The following sections describe what is new in this release:
Note
This feature does not apply to VSP 4450 Series or XA1400 Series.
In certain situations where MACsec encrypted packets traverse intermediate non-MACsec switches, QoS visibility is lost.
This feature uses confidentiality-offset to specify that the first 30 or 50 bytes within the MACsec frame transmit without encryption, thus leaving the 802.1Q VLAN tag p-bits in the clear so that the intermediate switch can differentiate between encrypted traffic. With the 802.1Q p-bits in the clear, internal QoS priority for MACsec packets on intermediate switches can be automatically assigned.
For more information, see VOSS User Guide.
Software Release Notes
Documentation collections
Hardware and Software Compatibility Matrices
Documentation for Extreme optics
RESTCONF Reference Documentation
The support portal for Software, MIB, Vulnerability/CVE and Field Notices
GitHub information for GNS3 images
If you have installed an Extreme-branded transceiver in a port, then you can view information about the transceiver by selecting the Vendor Part Number on the DDI/SFP tab of the Port pane.
For more information, see VOSS User Guide.
Beginning with this release, you can use the following existing CLI commands in Global Configuration mode:
virtual-service copy-file WORD<1-256> WORD<1-256>
virtual-service WORD<1-128> console
virtual-service WORD <1-128> install package WORD<1-512>
virtual-service WORD<1-128> uninstall
Procedures are updated to reflect two mode support. Upgrade procedures use Global Configuration mode only to reduce mode changes.
For more information, see VOSS User Guide.
The output for the show application iqagent status CLI command is updated to provide additional information if IQ Agent is enabled but disconnected. The same information is also available in EDM. This change requires ExtremeCloud IQ Agent 0.5.55 or later.
For more information, see VOSS CLI Commands Reference.
The Extreme-Dynamic-ACL RADIUS attribute now supports a list parameter. Use the list parameter to contain ports or masks and group similar ACE commands to avoid the packet limitation. Only one list parameter can exist in one Extreme-Dynamic-ACL. The length of an individual ACE command from an Extreme-Dynamic-ACL VSA message is increased from 128 to 255 characters.
For more information, see VOSS User Guide.
When you use the RADIUS VSA Extreme-Dynamic-Config to activate DHCP Snooping or Dynamic ARP Inspection, this functionality is now only enabled on the RADIUS returned VLAN/I-SID or, in the case of no RADIUS returned VLAN/I-SID, on the untagged VLAN/I-SID already present on the port. In previous releases, the functionality was enabled on all VLANs assigned to the port and this would typically result in warning messages if the onboarding VLAN, a Private VLAN, was also on the Auto-sense port, because DHCP Snooping and Dynamic ARP Inspection are not supported on Private VLANs.
The requirement to have both DHCP Snooping and Dynamic ARP Inspection enabled across all port VLANs is only required if IP Source Guard is to be also enabled on the same port. There is no change from previous releases if you use the RADIUS VSA Extreme-Dynamic-Config to activate IP Source Guard in addition to DHCP Snooping and Dynamic ARP Inspection.
For more information, see VOSS User Guide.
The following list identifies more granular options that enhance the factory default flag behaviors:
config-only — Boots the switch with a blank configuration. This parameter preserves configuration files, primary and secondary configuration file names, user accounts and passwords, digital certificates, IKE/OSPF/IS-IS keys, and SNMP communities. All ports are disabled and assigned to VLAN 1. License files are not removed. Use this parameter as a temporary troubleshooting option to test or investigate if something is wrong with the configuration without permanently removing the configuration files, user accounts, and other preserved items.
reset-all-files — Equivalent to a switch that ships from the factory. The switch has no configuration files, default user accounts, default security mode, Auto-sense-enabled ports, and performs a ZTP+ configuration after reboot. The 30-day factory license is also reset.
Licenses files are removed.
Note
You can also use a new unconfigure switch command to achieve the same behavior.
zero-touch — Boots the switch with a default configuration that enables Auto-sense. This parameter resets secure files but keeps the security mode and performs a ZTP+ configuration after reboot. License files are not removed.
For more information, see VOSS User Guide.
In this release, the system prompts you to change the admin and read-only user default passwords when you use the web-server enable command to enable the web management interface.
For more information, see VOSS User Guide.
Multi-area SPB supports Connectivity Fault Management (CFM) on virtual nodes in both home and remote area. For remote area, the boundary nodes respond to Layer 2 ping and Layer 2 traceroute messages that contain the remote area system ID. You must enable CFM on the boundary nodes for the functionality to work.
For more information, see VOSS User Guide.
Auto-set vim-speed on 25G VIMs based on inserted transceiver type.
The switch now automatically configures the Versatile Interface Module (VIM) speed based on the detected optics, which makes it easier to deploy and to maintain the module.
Auto-set vim-speed is enabled by default.
Note
This feature only applies to VSP 4900 Series.
Auto-channelize QSFP+ and QSFP28 ports when QSA adapter or breakout cable is detected and the port operates in Auto-sense mode.
Quad Small Form-factor Pluggable (QSFP) Plus adapter to Small Form-factor Pluggable (SFP) Plus adapter
This enhancement means that you no longer have to configure channelization on supported ports.
Together these enhancements make it even easier to deploy and use your switch.
For more information, see VOSS User Guide.
This release makes the following security-related enhancements:
Secure syslog automatically reconnects after a connectivity failure
In previous releases, if connectivity failed, the switch disabled the syslog host automatically and you needed to manually retry the connection. Now, if connectivity fails, the syslog host remains enabled and the switch attempts to reconnect with the syslog server every two minutes.
SSH rekeying applies to Secure Copy (SCP) and Secure File Transfer Protocol (SFTP).
Previously, the SSH rekey data limit and time interval applied only to the SSH server and client.
If the switch operates in Enhanced Secure Mode (ESM), 3des-cbc and blowfish-cbc encryption types are disabled by default.
A new log message displays if an SSH packet exceeding 32,768 bytes is received, in both ESM and non ESM modes. In previous releases, the switch silently discarded received SSH packets exceeding 32,768 bytes. For information about log messages, see VOSS Alarms and Logs Reference .
In both ESM and non ESM modes, the switch limits the supported algorithms for Remote Access Dial-In User Services (RADIUS) Security (RADsec) proxy to the following ciphers:
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-AES256-SHA384
ECDHE-RSA-AES128-SHA256
DHE-RSA-AES256-SHA256
DHE-RSA-AES256-SHA
DHE-RSA-AES128-SHA256
DHE-RSA-AES128-SHA
Note
For RADSec implementations, as a best practice, use radsecproxy version 1.9.1 or later.
The switch no longer advertises P-192 and P-224 Transport Layer Security (TLS) elliptic curves; the switch advertises P-256, P-384, and P-521. As a best practice with RADsec, manually force the TLS version 1.2 negotiation by adding to the RADsec proxy server configuration file.
New warning messages display if the switch operates in Enhanced Secure Mode and uses unsecure algorithms. For information about log messages, see VOSS Alarms and Logs Reference .
For more information, see VOSS User Guide.