ExtremeXOS 21.1.5-Patch1-2 RelNotes
ExtremeXOS 21.1.5-Patch1-2 RelNotes
121212-01
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
Software Licensing
Some software files have been licensed under certain open source or third-party licenses. End-
user license agreements and open source declarations can be found at:
www.extremenetworks.com/support/policies/software-licensing
Support
For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408
(toll-free in U.S. and Canada) or +1-408-579-2826. For the support phone number in other
countries, visit: http://www.extremenetworks.com/support/contact/
For product documentation online, visit: https://www.extremenetworks.com/documentation/
Table of Contents
Preface......................................................................................................................................... 5
Conventions............................................................................................................................................................................. 5
Providing Feedback to Us................................................................................................................................................ 6
Getting Help............................................................................................................................................................................ 6
Related Publications............................................................................................................................................................ 7
Chapter 1: Overview................................................................................................................... 8
New and Corrected Features in ExtremeXOS 21.1.5-Patch1-2......................................................................... 8
New and Corrected Features in ExtremeXOS 21.1.3-Patch1-4.........................................................................9
New and Corrected Features in 21.1............................................................................................................................ 13
New Hardware Supported in ExtremeXOS 21.1....................................................................................................43
Hardware No Longer Supported................................................................................................................................44
VLAN Option Formatting in Commands................................................................................................................44
Circuit Emulation Service (CES) No Longer Supported.................................................................................44
OpenFlow and SSH Included in ExtremeXOS Base Image........................................................................... 44
ExtremeXOS SSH Server Upgraded with OpenSSH v6.5...............................................................................45
CLI Command Output Format of Ports Lists....................................................................................................... 45
Extreme Hardware/Software Compatibility and Recommendation Matrices......................................45
Compatibility with ExtremeManagement (Formerly NetSight)..................................................................45
Upgrading ExtremeXOS..................................................................................................................................................45
Supported MIBs.................................................................................................................................................................. 46
Tested Third-Party Products.........................................................................................................................................46
Extreme Switch Security Assessment..................................................................................................................... 47
Service Notifications......................................................................................................................................................... 47
Chapter 2: Limits......................................................................................................................48
Chapter 3: Open Issues, Known Behaviors, and Resolved Issues.....................................78
Open Issues........................................................................................................................................................................... 78
Known Behaviors................................................................................................................................................................. 81
Resolved Issues in ExtremeXOS 21.1.5-Patch1-2...................................................................................................83
Resolved Issues in ExtremeXOS 21.1.5...................................................................................................................... 85
Resolved Issues in ExtremeXOS 21.1.4-Patch1-7.................................................................................................. 86
Resolved Issues in ExtremeXOS 21.1.4-Patch1-6.................................................................................................. 87
Resolved Issues in ExtremeXOS 21.1.4-Patch1-3.................................................................................................. 89
Resolved Issues in ExtremeXOS 21.1.4....................................................................................................................... 91
Resolved Issues in ExtremeXOS 21.1.3-Patch1-7.................................................................................................. 94
Resolved Issues in ExtremeXOS 21.1.3-Patch1-4.................................................................................................. 97
Resolved Issues in ExtremeXOS 21.1.3.................................................................................................................... 100
Resolved Issues in ExtremeXOS 21.1.2-Patch1-2.................................................................................................104
Resolved Issues in ExtremeXOS 21.1.2.................................................................................................................... 106
Resolved Issues in ExtremeXOS 21.1.1-Patch1-5................................................................................................... 110
Resolved Issues in ExtremeXOS 21.1.1-Patch1-2....................................................................................................113
Resolved Issues in ExtremeXOS 21.1..........................................................................................................................115
LACP Fallback.....................................................................................................................................................................126
Conventions
This section discusses the conventions used in this guide.
Text Conventions
The following tables list text conventions that are used throughout this guide.
New! New Content Displayed next to new content. This is searchable text within the PDF.
Platform-Dependent Conventions
Unless otherwise noted, all information applies to all platforms supported by ExtremeXOS software,
which are the following:
• ExtremeSwitching® switches
• Summit® switches
• SummitStack™
When a feature or feature implementation applies to specific platforms, the specific platform is noted in
the heading for the section describing that implementation in the ExtremeXOS command
documentation (see the Extreme Documentation page at www.extremenetworks.com/
documentation/). In many cases, although the command is available on all platforms, each platform
uses specific keywords. These keywords specific to each platform are shown in the Syntax Description
and discussed in the Usage Guidelines sections.
Terminology
When features, functionality, or operation is specific to a switch family, such as ExtremeSwitching™ or
Summit™, the family name is used. Explanations about features and operations that are the same across
all product families simply refer to the product as the switch.
Providing Feedback to Us
We are always striving to improve our documentation and help you work better, so we want to hear
from you! We welcome all feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team about
this document, please contact us using our short online feedback form. You can also email us directly at
documentation@extremenetworks.com.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
• GTAC (Global Technical Assistance Center) for Immediate Support
• Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
• Email: support@extremenetworks.com. To expedite your message, enter the product name or
model number in the subject line.
• Extreme Portal — Search the GTAC knowledge base, manage support cases and service contracts,
download software, and obtain product licensing, training, and certifications.
• The Hub — A forum for Extreme Networks customers to connect with one another, answer
questions, and share ideas and feedback. This community is monitored by Extreme Networks
employees, but is not intended to replace specific guidance from GTAC.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
Related Publications
ExtremeXOS Publications
• ACL Solutions Guide
• ExtremeXOS 21.1 Command Reference Guide
• ExtremeXOS 21.1 EMS Messages Catalog
• ExtremeXOS 21.1 Feature License Requirements
• ExtremeXOS 21.1 User Guide
• ExtremeXOS OpenFlow User Guide
• ExtremeXOS Quick Guide
• ExtremeXOS Legacy CLI Quick Reference Guide
• ExtremeXOS Release Notes
• Extreme Hardware/Software Compatibility and Recommendation Matrices
• Switch Configuration with Chalet for ExtremeXOS 21.1 and Later
• Using AVB with Extreme Switches
These release notes document ExtremeXOS 21.1.5 Patch 1-2, which adds a command and resolves
software deficiencies.
• New and Corrected Features in 21.1 on page 13
• New Hardware Supported in ExtremeXOS 21.1 on page 43
• Limits on page 48
• Open Issues, Known Behaviors, and Resolved Issues on page 78
Description
Configures suppressing - and MLD-triggered queries when topology changes are received.
Syntax Description
send-query For VLANs associated with STPD, when topology changes occur, send or
suppress IGMP or MLD queries.
on Send IGMP or MLD queries (default).
Default
Sending IGMP or MLD queries is on.
Usage Guidelines
Whenever STP topology changes are received on a port, the switch sends triggered queries that mark
the peer port as a router port and floods all multicast packets towards this port. This can cause
unnecessary bandwidth usage. This command allows you to allow or suppress this forwarding.
Example
The following example turns off IGMP and MLD queries:
# configure stpd multicast send-query off
History
This command was first available in ExtremeXOS 21.1.5-Patch1-2.
Platform Availability
This command is available on the Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching
X440-G2, X620 series switches.
This feature introduces a timer that keeps MLAG ports disabled for the configured duration while the
switch configuration is loading. This timer is also useful for cases where network-facing Layer 3
protocols, like OSPF, are yet to converge on the node that has just come up. This feature is disabled by
default.
Additionally, the show mlag ports on page 12 is changed to show the status of this feature.
Description
This command configures a reload delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
Default
The default reload-delay timer interval is 30 seconds.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command allows you to configure a time delay for MLAG ports providing
enough time for ISC ports/neighborship of other Layer 3 protocols to come up. To have this delay timer
take effect, you need to issue the enable mlag port reload-delay on page 10 command.
Example
The following example sets the reload-delay to 60 seconds:
configure mlag ports reload-delay 60
History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.
Platform Availability
This command is available on standalone and stacking switches that support the MLAG.
Description
This command enables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
This command has no arguments or variables.
Default
MLAG reload-delay is disabled by default.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. After using the configure mlag ports reload-delay on page 10 command to
configure a time delay for MLAG ports that provides enough time for ISC ports/neighborship of other
Layer 3 protocols to come up, you have to issue this command to enable the timer.
Example
The following example enables the MLAG reload-delay timer:
enable mlag port reload-delay
History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.
Platform Availability
This command is available on standalone and stacking switches that support the MLAG.
Description
This command disables reload-delay on Multi-switch Link Aggregation Group (MLAG) ports.
Syntax Description
This command has no arguments or variables.
Default
MLAG reload-delay is disabled by default.
Usage Guidelines
There are cases where MLAG ports comes up quicker than ISC ports after a switch reboot causing traffic
loss during this time gap. This command disables this timer feature.
Example
The following example disables the MLAG reload-delay timer:
disable mlag port reload-delay
History
This command was first available in ExtremeXOS 21.1.3-Patch1-4.
Platform Availability
This command is available on standalone and stacking switches that support the MLAG.
Description
Displays information about each MLAG group.
Syntax Description
port_list Specifies one or more ports.
Default
N/A.
Usage Guidelines
Use this command to display information about each MLAG group including local port number, local
port status, remote MLAG port state, MLAG peer name, MLAG peer status, local port failure count,
remote MLAG port failure count.
Local and remote link state and fail counts reflect the status of the entire LAG when a LAG is used in
conjunction with an MLAG. For example, if 1 and 2 ports in a local LAG on the switch associated with an
MLAG is down, the local link state will still show as ready and the associated local fail count will be
incremented. The remote fail count shown at MLAG neighboring switch will also be incremented.
Example
The following command displays information for an MLAG group:
# show mlag ports
The following command displays information about an MLAG group on ports 1 and 2:
History
This command was first available in ExtremeXOS 12.5.
Platform Availability
This command is available on standalone and stacking switches that support the MLAG.
As the scope of the MAC addresses originated by tenant VMs is restricted by the VNI, overlapping MAC
addresses across segments can be supported without traffic leaking between tenant segments. When a
tenant frame traverses a VXLAN overlay network, it is encapsulated by a VXLAN header that contains
the VNI. This frame is further encapsulated in a UDP header and L2/L3 headers.
VXLAN can add up to a 54-byte header to the tenant VM’s frame. For VXLAN to work correctly, this
requires that the IP MTU be set to at least 1554 bytes on the network-side interfaces, and on all transit
nodes which carry VXLAN traffic.
The role to encapsulate/decapsulate a frame is performed by a VXLAN Tunnel Endpoint (VTEP), also
referred to as VXLAN gateway. A VXLAN gateway can be a Layer 2 gateway or Layer 3 gateway
depending on its capacity. A Layer 2 gateway acts as a bridge connecting VXLAN segments to VLAN
segments. A Layer 3 gateway performs all that of Layer 2 gateway, and capable of routing traffic
between tenant VLANs.
Note
This feature implements only Layer 2 gateway.
At tunnel initiation, a gateway looks up the destination MAC address of the frame received from the
tenant VM. If the MAC address to remote VTEP IP binding is known, the gateway adds the VXLAN
header and the IP/UDP header to the frame and forwards toward the DC network. A gateway node that
terminates a tunnel removes the encapsulation headers from the packet and determines the bridge
domain of the inner frame by examining the VNID received in the VXLAN header. The gateway then
looks up the inner MAC destination address (DA) in the tenant VLAN's filtering database and decides
either to flood or forward the frame to tenant ports.
The VXLAN segments with the same virtual network ID form a virtual network with one Ethernet
broadcast domain.
In multicast VXLAN, the VNI is mapped to a multicast group and multicast tunnels are used to distribute
broadcast, unknown unicast and multicast (BUM) tenant traffic to remote endpoints (VTEPs). This
requires that the Layer 3 network should support multicast. Unicast VXLAN uses unicast tunnels, and
the BUM traffic is head-end replicated at each of the remote endpoints.
Note
This feature implements only unicast VXLAN.
Supported Platforms
Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.
Limitations
The following capabilities are not supported in ExtremeXOS 21.1:
• Layer 3 gateways
• Multicast VXLAN
• Ability to assign more than one VNI to a virtual network
• IPv6 addresses for local and remote VTEPs
• Assigning source IP addresses for VXLAN gateway encapsulation:
• Per virtual router
• Per virtual network or VNI
• Support for adding more than one tenant VLAN per VNI
• A physical port being part of both a tenant VLAN and an underlay (network) VLAN
• Routing in and out of tunnels
• Integration with any controllers
• Support for heterogeneous stack environments where at least one of the stack nodes is not VXLAN
capable
• More than one next hop per (network) hop
• Tagged and untagged tenant VLANs on the same port
Open Shortest Path First (OSPF) Exchanging Information for Virtual Extensible LAN (VXLANs)
ExtremeXOS leverages Open Shortest Path First (OSPF) to advertise and learn VTEPs dynamically in a
VXLAN network. OSPFv2 advertises the triplet of VNI/Endpoint IP Address/Advertising Router ID
through OSPFv2 domain using type 11 opaque link state advertisements (LSAs). The OSPFv2 VXLAN
LSA link state ID uses opaque type 128. The remaining 24 bits of the field are set to the VXLAN VNI.
Each locally configured VNI corresponds to a single opaque LSA advertised by the router. The OSPFv2
VXLAN LSA payload contains one top level TLV that specifies the locally configured IPv4 endpoint
address on the advertising router.
Note
• The remote endpoints learned using OSPF are not saved to the configuration.
• The OSPFv2 VXLAN opaque LSA is only advertised if OSPF VXLAN extensions are
enabled.
• OSPF VXLAN extensions can only be enabled when OSPFv2 is disabled.
• Local endpoint address can only be IPv4. IPv6 is not supported.
Supported Platforms
Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.
The show ospf command output has been changed (shown in bold):
show ospf
This feature is now supported on the new ExtremeSwitching X440-G2 and X620 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• When stacking switches that have different capacities, the stack goes to the lowest common level of
capacities and functionality when possible. If the stack already has an existing configuration that
exceeds the new lower capacity, policy disallows the ports on the new switch to become policy-
enabled.
• Only 'macdest', 'macsource', or 'port' policy rules can be applied to QinQ (that is, double-tagged)
packets received on an untagged VMAN port.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• SNMP is not supported.
Version :
ExtremeXOS version 15.7.0.22 fixes_v1570b9 by kosharma
on Tue Feb 24 11:53:33 IST 2015
Native VLAN : 1
Duplex : Full
SysName : X440-24t-10G
Location : Chennai
Power Request Id : 24333
Power Management Id : 2
Power Drawn : 1500 mW
Power Consumed : 3454 mW
This feature allows backup routers to take part in L3 routing for the packets it receives with the
destination address equal to VMAC. Backup routers enabled with this feature are called Fabric Routing
Enabled Backup (FREB) routers. This feature allows
• Load sharing of traffic between VRRP routers
• Saves bandwidth on the links connecting master and backup routers
This solution is applicable for all topologies, such as MLAG, EAPS, or STP.
Platform
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• Fabric Routing feature will not be supported for VRRP VR for which Virtual IP is same as interface IP
(owned IP).
• Traffic sent from host destined for VIP, will be L3 forwarded by FREB router if FREB router sits in
between, even though both are in same subnet. VIP cannot be used to run protocols between host
and VRRP router which will expect TTL value not be decremented, for example BFD.
• PVLAN configuration is not supported in this release.
• VLAN Aggregation configuration is not supported in this release.
Platform
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• Bound to FDB’s ARP limitations
• Bound to Route Manager’s entry limitations
The existing enable ospf export, disable ospf export, and configure ospf export
commands are expanded to allow a new route type of "host-mobility". Configuring host-mobility to be
exported causes OSPF to redistribute host-mobility routes.
The existing enable ospfv3 export and disable ospfv3 commands are expanded to allow a
new route type of "host-mobility". Configuring host-mobility to be exported causes OSPFv3 to
redistribute host-mobility routes.
# show ospf
OSPF : Disabled MPLS LSP as Next-Hop: No
RouterId : 0.0.0.0 RouterId Selection : Automatic
ASBR : No ABR : No
ExtLSA : 0 ExtLSAChecksum : 0x0
OriginateNewLSA : 0 ReceivedNewLSA : 0
SpfHoldTime : 3 Lsa Batch Interval : 30s
CapabilityOpaqueLSA : Enabled
10M Cost : 10 100M Cost : 5
1000M Cost (1G) : 4 10000M Cost (10G) : 2
40000M Cost (40G) : 2
# show ospfv3
OSPFv3 : Disabled RouterId : 0.0.0.0
RouterId Selection : Automatic ASBR : No
ABR : No ExtLSAs : 0
ExtLSAChecksum : 0x0 OriginateNewLSAs : 0
ReceivedNewLSAs : 0 SpfHoldTime : 3s
Num of Areas : 1 LSA Batch Interval : 0s
10M Cost : 100 100M Cost : 50
1000M Cost (1G) : 40 10000M Cost (10G) : 20
40000M Cost (40G) : 20 100000M Cost (100G) : 10
Graceful Restart : None Grace Period : 120s
Import Policy File : none
Redistribute:
Protocol Status Cost Type Tag Policy
direct Disabled 20 2 --- none
e-bgp Disabled 20 2 --- none
i-bgp Disabled 20 2 --- none
ripng Disabled 20 2 --- none
static Disabled 20 2 --- none
isis-level-1 Disabled 20 2 --- none
isis-level-2 Disabled 20 2 --- none
isis-level-1-external Disabled 20 2 --- none
isis-level-2-external Disabled 20 2 --- none
host-mobility Enabled 0 2 --- none
show iproute
Ori Destination Gateway Mtr Flags VLAN Duration
d 192.168.24.0/24 192.168.24.44 1 -------um---- vlan24 0d:4h:20m:48s
*hm 192.168.23.1/32 192.168.23.1 1 UGHD---u---f- vlan23 0d:0h:16m:5s
Flags: (b) BFD protection requested, (B) BlackHole, (c) Compressed, (D) Dynamic,
(f) Provided to FIB, (G) Gateway, (H) Host Route, (l) Calculated LDP LSP,
(L) Matching LDP LSP, (m) Multicast, (p) BFD protection active, (P) LPM-routing,
(R) Modified, (s) Static LSP, (S) Static, (t) Calculated RSVP-TE LSP,
(T) Matching RSVP-TE LSP, (u) Unicast, (U) Up, (3) L3VPN Route.
Origin(Ori):(b) BlackHole, (be) EBGP, (bg) BGP, (bi) IBGP, (bo) BOOTP,
(ct) CBT, (d) Direct, (df) DownIF, (dv) DVMRP, (e1) ISISL1Ext,
(e2) ISISL2Ext, (h) Hardcoded, (i) ICMP, (i1) ISISL1 (i2) ISISL2,
(is) ISIS, (mb) MBGP, (mbe) MBGPExt, (mbi) MBGPInter, (ma) MPLSIntra,
(mr) MPLSInter, (mo) MOSPF (o) OSPFv3, (o1) OSPFv3Ext1, (o2) OSPFv3Ext2,
(oa) OSPFv3Intra, (oe) OSPFv3AsExt, (or) OSPFv3Inter, (pd) PIM-DM, (ps) PIM-
SM,
(r) RIPng, (ra) RtAdvrt, (s) Static, (sv) SLB_VIP, (hm) Host-mobility, (un)
UnKnown,
(*) Preferred unicast route (@) Preferred multicast route,
(#) Preferred unicast and multicast route.
Flags: (b) BFD protection requested, (B) BlackHole, (c) Compressed Route,
(D) Dynamic, (f) Provided to FIB, (G) Gateway, (H) Host Route,
(l) Calculated LDP LSP, (L) Matching LDP LSP, (m) Multicast,
(p) BFD protection active, (P) LPM-routing, (R) Modified, (s) Static LSP,
(S) Static, (t) Calculated RSVP-TE LSP, (T) Matching RSVP-TE LSP,
(u) Unicast, (U) Up, (3) L3VPN Route.
Mask distribution:
2 routes at length 64
Static 1100
HostMobility 1150
ICMP 1200
EBGP 1700
IBGP 1900
OSPFIntra 2200
OSPFInter 2300
Isis 2350
IsisL1 2360
IsisL2 2370
RIP 2400
OSPFAsExt 3100
OSPFExt1 3200
OSPFExt2 3300
IsisL1Ext 3400
IsisL2Ext 3500
Bootp 5000
Static 1100
HostMobility 1150
ICMP 1200
EBGP 1700
IBGP 1900
OSPFv3Intra 2200
OSPFv3Inter 2300
Isis 2350
IsisL1 2360
IsisL2 2370
RIPng 2400
OSPFv3AsExt 3100
OSPFv3Ext1 3200
OSPFv3Ext2 3300
IsisL1Ext 3400
Supported Platforms
Summit X460-G2 series switches
DefaultMirror (Disabled)
Description: Default Mirror Instance, created automatically
Mirror to port: -
MyMirror (Disabled)
Description:
Mirror to port: 2:1
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• Support for maximum AS-Path length is on a BGP instance basis, not per peer.
• Enabling the capability to carry IPv6 Network Layer Reachability Information (NLRI) over IPv4
peering sessions and IPv4 NLRI over IPv6 sessions does not include the ability to have mismatching
next-hops. You must use outbound route-policy to specify the BGP next-hop value to be a reachable
subnet for the remote router or the remote router must have a means to reach the next-hop. For
IPv6 NLRI carried over IPv4 peering sessions, in the absence of route policy to set the next-hop, the
next-hop is automatically set to the mapped IPv6 address based on the IPv4 address of the
outgoing interface. You should either override this with policy or program the downstream router
with a static route to reach the mapped address. In either case, it is assumed the VLAN interface
used for peering is configured with both IPv4 and IPv6 addresses.
• The ability to carry mismatching NLRI applies to the Unicast, Multicast, and VPNv4 Sub-Address-
Families (SAFIs). The VPNv6 SAFI is not supported.
The following commands now allows you to enable the capability to carry NLRI of address family
indicator (AFI)/SAFI combinations even if the specified AFI does not match the address family of the
peering sessions:
Supported Platforms
Summit X460-G2, X670-G2, X770 series switches, with Core License or above.
Limitations
• The BFD setting can be applied on a per-peer basis, but the ability to set BFD on a peer-group or
address-family basis is not currently supported.
• The BGP peer must be in the disabled admin state to modify its BFD setting.
• While BFD can be enabled on any BGP peering session, protection is only provided for directly
connected EBGP peering sessions.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
Groups and tables are implemented as read only.
The following objects are defined in the CFM Group MIB module:
• extremeCfmNotifications
• extremeCfmMibObjects
• extremeCfmMibConformance
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
The LACP Fallback feature lets you select a single port that is automatically added to the aggregator if
LACP data units (LACPDUs) do not appear on any of the member ports within the specified period of
time. If LACPDUs are exchanged before this timeout expires, an aggregator is formed using traditional
means. If LACPDUs are not received, an active port with the lowest priority value is automatically added
to the aggregator (enters fallback state). If ports have the same priority value, the lowest port number
on the lowest slot number is chosen.
The selected port stays in the fallback state until fallback is disabled or until LACPDUs are received on
any of the member ports, at which point the old aggregator is removed and a new one is selected
based on information propagated in the LACPDUs. The new fallback port may also be re-elected if the
existing fallback port changes its state (for example, port priority change, link bounce, port disable/
enable, etc.).
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
When using LACP fallback with MLAG, fallback port is selected only on the LACP master.
Enabled : Yes
LAG State : Up
Unack count : 0
Wait-for-count : 0
Current timeout : Long
Activity mode : Active
Defaulted Action : Delete
Fallback : Enabled
Fallback timeout : 40 seconds
Receive state : Enabled
Transmit state : Enabled
Minimum active : 1
Selected count : 1
Standby count : 0
LAG Id flag : Yes
S.pri:0 , S.id:00:04:96:6d:55:13, K:0x03f9
T.pri:0 , T.id:00:00:00:00:00:00, L:0x0000
Port list:
The show lacp member-port port detail command now shows fallback information (shown
in bold):
# show lacp member-port 18 detail
Bidirectional Forwarding Detection (BFD) hardware assist support provides the functionality to run a
BFD session in hardware. Effective failure detection requires BFD to run at high frequencies (using
aggressive timers as low as 3 ms), which is not possible in the software mode because of CPU and
ExtremeXOS restrictions.
To make BFD sessions run in the hardware, the following configuration is required.
• Unused front panel port (not available for switching the user data traffic) configured as a loopback
port. The port is used internally by the BFD hardware to send control packets.
• IPforwarding is enabled on the BFD interfaces.
• Nexthop MAC address of neighbor should be known for the session creation. BFD process triggers
ARP to resolve the next hop MAC address, if not configured statically.
Supported Platforms
• Summit X460-G2 series switches, standalone only
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
• Removal of the preamble and interframe gap (IFG) overhead for the rate policing and shaping
functions
• Support for meter out-of-profile action for setting a specified 802.1p value
• Support for ACL match criteria “ccos” for matching customer 802.1p on UNI or NNI ports
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
The output of the show forwarding configuration command now shows rate limit information
(shown in bold):
# show forwarding configuration
L2 and L3 Forwarding table hash algorithm:
Configured hash algorithm: crc32
Current hash algorithm: crc32
L3 Dual-Hash configuration: (Applies to "c", "xl"-series and 8900-40GX-xm)
Configured setting: on
Current setting: on
Dual-Hash Recursion Level: 1
Hash criteria for IP unicast traffic for L2 load sharing and ECMP route sharing
Sharing criteria: L3_L4
IP multicast:
Group Table Compression: on
Local Network Forwarding: slow-path
Lookup-Key: (SourceIP, GroupIP, VlanId)
External lookup tables:
Configured Setting: l2-and-l3
Current Setting: l2-and-l3
Switch Settings:
Switching mode: store-and-forward
L2 Protocol:
Fast convergence: on
Rate Limit:
Overhead Bytes: 20
Fabric Flow Control:
Fabric Flow Control: auto
Link Aggregation Group (LAG) Support for Audio Video Bridging (AVB)
This feature completes the capability to use Link Aggregation Group (LAG) ports with Audio Video
Bridging (AVB) by adding support for LAG ports with Multiple Stream Reservation Protocol (MSRP).
This feature adds two modes for how MSRP calculates the available bandwidth of a LAG for use in
making stream reservations:
• Single-port mode simply provides link redundancy and the LAG effective bandwidth is the same as
the bandwidth of a single member port.
• Cumulative mode allows bandwidth aggregation and the LAG effective bandwidth is set to a
configurable percent of aggregate bandwidth of the member ports in the LAG. This feature also
adds generalized Precision Time Protocol (gPTP) configuration support at the LAG level. Only the
LAG master port need be specified when making gPTP configurations. However, the protocol is still
running on each member port at the physical port level.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
For the preceding command, with LAG support, the port speed is replaced with “effective speed”. For
physical ports, the effective speed is equivalent to the port speed (shown in bold).
Port Enabled Oper Effectv Dplx Jumbo Jumbo Cls Bndry State Sr-Pvid
Speed Size App/Reg
---- ------- ------ ------ ---- ----- ----- --- ----- ------- -------
*2g Y Up 150 M Full N 9216 A N QA/IN 2
B N QA/IN 2
*48 Y Up 1000 M Full N 9216 A N QA/IN 2
B N QA/IN 2
With the detail option, and if the port is a LAG, additional information appears:
The Event Management System supports the logging of event occurrences to external Syslog server
targets. Each Syslog server target is identified by its IP address, UDP port, VRID, and local use facility
(for example: “local0” through “local7”). Previously, the IP address of a Syslog server target was limited
to the IPv4 address family; but with this feature it can be of the IPv6 address family.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
The output of the show netlogin command now includes the authentication delay period value
(shown in bold):
The “local-slot” distribution mode is useful for reducing the fabric bandwidth load of a switch. Reducing
fabric bandwidth may be especially important for a SummitStack, which has significantly less fabric
(inter-slot) bandwidth available in comparison to chassis switches. In many chassis or SummitStack
hardware configurations, the “local-slot” distribution mode may reduce the switching latency of some
flows distributed to a LAG.
The use of the “port-lists” distribution mode should be taken into consideration when adding ports to a
LAG with the configure sharing command. Any newly added port on a LAG is not available for
unicast distribution unless it is also added to the distribution port list of at least one slot.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
The distribution modes affect only the distribution of known unicast packets on a LAG. Non-unicast
packets are distributed among all active members of a LAG.
The show sharing and show ports port_list sharing commands now display the
distribution mode for a LAG under the “Flag” column:
The show sharing and show ports port_list sharing commands now display the
configured distribution mode and distribution port lists for LAGs:
Additionally, the CVID associated with the configured port CVID is also stripped in the same operation.
If the port is CEP and CEP egress filtering in enabled, only the specified port CVID and CVIDs are
allowed to egress.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• Any limitations that currently exist with untagged VMAN ports also exist when the Port VLAN ID
element is additionally applied.
• VPLS service VMANs are not allowed to have port-cvid configurations.
Resilient Hashing
Resilient Hashing is a hardware-based capability that minimizes the remapping of flows to aggregator
member ports during aggregator member changes.
In conventional hashing, physical links are used to form fat logical pipes. The static hash scheme
associates a flow with a physical link. When a link fails, even flows that did not originally flow through
the failed link may be assigned to a new link. This reassignment may temporarily result in out-of-order
packet deliver even for the flows that were not using the failed link. In contrast, a resilient hashing
scheme associates flows with physical ports. When a link fails, only the affected flows are redistributed
uniformly across the remaining good physical links. Flows using functioning links remain unaffected and
are not reassigned to new links.
Supported Platforms
Summit X770 and X670-G2, and on SummitStacks when at least one of the supported switches is
included in the stack.
On SummitStacks, configuration of resilient hashing is not allowed unless at least one node in the stack
supports resilient hashing. In a stack where one or more nodes support resilient hashing and one or
more nodes do not support resilient hashing, resilient hashing is only in effect for flows received on
ports on nodes where resilient hashing is supported by the hardware.
Limitations
• Resilient hashing is available only on LAGs configured to use the “custom” distribution algorithm.
• Resilient Hashing applies only to the distribution of known unicast traffic.
• Traffic originating or forwarded by the system CPU is not distributed using Resilient Hashing.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
The following show commands now display additional information (shown in bold):
show ospfv3
Unknown 0
Interface v1
------------------------
LSA Type Count
------------------------
Link 0
Unknown 0
Area ID 0.0.0.0
------------------------
LSA Type Count
------------------------
Router 3
Network 1
Inter-Area-Prefix 7
Inter-Area-Router 1
NSSA 0
Intra-Area-Prefix 1
Unknown 0
Global
------------------------
LSA Type Count
------------------------
AS External 1
Unknown 0
Area ID 0.0.0.0
------------------------
LSA Type Count
------------------------
Router 3
Network 0
Inter-Area-Prefix 0
Inter-Area-Router 0
Intra-Area-Prefix 0
Unknown 0
SSHServer is migrated from SSH toolkit to OpenSSH, where the SSH server is added as part of the
exsshd process. ExtremeXOS 21.1 supports SSH protocol version 2 from OpenSSH. Although the SSH
server is added to exsshd, the key generation is not performed by exsshd. This is done separately by
another module from OpenSSH, ssh-keyGen, which is invoked from exsshd. The generated key is stored
in /etc/ssh/ssh_host_dsa_key and /etc/ssh/ssh_host_dsa_key.pub. The same format
is used for any keys that are imported to OpenSSH.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Limitations
• Keyboard interactive authentication is not supported.
• Host key algorithms are not configurable.
Applications are management software modules that manage, configure, or monitor specific functions
within a switch. The applications leverage existing ExtremeXOS capabilities and protocols to simplify
complex tasks. You may download applications to a switch independently from an ExtremeXOS release
(see ezServiceablity (File Upload/Download) on page 43).
• Python method—allows the remote system to send inline Python scripts to run on a switch. You
can use inline Python scripting to perform complex tasks not available using the ExtremeXOS
CLI.
• Configuration Applications.
• Application manager—provides the ability to dynamically add management applications at run time.
Applications may be developed independently from the ExtremeXOS release cycle.
• ezMLAG—works with Chalet web screens and peer switches. It can communicate with peer switches
to perform the complex task of setting up and maintaining MLAG configurations.
• VXLAN—works with Chalet to manage VXLAN configuration coordination across multiple switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
The allowed file extensions for <path> are: ,pol, cfg, xsf, py, pkt, and xml.
• The app/file/cfg URL is a shortcut for files in the /usr/local/cfg directory.
Note
ExtremeSwitching X440-G2 10 Gigabit model switches require a license to upgrade the
four SFP 1GbE ports to 10G. For more information, see ExtremeXOS 21.1 Feature License
Requirements.
Note
These hardware platforms are supported in the ExtremeXOS 16.x software.
Example
The enable stpd auto-bind command VLAN ID input should be entered as:
enable stpd auto-bind vlan 10,20-30
Not:
enable stpd auto-bind vlan 10, 20-30
When upgrading to ExtremeXOS 21.1 and later, SSH keys generated by ExtremeXOS versions 16.1 and
earlier are compatible and do not need to be re-generated.
Note
If a switch is downgraded from ExtremeXOS 21.1 or later to previous releases, with RSA key
saved, the key becomes invalid.
This guide also provides information about which optics are supported on which hardware platforms,
and the minimum software version required.
The latest version of this and other ExtremeXOS guides are at: www.extremenetworks.com/
documentation/
Upgrading ExtremeXOS
For instructions about upgrading ExtremeXOS software, see "Software Upgrade and Boot Options" in
the ExtremeXOS 22.3 User Guide.
Beginning with ExtremeXOS 12.1, an ExtremeXOS core image (.xos file) must be downloaded and
installed on the alternate (non-active) partition. If you try to download to an active partition, the error
message Error: Image can only be installed to the non-active partition.
appears. An ExtremeXOS modular software package (.xmod file) can still be downloaded and installed
on either the active or alternate partition.
Supported MIBs
The Extreme Networks MIBs are located at www.extremenetworks.com/support/policies/mibs/.
You need to provide your serial number or agreement number, and then the MIBs are available under
each release.
For detailed information on which MIBs and SNMP traps are supported, see the Extreme Networks
Proprietary MIBs and MIB Support Details sections in the ExtremeXOS 21.1 User Guide.
Service Notifications
To receive proactive service notification about newly released software or technical service
communications (for example, field notices, product change notices, etc.), please register at:
www.extremenetworks.com/support/service-notification-form
Table 3 summarizes tested metrics for a variety of features, as measured in a per-system basis unless
otherwise noted. These limits may change, but represent the current status. The contents of this table
supersede any values mentioned in the ExtremeXOS books.
The scaling and performance information shown in Table 3 is provided for the purpose of assisting with
network design. It is recommended that network architects and administrators design and manage
networks with an appropriate level of network scaling “head room.” The scaling and performance
figures provided have been verified using specific network topologies using limited switch
configurations. There is no guarantee that the scaling and performance figures shown are applicable to
all network topologies and switch configurations and are provided as a realistic estimation only. If you
experience scaling and performance characteristics that you feel are sufficiently below what has been
documented, contact Extreme Networks technical support for additional assistance.
The route limits shown in Table 3 for IPv4 and IPv6 routing protocols are software limits only. The actual
hardware limits may be higher or lower than the software limits, based on platform. The hardware limits
for specific platforms are specified as "IPv4/IPv6 routes (LPM entries in hardware)" in the following
table.
It is not advised to have greater than 25,000 total IP routes from all routing protocols. Adverse effects
can occur with routing tables larger than this, especially when a single network event or CLI command
affects a significant number of routes. For example, just after such a network event, the added system
load will cause a save configuration command to time out.
BGP (peer groups)—maximum Summit X460-G2, X670-G2, X770 with Core license or higher 64
number of BGP peer groups. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGP (policy entries)— Summit X460-G2, X670-G2, X770 with Core license or higher 256
maximum number of BGP Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
policy entries per route policy.
EAPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
EAPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620 Not supported
protected VLANs. ExtremeSwitching X440-G2
ELSM (vlan-ports)—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 5,000
number of VLAN ports. ExtremeSwitching X620
ERPS domains—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 32
number of ERPS domains ExtremeSwitching X620
without CFM configured.
ERPS domains—maximum Summit X450-G2, X670-G2, X770, and ExtremeSwitching 16
number of ERPS domains with X620 32
CFM configured. Summit X460-G2
ERPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ERPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ESRP groups—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 31
number of ESRP groups. ExtremeSwitching X440-G2, X620
IPv6 routes in software— Summit X450-G2, X460-G2, X670-G2, X770, and 25,000
maximum number of IPv6 ExtremeSwitching X620, X440-G2
routes in software.
IP router interfaces—maximum Summit X460-G2, X770, X670-G2, X450-G2 2,048
number of VLANs performing ExtremeSwitching X620, X440-G2 510
IPv4 and/or IPv6 routing.
Excludes sub-VLANs.
IP multicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of
permanent multicast IP routes.
IP unicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of ExtremeSwitching X620, X440-G2 480
permanent IP unicast routes.
IP route sharing (maximum Summit X460-G2, X670-G2, X450-G2, X770, and 2, 4, 8, 16, or 32
gateways)—Configurable ExtremeSwitching X620 N/A
maximum number of gateways ExtremeSwitching X440-G2
used by equal cost multipath
OSPF, BGP, IS-IS, static routes,
or L2VPNs. Routing protocol
OSPF is limited to 16 ECMP
gateways per destination.
Routing protocols BGP is
limited to 64 ECMP gateways
per destination, while and IS-IS
is limited to 8. Static routes are
limited to 32 next-hops.
L2VPNs are limited to 16 LSPs
per pseudowire on platforms
that support 32 gateways, and
64 LSPs per pseudowire on
platforms that support 64
gateways.
ExtremeSwitching X440-G2
IP multinetting (secondary IP Summit X450-G2, X460-G2, X670-G2, X770, and 255
addresses)—maximum ExtremeSwitching X620, X440-G2
number of secondary IP
addresses per VLAN.
IS-IS adjacencies—maximum Summit X460-G2, X670-G2, X770 128
number of supported IS-IS Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
adjacencies.
Note::
• Limit value same for MVR
senders, PIM Snooping
entries. PIM SSM cache,
IGMP senders, PIM cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.
• Layer 3 IPMC cache limit in
mixed mode also has the
same value.
Note::
• Limit value same for MLD
sender per switch,PIM IPv6
cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.
1 4 ingress
2 3 ingress + 1 egress
3 2 ingress + 2 egress
4 2 (ingress + egress)
5 1 (ingress + egress) + 2 ingress
6 1 (ingress + egress) + 1 egress + 1 ingress
Mirroring, one-to-many (filters) Summit X450-G2, X460-G2, X670-G2, X770, and 128
—maximum number of one-to- ExtremeSwitching X620, X440-G2
many mirroring filters.
N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 40 entries per
Slaves clock port
ExtremeSwitching X440-G2, X620 N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 10 entries per
Masters clock type
ExtremeSwitching X440-G2, X620 N/A
Route policies—suggested Summit X460-G2, X670-G2, X770, and ExtremeSwitching 10,000
maximum number of lines in a X620, X440-G2
route policy file.
RIP Learned Routes— Summit X770, X670-G2, X460-G2, and ExtremeSwitching 10,000
maximum number of RIP X440-G2, X620
routes supported without
aggregation.
RIP interfaces on a single Summit X670-G2, X460-G2 256
router—recommended Summit X770, X450-G2 256
maximum number of RIP ExtremeSwitching X440-G2, X620 128
routed interfaces on a switch.
RIPng learned routes— Summit X670-G2, X460-G2, X770, X450-G2 3,000
maximum number of RIPng ExtremeSwitching X440-G2, X620 N/A
routes.
Spanning Tree (maximum Summit X450-G2, X770, X670-G2, X460-G2, and 64
STPDs)—maximum number of ExtremeSwitchingX620 32
Spanning Tree Domains on ExtremeSwitching X440-G2
port mode EMISTP.
VRRP (maximum ping tracks) Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
—maximum number of ping ExtremeSwitching X620, X440-G2 centisecond or 1
tracks per VRRP Instance second hello
under 128 VRRP instances, interval)
with Advanced Edge license or
higher.
VRRP (v3-IPv6) (maximum Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
ping tracks)—maximum ExtremeSwitching X620, X440-G2 centisecond or 1
number of ping tracks per second hello
VRRP Instance under 128 interval)
VRRP instances, with
Advanced Edge license or
higher.
VRRP (v2/v3-IPv4/IPv6) Summit X450-G2, X460-G2, X670-G2, X770, and 8
(maximum iproute tracks)— ExtremeSwitching X620, X440-G2
maximum number of IP route
tracks per VLAN.
This chapter lists open software issues, limitations in ExtremeXOS system architecture (known issues),
and resolved issues in ExtremeXOS.
Open Issues
The following are new open issues for supported features found in ExtremeXOS 21.1.5 Patch 1-2.
xos0062966 When rendezvous point receives (*, G) join, and it has (S, G, RPT) entry, the entry
should be converted to (S, G), and (S, G) join should be sent upstream. However,
sometimes wrong assert is triggered and this new entry is dropped after a minute,
resulting in complete traffic loss.
Workaround: Either use BFD to keep all router neighbors alive, or configure static
neighbors and static FDB entries for all router neighbors. BFD is the preferred
method.
xos0062399 IPv6 BFD session for OSPFv3 flaps after disabling, and then enabling VLAN port.
SummitStack
xos0062386 With BGPv6, after port flap or failovers, some peers go into idle state.
xos0061909 Creating an IPFIX mirroring instance to a monitor port, deleting the mirroring
instance, and then recreating it again to a different monitor port, causes the
following error message (similar to the one below) to appear, and IPFIX mirroring
does not work:
<Erro:HAL.Mirror.Error> Slot-1: Failed to create mirroring
destination for slot 2, unit 9 Entry exists
Workaround: If the error appears in the log, disable and delete the mirror instance,
and then add it back again.
Workaround:
• When 10G combo ports are used at 1G for redundancy between fiber and copper,
then set the preferred medium to copper (configure ports
port_list preferred-medium copper), otherwise sometimes the
copper link might not come up.
• When 10G combo ports are used at 10G for redundancy between fiber and
copper, then set the preferred medium to fiber (configure ports
port_list preferred-medium fiber), otherwise sometimes the
copper link might not come up.
xos0062620 For ExtremeXOS 21.1, do not use copper DAC cables for stacking on
ExtremeSwitching X620-16T switches.
Summit X670-G2 Series Switches
xos0063170 On Summit X670-G2 series switches, greater EAPS convergence time occurs with
multiple VLANs (1,000 protected VLANs).
xos0063492 When a 1G port (SX/BASET) is used as a loopback port for mirroring to a port-list,
the port does not come back to active state after disabling mirroring.
Summit X460-G2 Series Switches
• When the 10G ports operate at 1G speed, the network clock does not lock. Models
with Ethernet BASE-T or Power over Ethernet (PoE) ports may lock on initial
configuration, but do not lock after a save and reboot.
Workaround: For SyncE input at 1G, use a 1G port, not a 10G port.
xos0063412 CFM fault not detected locally after disabling CCM for hardware Down MEP.
ExtremeSwitching X440-G2 Series Switches
xos0062236 EEE becomes disabled on combo ports after peer ports are disabled, and then
enabled.
xos0062773 After switch boot up or restart of process dot1ag, 95% CPU utilization occurs with 32
UP MEPs (maximum value).
xos0062895 On ExtremeSwitching X440-G2 stack, process nettools fails to start after rebooting
with DHCPv6 client enabled. Switch reboots repeatedly and reports the following
errors:
10/20/2015 11:31:06.45 <Erro:EPM.crash_rate> Slot-1: Process
netTools exceeded pre-configured or default crash rate
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-1: Process netTools
Failed
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-1: Process netTools
Failed
10/20/2015 11:31:06.45 <Erro:DM.Error> Slot-3: Node State[4] =
FAIL (Not In Sync)
10/20/2015 11:31:06.46 <Erro:DM.Error> Slot-1: Node State[4] =
FAIL (Process Failure)
10/20/2015 11:31:06.61 <Crit:NM.NodeStateFail> Slot-1: Slot-3 has
failed for the reason of "Not In Sync".
xos0062899 DHCPv6 client remains in initializing state after disabling, and then enabling, the port
in the relay switch.
Workaround: Restart process nettools, or disable, and then enable, DHCP client.
xos0063678 In ExtremeSwitching X440-G2 stack, rebooting backup slot with CFM 32 Down MEP
configuration times out with the following errors:
Error: This command is not permitted on nodes that are not active
02/16/2016 15:16:34.06 <Warn:HAL.Stacking.Warning> Slot-1: Timed
out waiting for 1 reboot replies.
02/16/2016 15:16:34.06 <Warn:HAL.Stacking.Warning> Slot-1: Timed
out waiting for 1 reboot replies.
NetLogin
xos0062680 Switch fails to send Radius accounting message for dot1x user after clear
netlogin state port <portNumber> command.
Optics
xos0062092 For Finisar LX-SFP optics, RxPower appears as "inf" instead of displaying correct
value in the output of the show port transceiver information
detail command.
SNMP
xos0062492 Traps having tabular variables as varbinds should include the instance along with the
tabular OID.
xos0062523 SNMP traps for overheat and negative temperatures incorrectly report detected
problems.
xos0062525 extremeEdpNeighborAdded/extremeEdpRemoved traps varbinds need to include
the instance along with the OID.
xos0062527 The varbinds of extremePowerSupplyGood, extremePsuPowerStatus traps need to
include the instance along with the OID.
Known Behaviors
The following are limitations in ExtremeXOS system architecture that have yet to be resolved.
SSH
xos0063327 If a switch is downgraded from ExtremeXOS 21.1 to previous releases, with RSA key saved,
the key becomes invalid.
VXLAN
xos0060213 Same port cannot be a part of network as well as tenant VLANs.
xos0063148 Rate-limit actions do not work when the port is added as VXLAN tenant on VLAN ports.
xos0059594 Egress mirroring of VXLAN traffic is not supported.
xos0059464 With no network ports configured and the switch receives VXLAN traffic from the access
VLAN side, traffic is sent to the CPU, causing high BCMRx usage (around 50%), which in
turn affects other parts of the system, such as OSPF (neighbor flap), pings etc.
The frames are going to the CPU because they have the MAC DA and Destination IP address
of the local switch. This behavior is no different than if the switch were a non-VXLAN-
capable switch.
By default all ports can terminate VXLAN traffic. If network ports are deleted with
configure virtual-network delete network ports portlist any
VXLAN traffic on these ports is sent to the CPU.
xos0062919 With VXLAN configuration, after rebooting the following error appears:
<Erro:HAL.IPv4Mc.GrpTblFull> IPv4 multicast entry not added. Hardware
Group Table full.
xos0069058 LACP packets are sent with VLAN tag 0 from backup node on a
SummitStack.
xos0069823 The output of the show fan command reports 0 RPM for other stack
node’s fans intermittently.
Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3
CR Number Description
General
xos0057140 Transceiver information for 40G Q+SR4 optic module shows invalid
power and threshold values.
xos0065665 Incorrect MAC address entries appear in "l2_user_entry" table.
xos0067280 Uploading a file using SFTP creates a read-only file on the switch.
xos0068002 File system check of /dev/hda8 failed error occurs during switch power
cycle after “manufacture-init”.
xos0068304 External PSU status appears as "failed" in show power command
output even though it is not present.
Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3 (continued)
CR Number Description
xos0068687 Multicast traffic to host randomly stops when enabling onePolicy with
PVID 4095.
xos0068767 Trap receiver configuration is not saved in ExtremeXOS when configured
from Extreme Management Center.
xos0068785 L2PT packets fail to switch over to backup path during failover.
xos0068810 SNMP walk on entPhysicalClass returns Other(1) instead of Fan(7) for fan
trays.
xos0068840 NetLogin process ends unexpectedly with signal 11, when client sends
logoff message before completing the authentication process.
xos0068911 After enabling STP auto-bind on a VLAN, removing all ports from the
VLAN, and then adding them back, displays STP tag as "(none)" in the
show ports information detail command.
xos0069061 Exsshd process ends unexpectedly with signal 11 during stack failover.
xos0069070 The process BCMAsync stops processing with scaled route/ARP entries
in hash table.
xos0069220 Users can access Chalet by easily guessing the login session ID created
by an existing session.
xos0062256 When auto-polarity is turned off, link comes up for straight cable rather
than crossover connection.
xos0062785 Need a mechanism to avoid configuring static route gateway and local IP
as the same.
xos0062882 Whole MIB compilation gets stuck at EXTREME-V2-TRAP MIB.
xos0065300 Kernel crash occurs when there are continuous new multicast streams
with PIM SM configuration.
xos0067587 When running show tech-support command with user-created
VRs, show configuration command does not display full
configuration.
xos0068888 When the command show tech-support all detail is
executed after running enable cli-config-logging,
messages beginning with "serial unknown" appear in the log. This issue
also occurs when executed from a Telnet session.
xos0069051 After 65,000 new FDB entries are learned, subsequent entries are
continuously added and deleted.
xos0069114 The show configuration command output displays additional
word "minutes" under "aaa" module when lockout-time-period is
configured.
xos0069150 In the output of the show vlan command, ports can have both "!" and
"*" flags set if the port is a share group port.
xos0069180 Cannot configure some IP security features after removing and adding
ports from VLANs.
Table 10: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4-Patch1-3 (continued)
CR Number Description
xos0069196 Inconsistent port learning flag appears in HAL with PVLAN and MLAG
configuration.
xos0069210 Unable to create private VLAN with 32-character name if the first 31
characters match an existing private VLAN name.
xos0069423 When using Chalet to configure the sysContact and sysLocation,
semicolon is not allowed.
Summit X770 Series Switches
xos0069487 HAL process ends unexpectedly with signal 6 when switch boots up with
PTP configurations.
Summit X440-G2 Series Switches
xos0068490 On ExtremeSwitching X440G2-48P/48t switches, cable diagnostic script
(cablediag.py) does not work.
SummitStack
xos0068500 HAL timeout occurs while rebooting the stack using the command
reboot stack-topology.
Security
xos0069306 Session hijacking (CVE-2017-14332): A remote user can hijack a session
on the switch web server due to the SessionIDs used by the webserver
authentication service on ExtremeXOS being insufficiently random. Also,
documented in xos0069140.
xos0069140 The following are ExtremeXOS vulnerabilities due to scripting allowed
when in FIPS mode:
• Escape from EXSH restricted shell (CVE-2017-14331)
• Information disclosure (CVE-2017-14327)
• Privilege Escalation (root interactive shell) (CVE-2017-14329)
• Privilege Escalation (root interactive shell) (CVE-2017-14330)
The following are additional ExtremeXOS vulnerabilities:
• Denial-of-service (CVE-2017-14328). See also xos0069213.
• Session hijacking (CVE-2017-14332). See also xos0069306.
xos0069213 Denial-of-service (CVE-2017-14328): A remote user can force the switch
to reboot by sending a single, specially crafted SOAP packet to the web
server. Also documented in xos0069140.
21.1.2, and ExtremeXOS 21.1.3. For information about those fixes, see the release notes for the specific
release.
Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4
CR Number Description
General
xos0054568 ESVT fails to function with jumbo-sized loopback frames. The show
esvt traffic-test output indicates the test completed
successfully, but no frame counts are indicated.
xos0064727 On DHCPv6 clients, sometimes the IPv6 address is not removed even
after disabling the client, and after rebooting, the IPv6 address is saved
and this causes the client to go into a stopped state with the following
error message appearing:
<Erro:vlan.AddIPAddrFail> Failed to add IP addr
8001::4aa6:dd38:9b32:e7b/128 from DHCPv6 to VLAN client,
DHCPv6 configured IPv6 address already exist on
interface client
xos0064741 After reboot, dirty bit is set without a configuration change if mgmt
VLAN has IP address configured/obtained.
xos0064798 Configured port's STP properties are lost when the port is moved from
one VLAN to another.
xos0065400 VLAN name and tag do not appear correctly when VLAN is created with
VLAN name as "tag".
xos0066782 BFD session ends when removing CVID from a service VMAN port.
xos0066783 Using IDMgr, UPM, and Policy combination makes client not reachable
untill IDMgr settles down.
xos0067063 Rtlookup is not able to display all the ECMP routes.
xos0067161 LACP flap occurs when disabling the mirror on port where LAG is
configured with LACP.
xos0067182 Authentication on switch using RSA keys stops working if one of the user
keys is deleted.
xos0067227 IDMgr entries are not flushed when ARP fast-convergence is on.
xos0067546 EPM process ends unexpectedly when SSH process is restarted while
SNMP query on memory statistics is still in progress.
xos0067704 The process exsh ends unexpectedly after issuing command with include
option that uses # via SSH script.
xos0067739 UDP configuration is lost after reboot with IP DAD enabled.
xos0067822 Memory leak occurs in XMLD process whenever Chalet session refresh
happens.
xos0067824 STP BPDUs are continuously sent after enabling and disabling MSTP on
an STP port.
xos0067841 Packets are dropped at ingress port for traffic at rate greater than 1000
pps when 500 ACL installed
Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4 (continued)
CR Number Description
xos0068191 Nettools process ends unexpectedly with signal 11 while rebooting the
switch with 100+ DHCP clients connected via Relay and with Smart Relay
enabled.
xos0068215 Logout dialog box appears even after disabling Netlogin logout-
privilege.
xos0068302 With both HTTP and HTTPS enabled, sending HTTP request from
NetLogin client causes the switch to return with HTTP response instead
of HTTPS.
xos0068323 In ExtremeXOS Python scripting, the argument sent to the command
Exsh.clicmd is replicated 24 times.
xos0068356 Informational messages appear on the console when an NTP-enabled
VLAN becomes inactive.
xos0068556 SSH with command argument as "show commands" is not working with
user account.
xos0068698 In NetLogin web, after you click the logout button, you are not redirected
to a page with the message “You have logged outâ€.
xos0068750 AAA process ends unexpectedly with signal 11 when processing a
corrupted RADIUS-challenge packet.
xos0068752 Kernel crash occurs when processing a packet with an invalid IP header
length.
xos0065167 Add optic support for MGBIC-LC04 Avago HFBR-57E0PZ-EN1.
xos0067807 On BlackDiamond 8800 series switches, the VRRP process monopolizes
40–50% CPU after disable/enable slot, or after <i>restart ports all</i>
when the switch has VRRP enabled on 120 STP-protected VLANs.
xos0064680 STP port-specific configuration is lost after disabling load sharing or
moving the port to a different VLAN.
xos0066366 On VPLS network with LAG on access side, clearing FDB on LSRs and
LERs results in traffic drop.
xos0066483 The encrypted shared secret for TACAS accounting secondary servers
does not appear in the configuration.
xos0067206 Unable to login to Chalet with any account that uses an ampersand (&)
character.
xos0068023 Hash collision warning message appears with invalid VRID when
exceeding L3 hash table limit.
xos0067271 FDB mismatch occurs between software and hardware after deleting,
and then adding, ISC port multiple times.
xos0066726 Hal process ends unexpectedly with signal 11 when trying to add port to
network vlan of pvlan.
xos0067493 PTPv1 packets are dropped on the port if GPTP is enabled on the same
port.
xos0066962 Port does not links up properly with GBIC Source Photonics 100FX
SPGFEFXCDFCCEX.
Table 11: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.4 (continued)
CR Number Description
xos0064790 Number of used "L4 Port Ranges" count is incorrect in show
access-list usage acl-range port output after
unconfiguring few ACL rules with "L4 port range" match condition.
xos0068374 With OSPFv3 16-way ECMP, rtlookup for destination shows multiple
duplicate entries.
xos0068454 In ISP mode, if no ports are associated with the NetLogin VLAN, then the
client cannot access the base URL.
xos0068057 HAL process ends unexpectedly with signal 6 and 11 when deleting and
re-adding subscriber VLAN from private VLAN.
xos0067459 HAL ends unexpectedly with signal 11 while sending L3 known traffic over
PVLAN configuration.
xos0068528 Link issue with 5 meter DAC cable.
xos0065009 The following error message appears when executing show tech
all command from multiple Telnet sessions:
<Crit:DM.InitIPMLSrvrFail> Initialization of the IPML
TCP connection for the Fault Tolerant service the on
port 7750 failed.
xos0065975 Process expy ends unexpectedly with signal 11 when rebooting the switch
after configuring port partition.
xos0067515 VPWS traffic forwarding stops after performing failover in the switch.
Summit X440-G2 Series Switches
xos0068466 "Fan Failures RPM out of Range" messages appear on ExtremeSwitching
X440-G2 series switches.
Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7
CR Number Description
General
xos0062758 With policy enabled, client authenticated using NetLogin is not getting
aged out when reauthentication is configured.
Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
xos0065527 Edge safeguard configuration gets lost when ports are removed and
added back to default VLAN.
xos0066477 Creating a VLAN starting with "vr" causes syntax recognition problems
with the show iparp vr command.
xos0066557 Kernel crash occurs after removing a subVLAN from one VR and adding
the same subVLAN in another VR.
xos0066932 Actual/configured sFlow sample rates are different after reconfiguring.
xos0066984 RADIUS-accounting request packet shows incorrect account-terminate
reason for user logout from SSH/Telnet session.
xos0066996 ESRP does not update the neighbor state properly while becoming
master from neutral state.
xos0067002 UPM status is "fail" if UPM profile has <i>save configuration as-script</i>
as the last command.
xos0067079 ACL installation for the policy authenticated client is failing when diffserv
replacement and meter configuration is present in the switch.
xos0067108 Packets received on STP blocked ports gets forwarded to other STP port
when netlogin & onePolicy is enabled with authentication mode optional.
xos0067323 FDBs are learned on incorrect VPLS peer on PE switches after include/
exclude dot1q tag in P switch.
xos0067325 After recovering from multiple link failures, ERPS incorrectly keeps both
the ring links in blocked state.
xos0067335 Memory leak occurs in VMT process when it is enabled on the port.
xos0067463 Traffic does not distribute across LSPs and LAG after enabling L2VPN
sharing feature.
xos0067506 A few VRRP instances remain in dual master state if VRRP state changes
for several VLANs in the same VRID within a short time period.
xos0067820 ExtremeXOS refuses connections with usernames starting with letters h,
i ,j, k, p, q, r, and s using SOAP/XML.
xos0067887 Switch reboots unexpectedly when there are continuous SSH attempts
and those attempts are rejected with access-profile.
xos0067912 The command show port protocol filter displays the
"Error: Configuration reply is too big" in output.
xos0068209 PIM process ends unexpectedly with signal 11.
xos0066941 Add a support for USB Zero Touch Provisioning.
xos0067583 Add support to configure ping success for VRRP track-ping.
xos0067973 After run failover, IDM kerberos system ACLAs are missing for some users
in new master.
xos0059947 Spurious log messages occur in the hardware while deleting tenant
VLAN in the switch.
Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
xos0065930 ACLCBFUNC log occurs after associating a policy that has CLEAR-flow
and network-zone configuration.
xos0066883 Process HAL ends unexpectedly with signal 11 on restarting all ports with
basic VXLAN configuration.
xos0066921 ARP fails to resolve for some hosts.
xos0067084 FDB is not learned over pseudowire after disabling, and then enabling,
learning on network VLAN ports.
xos0068099 After rebooting the switch, BGP neighbor configuration is lost when a
peer group is configured.
xos0067087 CFM LMR/DMR packets are sent with dot1p value 0.
xos0065571 Ping fails over L3VPN tunnel when the corresponding ARPs are in Layer
3 hardware hash table as "Extended View". Affects Summit X450-G2,
X670-G2, and X770 platforms.
xos0060343 On Summit X670v stack, configuration file replication on standby nodes
times out after second or third failover.
xos0067106 In dot1x authorization, service unavailable vlan port is re-authenticated in
every authorization causing blocked port.
xos0063669 Erro:RtMgr.Client.ReplyTimeOut messages appear after run failover/
reboot:
<Warn:EPM.hello_rate> Slot-2: Received hellos from
process rtmgr 2 more often then expected 3
<Erro:RtMgr.Client.ReplyTimeOut> Slot-2: Client with
ID=0x00000012 Timed out waiting for (ADDUPDRTE).
<Erro:RtMgr.Client.ReplyTimeOut> Slot-2: Client with
ID=0x00000012 Timed out waiting for (RTEGET).
xos0067446 "ACL filter update failed" error occurs when modifying the code point
value.
xos0066963 Jumbo frame is disabled on master port after rebooting when ports are
partitioned.
xos0062668 MIB compilation issues occur with VLAN MIB when using mgsoft.
xos0066697 Delay occurs in password prompt appearing when trying to establish
SSH connection.
xos0064870 Slots fail sometimes when applying PVLAN and STP configuration.
Summit X440-G2 Series Switches
xos0066945 On Summit X440-G2 series switches, 10G ports are not coming up with
5-meter passive copper cable when connected to ExtremeSwitching
X620-16X.
Summit X670-G2 Series Switches
xos0066844 Port with copper SFP inserted appears as active even if it is
administratively disabled.
Table 12: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-7 (continued)
CR Number Description
SummitStack
xos0058499 In SummitStack, the snmpEngine values are maintained in each node
separately instead of a single value, which is causing different values on
each failover.
Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4
CR Number Description
General
xos0052786 BGP aggregation command demands global unicast addresses (GUA)
and does not work with IPv6 unicast addresses.
xos0054222 Unable to add second IPv6 address prefix to the network-zone after
adding IPv4 address.
xos0064727 On DHCPv6 clients, sometimes the IPv6 address is not removed even
after disabling the client, and after rebooting, the IPv6 address is saved
and this causes the client to go into a stopped state with the following
error message appearing:
<Erro:vlan.AddIPAddrFail> Failed to add IP addr
8001::4aa6:dd38:9b32:e7b/128 from DHCPv6 to VLAN client,
DHCPv6 configured IPv6 address already exist on
interface client
xos0065654 Etmon process ends unexpectedly with signal 10 when packet size in
sampled packet is a negative integer.
xos0066072 The command configure ports rate-limit flood
out-actions disable-port does not take effect until the
command clear meter out-of-profile is executed.
xos0066444 Kernel error "Unable to copy IPMC index" appears in MLAG peers with
PIM dense mode.
xos0066590 In an MLAG peer when its MLAG port is down, the following error
appears: "Group <ip> not found for VLAN".
Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0066770 Memory leak occurs in aaa process when NetLogin dot1x client times out
or authentication fails for the client.
xos0066775 Configured peer group capabilities and policies are not reflected after
creating a new BGP neighbor.
xos0066874 Memory leak observed in AAA process when dot1x clients are
authenticated frequently.
xos0066923 Need commands to configure "reload-delay" timer for MLAG ports.
xos0066931 Exsshd process consumes ~90% CPU when the command clear
session is executed for the open SSH sessions.
xos0066982 In NetLogin dot1x, RADIUS retries are not working properly.
xos0067055 Log message "Process exsshd sends hello too often" appears when SSH
is enabled in the switch.
xos0067076 NetLogin process ends unexpectedly while fetching the client details
using SNMP MIB etsysMACAuthenticationMACSession and it happens
only when there is MAC move observed for the clients.
xos0067194 Topology change notification is not generated for the STP domain dot1d
mode when there is change in the topology.
xos0067203 Multicast packets are being flooded on EAPS blocked port while
removing and adding the ports configured with PSTAG.
xos0064672 Incorrect state observed for DHCPv6 client when restarting the nettools
process or rebooting the switch.
xos0066489 Loop occurs in ERPSv2 setup after rebooting one of the interconnecting
nodes.
xos0066490 ERPS in non-RPL nodes remains in pending state after rebooting
interconnection node.
xos0062966 When rendezvous point receives (*, G) join, and it has (S, G, RPT) entry,
the entry should be converted to (S, G), and (S, G) join should be sent
upstream. However, sometimes wrong assert is triggered and this new
entry is dropped after a minute, resulting in complete traffic loss.
Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0066891 Packets are being forwarded without a tag after rebooting when PSTAG
configured. This issue occurs when VLANs are configured with VID as "1".
xos0066926 Errors occur when configuring OpenFlow in passive mode.
xos0066950 Hash collision error messages may appear when there is contention for
the L3 Hash table:
<Warn:Kern.IPv4Adj.Warning> vrId 0 adj 0x00000002 Error
finding adjacency when deleting hash collision.
xos0066986 OSPF E1 routes in NSSA area are removed/not updated properly in the
routing table
xos0067048 Multicast traffic is not forwarded on PStag ports when port is also added
as part of another non-PStag VLAN.
xos0067138 BFD is not working for IP static multicast route.
xos0066774 IPv6 flow redirect does not work after slot is disabled, and then enabled
again.
xos0066040 Error message appears when adding a CEP port to a VMAN:
<Erro:HAL.MPLS.Error> pibAddCVIDMappedServices: vlan
1000 tagged 0 cepPvid 100
xos0066667 With VPLS, multicast traffic for service VLAN is dropped after disabling
and enabling the LAG ports if same port is configured as untagged in
VMAN and tagged in VLAN.
xos0063856 On enabling SSH2, switch displays key generation time as approximately
15 minutes whereas it actually takes less than one minute.
xos0067328 If you load a configuration file containing an SSH key length lesser than
the actual key size stored in the switch EEPROM, the following message
appears during bootup: "Enter passphrase:".
xos0063261 Warning message to "restart process exsshd" should appear when
configuring SSH2 key.
xos0066406 Scaled PStag configuration with non-PStag VLANs causes PStag error
messages and installation of additional IPMC rules.
NWI Series Switches
xos0066301 Transceiver is not detected on NWI platforms.
SummitStack
xos0067096 Multicast traffic is dropped on front panel port 1:1 when management
port goes down on stacking switch.
xos0067253 IPv4 packets ingressing a non-master stack node can be dropped when
the port number of the destination's ARP entry is unknown, such as
when the destination is using Network Load Balancing (NLB).
xos0066423 In SummitStacks, with policy re-authentication and continuous MAC
move scenarios, ACL delete requests are failing in backup node.
Summit X460-G2 Series Switches
Table 13: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3-Patch1-4 (continued)
CR Number Description
xos0057796 Power is momentarily denied to PoE devices connected on ports when a
redundant PSU is inserted.
xos0067077 In Summit X460-G2 alternate stacks, 10G links from the VIM-2T module
of the backup slot go down after saving, and then rebooting.
Summit X770 Series Switches
xos0053091 In Summit X770 series switches, additional link flaps occur on 40G ports
after reboot.
Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3
CR Number Description
General
xos0052432 Need provision for advertising/receiving unique local IPv6 unicast address
(ULA) using BGP protocol.
xos0062037 DHCP snooping entry gets programmed without client port number.
xos0063551 SNMP polling on CFM segment frame-delay statistics returns incorrect
values.
xos0064923 When a remote loop is detected by ELRP (ingress and egress port of loop
detection is the same) an excessive number of log messages occur.
xos0065210 With account lockout feature configured, an appropriate log message is
not generated when users are locked out after three unsuccessful login
attempts.
xos0065313 Need Idle-timeout feature added to Chalet.
xos0065321 With SSH session, source address information is not sent to TACACs
accounting server.
xos0065479 A CLI option is needed to save the state of whether or not the following
traps are enabled for cfgMgmtConfigChangeTrap and
cfgMgmtSaveConfigTrap.
xos0065525 Need modifications in port ID TLV. Device ID TLV is sent in CDP messages.
Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0065552 RADIUS-accounting request packet shows incorrect reason for client
termination.
xos0065615 Local multicast traffic is not egressing using a newly added member port
in a LAG.
xos0065805 Constant flush happens in ERPS non-revertive mode when the port being
blocked is non-RPL.
xos0065830 After port flaps, OSPF-learned routes are not present in kernel database.
xos0065896 Need addition of capability flags in show cdp neighbor command
output.
xos0065897 When continuous SSH attempts are made to a switch, exsshd process ends
unexpectedly with signal 6.
xos0065943 SNMP walk for extremePortUtilizationTable returns integer value, but CLI
output returns decimal value.
xos0065987 Service port FDB entries are learned on physical port of Network VLAN in
provider switch.
xos0066060 OpenFlow error message appears when rule is not getting installed in
hardware and same flow is received immediately for another installation.
xos0066156 Switch reboots unexpectedly due to memory leak in dot1ag process.
xos0066231 With default NetLogin configuration, extremeNetloginuser login and
logout traps are not sent.
xos0066323 When MLAG is configured with alternate path and ISC link goes down, a
peer down log message is not generated.
xos0066325 When MLAG is configured with alternate path and primary path goes
down, SNMP trap for ExtremeMlagPeerDown object is not generated.
xos0066345 XMLC process ends unexpectedly with signal 6 when sending XML
notification to Ridgeline server.
xos0066367 Need to have a "clear" command to change ERPS ring state from
"pending" to "idle" state.
xos0066398 COA disconnects are incorrectly logged as idle timeouts in EMS.
xos0066626 NetLogin process ends unexpectedly with signal 11 when RADIUS accept
packet contains MS-ipv4-remediation-servers attribute with an incorrect IP
address.
xos0066758 SSH login fails in first attempt, but succeeds in the second attempt, during
RADIUS authentication even if credentials are valid.
xos0066804 Routes learned from OSPF are lost after multiple port flaps occur.
xos0064025 Need to support Methode SP7051-EXT 10Gb-T RJ45 transceiver.
xos0064138 Client identifier option length in DHCPv6 solicit packet is 16 instead of 14
with Link layer address padded with zeroes.
Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0066224 User name is missing from output of show log command for NetLogin
users when they are cleared by link down/restart process NetLogin event
immediately after reboot.
xos0066610 Error "Cannot open Python script" appears after executing a Python script
stored under a user-created subdirectory.
xos0051490 External LSA generated by an ASBR in NSSA area contains wrong
forwarding address.
xos0063959 BGP routes become unfeasible when default routes are advertised through
OSPF or BGP.
xos0064874 Tagged frames should be processed for authentication with NetLogin and
policy enabled.
xos0065372 MPLS error messages occur after disabling, and then enabling network
VLANs.
xos0065490 IGMP packets are forwarded over EAPS-blocked ports when PSTAG is
configured on protected VLANs.
xos0065648 When a MAC address moves from a NetLogin-enabled port (mac-vlan
mode) to a non-NetLogin-enabled port, the VLAN_MAC table can become
full resulting in the following message:
amp;ltWarn:HAL.FDB.MacVlanAddFail&gt MAC-based VLAN
entry 78:7E:61:A1:DC:DC vlan 2600 addition to port 22
failed, Table full
xos0065742 SNMP traps are not generated for BGP state change events.
xos0065977 Random Nettools process ends unexpectedly with Signal 5 when router
discovery and DNS is enabled.
xos0066029 In Summit X460-G2 stacks, LACP keeps flapping due to forwarding one
LACP PDU to another group.
xos0066476 MPLS label TTL is not set properly for VPLS traffic in RSVP-TE.
xos0066772 Local multicast fast-path forwarding does not work for a few ports when
IGMP filter is in per-VLAN mode.
xos0066018 When VPLS service VLAN port is added to a VMAN as untagged, VPLS
service VLANs L2 traffic is forwarded into VMAN.
xos0066089 HAL process ends unexpectedly when a port is configured with
ipmcforwarding to-cpu off and it is not added to any VLAN.
xos0061317 Switch reboots unexpectedly when enabling FIP snooping.
xos0065159 OpenFlow process ends unexpectedly with signal 11 when OpenFlow
controller installs LLDP flow.
xos0060485 MPLS process ends unexpectedly with signal 11 when changing the LSR ID.
xos0066036 Kernel crash occurs when sending multicast traffic over Private VLAN.
xos0066759 Switch stops to transmit CPU-generated packets when slow path
forwarded packet rate is high.
Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0060461 Need command option for iBGP and eBGP protocolS under the
configure iproute ipv6 priority command.
xos0066004 When using the same debug password on different Telnet sessions of
same switch, cliMaster process ends unexpectedly.
xos0059489 ERPS process ends unexpectedly when ERPS tries to send hello packet
during reboot.
xos0065326 Multicast packet are dropped after enabling diffserv examination, with
hardware BFD assist causing OSPF and MPLS adjacency drops.
xos0065845 Traffic drops between the CVID configured ports in the VPLS service
VMAN when CEP egress filtering is enabled.
xos0066140 RSTP BPDU is not transmitted even though STP state is in forwarding
mode when loop-protect is enabled.
xos0065920, xos0065764 Link status goes to Ready state on port with 10/100/1000BASE-T optics
after multiple reboots.
xos0065962 OTM process ends unexpectedly when creating, and then deleting, 700
VXLAN segments.
xos0063806 After establishing SSH session with switch for some time, SSH login fails
and the command show management becomes unresponsive.
xos0065712 When repeated login and logout is performed using SSH-PKI (SSH login
using certificates) for about two days from eight terminals, memory leak
occurs.
xos0066837 When the switch is rebooted, the edge port gets blocked even though the
STP domain is disabled.
xos0066895 ELRP process ends unexpectedly when loop is detected in the switch.
xos0066806 PIM checkpointing loop occurs between two switches that have two ISCs
over two VRs.
SummitStack
xos0065387 SNMP times out while when saving on an eight-node stack of Summit
X440 series switches.
xos0065756 In SummitStacks, alternate IP address is used for external communication
even though a Management IP address is configured.
xos0066008 Random slots or whole stack reboots when one of the standby nodes in
the stack is power cycled with sys-recovery-level configured as
"shutdown".
xos0066085 Restart of some processes does not work properly when the standby slot
has a lower license level.
xos0065972 HAL process ends unexpectedly with signal 6 when rebooting stacks with
virtual MAC configuration for ESRP.
xos0066104 In SummitStacks, memory leak occurs in backup slot when configuring
LLDP to advertise power-via-mdi with classification.
xos0066331 Layer 3 traffic is not forwarded after multiple stack failovers.
Table 14: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.3 (continued)
CR Number Description
xos0065507 Hal process ends unexpectedly when failover is executed with 4,000
virtual networks, and tenant VLAN and traffic are sent with incremental
MAC addresses.
xos0065150 When LAG ports are added to VPLS, LACP flap occurs after rebooting the
slots in the stack.
ExtremeSwitching X620 Series Switches
xos0064012 In ExtremeSwitching X620 series switch, non-combo ports remain in down
state after multiple reboots.
Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2
CR Number Description
General
xos0065393 Memory leak occurs in HAL process after FDB entries age out.
xos0065519 Loops may occur in network after the performing the following specific
sequence:
xos0054151 DHCP server configuration is lost after reboot when IP DAD is on.
xos0061948 VLAN statistics not working after modifying the shared group.
xos0062722 NetLogin does not work after a port moved to translation VLAN expires.
xos0063194 Dot1x authentication fails after rebooting the client when it is connected
via IP phone.
xos0063326 Need to reduce the severity of "BGP resource full" message from Error to
Info.
xos0063424 Source MAC address is learned on the incorrect VLAN for double-tagged
packets with inner VLAN ID that is the same as the VPLS service VLAN ID.
Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2 (continued)
CR Number Description
xos0063509 Controlling trap behavior is not working in NetLogin.
xos0064023 L3 table full log appears because of false resource full triggered by link
flaps.
xos0064501 Lacking forbidden VLAN concept in OnePolicy feature.
xos0064706 Cannot use SSH client after using "vi script.py" or "load script script".
xos0064707 Error message from the load script command does not indicate that
Python is a supported script language.
xos0064841 LLDP stops advertising VLAN information on port after enabling LAG.
xos0064889 Layer 3 traffic through an MLAG peer in a failed state is not forwarded
when there is a state change in the EAPS ring where this MLAG peer is a
transit node.
xos0064904 With a frequent re-authentication period set (>= 30 seconds), NetLogin
process leaks memory.
xos0064984 Kernel oops occurs randomly when continuous SSH connection attempts
are made to the switch.
xos0065005 Rtmgr process ends unexpectedly some times during frequent route
transitions with Multicast, MPLS, and OSPF routes.
xos0065056 After applying meter to multiple VLANs, switch stops responding after
executing show access-list meter vlan.
Table 15: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2-Patch1-2 (continued)
CR Number Description
xos0065322 IPv6 neighbor-discovery max_pending_entries configuration for USER-VR
does not appear in output of show configuration command and is
lost after reboot.
xos0065344 The output of the show vid command shows flag status incorrectly.
xos0065661 IPMC error messages occur when multicast cache entries are created/
deleted for sub-VLAN, when sub-VLAN and super-VLAN belong to
different virtual routers.
xos0065677 With harmless ECC single-bit errors, Kernel error logs "ERROR
PBANK_LSB".
xos0065542 Kernel crash occurs when rebooting the switch with a physical loop.
xos0065871 LLDP process ends unexpectedly with signal 6 when doing SNMP walk for
lldpXMedLocLocationTable.
ExtremeSwitching X440-G2 Series Switches
xos0064801 In ExtremeSwitching X44-0G2 series switches, the output of the <i>show
temperature</i> command displays incorrect value..
ExtremeSwitching X620 Series Switches
xos0065079 ExtremeSwitching X620 series switches show external PSU as always
powered off.
SummitStack
xos0065157 In SummitStacks with remote mirroring configurations, the remote-tag is
not added for software-forwarded packets.
xos0064758 In SummitStacks, when doing SNMP walk for LLDP MIB, port number does
not represent the ifIndex or dot1dBasePort number.
xos0065088 With broadcast traffic flooded across the slots, the standby node stays in
rebooting state after consecutive master failovers by cycling the power off,
and then on.
xos0065071 When backup node is in failed state due to license mismatch, master node
CPU utilization spikes to 100% and stops responding.
Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2
CR Number Description
General
xos0055511 While configuring STP (802.1d) with port-encapsulation mode as EMISTP
where the L2PT-enabled VMAN and access VLAN have the same tag, the
designated bridge is not accepting the L2PT tunneled BPDUs from the
root bridge, and thus causes a loop (designated bridge also becomes a
root bridge).
This problem does not occur:
• When the access VLAN's tag and the L2PT-enabled VMAN's tag are
different.
• Without any L2PT configured, with the same tag used for the access
VLAN and provider-edge VMAN.
• When using Per-VLAN Spanning Tree Plus (PVST+), regardless of same
or different tags.
Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0064436 When adding ports to VLAN from Chalet, IPforwarding gets disabled for
that VLAN.
xos0064447 Creation of user accounts through XML does not work.
xos0064459 Nettools process ends unexpectedly with signal 11 when processing router
advertisement packets with DNSSL option.
xos0064682 Enabling egress VMAN CEP filtering on a CEP port sends a tagged packet,
even though it should be forwarded as untagged.
xos0064863 Hostname is not getting resolved via DNS while initiating SSH/SCP/TFTP
from switch.
xos0064956 EDP neighbors are not displayed when remote mirroring is disabled or
after unconfiguring a monitor port of remote mirroring.
xos0064960 Multicast traffic is forwarded through MVR receiver port in a VLAN even if
there is no active receiver.
xos0065189 BGP secondary best path is not active when primary best path goes down.
Summit Series Switches
xos0058437 For Summit X460 and X670-G2 series switches, the buffer for Weighted
Random Early Detection (WRED) queues is incorrectly allocated at 10% of
shared memory plus minimum guarantee, when it should be 100% of
shared memory plus minimum guarantee.
xos0062972 Add Support for the following optics on Summit X670-G2 and X770 series
switches:
• 10329, 908618-10, 40Gb BiDi QSFP+
• Avago AFBR-79EBPZ-EX1 optic transceiver
xos0064232 On some systems, after changing a VPWS service VLAN tag, traffic
continues to be forwarded with the prior tag.
Summit X620 Series Switches
xos0062729 On Summit X620 series switches, for ports with Base-T SFP optics and
explicitly configured at 1,000 speed, link comes up at peer end, but link
stays down at local end after either rebooting, or removing, and then re-
inserting optics.
xos0062890 On Summit X620 series switches, 100 mbps SFPs (100FX, FX/LX, BASET)
fail to link on reboot.
Summit X440-G2 Series Switches
xos0062583 Policy: Dynamic VLAN is not removed from backup slot after issuing
unconfigure policy maptable.
Summit X460-G2 Series Switches
Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0063811 Summit X460-G2 series switches with ExtremeXOS 15.6 through 21.1, have
the following limitations for SyncE input reference frequency:
• Network clock does not lock with input SyncE source port 52 (both at
10G and 1G speed) on all 48-port models (X460-G2-48t, 48x and 48p).
• When the 10G ports operate at 1G speed, the network clock does not
lock. Models with Ethernet BASE-T or Power over Ethernet (PoE) ports
may lock on initial configuration, but do not lock after a save and
reboot.
xos0063960 Several help options do not appear for the show fdb command.
Table 16: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.2 (continued)
CR Number Description
xos0063968 HAL process ends unexpectedly after changing/reverting service VLAN
tag.
Python
xos0064122 The command show tech-support terminates prematurely when
40G or 100G optics are present in the switch.
SNMP
xos0057212 SNMP traps not sent after changing or saving configuration, even though
respective traps are enabled.
xos0064114 SNMP process ends unexpectedly with signal 6 when switch time is
modified.
SSH
xos0063347 IPv6 address is not supported in SCP client present in the device.
VLANs
xos0062912 SNMP trap sent for link up/down status change does not include port
instance.
xos0063837 After deleting pstag port from a VLAN that has two LAG ports added as
untagged, an error message appears.
xos0064094 Removing subscriber VLAN from one PVLAN affects traffic in another
PVLAN.
xos0064491 The configuration of a disabled VLAN without any ports does not appear
in the output of the show configuration command.
VRRP
xos0063346 With multiple (greater than two) VRRP instances and host-mobility
enabled, FDB flush sent during topology change from other L2 protocols
does not occur.
Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5
CR Number Description
General
xos0055541 TACACS: On configuring shared secret key in encrypted form with
characters "&" and "<" , the show configuration aaa output
shows a different secret key from what was actually configured.
xos0057931 After rebooting the switch multiple times, following error log message
appears:
<Erro:cm.loadErr> Failed to load configuration: timed out
(after 150 seconds) while waiting for all applications to
get ready to load configuration on OPERATIONAL ( eaps is
still not ready yet)
.
xos0062265 Some legacy commands are not recognized.
xos0062444 Kernel panic occurs in DoS protect-enabled switches when TCN SYN
packets to port 80 are flooded to Management port.
xos0063331 VLAN IP address is unconfigured when modifying the VLAN name/port
information from Chalet.
xos0063332 Configuration changes to VPLS are not fully retrieved by SNMP walk,
which returns values for only few VPLS index.
xos0063842 Packets are being flooded in both network and access VLAN ports after
port flap.
xos0063995 SNMP sysUpTime does not return correct value after failover.
xos0064009 MLAG+EAPS:Traffic forwarding stops after EAPS that include ISC link
converges.
xos0064054 SNMPwalk on extremeAclStatsTable returns value with port instance
instead of ifIndex.
xos0064055 Resiliency Enhancement for IPv4 and IPv6 Static Routes feature has been
added.
xos0064063 Packet-Resolution match conditions need to be added as ACL match
conditions.
xos0064075 The output of the show fan command shows fan status as "Failed" after
hot re-seating a fan module.
xos0064129 Policy refresh never completes with network-zone configuration.
xos0064151 Error occurs when removing DHCP configuration from VLANs when LAG
ports are added to the VLANs.
xos0064178 Hardware entries not released on disabling of ports in a LAG connecting
an L2VPN router to the MPLS core when L2VPN sharing is configured and
in use.
xos0064179 MAC movement occurs in switch acting as an STP root bridge when PVST+
BPDUs are sent by peer switch using STP blocked port.
xos0064203 Incorrect next hop is chosen by BGP route after port flap.
Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5 (continued)
CR Number Description
xos0064215 The following log message appears when a subnet is reachable both using
MPLS and non-MPLS:
<Warn:Kern.IPv4FIB.Warning> Slot-4: dest 0x0A420000 / 24
nexthop 0xAC11121E: Unable to add route to unit 1, rc
Entry not found. Shadow problem.
xos0064223 Need to add an ACL match condition for matching next-hop addresses
during the look-up cycle of a packet, so that actions can be taken based on
the next-hop a packet is destined for.
xos0064278 In a SummitStack or BlackDiamond chassis, FDB is not programmed in
hardware after three failovers and fallback.
xos0064281 In Chalet, switch inappropriately displays logs for user accounts under
enhanced security mode.
xos0064299 The hal process ends unexpectedly after executing the command debug
packet capture on.
xos0064307 RADIUS accounting configuration is incorrect as shown by the command
show conf aaa and is lost after upgrade.
xos0064319 Aggregated BGP route is not transmitted to upstream neighbor when
highest prefix route is received from neighbor.
xos0064326 LACP flaps when the LAG port is added to VMAN, with the VMAN
ethertype same as LACP ethertype.
xos0064357 Out of sync between PIM and RTMgr process after introducing new best
route.
xos0064383 In the show l2vpn detail command output, the "PW Tx Pkts"
counters are not updated for VPWS sessions even though traffic is passing
correctly.
xos0064395 STP digest value gets changed when adding the port in VLAN or removing
the port from VLAN.
xos0064490 After upgrading from ExtremeXOS 15.2 to later release, last installed
dynamic ACL rule is given more priority than previously installed rules.
xos0064519 With MVR enabled on two VLANs, IGMP report packets are looped if sent
to all hosts group.
xos0064589 While learning BGP routes, some routes are not getting installed in route
table when deleting and re-adding the static route.
xos0064033 In Summit X670 series switches, traffic gets software forwarded after
disabling/enabling members of a shared group and recreating the shared
group after deletion.
xos0062720 Unable to save configuration when ACL/CFM is configured on multiple
VLANs.
xos0063429 The output of the command show fan shows the fan status as empty
after a hot re-seating of the fan module.
xos0064400 When switch boots up with factory default configuration, Zero Touch
Provisioning (ZTP+) is enabled automatically and IP is resolved correctly
using DHCP, but this causes flooding to be disabled on all ports.
Table 17: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-5 (continued)
CR Number Description
xos0063693 With L2VPN sharing, traffic loss occurs after LSP failover.
xos0061018 After failover, traffic fails across VPLS configured with 64 LSPs across LAG.
xos0064312 With VXLAN, if tenant VLAN and tunnel are on different VRs, FDB is not
learned on a tunnel.
xos0063844 With VXLAN, MLAG port in backup slot is not added to aggregator after
reboot of switch followed by disable and enable of port.
xos0064136 Unable to configure flood rate limit as 1 packets per second.
Summit X670 Series Switches
xos0057671 Link status goes to Ready state on port with 10/100/1000BASE-T optics
after multiple reboots.
xos0063263 On Summit X670 series switches, 1000BaseSX optics are incorrectly
detected as 100BaseFX.
SummitStack
xos0061834 In SummitStacks, the command synchronize stacking slot
<slot no> does not work from master node if the target slot is in failed
state.
xos0061861 A per-port meter configured on a SummitStack may not be properly
configured on the backup node following a reboot.
xos0062484 EPM process crashes on master if image upgrade on a standby slot
exceeds 30 minutes.
Summit X670-G2 Series Switches
xos0064574 In X670G2, IPMC cache entries are limited to 5000, when the lookup key is
changed from Source-Group-Vlan to Group-Vlan mode or vice versa.
BlackDiamond X8 Series Switches
xos0064010 The command show port buffer displays an incorrect port range
for 100G I/O modules.
xos0060666 After failover, traffic gets flooded on the ports of service VLAN in H-VPLS
core.
Summit X440 Series Switches
xos0063627 ARP is not re-added to hardware after it is removed initially due to the
table being full.
ExtremeXOS 15.7.1, and ExtremeXOS 16.1.3. For information about those fixes, see the release notes for
the specific release.
Table 18: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-2
CR Number Description
General
xos0061745 Ampersand used in UPM script is replaced by “& amp” in the XSF
configuration.
xos0062850 When upgrading ExtremeXOS to 15.7 or later releases, the web HTTP access
is enabled even though it is disabled in the configuration.
xos0063028 RADIUS configuration with shared-secret of 32 character is lost after reboot.
xos0063082 Updated DSCP value is not refreshed for Dynamic ACLs.
xos0063186 Kernel oops occurs when deleting private VLAN.
xos0063282 ExtremeXOS CLI restricts PVLAN subscriber VLAN from being configured as
an EAPS-protected VLAN.
xos0063423 Memory leak occurs in ISIS process when exporting OSPF routes to ISIS.
xos0063465 Cannot add/delete ports to load-shared MLAG ports without disabling
MLAG.
xos0063484 Enhancement added in STP flush generation mechanism to reduce hardware
programming load.
xos0063495 Policy authentication fails when RADIUS request queue has stale entries.
xos0063614 Kernel crash occurs when receiving DHCP packets with invalid field values.
xos0063710 Kernel oops occurs on switch with Private VLAN and MLAG configuration
after executing restart ports all.
Table 18: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs) in
ExtremeXOS 21.1.1-Patch1-2 (continued)
CR Number Description
xos0063463 Static FDB created on PSTag VLAN port is incorrectly displayed in show
configuration command.
xos0063494 OSPFv3 process ends unexpectedly on BFD-enabled switches, if there are
frequent link flaps for a long duration.
xos0063814 UPM process ends unexpectedly with Signal 11 occasionally when UPM
timers are configured.
xos0063849 VXLAN: The commands disable ospf and disable OSPF
vxlan-extensions does not flush learned RTEPs.
xos0064045 Need support for tagged and untagged VXLAN tenant VLANs on the same
port.
xos0064122 The command show tech-support terminates prematurely when
40G or 100G optics are present in the switch.
xos0061506 In Summit X440-G2 and X460-G2 series switches, the combo port comes
up as active even though when link peer port is down.
xos0063872 After multiple executions of run failover with redirect-flow
configuration, IPv4 ping fails.
xos0063928 Sysuptime in sFlow packets is invalid.
Summit X460-G2 Series Switches
xos0063927 Error "Deferred L2 notification code out of sync unit 0" repeatedly appears
in log.
Summit X670-G2 Series Switches
xos0063807 On Summit X670-G2 series switches, egress ACL rule actions do not take
effect on ports 64-72.
SummitStack
xos0061777 Standby nodes do not come back up to operational state after they go into
failed state.
xos0062700 When upgrading from ExtremeXOS 15.7 or earlier to 16.1, image download
fails if image was installed in backup node first and master node second.
xos0063904 FDB process ends unexpectedly in backup node of SummitStack configured
as MLAG peer when certain FDB entries are not flushed properly after age-
out.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
CR Number Description
General
xos0050771 The command show access-list dynamic counters does not
display the complete MAC address of VMs and it may not be possible to
read the counters correctly from the output.
xos0052723 With L3VPN configured (also: OSPF, BGP, MPLS, LSP) and routes are being
advertised and installed in the VRF routing table, after restarting process
OSPF, VPN routes are not installed.
xos0056829 Switches do not re-send the Group Specific Query following the
last_member_query_interval (1 second).
xos0057231 An FDB entry created by ARP with "i" flag set is not removed from the FDB
table after a static entry for the same IP address is added with a different
MAC value.
xos0057269 SNMP trap extremeIpSecurityViolation is sent with incorrect VLAN
description.
xos0057374 Switch odometer value is reinitialized when Master Switch Fabric Module
(MSM) fails to read the value.
xos0057672 The process rtmgr ends unexpectedly when disabling GRE tunnels.
xos0058669 DHCPv6 client: After changing the client identifier type, and then restarting
the port, old IPv6 addresses are not released, causing the show vlan
command to show multiple IPv6 addresses.
xos0058750 Neighbor discovery packets are duplicated in L2 VLANs when IPv6
addresses are configured for other VLANs that do not have any ports.
xos0059942 SSH connection ends when show commands produce lengthy output.
xos0060092 Fetching values using SNMP for "extremePortQosStatsTable" does not work
correctly.
xos0060643 Commands for downloading and installing images should use active/
inactive options when specifying partitions (in addition to current primary/
secondary options).
xos0061085 Kernel oops occurs while deleting VR with enable BGP export and IPARP
proxy configurations.
xos0061173 L2PT packets are dropped when ingress port is configured with software
learning.
xos0061198 Disabling VPN-VRF affects traffic on another VPN-VRF.
xos0061219 Parallel-mode-enabled DHCP offer is sent using primary IPv4 address to the
client for multiple offers received from server for different IPv4 addresses.
xos0061247 Configuring IPv6 Syslog target in a specific format produces an incomplete
command error, even though the command is complete.
xos0061331 Bootprelay for VRF is not supported. Commands to configure bootprelay
should reflect this.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061445 After creating and enabling an STPD, the command configure
"Default" add ports 1 tagged stpd "s1" adds ports to
the Default VLAN, but not with STPD domain, even though the error
"Command Aborted and no changes were made" appears.
xos0061465 IPv6 source address that is not configured on any VLAN in the given VR is
accepted as from source IP. Issue does not occur with IPv4.
xos0061507 SNMPget on EXTREME-SOFTWARE-MONITOR table returns value with
incorrect OID.
xos0061517 LACP adjacency fails while forwarding the PDU with l2pt profile over L2VPN
tunnels when MPLS PHP is enabled.
xos0061565 The TCL function, “clock scan," generates errors with default time zone
configuration.
xos0061656 Nodes remain in the "FDBSync" state due to temp-flooding while rebooting
the stack.
xos0061788 The process devmgr ends unexpectedly during snmpwalk when continuous
EMS logs are sent to the switch console.
xos0062017 DHCP trusted port configuration is lost after disabling, and then re-enabling
LAG.
xos0062018 For IPv6 routes with mask lengths greater than 64-bits, IPv6 unicast packets
destined for the switch CPU can be dropped if another IPv6 route is present
with a matching prefix and mask length less than or equal to 64-bits. This
issue affects Summit X460-G2, X670-G2, and X770 switches.
xos0062133 STP flush event does not happen after ports are quickly disabled, and then
enabled.
xos0062145 With QoS configuration, ACL process signal 11 ends unexpectedly after
rebooting.
xos0062240 Port that was administratively disabled becomes up after enabling rx pause.
xos0062271 CLI memory leak occurs when executing show commands with include
option through script.
xos0062277 The command show vlan vlan_list does not show information for
dynamic VLANs nor the Default VLAN. Error appears.
xos0062290 Due to ExtremeXOS reflection RSTP BPDU support, upstream bridges
believe that they are receiving their own BPDUs (contain the bridge's ID),
thus causing multisource events during topology changes, which can cause
slow convergence times when lp is configured (upwards of 30 seconds).
xos0062427 EDP process ends unexpectedly when CDP packets without portId TLV are
received.
xos0062441 The process rtMgr ends unexpectedly when IPv6 static route is deleted.
xos0062472 Source MAC addresses learned through CDP packets received on EAPS-
blocked ports cause traffic to be dropped.
xos0062570 In SummitStacks, executing the command enable sflow ports all enables
sFlow inappropriately on stacking ports.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0062705 Kernel oops can occur after clearing IPMC FDB in a stack.
xos0062789 Disabling learning on LAG ports does not flush FDB entries.
xos0062879 Transceiver information shows same Rx power value for 4x10G partition
ports even though some ports are in ready state.
xos0063089 Kernel oops triggered infrequently during continuous addition/deletion of
ARP entries for long durations.
xos0063359 The process rtmgr might end unexpectedly after executing disable
bgp, and then enable bgp, or after disable port, and then
enable port, or after rebooting a switch containing BGP routes.
xos0063368 In an MLAG configured switch, FDBs are not installed in hardware after
reboot if there are frequent MACMoves between MLAG port and ISC.
xos0063134 Traffic stops after disabling, and then enabling LAG porst having pstag with
static FDB
xos0063245 With IGMP per-VLAN mode, VRRP flaps occur after adding tagged ports to
VLANs.
xos0063457 Configuration for adding network VLAN port in STP for subscriber is not
saved.
xos0063521 A few IBGP routes are not updated in routing table when disable bgp
and enable bgp commands are executed in quick succession.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
SummitStack
xos0057835 In SummitStacks, clear-flow sampling period is incorrectly calculated.
xos0061799 Precedence order between policy port rules and policy MAC-based rules is
not preserved following a master/backup Failover.
xos0061841 FDB entries are not learned again after limit learning is unconfigured, and
then configured again, with PSTAG configuration in SummitStacks.
xos0061957 HAL process ends unexpectedly during failover when switches have ACL
policy without meter action.
xos0062084 Rebooting modules with only policy configurations clears their policy port
configurations when they rejoins the stack.
xos0062123 Port groups do not appear in the show configuration command.
However, they do appear in the show ports group command.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061922 Dynamic ACLs applied as "any" fail to install in hardware after upgrading
ExtremeXOS from any release other than EXOS 15.3.
xos0062156 ACL Manager API slice type can be off by one.
xos0062537 HAL crash occurs when redirect-port-list action contains more than 64
ports.
xos0062619 SSH access-profile using policy does not work with IPv6 addresses.
xos0063172 ACL action "redirect-port-list" does not take effect when another slice has a
rule to match all packets with deny action.
xos0063240 ACL process ends unexpectedly when switch has clear-flow ACL rule with
count interval greater than snmptrap generation timer.
xos0063547 Process ACL ends unexpectedly after applying a policy file with source zone
as a match condition.
AVB
xos0062494 Source MAC addresses learned through MVRP packets on a blocked port
(STP) cause traffic to be dropped.
BGP
xos0058441 After creating a BGP peering session between link local IPv6 addresses with
the scope ID specified, deleting the VLAN containing link local IPv6 address.
and then issuing the command show configuration bgp, switch
reboots with Epm application wdg timer warning error
message.
xos0060641 When BGP is administratively shut down, it does not send notifications to
peers.
xos0060680 Switch stops responding after executing clear bgp neighbor all
counters on a switch without BGP configuration.
xos0060749 Configuring, enabling, disabling, or deleting BGP neighbors using link local
address results in the following error message:
Error: cmBackendXmlParseEnd Failed to convert
"bgpCfgPeerRemoteAddr" value "fe80::204:96ff:fe97:efef/
brian-to-112"
xos0061129 In a multi-peer setup with many routes (over 150K), a few routes from the
preferred peer do not become active in the BGP RIB. Disabling, and then re-
enabling peer, restores all routes.
xos0061411 Route table installs sub-optimal BGP routes (next-hop) to kernel, while the
BGP RIB shows different paths when same routes are received from two
different peers in local-RI
xos0061505 After a topology change in the network, BGP routes requiring two levels of
recursive lookup are programmed in hardware with incorrect next hops.
xos0062260 BGP process ends unexpectedly when local address or password is changed
for BGP neighbor, and then you immediately execute a BGP show/
configuration command.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0055051 When applying an import policy to BGP, cost configured in the policy is not
applied to route tables. This issue is not resolved after multiple policy
refreshes nor after multiple disabling, and then enabling BGP.
xos0063173 Process dcbgp ends unexpectedly with signal 11 after issuing the command
show bgp neighbor.
Chalet
xos0060354 ExtremeXOS Chalet using IPv6 does not work with HTTPS.
xos0062016 Command line process memory leak occurs when accessing switches with
Chalet.
xos0063255 In Chalet, VLANs are sorted incorrectly.
ClearFlow
xos0062629 Clearflow rule does not work properly if there is dot(.) in the ACL counter.
EAPS
xos0061038 Loops occur in EAPS-protected VLANs, after peer reboot, if a VLAN’s port is
also protected by ELSM.
xos0061385 EAPS process ends unexpectedly after deleting EAPS shared-port
configuration.
ELRP
xos0062460 The show configuration command output shows incorrect ELRP
configuration.
xos0062618 ELRP forgets the disabled port information if the port is deleted from
another VLAN that also has ELRP enabled. As a result, the disabled port
stays disabled unless manually enabled.
ESRP
xos0061965 Configuring ESRP member VLANs (VRRP-enabled) produces errors.
FDB
xos0059481 Static FDB is programmed incorrectly in hardware after a stack failover.
IGMP
xos0062914 The process mcmgr ends unexpectedly after receiving corrupted IGMPv3
join packets on MLAG ports.
LAG\MLAG
xos0062428 Member ports with a modified speed configuration that is different than the
master port should not be allowed in LAG.
xos0063365 Frequent MLAG bulk syncs observed due to checksum mismatch between
MLAG peers when ISC port was added as an untagged port to a tagged
VLAN and VRRP was running between the peers.
MPLS
xos0059596 Can add more than one LSP a pseudo-wire when it is associated with a
VPWS.
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061092 Traffic forwarding on VPLS-serviced VMAN stops after link flap.
xos0061943 MPLS process ends unexpectedly when get-next is done with incomplete
OID for mplsXCIndex.
xos0062045 LLDP packets are tunnelled over L2VPn.
xos0062300 CEP CVID Ranges, other than first VLAN, fail when access port is a trunk.
xos0062301 Packet drops occurs between customer edge switches when VMAN and
CVID tag are the same.
xos0062380 Switch rejects incorrect LSP configurations as expected, but this operation
still uses LSP indexes in hardware.
xos0062754 VPLS traffic egresses out with dot1q tag when secondary EtherType is
configured.
xos0063271 Layer 3 packets in non-default virtual routers are slow-path forwarded after
disabling MPLS in the peer switch.
xos0063478 Traffic drop occurs while adding new member port to the existing LAG
group and PSTAG is configured on the port.
OpenFlow
xos0060531 Deleting VMAN deletes the VLAN configuration, but not associated
OpenFlow logical ports.
Optics
xos0059007 QSFP+ to SFP+ adapter support is added to work with all optical SFP+
transceivers with the exception of LRM and passive copper direct attach
cables.
xos0060018 With a 0.5M, 40G QSFP MOLEX passive copper cable inserted, disabling the
port where the optic is inserted, rebooting, and then enabling the port, the
port stays in the ready state and doesn't come up as enabled.
xos0060264 The output of the show port transceiver info command for
optics inserted in 40G/100G ports might be abnormally lengthy if the same
command is executed from two different CLI sessions simultaneously.
xos0062719 Allow use of 3rd-party optics without any additional license.
xos0063120 Error message "CFP2 modules >= 18 W unsupported" incorrectly appears for
Finisar Corp CFP2 LR4 optics.
OPSFV2
xos0061855 Configured OSPF neighbor is not retained after rebooting.
xos0063380 Error message appears after rebooting switch with OSPF configuration:
"Error while loading "ospfInterface": ERROR: 0.0.0.0 is not a valid configured
neighbor for interface".
Power
xos0062113 The show power command output does not display power usage for
PSUs with part numbers starting with “800515”.
QoS
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0061027 For SummitStacks, creating or deleting non-default QoS profiles may cause
some ports to flap.
xos0062050 QoS committed rate configurations for port groups are not loaded properly
after a save and reboot.
Security
xos0057679 Account user name and password are not encrypted in logs when cli-config-
logging is enabled.
xos0058808 Rarely, MAC addresses of authenticated clients learned on NetLogin-
enabled ports are not programmed in hardware.
xos0060909 In UPM profiles the variable EVENT.TIME incorrectly has the current time
rather than the time when the event was queued/triggered.
xos0061433 extremeNetloginUserLogoutTrap is received with errors.
xos0061597 After authenticating a NetLogin client, executing the command clear
netlogin state port, and then checking that ID-mgmt has deleted
the clients, log displays UnDscvrId EMS message, which does not indicate
the identity user.
xos0061652 Netlogin Dot1x: Authenticated value should be "Yes, Local" for clients with
invalid password authenticated on auth failure VLAN.
xos0061781 Identity manager entries become stale when clients are moved from one
port to another in sub-VLANs.
xos0061797 Dot1x client moves to authentication failure VLAN if authentication failed
due to incorrect supplicant password or framework failure, such as error in
VLAN movement, etc.; even if web-based NetLogin is enabled.
xos0061820 Dot1x clients move to authentication failure VLAN when web-based
NetLogin is enabled globally.
xos0061868 With protocol order as MAC dot1x, web-based UPM profile is not executed
for the client, which is authenticated as MAC.
xos0062366 After rebooting, DHCP binding entries are not restored using vr-default.
xos0062674 UPM profile fails to set the variables received from the RADIUS server using
VSA 212.
xos0062965 Policy process ends unexpectedly with signal 6 when master node goes
down.
xos0063090 NetLogin client does not move into authfail VLAN when user is absent from
local database.
xos0063248 NTP MD5 authentication with NTP server is failing.
xos0063445 NetLogin: FDB is not in synch when changing VLAN VSA's dynamically.
xos0063506 Traceroute MAC address in CFM domain does not return information about
destination switch.
SNMP
Table 19: Resolved Issues, Platform-Specific, and Feature Change Requests (CRs)
(continued)
CR Number Description
xos0059964 SNMP poll for MIB dot3StatsDuplexStatus always returns unknown(1) when
ports are configured with auto-negotiation on.
xos0060792 SNMP authentication failure log message and trap is inappropriately
generated when switch detects "Not In Time Windows" error.
xos0061379 Switch temperature value retrieved using SNMP get operation is incorrect.
xos0061886 SNMP master process ends unexpectedly with signal 6 with certain
sequence of snmpbulkget and snmpget.
xos0061945 SnmpSubagent crash occurs when snmpset executed on the last row in
EAPSMbrVlanEntry.
xos0063349 Switch stops responding to SNMP requests if SNMP get for multiple OIDs is
continuously initiated.
STP
xos0062701 HAL timeout occurs while rebooting a stack with STP configuration.
TWAMP
xos0062217 In SummitStacks with eight nodes and sFlow configuration, "Hardware L3
Table full" error messages appear when the stacks have a large number of
Layer 3 entries.
VLANs
xos0054039 IP multicast traffic is not forwarded on PSTAG VLANs when it shares ports
with other IGMP snooping-enabled VLANs or other L3 VLANs.
xos0060184 After configuring MVRP registration forbidden, the command is accepted
and registration is forbidden. However, the show configuration
mrp command does not display this configuration and this configuration is
not saved after a reboot.
xos0062255 CEP CVID configurations is missing after adding/deleting the port from
sharing.
xos0063207 Error occurs while adding LAG ports as tagged in one VMAN and untagged
in another VMAN, even though the VMAN EtherType is primary.
xos0063257 Saving configuration fails/times-out when VLANs added to a mirror filters
are renamed.
xos0063274 VLAN packets are egressing with VMAN ethertype when an egress port is
deleted from a VMAN that is also part of a VLAN.
This chapter lists corrections to the ExtremeXOS 21.1 User Guide and ExtremeXOS 21.1 Command
Reference Guide for ExtremeXOS 21.1.
Description
This command is used to configure a PIM interface that receives multicast data traffic. It could be either
from a source directly connected or from a PIM neighbor. In the second case (from a source not directly
connected), if the received interface has no PIM neighbor, the traffic is dropped (default behavior). If
you turn off this check, the traffic is processed.
Syntax Description
dense-neighbor-check Check if multicast traffic is received from PIM neighbor in dense mode.
off Forward multicast traffic even if not received from PIM dense neighbor.
Default
The default is on.
Example
The following example turns on dense neighbor check:
configure pim dense-neighbor-check on
History
This command was first available in ExtremeXOS 15.1.4.
Platform Availability
This command is available on platforms that support the appropriate license. For more information, see
the ExtremeXOS 21.1 Feature License Requirements.
SummitStack Topologies
In the ExtremeXOS 21.1 User Guide in Configuring Stacked Switches > Introduction to Stacking >
SummitStack Topologies section.
xos0067492
Note
As stacks are not necessarily a homogeneous composition of a single switch model, we do
not restrict the ability to configure/create any number of settings/objects based on the
capabilities of a single node that may or may not be actually present in the stack.
xos0067234
Note
Zero Touch Provisioning (ZTP) is not supported in stacking mode.
LACP Fallback
In the ExtremeXOS 21.1 User Guide under Configuring Slots and Ports on a Switch > Link Aggregation
on the Switch > LACP > LACP Fallback:
xos0070324
Note
In an MLAG environment, fallback port selection occurs only on the LACP master switch.