XMC 8.5.7 Release Notes
XMC 8.5.7 Release Notes
02/2022
9036781-10 Rev AA
Subject to Change Without Notice
Table of Contents
Version 8.5.7 Release Notes 4
Extreme Management Center's Transition to ExtremeCloud IQ 4
Customer Defects and Security Enhancements 5
Customer Found Defects Addressed in 8.5.7 5
Customer Found Defects Addressed in 8.5.6 6
Customer Found Defects Addressed in 8.5.5 7
Deprecated Features 32
Known Issues and Vulnerabilities Addressed 32
Known Issues Addressed in 8.5.7 32
Known Issues Addressed in 8.5.6 32
Known Issues Addressed in 8.5.5 33
Known Issues Addressed in 8.5.4 33
Known Issues Addressed in 8.5.3 34
Known Issues Addressed in 8.5.1 38
2 of 52
Known Issues Addressed in 8.5.0 39
Vulnerabilities Addressed 42
Addressed in 8.5.7 42
Extreme Management Center images: 42
ExtremeControl images 43
ExtremeAnalytics images 44
Fabric Manager images 44
Addressed in the 8.5.0 - 8.5.6 images 45
3 of 52
Version 8.5.7 Release Notes
IMPORTANT: For upgrade and installation requirements, as well as configuration considerations, please see
Extreme Management Center Configuration and Requirements.
IMPORTANT: Upgrading to Extreme Management Center version 8.5.7 requires you to renew your NMS
license if generated prior to July 31, 2020. Licenses generated prior to July 31, 2020 expire 90
days after upgrading to Extreme Management Center version 8.5.7.
You can view the status of your license by accessing Administration > Diagnostics> Server >
Server Licenses.
For the most recent version of these release notes, see Extreme Management Center
Release Notes.
For information regarding the features supported by specific devices, see the Firmware
Support Matrix. Version 8.5.7 of Extreme Management Center supports the same
devices listed in the matrix for version 8.5.5, with the addition of Extreme Campus
Controller 5.36 and 5.46.
NOTE: NISpackages are not installed with the Extreme Management Center,
ExtremeAnalytics, or ExtremeControl Engines.
Refer to the Sectionf Enginesof this Release Notes document for more
information.
Contact your representative to have your Extreme Management Center license migrated to
an ExtremeCloud IQ - Site Engine licensing model. The ExtremeCloud IQ - Site Engine license
also includes licensing for ExtremeAnalytics.
4 of 52
Customer Defects and Security Enhancements
For additional information about each of the features listed in this guide, refer to the
documentation posted online at ExtremeNetworks.com or the Help system included with
the software.
5 of 52
Customer Defects and Security Enhancements
6 of 52
Customer Defects and Security Enhancements
End-system authentication of 802.1x devices was clearing usernames that were 02332925
configured with MAC addresses. This is no longer occurring.
LDAP Authentication Failures for Unformatted MAC Addresses Improved
Unformatted MAC addresses used for LDAP authentication were incorrectly being 02344542
formatted with delimiters, which caused the authentication to fail. The issue has been
corrected.
7 of 52
Customer Defects and Security Enhancements
8 of 52
Customer Defects and Security Enhancements
3rd party sflow collectors for VSP devices were being overwritten by Extreme 1926465
Management Center when the device was removed. A second collector ID is now
used if the first collector ID is in use.
SMS texts were not sent during captive portal guest registration if there is only one 02311032
service provider configured to choose for sending authorization codes. The issue
has been corrected and texts can now be sent if only one service provider option is
available for sending authorization codes.
9 of 52
Customer Defects and Security Enhancements
Delays were occurring when Flexview / Physical Entity Listings were exported to .csv
reports because of the large volume of data being exported, and the reports were
failing to execute. 02268103
A new warning message has been added that indicates that more than 2,000 records
are being exported and the report will take some time to generate, and the timeout
has now been increased from 30 seconds to five minutes.
Support for MyVendorProfiles Now Included in Backup/Restore Operations
02141955
MyVendorProfiles were not included in the backup/restore operations.
Newly Added Archives Display in Detailed View
Archives that contain a group were not displaying newly added devices in the 1801552
Detailed View. Now, If devices are added to the group, they will be archived the next
time the scheduled archive is executed.
Scheduled Tasks During Daylight Savings Time Execute
Scheduling tasks for Sundays that transition from Daylight Savings Time to Standard
Time displayed an "Add failed" error dialog. Scheduled Tasks can now be started on 02267383
Sundays which transition from Daylight Savings Time to Standard Time (or vice-
versa).
TCL Scripts No Longer Requiring Script to be Saved
Execution of TCL scripts that use "scope = device" were requiring the script to be 02283123
saved, even when there were no changes to save.
Enforce Time of Policy Domain Lag Time Improved
02156722
Enforce of a policy domain was experiencing extremely long completion time.
Duplicate VLANS No Longer Imported When .PMD Files Imported
When policy .pmd files were imported into the policy domain, duplicate VLANs were 02005844
being imported. Duplicate VLANs are no longer being imported.
Netlogins Preserved During Enforce to ExtremeXOS After Change to ACL Policy
Role Mode
When changes were made to the ACL / policy role mode, the netlogin was being 02248336
disabled during enforce to ExtremeXOS. This issue has been corrected and
netlogins are preserved during enforce.
IP/UDP/TCP Rules Properly Enforced to Extreme Campus Controller
Some rule types were failing to be set because the IP/UDP/TCP rules were not being 02303839
enforced correctly to the Extreme Campus Controller.
ACL Policy Role Data Correctly Transferred During Upgrade
When upgrading from Extreme Management Center version 8.5.2 to version 8.5.3, 2304517
incorrect NAS-Filter-Rule ACL policy role data was being transferred. As a result, HP
and Cisco devices were not working properly.
10 of 52
Customer Defects and Security Enhancements
An error message was generating when a password or login was copied and pasted 02274240
into the field during login attempts. The message is no longer generated.
Script Documentation No Longer Includes Custom Scopes
Policy mappings could be deleted if they were set as default policy mappings in 02307796
ExtremeControl options. Now, the in-use check verifies the mappings are not set as
default before allowing delete.
Incorrect Successful Policy Enforce Corrected
Policy Enforce to Extreme Campus Controller was reporting success after failing to 02307184
enforce the configuration to the device. The REST set failure events were reported in
the event log.
Captive Portal No Longer Setting OS from the Browser
The captive portal was sometimes incorrectly setting the OS from the browser in an 01951730
end-system session, resulting in unexpected device type rule processing.
IP Subnet Config No Longer Preventing Proper Subnet Mapping
Setting IP subnet configuration location value to None was preventing proper subnet 02161385
mapping by VLAN ID or VLAN Name on the ExtremeComplianceengine.
Renaming Access Control Profiles No Longer Corrupting Database
Renaming Access Control profiles was sometimes corrupting the database and 02280562
leading to "Cannot load reports" errors when trying to view configuration rules.
11 of 52
Customer Defects and Security Enhancements
02265831
ExtremeControlengine was not successfully joining the domain when case insensitive
usernames, hostnames, and other lookup fields were entered. Now, ExtremeControl
joins the domain when new LDAP configurations and authentications using new LDAP
configurations with mixed-case user and host name data are entered.
When Remove from Service was selected on the Configure Device window for a
device, it was unclear that Extreme Management Center continues to monitor that
device.
02249867
Additional directions have been added to Help documentation that, once a
replacement device is ready, the RMA process is continued by adding the
replacement device's serial number, shutting down the device to be removed, and
starting the replacement device. In order to stop monitoring the device, you also need
to change the Poll Type to Not Polled.
VSP Series Family Type Expanded to Include Multiple Vendors
The VSP Series option could not be selected as Family type on the Site > Actions >
Custom Configuration tab for more than one vendor, even if multiple vendors 02230122
supported the VSP Series as a Family type. Now, multiple vendors can have the VSP
Series as a Family type.
EMail List Function Improved for Workflow Mail Activity
Once selected, there was no way to unselect Email lists for a Task or Scheduled 02258069
Tasks Workflow's Mail Activity.
Default SFTP/SCP User Name and Directory Now Set in Inventory Manager
Default SFTP/SCP user names and directories are now set in Administration > 02288993
Options > Inventory Manager.
Extreme Management Center Upgrades Completing Properly
12 of 52
Customer Defects and Security Enhancements
Extreme Networks is introducing the new Extreme Application Sensor and Analytics -----
Engine. This new Analytics engine combines the sensor and engine into one
package, eliminating the need for additional hardware requirements.
New DHCP Fingerprint for Apple Mobile Devices
02250934
A new DHCP fingerprint for Apple mobile devices that run iOS 14 has been added.
Extreme Management Center and ExtremeAnalytics Start-up Improved
MAC Lock additions and deletions were requiring an enforce. The issue has been -----
fixed so that no enforce is needed to make additions or deletions.
Multiple RADIUS Certificates Now Supported
With this feature, ExtremeControl now includes the capability to specify an EAP
Group to store RADIUS server certificate(s), from which you can designate RADIUS
certificate(s) for each tenant in your network instead of using the default RADIUS
certificate for all tenants.
Port Authentication Function Improved
The "Disable Authentication on all Ports" function on the Control > Policy tab was 02236922
displaying a list of ports that included ports that do not support authentication. This
issue has been corrected.
13 of 52
Customer Defects and Security Enhancements
New Extreme Management Center NMS or NMS Advanced licenses can now be 02264108
applied to ExtremeControlengines if the engine license is within the grace period
number of days before expiration.
ADV190023 - Microsoft Guidance for Enabling LDAP Channel Binding and LDAP
Signing
Setting the scale on a map (away from the default setting) was causing the map to
corrupt. The scale workflow issue has been corrected and maps no longer corrupt if the
scale is adjusted. 02242633
In addition, sometimes when a map was created or edited, the Map Scale was
dramatically increased or decreased, and the drawings on the map were duplicated.
These issues have also been corrected.
14 of 52
Customer Defects and Security Enhancements
Log-in delays seen in Extreme Management Center, caused by third-party devices with
poor SNMP response time, have been addressed. 02247375
In addition, the License Diagnostics page now includes the time it takes to retrieve
license counts and to refresh the data.
NOTE: VOSSdevices support a new "dvr-one-ip" feature in the 8.2 release that allows you -----
to share an IP address between a VLAN and its DvR interface. Extreme Management
Centercurrently does not support the "dvr-one-ip" feature and cannot read or enforce
configurations of this type. Configure VOSSdevice IP addresses on VLANs and their DvR
interfaces through the VLAN Definition tab.
New Warning For NMS-EVAL License Expiry
No warning was issued when an NMS-EVAL license was about to expire. New notifications -----
have been added to alert users prior to NMS-EVAL license expiry.
Extreme Management Center Now Supports Unified Series 5520 Devices
NOTE: Changing unified series devices from ExtremeXOS to VOSS or vice versa is not
supported in Extreme Management Center. We recommend the following steps when
changing a unified series to a different operating system.
-----
1. Delete the device from Extreme Management Center (make sure the check box is
checked to delete from database).
2. Manually change the device to the different operation system ("ExtremeXOSto
VOSS" or "VOSSto ExtremeXOS" or use ExtremeCloud IQ to perform this action).
3. Add the device back into Extreme Management Center.
Remove From Device Group Available When Multiple DevicesSelected
The Remove From Device Group menu action was available only when a single device 01709827
listed under a User Device Group was selected. It is now available when one or more 01971882
devices listed within the Devices table are selected.
Overview Tab Functionality for Imported ScriptsCorrected
Overview tab functionality has been corrected so that scripts that are imported or edited 02216199
via the Overview tab are no longer corrupted.
Support for RADIUSERS-CoA-Reauthenticate Attribute Added
Support for RADIUSERS-CoA-Reauthenticate attribute has been added for Extreme 02200420
ethernet routing switches.
15 of 52
Customer Defects and Security Enhancements
NOTE: If you are upgrading to Extreme Management Center Version 8.5.1(and future 02177860
versions), the "Launch WebView" capability is enabled by default for new Authorization
Groups. For Extreme Management Center Versions 8.5.0 or earlier, the "Launch WebView"
capability is DISABLED by default. After upgrading to version 8.5.1, you must review and
modify your Administrative Groups and configure them for “Launch WebView”
individually.
Message Added to Warn of Impact to TasksWhen Deleting User Profile
01930813
A new message warns that, when deleting a user profile, the scheduled firmware and
01931694
archived tasks created by the user being deleted are impacted.
Standby Units Identified for Archiving ExtremeXOS Devices
ExtremeXOS stacks with backups but no standby units were failing to 02230235
archive the configuration. Standby units have been identified to 02229333
successfully archive ExtremeXOS devices.
Password Updatesand PromptsImproved
01918709
Changes have been made to properly update passwords and ensure password change
01977127
prompts occur.
Loading Icon Introduced to DeviceView
A loading icon has been introduced for the DeviceView that remains visible until all the
1987849
grids of the tab are loaded to prevent an empty view from displaying if there is a delay in
the rendering of one grid.
ZTP+ Onboarding for VOSSDevicesAdded
-----
VOSSdevices can now be configured using the ZTP+ onboarding process.
Message to Use System Workflow Added
A new message to use a System Workflow instead of using Legacy Inventory scripts when 1869524
attempting to upgrade VDX devices has been added.
16 of 52
Customer Defects and Security Enhancements
In addition, you can now select View Configuration File from the Archivestab to view
archive information for ERS8600 series devices.
Ability to Add Tagged and Untagged VLANsfor LAG / MLAG Added
You can now add Tagged & Untagged VLANs for LAG/ MLAG on the Configuration > Ports -----
tab.
Maximize Feature Added to TasksWindows
The Maximize feature has added to several Tasks> Scriptsand Tasks> Workflows 1889058
windows.
17 of 52
Customer Defects and Security Enhancements
l Analytics Events
l Bandwidth for a Client Over Time
l Most Popular Applications
l Most Used Applications for a Client
l Most Used Applications for a User Name
l Network Activity by Cloud Region and Site
l Network Activity by Site
l Network Activity for a Client
l Network Activity for an Application
l Sites Using the Most Bandwidth
l Slowest Applications by Site
18 of 52
Customer Defects and Security Enhancements
ExtremeXOSuses the IETF YANG data model for ACLs (ietf-access-control-list) defined in
RFC- 8519.
New FlexView for BOSSPower Supply Information
Serial Numbers and Power Supply information were not included in the BOSSChassis
1943390
Components FlexView for ERSdevices on which BOSS 7.8.x or later was installed. The
information is now in a new FlexView called BOSS Power Supply Information.
19 of 52
Engines
Engines
l NISPackages Not Installed with Engines
l Upgrades Accessible to Engines without Internet Connectivity
l Operating Systems Upgrade to Ubuntu 18.04
NIS Packages Not Installed with Engines
NISpackages are not installed with the Extreme Management Center, ExtremeAnalytics, or
ExtremeControl Engines.
During installation, if you select yes at the “Do you want to use NIS? (y/ n)” prompt, you must install the
NISpackage for it to function.
To do this, run:
apt update
apt install nis
The NISpackage install will ask you if you want to keep /etc/yp.conf. Choose ‘N’ (the default) to
keep your existing yp.conf file. NISshould then work.
20 of 52
Extreme Management Center
For customers that do not have Internet connectivity in the lab systems:
l Save and back up any data on the Fabric Manager as per the recommended procedure.
l Delete the Fabric Manager from the device inventory in Extreme Management Center. (Check the
Remove from the database option.)
l Shut down the Fabric Manager VM.
l Deploy a fresh VM from the latest release with the updated Ubuntu.
21 of 52
Extreme Management Center
22 of 52
Extreme Management Center
NOTE: Access to the MIB Tools and FlexView Editor diagnostic tool via the Console Java application
will be removed in a future release.
23 of 52
Extreme Management Center
Unified Switching Devices Now Supported by Extreme Management Center and Fabric Manager
Extreme Management Center Compliance and Fabric Manager now support Unified Switching 5420
devices.
NOTE: VLAN pruning occurs when the VLAN does not have any ports associated with it, and pruning
has been enabled.
NOTE: After upgrading from a previous version of Extreme Management Center, Authorization
Groups should be reviewed to ensure the intended access with these refined capabilities.
NOTE: The queuing functionality is configurable from NSJBoss.properties with the following key:
LangleyMessageBus.useMessageQueue. If the key is set to true, then Extreme Management
Center will use JCiaQueue. If the key is set to false, then Extreme Management Center will not
use JCiaQueue. The Extreme Management Center server must be restarted in case any
modifications to NSJBoss.properties file have been made.
24 of 52
Extreme Management Center
NOTE: If you are upgrading to Extreme Management Center Version 8.5.3 (and future versions), the
Access Terminal capability is enabled by default for new Authorization Groups, but is
DISABLED by default for existing Authorization Groups. After upgrading to version 8.5.3, you
must review and modify your Administrative Groups and configure them for Access Terminal
individually.
NOTE: The ability to edit the device WebView URL is available only after the device is
successfully onboarded to Extreme Management Center.
25 of 52
Extreme Management Center
Timeout, and the result of the request is displayed in a pop-up dialog. Extreme Management Center
installations that are configured to run as root issue ICMP Requests, while installations that are
configured to run as users other than root will use a TCP Echo Request. In addition, the Ping Device
feature, accessible via the Alarms& Events> Search Maps> More Actions, displays the results of a Ping
Device.
NOTE: Firewalls and server configurations can block ICMP and/ or TCP requests, which can result in an
Unsuccessful Ping, even though SNMP, SSH, Telnet and other protocols are successful.
l AP310i-FCC l AP310e-FCC
l AP310i-CAN l AP310e-WR
l AP310i-IL l AP310e-CAN
l AP310e-FCC l AP310e-IL
l AP310e-WR l AP360i-WR
l AP310e-CAN l AP360i-CAN
l Ap310e-IL l AP360i-IL
l AP360i-WR l AP360e-FCC
l AP360i-CAN l AP360e-WR
l AP310i-FCC l AP360e-CAN
l AP310i-CAN l AP360e-IL
l AP310i-IL
26 of 52
Extreme Management Center
This feature is supported by VSP firmware version 8.1.1 and later, and on all platforms currently
supported by Extreme Management Center with two exceptions: XA1400 and VSP-8600.
Enhancements to VPEX
Extreme Management Center now supports the following Virtual Port Extender (VPEX) configurations:
l VPEX Ring Topologies – When two VPEX cascades are linked together, they form a VPEX ring.
This type of ring provides a redundant connection from any bridge port extender (BPE) in the
ring to the controlling bridge (CB).
Extreme Management Center requires the controlling bridge to have ExtremeXOS30.6 or later.
l One-Armed MLAGs – In this dual control configuration, the first tier BPEs are only connected to
one of the two controlling bridges, which leaves more trusted ports available. In some
applications, BPEs are limited to only two links for forming the ring, and the use of one-armed
MLAGs is required.
27 of 52
Extreme Management Center
Enhancements to ExtremeConnect
l New custom end-system data fields and additional operating system data fields have been added to
ExtremeConnect.
ExtremeAnalytics
l Streaming Flow Data from ExtremeAnalytics into Splunk
l Improvements to Response Time Dashboard
l Additional Devices Support Application Telemetry
28 of 52
Extreme Management Center
ExtremeCompliance
ExtremeCompliance now supports the following device types (as of Extreme Management Center Version
8.5):
l VSP4900-12MXU12XE l SLX9740-80C
l VSP4900-24S l AP310i/e
l VSP4900-24XE l AP310i/e
l SLX9740-40C l AP360i/e
Regimes and audit tests created in versions 8.1, 8.2, and 8.3 are retained following the upgrade.
ExtremeControl
l SIEM Notifications Functions Added to Access Control Tab
l Ping End-Systems Option Added to Tools Menu
l Message Strings Manager Feature Now in ExtremeControl
l Local Repositories Option Easier to Locate
l Manage Assessment Servers Upgrade Ability Now in ExtremeControl
l New Ciphers Added to ExtremeControl Engine Web Server Ports
l Filtering Function in Access Control Rule Table Enhanced
l Support for Extreme-Policy-ACL Added
l Rule Usage and Rule Hit Counts Tabs Added
l UDP & TCP Range Rules for Edit Traffic Description Supported
l Enhancements to DHCP Fingerprint Functionality
l Ability to Configure RADSec and TCP on Proxy RADIUSServers
l Export of End-System Table Data Now Supports HTML Format
l New Option to Remove End-Systems via the End-Systems Tab
l Advanced Location-Based Registration and Web Access Configuration Available
l Ability to Create Helpdesk Provisioners in Guest & IoT Manager
l Preview with RADIUSAttributes Added
l Enhancement to Variables in RADIUS Attribute Configurations
l Enhanced Enforce Preview Functionality for ExtremeControl
29 of 52
Extreme Management Center
UDP & TCP Port Range Rules for Edit Traffic Description Supported
For ExtremeXOSdevices running version 30.5.x or later, new functionality for range rules requires only a
single rule on the device. Previous implementation broke port ranges into multiple rules to support them
on the device. The new range rule support also allows a source or destination IP to be combined with
UDP or TCP ranges. The "Optional Value" field is now enabled to allow an optional IP address when a
UDP or TCP "Range" traffic classification type is selected. Devices that do not support this optional IP
address combined with a UDP or TCP port range will show the rule as unsupported in the Enforce
Preview window.
30 of 52
Extreme Management Center
l Delete custom fingerprints directly from the table. If the custom fingerprint was overriding a
system fingerprint, the system fingerprint becomes active once again.
l Import a custom DHCP fingerprint xml definitions file to Extreme Management Center.
l The Detection and Profiling table now supports additional operations, including the Group by this
Field option, which groups the data in the table by the selected column heading, and the Show in
Groups option, which displays the fingerprints grouped by the field you selected.
NOTE: Fingerprints are now applied to all ExtremeControl engines and are no longer engine-
specific.
31 of 52
Deprecated Features
Deprecated Features
In Extreme Management Center 8.5.5, NBI deviceData.portSpeed has been deprecated. Instead, use
deviceData.portConfigSpeed when auto-negotiation is disablednd deviceData.portConfigSpeedList when
auto-negotiation is enabled.
In Extreme Management Center version 8.5.7, the following legacy Java applications (Console, MIB Tools,
NAC Manager, and Policy Manager) are disabled by default. To use the legacy Java applications in version
8.5.7, follow the instructions in the GTAC knowledgebase article.
Beginning in Extreme Management Center version 8.5, the Extreme Management Center server no longer
supports native installation for the Windows operating system.
32 of 52
Known Issues and Vulnerabilities Addressed
NOTE: There is limitation that when a particular VLAN is mapped to both static and
dynamic NSI / ISID bindings. In such scenarios, Fabric Manager will display
either Static or Dynamic, since the response from the EXOSdevice has only
one FA VLAN ISID Mapping information
Devices were improperly being added to maps other than those -----
specified in the Add Device Action tab. The issue has been corrected.
Now, selecting a Map from the Network > Devices tree and selecting
"Add Device" adds the device to the map and to the map's parent site.
From the Network > Discovered tab, specifying a map when adding the
device will add the device to the specified map, as well as to the map
specified in the site's Add Action tab.
33 of 52
Known Issues and Vulnerabilities Addressed
34 of 52
Known Issues and Vulnerabilities Addressed
Now, registering for traps and syslog sets the trap and syslog message source IP address
for ExtremeXOSdevices to the IP address that Extreme Management Center uses to
manage the device.
Certain trap messages generated by the third-party CheckPoint for end-point devices 01943997
were truncated after parsing the snmptrapd log file(s).
When adding a new device type fingerprint, the Vendor Name was not displaying if the 2258176
“Is Partial” box was selected.
The FlexViews EXPR column on FlexViews reports was displaying ‘-‘ when values were 2221529
non-numeric; for example, the Active Wireless Access Points and Wireless Access Points
views.
After upgrading to Extreme Management Center version 8.5.0, log-on delays were 02247375
occurring that were caused by third party devices with poor SNMP response times.
User defined Port Templates for a Site were unable to be deleted. 02251367
After upgrading to Extreme Management Center 8.5.2, FlexReport PDFs did not contain 02276233
data.
A limit of 100 Access Points per map was being applied for wireless controllers and 02267218
Extreme Campus Controller. This limit has been removed.
Deleting firmware images from Extreme Management Center for MLX, ICX, VDX and SLX 02198267
devices was not deleting all images and directories.
Extreme Management Center did not use the slot:port format for ExtremeXOS devices 01953506
that support it. A new emc_vars format has been introduced to the script engine i.e
emc_vars[slot:port] that provides both slots and ports information.
Extreme Management Center was processing RADIUSaccounting requests for devices 01243712
with MAC address of zero. The issue has been corrected so if a MAC address of zero
occurs, the RadiusAuthInfo is returned as null and doesn't proceed further.
Authorization Group capabilities and functions, specifically the options related to Device 1786436
control, were still available for use after the devices were disabled. This issue has been
corrected.
Also, while the ability to run scripts using the right-click menu was not available, the
ability to execute scripts against the disabled devices via the Taskstab was still available.
This issue is corrected by unselecting the NetSight > OneView>Access Scheduled Tasks,
and Workflows/ Scripts > View > Edit, Workflows, Scripts, and Saved Tasks functions in
Extreme Management Center.
The Reports tab auto-refresh was not working for custom reports created with the 02256858
Reports Designer. The reports had to be manually refreshed to be updated.
In Extreme Management Center version 8.5.1, read-only users were improperly able to 2260874
access the Configure window and make device changes.
For Extreme Management Center workflow scripts, imported scripts with unicode 1825871
characters are no longer truncated.
35 of 52
Known Issues and Vulnerabilities Addressed
NOTE: Firewall states are retrieved from the globalstate variable in com.apple.alf.plist.
The auto-refresh function was not working properly for custom reports created using the 02256858
Report Designer.
The wrong device was occasionally displayed in the DeviceView > Device Logs > Syslog 02221460
and Traps table.
Extreme Management Center was not accepting a password longer than eight characters -----
if Extreme Management Center was installed or run as the user "netsight".
Read-only users incorrectly had access to the 'configure' function, which allowed them 2260874
the ability to enforce changes to the devices.
36 of 52
Known Issues and Vulnerabilities Addressed
37 of 52
Known Issues and Vulnerabilities Addressed
Additionally, when an archive was not created successfully, alarms did not clearly explain
the issue. Events that indicate a device archive failure are now prepended with Failed to
more clearly indicate the issue.
Administrator-selected options were sometimes being ignored when the list of Archived -----
devices was updated.
An improperly implemented base collector class support was creating a memory leak in -----
the Trap Receiver.
Enforce/ Verify failures were occasionally occurring after changing the VLAN or NSI -----
mapping of Policy Roles or Rules and enforcing to a Wireless Controller.
38 of 52
Known Issues and Vulnerabilities Addressed
39 of 52
Known Issues and Vulnerabilities Addressed
40 of 52
Known Issues and Vulnerabilities Addressed
41 of 52
Known Issues and Vulnerabilities Addressed
The ExtremeControl > Guest Web Access > Customize Fields > Edit window was lagging in 01916225
the "Loading" state.
The "Start Packet Capture" option is no longer available in any ExtremeControl end-system -----
tables.
Vulnerabilities Addressed
This section presents the vulnerabilities addressed in Extreme Management Center versions 8.5.0 - 8.5.7.
Addressed in 8.5.7
42 of 52
Known Issues and Vulnerabilities Addressed
22947,CVE-2021-3428,CVE-2021-3739,CVE-2021-34556,CVE-2021-35477,CVE-2020-
27781,CVE-2021-3509,CVE-2021-3524,CVE-2021-3531,CVE-2021-3712,CVE-2021-
3733,CVE-2021-3737,CVE-2020-15778,CVE-2021-41072,CVE-2021-42008, CVE-
2021-35577, CVE-2021-35646, CVE-2021-35638, CVE-2021-35597, CVE-2021-
35602,CVE-2021-35596, CVE-2021-35631, CVE-2021-35642, CVE-2021-35612, CVE-
2021-35626,CVE-2021-35625, CVE-2021-2478, CVE-2021-35613, CVE-2021-35591,
CVE-2021-35647,CVE-2021-35608, CVE-2021-35644, CVE-2021-35641, CVE-2021-
35632, CVE-2021-35640,CVE-2021-35637, CVE-2021-35645, CVE-2021-35648, CVE-
2021-35546, CVE-2021-35639,CVE-2021-35627, CVE-2021-2481, CVE-2021-35628,
CVE-2021-35623, CVE-2021-2479,CVE-2021-35635, CVE-2021-35633, CVE-2021-
35622, CVE-2021-35610, CVE-2021-35604,CVE-2021-35607, CVE-2021-35636, CVE-
2021-35575, CVE-2021-35584, CVE-2021-35624,CVE-2021-35643, CVE-2021-35630,
CVE-2021-35634, CVE-2021-42252, CVE-2021-3587
ExtremeControl images
CVE-2021-3800,CVE-2021-3612,CVE-2021-3653,CVE-2021-3656,CVE-2021-
34693,CVE-2021-38160,CVE-2021-3679,CVE-2021-3732,CVE-2021-22543,CVE-2021-
37576,CVE-2021-38204,CVE-2021-38205,CVE-2021-43527,CVE-2021-3711,CVE-
2021-3712,,CVE-2020-16592,CVE-2021-3487,CVE-2020-36311,CVE-2021-3612,CVE-
2021-3653,CVE-2021-3656,CVE-2021-4104,CVE-2021-21703,CVE-2017-6363,CVE-
2021-38115,CVE-2021-40145,CVE-2021-3770,CVE-2021-3778,CVE-2021-3796,CVE-
2021-40330,CVE-2017-17087,CVE-2019-20807,CVE-2021-3872,CVE-2021-3903,CVE-
2021-3927,CVE-2021-3928,CVE-2020-21913,CVE-2021-3564,CVE-2021-3573,CVE-
2020-3702,CVE-2021-38198,CVE-2021-40490,CVE-2019-19449,CVE-2020-
36322,CVE-2020-36385,CVE-2021-3655,CVE-2021-3743,CVE-2021-3753,CVE-2021-
3759,CVE-2021-38199,CVE-2021-3744,CVE-2021-3764,CVE-2021-37159,CVE-2021-
32027,CVE-2021-32028,CVE-2021-32029,CVE-2021-25219,CVE-2021-28831,CVE-
2021-42374,CVE-2021-42378,CVE-2021-42379,CVE-2021-42380,CVE-2021-
42381,CVE-2021-42382,CVE-2021-42384,CVE-2021-42385,CVE-2021-42386,CVE-
2021-23214,CVE-2021-23222,CVE-2021-3709,CVE-2021-3710,CVE-2021-38185,CVE-
2021-33560,CVE-2021-40528,,CVE-2021-3449,CVE-2021-3677,CVE-2021-
40153,CVE-2021-41072,CVE-2021-22945,CVE-2021-22946,CVE-2021-22947,CVE-
2021-38198,CVE-2021-40490,CVE-2019-19449,CVE-2021-3428,CVE-2021-3739,CVE-
2021-3743,CVE-2021-3753 ,CVE-2021-34556,CVE-2021-35477,CVE-2021-3744,CVE-
2021-37159,CVE-2020-27781,CVE-2021-3509,CVE-2021-3524,CVE-2021-3531,CVE-
2021-20288,CVE-2021-3712,CVE-2021-3733,CVE-2021-3737, CVE-2021-33624, CVE-
2020-15778, CVE-2019-7303, CVE-2020-11933, CVE-2020-11934, CVE-2020-27352,
CVE-2021-42008, CVE-2021-42252, CVE-2021-3587
43 of 52
Known Issues and Vulnerabilities Addressed
ExtremeAnalytics images
CVE-2021-3800,CVE-2021-3612,CVE-2021-3653,CVE-2021-3656,CVE-2021-
34693,CVE-2021-38160,CVE-2021-3679,CVE-2021-3732,CVE-2021-22543,CVE-2021-
37576,CVE-2021-38204,CVE-2021-38205,CVE-2021-43527,CVE-2021-3711,CVE-
2021-3712,CVE-2020-16592,CVE-2021-3487,CVE-2020-36311,CVE-2021-3612,CVE-
2021-4104,CVE-2019-7303,CVE-2020-11933,CVE-2020-11934,CVE-2017-6363,CVE-
2021-38115,CVE-2021-40145,CVE-2021-3770,CVE-2021-3778,CVE-2021-3796,CVE-
2021-40330,CVE-2017-17087,CVE-2019-20807,CVE-2021-3872,CVE-2021-3903,CVE-
2021-3927,CVE-2021-3928,CVE-2020-21913,CVE-2021-3564,CVE-2021-3573,CVE-
2020-3702,CVE-2021-38198,CVE-2021-40490,CVE-2019-19449,CVE-2020-
36322,CVE-2020-36385,CVE-2021-3655,CVE-2021-3743,CVE-2021-3753,CVE-2021-
3759,CVE-2021-38199,CVE-2021-3744,CVE-2021-3764,CVE-2021-37159,CVE-2021-
25219,CVE-2021-28831,CVE-2021-42374,CVE-2021-42378,CVE-2021-42379,CVE-
2021-42380,CVE-2021-42381,CVE-2021-42382,CVE-2021-42384,CVE-2021-
42385,CVE-2021-42386,CVE-2021-3709,CVE-2021-3710,CVE-2021-33560,CVE-2021-
40528,CVE-2021-40153,CVE-2021-41072,CVE-2021-22945,CVE-2021-22946,CVE-
2021-22947,CVE-2021-3428,CVE-2021-3739,CVE-2021-34556,CVE-2021-35477,CVE-
2020-27781,CVE-2021-3509,CVE-2021-3524,CVE-2021-3531,CVE-2021-20288,CVE-
2021-3712,CVE-2021-3733,CVE-2021-3737,CVE-2021-33624,CVE-2020-15788,CVE-
2020-27352,CVE-2021-38185,CVE-2021-42008,CVE-2021-42252, CVE-2021-3587
44 of 52
Known Issues and Vulnerabilities Addressed
14577,CVE-2020-14578,CVE-2020-14579,CVE-2020-14581,CVE-2020-14583,CVE-
2020-14593,CVE-2020-14621,CVE-2020-14664,CVE-2020-14779,CVE-2020-
14781,CVE-2020-14782,CVE-2020-14792,CVE-2020-14796,CVE-2020-14797,CVE-
2020-14798,CVE-2020-14803,CVE-2020-14803,CVE-2021-2161,CVE-2021-2163,CVE-
2021-27803,CVE-2017-6363,CVE-2021-38115,CVE-2021-40145,CVE-2021-3770,CVE-
2021-3778,CVE-2021-3796,CVE-2021-40330,CVE-2017-17087,CVE-2019-20807,CVE-
2021-3872,CVE-2021-3903,CVE-2021-3927,CVE-2021-3928,CVE-2020-21913,CVE-
2021-3564,CVE-2021-3573,CVE-2020-3702,CVE-2021-38198,CVE-2021-40490,CVE-
2019-19449,CVE-2020-36322,CVE-2020-36385,CVE-2021-3655,CVE-2021-3743,CVE-
2021-3753,CVE-2021-3759,CVE-2021-38199,CVE-2021-3744,CVE-2021-3764,CVE-
2021-37159,CVE-2021-32027,CVE-2021-32028,CVE-2021-32029,CVE-2021-
25219,CVE-2021-28831,CVE-2021-42374,CVE-2021-42378,CVE-2021-42379,CVE-
2021-42380,CVE-2021-42381,CVE-2021-42382,CVE-2021-42384,CVE-2021-
42385,CVE-2021-42386,CVE-2021-2478,CVE-2021-2479,CVE-2021-2481,CVE-2021-
35546,CVE-2021-35575,CVE-2021-35577,CVE-2021-35584,CVE-2021-35591,CVE-
2021-35596,CVE-2021-35597,CVE-2021-35602,CVE-2021-35604,CVE-2021-
35607,CVE-2021-35608,CVE-2021-35610,CVE-2021-35612,CVE-2021-35613,CVE-
2021-35622,CVE-2021-35623,CVE-2021-35624,CVE-2021-35625,CVE-2021-
35626,CVE-2021-35627,CVE-2021-35628,CVE-2021-35630,CVE-2021-35631,CVE-
2021-35632,CVE-2021-35633,CVE-2021-35634,CVE-2021-35635,CVE-2021-
35636,CVE-2021-35637,CVE-2021-35638,CVE-2021-35639,CVE-2021-35640,CVE-
2021-35641,CVE-2021-35642,CVE-2021-35643,CVE-2021-35644,CVE-2021-
35645,CVE-2021-35646,CVE-2021-35647,CVE-2021-35648,CVE-2021-23214,CVE-
2021-23222,CVE-2021-3709,CVE-2021-3710,CVE-2021-38185,CVE-2021-33560,CVE-
2021-40528,CVE-2021-3449,CVE-2021-3677,CVE-2021-40153,CVE-2021-41072,CVE-
2021-22945,CVE-2021-22946,CVE-2021-22947,CVE-2020-CVE-2021-3732,CVE-2021-
38198,CVE-2021-38205,CVE-2019-19449,CVE-2021-3428,CVE-2021-3739,CVE-2021-
34556,CVE-2021-35477,CVE-2020-27781,CVE-2021-3509,CVE-2021-3524,CVE-2021-
3531,CVE-2021-20288,CVE-2021-3712,CVE-2021-3733,CVE-2021-3737, CVE-2021-
3800, CVE-2020-15778 CVE-2021-42008, CVE-2021-42252, CVE-2021-3587
45 of 52
Known Issues and Vulnerabilities Addressed
46 of 52
Known Issues and Vulnerabilities Addressed
47 of 52
Known Issues and Vulnerabilities Addressed
48 of 52
Known Issues and Vulnerabilities Addressed
ExtremeControlengine image
l CVE-2019-10092, CVE-2019-11234, CVE-2019-11235, CVE-2018-16884, CVE-
2019-9500, CVE-2018-14678, CVE-2018-18021, CVE-2018-19824, CVE-2019-
3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-
2019-7308, CVE-2019-8912, CVE-2019-8980, CVE-2019-9213, CVE-2018-18397,
CVE-2018-19854, CVE-2019-6454, CVE-2019-14814, CVE-2019-14815, CVE-
2019-15918, CVE-2018-19985, CVE-2019-10639, CVE-2019-14763, CVE-2019-
15090, CVE-2019-15212, CVE-2019-15214, CVE-2019-15216, CVE-2019-15218,
CVE-2019-15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-3701, CVE-
2019-3819, CVE-2019-9506
l CVE-2018-19985, CVE-2018-20784, CVE-2019-0136, CVE-2019-10207, CVE-
2019-10638, CVE-2019-10639, CVE-2019-11487, CVE-2019-11599, CVE-2019-
11810, CVE-2019-13631, CVE-2019-13648, CVE-2019-14283, CVE-2019-14284,
CVE-2019-14763, CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-
2019-15214, CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-
15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-3701, CVE-2019-3819,
CVE-2019-3900, CVE-2019-9506, CVE-2018-21008, CVE-2019-14814, CVE-
2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-15117, CVE-2019-
49 of 52
Known Issues and Vulnerabilities Addressed
50 of 52
Known Issues and Vulnerabilities Addressed
ExtremeAnalyticsengine image
l CVE-2019-16233, CVE-2019-19083, CVE-2019-19807, CVE-2018-19985, CVE-
2018-20784, CVE-2019-0136, CVE-2019-10207, CVE-2019-10638, CVE-2019-
10639, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810, CVE-2019-13631,
CVE-2019-13648, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763, CVE-
2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214, CVE-2019-
15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220, CVE-2019-15221,
CVE-2019-15292, CVE-2019-3701, CVE-2019-3819, CVE-2019-3900, CVE-2019-
9506, CVE-2018-21008, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816,
CVE-2019-14821, CVE-2019-15117, CVE-2019-15118, CVE-2019-15505, CVE-
2019-15902, CVE-2019-15918, CVE-2019-14895, CVE-2019-14896, CVE-2019-
14897, CVE-2019-14901, CVE-2019-16231, CVE-2019-16233, CVE-2019-18660,
CVE-2019-19045, CVE-2019-19052, CVE-2019-19083, CVE-2019-19524, CVE-
2019-19529, CVE-2019-19534, CVE-2019-19807, CVE-2020-15778, CVE-2018-
18397, CVE-2018-19854, CVE-2019-6133, CVE-2019-7303, CVE-2018-14678,
CVE-2018-18021, CVE-2018-19824, CVE-2019-3459, CVE-2019-3460, CVE-
2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-2019-7308, CVE-2019-8912,
CVE-2019-8980, CVE-2019-9213, CVE-2018-12126, CVE-2018-12127, CVE-
2018-12130, CVE-2018-16884, CVE-2019-11091, CVE-2019-3874, CVE-2019-
3882, CVE-2019-9500, CVE-2019-9503, CVE-2019-11191, CVE-2019-11477,
CVE-2019-11478, CVE-2019-11479, CVE-2019-11085, CVE-2019-11815, CVE-
2019-11833, CVE-2019-11884, CVE-2018-13053, CVE-2018-13093, CVE-2018-
13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100,
CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-
2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-
14617, CVE-2018-16862, CVE-2018-20169, CVE-2018-20511, CVE-2018-20856,
CVE-2018-5383, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614, CVE-
51 of 52
Known Issues and Vulnerabilities Addressed
52 of 52