v9.2.2 Releasenotes v1
v9.2.2 Releasenotes v1
2
Fabric OS v9.2.2 Release Notes
Version 1.0
Broadcom FOS-922-RN
October 15, 2024
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Copyright © 2024 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
For more information, go to www.broadcom.com. All trademarks, trade names, service marks, and logos referenced herein
belong to their respective companies.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product or
circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
The product described by this document may contain open source software covered by the GNU General Public License
or other open source license agreements. To find out which open source software is included in Brocade products or to
view the licensing terms applicable to the open source software, please download the open source attribution disclosure
document in the Broadcom Support Portal. If you do not have a support account or are unable to log in, please contact
your support provider for this information.
Use of all versions of Brocade’s Fabric OS is subject to the terms and conditions of the Brocade Fabric Operating System
and Feature Licenses and License Keys End User License Agreement, effective October 1, 2019, as amended by
Brocade from time to time. It is the user’s responsibility to understand and comply with the terms of the EULA. By
downloading, installing, using, posting, distributing or otherwise making available FOS, you agree to be bound on an
ongoing basis by the EULA as updated by Brocade from time to time.
Broadcom FOS-922-RN
2
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Table of Contents
Broadcom FOS-922-RN
3
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Revision History................................................................................................................................ 77
Broadcom FOS-922-RN
4
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Chapter 1: Preface
If you purchased Brocade product support from a Broadcom OEM/solution provider, contact your OEM/solution provider
for all your product support needs.
OEM/solution providers are trained and certified by Broadcom to support Brocade products.
Broadcom provides backline support for issues that cannot be resolved by the OEM/solution provider.
Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade
expertise. For more information on this option, contact Broadcom or your OEM.
For questions regarding service levels and response times, contact your OEM/solution provider.
To expedite your call, have the following information immediately available:
General Information:
Technical support contract number, if applicable.
Switch model.
Switch operating system version.
Error numbers and messages received.
supportSave command output and associated files.
For dual-CP platforms the supportSave command gathers information from both CPs and any AP blades installed in
the chassis.
Detailed description of the problem, including the switch or fabric behavior immediately following the problem and any
specific questions.
Description of any troubleshooting steps already performed and the results.
Serial console and telnet session logs.
Syslog message logs.
Broadcom FOS-922-RN
5
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
FT00X0054E9
Broadcom FOS-922-RN
6
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
The following sections outline how to locate and download Brocade product manuals and release notes from Broadcom
and on the support portal. Although the illustrations show Fibre Channel and Fabric OS (FOS), they work for all Brocade
products and operating systems.
Broadcom FOS-922-RN
7
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
2.1.2 Locating Product Manuals and Release Notes on the Support Portal
Complete the following steps to locate your product manuals on the support portal.
1. Go to support.broadcom.com, click Login, and enter your username and password.
If you do not have an account, click Register to set up your account.
2. Select Brocade Storage Networking in the support portal.
Broadcom FOS-922-RN
8
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Chapter 3: Overview
Fabric OS v9.2.2 is the initial release supporting the G710 entry level switch.
Broadcom FOS-922-RN
9
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
The Fabric OS v9.2.2 release includes new software features and enhancements of existing, with the main areas listed
below and covered in more detail in the respective sections and chapters.
4.1 Hardware
Fabric OS v9.2.2 is the first release supporting the following new hardware:
Brocade G710 Entry level switch
FOS v9.2.2 is the first release supporting the 25GbE SFP+ LR, PN: 57-1000504=01 (CBR-25G-LR-01) with serial number
CDA9 xxxxxxxxxxx (for the 7850 extension switch).
When this optic is present and downgrade from FOS v9.2.2 is performed, the firmwaredownload will fail.
4.1.1 Platforms
In addition to the new hardware capabilities, FOS v9.2.2 also supports the same Brocade Gen 6 and Gen 7 Fibre Channel
platforms supported in FOS v9.2.1x.
System Security
– Discontinued support for inline passwords and critical security parameters
– StrictHostkeyChecking configuration for SSH
– Algorithm configuration for SSH Hostkey/Pubkey
– 4096 bits key size for FCAP/Commoncert
– SMTPS TLS certificate and cipher support for MAPS
– Increased password length for FOS user accounts
– Default Secure: Complex password policy
– Default Secure: HTTP “OPTIONS” method disabled
– BSL data anonymization
MAPS
– MAPS alert reduction
– MAPS secure SMTP support
Unified Storage Fabric (USF)
– USF Scale and topology support
– iSNS support
– IP Storage diagnostics
Fabric Services
– Upper layer object server
– Platform name identifier
– Simplified discovery
Broadcom FOS-922-RN
10
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Miscellaneous
– Enhanced services recovery
– Switchdisable command requiring confirmation
– Supportlink enhanced to support user defined tags
– Link Latency Determination (LLD)
– ClearLink diagnostics on LD HBA links
– ACC related SNMP traps on Access Gateway
– PortCfg max speed
Web Tools
– Federated Authentication
– Default protocol type for transfers
– Display of management port speed
– Support for password with up to 510 characters
– Web Tools tables improved to display full width
REST API changes
Deprecated features and commands
Obsoleted features and commands
4.2.1.1 Discontinued support for inline passwords and critical security parameters
In FOS v9.2.2 execution of commands with passwords inline in the command string is no longer supported. Instead, the
command must be executed without specifying the password and authentication is performed interactively. With this
change full CLI history is reenabled in FOS v9.2.2.
This change applies to the following commands:
Aaaconfig
Configupload
Configdownload
Extncfg
Factorycfg
Femdump
Firmwarecleaninstall
Broadcom FOS-922-RN
11
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Firmwaredownload
Firmwarepatch
Frudump
License
Secauthsecret
Seccertmgmt
Serviceshell
Snmpconfig
Sshutil
Supportftp
Supportlink
Supportsave
Tsclockserver
Passwd
Portcfg
Portcfgupload
If a command is executed with an inline password it will fail since the option is no longer valid
Example:
switch:FID128:admin>userconfig --add fosadmin -r admin -h 128 -l 1-128 -p password
Error: Invalid option (-p).
Usage: userConfig --add <username> -r <LF role> -l <LF_ID list> [-h <LF_ID>] [-c <chassis
role>] [-d <description>] [-x] [-at <HH:MM-HH:MM> | -access-time <HH:MM-HH:MM>]
StrictHostKeyChecking is enabled by default in FOS v9.2.2 factory shipped units and is configurable with the command
sshUtil:
When StrictHostKeyChecking is set to yes, for every ssh server that FOS will communicate with, known host entry must
be present.
The known host entry can be added with the sshutil command, enhanced to take known host entry with the format
<IP_address:port>.
Example:
Broadcom FOS-922-RN
12
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
In FOS versions prior to FOS 9.2.2, RSA SSH hostkey/pubkey use a hashing algorithm (SHA1) which is no longer
considered adequately strong and commonly reported as a potential vulnerability by scanning tools (such as Qualys).
While users can generate and use ECDSA SSH hostkey/pubkey instead of RSA (removing the RSA hostkey/pubkey in
the process, FOS v9.2.2 is enhanced to allow the admin to configure SSH HostkeyAlgorithms and PubkeyAlgorithms for
SSH connections to/from FOS and allow stronger RSA hostkey/pubkey using the command seccryptocfg.
The cryptographic templates in FOS v9.2.2 are updated with “HostKeyAlgorithms” and “PubKeyAlgorithms” key entries
under SSH.
Example for platforms shipping with FOS v9.2.2 from factory:
seccryptocfg --show
SSH Crypto:
SSH Cipher : aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-
cbc,aes256-cbc
SSH Kex : ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-
hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-
sha1
SSH MAC : hmac-sha2-256,hmac-sha2-512
SSH HostkeyAlg :rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521
SSH PubkeyAlg :rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521
TLS Ciphers:
------Truncated---------
Accordingly, the new attributes “HostkeyAlg” and “PubkeyAlg” are available with the command seccryptocfg –-
apply to configure platforms upgraded to FOS v9.2.2.
NOTE When configuring the SSH HostkeyAlgorithms and PubkeyAlgorithms using seccryptocfg –-apply the
SSH service (in FOS) is restarted to load the new configs and all the existing SSH sessions on the
current cp as well as on the standby cp in case of chassis will be terminated.
Example:
seccryptocfg --apply -group SSH -attr HostkeyAlg -value ‘rsa-sha2-512,rsa-sha2-256,ecdsa-
sha2-nistp521’
seccryptocfg --apply -group SSH -attr PubkeyAlg -value ‘rsa-sha2-512,rsa-sha2-256,ecdsa-
sha2-nistp521’
seccryptocfg --show
SSH Crypto:
SSH Cipher : aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-
cbc,aes256-cbc
SSH Kex : ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-
nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-
hellman-group14-sha1
SSH MAC : hmac-sha2-256,hmac-sha2-512
SSH HostkeyAlg :rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521
SSH PubkeyAlg :rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521
TLS Ciphers:
------Truncated---------
Broadcom FOS-922-RN
13
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Prior to FOS v9.2.2 the key sizes allowed for FCAP/Commoncert are 1024/2048.
In FOS v9.2.2 the key sizes allowed for both FCAP/Commoncert are 4096, allowing generation of CSR with 4096 bits key
size.
Command syntax:
seccertmgmt generate -csr {fcap|commoncert} [-type rsa] [-keysize {1024|2048|4096}] [-
hash {sha1|sha256}] [-years <x>] [-f]
FOS v9.2.2 is enhanced to support CA certificate and cryptographic cipher configurations for SMTPS TLS.
Enhancement of the commands in seccertmgmt and seccryptocfg provides the mechanism for certificate
management and cipher configuration for SMTPS.
Certificate Management
To establish TLS connection from a FOS switch to an SMTP server, the CA certificate which signed the SMTP server
certificate needs to be imported into FOS. This CA certificate will be used to validate the server certificate while
establishing the connection during the TLS session establishment phase. The value ‘smtps’ is provided for the -server
option with the command seccertmgmt to perform the operations associated with SMTPS.
(A maximum of 15 server CA certificates can be imported for SMTPS).
seccertmgmt export -ca -server smtps -protocol scp -ipaddr 1.1.1.1 -remotedir
/path/to/certificate/folder -login user_name
Example:
switch:FID128:admin> seccertmgmt show -all
Certificate Files:
---------------------------------------------------------------------------------
Protocol Client CA Server CA SW CSR PVT Key Passphrase
---------------------------------------------------------------------------------
FCAP Empty NA Empty Exist Exist Exist
RADIUS Empty Exist Empty Empty Empty NA
LDAP Empty Empty Empty Empty Empty NA
RSA NA Empty NA NA NA NA
FA NA Empty NA NA NA NA
SYSLOG Empty Exist Empty Empty Empty NA
HTTPS NA Empty Empty Empty Empty NA
KAFKA NA Empty NA NA NA NA
ASC NA Empty NA NA NA NA
SMTPS NA Empty NA NA NA NA
NOTE :
Client CA import as well as certificate import is not valid for ‘smtps’ and will result in an error
CSR generation for ‘smtps’ is not supported
SMTPS server CA certificates imported to the switch will be monitored by MAPS, similar to other certificates.
Server CA certificate size cannot be more than 1 MB for import operation, else the import operation will fail.
Zeroize will remove the server CA certificate for SMTPS
Cryptographic configuration
Accordingly, the command seccryptocfg is enhanced to configure the TLS protocol and ciphers to be used for SMTPS
communication.
Default Values
SMTPS_Ciphers:
ECDSA:ECDH:RSA:AES:3DES:!RSAPSK:!DHEPSK:!PSK:!DSS:!AESCCM8:!AESCCM:!ARIAGCM:!CAMELL
IA:!CHACHA20:!SEED:!RC4
SMTPS_Protocol: Any
Example:
seccryptocfg --show
-----------Truncated---------
SMTPS :
ECDSA:ECDH:RSA:AES:3DES:!RSAPSK:!DHEPSK:!PSK:!DSS:!AESCCM8:!AESCCM:!ARIAGCM:!CAMELLIA:!CH
ACHA20:!SEED:!RC4
TLS Protocol:
HTTPS : TLSv1.3
RADIUS : TLSv1.2
LDAP : TLSv1.2
SYSLOG : TLSv1.2
Broadcom FOS-922-RN
15
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
RSA : TLSv1.2
FA : TLSv1.2
SMTPS : Any
-----------Truncated---------
Prior to FOS v9.2.2 supported user account password is 40 characters. In FOS v9.2.2 user account password length is
increased to 510 characters to manage credentials rotation with longer passwords by centralized password management
services.
Accordingly, password policies can be defined to enforce password length up to 510 characters.
There are no changes to user account commands with this enhancement.
Downgrade is allowed from FOS v9.2.2 with passwords of length >40 characters while the admin will be presented with
the message to reconfigure the passwords with max 40 characters.
“WARNING:Login of users with password length more than 40 characters through REST/Webem
will not be allowed. Login through CLI and change the password to supported length.”
In FOS v9.2.2 the default password policy is updated to enforce usage of more complex (stronger) passwords.
Listed in the below table is a comparison of the password policy prior to FOS v9.2.2 and in FOS v9.2.2.
NOTE When upgrading to FOS v9.2.2 the new password policy is not in effect without user configuration.
During normal firmware upgrade, the values for the default password policy are not changed.
The admin must enforce the new default values by issuing the command passwdcfg --setdefault.
Changing individual parameters manually is still allowed using the command passwdcfg --set.
Broadcom FOS-922-RN
16
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
4.2.1.7.1 Configurations and events which set the new default password policy
Execution of the command passwdcfg --setdefault, will set the new default password policy in effect.
Execution of factoryreset --set securitydefault will set the new default password policy in effect.
Performing cleaninstall will set the new default password policy in effect.
Once the parameters are set with these strong default values, if the user wants to change, each parameter can be
changed using the existing cli passwdcfg –set command.
Note: Existing user account passwords in use will not be forced to change prior to expiry of the given password.
Default passwords of default accounts will continue to stay the same in FOS 9.2.2 and will be enhanced to adhere
to new passwd attribute defaults in future release.
After the HTTP “OPTIONS” method is disabled, the user will get an error message “403 Forbidden” for all HTTP
“OPTIONS” requests to the switch.
As part of Default Secure, HTTP “OPTIONS method is disabled in FOS v9.2.2 and per default on platforms shipping with
FOS v9.2.2 from factory or when the admin executes factory reset, config default and secure default.
BSL data anonymization can be configured for BSL data to be anonymized before it is uploaded and stored on the BSL
Supportlink server.
When enabled FOS performs a one-way SHA-256 hash to replace IP addresses, FQDNs, switch names, user names, and
email addresses which may be included in BSL data, before it is transmitted to the BSL server.
To configure BSL data anonymization use the command supportlink –config -anonymize <enable/disable>
to enable and disable anonymization of BSL data.
For more detailed information see the Fabric OS Administration Guide.
Broadcom FOS-922-RN
17
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
4.2.2 MAPS
In FOS v9.2.2 MAPS is enhanced to with Alert Reduction to reduce alert flooding as well as support for Secure SMTP.
In FOS v9.2.1 MAPS was enhanced with the configuration option of Adaptive notifications applying progressive quiet time
intervals for reoccurring alerts.
In FOS v9.2.2 as part of MAPS Alert Reduction, Adaptive notifications is enabled by default unless it has already been
configured ON or explicitly configured OFF; described in the table below.
Adaptive notification is configured ON and is effective Unchanged: Adaptive notification is configured ON and is
effective
MAPS alert Reduction removes the EMAIL action from selected default MAPS rules, see the Fabric OS MAPS User
Guide (Revision history) for details.
MAPS provides alerting via email when the action EMAIL is configured in MAPS global configuration and being configured
in a rule, then on this rule violation, MAPS sends emails to the configured recipient email addresses.
Per default the email is sent using plain SMTP protocol which is a mail server application used for sending, receiving and
relaying emails between senders and receivers. Plain SMTP protocol has a major drawback where emails between
sender and receiver are not encrypted. MAPS is being enhanced to use secure SMTP, also known as SMTPS.
SMTPS (secure SMTP) is a method for securing SMTP with transport layer security and is intended to provide
authentication and data encryption between the FOS switch (SMTP client) and the SMTP server.
SMTPs establish a secure SMTP connection by using TLS and with the secure connection the source/destination email
addresses and the message content is encrypted.
Importing “SMTP server CA certificates” is an optional step when configuring secure SMTP and is necessary to perform
server validation.
Broadcom FOS-922-RN
18
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
In case a CA certificate is not installed it is still possible to establish a secure connection between FOS and the mail
server, but there is no server validation.
Import of the CA certificate for the mail server is done with the command seccertmgmt import -ca -server
smtps. Chained Certificates are supported for SMTP server CA certificate.
For more information, see the section SMTPS TLS Certificate and Cipher Support for MAPS.
Secure SMTP is enabled using the command relayConfig. By default, the secure SMTP feature is disabled and the
user needs to explicitly enable to use secure SMTP.
The current Audit log message MAPS-1017 is enhanced to indicate whether secure SMTP mode is Enabled or Disabled.
Command syntax and examples:
switch:FID128:admin> relayConfig
Usage:
------
relayConfig --config -rla_ip <relay IP> -rla_dname <domain name>
relayConfig --config -secure_smtp {true|false}
relayConfig --config -rla_ip <relay IP> -rla_dname <domain name> -secure_smtp
{true|false}
relayConfig --show
relayConfig --delete
relayConfig --help
The admin can also enable or disable secure SMTP mode after relay configurations are configured.
Enabling secure SMTP mode
switch:FID128:admin:admin> relayConfig --config -secure_smtp true
2024/02/06-09:07:37 (PST), [MAPS-1017], 378, FID 128, INFO, cassian6, MAPS relayConfig
got updated to relay_IP: 1.1.1.1, domain: relay.smtp.company.com, secure SMTP mode:
Enabled.
Broadcom FOS-922-RN
19
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Once the SMTP CA certificate is imported, MAPS automatically adds the imported certificate into the ALL_CERTS logical
group.
MAPS start monitoring the certificates using the existing monitoring systems:
DAYS_TO_EXPIRE.
EXPIRED_CERTS.
Imported certificates can be verified by executing the command logicalgroup –show.
Example:
switch:FID128:admin:admin> logicalgroup --show ALL_CERTS
-----------------------------------------------------------------------------------------
Group Name |Predefined |Type |Member Count |Members
-----------------------------------------------------------------------------------------
ALL_CERTS |Yes |Certificate |6 |HTTPS SW
Certificate,LDAP Server CA Certificate,RADIUS Server CA Certificate,KAFKA Server CA
Certificate,IDP Server CA Certificate,SMTP Server CA Certificate
If secure SMTP is configured and downgrade is attempted, an error message is displayed to indicate that secure SMTP
configuration is not supported in pre-9.2.2 releases and the firmware downgrade operation will be blocked with the
following message:
“Secure SMTP configuration is not supported prior to FOS v9.2.2 and must be removed prior
to downgrade, using the command relayConfig."
Broadcom FOS-922-RN
20
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
The supported number of devices are increased in FOS v9.2.2 to 1200. This increased limit is not enforced and
downgrade to FOS v9.2.1 with the increased scale is allowed but not supported.
Below are the supported scale limits for USF with FOS v9.2.2:
Chassis scale
o 1 IP Storage Logical Switch.
4.2.3.3.1 IpsPing
IpsPing is enhanced with the option for the user to specify the number of ECHO requests using the option -count
Command syntax:
ipsPing <ipaddress> [-vrfId <vrf_id>] [-sourceGateway <ipaddress>] [-size <supported
size(18-2024)>] [-count <count(1-500)>]
Broadcom FOS-922-RN
21
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
4.2.3.3.2 IpsDiag
In FOS v9.2.2 iSNS support is included in USF with one logical iSNS instance per VRF implemented as a fabric wide
service.
iSNS is implemented according to RFC 4147 providing:
iSCSI device registration
iSCSI device query
Discovery Domain
Discovery Domain Set
iSNS configuration in FOS v9.2.2 consists of Storage Nodes, Discovery Domains (DD) and Discovery Domain Sets
(DDSet) support. The admin can create and delete DDs and DDSets, as well as add/delete the members (storage nodes)
to/from DDs/DDSets.
The following rules apply to iSNS configuration in FOS v9.2.2:
Creating DDs and DDSets for non-existent VRF is not allowed.
VRF cannot be deleted if referred by any DDs or DDSets
Creating DDs and DDSets for VRF that do not have iSNS server enabled is not allowed.
Disabling iSNS server does not require DDs and DDSets to be deleted.
Broadcom FOS-922-RN
22
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Only iSCSI device names (IQNs) are allowed as members of a DD. In addition, users are allowed to pre provision
the devices and add to DD before the devices register with the iSNS server
Creating empty DD and DDSets are allowed
Enabling and disabling of empty DDSets is allowed
Adding an empty DD to a DDSet is allowed
Deleting a DD that exists in a DDSet, is not allowed
Command syntax:
isnsConfig —show [ -vrfID <vrfID>]
isnsConfig –update [<vrfID>] -server <IP address>
isnsDD
o Used when creating/adding members/removing members/deleting/showing Discovery Domain (DD) and
its members in IQN format.
Command syntax:
isnsDD --create <name> [-vrfID <vrfID>] [-storageNode {<iqn1>}[,{<iqn2>}...]]
isnsDD --delete <name> [-vrfID <vrfID>]
isnsDD --add <name> [-vrfID <vrfID>] -storageNode {<iqn1>}[,{<iqn2>}...]
isnsDD --remove <name> [-vrfID <vrfID>] -storageNode {<iqn1>}[,{<iqn2>}...]
isnsDD --deleteAll [-vrfID <vrfID>]
isnsDD --show [-vrfID <vrfID> [-name <name>]]
isnsDDSet
o Used when creating/adding members/removing members/deleting/enable/disable/showing Discovery
Domain Set (DDS) and Discovery Domain members.
Command syntax:
isnsDDSet --create <name> [-vrfID <vrfID>] [-discoveryDomain {<dd1>}[,{<dd2>}...]]
isnsDDSet --delete <name> [-vrfID <vrfID>]
isnsDDSet --enable <name> [-vrfID <vrfID>]
isnsDDSet --disable <name> [-vrfID <vrfID>]
isnsDDSet --add <name> [-vrfID <vrfID>] -discoveryDomain {<dd1>}[,{<dd2>}...]
isnsDDSet --remove <name> [-vrfID <vrfID>] -discoveryDomain {<dd1>}[,{<dd2>}...]
isnsDDSet --deleteAll [-vrfID <vrfID>]
isnsDDSet --show [-vrfID <vrfID> [-name <name>]]
Broadcom FOS-922-RN
23
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
isnsShow
o Used to display registered devices according to Storage Nodes, Portals and Portal Groups or Network
Entities.
Command syntax:
isnsShow --device [-details] [-vrfID <vrfID>] [-name <iqn>]
isnsShow --entity [-details] [-vrfID <vrfID>]
[-entityID <eid>]
isnsShow --pg [-details] [-vrfID <vrfID> [-storageNode <iqn> |
-portalIP <IP address> [-portalPort <port number>] |
-tag <tag>]]
isnsShow --portal [-vrfID <vrfID> [-portalIP <IP address>
[-portalPort <port number>] | -entityID <eid>]]
ipsConfigurationSize
o Used to display the configuration size database for iSNS.
Command syntax:
ipsConfigurationSize --show [-feature <featureName>]
Broadcom FOS-922-RN
24
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
The Upper Layer Object Server (aka Object Server) provides an infrastructure for all Upper Level Protocols, so that
devices can register or deregister their logical entities (objects) with the Object server based on their FC4 type, ULP type
and ULP Name. The Object Server provides a way to manage Upper Level Protocol (ULP) objects (e.g., ULP names).
The ULP objects are used to identify logical entities defined by the Upper Level Protocols.
For NVMe, NQNs are the “ULP Name” object that is associated with NVMe connections. The object (ULP Name)
registration details are distributed across the fabric. The ULP Name Objects stored in the fabric are used to identify which
NQNs are associated with which ports.
Upper Layer Object Server support enables the storage admin, when performing namespace provisioning, to define
access between host NQN(s) and NVME storage subsystems NQNs, without host access to register the NQN(s).
Platform Name Identifier (PNI) is a new object registered during Fabric Login (FLOGI). This information ties a port to a
specific chassis which initiated the FLOGI and is the WWN of that chassis. The PNI, if provided, will be implicitly
registered during Fabric Login.
Name Server queries for PNI or using PNI for device discovery are supported using the (new) Name Server query
commands GNN_PNI, GPN_PNI, GPNI_NN, GPNI_PN, GPNI_ID and RSPNI_PNI.
The GPN_SD query command provides a common device discovery method that can be used for various protocols such
as FC-NVME and SCSI-FCP. A single GPN_SD exchange can be issued with multiple query requests, each with different
domain scope, FC4 type, and/or FC4 features. This is an efficient means to get a bulk response and can be used for
zoned and unzoned lookup. GPN_SD is the (per FC-GS9 standard) recommended query to use for device discovery.
Broadcom FOS-922-RN
25
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
4.2.5 Miscellaneous
This section describes miscellaneous enhancements in FOS v9.2.2
Enhanced services recovery enables recovery of non-critical services which may have crashed or failed to restart by
doing and HA reboot and restart of the service. With this enhancement the HA state when synchronized has two levels:
Level 1: Absolute sync, at this level all components from all services are in sync and running.
Example:
Switch:FID128:admin> hashow
Local CP (Slot 1, CP0): Active, Warm Recovered
Remote CP (Slot 2, CP1): Standby, Healthy
HA enabled, Heartbeat Up, HA State synchronized
Level 2: Conditional sync, at this level only critical services are guaranteed in sync, restartable services can be or may not
be in sync.
Example:
Switch:FID128:admin> hashow
Local CP (Slot 1, CP0): Active, Warm Recovered
Remote CP (Slot 2, CP1): Standby, Healthy
HA enabled, Heartbeat Up, HA State synchronized (critical)
For both level 1 and level 2 the end user can issue the command hafailover.
When a system with hasync at level 2 (HA State synchronized (critical)) the restartable services that were
crashed on the old active CP (at the time) will be started on the new active CP during the failover process. After the
failover is completed, a sync is performed from the new active CP to the standby CP.
Broadcom FOS-922-RN
26
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
From FOS v9.2.2 the command switchdisable require confirmation prior to be executed, except if specifying --force
to overrule interactive confirmation.
Example:
switch:FID128:admin> switchdisable
This will disable the switch and is disruptive to all connections.
Are you sure you want to continue disabling the switch? (yes, y, no, n): [no]: no
Aborting...
switch:FID128:admin>
switch:FID128:admin> switchdisable
This will disable the switch and is disruptive to all connections.
Are you sure you want to continue disabling the switch? (yes, y, no, n): [no]: y
switch:FID128:admin >
4.2.5.3 Supportlink
From FOS v9.2.2 Supportlink configuration is enhanced to provide the flexibility to group switches logical groups using
additional tags. The admin can configure up to 6 tags, of which 3 are predefined and 3 are custom tags. The predefined
tag names are “Organization”, “SiteID” and “OEM.” The values for these tag names are configurable. For the custom tags
both the name and value are configurable. For the predefined tags since the tag names are already defined the command
syntax is slightly different from the syntax used for the custom tags.
Command syntax:
Deleting a tag
supportLink --deletetag -name “CustomDesc1”
Display configuration
admin> supportlink --show
When no tags are configured only the predefined tags are displayed.
If supportlink —default is executed the tag values for the predefined tags will be reset to NULL and for free form
tags both tag values and tag names will be reset to NULL.
Free form tags cannot exceed the length of 64 bytes and tag values length cannot exceed 32 bytes. Special characters
are not allowed in tag names and tag values. Only alphanumeric characters are allowed.
With FOS v9.2.2 on both inter-switch links (ISL) and inter-fabric links (IFL) will support independent measurement of link
latency during link initialization. This enables calculation of Link Distance, and the results are displayed using existing
commands (portshow, islshow, iflshow, fabportshow).
Link latency measurement is enabled by default for all FC ports. This feature can be disabled/enabled on a specific port
using “portcfglld” CLI.
Command syntax:
switch:admin> portcfglld
Usage: portCfgLld {--enable | --disable | --show } [<slot>/]<port>
portCfgLld --help
Operands :
--enable - Enable the Link Latency Determination feature
--disable - Disable the Link Latency Determination feature
--show - Show LLD configuration for the port
--help - Help command to see Usage
Broadcom FOS-922-RN
28
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
FOS v9.2.2 <FOS v9.2.2 Not supported Supported switch will display ‘0’ for latency and cable distance
FOS v9.2.2 FOS v9.2.2 Supported Supported switch will display both latency and cable distance.
Note: When performing a non-disruptive upgrade to FOS v9.2.2 link distance will not be calculated nor displayed until
there is a disruptive operation on the ISL/IFL link and LLD is triggered.
Currently, the long-distance support is available only on the HBAs listed below. The HBA must be connected
directly (single mode Fibre optic cable). DWDM link cannot be used as the HBAs do not support it.
Supported HBA models:
LPe35000
LPe36000
LPe37000
LPe38000
Supported optics:
32G LW supported SFP - AFCT-57G5MZ-ELX
64G LW supported SFP - AFCT-57H5MZ-EL1
Supported firmware:
12.8, 14.0, 14.2 and 14.4.
These HBAs supports cable distances up to 10 KM. There is no additional configuration required on the HBA side for long
distance support, as the HBA card is pre-configured for LWL optics. Only the “Dynamic DPort” mode either on switch or
HBA must be configured.
Prior to running D-Port test on a long-distance cable connected between a switch and HBA, the port has to be configured
with additional buffers using the command portcfgfportbuffers. There is no additional configuration required for
ports like LS, LD or LE.
Broadcom FOS-922-RN
29
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
FOS v9.2.2 is enhanced to include two SNMP traps on switches in AG mode, necessary for ACC to identify case creation
scenarios on AGs.
The traps swFCPortScn and swEventTrap defined in the SW-MIB is now available and enabled by default in AG mode.
These two traps are already supported in the switch mode and now they will be supported in AG mode also.
The command snmpconfig can be used to display (and modify) mib capability features in SNMP. In the example below
the swFCPortScn and swEventTrap traps defined in the SW-MIB are displayed.
Example:
In FOS v9.2.2 the command portCfg is enhanced to allow configuring the max speed of the port without specifying the
actual speed value.
Command syntax:
OR
portcfgspeed -h
OR
portcfgspeed {-i | -x } {<port_index> | <portindex_range>} [-f] {<Speed_Level> | 0
-m <max_auto_speed>}
OR
portcfgspeed {-slot | -s} {<slot#> | <slotrange>} {<Speed_Level> | 0 -m
<max_auto_speed>}
In FOS v9.2.2 new RASLOG messages related to TruFOS certificate expiration are added.
In FOS v9.2.2 the VMID+ target port limit per logical switch has been removed.
The total number of VMID+ target ports per platform is unchanged
X7 directors support 64 VMID+ target ports
Gen 7 switches support 16 VMID+ target ports
In FOS v9.2.2 it is supported to login to FOS using Federated Authentication. When configuring Federated Authentication
in FOS, two different authentication modes are supported. The Web Tools authentication workflow is adapted accordingly.
FA only Authentication Mode:
Upon entering the Switch IP address in the browser, the URL will be redirected to the IDP server for authentication. After
successful authentication at IDP, the URL will be redirected to the Web Tools Dashboard view. Web Tools login page will
not be shown to the user in this workflow.
Dual Authentication Mode:
Upon entering the switch IP address in the browser, the Web Tools login screen will be displayed with two options:
1. Users can login with switch credentials by clicking the “Login” button (no change in existing Web Tools login
workflow)
Broadcom FOS-922-RN
31
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Scenario-2: User has already logged into IDP using the browser that is used to launch Web Tools
1. User clicks on “Login with SSO” button
2. Browser page is redirected to Web Tools Dashboard landing page
Login screen example:
After successful login, the FA user which is used for authentication will be shown in the user info section.
With FOS v9.2.2 Web Tools default protocol type selected for data transfers is set to SCP (previously it was set to FTP).
The user can still select to use FTP if enabled in FOS.
This applies to the following operations and dialogues:
Update Firmware
Add License
Backup Configuration
Restore Configuration
Broadcom FOS-922-RN
32
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
With FOS v9.2.2 Web Tools is updated to display the management port speed with unit Mbps (was previously M).
The update is shown in the example below.
Example:
With FOS v9.2.2 support for 510 characters for user account passwords, Web Tools is updated accordingly to support
510 characters.
Broadcom FOS-922-RN
33
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
With FOS v9.2.2 displaying tables in Web Tools is improved to provide full width.
In previous FOS versions the menu buttons were placed right to the table and the table could not use the full available
width even though there were no menu buttons.
In FOS v9.2.2 the table action button is moved into the table hamburger menu and the table width is maximized to occupy
the page.
Broadcom FOS-922-RN
34
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE There are no notifications when configuring non-secure protocols that these are deprecated.
4.2.7.3 SNMPv1
SNMPv1 is deprecated.
Functionality is kept intact, and warning is displayed on CLI (and Web Tools) when configuring usage of SNMPv1
4.2.7.4 IPFC
IPFC used when directly accessing Logical Switch management interfaces on the LS IP address (instead of using
‘setcontext’ from FID128) is deprecated.
Users are recommended to login to FID128 and use the command ‘setcontext’ to change to the desired LS (FID) for
operations.
Functionality is kept intact, and warning is displayed on Web Tools when using IPFC to connect to a Logical Switch.
4.2.7.5 TACACS+
TACACS+ is deprecated.
Functionality is kept intact, and warning is displayed on CLI when configuring usage of TACACS+
4.2.7.6 RADIUS
RADIUS is deprecated.
Functionality is kept intact, and warning is displayed on CLI when configuring usage of RADIUS
Broadcom FOS-922-RN
35
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE There are no notifications when deploying Cascaded AGs with other switches than G710.
When attempting to deploy Cascaded AG with G710 as the core AG, the connected ports on both the edge and core AG
switches will be disabled and an error message is displayed in the command output for switchshow specifying that
Cascaded AG is not supported.
4.2.7.9 FCoE
FCoE functionality is kept intact while the end user is notified with a warning message during FCoE CLI configuration.
A RASLOG message notifying deprecation will be posted during boot-up and configdownload
In FOS 9.2.2 release, FCoE users will be provided a warning message in CLI and via RASLOG about this deprecation.
The end user is notified with following warning message:
This RASLOG will be posted per logical switch in the following events:
When FCoE configuration is detected during boot
When FCoE configuration is detected during config download
For example, if FCoE configuration is detected in logical switches with FID 128 and 55, following RASLOGs will be
observed:
2024/03/07-10:57:01:259799 (GMT), [FCOE-1045], 29033/3702, SLOT 2 | FID 128, INFO, sw0,
FCoE is deprecated and will be obsoleted in a future FOS version.
In this FOS version, FCoE functionality is unchanged.
Broadcom FOS-922-RN
36
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
FCR speed and enforce tag configuration is deprecated in FOS v9.2.2, functionality is intact while users will be provided a
warning message when executing fcrlsan commands.
For the following CLI commands:
fcrlsan --add
fcrlsan --remove
fcrlsan --show
fcrlsan --help
Example:
switch:admin> fcrlsan --add -speed fast1
Warning: This command will become obsolete in a future release.
LSAN tag set successfully
The user can display any necessary info with the commands linkCost and nbrStateShow.
Broadcom FOS-922-RN
37
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Boot LUN Zoning was deprecated in a previous version of FOS and is obsoleted in FOS v9.2.2.
The command bootluncfg is removed in FOS v9.2.2.
Upgrade to FOS v9.2.2 is not permitted when Boot LUN zones exist in the zone database and must be deleted prior to
upgrade.
Boot LUN zones will not be allowed to be imported. RASLOG will be posted and in certain cases, port segmentation will
occur (e.g. zone merge cases) or loss of HA Sync will occur.
Examples of blocked importation due to presence of boot LUN zones
Zone Merges
Downlevel switch creation
Configdownload operations
Firmwareupgrade
HA sync from a downlevel Active CP
4.2.8.2 Reboot -f
Broadcom FOS-922-RN
38
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE On Brocade G620, G630, Brocade X6-8, and Brocade X6-4 platforms, this license enables the use of
IO Insight capability. The license itself is identified as “Fabric Vision and IO Insight” on these
platforms.
FICON Management Server – Also known as CUP (Control Unit Port), this license enables host control of switches in
mainframe environments.
Integrated Routing – This license allows any Fibre Channel port in a Brocade X7-4, X7-8, G720, G730 and G620 to be
configured as an EX_Port supporting Fibre Channel Routing (FCR).
Integrated Routing Ports on Demand – This license allows any Fibre Channel port in a Brocade 7810, G630, X6-8, or
X6-4 to be configured as an EX_Port supporting Fibre Channel Routing. The maximum number of EX_Ports supported
per platform is provided in the license.
ICL POD License – This license activates ICL ports on X6 or X7 platform core blades. An ICL license must be installed
on the director platforms at both ends of the ICL connection.
On the Brocade X6-8:
The first ICL POD license enables 8 UltraScale ICL QSFP ports on each core blade of the X6-8 director, which are QSFP
port numbers 0-3 and 8-11. The second ICL POD license enables all UltraScale ICL QSFP ports on each core blade of
the director.
On the Brocade X6-4:
On the X6-4, the first ICL POD license enables 4 UltraScale ICL QSFP ports on each core blade of the director, which are
QSFP port numbers 0, 1, 4, and 5. The second ICL POD license enables all UltraScale ICL QSFP ports on each core
blade of the director.
Broadcom FOS-922-RN
39
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE
Temporary licenses for features available on a per-slot basis enables the feature for all slots in
the chassis.
There are no temporary licenses for the Brocade 7850 platform.
Temporary and universal temporary licenses have durations and expiration dates established in the licenses themselves.
FOS will accept up to two temporary licenses and a single universal license on a unit. Universal temporary license keys
can be installed only once on a particular switch, but they can be applied to as many switches as desired. Temporary use
duration (the length of time for which the feature will be enabled on a switch) is provided with the license key. All universal
temporary license keys have an expiration date after which the license can no longer be installed on any unit.
Temporary or universal temporary licenses for Extension Upgrade do not enable additional ports on 7810.
Broadcom FOS-922-RN
40
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
41
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
FOS v9.2.0 is the first release supporting the Gen 7 FC QSFP+, PN: 57-1000481-01 (XBR-000420) with serial number
BAB1yywwxxxxxxxs.
When this optic is present and downgrade from FOS v9.2.0 is performed, the firmwaredownload will fail with the
following error:
Downgrade is not allowed as some of the ICL ports are connected with GEN7 100M QSFPs.
Please remove the QSFP(s) flagged and retry firmwaredowngrade.
For a list of supported fibre optic transceivers that are available from Brocade, refer to the latest version of the Brocade
Transceiver Support Matrix available online at www.broadcom.com.
Broadcom FOS-922-RN
42
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
7.1.1.1 Loading FOS PSDs via Web Tools or FOS Command Line
Installing a FOS PSD image on a switch is performed in the same manner as using a traditional full FOS image. If a FOS
PSD image is loaded on an incorrect switch model (for example, attempting to load a FOS PSD image for a Gen 6 entry
level switch on a Gen 6 Director), the following error message displays:
The server is inaccessible or firmware path is invalid or the firmware doesn't
support this platform. Please make sure the server name/IP address and the firmware
path are valid, the protocol and authentication are supported. It is also possible
that the RSA host key could have been changed and please contact the System
Administrator for adding the correct host key.
Brocade SANnav Management Portal v2.1.1 or earlier does not support FOS PSD images. However, FOS PSD images
are supported with SANnav v2.1.1.3 and later releases. SANnav v2.1.1.3 and later can both host and install FOS PSD
images onto Brocade switches.
Broadcom FOS-922-RN
43
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
v9.2.2_G6G7_DIR.zip Fabric OS v9.2.2 for Windows to install on X6-8, X6-4, X7-8 and X7-4 platforms
The image files for each respective platform can be downloaded from your switch vendor’s website and
support.broadcom.com, except for YANG files which are available on www.broadcom.com/products/fibre-channel-
networking/software/fabric-operating-system.
Broadcom FOS-922-RN
44
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Brocade G710 (Switch Type 191.0) Supported Not Supported Not Supported Not Supported
(Fabric OS v9.2.2
and later)
Brocade G720 (Switch Type 181.0) Supported Supported Supported Not Supported
Brocade G720 (Switch Type 181.5) Supported Supported Not Supported Not Supported
(Fabric OS v9.1.1
and later)
Brocade G730 (Switch Type 189.8) Supported Supported Not Supported Not Supported
Broadcom FOS-922-RN
45
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Brocade X6-4 (Switch Type 165.5) Supported Supported Not Supported Not Supported
(Fabric OS v9.1.0b
and later)
Brocade X6-8 (Switch Type 166.5) Supported Supported Not Supported Not Supported
(Fabric OS v9.1.0b
and later)
Brocade G610 (Switch Type 170.0 to 170.3) Supported Supported Supported Supported
Brocade G610 (Switch Type 170.4 or higher) Supported Supported Supported Not Supported
(Fabric OS v9.0.1b
and later)
Brocade G620 (Switch Type 183.0) Supported Supported Supported Not Supported
Brocade G620 (Switch Type 183.5) Supported Supported Not Supported Not Supported
(Fabric OS v9.1.1
and later)
Brocade G630 (Switch Type 184) Supported Supported Supported Not Supported
Brocade 7850 Extension Switch Supported Not Supported Not Supported Not Supported
Embedded Switches
Brocade G648 Blade Server SAN I/O Module Supported Supported Supported Supported
Brocade MXG610 Blade Server SAN I/O Module Not Supported Supported Supported Supported
Broadcom FOS-922-RN
46
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE When downgrading from FOS v9.2.0 MAPS TruFOS rules become unmonitored for the platforms
listed above.
Broadcom FOS-922-RN
47
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
This chapter contains information that you should consider before you use this Fabric OS release.
8.1 Scalability
All scalability limits are subject to change. Limits may be increased once further testing has been completed, even after
the release of this version of the Fabric OS software. For current scalability limits for Fabric OS software, refer to the
Brocade SAN Scalability Guidelines for Brocade Fabric OS v9.X document.
IT 8k 32k
*ITL/ITN and VITL/VITN share the same resource allocation and is provided on the principle of first come/first serve.
Flow Vision is not supported the Brocade 7850 Extension platform.
8.2 Compatibility/Interoperability
This section describes important compatibility and interoperability across Brocade products.
Broadcom FOS-922-RN
48
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE Web Tools will always show English language irrespective of Browser or Operating System language
setting.
If a DSA algorithm is used for the HTTPS certificate, then Web Tools cannot discover the switch because all the
supported ciphers for this algorithm are no longer supported.
1
Only qualified with FOS v9.0.0 or later.
Broadcom FOS-922-RN
49
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
2
While this platform is supported with FOS v8.x it is only qualified with FOS v9.0.0 or later.
3
Brocade G648 is also supported with FOS v8.2.0_gft release.
4
Brocade MXG610 is also supported with FOS v8.1.0_lnx2, v9.0.1a, and v9.1.0b.
Broadcom FOS-922-RN
50
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
YANG is a standard data modelling language that defines the data sent over the FOS REST API. Each FOS REST API
module is defined in a YANG module file with a .yang name extension. To download the Brocade FOS-specific YANG
files from the Broadcom website, perform the following steps:
1. Go to www.broadcom.com/products/fibre-channel-networking/software/fabric-operating-system.
2. Select Downloads.
3. The YANG files can be located under the Yang Modules.
4. Unzip or untar the Fabric OS package file; the yang.tar.gz file contains the collection of YANG module files that
this FOS release version supports. Untar the yang.tar.gz file to obtain individual YANG module files.
Alternatively, the YANG modules for a specific FOS version can be downloaded from github.com/brocade/yang.
Broadcom FOS-922-RN
51
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE From FOS v9.2.0, Electrical and Optical loopback tests are deprecated from D-Port test functionality
and CLI output. Link distance is only provided for distances over 1000 meters.
The following are specific adapter models and driver versions supported by Brocade with Fabric OS v9.2.x for ClearLink
Diagnostics.5
Emulex 16G Emulex 32G Emulex Gen 7 QLogic 16G QLogic 32G QLogic 64G
Adapter Adapter Adapter Adapter Adapter Adapter
D_Port tests will fail between a port with a 64G optic on a switch or director operating with FOS v9.0.1b and a port on a
G720, X7, G620 (switchType 183), or G630 (switchType 184) operating with FOS v9.0.0x. Any of these platforms
operating with FOS v9.0.0x should be upgraded to FOS v9.0.1a or later prior to running D_Port tests to a 64G optic.
5
Adapter firmware or driver versions that are later than the ones listed in the table may not work.
Broadcom FOS-922-RN
52
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
8.3.4 DDNS
Enabling and disabling the DDNS for IPv6 are disruptive operations which leads to DHCPv4 management IP change.
Enabling this operand without caution will lead to losing all active SSH sessions due to IP address change. The users can
login back to the switch only after finding the newly leased DHCPv4 address using the serial console.
NOTE When using MS Windows DHCP server, DNS should be configured on the switch (static or dynamic)
for IPv6 DDNS feature to work with the Windows DHCP server.
8.3.6 DWDM
For best performance and resiliency when deploying native FC ISLs over DWDM, best practice is to deploy distinct
ISLs over DWDM with in-order delivery (iodset) configured on the switches.
Trunking over DWDM is not recommended or supported by Brocade due to the risk of out-of-order frame delivery.
Trunking relies on deterministic deskew values across all trunked links to provide in-order delivery as well as FC
primitives for trunk formation. These deskew values cannot be guaranteed with DWDM equipment in the path.
Use of trunking over DWDM links should only be done when validated and supported by the DWDM vendor.
With Gen 7 switches, the permitted deskew (variance in latency due to difference in cable length) is less at 64G
compared to lower interface speeds.
8.3.8 Extension
Extension between a Brocade 7810 or SX6 running FOS v9.x and a Brocade 7840 is supported only if the 7840 is running
FOS 8.2.1 or later. The following table documents the combinations.
NOTE Extension between a Brocade 7810 or SX6 running FOS v9.2x and a Brocade 7840 is not supported.
Broadcom FOS-922-RN
53
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Extension between a Brocade 7850 and Brocade 7810 or SX6 is supported only if the 7810 or SX6 is running FOS 9.2.0
or later. The following table documents the combinations.
NOTE Extension between a Brocade 7850 and a Brocade 7840 is not supported.
Downgrade from FOS v9.2.2 is not supported when the optic 25GbE SFP+ LR, PN: 57-1000504=01 (CBR-
25G-LR-01) with serial number CDA9 xxxxxxxxxxx is present on the switch.
8.3.9 FCoE
The following topologies for FCoE on the FC32-64 are not supported with FOS v9.2.x:
Cisco UCS server directly connected to the FC32-64 without a Fabric Interconnect module.
Cisco UCS server with a Fabric Interconnect module connected to the FC32-64 via a Nexus 5000 series switch in
between. Neither running FCoE NPV mode nor L2 switching mode on the Nexus 5000 is supported.
FCoE devices are supported in edge-to-edge fabric topology. They are not supported in edge-to-backbone fabric
topology over FCR configurations.
8.3.10 FC-NVMe
FC-NVMe is supported in edge-to-edge fabric topology with device type information (e.g. Initiator or Target) over FCR
configurations.
FC-NVMe is supported in edge-to-backbone fabric topology without device type information over FCR configurations.
NOTE This only applies when starting from FOS v9.0.x. When performing staged firmwaredownload
migration starting from FOS v9.1.x to FOS v9.2.0 this does not apply.
NOTE When upgrading deployments with FCoE (UCS FI connected with Ethernet Uplinks) from FOS
v9.1.0x the following order must be followed to ensure non-disruptive upgrades:
FOS v9.1.0x -> v9.1.1x -> v9.2.0x in order to retain FCoE logins and traffic during the upgrade
process.
NOTE An SNMP FFDC file may result as part of firmware migration to or from FOS v9.2.1 when the switch
or director chassis is managed by SANnav v2.3.1. The conditions necessary to encounter the FFDC
are the FOS level on the standby CP or secondary partition lack SHA512 authentication support.
There is no functional impact however FFDC generation message appears repeatedly.
Broadcom FOS-922-RN
54
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
NOTE If for any reason the FPGA upgrade fails it is recommended to reissue the upgrade steps, do NOT
power-cycle the director or the affected slot.
To upgrade the FPGA on the CR64 blades perform the following steps:
1. Perform the following command to verify current FPGA code level fpgaupgrade --latest
2. Verify the current FPGA code level is lower than 0x01.0a for the CR64 blade slots
– Slot 7 and 8 on X7-8
– Slot 5 and 6 on X7-4
After verification proceed to the next step.
3. Verify both CR64 blades are online with the command slotshow.
4. Prepare for upgrade of the FPGA on the first CR64 blade with the command portdecom <ICL port> -qsfp
perform this for all connected E-ports (ICL ports) on the CR64 blade.
5. Disable the first CR64 blade on which the ICL ports were decommissioned in the previous step portdisable -s
<core blade slot #>.
6. Upgrade the FPGA on the first CR64 blade with the command fpgaupgrade -s <core blade slot #>
a. Respond Yes to automatically power-off and power-on the blade.
(i) Do you want to power-off and power-on the slot # automatically, after FPGA
and/or CPLD upgrade (y/[n])?:
b. In case you respond No to automatically power-off and power-on the blade perform these steps manually.
(i) slotpoweroff <core blade slot #>
(ii) slotpoweron <core blade slot #>
Broadcom FOS-922-RN
55
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
7. Verify the FPGA on the first CR64 blade is upgraded with the command fpgaupgrade –latest.
a. Verify the FPGA code level is 0x01.0a
8. Enable the first CR64 blade with the command portenable -s <core blade slot #> (as needed).
9. Persistently enable all ICL ports on the CR64 blade (which were disabled in step 5 prior to the upgrade)
portcfgpersistentenable <ICL port>.
Repeat this step for all connected E-ports (ICL ports) on the CR64 blade.
10. Verify the ICL ports are online with the command switchshow.
11. Repeat steps 4 through 11 on the second CR64 blade.
The FPGA upgrade is now complete.
To verify if the optimized credit model is already applied execute the following CLI:
fossystem --show -qos 1
In this case run the following command to optimize the credit model.
Example:
Switch:FID128:admin> fossystem --set -qos 1
fossystem success
Switch:FID128:admin> fossystem --show -qos 1
System is optimized for credit stall and over subscription flows.
Broadcom FOS-922-RN
56
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
8.3.15 Security
In this section important security notes relevant to FOS v9.2.x are listed.
Default Secure
Platforms shipping with FOS v9.2.x from factory have Default Secure enabled. This means that unsecure protocols are
blocked, and stronger cryptographic settings are applied. For more details refer to the Brocade Fabric OS Administration
Guide for Fabric OS v9.2.x.
WARNING Imported certificate contains OU field, which is deprecated starting with Fabric OS v9.2.0 based
on the recommendations form CA/Browser forum.
Excerpt of certificate with OU field:
openssl x509 -in signed.10.10.10.10-web.pem -text -noout
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = California, L = San Jose, O = Brocade, OU = test, CN =
192.0.2.1, emailAddress = name@domain
Validity
Not Before: Jul 27 14:16:38 2016 GMT
Not After : Jul 27 14:16:38 2017 GMT
Subject: C = US, ST = California, L = San Jose, O = Brocade, OU = Demo, CN =
CA@demo
Broadcom FOS-922-RN
57
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Access Gateway FOS Version Edge Switch FOS Version Shared Secret Configuration
Pre-9.0.0 9.0.0 or later AG local secret = Switch local secret
AG peer secret = Switch peer secret
9.0.0 or later 9.0.0 or later AG local secret = Switch peer secret
AG peer secret = Switch local secret
It is recommended to reconfigure shared secrets for F_Port authentication between HBAs and a switch before the
switch is upgraded to FOS v9.0.0 or later. Without reconfiguration, shared secrets configured in earlier FOS versions
will fail F_Port authentication when a device port resets. The shared secrets should be configured as given in the
following table.
FOS Version Shared Secret Configuration
FOS v9.x does not support F_Port authentication to Marvell QLogic BR series (Former Brocade Product Line) HBAs
as these HBAs only support legacy Brocade F_Port authentication. For these devices to connect to FOS v9.x, F_Port
authentication must be disabled.
FOS v9.x does not support F_Port trunking when F_Port authentication is enabled.
Broadcom FOS-922-RN
58
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
8.3.15.1 Syslog
When using non secure syslog server configuration in FOS 9.1x and upgrading to FOS v9.2x the cfgload.secure
configuration setting should be verified prior to upgrade. When this setting is set to 1 non secure syslog is no longer
permitted after upgrade to 9.2x.
Example, verifying cfgload.secure setting:
Switch:FID128:admin> configure --show -mod CHS
Key Name Value
Add Suffix to the uploaded file name(cfgload.cfgfile_suffix) 0
Do you want to enable auto firmwaresync(cfgload.firmware_sync) 1
Enable secure switch mode(cfgload.secure) 1
When the cfgload.secure setting is set to 1 the end user must make the following decision:
– Move to using a secure syslog server (this is the recommended best practice)
Or
– Change the cfgload.secure setting to 0, prior to upgrade to FOS v9.2x
NOTE Setting cfgload.secure to 0, also implies that FTP and HTTP protocols are permitted in FOS.
These protocols can be blocked using IPFilter policy
Broadcom FOS-922-RN
59
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
8.3.16 Zoning
When performing configdownload with a file that contains unsorted zone membership, any unsorted members will be
automatically sorted in the system when configdownload completes. As a result, when a switch is later re-enabled,
port segmentation may occur due to adjacent switches having the same zones with unsorted membership lists. Users can
recover from segmentation by executing cfgDisable, cfgClear, and cfgSave operations in order to clear the zoning
database from the switch that just performed configdownload. After segmented ISL ports are re-enabled, zone merge
can proceed.
NOTE These steps should ONLY be performed if the zone database is the same on the configdownload switch
as it is on the rest of the fabric.
8.3.18 Miscellaneous
After a power supply unit is removed from a Brocade G620, the historyshow command may miss the entries for
this FRU removal or insertion event. In addition, the RASLog error message EM-1028 may be logged when the power
supply is removed. This condition can be corrected by power-cycling the switch.
After running offline diagnostics mode 1 on QSFP ports, a Brocade G620 must be rebooted before operational use.
After running offline diagnostics with portledtest, portloopbacktest, or turboramtest commands on
FOS v9.x, Brocade G630 with swtichType 184 must be rebooted before operational use.
All links in an ICL QSFP connection on a Brocade X6 Director must be configured to the same speed using the
portcfgspeed command from one of the following supported speeds: 16Gb/s, 32Gb/s, or ASN. To connect an ICL
from an X6 with a 4x32GFC breakout optic (P/N 57-1000351-01) or a 4x16G FC optic to a 4x16G FC optic in a DCX
8510, the X6 port’s speed must be set to 16Gb/s.
Brocade G630 LEDs illuminate amber and green during power-up.
The CLI command option snmpconfig -set accesscontrol is planned to be deprecated in the next major
release.
When replacing a FC32-64 blade with a FC32-48 blade, flexport and FCoE configurations should be removed before
the FC32-64 blade is removed.
Enhanced checks are performed on optics during firmware upgrade to FOS v9.0.0 or later. Firmware download is
blocked if unsupported optics are discovered. The scanning of the optics takes a few minutes to complete. The
amount of time it takes is dependent on the number of ports on a switch. On a fully loaded eight slot director, it can
take up to five minutes to complete. In addition, ports with optics that fail the enhanced checks in FOS v9.x will not be
able to come online due to the optics as invalid module.
Broadcom FOS-922-RN
60
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Brocade G620 with switchType 183 and G630 with switchType 184 do not support the following legacy optical
modules:
– 16G SWL (HAA1, HAA2 serial number)
– 16G LWL (HDA1, HDA2, HDA3 serial number)
– 32G QSFP SWL (ZTA serial number)
The following examples show the sfpShow CLI outputs with the serial numbers of the legacy optical module:
sfpshow <port> -f
...
Serial No: HAA11213107BTY2
...
sfpshow <port> -f
....
Serial No: HDA318014000DN1
....
sfpshow <port> -f
....
Serial No: ZTA11517000001K
All user ports in a Gen 7 ICL QSFP port must be assigned to the same logical switch when Virtual Fabric is
configured. Port 0 of the ICL QSFP must be enabled first before port 1, port 2, and port 3 within the same QSFP to be
enabled. If port 0 of the Gen 7 ICL QSFP becomes offline, port 1, port 2, and port 3 of the QSFP will become offline
as a result.
All user ports in a Gen 7, 2KM ICL QSFP port must be assigned to the same logical switch when Virtual Fabric is
configured. Port 3 of the ICL QSFP must be enabled first before port 0, port 1, and port 2 within the same QSFP to be
enabled. If port 3 of the Gen 7, 2KM ICL QSFP becomes offline, port 0, port 1, and port 2 of the QSFP will become
offline as a result.
The output of CLI command sfpShow or any other interfaces to retrieve information from Gen 7 SWL QSFP (part
number 57-1000490) and LWL QSFP (part number 57-1000491) does not match the part numbers on the media
sticker labels. The output shows Gen 6 part number (57-1000351 for SWL or 57-1000480 for LWL). This does not
affect operation of the optics.
When a fabric with FOS v9.x is connected to a fabric with pre-FOS v9.0.0, RASLOG message FABR-1001 is
generated as shown in the following example. This is an expected message. There is no impact on the ISL
functionality.
[FABR-1001], 35, FID 128, WARNING,, port 62, incompatible VC count
FOS v9.x has disabled directory listing in CLI shell. As a result, entering <tab><tab> key does not list all CLIs
available. Users can enter help command to list the commands. The shell tab completion by entering the first letter
followed by <tab> key is supported.
The FCR support of Long Distance Fabric mode conflict cannot coexist with long distance port configuration. If long
distance mode (LD, LS, or LE) is enabled on the EX_Port and the EX_Port detected Backbone Fabric's Long
Distance Fabric configuration is different from the connected Edge Fabric's Long Distance Fabric configuration, then
the EX_Port will be disabled.
If Long Distance Fabric is enabled on a switch via the configure command, it is recommended to upgrade the switch
from FOS v8.2.x directly to FOS v9.0.0a or later. If the Long Distance Fabric configuration is enabled on an E_Port or
EX_Port, firmware upgrade or downgrade to FOS v9.0.0 will effectively cause the Long Distance Fabric configuration
to be disabled.
If an HTTPS certificate is installed on a switch in FOS v9.x, HTTP access is blocked by default as HTTPS access is
supported.
When portloopbacktest mode1 test runs on multiple Gen 7 ICL ports with multiple iterations, the test may fail. The
workaround is to run the test on one ICL port at a time with a reduced number of iterations.
Running long distance LE mode between any blades or switches among FC32-X7-48, FC64-48, or G720 with port
QoS mode enabled and vc_translation_link_init mode enabled may result in frame timeouts. The workaround for this
problem is to use LS or LD mode for long distance.
Broadcom FOS-922-RN
61
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
62
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
In the FC port external schema (available through NB streaming from SANnav Management portal) the
user_port_index has been replaced with port_number for ease of use for end users:
Previous schema (pre FOS v9.2.1):
{ "name" : "user_port_index", "type" : "int", "doc": "The user port index of the front-end port." }
New schema (FOS v9.2.1):
{ "name" : "port_number", "type" : "string", "doc": "The slot/port number of the port", "default": ""},
An SNMP FFDC file may result as part of firmware migration to or from FOS v9.2.1 when the switch or director
chassis is managed by SANnav v2.3.1. The conditions necessary to encounter the FFDC are the FOS level on the
standby CP or secondary partition lack SHA512 authentication support. There is no functional impact however FFDC
generation message appears repeatedly.
Broadcom FOS-922-RN
63
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
In addition to defect fixes, software releases may also contain updates to address Common Vulnerabilities and Exposures
(CVEs). The latest security vulnerability disclosures and descriptions of each CVE can be found by visiting the Brocade
Security Advisories web page:
www.broadcom.com/support/fibre-channel-networking/security-advisories
Specific CVEs addressed within any given software release will be publicly released a short period after the initial posting
of the software. This is done to provide enough time for OEMs to qualify security updates prior to public disclosure.
The exact CVEs addressed within the Fabric OS v9.x software releases are provided in the following security
announcement:
support.broadcom.com/external/content/SecurityAdvisories/0/25000
Broadcom FOS-922-RN
64
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
65
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
66
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
67
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
68
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
70
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
71
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
72
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
73
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
74
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
75
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
76
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
77
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
78
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
79
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Broadcom FOS-922-RN
80
Fabric OS v9.2.2 Fabric OS v9.2.2 Release Notes
Revision History
Broadcom FOS-922-RN
81