Dell Networking N1500シリーズ、ファームウェア バージョン6.2.6.6、A01
再起動が必要です 取り付け済み このファイルは、最新の更新プログラムの一部として自動的にインストールされました。問題が発生した場合は、手動でダウンロードして再インストールすることができます。このページのコンテンツは自動翻訳されている可能性があります。フィードバックを提供するには、ページの下部にあるフォームに入力してください。
Maintenance release of Dell Networking N1500 Series switches.
Please refer to the Release Notes for additional details which is included in the zip file - "Dell_Networking_6_2_6_6_Release_Notes"
Please refer to the Release Notes for additional details which is included in the zip file - "Dell_Networking_6_2_6_6_Release_Notes"
推奨
その他のアップデートを見る。SupportAssistを使用すると、お使いのデバイス向けの最新のドライバー アップデートをすべて見つけることができます。
修正と強化
New Features & Enhancements:
Added lower-case dot1x MAB user-name/password support to radius-server
Added ssh public key authentication support
Added TLSv1.0 as HTTPS protocol by default and disabled SSLv2 and SSLv3 by default
Kernel updates and SSL version upgrade to 1.0.1.o
PoE Controller firmware updated to 265_1
Fixes:
954419 - N4000 - 6.2.6.5 - Stack member crash "hapiMcAsyncTask"
954364 - N4000 - 6.2.6.5 - Stack member crash "hapiRxTask"
948955 - N-Series - 6.2.6.3 - Incorrect Dynamic MAC Address-table entry for Data-VLAN
939744 - N-Series-6.2.1.6-ip ospf and rip authentication encrypt string is showing in clear-text
939170 - N-Series - 6.2.1.6 - RSTP BPDU packet dropped if hello timer mismatch
936925 - N-Series-6.2.1.6 -Layer3 interface (vlans) stays down when stack master is powered off abruptly
936580 - N4000 - 6.2.1.6 -Switch stack unresponsive with mcastMapTask crash logs
936193 - N-Series - Observed "LLDP entry delete failed" log messages
934566 - N-Series-6.2.1.6-show buffers command shows incorrectly spaced or garbled output via telnet/SSH
934053 - N-Series - 6.2.1.6 - BGP AS Number Range (Unassigned by IANA)
927589 - N3000-6.2- IPv6 neighbor solicitation multicast not distributed to non-management stack members
927035 - N2048P - 6.2.0.5 - PoE interoperability issue with D-Link PoE Splitter
926627 - N-Series - 6.2.1.6 - Multiple vulnerabilities (CVE-2011-3389, CVE-2013-2566 and CVE-2015-2808)
926109 - N-Series - 6.2.1.6 - Port-security violation is not logged for ports with Sticky MAC enabled
923480 - N-Series - 6.2.1.5 - Port-Security (Sticky MAC) with voice VLAN is not working as expected
923462 - N-Series - 6.2.1.5 - Ports stop learning dynamic MAC address after disabling sticky MAC
921359 - N-Series - 6.2 - dot1x unauth-vlan not working with authentication order enabled
920185 - N3000 - 6.2 - Front 10G ports goes down when 10G SFP extension module is removed from the slot
914354 - N4000 - 6.2.0.5 - IPv6 Multicast not filtered by MLAG Peer-Link
913185 - N2000 - Switchport is not removed from unauth VLAN even after passing dot1x authentication.
913140 - N3000 - MLAG/LACP issue "Error allocating buffer pools for the received dot3ad data message"
907751 - N4000-6.2.0.5 - emWeb crash when Nessus Scan perform SSH login with Radius auth
890635 - N2000-6.1.2.4 - SNMP MIB Walk OID "1.3.6.1.4.1.674.10895.3000.1.2.100" returns URL http://0.0.0.0
859610 - N3000 - ssh public key authentication doesn't work
813685 - N3000 -IPV6 USGv6 Interoperability and Basic Conformance failures
939526 - N40xx - Stacked and running RPVST is often unable to learn GARP address after failover.
918049 - N20xx - 6.2.1.2 - SSH Radius authentication fails on first attempt
907697 - N20xx -6.1.2.4-dot1x mac based authentication,clients behind phones can't forward traffic
937583 - N40xxF - 6.2.0.5: Very slow response to 'show' CLIs when SFP/QSFPs are present
934044 - N2048 - 6.2.1.6: Switch crashes or hangs after multiple SSH session retries on switch
926091 - N40xxF - 6.2.0.5: Customer has stack and when issuing 'show' CLI causing his ping to timeout
924613 - N2048P - 6.2.0.5: CDC RX FIFO entry 45 ECC error seen
922438 - N-Series - 6.2.0.5/6.2.1.4: 'show port-security dynamic ' show learned even with no sec
921371 - N2048P - 6.1.2.4/6.2.0.5: Aastra 6725IP phone not getting power when connected to switch
920799 - N-Series - 6.1/6.2 - Ports flapping when port-channel membership is being modified via WebUI
891874 - N2048 - 6.1.2.4: Switch not sending snmp trap notification for UP/DOWN status on loopback interfaces
881612 - N2048 - 6.1.2.4: web timeout (HTTPS) does not depend on exce-timeout configuration
944153 - N4064F 6.2.1.6 : switch stack takes a very long time to respond for any sh commands
943187 - N4064F :6.2.1.6: stack of 2, stop processing incoming CPU packets when show tech-support
944106 - N3048 - 6.2.1.6 Banner is not displayed in running configuration after a reboot
詳細を見るAdded lower-case dot1x MAB user-name/password support to radius-server
Added ssh public key authentication support
Added TLSv1.0 as HTTPS protocol by default and disabled SSLv2 and SSLv3 by default
Kernel updates and SSL version upgrade to 1.0.1.o
PoE Controller firmware updated to 265_1
Fixes:
954419 - N4000 - 6.2.6.5 - Stack member crash "hapiMcAsyncTask"
954364 - N4000 - 6.2.6.5 - Stack member crash "hapiRxTask"
948955 - N-Series - 6.2.6.3 - Incorrect Dynamic MAC Address-table entry for Data-VLAN
939744 - N-Series-6.2.1.6-ip ospf and rip authentication encrypt string is showing in clear-text
939170 - N-Series - 6.2.1.6 - RSTP BPDU packet dropped if hello timer mismatch
936925 - N-Series-6.2.1.6 -Layer3 interface (vlans) stays down when stack master is powered off abruptly
936580 - N4000 - 6.2.1.6 -Switch stack unresponsive with mcastMapTask crash logs
936193 - N-Series - Observed "LLDP entry delete failed" log messages
934566 - N-Series-6.2.1.6-show buffers command shows incorrectly spaced or garbled output via telnet/SSH
934053 - N-Series - 6.2.1.6 - BGP AS Number Range (Unassigned by IANA)
927589 - N3000-6.2- IPv6 neighbor solicitation multicast not distributed to non-management stack members
927035 - N2048P - 6.2.0.5 - PoE interoperability issue with D-Link PoE Splitter
926627 - N-Series - 6.2.1.6 - Multiple vulnerabilities (CVE-2011-3389, CVE-2013-2566 and CVE-2015-2808)
926109 - N-Series - 6.2.1.6 - Port-security violation is not logged for ports with Sticky MAC enabled
923480 - N-Series - 6.2.1.5 - Port-Security (Sticky MAC) with voice VLAN is not working as expected
923462 - N-Series - 6.2.1.5 - Ports stop learning dynamic MAC address after disabling sticky MAC
921359 - N-Series - 6.2 - dot1x unauth-vlan not working with authentication order enabled
920185 - N3000 - 6.2 - Front 10G ports goes down when 10G SFP extension module is removed from the slot
914354 - N4000 - 6.2.0.5 - IPv6 Multicast not filtered by MLAG Peer-Link
913185 - N2000 - Switchport is not removed from unauth VLAN even after passing dot1x authentication.
913140 - N3000 - MLAG/LACP issue "Error allocating buffer pools for the received dot3ad data message"
907751 - N4000-6.2.0.5 - emWeb crash when Nessus Scan perform SSH login with Radius auth
890635 - N2000-6.1.2.4 - SNMP MIB Walk OID "1.3.6.1.4.1.674.10895.3000.1.2.100" returns URL http://0.0.0.0
859610 - N3000 - ssh public key authentication doesn't work
813685 - N3000 -IPV6 USGv6 Interoperability and Basic Conformance failures
939526 - N40xx - Stacked and running RPVST is often unable to learn GARP address after failover.
918049 - N20xx - 6.2.1.2 - SSH Radius authentication fails on first attempt
907697 - N20xx -6.1.2.4-dot1x mac based authentication,clients behind phones can't forward traffic
937583 - N40xxF - 6.2.0.5: Very slow response to 'show' CLIs when SFP/QSFPs are present
934044 - N2048 - 6.2.1.6: Switch crashes or hangs after multiple SSH session retries on switch
926091 - N40xxF - 6.2.0.5: Customer has stack and when issuing 'show' CLI causing his ping to timeout
924613 - N2048P - 6.2.0.5: CDC RX FIFO entry 45 ECC error seen
922438 - N-Series - 6.2.0.5/6.2.1.4: 'show port-security dynamic ' show learned even with no sec
921371 - N2048P - 6.1.2.4/6.2.0.5: Aastra 6725IP phone not getting power when connected to switch
920799 - N-Series - 6.1/6.2 - Ports flapping when port-channel membership is being modified via WebUI
891874 - N2048 - 6.1.2.4: Switch not sending snmp trap notification for UP/DOWN status on loopback interfaces
881612 - N2048 - 6.1.2.4: web timeout (HTTPS) does not depend on exce-timeout configuration
944153 - N4064F 6.2.1.6 : switch stack takes a very long time to respond for any sh commands
943187 - N4064F :6.2.1.6: stack of 2, stop processing incoming CPU packets when show tech-support
944106 - N3048 - 6.2.1.6 Banner is not displayed in running configuration after a reboot
バージョン
6.2.6.6, A01
リリース日:
08 9月 2015
ダウンロード タイプ
ファームウェア
カテゴリ
ネットワーク
重要度
推奨デル・テクノロジーズでは、次に予定されているアップデート時に、このアップデートを適用することをお勧めします。このアップデートには、システム全体の正常性を維持するための変更が含まれています。これにより、システム ソフトウェアが最新の状態に保たれるとともに、システム ソフトウェアと他のシステム モジュール(ファームウェア、BIOS、ドライバー、ソフトウェア)との互換性が維持されます。また、その他の新機能が追加される場合もあります。
ファイル形式: ローカルディスクに直接ファイルを解凍
ファイル名: N1500v6.2.6.6a01.zip
ファイルサイズ: 20.11 MB
これは大容量ファイルです。接続速度によっては、ダウンロードに時間がかかる場合があります。
フォーマットの説明:
このファイル形式は、ハードドライブ上のディレクトリに解凍できるファイルのアーカイブです。このディレクトリからインストールを行うことができます。
ダウンロードの整合性を確認するには、チェックサムの値を検証してください。
MD5:
71fbc9942134a934c1e299924d168f25
SHA1:
0b19fd5b985656812da52cb8e020b5288ff4a56a
SHA-256:
ea8c673e433df7bdafe23220256b9a219177c9ce86b4a21d81fcde542cc8db6a
ファイル形式: お客様にとって便利な修正点、および機能拡張に関する情報を含むテキストファイル
ファイル名: N1500ReadMev6.2.6.6a01.txt
ファイルサイズ: 3.05 KB
これは大容量ファイルです。接続速度によっては、ダウンロードに時間がかかる場合があります。
フォーマットの説明:
このファイル形式には、標準的なテキストエディタで表示できるプレーンテキストが含まれています。
ダウンロードの整合性を確認するには、チェックサムの値を検証してください。
MD5:
236726aae8ecd1db5fb484d2f8a0d489
SHA1:
2076b043af0184f68886f4b81dabebe232e8dc68
SHA-256:
bc9710aeecf26d8509f65824e573e01b343c417dbf01058e07dbdf4ea2dd59c1
ダウンロードすることによって、Dellソフトウェア製品ライセンス契約 (英語で) の条項に同意したことになります。
Maintenance release of Dell Networking N1500 Series switches.
Please refer to the Release Notes for additional details which is included in the zip file - "Dell_Networking_6_2_6_6_Release_Notes"
Please refer to the Release Notes for additional details which is included in the zip file - "Dell_Networking_6_2_6_6_Release_Notes"
Dell N1524
Dell N1524P
Dell N1548
Dell N1548P
(1) Download the zip file - N1500v6.2.6.6A01.zip
(2) Extract the image file "N1500v6.2.6.6.stk" from the zip file
(3) Install the image to the switch by following the upgrade procedure "Upgrading Dell Networking N1500 Series Switches From Version 6.2.5.3 to 6.2.6.6 Firmare.pdf" extracted from zip file.
Reboot will be required
(2) Extract the image file "N1500v6.2.6.6.stk" from the zip file
(3) Install the image to the switch by following the upgrade procedure "Upgrading Dell Networking N1500 Series Switches From Version 6.2.5.3 to 6.2.6.6 Firmare.pdf" extracted from zip file.
Reboot will be required