PD.02.22 Release Notes
PD.02.22 Release Notes
22 Release Notes
|2
Chapter 1
02.22 Release Notes
Description
This release note covers software versions for the PD.02 branch of the software.
Version PD.02.04 is the initial release of major version PD.02.
Product series supported by this software:
Important Information
To avoid damage to your equipment, do not interrupt power to the switch during a software update.
Version History
All released versions are fully supported by Aruba, unless noted in the table.
Products Supported
This release applies to the following product models:
Compatibility/Interoperability
The switch web agent supports the following web browsers:
Chrome n 105
n 104
Firefox n 104
n 103
Aruba recommends using the most recent version of each browser as of the date of this release note.
Enhancements
This section lists enhancements added to this branch of the software.
Version 02.22
No enhancements were included in version 02.22.
Version 02.21
Security
Added security improvements for web access to the switch.
Version 02.20
This software version was not released.
Version 02.19
No enhancements were included in version 02.19.
Version 02.18
No enhancements were included in version 02.18.
Version 02.17
No enhancements were included in version 02.17.
Version 02.16
No enhancements were included in version 02.16.
Version 02.15
No enhancements were included in version 02.15.
Version 02.14
Usability improvements.
Version 02.13
No enhancements were included in version 02.13.
Version 02.12
Password Security
A requirement to modify the switch default password has been added to enhance security of the switch.
Upon initial boot-up or following a factory reset, a change to the default password will be required.
Version 02.11
No enhancements were included in version 02.11.
Version 02.09
No enhancements were included in version 02.09.
Version 02.08
No enhancements were included in version 02.08.
Version 02.07
Version 02.07 was never released.
Version 02.06
MAC Authentication
Added ability to use PAP authentication which sends the MAC address of the client as the password in
the User-Password (RADIUS attribute 2) to the authentication server.
Password Manager
Enhanced the help text description of the Encrypted Password checkbox in the "Edit existing user"
window to include "If this box is checked, the provided password must be in encrypted format."
Version 02.05
No enhancements were included in version 02.05.
Version 02.04
IGMP Snooping
Added support for per-VLAN IGMP snooping and static mrouter port configuration.
Fixes
This section lists released builds that include fixes found in this branch of the software. Software fixes
are listed in reverse-chronological order, with the newest on the top of the list. Unless otherwise noted,
each software version listed includes all fixes added in earlier versions.
The Symptom statement describes what a user might experience if this is seen on the network. The
Scenario statement provides additional environment details and trigger summaries. When available, the
Workaround statement provides a workaround to the issue for customers who decide not to update to
this version of software.
The number that precedes the fix description is used for tracking purposes.
Version 02.22
Security
PD0222-01
Version 02.21
No fixes were included in version 02.21.
Version 02.20
This version was not released.
Version 02.19
Web UI
PD0219-01
Symptom/Scenario: The current copyright statement is not up to date.
Version 02.18
Patches applied to various open source components.
Version 02.17
ARP
CR_254987
Symptom/Scenario: In networks with a high amount of ARP traffic (for example, APR flooding), the ARP
table exceeds its maximum limit, causing the switch to reset.
Workaround: Identify and resolve the source of excessive ARP traffic on the network.
Version 02.16
IGMP Snooping
PD0216-03
Symptom/Scenario: When IGMP snooping is enabled for VLANs, IPv6 router advertisements are
blocked.
Workaround: Enabled IGMP snooping on individual ports rather than per VLAN.
Web UI
CR_254616
Symptom/Scenario: When using the Chrome browser, the browser reports the SSL certificate is invalid.
Workaround: Use the Internet Explorer or Firefox web browsers.
PD0216-01
Symptom/Scenario: The Web UI allows SFP ports to be set at a 100MB link speed.
PD0216-02
Symptom/Scenario: Non-default HTTP/HTTPS session timeout values are not preserved following a
reboot.
Web Management
CR_0000253436
Symptom/Scenario: Non-default HTTPS port configuration is not taking effect after performing
configuration backup and restore.
Workaround: Utilize default HTTPS port setting 443.
Version 02.14
No fixes were included in version 02.14.
Version 02.13
ARP
CR_0000252400
Symptom/Scenario: Proxy-ARP settings revert to factory defaults after a switch reboot.
MAC Authentication
CR_0000248798
RADIUS
Symptom/Scenario: The switch fails to perform dynamic VLAN assignment after MAC authentication.
RADIUS
CR_0000251834
Symptom: RADIUS accounting is not active, even though it has been enabled on the switch.
Scenario: When RADIUS authentication and accounting have been configured on the switch, the
calling_station_id and called_station_id fields display invalid MAC addresses, causing RADIUS
accounting to fail.
Version 02.12
LLDP
CR_0000251449
Symptom/Scenario: Unsupported discovery protocol frames are transmitted by the switch with
destination address: 01:00:0c:cc:cc:cc.
Management
CR_0000250690
Version 02.11
System
CR_0000250982
Symptom/Scenario: When MAC addresses age out, the switch may spontaneously reset.
Workaround: Increasing MAC address aging time to the maximum value will reduce the frequency of
occurrence.
Version 02.10
System
PD0210-01
Symptom/Scenario: Occasionally, the switch improperly removes individual MAC addresses from the
system and may result in an unexpected reset.
Workaround: Increasing the MAC address aging time to the maximum value will reduce the frequency
of occurrence.
Version 02.09
RADIUS
CR_0000248798
RADIUS
Symptom/Scenario: The switch fails to perform dynamic VLAN assignment after MAC authentication.
System
CR_0000248755/CR_0000249838
Symptom/Scenario: The switch randomly resets during periods of high sustained traffic volume
directed at the CPU.
Version 02.08
Management VLAN
CR_0000247836
Symptom/Scenario: If a second VLAN (non-management VLAN) is created, the clients connected to that
non-management VLAN can establish an HTTP connection to the management interface of the switch
when such a connection should only be allowed from the management VLAN.
SNMP
PD0208-01
Symptom/Scenario: The switch permits SNMP community name configurations but they are not
applied until after the switch is rebooted.
System
Web UI
CR0000247549
Symptom/Scenario: When using software version PD.02.06, disabling both HTTP & HTTPS results in
loss of access to the web interface.
CR0000247995
Symptom/Scenario: When using software version PD.02.06, the attempts to save files from the switch
with HTTP or HTTPS timeout.
Workaround: Use TFTP to save files.
Version 02.07
Version 02.07 was never released.
Version 02.06
MAC Authentication
CR_0000243416
Symptom/Scenario: Utilizing PAP authentication with MAC auth results in an error due to being an
unsupported setting.
Workaround: Use MD5 authentication method.
Password Manager
PD0206-02
Symptom/Scenario: With encryption enabled, attempting to enter a non-encrypted password displays
an invalid error message.
Workaround: Disable encryption and reenter the password or enter an encrypted password.
Web Management
PD0206-01
Symptom/Scenario: An Ajax scripting error message appears when attempting firmware update over
HTTP.
Workaround: Use TFTP for firmware upgrades or reattempt the firmware upgrade over HTTP.
Version 02.05
Port Connectivity
PD0205-01
Symptom: SFP ports on the HPE OfficeConnect 1920S 48G 4SFP PPoE+ 370W Switch (JL386A) do not
establish a link or convey switch traffic.
Version 02.04
Certificates
PD0204-01
Symptom/Scenario: Updating self-signed certificate generation from SHA1 to SHA256 and public key
length from 1024 to 2048 bits.
Workaround: Utilize a CA signed certificate that can be manually uploaded to the 1920S.
LLDP
CR_0000244109
Symptom/Scenario: If a connected device sends an LLDP TLV in "string" format to the 1920 switch, a
software crash occurs requiring a reboot to clear.
Workaround: Configure connected devices to send LLDP TLV's in "normal" format.
Trunking
PD0107-02
Symptom/Scenario: The Protected Ports configuration modal does not allow selection of ports
belonging to trunk groups.
Upgrade Information
Use Update Manager to update/downgrade switch software
The selection is named “Backup Code” because the firmware update occurs on the backup
image – not the active/primary image. This prevents the active image from being corrupted
during the firmware update, for example, a power failure occurring during the update process.
5. When using the Update Manager for the firmware update, the Digital Signature Verification
option should be selected.
n Fixes for security vulnerabilities are not documented in manuals, release notes, or other forms of
product documentation.
n A Security Bulletin is released when all vulnerable products still in support life have publicly available
images that contain the fix for the security vulnerability.