AOS-CX 10.13.1040 Release Notes
6300, 6400 Switch Series
Copyright Information
© Copyright 2024 Hewlett Packard Enterprise Development LP.
This product includes code licensed under certain open source licenses which require source compliance. The corresponding source for these components is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source code, please check if the code is available in the HPE Software Center at https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific software version and product for which you want the open source code. Along with the request, please send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Products Supported
This release applies to the 6300 and 6400 Switch series. The following table lists any applicable minimum software versions required for that model of switch.
If your product is not listed in the following table, no minimum software version is required.
Product number | Product name | Minimum software version |
---|---|---|
S3L75A | HPE Aruba Networking 6300L 24SRX CL6 2L2Y Layer2 Switch | 10.14.0006 |
S3L76A | HPE Aruba Networking 6300L 48SR5 CL8 2L2Y Layer2 Switch | 10.14.0006 |
S3L77A | HPE Aruba Networking 6300L 48SR5 CL8/6 2L2P Layer2 Switch | 10.14.0006 |
SOE91A | HPE Aruba Networking 6300M 48p SR10 1G/2.5G/5G/10G PTP/AVB Class8 PoE and 4p 100G MACsec Switch | 10.13.1000 |
SOX44A | HPE Aruba Networking 6300M 48p SR10 1G/2.5G/5G/10G PTP/AVB Class8 PoE 4p 100G MACsec TAA Switch | 10.13.1000 |
R8S89A | Aruba 6300M 24p SR10 10Gbase-T, PTP/AVB, 60W Class6 PoE with 2 x 50G and 2 x 25G MACsec Switch | 10.10.0002 |
R8S90A | Aruba 6300M 48p SR5 (up to 5G), PTP/AVB, 90W Class 8 PoE with 2 x 50G and 2 x 25G MACsec Switch | 10.10.0002 |
R8S91A | Aruba 6300M 48p SR5 (up to 5G) 60W Class6 PoE with 12p 90W Class 8 PoE with 2x 50G and 2x10G LRM/MACsec Switch | 10.10.0002 |
R8S92A | Aruba 6300M 24p SFP+ 10G LRM support and 2 x 50G and 2 x 25G MACsec Switch | 10.10.0002 |
SOG03A | HPE Aruba Networking 6300M 24p SFP+ 1G/10G 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG04A | HPE Aruba Networking 6300M 48p Smart Rate 1/2.5/5GbE Class 6 PoE and 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG05A | HPE Aruba Networking 6300M 24p Smart Rate 1/2.5/5GbE Class 6 PoE and 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG06A | HPE Aruba Networking 6300M 48p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch | 10.14.0001 |
SOF99A | HPE Aruba Networking 6300M 24p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG00A | HPE Aruba Networking 6300M 48p 10M/100M/1G 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG01A | HPE Aruba Networking 6300M 24p 10M/100M/1G 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG02A | HPE Aruba Networking 6300M 48p 10M/100M/1G 4p SFP56 50G Power-to-Port 2xFan PSU TAA Bundle | 10.14.0001 |
SOG95A | HPE Aruba Networking 6300F 48p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG96A | HPE Aruba Networking 6300F 24p 10M/100M/1G Class4 PoE 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG97A | HPE Aruba Networking 6300F 48p 10M/100M/1G 4p SFP56 50G TAA Switch | 10.14.0001 |
SOG98A | HPE Aruba Networking 6300F 24p 10M/100M/1G 4p SFP56 50G TAA Switch | 10.14.0001 |
JL665A | Aruba 6300F 48-port 1GbE Class 4 PoE and 4-port SFP56 Switch | 10.04.0001 |
JL666A | Aruba 6300F 24-port 1GbE Class 4 PoE and 4-port SFP56 Switch | 10.04.0001 |
JL667A | Aruba 6300F 48-port 1GbE and 4-port SFP56 Switch | 10.04.0001 |
JL668A | Aruba 6300F 24-port 1GbE and 4-port SFP56 Switch | 10.04.0001 |
R0X31A | Aruba 6400 Management Module | 10.04.1000 |
R0X38B | Aruba 6400 48-port 1GbE Class 4 PoE Module | 10.04.1000 |
R0X38C | Aruba 6400 48-port 1GbE Class 4 PoE v2 Module | 10.09.1000 |
R0X39B | Aruba 6400 48-port 1GbE Class 4 PoE and 4-port SFP56 Module | 10.04.1000 |
R0X39C | Aruba 6400 48-port 1GbE Class 4 PoE and 4-port SFP56 v2 Module | 10.09.1000 |
R0X40B | Aruba 6400 48-port 1GbE Class 6 PoE and 4-port SFP56 Module | 10.04.1000 |
R0X40C | Aruba 6400 48-port 1GbE Class 6 PoE and 4-port SFP56 v2 Module | 10.09.1000 |
R0X41A | Aruba 6400 48-port HPE Smart Rate 1/2.5/5GbE Class 6 PoE and 4-port SFP56 Module | 10.04.1000 |
R0X41C | Aruba 6400 48-port HPE Smart Rate 1/2.5/5GbE Class 6 PoE and 4-port SFP56 v2 Module | 10.09.1000 |
R0X42A | Aruba 6400 24-port 10Gbase-T and 4-port SFP56 Module | 10.04.1000 |
R0X42C | Aruba 6400 24-port 10Gbase-T and 4-port SFP56 v2 Module | 10.09.1000 |
R0X43A | Aruba 6400 24-port SFP+ and 4-port SFP56 Module | 10.04.1000 |
R0X43C | Aruba 6400 24-port SFP+ and 4-port SFP56 v2 Module | 10.09.1000 |
R0X44A | Aruba 6400 48-port 10/25GbE SFP28 Module | 10.04.2000 |
R0X44C | Aruba 6400 48-port 1G/10G/25GbE SFP28 v2 Extended Tables Module | 10.09.1000 |
R0X45A | Aruba 6400 12-port 40/100GbE QSFP28 Module | 10.04.2000 |
R0X45C | Aruba 6400 12-port 40/100GbE QSFP28 v2 Extended Tables Module | 10.09.1000 |
R0X26A | Aruba 6405 Switch | 10.05.0021 |
R0X27A | Aruba 6410 Switch | 10.05.0001 |
JL741A | Aruba 6410 96-port 1GbE Class PoE 4 and 4-port SFP56 Switch | 10.05.0001 |
S0E48A | HPE Aruba Networking CX 6400 v2 32p SFP28 25G 4p QSFP28 100G MACsec Extended Tables Module | 10.13.1000 |
S1T83A | HPE Aruba Networking CX 6400 v2 24p Smart Rate 1G/2.5G/5G/10G Class8 PoE 4p SFP56 50G Module | 10.13.1000 |
Important information for 6300 and 6400 Switches
Aruba switches covered by this release note use eMMC or SSD storage. This is non-volatile memory for persistent storage of configuration, files, databases, scripts, and so forth. Aruba recommends updating to version 10.06.0100 or later (including this release) to implement significant improvements to memory usage and prolong the life of the switch.
Do not interrupt power to the switch during a software update.
If using the WebUI, you should clear the browser cache after upgrading to this version of software before logging in to the switch using a WebUI session. This will ensure the WebUI session downloads the latest changes. Do not upgrade to 10.13 using REST API or WebUI unless your switch is running 10.09.1060, 10.10.1020 or later versions of these releases.
Switch fans will run at full speed when a fault is detected with the temperature sensors in the switch. This is normal behavior to ensure overheating does not occur. Should the fans run at full speed at unexpected times, check the output of show environment temperature
and show environment fans
, then contact support for further assistance.
AOS-CX BGP
AOS-CX BGP implementations support resolving a BGP route's nexthop to a default route (0.0.0.0/0). However, this is not generally recommended in network deployments. Considering the default route to be the last resort route, resolving the BGP route's nexthop to a default route can cause potential routing loops in the network, if they are not properly designed and monitored. Route flaps and/or traffic drops may be observed in such cases.
In 10.11.0001, the command route recursive-lookup default-route
has been introduced under the vrf
context to support BGP route's nexthop resolving to a default route in the Route table. This command is enabled by default.
RPVST and VLAN Configuration
If a switch has RPVST enabled and the native VLAN ID configured for a trunk interface is not the default VLAN ID 1, and the native VLAN ID is also used as the management VLAN, the switch may not be accessible over the trunk interface after upgrading from any 10.04.00xx version of software.
To fix the issue after an upgrade, log into the switch using the OOBM interface or serial port console and configure the following:
switch# configure
switch(config)# spanning-tree rpvst-mstp-interconnect-vlan <VLAN ID>
where <VLAN_ID>
is the native VLAN ID configured on the trunk interface.
If there are multiple trunk interfaces configured on the switch, each with a different VLAN ID, contact the Aruba Support Team.
PoE Feature and Software Upgrades
If the switch has the always-on PoE feature enabled, during the upgrade from a version of software prior to 10.05.0001 to this version of software, PoE Powered Devices (PDs) will lose power from the switch as the switch will power cycle during the update. Plan a time for upgrading the switch when loss of power to the PDs attached to the switch can be mitigated.
Restoring Previous Configuration
To restore a previous configuration when downgrading to a previous version of software, follow these steps:
- Use the
show checkpoint
command to see the saved checkpoints and ensure that you have a checkpoint that is an exact match of the target software version (see theImage Version
column in the output of the command, for example, FL.10.0x.yyyy). This checkpoint can be the startup-config-backup automatically created during the initial upgrade or any other manually created checkpoint for the target software version. - Copy the backup checkpoint into the startup-config.
- Boot the switch to the target version (lower version), making sure to select no when prompted to save the current configuration.
AOS-CX 10.13 is a Long Supported Release (LSR)
- LSRs are long lived releases where Aruba will introduce new features and new hardware, and park hardware (that is, this may be the last major release supported) as needed.
- LSRs are maintained and supported for 5 years (i.e., Initial Release + 5 years)
- Initial Release to End of Maintenance (EOM*): Bug and vulnerability patching with releases reducing in frequency over time.
- EOM to End of Support (EOS): Vulnerability patching on an as needed basis for High or Critical Common Vulnerability Scoring System (CVSS) issues.
For information about Short Supported Releases (SSRs) and Long Supported Releases (LSRs), see https://www.arubanetworks.com/support-services/end-of-life/arubaos-software-release/.
Upgrade Path
To upgrade to: | Your switch must be running this version or later: |
---|---|
AOS-CX 10.13.xxxx | AOS-CX 10.10.0002 |
AOS-CX 10.12.xxxx | AOS-CX 10.09.0002 |
AOS-CX 10.11.xxxx | AOS-CX 10.08.0001 |
Note: 10.11 is an SSR, recommended release is 10.11.0001 | |
AOS-CX 10.10.xxxx | AOS-CX 10.06.0110 |
Note: 10.10 is an LSR, recommended release is 10.10.10xx. | |
AOS-CX 10.09.xxxx | AOS-CX 10.06.0110 |
Note: 10.09 is an SSR, recommended release is 10.09.10xx. | |
AOS-CX 10.08.xxxx | AOS-CX 10.05.0001 |
Note: 10.08 is an SSR, recommended release is 10.09.10xx. | |
AOS-CX 10.07.xxxx | AOS-CX 10.04.0001 |
Note: 10.07 is an SSR, recommended release is 10.09.10xx. |
Refer to the Approved Product Lists sites for the Common Criteria, FIPS 140-2 and DoDIN APL to obtain the product certification details. Products should be used as evaluated and defined in the respective configuration guides.
- Common Criteria: https://www.niap-ccevs.org/Product/
- FIPS 140-2: https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search
- DoDIN APL: https://aplits.disa.mil/processAPList.action
This product includes code licensed under the GNU General Public License, the GNU Lesser General Public License, and/or certain other open-source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
6280 America Center Drive
San Jose, CA 95002
U.S.A.
Please specify the product and version for which you are requesting source code. You may also request a copy of this source code free of charge at: https://hpe.com/software/opensource
Version history
All released versions are fully supported by Aruba, unless noted in the table.
Version number | Release date | Remarks |
---|---|---|
10.13.1040 | 01/08/2024 | Released, fully supported, and posted on the Web. |
10.13.1030 | 27/06/2024 | Released, fully supported, and posted on the Web. |
10.13.1020 | 20/05/2024 | Released, fully supported, and posted on the Web. |
10.13.1010 | 09/04/2024 | Released, fully supported, and posted on the Web. |
10.13.1000 | 31/01/2024 | Released, fully supported, and posted on the Web. |
10.13.0005 | 14/11/2023 | Released, fully supported, and posted on the Web. |
Compatibility/interoperability
The switch web agent supports the following web browsers:
Browser | Minimum supported versions |
---|---|
Edge (Windows) | 41 |
Chrome (Ubuntu) | 76 (desktop) |
Firefox (Ubuntu) | 113 |
Safari (MacOS) | 12 |
Safari (iOS) | 10 (Version 12 is not supported) |
Internet Explorer is not supported.
Recommended versions of network management software for switches found in this release note:
Management software | Recommended version(s) |
---|---|
NetEdit | Refer to the AOS-CX and NetEdit Compatibility Matrix. |
Aruba Central | 2.5.7 |
AirWave | 8.3.0.2 |
Central On-Premises | 2.5.7.3 |
Aruba Fabric Composer | 7.0.3 |
Aruba CX Mobile App | Support coming in future release. |
IMC | (708P03) 6410 Switch Series not supported |
For more information, see the respective software manuals.
To upgrade software using NetEdit, make sure to upgrade to the above version of NetEdit first and then execute the switch software upgrade on devices discovered by this version of NetEdit.
Enhancements
There are no enhancements introduced in this release.
Resolved Issues
This section lists fixes found in this branch of the software. The Symptom statement describes what a user might experience if this issue is seen on the network. The Scenario statement provides additional environment details and trigger summaries. When available, the Workaround statement provides a workaround to the issue for customers who chooses not to update to this version of software.
For a list of issues resolved in the previous releases of 6300 and 6400 switches, refer to the AOS-CX Release Notes Portal.
The Bug ID is used for tracking purposes.
Resolved Issues
Category | Bug ID | Description |
---|---|---|
Chassis Manager | 316154 | (For 6400 Switch series only) Symptom: After ZTP, some modules fail to apply the config from ZTP configuration file. Scenario: This issue is seen in a ZTP provisioning scenario where the uplink is connected via data plane and the configuration file specifies only one generation of v1 or v2 card. However, if the switch has a few cards from other generations, then those cards may not properly populate their config. Workaround: Using MGMT port for ZTP or, change the ZTP configuration to specify the exact generation of cards in the chassis. |
IGMP | 317760 | (For 6300 Switch series only) Symptom: Switches incorrectly generated the debug|LOG_ERR|CDTR|1|MLD|MLD|MGMD_DEBUG MgmdOvsDbVGPS_UpdateVGPEntry update failed logs.Scenario: This issue is seen when the switches incorrectly log OVSDB update for VXLAN tunnels. |
Transceivers | 317033 | (For 6300 Switch series only) Symptom: The PMD daemon crashes unexpectedly. Scenario: This issue is seen when a third-party transceiver with invalid memory values is plugged to the switch. Workaround: Use the HPE supported transceiver. |
AAA | 318883 | Symptom: 802.1X authentication failed for a few clients. Scenario: This issue occurs when 802.1X clients authenticate using the EAP-TEAP method. |
PoE | 317110 | Symptom: PoE device (PD) will not get detected and hence, the switch will not deliver power to PD. Scenario: This issue is observed when NEATPAD PDs are connected to class6 and above class type PoE switches. Workaround: It is recommended to use an ALT-A PoE config. |
REST | 302889 | Symptom: Growth in the boot.log file size may lead to an increased RAM utilization.Scenario: This issue can be triggered by a high rate of unauthorized or wrong requests to the REST HTTPS server, which could either occur during malicious attacks or vulnerability tool tests. |
IP Directed Broadcast | 318235 | Symptom: The IPDB packets are not flooded to all the tunnel ports in a VXLAN environment. Scenario: When IGMP/MLD and IPDB are enabled together on a VLAN, the VLAN router detected ports were added as the flood portset for IPDB traffic flow, instead of all the tunnels which are a part of the VLAN. Workaround: Disable IGMP/MLD on the VLAN if multicast clients can be moved to a different VLAN. |
Boot | 314354 | Symptom: A kernel panic was observed during the boot-up or while rebooting the switch. Scenario: This issue occurs when the USB-A serial cable is disconnected while booting from ServiceOS to ProductOS. |
Activate | 317632 | Symptom: Some switches reach out to the Google Public DNS server: 8.8.8.8. Scenario: This issue is observed when there is no DNS server or DNS hosts configuration and when the aruba-central feature is enabled.Workaround: Disable the aruba-central functionality. |
SNMP | 312998 | Symptom: The values of the SNMP objects, snmpEngineBoots and snmpEngineTime did not increment.Scenario: This issue is seen when users check the packet capture for the generated SNMP traps. |
GPO | 317368 | (For 6300 Switch series only) Symptom: Ping failure is observed in a few switches. |
VSX Sync | 309500 | Symptom: VSX-Sync is no longer syncing after a command for BGP to redistribute to OSPF with a route map is used. Scenario: This issue is seen on a pair of switches in a VSX configuration, with syncing for BGP active and when the user configures a redistribution for BGP to OSPF with a route map on the primary switch. After this configuration, VSX-Sync won't sync the redistribution configuration or any other new configuration. Workaround: Either remove the redistribution configuration or disable BGP syncing. |
ARP | 315962 | Symptom: Some hosts experience connectivity issues. Scenario: This issue is observed in an ARP suppression enabled EVPN environment where hosts experience connectivity issues due to a missing associated ARP entry. Workaround: Add and remove the static ARP entry using the following CLI commands:
|
Feature Caveats
The following are feature caveats that should be taken into consideration when using this version of the software.
Feature | Description |
---|---|
Physical Port | Symptom: Link drops might be observed when the DAC cables, S1J07A or S1J08A is used for the products, S0E91A and S0X44A. Scenario: This issue is observed after upgrading the switches from 10.13.1000 or a later 10.13.1xxx version using VSF ISSU. Workaround: The products, S0E91A and S0X44A must be rebooted after an upgrade. Upgrade either the entire stack or only the stand alone switches based on your deployment. For stack with a mix of S0E91A, S0X44A, and other 6300 switches, either reboot the entire stack or perform ISSU and then manually reboot only the S0E91A and S0X44A switches using the vsf member <1-10> reboot command. |
User Based Tunnel | The switch does not support double encapsulation. A packet can be encapsulated with either L2GRE (UBT) or VXLAN, but not both. The network administrator should decide the tunneling type to be used, and then plan the configuration accordingly. |
User Based Tunnel | In the event of license issues when onboarding an DUT to primary or backup mobility conductor, the DUT will not try to bootstrap to other mobility conductor where a license is available. For example, a if mobility conductor does not have a license to on-board the DUT but mobility conductor does have adequate licenses, if both mobility conductors are reachable then UBT will be down, and the DUT will not attempt to bootstrap to the backup controller. However, if the primary mobility conductor is not reachable, the DUT gets tunneled to the standby/backup mobility conductor. Once the primary mobility conductor reachable by the DUT once again, the DUT will not automatically bootstrap back to the primary. Network administrators should manually disable and enable UBT on the DUT to re-establish the tunnel to the primary mobility conductor. |
Central | When a switch is able to connect to Aruba Central but is not registered in the Aruba Central inventory or does not have a proper license, the switch will get disconnected. If the Aruba Central feature is enabled using this command, the switch will then reconnect back to Aruba Central and will get disconnected again. This connect/disconnect process will continue until the switch is properly registered in Aruba Central. To avoid this unnecessary reconnection cycle, best practices is to disable Aruba Central until the switch is registered in Aruba Central, or a license is obtained for that device. |
Hot Patch | When a hot-patch file download is triggered using the switch WebUI, log messages can incorrectly state that the file is added to the database with a missing status. This is a temporary state, and will correctly change to Not applied once the download is completed. |
PIM-SM | Pim Active-Active is not supported on overlay VXLAN SVIs. |
SNMP | When SNMP is enabled via the switch CLI, it can take between 1-2 minutes for the SNMP daemon to be ready to respond to requests. If a local or external SNMP MIB walk is performed in the interval between when SNMP is first enabled and the SNMP daemon is ready, the MIB walk action will return an error. |
VXLAN | VXLAN encapsulation does not copy the ECN bits from inner header to outer header. If you create a traffic stream between connected hosts and enable the ECN bit for the hosts and start the traffic, a traffic capture may show that ECN bits aren't copied from the inner header to the outer header. |
Certificates | When a switch uses a certificate with a legacy certificate name that is not supported in 10.12 because it contains disallowed characters, the information will migrate properly in the upgrade, but that certificate can no longer be edited. For new certificate names, only alphanumeric characters, dots, dashes, and underscores are allowed. |
REST | Boundary values for match vni and set local preference in a route-map system cannot be set via the REST API and must be manually configured on the switch via the CLI. |
ACLs | NOTE: Applies only to the Aruba 6300 Switch Series. In a VSF stack, the switch may fail to log events for the matching access-list entries. ACL functionality is not impacted; access-list entries are applied properly and only the logging is incorrectly generated. |
Aruba CX Mobile App | VSF stack formation is blocked when there are reserved autojoin interfaces (25, 26, 49, 50) in the stack topology. |
BGP | In environments with VRRP or VSX peers, while performing mutual route leaking on the VRRP peers with BGP neighborship established in between and towards the upstream network, the switch will install both routes as ECMP instead of preferring the leaked routes. Use route-maps to give lower/higher preference to the routes received from an iBGP peer. For example: In the above example, since a lower value of local-preference (i.e. 50, whereas default value is 100) has been set to the routes received from iBGP peer, the leaked routes get preferred and get installed as best routes. |
BGP | The next-hop-unchanged option needs to be explicitly configured to preserve nexthop while advertising routes to eBGP peers, in the L2VPN EVPN address-family. For example:
|
Classifiers | For Classifier policy modifications to be secure, Aruba strongly encourages modifications be done as a three-step process: Bring down the port, modify, and bring the port back up. |
Classifiers | Policies containing both MAC and IPv6 classes are not allowed. |
CMF | No other checkpoint besides "startup-configuration" gets migrated during the upgrade process. |
Counters (6400 only) | Bytes/errors/drops count in show interface <IF-NAME> and show interface <IF-NAME> queues can have up to 10% deviation. This will manifest mainly when running at line rate with small packet sizes and after a port goes up/down. |
Counters (6400 only) | The "Bytes" counter is not supported in show interface <IF-NAME> queues output. |
DHCP Server, DHCP Relay, and DHCP Snooping | DHCP Relay and DHCP Snooping can co-exist on the same switch. DHCP Snooping and DHCP Server cannot co-exist on the same switch. DHCP Snooping, DHCP Relay, and DHCP Server together cannot co-exist on the same switch. |
EVPN | The iBGP split-horizon rule is not followed between different address families. |
Flow control (6400 only) | Flow control is not supported. |
IP-SLA | Reserved ports or ports used by other applications/services with in the system are not recommended to be used for other services. When two services use the same port there is chance of unexpected behaviors from these services. Best practices is to use unique port for each service across system. |
ICMP Redirect | The switch may only software forward at a rate of 100pps if the packets that trigger ICMP redirect. |
IGMP/PIM on 6-in-6, Loopback and GRE interfaces | IGMP cannot be enabled on either Loopback or GRE interfaces. IGMP and PIM is not supported on a 6-in-6 Tunnel. |
Line module Hot Swap and Reboot (6400 only) | Concurrent physical hot insert/removal or reboot of a line-module is not supported. Subsequent insert/removal or reboot of a line-module must be initiated only after preceding attempts have been completely processed by the system. For hot insert you must wait until the preceding line-module has reached the "ready" state before inserting subsequent line-modules. For hot removal you must wait until the line-module is no longer present in the system. See the CLI command show module for line-module status information. Aruba recommends line-modules be gracefully shut down before removal. Use the CLI config command module <SLOT-ID> admin-state [diagnostic | down | up] to change the administrative state of the line-module. Line module reboot and hot removal is not a hitless operation. Up to 2 seconds of traffic loss may be expected when any module is rebooted or removed from the system. Hot insert does not result in any traffic loss. |
MACsec | In an environment with a Cisco device, the Cisco device must be designated as the key server. Designating the AOS-CX as the key server results in complete traffic loss. |
MACsec | In an environment with Cisco and FlexFabric or H3C devices, do not update confidentiality-offset on the live channel. There can be complete traffic loss for an extended period on the MACsec channel when confidentiality-offset is updated on both ends. |
MACsec | MACsec uses a software-based implementation to track start and stop times for secure channels and secure associations. As the implementation is software-based, the stop times for MACsec secure channel and secure associations are only updated when they are deleted and therefore never updated in the output of the show macsec status detailed command. |
MACsec and UDLD | In an environment with devices running AOS-Switch, do not enable UDLD on the same link. The UDLD session can toggle between up and down continuously when both MACsec and UDLD is enabled on the same link. |
MACsec | In an environment with Cisco devices, when the GCM-AES-XPN-128 or GCM-AES-XPN-256 cipher suite is used for establishing the MACsec channel, the MKA policy on the Cisco device must be configured with ssci-based-on-sci . |
MACsec | MACsec works between a CX device and a Windows VM running AnyConnect with AES-128 cipher. AnyConnect does not support AES-256 in the NAM module (works only for the VPN module). |
MACsec | When Cisco AnyConnect is used as dot1x supplicant, it is recommended to configure cak-length to be 16 under dot1x-authenticator mode. |
MACsec | Ensure the cipher suite GCM-AES-128 is configured when AOS-CX is acting as a key server. This is because, by default AOS-CX will use the most secure cipher suite gcm-aes-xpn-256 for establishing MACsec secure link and Comware/PVOS doesn't support an XPN cipher suite. |
Multicast and VXLAN |
|
Priority queues (6400 only) | A maximum of four (4) priority queues is supported. |
RADIUS | Authorization by means of HPE VSAs is not supported. |
Reduction in TCAM entries (6400 only) | On some line cards, a small number (~200) of TCAM entries are used for internal purposes. |
REST | REST supports the 'admin' and 'operator' roles but does not work with TACACS+ command authorization. |
RIP/RIPng | Redistribute RIP/RIPng is not supported in BGP/BGP+. |
RIP/RIPng | RIP/RIPng metric configuration support is not available. |
SFTP | When the path to the SFTP server crosses segments with different MTU frame sizes, file transfers will fail. Configure the same MTU on all network segments on the path to the SFTP server to use SFTP to transfer files. |
Sub-interface | BFD is not supported on a sub-interface. A sub-interface as underlay for EVPN-VXLAN is not supported. |
Tunnels | When configuring tunnels (VXLAN/IP tunnels) with the underlay as a static route, the next-hop IP should be an SVI or ROP IP and not configured as the Active-Gateway. |
VRF | VRF names are limited to 31 characters. |
VRRP-MD5 authentication interop | Not supported with Comware-based switches. |
Traceroute | Issuing the traceroute command with the ip-option loosesourceroute parameter fails in an overlay EVPN-VxLAN deployment. |
Traceroute | Traceroute v4/v6 over VXLAN fails to find intermediate next-hop IP information from a source VTEP in Virtual Active Gateway environment (the SVI is the same as the Active Gateway IP). |
VRRP | VRRP Preemption Delay Timer (preempt delay minimum) may be ignored after a switch reboot or power cycle. |
VRRP and VXLAN | VRRP and VXLAN are mutually exclusive. |
PTP | (6300 Switch Series only) End clients offset might be slightly high when using PTP Default profile 1588v2 with default PTP parameters (1 PPS). |
Known Issues
The following are known open issues with this branch of the software. The Symptom statement describes what a user might experience if this is seen on the network. The Scenario statement provides additional environment details and trigger summaries. When available, the Workaround statement provides a workaround to the issue.
Category | Bug ID | Description |
---|---|---|
L3 Routes | 207077 | Symptom: Traffic convergence takes approximately two minutes when VSF switchover is performed. Scenario: This issue occurs when traffic is flowing through the switch using the uplink on the conductor. Performing a VSF switchover causes the standby to become the new conductor, and it takes approximately 2 minutes for traffic to resume using the uplink of the new conductor. Workaround: If the Uplink from the VSF is a LAG with members in Conductor/Standby/Member, the convergence time would be lesser and around 70 seconds. |
TFTP | 269619 | Symptom: TFTP Software image upload/download transfer operation fails. Scenario: Downloading/uploading the software Image via sm ubuntu IPv6 TFTP server fails. Workaround: Use the blocksize option in the copy command with a blocksize of 1375 or less. For example :
|
MACsec | 240672 | Symptom: Traffic is dropped for a few seconds on a MACsec channel during a VSF switchover. Scenario: When the MACsec channel has data-delay protection enabled, there can be traffic drops for a few seconds on the channel post a VSF switchover due to the reset of the MKA session on the interface. Workaround: Do not use data-delay protection in a MACsec policy if the system is deployed as a VSF stack. |
Port-Access Policy | 295644 | Symptom: Traffic loss occurs on the switch, where RADIUS responses or other traffic on the switch gets dropped, and new clients do not get onboarded. Scenario: When all ABP / Reflexive ACL clients log off or age out, the switch can start dropping the traffic. Workaround: Enable a group-based policy (GBP) on the switch. |
Upgrade information
AOS-CX 10.13.1040 for the 6400 Switch series uses ServiceOS FL.01.14.0002
Original Release | Intermediate Upgrade Release | Final Upgrade Releases |
---|---|---|
10.09.0001 - 10.09.1050 | 10.10.1020 or later 10.10.xxxx release | 10.13.xxxx |
10.09.0001 - 10.09.1050 | 10.10.0001 - 10.10.1010 | 10.13.xxxx |
10.09.1060 or later 10.09.xxxx release | 10.10.1020 or later 10.10.xxxx release | 10.12.0006 or later 10.12.xxx release, or 10.13.xxxx |
10.10.1020 or later 10.10.xxxx release | 10.12.0006 or later 10.12.xxx release, or 10.13.xxxx |
For 6400 only: To execute an In Service Software Upgrade (ISSU) to your switch must be running one of the following supported releases:
From | Supported Versions for Upgrade |
---|---|
10.13.0005 | 10.13.1000 or later versions |
10.13.1000 | 10.13.1010 or later versions |
10.13.1010 | 10.13.1020 or later versions |
10.13.1020 | 10.13.1030 or later versions |
10.13.1030 | 10.13.1040 |
Manual configuration restore for software downgrade
To restore a previous configuration when downgrading to a previous version of software, follow these steps:
- Use the
show checkpoint
command to see the saved checkpoints and ensure that you have a checkpoint that is an exact match of the target software version (see theImage Version
column in the output of the command, for example, FL.10.xx.yyyy). This checkpoint can be the startup-config-backup automatically created during the initial upgrade or any other manually created checkpoint for the target software version. - Copy the backup checkpoint into the startup-config.
- Boot the switch to the target version (lower version), making sure to select no when prompted to save the current configuration.
Hardware updates
The 6400 switch series chassis hardware images may have a different upgrade sequence if programmable device updates are pending that require a power cycle. To determine if there are pending upgrades:
- Issue the command
show needed-updates [next-boot [primary|secondary]]
and check the output of the command see if it indicates that one or more devices need to be updated. - Issue the command
show needed-updates [primary|secondary]
and check the output to see which updates are required for the current switch image. - Issue the command
allow-unsafe-updates <NUM_MINUTES>
if any non-failsafe device such as an icbbp_secondary needs to be updated. - Issue the command
show fabric
andshow module
repeatedly until the output of this command shows that all modules are in the Ready state. - Perform a manual chassis power-cycle. If no remote power control is available, physically unplug all the power cables wait at least ten seconds, and plug the power cables back in. This is the only way to clear the write-protection security set on the switch hardware.
- Wait for the chassis to reboot, and log in to the command-line interface as an admin user (or with an account with similar privileges).
- Issue the command
show fabric
andshow module
repeatedly until the output of this command shows that all modules are in the Ready state. - Issue the command
show needed-updates
. - If the output of the command
show needed-updates
doesn't report any further needed updates or other issues such as a needed power-cycle, then the switch update is complete. - However, if icbbp_primary was updated since the last chassis power-cycle, you may need to repeat this process and perform a second power cycle, to get the newly-updated switch image.
Performing the software upgrade
For additional upgrade and downgrade scenarios, including limitations of automatic upgrade and downgrade scenarios provided by the Configuration Migration Framework (CMF), refer to the AOS-CX 10.13 Fundamentals Guide.
This version may contain a change of BootROM from the current running version. A BootROM update is a non-failsafe update. Do not interrupt power to the switch during the update process or the update could permanently damage the device.
- Copy the new image into the non-current boot bank on the switch using your preferred method.
- Depending on the version being updated, there may be device component updates needed. Preview any devices updates needed using the
boot system <BOOT-BANK>
command and entering n when asked to continue.
For example, if you copied the new image to the secondary boot bank and no device component updates are needed, you will see this:
switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? n
In this example, three device updates will be made upon reboot, one of which is a non-failsafe device:
switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
3 device(s) need to be updated during the boot process.
The estimated update time is between 2 and 3 minute(s).
There may be multiple reboots during the update process.
1 non-failsafe device(s) also need to be updated.
Please run the 'allow-unsafe-updates' command to enable these updates.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? n
3. When ready to update the system, if a non-failsafe device update is needed, make sure the system will not have any power interruption during the process. Invoke the allow unsafe updates
command to allow updates to proceed after a switch reboot. Proceed to step 4 within the configured time.
switch# config
switch(config)#2 allow-unsafe-updates 30
This command will enable non-failsafe updates of programmable devices for the next 30 minutes. You will first need to wait for all line and fabric modules to reach the ready state, and then reboot the switch to begin applying any needed updates. Ensure that the switch will not lose power, be rebooted again, or have any modules removed until all updates have finished and all line and fabric modules have returned to the ready state.
WARNING: Interrupting these updates may make the product unusable!
Continue (y/n)? y
Unsafe updates : allowed (less than 30 minute(s) remaining)
4. Use the boot system <BOOT-BANK>
command to initiate the upgrade. On the switch console port an output similar to the following will be displayed as various components are being updated:
switch# boot system secondary
Default boot image set to secondary.
Checking if the configuration needs to be saved...
Checking for updates needed to programmable devices...
Done checking for updates.
3 device(s) need to be updated during the boot process.
The estimated update time is between 2 and 3 minute(s).
There may be multiple reboots during the update process.
This will reboot the entire switch and render it unavailable until the process is complete.
Continue (y/n)? y
The system is going down for reboot.
Looking for SVOS.
Primary SVOS: Checking...Loading...Finding...Verifying...Booting...
ServiceOS Information:
Version: <serviceOS number>
Build Date: yyyy-mm-dd hh:mm:ss PDT
Build ID: ServiceOS:<serviceOS number>:6303a2a501ba:202006171659
SHA: 6303a2a501bad91100d9e71780813c59f19c12fe
Boot Profiles:
0. Service OS Console
1. Primary Software Image [xx.10.12.1000]
2. Secondary Software Image [xx.10.13.0001]
Select profile(secondary):
ISP configuration:
Auto updates : enabled
Version comparisons : match (upgrade or downgrade)
Unsafe updates : allowed (less than 29 minute(s) remaining)
Advanced:
Config path : /fs/nos/isp/config [DEFAULT]
Log-file path : /fs/logs/isp [DEFAULT]
Write-protection : disabled [DEFAULT]
Package selection : 0 [DEFAULT]
3 device(s) need to be updated by the ServiceOS during the boot process.
The estimated update time by the ServiceOS is 2 minute(s).
There may be multiple reboots during the update process.
MODULE 'mc' DEVICE 'svos_primary' :
Current version : '<serviceOS number>'
Write-protected : NO
Packaged version : '<version>'
Package name : '<filename>.svos'
Image filename : '<svos_package_name>'
Image timestamp : 'Day Mon dd hh:mm:ss yyyy'
Image size : 22248723
Version upgrade needed
Starting update...
Writing... Done.
Erasing.. Done.
Reading... Done.
Verifying... Done.
Reading.. Done.
Verifying... Done.
Update successful (0.5 seconds).
reboot: Restarting system
Multiple components may be updated and several reboots will be triggered during these updates. When all component updates are completed, the switch console port will arrive at the login prompt with a display similar to following:
(C) Copyright 2017-2023 Hewlett Packard Enterprise Development LP
RESTRICTED RIGHTS LEGEND
Confidential computer software. Valid license from Hewlett Packard Enterprise Development LP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
We'd like to keep you up to date about:
Software feature updates
New product announcements
Special events
Please register your products now at: https://asp.arubanetworks.com
switch login:
Aruba recommends waiting until all upgrades have completed before making any configuration changes.
Chapter 2
Other resources
Aruba is committed to ensuring you have the resources you need to be successful. Check out these learning and documentation resources:
- AOS-CX switch software documentation portal: https://www.arubanetworks.com/techdocs/AOS-CX/help_portal/Content/home.htm
- AOS-CX technical training videos on YouTube: https://www.youtube.com/playlist?list=PLsYGHuNuBZcbWPEjjHuVMqP-Q_UL3CskS
Chapter 3
Aruba security policy
A Security Bulletin is the first published notification of security vulnerabilities and is the only communication vehicle for security vulnerabilities.
- Fixes for security vulnerabilities are not documented in manuals, release notes, or other forms of product documentation.
- A Security Bulletin is released when all vulnerable products still in support life have publicly available images that contain the fix for the security vulnerability.
The Aruba security policy can be found at https://www.arubanetworks.com/en-au/support-services/sirt/.
Security bulletins can be found at https://www.arubanetworks.com/en-au/support-services/security-bulletins/. You can sign up at https://sirt.arubanetworks.com/mailman/listinfo/security-alerts_sirt.arubanetworks.com to initiate a subscription to receive future Aruba Security Bulletin alerts via email.
Related Documents
![]() |
AOS-CX 10.13.1000 Release Notes for 6300 and 6400 Switch Series This document provides release notes for AOS-CX version 10.13.1000, detailing supported products, important information, resolved issues, feature caveats, known issues, and upgrade procedures for the Aruba 6300 and 6400 Switch Series. |
![]() |
AOS-CX 10.12.1010 Release Notes for 6300 and 6400 Switch Series This document provides release notes for AOS-CX version 10.12.1010, detailing supported products, enhancements, resolved issues, and feature caveats for the Aruba 6300 and 6400 Switch Series. |
![]() |
AOS-CX 10.06.0113 Release Notes for 6300 and 6400 Switch Series Comprehensive release notes for Aruba AOS-CX software version 10.06.0113, detailing software enhancements, bug fixes, known issues, and upgrade instructions for the Aruba 6300 and 6400 Switch Series. |
![]() |
HPE Aruba Networking 6300F/M Switch Series: Installation and Getting Started Guide Comprehensive guide for installing and getting started with HPE Aruba Networking 6300F/M Switch Series. Covers setup, configuration, troubleshooting, and specifications for network administrators. |
![]() |
AOS-CX 10.06.0120 Release Notes for 6300 and 6400 Switch Series This document provides release notes for AOS-CX 10.06.0120, detailing software versions, supported products, important information, enhancements, fixes, and known issues for the Aruba 6300 and 6400 Switch Series. |
![]() |
AOS-CX 10.09 Virtual Switching Framework (VSF) Guide for 6200 and 6300 Switch Series This guide provides comprehensive information on configuring and managing the AOS-CX 10.09 Virtual Switching Framework (VSF) for Aruba 6200 and 6300 Switch Series. Learn about VSF behavior, connection topologies, and essential configuration tasks for creating a unified network device. |
![]() |
AOS-CX 10.10.1120 Release Notes for 6300 and 6400 Switch Series This document provides release notes for AOS-CX version 10.10.1120, detailing supported products, enhancements, fixes, known issues, and upgrade information for the Aruba 6300 and 6400 Switch Series. |
![]() |
AOS-CX 10.12.1020 Release Notes for 6300 and 6400 Switch Series Detailed release notes for Aruba AOS-CX software version 10.12.1020, covering supported products, enhancements, resolved issues, known issues, and upgrade procedures for the 6300 and 6400 Switch Series. |