Customer Release Notes: Securestack C2 Firmware Version 5.01.01.0039 December 2007
Customer Release Notes: Securestack C2 Firmware Version 5.01.01.0039 December 2007
SecureStack C2
Firmware Version 5.01.01.0039
December 2007
INTRODUCTION:
This document provides specific information for version 5.01.01.0039 of firmware for the following SecureStack
C2 products:
Enterasys Networks recommends that you thoroughly review this release note prior to installing or
upgrading this product. There may be a more up-to-date version of this Release Note.
Please go to the Enterasys web site to ensure that this is the latest revision of the Release Note
(http://www.enterasys.com/support/).
FIRMWARE SPECIFICATION:
F0615-O
CUSTOMER RELEASE NOTES
BOOTPROM COMPATIBILITY:
If you install this image, you may not have control of all the latest features of this product until the next version(s)
of network management software. Please review the software release notes for your specific network
management platform for details.
SUPPORTED FUNCTIONALITY:
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
Please refer to http://www.enterasys.com/download/#switches for the latest firmware updates to the SecureStack
C2. In general, the SecureStack C2 product will be shipped to you pre-configured with this version of firmware. If
you would like to upgrade an existing SecureStack C2 product, please follow the TFTP download instructions that
are included in your Configuration Guide.
TFTP download instructions are also available on the Enterasys support web site at:
http://knowledgebase.enterasys.com/esupport/esupport.asp?ID=ent19703.
Soft copies of the Configuration Guide are available at no cost to the user on the Enterasys Networks web site,
http://www.enterasys.com/support/manuals. To order hard copies of the Configuration Guide, contact your
Enterasys representative.
The SecureStack C2 family of stackable switches is managed by a single IP address for a stack of up to 8
switches.
In order to download the new software to a stack of C2 switches, simply follow the instructions to upgrade a
switch with new software and then the system will automatically download the new software to all the members in
the stack controlled by that stack manager.
The stack will reset, the current config will be cleared, the new image will start up, and the stack will automatically
program itself with the previous configuration.
If the CLI is monitored during this process, the user will see that all Diffserv commands will display error
messages stating the command is unknown. This message should be ignored and is for information only.
Upgrading from the 2.00.48 release to the 2.01.20 release requires some additional steps for users who utilize
GVRP. When upgrading to the 2.01.20 image, the user should only reconfigure GVRP on inter-switch links (ISLs).
GVRP was enabled by default in the 2.00.48 image on all edge ports; only non-default commands are displayed
in the config, so only the set GVRP disable commands would be listed in a config file created in a 2.00.48 image.
In the 2.01.20 image, the situation is the opposite. Any ―GVRP disable‖ commands are ignored. For any ports on
which the user wants GVRP ―enabled‖, the user must log back in and reconfigure those ports to ―enable‖. Any
ports which the user wants to be ―disabled‖ will require no action.
Configuration files that were created in the 1.xx.xx track can be applied to a switch/stack using the 2.xx.xx track,
however the steps defined above for configuring GVRP must be observed.
F0615-O
CUSTOMER RELEASE NOTES
To upgrade to Release 3, it is highly recommended that you first upgrade to the latest Release 2 code (02.01.37)
as detailed above. This release contains additional safeguards that check that proper code versions exist on all
members of a stack.
To upgrade from a 2.xx.xx version to a 3.xx.xx version follow the steps below:
1. At switch prompt, execute the ―dir‖ command. This will display the file names of the images existing on
device.
2. If running version 2.01.37 and a backup image exists, use the ―delete <file name>‖ command to remove
the backup image.
Use the ―copy tftp://<tftp server IP>/<path>/<image name> system:image‖ command to download the new
Release 3 image. This image is downloaded, sent to all stack members, and marked as a ―backup‖ code
image. If this download to any of the stack members is unsuccessful, an error message should be
generated.
3. Issue the ―show version‖ command to verify that the new Release 3 code image exists on all stack
members as the ―backup‖ image. If not, you should manually push this code to any stack member that is
not properly updated using the ―set switch copy-fw‖ command.
4. Once all stack members contain the new software image, use the ―set boot system <image name>‖
command to set the newly downloaded image as the ―active‖ image.
If you have a unit that is running Release 2 or older software, and you want to use the unit in a stack running
Release 3 software, you must boot the unit as a standalone unit and update its code to Release 3 before cabling
it into the existing stack.
Router Capacities
F0615-O
CUSTOMER RELEASE NOTES
Feature Capacity
OSPF LSA Type 10 – Opaque Area Not Supported
OSPF LSA Type 11 – Opaque AS Not Supported
OSPF ECMP paths 4
Static routes 64
RIP routes 2500
IP Interfaces 24
Secondary Interfaces 31
VRRP Interfaces 20
IP Helper Address 6 per interface
Access Rules (inbound only) 100
Access Rules – Per ACL 9
IGMP Groups 256
DVMRP Routes 256
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
Accounts with ―read-write‖ or ―read-only‖ permissions will be locked out after the number of sequential failed
login attempts exceeds the configured login attempts value. Once the account has been locked out, a user
account with ―super-user‖ credentials must log into the device and re-enable the ―read-write‖ / ―read-only‖
account. The expiration of the lockout timer will have no effect on the state of accounts with these access
permissions.
Accounts with ―super-user‖ permission will be locked out for the duration of the lockout timer after the number of
sequential failed login attempts exceeds the configured login attempts value. Once this timer has expired, the
―super-user‖ account will automatically be re-enabled.
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
The default broadcast suppression threshold for all ports has been set to 14881 to allow the device to be
backward compatible with previous images.
Enterasys recommends administrators consider the following recommendations before configuring the
SecureStack-C2 for a PIM-SM environment.
F0615-O
CUSTOMER RELEASE NOTES
Furthermore, a problem exists if a new IP phone is connected to a quarantined port or an existing IP phone
loses its configuration. In either of these situations, the IP phone transmits its traffic as untagged and will not
become operational on the network if the Quarantine policy role is configured to deny access to network
resources the IP phone utilizes to obtain its configuration.
Users are able to reach PWA login screen in strict mode, but they will not be able to authenticate.
The 03.02.30 code contains a new PoE driver which will require additional bootup time as the driver is being
updated on PoE units within the stack. Once the initial boot of the code has completed the delay should never be
seen again.
A RADIUS authenticated users session will not timeout on the expiration of the idle timeout.
RIP stops calculating cost properly if cost ever equaled 16. If route cost is reduced below 16, the cost will not be
propagated downstream properly.
The C2 does not allow secondary interfaces to be configured as owners of a virtual IP. The secondary interfaces
can only be configured as backups of the virtual IP.
The command ―set macauthentication portinitialize <port-string>‖ does not remove any currently active sessions.
Authenticated PWA sessions are not removed upon the expiration of the session timeout value returned from the
RADIUS server.
Users can now configure ―vlantag‖ tag rules for administering a phone policy, but the ―vlantag‖ option is no
longer supported for a policy profile index.
The MAC authentication portquietperiod defaults to 30 seconds.
A new user will not be able to re-authenticate under an existing session name until the current user logs off that
name.
If a FID is mapped to a sid through WebView, the action is executed, however if there are any fids currently
mapped to the sid they will be removed. Only the most recent mapping will be preserved.
Dynamic and static (admin) assignment of rule types is only supported for port-strings. The CLI output of ―show
policy capabilities‖ falsely lists numerous other rule types as supporting this functionality.
The host should not be configured with an ip address which contains .255 in any of the four octets. The device
will view any packets sent to this address as a subnet broadcast and the packets will be dropped, thus causing
the device to become unmanageable.
Downgrading code the on C2 device may result in loss of some configuration. If a user would like to downgrade
they should save their configuration, load the previous version of code on their device, set this older version of
code to be the boot code, and then reload the saved configuration onto the device. Note that you will not be able
to do this remotely unless you have remote console support.
If a user telnets to another device from the C2 and connectivity is interrupted to the device (i.e., spanning tree
failover) it takes approximately 9 minutes to close the telnet session. During this time the user cannot perform
any actions through the current connection.
If the CoS state is disabled but a CoS priority has been configured, the switch will continue to forward packets
with the CoS priority, however the ToS field will not be modified.
When setting the ip address on the device with the CLI command ―set ip address… ―, if the gateway is entered
before the mask, an error is returned and the ip address, mask and gateway are not configured. The user must
enter the host ip, then mask, then gateway for the command to be accepted.
If PWA is in auto mode for a port, and default policy is applied, attempting to remove the default policy fails until
PWA is disabled either by port or globally.
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
Title
ctbroadcast mib
ctRatePolicing mib
ctQBridgeMIBExt mib
ctCDP mib
ctAliasMib
ctTxQArb mib
ctDownLoad mib
etsysRadiusAuthClientMIB
etsysRadiusAuthClientEncryptMIB
etsysPolicyProfileMIB
etsysPwaMIB
etsysSyslogClientMIB
etsysConfigurationManagementMIB
etsysMACLockingMIB
etsysSnmpPersistenceMIB
etsysMstpMIB
etsysMACAuthenticationMIB
etsysletfBridgeMibExtMIB
etsysMultiAuthMIB
etsysSntpClientMIB
etsysIeee8023LagMibExtMIB
etsysVlanAuthorizationMIB
etsysCosMIB
Enterasys Networks Private Enterprise MIBs are available in ASN.1 format from the Enterasys Networks web site
at: http://www.enterasys.com/support/mibs/ . Indexed MIB documentation is also available.
F0615-O
CUSTOMER RELEASE NOTES
F0615-O
CUSTOMER RELEASE NOTES
GLOBAL SUPPORT:
By Phone: 978-684-1000
1-800-872-8440 (toll-free in U.S. and Canada)
By Email: [email protected]
By Web: http://www.enterasys.com/support/
By Fax: 978-684-1499
By Mail: Enterasys Networks, Inc.
50 Minuteman Road
Andover, MA 01810 (USA)
For information regarding the latest software available, recent release note revisions, or if you require additional
assistance, please visit the Enterasys Networks Support web site.
F0615-O