AOS-CX 10.13.1040 Release Notes

6300, 6400 Switch Series

Copyright Information

© Copyright 2024 Hewlett Packard Enterprise Development LP.

This product includes code licensed under certain open source licenses which require source compliance. The corresponding source for these components is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source code, please check if the code is available in the HPE Software Center at https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific software version and product for which you want the open source code. Along with the request, please send a check or money order in the amount of US $10.00 to:

Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.

Notices

The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.

Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.

Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website.

Acknowledgments

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Products Supported

This release applies to the 6300 and 6400 Switch series. The following table lists any applicable minimum software versions required for that model of switch.

If your product is not listed in the following table, no minimum software version is required.

Product number Product name Minimum software version
S3L75A HPE Aruba Networking 6300L 24SRX CL6 2L2Y Layer2 Switch 10.14.0006
S3L76A HPE Aruba Networking 6300L 48SR5 CL8 2L2Y Layer2 Switch 10.14.0006
S3L77A HPE Aruba Networking 6300L 48SR5 CL8/6 2L2P Layer2 Switch 10.14.0006
SOE91A HPE Aruba Networking 6300M 48p SR10 1G/2.5G/5G/10G PTP/AVB Class8 PoE and 4p 100G MACsec Switch 10.13.1000
SOX44A HPE Aruba Networking 6300M 48p SR10 1G/2.5G/5G/10G PTP/AVB Class8 PoE 4p 100G MACsec TAA Switch 10.13.1000
R8S89A Aruba 6300M 24p SR10 10Gbase-T, PTP/AVB, 60W Class6 PoE with 2 x 50G and 2 x 25G MACsec Switch 10.10.0002
R8S90A Aruba 6300M 48p SR5 (up to 5G), PTP/AVB, 90W Class 8 PoE with 2 x 50G and 2 x 25G MACsec Switch 10.10.0002
R8S91A Aruba 6300M 48p SR5 (up to 5G) 60W Class6 PoE with 12p 90W Class 8 PoE with 2x 50G and 2x10G LRM/MACsec Switch 10.10.0002
R8S92A Aruba 6300M 24p SFP+ 10G LRM support and 2 x 50G and 2 x 25G MACsec Switch 10.10.0002
SOG03A HPE Aruba Networking 6300M 24p SFP+ 1G/10G 4p SFP56 50G TAA Switch 10.14.0001
SOG04A HPE Aruba Networking 6300M 48p Smart Rate 1/2.5/5GbE Class 6 PoE and 4p SFP56 50G TAA Switch 10.14.0001
SOG05A HPE Aruba Networking 6300M 24p Smart Rate 1/2.5/5GbE Class 6 PoE and 4p SFP56 50G TAA Switch 10.14.0001
SOG06A HPE Aruba Networking 6300M 48p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch 10.14.0001
SOF99A HPE Aruba Networking 6300M 24p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch 10.14.0001
SOG00A HPE Aruba Networking 6300M 48p 10M/100M/1G 4p SFP56 50G TAA Switch 10.14.0001
SOG01A HPE Aruba Networking 6300M 24p 10M/100M/1G 4p SFP56 50G TAA Switch 10.14.0001
SOG02A HPE Aruba Networking 6300M 48p 10M/100M/1G 4p SFP56 50G Power-to-Port 2xFan PSU TAA Bundle 10.14.0001
SOG95A HPE Aruba Networking 6300F 48p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch 10.14.0001
SOG96A HPE Aruba Networking 6300F 24p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch 10.14.0001
SOG97A HPE Aruba Networking 6300F 48p 10M/100M/1G 4p SFP56 50G TAA Switch 10.14.0001
SOG98A HPE Aruba Networking 6300F 24p 10M/100M/1G 4p SFP56 50G TAA Switch 10.14.0001
JL665A Aruba 6300F 48-port 1GbE Class 4 PoE and 4-port SFP56 Switch 10.04.0001
JL666A Aruba 6300F 24-port 1GbE Class 4 PoE and 4-port SFP56 Switch 10.04.0001
JL667A Aruba 6300F 48-port 1GbE and 4-port SFP56 Switch 10.04.0001
JL668A Aruba 6300F 24-port 1GbE and 4-port SFP56 Switch 10.04.0001
R0X31A Aruba 6400 Management Module 10.04.1000
R0X38B Aruba 6400 48-port 1GbE Class 4 PoE Module 10.04.1000
R0X38C Aruba 6400 48-port 1GbE Class 4 PoE v2 Module 10.09.1000
R0X39B Aruba 6400 48-port 1GbE Class 4 PoE and 4-port SFP56 Module 10.04.1000
R0X39C Aruba 6400 48-port 1GbE Class 4 PoE and 4-port SFP56 v2 Module 10.09.1000
R0X40B Aruba 6400 48-port 1GbE Class 6 PoE and 4-port SFP56 Module 10.04.1000
R0X40C Aruba 6400 48-port 1GbE Class 6 PoE and 4-port SFP56 v2 Module 10.09.1000
R0X41A Aruba 6400 48-port HPE Smart Rate 1/2.5/5GbE Class 6 PoE and 4-port SFP56 Module 10.04.1000
R0X41C Aruba 6400 48-port HPE Smart Rate 1/2.5/5GbE Class 6 PoE and 4-port SFP56 v2 Module 10.09.1000
R0X42A Aruba 6400 24-port 10Gbase-T and 4-port SFP56 Module 10.04.1000
R0X42C Aruba 6400 24-port 10Gbase-T and 4-port SFP56 v2 Module 10.09.1000
R0X43A Aruba 6400 24-port SFP+ and 4-port SFP56 Module 10.04.1000
R0X43C Aruba 6400 24-port SFP+ and 4-port SFP56 v2 Module 10.09.1000
R0X44A Aruba 6400 48-port 10/25GbE SFP28 Module 10.04.2000
R0X44C Aruba 6400 48-port 1G/10G/25GbE SFP28 v2 Extended Tables Module 10.09.1000
R0X45A Aruba 6400 12-port 40/100GbE QSFP28 Module 10.04.2000
R0X45C Aruba 6400 12-port 40/100GbE QSFP28 v2 Extended Tables Module 10.09.1000
R0X26A Aruba 6405 Switch 10.05.0021
R0X27A Aruba 6410 Switch 10.05.0001
JL741A Aruba 6410 96-port 1GbE Class PoE 4 and 4-port SFP56 Switch 10.05.0001
S0E48A HPE Aruba Networking CX 6400 v2 32p SFP28 25G 4p QSFP28 100G MACsec Extended Tables Module 10.13.1000
S1T83A HPE Aruba Networking CX 6400 v2 24p Smart Rate 1G/2.5G/5G/10G Class8 PoE 4p SFP56 50G Module 10.13.1000

Important information for 6300 and 6400 Switches

Aruba switches covered by this release note use eMMC or SSD storage. This is non-volatile memory for persistent storage of configuration, files, databases, scripts, and so forth. Aruba recommends updating to version 10.06.0100 or later (including this release) to implement significant improvements to memory usage and prolong the life of the switch.

Do not interrupt power to the switch during a software update.

If using the WebUI, you should clear the browser cache after upgrading to this version of software before logging in to the switch using a WebUI session. This will ensure the WebUI session downloads the latest changes. Do not upgrade to 10.13 using REST API or WebUI unless your switch is running 10.09.1060, 10.10.1020 or later versions of these releases.

Switch fans will run at full speed when a fault is detected with the temperature sensors in the switch. This is normal behavior to ensure overheating does not occur. Should the fans run at full speed at unexpected times, check the output of show environment temperature and show environment fans, then contact support for further assistance.

AOS-CX BGP

AOS-CX BGP implementations support resolving a BGP route's nexthop to a default route (0.0.0.0/0). However, this is not generally recommended in network deployments. Considering the default route to be the last resort route, resolving the BGP route's nexthop to a default route can cause potential routing loops in the network, if they are not properly designed and monitored. Route flaps and/or traffic drops may be observed in such cases.

In 10.11.0001, the command route recursive-lookup default-route has been introduced under the vrf context to support BGP route's nexthop resolving to a default route in the Route table. This command is enabled by default.

RPVST and VLAN Configuration

If a switch has RPVST enabled and the native VLAN ID configured for a trunk interface is not the default VLAN ID 1, and the native VLAN ID is also used as the management VLAN, the switch may not be accessible over the trunk interface after upgrading from any 10.04.00xx version of software.

To fix the issue after an upgrade, log into the switch using the OOBM interface or serial port console and configure the following:

switch# configure
switch(config)# spanning-tree rpvst-mstp-interconnect-vlan <VLAN ID>

where <VLAN_ID> is the native VLAN ID configured on the trunk interface.

If there are multiple trunk interfaces configured on the switch, each with a different VLAN ID, contact the Aruba Support Team.

PoE Feature and Software Upgrades

If the switch has the always-on PoE feature enabled, during the upgrade from a version of software prior to 10.05.0001 to this version of software, PoE Powered Devices (PDs) will lose power from the switch as the switch will power cycle during the update. Plan a time for upgrading the switch when loss of power to the PDs attached to the switch can be mitigated.

Restoring Previous Configuration

To restore a previous configuration when downgrading to a previous version of software, follow these steps:

  1. Use the show checkpoint command to see the saved checkpoints and ensure that you have a checkpoint that is an exact match of the target software version (see the Image Version column in the output of the command, for example, FL.10.0x.yyyy). This checkpoint can be the startup-config-backup automatically created during the initial upgrade or any other manually created checkpoint for the target software version.
  2. Copy the backup checkpoint into the startup-config.
  3. Boot the switch to the target version (lower version), making sure to select no when prompted to save the current configuration.

AOS-CX 10.13 is a Long Supported Release (LSR)

For information about Short Supported Releases (SSRs) and Long Supported Releases (LSRs), see https://www.arubanetworks.com/support-services/end-of-life/arubaos-software-release/.

Upgrade Path

To upgrade to: Your switch must be running this version or later:
AOS-CX 10.13.xxxx AOS-CX 10.10.0002
AOS-CX 10.12.xxxx AOS-CX 10.09.0002
AOS-CX 10.11.xxxx AOS-CX 10.08.0001
Note: 10.11 is an SSR, recommended release is 10.11.0001
AOS-CX 10.10.xxxx AOS-CX 10.06.0110
Note: 10.10 is an LSR, recommended release is 10.10.10xx.
AOS-CX 10.09.xxxx AOS-CX 10.06.0110
Note: 10.09 is an SSR, recommended release is 10.09.10xx.
AOS-CX 10.08.xxxx AOS-CX 10.05.0001
Note: 10.08 is an SSR, recommended release is 10.09.10xx.
AOS-CX 10.07.xxxx AOS-CX 10.04.0001
Note: 10.07 is an SSR, recommended release is 10.09.10xx.

Refer to the Approved Product Lists sites for the Common Criteria, FIPS 140-2 and DoDIN APL to obtain the product certification details. Products should be used as evaluated and defined in the respective configuration guides.

This product includes code licensed under the GNU General Public License, the GNU Lesser General Public License, and/or certain other open-source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:

Hewlett Packard Enterprise Company
Attn: General Counsel
6280 America Center Drive
San Jose, CA 95002
U.S.A.

Please specify the product and version for which you are requesting source code. You may also request a copy of this source code free of charge at: https://hpe.com/software/opensource

Version history

All released versions are fully supported by Aruba, unless noted in the table.

Version number Release date Remarks
10.13.1040 01/08/2024 Released, fully supported, and posted on the Web.
10.13.1030 27/06/2024 Released, fully supported, and posted on the Web.
10.13.1020 20/05/2024 Released, fully supported, and posted on the Web.
10.13.1010 09/04/2024 Released, fully supported, and posted on the Web.
10.13.1000 31/01/2024 Released, fully supported, and posted on the Web.
10.13.0005 14/11/2023 Released, fully supported, and posted on the Web.

Compatibility/interoperability

The switch web agent supports the following web browsers:

Browser Minimum supported versions
Edge (Windows) 41
Chrome (Ubuntu) 76 (desktop)
Firefox (Ubuntu) 113
Safari (MacOS) 12
Safari (iOS) 10 (Version 12 is not supported)

Internet Explorer is not supported.

Recommended versions of network management software for switches found in this release note:

Management software Recommended version(s)
NetEdit Refer to the AOS-CX and NetEdit Compatibility Matrix.
Aruba Central 2.5.7
AirWave 8.3.0.2
Central On-Premises 2.5.7.3
Aruba Fabric Composer 7.0.3
Aruba CX Mobile App Support coming in future release.
IMC (708P03) 6410 Switch Series not supported

For more information, see the respective software manuals.

To upgrade software using NetEdit, make sure to upgrade to the above version of NetEdit first and then execute the switch software upgrade on devices discovered by this version of NetEdit.

Enhancements

There are no enhancements introduced in this release.

Resolved Issues

This section lists fixes found in this branch of the software. The Symptom statement describes what a user might experience if this issue is seen on the network. The Scenario statement provides additional environment details and trigger summaries. When available, the Workaround statement provides a workaround to the issue for customers who chooses not to update to this version of software.

For a list of issues resolved in the previous releases of 6300 and 6400 switches, refer to the AOS-CX Release Notes Portal.

The Bug ID is used for tracking purposes.

Resolved Issues

Category Bug ID Description
Chassis Manager 316154 (For 6400 Switch series only)
Symptom: After ZTP, some modules fail to apply the config from ZTP configuration file.
Scenario: This issue is seen in a ZTP provisioning scenario where the uplink is connected via data plane and the configuration file specifies only one generation of v1 or v2 card. However, if the switch has a few cards from other generations, then those cards may not properly populate their config.
Workaround: Using MGMT port for ZTP or, change the ZTP configuration to specify the exact generation of cards in the chassis.
IGMP 317760 (For 6300 Switch series only)
Symptom: Switches incorrectly generated the debug|LOG_ERR|CDTR|1|MLD|MLD|MGMD_DEBUG MgmdOvsDbVGPS_UpdateVGPEntry update failed logs.
Scenario: This issue is seen when the switches incorrectly log OVSDB update for VXLAN tunnels.
Transceivers 317033 (For 6300 Switch series only)
Symptom: The PMD daemon crashes unexpectedly.
Scenario: This issue is seen when a third-party transceiver with invalid memory values is plugged to the switch.
Workaround: Use the HPE supported transceiver.
AAA 318883 Symptom: 802.1X authentication failed for a few clients.
Scenario: This issue occurs when 802.1X clients authenticate using the EAP-TEAP method.
PoE 317110 Symptom: PoE device (PD) will not get detected and hence, the switch will not deliver power to PD.
Scenario: This issue is observed when NEATPAD PDs are connected to class6 and above class type PoE switches.
Workaround: It is recommended to use an ALT-A PoE config.
REST 302889 Symptom: Growth in the boot.log file size may lead to an increased RAM utilization.
Scenario: This issue can be triggered by a high rate of unauthorized or wrong requests to the REST HTTPS server, which could either occur during malicious attacks or vulnerability tool tests.
IP Directed Broadcast 318235 Symptom: The IPDB packets are not flooded to all the tunnel ports in a VXLAN environment.
Scenario: When IGMP/MLD and IPDB are enabled together on a VLAN, the VLAN router detected ports were added as the flood portset for IPDB traffic flow, instead of all the tunnels which are a part of the VLAN.
Workaround: Disable IGMP/MLD on the VLAN if multicast clients can be moved to a different VLAN.
Boot 314354 Symptom: A kernel panic was observed during the boot-up or while rebooting the switch.
Scenario: This issue occurs when the USB-A serial cable is disconnected while booting from ServiceOS to ProductOS.
Activate 317632 Symptom: Some switches reach out to the Google Public DNS server: 8.8.8.8.
Scenario: This issue is observed when there is no DNS server or DNS hosts configuration and when the aruba-central feature is enabled.
Workaround: Disable the aruba-central functionality.
SNMP 312998 Symptom: The values of the SNMP objects, snmpEngineBoots and snmpEngineTime did not increment.
Scenario: This issue is seen when users check the packet capture for the generated SNMP traps.
GPO 317368 (For 6300 Switch series only)
Symptom: Ping failure is observed in a few switches.
VSX Sync 309500 Symptom: VSX-Sync is no longer syncing after a command for BGP to redistribute to OSPF with a route map is used.
Scenario: This issue is seen on a pair of switches in a VSX configuration, with syncing for BGP active and when the user configures a redistribution for BGP to OSPF with a route map on the primary switch. After this configuration, VSX-Sync won't sync the redistribution configuration or any other new configuration.
Workaround: Either remove the redistribution configuration or disable BGP syncing.
ARP 315962 Symptom: Some hosts experience connectivity issues.
Scenario: This issue is observed in an ARP suppression enabled EVPN environment where hosts experience connectivity issues due to a missing associated ARP entry.
Workaround: Add and remove the static ARP entry using the following CLI commands:
interface vlan <vlan id>
arp ipv4 <IPV4_ADDR> mac <MAC_ADDR>
no arp ipv4 <IPV4_ADDR> mac <MAC_ADDR>

Feature Caveats

The following are feature caveats that should be taken into consideration when using this version of the software.

Feature Description
Physical Port Symptom: Link drops might be observed when the DAC cables, S1J07A or S1J08A is used for the products, S0E91A and S0X44A.
Scenario: This issue is observed after upgrading the switches from 10.13.1000 or a later 10.13.1xxx version using VSF ISSU.
Workaround: The products, S0E91A and S0X44A must be rebooted after an upgrade. Upgrade either the entire stack or only the stand alone switches based on your deployment. For stack with a mix of S0E91A, S0X44A, and other 6300 switches, either reboot the entire stack or perform ISSU and then manually reboot only the S0E91A and S0X44A switches using the vsf member <1-10> reboot command.
User Based Tunnel The switch does not support double encapsulation. A packet can be encapsulated with either L2GRE (UBT) or VXLAN, but not both. The network administrator should decide the tunneling type to be used, and then plan the configuration accordingly.
User Based Tunnel In the event of license issues when onboarding an DUT to primary or backup mobility conductor, the DUT will not try to bootstrap to other mobility conductor where a license is available. For example, a if mobility conductor does not have a license to on-board the DUT but mobility conductor does have adequate licenses, if both mobility conductors are reachable then UBT will be down, and the DUT will not attempt to bootstrap to the backup controller. However, if the primary mobility conductor is not reachable, the DUT gets tunneled to the standby/backup mobility conductor. Once the primary mobility conductor reachable by the DUT once again, the DUT will not automatically bootstrap back to the primary. Network administrators should manually disable and enable UBT on the DUT to re-establish the tunnel to the primary mobility conductor.
Central When a switch is able to connect to Aruba Central but is not registered in the Aruba Central inventory or does not have a proper license, the switch will get disconnected. If the Aruba Central feature is enabled using this command, the switch will then reconnect back to Aruba Central and will get disconnected again. This connect/disconnect process will continue until the switch is properly registered in Aruba Central. To avoid this unnecessary reconnection cycle, best practices is to disable Aruba Central until the switch is registered in Aruba Central, or a license is obtained for that device.
Hot Patch When a hot-patch file download is triggered using the switch WebUI, log messages can incorrectly state that the file is added to the database with a missing status. This is a temporary state, and will correctly change to Not applied once the download is completed.
PIM-SM Pim Active-Active is not supported on overlay VXLAN SVIs.
SNMP When SNMP is enabled via the switch CLI, it can take between 1-2 minutes for the SNMP daemon to be ready to respond to requests. If a local or external SNMP MIB walk is performed in the interval between when SNMP is first enabled and the SNMP daemon is ready, the MIB walk action will return an error.
VXLAN VXLAN encapsulation does not copy the ECN bits from inner header to outer header. If you create a traffic stream between connected hosts and enable the ECN bit for the hosts and start the traffic, a traffic capture may show that ECN bits aren't copied from the inner header to the outer header.
Certificates When a switch uses a certificate with a legacy certificate name that is not supported in 10.12 because it contains disallowed characters, the information will migrate properly in the upgrade, but that certificate can no longer be edited. For new certificate names, only alphanumeric characters, dots, dashes, and underscores are allowed.
REST Boundary values for match vni and set local preference in a route-map system cannot be set via the REST API and must be manually configured on the switch via the CLI.
ACLs NOTE: Applies only to the Aruba 6300 Switch Series.
In a VSF stack, the switch may fail to log events for the matching access-list entries. ACL functionality is not impacted; access-list entries are applied properly and only the logging is incorrectly generated.
Aruba CX Mobile App VSF stack formation is blocked when there are reserved autojoin interfaces (25, 26, 49, 50) in the stack topology.
BGP In environments with VRRP or VSX peers, while performing mutual route leaking on the VRRP peers with BGP neighborship established in between and towards the upstream network, the switch will install both routes as ECMP instead of preferring the leaked routes. Use route-maps to give lower/higher preference to the routes received from an iBGP peer. For example:
!
route-map rmap permit seq 10
! set local-preference 50
router bgp 100
 vrf red
 neighbor 1.1.1.2 remote-as 100
 address-family ipv4 unicast
 neighbor 1.1.1.2 activate
 neighbor 1.1.1.2 route-map rmap in
 exit-address-family
!
In the above example, since a lower value of local-preference (i.e. 50, whereas default value is 100) has been set to the routes received from iBGP peer, the leaked routes get preferred and get installed as best routes.
BGP The next-hop-unchanged option needs to be explicitly configured to preserve nexthop while advertising routes to eBGP peers, in the L2VPN EVPN address-family. For example:
router bgp 1
 neighbor 1.1.1.1 remote-as 2
 address-family 12vpn evpn
 neighbor 1.1.1.1 activate
 neighbor 1.1.1.1 next-hop-unchanged
 neighbor 1.1.1.1 send-community extended
 exit-address-family
!
Classifiers For Classifier policy modifications to be secure, Aruba strongly encourages modifications be done as a three-step process: Bring down the port, modify, and bring the port back up.
Classifiers Policies containing both MAC and IPv6 classes are not allowed.
CMF No other checkpoint besides "startup-configuration" gets migrated during the upgrade process.
Counters (6400 only) Bytes/errors/drops count in show interface <IF-NAME> and show interface <IF-NAME> queues can have up to 10% deviation. This will manifest mainly when running at line rate with small packet sizes and after a port goes up/down.
Counters (6400 only) The "Bytes" counter is not supported in show interface <IF-NAME> queues output.
DHCP Server, DHCP Relay, and DHCP Snooping DHCP Relay and DHCP Snooping can co-exist on the same switch. DHCP Snooping and DHCP Server cannot co-exist on the same switch. DHCP Snooping, DHCP Relay, and DHCP Server together cannot co-exist on the same switch.
EVPN The iBGP split-horizon rule is not followed between different address families.
Flow control (6400 only) Flow control is not supported.
IP-SLA Reserved ports or ports used by other applications/services with in the system are not recommended to be used for other services. When two services use the same port there is chance of unexpected behaviors from these services. Best practices is to use unique port for each service across system.
ICMP Redirect The switch may only software forward at a rate of 100pps if the packets that trigger ICMP redirect.
IGMP/PIM on 6-in-6, Loopback and GRE interfaces IGMP cannot be enabled on either Loopback or GRE interfaces. IGMP and PIM is not supported on a 6-in-6 Tunnel.
Line module Hot Swap and Reboot (6400 only) Concurrent physical hot insert/removal or reboot of a line-module is not supported. Subsequent insert/removal or reboot of a line-module must be initiated only after preceding attempts have been completely processed by the system. For hot insert you must wait until the preceding line-module has reached the "ready" state before inserting subsequent line-modules. For hot removal you must wait until the line-module is no longer present in the system. See the CLI command show module for line-module status information. Aruba recommends line-modules be gracefully shut down before removal. Use the CLI config command module <SLOT-ID> admin-state [diagnostic | down | up] to change the administrative state of the line-module. Line module reboot and hot removal is not a hitless operation. Up to 2 seconds of traffic loss may be expected when any module is rebooted or removed from the system. Hot insert does not result in any traffic loss.
MACsec In an environment with a Cisco device, the Cisco device must be designated as the key server. Designating the AOS-CX as the key server results in complete traffic loss.
MACsec In an environment with Cisco and FlexFabric or H3C devices, do not update confidentiality-offset on the live channel. There can be complete traffic loss for an extended period on the MACsec channel when confidentiality-offset is updated on both ends.
MACsec MACsec uses a software-based implementation to track start and stop times for secure channels and secure associations. As the implementation is software-based, the stop times for MACsec secure channel and secure associations are only updated when they are deleted and therefore never updated in the output of the show macsec status detailed command.
MACsec and UDLD In an environment with devices running AOS-Switch, do not enable UDLD on the same link. The UDLD session can toggle between up and down continuously when both MACsec and UDLD is enabled on the same link.
MACsec In an environment with Cisco devices, when the GCM-AES-XPN-128 or GCM-AES-XPN-256 cipher suite is used for establishing the MACsec channel, the MKA policy on the Cisco device must be configured with ssci-based-on-sci.
MACsec MACsec works between a CX device and a Windows VM running AnyConnect with AES-128 cipher. AnyConnect does not support AES-256 in the NAM module (works only for the VPN module).
MACsec When Cisco AnyConnect is used as dot1x supplicant, it is recommended to configure cak-length to be 16 under dot1x-authenticator mode.
MACsec Ensure the cipher suite GCM-AES-128 is configured when AOS-CX is acting as a key server. This is because, by default AOS-CX will use the most secure cipher suite gcm-aes-xpn-256 for establishing MACsec secure link and Comware/PVOS doesn't support an XPN cipher suite.
Multicast and VXLAN
  • VXLAN must be configured prior to configuring VSX.
  • IPv6 multicast is not supported for VXLAN overlay.
  • Multicast support for static VXLAN in the overlay has limited support. Contact Aruba Support for details.
Priority queues (6400 only) A maximum of four (4) priority queues is supported.
RADIUS Authorization by means of HPE VSAs is not supported.
Reduction in TCAM entries (6400 only) On some line cards, a small number (~200) of TCAM entries are used for internal purposes.
REST REST supports the 'admin' and 'operator' roles but does not work with TACACS+ command authorization.
RIP/RIPng Redistribute RIP/RIPng is not supported in BGP/BGP+.
RIP/RIPng RIP/RIPng metric configuration support is not available.
SFTP When the path to the SFTP server crosses segments with different MTU frame sizes, file transfers will fail. Configure the same MTU on all network segments on the path to the SFTP server to use SFTP to transfer files.
Sub-interface BFD is not supported on a sub-interface. A sub-interface as underlay for EVPN-VXLAN is not supported.
Tunnels When configuring tunnels (VXLAN/IP tunnels) with the underlay as a static route, the next-hop IP should be an SVI or ROP IP and not configured as the Active-Gateway.
VRF VRF names are limited to 31 characters.
VRRP-MD5 authentication interop Not supported with Comware-based switches.
Traceroute Issuing the traceroute command with the ip-option loosesourceroute parameter fails in an overlay EVPN-VxLAN deployment.
Traceroute Traceroute v4/v6 over VXLAN fails to find intermediate next-hop IP information from a source VTEP in Virtual Active Gateway environment (the SVI is the same as the Active Gateway IP).
VRRP VRRP Preemption Delay Timer (preempt delay minimum) may be ignored after a switch reboot or power cycle.
VRRP and VXLAN VRRP and VXLAN are mutually exclusive.
PTP (6300 Switch Series only) End clients offset might be slightly high when using PTP Default profile 1588v2 with default PTP parameters (1 PPS).

Known Issues

The following are known open issues with this branch of the software. The Symptom statement describes what a user might experience if this is seen on the network. The Scenario statement provides additional environment details and trigger summaries. When available, the Workaround statement provides a workaround to the issue.

Category Bug ID Description
L3 Routes 207077 Symptom: Traffic convergence takes approximately two minutes when VSF switchover is performed.
Scenario: This issue occurs when traffic is flowing through the switch using the uplink on the conductor. Performing a VSF switchover causes the standby to become the new conductor, and it takes approximately 2 minutes for traffic to resume using the uplink of the new conductor.
Workaround: If the Uplink from the VSF is a LAG with members in Conductor/Standby/Member, the convergence time would be lesser and around 70 seconds.
TFTP 269619 Symptom: TFTP Software image upload/download transfer operation fails.
Scenario: Downloading/uploading the software Image via sm ubuntu IPv6 TFTP server fails.
Workaround: Use the blocksize option in the copy command with a blocksize of 1375 or less. For example :
copy tftp://[20:1::100];blocksize=1375/image.swi secondary
vrf vrf1
MACsec 240672 Symptom: Traffic is dropped for a few seconds on a MACsec channel during a VSF switchover.
Scenario: When the MACsec channel has data-delay protection enabled, there can be traffic drops for a few seconds on the channel post a VSF switchover due to the reset of the MKA session on the interface.
Workaround: Do not use data-delay protection in a MACsec policy if the system is deployed as a VSF stack.
Port-Access Policy 295644 Symptom: Traffic loss occurs on the switch, where RADIUS responses or other traffic on the switch gets dropped, and new clients do not get onboarded.
Scenario: When all ABP / Reflexive ACL clients log off or age out, the switch can start dropping the traffic.
Workaround: Enable a group-based policy (GBP) on the switch.

Upgrade information

AOS-CX 10.13.1040 for the 6400 Switch series uses ServiceOS FL.01.14.0002

Original Release Intermediate Upgrade Release Final Upgrade Releases
10.09.0001 - 10.09.1050 10.10.1020 or later 10.10.xxxx release 10.13.xxxx
10.09.0001 - 10.09.1050 10.10.0001 - 10.10.1010 10.13.xxxx
10.09.1060 or later 10.09.xxxx release 10.10.1020 or later 10.10.xxxx release 10.12.0006 or later 10.12.xxx release, or 10.13.xxxx
10.10.1020 or later 10.10.xxxx release 10.12.0006 or later 10.12.xxx release, or 10.13.xxxx

For 6400 only: To execute an In Service Software Upgrade (ISSU) to your switch must be running one of the following supported releases:

From Supported Versions for Upgrade
10.13.0005 10.13.1000 or later versions
10.13.1000 10.13.1010 or later versions
10.13.1010 10.13.1020 or later versions
10.13.1020 10.13.1030 or later versions
10.13.1030 10.13.1040

Manual configuration restore for software downgrade

To restore a previous configuration when downgrading to a previous version of software, follow these steps:

  1. Use the show checkpoint command to see the saved checkpoints and ensure that you have a checkpoint that is an exact match of the target software version (see the Image Version column in the output of the command, for example, FL.10.xx.yyyy). This checkpoint can be the startup-config-backup automatically created during the initial upgrade or any other manually created checkpoint for the target software version.
  2. Copy the backup checkpoint into the startup-config.
  3. Boot the switch to the target version (lower version), making sure to select no when prompted to save the current configuration.

Hardware updates

The 6400 switch series chassis hardware images may have a different upgrade sequence if programmable device updates are pending that require a power cycle. To determine if there are pending upgrades:

  1. Issue the command show needed-updates [next-boot [primary|secondary]] and check the output of the command see if it indicates that one or more devices need to be updated.
  2. Issue the command show needed-updates [primary|secondary] and check the output to see which updates are required for the current switch image.
  3. Issue the command allow-unsafe-updates <NUM_MINUTES> if any non-failsafe device such as an icbbp_secondary needs to be updated.
  4. Issue the command show fabric and show module repeatedly until the output of this command shows that all modules are in the Ready state.
  5. Perform a manual chassis power-cycle. If no remote power control is available, physically unplug all the power cables wait at least ten seconds, and plug the power cables back in. This is the only way to clear the write-protection security set on the switch hardware.
  6. Wait for the chassis to reboot, and log in to the command-line interface as an admin user (or with an account with similar privileges).
  7. Issue the command show fabric and show module repeatedly until the output of this command shows that all modules are in the Ready state.
  8. Issue the command show needed-updates.
  9. If the output of the command show needed-updates doesn't report any further needed updates or other issues such as a needed power-cycle, then the switch update is complete.
  10. However, if icbbp_primary was updated since the last chassis power-cycle, you may need to repeat this process and perform a second power cycle, to get the newly-updated switch image.

Performing the software upgrade

For additional upgrade and downgrade scenarios, including limitations of automatic upgrade and downgrade scenarios provided by the Configuration Migration Framework (CMF), refer to the AOS-CX 10.13 Fundamentals Guide.

This version may contain a change of BootROM from the current running version. A BootROM update is a non-failsafe update. Do not interrupt power to the switch during the update process or the update could permanently damage the device.

  1. Copy the new image into the non-current boot bank on the switch using your preferred method.
  2. Depending on the version being updated, there may be device component updates needed. Preview any devices updates needed using the boot system <BOOT-BANK> command and entering n when asked to continue.

For example, if you copied the new image to the secondary boot bank and no device component updates are needed, you will see this:

switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? n

In this example, three device updates will be made upon reboot, one of which is a non-failsafe device:

switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
3 device(s) need to be updated during the boot process.
The estimated update time is between 2 and 3 minute(s).
There may be multiple reboots during the update process.
1 non-failsafe device(s) also need to be updated.
Please run the 'allow-unsafe-updates' command to enable these updates.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? n

3. When ready to update the system, if a non-failsafe device update is needed, make sure the system will not have any power interruption during the process. Invoke the allow unsafe updates command to allow updates to proceed after a switch reboot. Proceed to step 4 within the configured time.

switch# config
switch(config)#2 allow-unsafe-updates 30
This command will enable non-failsafe updates of programmable devices for the next 30 minutes. You will first need to wait for all line and fabric modules to reach the ready state, and then reboot the switch to begin applying any needed updates. Ensure that the switch will not lose power, be rebooted again, or have any modules removed until all updates have finished and all line and fabric modules have returned to the ready state.
WARNING: Interrupting these updates may make the product unusable!
Continue (y/n)? y
Unsafe updates : allowed (less than 30 minute(s) remaining)

4. Use the boot system <BOOT-BANK> command to initiate the upgrade. On the switch console port an output similar to the following will be displayed as various components are being updated:

switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
3 device(s) need to be updated during the boot process.
The estimated update time is between 2 and 3 minute(s).
There may be multiple reboots during the update process.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? y
The system is going down for reboot.
Looking for SVOS.

Primary SVOS: Checking...Loading...Finding...Verifying...Booting...

ServiceOS Information:
Version: <serviceOS number>
Build Date: yyyy-mm-dd hh:mm:ss PDT
Build ID: ServiceOS:<serviceOS number>:6303a2a501ba:202006171659
SHA: 6303a2a501bad91100d9e71780813c59f19c12fe

Boot Profiles:
0. Service OS Console
1. Primary Software Image [xx.10.12.1000]
2. Secondary Software Image [xx.10.13.0001]

Select profile(secondary):

ISP configuration:
Auto updates : enabled
Version comparisons : match (upgrade or downgrade)
Unsafe updates : allowed (less than 29 minute(s) remaining)

Advanced:
Config path : /fs/nos/isp/config [DEFAULT]
Log-file path : /fs/logs/isp [DEFAULT]
Write-protection : disabled [DEFAULT]
Package selection : 0 [DEFAULT]

3 device(s) need to be updated by the ServiceOS during the boot process.
The estimated update time by the ServiceOS is 2 minute(s).
There may be multiple reboots during the update process.

MODULE 'mc' DEVICE 'svos_primary' :
Current version : '<serviceOS number>'
Write-protected : NO
Packaged version : '<version>'
Package name : '<filename>.svos'
Image filename : '<svos_package_name>'
Image timestamp : 'Day Mon dd hh:mm:ss yyyy'
Image size : 22248723
Version upgrade needed

Starting update...
Writing... Done.
Erasing.. Done.
Reading... Done.
Verifying... Done.
Reading.. Done.
Verifying... Done.
Update successful (0.5 seconds).
reboot: Restarting system

Multiple components may be updated and several reboots will be triggered during these updates. When all component updates are completed, the switch console port will arrive at the login prompt with a display similar to following:

(C) Copyright 2017-2023 Hewlett Packard Enterprise Development LP
RESTRICTED RIGHTS LEGEND
Confidential computer software. Valid license from Hewlett Packard Enterprise Development LP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:
Software feature updates
New product announcements
Special events
Please register your products now at: https://asp.arubanetworks.com

switch login:

Aruba recommends waiting until all upgrades have completed before making any configuration changes.

Chapter 2

Other resources

Aruba is committed to ensuring you have the resources you need to be successful. Check out these learning and documentation resources:

Chapter 3

Aruba security policy

A Security Bulletin is the first published notification of security vulnerabilities and is the only communication vehicle for security vulnerabilities.

The Aruba security policy can be found at https://www.arubanetworks.com/en-au/support-services/sirt/.
Security bulletins can be found at https://www.arubanetworks.com/en-au/support-services/security-bulletins/. You can sign up at https://sirt.arubanetworks.com/mailman/listinfo/security-alerts_sirt.arubanetworks.com to initiate a subscription to receive future Aruba Security Bulletin alerts via email.

PDF preview unavailable. Download the PDF instead.

rn 6300-6400 10-13-1040 madbuild

Related Documents

Preview AOS-CX 10.13.1000 Release Notes for 6300 and 6400 Switch Series
This document provides release notes for AOS-CX version 10.13.1000, detailing supported products, important information, resolved issues, feature caveats, known issues, and upgrade procedures for the Aruba 6300 and 6400 Switch Series.
Preview AOS-CX 10.12.1010 Release Notes for 6300 and 6400 Switch Series
This document provides release notes for AOS-CX version 10.12.1010, detailing supported products, enhancements, resolved issues, and feature caveats for the Aruba 6300 and 6400 Switch Series.
Preview AOS-CX 10.06.0113 Release Notes for 6300 and 6400 Switch Series
Comprehensive release notes for Aruba AOS-CX software version 10.06.0113, detailing software enhancements, bug fixes, known issues, and upgrade instructions for the Aruba 6300 and 6400 Switch Series.
Preview HPE Aruba Networking 6300F/M Switch Series: Installation and Getting Started Guide
Comprehensive guide for installing and getting started with HPE Aruba Networking 6300F/M Switch Series. Covers setup, configuration, troubleshooting, and specifications for network administrators.
Preview AOS-CX 10.06.0120 Release Notes for 6300 and 6400 Switch Series
This document provides release notes for AOS-CX 10.06.0120, detailing software versions, supported products, important information, enhancements, fixes, and known issues for the Aruba 6300 and 6400 Switch Series.
Preview AOS-CX 10.09 Virtual Switching Framework (VSF) Guide for 6200 and 6300 Switch Series
This guide provides comprehensive information on configuring and managing the AOS-CX 10.09 Virtual Switching Framework (VSF) for Aruba 6200 and 6300 Switch Series. Learn about VSF behavior, connection topologies, and essential configuration tasks for creating a unified network device.
Preview AOS-CX 10.10.1120 Release Notes for 6300 and 6400 Switch Series
This document provides release notes for AOS-CX version 10.10.1120, detailing supported products, enhancements, fixes, known issues, and upgrade information for the Aruba 6300 and 6400 Switch Series.
Preview AOS-CX 10.12.1020 Release Notes for 6300 and 6400 Switch Series
Detailed release notes for Aruba AOS-CX software version 10.12.1020, covering supported products, enhancements, resolved issues, known issues, and upgrade procedures for the 6300 and 6400 Switch Series.