0% found this document useful (0 votes)
71 views32 pages

HPE - A00110413en - Us - U.11.67 Release Notes

Uploaded by

Julian Ochocki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views32 pages

HPE - A00110413en - Us - U.11.67 Release Notes

Uploaded by

Julian Ochocki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

U.11.

67 Release Notes

Part Number: 5200-5157a


Published: January 2021
Edition: 2

HPE Confidential
© Copyright 2021 Hewlett Packard Enterprise Development LP

Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements accompanying
such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use,
or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.

Acknowledgments
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.

HPE Confidential
Contents

Chapter 1 11.66 Release Notes.........................................................................7


Description...................................................................................................................................................... 7
Important information...................................................................................................................................7
Products supported....................................................................................................................................... 7
Compatibility/interoperability....................................................................................................................... 7
Enhancements................................................................................................................................................ 8
Version 11.50....................................................................................................................................... 8
Per-Interface Syslog Event Enable-Disable........................................................................... 8
Version 11.38....................................................................................................................................... 8
Event Log Severity Change......................................................................................................8
Version 11.29....................................................................................................................................... 8
Dynamic Port Access Auth via RADIUS.................................................................................. 8
Version 11.23....................................................................................................................................... 8
SNMP Traps When MAC Addresses Are Added Or Deleted, part 2....................................8
Version 11.18....................................................................................................................................... 8
Management Access Security.................................................................................................8
Web Authentication Message.................................................................................................9
User-Configurable Per-Port MAC Address............................................................................ 9
SNMP Traps When MAC Addresses Are Added Or Deleted................................................ 9
Multiple RADIUS Groups......................................................................................................... 9
Show Port-Access Detailed Option........................................................................................ 9
Fixes..................................................................................................................................................................9
Version 11.67....................................................................................................................................... 9
SSH.............................................................................................................................................9
Version 11.66..................................................................................................................................... 10
Authentication........................................................................................................................10
Version 11.65..................................................................................................................................... 10
Authentication........................................................................................................................10
IMC...........................................................................................................................................10
Version 11.64..................................................................................................................................... 10
Version 11.63..................................................................................................................................... 10
Online Help............................................................................................................................. 10
Spanning Tree.........................................................................................................................10
TACACS+.................................................................................................................................. 11
Version 11.62..................................................................................................................................... 11
802-1x......................................................................................................................................11
Include Credentials................................................................................................................ 11
Management.......................................................................................................................... 11
Passwords............................................................................................................................... 11
Version 11.61..................................................................................................................................... 12
Accounting.............................................................................................................................. 12
Credentials..............................................................................................................................12
SFTP......................................................................................................................................... 12
Spanning Tree.........................................................................................................................12
Version 11.60..................................................................................................................................... 12
SNMP....................................................................................................................................... 12
UDLD....................................................................................................................................... 12
Web Management................................................................................................................. 12
Version 11.59..................................................................................................................................... 12
Config...................................................................................................................................... 12

Contents HPE Confidential 3


Crash....................................................................................................................................... 12
DHCP Snooping...................................................................................................................... 13
Version 11.58..................................................................................................................................... 13
Authentication........................................................................................................................13
Stacking................................................................................................................................... 13
Version 11.57..................................................................................................................................... 13
Authentication........................................................................................................................13
Logging.................................................................................................................................... 13
Version 11.56..................................................................................................................................... 13
Crash....................................................................................................................................... 13
Version 11.55..................................................................................................................................... 14
Config...................................................................................................................................... 14
Stacking................................................................................................................................... 14
Version 11.54..................................................................................................................................... 14
Crash....................................................................................................................................... 14
ICMP........................................................................................................................................ 14
Version 11.53..................................................................................................................................... 14
Command Authorization...................................................................................................... 14
Secure Copy............................................................................................................................ 14
Version 11.52..................................................................................................................................... 14
Banner MOTD.........................................................................................................................14
Crash....................................................................................................................................... 14
Version 11.51..................................................................................................................................... 15
Crash....................................................................................................................................... 15
IGMP........................................................................................................................................ 15
Version 11.50..................................................................................................................................... 15
Version 11.49..................................................................................................................................... 15
CLI............................................................................................................................................ 15
Crash....................................................................................................................................... 15
Loop Protection......................................................................................................................15
MAC Authentication...............................................................................................................15
Passwords............................................................................................................................... 16
Version 11.48..................................................................................................................................... 16
Syslog...................................................................................................................................... 16
Version 11.47..................................................................................................................................... 16
Crash....................................................................................................................................... 16
DHCP Snooping...................................................................................................................... 16
Link.......................................................................................................................................... 16
Spanning Tree.........................................................................................................................16
Web Management................................................................................................................. 16
Version 11.46..................................................................................................................................... 16
CLI............................................................................................................................................ 16
Management.......................................................................................................................... 17
Web Management................................................................................................................. 17
Version 11.45..................................................................................................................................... 17
Controlled Direction.............................................................................................................. 17
Version 11.44..................................................................................................................................... 17
CLI............................................................................................................................................ 17
DHCP....................................................................................................................................... 17
File Transfer............................................................................................................................ 17
Multicast..................................................................................................................................17
RADIUS.................................................................................................................................... 17
SNMP....................................................................................................................................... 17
Version 11.43..................................................................................................................................... 18
CLI............................................................................................................................................ 18
Crash....................................................................................................................................... 18
GVRP........................................................................................................................................ 18

4 HPE Confidential U.11.67 Release Notes


IGMP........................................................................................................................................ 18
Version 11.42..................................................................................................................................... 18
CLI............................................................................................................................................ 18
DHCP Snooping...................................................................................................................... 18
IGMP........................................................................................................................................ 18
Version 11.41..................................................................................................................................... 19
Authentication........................................................................................................................19
CLI............................................................................................................................................ 19
SNMP....................................................................................................................................... 19
Version 11.40..................................................................................................................................... 19
ARP...........................................................................................................................................19
CLI............................................................................................................................................ 19
IGMP........................................................................................................................................ 19
Include Credentials................................................................................................................ 19
Version 11.39..................................................................................................................................... 20
Authentication........................................................................................................................20
Version 11.38..................................................................................................................................... 20
SNMP....................................................................................................................................... 20
Version 11.37..................................................................................................................................... 20
Loop Protection......................................................................................................................20
Stacking................................................................................................................................... 20
Web Management................................................................................................................. 20
Version 11.36..................................................................................................................................... 20
Authentication........................................................................................................................20
IGMP........................................................................................................................................ 21
Version 11.35..................................................................................................................................... 21
CLI............................................................................................................................................ 21
Spanning Tree.........................................................................................................................21
Version 11.34..................................................................................................................................... 21
SNMP....................................................................................................................................... 21
Version 11.33..................................................................................................................................... 21
CLI............................................................................................................................................ 21
IGMP........................................................................................................................................ 21
Web Management................................................................................................................. 21
Version 11.32..................................................................................................................................... 21
CLI............................................................................................................................................ 21
DHCP Snooping...................................................................................................................... 22
SSL........................................................................................................................................... 22
Version 11.31..................................................................................................................................... 22
Crash....................................................................................................................................... 22
sFlow........................................................................................................................................22
SNMP....................................................................................................................................... 22
Web Management................................................................................................................. 22
Version 11.30..................................................................................................................................... 22
Authentication........................................................................................................................22
Version 11.29..................................................................................................................................... 22
CLI............................................................................................................................................ 22
FFI/Config................................................................................................................................ 22
SSL........................................................................................................................................... 23
Version 11.28..................................................................................................................................... 23
Authentication........................................................................................................................23
File Transfer............................................................................................................................ 23
Version 11.27..................................................................................................................................... 23
Counters..................................................................................................................................23
Web Management................................................................................................................. 23
Version 11.26..................................................................................................................................... 23
CLI............................................................................................................................................ 23

Contents HPE Confidential 5


Version 11.25..................................................................................................................................... 23
Management.......................................................................................................................... 23
Version 11.24..................................................................................................................................... 23
Version 11.23..................................................................................................................................... 23
Web Management................................................................................................................. 23
Version 11.22..................................................................................................................................... 24
CLI............................................................................................................................................ 24
Crash....................................................................................................................................... 24
Port Security........................................................................................................................... 24
Version 11.21..................................................................................................................................... 24
Version 11.20..................................................................................................................................... 24
CLI............................................................................................................................................ 24
Counters..................................................................................................................................24
Event Log.................................................................................................................................24
FFI.............................................................................................................................................24
Port Security........................................................................................................................... 24
Secure Copy............................................................................................................................ 24
Spanning Tree.........................................................................................................................25
Switch Tables.......................................................................................................................... 25
Version 11.19..................................................................................................................................... 25
Authentication........................................................................................................................25
SNMP/Config.......................................................................................................................... 25
Version 11.18..................................................................................................................................... 25
802.1X......................................................................................................................................25
Authentication........................................................................................................................25
Config...................................................................................................................................... 26
Crash....................................................................................................................................... 26
GVRP........................................................................................................................................ 26
LLDP.........................................................................................................................................26
RADIUS Accounting................................................................................................................26
SNMP/Config.......................................................................................................................... 26
SSH...........................................................................................................................................26
Stacking................................................................................................................................... 26
Unauthenticated VLAN..........................................................................................................27
Upgrade information................................................................................................................................... 27

Chapter 2 Aruba security policy.................................................................... 28


Security Bulletin subscription service........................................................................................................ 28

Chapter 3 Websites...........................................................................................29

Chapter 4 Support and other resources...................................................... 30


Accessing Hewlett Packard Enterprise Support........................................................................................30
Accessing updates........................................................................................................................................ 30
Remote support............................................................................................................................................31
Warranty information.................................................................................................................................. 31
Regulatory information............................................................................................................................... 32
Documentation feedback............................................................................................................................ 32

6 HPE Confidential U.11.67 Release Notes


Chapter 1
11.67 Release Notes

Description
This release note covers software versions beginning with U.11.18. For information about earlier software
versions, please see the U.11.17 release notes.
Product series supported by this software:

HPE 2510 48 Switch Series

Important information
To avoid damage to your equipment, do not interrupt power to the switch during a software update.

Products supported
This release applies to the following product models:

Product number Description


J9020A HPE 2510 48 Switch

Compatibility/interoperability
The switch web agent supports the following web browsers:

Browser Supported versions


Internet Explorer • Edge
• 11

Chrome • 53
• 52

Firefox • 49
• 48

Safari (MacOS only) • 10


• 9

NOTE: HPE recommends using the most recent version of each browser as of the date of this
release note.

Chapter 1 11.66 Release Notes HPE Confidential 7


Enhancements
This section lists released builds that include enhancements. Software enhancements are listed in reverse-
chronological order, with the newest at the top of the list. Unless otherwise noted, each software version
listed includes all enhancements added in earlier editions. The last release that introduced enhancements
was U.11.50.

NOTE: The number preceding the enhancement description is used for tracking purposes.

Version 11.50
Per-Interface Syslog Event Enable-Disable
CR_0000111562 This feature provides a per-port filter that can restrict the logging of events that are
associated with a link status change. Unimportant linkup/linkdown events can be filtered out, avoiding
unwanted messages in the event log and reducing troubleshooting time. See "Troubleshooting" in the
Management and Configuration Guide for your switch.

Version 11.38
Event Log Severity Change
PR_0000071660, CR_0000076630 This enhancement allows customers to use SNMP to change the severity
of event log entries from their default values.

Version 11.29
Dynamic Port Access Auth via RADIUS
PR_0000060972 Enables configuration of RADIUS attributes for downstream supplicant devices. This allows
a common port policy to be configured on all access ports by creating new RADIUS HP vendor-specific
attributes (VSAs) that will dynamically override the authentication limits. For more information, see the
chapter "RADIUS Authentication, Authorization, and Accounting" in the Access Security Guide for your switch.

Version 11.23
SNMP Traps When MAC Addresses Are Added Or Deleted, part 2
PR_0000056756 This is an addition to the U.11.18 enhancement that adds an SNMP trap when MAC
addresses are added to or deleted from a port (PR_0000045796). When the SNMP trap feature is enabled,
the SNMP trap data can be lost during periods with high levels of MAC learns or removals. This fix adds an
event log message to indicate the number of lost trap notifications.

Version 11.18
Management Access Security
PR_0000045680 Management Access Security enhancements related to configuration of access methods for
IP Authorized Manager entries. For more information, see the Access Security Guide for your switch.

8 HPE Confidential U.11.67 Release Notes


Web Authentication Message
PR_0000045711 The Web authentication message feature allows administrators to configure custom
messages that are displayed when authentication with the RADIUS server fails. For more information, see
the Access Security Guide for your switch, "Web-based and MAC authentication" chapter.

User-Configurable Per-Port MAC Address


PR_0000045752 User-configurable per-port MAC address enhancement. For more information, see the
Access Security Guide for your switch, "Web-based and MAC authentication" chapter.

SNMP Traps When MAC Addresses Are Added Or Deleted


PR_0000045796 Adds the ability to enable SNMP traps when MAC addresses are added to or deleted from a
port. For more information, see the Management and Configuration Guide for your switch, "Configuring for
Network Management Applications" chapter.

Multiple RADIUS Groups


PR_0000046226 Support is added for multiple RADIUS groups. For more information, see the Access Security
Guide for your switch, "RADIUS Authentication, Authorization, and Accounting" chapter.

Show Port-Access Detailed Option


PR_0000049830 The detailed option is added to the show port-access commands. For more
information, see the Management and Configuration Guide for your switch, "Port Traffic Controls" chapter.

Fixes
This section lists released builds that include fixes found in this branch of the software. Software fixes are
listed in reverse-chronological order, with the newest on the top of the list. Unless otherwise noted, each
software version listed includes all fixes added in earlier versions.
The Symptom statement describes what a user might experience if this is seen on the network. The Scenario
statement provides additional environment details and trigger summaries. When available, the Workaround
statement provides a workaround to the issue for customers who decide not to update to this version of
software.

NOTE: The number that precedes the fix description is used for tracking purposes.

Version 11.67
SSH
CR_0000251368
Symptom: The switch crashes with an error message similar to:

NMI event SW .... Task='tSsh0'


Scenario: This issue occurred when an SSH connection was made to the switch.

Chapter 1 11.66 Release Notes HPE Confidential 9


Version 11.66
Authentication
CR_0000241423
Symptom: The switch fails to enforce certain authorization restrictions.
Scenario: When accessing the switch using SSH, it fails to enforce the authorization commands restrictions
to local users.
Workaround: Restrict switch access to TELNET for local users with restricted authorization commands.

Version 11.65
Authentication
CR_0000225881
Symptom: Switch fails to grant authorized status to authenticated clients.
Scenario: When the switch is configured to allow access without authentication using configuration "aaa
authentication port-access eap-radius authorized", while the authentication port is also configured for both
authorized VLAN (auth-vid) and guest VLAN (unauth-vid) access, if the switch is unable to reach the RADIUS
server, it fails to grant authorized access to the client.

IMC
CR_0000225707
Symptom: Unexpected characters are displayed when initiating a TELNET session to the switch.
Scenario: When initiating a TELNET session to the switch using the embedded TELNET GUI from IMC version
7.2 or greater, the switch displays unexpected characters, such as "{" or "q".
Workaround: Use IMC version 7.1, or an alternative client, to TELNET to the switch.

Version 11.64
Version 11.64 was never released.

Version 11.63
Online Help
CR_0000201063
Symptom: Web management help file is not accessible.
Scenario: The web management interface online help file URL changed to accommodate domain change for
host files.

Spanning Tree
CR_0000202511 Symptom: Incorrect Spanning Tree hello time is reported as a MIB value.
Scenario: In a Spanning Tree topology, the switch reports the value of OID dot1dStpHelloTime on a root
switch in seconds instead of centiseconds as reported in non-root switches.
Workaround: There is no impact on Spanning Tree functionality as this is merely a value conversion from
seconds to centiseconds.

10 HPE Confidential U.11.67 Release Notes


TACACS+
CR_0000202399 Symptom: Switch may crash or hang during TACACS authentication.
Scenario: When "include-credentials" functionality is enabled on the switch and the switch is not known to
ACS, the switch may hang or crash during the switch TACACS authentication.
Workaround: Remove include-credentials from the switch configuration.

Version 11.62
802-1x
CR_0000170012 Symptom: Certain 801.x supplicant clients may not be successfully authenticated by the
switch when configured as 802.1X authenticator for port access.
Scenario: Certain 801.1X supplicant clients, such as the HP 425 802.11n Dual Radio Access Point Series, fail
to be successfully authenticated by a switch configured as 802.1x authenticator for port access, without an
existing guest VLAN.
Workaround: Configure the switch with a guest VLAN for 802.1x port access authentication. Example: aaa
port-access authenticator <PORT-NUM> unauth-vid <VLAN-ID>.

Include Credentials
CR_0000199379 Symptom: The switch configuration include-credentials that is required to include
passwords and security credentials in the configuration files is not correctly preserved upon switch software
upgrade from older versions.
Scenario: When upgrading the switch software, the switch configuration include-credentials is
changed to include-credentials radius-tacacs-only.
Workaround: After switch reboot, re-enable include credentials using the CLI command include-
credentials.

Management
CR_0000198649 Symptom: In the help text message of the Menu interface, the maximum supported
authorized managers are displayed incorrectly.
Scenario: The help text message of the IP Authorized Managers Help Screen Menu interface states A
maximum of 10 addresses is supported while the switch allows up to 100 authorized managers to be
configured.
Workaround: Use the CLI command ip authorized-managers help to determine the maximum
authorized manages that can be configured on the switch.

Passwords
CR_0000189714 Symptom: The help text description of CLI command password help displays the
incorrect supported password length.
Scenario: When the CLI command password help is executed, its help text description incorrectly states
that the supported password length is up to 16 characters while the switch supports passwords of up to 64
characters in length.

Chapter 1 11.66 Release Notes HPE Confidential 11


Version 11.61
Accounting
CR_0000174407 Symptom: Accounting Stop packets are not processed correctly for the corresponding
authenticated user.
Scenario: When RADIUS Accounting is configured and multiple users are authenticated from the same client
device, the Accounting Stop packet, for all authenticated users from the same client device, is sent with the
radius-class attributes of the first authenticated user.

Credentials
CR_0000174999 Symptom/Scenario: Extended password length support for switch access from 16 to up to
64 characters.

SFTP
CR_0000122259 Symptom: Downloading image file using SFTP is aborted before completion.
Scenario: When large files are transferred with Windows secure file transfer client applications, such as
WinSCP and PuTTY, the operation might be abruptly closed before the file transfer is successfully completed.

Spanning Tree
CR_0000172995 Symptom: Toggling admin-edge disable/enable triggers spanning-tree topology changes.
Scenario: In a spanning-tree topology, when a disabled port is configured as an admin-edge-port, a
topology change is triggered when this port is enabled.

Version 11.60
SNMP
CR_0000169214 An snmpwalk times out at lldpRemManAddrOID when it receives an LLDP Management
OID TLV in the LLDP frame.

UDLD
CR_0000165682 When a UDLD-enabled port establishes link with a port on a link partner that also has UDLD
configured, the port goes into a failed state and is blocked by UDLD. When the next UDLD packet is received
from the link partner after 5 seconds, the port will be unblocked and operate as expected.

Web Management
CR_0000162905 When a user connects to an IP address on the switch using a browser with Java version
7U51 or later, the web interface will be blocked because the Java applets were not code-signed.

Version 11.59
Config
CR_0000160912 Switch configuration becomes corrupted after an SCP config file transfer to the switch if the
file is greater than 32 kilobytes.

Crash
CR_0000154313 With SSH enabled, attempting SFTP transfers might cause the switch to reboot
unexpectedly with a message similar to TLB Miss: Virtual Addr=0x0000001c IP=0x8008b24c

12 HPE Confidential U.11.67 Release Notes


Task='tSftp0', Task ID=0x85717f10 fp:0x85d83a38 sp:0x85717d58 ra:0x8008b1c8 sr:
0x1000fc01.

DHCP Snooping
CR_0000153434 Sometimes DHCP Snooping fails to register a DHCP client in the DHCP binding database.
When Dynamic ARP Protection is also enabled, the non-registered client will not be able to successfully
transmit ARP packets.

Version 11.58
Authentication
CR_0000150695 The configured 'unauth-period' timer is not considered during the MAC-based
authentication process. When an 802.1x client is connected to a switch port that is also configured for MAC-
based authentication, the software assigns the client to the unauthenticated VLAN ID before the 802.1x
supplicant software had a chance to run.

Stacking
CR_0000149654 The switch is not reachable from an IP Stack commander switch when a browser is used.
When the IP Stack member switch is selected from the list, the connection fails with a Bad Request error
message.

Version 11.57
Authentication
CR_0000146365 When the same client is first authenticated by MAC-based authentication and then by
802.1x, sometimes an endless repetition of authentications can ensue. Whether or not this problem will
occur depends on the timing of the two authentication methods. When it happens, the client is first
authenticated by MAC-based authentication, then by 802.1x, and then the MAC address is deleted from the
address tables, which leads to a new authentication request, at which point the cycle repeats itself.

Logging
CR_0000134056 When the name of a configured RMON Event Filter contains a space, the filter is not
displayed in the output of the CLI commands show running-configuration and show config. When
the exact same filter name is then also used to configure a regular expression, the 'type' and 'value' fields in
the output of the CLI command show logging filter <filter name> are blank.

Version 11.56
Crash
CR_0000142269 When the config file includes the entry aaa accounting commands stop-only radius,
entering the command show port-security intrusion-log might cause the switch to reboot
unexpectedly with a message similar to Unalligned Access: Virtual Addr=0x00000053
IP=0x802a9898 Task= 'mSess2' Task ID=0x85dc5290 fp:0x00000002 sp:0x85dc3b00 ra:
0x802a9890 sr:0x1000fc01. Entering the command clear intrusion-flags might cause the switch
to reboot unexpectedly with a message similar to TLB Miss: Virtual Addr=0x000000b4
IP=0x802a989c Task= 'mSess1' Task ID=0x85ddfa10 fp:0x00000002 sp:0x85dde828 ra:
0x802a9890 sr:0x1000fc01.

Chapter 1 11.66 Release Notes HPE Confidential 13


Version 11.55
Config
CR_0000135481
After boot, a config file that has a trap destination community name with an open parenthesis "(" or a close
parenthesis ")" cannot be downloaded to the switch.

Stacking
CR_0000142136 When configured for IP Stacking, and passwords have been configured, and selecting a
Member from the web GUI drop down list, the web page displays the following error This is a dummy
page to force a manager login if any stack member is accessed from a commander. See
http_c. for more details. This issue was fixed on other platforms with CR_0000105617.

Version 11.54
Crash
CR_0000135269 Rarely, with very high levels of traffic directed at the switch's management interface in
combination with other conditions internal to the switch, the switch might reboot unexpectedly with a
message similar to NMI event SW: IP=0x8073af64 SR:0x1000fc01 Task= 'bcmRX' Task
ID=0x85e4f720 sp:0x85e4f5c0.

ICMP
CR_0000140363 The switch does not forward IRDP (ICMP Router Discovery Protocol) multicast packets.

Version 11.53
Command Authorization

CR_0000137774
When issuing a command such as show tech (which invokes many sub-commands), if any of the sub-
commands are on the HP-Command-Exception "DenyList", the command fails and the user is removed from
enable mode.

Secure Copy
CR_0000140869 When the user attempts a Secure Copy (SCP) to a protected file on the switch, the switch's
user interface hangs, requiring a switch reboot to clear the condition.

Version 11.52
Banner MOTD
CR_0000138217 When an MOTD is configured, the switch displays the default banner with the HP
"Restricted Rights Legend" in addition to the MOTD text. The HP "Restricted Rights Legend" should not be
displayed when an MOTD is configured.

Crash
CR_0000134697 When a Web-authentication client attempts to access any website, the switch might reboot
unexpectedly with a message similar to TLB Miss: Virtual Addr=0x00000050 IP=0x8051b764 Task=
'tHttpd' Task ID=0x85c63d00 fp:0x85c636f8 sp:0x85c63678 ra:0x8028b784 sr:0x1000fc01.

14 HPE Confidential U.11.67 Release Notes


CR_0000137484 Multiple SSH sessions attempting to simultaneously transfer files from the switch might
cause the switch to reboot unexpectedly with a message similar to TLB Miss: Virtual
Addr=0x00000000 IP=0x80711c0c Task= 'tSftp0' Task ID=0x856dc2f0 fp:0x00000005 sp:
0x856d8058 ra:0x806d6b20 sr:0x1000fc01.

Version 11.51
Crash
CR_0000132543 When the default gateway is changed via the Web interface, the switch might reboot
unexpectedly with a message similar to TLB Miss: Virtual Addr=0x00000004 IP=0x8027780c Task=
'tHttpd' Task ID=0x85c12610 fp:0x00000000 sp:0x85c11ec8 ra:0x802777c0 sr:0x1000fc01.

IGMP
CR_0000127628 In a topology where the host connects to a querier, the querier connects to a non-querier
switch, the non-querier switch connects to a router, and the multicast source is beyond the router, the host
might not receive the multicast stream. This happens because a "join" from the host that is received by the
querier is not forwarded by the non-querier switch.

Version 11.50
No fixes were included with version 11.50.

Version 11.49
CLI
CR_0000131650 Output of the CLI command show flash might include a "#" sign appended to the
software version number.

Crash
CR_0000127989 The switch experiences a gradual loss of free memory when clients that use a RADIUS-
assigned ACL reauthenticate. This can cause the switch to reboot unexpectedly. This issue was resolved for
other platforms with CR_0000118474.

Loop Protection
CR_0000130426 If loop protection is enabled on a port and then disabled before a loop is detected, the
switch will continue to act as if loop protection is enabled on that port. When a loop is subsequently
detected, the switch will disable the port.

MAC Authentication
CR_0000131443 With the combination of MAC authentication enabled, RADIUS-assigned ACLs, and clients
reauthenticating, some user actions such as issuing the command show port-access mac-based
clients [port-list] detailed might result in one or more of these symptoms:

1. The command output begins to display and then hangs


2. No communication with the RADIUS server
3. No response to SNMP requests

Chapter 1 11.66 Release Notes HPE Confidential 15


Passwords
CR_0000130959 If an Operator password is configured, when the user accesses the Web interface and
enters the Operator password, the switch does not accept the password and continues to request a
password.
CR_0000130960 If both Operator and Manager passwords are configured, after deleting the Manager
password the Web interfaces till accepts the Manager password.

Version 11.48
Syslog
PR_0000065540, CR_0000072482 There is a long delay before the switch event log messages are sent to the
syslog server.

Version 11.47
Crash
CR_0000120993 Uploading a config file via SFTP might cause the switch to reboot unexpectedly with a
message similar to Software exception at exception.c:374 -- in 'tExcTask', taskID =
0x87965b10, -> internal error.

DHCP Snooping
CR_0000126311 The CLI entry dhcp-snooping option 82 untrusted-policy keep is not included in the
config file if no dhcp-snooping option 82 is also configured. If the config file is saved to a TFTP server, it will
not function properly when subsequently loaded on a switch.

Link
CR_0000124901 After rebooting the switch with the boot system command, some links might not come
up.
Workaround: Use the reload command, or configure the switch to use fastboot.

Spanning Tree
CR_0000123533 After hot-swapping a mini-GBIC (SFP) in a slot that is configured with bpdu-protection and
is in the Spanning Tree BpduError state, the port begins forwarding traffic despite having received Spanning
Tree BPDUs.

Web Management
CR_0000124619 After logging into a switch as Operator via the Web user interface, in some situations the
user is not able to subsequently log into the switch as Manager. The switch might respond You are
already logged on.

Version 11.46
CLI
CR_0000123057 The CLI command console local-terminal none persists across new terminal sessions
without being saved in the configuration.
Workaround: Use console local-terminal vt100 to exit the local-terminal none mode.

16 HPE Confidential U.11.67 Release Notes


Management
PR_0000060431, CR_0000070319 Issuing the command ip authorized-managers along with a valid IP
address (example ip authorized-managers 10.20.30.40) results in an immediate resource
unavailable error on the CLI. The config file may also receive an erroneous line added after the error
occurs.

Web Management
CR_0000123053 The Web interface allows the password to be viewed.

Version 11.45
Controlled Direction
CR_0000118813 After a port changes state for Spanning Tree, in some situations a controlled-direction
setting of in is wrongly changed by the switch to both.

Version 11.44
CLI
CR_0000113718 The CLI command show port-access authenticator <port_number> clients
detailed sometimes results in an incorrect session time value, adding two extra zeros to the session time.
For example, Session Time: 10500 seconds might be displayed when the actual time is
105 seconds.
CR_0000114191 CLI help lists LACP as IEEE 802.1ad rather than 802.3ad.

DHCP
CR_0000117134 A VLAN configured via DHCP-Bootp will not obtain an IP address if the VLAN is configured
as a management VLAN. The switch fails to send a DHCP Request after receiving a DHCP Offer.

File Transfer
PR_0000073633, CR_0000078310 Error sometimes seen during SSH file transfer error while reading:
received a short buffer from FXP_READ, but not at EOF.

Multicast
CR_0000107597 The switch floods GMRP (GARP Multicast Registration Protocol) packets that are received on
Spanning Tree backup and alternate ports, instead of dropping the packets.
CR_0000110677 GMRP Frames should flood to the VLAN just as multicast traffic does but are not flooding as
expected.

RADIUS
CR_0000117215 If the encryption keys are not configured the same for primary and secondary radius
servers on the switch, the Radius server may reject clients with wrong username-password.

SNMP
CR_0000113034 SNMPget of the object dot3adAggPortListPorts returns extraneous comma and space
characters, which can affect scripts based on the SNMPget output.

Chapter 1 11.66 Release Notes HPE Confidential 17


Version 11.43
CLI
PR_0000057380, CR_0000069166 Issuing a debug all command enables unsupported debug types. For
example, after doing debug all, debug types such as ip rip and ip ospf are listed with the show debug
command.

Crash
CR_0000106214 Disabling a port with a RADIUS-assigned GVRP VLAN might cause the switch to reboot
unexpectedly with a message similar to NMI event SW:IP=0x802a783c SR:0x1000fc01
Task='m8021xCtrl' TaskID=0x85dbbb90 sp:0x85dbabd8.

GVRP
CR_0000109513 When a switch port is configured with the unknown-vlans disable parameter, VLANs
might be wrongly removed from a switch.

IGMP
CR_0000108874 The switch drops IGMP Joins and Leaves that are received on the Querier port. This issue
was introduced in U.11.40.
CR_0000108880 IGMPv2 LEAVE processing functionality no longer works for a multicast group after receipt
of IGMPv1 group specific membership query (GSMQ) packet when operating in IGMPv2 mode, even when ip
igmp forcedfastleave 1-24 is enabled. This improves the original IGMP fix (CR_0000105902), in U.11.42.

Version 11.42
CLI
PR_0000071925, CR_0000076872 This CLI command (ending in a tilde character) spanning-tree config-
name test~ returns a Commit failed message instead of correctly returning Invalid character (~):
test~.
CR_0000103448b Enabling and Disabling loop-protect on a range of ports may result in ports 4 and higher to
be disabled and left in an error state. For example, loop-protect 1-24 then no loop-protect 1-24 may result
in ports 4-24 to be left disabled. This improves the original CLI fix (CR_0000103448) in U.11.41.

DHCP Snooping
CR_0000106598 A DHCP packet sent to UDP port 67 and received on an untrusted port is forwarded by the
switch when it should not be. The switch logs an incorrect message similar to dhcp-snoop: backplane:
Server 10.10.10.50 packet received on untrusted port 1 dropped.

IGMP
CR_0000105902 IGMPv2 LEAVE processing functionality no longer works for a multicast group after receipt
of IGMPv1 group specific membership query (GSMQ) packet when operating in IGMPv2 mode, even when ip
igmp forcedfastleave 1-24 is enabled.
CR_0000107317 IGMP joins may cause multicast streams to flood, briefly, across the VLAN.

18 HPE Confidential U.11.67 Release Notes


Version 11.41
Authentication
CR_0000105275 When a switch port is configured for two different types of authentication, if either
authentication type is configured with a specific logoff-period that is different than the MAC address aging
time, the authenticated clients might reauthenticate at random times.

CLI
PR_0000064558, CR_0000072036 The switch displays the originally-configured RADIUS timeout in the output
of show port-access mac-based config auth-server, even if RADIUS assigns a different timeout.
CR_0000103448 Enabling and Disabling loop-protect on a range of ports may result in ports 4 and higher to
be disabled and left in an error state. For example, loop-protect 1-24 then no loop-protect 1-24 may result
in ports 4-24 to be left disabled.

SNMP
PR_0000072099, CR_0000077036 The MIB object hpSwitchStpStatAdminStatus.0 gives the wrong value (2,
disabled) even when STP is enabled.

Version 11.40
ARP
PR_0000069233, CR_0000074561 Static ARP configuration command accepts an invalid MAC address of all
zeroes (000000-000000).

CLI
PR_0000069554, CR_0000074837 This improves the static ARP CLI help text.
CR_0000103147 When attempting to configure local passwords for Operator or Manager using the CLI, the
switch might respond with a resource unavailable error.
CR_0000104104 Certain CLI commands with the authentication keyword may fail. For example, entering
aaa authentication telnet enable tacacs on the CLI might result in the switch response Usage:
aaa <…> as if the command had been typed incorrectly.
CR_0000104569 Some aaa authentication commands are not displayed with the show run or show
start commands, for example aaa authentication telnet enable tacacs. If the config file is saved
to a TFTP server, it will not function properly when subsequently loaded on a switch.

IGMP
CR_0000103101 The switch forwards joins to all queriers instead of only to the querier for the VLAN on
which the join was received. This can result in intermittent flow failures.

Include Credentials
CR_0000103155 A switch configuration that has RADIUS and/or TACACS keys and the command include-
credentials radius-tacacs-only does not contain the keys when the config file is saved to a TFTP
server.

Chapter 1 11.66 Release Notes HPE Confidential 19


Version 11.39
Authentication
CR_0000102641 With a PC (802.1X authentication) attached to a phone (802.1X authentication) and the
phone connected to a switch port, and with the RADIUS server providing an untagged Egress-VLANID for the
PC client and with the phone moving to a tagged VLANID, if the PC is rebooted after a successful
authentication of both phone and PC, then the switch fails to reauthenticate the PC and instead puts the PC
into the Held state.
CR_0000102643 With a PC (MAC-based authentication) attached to a phone (802.1X authentication) and the
phone connected to a switch port, and with a MAC-based reauth-period configured and the RADIUS server
providing an untagged Egress-VLANID for the MAC-based PC client, if the MAC-based reauth-period timer
expires after a successful authentication of both phone and PC, then the switch fails to reauthenticate the
PC and displays the error dca: macAuth client untagged VLAN-id arbitration error in the
event log.
CR_0000102966 When a client performs 802.1X authentication on a 48-port switch and the RADIUS server
returns a dynamic VLAN, the client will be placed in the unauthenticated VLAN rather than the VLAN
assigned by RADIUS. This applies only to ports 25 and above, and only for client-based authentication.

Version 11.38
SNMP
PR_0000073694, CR_0000078363 SNMPget of the object hpicfFaultFinderTrap fails to return the port ID on
which the problem occurred.
CR_0000102629 In switch software the OID suffix for hpicfBridgeRstpPortPathCost is 7 and for
hpicfBridgeRstpForceBpduMigrationCheck the OID suffix is 6, but the reverse is actually correct.

Version 11.37
Loop Protection
PR_0000072139 Loop-protect stops working on the ports connected to an unmanaged switch.

Stacking
PR_0000071644 Using a stack, with a Commander and Members, the Commander's IP address is sometimes
displayed in Member Identity Tabs as 0.0.0.0.

Web Management
PR_0000070264 The config file saved via the Web user interface is corrupted and cannot be loaded onto a
switch.

Version 11.36
Authentication
PR_0000070500 When the 802.1X authenticator times out waiting for a supplicant response, instead of
transitioning to the connecting state and restarting the attempt to acquire a supplicant by transmitting
Identity-Requests, it falls silent.

20 HPE Confidential U.11.67 Release Notes


IGMP
PR_0000071591 Forced Fast-Leave IGMP does not work correctly for ports with MACs learned on multiple
VLANs, unless each of those VLANs is configured for Forced Fast-Leave.
PR_0000072313 Some devices, when elected IGMP Querier, transmit malformed Group Specific Queries.
Specifically, they transmit a GSQ that has a MAX Response Field set to "˜00'.

Version 11.35
CLI
PR_0000070733 The CLI command aaa option for unauth-period is missing. For example, aaa port-
access authenticator unauth-period is not accepted.
PR_0000071004 The output of the command show port-access authenticator config displays the
direction as both, even if the direction was configured to be in or out.
PR_0000072110 CLI command show int (show interface) might not show the correct dropped packet count
for Transmits (Tx).

Spanning Tree
PR_0000070920 With Spanning Tree disabled, tagged Spanning Tree BPDUs are not always forwarded out a
trunked port.

Version 11.34
SNMP
PR_0000071585 The output of an SNMP "getmib" is off by one EventDescription number. For example, a
"getmib" output showing EventDescription 76 means a port is now online, but the EventDescription # should
have been 75 for a port that is offline. This can affect trap receivers that parse the SNMP response.

Version 11.33
CLI
PR_0000068813 The commands page and no page are not available at the Operator privilege level.

IGMP
PR_0000070385 After receiving a frame with destination address 231.0.0.2, the switch floods all multicast
streams that have no clients.

Web Management
PR_0000060688 With IP virtual stacking enabled and accessing the stack via the Web user interface, the IP
address displayed in stack member identity tabs is always that of the commander.

Version 11.32
CLI
PR_0000069348 The switch allows configuration of a "voice" VLAN even though the switch does not support
LLDP-MED.
PR_0000069358 The switch places snmp-server host entries in the wrong location in the config file.

Chapter 1 11.66 Release Notes HPE Confidential 21


DHCP Snooping

PR_0000065859
With DHCP snooping enabled, the switch drops DHCP ACK packets from PXE servers, which causes PXE boot
processes to fail.

SSL
PR_0000070330 After copying the CA certificate to the switch this error message is received: Error
setting CA Signed Request Configuration - No certificate is installed. This improves the
original SSL fix (PR_0000064686) in U.11.29.

Version 11.31
Crash
PR_0000066961 With DHCP snooping enabled, the switch might reboot unexpectedly with a message similar
to the following:
TLB Miss: Virtual Addr=0x00000003 IP=0x804e5658 Task='eDrvPoll Task ID=0x85992560
fp:0x000000f0 sp:0x85991f18 ra:0x804e54cc sr:0x1000fc01

sFlow
PR_0000068142 sFlow counters incorrectly include data from multiple interfaces.

SNMP
PR_0000064215 An SNMP query for the authorized VLAN ID or the unauthorized VLAN ID does not receive a
correct value.

Web Management
PR_0000067715 The Web user interface does not allow a user to change the switch's IP address and default
gateway at the same time. With this fix, the Apply Changes button saves both values simultaneously.

Version 11.30
Authentication
PR_0000017310 When a PC is attached to the PC port of a VoIP phone and the PC authenticates first (before
the phone), the switch does not use the RADIUS-assigned tagged VLAN for the phone, so the phone does
not authenticate.

Version 11.29
CLI
PR_0000066827 The command snmp-server enable traps authentication is not saved in running or
startup configurations.

FFI/Config
PR_0000039989
FFI - If an FFI event is triggered, and then the link is brought down and back up again, the same FFI event will
be triggered again in about 20 seconds even if the trigger condition isn't met.

22 HPE Confidential U.11.67 Release Notes


Config - This fix makes the downgrade of the port to auto-10/100 visible in the running configuration. Note
that this may trigger the switch to ask Do you want to save current configuration? upon logout or
switch reload.

SSL
PR_0000064686 After copying the CA certificate to the switch this error message is received: Error
setting CA Signed Request Configuration - No certificate is installed.

Version 11.28
Authentication
PR_0000058441 User authentication fails if the user's RADIUS configuration includes a non-HP VSA before
any HP VSAs.
Workaround: Configure the user in RADIUS with at least one HP VSA before any non-HP VSAs.

File Transfer
PR_0000054790 Switch software cannot be updated via HTTPS.

Version 11.27
Counters
PR_0000064998 The five minute weighted average counters are incorrect.

Web Management
PR_0000060662 The Web user interface displays the word Status at top of screen even though there is no
status information provided.

Version 11.26
CLI
PR_0000062213 When a single MAC address exists in multiple VLANs on a port, the output of the command
show mac-address <port> lists that MAC address in only one VLAN on the specified port.

Version 11.25
Management
PR_0000053533 The ProCurve Manager (PCM) test communication parameters test might fail on the
second attempt.

Version 11.24
No fixes were included with version 11.24.

Version 11.23
Web Management
PR_0000060813 Using the Web interface, the close-up view of stack members might not display if the
commander is configured for SSL-only access.

Chapter 1 11.66 Release Notes HPE Confidential 23


Version 11.22
CLI
PR_0000061308 The output of the command show mac-address <port-list> lists only MAC addresses
in VLAN 1 on the specified ports.

Crash
PR_0000059002 Rarely, a switch that is configured for IP routing and also sending sFlow samples might
reboot unexpectedly with a message similar to the following:
TLB Miss: Virtual Addr=0x00000038 IP=0x800a0e44 Task='eDrvPoll'

Port Security
PR_0000061391 With port security enabled and after the first ARP request is received on a port, for every
subsequent ARP request received on that port the switch forwards two ARP requests.

Version 11.21
No fixes were included with version 11.21.

Version 11.20
CLI
PR_0000041272 CLI output from the commands show port-access web clients or show port-
access web clients detailed only displays the client information from the first port that is active (i.e.
has authenticated or unauthenticated clients). All other ports will not show any clients, even if the port has
several authenticated or unauthenticated clients.

Counters
PR_0000047425 Jumbo frames are counted as giants, even when jumbo frame support is enabled.
PR_0000057675 The counter shows Giants Rx = 0, although the switch event log includes FFI Excessive
undersized/giant packets messages.

Event Log
PR_0000049241 The switch's event log displays erroneous FFI Excessive undersized/giant packets
messages on ports operating at 10 Mbps, half duplex (10Hdx).

FFI
PR_0000058426 With jumbo frames disabled, FFI (Find, Fix, Inform) Excessive undersized/giant
packets messages are not generated for frames larger than 1518 bytes.

Port Security
PR_0000055625 With port security enabled, the switch drops the first packet it receives even if the packet
passes the security check.

Secure Copy
PR_0000045907 The switch does not close the SCP (Secure Copy) session after the file transfer is completed.

24 HPE Confidential U.11.67 Release Notes


Spanning Tree
PR_0000057003 The switch might experience Spanning Tree instability upon changing the system time via
CLI, TimeP, or SNTP, if the time change occurs while the switch is receiving high volumes of broadcast traffic
(on the order of 1 Mbps) on its Spanning Tree root port. This issue might also affect switch management
traffic, causing unresponsive SNMP, TELNET, and SSH sessions.

Switch Tables
PR_0000050024 The switch's VLAN MAC address is not removed when the VLAN is removed.

Version 11.19
Authentication
PR_0000055381 With authentication configured, the output of the command show port-access
authenticator incorrectly shows tagged VLAN information.

SNMP/Config
PR_0000039221 The switch can misinterpret the community name as if it were a trap level, in the snmp-
server host command. This fix modifies the command with keywords community and trap-level. The
new command syntax is as follows:
snmp-server host <ip addr> [community <community string>] [trap-level <none | all |
not-info | critical | debug>] [informs]

Version 11.18
802.1X
PR_0000053952 With cached reauthentication enabled, an unusual sequence of events can cause clients to
remain authenticated for a period of time that is longer than configured or expected.

Authentication
PR_0000045069 In some situations the switch authenticates an EAP 802.1X client but does not allow
communication from the client.
PR_0000046570 When both 802.1X and MAC Authentication are configured on a port, the switch uses the
MAC Authentication logoff period for both 802.1X and MAC Authentication clients.
PR_0000052226 When port authentication methods are in use on a switch, if all of the clients are
disconnected, the switch may change the Class of Service (CoS) settings. This PR_0000052226 improves the
Authentication fix in U.11.15 software (PR_0000044893).
PR_0000052746 The switch either stops responding or reboots unexpectedly after a client is authenticated
and one of the following activities occurs:

• After the client is authenticated with MAC Authentication, if the client is manually re-authenticated with
the command aaa port-access mac-based <port> reauthenticate, the switch stops responding.

• If the logoff period is set with the command aaa port-access mac-based <port> logoff period
<value>, after the logoff period is reached the switch stops responding.

• When both 802.1X and MAC Authentication are configured on a port, if the client is authenticated with
802.1X and 802.1X is subsequently disabled with the command no aaa port-access authenticator
active, the switch stops responding.

If the switch reboots, a message similar to one of the following is seen in the event log:

Chapter 1 11.66 Release Notes HPE Confidential 25


system: Software exception at buffers.c:2150 -- in 'mSnmpC
or
system: Software exception at buffers.c:2150 -- in 'mAdMgr

Config
PR_0000037570 After using the CLI to assign a port in a VLAN number higher than 32, the configuration
cannot be saved via the Menu interface.

Crash
PR_0000038008 The switch may reboot unexpectedly during Telnet access, with a message similar to the
following:
NMI event SW:IP=0x0049cba8 MSR:0x0000b032 LR:0x00489a8c
Task='tTelnetOut2' TaskID=0x3210d30
cr:0x22000080 sp:0x03210860 xer:0x20000000
PR_0000054709 The switch might reboot unexpectedly after moving a client from a port configured for one
authentication method to a port configured for a different authentication method. The switch logs a
message similar to one of the following:
NMI event SW:IP=0x802cb480 SR:0x1000fc01 Task='mWebAuth' Task ID=0x85c6e220 sp:
0x85c6deb8
or
NMI event SW:IP=0x802caeb0 SR:0x1000fc01 Task='m8021xCtrl' Task ID=0x85da5560 sp:
0x85da4fa8

GVRP
PR_0000046133 Switches do not use multiple GARP Information Propagation (GIP) contexts when the switch
has been configured for MSTP operation; the same GIP context is used for all ports participating in GVRP.
There should be multiple GIP contexts-one for each 'spanning-tree' (the IST and each of the MSTIs). This fix
improves the GVRP fix in U.11.15 (PR_0000040758).

LLDP
PR_0000051224 In some cases LLDP packets are transmitted from a switch port before the client is
authenticated.

RADIUS Accounting
PR_0000042522 The 'class' attribute is not included in the accounting-request to the RADIUS server; RFC
2865 states that this should occur.

SNMP/Config
PR_0000043775 The switch allows invalid configuration parameters to be set via SNMP.

SSH
PR_0000014531 Rarely, after some period of time with normal SSH connectivity, the switch may become
unresponsive to further SSH management.

Stacking
PR_0000052110 When a commander accesses a member switch and the user issues the show tech all
command, in some situations the session from commander to member can become unresponsive.

26 HPE Confidential U.11.67 Release Notes


Workaround: From the commander switch, kill the unresponsive session.

Unauthenticated VLAN
PR_0000045072 An unauthenticated VLAN cannot be configured for 802.1X authentication, when another
authentication method is also in use on a port. This fix also adds the unauth-period parameter for MAC
authentication.

Upgrade information
Upgrading restrictions and guidelines
U.11.67 uses BootROM R.10.06. If your switch has an older version of BootROM, the BootROM will be
updated with this version of software.

Chapter 1 11.66 Release Notes HPE Confidential 27


Chapter 2
Aruba security policy

A Security Bulletin is the first published notification of security vulnerabilities and is the only communication
vehicle for security vulnerabilities.

• Fixes for security vulnerabilities are not documented in manuals, release notes, or other forms of product
documentation.
• A Security Bulletin is released when all vulnerable products still in support life have publicly available
images that contain the fix for the security vulnerability.

The Aruba security policy can be found at https://www.arubanetworks.com/en-au/support-services/


sirt/. Security bulletins can be found at https://www.arubanetworks.com/en-au/support-services/
security-bulletins/.

Security Bulletin subscription service


You can sign up at https://sirt.arubanetworks.com/mailman/listinfo/security-
alerts_sirt.arubanetworks.com to initiate a subscription to receive future Aruba Security Bulletin alerts via
email.

28 HPE Confidential U.11.67 Release Notes


Chapter 3
Websites

Networking Websites
Aruba Support Portal
asp.arubanetworks.com
Aruba Software and Documentation
asp.arubanetworks.com/downloads
Aruba Security Advisories
www.arubanetworks.com/support-services/security-bulletins
Hewlett Packard Enterprise Networking Software
www.hpe.com/networking/software
Hewlett Packard Enterprise Networking website
www.hpe.com/info/networking
Hewlett Packard Enterprise My Networking website
www.hpe.com/networking/support
Hewlett Packard Enterprise My Networking Portal
www.hpe.com/networking/mynetworking
Hewlett Packard Enterprise Networking Warranty
www.hpe.com/networking/warranty

General websites
Hewlett Packard Enterprise Information Library
www.hpe.com/info/EIL

Chapter 3 Websites HPE Confidential 29


Chapter 4
Support and other resources

Accessing Hewlett Packard Enterprise Support


• For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
https://www.hpe.com/info/assistance
• To access documentation and support services, go to the Hewlett Packard Enterprise Support Center
website:
https://www.hpe.com/support/hpesc

Information to collect
• Technical support registration number (if applicable)
• Product name, model or version, and serial number
• Operating system name and version
• Firmware version
• Error messages
• Product-specific reports and logs
• Add-on products or components
• Third-party products or components

Accessing updates
• Some software products provide a mechanism for accessing software updates through the product
interface. Review your product documentation to identify the recommended software update method.
• To download product updates:
Hewlett Packard Enterprise Support Center
https://www.hpe.com/support/hpesc
Hewlett Packard Enterprise Support Center: Software downloads
https://www.hpe.com/support/downloads
My HPE Software Center
https://www.hpe.com/software/hpesoftwarecenter
• To subscribe to eNewsletters and alerts:
https://www.hpe.com/support/e-updates
• To view and update your entitlements, and to link your contracts and warranties with your profile, go to
the Hewlett Packard Enterprise Support Center More Information on Access to Support Materials
page:

30 HPE Confidential U.11.67 Release Notes


https://www.hpe.com/support/AccessToSupportMaterials

IMPORTANT: Access to some updates might require product entitlement when accessed
through the Hewlett Packard Enterprise Support Center. You must have an HPE Passport set up
with relevant entitlements.

Remote support
Remote support is available with supported devices as part of your warranty or contractual support
agreement. It provides intelligent event diagnosis, and automatic, secure submission of hardware event
notifications to Hewlett Packard Enterprise, which will initiate a fast and accurate resolution based on your
product's service level. Hewlett Packard Enterprise strongly recommends that you register your device for
remote support.
If your product includes additional remote support details, use search to locate that information.

Remote support and Proactive Care information


HPE Get Connected
https://www.hpe.com/services/getconnected
HPE Proactive Care services
https://www.hpe.com/services/proactivecare
HPE Datacenter Care services
https://www.hpe.com/services/datacentercare
HPE Proactive Care service: Supported products list
https://www.hpe.com/services/proactivecaresupportedproducts
HPE Proactive Care advanced service: Supported products list
https://www.hpe.com/services/proactivecareadvancedsupportedproducts

Proactive Care customer information


Proactive Care central
https://www.hpe.com/services/proactivecarecentral
Proactive Care service activation
https://www.hpe.com/services/proactivecarecentralgetstarted

Warranty information
To view the warranty information for your product, see the links provided below:
HPE ProLiant and IA-32 Servers and Options
https://www.hpe.com/support/ProLiantServers-Warranties
HPE Enterprise and Cloudline Servers
https://www.hpe.com/support/EnterpriseServers-Warranties
HPE Storage Products
https://www.hpe.com/support/Storage-Warranties
HPE Networking Products
https://www.hpe.com/support/Networking-Warranties

Chapter 4 Support and other resources HPE Confidential 31


Regulatory information
To view the regulatory information for your product, view the Safety and Compliance Information for Server,
Storage, Power, Networking, and Rack Products, available at the Hewlett Packard Enterprise Support Center:
https://www.hpe.com/support/Safety-Compliance-EnterpriseProducts

Additional regulatory information


Hewlett Packard Enterprise is committed to providing our customers with information about the chemical
substances in our products as needed to comply with legal requirements such as REACH (Regulation EC No
1907/2006 of the European Parliament and the Council). A chemical information report for this product can
be found at:
https://www.hpe.com/info/reach
For Hewlett Packard Enterprise product environmental and safety information and compliance data,
including RoHS and REACH, see:
https://www.hpe.com/info/ecodata
For Hewlett Packard Enterprise environmental information, including company programs, product recycling,
and energy efficiency, see:
https://www.hpe.com/info/environment

Documentation feedback
Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us
improve the documentation, send any errors, suggestions, or comments to Documentation Feedback
(docsfeedback@hpe.com). When submitting your feedback, include the document title, part number,
edition, and publication date located on the front cover of the document. For online help content, include
the product name, product version, help edition, and publication date located on the legal notices page.

32 HPE Confidential U.11.67 Release Notes

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy