Enhancements
This section lists enhancements added to this branch of the software.
Software enhancements are listed in reverse-chronological order, with the newest on the top of the list. Unless otherwise noted, each software version listed includes all enhancements added in earlier versions.
Version |
Software |
Description |
Category |
---|---|---|---|
16.10.0025 |
KB |
Support for https-based firmware downloads from Aruba Central has been added. The firmware has been embedded with trust anchor for verifying the firmware repository server certificate. Updates are made to verify the Subject Alternative Name (SAN) from the server certificate and to limit the newly added trust anchor for only https-based firmware downloads. |
Central Integration |
16.10.0024 |
KB |
No enhancements were included in version 16.10.0024. |
NA |
16.10.0023 |
KB |
No enhancements were included in version 16.10.0023. |
NA |
16.10.0022 |
KB |
The IP Auth manager feature has been added to close a TCP connection from an unauthorized client by sending a TCP RST immediately after receiving a TCP SYN packet, rather than allowing a complete three-way TCP handshake and then sending a TCP RST.
When an unauthorized client connects via the OOBM port, the existing behaviour remains unchanged.
|
Security |
16.10.0021 |
KB |
No enhancements were included in version 16.10.0021. |
NA |
16.10.0020 |
KB |
OSPF Route Filtering feature provides an option to filter the intra-area routes from installing into local FIB table. By using this, operator can create Syntax: OSPFv2: distribute-list <IP-ADDR>/<Prefix-Len> OSPFv3: distribute-list <IPV6-ADDR>/<Prefix-Len> Refer to the Aruba 3810/5400R Multicasting and Routing Guide for AOS-S Switch 16.11 and Aruba 3810/5400R IPv6 Configuration Guide for AOS-S Switch 16.11 for more information. |
OSPF/OSPFv3 |
16.10.0020 |
KB |
Added support in Device fingerprinting (DFP) module to send protocol data to Aruba Central for telemetry. Added options-list parameter to device-fingerprinting CLI. Switch software is enhanced to collect DHCP options list and up to three instances of HTTP user agent headers. Syntax: device-fingerprinting [policy]<PROFILE_NAME> dhcp [option-num <NUM> | options-list]. Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.11 for more information. |
Device Finger Printing |
16.10.0019 |
KB |
No enhancements were included in version 16.10.0019. |
NA |
16.10.0018 |
KB |
The Enrollment over Secured Transport (EST) client feature is updated to download and renew the CA certificates from an EST server independent of application certificate enrollment. A new command Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.10 and Aruba MIB and Trap Support Matrix for AOS-S Switch 16.10 for more information. |
EST |
16.10.0017 |
KB |
TCP timestamps are an extension to the original TCP stack, that was introduced to identify and reject old duplicate packets (PAWS) and to improve round-trip-time measurement. Using a scanner or other tool, an attacker can observe the TCP timestamp and determine the system uptime to gain information about the operational state of the system. To avoid such risks, a new command A MIB has also been added to enable or disable the randomization of TCP timestamp offsets. Refer to the Aruba 3810/5400R Management and Configuration Guide for AOS-S Switch 16.10 and Aruba MIB and Trap Support Matrix for AOS-S Switch 16.10 for more information. |
Security |
16.10.0017 |
KB |
This is an enhancement to an existing User-Based Tunneling To support such silent devices, a new command A MIB has also been added to enable User-Based Tunneling Wake-on-LAN (WoL) on the specified VLANs. Refer to the Aruba 3810/5400R Management and Configuration Guide for AOS-S Switch 16.10 and Aruba MIB and Trap Support Matrix for AOS-S Switch 16.10 for more information. |
Support for Silent Device |
16.10.0016 |
KB |
Added support for the new SSH data integrity algorithm hmac-sha2-256, which is defined in RFC 6668. Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.10 and Aruba 3810/5400R IPv6 Configuration Guide for AOS-S Switch 16.10 for more information. |
SSH |
16.10.0016 |
KB |
Added support to configure the size of the EAP-TLS fragments sent from the switch to the RADIUS server. Configuring EAP-TLS fragment size based on the MTU of the network avoids IP fragmentation in the network, and thus, the fragmented packets will not be dropped by the firewall or gateways. Added a MIB to indicate the maximum size of the EAP-TLS fragment sent to the RADIUS server. Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.10 and Aruba MIB and Trap Support Matrix for AOS-S Switch 16.10 for more information. |
EAP-TLS Fragmentation |
16.10.0015 |
KB |
No enhancements were included in version 16.10.0015. |
NA |
16.10.0014 |
KB |
No enhancements were included in version 16.10.0014. |
NA |
16.10.0013 |
KB |
Added support to user roles to establish user-based tunneling to tunnel voice and data traffic selectively and authenticate critical-role user in the event of RADIUS server unavailability. Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.10 and the Aruba 3810/5400R Management and Configuration Guide for AOS-S Switch 16.10 for more information. |
Enhancement in traffic tunneling and critical-role authentication |
16.10.0013 |
KB |
Added MIBs to display the count of total and operational members in a VSF and BPS stack. Refer to the Aruba MIB and Trap Support Matrix for AOS-S Switch 16.10 for more information. |
Back Plane Stacking (BPS) and Virtual Switch Framework (VSF) |
16.10.0012 |
KB |
Added |
Enhancement for |
16.10.0012 |
KB |
Added support to enable SNMP traps for a specified event. This helps to filter out particular traps from all SNMP trap messages. Syntax: |
Customization for SNMP Traps |
16.10.0012 |
KB |
Added Syntax: |
Configuration for loop-protect receiver-action |
16.10.0012 |
KB |
Added support to maintain the current role of the User Based Tunneling client in the switch instead of de-authenticating the client during controller maintenance. The client traffic flow is resumed at the switch ingress port when the controller is reachable. The client is de-authenticated when the controller is not available even after the configured maintenance period. |
Enhancement for |
16.10.0011 |
KB |
Improved performance when executing |
Performance improvements for |
16.10.0011 |
KB |
Added support to format MAC address in upper case for the Called and Calling Station IDs. Refer to the Access Security Guide for more information. |
Port Access Enhancement |
16.10.0011 |
KB |
Added support to include the Port VLAN information in RADIUS access request for all authentication types. Refer to the Access Security Guide for more information. |
Port Access Enhancement |
16.10.0011 |
KB |
Added support to enable AES 256-bit encryption for SNMP. Refer to the Management and Configuration Guide for more information. |
AES 256-bit encryption for SNMP |
16.10.0011 |
KB |
Added support to configure a prefix string along with the switch IP address or hostname in the logs sent to the Syslog servers. This helps to classify and group log entries based on the string value. Syntax: Refer to the Management and Configuration Guide for more information. |
Syslog Enhancement |
16.10.0011 |
KB |
Added support to schedule a stack or chassis reboot. Syntax: Refer to the Management and Configuration Guide for more information. |
Stacking Enhancement |
16.10.0010 |
KB |
Added support to provide the option to specify the source interface or VLAN for Central connectivity. The existing IP source-interface command is enhanced to override current configuration check for provisioning using Aruba Activate. Refer to the Management and Configuration Guide for more information. |
Source interface option for Central connectivity |
16.10.0010 |
KB |
Added support to allow more PoE devices to be connected to the switch by using Refer to the Management and Configuration Guide for more information. |
Device Profile Enhancement |
16.10.0010 |
KB |
Added support for FQDN (only IPv4) while configuring TACACS server along with the existing support of IP address. Refer to the Access Security Guide for more information. |
TACACS Option |
16.10.0010 |
KB |
Added support to work with the default setting in OpenSSH 8.2 by choosing an inherently more secure algorithm as the default on the switch for SSH communication. Refer to the Access Security Guide for more information. The list of new Host-Key algorithms are as follows:
The list of new SSH KEX algorithms are as follows:
|
Support for OpenSSH 8.2 |
16.10.0010 |
KB |
Improved performance when displaying large configurations. |
Performance improvements for |
16.10.0010 |
KB |
Added RMON logging for the failure events in SSH, Web UI, Syslog over TLS sessions, and x509 certificate processing. Refer to the Event Log Message Reference Guide for more information. |
RMON logging |
16.10.0009 |
KB |
Added support for the manager password enforcement to ensure that the switch prompts the user to configure the manager password on the switch before configuring any other features. If the manager password is not configured, then the user will have read-only access to the switch. This is applicable only to switches with factory default configuration. Refer to the Access Security Guide for more information. |
Manager Password Enforcement |
16.10.0009 |
KB |
Added support to enhance the payload size for the REST API interfaces. The increased payload size for 3810M and 54xxR platforms is 1024K. Refer to the REST API Guide for more information. |
REST API Payload Enhancement |
16.10.0009 |
KB |
Added support for Server Name Indication (SNI), which is a TLS extension defined in RFC 6066. This feature is enabled by default to include the SNI extension in the Client Hello sent from the switch to all the TLS client applications. Refer to the Access Security Guide for more information. |
Server Name Indication for TLS |
16.10.0008 |
KB |
Version 16.10.0008 was never released. |
NA |
16.10.0007 |
KB |
|
CLI |
16.10.0007 |
KB |
Added the following REST enhancements:
|
REST |
16.10.0007 |
KB |
Added support for the following 1G and 10G TAA transceivers:
|
Transceivers |
16.10.0007 |
KB |
Added support for the new activate endpoint devices-v2.arubanetworks.com which has the following two major differences compared to the old endpoint device.arubanetworks.com:
Zero Touch Provisioning (ZTP) improvements were made to deal with situations such as unresponsive DNS servers. Refer to the Management and Configuration Guide for more information. |
Zero Touch Provisioning |
16.10.0006 |
KB |
Version 16.10.0006 was never released. |
NA |
16.10.0005 |
KB |
No enhancements were included in version 16.10.0005. |
NA |
16.10.0004 |
KB |
Version 16.10.0004 was never released. |
NA |
16.10.0003 |
KB |
New command If the same client is accessing the network from multiple switches, then the accounting session ID can be duplicated. This caused issues in Clearpass where client insertion in the database failed with an error similar to Integrity Error: acct_id, calling_station_id violates check constraint. This new command alleviates that problem. |
AAA |
16.10.0003 |
KB |
Extended the device identify capability by just matching based on the attribute MAC OUI to the Sys name and Sys description attributes. |
Device profile |
16.10.0003 |
KB |
This enhancement will only be in effect if the CoA/Disconnect request has a message authenticator attribute in request packet. The message authenticator attribute is used to verify the integrity (HMAC-MD5) of the RADIUS packet. This is an optional attribute in the Access/CoA/Disconnect packet. If the received packet has this attribute in the RADIUS packet, the receiver will validate the integrity value and discard it if the value is incorrect. |
RADIUS |
16.10.0002 |
KB |
No enhancements were included in version 16.10.0002. |
NA |
16.10.0001 |
KB |
No enhancements were included in version 16.10.0001. |
NA |