH sessions.

ExtremeXOS Release Notes for version 21.1.5 72


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
Static MAC multicast FDB Summit X450-G2, X460-G2, X670-G2, X770, and 1,024
entries—maximum number of ExtremeSwitching X620, X440-G2
permanent multicast MAC
entries configured into the
FDB.
Syslog servers—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 4
number of simultaneous ExtremeSwitching X620, X440-G2
syslog servers that are
supported.
Telnet (number of sessions)— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of ExtremeSwitching X620, X440-G2
simultaneous Telnet sessions.
Virtual routers—maximum Summit X460-G2, X670-G2, X770, X450-G2 63
number of user-created virtual ExtremeSwitching X440-G2, X620 N/A
routers that can be created on
a switch.

Note:: Virtual routers are not


supported on Summit X440
series switches.

Virtual router forwarding Summit X460-G2, X670-G2, X770, X450-G2 960 *


(VRFs)—maximum number of ExtremeSwitching X440-G2, X620 N/A
VRFs that can be created on a
switch.

Note:: * Subject to other


system limitations.

Virtual router protocols per VR Summit X460-G2, X670-G2, X770, X450-G2 8


—maximum number of routing ExtremeSwitching X440-G2, X620 N/A
protocols per VR.
Virtual router protocols per Summit X460-G2, X670-G2, X770, X450-G2 64
switch—maximum number of ExtremeSwitching X440-G2, X620 N/A
VR protocols per switch.
VLAN aggregation—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
number of port-VLAN ExtremeSwitching X620, X440-G2
combinations on any one
superVLAN and all of its
subVLANs.
VLANs—includes all VLANs. Summit X450-G2, X460-G2, X670-G2, X770, and 4,094
ExtremeSwitching X620, X440-G2
Note:: ExtremeXOS supports
only 4,092 user-configurable
VLANs. (VLAN 1 is the default
VLAN, and 4,095 is the
management VLAN, and you
may not configure them.)

ExtremeXOS Release Notes for version 21.1.5 73


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
VLANs—maximum number of Summit X770, X670-G2, X460-G2 4,093
port-specific tag VLANs. ExtremeSwitching X440-G2, X620 N/A
VLANs—maximum number of Summit X460-G2 4,096
port-specific tag VLAN ports. Summit X770, X670-G2 8,192
Summit X450-G2, and ExtremeSwitching X440-G2, X620 N/A
VLANs (Layer 2)—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 4,094
number of Layer 2 VLANs. ExtremeSwitching X620, X440-G2
VLANs (Layer 3)—maximum Summit X460-G2, X770, X670-G2, X450-G2 2,048
number of VLANs performing ExtremeSwitching X440-G2, X620 510
IPv4 and/or IPv6 routing.
Excludes sub-VLANs.
VLANs (maximum active port- Summit X770, X670-G2, X460-G2, X450-G2, and 32
based)—maximum active ExtremeSwitching X440G2 16
ports per VLAN when 4,094 ExtremeSwitching X620
VLANs are configured with
default license.
VLANs (maximum active Summit X450-G2, X460-G2, X670-G2, X770, and 16
protocol-sensitive filters)— ExtremeSwitching X620, X440-G2
number of simultaneously
active protocol filters in the
switch.
VLAN translation—maximum Summit X770 103
number of translation VLANs. Summit X670-G2 63
Assumes a minimum of one Summit X460-G2 53
port per translation and Summit X450-G2 51
member VLAN. ExtremeSwitching X620 15
ExtremeSwitching X440-G2 47
VLAN translation—maximum Summit X770, X670-G2, X450-G2 1,024
number of translation VLAN ExtremeSwitching X620 512
pairs with an IP address on the ExtremeSwitching X440-G2 255
translation VLAN.

Note:: This limit is dependent


on the maximum number of
translation VLAN pairs in an
L2-only environment if the
configuration has tagged and
translated ports.

VLAN translation—maximum Summit X460-G2 2,046


number of translation VLAN Summit X450-G2, X770, X670-G2 1,024
pairs in an L2-only ExtremeSwitching X440-G2, X620 512
environment.

ExtremeXOS Release Notes for version 21.1.5 74


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
VRRP (v2/v3-IPv4) (maximum Summit X770, X670-G2, X460-G2, X450-G2 511
instances)—maximum number ExtremeSwitching X440-G2, X620 128
of VRRP instances for a single
switch, with Advanced Edge
license or higher.

Note:: These limits are


applicable for Fabric Routing
configuration also.

VRRP (v3-IPv6) (maximum Summit X770, X670-G2, X460-G2, X450-G2 511


instances)—maximum number ExtremeSwitching X440-G2, X620 128
of VRRP instances for a single
switch, with Advanced Edge
license or higher. (VRRP-
VRRPv3-IPv6)

Note:: These limits are


applicable for Fabric Routing
configuration also.

VRRP (v2/v3-IPv4/IPv6) Summit X770, X670-G2, X460-G2, X450-G2 and 31


(maximum VRID)—maximum ExtremeSwitching X440-G2, X620
number of unique VRID
numbers per switch. Note:: With Advanced Edge license or higher

VRRP (v2/v3-IPv4/IPv6) Summit X770, X670-G2, X460-G2, X450-G2 and 31


(maximum VRIDs per VLAN)— ExtremeSwitching X440-G2, X620
maximum number of VRIDs
per VLAN. Note:: With Advanced Edge license or higher

VRRP (v2/v3-IPv4/IPv6) Summit X450-G2, X460-G2, X670-G2, X770, and 8


(maximum ping tracks)— ExtremeSwitching X620, X440-G2
maximum number of ping
tracks per VLAN. Note:: With Advanced Edge license or higher

VRRP (maximum ping tracks) Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
—maximum number of ping ExtremeSwitching X620, X440-G2 centisecond or 1
tracks per VRRP Instance second hello
under 128 VRRP instances, interval)
with Advanced Edge license or
higher.
VRRP (v3-IPv6) (maximum Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
ping tracks)—maximum ExtremeSwitching X620, X440-G2 centisecond or 1
number of ping tracks per second hello
VRRP Instance under 128 interval)
VRRP instances, with
Advanced Edge license or
higher.
VRRP (v2/v3-IPv4/IPv6) Summit X450-G2, X460-G2, X670-G2, X770, and 8
(maximum iproute tracks)— ExtremeSwitching X620, X440-G2
maximum number of IP route
tracks per VLAN.

ExtremeXOS Release Notes for version 21.1.5 75


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
VRRP (v2/v3-IPv4/IPv6)— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of VLAN ExtremeSwitching X620, X440-G2
tracks per VLAN.
VXLAN—maximum virtual Summit X670-G2, X770 2,048–4,000
networks. Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, N/A
X620
Note:: Every VPLS instance/
PSTag VLAN reduces this limit
by 1. Assumption is all BUM
(broadcast/unknown-unicast/
multicast) FDB entries are
pointing to the same set of
RTEPs when all VNETs use
explicit flooding. Depends on
whether all VNETs use
standard or explicit and the
number of tenant VLAN ports.

VXLAN—maximum tenant Summit X670-G2, X770 4,096


VLAN plus port combinations Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, N/A
X620
Note:: Every (VPLS/PSTag
VLAN/ TRILL access VLAN) +
port reduces the limit by 1.

VXLAN—maximum static MAC Summit X670-G2, X770 64,000


to IP bindings. Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, N/A
X620
Note:: Every FDB entry
configured reduces this limit
by 1

VXLAN—maximum RTEP IP Summit X670-G2, X770 512


addresses Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, N/A
X620
VXLAN—maximum virtual Summit X670-G2, X770 4,000
networks with dynamic Summit X460-G2, X450-G2, and ExtremeSwitching X440-G2, N/A
learning and OSPF extensions X620
for VXLAN
XML requests—maximum Summit X450-G2, and ExtremeSwitching X440G2, X620 10 with 100
number of XML requests per DACLs
second.

Note:: Limits are dependent on


load and type of XML request.
These values are dynamic ACL
data requests.

ExtremeXOS Release Notes for version 21.1.5 76


Limits

Table 3: Supported Limits (continued)


Metric Product Limit
XNV authentication— Summit X460-G2, X670-G2, X770 2,048
maximum number of VMs that Summit X450-G2, and ExtremeSwitching X440-G2, X620 1,024
can be processed
(combination of local and
network VMs).
XNV database entries— Summit X450-G2, X460-G2, X670-G2, X770, and 16,000
maximum number of VM ExtremeSwitching X620, X440-G2
database entries (combination
of local and network VMs).
XNV database entries— Summit X450-G2, X460-G2, X670-G2, X770, and 2,048
maximum number of VPP ExtremeSwitching X620, X440-G2
database entries (combination
of local and network VPPs).
XNV dynamic VLAN— Summit X450-G2, X460-G2, X670-G2, X770, and 2,048
Maximum number of dynamic ExtremeSwitching X620, X440-G2
VLANs created (from VPPs /
local VMs).
XNV local VPPs—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 2,048 ingress
number of XNV local VPPs. ExtremeSwitching X620, X440-G2 512 egress
XNV policies/dynamic ACLs— Summit X450-G2, X460-G2, X670-G2, X770, and 8 ingress
maximum number of policies/ ExtremeSwitching X620, X440-G2 4 egress
dynamic ACLs that can be
configured per VPP.
XNV network VPPs—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 2,048 ingress
number of XNV network ExtremeSwitching X620, X440-G2 512 egress
VPPs. p

a The table shows the total available.


b Limit depends on setting configured for "configure forwarding external-tables".
c When there are BFD sessions with minimal timer, sessions with default timer should not be used.
d Based on in “none more-l2” mode.
e Based on forwarding internal table configuration "more l2”.
f Effective capacity varies based on actual MAC addresses and VLAN IDs used and hash algorithm selected.
g Based on “l2-only mode”.
h Based on forwarding internal table configuration "more l3-and-ipmc”.
i Based on forwarding external table configuration "l3-only ipv4".
j The limit depends on setting configured with configure iproute reserved-entries.
k Based on forwarding external table configuration "l3-only ipv4”.
l Based on forwarding external table configuration "l3-only ipv6”.
m The IPv4 and IPv6 multicast entries share the same hardware tables, so the effective number of IPv6 multicast entries
depends on the number of IPv4 multicast entries present and vice-versa.
n If IGMP and MLD are simultaneously configured on the switch, the number of effective subscribers supported would
be appropriately lessened.
o Sum total of all PBR next hops on all flow redirects should not exceed 4,096.
p The number of XNV authentications supported based on system ACL limitations.

ExtremeXOS Release Notes for version 21.1.5 77


3 Open Issues, Known Behaviors,
and Resolved Issues
Open Issues
Known Behaviors
Resolved Issues in ExtremeXOS 21.1.5-Patch1-2
Resolved Issues in ExtremeXOS 21.1.5
Resolved Issues in ExtremeXOS 21.1.4-Patch1-7
Resolved Issues in ExtremeXOS 21.1.4-Patch1-6
Resolved Issues in ExtremeXOS 21.1.4-Patch1-3
Resolved Issues in ExtremeXOS 21.1.4
Resolved Issues in ExtremeXOS 21.1.3-Patch1-7
Resolved Issues in ExtremeXOS 21.1.3-Patch1-4
Resolved Issues in ExtremeXOS 21.1.3
Resolved Issues in ExtremeXOS 21.1.2-Patch1-2
Resolved Issues in ExtremeXOS 21.1.2
Resolved Issues in ExtremeXOS 21.1.1-Patch1-5
Resolved Issues in ExtremeXOS 21.1.1-Patch1-2
Resolved Issues in ExtremeXOS 21.1

This chapter lists open software issues, limitations in ExtremeXOS system architecture (known issues),
and resolved issues in ExtremeXOS.

Open Issues
The following are new open issues for supported features found in ExtremeXOS 21.1.5 Patch 1-2.

Table 4: Open Issues, Platform-Specific, and Feature Change Requests (CRs)


CR Number Description
General
xos0067463 Traffic does not distribute across LSPs and LAG after enabling L2VPN sharing
feature.
xos0062584 The command configure web http access-profile is missing the
option access-profile.

xos0062966 When rendezvous point receives (*, G) join, and it has (S, G, RPT) entry, the entry
should be converted to (S, G), and (S, G) join should be sent upstream. However,
sometimes wrong assert is triggered and this new entry is dropped after a minute,
resulting in complete traffic loss.

Workaround: Disable, and then re-enable PIM.

ExtremeXOS Release Notes for version 21.1.5 78


Open Issues, Known Behaviors, and Resolved Issues

Table 4: Open Issues, Platform-Specific, and Feature Change Requests (CRs)


(continued)
CR Number Description
xos0063247 Duplicate packets occur during MLAG link recovery when LACP is used for load
sharing.
xos0063396 While enabling 1G links, unexpected link-down PDU is received in EAPS master.
xos0048715 IPv6 ECMP works for hardware-forwarded traffic, but does not work for slow-path
traffic.

Workaround: Either use BFD to keep all router neighbors alive, or configure static
neighbors and static FDB entries for all router neighbors. BFD is the preferred
method.

xos0062399 IPv6 BFD session for OSPFv3 flaps after disabling, and then enabling VLAN port.
SummitStack
xos0062386 With BGPv6, after port flap or failovers, some peers go into idle state.
xos0061909 Creating an IPFIX mirroring instance to a monitor port, deleting the mirroring
instance, and then recreating it again to a different monitor port, causes the
following error message (similar to the one below) to appear, and IPFIX mirroring
does not work:
<Erro:HAL.Mirror.Error> Slot-1: Failed to create mirroring
destination for slot 2, unit 9 Entry exists

Workaround: If the error appears in the log, disable and delete the mirror instance,
and then add it back again.

ExtremeSwitching X620 Series Switches


xos0062636 Unexpected link switchover behavior occurs when exchanging copper and fiber
cables on ExtremeSwitching X620 combo ports.

Workaround:
• When 10G combo ports are used at 1G for redundancy between fiber and copper,
then set the preferred medium to copper (configure ports
port_list preferred-medium copper), otherwise sometimes the
copper link might not come up.
• When 10G combo ports are used at 10G for redundancy between fiber and
copper, then set the preferred medium to fiber (configure ports
port_list preferred-medium fiber), otherwise sometimes the
copper link might not come up.

xos0062620 For ExtremeXOS 21.1, do not use copper DAC cables for stacking on
ExtremeSwitching X620-16T switches.
Summit X670-G2 Series Switches
xos0063170 On Summit X670-G2 series switches, greater EAPS convergence time occurs with
multiple VLANs (1,000 protected VLANs).
xos0063492 When a 1G port (SX/BASET) is used as a loopback port for mirroring to a port-list,
the port does not come back to active state after disabling mirroring.
Summit X460-G2 Series Switches

ExtremeXOS Release Notes for version 21.1.5 79


Open Issues, Known Behaviors, and Resolved Issues

Table 4: Open Issues, Platform-Specific, and Feature Change Requests (CRs)


(continued)
CR Number Description
xos0063811 Summit X460-G2 series switches with ExtremeXOS 15.6 through 21.1, have the
following limitations for SyncE input reference frequency:
• Network clock does not lock with input SyncE source port 52 (both at 10G and 1G
speed) on all 48-port models (X460-G2-48t, 48x and 48p).

Workaround: For SyncE input at 10G, avoid port 52.

• When the 10G ports operate at 1G speed, the network clock does not lock. Models
with Ethernet BASE-T or Power over Ethernet (PoE) ports may lock on initial
configuration, but do not lock after a save and reboot.

Workaround: For SyncE input at 1G, use a 1G port, not a 10G port.

xos0063412 CFM fault not detected locally after disabling CCM for hardware Down MEP.
ExtremeSwitching X440-G2 Series Switches
xos0062236 EEE becomes disabled on combo ports after peer ports are disabled, and then
enabled.
xos0062773 After switch boot up or restart of process dot1ag, 95% CPU utilization occurs with 32
UP MEPs (maximum value).
xos0062895 On ExtremeSwitching X440-G2 stack, process nettools fails to start after rebooting
with DHCPv6 client enabled. Switch reboots repeatedly and reports the following
errors:
10/20/2015 11:31:06.45 <Erro:EPM.crash_rate> Slot-1: Process
netTools exceeded pre-configured or default crash rate
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-1: Process netTools
Failed
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-1: Process netTools
Failed
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-3: Node State[4] =
FAIL (Not In Sync)
10/20/2015 11:31:06.46 <Erro:DM.Error> Slot-1: Node State[4] =
FAIL (Process Failure)
10/20/2015 11:31:06.61 <Crit:NM.NodeStateFail> Slot-1: Slot-3 has
failed for the reason of "Not In Sync".

xos0062899 DHCPv6 client remains in initializing state after disabling, and then enabling, the port
in the relay switch.

Workaround: Restart process nettools, or disable, and then enable, DHCP client.

xos0063678 In ExtremeSwitching X440-G2 stack, rebooting backup slot with CFM 32 Down MEP
configuration times out with the following errors:
Error: This command is not permitted on nodes that are not active
02/16/2016 15:16:34.06 <Warn:HAL.Stacking.Warning> Slot-1: Timed
out waiting for 1 reboot replies.
02/16/2016 15:16:34.06 <Warn:HAL.Stacking.Warning> Slot-1: Timed
out waiting for 1 reboot replies.

Summit X450-G2 Series Switches


xos0063008 In Summit X450-G2 stack with mirroring configuration, boot up times out (after 300
seconds) while waiting for configuration checkpoint save operation to finish (FDB is
still not saved).

ExtremeXOS Release Notes for version 21.1.5 80


Open Issues, Known Behaviors, and Resolved Issues

Table 4: Open Issues, Platform-Specific, and Feature Change Requests (CRs)


(continued)
CR Number Description
BGP
xos0060641 When BGP is administratively shut down, it does not send notifications to peers.
xos0063778 If an applied BGP import policy is edited such that previously permitted routes are
now denied, the BGP RIB (show bgp routes command) still shows the newly
denied route(s) as active. The routing table is, however, updated correctly to reflect
the new policy.
xos0063698 A BGP route is not replaced in the routing table by a new instance of the same prefix
and length containing a different metric value. This condition can occur if an applied
BGP import-policy file is edited to modify the route metric.
MPLS
xos0062996 VPLS: Traffic is not forwarded to service port (VLAN-tagged port) when CEP egress
filtering is enabled on it.

Workaround: Disable CEP egress filter.

NetLogin
xos0062680 Switch fails to send Radius accounting message for dot1x user after clear
netlogin state port <portNumber> command.
Optics
xos0062092 For Finisar LX-SFP optics, RxPower appears as "inf" instead of displaying correct
value in the output of the show port transceiver information
detail command.
SNMP
xos0062492 Traps having tabular variables as varbinds should include the instance along with the
tabular OID.
xos0062523 SNMP traps for overheat and negative temperatures incorrectly report detected
problems.
xos0062525 extremeEdpNeighborAdded/extremeEdpRemoved traps varbinds need to include
the instance along with the OID.
xos0062527 The varbinds of extremePowerSupplyGood, extremePsuPowerStatus traps need to
include the instance along with the OID.

Known Behaviors
The following are limitations in ExtremeXOS system architecture that have yet to be resolved.

ExtremeXOS Release Notes for version 21.1.5 81


Open Issues, Known Behaviors, and Resolved Issues

Table 5: Known Issues, Platform-Specific, and Feature Change Requests (CRs)


CR Number Description
General
xos0062115 For ExtremeSwitching X440-G2 and X620 series switches, Dot1p is not set properly in the
CVID translated packet.
xos0062068 For extremeErpsRingNodeType, node type of RPL Neighbor returns value "nonRplOwner"
for SNMP get.
xos0062131 In VMANs, CEP port does not transmit ELRP packets, unlike untagged/tagged ports.
xos0062466 For ExtremeSwitching X440-G2 and X620 series switches, VLAN traffic is not dropped if
the port is classified both as VLAN tagged and VMAN CEP port. However, Dot1p value is set
to "0" in egress for all priorities in VLAN traffic.
xos0062119, For ExtremeSwitching X440-G2 and X620 series switches, "qosmonitor congestion
xos0063047 counter" for egress port does not appear in the output of the show ports
qosmonitor congestion command when a port list is specified, instead of a single
egress port.
xos0063413 In Chalet, when switching between earlier versions of ExtremeXOS and version 21.1, the
Apps tab does not appear.

Workaround: Reload the web page or clear the cache.

SSH
xos0063327 If a switch is downgraded from ExtremeXOS 21.1 to previous releases, with RSA key saved,
the key becomes invalid.
VXLAN
xos0060213 Same port cannot be a part of network as well as tenant VLANs.
xos0063148 Rate-limit actions do not work when the port is added as VXLAN tenant on VLAN ports.
xos0059594 Egress mirroring of VXLAN traffic is not supported.
xos0059464 With no network ports configured and the switch receives VXLAN traffic from the access
VLAN side, traffic is sent to the CPU, causing high BCMRx usage (around 50%), which in
turn affects other parts of the system, such as OSPF (neighbor flap), pings etc.
The frames are going to the CPU because they have the MAC DA and Destination IP address
of the local switch. This behavior is no different than if the switch were a non-VXLAN-
capable switch.
By default all ports can terminate VXLAN traffic. If network ports are deleted with
configure virtual-network delete network ports portlist any
VXLAN traffic on these ports is sent to the CPU.
xos0062919 With VXLAN configuration, after rebooting the following error appears:
<Erro:HAL.IPv4Mc.GrpTblFull> IPv4 multicast entry not added. Hardware
Group Table full.

Summits and ExtremeSwitching Series Switches


xos0063046 On ExtremeSwitching X440-G2 and Summit X460-G2 series switches, for the 1G combo
ports if fiber is the preferred medium and a copper cable is inserted, and then a fiber cable
is also inserted, the link switches from copper mode to fiber mode, and a link flap occurs.
Summit X460-G2 Series Switches

ExtremeXOS Release Notes for version 21.1.5 82


Open Issues, Known Behaviors, and Resolved Issues

Table 5: Known Issues, Platform-Specific, and Feature Change Requests (CRs)


(continued)
CR Number Description
xos0062225 For Summit X4460-G2 switches, when HwBFD session is enabled, configuring
authentication is ineffective (session stays up despite a password mismatch between the
neighbors).
Summit X670-G2 Series Switches
xos0062486 For Summit X670-G2 series switches, configuring overhead bytes using configure
forwarding rate-limit overhead-bytes does not work with egress ACL
meter.
SummitStack
xos0062687 For Summit X450-G2 and X620 SummitStacks, after stack reboots, the following error
message appears:
<Warn:DM.Warning> Slot-2: mcmgr cannot write msg_id 5 to MASTER
connection 0
This error can be ignored. No functional problem has occurred.
xos0066970 In the output of the show fan command, the fan tray revision and part number appears
only for first fan tray in stack.

Resolved Issues in ExtremeXOS 21.1.5-Patch1-2


The following issues were resolved in ExtremeXOS 21.1.5-Patch1-2. ExtremeXOS 21.1.5-Patch1-2 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, ExtremeXOS 21.1.3, and ExtremeXOS 21.1.4. For information about those fixes, see the
release notes for the specific release.

Table 6: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.5-Patch1-2
CR Number Description
General
xos0070993 The STP port link-type configuration is not retained when a untagged
port is deleted from a VLAN that is part of an STP domain and then
added in another VLAN that is also part of the STP domain. This results
in the port behaving like a normal STP port, even though the
configuration appears in the output of the "show configuration stpd"
command.
xos0071077 The "tag" match condition is not working with BGP routing policies.
xos0071222 Need a mechanism to suppress generation of IGMP-triggered queries
when receiving STP topology changes.
xos0071340 In the output of show mvrp ports counters event
command, MVRP LeaveAll Tx packets appear as Rx packets.

ExtremeXOS Release Notes for version 21.1.5 83


Open Issues, Known Behaviors, and Resolved Issues

Table 6: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.5-Patch1-2 (continued)
CR Number Description
xos0071450 In the output of show ports command, the usual expression for
excluding “0” entries is not working as expected.
xos0071468 In WMLAG, static MAC address of second peer is not flushed from FDB
table during failures.
xos0071532 EDP process ends unexpectedly with signal 6 when receiving EDP
packets with zero length on the TLV.
xos0071607 Memory leak for process hal occurs after executing command "debug hal
show forwarding distribution".
xos0071654 Process netTools stops responding when CNAME record is present.
xos0071768 With two connected switches with one running ExtremeXOS and one
running EOS, MSTI information is omitted from STP BPDUs sent by the
ExtremeXOS switches.
xos0071869 PIM register policy allows unpermitted group address packets when the
source is in the permitted list.
xos0071872 NetLogin process ends unexpectedly with signal 11 when processing
multiple web authentication requests from the same client.
xos0071877 PTPv2 Layer 2 Sync-E packets are duplicated and therefore egress at
twice the ingress rate.
xos0071912 When using "ipaddress" keyword for DHCP option 78, the DHCP ACK is
sent with an incorrect value.
xos0071076 The command configure tacacs timeout does not take
effect.
xos0071135 Service VMAN packets are being forwarded in slowpath after deleting
VPLS instance.
xos0071686 Nettools process ends unexpectedly with signal 11 when same policy is
applied as user ACL and UDP profile.
xos0071745 Multicast packets are dropped for some sources when the route to the
source network changes.
xos0071862 Need ACL match condition to filter OSPF packet types.
xos0071965 ExtremeXOS switches send BPDUs with sender Bridge-ID when EOS
switches are the root.
xos0070819 Information about PSU fan airflow direction needs to be added to the
show power command.
xos0071730 BFD enabled warning message appears when BFD is re-configured, even
though it is already enabled.
xos0071728 A few MPLS LSPs remain in down state after several link flap events in
LSP path.
SummitStack
xos0071781 New BFD sessions created after stack failover remain in down/initial
state if BFD flaps occur prior to failover.

ExtremeXOS Release Notes for version 21.1.5 84


Open Issues, Known Behaviors, and Resolved Issues

Table 6: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.5-Patch1-2 (continued)
CR Number Description
xos0070018 In the command show checkpoint-data output, need to show
IPML connection status between master and backup in a stack.
xos0071254 Login issues occur when using Telnet to connect to other slots from
master node with RADIUS mgmt-access enabled.
xos0071783 STP process ends unexpectedly with signal 11 when disabling active link
to trigger Backup root.
xos0071107 Uptime is reset after the first failover, but generally is not reset after
subsequent failovers.

Resolved Issues in ExtremeXOS 21.1.5


The following issues were resolved in ExtremeXOS 21.1.5. ExtremeXOS 21.1.5 includes all fixes up to and
including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7, ExtremeXOS 12.2.2-
patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS 12.6.3, ExtremeXOS
12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS 15.2.4.5-Patch1-5,
ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8, ExtremeXOS
15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1, ExtremeXOS
21.1.2, ExtremeXOS 21.1.3, and ExtremeXOS 21.1.4. For information about those fixes, see the release
notes for the specific release.

Table 7: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.5
CR Number Description
General
xos0052545 During failover from EBGP to VPNv4 IBGP route, VPNv4 IBGP route is
removed causing loss in connectivity over L3VPN.
xos0062527 The varbinds of extremePowerSupplyGood, extremePsuPowerStatus
traps need to include the instance along with the OID.
xos0067260 ELRP should detect loops on dynamic VLANs created by Netlogin/Policy,
XNV, and MVRP.
xos0070088 With alternate IP address configuration, MLAG ports are disabled when
other MLAG peer comes up after a reboot.
xos0070165 Timeout error observed in browser, when trying to authenticate more
than one client in Web based Netlogin.
xos0070406 Legacy Nortel phones do not power up with Summit X460-G2 series
switches using legacy detection mode.
xos0070534 The OID extremeImageToUseOnReboot cannot be used to select the
image to be booted on reboot.
xos0070592 OSPF neighborship is not re-established after configuring IP multicast
forwarding option to-cpu to off, and then back on, over the LAG port
in VLAN.

ExtremeXOS Release Notes for version 21.1.5 85


Open Issues, Known Behaviors, and Resolved Issues

Table 7: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.5 (continued)
CR Number Description
xos0070601 When the MAC-locking threshold is set to 0, then the learn-limit-action
(disable port) is not triggered for the second violation.
xos0070775 HAL process ends unexpectedly when executing the configure
access-list delete acl_name all command after
refreshing the ACL.
xos0070786 If jumbo frames are initially enabled on a port, which then becomes a
master port of a load-sharing group, followed by enabling jumbo frames
on all ports, then in the output of the command show
configuration vlan, jumbo-frames are disabled on the slave
ports of the load-sharing group.
xos0070840 With MAC Locking and MAC Lockdown timeout enabled, LAG ports are
not disabled for a second time even after reaching learn-limit.
xos0070841 With MAC Locking and MAC Lockdown timeout enabled, LAG ports are
not disabled even after reaching learn-limit when traffic is received
through member port.
xos0071021 HAL process ends unexpectedly due to memory corruption with eFence
is enabled.
xos0071030 “Ingress Block Port” list is not updated in the kernel for MLAG sharing
port after reboot.
xos0069148 ELRP does not work with NetLogin MAC-based VLANs.

Resolved Issues in ExtremeXOS 21.1.4-Patch1-7


The following issues were resolved in ExtremeXOS 21.1.4-Patch1-7. ExtremeXOS 21.1.4-Patch1-7 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, ExtremeXOS 21.1.3, and ExtremeXOS 21.1.4. For information about those fixes, see the
release notes for the specific release.

Table 8: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.4-Patch1-7
CR Number Description
General
xos0067913 Mac-lockdown timeout does not work with ONEPolicy.
xos0069198 Creating VLANs with reserved keywords using SNMP or Policy Manager
is incorrectly allowed.
xos0069422 Exiting an SSH client session causes the SSH server to unexpectedly
initiate a session close request.

ExtremeXOS Release Notes for version 21.1.5 86


Open Issues, Known Behaviors, and Resolved Issues

Table 8: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.4-Patch1-7 (continued)
CR Number Description
xos0069810 NetLogin Dot1x authentication fails if supplicant response is received
after EAPOL requests expire.
xos0069839 If edge safeguard is enabled on a port before configuring the link type as
edge, then the operational edge status of that port becomes false
resulting in the port behaving like a normal STP port.
xos0070672 HAL process ends unexpectedly when executing "show access-list
counter" after refreshing a user-created policy.
xos0069714 With mac-lockdown timeout enabled, NetLogin-authenticated users are
removed by FDB aging time.
xos0070427 The command show mpls ldp label retained lsp output
should also display the LSR-ID.
xos0070498 Kernel crashes randomly after learning FDB entries with the port
instance of VLAN as null.
xos0070503 A source MAC address is re-added on PSTAG ports if the same MAC
address is arriving on the master and a member of sharing.
xos0070525 Grandmaster clock change takes an excessive amount of time to
propagate in a cascade network.
xos0068900 On the Summit X460-G2 and X450-G2, FDB entries are not removed in
software and hardware after FDB aging time expires.
xos0069875 Warning message that appears when enabling NetLogin MAC in policy
mode needs to be removed.
xos0070016 IP route compression is enabled automatically after configuring an IP
address in a VLAN created over user VR.
xos0070150 Kernel error messages appear after disabling all ports or disabling VRRP.
xos0051464 "The command debug hal configure stacking port
port# [enable|disable] is not working in stacks.

Resolved Issues in ExtremeXOS 21.1.4-Patch1-6


The following issues were resolved in ExtremeXOS 21.1.4-Patch1-6. ExtremeXOS 21.1.4-Patch1-6 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, ExtremeXOS 21.1.3, and ExtremeXOS 21.1.4. For information about those fixes, see the
release notes for the specific release.

ExtremeXOS Release Notes for version 21.1.5 87


Open Issues, Known Behaviors, and Resolved Issues

Table 9: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.4-Patch1-6
CR Number Description
General
xos0048459 ACL Smart refresh does not occur when modifying the rules in an
existing policy.
xos0058443 Unconfiguring BFD VLAN re-configures the default BFD parameter for
the VLAN.
xos0066468 CPU usage spikes for vlan and ipSecurity processes in backup node
when IP security, policy, and NetLogin features are enabled on the same
port.
xos0066935 Files are not deleted in standby nodes after removing files in master
node that were created through "save" operation.
xos0067270 VRRP flap occurs with CPU congestion.
xos0067661 With IP security DHCP-snooping enabled, the client port for DHCP
snooped entry is not checkpointed to the backup node.
xos0068982 In dot1x authentication, EAP request packets are sent without tags even
though port is added as tagged.
xos0069418 Policy, Python, and script files cannot be overwritten using SFTP in
WinSCP client.
xos0069450 Unable to filter link up/down log events based on port number.
xos0069476 A custom user cannot SSH into the switch if agent forwarding is enabled.
xos0069580 The command show configuration bfd shows enable bfd
vlan even though it is not explicitly enabled.
xos0069604 The process rtmgr ends unexpectedly with signal 11 after running
disable/enable ospf in peer switch.
xos0069715 Dynamically assigned IP addresses do not appear when an SNMP walk is
done on OID 1.3.6.1.2.1.4.20 (IPAddrTable).
xos0069716 The IPAddrTable If index entry contains the Index value corresponding to
the Rt-interface, and not to the corresponding VLAN interface.
xos0069755 Disabling an edge port incorrectly triggers a topology change.
xos0069806 Number of simultaneous TCP session should be restricted during web-
based NetLogin authentication.
xos0069808 Kernel crash occurs when processing a IGMP packet with an invalid IP
header length.
xos0069696 Traffic is not forwarded in VPLS tunnel after disable/enable sharing on
VMAN CEP ports.
xos0066886 Continuously, restarting MLAG ports causes brief loops.
xos0069800 After ESRP failover L2VPN session remain in signaling state with ESRP
VPLS redundancy enabled.
xos0069226 Process rtmgr end unexpectedly with signal 11 when deleting, and then
re-creating, the fabric connection.

ExtremeXOS Release Notes for version 21.1.5 88


Open Issues, Known Behaviors, and Resolved Issues

Table 9: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in


ExtremeXOS 21.1.4-Patch1-6 (continued)
CR Number Description
xos0068737 PTPv2 packets are duplicated and egress at twice the incoming rate after
enabling GPTP on the ingress ports.
xos0069998 In rare scenarios, few packet drops occur on front panel 10G ports of
Summit X460-G2 series switches with 99% line-rate traffic.
xos0069691 EXOS-VM displays coreDumpWrite failed error during bootup.
xos0070169 NetLogin Dot1x authentication fails when port is not part of any default
VLAN.
SummitStack
xos0058419 After rebooting a stack, error messages similar to the following appear
for ports belonging to LAGs:
tErro:cm.sys.actionErr> Slot-2: Error while loading
"ports": Speed change is not allowed on port 2:6 as it
is a trunk member port.

xos0069058 LACP packets are sent with VLAN tag 0 from backup node on a
SummitStack.
xos0069823 The output of the show fan command reports 0 RPM for other stack
node’s fans intermittently.

Resolved Issues in ExtremeXOS 21.1.4-Patch1-3


The following issues were resolved in ExtremeXOS 21.1.4-Patch1-3. ExtremeXOS 21.1.4-Patch1-3 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, ExtremeXOS 21.1.3, and ExtremeXOS 21.1.4. For information about those fixes, see the
release notes for the specific release.

Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3
CR Number Description
General
xos0057140 Transceiver information for 40G Q+SR4 optic module shows invalid
power and threshold values.
xos0065665 Incorrect MAC address entries appear in "l2_user_entry" table.
xos0067280 Uploading a file using SFTP creates a read-only file on the switch.
xos0068002 File system check of /dev/hda8 failed error occurs during switch power
cycle after “manufacture-init”.
xos0068304 External PSU status appears as "failed" in show power command
output even though it is not present.

ExtremeXOS Release Notes for version 21.1.5 89


Open Issues, Known Behaviors, and Resolved Issues

Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3 (continued)
CR Number Description
xos0068687 Multicast traffic to host randomly stops when enabling onePolicy with
PVID 4095.
xos0068767 Trap receiver configuration is not saved in ExtremeXOS when configured
from Extreme Management Center.
xos0068785 L2PT packets fail to switch over to backup path during failover.
xos0068810 SNMP walk on entPhysicalClass returns Other(1) instead of Fan(7) for fan
trays.
xos0068840 NetLogin process ends unexpectedly with signal 11, when client sends
logoff message before completing the authentication process.
xos0068911 After enabling STP auto-bind on a VLAN, removing all ports from the
VLAN, and then adding them back, displays STP tag as "(none)" in the
show ports information detail command.
xos0069061 Exsshd process ends unexpectedly with signal 11 during stack failover.
xos0069070 The process BCMAsync stops processing with scaled route/ARP entries
in hash table.
xos0069220 Users can access Chalet by easily guessing the login session ID created
by an existing session.
xos0062256 When auto-polarity is turned off, link comes up for straight cable rather
than crossover connection.
xos0062785 Need a mechanism to avoid configuring static route gateway and local IP
as the same.
xos0062882 Whole MIB compilation gets stuck at EXTREME-V2-TRAP MIB.
xos0065300 Kernel crash occurs when there are continuous new multicast streams
with PIM SM configuration.
xos0067587 When running show tech-support command with user-created
VRs, show configuration command does not display full
configuration.
xos0068888 When the command show tech-support all detail is
executed after running enable cli-config-logging,
messages beginning with "serial unknown" appear in the log. This issue
also occurs when executed from a Telnet session.
xos0069051 After 65,000 new FDB entries are learned, subsequent entries are
continuously added and deleted.
xos0069114 The show configuration command output displays additional
word "minutes" under "aaa" module when lockout-time-period is
configured.
xos0069150 In the output of the show vlan command, ports can have both "!" and
"*" flags set if the port is a share group port.
xos0069180 Cannot configure some IP security features after removing and adding
ports from VLANs.

ExtremeXOS Release Notes for version 21.1.5 90


Open Issues, Known Behaviors, and Resolved Issues

Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3 (continued)
CR Number Description
xos0069196 Inconsistent port learning flag appears in HAL with PVLAN and MLAG
configuration.
xos0069210 Unable to create private VLAN with 32-character name if the first 31
characters match an existing private VLAN name.
xos0069423 When using Chalet to configure the sysContact and sysLocation,
semicolon is not allowed.
Summit X770 Series Switches
xos0069487 HAL process ends unexpectedly with signal 6 when switch boots up with
PTP configurations.
Summit X440-G2 Series Switches
xos0068490 On ExtremeSwitching X440G2-48P/48t switches, cable diagnostic script
(cablediag.py) does not work.
SummitStack
xos0068500 HAL timeout occurs while rebooting the stack using the command
reboot stack-topology.
Security
xos0069306 Session hijacking (CVE-2017-14332): A remote user can hijack a session
on the switch web server due to the SessionIDs used by the webserver
authentication service on ExtremeXOS being insufficiently random. Also,
documented in xos0069140.
xos0069140 The following are ExtremeXOS vulnerabilities due to scripting allowed
when in FIPS mode:
• Escape from EXSH restricted shell (CVE-2017-14331)
• Information disclosure (CVE-2017-14327)
• Privilege Escalation (root interactive shell) (CVE-2017-14329)
• Privilege Escalation (root interactive shell) (CVE-2017-14330)
The following are additional ExtremeXOS vulnerabilities:
• Denial-of-service (CVE-2017-14328). See also xos0069213.
• Session hijacking (CVE-2017-14332). See also xos0069306.
xos0069213 Denial-of-service (CVE-2017-14328): A remote user can force the switch
to reboot by sending a single, specially crafted SOAP packet to the web
server. Also documented in xos0069140.

Resolved Issues in ExtremeXOS 21.1.4


The following issues were resolved in ExtremeXOS 21.1.4. ExtremeXOS 21.1.4 includes all fixes up to and
including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7, ExtremeXOS 12.2.2-
patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS 12.6.3, ExtremeXOS
12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS 15.2.4.5-Patch1-5,
ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8, ExtremeXOS
15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1, ExtremeXOS

ExtremeXOS Release Notes for version 21.1.5 91


Open Issues, Known Behaviors, and Resolved Issues

21.1.2, and ExtremeXOS 21.1.3. For information about those fixes, see the release notes for the specific
release.

Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4
CR Number Description
General
xos0054568 ESVT fails to function with jumbo-sized loopback frames. The show
esvt traffic-test output indicates the test completed
successfully, but no frame counts are indicated.
xos0064727 On DHCPv6 clients, sometimes the IPv6 address is not removed even
after disabling the client, and after rebooting, the IPv6 address is saved
and this causes the client to go into a stopped state with the following
error message appearing:
<Erro:vlan.AddIPAddrFail> Failed to add IP addr
8001::4aa6:dd38:9b32:e7b/128 from DHCPv6 to VLAN client,
DHCPv6 configured IPv6 address already exist on
interface client

xos0064741 After reboot, dirty bit is set without a configuration change if mgmt
VLAN has IP address configured/obtained.
xos0064798 Configured port's STP properties are lost when the port is moved from
one VLAN to another.
xos0065400 VLAN name and tag do not appear correctly when VLAN is created with
VLAN name as "tag".
xos0066782 BFD session ends when removing CVID from a service VMAN port.
xos0066783 Using IDMgr, UPM, and Policy combination makes client not reachable
untill IDMgr settles down.
xos0067063 Rtlookup is not able to display all the ECMP routes.
xos0067161 LACP flap occurs when disabling the mirror on port where LAG is
configured with LACP.
xos0067182 Authentication on switch using RSA keys stops working if one of the user
keys is deleted.
xos0067227 IDMgr entries are not flushed when ARP fast-convergence is on.
xos0067546 EPM process ends unexpectedly when SSH process is restarted while
SNMP query on memory statistics is still in progress.
xos0067704 The process exsh ends unexpectedly after issuing command with include
option that uses # via SSH script.
xos0067739 UDP configuration is lost after reboot with IP DAD enabled.
xos0067822 Memory leak occurs in XMLD process whenever Chalet session refresh
happens.
xos0067824 STP BPDUs are continuously sent after enabling and disabling MSTP on
an STP port.
xos0067841 Packets are dropped at ingress port for traffic at rate greater than 1000
pps when 500 ACL installed

ExtremeXOS Release Notes for version 21.1.5 92


Open Issues, Known Behaviors, and Resolved Issues

Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4 (continued)
CR Number Description
xos0068191 Nettools process ends unexpectedly with signal 11 while rebooting the
switch with 100+ DHCP clients connected via Relay and with Smart Relay
enabled.
xos0068215 Logout dialog box appears even after disabling Netlogin logout-
privilege.
xos0068302 With both HTTP and HTTPS enabled, sending HTTP request from
NetLogin client causes the switch to return with HTTP response instead
of HTTPS.
xos0068323 In ExtremeXOS Python scripting, the argument sent to the command
Exsh.clicmd is replicated 24 times.
xos0068356 Informational messages appear on the console when an NTP-enabled
VLAN becomes inactive.
xos0068556 SSH with command argument as "show commands" is not working with
user account.
xos0068698 In NetLogin web, after you click the logout button, you are not redirected
to a page with the message “You have logged outâ€.
xos0068750 AAA process ends unexpectedly with signal 11 when processing a
corrupted RADIUS-challenge packet.
xos0068752 Kernel crash occurs when processing a packet with an invalid IP header
length.
xos0065167 Add optic support for MGBIC-LC04 Avago HFBR-57E0PZ-EN1.
xos0067807 On BlackDiamond 8800 series switches, the VRRP process monopolizes
40–50% CPU after disable/enable slot, or after <i>restart ports all</i>
when the switch has VRRP enabled on 120 STP-protected VLANs.
xos0064680 STP port-specific configuration is lost after disabling load sharing or
moving the port to a different VLAN.
xos0066366 On VPLS network with LAG on access side, clearing FDB on LSRs and
LERs results in traffic drop.
xos0066483 The encrypted shared secret for TACAS accounting secondary servers
does not appear in the configuration.
xos0067206 Unable to login to Chalet with any account that uses an ampersand (&)
character.
xos0068023 Hash collision warning message appears with invalid VRID when
exceeding L3 hash table limit.
xos0067271 FDB mismatch occurs between software and hardware after deleting,
and then adding, ISC port multiple times.
xos0066726 Hal process ends unexpectedly with signal 11 when trying to add port to
network vlan of pvlan.
xos0067493 PTPv1 packets are dropped on the port if GPTP is enabled on the same
port.
xos0066962 Port does not links up properly with GBIC Source Photonics 100FX
SPGFEFXCDFCCEX.

ExtremeXOS Release Notes for version 21.1.5 93


Open Issues, Known Behaviors, and Resolved Issues

Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4 (continued)
CR Number Description
xos0064790 Number of used "L4 Port Ranges" count is incorrect in show
access-list usage acl-range port output after
unconfiguring few ACL rules with "L4 port range" match condition.
xos0068374 With OSPFv3 16-way ECMP, rtlookup for destination shows multiple
duplicate entries.
xos0068454 In ISP mode, if no ports are associated with the NetLogin VLAN, then the
client cannot access the base URL.
xos0068057 HAL process ends unexpectedly with signal 6 and 11 when deleting and
re-adding subscriber VLAN from private VLAN.
xos0067459 HAL ends unexpectedly with signal 11 while sending L3 known traffic over
PVLAN configuration.
xos0068528 Link issue with 5 meter DAC cable.
xos0065009 The following error message appears when executing show tech
all command from multiple Telnet sessions:
<Crit:DM.InitIPMLSrvrFail> Initialization of the IPML
TCP connection for the Fault Tolerant service the on
port 7750 failed.

xos0065975 Process expy ends unexpectedly with signal 11 when rebooting the switch
after configuring port partition.
xos0067515 VPWS traffic forwarding stops after performing failover in the switch.
Summit X440-G2 Series Switches
xos0068466 "Fan Failures RPM out of Range" messages appear on ExtremeSwitching
X440-G2 series switches.

Resolved Issues in ExtremeXOS 21.1.3-Patch1-7


The following issues were resolved in ExtremeXOS 21.1.3-Patch1-7. ExtremeXOS 21.1.3-Patch1-7 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, and ExtremeXOS 21.1.3. For information about those fixes, see the release notes for
the specific release.

Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7
CR Number Description
General
xos0062758 With policy enabled, client authenticated using NetLogin is not getting
aged out when reauthentication is configured.

ExtremeXOS Release Notes for version 21.1.5 94


Open Issues, Known Behaviors, and Resolved Issues

Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
xos0065527 Edge safeguard configuration gets lost when ports are removed and
added back to default VLAN.
xos0066477 Creating a VLAN starting with "vr" causes syntax recognition problems
with the show iparp vr command.

xos0066557 Kernel crash occurs after removing a subVLAN from one VR and adding
the same subVLAN in another VR.
xos0066932 Actual/configured sFlow sample rates are different after reconfiguring.
xos0066984 RADIUS-accounting request packet shows incorrect account-terminate
reason for user logout from SSH/Telnet session.
xos0066996 ESRP does not update the neighbor state properly while becoming
master from neutral state.
xos0067002 UPM status is "fail" if UPM profile has <i>save configuration as-script</i>
as the last command.
xos0067079 ACL installation for the policy authenticated client is failing when diffserv
replacement and meter configuration is present in the switch.
xos0067108 Packets received on STP blocked ports gets forwarded to other STP port
when netlogin & onePolicy is enabled with authentication mode optional.
xos0067323 FDBs are learned on incorrect VPLS peer on PE switches after include/
exclude dot1q tag in P switch.
xos0067325 After recovering from multiple link failures, ERPS incorrectly keeps both
the ring links in blocked state.
xos0067335 Memory leak occurs in VMT process when it is enabled on the port.
xos0067463 Traffic does not distribute across LSPs and LAG after enabling L2VPN
sharing feature.
xos0067506 A few VRRP instances remain in dual master state if VRRP state changes
for several VLANs in the same VRID within a short time period.
xos0067820 ExtremeXOS refuses connections with usernames starting with letters h,
i ,j, k, p, q, r, and s using SOAP/XML.
xos0067887 Switch reboots unexpectedly when there are continuous SSH attempts
and those attempts are rejected with access-profile.
xos0067912 The command show port protocol filter displays the
"Error: Configuration reply is too big" in output.
xos0068209 PIM process ends unexpectedly with signal 11.
xos0066941 Add a support for USB Zero Touch Provisioning.
xos0067583 Add support to configure ping success for VRRP track-ping.
xos0067973 After run failover, IDM kerberos system ACLAs are missing for some users
in new master.
xos0059947 Spurious log messages occur in the hardware while deleting tenant
VLAN in the switch.

ExtremeXOS Release Notes for version 21.1.5 95


Open Issues, Known Behaviors, and Resolved Issues

Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
xos0065930 ACLCBFUNC log occurs after associating a policy that has CLEAR-flow
and network-zone configuration.
xos0066883 Process HAL ends unexpectedly with signal 11 on restarting all ports with
basic VXLAN configuration.
xos0066921 ARP fails to resolve for some hosts.
xos0067084 FDB is not learned over pseudowire after disabling, and then enabling,
learning on network VLAN ports.
xos0068099 After rebooting the switch, BGP neighbor configuration is lost when a
peer group is configured.
xos0067087 CFM LMR/DMR packets are sent with dot1p value 0.
xos0065571 Ping fails over L3VPN tunnel when the corresponding ARPs are in Layer
3 hardware hash table as "Extended View". Affects Summit X450-G2,
X670-G2, and X770 platforms.
xos0060343 On Summit X670v stack, configuration file replication on standby nodes
times out after second or third failover.
xos0067106 In dot1x authorization, service unavailable vlan port is re-authenticated in
every authorization causing blocked port.
xos0063669 Erro:RtMgr.Client.ReplyTimeOut messages appear after run failover/
reboot:
<Warn:EPM.hello_rate> Slot-2: Received hellos from
process rtmgr 2 more often then expected 3
<Erro:RtMgr.Client.ReplyTimeOut> Slot-2: Client with
ID=0x00000012 Timed out waiting for (ADDUPDRTE).
<Erro:RtMgr.Client.ReplyTimeOut> Slot-2: Client with
ID=0x00000012 Timed out waiting for (RTEGET).

xos0067446 "ACL filter update failed" error occurs when modifying the code point
value.
xos0066963 Jumbo frame is disabled on master port after rebooting when ports are
partitioned.
xos0062668 MIB compilation issues occur with VLAN MIB when using mgsoft.
xos0066697 Delay occurs in password prompt appearing when trying to establish
SSH connection.
xos0064870 Slots fail sometimes when applying PVLAN and STP configuration.
Summit X440-G2 Series Switches
xos0066945 On Summit X440-G2 series switches, 10G ports are not coming up with
5-meter passive copper cable when connected to ExtremeSwitching
X620-16X.
Summit X670-G2 Series Switches
xos0066844 Port with copper SFP inserted appears as active even if it is
administratively disabled.

ExtremeXOS Release Notes for version 21.1.5 96


Open Issues, Known Behaviors, and Resolved Issues

Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
SummitStack
xos0058499 In SummitStack, the snmpEngine values are maintained in each node
separately instead of a single value, which is causing different values on
each failover.

Resolved Issues in ExtremeXOS 21.1.3-Patch1-4


The following issues were resolved in ExtremeXOS 21.1.3-Patch1-4. ExtremeXOS 21.1.3-Patch1-4 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1,
ExtremeXOS 21.1.2, and ExtremeXOS 21.1.3. For information about those fixes, see the release notes for
the specific release.

Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4
CR Number Description
General
xos0052786 BGP aggregation command demands global unicast addresses (GUA)
and does not work with IPv6 unicast addresses.
xos0054222 Unable to add second IPv6 address prefix to the network-zone after
adding IPv4 address.
xos0064727 On DHCPv6 clients, sometimes the IPv6 address is not removed even
after disabling the client, and after rebooting, the IPv6 address is saved
and this causes the client to go into a stopped state with the following
error message appearing:
<Erro:vlan.AddIPAddrFail> Failed to add IP addr
8001::4aa6:dd38:9b32:e7b/128 from DHCPv6 to VLAN client,
DHCPv6 configured IPv6 address already exist on
interface client

xos0065654 Etmon process ends unexpectedly with signal 10 when packet size in
sampled packet is a negative integer.
xos0066072 The command configure ports rate-limit flood
out-actions disable-port does not take effect until the
command clear meter out-of-profile is executed.

xos0066444 Kernel error "Unable to copy IPMC index" appears in MLAG peers with
PIM dense mode.
xos0066590 In an MLAG peer when its MLAG port is down, the following error
appears: "Group <ip> not found for VLAN".

ExtremeXOS Release Notes for version 21.1.5 97


Open Issues, Known Behaviors, and Resolved Issues

Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0066770 Memory leak occurs in aaa process when NetLogin dot1x client times out
or authentication fails for the client.
xos0066775 Configured peer group capabilities and policies are not reflected after
creating a new BGP neighbor.
xos0066874 Memory leak observed in AAA process when dot1x clients are
authenticated frequently.
xos0066923 Need commands to configure "reload-delay" timer for MLAG ports.
xos0066931 Exsshd process consumes ~90% CPU when the command clear
session is executed for the open SSH sessions.
xos0066982 In NetLogin dot1x, RADIUS retries are not working properly.
xos0067055 Log message "Process exsshd sends hello too often" appears when SSH
is enabled in the switch.
xos0067076 NetLogin process ends unexpectedly while fetching the client details
using SNMP MIB etsysMACAuthenticationMACSession and it happens
only when there is MAC move observed for the clients.
xos0067194 Topology change notification is not generated for the STP domain dot1d
mode when there is change in the topology.
xos0067203 Multicast packets are being flooded on EAPS blocked port while
removing and adding the ports configured with PSTAG.
xos0064672 Incorrect state observed for DHCPv6 client when restarting the nettools
process or rebooting the switch.
xos0066489 Loop occurs in ERPSv2 setup after rebooting one of the interconnecting
nodes.
xos0066490 ERPS in non-RPL nodes remains in pending state after rebooting
interconnection node.
xos0062966 When rendezvous point receives (*, G) join, and it has (S, G, RPT) entry,
the entry should be converted to (S, G), and (S, G) join should be sent
upstream. However, sometimes wrong assert is triggered and this new
entry is dropped after a minute, resulting in complete traffic loss.

Workaround: Disable, and then re-enable PIM.

xos0066012 ExtremeXOS MIBs have non-compilable errors.


xos0066030 L2PT is not working properly after path switchover in VPWS.
xos0066386 The show configuration commands stops responding and
produces an error when there is a loop in the network.
xos0066518 LLDP packets are reflected back to the sender without echo kill in
PVLAN.
xos0066813 Service VLAN ARP packets are lifted to the CPU during MPLS swap
operation when service a VLAN is configured with the IP address of the
provider switch.

ExtremeXOS Release Notes for version 21.1.5 98


Open Issues, Known Behaviors, and Resolved Issues

Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0066891 Packets are being forwarded without a tag after rebooting when PSTAG
configured. This issue occurs when VLANs are configured with VID as "1".
xos0066926 Errors occur when configuring OpenFlow in passive mode.
xos0066950 Hash collision error messages may appear when there is contention for
the L3 Hash table:
<Warn:Kern.IPv4Adj.Warning> vrId 0 adj 0x00000002 Error
finding adjacency when deleting hash collision.

xos0066986 OSPF E1 routes in NSSA area are removed/not updated properly in the
routing table
xos0067048 Multicast traffic is not forwarded on PStag ports when port is also added
as part of another non-PStag VLAN.
xos0067138 BFD is not working for IP static multicast route.
xos0066774 IPv6 flow redirect does not work after slot is disabled, and then enabled
again.
xos0066040 Error message appears when adding a CEP port to a VMAN:
<Erro:HAL.MPLS.Error> pibAddCVIDMappedServices: vlan
1000 tagged 0 cepPvid 100

xos0066667 With VPLS, multicast traffic for service VLAN is dropped after disabling
and enabling the LAG ports if same port is configured as untagged in
VMAN and tagged in VLAN.
xos0063856 On enabling SSH2, switch displays key generation time as approximately
15 minutes whereas it actually takes less than one minute.
xos0067328 If you load a configuration file containing an SSH key length lesser than
the actual key size stored in the switch EEPROM, the following message
appears during bootup: "Enter passphrase:".
xos0063261 Warning message to "restart process exsshd" should appear when
configuring SSH2 key.
xos0066406 Scaled PStag configuration with non-PStag VLANs causes PStag error
messages and installation of additional IPMC rules.
NWI Series Switches
xos0066301 Transceiver is not detected on NWI platforms.
SummitStack
xos0067096 Multicast traffic is dropped on front panel port 1:1 when management
port goes down on stacking switch.
xos0067253 IPv4 packets ingressing a non-master stack node can be dropped when
the port number of the destination's ARP entry is unknown, such as
when the destination is using Network Load Balancing (NLB).
xos0066423 In SummitStacks, with policy re-authentication and continuous MAC
move scenarios, ACL delete requests are failing in backup node.
Summit X460-G2 Series Switches

ExtremeXOS Release Notes for version 21.1.5 99


Open Issues, Known Behaviors, and Resolved Issues

Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0057796 Power is momentarily denied to PoE devices connected on ports when a
redundant PSU is inserted.
xos0067077 In Summit X460-G2 alternate stacks, 10G links from the VIM-2T module
of the backup slot go down after saving, and then rebooting.
Summit X770 Series Switches
xos0053091 In Summit X770 series switches, additional link flaps occur on 40G ports
after reboot.

Resolved Issues in ExtremeXOS 21.1.3


The following issues were resolved in ExtremeXOS 21.1.3. ExtremeXOS 21.1.3 includes all fixes up to and
including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7, ExtremeXOS 12.2.2-
patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS 12.6.3, ExtremeXOS
12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS 15.2.4.5-Patch1-5,
ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8, ExtremeXOS
15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1, and ExtremeXOS
21.1.2. For information about those fixes, see the release notes for the specific release.

Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3
CR Number Description
General
xos0052432 Need provision for advertising/receiving unique local IPv6 unicast address
(ULA) using BGP protocol.
xos0062037 DHCP snooping entry gets programmed without client port number.
xos0063551 SNMP polling on CFM segment frame-delay statistics returns incorrect
values.
xos0064923 When a remote loop is detected by ELRP (ingress and egress port of loop
detection is the same) an excessive number of log messages occur.
xos0065210 With account lockout feature configured, an appropriate log message is
not generated when users are locked out after three unsuccessful login
attempts.
xos0065313 Need Idle-timeout feature added to Chalet.
xos0065321 With SSH session, source address information is not sent to TACACs
accounting server.
xos0065479 A CLI option is needed to save the state of whether or not the following
traps are enabled for cfgMgmtConfigChangeTrap and
cfgMgmtSaveConfigTrap.
xos0065525 Need modifications in port ID TLV. Device ID TLV is sent in CDP messages.

ExtremeXOS Release Notes for version 21.1.5 100


Open Issues, Known Behaviors, and Resolved Issues

Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0065552 RADIUS-accounting request packet shows incorrect reason for client
termination.
xos0065615 Local multicast traffic is not egressing using a newly added member port
in a LAG.
xos0065805 Constant flush happens in ERPS non-revertive mode when the port being
blocked is non-RPL.
xos0065830 After port flaps, OSPF-learned routes are not present in kernel database.
xos0065896 Need addition of capability flags in show cdp neighbor command
output.
xos0065897 When continuous SSH attempts are made to a switch, exsshd process ends
unexpectedly with signal 6.
xos0065943 SNMP walk for extremePortUtilizationTable returns integer value, but CLI
output returns decimal value.
xos0065987 Service port FDB entries are learned on physical port of Network VLAN in
provider switch.
xos0066060 OpenFlow error message appears when rule is not getting installed in
hardware and same flow is received immediately for another installation.
xos0066156 Switch reboots unexpectedly due to memory leak in dot1ag process.
xos0066231 With default NetLogin configuration, extremeNetloginuser login and
logout traps are not sent.
xos0066323 When MLAG is configured with alternate path and ISC link goes down, a
peer down log message is not generated.
xos0066325 When MLAG is configured with alternate path and primary path goes
down, SNMP trap for ExtremeMlagPeerDown object is not generated.
xos0066345 XMLC process ends unexpectedly with signal 6 when sending XML
notification to Ridgeline server.
xos0066367 Need to have a "clear" command to change ERPS ring state from
"pending" to "idle" state.
xos0066398 COA disconnects are incorrectly logged as idle timeouts in EMS.
xos0066626 NetLogin process ends unexpectedly with signal 11 when RADIUS accept
packet contains MS-ipv4-remediation-servers attribute with an incorrect IP
address.
xos0066758 SSH login fails in first attempt, but succeeds in the second attempt, during
RADIUS authentication even if credentials are valid.
xos0066804 Routes learned from OSPF are lost after multiple port flaps occur.
xos0064025 Need to support Methode SP7051-EXT 10Gb-T RJ45 transceiver.
xos0064138 Client identifier option length in DHCPv6 solicit packet is 16 instead of 14
with Link layer address padded with zeroes.

ExtremeXOS Release Notes for version 21.1.5 101


Open Issues, Known Behaviors, and Resolved Issues

Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0066224 User name is missing from output of show log command for NetLogin
users when they are cleared by link down/restart process NetLogin event
immediately after reboot.
xos0066610 Error "Cannot open Python script" appears after executing a Python script
stored under a user-created subdirectory.
xos0051490 External LSA generated by an ASBR in NSSA area contains wrong
forwarding address.
xos0063959 BGP routes become unfeasible when default routes are advertised through
OSPF or BGP.
xos0064874 Tagged frames should be processed for authentication with NetLogin and
policy enabled.
xos0065372 MPLS error messages occur after disabling, and then enabling network
VLANs.
xos0065490 IGMP packets are forwarded over EAPS-blocked ports when PSTAG is
configured on protected VLANs.
xos0065648 When a MAC address moves from a NetLogin-enabled port (mac-vlan
mode) to a non-NetLogin-enabled port, the VLAN_MAC table can become
full resulting in the following message:
amp;ltWarn:HAL.FDB.MacVlanAddFail&amp;gt MAC-based VLAN
entry 78:7E:61:A1:DC:DC vlan 2600 addition to port 22
failed, Table full

xos0065742 SNMP traps are not generated for BGP state change events.
xos0065977 Random Nettools process ends unexpectedly with Signal 5 when router
discovery and DNS is enabled.
xos0066029 In Summit X460-G2 stacks, LACP keeps flapping due to forwarding one
LACP PDU to another group.
xos0066476 MPLS label TTL is not set properly for VPLS traffic in RSVP-TE.
xos0066772 Local multicast fast-path forwarding does not work for a few ports when
IGMP filter is in per-VLAN mode.
xos0066018 When VPLS service VLAN port is added to a VMAN as untagged, VPLS
service VLANs L2 traffic is forwarded into VMAN.
xos0066089 HAL process ends unexpectedly when a port is configured with
ipmcforwarding to-cpu off and it is not added to any VLAN.
xos0061317 Switch reboots unexpectedly when enabling FIP snooping.
xos0065159 OpenFlow process ends unexpectedly with signal 11 when OpenFlow
controller installs LLDP flow.
xos0060485 MPLS process ends unexpectedly with signal 11 when changing the LSR ID.
xos0066036 Kernel crash occurs when sending multicast traffic over Private VLAN.
xos0066759 Switch stops to transmit CPU-generated packets when slow path
forwarded packet rate is high.

ExtremeXOS Release Notes for version 21.1.5 102


Open Issues, Known Behaviors, and Resolved Issues

Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0060461 Need command option for iBGP and eBGP protocolS under the
configure iproute ipv6 priority command.
xos0066004 When using the same debug password on different Telnet sessions of
same switch, cliMaster process ends unexpectedly.
xos0059489 ERPS process ends unexpectedly when ERPS tries to send hello packet
during reboot.
xos0065326 Multicast packet are dropped after enabling diffserv examination, with
hardware BFD assist causing OSPF and MPLS adjacency drops.
xos0065845 Traffic drops between the CVID configured ports in the VPLS service
VMAN when CEP egress filtering is enabled.
xos0066140 RSTP BPDU is not transmitted even though STP state is in forwarding
mode when loop-protect is enabled.
xos0065920, xos0065764 Link status goes to Ready state on port with 10/100/1000BASE-T optics
after multiple reboots.
xos0065962 OTM process ends unexpectedly when creating, and then deleting, 700
VXLAN segments.
xos0063806 After establishing SSH session with switch for some time, SSH login fails
and the command show management becomes unresponsive.

xos0065712 When repeated login and logout is performed using SSH-PKI (SSH login
using certificates) for about two days from eight terminals, memory leak
occurs.
xos0066837 When the switch is rebooted, the edge port gets blocked even though the
STP domain is disabled.
xos0066895 ELRP process ends unexpectedly when loop is detected in the switch.
xos0066806 PIM checkpointing loop occurs between two switches that have two ISCs
over two VRs.
SummitStack
xos0065387 SNMP times out while when saving on an eight-node stack of Summit
X440 series switches.
xos0065756 In SummitStacks, alternate IP address is used for external communication
even though a Management IP address is configured.
xos0066008 Random slots or whole stack reboots when one of the standby nodes in
the stack is power cycled with sys-recovery-level configured as
"shutdown".
xos0066085 Restart of some processes does not work properly when the standby slot
has a lower license level.
xos0065972 HAL process ends unexpectedly with signal 6 when rebooting stacks with
virtual MAC configuration for ESRP.
xos0066104 In SummitStacks, memory leak occurs in backup slot when configuring
LLDP to advertise power-via-mdi with classification.
xos0066331 Layer 3 traffic is not forwarded after multiple stack failovers.

ExtremeXOS Release Notes for version 21.1.5 103


Open Issues, Known Behaviors, and Resolved Issues

Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0065507 Hal process ends unexpectedly when failover is executed with 4,000
virtual networks, and tenant VLAN and traffic are sent with incremental
MAC addresses.
xos0065150 When LAG ports are added to VPLS, LACP flap occurs after rebooting the
slots in the stack.
ExtremeSwitching X620 Series Switches
xos0064012 In ExtremeSwitching X620 series switch, non-combo ports remain in down
state after multiple reboots.

Resolved Issues in ExtremeXOS 21.1.2-Patch1-2


The following issues were resolved in ExtremeXOS 21.1.2-Patch1-2. ExtremeXOS 21.1.2-Patch1-2 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3, ExtremeXOS 21.1.1, and
ExtremeXOS 21.1.2. For information about those fixes, see the release notes for the specific release.

Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2
CR Number Description
General
xos0065393 Memory leak occurs in HAL process after FDB entries age out.
xos0065519 Loops may occur in network after the performing the following specific
sequence:

1 Enable STP in any VLAN with specific set of ports.


2 Delete all ports from that VLAN.
3 Add same set of ports to another VLAN.
4 Enable EAPS/ESRP/STP protocol on this new VLAN.

xos0054151 DHCP server configuration is lost after reboot when IP DAD is on.
xos0061948 VLAN statistics not working after modifying the shared group.
xos0062722 NetLogin does not work after a port moved to translation VLAN expires.
xos0063194 Dot1x authentication fails after rebooting the client when it is connected
via IP phone.
xos0063326 Need to reduce the severity of "BGP resource full" message from Error to
Info.
xos0063424 Source MAC address is learned on the incorrect VLAN for double-tagged
packets with inner VLAN ID that is the same as the VPLS service VLAN ID.

ExtremeXOS Release Notes for version 21.1.5 104


Open Issues, Known Behaviors, and Resolved Issues

Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2 (continued)
CR Number Description
xos0063509 Controlling trap behavior is not working in NetLogin.
xos0064023 L3 table full log appears because of false resource full triggered by link
flaps.
xos0064501 Lacking forbidden VLAN concept in OnePolicy feature.
xos0064706 Cannot use SSH client after using "vi script.py" or "load script script".
xos0064707 Error message from the load script command does not indicate that
Python is a supported script language.
xos0064841 LLDP stops advertising VLAN information on port after enabling LAG.
xos0064889 Layer 3 traffic through an MLAG peer in a failed state is not forwarded
when there is a state change in the EAPS ring where this MLAG peer is a
transit node.
xos0064904 With a frequent re-authentication period set (>= 30 seconds), NetLogin
process leaks memory.
xos0064984 Kernel oops occurs randomly when continuous SSH connection attempts
are made to the switch.
xos0065005 Rtmgr process ends unexpectedly some times during frequent route
transitions with Multicast, MPLS, and OSPF routes.
xos0065056 After applying meter to multiple VLANs, switch stops responding after
executing show access-list meter vlan.

xos0065104 FDB is not removed from software after ageing period.


xos0065109 Packets with DMAC as multicast MAC and DIP as unicast IP are software
forwarded when IGMP filter mode is per-VLAN.
xos0065110 Creating one VLAN starting with "vr" causes the show iproute vr
vr-mgmt command to not recognize "vr-mgmt in the syntax.
xos0065120 Configuring port display-string with special characters causes page
loading issues on Chalet.
xos0065197 Rtmgr process ends unexpectedly with signal 11 after issuing restart
ports all command in peer switch with BGP enabled.
xos0065215 Slow xmld process memory leak occurs when EPIC center polling the
switch.
xos0065218 DHCP binding restoration fails if file name is configured with directory
name.
xos0065226 When Extreme Network switch is acting as a DHCP server, the default-
gateway address is sent as the DNS server address even if it has been
configured on the switch.
xos0065261 Traffic loss occurs in one VLAN when another VLAN with a loop causes
significant congestion.
xos0065301 FDB entries are not programmed in the hardware as programmed in the
software.
xos0065308 Kernel crash occurs when unconfiguring switch with maximum ACL rules.

ExtremeXOS Release Notes for version 21.1.5 105


Open Issues, Known Behaviors, and Resolved Issues

Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2 (continued)
CR Number Description
xos0065322 IPv6 neighbor-discovery max_pending_entries configuration for USER-VR
does not appear in output of show configuration command and is
lost after reboot.
xos0065344 The output of the show vid command shows flag status incorrectly.

xos0065661 IPMC error messages occur when multicast cache entries are created/
deleted for sub-VLAN, when sub-VLAN and super-VLAN belong to
different virtual routers.
xos0065677 With harmless ECC single-bit errors, Kernel error logs "ERROR
PBANK_LSB".
xos0065542 Kernel crash occurs when rebooting the switch with a physical loop.
xos0065871 LLDP process ends unexpectedly with signal 6 when doing SNMP walk for
lldpXMedLocLocationTable.
ExtremeSwitching X440-G2 Series Switches
xos0064801 In ExtremeSwitching X44-0G2 series switches, the output of the <i>show
temperature</i> command displays incorrect value..
ExtremeSwitching X620 Series Switches
xos0065079 ExtremeSwitching X620 series switches show external PSU as always
powered off.
SummitStack
xos0065157 In SummitStacks with remote mirroring configurations, the remote-tag is
not added for software-forwarded packets.
xos0064758 In SummitStacks, when doing SNMP walk for LLDP MIB, port number does
not represent the ifIndex or dot1dBasePort number.
xos0065088 With broadcast traffic flooded across the slots, the standby node stays in
rebooting state after consecutive master failovers by cycling the power off,
and then on.
xos0065071 When backup node is in failed state due to license mismatch, master node
CPU utilization spikes to 100% and stops responding.

Resolved Issues in ExtremeXOS 21.1.2


The following issues were resolved in ExtremeXOS 21.1.2. ExtremeXOS 21.1.2 includes all fixes up to and
including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7, ExtremeXOS 12.2.2-
patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS 12.6.3, ExtremeXOS
12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS 15.2.4.5-Patch1-5,
ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8, ExtremeXOS
15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3 and ExtremeXOS 21.1.1. For
information about those fixes, see the release notes for the specific release.

ExtremeXOS Release Notes for version 21.1.5 106


Open Issues, Known Behaviors, and Resolved Issues

Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2
CR Number Description
General
xos0055511 While configuring STP (802.1d) with port-encapsulation mode as EMISTP
where the L2PT-enabled VMAN and access VLAN have the same tag, the
designated bridge is not accepting the L2PT tunneled BPDUs from the
root bridge, and thus causes a loop (designated bridge also becomes a
root bridge).
This problem does not occur:
• When the access VLAN's tag and the L2PT-enabled VMAN's tag are
different.
• Without any L2PT configured, with the same tag used for the access
VLAN and provider-edge VMAN.
• When using Per-VLAN Spanning Tree Plus (PVST+), regardless of same
or different tags.

xos0058668 After rebooting DHCPv6, client remains in rebooting state.


xos0061359 Policy has no PVID after unconfiguring the switch.
xos0062850 When upgrading ExtremeXOS to 15.7 or later releases, the web HTTP
access is enabled even though it is disabled in the configuration.
xos0063183 Chalet's web login requires RADIUS Netlogin to be enabled for RADIUS
authentication to succeed when only Mgmt-Access should be required.
xos0063190 Session timeout value is inappropriately overwriting the idle time-out
value whenever both session timeout and idle timeout values are same, or
the idle timeout value is 0.
xos0063331 VLAN IP address is unconfigured when modifying the VLAN name/port
information from Chalet.
xos0063554 The following vulnerability in OpenSSL exists that impacts ExtremeXOS
(CVE-2015-3197): A malicious client can negotiate SSLv2 ciphers that have
been disabled on the server and complete SSLv2 handshakes even if all
SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was
not also disabled via SSL_OP_NO_SSLv2. This issue affects OpenSSL
versions 1.0.2 and 1.0.1.
xos0064029 Cannot delete prefixes for VLAN router advertisement messages after
setting them.
xos0064043 Unable to use a configuration file that has been copied from an existing
configuration file.
xos0064100 With policy enabled, switch reloads with kernel oops when deleting a port
from a VLAN that also has the same port added to PSTag.
xos0064216 Unable to ping a destination which is reachable, if the destination is also
present locally but disabled.
xos0064220 Calling-station-id attribute is missing in the RADIUS request for mgmt-
access.
xos0064240 No log message appears by default when a BGP peer transitions to
established or from the established state.

ExtremeXOS Release Notes for version 21.1.5 107


Open Issues, Known Behaviors, and Resolved Issues

Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0064436 When adding ports to VLAN from Chalet, IPforwarding gets disabled for
that VLAN.
xos0064447 Creation of user accounts through XML does not work.
xos0064459 Nettools process ends unexpectedly with signal 11 when processing router
advertisement packets with DNSSL option.
xos0064682 Enabling egress VMAN CEP filtering on a CEP port sends a tagged packet,
even though it should be forwarded as untagged.
xos0064863 Hostname is not getting resolved via DNS while initiating SSH/SCP/TFTP
from switch.
xos0064956 EDP neighbors are not displayed when remote mirroring is disabled or
after unconfiguring a monitor port of remote mirroring.
xos0064960 Multicast traffic is forwarded through MVR receiver port in a VLAN even if
there is no active receiver.
xos0065189 BGP secondary best path is not active when primary best path goes down.
Summit Series Switches
xos0058437 For Summit X460 and X670-G2 series switches, the buffer for Weighted
Random Early Detection (WRED) queues is incorrectly allocated at 10% of
shared memory plus minimum guarantee, when it should be 100% of
shared memory plus minimum guarantee.
xos0062972 Add Support for the following optics on Summit X670-G2 and X770 series
switches:
• 10329, 908618-10, 40Gb BiDi QSFP+
• Avago AFBR-79EBPZ-EX1 optic transceiver
xos0064232 On some systems, after changing a VPWS service VLAN tag, traffic
continues to be forwarded with the prior tag.
Summit X620 Series Switches
xos0062729 On Summit X620 series switches, for ports with Base-T SFP optics and
explicitly configured at 1,000 speed, link comes up at peer end, but link
stays down at local end after either rebooting, or removing, and then re-
inserting optics.
xos0062890 On Summit X620 series switches, 100 mbps SFPs (100FX, FX/LX, BASET)
fail to link on reboot.
Summit X440-G2 Series Switches
xos0062583 Policy: Dynamic VLAN is not removed from backup slot after issuing
unconfigure policy maptable.
Summit X460-G2 Series Switches

ExtremeXOS Release Notes for version 21.1.5 108


Open Issues, Known Behaviors, and Resolved Issues

Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0063811 Summit X460-G2 series switches with ExtremeXOS 15.6 through 21.1, have
the following limitations for SyncE input reference frequency:
• Network clock does not lock with input SyncE source port 52 (both at
10G and 1G speed) on all 48-port models (X460-G2-48t, 48x and 48p).
• When the 10G ports operate at 1G speed, the network clock does not
lock. Models with Ethernet BASE-T or Power over Ethernet (PoE) ports
may lock on initial configuration, but do not lock after a save and
reboot.

xos0063960 Several help options do not appear for the show fdb command.

Summit X670-G2 Series Switches


xos0064568 Traffic drop occurs on VPLS service VLANLAG port after slot reboot.
xos0064537 Randomly, rtmgr process ends unexpectedly with signal 6 when rebooting
neighboring routers with OSPF and BGP routes.
xos0063860 Process rtmgr ends unexpectedly with signal 11 after issuing the command
restart ports all in peer switch with BGP enabled.
SummitStack
xos0062753 System-health-check previously ran only on master and backup modules.
As a result, any errors on the standby modules of the stack were not
checked and reported. The system-health-check process now runs on all
‘operational’ or ‘alive’ modules in the stack, including standby modules.
xos0063919 On standby nodes, IP ARP refresh and Neighbor refresh are now disabled
on VR-Mgmt. Primary and backup nodes use the configured enabled/
disabled setting.
xos0064575 "Operation draining timed out" error message appears while saving the
configuration in stacking switch.
ACL
xos0064525 Policy does not allow regular expression to be specified for BGP
communities.
xos0064573 ACL process ends unexpectedly after refreshing a policy with clear-flow
rules.
BGP
xos006449 BGP route policy performs improper community delete operation.
xos0064884 "remove-private-AS-numbers" setting in BGP is not preserved after switch
reboot.
xos0064496 BGP route policy performs improper community delete operation.
MLAG
xos0056368 Kernel errors occur after disabling sharing configuration on ISC ports of
MLAG. For example: "exvlan: handleVsmKernelRequest:8545:
handleVsmKernelRequest Invalid Ingress port: 1000008 got"
MPLS

ExtremeXOS Release Notes for version 21.1.5 109


Open Issues, Known Behaviors, and Resolved Issues

Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0063968 HAL process ends unexpectedly after changing/reverting service VLAN
tag.
Python
xos0064122 The command show tech-support terminates prematurely when
40G or 100G optics are present in the switch.
SNMP
xos0057212 SNMP traps not sent after changing or saving configuration, even though
respective traps are enabled.
xos0064114 SNMP process ends unexpectedly with signal 6 when switch time is
modified.
SSH
xos0063347 IPv6 address is not supported in SCP client present in the device.
VLANs
xos0062912 SNMP trap sent for link up/down status change does not include port
instance.
xos0063837 After deleting pstag port from a VLAN that has two LAG ports added as
untagged, an error message appears.
xos0064094 Removing subscriber VLAN from one PVLAN affects traffic in another
PVLAN.
xos0064491 The configuration of a disabled VLAN without any ports does not appear
in the output of the show configuration command.

VRRP
xos0063346 With multiple (greater than two) VRRP instances and host-mobility
enabled, FDB flush sent during topology change from other L2 protocols
does not occur.

Resolved Issues in ExtremeXOS 21.1.1-Patch1-5


The following issues were resolved in ExtremeXOS 21.1.1-Patch1-5. ExtremeXOS 21.1.1-Patch1-5 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5.2-Patch1-3, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5.4-Patch1-9, ExtremeXOS
15.2.4.5-Patch1-5, ExtremeXOS 15.3.1.4-patch1-47, ExtremeXOS 15.3.5.2-patch1-10, ExtremeXOS 15.4.2.8,
ExtremeXOS 15.5.5.2, ExtremeXOS 15.6.5, ExtremeXOS 15.7.3, ExtremeXOS 16.1.3 and ExtremeXOS 21.1.1.
For information about those fixes, see the release notes for the specific release.

ExtremeXOS Release Notes for version 21.1.5 110


Open Issues, Known Behaviors, and Resolved Issues

Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5
CR Number Description
General
xos0055541 TACACS: On configuring shared secret key in encrypted form with
characters "&" and "<" , the show configuration aaa output
shows a different secret key from what was actually configured.
xos0057931 After rebooting the switch multiple times, following error log message
appears:
<Erro:cm.loadErr> Failed to load configuration: timed out
(after 150 seconds) while waiting for all applications to
get ready to load configuration on OPERATIONAL ( eaps is
still not ready yet)
.
xos0062265 Some legacy commands are not recognized.
xos0062444 Kernel panic occurs in DoS protect-enabled switches when TCN SYN
packets to port 80 are flooded to Management port.
xos0063331 VLAN IP address is unconfigured when modifying the VLAN name/port
information from Chalet.
xos0063332 Configuration changes to VPLS are not fully retrieved by SNMP walk,
which returns values for only few VPLS index.
xos0063842 Packets are being flooded in both network and access VLAN ports after
port flap.
xos0063995 SNMP sysUpTime does not return correct value after failover.
xos0064009 MLAG+EAPS:Traffic forwarding stops after EAPS that include ISC link
converges.
xos0064054 SNMPwalk on extremeAclStatsTable returns value with port instance
instead of ifIndex.
xos0064055 Resiliency Enhancement for IPv4 and IPv6 Static Routes feature has been
added.
xos0064063 Packet-Resolution match conditions need to be added as ACL match
conditions.
xos0064075 The output of the show fan command shows fan status as "Failed" after
hot re-seating a fan module.
xos0064129 Policy refresh never completes with network-zone configuration.
xos0064151 Error occurs when removing DHCP configuration from VLANs when LAG
ports are added to the VLANs.
xos0064178 Hardware entries not released on disabling of ports in a LAG connecting
an L2VPN router to the MPLS core when L2VPN sharing is configured and
in use.
xos0064179 MAC movement occurs in switch acting as an STP root bridge when PVST+
BPDUs are sent by peer switch using STP blocked port.
xos0064203 Incorrect next hop is chosen by BGP route after port flap.

ExtremeXOS Release Notes for version 21.1.5 111


Open Issues, Known Behaviors, and Resolved Issues

Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5 (continued)
CR Number Description
xos0064215 The following log message appears when a subnet is reachable both using
MPLS and non-MPLS:
<Warn:Kern.IPv4FIB.Warning> Slot-4: dest 0x0A420000 / 24
nexthop 0xAC11121E: Unable to add route to unit 1, rc
Entry not found. Shadow problem.

xos0064223 Need to add an ACL match condition for matching next-hop addresses
during the look-up cycle of a packet, so that actions can be taken based on
the next-hop a packet is destined for.
xos0064278 In a SummitStack or BlackDiamond chassis, FDB is not programmed in
hardware after three failovers and fallback.
xos0064281 In Chalet, switch inappropriately displays logs for user accounts under
enhanced security mode.
xos0064299 The hal process ends unexpectedly after executing the command debug
packet capture on.
xos0064307 RADIUS accounting configuration is incorrect as shown by the command
show conf aaa and is lost after upgrade.
xos0064319 Aggregated BGP route is not transmitted to upstream neighbor when
highest prefix route is received from neighbor.
xos0064326 LACP flaps when the LAG port is added to VMAN, with the VMAN
ethertype same as LACP ethertype.
xos0064357 Out of sync between PIM and RTMgr process after introducing new best
route.
xos0064383 In the show l2vpn detail command output, the "PW Tx Pkts"
counters are not updated for VPWS sessions even though traffic is passing
correctly.
xos0064395 STP digest value gets changed when adding the port in VLAN or removing
the port from VLAN.
xos0064490 After upgrading from ExtremeXOS 15.2 to later release, last installed
dynamic ACL rule is given more priority than previously installed rules.
xos0064519 With MVR enabled on two VLANs, IGMP report packets are looped if sent
to all hosts group.
xos0064589 While learning BGP routes, some routes are not getting installed in route
table when deleting and re-adding the static route.
xos0064033 In Summit X670 series switches, traffic gets software forwarded after
disabling/enabling members of a shared group and recreating the shared
group after deletion.
xos0062720 Unable to save configuration when ACL/CFM is configured on multiple
VLANs.
xos0063429 The output of the command show fan shows the fan status as empty
after a hot re-seating of the fan module.
xos0064400 When switch boots up with factory default configuration, Zero Touch
Provisioning (ZTP+) is enabled automatically and IP is resolved correctly
using DHCP, but this causes flooding to be disabled on all ports.

ExtremeXOS Release Notes for version 21.1.5 112


Open Issues, Known Behaviors, and Resolved Issues

Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5 (continued)
CR Number Description
xos0063693 With L2VPN sharing, traffic loss occurs after LSP failover.
xos0061018 After failover, traffic fails across VPLS configured with 64 LSPs across LAG.
xos0064312 With VXLAN, if tenant VLAN and tunnel are on different VRs, FDB is not
learned on a tunnel.
xos0063844 With VXLAN, MLAG port in backup slot is not added to aggregator after
reboot of switch followed by disable and enable of port.
xos0064136 Unable to configure flood rate limit as 1 packets per second.
Summit X670 Series Switches
xos0057671 Link status goes to Ready state on port with 10/100/1000BASE-T optics
after multiple reboots.
xos0063263 On Summit X670 series switches, 1000BaseSX optics are incorrectly
detected as 100BaseFX.
SummitStack
xos0061834 In SummitStacks, the command synchronize stacking slot
<slot no> does not work from master node if the target slot is in failed
state.
xos0061861 A per-port meter configured on a SummitStack may not be properly
configured on the backup node following a reboot.
xos0062484 EPM process crashes on master if image upgrade on a standby slot
exceeds 30 minutes.
Summit X670-G2 Series Switches
xos0064574 In X670G2, IPMC cache entries are limited to 5000, when the lookup key is
changed from Source-Group-Vlan to Group-Vlan mode or vice versa.
BlackDiamond X8 Series Switches
xos0064010 The command show port buffer displays an incorrect port range
for 100G I/O modules.
xos0060666 After failover, traffic gets flooded on the ports of service VLAN in H-VPLS
core.
Summit X440 Series Switches
xos0063627 ARP is not re-added to hardware after it is removed initially due to the
table being full.

Resolved Issues in ExtremeXOS 21.1.1-Patch1-2


The following issues were resolved in ExtremeXOS 21.1.1-Patch1-2. ExtremeXOS 21.1.1-Patch1-2 includes
all fixes up to and including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7,
ExtremeXOS 12.2.2-patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS
12.6.3, ExtremeXOS 12.6.5, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5, ExtremeXOS 15.2.4, ExtremeXOS 15.3.3,
ExtremeXOS 15.4.1, ExtremeXOS 15.5.1, ExtremeXOS 15.5.2, ExtremeXOS 15.6.1, ExtremeXOS 15.6.2,

ExtremeXOS Release Notes for version 21.1.5 113


Open Issues, Known Behaviors, and Resolved Issues

ExtremeXOS 15.7.1, and ExtremeXOS 16.1.3. For information about those fixes, see the release notes for
the specific release.

Table 18: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-2
CR Number Description
General
xos0061745 Ampersand used in UPM script is replaced by “& amp” in the XSF
configuration.
xos0062850 When upgrading ExtremeXOS to 15.7 or later releases, the web HTTP access
is enabled even though it is disabled in the configuration.
xos0063028 RADIUS configuration with shared-secret of 32 character is lost after reboot.
xos0063082 Updated DSCP value is not refreshed for Dynamic ACLs.
xos0063186 Kernel oops occurs when deleting private VLAN.
xos0063282 ExtremeXOS CLI restricts PVLAN subscriber VLAN from being configured as
an EAPS-protected VLAN.
xos0063423 Memory leak occurs in ISIS process when exporting OSPF routes to ISIS.
xos0063465 Cannot add/delete ports to load-shared MLAG ports without disabling
MLAG.
xos0063484 Enhancement added in STP flush generation mechanism to reduce hardware
programming load.
xos0063495 Policy authentication fails when RADIUS request queue has stale entries.
xos0063614 Kernel crash occurs when receiving DHCP packets with invalid field values.
xos0063710 Kernel oops occurs on switch with Private VLAN and MLAG configuration
after executing restart ports all.

xos0063736 In Syslog, username information appears as "*****" during login/logout


cases.
xos0063761 Traffic is not forwarded after disable/enable sharing when traffic ingressing
port is part of both port specific tag (PSTag) and service VMAN (untagged
port).
xos0063791 Disabling MLAG ports on both MLAG peer switches prior to VM migration
prevents proper VXLAN termination.
xos0063853 Potential memory corruption when MAC locking is configured.
xos0063870 Kernel oops occurs due to memory overrun in user kernel interface.
xos0063956 ACL slice is not freed up after changing IGMP snooping filter from per-VLAN
to per-port mode.
xos0063967 XNV dynamic VLAN is not created on MLAG peer where MLAG port is down.
xos0063968 HAL process ends unexpectedly after changing/reverting service VLAN tag.
xos0064067 Traffic loss occurs in MLAG setup when ingress port and ISC port reside on
different hardware units, and when the internal port number for both of
these ports is the same.
xos0063948 Clearflow delta values are randomly not calculated properly.

ExtremeXOS Release Notes for version 21.1.5 114


Open Issues, Known Behaviors, and Resolved Issues

Table 18: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-2 (continued)
CR Number Description
xos0063463 Static FDB created on PSTag VLAN port is incorrectly displayed in show
configuration command.
xos0063494 OSPFv3 process ends unexpectedly on BFD-enabled switches, if there are
frequent link flaps for a long duration.
xos0063814 UPM process ends unexpectedly with Signal 11 occasionally when UPM
timers are configured.
xos0063849 VXLAN: The commands disable ospf and disable OSPF
vxlan-extensions does not flush learned RTEPs.
xos0064045 Need support for tagged and untagged VXLAN tenant VLANs on the same
port.
xos0064122 The command show tech-support terminates prematurely when
40G or 100G optics are present in the switch.
xos0061506 In Summit X440-G2 and X460-G2 series switches, the combo port comes
up as active even though when link peer port is down.
xos0063872 After multiple executions of run failover with redirect-flow
configuration, IPv4 ping fails.
xos0063928 Sysuptime in sFlow packets is invalid.
Summit X460-G2 Series Switches
xos0063927 Error "Deferred L2 notification code out of sync unit 0" repeatedly appears
in log.
Summit X670-G2 Series Switches
xos0063807 On Summit X670-G2 series switches, egress ACL rule actions do not take
effect on ports 64-72.
SummitStack
xos0061777 Standby nodes do not come back up to operational state after they go into
failed state.
xos0062700 When upgrading from ExtremeXOS 15.7 or earlier to 16.1, image download
fails if image was installed in backup node first and master node second.
xos0063904 FDB process ends unexpectedly in backup node of SummitStack configured
as MLAG peer when certain FDB entries are not flushed properly after age-
out.

Resolved Issues in ExtremeXOS 21.1


The following issues were resolved in ExtremeXOS 21.1. ExtremeXOS 21.1 includes all fixes up to and
including ExtremeXOS 11.6.5.3, and earlier, ExtremeXOS 12.0.5, ExtremeXOS 12.1.7, ExtremeXOS 12.2.2-
patch1-12, ExtremeXOS 12.3.6, ExtremeXOS 12.4.5, ExtremeXOS 12.5.5, ExtremeXOS 12.6.3, ExtremeXOS
12.6.5, ExtremeXOS 12.7.1, ExtremeXOS 15.1.5, ExtremeXOS 15.2.4, ExtremeXOS 15.3.3, ExtremeXOS 15.4.1,
ExtremeXOS 15.5.1, ExtremeXOS 15.5.2, ExtremeXOS 15.6.1, ExtremeXOS 15.6.2, ExtremeXOS 15.7.1, and
ExtremeXOS 16.1.3. For information about those fixes, see the release notes for the specific release.

ExtremeXOS Release Notes for version 21.1.5 115


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
CR Number Description
General
xos0050771 The command show access-list dynamic counters does not
display the complete MAC address of VMs and it may not be possible to
read the counters correctly from the output.
xos0052723 With L3VPN configured (also: OSPF, BGP, MPLS, LSP) and routes are being
advertised and installed in the VRF routing table, after restarting process
OSPF, VPN routes are not installed.
xos0056829 Switches do not re-send the Group Specific Query following the
last_member_query_interval (1 second).
xos0057231 An FDB entry created by ARP with "i" flag set is not removed from the FDB
table after a static entry for the same IP address is added with a different
MAC value.
xos0057269 SNMP trap extremeIpSecurityViolation is sent with incorrect VLAN
description.
xos0057374 Switch odometer value is reinitialized when Master Switch Fabric Module
(MSM) fails to read the value.
xos0057672 The process rtmgr ends unexpectedly when disabling GRE tunnels.
xos0058669 DHCPv6 client: After changing the client identifier type, and then restarting
the port, old IPv6 addresses are not released, causing the show vlan
command to show multiple IPv6 addresses.
xos0058750 Neighbor discovery packets are duplicated in L2 VLANs when IPv6
addresses are configured for other VLANs that do not have any ports.
xos0059942 SSH connection ends when show commands produce lengthy output.
xos0060092 Fetching values using SNMP for "extremePortQosStatsTable" does not work
correctly.
xos0060643 Commands for downloading and installing images should use active/
inactive options when specifying partitions (in addition to current primary/
secondary options).
xos0061085 Kernel oops occurs while deleting VR with enable BGP export and IPARP
proxy configurations.
xos0061173 L2PT packets are dropped when ingress port is configured with software
learning.
xos0061198 Disabling VPN-VRF affects traffic on another VPN-VRF.
xos0061219 Parallel-mode-enabled DHCP offer is sent using primary IPv4 address to the
client for multiple offers received from server for different IPv4 addresses.
xos0061247 Configuring IPv6 Syslog target in a specific format produces an incomplete
command error, even though the command is complete.
xos0061331 Bootprelay for VRF is not supported. Commands to configure bootprelay
should reflect this.

ExtremeXOS Release Notes for version 21.1.5 116


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061445 After creating and enabling an STPD, the command configure
"Default" add ports 1 tagged stpd "s1" adds ports to
the Default VLAN, but not with STPD domain, even though the error
"Command Aborted and no changes were made" appears.

xos0061465 IPv6 source address that is not configured on any VLAN in the given VR is
accepted as from source IP. Issue does not occur with IPv4.
xos0061507 SNMPget on EXTREME-SOFTWARE-MONITOR table returns value with
incorrect OID.
xos0061517 LACP adjacency fails while forwarding the PDU with l2pt profile over L2VPN
tunnels when MPLS PHP is enabled.
xos0061565 The TCL function, “clock scan," generates errors with default time zone
configuration.
xos0061656 Nodes remain in the "FDBSync" state due to temp-flooding while rebooting
the stack.
xos0061788 The process devmgr ends unexpectedly during snmpwalk when continuous
EMS logs are sent to the switch console.
xos0062017 DHCP trusted port configuration is lost after disabling, and then re-enabling
LAG.
xos0062018 For IPv6 routes with mask lengths greater than 64-bits, IPv6 unicast packets
destined for the switch CPU can be dropped if another IPv6 route is present
with a matching prefix and mask length less than or equal to 64-bits. This
issue affects Summit X460-G2, X670-G2, and X770 switches.
xos0062133 STP flush event does not happen after ports are quickly disabled, and then
enabled.
xos0062145 With QoS configuration, ACL process signal 11 ends unexpectedly after
rebooting.
xos0062240 Port that was administratively disabled becomes up after enabling rx pause.
xos0062271 CLI memory leak occurs when executing show commands with include
option through script.
xos0062277 The command show vlan vlan_list does not show information for
dynamic VLANs nor the Default VLAN. Error appears.
xos0062290 Due to ExtremeXOS reflection RSTP BPDU support, upstream bridges
believe that they are receiving their own BPDUs (contain the bridge's ID),
thus causing multisource events during topology changes, which can cause
slow convergence times when lp is configured (upwards of 30 seconds).
xos0062427 EDP process ends unexpectedly when CDP packets without portId TLV are
received.
xos0062441 The process rtMgr ends unexpectedly when IPv6 static route is deleted.
xos0062472 Source MAC addresses learned through CDP packets received on EAPS-
blocked ports cause traffic to be dropped.
xos0062570 In SummitStacks, executing the command enable sflow ports all enables
sFlow inappropriately on stacking ports.

ExtremeXOS Release Notes for version 21.1.5 117


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0062705 Kernel oops can occur after clearing IPMC FDB in a stack.
xos0062789 Disabling learning on LAG ports does not flush FDB entries.
xos0062879 Transceiver information shows same Rx power value for 4x10G partition
ports even though some ports are in ready state.
xos0063089 Kernel oops triggered infrequently during continuous addition/deletion of
ARP entries for long durations.
xos0063359 The process rtmgr might end unexpectedly after executing disable
bgp, and then enable bgp, or after disable port, and then
enable port, or after rebooting a switch containing BGP routes.
xos0063368 In an MLAG configured switch, FDBs are not installed in hardware after
reboot if there are frequent MACMoves between MLAG port and ISC.
xos0063134 Traffic stops after disabling, and then enabling LAG porst having pstag with
static FDB
xos0063245 With IGMP per-VLAN mode, VRRP flaps occur after adding tagged ports to
VLANs.
xos0063457 Configuration for adding network VLAN port in STP for subscriber is not
saved.
xos0063521 A few IBGP routes are not updated in routing table when disable bgp
and enable bgp commands are executed in quick succession.

Summit X460-G2 Series Switches


xos0061486 Combo ports have unsupported autonegotiation and half-duplex settings.
xos0062425 On Summit X460-G2 series switches, the primary port is incorrectly set as
40 when it should be 41. Under certain conditions, this can cause a kernel
crash.
xos0062855 On the Summit X460-G2 series switches, VPLS packets are forwarded with
two tags when the service VLAN ports are also members of an untagged
VMAN.
xos0063071 Add support for ONEPolicy IP socket classification.
Summit X450-G2 Series Switches
xos0060129 On Summit X450-G2 series switches, 10/100/1000BASE-T SFP+ optics do
not link to similar optics when in the SFP/SFP+ ports. They do link or
partially link when connected to a regular triple speed copper port.
xos0061704 With SSH2 enabled, reboot the switch and force some other standby node
to become the master node. Key becomes invalid on new master node.
Summit X670-G2
xos0061791 On SummitStacks containing master and standby nodes of different
switches, the standby node may go to failed state after a node reboot.
xos0062166 On Summit X670-G2 series switches configured with L3VPN, executing the
clear iparp command causes the switch to reboot with Kernel Oops.
xos0063204 Traffic stops on LAG ports when frequently modifying the sharing group.

ExtremeXOS Release Notes for version 21.1.5 118


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
SummitStack
xos0057835 In SummitStacks, clear-flow sampling period is incorrectly calculated.
xos0061799 Precedence order between policy port rules and policy MAC-based rules is
not preserved following a master/backup Failover.
xos0061841 FDB entries are not learned again after limit learning is unconfigured, and
then configured again, with PSTAG configuration in SummitStacks.
xos0061957 HAL process ends unexpectedly during failover when switches have ACL
policy without meter action.
xos0062084 Rebooting modules with only policy configurations clears their policy port
configurations when they rejoins the stack.
xos0062123 Port groups do not appear in the show configuration command.
However, they do appear in the show ports group command.

xos0062238 On a stacked system, configuration of a user-defined CoS value's


etsysCos8021dPriority using the MIB can return success when the set
actually failed (as seen by a subsequent get).
xos0062291 Applying the same policy MAC admin rule to multiple ports produces the
following error message: hardware configuration of rule
failed for policy.
xos0062367 ACL process ends unexpectedly on repeated refresh of ACL policy with
clear-flow action.
xos0062504 You can set a GPTP "peer delay current interval" outside of the correct range
of -3 to 17..
xos0062522 In SummitStack switches, standby slots go to failed state when a very large
number of log messages are continuously generated in the switch.
xos0063242 Stacks configured as DHCP clients do not respond to pinging after failover.
xos0063344 With MLAG and LAG configurations, when a stack node comes up after a
reboot, FDB entries flooded from other slots are programmed on incorrect
ports internally.
xos0063490 CFM stays down after slot reboot on a stack.
ACL
xos0054348 Cannot delete flow names after deleting, and then creating, the flow while
the ACL is installed.
xos0054714 When ACLs are applied in both ingress and egress directions, you cannot
see egress direction using SNMP. When a policy has more than one counter,
using SNMP, you can only check the updates from the first counter, and
subsequent counters do not appear.
xos0059924 The output of the command show access-list meter ports
displays additional meter name when only one meter is applied using ACL
policy.
xos0060716 Need support for new ACL action "redirect-vlan" to redirect matched
packets to all ports in specified VLANs.

ExtremeXOS Release Notes for version 21.1.5 119


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061922 Dynamic ACLs applied as "any" fail to install in hardware after upgrading
ExtremeXOS from any release other than EXOS 15.3.
xos0062156 ACL Manager API slice type can be off by one.
xos0062537 HAL crash occurs when redirect-port-list action contains more than 64
ports.
xos0062619 SSH access-profile using policy does not work with IPv6 addresses.
xos0063172 ACL action "redirect-port-list" does not take effect when another slice has a
rule to match all packets with deny action.
xos0063240 ACL process ends unexpectedly when switch has clear-flow ACL rule with
count interval greater than snmptrap generation timer.
xos0063547 Process ACL ends unexpectedly after applying a policy file with source zone
as a match condition.
AVB
xos0062494 Source MAC addresses learned through MVRP packets on a blocked port
(STP) cause traffic to be dropped.
BGP
xos0058441 After creating a BGP peering session between link local IPv6 addresses with
the scope ID specified, deleting the VLAN containing link local IPv6 address.
and then issuing the command show configuration bgp, switch
reboots with Epm application wdg timer warning error
message.
xos0060641 When BGP is administratively shut down, it does not send notifications to
peers.
xos0060680 Switch stops responding after executing clear bgp neighbor all
counters on a switch without BGP configuration.
xos0060749 Configuring, enabling, disabling, or deleting BGP neighbors using link local
address results in the following error message:
Error: cmBackendXmlParseEnd Failed to convert
"bgpCfgPeerRemoteAddr" value "fe80::204:96ff:fe97:efef/
brian-to-112"

xos0061129 In a multi-peer setup with many routes (over 150K), a few routes from the
preferred peer do not become active in the BGP RIB. Disabling, and then re-
enabling peer, restores all routes.
xos0061411 Route table installs sub-optimal BGP routes (next-hop) to kernel, while the
BGP RIB shows different paths when same routes are received from two
different peers in local-RI
xos0061505 After a topology change in the network, BGP routes requiring two levels of
recursive lookup are programmed in hardware with incorrect next hops.
xos0062260 BGP process ends unexpectedly when local address or password is changed
for BGP neighbor, and then you immediately execute a BGP show/
configuration command.

ExtremeXOS Release Notes for version 21.1.5 120


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0055051 When applying an import policy to BGP, cost configured in the policy is not
applied to route tables. This issue is not resolved after multiple policy
refreshes nor after multiple disabling, and then enabling BGP.
xos0063173 Process dcbgp ends unexpectedly with signal 11 after issuing the command
show bgp neighbor.
Chalet
xos0060354 ExtremeXOS Chalet using IPv6 does not work with HTTPS.
xos0062016 Command line process memory leak occurs when accessing switches with
Chalet.
xos0063255 In Chalet, VLANs are sorted incorrectly.
ClearFlow
xos0062629 Clearflow rule does not work properly if there is dot(.) in the ACL counter.
EAPS
xos0061038 Loops occur in EAPS-protected VLANs, after peer reboot, if a VLAN’s port is
also protected by ELSM.
xos0061385 EAPS process ends unexpectedly after deleting EAPS shared-port
configuration.
ELRP
xos0062460 The show configuration command output shows incorrect ELRP
configuration.
xos0062618 ELRP forgets the disabled port information if the port is deleted from
another VLAN that also has ELRP enabled. As a result, the disabled port
stays disabled unless manually enabled.
ESRP
xos0061965 Configuring ESRP member VLANs (VRRP-enabled) produces errors.
FDB
xos0059481 Static FDB is programmed incorrectly in hardware after a stack failover.
IGMP
xos0062914 The process mcmgr ends unexpectedly after receiving corrupted IGMPv3
join packets on MLAG ports.
LAG\MLAG
xos0062428 Member ports with a modified speed configuration that is different than the
master port should not be allowed in LAG.
xos0063365 Frequent MLAG bulk syncs observed due to checksum mismatch between
MLAG peers when ISC port was added as an untagged port to a tagged
VLAN and VRRP was running between the peers.
MPLS
xos0059596 Can add more than one LSP a pseudo-wire when it is associated with a
VPWS.

ExtremeXOS Release Notes for version 21.1.5 121


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061092 Traffic forwarding on VPLS-serviced VMAN stops after link flap.
xos0061943 MPLS process ends unexpectedly when get-next is done with incomplete
OID for mplsXCIndex.
xos0062045 LLDP packets are tunnelled over L2VPn.
xos0062300 CEP CVID Ranges, other than first VLAN, fail when access port is a trunk.
xos0062301 Packet drops occurs between customer edge switches when VMAN and
CVID tag are the same.
xos0062380 Switch rejects incorrect LSP configurations as expected, but this operation
still uses LSP indexes in hardware.
xos0062754 VPLS traffic egresses out with dot1q tag when secondary EtherType is
configured.
xos0063271 Layer 3 packets in non-default virtual routers are slow-path forwarded after
disabling MPLS in the peer switch.
xos0063478 Traffic drop occurs while adding new member port to the existing LAG
group and PSTAG is configured on the port.
OpenFlow
xos0060531 Deleting VMAN deletes the VLAN configuration, but not associated
OpenFlow logical ports.
Optics
xos0059007 QSFP+ to SFP+ adapter support is added to work with all optical SFP+
transceivers with the exception of LRM and passive copper direct attach
cables.
xos0060018 With a 0.5M, 40G QSFP MOLEX passive copper cable inserted, disabling the
port where the optic is inserted, rebooting, and then enabling the port, the
port stays in the ready state and doesn't come up as enabled.
xos0060264 The output of the show port transceiver info command for
optics inserted in 40G/100G ports might be abnormally lengthy if the same
command is executed from two different CLI sessions simultaneously.
xos0062719 Allow use of 3rd-party optics without any additional license.
xos0063120 Error message "CFP2 modules >= 18 W unsupported" incorrectly appears for
Finisar Corp CFP2 LR4 optics.
OPSFV2
xos0061855 Configured OSPF neighbor is not retained after rebooting.
xos0063380 Error message appears after rebooting switch with OSPF configuration:
"Error while loading "ospfInterface": ERROR: 0.0.0.0 is not a valid configured
neighbor for interface".
Power
xos0062113 The show power command output does not display power usage for
PSUs with part numbers starting with “800515”.
QoS

ExtremeXOS Release Notes for version 21.1.5 122


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061027 For SummitStacks, creating or deleting non-default QoS profiles may cause
some ports to flap.
xos0062050 QoS committed rate configurations for port groups are not loaded properly
after a save and reboot.
Security
xos0057679 Account user name and password are not encrypted in logs when cli-config-
logging is enabled.
xos0058808 Rarely, MAC addresses of authenticated clients learned on NetLogin-
enabled ports are not programmed in hardware.
xos0060909 In UPM profiles the variable EVENT.TIME incorrectly has the current time
rather than the time when the event was queued/triggered.
xos0061433 extremeNetloginUserLogoutTrap is received with errors.
xos0061597 After authenticating a NetLogin client, executing the command clear
netlogin state port, and then checking that ID-mgmt has deleted
the clients, log displays UnDscvrId EMS message, which does not indicate
the identity user.
xos0061652 Netlogin Dot1x: Authenticated value should be "Yes, Local" for clients with
invalid password authenticated on auth failure VLAN.
xos0061781 Identity manager entries become stale when clients are moved from one
port to another in sub-VLANs.
xos0061797 Dot1x client moves to authentication failure VLAN if authentication failed
due to incorrect supplicant password or framework failure, such as error in
VLAN movement, etc.; even if web-based NetLogin is enabled.
xos0061820 Dot1x clients move to authentication failure VLAN when web-based
NetLogin is enabled globally.
xos0061868 With protocol order as MAC dot1x, web-based UPM profile is not executed
for the client, which is authenticated as MAC.
xos0062366 After rebooting, DHCP binding entries are not restored using vr-default.
xos0062674 UPM profile fails to set the variables received from the RADIUS server using
VSA 212.
xos0062965 Policy process ends unexpectedly with signal 6 when master node goes
down.
xos0063090 NetLogin client does not move into authfail VLAN when user is absent from
local database.
xos0063248 NTP MD5 authentication with NTP server is failing.
xos0063445 NetLogin: FDB is not in synch when changing VLAN VSA's dynamically.
xos0063506 Traceroute MAC address in CFM domain does not return information about
destination switch.
SNMP

ExtremeXOS Release Notes for version 21.1.5 123


Open Issues, Known Behaviors, and Resolved Issues

Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0059964 SNMP poll for MIB dot3StatsDuplexStatus always returns unknown(1) when
ports are configured with auto-negotiation on.
xos0060792 SNMP authentication failure log message and trap is inappropriately
generated when switch detects "Not In Time Windows" error.
xos0061379 Switch temperature value retrieved using SNMP get operation is incorrect.
xos0061886 SNMP master process ends unexpectedly with signal 6 with certain
sequence of snmpbulkget and snmpget.
xos0061945 SnmpSubagent crash occurs when snmpset executed on the last row in
EAPSMbrVlanEntry.
xos0063349 Switch stops responding to SNMP requests if SNMP get for multiple OIDs is
continuously initiated.
STP
xos0062701 HAL timeout occurs while rebooting a stack with STP configuration.
TWAMP
xos0062217 In SummitStacks with eight nodes and sFlow configuration, "Hardware L3
Table full" error messages appear when the stacks have a large number of
Layer 3 entries.
VLANs
xos0054039 IP multicast traffic is not forwarded on PSTAG VLANs when it shares ports
with other IGMP snooping-enabled VLANs or other L3 VLANs.
xos0060184 After configuring MVRP registration forbidden, the command is accepted
and registration is forbidden. However, the show configuration
mrp command does not display this configuration and this configuration is
not saved after a reboot.
xos0062255 CEP CVID configurations is missing after adding/deleting the port from
sharing.
xos0063207 Error occurs while adding LAG ports as tagged in one VMAN and untagged
in another VMAN, even though the VMAN EtherType is primary.
xos0063257 Saving configuration fails/times-out when VLANs added to a mirror filters
are renamed.
xos0063274 VLAN packets are egressing with VMAN ethertype when an egress port is
deleted from a VMAN that is also part of a VLAN.

ExtremeXOS Release Notes for version 21.1.5 124


4 ExtremeXOS Document
Corrections
configure pim dense-neighbor-check
SummitStack Topologies
Zero Touch Provisioning (ZTP) and Stacking
LACP Fallback

This chapter lists corrections to the ExtremeXOS 21.1 User Guide and ExtremeXOS 21.1 Command
Reference Guide for ExtremeXOS 21.1.

configure pim dense-neighbor-check


Add the following command to the ExtremeXOS 21.1 Command Reference Guide
configure pim dense-neighbor-check [on | off}

Description
This command is used to configure a PIM interface that receives multicast data traffic. It could be either
from a source directly connected or from a PIM neighbor. In the second case (from a source not directly
connected), if the received interface has no PIM neighbor, the traffic is dropped (default behavior). If
you turn off this check, the traffic is processed.

Syntax Description
dense-neighbor-check Check if multicast traffic is received from PIM neighbor in dense mode.

on Drop multicast traffic if not received from PIM neighbor (default).

off Forward multicast traffic even if not received from PIM dense neighbor.

Default
The default is on.

Example
The following example turns on dense neighbor check:
configure pim dense-neighbor-check on

History
This command was first available in ExtremeXOS 15.1.4.

ExtremeXOS Release Notes for version 21.1.5 125


ExtremeXOS Document Corrections

Platform Availability
This command is available on platforms that support the appropriate license. For more information, see
the ExtremeXOS 21.1 Feature License Requirements.

SummitStack Topologies
In the ExtremeXOS 21.1 User Guide in Configuring Stacked Switches > Introduction to Stacking >
SummitStack Topologies section.

xos0067492

The following note should appear:

Note
As stacks are not necessarily a homogeneous composition of a single switch model, we do
not restrict the ability to configure/create any number of settings/objects based on the
capabilities of a single node that may or may not be actually present in the stack.

Zero Touch Provisioning (ZTP) and Stacking


In the ExtremeXOS 21.1 User Guide, in Getting Started > Zero Touch Provisioning (Auto Configuration)
section.

xos0067234

The following note should appear:

Note
Zero Touch Provisioning (ZTP) is not supported in stacking mode.

LACP Fallback
In the ExtremeXOS 21.1 User Guide under Configuring Slots and Ports on a Switch > Link Aggregation
on the Switch > LACP > LACP Fallback:

xos0070324

The following note should appear:

Note
In an MLAG environment, fallback port selection occurs only on the LACP master switch.

ExtremeXOS Release Notes for version 21.1.5 126

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy