7X 8X Troubleshooting Guide
7X 8X Troubleshooting Guide
A
OmniSwitch 6900/6860(E)/6865
Release 8.3.1.R02
These release notes accompany release 8.3.1.R02. These release notes provide important information on
individual software features and hardware modules. Since much of the information in these release notes is not
included in the hardware and software user manuals, it is important that you read all sections of this document
before installing new hardware or loading new software.
Note: The OS9900 and OS10K are not supported in this 8.3.1.R02 Release. Support will be added for these
platforms in an upcoming 8.3.1.R02 Release.
Contents
Contents .............................................................................................................................. 2
[IMPORTANT] *MUST READ*: AOS Release 8.3.1.R02 Prerequisites and Deployment Information............... 5
CodeGuardian ....................................................................................................................... 8
Related Documentation
These release notes should be used in conjunction with OmniSwitch AOS Release 8 User Guides. The following
are the titles of the user guides that apply to this release. User guides can be downloaded at:
http://enterprise.alcatel-lucent.com/?dept=UserGuides&page=Portal
System Requirements
Memory Requirements
The following are the standard shipped memory configurations. Configuration files and the compressed
software images—including web management software (WebView) images—are stored in the flash memory.
Switches not running the minimum version required should upgrade to the latest UBoot or FPGA that is
available with the 8.3.1.R02 AOS software available from Service & Support.
Please refer to the Upgrade Instructions section at the end of these Release Notes for step-by-step instructions
on upgrading your switch.
[IMPORTANT] *MUST READ*: AOS Release 8.3.1.R02 Prerequisites and Deployment Information
General Information
• Note: Early availability features are available in AOS and can be configured. However, they have
not gone through the complete AOS validation cycle and are therefore not officially supported.
• Please refer to the Feature Matrix in Appendix A for detailed information on supported features for
each platform.
• Prior to upgrading to AOS Release 8.3.1.R02 please refer to Appendix B for important best practices,
prerequisites, and step-by-step instructions.
Additional Information
• The Advanced license is included by default on the OS6865, OS6860E, and OS6900 platforms in
8.3.1.R02. It is not included on the OS6860-nonE models.
• All switches that ship from the factory with AOS Release 8.3.1.R02 will default to VC mode and attempt
to run the automatic VC, automatic remote configuration, and automatic fabric protocols. Please note
that since the switches default to VC mode, automatic remote configuration does not support the
downloading of a ‘boot.cfg’ file, only the ‘vcboot.cfg’ file is supported.
• The OmniSwitch BPS (OS-BPS) is no longer supported beginning with AOS Release 8.3.1.R01.
VC-2 or more
requires Advanced
license.
If Advanced features were If Advanced features were
enabled (even if the enabled (even if the
configurations were cleared configurations were
or disabled before 45-day cleared/disabled before 45
demo period). days demo period).
- Switch will reboot. – Switch will reboot
If permanent license is If permanent license is
installed before the installed before the
expiration of demo license. expiration of demo license.
– Switch will not reboot. - Switch will not reboot
Licensed Features
The table below lists the licensed features in this release and whether or not a license is required for the various
models.
License Required?
OS6900 OS6860(E) OS6865 Notes
Advanced Features
• The Advanced license is included in this release and always active on the OS6865.
• The Advanced license is included in this release must be activated on the OS6860E and OS6900 with the
command license apply file license.dat.
o There may be a default “license.dat” file included, if not, one can be manually created. The file
can be empty.
o Upon successful installation the Advanced license is applied at runtime, no reboot required.
o If part of a VC, the OS6860 non-E models must still have a valid license key.
o If the Advanced demo license is activated it must be deactivated first.
CodeGuardian
Alcatel-Lucent Enterprise and LGS Innovations have combined to provide the first network equipment to be
hardened by an independent group. CodeGuardian promotes security and assurance at the network device level
using independent verification and validation of source code, software diversification to prevent exploitation
and secure delivery of software to customers.
CodeGuardian employs multiple techniques to identify vulnerabilities such as software architecture reviews,
source code analysis (using both manual techniques and automated tools), vulnerability scanning tools and
techniques, as well as analysis of known vulnerabilities in third party code.
Software diversification
Software diversification randomizes the executable program so that various instances of the same software,
while functionally identical, are arranged differently. The CodeGuardian solution rearranges internal software
while maintaining the same functionality and performance and modifies the deliverable application to limit or
prevent/impede software exploitation. There will be up to 5 different diversified versions per GA release of
code.
System
PR Description Workaround
222080 Dynamic unicast SDP entry is not showing There is no known workaround at this time.
up under service domain when unknown
unicast traffic is sent from SAP to SAP.
Layer 2 / Multicast
PR Description Workaround
216750 If DHL session is administratively disabled If the links belonging to a DHL admin
while retaining the linka and linkb disabled session are part of a loop, bring
port/linkagg, STP will be disabled on down one of the links to avoid the loop or
these ports and traffic could continuously delete the session through configuration.
loop if these ports are part of a loop.
219094 IPMS displays forwarding entries back to There is no known workaround at this time.
the same source vlan/port. This has no functional impact.
222153 During a takeover in a VC, the chassis that Flush the MACs on the switches connected to
was rebooted may respond to requests server-cluster ports connected to the chassis
before being fully operational causing that did not go down during takeover or wait
unknown destination MACs to be flooded for MACs to age out.
to edge switches which may cause server-
cluster traffic connected to those edge
switches to be dropped.
QoS
PR Description Workaround
222853 Openflow agent (VC of 2 OS6900 X72/Q32) There is no known workaround at this time.
is sending wrong OFP_port number to
controller in OFP.
222968 The traffic is not forwarded for all 224K There is no known workaround at this time.
MAC entries learned in hardware as
openflow L2-dest flows. Traffic
forwarding is happening only for
approximately 213K flows.
ISSU/Takeover/Reload
PR Description Workaround
220683 After an ISSU upgrade seeing traffic loss Performing a MAC flush or port toggle helps
for one or more VLANs on UNP ports. to recover.
Virtual Chassis
PR Description Workaround
222554 Expansion slot extraction leads to node Remove the VFL configuration before
reload in Auto-VC setup of vc-of-6. performing hot-swap of the expansion slot.
222609 Dynamic SAP ports were not created as a Enable auto-fabric globally and disable SPB
part of auto-fabric process if both are protocol individually on the ports on which
AOS switches and one of them is UNP is expected to be auto-configured.
configured as a plain L2 switch.
• When connecting or disconnecting a power supply to or from a chassis, the power supply must first be
disconnected from the power source.
• For the OS6900-X40 wait for first module to become operational before adding the second module.
• All module extractions must have a 30 second interval before initiating another hot swap activity.
• All module insertions must have a 5 minute interval AND the OK2 LED blinking green before initiating
another hot swap activity.
OS-HNI-U6 OS-HNI-U6
OS-QNI-U3 OS-QNI-U3
OS-XNI-T8 OS-XNI-T8
OS-XNI-U12E OS-XNI-U12E
3. Extract the module from the chassis and wait approximately 30 seconds before inserting a
replacement.
8. Hot swap one CFM at a time. Please ensure all fan trays are always inserted and operational. CFM hot
swap should be completed with 120 seconds.
Technical Support
Alcatel-Lucent technical support is committed to resolving our customer’s technical issues in a timely manner.
Customers with inquiries should contact us at:
Email: [email protected]
Internet: Customers with service agreements may open cases 24 hours a day via the support web page at:
support.esd.alcatel-lucent.com. Upon opening a case, customers will receive a case number and may review,
update, or escalate support cases on-line. Please specify the severity level of the issue per the definitions
below. For fastest resolution, please have hardware configuration, module types and revision by slot, software
revision, and configuration file available for each switch.
Severity 1 - Production network is down resulting in critical impact on business—no workaround available.
enterprise.alcatel-lucent.com - Alcatel-Lucent and the Alcatel-Lucent Enterprise logo are trademarks of Alcatel-Lucent.
To view other trademarks used by affiliated companies of ALE Holding, visit: enterprise.alcatel-lucent.com/trademarks. All
other trademarks are the property of their respective owners. The information presented is subject to change without
notice. Neither ALE Holding nor any of its affiliates assumes any responsibility for inaccuracies contained herein (2017).
Note: Early availability features are available in AOS and can be configured. However, they have not
gone through the complete AOS validation cycle and are therefore not officially supported.
Management Features
USB Console Support N Y N
SNMP v1/v2/v3 Y Y Y
NTP Y Y Y
PING and TRACEROUTE as a Y Y Y
Read-Only user
USB Disaster Recovery Y Y Y
Automatic Remote Y Y Y
Configuration / Zero touch
provisioning
IP Managed Services Y Y Y
SSH for read-only users Y Y Y
VRF Y Y Y
VRF – DHCP Client Y Y Y
Automatic/Intelligent Fabric Y Y Y
Automatic VC Y Y Y
Bluetooth for Console Access N Y N
EEE support Y Y Y
Embedded Python Scripting / Y Y Y
Event Manager
ISSU Y Y Y
OpenFlow Y Y N
SAA Y Y Y
SNMPv3 FIPS Certified N N N
Cryptographic Algorithms
UDLD Y Y Y
USB Flash Y Y Y
Virtual Chassis (VC) Y Y Y
VC Split Protection (VCSP) Y Y Y
PIM-DM Y Y Y
IPv4 Multicast Switching Y Y Y
Add tags to static-route Y Y Y
command to enable easier
redistribution
BGP with graceful restart Y Y Y
BGP route reflector for IPv6 Y Y Y
BGP ASPATH Filtering for IPv6 Y Y Y
routes on IPv6 peering
BGP support of MD5 password Y Y Y
for IPv6
BGP 4-Octet ASN Support Y Y Y
GRE Y Y Y
IP-IP tunneling Y Y Y
IP routed port Y Y Y
IPv6 Y Y Y
IPv6 DHCP relay and Neighbor Y Y Y
discovery proxy
ISIS IPv4/IPv6 Y Y Y
M-ISIS Y Y Y
OSPFv3 Y Y Y
RIP v1/v2 Y Y Y
RIPng Y Y Y
DHCP Server (v4, v6 with Y Y Y
integrated support of QIP
remote management)
VRRP v2 Y Y Y
VRRP v3 Y Y Y
ARP - Proxy Y Y Y
ARP - Distributed Y N N
BFD Y Y Y
DHCP Snooping Y Y Y
DHCP Snooping IP source Y Y Y
filtering – VLAN/port-based
DHCPv6 Relay Y Y Y
IP Multinetting Y Y Y
IPSec Y Y Y
Server Load Balancing (SLB) Y Y Y
Multicast Features
IGMP v1/v2/v3 Y Y Y
IPv4 Multicast Switching Y Y Y
PIM-DM Y Y Y
DVMRP Y Y Y
Monitoring/Troubleshooting
Features
Extended ping and traceroute Y Y Y
Port mirroring Y Y Y
Port monitoring Y Y Y
Switch logging / Syslog Y Y Y
RMON Y Y Y
SFlow Y Y Y
Policy based mirroring Y Y Y
Port mirroring - remote Y Y Y
TDR N Y N
Ethernet Services Y Y Y
Ethernet OAM (ITU Y1731 and Y Y Y
802.1ag)
Security Features
Access Guardian – UNP Y Y Y
Access Guardian - BYOD N Y Y
Interface Violation Recovery Y Y Y
Learned Port Security (LPS) Y Y Y
LLDP Rogue Detection Y Y Y
TACACS+ Client Y Y Y
TACACS+ command based Y Y Y
authorization
Accounting Y Y Y
Application Monitoring and N Y N
Enforcement (Appmon)
ARP Poisoning Protection Y Y Y
Application Fingerprinting Y N N
COA Extension support for N Y Y
RADIUS (BYOD)
mDNS Snooping/Relay (BYOD) N Y Y
UPNP/DLNA Relay (BYOD) N Y Y
Page 18 of 31 OmniSwitch AOS Release 8.3.1.R02 - Rev. A
January 2017
PoE Features
802.1af and 802.3at N Y Y
Other Features
Dying Gasp N Y Y
Standard Upgrade - The standard upgrade of a standalone chassis or virtual chassis (VC) is nearly
identical. All that’s required is to upload the new image files to the Running directory and reload the
switch. In the case of a VC, prior to rebooting the Master will copy the new image files to the Slave(s)
and once the VC is back up the entire VC will be synchronized and running with the upgraded code.
ISSU - The In Service Software Upgrade (ISSU) is used to upgrade the software on a VC or modular
chassis with minimal network disruption. Each element of the VC is upgraded individually allowing
hosts and switches which are dual-homed to the VC to maintain connectivity to the network. The
actual downtime experienced by a host on the network should be minimal but can vary depending upon
the overall network design and VC configuration. Having a redundant configuration is suggested and
will help to minimize recovery times resulting in sub-second convergence times.
Virtual Chassis - The VC will first verify that it is in a state that will allow a successful ISSU
upgrade. It will then copy the image and configuration files of the ISSU specified directory
to all of the Slave chassis and reload each Slave chassis from the ISSU directory in order from
lowest to highest chassis-id. For example, assuming chassid-id 1 is the Master, the Slave
with chassis-id 2 will reload with the new image files. When Slave chassis-id 2 has rebooted
and rejoined the VC, the Slave with chassis -id 3 will reboot and rejoin the VC. Once the
Slaves are complete they are now using the new image files. The Master chassis is now
rebooted which causes the Slave chassis to become the new Master chassis. When the original
Master chassis reloads it comes back as a Slave chassis. To restore the role of Master to the
original Master chassis the current Master can be rebooted and the original Master will
takeover, re-assuming the Master role.
Modular Chassis - The chassis will first verify that it is in a state that will allow a successful
ISSU upgrade. It will then copy the image and configuration files of the ISSU specified directory
to the secondary CMM and reload the secondary CMM which becomes the new primary CMM.
The old primary CMM becomes the secondary CMM and reloads using the upgraded code. As a
result of this process both CMMs are now running with the upgraded code and the primary and
secondary CMMs will have changed roles (i.e., primary will act as secondary and the secondary
as primary). The individual NIs can be reset either manually or automatically (based on the NI
reset timer).
ISSU – Supported
OS6865 - VC N/A N/A
Standard - Supported
Prerequisites
These upgrade instructions require that the following conditions exist, or are performed, before upgrading. The
person performing the upgrade must:
• Be aware of any issues that may arise from a network outage caused by improperly loading this
code.
• Understand that the switch must be rebooted and network access may be affected by following this
procedure.
• Have a working knowledge of the switch to configure it to accept an FTP connection through the
EMP or Network Interface (NI) Ethernet port.
• Read the GA Release Notes prior to performing any upgrade for information specific to this release.
• Ensure there is a current certified configuration on the switch so that the upgrade can be rolled-
back if required.
• Verify the current versions of UBoot and FPGA. If they meet the minimum requirements, (i.e. they
were already upgraded during a previous AOS upgrade) then only an upgrade of the AOS images is
required.
• Depending on whether a standalone chassis or VC is being upgraded, upgrading can take from 5 to
20 minutes. Additional time will be needed for the network to re-converge.
• The examples below use various models and directories to demonstrate the upgrade procedure.
However any user-defined directory can be used for the upgrade.
• If possible, have EMP or serial console access to all chassis during the upgrade. This will allow you
to access and monitor the VC during the ISSU process and before the virtual chassis has been re-
established.
• Knowledge of various aspects of AOS directory structure, operation and CLI commands can be found
in the Alcatel-Lucent OmniSwitch User Guides. Recommended reading includes:
o Release Notes - for the version of software you’re planning to upgrade to.
o The AOS Switch Management Guide
Chapter – Getting Started
Chapter - Logging Into the Switch
Chapter - Managing System Files
Chapter - Managing CMM Directory Content
Chapter - Using the CLI
Chapter - Working With Configuration Files
Chapter - Configuring Virtual Chassis
Do not proceed until all the above prerequisites have been met. Any deviation from these upgrade procedures
could result in the malfunctioning of the switch. All steps in these procedures should be reviewed before
beginning.
Switch Maintenance
It’s recommended to perform switch maintenance prior to performing any upgrade. This can help with
preparing for the upgrade and removing unnecessary files. The following steps can be performed at any time
prior to a software upgrade. These procedures can be done using Telnet and FTP, however using SSH and
SFTP/SCP are recommended as a security best-practice since Telnet and FTP are not secure.
1. Use the command ‘show system’ to verify current date, time, AOS and model of the switch.
6900-> show system
System:
Description: Alcatel-Lucent OS6900-X20 7.3.2.568.R01 Service Release, September 05, 2014.,
Object ID: 1.3.6.1.4.1.6486.801.1.1.2.1.10.1.1,
Up Time: 0 days 0 hours 1 minutes and 44 seconds,
Contact: Alcatel-Lucent, http://alcatel-lucent.com/wps/portal/enterprise,
Name: 6900,
Location: Unknown,
Services: 78,
Date & Time: FRI OCT 31 2014 06:55:43 (UTC)
Flash Space:
Primary CMM:
Available (bytes): 1111470080,
Comments : None
3. Verify that the /flash/pmd and /flash/pmd/work directories are empty. If they have files in them check the
date on the files. If they are recently created files (<10 days), contact Alcatel-Lucent Service & Support. If not,
they can be deleted.
4. Use the ‘show running-directory’ command to determine what directory the switch is running from and
that the configuration is certified and synchronized:
6900-> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : vc_dir,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
If the configuration is not certified and synchronized, issue the command ‘write memory flash-synchro’:
6900-> write memory flash-synchro
6. If you do not already have established baselines to determine the health of the switch you are upgrading,
now would be a good time to collect them. Using the show tech-support series of commands is an excellent
way to collect data on the state of the switch. The show tech support commands automatically create log files
of useful show commands in the /flash directory. You can create the tech-support log files with the following
commands:
It is a good idea to offload these files and review them to determine what additional data you might want to
collect to establish meaningful baselines for a successful upgrade.
• If upgrading a standalone chassis or VC using a standard upgrade procedure please refer to Appendix C
for specific steps to follow.
• If upgrading a VC using ISSU please refer to Appendix D for specific steps to follow.
Go to the Service and Support website and download and unzip the upgrade files for the appropriate model and
release. The archives contain the following:
• OS6900 - Tos.img
• OS6860 – Uos.img
• OS6865 – Uos.img
• imgsha256sum (not required) –This file is only required when running in Common Criteria mode. Please
refer to the Common Criteria Operational Guidance Document for additional information. (Note: This
document will be available at a future date after completion of Common Criteria certification).
FTP the image files to the Running directory of the switch you are upgrading. The image files and directory will
differ depending on your switch and configuration.
Follow the steps below to upgrade the image files by reloading the switch from the Running directory.
If upgrading a VC the new image file will be copied to all the Slave chassis and the entire VC will reboot. After
approximately 5-20 minutes the VC will become operational.
Log in to the switch to confirm it is running on the new software. This can be determined from the login banner
or the show microcode command.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
Note: If there are any issues after upgrading the switch can be rolled back to the previous certified version by
issuing the reload from certified no rollback-timeout command.
After verifying the software and that the network is stable, use the following commands to certify the new
software by copying the Running directory to the Certified directory.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
Go to the Service and Support Website and download and unzip the ISSU upgrade files for the appropriate
platform and release. The archive contains the following:
• OS6900 - Tos.img
• OS6860 – Uos.img
• OS6865 – Uos.img
• imgsha256sum (not required) –This file is only required when running in Common Criteria mode. Please
refer to the Common Criteria Operational Guidance Document for additional information. (Note: This
document will be available at a future date after completion of Common Criteria certification).
Note: The following examples use issu_dir as an example ISSU directory name. However, any directory
name may be used. Additionally, if an ISSU upgrade was previously performed using a directory named
issu_dir, it may now be the Running Configuration, in which case a different ISSU directory name should be
used.
2. Create the new directory on the Master for the ISSU upgrade:
It is important to connect to the Slave chassis and verify that there is no existing directory with the path
/flash/issu_dir on the Slave chassis. ISSU relies upon the switch to handle all of the file copying and directory
creation on the Slave chassis. For this reason, having a pre-existing directory with the same name on the Slave
chassis can have an adverse affect on the process. To verify that the Slave chassis does not have an existing
directory of the same name as the ISSU directory on your Master chassis, use the internal VF-link IP address to
connect to the Slave. In a multi-chassis VC, the internal IP addresses on the Virtual Fabric Link (VFL) always use
the same IP addresses: 127.10.1.65 for Chassis 1,127.10.2.65 for Chassis 2, etc. These addresses can be found
by issuing the debug command ‘debug show virtual-chassis connection’ as shown below:
4. SSH to the Slave chassis via the internal virtual-chassis IP address using the password ‘switch’:
Password:switch
5. Use the ls command to look for the directory name being used for the ISSU upgrade. In this example, we’re
using /flash/issu_dir so if that directory exists on the Slave chassis it should be deleted as shown below.
Repeat this step for all Slave chassis:
6900-> rm –r /flash/issu_dir
6900-> exit
logout
Connection to 127.10.2.65 closed.
7. On the Master chassis copy the current Running configuration files to the ISSU directory:
8. FTP the new image files to the ISSU directory. Once complete verify that the ISSU directory contains only
the required files for the upgrade:
6900-> ls /flash/issu_dir
Tos.img issu_version vcboot.cfg vcsetup.cfg
During ISSU ‘show issu status’ gives the respective status (pending, complete, etc)
Allow the upgrade to complete. DO NOT modify the configuration files during the software upgrade. It normally
takes between 5 and 20 minutes to complete the ISSU upgrade. Wait for the System ready or [L8] state which
gets displayed in the ssh/telnet/console session before performing any write-memory or configuration changes.
Log in to the switch to confirm it is running on the new software. This can be determined from the login banner
or the show microcode command.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : issu_dir,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED
Running Configuration : SYNCHRONIZED
After verifying the software and that the network is stable, use the following commands to certify the new
software by copying the Running directory to the Certified directory:
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : issu_dir,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED
Running Configuration : SYNCHRONIZED
PR Summary
209918 Fix done under PR 197661 (tx loss frames on SPB interface ports) not working for SNMP.
211111 OS6900: DDM issue: Input value is 0 when unidirectional failure happens.
211133 kernel: [689541.680000] error writing 94 to 13, read back fffffff5/-11 ret -11 count 5.
213122 If the authentication server is reachable via front panel ports it is authenticated locally,
but still tries to authenticate via ASA.
214291 aaa accounting packet from the switch not honoring the user-name received from radius
in a non-supplicant authentication.
215317 switch crashed due trapmgr stack while revmoing snmp configuration from switch.
215517 8.x SSH session syslog missing the host name, need to be similar to 6.x.
218434 unable to create static SAP when the dynamic rule is active on the switch.
220674 Memory leak on OS6860 when running a script to take show log swlog slot 1/1 output.
221069 Need to check ssh vulnerability- Strong ciphers and hmac ciphers on 8x switch.
221349 831R01-CCE: RSA key not generated when "cert.d" directory is not available in
"/flash/switch" directory.
221502 The OS6900 switch is using "Acconting-On" message in radius packet (accounting packets)
instead of "Start” message.
221558 OS6900 running 7.3.4.273.R02 SSH to loopback/vlan IP address not possible until ICMP
packet send.
221581 SSH connection issue between OS9700 and OS6860 with the AOS 8.3.1.314.R01.
221585 On OS9900 the output of "show power supply" and "show chassis" are not consistent in
regard to the regard to the remaining power.
221675 Unable to ping the device which falls under the default UNP profile.
221863 OS9900- The "copy running certified flash-synchro" does not synchronize the chassis.
221866 OS9900 -Autoneg disabled does not apply on OS99-GNI-48 even when the port running at
100/1000.
222081 LGS 178-181: Possible exploit due to mempy without bounds check in Radius interface.
LGS "Important”.
222114 OS6900 - Continuous "cp: write error: No space left on device" and slow telnet
connectivity.
222294 OS6860 needs to know why the check box present on the Captive Portal page on 8.3.1.