AWP 547 14 Relnote
AWP 547 14 Relnote
AWP 547 14 Relnote
i
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright ©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. For information about this see www.openssl.org/
This product includes software licensed under the GNU General Public License available
from: www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the Allied
Telesis GPL Code Download Center at: www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses
including the GNU General Public License (GPL) and will make all required source code
available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
©2017 Allied Telesis Inc. All rights reserved. No part of this publication may be reproduced
without prior written permission from Allied Telesis, Inc.
Allied Telesis, Inc. reserves the right to make changes in specifications and other
information contained in this document without prior written notice. The information
provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be
liable for any incidental, special, indirect, or consequential damages whatsoever, including
but not limited to lost profits, arising out of or related to this manual or the information
contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have
known, the possibility of such damages.
ii
What’s New in Version 5.4.7-1.4
For:
SwitchBlade x8100 Series XS900MX Series
SwitchBlade x908 GS900MX/MPX Series
DC2552XS/L3 GS970M Series
x930 Series FS980M Series
x510 Series AR4050S
IX5-28GPX AR3050S
x310 Series AR2050V
x230 Series AR2010V
x550 Series AMF Cloud
IE510-28GSX-80
IE300 Series
IE200 Series
Introduction
This release note describes the issues resolved in AlliedWare Plus software version 5.4.7-
1.4. For more information, see the Command Reference for your switch or AR-series
firewall. Software file details for this version are listed in Table 1 below.
You can obtain the software files from the Software Download area of the Allied Telesis
website. Log in using your assigned email address and password.Contact your authorized
Allied Telesis support center to obtain a license.
Caution: Software version 5.4.7-x.x requires a release license for the SBx908 and
SBx8100 switches. If you are using either of these switches, make sure that each
switch has a 5.4.7 license certificate before you upgrade.
Contact your authorized Allied Telesis support center to obtain a license. For details, see:
Unsupported x610 and x210 Series switches are not supported by version 5.4.7-1.1 and later.
models
Caution: Using a software version file for the wrong switch or AR-series firewall model
may cause unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a commitment on
the part of Allied Telesis, Inc. While every effort has been made to ensure that the
information contained within this document and the features and changes described are
accurate, Allied Telesis, Inc. can not accept any type of liability for errors in, or omissions
arising from, the use of this information.
Please refer to the ISSU compatibility matrix below to determine ISSU release
compatibility. C= Compatible, I = Incompatible.
To Release
Release 5.4.7-1.1 5.4.7-1.2 5.4.7-1.3 5.4.7-1.4
5.4.7-1.1 C I I
5.4.7-1.2 C I
FROM
5.4.7-1.3 C
The issues resolved in software version 5.4.7-1.4 are listed in the section titled: “Issues
Resolved in 5.4.7-1.4” on page 6.
C613-10526-00-REV D
AR3050S/AR4050S
SBx8100 CFC400
SBx8100 CFC960
DC2552XS/L3
AMF Cloud
x510, 510L
GS900MX
XS900MX
AR2010V
AR2050V
FS980M
FS970M
SBx908
IE200
IE300
IE510
x230
x310
x550
x930
IX5
CR Module Description
5
Issues Resolved in 5.4.7-1.4
This AlliedWare Plus maintenance version includes the resolved issues in the following table, ordered by feature.
C613-10526-00-REV D
AR3050S/AR4050S
SBx8100 CFC400
SBx8100 CFC960
DC2552XS/L3
AMF Cloud
x510, 510L
GS900MX
XS900MX
AR2010V
AR2050V
GS970M
FS980M
SBx908
IE200
IE300
IE510
x230
x310
x550
x930
IX5
CR Module Description
CR-57188 AMF Previously, enabling AMF on an IE200 variant switch could cause the switch – – – – Y – – – – – – – – – – – – – – – –
to lock up.
This issue has been resolved.
CR-57349 AMF Previously, an unexpected termination of background AMF processes could Y – Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
occur on a large AMF network with a VAA master.
6
AR3050S/AR4050S
SBx8100 CFC400
SBx8100 CFC960
DC2552XS/L3
AMF Cloud
x510, 510L
GS900MX
XS900MX
C613-10526-00-REV D
AR2010V
AR2050V
GS970M
FS980M
SBx908
IE200
IE300
IE510
x230
x310
x550
x930
IX5
CR Module Description
CR-57748 IP Reputation Previously, when IP Reputation started up, it was sometimes possible for – – – – – – – – – – – – – – – – – – – Y –
erroneous error messages to be generated indicating that each of the IP
Reputation categories could not be found.
This issue has been resolved.
CR-58035 LACP Previously, when using a static ARP with a multicast MAC address that used – Y Y Y Y Y Y Y Y Y Y Y – Y – – – – – – –
a LACP based aggregator as the nexthop port, the ports used to egress the
frames would not be updated when ports were dynamically added or
removed from the aggregator by LACP.
This issue has been resolved.
7
This issue has been resolved, now PPP over 3G USB modems retain their
default PPP DNS option of request.
AR3050S/AR4050S
SBx8100 CFC400
SBx8100 CFC960
DC2552XS/L3
AMF Cloud
x510, 510L
GS900MX
XS900MX
C613-10526-00-REV D
AR2010V
AR2050V
GS970M
FS980M
SBx908
IE200
IE300
IE510
x230
x310
x550
x930
IX5
CR Module Description
CR-57674 PTP Previously, on x930 series switches, port number 1.0.25 and 1.0.26 linked – – – – – – – – – – – – Y – – – – – – – –
Transparent at 10G would exhibit large resident delay values in PTP synchronisation
Clock frames when enabled in 1588 Transparent Clock mode.
This issue has been resolved.
CR-57852 PTP Previously, the synchronisation frame resident time values did not reflect – – – – Y Y Y – – – – – Y – – – – – – – –
Transparent correct timestamps.
Clock
This issue has been resolved.
CR-57606 RADIUS Previously, when EAP-TLS and PEAP authentication were disabled in the Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
startup configuration, the switch would still boot-up with a warning
8
been addressed.
ISSU: Effective when CFCs upgraded.
AR3050S/AR4050S
SBx8100 CFC400
SBx8100 CFC960
DC2552XS/L3
AMF Cloud
x510, 510L
GS900MX
XS900MX
C613-10526-00-REV D
AR2010V
AR2050V
GS970M
FS980M
SBx908
IE200
IE300
IE510
x230
x310
x550
x930
IX5
CR Module Description
CR-57817 Unicast Previously, in configurations involving recursive routes it was possible for a – – – – – Y Y – Y Y Y Y Y Y Y Y Y Y Y Y Y
Routing system reboot to occur during the addition and remove of ECMP routes.
This issue has been resolved.
ISSU: Effective when CFCs upgraded.
CR-57311 VLAN Previously, when a switchport was configured as a private-vlan and in trunk Y – – – – – – – – – – – – – Y Y Y – – – –
mode, and then the configuration was removed, the port would incorrectly
remain configured as a private vlan port.
This meant the port would not be able to operate as a regular trunk or
access port.
9
What’s New in Version 5.4.7-1.3
For: x550 Series only
Introduction
This release note provides support for the x550 Series platform.
The x550 Series platform is a new platform containing two models supported by
AlliedWare Plus software release version 5.4.7-1.3.
Product models and software file details for this version are listed in Table 1 below.
You can obtain the software files from the Software Download area of the Allied Telesis
website. Log in using your assigned email address and password.Contact your authorized
Allied Telesis support center to obtain a license.
The following table lists model names and software files for this version.
Caution: Using a software version file for the wrong switch or AR-Series firewall model
may cause unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a commitment on
the part of Allied Telesis, Inc. While every effort has been made to ensure that the
information contained within this document and the features and changes described are
accurate, Allied Telesis, Inc. can not accept any type of liability for errors in, or omissions
arising from, the use of this information.
Introduction
This release note describes the issues resolved in AlliedWare Plus software version 5.4.7-
1.2. For more information, see the Command Reference for your switch or AR-series
firewall. Software file details for this version are listed in Table 1 below.
You can obtain the software files from the Software Download area of the Allied Telesis
website. Log in using your assigned email address and password.Contact your
authorized Allied Telesis support center to obtain a license.
The following table lists model names and software files for this version.
Unsupported x610 and x210 Series switches are not supported by version 5.4.7-1.1 and later..
models
Caution: Using a software version file for the wrong switch or AR-series firewall model
may cause unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a commitment on
the part of Allied Telesis, Inc. While every effort has been made to ensure that the
information contained within this document and the features and changes described are
accurate, Allied Telesis, Inc. can not accept any type of liability for errors in, or omissions
arising from, the use of this information
CR-57789 AMF Previously, after the command atmf cleanup was issued to
reset a x230 variant switch to factory default, the autoboot
feature would fail to work.
This issue has been resolved.
Introduction
This release note describes the new features and enhancements in AlliedWare Plus
software version 5.4.7-1.1. For more information, see the Command Reference for your
switch or AR-series firewall. Software file details for this version are listed in Table 1 below.
You can obtain the software files from the Software Download area of the Allied Telesis
website. Log in using your assigned email address and password.
Caution: Software version 5.4.7-x.x requires a release license for the SBx908 and
SBx8100 switches. If you are using either of these switches, make sure that each
switch has a 5.4.7 license certificate before you upgrade.
Contact your authorized Allied Telesis support center to obtain a license. For details, see:
Unsupported x610 and x210 Series switches are not supported by version 5.4.7-1.1 and later.
models
Not all models of XEM are supported in the SwitchBlade x908 by version 5.4.7-x.x. The
following table lists which XEMs are and are not supported by version 5.4.7-x.x.
Table 2: Support of XEM modules for the SwitchBlade x908 in version 5.4.7-x.x
Caution: Using a software version file for the wrong switch or AR-series firewall model
may cause unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a commitment on
the part of Allied Telesis, Inc. While every effort has been made to ensure that the
information contained within this document and the features and changes described are
accurate, Allied Telesis, Inc. can not accept any type of liability for errors in, or omissions
arising from, the use of this information.
To see how to find full documentation about all features on your product, see “Obtaining
User Documentation” on page 43.
From AlliedWare Plus versions 5.4.7-0.4 onwards and 5.4.7-1.1 onwards, unconfigured
devices automatically receive a management IP address on start-up, without any manual
configuration. You can optionally set up a DHCP server on your network and have the
device obtain an address via DHCP, or otherwise the device uses an IP address of
169.254.42.42.
This automatic address assignment means you can use SSH to manage the device, without
the need for an Asyn console cable.
AR-Series Firewalls are typically pre-configured at the factory. Therefore the new start-up
behavior does not apply to them unless you manually return them to an unconfigured
state by using the command erase factory-default.
For details of the management interface and the new start-up behavior, see “Changes to
default start-up behavior” in the “Important Considerations Before Upgrading” on
page 27 section of this release note.
Version 5.4.7-1.1 adds support for 802.1ag and ITU Y.1731 Connectivity Fault
Management. For many years, Network Service Providers (NSPs) have managed their
networks using the FCAPS model: Fault, Configuration, Accounting, Performance, and
Security. CFM is an IEEE 802.1ag and ITU Y.1731 standard for managing connectivity at the
Ethernet service level. The 802.1ag standard adds Fault management capabilities to
Ethernet, while the ITU Y.1731 standard expands the capabilities to include Performance.
Ethernet CFM provides the network operator with a way to detect faults in the network,
and to isolate the location of the fault at either the link level (i.e. port) or at the VLAN level.
Y.1731 extends this, and also provides a way to manage Service Level Agreements (SLAs)
at the link level, but more importantly at the VLAN level.
For more information and configuration details, see the CFM Feature Overview and
Configuration Guide.
For more information and configuration details for G.8032, see the G.8032 Feature
Overview and Configuration Guide.
For more information and configuration details for ACLs, see the ACLs Feature Overview
and Configuration Guide.
For more information and configuration details for VRF-lite, see the VRF-lite Feature
Overview and Configuration Guide.
For more information and configuration details for IGMP, see the IGMP/MLD Feature
Overview and Configuration Guide.
For more information and configuration details for PIM Sparse Mode, see the PIM-SM
Feature Overview and Configuration Guide.
Each tenant network (an AMF area) is kept separate from other tenant networks allowing
very flexible deployment, and central or individual network management options. The
tenants in each AMF area could be branch offices of a single organization, or separate
customers managed by a single service provider. A service provider could also provision
AMF areas for tenants, and the tenants manage their own network. This is possible
because each AMF area is isolated from all others, so any tenant can only view and
manage their own network.
The key advantage of hosting multiple tenants on a single VAA, over a traditional AMF
installation, is that each tenant network does not require an Allied Telesis Master capable
device. This creates a high-value solution for large distributed companies, as well as
service providers offering network provisioning and/or management services.
Virtual machines can support a variety of hosting options, including Amazon Web Service
(AWS) and Microsoft Azure, which are cloud-based services. The major benefit of cloud-
based services is that they are not bound by the constraints of fixed physical local
hardware. This reduces the total cost of ownership, with servers and services which can be
created/deleted as desired.
For more information and configuration details, see the AMF Feature Overview and
Configuration Guide.
For instructions about installing the VAA, see the Install Guide: Virtual AMF Appliance
(VAA) for AMF Cloud.
The AMF secure mode feature improves the security of the AMF network by reducing the
risk of your network being compromised through unauthorized access to the AMF
network. It achieves this by:
AMF secure mode is optional and enabled from the command line interface. When
running in AMF secure mode the AMF controllers and masters in the AMF network form a
group of certification authorities. A node may only join a secure AMF network once
authorized by a master or controller. When enabled, all devices in the AMF network must
be running in secure mode. Unsecured devices will not be able to join a secure AMF
network.
The 300 virtual links feature is supported on topologies where the node at the top is a VAA
and the nodes connected through the virtual links are all in separate domains, all at a core
distance of 1, as shown in the following figure.
M 1
em
be
r
M 2
em
be
VAA
r
virtual link
M 3
em
be
r
up to
300 members
For example, this could be a number of branch office switches connected to a VAA
through virtual links. Each branch office switch would have only one AMF link, which is the
virtual link to the Master device.
There are no command changes required to support the increased number of virtual links.
For configuration details and more information about virtual links, see the AMF Feature
Overview and Configuration Guide.
Version 5.4.7-1.1 adds support for static Equal Cost Multi-path (ECMP) Routing for
interfaces whose IP address is typically dynamically assigned, such as PPP interfaces and
virtual tunnel interfaces.
This means that if you create two static routes to the same remote destination network,
the egress interfaces can be specified as the next hop for the routes, instead of the next
hop ip address. The AR-series firewall will then balance traffic flows via the two routing
paths. For example, to use ECMP routing via tunnel1 and tunnel2, use commands like the
following:
From 5.4.7-1 onwards, the URL filtering feature has been extended to include the ability to
filter SSL-protected websites. For HTTPS requests, the original URLs are encrypted,
therefore they are not visible for processing. Instead the domain name specified in TLS SNI
(Transport Layer Security Server Name Indication) for each HTTPS request is used as the
URL for matching. This filtering capability can be used with user defined white-lists/black
lists, as well as with Kaspersky black lists.
From 5.4.7-1 onwards, the Web-Control feature has also been extended to include the
ability to categorize SSL-protected websites. The categorization is performed based on
the Server Name Indication (SNI) field contained within the Client Hello message during
the Transport Layer Security (TLS) handshake, as the SNI is in clear-text and represents the
domain part of the URL of the HTTPS request.
The SNI field is contained within the Client Hello message supplied during the TLS
handshake when a client web browser first attempts to access a secure HTTPS server
website. The SNI information is supplied in clear-text, and represents the domain part of
the URL of the HTTPS request. The SNI field is used by secure web servers hosting multiple
secure websites, and allows a secure web server with a single public IP address to host
multiple websites. It allows the secure web server to supply the correct digital certificate
containing the correct domain name(s) to the requesting web browser client, so that the
negotiation of the encrypted connection to the website can proceed.
For information about using URL filtering or Web-Control, see the URL Filtering Feature
Overview and Configuration Guide or the Web Control Filtering Feature Overview and
Configuration Guide.
Version 5.4.7-0.3 onwards and version 5.4.7-1.1 onwards enable you to change the HTTPS
port used to access the Firewall GUI. The default HTTPS port used by the Firewall GUI is
443.
Note that any device on which a non-default secure port is set will have limited
capabilities when accessed via Vista Manager. Additionally all external API requests will
need to be directed to the configured port, instead of the default port 443.
For more information about the Firewall GUI, see Getting Started with the VPN Firewall
GUI and Getting Started with the UTM Firewall GUI.
Version 5.4.7-1.1 enhances the logging of URL requests and firewall connections.
For details of these enhancements, see the URL Filtering Feature Overview and
Configuration Guide and the Firewall and NAT Feature Overview and Configuration Guide.
Note that log messages related to the firewall UTM features are generated by different
programs, but from version 5.4.7-0.1 onwards they are all now assigned the facility ‘local5’.
This means you can easily filter log messages for all UTM messages via a single filter, for
instance, to send all UTM log messages from multiple devices to a single destination.
The program IPS generates messages for the stream-based security features Intrusion
Prevention System, IP Reputation, Malware Protection, URL Filtering.
The program UTM generates messages for the proxy-based security features Web
Control and Anti-virus.
Example To configure an AR-Series firewall to generate log messages for any UTM features that are
enabled and send them to a syslog server at IP address 192.168.1.1, use the commands:
awplus(config)# url-filter
awplus(config-url-filter)# log url-requests
To enable logging of new connections, closed connections, or both passing through the
firewall, use the commands:
To show the configuration of firewall connection logging, use the following command:
By default, when a TCP session is successfully established through the AR-Series firewall,
when the session goes idle it automatically times out of the firewall connection tracking
table after 3600 seconds.
In some situations it may be beneficial to time out unused established TCP sessions earlier.
For example, in a busy environment where there is an excessive number of sessions being
established, the firewall connection tracking table could become oversubscribed, with
new connections being blocked until older sessions are timed out.
From version 5.4.7-1.1 onwards, the following new command is available to set a non-
default TCP session timeout for established idle sessions:
Version 5.4.7-0.2 onwards and version 5.4.7-1.1 onwards add support for 4G cellular
modems, which offer much higher-speed data transfer than older 3G modems. A cellular
modem can be used for AR-Series firewalls in remote locations, or as a back-up link to be
used when the primary Internet connection is unavailable.
For more information and configuration details, see the USB Cellular Modem Feature
Overview and Configuration Guide.
Version 5.4.7-0.2 onwards and 5.4.7-1.1 onwards enable you to change the Administrative
Distance of a default gateway route learned via a DHCP client interface.
This enhancement allows the user to modify the AD of the default route to a non-default
value.
OpenFlow™ enhancements
Available on x930, x510, x510L, IX5, DC2552XS/L3, x310 and x230 Series Switches
Version 5.4.7-1.1 includes several OpenFlow enhancements, which are summarized below.
For details of the enhancements, see the OpenFlow Feature Overview and Configuration
Guide.
The switch-to-controller connection can be either TCP based, or SSL based. SSL is
recommended for security, as the connection link is encrypted and authenticated. In order
to set up a secure link, keys and certificates must be defined before the controller is added
with the protocol specified as SSL.
Transport Layer Security (TLS) v1.0, TLS v1.1 and TLS v1.2 are supported on secure link(s).
The TLS version used between an OpenFlow switch and OpenFlow controller is
determined by peer negotiation.
For step-by-step configuration instructions, see the OpenFlow Feature Overview and
Configuration Guide.
Standalone mode
In standalone mode, if no message is received from the OpenFlow controller for three
times the inactivity probe interval, then the OpenFlow protocol will take over
responsibility for setting up flows. The OpenFlow protocol will cause the switch to act like
an ordinary MAC-learning switch, but continue to retry connecting to the controller in the
background. When the connection succeeds, it will discontinue its standalone behavior.
Secure mode
In secure mode, the OpenFlow protocol will not set up flows on its own when the
controller connection fails or when there are no controllers defined. The switch will
continue to retry connecting to any defined controllers forever.
This mode is the default, or you can specify it by using the command:
To control how long it will take for the switch to consider its connection to the controller
broken, use the command:
where <timeout> is the number of seconds before the switch will send an inactivity probe.
The switch will wait two times the inactivity time before considering that the link has
failed.
Version 5.4.7-1.1 enables you to specify an SMTP server by specifying its domain name
(FQDN) instead of its IP address. This makes it possible for your device to send email if you
only know the server’s domain name.
You must also ensure that the DNS client on your device is enabled. It is enabled by default
but if it has been disabled, you can re-enable it using the command:
awplus(config)#ip domain-lookup
Version 5.4.7-1.1 adds support for external logging, which sends syslog messages to a file
on a USB memory device or SD card.
It also adds commands to copy the contents of the buffered log (copy buffered-log) and
permanent log (copy permanent-log) to a destination file in a different external or
internal location.
For details, see the Logging Feature Overview and Configuration Guide.
Note that other features (policy-based QoS and DoS) also use hardware ACL entries
internally, so configuring those features reduces the number of ACLs you can create.
From version 5.4.7-1.1 onwards, IGMP mroute proxy interfaces do not have to be
configured with an IP address before they can operate. Now it is possible to have an
address-less interface to operate as an IGMP mroute proxy interface.
This feature is useful when IGMP-Proxy needs to run on many downstream interfaces. For
example, you may want to use it if your device has one subscriber (multicast receiver) per
VLAN, and many receivers (many VLANs) connected to the device. In such a situation,
assigning IP addresses to each VLAN may not be practicable.
Note that for such interfaces to be able to send queries to hosts directly attached to the
interface, it is necessary to enable IGMP snooping querier on the interface, using the
command ip igmp snooping querier.
...
ip multicast-routing
....
!
interface vlan10
ip address 192.168.10.1/24
ip igmp
ip igmp proxy-service
!
interface vlan20,vlan30
ip igmp
ip igmp mroute-proxy vlan10
ip igmp snooping querier
Version 5.4.7-1.1 adds support for an alternate checksum mode for VRRPv3 to allow inter-
operability with some other vendors’ products. This mode may be required if the other
product indicates checksum errors on VRRP packets sent by AlliedWare Plus devices.
To configure the alternative mode (for VRRP instance 1 and VLAN1 in this example), use
the commands:
awplus#configure terminal
awplus(config)#router vrrp 1 vlan1
awplus(config-router)#alternate-checksum-mode
From version 5.4.7-1.1 onwards, a G.8032 sub-ring may be connected to and interact with
an EPSR ring.
In some supported scenarios, you will need to enable an EPSR instance to send out a
FLUSH-FDB-PDU message after being notified of a topology change by an ERP instance. To
do this, use the following new command:
For more information, see the “Connecting G.8032 and EPSR” section of the G.8032
Feature Overview and Configuration Guide.
Version 5.4.7-0.2 onwards and version 5.4.7-1.1 onwards allow you to configure a
minimum number of days before a password can be changed by a user. With this feature
enabled, once a user sets the password, the user cannot change it again until the
minimum lifetime has passed.
The minimum lifetime is helpful in conjunction with a security policy that prevents people
from re-using old passwords. For example, if you do not allow people to re-use any of their
last 5 passwords, a person can bypass that restriction by changing their password 5 times
in quick succession and then re-setting it to their previous password. The minimum
lifetime prevents that by preventing people from changing their password in quick
succession.
awplus#configure terminal
awplus(config)#security-password min-lifetime-enforce <0-1000>
Version 5.4.7-1.1 onwards enable you to specify how many times the switch will retry
sending a SYN ACK for a TCP connection for which it has received a SYN but not an ACK.
Such connections are called half-open TCP Connections. This enhancement allows you to
influence how long half-open TCP connections take to time out.
To set how many times to retry sending a SYN ACK for a half-open TCP connection before
abandoning it, use the command:
awplus#configure terminal
awplus(config)#ip tcp synack-retries <0-255>
The following table shows the approximate correlation between the number of retries and
the time half-open TCP connections take to time out.
From AlliedWare Plus versions 5.4.7-1.1 and 5.4.7-0.4 onwards, unconfigured devices
automatically receive a management IP address on start-up, without any manual
configuration. You can optionally set up a DHCP server on your network and have the
device obtain an address via DHCP, or otherwise the device uses an IP address of
169.254.42.42.
This automatic address assignment means you can use SSH to manage the device, without
the need for an Asyn console cable.
The device must be unconfigured for this automatic address assignment to occur.
AR-Series Firewalls are typically pre-configured at the factory. Therefore the new start-up
behavior does not apply to them unless you manually return them to an unconfigured
state by using the command erase factory-default.
2. The device is not set up to use autoboot functionality via external media. This means
the device is considered unconfigured if a USB stick or SD card is connected, unless
that external media contains a file named autoboot.txt.
Note that a device is still considered unconfigured if GUI files are present in the root
directory /flash memory. However, if the device has been configured to enable the HTTP
service, then the device is no longer considered unconfigured.
You can manually return a device to an unconfigured state by using the command
erase factory-default.
27
What is the management interface?
The management interface depends on the interfaces available on the device.
It is:
On a switch: the eth0 interface, labeled NET MGMT, if that interface exists
On a switch or firewall that does not have a NET MGMT interface, but does have
switchports: vlan1
On a firewall with no switchports (AR2010V): the first eth port to go link-up.
2. Telnet is disabled, SSH server is enabled, and Loop Protection is enabled (on devices
that support it).
3. DHCP and DHCPv6 clients are enabled on the management interface, and the DHCP
and DHCPv6 client process is started.
5. If the device obtains an address or addresses from DHCP or DHCPv6, then it applies
the address to the management interface.
6. If the device does not obtain an IPv4 address via DHCP within10 seconds, then it
applies the class B IPv4 link-local address 169.254.42.42/16 to the management
interface. The device also disables the IPv4 DHCP client at this point.
You can manage the device by using SSH to connect to the IPv4 or IPv6 address assigned
to the management interface. You will need to ensure your management computer is
configured with an IP/IPv6 address within the same subnet as the management IP address
on the device. Connect using an SSH client, and login using the default username/
password (manager/friend). If you get a hostkey warning message, follow the message’s
instructions to accept the key.
28
Configured commands
The following commands are configured:
no service telnet
service ssh
ssh server allow-users manager
loop-protection loop-detect fast-block ldf-interval 1
interface <management-interface>
ip address dhcp
ipv6 address dhcp
Note that some devices (e.g. AR-Series Firewalls) do not support Loop Protection, so will
not include the loop-protection configuration. If no DHCP address is assigned to the
management interface, then the management interface’s dynamic configuration is
changed to the following commands:
interface <management-interface>
ip address 169.254.42.42/16
ipv6 address dhcp
The process will stop if either of the following events occur during start-up:
« configuration changes are made by logging in via a console port (see
“Configuring the device by the console” on page 30 for details).
« AMF zero-touch recovery begins. The new start-up process does not stop AMF
from treating the device as a clean device and initiating zero-touch recovery.
Other than the configuration changes specified above, the factory configuration
remains unchanged, so protocols such as RSTP remain in their default state.
On a stack, this new behavior will only be executed on the Stack Master.
The configuration changes are not automatically saved, so rebooting the device
without saving the configuration will trigger the same behavior again.
The device broadcasts DHCP messages. If the device is attached to existing network
infrastructure via multiple switchports, and the existing equipment does not support
STP, then there is the potential for a broadcast storm. To ensure loop-free operation
with this feature, AlliedWare Plus devices have RSTP enabled by default. Additionally,
the Loop Protection feature is now automatically enabled during start-up on devices
that support it.
If using a DHCP or DHCPv6 server for address allocation, we recommend you
configure the server to allocate a static IPv4 or IPv6 address binding based on the
MAC address of the device. This ensures you know which management address to
SSH to.
29
Setting up a number of devices
If you want to attach multiple devices to your network at the same time, there are a couple
of things you need to consider:
You should assign the addresses by DHCP, because otherwise all the new devices will
apply the same IP address to the management interface, making the feature
unusable.
Your SSH client may notify you that the host key has changed when you move from
one device to the next device. The warning will include a selection option to replace
the old host key, or instructions on how to do this. Follow the client’s selection option
or instructions.
Adding an A simple way to prevent the new start-up behavior is to insert USB stick or SD card
autoboot file containing a file named autoboot.txt. Unless you wish to configure autoboot, leave the
autoboot.txt file empty. The file stops the device from being treated as an unconfigured
device.
Configuring the Another way to prevent the new start-up behavior is to connect via the Asyn-based
device by the console port only, leaving the network management interface disconnected.
console
If you have both Asyn and network interfaces connected, you need to be cautious for a
few seconds after start-up about entering configuration commands via the Asyn console
interface. During these few seconds, dynamically entering any configuration commands
via the console can stop the new start-up behavior. This possibility occurs until the
management interface comes up and (for vlan1) a switchport goes into the STP
forwarding state. Once STP is in forwarding state, entering configuration via the console
will not stop the new start-up behavior.
Performing network management via eth interfaces will start IP address assignment more
quickly than via vlan1. This is because (unlike switchports within a VLAN) eth interfaces do
not use STP, so there is no additional delay waiting for the STP state change.
Monitoring
There are no show commands specific to this feature. The following messages are output
to the console (if connected) after the management interface goes link-up:
A message is output when an address is assigned to the management interface, such as:
30
Changes to handling of characters in strings
Interface descriptions
From version 5.4.7-1.1 onwards, interface descriptions can only contain printable ASCII
characters (ASCII 32-126).
If you have interface descriptions that contain other characters, change them before you
upgrade. Otherwise, the descriptions will be removed from your configuration when you
upgrade.
To specify the interface description, use the description command in interface mode, like
the following example:
If you have group names with other characters, change them before you upgrade.
Otherwise, such group names will be removed from your configuration when you
upgrade.
This means that if your PPP configuration currently contains names with double-quotes,
backslashes or spaces, the value used by PPP may change when you upgrade to version
5.4.7-1.1 or later.
If the name contains the special characters backslash, double-quote or space, those
characters should be escaped with a backslash (e.g. three\ word\ name). However, if the
name contains a literal backspace character, escaping the backspace character is optional.
For example, entering either domain\\user or domain\user results in PPP reading
domain\user.
31
Strings identified as WORD in CLI help
Many AlliedWare Plus commands allow you to enter a user-specified string, for example to
name something, and identify that string in the CLI help with the placeholder WORD (for
example, the command username WORD). From version 5.4.7-1.1 onwards, fewer
characters are accepted as valid for WORD. The changes are:
You can only enter printable ASCII characters (ASCII 32-126), not extended ASCII
characters
You cannot end the WORD with a single backslash
You cannot use unmatched double-quote characters. For example, previously
"example would have been accepted. Now it is not accepted
You cannot use a WORD made up only of double-quote characters (e.g. '""')
You cannot end a WORD with a single space, even if preceded by a backslash. You
should use quotes instead if you require a space.
If your configuration currently contains any of these disallowed options in a WORD, you
need to reconfigure the WORD before you upgrade to version 5.4.7-1.1 or later.
The special characters backslash, double-quote and space should be avoided in the
WORD if possible. If you cannot avoid these characters, the CLI parser will accept them if
you escape them with a backslash (e.g. three\ word\ name).
From version 5.4.7-0.2 onwards, x230 Series switches no longer use a separate internal
NVS (Non-Volatile Storage) memory device. Instead, data that was stored in NVS is now
stored in a special area in Flash memory. This change does not affect how you display log
messages and other data that was previously stored in NVS.
When you upgrade to version 5.4.7-0.2 or later, all files in NVS are deleted. If you had
stored files in NVS yourself and you want to keep those files, save them to Flash memory
before upgrading.
From version 5.4.7-1.1 onwards, you may find that the switchport trunk allowed vlan
remove command appears to take longer to execute on a VCStack if you are configuring a
large number of switchports. This is because the command now stops you from using the
CLI until removal of VLAN port membership has finished on all stack members.
32
Precedence when matching by VLAN in a QoS
policy-map on IE200 Series
Applies to IE200 Series switches
From version 5.4.7-1.1 onwards, if you use both an ACL and a match vlan clause to match
by VLAN in a QoS policy-map on an IE200 Series switch, the ACL now takes precedence.
On FS980M Series switches, from version 5.4.7-1.1 onwards, if the MTU of a VLAN is set to
less than 1500 bytes, all packet forwarding to that VLAN will be done using the slow path
forwarding (via the CPU). This ensures that packets are fragmented correctly. Previously,
packets sized 1500 bytes or more were hardware switched without being fragmented.
Previously, output of the commands show cpu and show cpu history reported
incorrectly low CPU usage values on devices that use multi-core CPUs. This has been
corrected in version 5.4.7-1.1 onwards, so you may now see higher values reported, even
though the CPU load has not increased.
The hairpin link is no longer supported; the hybrid port is instead. When upgrading
from 5.4.6-2.x or earlier to 5.4.7-0.1 or later, special care will have to be taken if a
hairpin link is present. Please contact Allied Telesis Support for assistance on this.
AMF guest nodes on ports using the OpenFlow protocol are no longer supported.
33
Traffic Control is disabled by default for bridged
traffic
Applies to AR-Series Firewalls
On AR-series firewalls, version 5.4.7-0.1 onwards makes it possible for users to explicitly
enable traffic control for bridged traffic per bridge interface.
Previously, traffic control was enabled by default on all bridge interfaces, which caused
performance loss with heavy bridged traffic when traffic control or Unified Threat
Management (UTM) was configured.
Now, traffic control is disabled by default for bridged traffic. To enable it, use the following
new command in interface mode for the desired bridge:
awplus(config-if)#l3-filtering enable
We do not recommend shaping bridged traffic on firewalls that are running Unified Threat
Management (UTM) features, because both Traffic Control and UTM require significant
CPU resources.
On AR4050S and AR3050S UTM firewalls, earlier releases deprecated Traffic Shaping and
replaced it with Traffic Control. In version 5.4.7-0.1, Traffic Shaping commands have been
deleted.
If you are running Traffic Shaping and you want to upgrade to 5.4.7-x.x from 5.4.5-x.x or an
earlier version, upgrade to a 5.4.6-x.x version first and then save your configuration.
AlliedWare Plus will convert your configuration automatically to a Traffic Control
configuration.
See the Traffic Control Feature Overview and Configuration Guide for Traffic Control
configuration details.
Version 5.4.7-0.1 reduces the total number of available IPv4 unicast/multicast route entries
in the system by 4, when running silicon profiles default, profile1, or profile2.
34
Using the switch GUI with TACACS+ command
authorization
Applies to AlliedWare Plus switches
If the switch GUI is being used when TACACS+ command authorization is enabled, from
version 5.4.7-0.1 onwards, you need to configure the server to authorize the command
snmp-server configure-for-gui-access for the GUI user.
In addition, the switch GUI uses a lot of standard CLI commands for its internal operation.
This means that a user of the GUI will generally be limited to the same kind of operations
they are limited to on the CLI. However, some GUI functionality is implemented using
alternative mechanisms like SNMP and TFTP. This functionality will not be covered by
command authorization.
This new requirement does not apply to the GUI on AR-series firewalls.
From version 5.4.7-0.1 onwards, the behavior of NTP has changed in AMF networks.
Previously, you needed to configure at least one external NTP server on only one of your
AMF masters. Directly-connected nodes would also automatically NTP peer with each
other.
Now all AMF nodes will only automatically receive time from the AMF master's NTP server.
Nodes no longer peer with directly connected nodes. NTP now also synchronizes faster
with the AMF master.
You now need to configure at least one external NTP server on all AMF masters in your
network to ensure accurate logging, and consistent timestamps between all AMF nodes.
Configuration of three or more NTP servers is considered best practice. Configured servers
do not need to be the same between AMF Masters. One option is to use the pool of NTP
servers provided by the NTP Pool Project (www.pool.ntp.org).
In some networks, the AMF masters may not have a path to such NTP servers. This may be
due to ensuring the AMF masters and core of the network are locked down with no
internet access. If so, a local NTP server, or AMF node which does have internet access, can
be configured as the desired NTP server.
In this situation, configure the AMF masters to use the local server or other AMF node as
its NTP server. Ensure the AMF Masters have IP reachability to the NTP server’s address.
When you have multiple AMF masters, the AMF masters will act as NTP peers of each
other, and other nodes will use the AMF masters as NTP servers. This happens
automatically; you do not have to configure it.
When you upgrade a DC2552XS/L3 switch from 5.4.5-x.x or earlier to 5.4.7-x.x or 5.4.6-x.x,
the switch's reboot history is reset. The ongoing reboot history will be stored in NVS. If you
need to view the previous reboot history, see the file reboot.log in the Flash file system.
35
Bootloader compatibility for SBx81CFC960
Applies to SBx8100 Series switches
On the AT-SBx81CFC960, please check your bootloader and current software version
before you upgrade to AlliedWare Plus software version 5.4.6 or later.
Licensing
Applies to SBx908 and SBx8100 Series switches
From software version 5.4.4-0.4 onwards, AlliedWare Plus software releases need to be
licensed for SBx908 and SBx8100 switches.
If you are upgrading to 5.4.7-x.x on your SBx908 or SBx8100 switch, please ensure you
have a 5.4.7 license on your switch. To obtain a license, contact your authorized Allied
Telesis support center. You will need to provide the MAC addresses of the switches you
want to license. For details, see:
36
ISSU (In-Service Software Upgrade) on SBx8100
with CFC960
ISSU is available on standalone SBx8100 Series switches with dual CFC960 control cards,
and on switches using VCStack Plus™ to create a single virtual unit out of two chassis
(where each chassis has a pair of CFC960 control cards). ISSU allows you to upgrade the
software release running on the CFCs with no disruption to network traffic passing
through the chassis.
You cannot use ISSU to upgrade to 5.4.7-1.1 from any previous software version.
This version supports VCStack “reboot rolling” upgrades. With the reboot rolling
command, you can reduce downtime when upgrading a VCStack. You can use the reboot
rolling command to upgrade to 5.4.7-1.x from:
5.4.7-x.x, or
5.4.6-x.x, or
5.4.5-x.x, or
5.4.4-1.x or later.
To use reboot rolling, first enter the boot system command, which will install the new
release file on all stack members. Then enter the reboot rolling command. Note that
reboot rolling is not supported on SBx8100.
You cannot use rolling reboot to upgrade directly to 5.4.7-1.x from 5.4.4-0.x or earlier
versions.
37
Forming or extending a VCStack with auto-
synchronization
Applies to all stackable AlliedWare Plus switches
If you create a VCStack from switches that are running different software versions, auto-
synchronization ensures that all members will run the same software version when they
boot up. Auto-synchronization is supported between 5.4.7-1.x and:
5.4.7-0.x
5.4.6-2.x, and
5.4.6-1.2 and all later 5.4.6-1.x versions.
On VCStacks
If you are working with a VCStack:
If you want to upgrade an existing VCStack to 5.4.7-1.x, this should not cause any
problems. The boot system command will automatically copy the new software
release to all stack members. Do not reboot any individual stack members after
installing the new release - instead reboot the stack as a whole.
If you encounter any errors from the boot system command, then check that the
release file was copied to all stack members before rebooting. If it was not, then
address any problems reported, such as freeing up space in Flash for the new release
file, and then repeat the boot system command again.
If a stack is running v5.4.7-1.x, and you connect a switch running 5.4.6-1.1 or earlier to
the stack, then the v5.4.7-1.x software will not be automatically copied over to the
newly-added stack member, even if stack software-auto-synchronize has been
enabled on the stack. Instead, upgrade the switch that is to be added to the stack to
v5.4.7-1.x before you add it to the stack.
If a stack is running 5.4.6-1.1 or earlier, and you connect a switch running v5.4.7-1.x to
the stack, then the older software cannot be automatically copied over to the newly-
added stack member, even if stack software-auto-synchronize has been enabled on
the stack. Instead, downgrade the switch that is to be added to the stack to the older
release before you add it to the stack.
If you do boot up a stack with a switch running an incompatible version, the
incompatible switch will boot up as a standalone unit. To recover, simply leave the
incompatible switch cabled into the stack, log into it, upgrade or downgrade it to the
desired release, and reboot the switch.
If you want to upgrade an existing SBx8100 VCStack Plus system to v5.4.7-1.x, this
should not cause any problems. The boot system command will automatically copy
38
the new software release to all stack members. Do not reboot any individual CFCs or
stack members after installing the new release - instead reboot the stack as a whole.
If you encounter any errors from the boot system command, then check that the
release file was copied to all CFCs. If it was not, then address any problems reported,
such as freeing up space in Flash for the new release file, and then repeat the boot
system command again.
If you want to insert a new dual CFC into a chassis that is part of an existing VCStack
Plus system, refer to “Upgrading an SBx8100 chassis or adding a CFC to an SBx8100
chassis” below.
If you want to insert a new SBx8100 chassis into a VCStack Plus system, refer to “On
VCStacks” on page 38 above.
Upgrading an If you want to upgrade an existing SBx8100 that has two CFCs installed to v5.4.7-1.x, this
SBx8100 chassis or should not cause any problems. The boot system command will automatically copy the
adding a CFC to an new software release to both CFCs. Do not reboot any individual CFCs after installing the
SBx8100 chassis new release - instead reboot the chassis as a whole.
If you encounter any errors from the boot system command, then check that the release
file was copied to both CFCs. If it was not, then address any problems reported, such as
freeing up space in Flash for the new release file, and then repeat the boot system
command again.
If a standalone SBx8100 has a CFC installed that is running 5.4.6-1.1 or earlier, and you
add a CFC running v5.4.7-1.x to the chassis, then the older software cannot be
automatically copied over to the newly-added CFC.
If a standalone SBx8100 has a CFC installed that is running v5.4.7-1.x, and you add a
CFC running 5.4.6-1.1 or earlier to the chassis, then the v5.4.7-1.x software cannot be
automatically copied over to the newly-added CFC.
If you connect a CFC running an incompatible release to an SBx8100 chassis, you will
be unable to log into the added CFC. For example, if the Active CFC is running
v5.4.7-0.1 and another CFC joins with 5.4.6-0.x, the error you get is:
======
cfc960 login: manager
Password:
Last login: Thu Mar 23 02:15:21 UTC 2017 on ttyS0
All 1 lines for VR:PVR are busy. Try again later
======
______________ ____
/\ \ / /______\
/ \ \_ __/ /| ______ |
/ \ | | / | ______ |
/ \ \ / / \ ____ /
/______/\____\ \/ /____________/
39
Upgrading/ If auto-synchronization is not available, you have manually upgrade or downgrade the
downgrading a CFC to match your existing SBx8100. This section describes two different ways to do this:
CFC
Option 1: Insert the new CFC into the chassis. Load the desired software version onto a
USB stick and insert the USB stick into the chassis. Via the bootloader menu (CTRL+B),
perform a one-off boot (option 1), select USB, then select the desired software version.
Both CFCs should detect each other. Log in and enter boot system to ensure the desired
software version is set on the new CFC.
Option 2: Remove the new CFC if you had already inserted it. Upgrade or downgrade the
existing SBx8100 so that it is running the same software version as the new CFC. Reinsert
the new CFC. Both CFCs should then detect each other successfully. You can then log in
and set the desired software version on both CFCs.
40
x610 Series switch as AMF master
Versions 5.4.7-1.1 and later do not support x610 Series switches. If your network is using
an x610 Series switch as an AMF master, you may not be able to upgrade any devices in
your AMF network to 5.4.7-1.1 or later. This is because if your member devices run a newer
version than the master, then compatibility issues may occur - see “AMF software version
compatibility”.
We strongly recommend that all nodes in an AMF network run the same software release.
If this is not possible, please be aware of the following compatibility limitations.
If using an AMF If you use an AMF Controller and any of your Controller or Area Master nodes are running
controller 5.4.7-1.x, then they all must. Otherwise, the “show atmf area nodes” command and the
“show atmf area guests” command will not function, and Vista Manager will all show
incorrect network topology.
If using secure If your AMF network is in secure mode, all nodes must run version 5.4.7-0.3 or later.
mode Upgrade all nodes to run version 5.4.7-0.3 or later before you enable secure mode.
5.4.7-0.x
5.4.6-x.x
5.4.5-x.x
5.4.4-x.x, and
5.4.3-2.6 or later.
41
Upgrading all switches in an AMF network
Applies to all AlliedWare Plus devices
This version supports upgrades across AMF networks. There are two methods for
upgrading firmware on an AMF network:
You can use either reboot-rolling or distribute firmware to upgrade to this software
version, from 5.4.3-2.6 and later.
However, if you use reboot-rolling or distribute firmware to upgrade an AMF network, and
any of the devices are running 5.4.7-1.1 or later, then you must initiate the upgrade from a
device that is running 5.4.7-1.1 or later. Otherwise, the devices running 5.4.7-1.1 or later
will not be upgraded.
1. Copy the release .rel files for each product family to the media location you intend to
upgrade from (Flash memory, SD card, USB stick etc).
3. Initiate the AMF network upgrade using the selected method. To do this:
a. create a working-set of the nodes you want to upgrade
b. enter the command atmf reboot-rolling <location> or atmf distribute-
firmware <location> where <location> is the location of the .rel files.
c. Check the console messages to make sure that all nodes are “release ready”. If
they are, follow the prompts to perform the upgrade.
42
Obtaining User Documentation
For full AlliedWare Plus documentation, see our online documentation Library. For
AlliedWare Plus products, the Library includes the following documents:
Feature Overview and Configuration Guides - find these by clicking here and
searching for the feature name.
Datasheets - find these by clicking here and searching for the product series.
Installation Guides - find these by clicking here and searching for the product series.
Command References - find these by clicking here and searching for the product
series.
This command compares the SHA256 checksum of the release file with the correct
checksum for the file.
The following command contains the hash for 5.4.7-1.1, so you can simply copy and paste
that command into the CLI if you wish to verify the file x930-5.4.7-1.1.rel:
Caution If the verification fails, the following error message will be generated:
“% Verification Failed”
In the case of verification failure, please delete the release file and contact Allied Telesis support.
All x930 Series switch models run the same release file and therefore have the same
checksum.
If the switch is in secure mode, it will verify the release file every time it boots up. To do
this, it runs the crypto verify command while booting. Therefore, you need to copy the
crypto verify command to the startup configuration, by using the command:
43
awplus#copy running-config startup-config
If the crypto verify command is not in the startup configuration, the switch will report a
verification error at bootup.
If there is a verification error at bootup, the switch produces an error message and finishes
booting up. If this happens, run the crypto verify command after bootup finishes, to
verify the running release file. If verification of the running release file fails, delete the
release file and contact Allied Telesis support.
44
Licensing this Software Version on an
SBx908 Switch
Release licenses are applied with the license certificate command, then validated with
the show license or show license brief commands. Follow these steps:
Obtain the MAC address for a switch
Obtain a release license for a switch
Apply a release license on a switch
Confirm release license application
Switches may have several MAC addresses. Use the show system mac license command
to show the switch MAC address for release licensing:
Contact your authorized Allied Telesis support center to obtain a release license.
Use the license certificate command to apply a release license to your switch.
Note the license certificate file can be stored on internal flash memory, or an external SD
card, or on a server accessible by the TFTP, SCP or HTTP protocols.
Entering a valid release license changes the console message displayed about licensing:
1 license installed.
45
4. Confirm release license application
On a stand-alone switch, use the commands show license or show license brief to
confirm release license application.
On a stacked switch, use the command show license member or show license brief
member to confirm release license application.
The show license command displays the base feature license and any other feature and
release licenses installed on AlliedWare Plus switches:
awplus#show license
OEM Territory : ATI USA
Software Licenses
------------------------------------------------------------------------
Index : 1
License name : Base License
Customer name : ABC Consulting
Quantity of licenses : 1
Type of license : Full
License issue date : 20-Mar-2017
License expiry date : N/A
Features included : EPSR-MASTER, IPv6Basic, MLDSnoop, OSPF-64,
RADIUS-100, RIP, VRRP
Index : 2
License name : 5.4.7-rl
Customer name : ABC Consulting
Quantity of licenses : -
Type of license : Full
License issue date : 20-Mar-2017
License expiry date : N/A
Release : 5.4.7
46
Licensing this Software Version on an
SBx8100 Series Switch Control Card
Release licenses are applied with the license certificate command, then validated with
the show license or show license brief commands. Follow these steps:
If your control card is in a stacked chassis, you do not need to perform these steps on each
chassis in the stack, only on the stack master.
If your license certificate contains release licenses for each control card present in a
stacked chassis, entering the license certificate command on the stack master will
automatically apply the release licenses to all the control cards within the stack.
Chassis may have several MAC addresses. Use the show system mac license command to
show the control card MAC address for release licensing. Note the MAC addresses for each
control card in the chassis. The chassis MAC address is not used for release licensing. Use
the card MAC address for release licensing.
Contact your authorized Allied Telesis support center to obtain a release license.
Use the license certificate command to apply a release license to each control card
installed in your chassis or stack.
Note the license certificate file can be stored on internal flash memory, a USB drive, or on a
server accessible by the TFTP, SCP or HTTP protocols.
47
Entering a valid release license changes the console message displayed about licensing:
1 license installed.
On a stand-alone chassis, use the commands show license or show license brief to
confirm release license application.
On a stacked chassis, use the command show license member or show license brief
member to confirm release license application.
The show license command displays the base feature license and any other feature and
release licenses installed on AlliedWare Plus chassis:
awplus#show license
OEM Territory : ATI USA
Software Licenses
------------------------------------------------------------------------
Index : 1
License name : Base License
Customer name : ABC Consulting
Quantity of licenses : 1
Type of license : Full
License issue date : 20-Mar-2017
License expiry date : N/A
Features included : IPv6Basic, LAG-FULL, MLDSnoop, RADIUS-100
Virtual-MAC, VRRP
Index : 2
License name : 5.4.7-rl
Customer name : ABC Consulting
Quantity of licenses : -
Type of license : Full
License issue date : 20-Mar-2017
License expiry date : N/A
Release : 5.4.7
48
Installing this Software Version
Caution: Software versions 5.4.7-x.x require a release license for the SBx908 and
SBx8100 switches. Contact your authorized Allied Telesis support center to obtain a
license. For details, see:
To install and enable this software version, use the following steps:
1. Copy the software version file (.rel) onto your TFTP server.
2. If necessary, delete or move files to create space in the switch’s Flash memory for the
new file. To see the memory usage, use the command:
awplus# show file systems
3. Copy the new release from your TFTP server onto the switch.
awplus# copy tftp flash
Product Command
FS980M
series awplus(config)# boot system FS980-5.4.7-1.4.rel
GS900MX/
MPX series awplus(config)# boot system GS900-5.4.7-1.4.rel
GS970M
series awplus(config)# boot system GS970-5.4.7-1.4.rel
XS900MX
series awplus(config)# boot system XS900-5.4.7-1.4.rel
x230 series awplus(config)# boot system x230-5.4.7-1.4.rel
IE200 series awplus(config)# boot system IE200-5.4.7-1.4.rel
x310 series awplus(config)# boot system x310-5.4.7-1.4.rel
IE300 series awplus(config)# boot system IE300-5.4.7-1.4.rel
IX5-28GPX awplus(config)# boot system IX5-5.4.7-1.4.rel
x510 series awplus(config)# boot system x510-5.4.7-1.4.rel
x550 series awplus(config)# boot system x550-5.4.7-1.4.rel
49
Product Command
IE510-28GSX awplus(config)# boot system IE510-5.4.7-1.4.rel
SBx908 awplus(config)# boot system SBx908-5.4.7-1.4.rel
x550 series awplus(config)# boot system x550-5.4.7-1.4.rel
x930 series awplus(config)# boot system SBx930-5.4.7-1.4.rel
DC2552XS/L3 awplus(config)# boot system DC2500-5.4.7-1.4.rel
SBx8100 with
CFC400 awplus(config)# boot system SBx81CFC400-5.4.7-1.4.rel
SBx8100 with
CFC960 awplus(config)# boot system SBx81CFC960-5.4.7-1.4.rel
AR2010V awplus(config)# boot system AR2010V-5.4.7-1.4.rel
AR2050V awplus(config)# boot system AR2050V-5.4.7-1.4.rel
AR3050S awplus(config)# boot system AR3050S-5.4.7-1.4.rel
AR4050S awplus(config)# boot system AR4050S-5.4.7-1.4.rel
5. Return to Privileged Exec mode and check the boot settings, using:
awplus(config)# exit
awplus# show boot
50
Accessing the AR-Series Firewall GUI
This section describes how to access the firewall GUI, to manage and monitor your
AR-series firewall. The GUI provides setup of the firewall, enabling the configuration of
entities (Zones, Networks and Hosts) and then creating firewall and NAT rules for traffic
between these entities.
If your AR-series firewall came with the GUI pre-installed, perform the following steps to
browse to the GUI:
If your AR-series firewall did not come with the GUI pre-installed, perform the following
steps through the command-line interface:
1. Create one or more IP interfaces and assign them IP addresses, including configuring
WAN connectivity. For information about configuring PPP, see the PPP Feature
Overview and Configuration Guide. For information about configuring IP, see the IP
Feature Overview and Configuration Guide.
2. If you plan to enable the firewall functionality, first create a firewall rule to allow traffic
from the Update Manager to pass through the firewall. This is needed because AR-
series firewalls block all traffic by default. The following figure shows a recommended
example configuration, when WAN connectivity is through ppp0:
zone public
network wan
ip subnet 0.0.0.0/0 interface ppp0
host ppp0
ip address dynamic interface ppp0
firewall
rule 10 permit dns from public.wan.ppp0 to public.wan
rule 20 permit https from public.wan.ppp0 to public.wan
protect
51
5. Log into the GUI.
Start a browser and browse to the firewall’s IP address, using HTTPS. You can access
the GUI via any reachable IP address on any interface.
The GUI starts up and displays a login screen. Log in with your username and
password.
To install and run the GUI, you need the following system products and setup:
PC Platform:
Windows XP SP2 and up / Windows Vista SP1 and up
Browser: (must support Java Runtime Environment (JRE) version 6)
Microsoft Internet Explorer 7.0 and up / Mozilla Firefox 2.0 and up
1. Copy to the GUI Java applet file (.jar extension) onto your TFTP server, SD card or USB
storage device.
2. Connect to the switch’s management port, then log into the switch.
3. If necessary, delete or move files to create space in the switch’s Flash memory for the
new file.
To see the memory usage, use the command:
awplus# show file systems
To list files, use the command:
awplus# dir
To delete files, use the command:
awplus# del <filename>
Where <address> is the IP address that you will subsequently browse to when you
connect to the GUI Java applet. For example, to give the switch an IP address of
192.168.2.6, with a subnet mask of 255.255.255.0, use the command:
awplus(config-if)# ip address 192.168.2.6/24
Where <gateway-address> is the IP address for your gateway device. You do not need
to define a default gateway if you browse to the switch from within its own subnet.
52
6. Copy the GUI file onto your switch from the TFTP server, SD card, or USB storage
device.
TFTP server: Use the command:
awplus# copy tftp://<server-address>/<filename.jar> flash:/
where <server-address> is the IP address of the TFTP server, and where <filename.jar>
is the filename of the GUI Java applet.
7. Ensure the HTTP service is enabled on your switch. Use the commands:
awplus# configure terminal
The HTTP service needs to be enabled on the switch before it accepts connections
from a web browser. The HTTP service is enabled by default. However, if the HTTP has
been disabled then you must enable the HTTP service again.
10. Enter the URL in the Java Control Panel Exception Site List
Click on the ‘Edit Site List’ button in the Java Control Panel dialog Security tab to enter
a URL in the Exception Site List dialog. In the ‘Exception Site List’ dialog, enter the IP
address you configured in Step 4, with a http:// prefix.
After entering the URL click the Add button then click OK.
53