cnMatrix-EXTX Release Notes - 4.1-r3
cnMatrix-EXTX Release Notes - 4.1-r3
cnMatrix-EXTX Release Notes - 4.1-r3
Release 4.1-r3
Contents
Release Notes for Cambium Networks cnMatrix Release 4.1-r3.................................................................. 1
Contents ........................................................................................................................................................ 1
Introduction .............................................................................................................................................. 2
Supported Models .................................................................................................................................... 2
Cambium Networks products and support............................................................................................... 4
What’s New in 4.1-r3 ................................................................................................................................ 4
IPv6 ND RA Guard ..................................................................................................................................... 5
MAC Authentication Bypass - MAB.......................................................................................................... 6
Port Network Access Control: Authorization ............................................................................................ 7
MSTP support in cnMaestro ..................................................................................................................... 7
STP Path Cost method............................................................................................................................... 8
Port Security: MAC address learn limit ..................................................................................................... 8
cnMatrix Support For cnMaestro SNMP Agent Configuration ................................................................. 9
Energy Efficient Ethernet .......................................................................................................................... 9
Counter for link-up/down events ........................................................................................................... 10
Supported Features in cnMatrix 4.1-r3................................................................................................... 10
Fixed Issues ............................................................................................................................................. 13
Known Issues (Release 4.1-r3) ................................................................................................................ 14
Feature Notes ......................................................................................................................................... 16
Limitations .............................................................................................................................................. 16
Supported Models
• cnMatrix EX2028
• cnMatrix EX2028-P
• cnMatrix EX2010
• cnMatrix EX2010-P
• cnMatrix EX2016M-P
• cnMatrix EX1028
• cnMatrix EX1028-P
• cnMatrix EX1010
• cnMatrix EX1010-P
• cnMatrix TX2020R-P
• cnMatrix TX2012R-P
Attention: Certain features may not be available on this product line and will be called out explicitly
where not applicable. The TX switches do not support running software versions 2.x and 3.x.
Downloading unsupported software is prohibited by 4.1-r3 agent.
New Features
cnMatrix Release 4.1 brings new functionality supported on all models or only on specific
models. The new features and supported models are listed in the table below.
IPv6 ND RA Guard
This feature prevents malicious and unwitting IPv6 Neighbor Discovery Router Advertisement packets
entering the network at the edge. This feature can be enabled on a per-port basis.
By attaching the “host” policy to a port, the IPv6 ND RA packets received on that port will be dropped at
ingress. By attaching the “router” policy, the IPv6 ND RA packets will be allowed on that port.
This is the feature that allows authenticating non-802.1x capable devices based on their MAC address.
The switch can use either the local dot1x database or a RADIUS (Remote Authentication Dial In User
Service) server to authenticate the MAC address. For the local database, use the MAC address without
any separator as the username and password, as shown in this example:
When MAB is enabled, the authentication process will first try to identify any dot1x capable device
connected on the port. When that fails, the same amount of time will be spent trying to acquire the
MAC address of the device. Once the MAC address has been acquired, the switch will check that it is
allowed access to the network, either locally or using a RADIUS server. If the MAC address has not been
acquired during this time, the authentication process will start all over again. Despite not sending any
identity-request messages during the MAC address acquisition, the switch will still listen for EAP-start
messages and will initiate dot1x authentication once such a message is received.
Command Explanation
configure terminal Enter global configuration mode
interface gigabitEthernet 0/1 Enter interface configuration mode
dot1x port-control auto Enable authentication on the port
dot1x mac-auth-bypass Enable MAB
dot1x reauth-max 3 (Optional) Configure the number of times the
switch will try to authenticate dot1x devices.
dot1x timeout tx-period 30 (Optional) Configure the time to wait for dot1x
devices to respond.
end Return to the privileged EXEC mode
show dot1x interface gigabitEthernet Displays the interface dot1x configuration.
0/1
Once a device has been authenticated using MAB, further reauthentication attempts will use the same
MAC address. To replace the MAC address, the link admin state or dot1x port-control must be bounced.
When in single-host mode, the switch will acquire the first MAC address and only this address will be
allowed to access the network.
Command Explanation
configure terminal Enter global configuration mode
aaa authorization network default Set global dot1x authorization method to RADIUS
group radius
end Return to the privileged EXEC mode
show dot1x Displays global dot1x configuration
For authorization to work, the following requirements must be met:
For dynamically assigning the VLAN, the switch expects the following attributes from the RADIUS server:
• Tunnel-Type
• Tunnel-Medium-Type
• Tunnel-Private-Group-ID
The Tunnel-Type attribute must be set to VLAN, the Tunnel-Medium-Type attribute must be set to IEEE-
802 and the Tunnel-Private-Group-ID attribute must contain the VLAN ID as a string.
For dynamically assigning the 802.1p priority, the switch expects the User-Priority-Table attribute to
contain the desired priority repeated 8 times. The reason for this is that cnMatrix 1k and 2k series only
support overwriting the priority with a single value.
To configure the path cost method via CLI, run the following command :
The configuration is also available in the Web GUI, for each STP mode.
Path cost values will be immediately modified on the operational ports, and the STP trees will be
recalculated accordingly. Ports on which the cost is set manually will not be affected by this global
setting.
The feature allows the network administrator to configure the maximum number of devices that can
access the network from a specific port, and the action to be taken in case the configured number is
exceeded.
This command enables the feature and set the default maximum to “1” and “protect” as the default
action:
cnMatrix(config-if)# switchport port-security
This command set the maximum number of MAC addresses allowed per port:
This command set the action to be taken in case the configured number is exceeded:
“protect”—When the number of port secure MAC addresses reaches the maximum limit allowed on the
port, packets with unknown source addresses are dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum value or increase the number of maximum
allowable addresses. The violation counter increments. You are not notified that a security violation has
occurred.
“restrict” – When the number of secure MAC addresses reaches the limit allowed on the port, packets
with unknown source addresses are dropped until you remove a sufficient number of secure MAC
addresses or increase the number of maximum allowable addresses. An SNMP trap is sent, a syslog
message is logged, and the violation counter increments.
By default, the feature is disabled. When enabled, the maximum number of allowed MAC addresses is
set to 1, and the action is set to “protect”.
To display the entries that are created via cnMaestro, use the following command:
Note: entries are read-only but are displayed as comments to provide a complete picture of the current
configuration.
For EEE to function, both devices must support LPI mode and they must have EEE enabled.
To enable/disable EEE, via CLI, use the “energy-efficient-ethernet” command from the interface
configuration.
This feature provides a way for the switch to count the number of link transition events per port. And
display this count to the user. This information can be displayed via the “show interfaces” command, as
well as via the “show interfaces link-transitions” CLI command, and it is also visible in the “Port Basic
Settings” page in the Web GUI.
cnMatrix feature availability varies between hardware platforms and cloud managers. Please consult the
feature availability table below.
cnMaestro XMS-Cloud
Configurable Configurable
cnMatrix Feature (3.0.4) (10.7) EX2K EX1K TX2K
802.1Q VLAN and Trunking Support Yes Yes Yes Yes Yes
Yes (port-
Port Mirroring: Port-based, ACL-based No Yes Yes Yes
based only)
Locally Managed Username and Password Yes Yes Yes Yes Yes
Up to 30W
(60W on Up to
802.3 af/at/bt Yes Yes
30W
Up to 90W
EX2016M-
P)
Only
EX2016-M-
Yes (first half of
PoE on 4 Pairs (90W) N/A N/A P, ports 9- No
the ports)
14, max
60W
SFP+ (SFP
Transceiver ports N/A N/A SFP SFP+
on EX2010)
Yes (No on
Cable Diagnostics cnMaestroX No 2.5Gbps Yes Yes
ports)
Yes (TX2020R-P
Dual Redundant Power Supplies No No No No
only)
Yes
PBA (cnMaestroX on Yes Yes Yes Yes
EX1K)
Fixed Issues
Tracking Product Feature Description
3404 All SSH Exceptions encountered when using monitoring tools which connect to
the switch through SSH
3433 All SSH Memory leak when multiple SSH sensors are enabled on network
monitoring tool such as PRTG
3475 All DHCP Server DHCP pool name is not properly generated by ‘show running-config’.
This can cause configuration failure when CLI template is pushed from
cnMaestro.
3533 All Spanning- Root Bridge changes continuously when SNTP is enabled and the clock
Tree is synchronized
3562 All SFP+ Ubiquiti BiTi transceiver not configured by auto-detect. The transceiver
type is listed as N/A, the wavelength is displayed incorrectly.
3573 All LLDP LLDP-based PBA policy now allows multiple LLDP neighbors on the
same port. Device such as IP Phone can use LLDP detection with PBA
policy
3574 All SSH SSH segmentation fault when running Tenable Nessus software tool
388 All DHCP Relay: The switch doesn’t relay all Use cnMatrix switch to relay DHCP
DHCP Release and Renew packets if there are packets for less than 360 DHCP
more than 360 DHCP clients connected to the clients.
switch.
460 All LLDP port-id-subtype setting and DHCP server Reconfigure the settings if they are
host hardware-type 3 setting are lost after boot. lost after reboot.
519 All UP7 traffic not equally serviced if received from N/A
2 different ports - SP scheduler
695 All Ping doesn't work between 1/10 Gb interfaces N/A
or 1/10 Gb port-channels when STP mode is
PVRST and more than 9 VLANs are created.
838 All DHCP Snooping: When disabling DHCP Reconfigure DHCP Snooping per
Snooping globally, the DHCP Snooping VLAN VLAN.
configuration is cleared.
848 All Auto Attach: For phone detection it is advisable Phones can be identified using
not to use rules with LLDP-CAP "phone" as other data LLDP data, such as
matching criteria. System Description, System Name
or Chassis ID.
946 All Routing is not working on routed port when Use static ARPs only for VLAN
static ARP is used interfaces.
985 All Exec-timeout setting is lost after reboot. Reconfigure this setting after unit
reboot.
2122 All RIPv1/RIPv1 compatible updates are not sent Only connect cnMatrix 3.0.1-r4 to
to the RIP neighbors RIPv2 neighbors, and set the RIP
(3.0.1-r4 does not work with RIPv1 RIP router) send update to RIPv2 mode
3513 All MSTP: In some cases, for very long VLAN lists N/A
cnMaestro associated to MSTP instances, the
configuration may fail
3683 All Port MAC Limiting: Migrated MAC addresses This is a display issue. Please
are not deleted from the software FDB table ignore this output.
after the limit is reached on the new port.
Feature Notes
• If you remove the default IP address from mgmt0 interface and save the running-config the default
IP address is restored after boot.
Limitations
Tracking Product Description Workaround
2103 All Router Port configuration from CLI Templates Configuring a router port from a
will result in faulty port performance tracking template can lead to unexpected
monitoring behavior. The setting is
not recommended while using
cnMaestro.