Enhancements
This section lists enhancements added to this branch of the software.
Software enhancements are listed in reverse-chronological order, with the newest on the top of the list. Unless otherwise noted, each software version listed includes all enhancements added in earlier versions
|
Version |
Software |
Description |
Category |
|---|---|---|---|
|
16.11.0024 |
WC |
From this release onwards the name Aruba will be updated to HPE ANW or HPE Aruba Networking in areas that are visible to the end user. |
CLI |
|
16.11.0023 |
WC |
No enhancements were included in version 16.11.0023. |
NA |
|
16.11.0022 |
WC |
Version 16.11.0022 is unavailable for download. |
NA |
|
16.11.0021 |
WC |
No enhancements were included in version 16.11.0021. |
NA |
|
16.11.0020 |
WC |
No enhancements were included in version 16.11.0020. |
NA |
|
16.11.0019 |
WC |
No enhancements were included in version 16.11.0019. |
NA |
|
16.11.0018 |
WC
|
Support for the following 10G C-class transceivers:
|
C-Class Transceivers |
|
16.11.0017 |
WC |
Version 16.11.0017 is unavailable for download. |
NA |
|
16.11.0016 |
WC |
Support for switches to send device level stats metric information indicating the total power consumed by switch to Central. |
Central Integration |
| 16.11.0015 | WC |
Support for removing old ciphers in the host key algorithm has been added. A new configuration option has been introduced which allows customers to remove ssh-rsa ciphers. Customers will be able to remove and disable outdated ssh-rsa ciphers in the host key algorithm using ip ssh host-key-algorithm. |
SSH |
| 16.11.0015 | WC |
Support to verify VSF error logs that are being sent to Central has been introduced. The show logging command can be used in the switch to verify VSF error events. |
Central Integration |
|
16.11.0013 |
WC |
No enhancements were included in version 16.11.0014. |
NA |
|
16.11.0013 |
WC |
No enhancements were included in version 16.11.0013. |
NA |
|
16.11.0012 |
WC |
Support for https-based firmware downloads from Aruba Central has been added. The firmware has been embedded with trust anchor for verifying the firmware repository server certificate. Updates are made to verify the Subject Alternative Name (SAN) from the server certificate and to limit the newly added trust anchor for only https-based firmware downloads. |
Central Integration |
|
16.11.0011 |
WC |
No enhancements were included in version 16.11.0011. |
NA |
|
16.11.0010 |
WC |
The User Role feature of the switch is enhanced to allow configuring the authentication client limits for a port. The following new attributes are added under the device context of User Role.
When a client is authenticated with an user role with above attributes, the ports client limit is temporarily overridden. Multiple overrides are allowed on same port using user role or RADIUS VSA, only if the new limits are greater than already applied limit. |
User Role |
|
16.11.0009 |
WC |
Version 16.11.0009 is unavailable for download. |
NA |
|
16.11.0008 |
WC |
No enhancements were included in version 16.11.0008. |
NA |
|
16.11.0007 |
WC |
A new configuration option is added in LLDP to mention which VLANs IP address should be included in the outbound LLDP advertisements of switch ports. The IPv4/IPv6 address configured statically or dynamically assigned through DHCP on the specified management VLAN will be included in the outbound LLDP advertisements. Syntax: [no] lldp management-address vlan <vid>
|
LLDP |
|
16.11.0007 |
WC |
To provide a secured management connection to the switch, the following improvements are made:
The above configuration changes will be applied on firmware upgrade of switches with default configuration, i.e. only for switches that meet the following configuration criteria:
|
Security |
|
16.11.0006 |
WC |
The IP Auth manager feature has been added to close a TCP connection from an unauthorized client by sending a TCP RST immediately after receiving a TCP SYN packet, rather than allowing a complete three-way TCP handshake and then sending a TCP RST.
When an unauthorized client connects via the OOBM port, the existing behaviour remains unchanged.
|
Security |
|
16.11.0005 |
WC |
No enhancements were included in version 16.11.0005. |
NA |
|
16.11.0004 |
WC |
OSPF Route Filtering feature provides an option to filter the intra-area routes from installing into local FIB table. By using this, operator can create Syntax: OSPFv2: distribute-list <IP-ADDR>/<Prefix-Len> OSPFv3: distribute-list <IPV6-ADDR>/<Prefix-Len> Refer to the Aruba 3810/5400R Multicasting and Routing Guide for AOS-S Switch 16.11 and Aruba 3810/5400R IPv6 Configuration Guide for AOS-S Switch 16.11 for more information. |
OSPF/OSPFv3 |
|
16.11.0004 |
WC |
Added support in Device fingerprinting (DFP) module to send protocol data to Aruba Central for telemetry. Added options-list parameter to device-fingerprinting CLI. Switch software is enhanced to collect DHCP options list and up to three instances of HTTP user agent headers. Syntax: device-fingerprinting [policy]<PROFILE_NAME> dhcp [option-num <NUM> | options-list]. Refer to the Aruba 3810/5400R Access Security Guide for AOS-S Switch 16.11 for more information. |
Device Finger Printing |
|
16.11.0003 |
WC |
The Enrollment over Secured Transport (EST) client feature is updated to download and renew the CA certificates from an EST server independent of application certificate enrollment. A new command Refer to the Aruba 2930M/2930F Access Security Guide for AOS-S 16.11 and Aruba MIB and Trap Support Matrix for AOS-S 16.11 for more information. |
EST |
|
16.11.0002 |
WC |
TCP timestamps are an extension to the original TCP stack, that was introduced to identify and reject old duplicate packets (PAWS) and to improve round-trip-time measurement. Using a scanner or other tool, an attacker can observe the TCP timestamp and determine the system uptime to gain information about the operational state of the system. To avoid such risks, a new command A MIB has also been added to enable or disable the randomization of TCP timestamp offsets. Refer to the Aruba 2930F/2930M Management and Configuration Guide for AOS-S 16.11 and Aruba MIB and Trap Support Matrix for AOS-S 16.11 for more information. |
Security |
|
16.11.0002 |
WC |
This is an enhancement to an existing User-Based Tunneling To support such silent devices, a new command A MIB has also been added to enable User-Based Tunneling Wake-on-LAN (WoL) on the specified VLANs. Refer to the Aruba 2930F/2930M Management and Configuration Guide for AOS-S 16.11 and Aruba MIB and Trap Support Matrix for AOS-S 16.11 for more information. |
Support for Silent Device |
|
16.11.0001 |
WC |
Updated all non-inclusive terminologies. Refer to Terminology Change for more information. |
- |