Omniswitch Aos Release 810r1 Release Notes Rev A en
Omniswitch Aos Release 810r1 Release Notes Rev A en
Omniswitch Aos Release 810r1 Release Notes Rev A en
A
OmniSwitch 6360, 6465, 6560(E),
6570M, 6860(E), 6860N, 6865, 6900-
V72/C32/
C32E/X48C6/T48C6/X48C4E/V48C8/
T24C2/X24C2, 9900
Release 8.10R1
These release notes accompany release 8.10R1. These release notes provide important information on
individual software features and hardware modules. Since much of the information in these release notes is not
included in the hardware and software user manuals, it is important that you read all sections of this document
before installing new hardware or loading new software.
Note: The OS6900-T20/T40/X20/X40/X72/Q32 models are no longer being supported starting with AOS Release
8.10R1. AOS Release 8.9R4 is that last release with support for these models.
Contents
Contents ........................................................................................................................... 2
[IMPORTANT] *MUST READ*: AOS Release 8.10R1 Prerequisites and Deployment Information ................ 10
Technical Support............................................................................................................... 30
Appendix C: SPB L3 VPN-Lite Service-based (Inline Routing) / External Loopback Support / BVLAN
Guidelines ........................................................................................................................ 42
Related Documentation
These release notes should be used in conjunction with OmniSwitch AOS Release 8 User Guides. The following
are the titles of the user guides that apply to this release.
System Specifications
Memory Specifications
The following are the standard shipped memory configurations. Configuration files and the compressed
software images—including web management software (WebView) images—are stored in the flash memory.
Switches not running the minimum version required should upgrade to the latest U-Boot or FPGA that is
available with this AOS release software available from Service & Support.
Please refer to the Upgrade Instructions section at the end of these Release Notes for step-by-step instructions
on upgrading your switch.
8.8.33.R014
8.9.85.R025
OS6465-P12 8.8.33.R01 8.8.33.R01 0.5 0.5
(ENH-240) 8.9.85.R025
1. FPGA version 0.7 is optional to address issue CRAOS8X-12042.
2. U-boot 8.7.2.R02 is optional to address UBIFS error issues CRAOS8X-4813/13440.
3. Optional U-boot update for CRAOS8X-24464, ability to disable/authenticate U-boot access.
4. Optional U-boot update to support boot from USB feature.
5. Highly recommended to address the NAND flash corruption issue CRAOS8X-35470.
1. FPGA versions .7 and .10 are optional on the PoE models for the fast and perpetual PoE feature support.
2. Optional U-boot update for CRAOS8X-24464, ability to disable/authenticate U-boot access.
Note: Existing OS9900 NIs used in the OS9907 chassis that are to be used in the OS9912 chassis must first have the
Uboot and FPGA upgraded before inserting them into the OS9912 chassis. See footnote #2.
[IMPORTANT] *MUST READ*: AOS Release 8.10R1 Prerequisites and Deployment Information
General Information
• Early availability features are available in AOS and can be configured. However, they have not gone
through the complete AOS validation cycle and are therefore not officially supported.
• Please refer to the Feature Matrix in Appendix A for detailed information on supported features for
each platform.
Page 10 of 73 OmniSwitch AOS Release 8.10R1 - Rev. A
July 2024
• Prior to upgrading please refer to Appendix D for important best practices, prerequisites, and step-by-
step instructions.
• Some switches that ship from the factory will default to VC mode (requiring a vcboot.cfg configuration
file) and attempt to run the automatic VC, automatic remote configuration, and automatic fabric
protocols. Please note that since the switches default to VC mode, automatic remote configuration
does not support the downloading of a ‘boot.cfg’ file, only the ‘vcboot.cfg’ file is supported.
• Some switches may ship from the factory with a diag.img file. This file is for internal switch diagnostic
purposes only and can be safely removed.
Note: None of the ports on the OS6865 or OS6465 models default to auto-vfl so automatic VC will not run by
default on newly shipped switches. However, automatic remote configuration and automatic fabric will run by
default. The OS9900 does not support automatic VC mode, only static VC mode is supported.
• Switches that ship from the factory will have the Running Configuration set to the /flash/working
directory upon the first boot up. By default, the automatic VC feature will run and the vcboot.cfg and
vcsetup.cfg files will be created in the /flash/working directory but not in the /flash/certified
directory which results in the Running Configuration not being certified. This will result in the Running
Configuration being set to the /flash/certified directory on the next reboot. Additionally, on the next
reboot the switch will no longer be in the factory default mode and will have a chassis-id of 1 which
could cause a duplicate chassis-id issue if the switch is part of a VC. To set the switch back to the
factory defaults on the next reboot perform the following:
-> rm /flash/working/vcboot.cfg
-> rm /flash/working/vcsetup.cfg
-> rm /flash/certified/vcboot.cfg
-> rm /flash/certified/vcsetup.cfg
• The OS6560-P48Z16 (903954-90) supports link aggregation only on the 1G/2.5G multigig and 10G ports
(33-52). The 1G ports (ports 1-32) do not support link aggregation (CRAOSX-1766). Linkagg
configuration on unsupported ports in 85R1/841R03 config file will be removed internally from software
during upgrade reboot. Oversized frames will not be dropped on ingress of ports 1-32 (CRAOS8X-20939).
Note: OS6560-P48Z16 (all other PNs) - This is a new version of the OS6560-P48Z16 which does not have
the limitations mentioned above. The model number (OS6560-P48Z16) remains the same for both
versions, only the part number can be used to differentiate between the versions.
Exceptions:
• Copper ports or ports with copper transceivers do not support faster convergence.
• OS6865-P16X and OS6865-U12X ports 3 and 4 do not support faster convergence.
• VFL ports do not support faster convergence.
• Splitter ports (i.e. 4X10G or 4X25G) do not support faster convergence.
• OS6570M-12/12D ports 9 and 10 do not support fast convergence.
• SHA-1 Algorithm - Chosen-prefix attacks against the SHA-1 algorithm are becoming easier for an
attacker1. For this reason, we have disabled the "ssh-rsa" public key signature algorithm by default. The
better alternatives include:
• The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These algorithms have the
advantage of using the same key type as "ssh-rsa" but use the safer SHA-2 hash algorithms.
RSA SHA-2 is enabled in AOS.
• The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These algorithms are
supported in AOS by default.
To check whether a server is using the weak ssh-rsa public key algorithm, for host authentication, try
to connect to it after disabling the ssh-rsa algorithm from ssh(1)'s allowed list using the command
below:
-> ssh strong-hmacs enable
If the host key verification fails and no other supported host key types are available, the server
software on that host should be upgraded.
1. "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of
Trust" Leurent, G and Peyrin, T (2020) https://eprint.iacr.org/2020/014.pdf
• With the continuous goal of preserving the environment in addition to the AOS software being
preloaded on the switch and available on the Business Portal, we have begun removing the software
access card previously included in the switch ship kit. For additional information or if in need of special
assistance, please contact Service & Support.
Licensed Features
The table below lists the CAPEX licensed features in this release and whether or not a license is required for
the various models. Refer to the licensing portal.
ALE secure diversified code employs multiple techniques to identify vulnerabilities such as software
architecture reviews, source code analysis (using both manual techniques and automated tools), vulnerability
scanning tools and techniques, as well as analysis of known vulnerabilities in third party code.
Software Diversification
Software diversification rearranges the memory map of the executable program so that various instances of the
same software, while functionally identical, are arranged differently in memory. In AOS 8.6.R01, ALE has
adopted address system layout randomization(ASLR) as a standard feature. ASLR results in a unique memory
layout of the running software each time the OmniSwitch reboots to impede or prevent software exploitation.
ASLR is depicted below showing that two different system boots results in two different memory layouts for
code segments, data segments, dynamic libraries, etc.
Boot 1
Boot 2
OS6560E-P48Z16
Summary Table
Management Features
Hybrid Interface Auto Detect 6465T, 6570M-U28
OVNA - Loop Detection Preventative Maintenance 6360, 6465, 6560, 6570M, 9900
Password-protected ONIE access 6860N, 6900
Signed AOS Image 6360, 6465, 6560, 6570M, 6860, 6860N, 6865,
6900, 9900
Prompt-On-Deletion Enhancement 6360, 6465, 6560, 6570M, 6860, 6860N, 6865,
6900, 9900
Service Features
IPv4 Source Filtering Over SPB/VxLAN/VPLS Services 6860N, 6900
VxLAN Ethernet VPN (EVPN) 6900-X48C6/T48C6/X48C4E/
V48C8/ C32E/T24C2/X24C2
LACP Frames Over SPB L2-Services 6860, 6860N, 6865, 6900, 9900
Define Modulo Used by Switch to Calculate BVLAN 6860, 6860N, 6865, 6900, 9900
SPB Fabric Hashing Mechanism Enhancement 6860N, 6900
QoS/Security Features
Bi-directional IPv6 ACL 6560, 9900
ACL Destination Port Group on IGMP Snooping 6360, 6465, 6560, 6570M, 9900
Policy VLAN Group Condition for QoS 6360, 6465, 6560, 6570M, 6860N,
6900-V72/C32, 9900
AP Mode for Third-party APs All
Licensed Features
Multicast Routing Support on OS6560 6560
Management Features
Hybrid Interface Auto Detect
The OmniSwitch can now auto detect the SFP or RJ-45 cable on the hybrid port and bring up the interface
based on what is connected. To implement this a new configurable hybrid-mode auto is introduced to auto
detect the connected device on the hybrid port.
In auto mode the OmniSwitch will scan for signals on both the copper and fiber media. If a link is detected on
the fiber media, the OmniSwitch will enable the fiber mode, or if a link is detected on RJ-45 port the
OmniSwitch will enable the copper mode.
If both cables are connected simultaneously, fiber mode is enabled as the preferred mode.
To indicate the potential loop in the network a loop detection threshold counter is introduced in the swlog.
When the threshold is breached, it indicates a potential loop in the network. There will be continuous MAC
movements in the event of a network loop which will be counted by a loop detection counter. When this
counter exceeds the maximum threshold a log will be added in the swlog indicating the potential loop in the
network. The maximum threshold is configurable.
• When the authentication option is enabled ONIE access is allowed only after authenticating with a
password.
• When the authentication option is disabled ONIE access is allowed without a password.
• If ONIE authentication is disabled after being enabled, any existing password is reset.
• In the case of a VC, the ONIE authentication will be synchronized to all existing units of the VC. The
authentication will not be synchronized to any new unit joining the VC. The configuration needs to be
set before adding a new unit to the VC.
• During disaster recovery the correct password must be entered to recover the switch if ONIE
authentication is enabled. If the password is forgotten there is no other mechanism to perform disaster
recovery and the switch needs to undergo RMA.
This feature enhancement provides the ability for an OmniSwitch to determine if the AOS software comes from
a trusted source and to detect if it has been tampered with after signing. Using RSA-4096 and SHA-256, AOS
images are signed with a private key allowing AOS to verify the signature with a corresponding public key
during reload and flash synchronization.
• The signature will be stored as part of the AOS image file, there are no U-boot or ONIE dependencies
for this feature.
• Starting in 8.10R1, the required code signing certificate containing the public key and the associated
CA bundle will automatically be setup on the switch for signature verification.
Prompt-On-Deletion Enhancement
This enhancement provides the prompt-on-deletion parameter to prevent accidental deletion of a single VLAN
or range of VLANs with member ports attached. When enabled, the user will be prompted to confirm the
deletion of a VLAN with member ports attached.
Service Features
ISF can be enabled across the four services supported in AOS. Service level source filtering and port level
source filtering are mutually exclusive. ISF on a service is not supported on Dynamic Service IDs.
The OmniSwitch Ethernet Virtual Private Network (EVPN) feature is implemented as described in RFC 7432. AOS
EVPN adapts the latest specification of the RFC (draft-ietf-bess-rfc7432bis-07). The EVPN protocol is based on
the MP-BGP and provides several improvements to the existing AOS overlay services.
The EVPN based services provide multihoming capability for the access host devices along with the L2 and L3
mobility for the connected hosts. The multihoming of the hosts will provide better network utilization due to
the multi-path routes and provide network redundancy for the hosts. The EVPN based networks also reduces
the amount of broadcast traffic in the overlay network. This is achieved by managing the L2 and L3 host FDB
entries in the control plane.
The BGP EVPN protocol is supported by using the BGP route types (Type 1 to 4, and Type 6 to 8) to orchestrate
the EVPN functionality. Each route type has a specific function in the operation of an overlay EVPN network.
Additionally, EVPN will also support the default gateway functionality using the BGP default gateway extended
community as defined in RFC 7432.
In AOS, the EVPN protocol is based on MP-BGP and provides several improvements to the existing AOS overlay
services. In this release, EVPN is supported only on VxLAN services.
The OmniSwitch supports VxLAN based EVPN. The EVPN works on the control plane and the VxLAN works on the
data plane. This enhances the layer 2 and layer 3 efficiency and scalability. It allows to scale the network by
extending the Layer 2 connectivity across different locations by a network overlay in an existing physical
network.
• service bgp-evpn
• service igmp-mld-proxy
• service proxy-arp
• service bgp-evpn mac-mobility
• show service evpn ethernet-segment
• show service evpn evi
• service vxlan
• show service debug-info
• show service
• show service proxy-arp config
• service access
BGP commands
IP commands
• show ip evpn proxy-arp
• ip anycast-gateway-mac auto
• ip interface anycast-gateway-address
• debug ip proxy-arp aging-time
• arp
• ip interface
• show ip interface
• show ip config
• clear arp-evpn-proxy-cache
Supports tunnelling of 802.3ad Link Aggregation Control Protocol frames over an SPB network.
• service l2profile
• show service l2profile
BVLAN modulo number is used to dynamically calculate an SPB BVLAN value for a System Default profile. As
part of this enhancement, a new CLI is added to configure the BVLAN modulo value to dynamically calculate an
SPB BVLAN value for a System Default profile. This configured value will be used to derive BVLAN for auto
service creation for UNP user learning. The default value of bvlan-mod is set to 8.
Currently, the hashing process relies on MAC addresses of ingress/egress BEB and ISID. However, certain traffic
patterns result in inconsistent BEB nodes and ISID, leading to uneven traffic distribution or the saturation of a
link when the BEB nodes and ISIDs are the same. To address the hashing issue source/destination IPs and ports
within SPB packets will be incorporated into the hashing algorithm. A new command is provided to configure
the new mode to enable or disable source/destination IP addresses and ports in the SPB MAC-in-MAC payload.
QoS/Security Features
Bi-directional IPv6 ACL
The OmniSwitch is enhanced to support configuration of bi-directional IPv6 ACL. The bi-directional IPv6 can be
configured using the CLI, capability profile tcam mode source-dest-ipv6. The existing capability profile tcam
mode command is modified to accommodate both the source and destination IPv6 in the ACL. When the new
capability profile source-dest-ipv6 is selected, the write memory must be performed and the switch must be
reloaded. The show capability profile command is modified to display the configured/active TCAM mode
settings.The following CLI commands are associated with this feature.
The OmniSwitch now supports policy condition destination port or port group along with multicast IPv4
addresses on OS6360, OS6465, OS6560, OS6570, and OS9900 platforms.
This enhancement allows for the configuration of a VLAN group and its associated VLAN ID numbers. A VLAN
group may be attached to a policy condition. The action associated with that policy will be applied to all
members of the VLAN group.
The OmniSwitch allows support for both Stellar and third-party APs. The AP mode feature for third-party APs
can be configured with the option “all”. The existing CLI unp ap-mode is modified to configure the support for
third-party APs.
Licensed Features
Multicast Routing Support on the OmniSwitch 6560
Adds support for PIMv4 and PIMv6 to the OS6560 with the Advanced Routing license.
CR Description Workaround
CRAOS8X-23137 When high number of vlans are mapped to DHL links, There is no known
during failover some traffic loss may be seen. workaround at this time.
CRAOS8X-41054 On an OS9912, when upgrading coreboot on both Upgrade one CMM at a time.
CMMs at the same time and reloading from working,
CMM-B becomes primary instead of CMM-A as
expected.
CRAOS8X-44303 With na AOS system name of more than 32 Decrease AOS system name
characters, BYOD functionality will not work with OV to 32 characters or less.
since system name is one of the attributes in
COA/DM messages and NAS-ID in OV can’t be set
beyond 32 characters.
Hardware / Transceivers
CRAOS8X-41609 On 6860N 25G ports with a 4x10G transceiver, on Admin enable the port when
intermittent admin disables one or more ports will peer is disabled or
continue to display up. disconnect/remove the
transceiver.
CRAOS8X-41611 On an OS99-CNI-U8 with 4x25G DAC link sometimes Use the QSFP-100G-SR4
does not come up for certain lanes. fiber transceiver with 4X25G
capability.
CRAOS8X-43486 On some platforms (OS6860N 25G ports, OS6900 10G If 1G speed is required, use
and 25G ports, OS6560-P48X4 ports 53/54 and 1G transceivers.
OS6360 uplink ports), the SFP-10G-GIG-LR/SR only
links up at 10G and is unstable at 1G speed.
CRAOS8X-44378 A fake link with SFP-DUAL-BX-D/U on the 25G ports There is no known
may sometimes be seen. workaround at this time.
CRAOS8X-46185 Fiber ports with SFP-GIG-T connected to peer at 10M On OS6570M-U28 a hot-swap
speed is operational as expected. However, when of the SFP-GIG-T recovers
the peer link changes from 10M to 100M or 1G speed, the port. On OS6570M-
user may (intermittently) see link down with peer 12/12D a switch reload may
side link up. be required to recover port.
CRAOS8X-46195 VFL links using 4X25G splitters require additional The preferred method is
configuration to prevent CRC errors being seen on configuring inter-frame-gap
the link. to 13 on both sides of the
link.
An alternate method is
configuring FEC to FC and
auto-negotiation disable on
both sides of the link.
Note: Configuring FEC and
disabling auto-negotiation
will cause link to reset.
Layer 2
CRAOS8X-26502 While converging due to a link/node failure in a MRP Clients will be relearned
ring network, sometimes a very few multicast IGMP after the next query
clients are not relearned when there are more than interval.
200 multicast streams.
Layer 3
CRAOS8X-11084 Packet drop seen in BFD config when VRRP VLAN There is no known
interface is toggled. workaround at this time.
CRAOS8X-33472 When BGP peering sessions operate over an IPv6 TCP There is no known
connection between two OS9900s it has been workaround at this time.
observed that there could be intermittent flapping
of BGP session due to loss of TCP synchronization
between the BGP routers. An error log may be
observed as follows:
QoS/Security
CRAOS8X-40989 On an OS99-XNI-P24Z8 the dynamic MACsec port Toggle the MACsec admin
status is down after a reload.The issue is only state on the port.
specific to the first 8 ports.
Services
CRAOS8X-33705 Double tagged packets with size less than 64 bytes There is no known
received as encapsulated inside a tunneled packet workaround at this time.
(eg: SPB encapsulated), may get dropped on the
network port of an OS6900.
CRAOS8X-38026 On an OS9912 some traffic drop seen when sending There is no known
traffic on two different ISIDs after disabling trust tag workaround at this time.
on UNP port.
CRAOS8X-41204 When sending traffic for a maximum number of 1K The traffic will recover in
VPLS Services, some traffic may be dropped when approximately 15 to 25
interfaces such as LER/LSR, IP, or OSPF are toggled. seconds after link recovery.
CRAOS8X-41214 When sending traffic on a VPLS, the MACs are not Resend the traffic after the
being learned on SAP access and network ports after toggle. Issue will not be
OSPF interface toggle. The traffic is successfully seen with continuous
received on the egress of the and access ports. Issue traffic.
is only seen when 1K MAC addresses are sent.
Virtual Chassis
Other
• When connecting or disconnecting a power supply to or from a chassis, the power supply must first be
disconnected from the power source.
• All NI module extractions must have a 30 second interval before initiating another hot-swap activity.
CMM module extractions should have between a 15 and 20 minute interval.
• All new module insertions must have a 5 minute interval AND the LEDs (OK, PRI, VC, NI) have returned
to their normal operating state.
Empty
OS68-XNI-U4 OS68-XNI-U4
OS68-VNI-U4 OS68-VNI-U4
OS68-QNI-U2 OS68-QNI-U2
OS68-CNI-U1 OS68-CNI-U1
OS99-CMM OS99-CMM
OS99-CMM2 OS99-CMM2
OS9907-CFM OS9907-CFM
OS99-GNI-48 OS99-GNI-48
OS99-GNI-P48 OS99-GNI-P48
OS99-XNI-48 OS99-XNI-48
OS99-XNI-U48 OS99-XNI-U48
OS99-XNI-P48Z16 OS99-XNI-P48Z16
OS99-CNI-U8 OS99-CNI-U8
OS99-GNI-U48 OS99-GNI-U48
OS99-XNI-U24 OS99-XNI-U24
OS99-XNI-P24Z8 OS99-XNI-P24Z8
OS99-XNI-U12Q OS99-XNI-U12Q
OS99-XNI-UP24Q2 OS99-XNI-UP24Q2
OS99-CNI-U20 OS99-CNI-U20
Hot-Swap Procedure
The following steps must be followed when hot-swapping modules.
• Hot-swapping an element of a VC is only supported when replaced with the same model element (i.e.
an OS6900-V72 must be replaced with an OS6900-V72).
4. Reload chassis.
5. Start lanpower.
Technical Support
ALE technical support is committed to resolving our customer’s technical issues in a timely manner. Customers
with inquiries should contact us at:
Spain Spanish
Your questions answered in English, French, German or English +1 650 385 2193
Spanish. French +1 650 385 2196
German +1 650 385 2197
Spanish +1 650 385 2198
Fax: +33(0)3 69 20 85 85
Email: ale.welcomecenter@al-enterprise.com
Web : myportal.al-enterprise.com
Internet: Customers with service agreements may open cases 24 hours a day via the support web page. Upon
opening a case, customers will receive a case number and may review, update, or escalate support cases on-
line. Please specify the severity level of the issue per the definitions below. For fastest resolution, please have
hardware configuration, module types and version by slot, software version, and configuration file available for
each switch.
Severity 1 - Production network is down resulting in critical impact on business—no workaround available.
Legal Notices applicable to any software distributed alone or in connection with the product to which this
document pertains, are contained in files within the software itself located at: /flash/foss.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE. To view other
trademarks used by affiliated companies of ALE Holding, visit: www.al-enterprise.com/en/legal/trademarks-
copyright. All other trademarks are the property of their respective owners. The information presented is
subject to change without notice. Neither ALE Holding nor any of its affiliates assumes any responsibility for
inaccuracies contained herein. © Copyright 2024 ALE International, ALE USA Inc. All rights reserved in all
countries.
Note: Early availability features are available in AOS and can be configured. However, they have not gone through the complete AOS validation cycle
and are therefore not officially supported.
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
Management Features
AOS Micro Services (AMS) 8.7R2 8.6R1 8.6R1 8.9R2 8.6R1 8.7R1 8.6R1 8.6R1 8.7R1 8.6R1
Automatic Remote Configuration 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
Download (RCL)
Automatic/Intelligent Fabric 8.7R2 8.5R1 Y 8.9R2 Y 8.7R2 Y Y Y Y
Automatic VC 8.7R2 N Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 N
Bluetooth - USB Adapter with Bluetooth 8.7R2 8.6R2 8.6R2 8.9R2 Y 8.7R1 8.6R2 8.6R2 N N
Technology
Console Disable 8.7R2 8.6R2 8.6R2 8.9R2 8.6R2 8.7R1 8.6R2 8.6R2 8.7R1 8.6R2
Dying Gasp 8.9R3 Y Y 8.9R3 Y 8.7R1 Y N N N
Dying Gasp (EFM OAM / Link OAM) N 8.6R1 8.6R1 8.9R3 8.6R1 8.7R1 8.6R1 N N N
EEE support Y 8.9R1 8.9R1 8.9R2 Y 8.7R1 Y Y Y Y
Embedded Python Scripting / Event 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.7R2 8.7R2 Y
Manager
IP Managed Services N N N N Y 8.7R1 Y 8.5R2 8.7R1 Y
Hitless Security Patch Upgrade 8.7R2 8.7R1 8.7R1 8.9R2 8.7R1 8.7R1 8.7R1 8.7R1 8.7R1 8.7R1
In-Band Management over SPB N N N N 8.5R4 8.7R1 8.5R4 8.5R4 8.7R1 8.5R4
ISSU 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
NaaS 8.8R1 8.8R1 8.8R1 8.9R2 8.8R1 8.8R1 8.8R1 8.8R1 8.8R1 8.8R1
NAPALM Support 8.7R2 8.5R1 8.5R1 8.9R2 8.5R1 8.7R1 8.5R1 8.7R2 8.7R2 N
NTP - Version 4.2.8.p11 8.7R2 8.5R4 8.5R4 8.9R2 8.5R4 8.7R1 8.5R4 8.5R4 8.7R1 8.5R4
NTP - IPv6 8.7R3 8.7R3 8.7R3 8.9R2 8.7R3 8.7R3 8.7R3 8.7R3 8.7R3 8.7R3
OpenFlow N N N N Y N N N N N
OV Cirrus – Zero touch provisioning 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.7R2 8.7R2 N
OV Cirrus – Configurable NAS Address 8.7R2 8.5R4 8.5R4 8.9R2 8.5R4 8.7R1 8.5R4 8.5R4 8.7R1 8.5R4
OV Cirrus – Default Admin Password 8.7R2 8.5R4 8.5R4 8.9R2 8.5R4 8.7R1 8.5R4 8.5R4 8.7R1 8.5R4
Change
Page 32 of 73 OmniSwitch AOS Release 8.10R1 - Rev. A
July 2024
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
OV Cirrus – Managed 8.7R2 8.5R4 8.5R4 8.9R2 8.5R4 8.7R1 8.5R4 8.5R4 8.7R1 8.5R4
OVSDB N N N N N N N 8.7R1 N N
Package Manager 8.7R2 8.6R2 8.6R2 8.9R2 8.6R2 8.7R1 8.6R2 8.6R2 8.7R1 8.6R2
Readable Event Log 8.7R2 8.6R1 8.6R1 8.9R2 8.6R1 8.7R1 8.6R1 8.6R1 8.7R1 8.6R1
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
BGP-EVPN N N N N N N N N 8.10R1 N
DHCP Snooping / IP Source Filtering 8.7R2 8.5R4 Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
IPv6 - DHCPv6 Snooping 8.7R2 8.6R1 8.6R1 8.9R2 8.5R3 8.7R1 8.5R4 8.6R2 8.7R1 8.7R1
IPv6 - Source filtering 8.7R2 N 8.6R1 8.9R2 8.5R3 8.7R1 8.5R4 8.6R2 8.7R1 8.7R1
IPv6 - DHCP Guard EA EA EA 8.9R2 EA N EA N N N
IPv6 - DHCP Client Guard EA EA EA 8.9R2 EA N EA N N N
IPv6 - RA Guard (RA filter) Y Y 8.5R2 8.9R2 Y 8.7R1 Y Y Y Y
IPSec N N N N Y 8.7R1 Y Y Y N
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
RIPng N 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
UDP Relay (IPv4) 8.7R2 8.5R4 8.5R4 8.9R2 Y 8.7R1 Y 8.5R4 8.7R1 8.5R4
UDP Relay (IPv6) 8.7R2 8.6R1 8.6R1 8.9R2 8.6R1 8.7R1 8.6R 8.6R1 8.7R1 8.6R1
Multicast Features
DVMRP N N N N Y 8.7R1 Y 8.5R2 8.7R1 N
Monitoring/Troubleshooting Features
Ping and traceroute 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
Port monitoring 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Port mirroring - remote 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.7R2 8.7R2 8.6R1
Port mirroring – remote over linkagg N N 8.9R3 N Y 8.7R1 Y 8.7R2 8.7R2 8.6R1
Link Aggregation (static and LACP) 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Loopback detection – Edge (Bridge) 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
MAC Forced Forwarding / Dynamic Proxy 8.7R2 8.7R1 N 8.9R2 8.6R1 N 8.6R1 N N N
ARP
MPLS N N N N N 8.9R3 N N N N
MRP N 8.7R2 N N N N 8.7R2 N N N
Port mapping 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 N
Private VLANs (PVLAN) N N N N Y 8.7R2 Y N 8.7R2 N
SIP Snooping N N N N Y N N N N N
Spanning Tree (1X1, RSTP, MSTP) 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Spanning Tree (PVST+, Loop Guard) N Y Y 8.9R2 Y Y Y Y Y Y
MVRP 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R4 8.7R1 Y
2
SPB N N N N Y 8.7R1 Y 8.5R2 8.7R1 Y
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
SPB - Over Shared Ethernet N N N N 8.7R1 8.7R1 8.7R1 8.7R1 8.7R1 8.7R1
SPB – HW-based LSP flooding N N N N 8.6R1 N 8.6R1 N N 8.5R4
QoS Feature Support
802.1p / DSCP priority mapping 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Auto-Qos prioritization of NMS/IP Phone 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
Traffic
Auto-Qos – New MAC range 8.7R2 8.5R2 8.5R2 8.9R2 8.5R2 8.7R1 8.5R2 8.5R2 8.7R1 8.5R2
Groups – VLAN 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1 8.10R1
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
Custom QSP Profiles 8.7R2 Y Y 8.9R2 Y Y Y Y Y Y
GOOSE Messaging Prioritization N 8.7R1 N N N N 8.7R1 N N N
Metro Ethernet Features
Application Fingerprinting N N N N N N N N N N
Application Monitoring and Enforcement N N N N Y 8.7R2 N N N N
(Appmon)
ARP Poisoning Protection 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R2 8.7R1 Y
BYOD - COA Extension support for 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
RADIUS
BYOD - mDNS Snooping/Relay 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
BYOD - UPNP/DLNA Relay 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
BYOD - Switch Port location information 8.7R2 Y Y 8.9R2 Y 8.7R1 Y 8.6R2 8.7R1 Y
pass-through in RADIUS requests
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
IoT Device Profiling (IPv6) 8.7R2 8.7R1 8.7R1 8.9R2 8.7R15 8.9R3 8.7R15 8.9R3 8.9R3 8.7R1
Directed Broadcasts – Control 8.7R2 8.5R2 8.5R2 8.9R2 8.5R2 8.7R1 8.5R2 8.7R1 8.7R1 Y
Learned Port Security (LPS) 8.7R2 8.5R1 Y 8.9R2 Y 8.7R1 Y 8.5R4 8.7R1 Y
TACACS+ - IPv6 8.7R3 8.7R3 8.7R3 8.9R2 8.7R3 8.7R3 8.7R3 8.7R3 8.7R3 8.7R3
PoE Features
802.3af and 802.3at 8.7R2 8.5R1 Y N Y 8.7R1 Y N N Y
802.3bt 8.7R2 Y 8.6R2 N N 8.7R1 N N N N
Auto Negotiation of PoE Class-power 8.7R2 8.5R1 Y N Y 8.7R1 Y N N Y
upper limit
Display of detected power class 8.7R2 8.5R1 Y N Y 8.7R1 Y N N Y
LLDP/802.3at power management TLV 8.7R2 8.5R1 Y N Y 8.7R1 Y N N Y
Feature 6360 6465 6560 OS6570M 6860(E) 6860N 6865 6900- 6900- 9900
V72/ X48C6/
C32 T48C6/X48C4E/V48C8/C32E
T24C2/X24C2
HPOE support 8.7R2 8.5R1 Y (95W) N Y 8.7R1 Y (75W) N N Y (75W)
(95W) (60W) (60W) (95W)
MACsec Support
(MACsec site license required)
OmniSwitch 9900
OS99-CMM 4X10G mode only - Static and Dynamic (128-bit) modes
OS99-CMM2 Not Supported
OS99-GNI-48/P48 10M/100M/1G ports - Static and Dynamic (128-bit) modes
OS99-XNI-48/P48 10G ports - Static and Dynamic (128-bit) modes
OS99-XNI-U48 10G ports - Static and Dynamic (128-bit) modes
OS99-XNI-P48Z16 1G/2.5G/5G/10G (16x) - Static and Dynamic (128-bit) modes
1G/10G (32x) - Static and Dynamic (128-bit) modes
OS99-GNI-U48 1G ports - Static and Dynamic (128-bit) modes
OS99-XNI-U24 10G ports - Static and Dynamic (128-bit) modes
OS99-XNI-P24Z8 1G/2.5G/5G/10G (8x) - Static and Dynamic (128-bit) modes
1G/10G (16x) - Static and Dynamic (128-bit) modes
OS99-XNI-U12Q 10G / 4x10G Uplink - Static and Dynamic (128-bit) modes
OS99-XNI-UP24Q2 10G(Fiber)/4x10G Uplink - Static and Dynamic (128-bit) modes
10G (Copper) - Static and Dynamic (128-bit) modes
OS99-CNI-U8 Not Supported
OS99-CNI-U20 40G/100G - Static and Dynamic (128-bit) modes
OmniSwitch 6900
OS6900-X48C4E Dynamic mode only on all ports. Supports 256-bit key length.
OmniSwitch 6860(E)
OS6860(E) All models support MACsec on 10G ports.
OS6860E-P24 1G/10G ports.
OS6860E-P24Z8 1G/10G ports (not supported on 2.5G ports).
OmniSwitch 6860N Dynamic mode only. All OS6860N models support 256-bit key length.
OS6860N-U28 SFP (1-24), SFP+ (25-28) and SFP28 (31-34) ports
OS6860N-P48Z SFP28 (51-54) ports
OS6860N-P48M - Expansion modules (Not supported on any 4X10G splitter transceivers).
- Multi-rate Gigabit Ports (37-48)
OS6860N-P24Z SFP28 (27-30) ports
OS6860N-P24M - Expansion modules (Not supported on any 4X10G splitter transceivers)
- Multi-rate Gigabit Ports (1-24)
OmniSwitch 6560
OS6560-P24X4/24X4 - Ports 1-24 (Static and Dynamic modes)
- Ports 25-30 (Not Supported)
OS6560-P48X4/48X4 - Ports 1-48 (Static and Dynamic modes)
- Ports 49-52 (Dynamic mode only)
- Ports 53-54 (Not Supported)
OS6560-P48Z16 - Ports 1-32 (Static and Dynamic Modes)
(904044-90 only) - Ports 33-48 (Static and Dynamic modes)
- Ports 49-52 (Dynamic mode only)
- Ports 53-54 (Not Supported)
OS6560-X10 - Ports 1-8 (10G ports only. Dynamic mode only)
- Ports 9-10 (Not Supported)
OmniSwitch 6465 - OS6465-P28 - supported on all ports except ports 27 and 28.
Page 41 of 73 OmniSwitch AOS Release 8.10R1 - Rev. A
July 2024
Appendix C: SPB L3 VPN-Lite Service-based (Inline Routing) / External Loopback Support / BVLAN
Guidelines
The OmniSwitch supports SPB L3 VPN-Lite using either service-based (inline routing) or external loopback. The
tables below summarize the currently supported protocols for each method in this release.
IPv6
Protocols
Static Routing 8.5R4 8.6R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
RIPng 8.5R4 8.6R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
OSPFv3 8.5R4 8.6R2 8.7R2 8.7R3 8.8R1 8.7R2 8.R1
BGP 8.5R4 8.6R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
VRRPv3 8.5R4 8.7R1 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
IS-IS N N N N N N N
PIM-SM/DM 8.5R4 8.6R2 8.8R1 8.8R1 8.8R1 8.8R1 8.9R1
DHCP Relay 8.6R1 8.7R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
UDP Relay 8.6R1 8.7R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
BFD 8.7R2 8.7R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
IPv6 MLD Y 8.7R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
Snooping
IPv6 Multicast Y 8.7R2 8.7R2 8.7R3 8.8R1 8.7R2 8.9R1
Headend
Mode
IPv6 Multicast 8.5R4 8.7R2 8.8R1 8.8R1 8.8R1 8.8R1 8.9R1
Tandem Mode
IPv6 Protocols
Static Routing 8.5R4 Y 8.7R1 8.5R4 8.7R1 8.7R2 8.7R3 8.9R1
RIPng 8.5R4 Y 8.7R1 8.5R4 8.7R1 8.7R2 8.7R3 8.9R1
OSPFv3 8.5R4 Y 8.7R1 8.5R4 8.7R1 8.7R2 8.7R3 8.9R1
BGP 8.5R4 Y 8.7R1 8.5R4 8.7R1 8.7R2 8.7R3 8.9R1
VRRPv3 8.5R4 8.5R4 8.7R1 8.7R1 8.7R2 8.7R2 8.7R3 8.9R1
IS-IS Y Y Y Y Y 8.7R2 8.7R3 8.9R1
PIM-SM/DM 8.5R4 8.5R4 8.7R1 8.5R4 8.7R1 8.7R2 8.7R3 8.9R1
DHCP Relay 8.6R1 8.6R1 8.7R1 8.6R1 8.7R1 8.7R2 8.7R3 8.9R1
UDP Relay 8.6R1 8.6R1 8.7R1 8.6R1 8.7R1 8.7R2 8.7R3 8.9R1
BFD Y Y Y Y Y 8.7R2 8.7R3 8.9R1
IPv6 MLD 8.5R4 Y 8.7R1 Y 8.7R2 8.7R2 8.7R3 8.9R1
Snooping
IPv6 Multicast 8.5R4 Y 8.7R1 Y 8.7R2 8.7R2 8.7R3 8.9R1
Headend Mode
IPv6 Multicast 8.5R4 Y 8.7R1 Y Y Y Y 8.9R1
Tandem Mode
In most SPB networks this is not a local operation on a single switch. The BVLAN is configured on all the switches
in the network. A check must be performed to see if any service has been attached to the BVLAN. The check
does not have to be on a local switch, the service attachment to the BVLAN can be on any switch in the network.
1. This will indicate that this is an active BVLAN.
2. Even if the service is not local to a node the node can act as a transit node for the active BVLAN. For this
reason the BVLAN cannot be deleted from the network.
To determine if a BVLAN is active use the following command. If there is a service associated with the BVLAN
then In Use will show as Yes. This is a network wide view so even if the services are active on a remote node,
this local node will show that the BLVAN is active even if the services are not configured on the local node.
After the services have been consolidated the idle BVLANs can be deleted across the entire network. Deleting
idle BVLANs will have no effect on the existing network.
Standard Upgrade - The standard upgrade of a standalone chassis or virtual chassis (VC) is nearly
identical. All that’s required is to upload the new image files to the Running directory and reload the
switch. In the case of a VC, prior to rebooting the Master will copy the new image files to the Slave(s)
and once the VC is back up the entire VC will be synchronized and running with the upgraded code.
ISSU - The In Service Software Upgrade (ISSU) is used to upgrade the software on a VC or modular
chassis with minimal network disruption. Each element of the VC is upgraded individually allowing
hosts and switches which are dual-homed to the VC to maintain connectivity to the network. The
actual downtime experienced by a host on the network should be minimal but can vary depending upon
the overall network design and VC configuration. Having a redundant configuration is suggested and
will help to minimize recovery times resulting in sub-second convergence times.
Virtual Chassis - The VC will first verify that it is in a state that will allow a successful ISSU
upgrade. It will then copy the image and configuration files of the ISSU specified directory
to all of the Slave chassis and reload each Slave chassis from the ISSU directory in order from
lowest to highest chassis-id. For example, assuming chassid-id 1 is the Master, the Slave
with chassis-id 2 will reload with the new image files. When Slave chassis-id 2 has rebooted
and rejoined the VC, the Slave with chassis -id 3 will reboot and rejoin the VC. Once the
Slaves are complete they are now using the new image files. The Master chassis is now
rebooted which causes the Slave chassis to become the new Master chassis. When the original
Master chassis reloads it comes back as a Slave chassis. To restore the role of Master to the
original Master chassis the current Master can be rebooted and the original Master will
takeover, re-assuming the Master role.
Modular Chassis - The chassis will first verify that it is in a state that will allow a successful
ISSU upgrade. It will then copy the image and configuration files of the ISSU specified directory
to the secondary CMM and reload the secondary CMM which becomes the new primary CMM.
The old primary CMM becomes the secondary CMM and reloads using the upgraded code. As a
result of this process both CMMs are now running with the upgraded code and the primary and
secondary CMMs will have changed roles (i.e., primary will act as secondary and the secondary
as primary). The individual NIs can be reset either manually or automatically (based on the NI
reset timer).
OS6900-
No longer supported
X20/X40/T20/T40/Q32/X72
• ISSU from 8.9.92.R04 is not supported on platforms: OS6560, OS6465, OS6570M, OS9900, OS6360 (due to
SSH issue on build 8.9.92.R04)
Prerequisites
These upgrade instructions require that the following conditions exist, or are performed, before upgrading. The
person performing the upgrade must:
• Be aware of any issues that may arise from a network outage caused by improperly loading this
code.
• Understand that the switch must be rebooted and network access may be affected by following this
procedure.
• Have a working knowledge of the switch to configure it to accept an FTP connection through the
EMP or Network Interface (NI) Ethernet port.
• Read the GA Release Notes prior to performing any upgrade for information specific to this release.
• Ensure there is a current certified configuration on the switch so that the upgrade can be rolled-
back if required.
• Verify the current versions of U-Boot and FPGA. If they meet the minimum requirements, (i.e. they
were already upgraded during a previous AOS upgrade) then only an upgrade of the AOS images is
required.
• Depending on whether a standalone chassis or VC is being upgraded, upgrading can take from 5 to
20 minutes. Additional time will be needed for the network to re-converge.
• The examples below use various models and directories to demonstrate the upgrade procedure.
However, any user-defined directory can be used for the upgrade.
• If possible, have EMP or serial console access to all chassis during the upgrade. This will allow you to
access and monitor the VC during the ISSU process and before the virtual chassis has been re-
established.
• Knowledge of various aspects of AOS directory structure, operation and CLI commands can be found
in the Alcatel-Lucent OmniSwitch User Guides. Recommended reading includes:
o Release Notes - for the version of software you’re planning to upgrade to.
o The AOS Switch Management Guide
Chapter – Getting Started
Chapter - Logging Into the Switch
Chapter - Managing System Files
Chapter - Managing CMM Directory Content
Chapter - Using the CLI
Chapter - Working With Configuration Files
Chapter - Configuring Virtual Chassis
Do not proceed until all the above prerequisites have been met. Any deviation from these upgrade procedures
could result in the malfunctioning of the switch. All steps in these procedures should be reviewed before
beginning.
Switch Maintenance
It’s recommended to perform switch maintenance prior to performing any upgrade. This can help with
preparing for the upgrade and removing unnecessary files. The following steps can be performed at any time
prior to a software upgrade. These procedures can be done using Telnet and FTP, however using SSH and
SFTP/SCP are recommended as a security best-practice since Telnet and FTP are not secure.
1. Use the command ‘show system’ to verify current date, time, AOS and model of the switch.
6900-> rm *.log
6900-> rm *.tar
3. Verify that the /flash/pmd and /flash/pmd/work directories are empty. If they have files in them check the
date on the files. If they are recently created files (<10 days), contact Service & Support. If not, they can be
deleted.
4. Use the ‘show running-directory’ command to determine what directory the switch is running from and
that the configuration is certified and synchronized:
If the configuration is not certified and synchronized, issue the command ‘write memory flash-synchro’:
6900-> write memory flash-synchro
6. If you do not already have established baselines to determine the health of the switch you are upgrading,
now would be a good time to collect them. Using the show tech-support series of commands is an excellent
way to collect data on the state of the switch. The show tech support commands automatically create log files
of useful show commands in the /flash directory. You can create the tech-support log files with the following
commands:
Additionally, the ‘show tech-support eng complete’ command will create a TAR file with multiple tech-
support log files as well as the SWLOG files from the switches.
Page 48 of 73 OmniSwitch AOS Release 8.10R1 - Rev. A
July 2024
It is a good idea to offload these files and review them to determine what additional data you might want to
collect to establish meaningful baselines for a successful upgrade.
• If upgrading a standalone chassis or VC using a standard upgrade procedure please refer to Appendix E
for specific steps to follow.
• If upgrading a VC using ISSU please refer to Appendix F for specific steps to follow.
Go to the Service and Support website and download and unzip the upgrade files for the appropriate model and
release. The archives contain the following:
• OS6360 – Nosa.img
• OS6465 – Nos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6560 – Nos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6860 – Uos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6860N – Uosn.img
o Refer to Appendix H for recommended CPLD upgrades. AOS must be upgraded prior to
upgrading the CPLD.
• OS6865 – Uos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6900-V72/C32/X48C6/T48C6/X48C4E/V48C8 – Yos.img.
o Refer to Appendix H for recommended CPLD upgrades. AOS must be upgraded prior to
upgrading the CPLD.
• imgsha256sum (not required) –This file is only required when running in Common Criteria mode. Please
refer to the Common Criteria Operational Guidance Document for additional information.
FTP the image files to the Running directory of the switch you are upgrading. The image files and directory will
differ depending on your switch and configuration.
Follow the steps below to upgrade the image files by reloading the switch from the Running directory.
If upgrading a VC the new image file will be copied to all the Slave chassis and the entire VC will reboot. After
approximately 5-20 minutes the VC will become operational.
Log in to the switch to confirm it is running on the new software. This can be determined from the login banner
or the show microcode command.
OS6900-> show microcode
/flash/working
Package Release Size Description
-----------------+-----------------------+--------+-----------------------------------
Yos.img 8.10.102.R01 239607692 Alcatel-Lucent OS
Note: If there are any issues after upgrading the switch can be rolled back to the previous certified version by
issuing the reload from certified no rollback-timeout command.
After verifying the software and that the network is stable, use the following commands to certify the new
software by copying the Running directory to the Certified directory.
OS6900-> copy running certified
Go to the Service and Support Website and download and unzip the ISSU upgrade files for the appropriate
platform and release. The archive contains the following:
• OS6360 – Nosa.img
• OS6465 – Nos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6560 – Nos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6570M – Wos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6860 – Uos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6860N – Uosn.img
o Refer to Appendix H for recommended CPLD upgrades. AOS must be upgraded prior to
upgrading the CPLD.
• OS6865 – Uos.img
o Refer to Appendix G for recommended FPGA/U-boot upgrades. AOS must be upgraded prior to
upgrading the FPGA/U-boot.
• OS6900-V72/C32/X48C6/T48C6/X48C4E/V48C8 – Yos.img.
o Refer to Appendix H for recommended CPLD upgrades. AOS must be upgraded prior to
upgrading the CPLD.
• imgsha256sum (not required) –This file is only required when running in Common Criteria mode. Please
refer to the Common Criteria Operational Guidance Document for additional information.
Note: The following examples use issu_dir as an example ISSU directory name. However, any directory name
may be used. Additionally, if an ISSU upgrade was previously performed using a directory named issu_dir, it
may now be the Running Configuration, in which case a different ISSU directory name should be used.
2. Create the new directory on the Master for the ISSU upgrade:
OS6900-> mkdir /flash/issu_dir
It is important to connect to the Slave chassis and verify that there is no existing directory with the path
/flash/issu_dir on the Slave chassis. ISSU relies upon the switch to handle all of the file copying and directory
creation on the Slave chassis. For this reason, having a pre-existing directory with the same name on the Slave
chassis can have an adverse effect on the process. To verify that the Slave chassis does not have an existing
directory of the same name as the ISSU directory on your Master chassis, use the internal VF-link IP address to
connect to the Slave. In a multi-chassis VC, the internal IP addresses on the Virtual Fabric Link (VFL) always use
the same IP addresses: 127.10.1.65 for Chassis 1,127.10.2.65 for Chassis 2, etc. These addresses can be found
by issuing the debug command ‘debug show virtual-chassis connection’ as shown below:
OS6900-> debug show virtual-chassis connection
Address Address
Chas MAC-Address Local IP Remote IP Status
-----+------------------+---------------------+-------------------+-------------
1 e8:e7:32:b9:19:0b 127.10.2.65 127.10.1.65 Connected
4. SSH to the Slave chassis via the internal virtual-chassis IP address using the password ‘switch’:
OS6900-> ssh 127.10.2.65
Password:switch
5. Use the ls command to look for the directory name being used for the ISSU upgrade. In this example, we’re
using /flash/issu_dir so if that directory exists on the Slave chassis it should be deleted as shown below.
Repeat this step for all Slave chassis:
6900-> rm –r /flash/issu_dir
7. On the Master chassis copy the current Running configuration files to the ISSU directory:
OS6900-> cp /flash/working/*.cfg /flash/issu_dir
8. FTP the new image files to the ISSU directory. Once complete verify that the ISSU directory contains only
the required files for the upgrade:
6900-> ls /flash/issu_dir
Yos.img issu_version vcboot.cfg vcsetup.cfg
During ISSU ‘show issu status’ gives the respective status (pending, complete, etc)
OS6900-> show issu status
Issu pending
Allow the upgrade to complete. DO NOT modify the configuration files during the software upgrade. It normally
takes between 5 and 20 minutes to complete the ISSU upgrade. Wait for the System ready or [L8] state which
gets displayed in the ssh/telnet/console session before performing any write-memory or configuration changes.
6900-> debug show virtual-chassis topology
Local Chassis: 1
Oper Config Oper System
Chas Role Status Chas ID Pri Group MAC-Address Ready
-----+------------+-------------------+--------+-----+------+------------------+-------
1 Master Running 1 100 19 e8:e7:32:b9:19:0b Yes
2 Slave Running 2 99 19 e8:e7:32:b9:19:43 Yes
Log in to the switch to confirm it is running on the new software. This can be determined from the login banner
or the show microcode command.
OS6900-> show microcode
/flash/working
Package Release Size Description
-----------------+------------------------+--------+-----------------------------------
Yos.img 8.10.102.R01 2239607692 Alcatel-Lucent OS 97424 Alcatel-Lucent OS
After verifying the software and that the network is stable, use the following commands to certify the new
software by copying the Running directory to the Certified directory:
OS6900-> write memory flash-synchro
Summary
CR / Feature
CRAOS8X-12042 Description Switch does not shutdown after crossing danger threshold temperature.
FPGA Version 0.7
Platforms OS6465-P28
CRAOS8X-7207 Description Chassis reboots twice to join a VC.
FPGA Version 0.7
Platforms OS6560-P24Z24,P24Z8,P48Z16 (903954-90)
CRAOS8X-4150 Description VC LED status behavior.
U-boot Version 0.12
Platforms OS6865-U28X
8.7R1 Release
CRAOS8X-16452 Description Port remains UP when only SFP is connected.
FPGA Version - 0.6 (OS6560-P48Z16 (904044-90))
- 0.7 (OS6560-48X4, OS6560-P48X4)
- 0.8 (OS6560-X10)
Platforms OS6560-P48Z16 (904044-90), OS6560-48X4, OS6560-P48X4, OS6560-X10
Fast/Perpetual PoE Description Fast and Perpetual PoE Support
FPGA Version 0.7 (OS6860E-P24Z8)
0.10
0.14 (OS6865-U28X)
0.25 (OS6865-P16X/U12X)
Platforms OS6860/OS6865
8.7R2 Release
CRAOS8X- Description U-boot unable to mount NAND flash with UBIFS errors
4813/13440
U-boot Version 8.7.2.R02
Platforms OS6465(T), 6560-24X4/P24X4/48X4/P48X4/X10
CRAOS8X-13819 Description U-boot unable to mount eUSB flash
U-boot Version 8.7.2.R02
Platforms OS6560-24Z24/P24Z24/24Z8/P24Z8/P48Z16 (all PNs), 6865
CRAOS8X-22857 Description OS6560-P24Z24 reloads continuously with pmds
FPGA Version 0.8
Platforms OS6560-24Z24/P24Z24/24Z8/P24Z8/P48Z16 (903954-90)
1588v2 Support Description 1588v2 Support
FPGA Version 0.7 (OS6560-P48Z16 (904044-90))
0.8 (OS6560-48X4/P48X4)
Platforms OS6560-48X4/P48X4/P48Z16(904044-90)
Supported on 1G and 10G ports only. Not supported 2.5G ports.
U-boot Password Description U-boot password support (Early Availability)
Authentication
U-boot Version 8.7.2.R02
Platforms OS6465
8.7R3 Release
CRAOS8X-26370 Description Required upgrade to enable 12V Power Fail Interrupt (CRAOS8X-26370).
CRAOS8X-25033 Required upgrade to address fan speed issue. (CRAOS8X-25033)
FPGA Version 0.17
Platforms OS6360-24/P24/48/P48
CRAOS8X-24464 Description U-boot update for CRAOS8X-24464, ability to disable / authenticate U-
boot access.
U-boot Version 8.7.30.R03
Platforms OS6360, 6465, 6560, 6860, 6865, 9900. (Not applicable for platforms
that use ONIE)
8.8R1 Release
Boot from USB Description U-boot update to allow switch to boot from USB.
U-boot Version 8.8.33.R01
Platforms OS6465, OS6865
8.8R2 Release
Future Description U-boot/FPGA update to allow future CMM2/OS9912 NI compatibility.
compatibility
U-boot/FPGA Versions See OS9900 Table for versions.
Platforms 9907
8.9R1 Release
N/A There are no U-boot/FPGA upgrade requirements in this release.
8.9R2 Release
Fan Speed Description Reduced fan speed at boot-up
FPGA Version 0.20
Platforms OS6360-(P)24/(P)48/PH48
CRAOS8X_35470 Description U-boot fix for NAND flash bad file system block.
and CPLD Support Support of Gowin CPLD1
U-boot 8.9.85.R02
Platforms OS6360 (All)
CPLD Support Description Support of Gowin CPLD1
U-boot 8.9.92.R02
Platforms OS6570M-12/12D/U28
CRAOS8X_35470 Description U-boot fix for NAND flash bad file system block
U-boot/FPGA Versions 8.9.85.R02
Platforms OS6465 (All), OS6560-(P)24X4/(P)48X4/X10
1. Existing switches do not contain the new CPLD component and do not need to upgrade. Switches with the new CPLD
component will ship from the factory with the correct version.
8.9R3 Release
CRAOS8X-40924 Description Address issue when disabling U-boot access.
U-boot Version 8.9.139.R03
Platforms OS6570M-12/12D/U28
Power Supply Description Address power supply interrupt issue.
Interrupt
FPGA Version 0.12
Platforms OS6570M-U28
8.9R4 Release
Signed AOS Images Description Adds support for signed images when used with AOS 8.9R4 GA release.
U-boot Version 8.9.70.R04
Platforms OS6570M-12/12D/U28
8.10R1 Release
CRAOS8X-43592 Description 1G/10G SFP not recognized.
U-boot Version XNI_U24 - 2.12.0
XNI_U48 - 2.12.0
GNI_U48 - 1.8.0
CNI_U8 - 1.10
Platforms OS9907/OS9912
Note: AOS must be upgraded prior to performing an FPGA/CPLD or U-boot upgrade.
1. Download and extract the upgrade archive from the Service & Support website. In addition to the AOS
images, the archive will also contain an FPGA upgrade kit and U-boot file, for example.
• U-boot.8.9.R04.70.tar.gz
2. FTP (Binary) the files to the /flash directory on the primary CMM.
3. Enter the following to upgrade the FPGA. The ‘all’ parameter should be used when upgrading with an FPGA
kit. Additionally, this will update all the elements of a VC, for example:
-> update fpga-cpld cmm all file fpga_kit_8757
Parse /flash/fpga_kit_8757
fpga file: OS6360-10_CPLD_V19_20230110.vme
Please wait...
fpga file: OS6360-10_CPLD_V19_20230110.vme
update chassis 1
Starting CMM ALL FPGA Upgrade
CMM 1/1
Successfully updated
Reload required to activate new firmware.
8.8R2 Release
OS6860N-P48M/P48Z/P24M/P24Z
CRAOS8X-29731/30471 Description OS6860N power supplies
CPLD File os6860n_p48m_p48z_u28_maincpu_20220318.updater
os6860n_p24m_p24z_maincpld_22020309.updater
8.9R1 Release
OS6900-T48C6
CRAOS8X-30098 Description Fixed I2C lockup issue on CPU board.
(Please refer to CRAOS8X-30098 for additional details)
CPLD File denverton_cpucpld_v0b.02.0eh_20211124.jbc.updater
No CR Description Improved power down sequence when PSU shut down.
CPLD File os6900_t48c6_mainpld_v1.03.02.04.jbc.updater
OS6900-X48C6
CRAOS8X-30098 Description Fixed I2C lockup issue on CPU board.
(Please refer to CRAOS8X-30098 for additional details)
CPLD File denverton_cpucpld_v0b.02.0eh_20211124.jbc.updater
No CR Description Improved power down sequence when PSU shut down.
CPLD File os6900_x48c6_mainpldall_bp_v1.03.02.02h.jbc.updater
OS6900-X48C4E
CRAOS8X-30098 Description Fixed I2C lockup issue on CPU board.
(Please refer to CRAOS8X-30098 for additional details)
CPLD File OS6900_XC48C4E_MAIN_CPU_FAN_CPLD_2e3228_20220322.updater
8.9R4 Release
OS6900-X48C4E
CRAOS8X-43968 Description Fixed temperature error on OS6900-X48C4E (Hardware revision: 6) with
a single power supply.
CPLD File updater_kit_8629 (version 2.15)
8.10R1 Release
N/A Description N/A
CPLD File N/A
Notes:
1. Upgrading the CPLD on ONIE-based models using an updater kit is supported beginning with AOS Release 8.9.R03.
2. The updater kit contains all the necessary individual updater files.
3. CPLD versions are compatible with previous AOS releases. Downgrading to a previous AOS release is supported:
a. Backup the configuration files from previous release.
b. Upgrade to AOS Release 8.9.R03.
c. Upgrade the CPLD.
d. Downgrade to previous release. (ISSU is not supported when downgrading AOS)
e. Restore the configuration.
Note: AOS must be upgraded to 8.10R1 prior to performing a CPLD upgrade using the updater kit.
ONIE-based platforms contain multiple CPLDs. The upgrade process will pick the correct updater file from the
kit based on the platform and the CPLD type. The procedure will check for a version mismatch and upgrade the
CPLD one at a time (i.e. Main board or CPU board). The CPLD will be upgraded one at a time so it may be
necessary to run the command multiple times. If no upgrade is required, the command will display a message
indicating there are no pending upgrades. See example below (file and product names will vary).
1. Download and extract the upgrade archive from the Service & Support website. In addition to the AOS
images, the archive will also contain a CPLD upgrade kit, for example.
2. Ensure the configuration is certified and synchronized prior to upgrading the CPLD. It’s recommended to
have a console connection in case there are any issues during the CPLD upgrade procedure.
3. FTP (Binary) the updater kit to the /flash directory on the primary CMM.
4. Enter the following to upgrade the CPLD. Use the ‘all’ parameter to upgrade each element in a VC, for
example:
-> update fpga-cpld all 1/1 file updater_kit_8629
Starting CMM 1/1 FPGA Upgrade
CMM 1/1
starting onie update
Removing firmware update results: OS6900_XC48C4E_MAIN_CPU_FAN_CPLD_2f3238_20240315.updater
Staging firmware update: /flash/ OS6900_XC48C4E_MAIN_CPU_FAN_CPLD_2f3238_20240315.updater
onie update successful
Successfully updated
Reload required to activate new firmware.
4. If multiple CPLDs have to be upgraded the command must be run several times.
5. Once the CPLDs have been upgraded a manual reload is required. This will boot each of the units to “ONIE:
Update ONIE” mode. Note: Do not press any keys while in ONIE mode.
6. The switch will update the CPLD and then reboot to the Certified directory. Note: The switch will not boot
back to the last running directory.
7. OS6860N models (except U28) will then automatically power cycle. For all other models manually power
cycle the units to refresh the CPLD image. The switch will then again boot back to the Certified directory.
CR/PR
Description
NUMBER
Case: Summary:
00733478 Unable to remove the interface from the policy port group.
CRAOS8X-43718 policy port group “testing” no 1/1/45
ERROR: “testing”: Groups must have at least one entry
Explanation:
The port bitmap comparison to check if ports are part of a port-group was only to
check for the first 32 user ports of the device. Any port-group policy having ports
33 or above was not compared to whether its bitmap was set or not and hence
was returning an error saying the group should have at least one member.
Changes were added to check all the bits in the port bitmap instead of checking
only the first 32 bits and it is fixed in 8.10R01.
Case: Summary:
00750068 The OS6900 core switch stuck in the boot loop during the upgrade from
CRAOS8X-45604 8.7.354.R01 to 8.9.94.R04.
Explanation:
The root cause of the issue is due to the configuration of "debug ip bgp adv-
loopback0 enable".
Fix is given in 8.10R01
Case: Summary:
00719941, Qos port violation noticed for TCP 53 and TCP 179 on the UserPorts. When switch
00742179 receives the TCP RST ACK packets with source port 53 (for DNS) and 179(BGP), the
CRAOS8X-42339, switch shutdowns the port for violation.
CRAOS8X-44429 qos trust-ports user-port shutdown dns-reply bgp
Explanation:
The fix is given in AOS 8.10R01.
�Click for Additional Information
Case: Summary:
CVE-2024-0727, CVE-2023-5678: Vulnerability Analysis for AOS 8X switches.
00734062,
00721704 Explanation:
CRAOS8X-43714, The vulnerability has been resolved in OpenSSL version 3.0.13. Fix in provided in
CRAOS8X-42394 8.10R01.
Case: Summary:
00664503 CVE-2021 41617 & CVE-2021-36368 need vulnerability analysis for AOS 8.X
CRAOS8X-36871 switches.
Explanation:
This vulnerability is fixed in AOS 8.10R01.
Case: Summary:
00741513 802.1x supplicant clients are not responding to EAP ID requests within 3 seconds
CRAOS8X-44482 for 3 retries attempted from AOS switch.
Explanation:
The switch sends 3 EAP (max-req=3) requests each second to determine if the
device is supplicant or non-supplicant. If no response is received, it is considered
a non-supplicant.
The other timers, like Tx-timeout and supplicant-timeout, are used when the PC
responds to the EAP.
Fix is given to allow 802.1x supplicant PCs to take more retries to respond to EAP
ID request of AOS switch before considering this client as non-supplicant. Max-req
can now to set to 50 times while the default max-req is 2 times.
Case: Summary:
00708315 Vulnerability check of CVE-2023-24329 for AOS 8X switches.
CRAOS8X-41378
Explanation:
Python version will be upgraded to 3.11.4 from AOS 8.10R01.
Case: Summary:
00719316 Vulnerability check of CVE-2023-5363 for AOS 8X switches.
CRAOS8X-42207
Explanation:
OpenSSL upgraded to 3.0.13 version that has the fix for this CVE. Fix is given in
8.10R01.
Case: Summary:
00734322, There is no CVLAN tag in the DHCP discover packets egressing on the NNI Port of
00745117 the switch.
CRAOS8X-43897,
CRAOS8X-44695 Explanation:
The fix will be available in AOS release 8.10R01.
Case: Summary:
00739642 This is about an error message "cannot enable sflow sampler on the port" received
CRAOS8X-44869 while trying to configure "sflow sampler" on a linkagg with only a single port
1/1/49A on an OS6900-X48C6 switch.
Explanation:
The fix will be available in AOS release 8.10R01.
Case: Summary:
00758170 Chassis.2 status is showing "Failure-Shutdown" on OS6560-48X4 switches in VC
CRAOS8X-45639 after upgrading to 8.9.94.R04 from 8.9R03.
Explanation:
This issue has been reported only in AOS 8.9R04 with FIPS mode enabled. This
issue will be fixed in AOS 8.10R01.
Case: Summary:
00728419 IP multicast VLAN (IPMVLAN) is not working. IGMP queries ingress on UNI with
CRAOS8X-43326 CVLAN ID tag. However multicast data traffic is not egress on UNI port with CVLAN
ID tag. CVLAN tag translate was not working for IPMVLAN implementation. SVLAN
and CVLAN are different VLAN ID in this use case.
Explanation:
There are changes done in AOS 8.X IPMVLAN implementation to ensure the
multicast data traffic forwarded with required CVLAN while egressing on UNI port.
Case: Summary:
00726097 There are logs as given below when using sflow agent.
CRAOS8X-42858
pd:pd_free: Cpss trying to free a buffer it doesn't own (state=Free owner=None
prev owner=Pd )
Explanation:
There are double free of the PD (Packet Driver) buffer when the packet driver
queue is full. When the queue is full, the buffer is freed, and the same buffer is
assigned back to the client list.
Fix is done to remove the extra free of freeing the packet driver buffer in AOS
8.10R01.
Case: Summary:
00731546 Vulnerability check of CVE-2023-6129 for AOS 8.X switches.
CRAOS8X-43499
Explanation:
Fix is available in 8.10R01 GA.
Case: Summary:
00747235 The information displayed is wrong in the OS6900-V48C8 for the command:
CRAOS8X-45002 ->show interfaces 1/1/57.
Explanation:
This is a cosmetic issue and there will be no operational impact.
Case: Summary:
00734658 Random IP Phone never receives IP and continuous error "svcNi mSVC ERR
CRAOS8X-43844 SVCN:SAP:: Process SAP Cfg Entry[0] failed" in console
Explanation:
• Concurrent access to the BCM Sdk port type data structure during a link
scan speed change configuration.
• Returning Service Access Point details without proper cleanup creates an
issue state.
Case: Summary:
00738590 6465: PoE status "denied" for Watchnet MPIX-40IRPTZAI camera model
CRAOS8X-44265
Explanation:
The Watchnet MPIX-40IRPTZAI camera model consistently displays a "Denied"
status when connected to the OS6465-P6 switch across all ports.
OS6465 swlogd lpNi LanNi INFO: Port 1/1/1 FAULT State change 1b to 43 desc:
Port is off: Class Error (Illegal class)
Case: Summary:
00754049 TCam NI task restarted[Failed App /bin/tcamnid] while executing tech-support-
CRAOS8X-45829 eng complete
Explanation:
When there are more IP entries in the network group, OS9900's RuleIdx cannot
progress to the next iteration.
Case: Summary:
00752480 2XOS6560-24X4: Chassis-2 going to Failure-shutdown after upgrading to AOS
CRAOS8X-45639 8.9R04.
Explanation:
When FIP configuration is enabled, FIPS mode in master and slave are not
synchronized: Master have the FIP mode enabled; however, slave is missed to set
the mode which is causing algorithms mismatch between ssh client and server.
Case: Summary:
00754707 ARP is learnt in incorrect service when MAC is learnt in correct service.
CRAOS8X-45930
Explanation:
It has been confirmed that the issue is with the display; there will be no
functional impact.
While displaying "show arp", it is using the “Virtual Port” details which was
updated with the most recent service ID.
The fix approach is to use the variable in “ipmcmm” which already knows the
correct ISID value when using "show arp".
Case: Summary:
00743364 Interface speed 1G,10G accepted in 25G speed port which causes the port not to
CRAOS8X-44533 come up in 25G speed
Explanation:
• Speed 100M, 1G, and 10G will not be accepted when 25G SFP is connected
to the port group.
Case: Summary:
00752681 The output of “show configuration snapshot aaa” had user command output in CLI
CRAOS8X-45575 guide. CLI output is not expected to display the “user” command configuration.
The users created in the switch are saved in userTable in the /flash/system folder
and these users will not be printed in configuration snapshot commands.
Explanation:
Management and CLI guide documentation corrected in AOS 8.10R01 for “show
configuration snapshot aaa”.
Explanation:
The error is seen when it is unable to get host interface for 20G interface. This
issue is fixed in 8.10R01.
Case: Summary:
00750952 DHCP snooping entry is not updated during re-IP or PXE process causes ISF to drop
CRAOS8X-45460 any ARP packets received from the new IP. As a result, clients on the ports will
not have network connectivity.
Explanation:
Due to changes made to the DHCP server for printers and PXE devices to acquire
IP addresses within a new range, clients are now unable to connect to the
network after receiving their new IP addresses during the DHCP renewal process.
Checking the DHCP snooping table on the switch reveals that it still displays the
old IP addresses for the clients. Due to this conflict, IP source filtering is blocking
packets from the new IP addresses of the clients. Disabling ISF on the VLAN/port
is one of the work arounds.
Case: Summary:
00738222 Different behavior of OID dot1qVlanFdbId than AOS6x and other vendors.
CRAOS8X-44151
Explanation:
The OID dot1qVlanFdbId has been observed as behaving differently in AOS8x
switches than AOS6x and other vendor switches.
The index for all the VLANs is set as 1, instead of unique values of each VLAN IDs
like other vendors.
Case: Summary:
00727549 Multiarea SPB interoperability with Extreme switches.
CRAOS8X-42974
Explanation:
when multiarea is enabled on Extreme SPB node, the new area configured is
appended to default area 00 instead of overwriting it, in ALE SPB node. Extreme
detects the ALE area as a loop connection and the SPB adjacency is shutdown.
Case: Summary:
00746197 OS6900-X72: Switch uses a different "IP Inteface" for DNS Query instead of
CRAOS8X-44962 "Loopback0".
Explanation:
OS6900-X72 switch configured with service source-ip "Loopback0". Still the DNS
query from the switch uses a different IP interface instead of "Loopback0" as
configured.
Case: Summary:
00748200 OS6560-P48Z16: VC-Split after the upgrade from 8.9R03 to 8.9.94.R04
CRAOS8X-45068
Explanation:
The chassis affected are stuck in unusual boot loop and there was no login prompt
even on console access. Spin locks are a synchronization mechanism which allows
one process at a time to access the shared memory. OS6560 is a device with two
CPU cores. During the issue state the 'spinlock backtrace tracking' got stuck and
busy-locked one CPU core. This caused the other CPU to detect the stall, dump
the backtrace, and hang the box.
Case: Summary:
00751395 Mitel IP phone connected to the UNP port of OS6560-P48Z16 switch is filtered by
CRAOS8X-45516 LPS.
Explanation:
If the IP-Phone mac address is initially classified in “server-down” profile. LPS
increment the bridging count of the port to 1. Later the same device is identified
as IP-Phone based on LLDP info. While assigning the profile in
agCmmAssignProfileToMac, the LPS Count was not decremented properly. Hence
same mac was learnt in filtering as the bridge count already reached max limit of
1.
Case: Summary:
00749019 OS6860N stops authenticating end users via RADIUS server. Access to the switch
CRAOS8X-45241 could not be established via SSH or Console prompt. Reload of switch is required
to overcome this issue.
Explanation:
As part of the user authentication process, radCLI sends the Radius packet to the
server. During this flow, while recomputing hash for the packet to be sent to the
radius server, radCLI task got stuck in an infinite loop.
Case: Summary:
00753370 AOS 8.x switches uses identical value in the 'Authenticator' field of "RADIUS-
CRAOS8X-45732 Request" packet.
Explanation:
"RADIUS-Request" packets from two different AOS 8.x switches seems to be using
identical value in the 'Authenticator' field. The authenticator field hash is
computed using a random number based on the time in seconds. In a time-
synchronized network, when multiple switches try to send RADIUS-Request in the
same second then there is high possibility for AOS switches to generate identical
'Authenticator' value.
Case: Summary:
00736076 Write Memory failed! Unable to retrieve VCM configuration.
CRAOS8X-43927
Explanation:
These errors are generated after executing the CLI command “write memory” and
“write-memory flash-synchro” in the OS6560 switch. This issue is due to the TCP
connection failure between the MIP_gw and the VCM.
Case: Summary:
00725556 OS6860N: No connectivity on the service access port with UNP.
CRAOS8X-42890
Explanation:
An OS6860N switch using SPB has a device connected via an ISID #### via UNP on
an interface but is not able to communicate with the network. SVC BCM error
occurs when the access port is dynamically changed, causing the SAP port to
become nonfunctional.
Case: Summary:
00733326 OS6900 Traffic loss observed on unit-1 of VC due to missing vlan tag on SAP port.
CRAOS8X-43637
Explanation:
The ICMP between client and server has around 98% loss.
The SAP connected to router is holding the services along with specific vlan IDs.
The pkt from client is reaching the server and response from server is reaching
the VC and while exiting, it is not adding the respective vlan tag, hence client not
receiving the response from the router.
Case: Summary:
00730642 Authentication was failing for the clients connected to OS6560 switch on UNP
CRAOS8X-43939 802.1x ports.
Explanation:
The issue was that the delay in Client responding to EAP request from switch. Due
to no response from client, switch was resending the same request as duplicate
and now client is responding with 2 replies. Switch was forwarding the first reply
and for the RADUIS response from Server, switch was sending the duplicate
response to server which is not supposed to be done.
Case: Summary:
00742719 OS6860E Switch rebooted with new_cs PMD.
CRAOS8X-44522
Explanation:
The switch has been restarted and new_cs PMD was generated.
The reason for the crash was due to incorrect payload length dhcpv6 packet
reception.
Case: Summary:
00747497 OS9900 was upgraded to 8.9R2 and post-upgrade the QSFP-40G-LR in OS99-CNI-U8
CRAOS8X-45011 stays down.
Explanation:
The issue is observed when the switch is upgraded to AOS 8.9R2. Once the issue is
seen in the port the same SFP is moved to another port the interface comes up. If
the same QSFP is moved back to the issue port, the port down is seen.
Case: Summary:
00748554 When two 2000W Power supply the “Error reading PS EEPROM” error is seen in the
CRAOS8X-45492 switch console.
Explanation:
In AOS 8.9R04, enhancements are made to the fan algorithm, where the switch
will pool the power supply for power consumption every 15 seconds. When there
is a missing pooling request, the reported error is seen in the console.
Case: Summary:
00757184 In the OS9907 model switch, while performing the failover test in the CMM of the
CRAOS8X-46260 chassis, and after the failover of the CMM you have noticed VFL ports of the
Chassis are in down status, however, the interface status is up.
Explanation:
VFL port status is down after the failover test of CMM A. However, the interface
status is up. The issue was not seen when the VC take-over command was used
and physically the link was made down. The reboot of the whole chassis resolved
the issue.
Case: Summary:
00719419 The L2GRE frames are sent out with a Tag even though the uplink port on the
CRAOS8X-42883 switch is untagged.
Explanation:
The switch sends the tagged packets on an untagged uplink port toward the
router, and the router drops that L2GRE packet. This is due to an incorrect VLAN
check applied for L2GRE ports and is an AOS software issue.
Case: Summary:
00719419 The L2GRE frames are sent out with a Tag even though the uplink port on the
CRAOS8X-42883 switch is untagged.
Explanation:
The switch sends the tagged packets on an untagged uplink port toward the
router, and the router drops that L2GRE packet. This is due to an incorrect VLAN
check applied for L2GRE ports and is an AOS software issue.
Case: Summary:
00732839 SFP-10G-SR / 1G-SX is not detected on chassis 1 of the OS9007 VC on the OS99-
CRAOS8X-43592 XNI-U48 module.
Explanation:
The SFPs are detected on hardware however, it is not updated in the Software
and thus the SFPs are not shown in “show transceiver output”.
Case:
Summary:
00741744
OS6860N: After successful authentication, all traffic on dynamic SAP port is
CRAOS8X-44402 dropped.
Explanation:
When a device is connected to a dynamic UNP port, it passes the authentication
and expected UNP profile is assigned. After that all packets received on the port
are not forwarded.
� Click for Additional Information
Case:
Summary:
00733059
OS6860E: BGP multipath feature not supported for IPv6 prefixes
CRAOS8X-43674
Explanation:
The switch fails to load balance traffic across two equal-cost paths for IPv6
prefixes learned through BGP. This behavior is observed despite both paths
appearing in the BGP table. Only one path is ultimately installed into the routing
table, resulting in suboptimal traffic distribution.
Case:
Summary:
00732563
BGP policy prefix6-list to allow only the default route is not supported
CRAOS8X-43591
Explanation:
The functionality of implementing a BGP policy prefix6-list exclusively for
permitting only the default route is not currently available on Alcatel
Omniswitches.
� Click for Additional Information
Case:
Summary:
00722591
OS6860N: Connectivity issues on Service Access Ports
CRAOS8X-42412
Explanation:
Lack of connectivity and missing MAC address on the affected ports. Additionally,
the interface counters displayed no incoming traffic. The issue is more frequent
on dynamic SAP ports.
� Click for Additional Information
Case: Summary:
00735340 6900-X72 in router mode unable to route traffic to some destinations using the
CRAOS8X-43913 default gateway route.
Explanation:
An OS 6900-X72 in Router Mode receives a 0.0.0.0/0 route via OSPF but is unable
to send traffic to 128.0.0.0/1 unless a more specific route is present.
At the software level we see the default route from OSPF is learned, but at the
hardware level it is not being installed. Note that this issue does not occur when
the switch is in Switch Mode. This does not affect the OS 6900-V72
Installing Packages
Verify the package prior to install. Then install and commit the package to complete the installation. For
example:
-> pkgmgr verify nos-mrp-v1.deb
Verifying MD5 checksum.. OK
-> pkgmgr install nos-mrp-v1.deb
-> write memory
-> show pkgmgr
Legend: (+) indicates package is not saved across reboot
(*) indicates packages will be installed or removed after reload
Name Version Status Install Script
---------------+---------------------+------------------+---------------------------------
ams default installed default
ams-apps default installed default
mrp 8.7.R03-xxx installed /flash/working/pkg/mrp/install.sh
Removing Packages
Find the name of the package to be removed using the show pkgmgr command, then remove and commit the
package to complete the removal. Remove the Debian installation file. For example:
-> pkgmgr remove mrp
Purging mrp (8.7.R03-xxx)...
Removing package mrp.. OK
Write memory is required complete package mrp removal
-> write memory
Package(s) Committed
AMS
The ams-broker.cfg configuration file for AMS contains plain text passwords. The passwords can be stored as
encrypted beginning with the 8.7R1 release. Follow the steps below prior to upgrading to 8.7R1 or later release
to store encrypted passwords.
IoT-Profiler
The ovbroker.cfg configuration file for AMS-APPS/IoT-Profiler contains plain text passwords. The passwords can
be stored as encrypted beginning with the 8.7R1 release. Follow the steps below prior to upgrading to 8.7R1 or
later release to store encrypted passwords.
1. Remove the install.sh file present under path /flash/<running-directory>/pkg/ams-apps/ for AMS-APPS
prior to upgrading AOS.
2. Remove this file from each VC node.
3. Upgrade the switch.
4. Once the switch comes up after the upgrade, the password present under/flash/<running-
directory>/pkg/ams-apps/ovbroker.cfg file will be encrypted.
CRAOS8X-46556
Description: The vulnerability (CVE-2024-6387) in OpenSSH is a signal handler race condition in the OpenSSH
server (sshd) that occurs if a client does not authenticate within LoginGraceTime which is 600 seconds by
default. An attacker can exploit this vulnerability on a device by repeatedly attempting to connect to the
OpenSSH server without authenticating. Each attempt aims to trigger the SIGALRM signal handler at a precise
moment when it is performing unsafe operations. The key to successful exploitation is the ability to manipulate
the server’s memory layout through crafted inputs, such as malformed SSH keys, which are designed to place
the device memory in a state where it becomes vulnerable to corruption.
Workaround: Set "LoginGraceTime" to "0" in sshd_cfg. This disables the functionality that is used to trigger the
vulnerability. AOS 8.10R1 enables the workaround by default. If the “ssh login-grace-time“ is already configured
to a value other than 0, it is advisable to set to “0” using “ssh login-grace-time 0” command.