Extreme Management Center Version 8.5.5 Release Notes
8.5.5
February 2021
A PDF copy of these release notes can be found here.
The Extreme Management Center Release Notes provide information on the new features and enhancements included in version 8.5.5, as well as issues that have been resolved and configuration changes for this release.
IMPORTANT: | For upgrade and installation requirements, as well as configuration considerations, please see Extreme Management Center Configuration and Requirements. |
IMPORTANT: | Upgrading to Extreme Management Center version 8.5 requires you to renew your NMS license if generated prior to July 31, 2020. Licenses generated prior to July 31, 2020 expire 90 days after upgrading to Extreme Management Center version 8.5. You can view the status of your license by accessing Administration > Diagnostics > Server > Server Licenses. |
For the most recent version of these release notes, see Extreme Management Center Release Notes.
For information regarding the features supported by specific devices, see the Firmware Support Matrix. Version 8.5 of Extreme Management Center supports the devices listed in the matrix.
NOTE: |
NIS packages are not installed with the Extreme Management Center, ExtremeAnalytics, or ExtremeControl Engines.
Refer to the Section 1.2 Engines of this Release Notes document for more information. |
Extreme Management Center's Transition to ExtremeCloud IQ
Starting with Extreme Management Center version 8.5.3, Extreme Management Center began the transition to a cloud-based environment, ExtremeCloud IQ.
Enhancements in Version 8.5.5
New features and enhancements are added to the following areas in Extreme Management Center version 8.5.5:
- Customer Feature Requests
- Engines
- Extreme Management Center
- ExtremeAnalytics
- ExtremeCompliance
- ExtremeControl
For additional information about each of the features listed in this guide, refer to the documentation posted online at ExtremeNetworks.com or the Help system included with the software.
Customer Feature Requests Addressed in 8.5.5
Extreme Management Center CFRs Addressed | ID |
Policy Enforce to ExtremeXOS Patch Failure Corrected Extreme Management Center version 8.5.2.6 Policy Enforce to ExtremeXOS version 30.7.1.1 patch1-54 fails for Roles with names starting with "8021x". The issue has been corrected |
2306872 |
Popups Now Able to be Prevented There was no ability to globally prevent window popups on various pages in Extreme Management Center. The issue has been corrected. |
01993579 |
Add Device to Policy Domain Functionality Improved Manually adding a device to Extreme Management Center with the "Add Device to Policy Domain" action selected in the Site Actions was failing to add the device. In some cases, future attempts to add a device would also fail, requiring the user to restart the Extreme Management Center server. |
2334861 |
RMA Process Completing Properly The RMA process was not completing when the Configuration Updates field was set to Never in the World site. |
02259784 |
PV-A-300 Hardware w/ 10GB Adapter Not Recognized In Extreme Management Center
The PV-A-300 Hardware w/ 10GB Adapter was not being recognized in Extreme Management Center versions 8.1.7.27, 8.3.0.111, and 8.5. |
02265680 |
Cold and Warm Start Traps Labeled Correctly As Warning Alarms Cold and Warm Start traps were improperly labeled as information alarms. Now, Cold Start and Warm Start Alarms are warning level alarms instead of information level alarms by default. |
02307127 |
Device Menu Actions Launch Function Improved Device menu actions were not launching properly from the Alarms and Events > Alarms tab. |
02290186 |
Process to Delete VLANs Clarified Customers wanted to delete VLANs, but did not realize that VLANs cannot be deleted from sites when defined within the parent site. The delete process has been clarified that VLANs should be added only to the specific sites for which they are intended, and not to parent sites of intended sites. |
02222569 |
Delete Extreme Management Center Data Function Working Properly When a device’s firmware was not known, the device data was not deleting when the Delete Extreme Management Center Data function was selected. This issue has been corrected. |
02312388 |
NBI PortData.portSpeed Value No Longer Being Used The NBI PortData.portSpeed value was no longer being used and had been replaced by portConfigSpeed (when auto is disabled) and portConfigSpeedList (when auto is enabled). PortData.portSpeed has been removed from the NBI. |
02319113 |
Documentation on ClientID for NBI Clarified Clarified in documentation that in order to access the following information through the Northbound API, the Client ID must also be assigned to an Authorization Group:
|
02314907 |
Menu Actions Launch Successfully from Alarms View All menu actions now successfully launch from the Alarms view in Extreme Management Center. |
02290186 |
Alarm Trap Action Now Sends SNMPv2 and SNMPv3 Traps Not Informs The Alarm Trap action was sending informs if configured to SNMPv2 or SNMPv3 for action. Now, Alarm Trap action supports the ability to send SNMPv2 and SNMPv3 traps instead of informs. |
02253512 |
Connection Issues between Extreme Management Center and Extreme Wireless Connectors (EWCs) Improved When an EWC was down and not reachable from Extreme Management Center, multiple contact requests created for that specific controller caused slowness in Extreme Management Center. This issue has been corrected. |
189978 1915223 |
ExtremeAnalytics CFRs Addressed | ID |
The Appid Process Performance Improved The Appid Process was occasionally crashing. The issues have been addressed. |
02289778 |
3rd Party Sflow Collector No Longer Being Overwritten 3rd party sflow collectors for VSP devices were being overwritten by Extreme Management Center when the device was removed. A second collector ID is now used if the first collector ID is in use. |
1926465 |
ExtremeControl CFRs Addressed | ID |
Changes to ExtremeControl RADIUS Server certificates were not shown in the WebView certificates diagnostics page after enforce until the engine was restarted. This issue has been corrected. |
02315158 |
Import Function for User Groups Improved Import of User Group entries was causing the enforce to fail. This issue has been corrected. |
2270556 |
SMS Texts Now Sent During Guest Registration if One Service Provider is Configured for Sending Authorization Codes. SMS texts were not sent during captive portal guest registration if there is only one service provider configured to choose for sending authorization codes. The issue has been corrected and texts can now be sent if only one service provider option is available for sending authorization codes. |
02311032 |
Customer Feature Requests Addressed in 8.5.4
Extreme Management Center CFRs Addressed | ID |
Slow Page Loads and Error Messages for Servers with Large Scale Configurations Corrected Extreme Management Center was running slow with page load errors on Extreme Management Center servers with large scale configurations. |
02309089 |
Warning Added for Flexview Listings Exported to .CSV Reports Delays were occurring when Flexview / Physical Entity Listings were exported to .csv reports because of the large volume of data being exported, and the reports were failing to execute. A new warning message has been added that indicates that more than 2,000 records are being exported and the report will take some time to generate, and the timeout has now been increased from 30 seconds to five minutes. |
02268103 |
Support for MyVendorProfiles Now Included in Backup/Restore Operations MyVendorProfiles were not included in the backup/restore operations. |
02141955 |
Newly Added Archives Display in Detailed View Archives that contain a group were not displaying newly added devices in the Detailed View. Now, If devices are added to the group, they will be archived the next time the scheduled archive is executed. |
1801552 |
Scheduled Tasks During Daylight Savings Time Execute Scheduling tasks for Sundays that transition from Daylight Savings Time to Standard Time displayed an "Add failed" error dialog. Scheduled Tasks can now be started on Sundays which transition from Daylight Savings Time to Standard Time (or vice-versa). |
02267383 |
TCL Scripts No Longer Requiring Script to be Saved Execution of TCL scripts that use "scope = device" were requiring the script to be saved, even when there were no changes to save. |
02283123 |
Enforce Time of Policy Domain Lag Time Improved Enforce of a policy domain was experiencing extremely long completion time. |
02156722 |
Duplicate VLANS No Longer Imported When .PMD Files Imported When policy .pmd files were imported into the policy domain, duplicate VLANs were being imported. Duplicate VLANs are no longer being imported. |
02005844 |
Netlogins Preserved During Enforce to ExtremeXOS After Change to ACL Policy Role Mode When changes were made to the ACL / policy role mode, the netlogin was being disabled during enforce to ExtremeXOS. This issue has been corrected and netlogins are preserved during enforce. |
02248336 |
IP/UDP/TCP Rules Properly Enforced to Extreme Campus Controller Some rule types were failing to be set because the IP/UDP/TCP rules were not being enforced correctly to the Extreme Campus Controller. |
02303839 |
ACL Policy Role Data Correctly Transferred During Upgrade When upgrading from Extreme Management Center version 8.5.2 to version 8.5.3, incorrect NAS-Filter-Rule ACL policy role data was being transferred. As a result, HP and Cisco devices were not working properly. |
2304517 |
Login and Password Error Message Removed An error message was generating when a password or login was copied and pasted into the field during login attempts. The message is no longer generated. |
02274240 |
Script Documentation No Longer Includes Custom Scopes Extreme Management Center Documentation topic on "Creating Scripts" incorrectly included references to a "Custom" scope. Only global and device scopes should be described. |
02276871 |
ExtremeAnalytics CFRs Addressed | ID |
Imported and Exported Locations Execution Improved; Error Message No Longer Generated When attempting to import or export locations in ExtremeAnalytics, an error message was being generated and the imports and exports were not always executing successfully. |
02260320 |
ExtremeControl CFRs Addressed | ID |
Enforce to Extreme Campus Controller Failing to Create Rate Limits Enforcing policy to Extreme Campus Controller was failing to create new rate limits. |
02307178 |
In-Use Check Verifies Mappings Not Set as Default Before Deleting Policy mappings could be deleted if they were set as default policy mappings in ExtremeControl options. Now, the in-use check verifies the mappings are not set as default before allowing delete. |
02307796 |
Incorrect Successful Policy Enforce Corrected Policy Enforce to Extreme Campus Controller was reporting success after failing to enforce the configuration to the device. The REST set failure events were reported in the event log. |
02307184 |
Captive Portal No Longer Setting OS from the Browser The captive portal was sometimes incorrectly setting the OS from the browser in an end-system session, resulting in unexpected device type rule processing. |
01951730 |
IP Subnet Config No Longer Preventing Proper Subnet Mapping Setting IP subnet configuration location value to None was preventing proper subnet mapping by VLAN ID or VLAN Name on the ExtremeCompliance engine. |
02161385 |
Renaming Access Control Profiles No Longer Corrupting Database Renaming Access Control profiles was sometimes corrupting the database and leading to "Cannot load reports" errors when trying to view configuration rules. |
02280562 |
Case Insensitive UserNames No Longer Preventing ExtremeControl Engine From Joining Domain |
02265831 |
Nickname Filter Issues Corrected When device data in the Access Control > End System table was filtered by nickname, the device was no longer displaying after it was reauthenticated. |
2279239 |
Customer Feature Requests Addressed in 8.5.3
Extreme Management Center CFRs Addressed | ID |
Remove From Service Option Clarified When Remove from Service was selected on the Configure Device window for a device, it was unclear that Extreme Management Center continues to monitor that device. Additional directions have been added to Help documentation that, once a replacement device is ready, the RMA process is continued by adding the replacement device's serial number, shutting down the device to be removed, and starting the replacement device. In order to stop monitoring the device, you also need to change the Poll Type to Not Polled. |
02249867 |
VSP Series Family Type Expanded to Include Multiple Vendors The VSP Series option could not be selected as Family type on the Site > Actions > Custom Configuration tab for more than one vendor, even if multiple vendors supported the VSP Series as a Family type. Now, multiple vendors can have the VSP Series as a Family type. |
02230122 |
EMail List Function Improved for Workflow Mail Activity Once selected, there was no way to unselect Email lists for a Task or Scheduled Tasks Workflow's Mail Activity. |
02258069 |
Default SFTP/SCP User Name and Directory Now Set in Inventory Manager Default SFTP/SCP user names and directories are now set in Administration > Options > Inventory Manager. |
02288993 |
Extreme Management Center Upgrades Completing Properly Upgrading to Extreme Management Center version 8.5.1 was sometimes exiting halfway and not completing because files were not found during the upgrade process. Additional checks have been added to ensure all files are in place during upgrade and that upgrade completes successfully. |
02265429 |
ExtremeAnalytics CFRs Addressed | ID |
Introducing the Application Sensor and Analytics Engine Extreme Networks is introducing the new Extreme Application Sensor and Analytics Engine. This new Analytics engine combines the sensor and engine into one package, eliminating the need for additional hardware requirements. |
----- |
New DHCP Fingerprint for Apple Mobile Devices A new DHCP fingerprint for Apple mobile devices that run iOS 14 has been added. |
02250934 |
Extreme Management Center and ExtremeAnalytics Start-up Improved After upgrading to Extreme Management Center version 8.5.0, Extreme Management Center and, in turn, the ExtremeAnalytics engine, were not starting up completely. This issue has been corrected and start up for both now completes properly. |
02236775 02250432 |
ExtremeConnect CFRs Addressed | ID |
The ExtremeConnect Services API online documentation was missing after Extreme Management Center version 8.3.3 update. Those pages have been added back to the online Help documentation with Extreme Management Center version 8.5.3. | 02253977 |
ExtremeControl CFRs Addressed | ID |
MAC Lock Additions and Deletions No Longer Require Enforce MAC Lock additions and deletions were requiring an enforce. The issue has been fixed so that no enforce is needed to make additions or deletions. |
----- |
Multiple RADIUS Certificates Now Supported ExtremeControl version 8.5.3 now supports installing multiple RADIUS Certificates on an ExtremeControl engine. During 802.1X authentication, the installed RADIUS Certificate will be used and exchanged based on incoming RADIUS packet data, such as User-Name, NAS-IP-Address (Switch IP) or Calling-station-id (MAC Address). This is called ‘Attribute to EAP Group Mapping’ in ExtremeControl. |
01946914 |
Port Authentication Function Improved The "Disable Authentication on all Ports" function on the Control > Policy tab was displaying a list of ports that included ports that do not support authentication. This issue has been corrected. |
02236922 |
New Extreme Management Center NMS or NMS Advanced Licenses Can Now Be Applied to ExtremeControl engines New Extreme Management Center NMS or NMS Advanced licenses can now be applied to ExtremeControl engines if the engine license is within the grace period number of days before expiration. |
02264108 |
ADV190023 - Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing Security Advisory ADV190023, published August 2019, suggested changing default security settings within Active Directory. Changes to some of these settings could impact the interoperability of ExtremeControl within Active Directory environments. The impacts to the ExtremeControl engine would be:
Please refer to GTAC KB article https://gtacknowledge.extremenetworks.com/articles/Q_A/000044961 for more information and optionally visit Microsoft’s site for updated information about this proposed change: https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV190023. |
01970727 01975814 |
Customer Feature Requests Addressed in 8.5.2
Extreme Management Center CFRs Addressed | ID |
Map Scale Issues Corrected
Setting the scale on a map (away from the default setting) was causing the map to corrupt. The scale workflow issue has been corrected and maps no longer corrupt if the scale is adjusted. |
02242633 |
Extreme Management Center Log-In Delays Improved
Log-in delays seen in Extreme Management Center, caused by third-party devices with poor SNMP response time, have been addressed. |
02247375 |
Customer Feature Requests Addressed in 8.5.1
Customer Feature Requests Addressed in 8.5.0
Engines
- NIS Packages Not Installed with Engines
- Upgrades Accessible to Engines without Internet Connectivity
- Operating Systems Upgrade to Ubuntu 18.04
- NIS Packages Not Installed with Engines
- NIS packages are not installed with the Extreme Management Center, ExtremeAnalytics, or ExtremeControl Engines.
- During installation, if you select yes at the “Do you want to use NIS? (y/n)” prompt, you must install the NIS package for it to function.
- To do this, run:
apt update
apt install nis
The NIS package install will ask you if you want to keep/etc/yp.conf
. Choose ‘N’ (the default) to keep your existingyp.conf
file. NIS should then work.
To test it, use a command such as “ypcat passwd
”.
- Upgrades Accessible to Engines without Internet Connectivity
- Upgrades for the Extreme Management Center server, the ExtremeAnalytics engine, and the ExtremeControl engine are now accessible without internet connectivity.
- Operating Systems Upgrade to Ubuntu 18.04
- The Extreme Management Center, ExtremeAnalytics, and ExtremeControl engine operating systems have been upgraded to Ubuntu 18.04.
Fabric Manager VM OS Upgrade to Ubuntu 18.04
Beginning with Extreme Management Center 8.5.5, the Fabric Manager VM operating systems have been upgraded to Ubuntu 18.04.
For customers that have Internet connectivity in the lab systems:
- Initiate engine upgrade as per the recommended procedure.
- Perform an online OS upgrade, using the following CLI commands:
#>apt update
#>apt upgrade
#>apt autoremove
#>do-release-upgrade
(Follow the instructions and retain any .conf
files that might have been updated during the original configuration of the Fabric Manager.)
- Once the upgrade is completed, confirm the status of the OS version:
#>lsb_release-a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.05.5 LTS
Release: 18.04
Codename: bionic
- Save and back up any data on the Fabric Manager as per the recommended procedure.
- Delete the Fabric Manager from the device inventory in Extreme Management Center. (Check the Remove from the database option.)
- Shut down the Fabric Manager VM.
- Deploy a fresh VM from the latest release with the updated Ubuntu.
Extreme Management Center
- VOSS rcnaAuthenticationFailure trap Now Supported
- Polling Expanded to Include snmpEngineTime
- Improvements Made to Import Tab in Workflows
- Filters Added to Port Templates Tables
- MIB Tools and Flexview Editor Launched as Standalone App
- Policy Domain Evaluation Tool Launched as Standalone App
- Customer Experience Option Added
- Unified Switching Devices Now Supported by Extreme Management Center and Fabric Manager
- Workflow Charts Renamed
- SHA256 Checksums Now Used
- VSP VLAN/ISID Pruning Function Added
- DvR Redistribution Allowed
- Capabilities for Map and Sites Access Enhanced
- New Threaded Blocking Queue
- New Limit on Backup/Restore Log Files
- Statistics Collection Updated
- Access Terminal Capability Added
- Search Result Field Added to Search Maps Function
- DeviceView Enhanced with Asset Tag, User Data, Notes
- Ability to Choose How to Access Device Web Session
- Ability to Export Filtered Events Added
- New Alarms Added in Extreme Management Center
- WebAccess Added to Authorization Groups User Capabilities
- Ping Device Feature Added
- Devices Now Supported by Extreme Management Center
- Discover Now Allowed for Sites Based on Add Device Capability
- Clarification of Port Type Column on Device View > Port Tab
- Enhancement to Extreme Management Center Backups
- Failed to Join Domain Alarm Added
- REST API Added to GIM
- Fabric Authentication Type Enhancement
- Fabric Attach and Switched UNI Enhancement
- Enhancements to VPEX
- Improvements to Server Certificates
- 11ax Radio for AP5xx Models Supported
- Enhancements to Network Status Summary
- New Wireless FloorPlans Summary Added
- Enhancements to ExtremeConnect
- VOSS rcnaAuthenticatonFailure Trap Now Supported
- Extreme Management Center now supports VOSS rcnaAuthenticationFailure traps.
- Polling Expanded to Include snmpEngineTime
- Extreme Management Center now polls for snmpEngineTime (if present on the device) for determining sysUpTime.
- Improvements Made to Import Tab in Workflows
- The Import tab of a Workflow script activity has been enhanced.
- Filters Added to Port Templates Tables
- Column filters have been added to the Port Templates table in the Network > Devices > Sites tab, as well as a button to quickly filter the table to show all templates or only the Local templates. Also, a filter was added to the Port Template field on the Device Configuration View > Ports tab that you can type to filter the list, which makes the port template selection process easier.
- MIB Tools and Flexview Editor Launched as Standalone App
- The MIB Tools browser has been combined with the FlexView Editor diagnostic tool, which can now be launched as a standalone application. To launch, navigate to your Extreme Management Center server IP (
https://<your XMC Server IP>:8443/Clients/MIB_Tools.jnlp
) or access it from the Administration > Diagnostics tab.
NOTE: Access to the MIB Tools and FlexView Editor diagnostic tool via the Console Java application will be removed in a future release.
- Policy Domain Evaluation Tool Launched as Standalone App
- The Generate Wireshark Filters menu dialog has been repackaged into the Policy Domain Evaluation Tool, which can now be launched as a standalone application. To launch, navigate to your Extreme Management Center server IP (
hhtps://<your XMC Server IP>:8443/Clients/PMDEval.jnlp
) or access it from the Administration > Diagnostics > Server Utilities tab.
- Customer Experience Option Added
- A new Customer Experience option has been added to the Administration > Options tab, which allows customers to opt out of providing feedback.
- Unified Switching Devices Now Supported by Extreme Management Center and Fabric Manager
- Extreme Management Center Compliance and Fabric Manager now support Unified Switching 5420 devices.
- Workflow Charts Renamed
- Charts in the Workflow Dashboard have been re-labeled from "Completed" to "Successful" and from "Failed" to "Unsuccessful" to minimize confusion.
- SHA256 Checksums Now Used
- Extreme Management Center files are now published with SHA256 checksums, instead of MD5 checksums.
- VSP VLAN/ISID Pruning Function Added
- CVLAN UNI L2 Services that are associated with VLANs that are pruned are now also pruned themselves.
-
NOTE: VLAN pruning occurs when the VLAN does not have any ports associated with it, and pruning has been enabled.
- DvR Redistribution Allowed
- Extreme Management Center now allows you to redistribute static and locally configured routes via DvR.
- Capabilities for Map and Sites Access Enhanced
- The Authorization Group > NetSight OneView capabilities for Maps and Sites have been reorganized as "Maps Write Access," "Maps/Sites Read Access," and "Sites Write Access."
NOTE: After upgrading from a previous version of Extreme Management Center, Authorization Groups should be reviewed to ensure the intended access with these refined capabilities.
- New Threaded Blocking Queue
-
A new dedicated threaded Blocking Queue (JCiaQueue) has been introduced which is responsible to read/write Langley messages. The JCiaQueue is introduced to address the intermittent loss of connection with ExtremeWireless controllers, which Extreme Management Center and ExtremeWireless Manager were experiencing that generated out-of-sync errors.
NOTES: The queuing functionality is configurable from NSJBoss.properties with the following key: LangleyMessageBus.useMessageQueue. If the key is set to true, then Extreme Management Center will use JCiaQueue. If the key is set to false, then Extreme Management Center will not use JCiaQueue. The Extreme Management Center server must be restarted in case any modifications to NSJBoss.properties file have been made.
- New Limit on Backup/Restore Log Files
- A new feature has been added that removes backup or restored log files when the backup/restore log file count exceeds 30. This new feature is enabled by default but may be overridden by adding the 'extreme.database.backup.loghistory.maxFiles' entry in the NSJBoss.properties file.
- Statistics Collection Updated
- The interval for collecting statistics on devices and ports has been moved from the Administration > Options tab to the Configure Device view. The Monitor Mode for statistic collection has been renamed Threshold Alarms Mode, and terminology in the Inventory Dashboard and Administration > Options has been changed accordingly. The statistics collection interval cannot be changed for devices that are being polled with ZTP+.
- DeviceView Enhanced with Asset Tag, User Data, Notes
- The DeviceView is enhanced to display the Asset Tag, User Data and Notes on a device in the Extreme Management Center server, if these attributes are configured on the device in Extreme Management Center.
- Access Terminal Capability Added
- The Access Terminal capability, in the NetSight OneView list of capabilities, controls your access to opening a terminal session from the device menu.
NOTE: If you are upgrading to Extreme Management Center Version 8.5.3 (and future versions), the Access Terminal capability is enabled by default for new Authorization Groups, but is DISABLED by default for existing Authorization Groups. After upgrading to version 8.5.3, you must review and modify your Administrative Groups and configure them for Access Terminal individually.
- Search Result Field Added to Search Maps Function
- A new Search Result field has been added that displays all the maps that include the client or device you searched, if that client or device is included in multiple maps. If the client or device you searched is included in only one map, that map opens as a result of the search.
- Ability to Choose How to Access Device Web Session
- From the Device > Configure Device tab, you can choose how to access your device's Web Session by modifying the device WebView URL. You can select either the default WebView URL, provided by Extreme Management Center, or enter another WebView URL.
NOTE: The ability to edit the device WebView URL is available only after the device is successfully onboarded to Extreme Management Center.
- Ability to Export Filtered Events Added
- The ability to export filtered events to a .csv file has been added to Extreme Management Center.
- New Alarms Added In Extreme Management Center
- The following alarms are available in Extreme Management Center version 8.5.1:
- Port RX % Utilization Threshold Alarm
- Port TX % Utilization Threshold Alarm
- WebAccess Added to Authorization Group Capabilities
- WebAccess has been added to the Administration > Users > Group Authorization > Capabilities tab.
- Ping Device Feature Added
- You can now send a Ping (ICMP or TCP Echo Request) to determine if a device is reachable. The timeout value for the request is configured in Administration > Options > Status Polling > Ping > Length of Ping Timeout, and the result of the request is displayed in a pop-up dialog. Extreme Management Center installations that are configured to run as root issue ICMP Requests, while installations that are configured to run as users other than root will use a TCP Echo Request. In addition, the Ping Device feature, accessible via the Alarms & Events > Search Maps > More Actions, displays the results of a Ping Device.
NOTE: Firewalls and server configurations can block ICMP and/or TCP requests, which can result in an Unsuccessful Ping, even though SNMP, SSH, Telnet and other protocols are successful.
- Devices Now Supported by Extreme Management Center
- The following devices are now supported by Extreme Management Center version 8.5:
- AP310i-FCC
- AP310i-CAN
- AP310i-IL
- AP310e-FCC
- AP310e-WR
- AP310e-CAN
- Ap310e-IL
- AP360i-WR
- AP360i-CAN
- AP360i-IL
- AP360e-FCC
- AP360e-WR
- AP360e-CAN
- AP360e-IL
- AP360i-FCC
- AP310i-WR
- SLX 9740
- SLX-9740-40C
- SLX-9740-80C
- VSP-4900-24XE
- VSP-4900-12MXU
- VSP-4900-24S
- Discover Now Allowed for Sites Based on Add Device Capability
- Discover is now allowed for valid sites based on Add Device capability. The capability for "Sites Read/Write Access" is not necessary for Site Discover, but it is necessary for adding or editing sites.
- Clarification of Port Type Column in Device View > Port Tab
- The Port Type column on the Device View > Port tab has been renamed Neighbor Capabilities and shows all advertised capabilities of the neighbor, instead of displaying “Interswitch” or “Access.”
- Enhancement to Extreme Management Center Backups
- A new checkbox on the Administration > Backup/Restore tab allows you to select whether alarm, end-system event, and reporting are included in Extreme Management Center backups.
- Failed to Join Domain Alarm Added
- A “Failed to Join Domain” alarm is now automatically generated in Extreme Management Center when an engine is unable to join a domain and an event is generated.
- REST API Added to GIM
- REST API has been added to GIM to increase the .CSV import level for devices from 200 to 5000, and to improve the time to provision these devices.
- Fabric Authentication Type Enhancement
- Fabric Enable in NNI mode now supports the SHA-256 Fabric Auth Type.
- Enhancements to VPEX
- Extreme Management Center now supports the following Virtual Port Extender (VPEX) configurations:
- VPEX Ring Topologies – When two VPEX cascades are linked together, they form a VPEX ring. This type of ring provides a redundant connection from any bridge port extender (BPE) in the ring to the controlling bridge (CB).
Extreme Management Center requires the controlling bridge to have ExtremeXOS 30.6 or later. - One-Armed MLAGs – In this dual control configuration, the first tier BPEs are only connected to one of the two controlling bridges, which leaves more trusted ports available. In some applications, BPEs are limited to only two links for forming the ring, and the use of one-armed MLAGs is required.
- VPEX Ring Topologies – When two VPEX cascades are linked together, they form a VPEX ring. This type of ring provides a redundant connection from any bridge port extender (BPE) in the ring to the controlling bridge (CB).
- Improvements to Server Certificates
- The following improvements to server certificates are included in Extreme Management Center version 8.5:
- PKCS#12/PFX keystores without a keystore password can be imported
- Unencrypted RSA private keys containing a "BEGIN RSA PRIVATE KEY" header can be imported
- Error messages are more descriptive
- 11ax Radio for AP5xx Models Supported
- Extreme Management Center now supports 11ax Radio for AP5xx models.
- Enhancements to Network Status Summary Report
- The Network Status Summary PDF report has been updated to include the following enhancements:
- Reports display Top 10 instead of Top 5 statistics.
- New “Top 10 WLANs by Clients” and “Top 10 Clients by Bandwidth” reports have been added.
- Enhanced color and graphic resolution for all reports.
- Ability to select a site and generate a Network Status Summary based on the activity for that site.
- Scheduling capability to generate the Network Status Summary on an hourly, daily, weekly, or monthly basis.
- The Network Status Summary reports are now also available in the Reports Catalog under the Network option in the left-panel tree.
- New Wireless FloorPlans Summary Added
- A new FloorPlans Summary report, which displays AP, WLAN and Client data based on selected floorplans, has been added to Extreme Management Center's Reports Catalog under the Wireless option in the left-panel tree. You can also schedule the FloorPlan Summary to generate hourly, daily, weekly or monthly reports.
- Enhancements to ExtremeConnect
- Several enhancements have been made to ExtremeConnect, including:
- New custom end-system data fields and additional operating system data fields have been added to ExtremeConnect.
- Extreme Management Center backups now include ExtremeConnect configurations.
- Beginning with Extreme Management Center version 8.5, the following ExtremeConnect modules are hidden by default:
- FiberlinkMaaS360
- FntCommand
- Intune
- McAfee Dxl
- McAfee EPO
- MobileIron
- MSLync SDN
- OpenStack
- Sophos Mdm
- Xen Desktop
- Xen Server
- Xen Mobile
- Domain Portal (cross-XMC search – has no UI anymore)
- Eset Security
- Nutanix
- VWClever RDC
ExtremeAnalytics
- Streaming Flow Data from ExtremeAnalytics into Splunk
- Improvements to Response Time Dashboard
- Additional Devices Support Application Telemetry
- Streaming Flow Data from ExtremeAnalytics into Splunk
- ExtremeAnalytics supports the ability to stream flow data from an ExtremeAnalytics engine into Splunk. This support includes instructions on how to configure IPFIX to work with Splunk and files that you can copy to the Splunk server to facilitate integration.
- Improvements to Response Time Dashboard
- The ExtremeAnalytics Response Time dashboard, when grouping by interface, displays only the device IP address for received Application Telemetry flow data when it is lacking sampled packet information.
- Additional Devices Support Application Telemetry
- Application Telemetry is supported on the following device types:
- EXOS Summit Series X440-G2
- EXOS5520
- VOSS5520
- SLX9740
- ERS4900
- ERS5900
- ERS devices running firmware versions later than 7.7.0
- BOSS devices running firmware versions later than 7.7.0
ExtremeCompliance
ExtremeCompliance now supports the following device types (as of Extreme Management Center Version 8.5):
-
VSP4900-12MXU12XE
-
VSP4900-24S
-
VSP4900-24XE
-
SLX9740-40C
-
SLX9740-80C
-
AP310i/e
-
AP360i/e
Regimes and audit tests created in versions 8.1, 8.2, and 8.3 are retained following the upgrade.
ExtremeControl
- SIEM Notifications Functions Added to Access Control Tab
- Ping End-Systems Option Added to Tools Menu
- Message Strings Manager Feature Now in ExtremeControl
- Local Repositories Option Easier to Locate
- Manage Assessment Servers Upgrade Ability Now in ExtremeControl
- New Ciphers Added to ExtremeControl Engine Web Server Ports
- Filtering Function in Access Control Rule Table Enhanced
- Support for Extreme-Policy-ACL Added
- Rule Usage and Rule Hit Counts Tabs Added
- UDP & TCP Range Rules for Edit Traffic Description Supported
- Enhancements to DHCP Fingerprint Functionality
- Ability to Configure RADSec and TCP on Proxy RADIUS Servers
- Export of End-System Table Data Now Supports HTML Format
- New Option to Remove End-Systems via the End-Systems Tab
- Advanced Location-Based Registration and Web Access Configuration Available
- Ability to Create Helpdesk Provisioners in Guest & IoT Manager
- Preview with RADIUS Attributes Added
- Enhancement to Variables in RADIUS Attribute Configurations
- Enhanced Enforce Preview Functionality for ExtremeControl
- SIEM Notifications Functions Added to Access Control Tab
- A configuration menu button has been added to the Access Control > Configurations > Notifications tab that can be used to create default SIEM Notifications or change the default SIEM server.
- Ping End-Systems Option Added to Tools Menu
- The Ping End-Systems option has been added to Tools drop-down list on the Access Control > End-Systems table.
- Message Strings Manager Feature Now in ExtremeControl
- The Message Strings Manager feature has been added to ExtremeControl. It is accessible from the Access Control > Configurations > Captive Portals > Website Configuration > Look & Feel tab.
- Local Repositories Option Easier to Locate
- The Local Repositories option on the Access Control > Configuration > AAA tab is now located in the left-panel tree, making it more visible than where it was previously located.
- Manage Assessment Servers Upgrade Ability Now in ExtremeControl
- The Manage Assessment Servers check for updates and upgrade features on the Access Control > Configuration > Profiles > Assessments tab are now available in ExtremeControl.
- New Ciphers Added to ExtremeControl Engine Web Server Ports
- New ciphers have been added to ExtremeControl Engine web server ports, allowing browsers to be able to block CBC-based ciphers and still connect with engine web pages.
- Filtering Function in Access Control Rule Table Enhanced
- Column filtering in the Access Control Rule table now requires rule matches for all filters, not any single filter.
- Support for Extreme-Policy-ACL Added
- Support for ExtremeControl RADIUS attribute Extreme-Policy-ACL, which is used for dynamic ACLs on ExtremeControl devices, has been added.
- Rule Usage and Rule Hit Counts Tabs Added
- New Rule Usage and Rule Hit Counts tabs have been added to the Policy > Devices/Port Groups tab. The Rule Usage table displays a raw usage report of the Content-Aware Processors (CAP) on devices. The Rule Hit Counts tab displays the number of packets that matched each ACE by the traffic description configured on the device you select on the Policy > Devices / Port Groups > Devices tab.
- UDP & TCP Port Range Rules for Edit Traffic Description Supported
- For ExtremeXOS devices running version 30.5.x or later, new functionality for range rules requires only a single rule on the device. Previous implementation broke port ranges into multiple rules to support them on the device. The new range rule support also allows a source or destination IP to be combined with UDP or TCP ranges. The "Optional Value" field is now enabled to allow an optional IP address when a UDP or TCP "Range" traffic classification type is selected. Devices that do not support this optional IP address combined with a UDP or TCP port range will show the rule as unsupported in the Enforce Preview window.
- Enhancements to DHCP Fingerprint Functionality
- Several enhancements to the Detection and Profiling table on the Administration > Device Types tab have been made to improve DHCP fingerprint functionality.
- Add or edit DHCP device type profiles directly to the table. If a system fingerprint is edited, a custom fingerprint is created that overrides the system fingerprint.
- Delete custom fingerprints directly from the table. If the custom fingerprint was overriding a system fingerprint, the system fingerprint becomes active once again.
- Import a custom DHCP fingerprint xml definitions file to Extreme Management Center.
- The Detection and Profiling table now supports additional operations, including the Group by this Field option, which groups the data in the table by the selected column heading, and the Show in Groups option, which displays the fingerprints grouped by the field you selected.
- NOTE: Fingerprints are now applied to all ExtremeControl engines and are no longer engine-specific.
- Ability to Configure RADSec and TCP on Proxy RADIUS Servers
- You can now select TCP and RADSec setting options when configuring RADIUS Server authentication and accounting ports. RADSec adds TLS (Transport Layer Security) over TCP. For versions prior to Extreme Management Center version 8.5, TCP/TLS settings are not supported and cannot be enforced to ExtremeControl engines.
- Export of End-System Table Data Now Supports HTML Format
- Export of ExtremeControl end-systems and end-system events from the respective tables now supports HTML format.
- New Option to Remove End-Systems via the End-Systems Tab
- A new Cleanup Data option has been added to the Tools menu in the End-Systems Table on the Access Control > End-Systems tab, which enables you to easily remove end-systems from the tables and charts on the End-Systems tab.
- Advanced Location-Based Registration and Web Access Configuration Available
- Advanced location-based registration and web access enables you to configure different access features for end users based on the location of a connecting end-system. Using the Rules tab, you can define a location-based access configuration, which specifies the access method and portal used by the end user to register or log in, and the access levels assigned to the end user following registration or login.
- Ability to Create Helpdesk Provisioners in Guest & IoT Manager
- You can now create a Helpdesk Provisioner user in Guest & IoT Manager with the ability to view and edit all the Guest user and Device records of the Onboarding Templates to which they are assigned. Helpdesk Provisioners can add records of assigned Onboarding Templates; edit, delete and extend user expiration; and perform resend password, resend details, renew password, and print operations on accessible records.
- Preview with RADIUS Attributes Added
- A new Preview with RADIUS Attributes option, which allows you to preview your policy with a given RADIUS Attribute configuration, has been added to Access Control > Policy Mappings.
- Enhancement to Variables in RADIUS Attribute Configurations
- Custom substitution variables can now contain other variables and are resolved up to three times in RADIUS Attribute configurations.
- Enhanced Enforce Preview Functionality for ExtremeControl
- The Enforce Preview functionality is enhanced for the ExtremeControl engine configuration, displaying additional details about the enforce.
Deprecated Features
In Extreme Management Center 8.5.5, NBI deviceData.portSpeed has been deprecated. Instead, use deviceData.portConfigSpeed when auto-negotiation is disablednd deviceData.portConfigSpeedList when auto-negotiation is enabled.
In Extreme Management Center version 8.5, the following legacy Java applications (Console, MIB Tools, NAC Manager, and Policy Manager) are disabled by default. To use the legacy Java applications in version 8.5, follow the instructions in the GTAC knowledgebase article.
Beginning in Extreme Management Center version 8.5, the Extreme Management Center server no longer supports native installation for the Windows operating system.
Known Issues and Vulnerabilities Addressed
Known Issues Addressed in 8.5.5
Extreme Management Center Issues Addressed | ID |
Fabric Manager was displaying only the Dynamic FA VLAN ISID Mappings for EXOS device running on versions prior to EXOS OS version 30.1. For EXOS OS versions above 30.1, Fabric Manager will display both Static and Dynamic FA VLAN ISID mapping. NOTE: There is limitation that when a particular VLAN is mapped to both static and dynamic NSI / ISID bindings. In such scenarios, Fabric Manager will display either Static or Dynamic, since the response from the EXOS device has only one FA VLAN ISID Mapping information. |
----- |
Devices were improperly being added to maps other than those specified in the Add Device Action tab. The issue has been corrected. Now, selecting a Map from the Network > Devices tree and selecting "Add Device" adds the device to the map and to the map's parent site. From the Network > Discovered tab, specifying a map when adding the device will add the device to the specified map, as well as to the map specified in the site's Add Action tab. |
----- |
Known Issues Addressed in 8.5.4
Extreme Management Center Issues Addressed | ID |
An Unable to Load Pages or Data state sometimes occurred if several buttons or tabs are selected before pages were allowed to fully or properly load. | ----- |
Slow SNMP response time, while a significant number of device status changes were processing, was generating “Out-of-Memory” errors. | 02292280 |
The System Workflow task “Config VOSS Virtual IST” did not support the LACP SMLT System ID. Now, the LACP SMLT System ID field is optional in System Workflows. | ----- |
Selecting "Generate PDF" from the Devices > Interface History tab was resulting in a 404 File Not Found Page. | ----- |
The Wireless > Network > Topologies tab was displaying a number of topologies that did not belong to EWCs. | ----- |
ExtremeAnalytics Issues Addressed | ID |
Port-based fingerprint match errors were sometimes appearing in the ExtremeAnalytics server log. | ----- |
Known Issues Addressed in 8.5.3
Extreme Management Center Issues Addressed | ID |
Importing multiple scripts using the Tasks > Scripts > Import function occasionally changed the original indexing and lead to incorrect script matching or deletion. | 01852604 |
Scheduled archives of more than 10 devices that use SCP or SFTP were randomly failing. | 02187412 |
The Progress bar, as shown in the Results of an Execute CLI Commands execution, was incorrect; the completion percentage value was not shown. The Progress bar is completion percentage value is now correctly displayed. | 02276741 |
Logging statements were included for debugging the Device Menus options. Since CLI scripts do not support Menus, debug statements have been modified to not append in the log files. | 02249872 |
REST device calls use SSL if the WebView URL protocol is HTTPS. The URL must also include the correct TCP port (e.g. https://%IP:443). | 02265917 |
Deploying Extreme Management Center version 8.5.0 was executing differently than if Extreme Management Center was upgraded from version 8.4.x to version 8.5.0. The issues have been addressed and now deployment of and upgrade to Extreme Management Center version 8.5.0 execute properly. | 02242528 |
Extreme Management Center was treating EAPS domain names as case-sensitive while computing domain membership, which resulted in devices in the same domain with different domain names. Now, EAPS domain names are treated as case-insensitively while computing domain membership across devices. | 01933011 |
Selecting the 'Refresh Port Status' button on the Devices > Summary > Ports tab for VSP / VOSS devices was not updating the devices’ port status. In addition, alarms may not have been created based on port status for VOSS platforms. | 02246282 |
In the Workflows > Scheduled Tasks table, the "Last Run" field was not displaying the last time a task executed after a first run or only run of the task. | 02269563 |
Extreme Management Center was querying an MIB table for topology information for all VSP devices that is not supported by VSP9000 devices. Now, the correct MIB table is queried for topology information for VSP9000 series devices. | 02263113 |
On the Archives tab, deleted devices were still displaying in the Archives table when the Stamp New Version option was used. | 02247177 |
Clearing an alarm was resulting in the Alarm Name and Information fields appearing blank in the Alarm History table. | 02251627 |
The wrong device was occasionally displaying in the DeviceView > Device Logs > Syslog and/or Traps table. | 02221460 |
The connection for ICX backup workflows was closing before the workflow was fully executed and generating an improper ‘Failed’ message. | 02168685 |
Selecting the Archive > Inventory Settings device option generated a "Could not load report" error message and the Inventory Settings panel would not display. | 2264072 |
for ExtremeXOS devices in Extreme Management Center, if the source IP address was not added, traps and syslogs appeared with the wrong IP address. Also, email notifications and events did not appear in alarms if the IP addresses did not match the managed IP address. Now, registering for traps and syslog sets the trap and syslog message source IP address for ExtremeXOS devices to the IP address that Extreme Management Center uses to manage the device. |
02005429 |
Certain trap messages generated by the third-party CheckPoint for end-point devices were truncated after parsing the snmptrapd log file(s). | 01943997 |
When adding a new device type fingerprint, the Vendor Name was not displaying if the “Is Partial” box was selected. | 2258176 |
The FlexViews EXPR column on FlexViews reports was displaying ‘-‘ when values were non-numeric; for example, the Active Wireless Access Points and Wireless Access Points views. | 2221529 |
After upgrading to Extreme Management Center version 8.5.0, log-on delays were occurring that were caused by third party devices with poor SNMP response times. | 02247375 |
User defined Port Templates for a Site were unable to be deleted. | 02251367 |
After upgrading to Extreme Management Center 8.5.2, FlexReport PDFs did not contain data. | 02276233 |
A limit of 100 Access Points per map was being applied for wireless controllers and Extreme Campus Controller. This limit has been removed. | 02267218 |
Deleting firmware images from Extreme Management Center for MLX, ICX, VDX and SLX devices was not deleting all images and directories. | 02198267 |
Extreme Management Center did not use the slot:port format for ExtremeXOS devices that support it. A new emc_vars format has been introduced to the script engine i.e emc_vars[slot:port] that provides both slots and ports information. | 01953506 |
Extreme Management Center was processing RADIUS accounting requests for devices with MAC address of zero. The issue has been corrected so if a MAC address of zero occurs, the RadiusAuthInfo is returned as null and doesn't proceed further. | 01243712 |
Authorization Group capabilities and functions, specifically the options related to Device control, were still available for use after the devices were disabled. This issue has been corrected. Also, while the ability to run scripts using the right-click menu was not available, the ability to execute scripts against the disabled devices via the Tasks tab was still available. This issue is corrected by unselecting the NetSight > OneView>Access Scheduled Tasks, and Workflows/Scripts > View > Edit, Workflows, Scripts, and Saved Tasks functions in Extreme Management Center. |
1786436 |
The Reports tab auto-refresh was not working for custom reports created with the Reports Designer. The reports had to be manually refreshed to be updated. | 02256858 |
In Extreme Management Center version 8.5.1, read-only users were improperly able to access the Configure window and make device changes. | 2260874 |
For Extreme Management Center workflow scripts, imported scripts with unicode characters are no longer truncated. | 1825871 |
The firewall state was being incorrectly reported on recent Mac OSX versions. The agent will now detect firewall states of "0" as OFF and anything greater than "0" (1 =ON, 2 = OFF + Essential Services) as ON. NOTE: Firewall states are retrieved from the globalstate variable in com.apple.alf.plist. |
----- |
The auto-refresh function was not working properly for custom reports created using the Report Designer. | 02256858 |
The wrong device was occasionally displayed in the DeviceView > Device Logs > Syslog and Traps table. | 02221460 |
Extreme Management Center was not accepting a password longer than eight characters if Extreme Management Center was installed or run as the user "netsight". | ----- |
Read-only users incorrectly had access to the 'configure' function, which allowed them the ability to enforce changes to the devices. | 2260874 |
ExtremeAnalytics Issues Addressed | ID |
ExtremeAnalytics Flow Grid filters were timing out when attempting to display filtered flow results. | ----- |
On the Analytics tab, a "Could not load report" error message was improperly being generated when IP subnets were added to end-point locations. | 02211025 1955045 |
Importing end-point locations in ExtremeAnalytics was improperly generating error messages. |
02260320 |
When a VSP device, for which collectors are configured to forward sflow to a third-party server, was later added as a flow source to the ExtremeAnalytics engine, the sflow configuration was improperly deleted when the device was removed from the ExtremeAnalytics engine. | 1926465 |
The Analytics License Violation message would improperly display when either no engines were configured or a non-Analytics view was being accessed. | 1906404 |
ExtremeControl Issues Addressed | ID |
It was not possible to enter a Virtual Router Name when adding a new switch with NBI. |
02263955 |
Policy enforce failed and an "Unexpected error" message displayed when using an IP Socket Automated Service with a Network Resource that contained a masked IP address. | 02229897 |
Admin users, using the Admin Role in the Captive Portal administrative setting and when the “Limit the Sponsor’s View to Own Users” option was enabled, were able to view pending sponsored users who used different email addresses than the Admin Users through sponsor page. | 01883106 |
The maximum limits set for backup scripts for ExtremeControl and Workflow folders were not being considered. | 01887642 |
No error message was generated when configuring a switch with NBI with same ExtremeControl gateway used as both the primary and secondary gateway. | 02262810 |
On the Control > Policy tab, changes made to a Class of Service applied to a Global Service Rule were not being saved when the domain was saved. | 01989463 |
On the Control > Policy tab, attempts to delete a Class of Service applied to a Global Service Rule using the Delete & Clear Actions button were not deleting the CoS when the domain was saved. | 01996239 |
The Ports table (or Port Tree) in the DeviceView window was not populating with data for some VSP-4900 devices. | 02219711 |
After adding a device to a policy domain in ExtremeControl, the data was not displaying immediately in the Policy Domain column of the Devices table. | 1992716 |
An error was caused when the read operation was attempted on the 802.1x MIB “dot1xAuthTxPeriod,” which is deprecated and obsolete. The Get and Set Operation on Authentication txPeriod has been removed from Port Authentication in Policy Manager. | 02155440 |
If an end-system record was deleted from the End-System group in Extreme Management Center, it was removed but remained as a visible entry in Guest and IoT Manager (GIM). Because it is recommended that GIM entries are managed in GIM, a warning message is displayed and the deletion of the GIM entry is prevented in ExtremeControl. | 02007116 |
The mobile captive portal improperly displayed the selector and provider field with only a single entry listed. Now, the mobile captive portal displays the providers list only if the number of providers is greater than one. | 01909449 |
The option to print more than one user record at once was not available in the Guest and IoT Manager (GIM). Now, the option to print multiple user records at once is available. | 02214309 |
When adding or editing a User Group on the Control > LDAP User Group Entry Editor window, commas are generally used to separate the attribute/value pairs in an entry to ensure they are evaluated separately. However, adding a comma was sometimes impacting how wildcards (*) are handled. To force the entry to be treated as a single value, do not use a comma before a second ‘=’. For Example:
|
01772140 |
NBI was allowing the ability to access and modify control switches and add secondary Gateway switches, but was not allowing the ability to unset secondary Gateway switches. | 02262704 |
Device services, including SNMP services, were being configured on multiple interfaces for the ExtremeControl engine. However, SNMP is only supported on one interface, and users were not informed appropriately. A warning has been added to alert that, when configuring device services on more than one interface, SNMP will only work over one interface. | ----- |
The end-systems table was displaying incorrect status. The addition of a live update feature has corrected this issue. | 215582 |
The ExtremeControl captive portal was not working if both IPv4 and IPv6 addresses are configured on the registration and remediation interface. This issue has been corrected. | 01911557 |
An individual certificate could not be deleted if the Trusted Authority certificate list contained duplicate entries with the same certname/SHA-type as the certificate. All certificates with the same certname/SHA-type had to be deleted and then the desired certificate had to be re-added. | 01952004 |
ExtremeControl was using pooled LDAP connections, which are left open indefinitely and may be eventually torn down by the LDAP server, resulting in the entire pool being "dead" on the LDAP server side. Now, the pooled connection timeout is set to 5 minutes (300000 milliseconds). | 01957077 |
By default, if a wireless controller sent Siemens-BSS-MAC attribute, ExtremeControl overwrote the called-station-id with the value to be used to identify the location of end-system. ExtremControl now supports an engine property to disable the default behavior of Siemens-BSS-MAC RADIUS attribute sent by Extreme wireless controllers that overwrites the Called-Station-Id attribute value. The new property is REPLACE_CALLED_STATION_ID_WITH_SIEMENS_BSS_MAC and setting this to false disables the default behavior. | ----- |
Known Issues Addressed in 8.5.1
Known Issues Addressed in 8.5.0
Vulnerabilities Addressed
This section presents the vulnerabilities addressed in Extreme Management Center 8.5.1:
- The following vulnerabilities were addressed in the Extreme Management Center, ExtremeControl, and ExtremeAnalytics engine images:
- CVE-2018-0500, CVE-2018-8740, CVE-2019-19603, CVE-2019-19645, CVE-2020-11655, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632, CVE-2020-13790, CVE-2020-0543, CVE-2020-0548, CVE-2020-0549, CVE-2019-1547, CVE-2019-1549, CVE-2019-1551, CVE-2019-1563, CVE-2017-11109, CVE-2017-5953, CVE-2017-6349, CVE-2017-6350, CVE-2018-20786, CVE-2019-20079, CVE-2019-12387, CVE-2019-12855, CVE-2019-9512, CVE-2019-9514, CVE-2019-9515, CVE-2020-10108, CVE-2020-10109, CVE-2020-10531, CVE-2020-1700, CVE-2019-13734, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752, CVE-2019-13753, CVE-2019-19880, CVE-2019-19923, CVE-2019-19924, CVE-2019-19925, CVE-2019-19926, CVE-2019-19959, CVE-2019-20218, CVE-2020-9327, CVE-2020-8130, CVE-2019-19221, CVE-2020-9308, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2020-8597, CVE-2019-19956, CVE-2020-7595, CVE-2018-16888, CVE-2019-20386, CVE-2019-3843, CVE-2019-3844, CVE-2020-1712, CVE-2019-19906, CVE-2017-16808, CVE-2018-10103, CVE-2018-10105, CVE-2018-14461, CVE-2018-14462, CVE-2018-14463, CVE-2018-14464, CVE-2018-14465, CVE-2018-14466, CVE-2018-14467, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14879, CVE-2018-14880, CVE-2018-14881, CVE-2018-14882, CVE-2018-16227, CVE-2018-16228, CVE-2018-16229, CVE-2018-16230, CVE-2018-16300, CVE-2018-16451, CVE-2018-16452, CVE-2018-19519, CVE-2019-1010220, CVE-2019-15166, CVE-2019-15167, CVE-2019-5188, CVE-2019-15795, CVE-2019-15796, CVE-2019-20367, CVE-2019-13627, CVE-2019-15165, CVE-2019-15845, CVE-2019-16201, CVE-2019-16254, CVE-2019-16255,CVE-2019-14866, CVE-2019-12290, CVE-2019-18224, CVE-2019-13117, CVE-2019-13118, CVE-2019-18197, CVE-2019-6111, CVE-2019-10222, CVE-2019-13012, CVE-2019-12450, CVE-2019-8457, CVE-2019-12735, CVE-2019-19377, CVE-2019-19769, CVE-2020-11494, CVE-2020-11565, CVE-2020-11608, CVE-2020-11609, CVE-2020-11668, CVE-2020-12657, CVE-2020-12826, CVE-2020-8616, CVE-2020-8617, CVE-2020-11669, CVE-2020-12762, CVE-2020-3810, CVE-2019-20795, CVE-2020-12243, CVE-2018-5383, CVE-2020-2759, CVE-2020-2760, CVE-2020-2762, CVE-2020-2763, CVE-2020-2765, CVE-2020-2780, CVE-2020-2804, CVE-2020-2812, CVE-2020-2892, CVE-2020-2893, CVE-2020-2895, CVE-2020-2896, CVE-2020-2897, CVE-2020-2898, CVE-2020-2901, CVE-2020-2903, CVE-2020-2904, CVE-2020-2921, CVE-2020-2922, CVE-2020-2923, CVE-2020-2924, CVE-2020-2925, CVE-2020-2926, CVE-2020-2928, CVE-2020-2930, CVE-2019-16234, CVE-2019-19768, CVE-2020-10942, CVE-2020-11884, CVE-2020-8648, CVE-2020-9383, CVE-2019-2228, CVE-2020-3898, CVE-2019-18348, CVE-2020-8492, CVE-2020-11008, CVE-2020-5260, CVE-2020-8428, CVE-2020-8834, CVE-2020-8992, CVE-2018-14553, CVE-2019-11038, CVE-2020-8831, CVE-2020-8833, CVE-2020-8835, CVE-2018-14498, CVE-2018-19664, CVE-2018-20330, CVE-2019-2201, CVE-2018-11574, CVE-2019-19046, CVE-2020-8428, CVE-2020-15709, CVE-2020-12400, CVE-2020-12401, CVE-2020-6829, CVE-2020-15704, CVE-2020-11936, CVE-2020-15701, CVE-2020-15702, CVE-2020-14539, CVE-2020-14540, CVE-2020-14547, CVE-2020-14550, CVE-2020-14553, CVE-2020-14559, CVE-2020-14568, CVE-2020-14575, CVE-2020-14576, CVE-2020-14586, CVE-2020-14591, CVE-2020-14597, CVE-2020-14619, CVE-2020-14620, CVE-2020-14623, CVE-2020-14624, CVE-2020-14631, CVE-2020-14632, CVE-2020-14633, CVE-2020-14634, CVE-2020-14641, CVE-2020-14643, CVE-2020-14651, CVE-2020-14654, CVE-2020-14656, CVE-2020-14663, CVE-2020-14678, CVE-2020-14680, CVE-2020-14697, CVE-2020-14702, CVE-2019-17514, CVE-2019-20907, CVE-2019-9674, CVE-2020-14422, CVE-2017-12133, CVE-2017-18269, CVE-2018-11236, CVE-2018-11237, CVE-2018-19591, CVE-2018-6485, CVE-2019-19126, CVE-2019-9169, CVE-2020-10029, CVE-2020-1751, CVE-2020-1752, USN-4377-1, CVE-2020-14309, CVE-2020-15707, CVE-2020-10713, CVE-2020-15706, CVE-2020-14311, CVE-2020-14310, CVE-2020-15705, CVE-2020-14308,CVE-2020-10711, CVE-2020-10751, CVE-2020-12768, CVE-2020-12770, CVE-2020-13143, CVE-2020-5963, CVE-2020-5967, CVE-2020-5973, CVE-2020-8169, CVE-2020-8177, CVE-2020-12049, CVE-2019-17023, CVE-2020-12399, CVE-2019-7303, CVE-2019-14855, CVE-2018-7738, CVE-2019-1547, CVE-2019-1551, CVE-2019-1563, CVE-2020-1968, CVE-2020-14386, CVE-2020-14344, CVE-2020-14363, CVE-2018-20669, CVE-2019-19947, CVE-2019-20810, CVE-2020-10732, CVE-2020-10766, CVE-2020-10767, CVE-2020-10768, CVE-2020-10781, CVE-2020-12655, CVE-2020-12656, CVE-2020-12771, CVE-2020-13974, CVE-2020-15393, CVE-2020-2439, CVE-2019-20810, CVE-2020-10757, CVE-2020-10766, CVE-2020-10767, CVE-2020-10768, CVE-2020-10781, CVE-2020-12655, CVE-2020-12656, CVE-2020-12771, CVE-2020-13974, CVE-2020-14356, CVE-2020-15393, CVE-2020-24394, CVE-2019-20810, CVE-2020-10757, CVE-2020-10766, CVE-2020-10767, CVE-2020-10768, CVE-2020-10781, CVE-2020-12655, CVE-2020-12656, CVE-2020-12771, CVE-2020-13974, CVE-2020-14356, CVE-2020-15393, CVE-2020-24394, CVE-2020-12403, CVE-2020-14367, CVE-2020-15861, CVE-2020-15862, CVE-2020-8620, CVE-2020-8621, CVE-2020-8622, CVE-2020-8623, CVE-2020-8624, CVE-2020-8231, CVE-2020-1938
- Extreme Management Center and ExtremeControl engine images:
- CVE-2019-7317, CVE-2020-13820, CVE-2020-13819, CVE-2019-11599, CVE-2019-9503, CVE-2019-3842, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091, CVE-2019-3874, CVE-2019-3882, CVE-2019-6133, CVE-2018-5743, CVE-2019-0136, CVE-2019-10207, CVE-2019-11487, CVE-2019-13631, CVE-2019-15211, CVE-2019-15215, CVE-2018-21008, CVE-2019-14816, CVE-2019-14821, CVE-2019-15117, CVE-2019-15118, CVE-2019-15505, CVE-2019-15902, CVE-2018-20784, CVE-2019-10638, CVE-2019-13648, CVE-2019-14283, CVE-2019-14284, CVE-2019-3900
- Extreme Management Center and ExtremeAnalytics engine images:
- CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901, CVE-2019-16231, CVE-2019-18660, CVE-2019-19045, CVE-2019-19052, CVE-2019-19524, CVE-2019-19534, CVE-2019-19529
- Extreme Management Centerengine image:
- CVE-2019-18813, CVE-2019-19051, CVE-2019-19055, CVE-2019-19072, CVE-2019-11190, CVE-2019-11191, CVE-2019-11810, CVE-2019-11815, CVE-2016-3189, CVE-2019-12900, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614, CVE-2019-13272, CVE-2019-3846, CVE-2016-10743, CVE-2019-9495, CVE-2019-9497, CVE-2019-9498, CVE-2019-9499, CVE-2019-9893, CVE-2019-11477, CVE-2019-11478, CVE-2018-20836, CVE-2019-10142, CVE-2019-11833, CVE-2019-11884, CVE-2019-2054, CVE-2019-5435, CVE-2019-5436, CVE-2019-9924, CVE-2019-11555, CVE-2018-20843, CVE-2016-6153, CVE-2017-10989, CVE-2017-13685, CVE-2017-2518, CVE-2017-2519, CVE-2017-2520, CVE-2018-20346, CVE-2018-20505, CVE-2018-20506, CVE-2019-9936, CVE-2019-9937, CVE-2019-13057, CVE-2019-13565, CVE-2019-11479, CVE-2019-16056, CVE-2019-16935, CVE-2019-14615, CVE-2019-15291, CVE-2019-18683, CVE-2019-18885, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063, CVE-2019-19227, CVE-2019-19332, CVE-2018-3639, CVE-2018-3640, CVE-2018-3646, CVE-2019-3462, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2018-20685, CVE-2019-6109, CVE-2019-1559, CVE-2015-9383, CVE-2018-20406, CVE-2018-20852, CVE-2019-10160, CVE-2019-5010, CVE-2019-9636, CVE-2019-9740, CVE-2019-9947, CVE-2019-9948, CVE-2019-5481, CVE-2019-5482, CVE-2019-15903, CVE-2019-14287, CVE-2016-10905, CVE-2017-18509, CVE-2018-20961, CVE-2018-20976, CVE-2019-15926, CVE-2019-14835, CVE-2019-15030, CVE-2019-15031, CVE-2016-5195, CVE-2019-5094, CVE-2018-12207, CVE-2019-0154, CVE-2019-0155, CVE-2019-11135, CVE-2019-15098, CVE-2019-16746, CVE-2019-17052, CVE-2019-17053, CVE-2019-17054, CVE-2019-17055, CVE-2019-17056, CVE-2019-17666, CVE-2019-2215, CVE-2019-16275, CVE-2019-17075, CVE-2019-17133, CVE-2019-0155, CVE-2019-11135, CVE-2019-11139, CVE-2019-18218, CVE-2019-18218, CVE-2016-10906, CVE-2017-18232, CVE-2019-14814, CVE-2019-16168, CVE-2019-19242, CVE-2019-19244, CVE-2019-5018, CVE-2019-5827, CVE-2018-20856, CVE-2018-10844, CVE-2018-10845, CVE-2018-10846, CVE-2019-3829, CVE-2019-3836, CVE-2016-7076, CVE-2017-1000368, USN-4038-3, USN-4049-3, 1999-0632
- The following vulnerabilities were addressed in the ExtremeControl engine image:
- CVE-2019-10092, CVE-2019-11234, CVE-2019-11235, CVE-2018-16884, CVE-2019-9500, CVE-2018-14678, CVE-2018-18021, CVE-2018-19824, CVE-2019-3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-2019-7308, CVE-2019-8912, CVE-2019-8980, CVE-2019-9213, CVE-2018-18397, CVE-2018-19854, CVE-2019-6454, CVE-2019-14814, CVE-2019-14815, CVE-2019-15918, CVE-2018-19985, CVE-2019-10639, CVE-2019-14763, CVE-2019-15090, CVE-2019-15212, CVE-2019-15214, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-3701, CVE-2019-3819, CVE-2019-9506, USN-4115-2
- The following vulnerabilities were addressed in the ExtremeAnalytics engine image:
- CVE-2019-16233, CVE-2019-19083, CVE-2019-19807
Installation, Upgrade, and Configuration Changes
Installation Information
When you purchased Extreme Management Center, you received a Licensed Product Entitlement ID that allows you to generate a product license key. Prior to installing Extreme Management Center, redeem your Entitlement ID for a license key. Refer to the instructions included with the Entitlement ID sent to you.
For complete installation instructions, refer to the installation documentation located on the Documentation web page: https://documentation.extremenetworks.com/netsight/8.5/XMC_8.5_XMC_Installation_Guide.pdf?_ga=2.5466491.996146140.1614099713-1806128357.1531489287
If you have requested an Extreme Management Center evaluation license, you received an Entitlement ID. This Entitlement ID allows you to generate a product evaluation license key. Refer to the instructions included with the Entitlement ID to generate the license key. Use the key when you install the product.
Evaluation licenses are valid for 30 days. To upgrade from an evaluation license to a purchased copy, contact your Extreme Networks Representative to purchase the software. Refer to the Upgrading an Evaluation License section of the Extreme Management Center Installation Guide for instructions on upgrading your evaluation license.
IMPORTANT: | The Compliance tab is available and supported by Extreme on an Extreme Management Center engine running the Linux operating system supplied by Extreme. Other Linux operating systems can support ExtremeCompliance functionality, but python version 2.7 or higher must be installed. Additionally ExtremeCompliance functionality requires the git, python2, python mysql module, python setuptools module, and python "pygtail" module packages be installed and related dependencies managed by the customer for their server’s unique operating system and version. |
Installing Without an Internet Connection
!!! ATTENTION !!!
We can attempt to upgrade the OS without using the internet if there were no extra Ubuntu packages installed. If there were extraneous packages installed, the upgrade will fail with this method.
Do you want to attempt a local in-place upgrade of the OS and reboot when complete? (Y/n)
Custom FlexViews
When reinstalling Extreme Management Center Console, the installation program saves copies of any FlexViews you created or modified in the <install directory>\.installer\backup\current\appdata\System\FlexViews
folder.
If you are deploying FlexViews via the Extreme Management Center server, save them in the appdata\VendorProfiles\Stage\MyVendorProfile\FlexViews\My FlexViews
folder.
Custom MIBs and Images
If you are deploying MIBs via the Extreme Management Center server, they are saved in the appdata\VendorProfiles\Stage\MyVendorProfile\MIBs\
folder.
If you are deploying device images (pictures) via the Extreme Management Center server, they are saved in the appdata\VendorProfiles\Stage\MyVendorProfile\Images\
folder.
Important Upgrade Considerations
Extreme Management Center 8.5.x supports upgrades from Extreme Management Center version 8.2.x, 8.3.x or 8.4.x. If you are upgrading from version 8.1 or earlier of NetSight/Extreme Management Center, you must perform an intermediate upgrade. For example, if you are upgrading from Extreme Management Center 8.1, you must first upgrade to the latest Extreme Management Center 8.2 or 8.3 release, then to 8.5.x.
IMPORTANT: | When performing an upgrade, be sure to back up the database prior to performing the upgrade, and save it to a safe location. Use the Administration > Backup/Restore tab to perform the backup. |
- When upgrading the Extreme Management Center server, ExtremeAnalytics engine, or ExtremeControl engine to version 8.5, ensure the DNS server IP address is correctly configured.
-
When upgrading to Extreme Management Center version 8.5, if you adjusted the Extreme Management Center memory settings and want them to be saved on upgrade, a flag (
-DcustomMemory
) needs to be added to the/usr/local/Extreme_Networks/NetSight/services/nsserver.cfg
file.
For example:-Xms12g -Xmx24g -XX:HeapDumpPath=../../nsdump.hprof -XX:+HeapDumpOnOutOfMemoryError -XX:MetaspaceSize=128m -DcustomMemory
- If your network is using ExtremeAnalytics or ExtremeControl engines, Fabric Manager, or another add-on feature, you must first perform the Extreme Management Center upgrade to version 8.5 and then add the feature.
- If you are running Data Center Manager (DCM), a Mobile Device Management (MDM) integration, or other ExtremeConnect or Fusion integration with Extreme Management Center, or are accessing Web Services directly or through ExtremeConnect, you need to install an Extreme Management Center Advanced (NMS-ADV) license. Contact your Extreme Networks Representative for information on obtaining this license.
License Renewal
Upgrading to Extreme Management Center version 8.5 requires you to renew your NMS license if generated prior to July 31, 2020. Licenses generated prior to July 31, 2020 expire 90 days after upgrading to Extreme Management Center version 8.5.
Upgrading Hardware
When attempting to upgrade the Extreme Management Center server, the ExtremeAnalytics engine, or the ExtremeControl engine to version 8.5, the upgrade might not complete successfully. If the upgrade is not successful, begin the upgrade again.
Free Space Consideration
When upgrading to Extreme Management Center version 8.5, a minimum of 15 GB of free disk space is required on the Extreme Management Center server.
To increase the amount of free disk space on the Extreme Management Center server, perform the following:
- Decrease the number of Extreme Management Center backups (by default, saved in the
/usr/local/Extreme_Networks/NetSight/backup
directory). - Decrease the Data Persistence settings (Administration > Options > Access Control > Data Persistence).
- Remove unnecessary archives (Network > Archives).
-
Delete the files in the
<installation directory>/NetSight/.installer
directory.
Site Discover Consideration
Discovering devices via the Site tab using a Range, Subnet, or Seed discover might not successfully add all expected devices. To correct the issue, increase the Length of SNMP Timeout value on the Administration > Options > Site tab in the Discover First SNMP Request section.
ExtremeAnalytics Upgrade Information
Enabling or disabling the disk flow export feature might cause enforce operations to time out. Enforcing again resolves the issue.
When you delete an ExtremeXOS device that is configured as a flow source via the Flow Sources table of the Analytics > Configuration > Engines > Configuration tab from the Devices list on the Network > Devices tab, an error message is generated in the server.log
. The message does not warn you that the device is in use as a flow source. Adding the device back in the Devices list on the Network > Devices tab or removing the device from the Flow Source table fixes the issue.
The Flow Sources table on the Analytics > Configuration > engine > Configuration tab may take a few minutes to load.
ExtremeControl Upgrade Information
4.4.1 General Upgrade Information
Before upgrading to Extreme Management Center 8.5, upgrade your ExtremeControl engine version to 8.2 or 8.4. Additionally, both Extreme Management Center and the ExtremeControl engine must be at version 8.5 in order to take advantage of the new ExtremeControl 8.5 features.
You can download the latest ExtremeControl engine version at the Extreme Portal: https://extremeportal.force.com. Be sure to read the Upgrading to ExtremeControl 8.5 document (available on the Documentation tab of the Portal) for important information.
In addition, if your ExtremeControl solution utilizes a Nessus assessment server, upgrade your assessment agent adapter to version 8.5 if you upgrade to the ExtremeControl engine 8.5. Version 8.5 of the assessment agent adapter requires an operating system with a 64-bit architecture.
ExtremeControl Version 8.0 and later
Beginning in version 8.0, ExtremeControl may fail to join Active Directory when accessing as a Standard Domain User with Descendant Computer Objects ("Reset password" permissions only) group member.
To allow this functionality, add the following permissions:
- Reset Password
- Validated write to DNS host name
- Validated write to service principal
- Read and write account restrictions
- Read and write DNS host name attributes
- Write servicePrincipalName
Other Upgrade Information
Immediately after you install version 8.5 on the ExtremeControl engine, the date and time does not properly synchronize and the following error message displays:
WARNING: Unable to synchronize to a NTP server. The time might not be correctly set on this device.
Ignore the error message and the date and time automatically synchronize after a short delay.
Additionally, the following message might display during the ExtremeControl upgrade to version 8.5:
No domain specified
To stop domain-specific winbindd
process, run /etc/init.d/winbindd stop {example-domain.com}
Fabric Configuration Information
Certificate
Fabric Manager might be unavailable via Extreme Management Center after upgrading if the certificate is missing in Extreme Management Center Trust store.
To ensure Fabric Manager is available, enter the Fabric Manager certificate in the Extreme Management Center Trust store using Generate Certificate option.
Authentication Key
When you provision authentication keys for Fabric Attach, the key cannot be read back for security reasons. When the key is read from the device, it always shows "****". For this reason, it might seem that there is a configuration mismatch when one does not exist.
Service Configuration Change
If you change a configured service via the Configure Device window that references one of the following, and then enforce those changes to the device, the configuration on the device might change unexpectedly:
- MLT
- SMLT
- Port-specific settings to a port belonging to an MLT or SMLT
To prevent this merge, change rows in the Enforce Preview window where MLT or SMLT are in use from Current to Desired.
To correct the issue after enforcement, modify the service on the device via the CLI.
Using the CLIP Addresses table in the Configure Device window, you can enter addresses in both IPv4 and IPv6 formats. However, Extreme Management Center version 8.5 only supports applying a single address (either IPv4 or IPv6) to a Loopback Interface.
Gateway Address Configuration Change
In versions of Extreme Management Center prior to 8.5, the Default Gateway IP Address is configured as part of the VLAN. In 8.5, the Default Gateway IP Address is configured as part of the VRF.
When enforcing VRFs to a device after upgrading to version 8.5, merge any Default Gateway IP Addresses from the device into the configuration of Extreme Management Center to prevent incorrect configuration of the device.
Upgrading VSP-8600
When upgrading from Extreme Management Center version 8.2 to version 8.3. manually reload previously discovered VSP-8600 devices to gain access to Fabric Connect features.
Removing Fabric Connect Configuration
Removing a device's Fabric Connect configuration by setting the Topology Definition to <None> may fail if the device has Logical Interfaces assigned to ISIS.
Password Configuration
Fabric Manager fails to onboard in Extreme Management Center if the root password includes an ampersand (&) character. Additionally, if the Administration > Inventory Manager > SCP tab contains a password that includes an ampersand (&) in Extreme Management Center, the Fabric Manager firmware does not download successfully.
Ensure you use a password without an ampersand (&) character.
VRF Configuration
VSP SNMP performance is adversely affected as the number of VRF configurations increases. This issue can be resolved by upgrading to VSP release 8.1.1 or later or VSP8600 series version 6.3.3 or later.
Device Configuration Information
VDX Device Configuration
To properly discover interfaces and links for VDX devices in Extreme Management Center, enable three-tuple-if
on the device.
NOTE: | To enable three-tuple-if on the device in Extreme Management Center:
|
Additionally, for Extreme Management Center to display VCS fabric , the NOS version must be 7.2.0a or later.
Rediscover VDX devices after upgrading to Extreme Management Center version 8.4.2.
VSP Device Configuration
Topology links from VSP devices to other VSP or ERS devices might not display in a topology map (or might display inconsistently). To ensure topology map links display correctly, verify that the VSP device is configured to publish its management IP address in the autotopology (SONMP) data.
Ensure that the output of show sys setting
command shows:
autotopology : on
ForceTopologyIpFlag : true
clipId-topology-ip : 0
If the output values displayed are different, configure the VSP device to publish management IP address in SONMP data by executing the following CLI commands:
(config)# autotopology
(config)# sys force-topology-ip-flag enable
(config)# default sys clipId-topology-ip
The Status of LAG links in maps will start working after the next polling following an upgrade to Extreme Management Center version 8.4. You can initiate the polling of a device by performing a refresh/rediscovery of the device.
ERS Device Configuration
ERS devices might automatically change VLAN configurations you define in Extreme Management Center. To disable this, change the vlan configcontrol
setting for ERS devices you add to Extreme Management Center by entering the following in the device command line:
CLI commands
enable
config term
vlan configcontrol flexible
Additionally, configure all VLANs on the port for an ERS device with the same tag status (tagged or untagged). If enforcing to an ERS device on which a port has at least one VLAN as tagged, Extreme Management Center adds all untagged VLANs to the tagged VLAN list and clears the untagged VLAN list.
Creating an archive for ERS devices using the Network > Archives tab does not complete successfully if Menu mode (cmd-interface menu) is used instead of CLI mode (cmd-interface cli). Use CLI mode to create the archive.
SLX Device Configuration
When creating a ZTP+ Configuration for an SLX 9240 on which firmware version 18s.01.01 or 18s.01.02 is installed, the ZTP+ process fails if the Administration Profile value uses SSH or Telnet CLI credentials. Extreme Management Center indicates that the SSH or CLI profile is not supported by the device.
To create a ZTP+ configuration for an SLX 9240:
- Create a new Device Profile with the CLI Credential set to < No Access >.
- Create the ZTP+ Configuration and select the new Device Profile you created in Step 1 as the Administration Profile.
- After the ZTP+ process successfully completes and the device is added to Extreme Management Center, select a Device Profile that uses the correct CLI credentials for the SLX device in the Administration Profile.
NOTE: | The SLX ZTP+ Connector does NOT support configuring CLI credentials on the device. |
ExtremeXOS Device Configuration
ExtremeXOS devices on which firmware version 30.3.1.6 is installed do not download and install new firmware versions successfully via the ZTP+ process. To correct the issue, access the Network > Firmware tab in Extreme Management Center, select the ExtremeXOS device you are updating via ZTP+, and change the Version field in the Details right-panel from builds/xos_30.3/30.3.1.6 to 30.3.1.6.
Firmware Upgrade Configuration Information
Extreme Management Center supports firmware downloads and uploads to devices using TFTP, FTP, SCP, and SFTP. However, before firmware images can be downloaded or uploaded from the server, Extreme Management Center needs the root path or directory for each of the protocols. The following default root paths for each protocol are configurable from the Administration > Options > Inventory Manager tab:
Protocol Root Path:
- TFTP: /tftpboot/firmware/images/
- FTP: /tftpboot/firmware/images/
- SCP: /root/firmware/images/
- SFTP: /root/firmware/images/
To upload firmware images that are 2 GB or less to the server, use the Extreme Management Center Network > Firmware tab. For files larger than 2 GB, use a third-party client (such as SCP, WinSCP, or FTP).
For example, to use SCP to upload a firmware image to the SCP root path on the server, enter the following:
scp <LOCAL_FIRMWARE_PATH> root@<Extreme Management Center_SERVER_IP>:/root/firmware/images
- Where:
- <Extreme Management Center_SERVER_IP>= IP Address to Extreme Management Center Server
- <LOCAL_FIRMWARE_PATH>= fully qualified path to a firmware image on the client machine
Wireless Manager Upgrade Information
A High Availability pair cannot be added as a flow source if the WLAN(s) selected are not in common with both wireless controllers.
Following a Wireless Manager upgrade, clear the Java Cache before starting the Extreme Management Center client.
System Requirements
IMPORTANT: | Wireless event collection is disabled by default in version 8.5 due to the increase in disk space usage required. To enable event collection, select Enable Event Collection on the Administration > Options > Event Analyzer tab. Internet Explorer is not supported in Extreme Management Center version 8.5. |
Extreme Management Center Server and Client OS Requirements
Extreme Management Center Server Requirements
These are the operating system requirements for the Extreme Management Center server.
Manufacturer | Operating System |
---|---|
Linux | Red Hat Enterprise Linux WS and ES v6 and v7 Ubuntu 18.04 |
VMware® (Extreme Management Center Virtual Engine) | VMware ESXi™ 6.0 server VMware ESXi™ 6.5 server VMware ESXi™ 6.7 server vSphere (client only)™ |
Hyper-V (Extreme Management Center Virtual Engine) | Hyper-V Server 2012 R2 Hyper-V Server 2016 |
Extreme Management Center Client Requirements
These are the operating system requirements for remote Extreme Management Center client machines.
Manufacturer | Operating System |
---|---|
Windows (qualified on the English version of the operating systems) | Windows® 10 |
Linux | Red Hat Enterprise Linux WS and ES v6 and v7 Ubuntu 18.04 |
Mac OS X® | El Capitan Sierra |
Extreme Management Center Server and Client Hardware Requirements
These are the hardware requirements for the Extreme Management Center server and Extreme Management Center client machines.
NOTES: | ExtremeControl and ExtremeAnalytics are not supported on Small Extreme Management Center servers. |
Extreme Management Center Server Requirements
Specifications | Small | Medium | Enterprise | Large Enterprise |
---|---|---|---|---|
Total CPUs | 1 | 2 | 2 | 2 |
Total CPU Cores | 8 | 16 | 24 | 24 |
Memory | 16 GB | 32 GB | 64 GB | 64 GB |
Disk Size | 240 GB | 480 GB | 960 GB | 1.92 TB |
IOPS | 200 | 200 | 10,000 | 10,000 |
Recommended scale based on server configuration: |
||||
Maximum APs | 250 | 2,500 | 25,000 | 25,000 |
Maximum Wireless MUs | 2,500 | 25,000 | 100,000 | 100,000 |
Maximum Managed Devices | 100 | 1,000 | 10,000 | 10,000 |
ExtremeControl End-Systems | N/A | 50,000 | 200,000 | 200,000 |
Statistics Retention (Days) | 90 | 180 | 180 | 360 |
ExtremeAnalytics | No | Yes | Yes | Yes |
MU Events | No | Yes | Yes | Yes |
IMPORTANT: | For optimal performance the CPU and Memory needs to reserved in the ESX Client and the virtual machine needs to be deployed using Thick Disk provisioning. |
Extreme Management Center Client Requirements
Specifications | Requirements |
---|---|
CPU Speed | 3.0 GHz Dual Core Processor |
Memory | 8 GB (4 GB for 32-bit OS) |
Disk Size | 300 MB (User's home directory requires 50 MB for file storage) |
Java Runtime Environment (JRE) (Oracle Java only) | Version 8 |
Browser1 (Enable JavaScript and Cookies) | Microsoft Edge (version 41.16.199.10000.0 in compatibility mode) Mozilla Firefox (version 34 or later2) Google Chrome (version 33.0 or later) |
1Browsers set to a zoom ratio of less than 100% might not display Extreme Management Center properly (for example, missing borders around windows). Setting your browser to a zoom ratio of 100% corrects this issue.
2When accessing Extreme Management Center using Firefox version 59.0.1 on a non-touchscreen system on which a Windows operating system is installed, the vertical scroll arrows do not display.
Virtual Engine Requirements
The Extreme Management Center, ExtremeControl, and ExtremeAnalytics virtual engines must be deployed on a VMWare or Hyper-V server with a disk format of VHDX.
- The VMWare Extreme Management Center virtual engines are packaged in the .OVA file format (defined by VMware).
- The Hyper-V Extreme Management Center virtual engines are packaged in the .ZIP file format.
IMPORTANT: | For ESX and Hyper-V servers configured with AMD processors, the Extreme ExtremeAnalytics virtual engine requires AMD processors with at least Bulldozer based Opterons. |
Extreme Management Center Virtual Engine Requirements
Specifications | Small | Medium | Large |
---|---|---|---|
Total CPU Cores | 8 | 16 | 24 |
Memory | 16 GB | 32 GB | 64 GB |
Disk Size | 240 GB | 480 GB | 960 GB |
IOPS | 200 | 200 | 10,000 |
Recommended scale based on server configuration: |
|||
Maximum APs | 250 | 2,500 | 25,000 |
Maximum Wireless MUs | 2,500 | 25,000 | 100,000 |
Maximum Managed Devices | 100 | 1,000 | 10,000 |
ExtremeControl End-Systems | N/A | 50,000 | 200,000 |
Statistics Retention (Days) | 90 | 180 | 180 |
ExtremeAnalytics | No | Yes | Yes |
MU Events | No | Yes | Yes |
IMPORTANT: | For optimal performance the CPU and Memory needs to reserved in the ESX Client and the virtual machine needs to be deployed using Thick Disk provisioning. |
ExtremeControl Virtual Engine Requirements
Specifications | Small | Medium | Enterprise |
---|---|---|---|
Total CPU Cores | 8 | 16 | 16 |
Memory | 12 GB | 16 GB | 32 GB |
Disk Size | 40 GB | 120 GB | 120 GB |
IOPS | 200 | 200 | 200 |
Recommended scale based on server configuration: |
|||
ExtremeControl End-Systems | 3,000 | 6,000 | 9,000/12,0001 |
Authentication | Yes | Yes | Yes |
Captive Portal | No | Yes | Yes/No1 |
Assessment | No | Yes | No |
1The Enterprise ExtremeControl engine configuration supports two different scale options:
- Up to 9,000 end-systems if your network uses Captive Portal functionality.
- Up to 12,000 end-systems if your network does not use Captive Portal functionality.
IMPORTANT: | For optimal performance the CPU and Memory needs to reserved in the ESX Client and the virtual machine needs to be deployed using Thick Disk provisioning. |
ExtremeAnalytics Virtual Engine Requirements
Specifications | Small | Medium | Enterprise |
---|---|---|---|
Total CPU Cores | 8 | 16 | 16 |
Memory | 12 GB | 32 GB | 64 GB |
Disk Size | 40 GB | 480 GB | 960 GB |
IOPS | 200 | 10,000 | 10,000 |
Recommended scale based on server configuration: |
|||
Flows Per Minute | 250,000 | 500,000 | 750,000 |
End-Systems | 10,000 | 20,000 | 30,000 |
Raw Flow Retention (Days) | 3.5 | 3.5 | 7 |
IMPORTANT: |
The ESXi free license supports a maximum of 8 CPU cores, and the medium and enterprise ExtremeAnalytics virtual engine installations require 16 CPU cores. Sixteen CPU cores are only available by purchasing a permanent license. To use the ExtremeAnalytics virtual engine with an ESXi free license, adjust the number of CPU cores to 8. To reduce the possibility of impaired functionality, ensure at least 4 GB of swap space is available for flow storage on the ExtremeAnalytics virtual engine. To verify the amount of
available RAM on your Linux system, use the |
Extreme Application Sensor and Analytics Virtual Engine Requirements
OVA | CPUs | Memory (GB) | Disk (GB) | Maximum Number of Monitoring Interfaces Supported |
Small | 8 | 12 | 40 | 1 |
Medium | 16 | 24 | 440 | 2 |
Large | 24 | 36 | 960 | 3 |
Fabric Manager Requirements
Specifications | Requirements |
---|---|
Total CPU Cores | 4 |
Memory | 9 GB |
Memory allocated to Java: -Xms -Xmx |
4 GB 6 GB |
Disk Size | 60 GB |
ExtremeControl Agent OS Requirements
The table below outlines the supported operating systems for end-systems connecting to the network through an ExtremeControl deployment that is implementing agent-based assessment. Additionally, the end-system must support the operating system disk space and memory requirements as provided by Microsoft® and Apple®.
Manufacturer | Operating System | Operating System Disk Space | Available/Real Memory |
---|---|---|---|
Windows1 | Windows Vista Windows XP Windows 2008 Windows 2003 Windows 7 Windows 8 Windows 8.1 Windows 10 |
80 MB | 40 MB (80 MB with Service Agent) |
Mac OS X | Catalina Tiger Snow Leopard Lion Mountain Lion Mavericks Yosemite El Capitan Sierra |
10 MB | 120 MB |
1Certain assessment tests require the Windows Action Center (previously known as Windows Security Center), which is supported on Windows XP SP2+, Windows Vista, and Windows 7, Windows 8, and Windows 8.1 operating systems.
ExtremeControl Agent support for Antivirus or Firewall products includes, but is not limited to, the following families of products:
- McAfee
- Norton
- Kaspersky
- Trend Micro
- Sophos
ExtremeControl Agent operating system support for the above products includes the latest Windows or Mac OS X versions currently available at the time of product release. The ExtremeControl Agent running on MAC Operating Systems requires Java Runtime Environment (JRE) support. Some features of various products might not be supported. For additional information on specific issues, see Known Issues and Limitations.
ExtremeControl Supported End-System Browsers
The following table outlines the supported desktop and mobile end-system browsers connecting to the network through the Mobile Captive Portal of Extreme Networks ExtremeControl.
Medium | Browser | Version |
---|---|---|
Desktop | Microsoft Edge Microsoft Internet Explorer Mozilla Firefox Google Chrome |
41 and later 11 and later 34 and later 33.0 and later |
Mobile | Internet Explorer Mobile Microsoft Edge Microsoft Windows 10 Touch Screen Native (Surface Tablet) iOS Native Android Chrome Android Native Dolphin Opera |
11 and later (Windows Phone) All versions N/A 9 and later 4.0 and later 4.4 and later All versions All versions |
NOTES: | A native browser indicates the default, system-installed browser. Although this might be Chrome (Android), this also includes the default, system-controlled browser used for a device’s Captive Network Detection for a device. Typically, this is a non-configurable option for Wi-Fi Captive Network Detection, but default Android, Microsoft and iOS devices are tested for compatibility with the Mobile Captive Portal. A mobile device can access the standard (non-mobile) version of the Captive Portal using any desktop-supported browsers available on a mobile device. |
For other browsers, the Mobile Captive Portal requires the browser on the mobile device to be compatible with Webkit or Sencha Touch.
To confirm compatibility with Webkit or Sencha Touch, open http://<ExtremeControl Engine IP>/mobile_screen_preview
using your mobile web browser.
- If the browser is compatible, the page displays properly.
- If the browser is not compatible with the Mobile Captive Portal, the following error displays:
ExtremeControl Engine Version Requirements
For complete information on ExtremeControl engine version requirements, see the Extreme Management Center Version 8.5.5 Release Notes section of these Release Notes.
ExtremeControl VPN Integration Requirements
VPN concentrators are supported for use in ExtremeControl VPN deployment scenarios.
- Supported Functionality: Authentication and Authorization (policy enforcement)
Cisco ASA
Enterasys XSR - Supported Functionality: Authentication
Juniper SA (requires an S-Series Stand Alone (SSA) system in order to provide access control)
NOTE: | For all ExtremeControl VPN Deployment scenarios, an S-Series Stand Alone (SSA) system is required to change authorization levels beyond the initial authorization, such as when using assessment. |
ExtremeControl SMS Gateway Requirements
The following SMS Gateways have been tested for interoperability with ExtremeControl:
- Clickatell
- Mobile Pronto
ExtremeControl SMS Text Messaging Requirements
The following mobile service providers are supported by default for SMS text messaging in an ExtremeControl deployment. Additional service providers can be added:
AT&T | Sprint PCS |
Alltel | SunCom |
Bell Mobility (Canada) | T-Mobile |
Cingular | US Cellular |
Metro PCS | Verizon |
Rogers (Canada) | Virgin Mobile (US and Canada) |
ExtremeAnalytics Requirements
To use an ExtremeSwitching X440-G2 switch as an Application Telemetry source for ExtremeAnalytics, install firmware version 22.4.1.4-patch2-5
or higher.
Ekahau Maps Requirements
Extreme Management Center supports importing Ekahau version 8.x maps in .ZIP format.
Guest and IoT Manager Requirements
Guest and IoT Manager Server OS Requirements
These are the operating system requirements for Guest and IoT Manager server:
Manufacturer | Operating System |
---|---|
VMware® (Extreme Management Center Virtual Engine) | VMware ESXi™ 5.5 server VMware ESXi™ 6.0 server VMware ESXi™ 6.5 server vSphere (client only)™ |
Guest and IoT Manager Outlook Add-in Client Requirements
These are the requirements for the Client Machines, which need to run Guest and IoT Manager Outlook Add-in.
Manufacturer | Operating System |
---|---|
Windows1 | Windows 7 Windows 10 |
Mac OS X | Sierra High Sierra Mojave |
1Microsoft® Outlook® 2016 is needed on Windows/Mac clients for the add-in to operate.
Guest and IoT Manager Virtual Engine Requirements
The VMWare Guest and IoT Manager virtual engines are packaged in the .OVA file format (defined by VMware) and needs an x86, 64-bit capable environment
Specifications | Minimum | Recommended |
---|---|---|
Total CPU Cores | 2 | 4 |
Memory | 2 GB | 4 GB |
Disk Size | 80 GB | 80 GB |
Interfaces | 1 Physical NIC | 3 Physical NICs |
Guest and IoT Manager Supported Browsers
The following table outlines the supported desktop and mobile browsers that can be used to launch Guest and IoT Manager Admin and Provisioner Web Application:
Medium | Browser | Version |
---|---|---|
Desktop | Microsoft Internet Explorer Mozilla Firefox Google Chrome Microsoft Edge Safari |
11 and later 63 and later 65 and later 42 and later 12 and later |
Mobile1 | iOS Native Android Chrome US Browser Opera Firefox |
9 and later 65 and later 11.5 and later 40 and later 63 and later |
1Mobile Browsers are supported only for the Guest Self-Service Provisioning flow.
Notes:
- A mobile device can access the Guest and IoT Manager Application by using any desktop-supported browsers available on a mobile device. Before login, make sure to select the Desktop site option in the browser options.
- Browsers set to a zoom ratio of less than 100% might not display Guest and IoT Manager Application properly (for example, missing borders around windows). Setting your browser to a zoom ratio of 100% corrects this issue.
- Guest and IoT Manager Application is best viewed in 1920 x 1080 resolution or higher. Lower resolutions might result in improper layouts in some cases.
- If you are using self-signed certificates, they must be added in the Trusted Root Certificate store on the client machine or you might observe issues in the “print” use cases. This is only applicable for Microsoft Edge and Microsoft Internet Explorer browsers.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
- Extreme Portal
- Search the GTAC (Global Technical Assistance Center) knowledge base, manage support cases and service contracts, download software, and obtain product licensing, training, and certifications.
- The Hub
- Connect with other Extreme customers, ask or answer questions, and share ideas and feedback. This community is monitored by Extreme Networks employees, but is not intended to replace specific guidance from GTAC.
- GTAC
- For immediate support, call 1-800-998-2408 (toll-free in U.S. and Canada) or 1-603-952-5000.
Before contacting Extreme Networks for technical support, have the following information ready:
- Your Extreme Networks service contract number and/or serial numbers for all involved Extreme Networks products
- A description of the failure
- A description of any action already taken to resolve the problem
- A description of your network environment (such as layout, cable type, other relevant environmental information)
- Network load at the time of trouble (if known)
- The device history (for example, if you have returned the device before, or if this is a recurring problem)
- Any related Return Material Authorization (RMA) numbers