V9.0.1e1 Releasenotes Digest Edition v5.0
V9.0.1e1 Releasenotes Digest Edition v5.0
V9.0.1e1 Releasenotes Digest Edition v5.0
1e1
Fabric OS v9.0.1e Release Notes Digest
Version 5.0
Broadcom FOS-901e-RN
November 8, 2022
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Copyright © 2022 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
For more information, go to www.broadcom.com. All trademarks, trade names, service marks, and logos referenced
herein belong to their respective companies.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve
reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However,
Broadcom does not assume any liability arising out of the application or use of this information, nor the application or
use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of
others.
The product described by this document may contain open source software covered by the GNU General Public License
or other open source license agreements. To find out which open source software is included in Brocade products, to
view the licensing terms applicable to the open source software, and to obtain a copy of the programming source code,
please download the open source disclosure documents in the Broadcom Customer Support Portal (CSP). If you do not
have a CSP account or are unable to log in, please contact your support provider for this information.
Use of all versions of Brocade’s Fabric OS is subject to the terms and conditions of the Brocade Fabric Operating System
and Feature Licenses and License Keys End User License Agreement, effective October 1, 2019, as amended by Brocade
from time to time. It is the user’s responsibility to understand and comply with the terms of the EULA. By downloading,
installing, using, posting, distributing or otherwise making available FOS, you agree to be bound on an ongoing basis by
the EULA as updated by Brocade from time to time.
Broadcom FOS-901e-RN
2
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Table of Contents
11.1.1.1 Loading FOS PSDs via Web Tools or FOS Command Line ........................................... 24
11.1.1.2 Loading FOS PSDs via Brocade SANnav Management Portal ...................................... 24
Broadcom FOS-901e-RN
4
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Revision History...................................................................................................................................................54
Broadcom FOS-901e-RN
5
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Chapter 1: Preface
If you purchased Brocade product support directly from Broadcom, use one of the following methods to contact the
Technical Assistance Center 24x7. For product support information and the latest information on contacting the
Technical Assistance Center, go to www.broadcom.com/support/fibre-channel-networking/contact-brocade-support.
Online Telephone
For nonurgent issues, the preferred method is to log on to the For Severity 1 (critical) issues, call Brocade Fibre Channel
Support portal at support.broadcom.com. (You must initially Networking Global Support at one of the phone numbers listed at
register to gain access to the Support portal.) Once registered, www.broadcom.com/support/fibre-channel-networking/contact-
log on and then select Brocade Products. You can now brocade-support.
navigate to the following sites:
Case Management
Software Downloads
Licensing
SAN Reports
Brocade Support Link
Training & Education
If you purchased Brocade product support from a Broadcom OEM/solution provider, contact your OEM/solution
provider for all your product support needs.
• OEM/solution providers are trained and certified by Broadcom to support Brocade products.
• Broadcom provides backline support for issues that cannot be resolved by the OEM/solution provider.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade
expertise. For more information on this option, contact Broadcom or your OEM.
For questions regarding service levels and response times, contact your OEM/solution provider.
To expedite your call, have the following information immediately available:
General Information:
Technical support contract number, if applicable.
Switch model.
Switch operating system version.
Error numbers and messages received.
supportSave command output and associated files.
For dual-CP platforms running Fabric OS 6.2 and above, the supportSave command gathers information from
both CPs and any AP blades installed in the chassis.
Detailed description of the problem, including the switch or fabric behavior immediately following the problem and
any specific questions.
Description of any troubleshooting steps already performed and the results.
Serial console and telnet session logs.
Broadcom FOS-901e-RN
6
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FT00X0054E9
White papers and data sheets are available at www.broadcom.com. Product documentation for all supported releases is
available at myBroadcom to registered users. Registered users can also find release notes at myBroadcom.
Broadcom FOS-901e-RN
7
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
The following sections outline how to locate and download Brocade product manuals and release notes from Broadcom
and myBroadcom. Although the illustrations show Fibre Channel and Fabric OS (FOS), they work for all Brocade products
and operating systems.
Broadcom FOS-901e-RN
8
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
• Click the Product Search box, select FIBRE CHANNEL NETWORKING, and select a product from the
product list.
The list of documents and software available for the product displays.
4. Clear the Software check box to list only the documents and release notes.
Broadcom FOS-901e-RN
9
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Quality is our first concern and we have made every effort to ensure the accuracy and completeness of this document. If
you find an error or omission or you think that a topic needs further development, we want to hear from you. You can
provide feedback by sending an email to [email protected]. Provide the publication title, publication
number, and as much detail as possible, including the topic heading and page number, as well as your suggestions for
improvement.
Broadcom FOS-901e-RN
10
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Chapter 3: Overview
Broadcom FOS-901e-RN
11
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-823847 - TruFOS Certificate cannot be installed on switches running 9.0.1e from SanNAV server.
FOS-823847 - Switch panic after cald failed to allocate memory for maintaining keep alive with ESRS.
FOS-838047 - During the FOS upgrade process, initiated from SANnav, directors can experience unexpected reboots
during the upgrade process. In each director where this occurred the FOS upgrade had completed on
the Standby CP and then an unexpected reboot occurred. Both CR blades reset and started POST
diagnostics.
FOS-838223 - Devices connected to Gen7 switch with default allaccess zone cannot communicate to each other in
FICON environment.
FOS-839056 - Frame drops affecting entire fabric after creating smaller trunks from larger trunks.
FOS-839186 - Code upgrade turned into cold recovery when weblinker cannot restart in time, or on a normal
operation switch, user may encounter failures in config change operations (e.g. portcfg or lscfg)
Broadcom FOS-901e-RN
12
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-837563 - Brocade G630 switch (Switch type = 184) may experience sudden reboot - resets.
FOS-837280 - Boot over SAN device cannot boot up after upgrading firmware on 32G FC switches.
FOS-837583 - SNMP daemon leaks memory and causes switch to hafailover/hareboot/panic when switch runs out of
memory.
FOS-835201 - After upgrading to FOS v9.0.0, observed that both CPs on X6 director go into a rolling panic, back and
forth, every couple of minutes.
FOS-834912 - SANnav reports error: "Registration for telemetry profile 'xxx' has failed and Switch panic after cald
termination.
FOS-826227 - Devices in default allaccess zone cannot communicate to each other across LISLs in FICON environment
on all platforms.
Broadcom FOS-901e-RN
13
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-832100 - A switch operating in AG mode, or while operating with Flow Vision enabled can observe a cold reboot
when attempting to capture a SupportSave, SupportShow or FemDump output.
FOS-823675 - On a 32G DWDM port, D_Port diagnostics fails on the spinfab throughput test and DWDM line flips fail.
FOS-830052 - Port initialization interop issues with a certain SFP, when connecting to a specific 3rd device. This may
result in some ports showing errors and some going into no_sync, port_Flt state.
FOS-831875 - SNMP application may lose connection to switch momentarily during SNMP walk of IPV6 address table
and occasionally the user may observe CP lost HA SYNC if the walk is performed during
hafailover/hareboot.
Broadcom FOS-901e-RN
14
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
7.1.1 Enhancements
FOS v9.0.1b includes additional optimizations to the tuning parameters for 64G ports intended to provide improved
performance and long-term stability and reliability. These changes complement the 64G SFP module firmware
enhancements described in the next section and ensure the highest level of signal integrity for robust 64G link
behaviour. Customers currently running FOS v9.0.1a with active 64G ports are highly encouraged to upgrade to v9.0.1b
at their earliest convenience.
FOS v9.0.1b contains an updated version of the 64G SFP module firmware with improvements to RX Jitter tolerance,
additional error logging for debugging, and other minor improvements. While it is not critical that 64G SFPs be upgraded
immediately, it is highly recommended that users confirm their current 64G SFP module firmware levels; and if
determined to be down-level, upgrade to the latest version available at the earliest convenient opportunity. Note that
there may be newer SFP firmware versions available than the version available in FOS v9.0.1b.
To verify the version of firmware currently running on the 64G SFPs, refer to the sfpupgrade command
enhancements described in Modified Software Features. The latest SFP module firmware versions available at the time
of this Release Note document publication are:
MCU: 0x17
DSP: 0xda0718
Contact your support provider for more information or for assistance on upgrading 64G SFP module firmware.
Note: Upgrading 64G SFP modules is disruptive to the port with the module being upgraded but is not disruptive to the
switch or other ports. Optics module firmware upgrades can be performed on an individual port basis or on a
range of ports.
Broadcom FOS-901e-RN
15
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
This release of FOS is available for entitled equipment download in Platform Specific Download (PSD) form.
For more detail, see Platform Specific Downloads.
NOTE The MCU and DSP version displayed refer to the version available in this FOS release. Contact your
provider regarding newer available code.
Broadcom FOS-901e-RN
16
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
8.1 Hardware
The following section lists new hardware introduced with this release.
Broadcom FOS-901e-RN
17
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
The SNMP CLI command snmpTraps –send suboption ip-address is not supported in FOS v9.0.1a.
The CLI command sfpupgrade is only intended for maintenance operations under the direction of Brocade
Support.
This software conforms to the Fibre Channel standards in a manner consistent with accepted engineering practices and
procedures. In certain cases, Brocade might add proprietary supplemental functions to those specified in the standards.
For a list of FC standards conformance, visit the following Broadcom SAN Standards website:
https://www.broadcom.com/support/fibre-channel-networking/san-standards/
Broadcom FOS-901e-RN
18
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Fabric OS v9.0 includes all basic switch and fabric support software, as well as optionally licensed software that is
enabled via license keys or license files.
Optionally licensed features include:
Brocade Ports on Demand – This license allows customers to instantly scale the fabric by provisioning additional SFP
ports via license key upgrade. (Applies to select switch models.)
Brocade Q-Flex Ports on Demand – This license allows customers to further scale the fabric and increase flexibility by
provisioning additional 4x32G QSFP ports via license key upgrade. (Applies to the Brocade G620 and G630 only.)
Brocade Extended Fabrics – This license provides greater than 10 km of switched fabric connectivity at full bandwidth
over long distances (depending on the platform, this can be up to 3000 km).
Brocade ISL Trunking – This license provides the ability to aggregate multiple physical links into one logical link for
enhanced network performance and fault tolerance. It also includes Access Gateway ISL Trunking on those products that
support Access Gateway deployment.
Brocade Fabric Vision – This license enables support for MAPS (Monitoring and Alerting Policy Suite), Flow Vision, and
ClearLink (D_Port) when connecting to non-Brocade devices. MAPS enables rules-based monitoring and alerting
capabilities, and it provides comprehensive dashboards to quickly troubleshoot problems in Brocade SAN environments.
Flow Vision enables host-to-LUN flow monitoring, application flow mirroring for nondisruptive capture and deeper
analysis, and a test traffic flow generation function for SAN infrastructure validation. Support for D_Port to non-Brocade
devices allows extensive diagnostic testing of links to devices other than Brocade switches and adapters.
NOTE On Brocade G620, G630, Brocade X6-8, and Brocade X6-4 platforms, this license enables the use of
IO Insight capability. The license itself is identified as “Fabric Vision and IO Insight” on these
platforms.
FICON Management Server – Also known as CUP (Control Unit Port), this license enables host control of switches in
mainframe environments.
Integrated Routing – This license allows any Fibre Channel port in a Brocade X7-4, X7-8, G720, and G620 to be
configured as an EX_Port supporting Fibre Channel Routing (FCR).
Integrated Routing Ports on Demand – This license allows any Fibre Channel port in a Brocade 7810, G630, X6-8, or X6-4
to be configured as an EX_Port supporting Fibre Channel Routing. The maximum number of EX_Ports supported per
platform is provided in the license.
ICL POD License – This license activates ICL ports on X6 or X7 platform core blades. An ICL license must be installed on
the director platforms at both ends of the ICL connection.
On the Brocade X6-8:
The first ICL POD license enables 8 UltraScale ICL QSFP ports on each core blade of the X6-8 director, which are QSFP
port numbers 0-3 and 8-11. The second ICL POD license enables all UltraScale ICL QSFP ports on each core blade of
the director.
Broadcom FOS-901e-RN
19
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
The following licenses are available in Fabric OS 9.0 as either universal temporary or regular temporary licenses:
Fabric (E_Port)
Extended Fabric
Trunking
Integrated Routing
Integrated Routing Ports on Demand
FICON Management Server (CUP)
Fabric Vision
Extension Upgrade
NOTE Temporary licenses for features available on a per-slot basis enable the feature for any and all slots
in the chassis.
Broadcom FOS-901e-RN
20
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Temporary and universal temporary licenses have durations and expiration dates established in the licenses themselves.
FOS will accept up to two temporary licenses and a single universal license on a unit. Universal temporary license keys
can be installed only once on a particular switch, but they can be applied to as many switches as desired. Temporary use
duration (the length of time for which the feature will be enabled on a switch) is provided with the license key. All
universal temporary license keys have an expiration date after which the license can no longer be installed on any unit.
Temporary or universal temporary license for Extension Upgrade do not enable additional ports on 7810.
Broadcom FOS-901e-RN
21
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Broadcom FOS-901e-RN
22
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
For the list of supported power supplies for Brocade X6 and power supply requirements, refer to the Brocade X6
Director Technical Specifications section of Brocade X6-8 Director Hardware Installation Guide and Brocade X6-4 Director
Hardware Installation Guide.
For the list of supported power supplies for Brocade X7 and power supply requirements, refer to the Brocade X7 Director
Technical Specification.
For a list of supported fibre optic transceivers that are available from Brocade, refer to the latest version of the Brocade
Transceiver Support Matrix available online at www.broadcom.com.
Broadcom FOS-901e-RN
23
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
This release of FOS is available for entitled equipment download in Platform Specific Download (PSD) form. FOS PSD
releases provide a smaller version of the FOS image that can only be loaded on a single hardware platform, consisting of
a single switch model or group of switch models. These FOS PSD images enable much faster download and file transfer
times since they are between 65-90% smaller in size than traditional full FOS images.
Unlike traditional FOS release images that can be installed on any supported Brocade switch and director, FOS PSD
images must be downloaded separately for each platform that the FOS release will be used on. The full list of unique
FOS PSD images available for this release and the models that each PSD image supports is noted in section FOS Image
Filenames.
11.1.1.1 Loading FOS PSDs via Web Tools or FOS Command Line
Installing a FOS PSD image on a switch is performed in the same manner as using a traditional full FOS image. If a FOS
PSD image is loaded on an incorrect switch model (for example, attempting to load a FOS PSD image for a Gen 6 entry
level switch on a Gen 6 Director), the following error message displays:
Cannot download the requested firmware because the firmware doesn't support this platform. Please enter
another firmware.
Brocade SANnav Management Portal version 2.1.1 or earlier does not support FOS PSD images. However, FOS PSD
images are supported with SANnav 2.1.1.3 and later releases. SANnav 2.1.1.3 and later can both host and install FOS PSD
images onto Brocade switches.
Broadcom FOS-901e-RN
24
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Fabric OS v9.0.1e
v9.0.1e_LW.tar.gz* Fabric OS v9.0.1e LW for Linux to install on G610 Lifetime Warranty platforms
v9.0.1e_LW.zip* Fabric OS v9.0.1e LW for Windows to install on G610 Lifetime Warranty platforms
v9.0.1e_G6G7_DIR.zip Fabric OS v9.0.1e for Windows to install on X6-8, X6-4, X7-8 and X7-4 platforms
v9.0.1e_releasenotes_v1.pdf Fabric OS v9.0.1e Release Notes
* Lifetime Warranty PSD image may be unavailable in the future when newer versions on the same FOS code level are
made available. Current posting status for all releases of Brocade Fabric OS is in the Brocade Software: Software Release
Support and Posting Matrices published to the Brocade Product End-of-Life web page
https://www.broadcom.com/support/fibre-channel-networking/eol.
The image files for each respective platform can be downloaded from https://www.broadcom.com/mybroadcom,
except for YANG files which are available on https://www.broadcom.com.
Broadcom FOS-901e-RN
25
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
This section contains important details to consider before migrating to or from this FOS release.
Any Brocade platform listed in the Supported Devices section running any FOS v8.2 version can be non-disruptively
upgraded to FOS v9.0.1e.
Any Brocade platform listed in the Supported Devices section running any FOS 8.1 version must be upgraded to
FOS v8.2.x firmware before it can be non-disruptively upgraded to FOS v9.0.1e.
When upgrading to Fabric OS v9.0.1x in fabrics where DH-CHAP authentication is enabled on ISLs (E_Port
authentication), ensure that the DH-CHAP secret is not the same on both sides of the ISL (E_Ports). See KB Article 14542
and a more detailed description in the Security section of Important Notes.
Disruptive upgrades to Fabric OS v9.0.1x are allowed and are supported from FOS 8.1.x (up to a two-level migration)
using the optional -s parameter with the firmwaredownload command.
On Gen 7 platforms, firmware downgrades from FOS v9.0.1x are not allowed when 64G optics are installed.
On a Brocade G610 firmware downgrades from FOS v9.0.1x to FOS v8.2.0x or earlier versions are not allowed.
On a Brocade G610 with switchType as 170.4 or higher, the minimum required FOS version is FOS v9.0.1b. Firmware
downgrades to earlier versions are not allowed.
On a Brocade G620 with switchType as 183 or a Brocade G630 with switchType as 184, the minimum required
FOS version is FOS v9.0.0. Firmware downgrades to FOS v8.2.x or earlier versions are not allowed.
Broadcom FOS-901e-RN
26
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
On any Brocade SAN switch platform, firmware upgrade to FOS v9.0.0 or later must acknowledge and accept the EULA
before FOS can be installed. On any Brocade SAN switch platform running FOS v9.0.0 or later, firmware upgrade or
downgrade must acknowledge and accept the EULA before FOS can be installed.
On a Brocade X6 director with SX6 blades and port channels configuration, firmware downgrades from FOS v9.0.0 or
later to FOS v8.2.x should downgrade to FOS v8.2.2c or FOS v8.2.1e first to avoid CP crash.
On a Brocade X7 director and G720 switch, non-disruptive upgrade from FOS v9.0.0 to this release is not supported. On
these platforms, upgrade from FOS v9.0.0 using the optional -s parameter with the firmwaredownload command is
supported. In addition, firmware downgrade from this release to FOS v9.0.0 on these platforms is blocked. Performing
firmarecleaninstall to FOS v9.0.0 on these platforms should be avoided.
On a Brocade 7810 and Brocade X6 director with SX6 blade with following optics part number installed, firmware
downgrade from this release to FOS v8.2.2b or earlier is blocked:
32Gb/s Fibre Channel SWL SFP (part number 57-1000485-01)
32Gb/s Fibre Channel LWL SFP (part number 57-1000486-01)
16Gb/s Fibre Channel SWL SFP (part number 57-1000487-01)
16Gb/s Fibre Channel LWL SFP (part number 57-1000488-01)
16Gb/s Fibre Channel ELWL SFP (part number 57-1000489-01)
Refer to the Brocade Fabric OS Software Upgrade User Guide for detailed instructions on non-disruptive and disruptive
upgrade procedures.
Broadcom FOS-901e-RN
27
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
This chapter contains information that you should consider before you use this Fabric OS release.
12.1 Scalability
All scalability limits are subject to change. Limits may be increased once further testing has been completed, even after
the release of this version of the Fabric OS software. For current scalability limits for Fabric OS software, refer to the
Brocade SAN Scalability Guidelines for Brocade Fabric OS 9.X document.
12.2 Compatibility/Interoperability
Broadcom FOS-901e-RN
28
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
NOTE Web Tools will always show English language irrespective of Browser or Operating System language
setting.
Broadcom FOS-901e-RN
29
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
1
Brocade MXG610 is also supported with FOS v8.1.0_lnx2 release.
2
Support merged from embedded FOS releases to mainline FOS releases.
3
Brocade G648 is also supported with FOS v8.2.0_gft release.
Broadcom FOS-901e-RN
30
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
YANG is a standard data modelling language that defines the data sent over the FOS REST API. Each FOS REST API
module is defined in a YANG module file with a .yang name extension. To download the Brocade FOS-specific YANG files
from the Broadcom website, perform the following steps:
1. Go to https://www.broadcom.com/.
2. Select Group “Fibre Channel Networking”, Family “Fibre Channel Networking” and search for keyword
“YANG”.
3. The YANG files can be located under the Programming Guide category.
4. Navigate to the link for the Fabric OS package file, either for Windows or for Linux, and download it to your disk.
5. Unzip or untar the Fabric OS package file; the yang.tar.gz file contains the collection of YANG module files that
this FOS release version supports. Untar the yang.tar.gz file to obtain individual YANG module files.
Alternatively, download the YANG files for a specific FOS version from https://github.com/brocade/yang.
Broadcom FOS-901e-RN
31
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
D_Port tests will fail between a port with a 64G optic on a switch or director operating with FOS v9.0.1b and a port on a
G720, X7, G620 (switchType 183), or G630 (switchType 184) operating with FOS v9.0.0x. Any of these platforms
operating with FOS v9.0.0x should be upgraded to FOS v9.0.1a or later prior to running D_Port tests to a 64G optic.
If Diagnostic POST is enabled, supportSave should not be started until the POST tests are completed after a
switch or director boots up. Starting supportSave collection when POST tests are still running can result in
unpredictable behaviour.
Running systemverification with the increased no.of.runs parameter in a Director with an FC32-64 blade
can cause test failures to be reported. Limit the number of runs to less than four (4).
12.3.5 DWDM
For best performance and resiliency when deploying native FC ISLs over DWDM, best practice is to deploy distinct
ISLs over DWDM with in-order delivery (iodset) configured on the switches.
Trunking over DWDM is not generally recommended due to the risk of out-of-order frame delivery. Trunking relies
on deterministic deskew values across all trunked links to provide in-order delivery as well as FC primitives for trunk
formation. These deskew values cannot be guaranteed with DWDM equipment in the path.
Use of trunking over DWDM links should only be done when validated and supported by the DWDM vendor.
With Gen 7 switches the permitted deskew (variance in latency due to difference in cable length) is less than with
Gen 5 or Gen 6 switches to ensure high performance across trunks at all supported speeds, including 16G and 32G.
4
Adapter firmware or driver versions that are later than the ones listed in the table may not work.
Broadcom FOS-901e-RN
32
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
12.3.7 Extension
Extension between a Brocade 7810 or SX6 running FOS v9.0.x and a Brocade 7840 is supported only if the 7840 is
running FOS v8.2.1 or later. The following table documents the combinations.
Site1 Switch/Blade Site1 Firmware Site2 Switch/Blade Site2 Firmware
7840 8.2.1 or later 7840 8.2.1 or later
SX6 9.0.0 or later 7840 8.2.1 or later
7810 9.0.0 or later 7840 8.2.1 or later
12.3.8 FcoE
The following topologies for FcoE on the FC32-64 are not supported with FOS v9.0.x:
Cisco UCS server directly connected to the FC32-64 without a Fabric Interconnect module.
Cisco UCS server with a Fabric Interconnect module connected to the FC32-64 via a Nexus 5000 series switch in
between. Neither running FcoE NPV mode nor L2 switching mode on the Nexus 5000 is supported.
FcoE devices are supported in edge-to-edge fabric topology. They are not supported in edge-to-backbone fabric
topology over FCR configurations.
12.3.9 FC-NVMe
FC-NVMe is supported in edge-to-edge fabric topology with device type information (e.g. Initiator or Target) over
FCR configurations.
FC-NVMe is supported in edge-to-backbone fabric topology without device type information over FCR
configurations.
Broadcom FOS-901e-RN
33
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
12.3.11 MAPS
MAPS monitoring of UCS server login does not support the FENCE action even though the mapsrule command does
not block the configuration.
12.3.12 Security
FOS v9.0.x requires passwords for admin and user accounts to be changed from default password string “password”.
In the following scenarios, default password may still be present in FOS v9.0.x. It is recommended to change the
password in this scenario or at the next login prompt:
– A default password is used in an earlier FOS version. FOS is upgraded from the earlier FOS version to FOS v9.0.x.
– A default password is used in an earlier FOS version on active CP. The standby CP runs FOS v9.0.x and becomes
active due to HA failover.
– A default password is used in an earlier FOS version. Password is distributed from the earlier FOS version to FOS
v9.0.x.
It is recommended to reconfigure shared secrets for F_Port authentication between Access Gateway and switch
before firmware upgrade to FOS v9.0.x. The shared secrets should be configured as given in the following table.
Access Gateway FOS Edge Switch FOS Shared Secret Configuration
Version Version
It is recommended to reconfigure shared secrets for F_Port authentication between HBAs and a switch before the
switch is upgraded to FOS v9.0.0 or later. Without reconfiguration, shared secrets configured in earlier FOS versions
will fail F_Port authentication when a device port resets. The shared secrets should be configured as given in the
following table.
FOS Version Shared Secret Configuration
Broadcom FOS-901e-RN
34
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS v9.0.x does not support F_Port authentication to Marvell Qlogic BR series (Former Brocade Product Line) HBAs
as these HBAs only support legacy Brocade F_Port authentication. For these devices to connect to FOS v9.0.x, F_Port
authentication must be disabled.
FOS v9.0.x does not support F_Port trunking when F_Port authentication is enabled.
When FIPS-Inside is enabled in FOS v9.0.x, only integrity test will run. Self-tests will not run.
If users configure any duplicated Virtual Fabric (VF) list with ldapcfg –mapattr <ldaprole> command,
only the first mapping from the list will be used during LDAP authentication and authorization.
FOS 9.0 default cipher string will support additional ciphers. To maintain equivalent ciphers as in versions earlier
than 9.0.0, please use the cipher string ‘!ECDH:!DH:HIGH:-MD5:!CAMELLIA:!SRP:!PSK:!AESGCM:!AESCCM:!ARIA:DES-
CBC3-SHA’ in the secCryptoCfg templates.
If users had configured syslog cipher in FOS v8.1.0b or later, then firmware downgraded the switch to FOS v8.1.0a,
the switches are recommended upgrade to v8.1.0b or later first before upgrading to FOS v9.0.0 or later.
FOS 9.0.x requires role mapping or VSA attributes to be configured for LDAP user authentication in a VF enabled
switch. In a non-VF switch, ldapcfg --maprole is mandatory. It should be configured before upgrading to
FOS v9.0.x to avoid login failure for LDAP users.
Users must specify the domain of an LDAP server when adding the LDAP server to the remote AAA configuration of a
switch.
Self-signed certificates generated in FOS v9.0.0 for HTTPS may report warnings when used with some applications.
The certificate may need to be re-generated after upgrade to FOS v9.0.0a using the command seccertmgmt
generate -cert https.
Optional certificate extensions, such as BasicConstraints, KeyUsage, and ExtendedKeyUsage are ignored when a
certificate containing these is imported in basic mode. During session establishment, the extensions are validated.
Hence, invalid extensions will be rejected and result in session failure.
Login of LDAP users using Distinguished Name (DN) will be supported only for the users created in container “Users”
of the domain configured in the switch, even though the switch is configured with Global Catalog (GC) port of the
server. Login using User Principal Name (UPN) and sAMAccountName will be supported irrespective of the domain
and OU on which the user is created.
When upgrading to Fabric OS v9.0.1x in fabrics where DH-CHAP authentication is enabled on ISLs (E_Port
authentication), ensure that the DH-CHAP secret is not the same on both sides of the ISL (E_Ports). Fabrics with
authentication enabled using the same DH-CHAP secret on both sides of the ISL will not encounter an issue while
running FOS v8.x and upgrading to FOS 9.x will be successful. However, the next time the ISL "bounces" and since
the "secrets" on both sides of the ISL match, the authentication will fail as per the FC-SP-2 specification,
consequently the ISL link will not form. Per KB Article 14542, the recommended operation is one of the following
options:
– If it is prior to upgrading to FOS v9.x, verify or implement different secrets for DH-CHAP at each side of the ISL.
– If you have already upgraded to FOS v9.x, verify or implement different secrets for DH-CHAP at each side of the
ISL prior to taking any ISLs offline.
Customers that have already configured different secrets on each side of the ISL link will not encounter any issue
upgrading, and customers that have not enabled E_Port Authentication will also not encounter any issue.
Broadcom FOS-901e-RN
35
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
12.3.13 Zoning
If there are TI Zones or unsorted zones in a configuration file downloaded by configdownload and the zones do
not already exist in the zoning database when configdownload runs, the membership list of any zones in the
configuration file will be automatically sorted. If the TI Zones or unsorted zones that are downloaded already exist in
the zone database, then the member lists will remain unsorted. As a result, when a switch is enabled after
configdownload, port segmentation may occur due to adjacent switches having the same zones with unsorted
membership lists. To avoid this condition, users should not run cfgClear before configdownload. Users can
recover from segmentation by executing cfgDisable, cfgClear, and cfgSave operations to clear the zoning
database from one side of the segmented fabric. Note that these steps should only be performed if the zone
database is the same on the configdownload switch as it is on the rest of the fabric. After segmented ISL ports
are re-enabled, zone merge can proceed.
After an X6 director completes the field migration to upgrade to X7 director, (Domain, Index) (D,I) zones must be
converted to the new index assigned to X7 directors that follow unified addressing mode assignment.
12.3.15 Miscellaneous
Brocade X7 directors have pre-installed Brocade Trusted FOS (TruFOS) Certificates. Although TruFOS Certificates do
not currently enable any features or functionality, certificate status is available in the license --show command
output, and MAPS monitors and alerts for upcoming expiration in default policies. New or updated TruFOS
Certificates can be obtained by contacting your support provider.
On a switch configured with Virtual Fabrics, SNMP will dispatch the traps/informs only from Virtual Fabrics that the
user associated with the SNMPv3 traps/informs the receiver has access to.
After a power supply unit is removed from a Brocade G620, the historyshow command may miss the entries for
this FRU removal or insertion event. In addition, the RASLog error message EM-1028 may be logged when the power
supply is removed. This condition can be corrected by power-cycling the switch.
After running offline diagnostics mode 1 on QSFP ports, a Brocade G620 must be rebooted before operational use.
After running offline diagnostics with portledtest, portloopbacktest, or turboramtest commands on
FOS v9.0.x, Brocade G630 with swtichType 184 must be rebooted before operational use.
All links in an ICL QSFP connection on a Brocade X6 Director must be configured to the same speed using the
portcfgspeed command from one of the following supported speeds: 16Gb/s, 32Gb/s, or ASN. To connect an ICL
from an X6 with a 4x32GFC breakout optic (P/N 57-1000351-01) or a 4x16G FC optic to a 4x16G FC optic in a DCX
8510, the X6 port’s speed must be set to 16Gb/s.
Brocade G630 LEDs illuminate amber and green during power-up.
Broadcom FOS-901e-RN
36
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
The CLI command option snmpconfig -set accesscontrol is planned to be deprecated in the next major
release.
When replacing a FC32-64 blade with a FC32-48 blade, flexport and FcoE configurations should be removed before
the FC32-64 blade is removed.
Enhanced checks are performed on optics during firmware upgrade to FOS v9.0.x. Firmware download is blocked if
unsupported optics are discovered. The scanning of the optics takes a few minutes to complete. The amount of time
it takes is dependent on the number of ports on a switch. On a fully loaded eight (8) slot director, it can take up to
five (5) minutes to complete. In addition, ports with optics that fail the enhanced checks in FOS v9.0.x will not be
able to come online due to the optics as invalid module.
Brocade G620 with switchType 183 and G630 with switchType 184 do not support the following legacy
optical modules:
• 16G SWL (HAA1, HAA2 serial number)
• 16G LWL (HDA1, HDA2, HDA3 serial number)
• 32G QSFP SWL (ZTA serial number)
The following examples show the sfpShow CLI outputs with the serial numbers of the legacy optical
module
sfpshow <port> -f
...
Serial No: HAA11213107BTY2
...
sfpshow <port> -f
....
Serial No: HDA318014000DN1
....
sfpshow <port> -f
....
Serial No: ZTA11517000001K
All user ports in a Gen 7 ICL QSFP port must be assigned to the same logical switch when Virtual Fabric is configured.
Port 0 of the ICL QSFP must be enabled first before port 1, port 2, and port 3 within the same QSFP be enabled. If
port 0 of the Gen 7 ICL QSFP becomes offline, port 1, port 2, and port 3 of the QSFP will become offline as result.
The output of CLI command sfpShow or any other interfaces to retrieve information from Gen 7 SWL QSFP (Part
Number 57-1000490) and LWL QSFP (Part Number 57-1000491) does not match the Part Numbers on the media
sticker labels. The output shows Gen 6 Part Number (57-1000351 for SWL or 57-1000480 for LWL). This does not
affect operation of the optics.
When a fabric with FOS v9.0.x is connected to a fabric with pre-FOS v9.0.0, RASLOG message FABR-1001 is
generated as shown in the following example. This is an expected message.
[FABR-1001], 35, FID 128, WARNING,, port 62, incompatible VC count
FOS v9.0.x has disabled directory listing in the CLI shell. As a result, entering <tab><tab> key does not list all CLIs
available. Users can enter the help command to list the commands. The shell tab completion by entering the first
letter followed by <tab> key is supported.
The FCR support of “Long Distance Fabric” mode conflict cannot coexist with long distance port configuration. If long
distance mode (LD, LS, or LE) is enabled on the EX_Port and the EX_Port detected Backbone Fabric's "Long distance
Broadcom FOS-901e-RN
37
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
fabric" configuration is different from the connected Edge Fabric's "Long distance fabric" configuration, then the
EX_Port will be disabled.
If “Long Distance Fabric” is enabled on a switch via the configure command, it is recommended to upgrade the
switch from FOS v8.2.x directly to FOS v9.0.0a or later. If the “Long Distance Fabric” configuration is enabled on an
E_Port or EX_Port, firmware upgrade or downgrade to FOS v9.0.x will effectively cause the “Long Distance Fabric”
configuration to be disabled.
If an HTTPS certificate is installed on a switch in FOS v9.0.x, HTTP access is blocked by default as HTTPS access is
supported.
When portloopbacktest mode1 test runs on multiple Gen 7 ICL ports with multiple iterations, the test may
fail. The workaround is to run the test on one ICL port at a time with reduced number of iterations.
Running long distance LE mode between any blades or switches among FC32-X7-48, FC64-48, or G720 with port QoS
mode enabled and vc_translation_link_init mode enabled may result in frame timeouts. The
workaround for this problem is to use LS or LD mode for long distance.
If downloading firmware on an unsupported platform, a write post to /rest/operations/show-status/message-
id/20000 occurs and will incorrectly concatenate firmware download error messages. No recovery is needed, and
this behaviour will not cause any functional impact.
In FOS v9.0.1b, v9.0.1c and v9.0.1d the following platforms incorrectly changed subtype:
Incorrect Subtype Shown in FOS v9.0.1d Correct Subtype
162.1 162.0
162.6 162.5
184.1 184.0
Broadcom FOS-901e-RN
38
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
This section lists the Common Vulnerabilities and Exposures (CVEs) that have been addressed. Each CVE is identified by
the CVE ID number. For the latest security vulnerabilities disclosures, please visit Brocade Security Advisories web page
at https://www.broadcom.com/support/fibre-channel-networking/security-advisories.
Brocade Fabric OS version 9.0.1e1
CVE-2022-33186
A vulnerability in Brocade Fabric OS software v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j and earlier versions could allow a remote
unauthenticated attacker to execute on a Brocade Fabric OS switch commands capable of modifying zoning, disabling
the switch, disabling ports and modifying the switch IP address.
CVE-2018-6449
Host Header Injection vulnerability in the http management interface in Brocade Fabric OS could allow a remote
attacker to exploit this vulnerability by injecting arbitrary HTTP headers.
CVE-2021-27794
A vulnerability in the authentication mechanism of Brocade Fabric OS versions before Brocade Fabric OS v.9.0.1a,
v8.2.3a and v7.4.2h could allow a user to Login with empty password, and invalid password through telnet, ssh and
REST.
CVE-2021-27792
The request handling functions in the web management interface of Brocade Fabric OS versions do not properly handle
malformed user input, resulting in a service crash.
CVE-2021-27791
The function used to parse the Authentication header in the Brocade Fabric OS Web application service fails to properly
process a malformed authentication header from the client, resulting in reading memory addresses outside the intended
range.
Broadcom FOS-901e-RN
39
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
CVE-2021-27790
The command “ipfilter” in Brocade Fabric OS uses an unsafe string function to process user input.
CVE-2021-27789
A vulnerability in the Brocade Fabric OS could allow an authenticated CLI user to abuse the history command to write
arbitrary content to files.
CVE-2020-15388
The Web application of Brocade Fabric OS contains debug statements that expose sensitive information to the
program's standard output device.
CVE-2020-15386
Brocade Fabric OS may observe high CPU load during security scanning, leading to a slower response to CLI commands
and other operations.
CVE-2020-15383
Running security scans against the SAN switch can cause “config” and “secnotify” processes within the firmware to
consume all memory leading to a denial-of-service impact, possibly including a switch panic.
CVE-2020-1971
The X.509 GeneralName type is a generic type for representing different types of names.
CVE-2020-1967
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due
to a NULL pointer dereference resulting from incorrect handling of the "signature_algorithms_cert" TLS extension.
CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from
untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and
others) may execute untrusted code.
CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after
sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted
code.
CVE-2021-27793
Intermittent authorization failure seen with aaa tacacs+ can cause a user with a valid account to be unable to log into
the switch. Observed on FOS firmware before Brocade Fabric OS v9.0.1b and after 9.0.0. Also observed on FOS
firmware before Brocade Fabric OS v8.2.3a and after v8.2.0.
Broadcom FOS-901e-RN
40
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
CVE-2021-3449
An OpenSSL TLS Server may crash if sent a maliciously crafted renegotiation ClientHello message from a client.
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard coded to 48 bytes. This allows a remote peer to
fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to
cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11.
Brocade Fabric OS versions v9.0.1c
No CVEs
Brocade Fabric OS versions v9.0.1d
No CVEs
In OpenSSL before OpenSSL 3.0.2, OpenSSL 1.1.1n, OpenSSL 1.0.2zd, it is possible to trigger an infinite loop by crafting a
certificate that has invalid elliptic curve parameters.
CVE-2022-28169
A low privilege webtools user could gain elevated admin rights, or privileges, beyond what is intended or entitled for
that user. By exploiting this vulnerability, a user whose role is not an admin, can create a new user with an admin role
using the operator session id. The issue was replicated after intercepting the admin and operator authorization headers
sent unencrypted and editing a user addition request to use the operator's authorization header.
CVE-2022-28170
Brocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j stores server and user
password in the debug statements.
CVE-2022-33179
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 7.4.2j could allow an attacker to
break out of restricted shells with “set context” and escalate privileges.
CVE-2022-33180
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, could allow an
attacker to export out sensitive files with “seccryptocfg”, “configupload”.
Broadcom FOS-901e-RN
41
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
CVE-2022-33181
An information disclosure vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c,
8.2.0cbn5, 7.4.2.j could allow an attacker to read sensitive files using switch commands “configshow” and “supportlink”.
CVE-2022-33182
A privilege escalation vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5,
could allow a local user to escalate its privilege to root using switch commands “supportlink”, “firmwaredownload”,
“portcfgupload, license, and “fosexec”.
CVE-2022-33183
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow an
attacker to perform stack buffer overflow using in “firmwaredownload” and “diagshow” commands.
CVE-2022-33184
A vulnerability in Brocade Fabric OS fab_seg.c.h libraries could allow authenticated attackers to exploit stack-based
buffer overflows, allowing the execution of arbitrary code as the root user account.
CVE-2022-33185
Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, v9.1.0 use unsafe string function to process
user input. Authenticated attackers can abuse these vulnerabilities to exploit stack-based buffer overflows, allowing
execution of arbitrary code as the root user account.
CVE-2021-29650
An issue was discovered in the Linux kernel before 5.11.11. The Netfilter subsystem allows attackers to cause a denial of
service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon
the assignment of a new table value, aka CID-175e476b8cdf.
CVE-2021-39275
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass
untrusted data to these functions, but third-party/external modules may. This issue affects Apache HTTP Server 2.4.48
and earlier.
CVE-2021-34798
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48
and earlier.
Broadcom FOS-901e-RN
42
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
CVE-2021-23841
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the
issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that
may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may
subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function
X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use
this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL
versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL
versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving
public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to
1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2022-0155
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding
the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a
buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that
are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value
has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING
structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL
terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also
happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found
to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that
have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1
structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the
"data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of
certificates (for example if a certificate has been directly constructed by the application instead of loading it via the
OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur
in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an
application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions
then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the
disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected
1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
Broadcom FOS-901e-RN
43
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
CVE-2021-3711
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically
an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the
"outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then
allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the
"out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size
required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size
required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a
second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an
application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the
contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash.
The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected
1.1.1-1.1.1k).
Broadcom FOS-901e-RN
44
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Defect ID Description
FOS-844297 TruFOS Certificate cannot be installed on switches running 9.0.1e from SANnav server
Defect ID Description
FOS-821746 Edge to edge routing was not working and frames dropped on E-port or EX-port.
FOS-823847 Switch panic after cald failed to allocate memory for maintaining keep alive with ESRS.
FOS-832909 FCR (iSwitchd) uses RSCNs to convey incremental updates to the device directory. When an RSCN fails
to be delivered, the Name Server database can become out of sync across routed fabrics.
FOS-836232 The user will observe that Tunnel with Preshared key will not come up after config download.
FOS-836506 Periodic XTUN-1997 triggers when running FICON and FCP/SCSI flows over an FCIP Tunnel Port Based
or Device Based Routing configuration. The XTUN-1997 triggers are for Keepalive timeouts on the
medium priority circuits.
FOS-836573 FICN_1062 and FICN_1063 RASLOGs every 1.5 seconds on FICON Emulation enabled FCIP Tunnel
FOS-836845 Relay Config no longer accepts FQDN as IP address: > Config --config -rla_ip xxx -rla_dname yyy
Invalid IP Address for Relay Host Configuration.
FOS-837088 FOS accepts REST requests with an empty audit class list.
FOS-837183 TX rules for ISL ports do not get triggered for MAPS custom policy that includes both RX and TX rules
for the ISL ports.
FOS-837394 'diagshow' command output shows port error statistics incrementing while link itself has no error.
FOS-837451 DWDM is reporting a "loss of lock" error and the switch is showing no light on the port.
Broadcom FOS-901e-RN
45
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-837755 Stale CAM entries are present on the ports, which were disabled.
FOS-837837 Performance stats for VE ports are not present in connunitportstat table
FOS-838047 During the FOS upgrade process, initiated from SANnav, directors can experience unexpected reboots
during the upgrade process. In each director where this occurred the FOS upgrade had completed on
the Standby CP and then an unexpected reboot occurred. Both CR blades reset and started POST
diagnostics.
FOS-838223 Devices connected to the Gen7 switch with default allaccess zone cannot communicate to each other
in the FICON environment.
FOS-838514 7840, 7810 or SX6 blade encounters DP Linux out of Memory causing IO disruption
FOS-838977 Weblinkercfg continues crashing while processing Enumerate telemetry profile query.
FOS-839056 Frame drops affect the entire fabric after creating smaller trunks from larger trunks.
FOS-839186 Code upgrade turned into cold recovery when weblinker cannot restart in time, or on a normal
operation switch, user may encounter failures in config change operations (e.g. portcfg or lscfg)
FOS-839936 User may encounter a CP Assert, upon initial failover to Fabric OS v9.x
FOS-840909 FCPH-1003 reports duplicate port WWN with a port that does not have the same port WWN.
FOS-841478 Duplicate PWWN detection resulted in disruption to the existing FICON CHPID.
FOS-841961 On a X7 director that had gone through CLI "firmwarecleaninstall" of FOS9.0.x, after an upgrade to
FOS v9.1.x, the active CP will show FAULTY (53) and will essentially be unresponsive. No output on the
serial console. The management and service ports are no longer accessible.
Defect ID Description
Broadcom FOS-901e-RN
46
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-823675 On a 32G DWDM port, D_Port diagnostics fails on the spinfab throughput test and DWDM line flips
fail.
FOS-826127 Fabric merge fails with error "Strict Fabric wide policy is conflicting" on adding new switch to fabric.
FOS-826227 Devices in default allaccess zone cannot communicate to each other across LISLs in FICON
environment on all platform.
FOS-826780 Add fence and decommission actions for the monitoring items TXP and RXP in the MAPS policy.
FOS-826804 Switch needs a manual reboot to recover from HA Out of Sync state after mdd daemon panic.
Observed raslog: [HAM-1013], , SLOT 1 | CHASSIS, CRITICAL, , Can't restart (md (pid=27115)): System
unready or LS trans in progress. Reboot/Failover manually if necessary.
FOS-829439 port faulted with raslog: 2021/12/20-09:25:46, [C4-1049], 466935, FFDC | CHASSIS, ERROR,
BrocadeG620, S0,P25(37): Port faulted at ALLOC. Requested 0 buffers; ASIC buffers: current=263500
max=15360
FOS-830052 Port initialization interop issues with a certain SFP, when connecting to a specific 3rd party device.
This may result in some ports showing errors and some going into no_sync, port_Flt state.
FOS-830714 With flat zoning, user observed 400ms delay in ACK to a FLOGI during ports flipping test and ports
getting throttled without coming online.
FOS-833348 Switch in AG goes to rolling reboot due to NPD crash after AG is rebooted
FOS-834621 eHCL sequence encounters fatal FICON FD error, which results in VE recovery.
FOS-834868 firmwareactivation CLI fails with SULB-1043, after staging a firmware upgrade/downgrade:
2021/09/22-14:58:50:367354, [SULB-1043], 76469/35239, SLOT 1 | CHASSIS, INFO, , Firmwareactivate
command failed.
FOS-834912 SANnav reports error: "Registration for telemetry profile 'xxx' has failed and Switch panic after cald
termination.
FOS-835201 After upgrading to FOS v9.0.0, observed that both CPs on X6 director go into a rolling panic, back and
forth, every couple of minutes.
FOS-835708 Change switch ip addresses and new IP addresses are lost after dual CP reboot. CLI "ipaddrshow" still
show previous IPv4/IPv6 addresses.
Broadcom FOS-901e-RN
47
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-835791 Individual ports, that were previously disabled, are enabled while running CLI command
switchcfgpersistentenable
FOS-835854 Observed memory leak in brocade-license while doing REST GET on "rest/running/brocade-
license/ports-on-demand-license-info?mp_util=2"
FOS-836043 DCX8510 returning chassis S/N when being queried for brocade-chassis info via REST, when WWN 1
S/N was previously returned and used for entitlement.
FOS-836219 CLI "sfpshow -all" did not display complete output and the polling of smart SFP data stopped. It
reported an very old "Last poll time:"
FOS-836265 During code upgrade from FOS v8.2.1x to FOS v8.2.3x, FOS cannot completely be brought up due to
cald core dumps. User observes the switch hanging.
FOS-836572 'snmpconfig' CLI returns error 'Failed to get snmp config info' due to SNMP service not restarting after
getting disrupted.
FOS-837280 Boot over SAN device cannot boot up after upgrading firmware on 32G FC switches.
FOS-837405 Flow vision reports the wrong direction of flows for the SCSI devices that don't register FC4 features.
FOS-837483 Code upgrade was disruptive after HA recovery failed for all online 32G QSFP ports.
FOS-837563 Brocade G630 switch (Switch type = 184) may experience sudden reboot - resets.
FOS-837583 SNMP daemon leaks memory and causes switch to hafailover/hareboot/panic when switch runs out
of memory.
FOS-838223 Devices in 64G switch with default allaccess zone cannot communicate to each other in FICON
environment.
Defect ID Description
FOS-818632 Getting delayed response from the FOS firmwaredownload API if we enable FIPS on the switch
FOS-818655 Domain ID, SCC_POLICY, port names, and port configurations reverted to the previous settings in a
different environment.
Broadcom FOS-901e-RN
48
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-821268 Observed a weblinker process termination when generating certificate for HTTPS and flash space
eventually went to over 90%.
FOS-821353 Weblinker memory leaks observed when RADIUS is configured as AAA authentication.
FOS-823675 On a 32G DWDM port, D_Port diagnostics fails on the spinfab throughput test and DWDM line flips
fail.
FOS-823756 A 3rd party device is unsuccessful in moving from one switch port to another switch port.
FOS-824498 MAPS test email defaulted "From address" to [email protected] on some switches and
rejected by postmaster.
FOS-826243 The REST peak counters for fibrechannel-statistics seen as zero despite traffic flowing.
FOS-826747 A port blade failed and went missing from the "slotshow" CLI and switch monitor components such
as maps continue to report system status as healthy.
FOS-826987 'filterportshow' output is incomplete and switch panic with console output, "BUG: Bad page map in
process supportsave".
FOS-827718 Standby CP may remain at down level firmware version after a concurrent dual CP firmware upgrade
failure
FOS-827719 CORE and FFDC are generated on newly active CP after a dual CP firmwaredownload.
FOS-827734 In swDeviceStatusTrap, swFCPortSpecifier value shows -1/<port_index> instead of the actual port
number.
FOS-827976 cold boot after ONMd crash when standby becomes active during hafailover process.
FOS-828899 DP Panic after upgrading to FOS8.2.1 through FOS8.2.2d while running FICON XRC traffic over XRC
Emulation enabled FCIP Tunnel.
FOS-829310 FICN-1062 or FICN-1063 with LastStates=0x005E005E0068 indicating that there were FICON Abort
sequences processed on the emulated tunnel.
FOS-829423 FCIP DP Panic and DP Reset after switching an FCIP Circuit from wantool testing state back to active
FCIP Circuit
Broadcom FOS-901e-RN
49
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-829441 "XTUN-1001 : memory allocation error" messages in RASLOG after using FCIP SLA or manual WTOOL
functionality.
FOS-829537 Following an hareboot, the agautomapbalance configuration is not the same as it was before the
hareboot.
FOS-829594 Issuing a switchenable when the switch is already enabled may lead to I/O disruption
FOS-830052 Port initialization interop issues with a certain SFP, when connecting to a specific 3rd device. This
may result in some ports showing errors and some going into no_sync, port_Flt state.
FOS-830310 Firmwaredownload fails with a generic error-message: "Firmwaredownload sanity check failed.
Please contact the service provider if the issue persists."
FOS-830884 WebTool "Switch Administration -> Extended Fabric" tab are missing slots for X6 directors.
FOS-831297 FOS Version 9.0.1a and 9.0.1b does not show any entry in NameServer View in Webtools if only one
zone is present in fabric.
FOS-831329 End devices report errors after a link of an FEC-enabled trunk is bounced.
FOS-831688 Various operations fail after switch run out of disk space.
FOS-831727 Long distance E-port trunk does not come back up after port bounce.
FOS-831875 SNMP application may lose connection to switch momentarily during snmp walk of IPV6 address
table and occasionally the user may observe CP lost HA SYNC if the walk is performed during
hafailover/hareboot.
FOS-832100 A switch operating in AG mode, or while operating with Flow Vision enabled can observe a cold
reboot when attempting to capture a SupportSave, SupportShow or FemDump output. A director
may observe an HA fail-over without further impact.
FOS-832152 All hosts on two AGs lost access to storage after ports were added to F-Port trunk group
FOS-832917 The X7 has two power supplies that are faulty, but MAPS did not trigger the expected rules to put
the switch into a MARGINAL state as expected and SANnav does not reflect a Degraded state.
FOS-832960 Disruption on Access Gateways when F-port trunks change trunk master.
Broadcom FOS-901e-RN
50
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-834163 Extension tunnel on 7810, 7840 or SX6 blade will not come online in a NAT (Network Address
Translation) enabled WAN environment.
Defect ID Description
FOS-831875 SNMP application may lose connection to switch momentarily during snmp walk of IPV6 address
table and occasionally the user may observe CP lost HA SYNC if the walk is performed during
hafailover/hareboot.
FOS-828899 DP Panic after upgrading to FOS8.2.1 through FOS8.2.2d while running FICON XRC traffic over XRC
Emulation enabled FCIP Tunnel.
FOS-829310 FICN-1062 or FICN-1063 with LastStates=0x005E005E0068 indicating that there were FICON Abort
sequences processed on the emulated tunnel.
Defect ID Description
FOS-827771 MAPS fences a port due to a falsely read Class3 TX Timeout (C3TXTO) counter.
FOS-828412 SNMP-Walk mib-2 does not get most groups except for interfaces and if-mib.
FOS-829031 After firmware upgrade to FOS9.0.1/9.0.1a, domain controller frames originated from an F port
cannot pass through ISLs. The impacted services include: • RDP Read Diagnostic Parameters (RDP).
• Set Bit-error Reporting Parameters (SBRP) • Read Link Error Status Block (RLS)
FOS-829367 When displaying snmpv1 configuration - snmpconfig --show snmpv1, it does not return the header
part.
FOS-829511 The non-printable characters in CLI, "supportshow asic_db”. +++++++++++++++++ Asic Chip 3/0/0
RTE database ++++++++++++++++++++++++ [Fri Apr 02 15:04:34.850 2021] asicswdump -s 3 -m 0
:
Broadcom FOS-901e-RN
51
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Defect ID Description
FOS-813525 Fibre channel port statistics counters report large values such as "4294967295" after statistics
reset.
FOS-813847 WebTools Name Server view does not show WWN Company ID for OUI 34:80:0d
FOS-815401 WebEm Netstat Metric value does not match the CLI value
FOS-816201 Date and audit logs in auditdump output shows timezone as "Localtime" when timezone is set in
old format
FOS-817406 Blade does not initialize after a blade insert and raslog BL-5204 with reason=62.
FOS-819632 On firmware migration from 8.2.2 to 9.0.0 with 256 accounts, there will be 257 accounts due to
maintenance and SSH/telnet fails for last account
FOS-819951 CLI command portledtest shows the test as passed but LEDs still continue to glow in any color.
FOS-819966 sys_flow_monitor dashboard displays port speed as 0 for host and target of the monitored flow.
FOS-820016 sys_flow_monitor dashboard is not reporting statistics on active flows and the state of the flow is
deactivated after switchdisable and switchenable operation.
Defect ID Description
FOS-809191 Brocade 7810 extension switch's secondary NTP server does not go to active state after the active
NTP server goes down.
FOS-810530 Zone merge slow performance and failure on that switch that has defzone all access defined.
Along with this behavior IPC drops RASLOGs events and/or termination of process nsd may be
seen.
FOS-816124 The raslog TS-1002 floods console indicating continuous toggling of active clock server between
LOCL and external
Broadcom FOS-901e-RN
52
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
FOS-817433 Error message "portPeerBeacon is not supported by the other end" with AG mode F-Ports.
FOS-818010 EDC and RDF registrations will complete successfully, however, the registered values are not
retained when viewed using the "fabricNotification" CLI.
FOS-818869 inet6 address family not supported in 'netstat' command. S8Gen7:FID128:admin> netstat -A inet6
-nr Address family `inet6' not supported. S8Gen7:FID128:admin> netstat --help
FOS-820163 VLAN and MTU Size is not displayed in FCIP circuit view
FOS-821268 Observed a weblinker process termination when generating certificate for HTTPS and flash space
eventually went to over 90%.
FOS-823433 In ISL between G720 or FC64-48 (64G optic) to a G630 (32G optic) may take longer time to
converge at 32G speed. This is applicable when the G630 switch is running pre-FOS 9.0.1
Broadcom FOS-901e-RN
53
Fabric OS v9.0.1e/v9.0.1e1 Fabric OS v9.0.1e Release Notes Digest
Revision History
Broadcom FOS-901e-RN
54