FIRMWARE CHANGE HISTORY ----------------------- IBM RackSwitch G8124/G8124E Version 7.11.24.0 (Released May 2022) ** Changes since the 7.11.23.0 release ** Enhancements: none Changes: none Fixes: - Fixed vulnerabilities in the GNU C library as reported in the CVE Advisory: CVE-2021-35942. (254965) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.23.0 (Released February 2022) ** Changes since the 7.11.22.0 release ** Enhancements: none Changes: none Fixes: - Fixed vulnerabilities in the OpenSSL library as reported in the CVE Advisories: CVE-2020-1971, CVE-2021-23840, CVE-2021-23841, CVE-2021-3712. (244492) - Fixed vulnerabilities in the libXML2 library as reported in the CVE Advisories: CVE-2021-3517, CVE-2021-3537. (244492) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.22.0 (Released August 2021) ** Changes since the 7.11.21.0 release ** Enhancements: none Changes: - Avoid using deprecated SSH cryptographic settings - removed unsecure key exchange algorithms: diffie-hellman-group-exchange-sha1 and diffie-hellman-group1-sha1 (230493) - A SSH public key too small could exist on switch - added support to automatically install a 2048 bit RSA public key at boot, in case a 1024 bit ssh-dss host key is saved on a device (230493) Fixes: none ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.21.0 (Released June 2021) ** Changes since the 7.11.20.0 release ** Enhancements: none Changes: none Fixes: - SSL host-certificate expiration would occur after 8th of March 2021 even if a new https certificate is generated. (226846) - Switch uptime from BBI interface would be different from the one in CLI for switches that have been running for more than 497 days. (228385) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.20.0 (Released March 2021) ** Changes since the 7.11.19.0 release ** Enhancements: none Changes: none Fixes: - Fixed vulnerabilities as reported in the CVE Advisories: CVE-2016-9318, CVE-2018-14404, CVE-2019-19956, CVE-2019-20388, CVE-2020-7595, CVE-2020-24977. (220993) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.19.0 (Released November 2020) ** Changes since the 7.11.18.0 release ** Enhancements: none Changes: none Fixes: - Fixed vulnerabilities in the Linux kernel as reported in the CVE Advisories: CVE-2020-13974, CVE-2020-10732, CVE-2020-14314, CVE-2020-12770. (207165) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.18.0 (Released August 2020) ** Changes since the 7.11.17.0 release ** Enhancements: none Changes: none Fixes: - Https connection would be lost when generating a certificate with blank fields. (202593) - Fixed vulnerabilities as reported in the CVE Advisories: CVE-2020-12464. (207165) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.17.0 (Released February 2020) ** Changes since the 7.11.16.0 release ** Enhancements: none Changes: none Fixes: - The switch could crash when modifying the port-channels used by FCoE. (183939) - Fixed vulnerabilities as reported in the CVE Advisories: CVE-2019-1559. (181273) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.16.0 (Released October 2019) ** Changes since the 7.11.15.0 release ** Enhancements: none Changes: none Fixes: - Fixed vulnerabilities in the Linux kernel as reported in the CVE Advisories CVE-2019-11477, CVE-2019-11478, CVE-2019-11479. (177635) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.15.0 (Released June 2019) ** Changes since the 7.11.14.0 release ** Enhancements: none Changes: none Fixes: - After a switch reload, Control ports in a failover manual monitor configuration and all VLAG member ports which are UP that have a higher port number than the control ports would remain err-disabled even after the expiry of the VLAG start-up delay timer. (166867) - Fixed vulnerabilities in the OpenSSL library as reported in the CVE Advisory CVE-2018-0734. (175714) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.14.0 (Released February 2019) ** Changes since the 7.11.13.0 release ** Enhancements: none Changes: none Fixes: - Switch could crash when changing the switch Management IP address under heavy CPU utilization conditions, while receiving continuous traffic on the Management Port. (147023) - Protocols would flap and Switch would experience high CPU utilization when the switch were scanned by Qualys software. (146840) - Spanning tree group(STG) instances could not be configured from the BBI interface of the switch. (161182) - Fixed vulnerabilities in the OpenSSL library as reported in the CVE Advisory CVE-2018-0732. (147029) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.13.0 (Released October 2018) ** Changes since the 7.11.12.0 release ** Enhancements: none Changes: none Fixes: - A crash could occur when the switch were scanned by the Rapid 7 security tool or nessus scan for vulnerabilities or when the CLI commands "no ssh enable" or "no access netconf ssh enable" were executed after the scan. (133904/138760) - Switch would reboot due to memory exhaustion when exposed to prolonged port flapping, or prolonged network loop conditions in a VLAG setup. (133992/135129) - If either of the switches in a VLAG pair were rebooted after VLAG tier-id is changed on both switches by copying configuration (with a new VLAG tier-id) from a remote server such as FTP, a network loop could be caused. (137255) - Fixed vulnerabilities in the TLS protocol as reported in the CVE Advisories CVE-2014-8730. (80866) - Switch no longer supports the Diffie-Hellman key exchange algorithm in strict security mode. (143643) - Enhance BBI session default user password reset framework. (135949/135951) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.12.0 (Released June 2018) ** Changes since the 7.11.11.0 release ** Enhancements: - A syslog will now be logged - when port statistics are cleared from the UI, for example using CLI commands 'clear counters' or 'clear interfaces'. - when flash dump is cleared, for example using CLI command 'clear flash-dump'. (121539) Changes: none Fixes: - Port statistics for a given port in the switch tech-support would be reported as unavailable, if that port's statistics were not requested prior to using any user interface from the switch. For example using CLI command 'show interface port interface-counters'. (124797) - The OID of SNMP Objects in the lldpRemManAddrTable (1.0.8802.1.1.2.1.4.2) when fetched using SNMP commands contain only two indices of lldpRemTimeMark and lldpRemLocalPortNum instead of five indices of lldpRemTimeMark,lldpRemLocalPortNum, lldpRemIndex, lldpRemManAddrSubtype and lldpRemManAddr as defined in the lldpMIB. (117804) - Fixed Libxml2 vulnerabilities as reported in the Advisories CVE-2016-5131, CVE-2017-15412, CVE-2017-16932, CVE-2017-5130. (124059) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.11.0 (Released November 2017) ** Changes since the 7.11.10.0 release ** Enhancements: none Changes: none Fixes: - Spanning Tree protocol for the Default Group STG 1 would flap once when deleting VLANs from switch configuration. (68065) - A crash could occur when clicking the "show log" tab under the Dashboard menu when using BBI. (LV302598/77085/86874) - An incorrect SSH return code (255) indicating error is returned though the command is successfully executed. It now returns 0 indicating success upon successful completion of a command. (99036) - Fixed libXML2 vulnerabilities as reported in the CVE Advisories CVE-2017-8872, CVE-2017-9049 and CVE-2017-9050. (104768) - Address issue in login credential mechanism. (107614) - Support for the weak ciphers TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA has been removed. (109956/111620) - Fixed TCP vulnerabilities as reported in the CVE Advisory CVE-2017-6214. (113078) - Address non-configured community strings. (115054) - The switch’s browser based interface (BBI) was susceptible to security vulnerabilities cross-site scripting (XSS) and stored cross-site scripting as reported by the IBM security tool Appscan. (116507) =============================================================================== IBM RackSwitch G8124/G8124E Version 7.11.10.0 (Released May 2017) ** Changes since the 7.11.9.0 release ** Enhancements: none Changes: - The support for TLS versions 1.1 and 1.0 has been deprecated. TLS version 1.2 is now supported by default. (PSIRT ALIRT 10820) (72679) Fixes: - The MTU value for a port in the output of “show lldp info” command is incorrectly reported as 1522 instead of 9216. (73928) - The SSH Server CBC Mode Ciphers and SSH Weak MAC Algorithms have been disabled. (75828) - The switch’s browser based interface (BBI) was reported to be missing the "Content-Security-Policy", "X-Content-Type-Option" and "X-XSS-Protection" headers in the HTTP response when scanned by the web security tool IBM Appscan. (68381,75827) - In a multicast environment, switch acting simultaneously as a "Last Hop Router" (LHR) and an "Intermediate Router" (IR) would cause the switch to be unable to send traffic to LHR clients for a specific group. This happens when the switch has already received IR PIM joins for the same group, started forwarding traffic towards the IR clients and then receives LHR IGMP joins for that group. (78192) - A crash would occur when scanned by the web security tool IBM Appscan, while running a Recorded Login option. (90107) - HTTP requests sent by LXCA with a “/” URL would erroneously be rejected causing the switch’s GUI to fail to launch in LXCA (92267) - Fixed zlib vulnerabilities as reported in the CVE Advisories CVE-2016-9840, CVE-2016-9841, CVE-2016-9842 and CVE-2016-9843. (86800) - Fixed libXML2 vulnerabilities as reported in the CVE Advisories CVE-2016-4658 and CVE-2016-9318. (86808) - A switch upon receiving a rogue OSPF LSA containing its own router ID with a maximum sequence number (0x7fffffff), would incorrectly respond with a fight-back LSA of its own database, as opposed to the rogue's LSA database. (92346) =============================================================================== IBM RackSwitch G8124/G8124E Version 7.11.9.0 (Released January 2017) ** Changes since the 7.11.8.0 release ** Enhancements: none Changes: none Fixes: - The switch’s browser based interface (BBI) was reported to be susceptible to the security vulnerability CSRF (cross-site request forgery) when scanned by the web security tool IBM Appscan. (68381) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2016-2183(SWEET32) and CVE-2016-6329. The ciphers DES,3DES and Blowfish are no longer supported. (66395) =============================================================================== IBM RackSwitch G8124/G8124E Version 7.11.8.0 (Released September 2016) ** Changes since the 7.11.7.0 release ** Enhancements: none Changes: none Fixes: - Switch would fail to generate SNMP traps when STP was not stabilized for default spanning tree group (STG 1) early on at bootup. (51622) - Switch could crash when processing SSL traffic received on the management interface. (50705) - Password for tacacs users could not be changed from the switch using the "primary-password" command when the "tacacs-server password-change" feature is enabled. (63530) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2016-2108(ALIRT LEN-7502). (55174) - Fixed security vulnerabilities as reported in CVE Advisories CVE-2016-3705, CVE-2016-3627, CVE-2015-8806, CVE-2016-4447, CVE-2016-4449, CVE-2016-4448 (libxml2). (57176, 55781, 58942, 58943) =============================================================================== IBM RackSwitch G8124/G8124E Version 7.11.7.0 (Released June 2016) ** Changes since the 7.11.6.0 release ** Enhancements: none Changes: none Fixes: - Fixed security vulnerabilities as reported in CVE Advisories CVE-2015-8710 (libxml2). (49214) - The switch’s browser based interface (BBI) was susceptible to security vulnerabilities XSS (stored cross-site scripting) and CSRF (cross-site request forgery). The web security policy mechanism HSTS (HTTP Strict Transport Security) has been implemented on BBI. (49409, 49427, 49471) - The switch’s browser based interface (BBI) would fail to honor the “cache-control=no-cache” directive and still cache the pages. The value of the “cache-control” directive has been changed from “no-cache” to “no-store”. (49475) - Switch could crash when enabling HTTPS protocol, while the switch were trying to connect to the VSI Manager. (50435) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.6.0 (Released February 2016) ** Changes since the 7.11.5.0 release ** Enhancements: none Changes: - The output of “show tech-support” now includes the isCLI commands as headers before their respective output. (38125) Fixes: - Using Cisco ACS, version 5.3 and above, to authenticate users with TACACS protocol, could lead to the User Interface thread (SSHD,AGR,TNET,CONS) to be suspended forever, thereby denying any further authentication with the TACACS protocol. (LV307694/7383) - Link would fail to come up when the port was configured with speed 100, full duplex, and auto-negotiation disabled. (38491) - Applying switch configuration having OSPF commands, could fail with the message “Routed Port Interface corresponding area (index) 0 is not enabled”, when pasting from a serial session. (7071) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2015-7575 (SLOTH). (47856) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2015-3194, CVE-2015-3195. (46801) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.5.0 (Released October 2015) ** Changes since the 7.11.4.0 release ** Enhancements: none Changes: - The command "show flash-dump-uuencode" in the isCLI menu and its equivalent "/maint/uudmp" from the IBMNOS-CLI menu have been deprecated. The reference to use these commands has been removed from the help tip that is posted upon user login if a flash-dump exists on the switch. (XB282980) - Added the ability for users to enable/disable SNMP login/logout traps through the "[no] snmp-server loginout-trap" command. (38040) Fixes: - When configuring “qos bandwidth min” on an UFP port, the switch would incorrectly allow the sum of the minimum bandwidth to be less than 100%. (40181, 40295) - Switch could crash when the server is configured with more than 4 UFP vNIC functions per port (switch only supports 4 vports). The switch will now shut down the vports when the mismatch occurs. (40296) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2015-1788 (BN_GF2m_mod_inv), CVE-2015-1789 (X509_cmp_time) and CVE-2015-1792 (do_free_upto). (39415) ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.4.0 (Released July 2015) ** Changes since the 7.11.3.0 release ** Enhancements: none Changes: - Added the ability to delete SNMP read and write community strings with the introduction of two new commands "no snmp-server read-community" and "no snmp-server write-community" respectively. (LV308180) - Addiitonal Debugs have been added to the get more information about system queues and threads under maitenace mode.The output of the "show mp thread" now includes information about the last command processed by each STEM thread. (LV311825) Fixes: - The mapping between local and remote ports is incorrect when using standard LLDP MIBs. The same is not true for private LLDP mibs (lldpInfoRemoteDevicesTable). (XB299432) - A high CPU utilization could occur during Topology Changes when running MSTP protocol in a multi tier VLAG setup. (LV310542) - Vlag failover due to primary switch being reloaded may incorrectly cause the secondary switch to error disable its vlag ports. This may happen when the healthcheck interface port number is higher than that of the ISL interface port number. (LV308603) - Switch could hang after deleting an IP interface that is associated with OSPF. (LV311901) - An SNMP MIB walk on both the peers of a VLAG domain could result in the flap of VRRP Protocol. (XB251897/XB253845) - Fixed GLIBC vulnerabilities as reported in CVE Advisories CVE-2013-7424 (getaddrinfo()) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2015-0286 (ASN1_TYPE_cmp). ================================================================================ IBM RackSwitch G8124/G8124E Version 7.11.3.0 (Released April 2015) Enhancements: none Fixes: - FCoE sessions could flap due to the High CPU Utilization caused by the software flooding of Clear Virtual Links packets with an unknown destination MAC in the FCoE VLAN. (LV296464) - Missing space after Objects DHCPSnoopingCurCfgPortTableEntry, DHCPSnoopingNewCfgPortTableEntry, DHCPSnoopingCurCfgVlanTableEntry and MldNewInterfaceEntry in the Enterprise MIB would cause compile errors when using certain MIB compilers. (XB280147) - A crash would occur when uploading a configuration to the switch, where the configuration file was edited to remove the leading Tab from the commands under "vlan dot1q" menu. (LV299681) - Switch could fail to install an ARP Entry for the static route or gateway leading to ARP packets getting flooded in the network. (LV301211) - Syslog messages would be lost after a reboot, when setting the facility using “logging host <1/2> facility “ to an odd number (LV299860) - Fixed OpenSSL vulnerabilities as reported in CVE Advisories CVE-2014-3572, CVE-2015-0204, CVE-2014-8275,CVE-2014-3570, CVE-2015-2808 (BarMitzvah), CVE-2014-3505, CVE-2014-3506 (openssl), CVE-2014-3507(same as 3506, d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb), CVE-2014-3508 (openssl), CVE-2014-3509 (race condition in t1_lib.c), CVE-2014-3510 (openssl), CVE-2014-3511 (openssl). (LV304231, LV308279, XB293143) - Fixed security vulnerabilities as reported in CVE Advisories CVE-2014-0191 (libxml2), CVE-2013-2877(libxml2), CVE-2014-3660 (libxml2), CVE-2013-2566(RC4 algo, TLS protocol), CVE-2015-0235 (GHOST/glibc) Changes: - Extend the ability of the command "[no] snmp-server link-trap port enable" to disable/enable link-trap for multiple interfaces. (LV302420) - source MAC address of protocol packets from LLDP, LACP , STP, PVRST and 802.1x are not learned by the switch. (LV301284) ===================================================================== IBM RackSwitch G8124/G8124E Version 7.11.1.0 (Released November 2014) New and Updated Features: ------------------------- IGMPv3 on vLAG support ---------------------- IGMPv3 protocol can now be configured when the unit is part of a vLAG topology. Display ARP entries for VLAN 4095 --------------------------------- This enhancement extends the display of ARP table to include the ARPs learnt on the dedicated management port. TACACs ------ For remote authentication with SSH using bypass username, both local username and password will be prompted. BGP Preappend AS Path ---------------------- This enhancement allows route-map to specify up to 32 AS numbers to prepend to a matched route. Fixes: None ===================================================================== IBM RackSwitch G8124/G8124E Version 7.9.1.0 (Released June 2014) New and Updated Features: ------------------------- VLAG-PIM with multicast sources ------------------------------- PIM is a multicast routing protocol to route the multicast traffic from multicast source to the receiver. vLAG PIM defines how PIM protocol should work over the vLAG topology. This new enhancement enables support for vLAG PIM with multicast source connected in the L2 domain behind the vLAG ports. It defines the vLAG PIM protocol behavior and traffic routing across different multicast source and receivers. With this new enhancement, multicast source and receiver can be connected anywhere in the vLAG PIM environment. This also enables vLAG PIM support in a multi tier tenant environment with L2 VLAG on the bottom tier and L3 VLAG on the top tier. Decoupling active VLANs from MSTP configuration: ------------------------------------------------ This feature enables the decoupling of the VLAN(s) configuration from MSTP configuration and changes the MSTP configuration menu to a more simplified one. By doing so, specifying a mapping between VLAN(s) and MSTI will not create any VLAN(s) and the participation of the VLAN(s) in MSTP will not depend on the VLAN(s) creation. LACP Individual Mode -------------------- When this feature is enabled on an LACP port-channel, if a member port of the port-channel does not receive any LACPDU over a period of time, it will be treated as a normal port which may forward data traffic according to its STP state. VLAG-MSTP Enhancement --------------------- This enhancement removes STP configuration restrictions, such as changing the MSTP instance and VLAN associations, that were enforced in previous releases when vLAG and MSTP are both enabled. The vLAG interswitch link ports are no longer error-disabled when there's an MSTP region mismatch between the vLAG switches, instead a recurring warning message is generated during the duration of the configuration mismatch. STP Range enhancement --------------------- This feature is an enhancement for existing STP commands to support configuration of a range of STP groups at a time. IBM-NOS CLI removal ------------------- The IBM-NOS CLI will not be supported as of this release. All switches will boot up with ISCLI. The existing NOS CLI configuration still can be recognized and correctly converted to provide smooth migration for customers who have NOS CLI configuration. IPv6 Counter enhancement ------------------------ This release adds CLI and corresponding SNMP MIB objects for IPv6 counters. The feature provides support for IPv6 neighbor cache table statistics like: Current number of installed entries. Maximum number of entries supported by router. High Water of the ipv6 neighbor cache table. Clear statistics BGP Community Lite ------------------ This feature provides support for BGP community strings to be advertised in updates to neighbors.The switch will be configured to attach a community string to the route updates it sends to peers.In this release, the IBM switch will not make any routing changes or alterations to the community string when receiving updates with a community string attached. Display BGP Routes ------------------- This feature provides an option to display BGP advertised routes that have been advertised to a specific neighbor. Host-Resources MIB (RFC1514) ---------------------------- The Host Resources MIB (RFC 2790) defines objects which are common across many computer system architectures. SNMP ACL --------- This feature is an enhancement to add access control for SNMP requests. SNMP Trap Host --------------- This feature implements the SNMP interface for getting and setting SNMP host configuration for traps. ESN to SNMP ------------ This feature enables SNMP access to Electronic Serial Number of the switch. Compliance to NIST-800 131A ---------------------------- This release enables compliance to NIST SP800-131a. PSIRT - SSL Vulnerability [CVE-2011-3389] ----------------------------------------- This release addresses the SSL vulnerability as described in CVE-2011-3389. It allows the customer to configure the switch to explicitly restrict negotiated versions to a “minimum version” of ssl to force the switch to ensure that only “safe” versions are negotiated. Security vulnerability: Remove switch type from login display ------------------------------------------------------------- Removed the switch type prompt since this is a security vulnerability. Secure FTP ---------- This release adds support for Secure FTP (sFTP). Use SHA-256 as default: ----------------------- Set SHA-256 as the default and preferred hashing algorithm for all secured network operations where applicable. This includes TLS certificates and cipher suites with HMAC SHA-256 in TLS. IPSec over Virtual links ------------------------ OSPFv3 over IPSec on Virtual Links is needed to complete NIST IPSec certification for OSPFv3 traffic. IPSec is needed to secure IPv6 traffic. The feature will use IPv6 Authentication Header (AH) to provide authentication and IPv6 Encapsulating Security Payload (ESP) to provide authentication and confidentiality to virtual link packets. Password Fix-Up Mode --------------------- Password Fix-Up Mode enables admin user account recovery if administrator access is lost. This release adds the option to disable password fix-up functionality to let the administrator of the switch decide whether the Fix-Up mode should be enabled or not to cover security concerns. IPv6 Health Check ----------------- The release supports the use of IPv6 address for vLAG health check. RMON Support (RFC1757,RFC2819) --------------------------------- Remote network monitoring devices, often called monitors or probes, are instruments that exist for the purpose of managing a network. This release supports RMON for Ethernet statistics, Ethernet History as well as Alarm and Event groups. Layer 3 ARP Table full ----------------------- When the L3 ARP table is full, the switch will generate a new trap message in addition to the existing syslog message. Use SSH public keys for up to 20 local switch users/admins ----------------------------------------------------------- The feature allows users to login to switch via SSH using public key authentication instead of password authentication.When SSH is enabled the switch should support both password and public key authentication. The switch shall support up to 20 SSH public key users. Fixes: - SNMP MIB walk could result in the flap of protocols such as VRRP, STP, LACP. (XB251897/XB253845) - Executing "show interface transceiver" command could result in the flap of protocols such as VRRP, STP, LACP. (XB253893) ================================================================================ IBM RackSwitch G8124 Version 7.7.5.0 (Released August 2013) ** Changes since the 7.7.3.0 release ** Enhancements: None Changes: SNMP ports that are not able to converge with peer ports will now result in a link-down state. This will occur when ports configured as members of an LACP trunk are connected to non-LACP ports. This is expected behavior. When connecting different IBMNOS products using LACP ports, it is recommended to install complimentary firmware versions (e.g., 7.7.5) on each device to ensure matching LACP behavior. Fixes: - Inefficiencies in the SNMP-processing code could result in high CPU utilization, SNMP client time-outs, protocol flaps, or a switch reset by the Hardware Watchdog. (66769, 70649) - User-configured ACL Deny rules were not being respected for packets with a Layer-4 (TCP) port of 22 or 23 (i.e., SSH and Telnet, respectively). (69126 / XB202484) - A prolonged period of high CPU utilization can lead to protocol-thread starvation. In one such case, LACP PDUs were not being sent by the CPU, leading to the break down of the LACP trunk forming the ISL in a vLAG topology. The ISL trunk ports that had previously been in the STP Discarding state would then errantly go into the Forwarding state, resulting in flooding of STP BPDUs into the network, and the inevitable network loop. (70887) - The SNMP dot1qVlanCurrentEntry OID was not being populated, resulting in SNMP Walks being stuck indefinitely at that point. (71785) - Disabling LACP (from the peer device) on a member port of an LACP trunk that also has STP disabled would result in the port being errantly displayed as FORWARDING in the output of the "show spanning-tree stp" command (and via the BBI), when in fact the port would be in the BLOCKING state (as designed). (71805, 71822) - Deleting the LACP key (from the peer device) on a member port of an LACP trunk that also has STP disabled would result in the port errantly going into the FORWARDING state. (71841) - With STP in PVRST mode and with a high active-port/STG product, a memory leak could occur while processing BPDUs (this was demonstrable with 47 ports active and more than 127 STGs configured per port). Over time, the memory leak could lead to a reset of the switch by the Memory Monitor. (71844) - A crash would occur when issuing the "show ufp info vport" command without explicitly specifying a vport number. (71951) - A watchdog timeout could occur if an IGMPv3 Report packet was received with the invalid source-IP address of 0.0.0.0. (71749) - Attempting to set port speed via the CMM would fail. (XB171317) - If the CMMs had "Failover on Physical Network Link" enabled (default), and the network link of the Active CMM went down, ports INTB1 and INTB2 could get disabled when the Standby CMM became active. (XB172285) - An IP address could not simultaneously be configured as a global DHCP server address, and a broadcast-domain DHCP server address. (XB172381) - A crash would occur while handling an SNMP ?Get? Request for the Object that contains UFP information pertaining the switch (OID 1.0.8802.1.1.2.1.4.1.1.12.2700.65.4). (XB194463, XB202919) - A crash could occur if an FCoE-related CLI command was issued while the external management port was being flooded with packets. (XB199890) - NTPv3 authentication information was being added to outgoing NTP Client Requests, even when authentication was disabled on the Switch. The consequence was that NTP servers that do not support authentication would discard the requests (i.e,, not respond to the Client Requests). (XB204541) - A crash could occur while handling an HTTPS request if the connection to the client was suddenly terminated while handling the transaction. (XB205895) - If the switch's Hostname was used to access the switch via BBI (i.e., relying on DNS instead of inputting the raw IP address), attempting to perform an image upgrade would result in redirection to a blank page. (XB206876) =========================================================================== IBM RackSwitch G8124E 7.7.3.0 (Released, June 2013) --------------------------------------------------- Enhancements: LACP Suspend Port ----------------- This feature provides the capability to allocate an assigned trunk to LACP ports by LACP key, which avoids a potential traffic loop caused by mis-connection or error configuration. FCoE with LAG support in standalone mode solution ------------------------------------------------- Link Aggregration Group (LAG) also know as trunk, allows multiple ports on a switch to be combined together as a single link. To support the increasing demand of higher bandwidth to the uplink FCF in an FCoE environment, we added LAG support for our FCoE solution in this release. Duplicate IP Detection ---------------------- The switch uses a simple mechanism to detect if two hosts on the same subnetwork are using the same IPv4 address at the same time. The switch sends a gratuitous ARP request for its own IP address. If it receives an ARP response, it sends a syslog message with the IP address and MAC address of the host that is using its IP address. Hotlinks + STP -------------- In prior releases, STP needs to be disabled globally when Hotlinks feature is configured. This feature removed this limitation of having to globally disable STP. BGP multipath relax ------------------- This functionality allows load balancing across different autonomous system paths that have equal AS path length. vLAG+PIM Dense Mode ------------------- Enable the PIM protocol over the vLAG topology in dense mode for efficient multicast forwarding.