Professional Documents
Culture Documents
ExtremeXOS 22.1 RelNotes PDF
ExtremeXOS 22.1 RelNotes PDF
121169-00
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
Support
For product support, including documentation, visit: http://www.extremenetworks.com/support/
Chapter 1: Overview................................................................................................................... 7
New and Corrected Features in ExtremeXOS 22.1................................................................................................7
Summit X460-G2 Series Switches Have Advanced Edge License............................................................ 26
VLAN Option Formatting in Commands................................................................................................................ 26
Circuit Emulation Service (CES) No Longer Supported................................................................................. 27
OpenFlow and SSH Included in ExtremeXOS Base Image............................................................................ 27
ExtremeXOS SSH Server Upgraded with OpenSSH v6.5............................................................................... 27
CLI Command Output Format of Ports Lists........................................................................................................27
Extreme Hardware/Software Compatibility and Recommendation Matrices...................................... 27
Compatibility with Extreme Management Center (Formerly NetSight)................................................. 28
Upgrading ExtremeXOS..................................................................................................................................................28
Supported MIBs...................................................................................................................................................................28
Tested Third-Party Products......................................................................................................................................... 28
Extreme Switch Security Assessment......................................................................................................................29
Service Notifications.........................................................................................................................................................30
Chapter 2: Limits.......................................................................................................................31
Chapter 3: Open Issues, Known Behaviors, and Resolved Issues..................................... 61
Open Issues............................................................................................................................................................................ 61
Known Behaviors................................................................................................................................................................63
Resolved Issues in ExtremeXOS 22.1.........................................................................................................................64
Conventions
This section discusses the conventions used in this guide.
Text Conventions
The following tables list text conventions that are used throughout this guide.
Platform-Dependent Conventions
Unless otherwise noted, all information applies to all platforms supported by ExtremeXOS® software,
which are the following:
• ExtremeSwitching® switches
• Summit® switches
• SummitStack™
When a feature or feature implementation applies to specific platforms, the specific platform is noted in
the heading for the section describing that implementation in the ExtremeXOS command
documentation (see the Extreme Documentation page at http://
documentation.extremenetworks.com). In many cases, although the command is available on all
platforms, each platform uses specific keywords. These keywords specific to each platform are shown in
the Syntax Description and discussed in the Usage Guidelines sections.
Terminology
When features, functionality, or operation is specific to a switch family, such as ExtremeSwitching™ or
Summit®, the family name is used. Explanations about features and operations that are the same across
all product families simply refer to the product as the switch.
Providing Feedback to Us
We are always striving to improve our documentation and help you work better, so we want to hear
from you! We welcome all feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team about
this document, please contact us using our short online feedback form. You can also email us directly at
internalinfodev@extremenetworks.com.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
• Global Technical Assistance Center (GTAC) for Immediate Support
• Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
• Email: support@extremenetworks.com. To expedite your message, enter the product name or
model number in the subject line.
• GTAC Knowledge — Get on-demand and tested resolutions from the GTAC Knowledgebase, or
create a help case if you need more guidance.
• The Hub — A forum for Extreme customers to connect with one another, get questions answered,
share ideas and feedback, and get problems solved. This community is monitored by Extreme
Networks employees, but is not intended to replace specific guidance from GTAC.
• Support Portal — Manage cases, downloads, service contracts, product licensing, and training and
certifications.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related Return Material Authorization (RMA) numbers
Related Publications
ExtremeXOS Publications
• ACL Solutions Guide
• ExtremeXOS 22.1 Command Reference Guide
• ExtremeXOS 22.1 EMS Messages Catalog
• ExtremeXOS 22.1 Feature License Requirements
• ExtremeXOS 22.1 User Guide
• ExtremeXOS OpenFlow User Guide
• ExtremeXOS Quick Guide
• ExtremeXOS Legacy CLI Quick Reference Guide
• ExtremeXOS Release Notes
• Extreme Hardware/Software Compatibility and Recommendation Matrices
• Switch Configuration with Chalet for ExtremeXOS 16.2 and Earlier
• Using AVB with Extreme Switches
These release notes document ExtremeXOS 22.1 which adds features and resolves software deficiencies.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Limitations
The following features of Change-of-Authorization (RFC5176) are not implemented in ExtremeXOS:
• Reverse Path Forwarding Check—Typically this is used in a proxy scenario. This check is used to
determine if the IP address indicated by the RADIUS attributes is a routable destination address for a
request sent by the switch software.
• IPSEC encryption—End-to-end encryption of both the RADIUS requests and responses.
• Disconnect-Request and Change-of-Authorization packets identifying sessions with anything other
than the Calling-Station-Id attribute containing a properly formatted MAC address. In addition to the
Calling-Station-ID attribute, you can also use a NAS-Port attribute, which indicates the index of the
specific port the session is connected to.
• Acct-Session-Id attribute—This is an alternate means of session identification. Sessions are currently
uniquely identified by port and MAC address pair.
• Retransmissions of Disconnect-Request or Change-of-Authorization ACK and NAK packets—
Retransmissions of packets is the responsibility of the device initiating the dynamic authorization
transactions.
disable radiusdynamic-authorization
show radius
Link Layer Discovery Protocol (LLDP) System Name Added to Show Output
The output of the show lldp neighbors command now shows the system name.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
show vlan
# show vlan
Untagged ports auto-move: Off
--------------------------------------------------------------------------------------
Name VID Protocol Addr Flags Proto Ports Virtual
Active router
/Total
---------------------------------------------------------------------------------------
Default 1 ---------------------------T--------------- ANY 2 /33 VR-Default
Mgmt 4095 ------------------------------------------- ANY 1 /1 VR-Mgmt
...
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Limitations
• Commands executed using North Bound interfaces (For example: SNMP, Extreme Management
Center, web) are not supported.
• The command show cli journal is not checkpointed in backup slot.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
During initial switch setup, you are prompted to configure SNMP community string and SNMPv3 user as
desired.
These changes in ExtremeXOS 22.1 SNMP behavior do not affect switch upgrades. Switches that already
have saved SNMP configurations continue to use their existing configurations.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
Additionally, all tables and variables of the OSPFv3-MIB (draft-ietf-ospf-ospfv3-mib-10) are now
supported. and subset of the traps in RFC 5643.
Supported Platforms
For VRF: Summit X450-G2, X460-G2, X670-G2, X770 series switches.
For MIB: Summit X450-G2, X460-G2, X670-G2, X770 and ExtremeSwitching X440-G2, X620 series
switches.
Limitations
• Only non-VPN VRFs are supported. OSPFv3 is blocked on VPN VRFs.
• BGP does not support VPN-IPv6 routes, so PE-CE support is not available.
• SNMP SET requests for OSPFv3 MIB objects are not supported.
show ospfv3
Redistribute:
Protocol Status Cost Type Tag Policy
direct Disabled 20 2 --- none
e-bgp Disabled 20 2 --- none
i-bgp Disabled 20 2 --- none
ripng Disabled 20 2 --- none
static Disabled 20 2 --- none
isis-level-1 Disabled 20 2 --- none
isis-level-2 Disabled 20 2 --- none
isis-level-1-external Disabled 20 2 --- none
isis-level-2-external Disabled 20 2 --- none
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
show stpd
When STP is disabled globally, BPDUs received on a port are forwarded to other ports that are part of
same VLAN causing the switch to transparently forward STP/RSTP/MSTP BPDUs. This transparent
forwarding causes one-to-many peer in the network trouble where STP is disabled. To avoid this
transparent forwarding of BPDUs, this feature provides the ability to discard the BDPUs when there is
no STP configuration enabled on the switch.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X770 and X670-G2 series switches, standalone, and in stacks that have these series switches
slots only.
Supported Platforms
Summit X460-G2, X670-G2, and X770 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
show mvrp
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770 series switches as standalone or in stacks.
The following show commands now display the current hash algorithm:
#show ipconfig ipv4
Use Redirects : Disabled
...
Route Sharing Hash : CRC Lower, Default Method
- or -
Route Sharing Hash : XOR, Custom Method
#show ipconfig ipv6
Route Sharing : Disabled
...
Route Sharing Hash : CRC Lower, Default Method
- or -
Route Sharing Hash : XOR, Custom Method
The following match criteria syntax can be added to the “if” clause of a policy rule:
The following policy example matches VNI 100 and increments a counter:
entry countvni100 {
if {
vxlan-vni 100;
} then {
count vni100;
}}
Supported Platforms
Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
The following show command now displays the port type (TLS or UPD) (shown in bold):
The EMS server attempts to established connection when secure Syslog target is enabled. If enable
command is issued from CLI, target is enabled only if connection is successful. If enable command is
issued from loading a configuration, target is enabled regardless of connection result. If connection the
is not successful, reconnection is attempted every 5 minutes until connection is successfully established.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Secure Authentication of Syslog Server and SSH Client Using X.509 Certificate
This feature in ExtremeXOS supports the secure authentication of Syslog server and SSH client to an
ExtremeXOS device using an X.509 certificate. The following are the primary aspects to a Public-Key
Infrastructure (PKI) configuration:
• Trusted CA—The X509v3 certificates of Certificate Authority (CA).
• Peer Certificate—The X509v3 certificate of the peer, signed by one of the above trusted CAs.
• OCSP—Online Certificate Status Protocol used to find the revocation status of the peer certificate.
• OCSP Signature CA—To support Trusted Responder Model (TRM) of OCSP, the X509v3 certificate of
the OCSP Responder is required. The OCSP signature CA is only required for TRM; it is not used for
DTM and common issuer.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Limitations
• All certificates should be in PEM format files.
• Downloading CA certificate chain is not supported.
• Individual CA certificates in a certificate chain should be downloaded one-by-one using the
following command: download ssl ipaddress certificate {ssl-cert | trusted-ca
| ocsp-signature-ca} cert_file
• Downloading CA certificate of size greater than 7.5KB is not recommended.
• Certification Revocation Lists (CRLs)—not supported.
• OCSP stapling—not supported.
• Nonce is always disabled in OCSP request.
• OCSP is not done for the OCSP responder certificate. Therefore, the OCSP responder certificate
should satisfy any of following criteria, failing which the OCSP response is rejected:
• OCSP responder certificate should be self-signed (OR).
• OCSP responder certificate should contain id-pkix-ocsp-nocheck extension.
Secure Shell (SSH) Public Key Infrastructure (PKI) with X509v3 Certificate-
Based Authentication
This feature adds Secure Shell (SSH) Public Key Infrastructure (PKI) with X509v3 Certificate-Based
Authentication to ExtremeXOS.
Previously, the ExtremeXOS SSH server supported the following two types of authentication methods
to authenticate the SSH clients:
• Password-based authentication—Simple mapping of configured user and password.
• User key-based authentication—User generates the key pair (public and private keys). The public key
is copied to the switch and associated to a particular user name. When the user tries to login to the
switch with their private key, the ExtremeXOS SSH server verifies the key and its association to the
user. If this succeeds, the login is allowed. If key-based authentication fails, it fails back to password-
based authentication.
The major disadvantage with user key-based authentication is scalability. As number of users increase,
more keys are copied and stored on the switch. This problem can be solved with the PKI. Additionally,
PKI provides added security, certificate revocation checking, avoiding manual mapping of key with user,
etc.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Limitations
• Certificate-based authentication is supported only for ExtremeXOS SSH server, not for ExtremeXOS
SSH client.
• Revocation check is done only for the SSH client-end certificate using Online Certificate Status
Protocol (OCSP) only at the time of login. No periodic revocation checks occur.
• The SSH client certificate must have client authentication purpose in the extendedKeyUsage field.
• Username must be present in CommonName (CN) in the subject of the certificate. The login
username and this CN must match for access to be granted.
• Support only for RSA, DSA-based SSH client certificates.
In ExtremeXOS, cryptographic functions are implemented using the OpenSSL library. The OpenSSL
library uses a DRBG to generate random numbers. This DRBG is seeded with random numbers from
the /dev/urandom device in the default configuration. However, in devices with few entropy sources, it
is possible for the /dev/urandom device to provide the same seeds to OpenSSL instances running on
different devices, resulting in two or more devices generating the same keys or sometimes different
RSA keys having a common factor. It is also possible that after a reboot, the /dev/urandom device may
provide the same seed that it provided on the last boot to OpenSSL instances running on the switch.
This feature solves this problem by modifying OpenSSL such that it seeds its DRBG with random bits
from the /dev/random device, instead of the /dev/urandom device.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
compromise the security of a cryptographic module or the security of the information protected by the
module).
CSP zeroization applies to flash memory, SSH private keys, and SSH session keys (present in volatile
memory) stored in a switch.
Zeroization of Flash
Flash memory mounted in /config and /scratch directories are zeroized currently after using the
command unconfigure switch erase all. As part of this feature, read-verify is done before
rebooting switch to bootrom.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Openssh-6.5p1 supports Diffie-Hellman group 1 and Diffie-Hellman group 14 as part of the key exchange
algorithms. By default, both Diffie-Hellman group 1 and Diffie-Hellman group14 are supported. You can
configure the minimal supported Diffie-Hellman group as 14 to avoid using the weaker Diffie-Hellman
group 1 on the SSH server.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
show ssh2
show ssh2
show ssh2
SSH module configuration details:
SSH Access : Disabled
Key validity : Invalid
TCP port : 22
VR : all
Access profile : not set
Secure Mode : Off
Diffie-Hellman Groups : 1 (1024 bits prime), 14 (2048 bits prime)
Idle time : 60 minutes
Ciphers : Not configured
Macs : hmac-md5-etm@openssh.com, hmac-sha1-etm@openssh.com,
hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com,
hmac-ripemd160-etm@openssh.com, hmac-sha1-96-etm@openssh.com,
hmac-md5-96-etm@openssh.com, hmac-md5, hmac-sha1,
hmac-sha2-256, hmac-sha2-512, hmac-ripemd160,
hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
As part of the Software Defined Networking (SDN), the networking industry has defined abstracted
models for various network functions and control. The OVSDB Hardware VTEP Schema is a standards-
based approach that allows a Network Virtualization Controller such as VMware NSX to configure a
hardware switch that implements VXLAN termination (VTEP). ExtremeXOS supports version 1.3 of the
schema.
• MAC addresses of remote virtual machines (VMs) and the tunnel to which each MAC address is
bound.
• The virtual network to tenant interface mapping. The controller instructs the gateway on how to
map a port or a <port, 802.1Q> tag pair to a VNI.
Supported Platforms
Summit X770 and X670-G2 standalone, and stacks that have Summit X770 and X670-G2 slots only.
Limitations
The following OVSDB capabilities are not supported in ExtremeXOS:
• IPv6 addresses for OVSDB manager.
• IPv6 addresses in Hardware VTEP Schema.
• Support for stacks wherein at least one node is not VXLAN capable.
• MLAG for VTEP redundancy.
• Except for show commands, OVSDB and ExtremeXOS commands should not be used
simultaneously to manage VXLAN.
disable ovsdb
enable ovsdb
show ovsdb
unconfigure ovsdb
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches.
Supported Platforms
Summit X770 and X670-G2 series switches (standalone), and stacks that have X770 and X670-G2 slots
only.
Limitations
• Multi-switch Link Aggregation (MLAG) does not function if the Inter-Switch Connection (ISC) port is
added to an untagged tenant VMAN.
• Non-Tenant VLANs/VMANs do not function if the port also has an untagged tenant VMAN.
With NetLogin, ONEPolicy, and IDM enabled, once the MAC address is authenticated and IDM table is
populated with the MAC user and with Kerberos correlated user, using XML target configured in
ExtremeXOS, the IDMGR events are be sent to Extreme Management Center server using HTTP/HTTPS.
Extreme Management Center after receiving the XML event decides what to do with the profiles
configured for Kerberos.
Supported Platforms
Summit X450-G2, X460-G2, X670-G2, X770, and ExtremeSwitching X620, X440-G2 series switches
For more information about licenses, see ExtremeXOS 22.1 Feature License Requirements .
Example
The enable stpd auto-bind command VLAN ID input should be entered as:
enable stpd auto-bind vlan 10,20-30
Not:
enable stpd auto-bind vlan 10, 20-30
When upgrading to ExtremeXOS 21.1 and later, SSH keys generated by earlier ExtremeXOS versions (16.1
and earlier) are compatible and do not need to be re-generated.
Note
If a switch is downgraded from ExtremeXOS 21.1 or later to previous releases, with RSA key
saved, the key becomes invalid.
This guide also provides information about which optics are supported on which hardware platforms,
and the minimum software version required.
The latest version of this and other ExtremeXOS guides are at: http://
documentation.extremenetworks.com
Upgrading ExtremeXOS
For instructions about upgrading ExtremeXOS software, see "Software Upgrade and Boot Options" in
the ExtremeXOS 22.1 User Guide .
Beginning with ExtremeXOS 12.1, an ExtremeXOS core image (.xos file) must be downloaded and
installed on the alternate (non-active) partition. If you try to download to an active partition, the error
message Error: Image can only be installed to the non-active partition.
appears. An ExtremeXOS modular software package (.xmod file) can still be downloaded and installed
on either the active or alternate partition.
Supported MIBs
The Extreme Networks MIBs are located on the eSupport website under Download Software Updates,
located at: https://esupport.extremenetworks.com.
You need to provide your serial number or agreement number, and then the MIBs are available under
each release.
For detailed information on which MIBs are supported, see the Extreme Networks Proprietary MIBs and
MIB Support Details sections in the ExtremeXOS 22.1 User Guide .
• Nessus
Service Notifications
To receive proactive service notification about newly released software or technical service
communications (for example, field notices, product change notices, etc.), please register at:
www.extremenetworks.com/support/service-notification-form
Table 4 summarizes tested metrics for a variety of features, as measured in a per-system basis unless
otherwise noted. These limits may change, but represent the current status. The contents of this table
supersede any values mentioned in the ExtremeXOS books.
The scaling and performance information shown in Table 4 is provided for the purpose of assisting with
network design. It is recommended that network architects and administrators design and manage
networks with an appropriate level of network scaling “head room.” The scaling and performance
figures provided have been verified using specific network topologies using limited switch
configurations. There is no guarantee that the scaling and performance figures shown are applicable to
all network topologies and switch configurations and are provided as a realistic estimation only. If you
experience scaling and performance characteristics that you feel are sufficiently below what has been
documented, contact Extreme Networks technical support for additional assistance.
The route limits shown in Table 4 for IPv4 and IPv6 routing protocols are software limits only. The actual
hardware limits may be higher or lower than the software limits, based on platform. The hardware limits
for specific platforms are specified as "IPv4/IPv6 routes (LPM entries in hardware)" in the following
table.
It is not advised to have greater than 25,000 total IP routes from all routing protocols. Adverse effects
can occur with routing tables larger than this, especially when a single network event or CLI command
affects a significant number of routes. For example, just after such a network event, the added system
load will cause a save configuration command to time out.
BGP (peer groups)—maximum Summit X460-G2, X670-G2, X770 with Core license 64
number of BGP peer groups. Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
BGP (policy entries)— Summit X460-G2, X670-G2, X770 with Core license 256
maximum number of BGP Summit X450-G2, and ExtremeSwitching X440-G2, X620 Not supported
policy entries per route policy.
EAPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
EAPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620 Not supported
protected VLANs. ExtremeSwitching X440-G2
ELSM (vlan-ports)—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 5,000
number of VLAN ports. ExtremeSwitching X620
ERPS domains—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 32
number of ERPS domains ExtremeSwitching X620, X440-G2
without CFM configured.
ERPS domains—maximum Summit X450-G2, X670-G2, X770, and ExtremeSwitching 16
number of ERPS domains with X620 32
CFM configured. Summit X460-G2
ERPSv1 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 1,000
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ERPSv2 protected VLANs— Summit X450-G2, X460-G2, X670-G2, X770, and 500
maximum number of ExtremeSwitching X620, X440-G2
protected VLANs.
ESRP groups—maximum Summit X450-G2, X460-G2, X670-G2, X770, and 31
number of ESRP groups. ExtremeSwitching X440-G2, X620
IPv6 routes in software— Summit X450-G2, X460-G2, X670-G2, X770, and 25,000
maximum number of IPv6 ExtremeSwitching X620, X440-G2
routes in software.
IP router interfaces—maximum Summit X460-G2, X770, X670-G2, X450-G2 2,048
number of VLANs performing ExtremeSwitching X620, X440-G2 510
IPv4 and/or IPv6 routing.
Excludes sub-VLANs.
IP multicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of
permanent multicast IP routes.
IP unicast static routes— Summit X460-G2, X670-G2, X450-G2, X770 1,024
maximum number of ExtremeSwitching X620, X440-G2 480
permanent IP unicast routes.
IP route sharing (maximum Summit X460-G2, X670-G2, X450-G2, X770, and 2, 4, 8, 16, 32, or
gateways)—Configurable ExtremeSwitching X620 64
maximum number of gateways ExtremeSwitching X440-G2 N/A
used by equal cost multipath
OSPF, BGP, IS-IS, static routes,
or L2VPNs. Routing protocol
OSPF is limited to 64 ECMP
gateways per destination.
Routing protocols BGP is
limited to 64 ECMP gateways
per destination, while and IS-IS
is limited to 8. Static routes are
limited to 64 next-hops.
L2VPNs are limited to 16 LSPs
per pseudowire on platforms
that support 32 gateways, and
64 LSPs per pseudowire on
platforms that support 64
gateways.
1,022
Summit X460-G2, X450-G2 1,022
default maximum gateways of 4 510
if maximum gateways is 2 254
126
if maximum gateways is 8
62
if maximum gateways is 16
if maximum gateways is 32 126
if maximum gateways is 64 126
126
ExtremeSwitching X620 126
62
default maximum gateways of 4 30
if maximum gateways is 2
if maximum gateways is 8 N/A
if maximum gateways is 16
if maximum gateways is 32
if maximum gateways is 64
ExtremeSwitching X440-G2
IP multinetting (secondary IP Summit X450-G2, X460-G2, X670-G2, X770, and 255
addresses)—maximum ExtremeSwitching X620, X440-G2
number of secondary IP
addresses per VLAN.
IS-IS adjacencies—maximum Summit X460-G2, X670-G2, X770 128
number of supported IS-IS Summit X450-G2, and ExtremeSwitching X620, X440-G2 N/A
adjacencies.
Note:
• Limit value same for MVR
senders, PIM Snooping
entries. PIM SSM cache,
IGMP senders, PIM cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.
• Layer 3 IPMC cache limit in
mixed mode also has the
same value.
Note:
• Limit value same for MLD
sender per switch,PIM IPv6
cache.
• The internal lookup table
configuration used is "more
l3-and-ipmc”.
• Assumes source-group-
vlan mode as look up key.
1 4 ingress
2 3 ingress + 1 egress
3 2 ingress + 2 egress
4 2 (ingress + egress)
5 1 (ingress + egress) + 2 ingress
6 1 (ingress + egress) + 1 egress + 1 ingress
Mirroring, one-to-many (filters) Summit X450-G2, X460-G2, X670-G2, X770, and 128
—maximum number of one-to- ExtremeSwitching X620, X440-G2
many mirroring filters.
N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 40 entries per
Slaves clock port
ExtremeSwitching X440-G2, X620 N/A
PTP/1588v2 Unicast Static Summit X770, X670-G2, X460-G2 10 entries per
Masters clock type
ExtremeSwitching X440-G2, X620 N/A
Route policies—suggested Summit X460-G2, X670-G2, X770, and ExtremeSwitching 10,000
maximum number of lines in a X620, X440-G2
route policy file.
RIP Learned Routes— Summit X770, X670-G2, X460-G2, and ExtremeSwitching 10,000
maximum number of RIP X440-G2, X620
routes supported without
aggregation.
RIP interfaces on a single Summit X670-G2, X460-G2 256
router—recommended Summit X770, X450-G2 256
maximum number of RIP ExtremeSwitching X440-G2, X620 128
routed interfaces on a switch.
RIPng learned routes— Summit X670-G2, X460-G2, X770, X450-G2 3,000
maximum number of RIPng ExtremeSwitching X440-G2, X620 N/A
routes.
Spanning Tree (maximum Summit X450-G2, X770, X670-G2, X460-G2, and 64
STPDs)—maximum number of ExtremeSwitchingX620
Spanning Tree Domains on ExtremeSwitching X440-G2 32
port mode EMISTP.
Note:
• Maximum of 10 active
ports per PVST domain
when 256 PVST domains
are configured.
• Maximum of 7 active ports
per PVST domain when 128
PVST domains are
configured.
VRRP (maximum ping tracks) Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
—maximum number of ping ExtremeSwitching X620, X440-G2 centisecond or 1
tracks per VRRP Instance second hello
under 128 VRRP instances, interval)
with Advanced Edge license or
higher.
VRRP (v3-IPv6) (maximum Summit X450-G2, X460-G2, X670-G2, X770, and 8 (20
ping tracks)—maximum ExtremeSwitching X620, X440-G2 centisecond or 1
number of ping tracks per second hello
VRRP Instance under 128 interval)
VRRP instances, with
Advanced Edge license or
higher.
VRRP (v2/v3-IPv4/IPv6) Summit X450-G2, X460-G2, X670-G2, X770, and 8
(maximum iproute tracks)— ExtremeSwitching X620, X440-G2
maximum number of IP route
tracks per VLAN.
VRRP (v2/v3-IPv4/IPv6)— Summit X450-G2, X460-G2, X670-G2, X770, and 8
maximum number of VLAN ExtremeSwitching X620, X440-G2
tracks per VLAN.
This chapter lists open software issues, limitations in ExtremeXOS system architecture (known issues),
and resolved issues in ExtremeXOS.
Open Issues
The following are new open issues for supported features found in ExtremeXOS 22.1.
xos0066067 When a configuration file (.xsf) saved in ExtremeXOS 21.1 is run on ExtremeXOS 22.1,
all the configured MAC lists, primary and secondary shared-secrets in RADIUS and
TACAS, and NMS shared-secrets are replaced with empty strings.
ACL
xos0064027 Due to limitations in slice depth, Summit X460-G2 series switches cannot have 512
single-wide rules in a single slice, causing applications like policy to not attain full
capacities. Consequently, Summit X460-G2 series switches are constrained to
Summit X450-G2 rule limits.
NetLogin
xos0065247 Unauthenticated clients in NetLogin get DHCP IP address using NetLogin-
authenticated VLAN when private VLAN is configured and clients are in isolated
VLAN.
OVSDB
Workaround:
In setups where OVSDB is used to manage and configure the ExtremeXOS switch as
a VTEP, the VTEP schema database must be manually cleared using the command
disable ovsdb schema when the active configuration of an ExtremeXOS
switch is changed using the CLI command use configuration. Failure to do
so might result in OVSDB using a stale VTEP schema database.
xos0065504 The command show ovsdb schema can become unresponsive when either
ExtremeXOS or OVSDB are synchronizing data.
xos0064657, xos0064656 switch_fault_status and port_fault_status are not set in the hardware_vtep schema.
In ExtremeXOS 22.1, for switch_port_status and port_fault_status (PSTAG-like
scenarios), EMS receives a log message.
SNMP
xos0066062 SNMP community strings that are stored as encrypted using the command
configure snmp add community community_string readonly
| readwrite store-encrypted do not work after you upgrade from an
earlier version of ExtremeXOS to version 22.1.
xos0066070 XSF scripts with encrypted communities and v3 users created with earlier versions of
ExtremeXOS do not work on ExtremeXOS 22.1. Additionally, after loading the script,
SNMP access remains disabled in ExtremeXOS 22.1, even if it was enabled in an
earlier version of ExtremeXOS. This occurs because SNMP is disabled by default in
ExtremeXOS 22.1 and enabled by default in earlier versions.
Known Behaviors
The following are limitations in ExtremeXOS system architecture that have yet to be resolved.
SSH
xos0064755 Turning FIPS mode off when Secure mode is on loses the cipher configuration.
VRRP
xos0064219 When downgrading the ExtremeXOS image from 22.1 to an earlier version, if you
have set up a greater number of VRRP VRIDs per VLAN than are supported in that
earlier release, but that are supported in version 22.1 (maximum of 255), VRRP
instances for all VRIDs are incorrectly enabled.
• When the 10G ports operate at 1G speed, the network clock does not lock. Models
with Ethernet BASE-T or Power over Ethernet (PoE) ports may lock on initial
configuration, but do not lock after a save and reboot.
Note: For SyncE input at 1G, use a 1G port, not a 10G port.
xos0063960 Several help options do not appear for the show fdb command.
xos0064472 SyncE clock switchover does not occur when the clock source ports medium are
different. When the clock source configured on a fiber port is then unconfigured, and
reconfigured, for another copper port, the clock status goes into holdover mode.
After a reboot it gets locked.
xos0064713 In SummitStacks, memory leak happens in NetLogin process when continuous MAC
authentication occurs leading to a backup node reboot.
Summit X670-G2 Series Switches
xos0064568 After slot reboot, traffic drop occurs on VPLS service VLAN LAG port.
ACL
xos0064170 When ClearFlow is enabled with around 4,000 rules with separate counters, the HAL
process utilization almost always stays at 40%.
xos0064496 BGP route policy performs improper community delete operation.
xos0064523 Dynamic ACL rule is not removed properly when turning off packet capture.
xos0064573 ACL process ends unexpectedly after refreshing a policy with clear-flow rules.
BGP