GV OS ReleaseNote v5104
GV OS ReleaseNote v5104
04 Release Notes
Updated: August 20, 2018
Table of Contents
About This Document ...............................................................................................................................1
Upgrade Instructions .................................................................................................................................1
Line Card or Module Removal Procedure (Hot Removal) ........................................................................ 3
What’s New ...............................................................................................................................................4
New Features in 5.1.01 .......................................................................................................................4
New Features in 5.1.00 .......................................................................................................................5
Resolved Issues .....................................................................................................................................11
Resolved Issues in 5.1.04 .................................................................................................................11
Resolved Issues in 5.1.03 .................................................................................................................11
Resolved Issues in 5.1.02 .................................................................................................................12
Resolved Issues in 5.1.01 .................................................................................................................13
Resolved Issues in 5.1.00 .................................................................................................................14
Known Issues .........................................................................................................................................19
Available Documentation ........................................................................................................................28
Contacting Gigamon Support..................................................................................................................29
Aggregation White Boxes running the GigaVUE-OS v5.1.04 software release, as well as the H-VUE™
Web-Based GUI.
The GigaVUE H Series and TA Series Nodes include GigaVUE-HB1, GigaVUE-HC1, GigaVUE-HC2,
GigaVUE-HC3, GigaVUE-HD4, GigaVUE-HD8, GigaVUE-TA1, GigaVUE-TA10, GigaVUE-TA40,
GigaVUE-TA100, and GigaVUE-TA100-CXP manufactured by Gigamon . The GigaVUE H Series and
®
TA Series deliver performance and intelligence in each of its Visibility Platform nodes, with port density
and speeds that scale to network needs, from 1Gb to 100Gb.
With an intuitive web-based interface (H-VUE) and a powerful CLI, the Visibility Platform is able to
replicate, filter, and selectively forward network traffic to monitoring, management, and security tools. In
addition, the optionally available GigaVUE-Fabric Manager (FM) provides extended visibility fabric
management and reporting capabilities.
Upgrade Instructions
To upgrade to 5.1.xx, the recommended procedure is to install the image, then if needed,
upgrade uboot as a separate step.
Refer to the GigaVUE H Series Upgrade Guide and GigaVUE TA Series Upgrade Guide for the
procedure.
1 8/20/2018
GigaVUE OS v5.1.04 Release Notes
Browser Version
What’s New
New Features in 5.1.01
Feature
Feature
Feature
Feature
Feature
Feature
Feature
Feature
Documentation Feedback
All user documents contain the following documentation feedback link in the “Additional Sources of
Information”. The link takes you to a survey in which you can send feedback and report issues in the
documentation.
https://www.surveymonkey.com/r/gigamondocumentationfeedback
Resolved Issues
This section contains lists of resolved issues for 5.1.00 and each MR within the 5.1.xx branch.
HD-39779 Resolved an issue that occurred when there was an overlapping network port and a
tool port that was shared in common with a byRule map and a passall map.
HD-39060 Resolved an issue in which a GigaSMART operation (GSOP) could not be removed
after editing the source port in the map. When removing the GSOP, the following
error message was displayed: Not enough resource.
HD-42030 Resolved an issue in which a child process (python) was killed but the REST API did
not relaunch the process.
HD-41878 Resolved an issue for which an inline-bypass configuration with inline-tool-group
having shared mode false, caused the incoming VLAN of the packet to be stripped.
HD-41841 SFP power log messages were incorrectly set at notice (normal but significant) level
and flooded the system, filling up the log files. The message severity level has been
changed to info (informational messages).
HD-41108 Resolved an issue after reloading a GigaVUE-HC2 with inline bypass configuration,
traffic between the network ports was dropped when the failover action was
configured as per-tool in the inline serial configuration and the source was a single
inline network.
HD-40954 H-VUE is now supported when using Internet Explorer.
HD-40131 Resolved an issue in which the hybrid port type was not supported when 1Gb SFPs
were installed.
HD-39892 Resolved an issue in which peer ports on PRT-HD0-C02X08 line card on a GigaVUE
HD Series node went down following a reload when forcelinkup was enabled on
ports.
HD-39807 In H-VUE, blocked the configuration of a collector map with a load balance-enabled
port group as a destination as this is unsupported.
HD-39730 Resolved an issue in which an incorrect speed for the eport on the GigaSMART
module on GigaVUE-HC3 was displayed in the output of the show port utilization
command.
HD-39720, HD-39244, HD-38339
Resolved an issue in which GigaSMART engine crashes were seen if the
ModifyBearerReq was missed or had invalid fields so that the respective tunnels
could not be created.
HD-39270 Resolved an issue for inline SSL decryption on GigaVUE-HC2, in which the apps
inline-ssl profile alias <alias> decrypt tool-bypass <disable | enable> command
was not working as expected.
HD-38225 Resolved an issue with inline bypass following a node reload in which the heartbeat
state was up before the inline tool was functional.
HD-38033 Resolved an issue in which a single fiber was connected to a tool port and
forcelinkup was enabled, but traffic was not sent to connected device.
HD-37977, HD-38096
Resolved an issue on GigaVUE TA10 nodes in which control plane CLI slowness
was experienced. One of the software process CPUs showed high usage, and a
power supply and FAN showed absent or had an incorrect status in the show
chassis or show environment commands.
HD-37925 Resolved an issue in which a hybrid port stopped sending traffic after a reload. This
issue affected RJ-45 copper ports (non-SFP ports).
HD-37858, HD-35612
Resolved an issue in which packet drops were not shown in H-VUE in Port Statistics
graphs, though they could be seen in the CLI.
HD-37836, HD-37955
Resolved an issue in which there were management connectivity issues when a
GigaVUE-HD8 node was booting up, due to control card, CC2, being connected to a
network port.
HD-37816 Resolved an issue in H-VUE in which the following error message was displayed
under the log settings so the syslog server could not be configured on a GigaVUE-
TA10: AddressValueError: At least 3 parts expected in '1.1.1.1'.
HD-37714, HD-35182
Resolved an issue with GigaSMART Adaptive Packet Filtering (APF) in which input
packet counters (pkts_in and octets_in) displayed zero values for the GigaSMART
operation statistics.
HD-37693 Resolved an issue on GigaVUE-HC1 in which the auto-negotiation setting on 1Gb
ports could not be changed because they had once been configured as inline
network ports.
HD-37679 Resolved an issue with a port down condition between GigaVUE TA Series and
GigaVUE HD Series nodes with 40Gb optics.
HD-37648 Resolved an issue in which H-VUE displayed a protected inline network port pair on
a copper TAP on GigaVUE-HC1 as unprotected.
HD-37503, HD-33653
Resolved an issue in H-VUE in which unsupported editing of the from port in GTP
second level maps, including flow filtering, flow sampling, and whitelisting maps, was
allowed.
HD-37224 Resolved an issue in H-VUE in which there were packet drops under Ports with
Packet Drops on the Overview Page on a GigaVUE-HB1, but under the Packet
Drops counter, it indicated that no packets were dropped.
HD-37168 Resolved an issue for inline SSL decryption on GigaVUE-HC2 in which the
GigaSMART operation statistics for an out-of-band map were always displayed as
zero.
HD-37071 Resolved an issue in which a map alias containing a special character (an
apostrophe) could not be displayed in H-VUE, but could be displayed in the CLI.
HD-36954 Resolved an issue with inline bypass in which enabling and disabling negative
heartbeat impacted regular heartbeat.
HD-36693, HD-37243
Resolved an issue on GigaVUE-HC1 in which an incorrect LED illuminated for a port
that was enabled and up.
HD-36637 Resolved an issue on GigaVUE-HC3 in which GigaStream on stack ports across
different modules was not supported.
HD-36608, HD-35013, HD-32626
Resolved an issue on GigaVUE-HB1 in which the GigaSMART engine port (e1)
showed a port temperature of 0C.
HD-36592 Resolved an issue with inline bypass in which ingress VLAN tagging (explicit VLAN
tagging) was not working when there were more than eight (8) inline networks in an
inline network group. Traffic only flowed to the first eight inline network port pairs.
HD-36430 Resolved an issue on GigaVUE-HC1 in which the port speed was incorrectly
displayed as 10Gb for a hybrid port with a 1Gb copper SFP. An X port with a 1Gb
copper SFP inserted can no longer be configured as a hybrid port.
HD-36399 Resolved an issue with Role-Based Access Control (RBAC) for map templates in H-
VUE in which a user-configured map template was not displayed on the Map
Templates page.
HD-36344, HD-36179, HD-36345, HD-37487
Resolved an issue on GigaVUE-HC2 nodes equipped with Control Card version 2
(HC2 CCv2) in which TAP modules plugged into slots 3 and 4 failed to initialize and
ports remained down.
HD-36242, HD-36243
Resolved an issue with inline SSL decryption on GigaVUE-HC2 in which the primary
and secondary signing keys were not deleted with the following commands,
however, after the commands were issued, a new certificate/key pair could be
configured, which overwrote the existing certificate/key pair:
1. no apps inline-ssl signing rsa for primary
2. no apps inline-ssl signing rsa for secondary
HD-36058 Resolved an issue in which the display of a local user’s account status was
inconsistent between the CLI and H-VUE. The status in the CLI (Local password
login disabled) is now displayed in H-VUE.
HD-36028 Resolved an issue in which the use of the configuration delete-all command on
devices in the cluster, did not correctly synchronize further configuration changes.
HD-35929 Starting in software version 5.0, an X port with a 1Gb copper SFP inserted cannot be
configured as a hybrid port. Added an error message in the output of the show port
command that the hybrid port type is not supported for this SFP.
HD-35891, HD-34931
Resolved an issue in which editing a second level map for an Adaptive Packet
Filtering (APF) GigaSMART operation to delete one GigaSMART rule (gsrule),
caused traffic for other gsrules in the map to stop flowing.
HD-35883 Resolved an issue in H-VUE in which the display for Under-Utilized Ports and Over-
Utilized Ports was interchanged.
HD-35842 Resolved an issue on GigaVUE-TA1 in which the U-Boot binary from active/booted
image was not displayed in the output of the show uboot command.
HD-35805 Resolved an issue in which GigaSMART crashed after GTP and another
GigaSMART application (APF) was configured on the same GigaSMART engine.
HD-35802 Resolved an issue in GigaSMART NetFlow records in which two-way binding is not
propagated from the GUI to the model. NetFlow Collector fields are not removed
when they are deleted using the GUI, but they are removed when deleted using the
CLI.
HD-35687 Resolved an issue on the PRT-HC3-C08Q08 module on GigaVUE-HC3 in which
subports remained down on switching from one port mode to a different port mode
(4x or 2q) using the configuration switch-to or configuration text file commands.
HD-35624, HD-30310
Resolved an issue in which an optical 1Gb link between the PRT-H00-X04G44 line
card on a GigaVUE HD Series node and a GigaVUE-HC1 node did not come up due
to auto-negotiation settings.
HD-35577 Resolved an issue in which the node entered safe mode due to editing more than
one map attribute at a time, such as changing a tool port and changing roles in the
same edit (without exiting map prefix mode).
HD-35464 Resolved an issue in some scenarios involving inline tool groups, in which issuing
the configuration switch-to command to restore a saved configuration might have
caused one of the inline tool members to incorrectly remain in a down state.
HD-35337 Resolved an issue with a 40Gb stack-link port on a connected node that stayed up
when a GigaVUE-TA40 was disabled because the GigaVUE-TA40 was not turning
the laser off on disable.
HD-35335 Resolved an issue for an inline bypass configuration with an inline network group
and an inline tool group, when only one inline tool pair in the inline tool group was
up, configuring an out-of-band (OOB) map with one of the inline tool ports as the
source caused traffic drops.
HD-35314 Resolved an issue with GigaSMART Application Session Filtering (ASF) in which the
output of show map stats for the second level map displayed incorrect byte counts.
HD-35133 Resolved an issue for inline bypass in which there were traffic drops when an inline
tool group was configured with a spare inline tool and explicit VLAN tagging in an
inline serial arrangement.
HD-34785 Resolved an issue with pattern matching masking using regular expressions (RegEx)
in GigaSMART Adaptive Packet Filtering (APF) in which only 8 bytes were masked
instead of the 12 specified in the GigaSMART rule (gsrule).
HD-34684 Resolved an issue in which editing maps containing overlapping (subset of) network
ports, then adding a new network port in a map which is last in the map priority order
resulted in the following error message: % Configuration failed.
HD-34312 Resolved an issue in a scaled configuration in which a GigaSMART tunnel license
that could not be synchronized from the master to the non-master nodes across a
cluster was missed on the non-master nodes in the cluster, which might have caused
them to go into Safe mode.
HD-34149 Resolved an issue in which a large value (12992277 minutes) for the web session
auto-logout command prevented Web login through H-VUE.
HD-34128 Resolved an issue in which an ingress interface was a fanned out port (a subport)
and the GigaSMART NetFlow ifname was blank in the exported flow record after
reloading the node.
HD-34106 Resolved an issue with PRT-HD0-C06X24 on GigaVUE HD Series nodes in which
the power level on stack ports might be displayed as -40.00dBm in the output of
show port commands after an upgrade from a pre-5.1 release to the 5.1 release.
To correct this issue, turn the power to the node off and on again.
HD-33500 Disallowed the creation of a GTP whitelist with a hyphen (-) as the first character of
the alias as this caused the whitelist to be inaccessible from the CLI.
HD-33382 Resolved an issue with the show aaa authentication attempts command in which
the output was different for an admin user and a monitor user after logging in
following several failed login attempts and being locked out.
HD-31579 Resolved an issue in which maps could not be edited in H-VUE by a user with edit-
only access to the map.
HD-22895 Resolved an issue in which the configuration text file <filename> apply verbose
fail-continue command failed if the text file contained Application Session Filtering
(ASF) with Buffering configuration.
Known Issues
This is a list of known issues in this release.
HD-47022 For HB1, the clock cannot be set to a new time. If the clock is changed to a time
other than the current time, after rebooting, the clock changes back to the original
time.
HD-42979 For classic inline bypass in a many-to-many scenario, with an inline network group
feeding an inline serial passall map and the traffic path set to monitoring, disabling
an inline tool to trigger failover results in traffic being forwarded back to the disabled
inline tool. This is expected behavior.
HD-42859 For classic inline bypass, with inline network and inline tool ports configured with
shared mode disabled and the traffic path of the inline network set to either bypass
or monitoring, when there is a rule based map or shared collector sending traffic from
the inline network to the inline tool port, adding or deleting a passall out-of-band
(OoB)map that uses one of the inline network ports as a source causes the traffic
matching the rule in the inline map or shared collector to be dropped between the
inline network port. The workaround is as follows:
• Step 1: Enable physical bypass before adding or deleting the passall OoB map
and once the passall OoB map is configured, change the traffic path of the inline
network to bypass or monitoring.
• Step 2: Disable physical bypass.
HD-42186 For classic inline bypass inline serial tool arrangement, when the inline network is set
to monitoring and the failover action of the inline tools is set to tool-bypass, when the
first inline tool in the series fails, one-way traffic is sent to the second inline tool. This
is expected behavior.
HD-42073 For classic inline bypass, when the inline network group is in monitoring mode, the
inline serial failover action per-tool is not taken into account. This is expected
behavior for monitoring mode for inline classic deployments and there are no further
plans to enhance monitoring mode in classic inline bypass. This issue/use case is
resolved with flexible inline arrangements (GA in software version 5.3), which offers
better traffic path monitoring behavior that is highly customizable and adaptable to
per tool failures.
HD-41895 For classic inline bypass, the traffic coming from an inline network group, with a
traffic path of monitoring, and going to an inline tool is missing a VLAN tag. Note that
the traffic to the inline tool is untagged only when the source is an inline network
group and the traffic path is set to monitoring.
HD-41053 For inline SSL decryption, deleting a GigaSMART out-of-band map results in loss of
access to HTTPS from client-server. The workaround is upgrade to software version
5.2.xx.
HD-40829 On GigaVUE-HD8, if the ports do not have any statistics because no traffic has been
sent or the port statistics have been cleared, issuing the show profile current port
command logs the user out of the system. The workaround is to log back in and
issue any other CLI command.
HD-39989 In H-VUE, an unsupported map configuration leads to a GigaVUE node entering safe
mode following an upgrade to software version 5.1.01 from a 5.1 or earlier software
version. A shared collector map should not be configured with a load balance-
enabled port group as a destination. Prior to software version 5.1.01, this type of
configuration was accepted by H-VUE, but on upgrade to software version 5.1.01,
the GigaVUE node enters safe mode. The workaround is to remove the configuration
of the collector map before the upgrade.
HD-39775 For inline SSL decryption on GigaVUE-HC2, defer timeout is only enforced for local
lookup, not cloud lookup.
HD-39121 With GTP load balancing in a cluster in which the load balanced ports can be on a
different node than the GigaSMART group and GigaSMART operation, GigaSMART
crashes and the node reboots when second level maps have been configured first,
followed by a large number of first level maps configured next. After the node
reboots, this issue is resolved because the first level maps are replayed first and the
second level maps are replayed next. However, the workaround is to configure the
first level maps first and then configure the second level maps.
HD-38754 For inline SSL decryption on GigaVUE-HC2, you can configure a non-default value
for the packet buffer overload threshold, but do not disable it as follows:
(config) # gsparams gsgroup <GigaSMART group alias> resource packet-buffer
overload-threshold disable
If the overload threshold is disabled, the GigaVUE node can enter an overload
bypass state from which it cannot recover. If this issue has occurred, change the
overload threshold to the default value and reboot the node to recover from this
state.
HD-38563 With GigaSMART Adaptive Packet Filtering (APF) on GigaVUE-HC1 and GigaVUE-
HC3, when there are multiple Regular Expression (RegEx) rules with wildcards in a
single map where the search possibilities are quite large, the search slows, the
performance decreases, and due to that, there could also be some dropped traffic. If
there are multiple complex wildcard-based expressions, the workaround is to split the
rules into two or more maps. This might use an additional physical port for the
workaround, depending on the RegEx configuration.
HD-38079 With GigaSMART APF pattern matching, masking does not occur for a second
GigaSMART rule, depending on how the Regular Expression (RegEx) is written.
Consider the following GigaSMART rules (gsrules):
gsrule add pass pmatch mask 0x2a protocol tcp pos 1 RegEx [a-z0-9]+
0..10
gsrule add pass pmatch mask 0x2a protocol tcp pos 1 RegEx [a-z0-9]+
67..80
These two gsrules are part of the same map and have the same RegEx. The gsrules
are trying to mask two different sections in the packet. During pattern matching
lookup, APF stores the first 20 occurrences. If each of the gsrules have more than 20
matches, there can only be the first 10 matches of each because a maximum of 20
occurrences are stored. Matches that occur further into the packet (such as at offset
67..80) will not be available, so masking will not occur for the second gsrule. The
workaround is to write Regular Expressions that are not as broad.
HD-37929 For nodes in a cluster, discarded packets (IfInDiscards) are not counted correctly
when a tool port is on a remote node. If the tool port is on the same node as the
network port, discarded packets are counted correctly. If the tool port is on a remote
node, discarded packets are counted on the stack link.
HD-37873 An unsupported map configuration leads to a GigaVUE node entering safe mode
following an upgrade to software version 5.1. A shared collector map and a regular
map should not have same set of network ports. Overlapping network ports should
not be configured and are not supported. Prior to software version 5.1, this type of
configuration was accepted by the system, but on upgrade to software version 5.1,
the GigaVUE node enters safe mode and can be recovered only by deleting the
unsupported map configuration.
HD-36284 Egress port filters do not work for VLAN pass/drop rules for hybrid GigaStream ports.
HD-36014 For inline SSL decryption on GigaVUE-HC2, cannot ping the stack port interface on
the GigaSMART engine from a laptop or client machine. This is because incoming
connections to the stack port interface are blocked for security reasons.
HD-35774 On the PRT-HC3-C08Q08 module on GigaVUE-HC3, stacking is not supported on
2q mode subports.
HD-35564 For inline SSL decryption on GigaVUE-HC2, maps need to be added in a specific
order. The order is as follows: inline SSL first level map, inline SSL second level
map, shared collector, classic inline map, then optional out-of-band map.
HD-35523 Upgrading the coreboot is only available if the GigaVUE-TA100-CXP has a 5.0.xx or
higher software image. Upgrade the GigaVUE-TA100-CXP to a 5.0.xx or higher
image before issuing the coreboot install command or the image install
<filename.img> install-boot command. Otherwise, do not issue these commands,
as they will make the system unrecoverable.
HD-35243, HD-35288
In releases prior to software version 5.0, the show filter-resource command
displays a percentage of the total number of rules used in a map. 100% means that
the maximum number of rules is used. On a node such as GigaVUE-TA100, where
the maximum number of rules is 1024, in fact, the maximum is one less than that, or
1023. In software version 5.0, when a filter template is applied, the show filter-
resource command displays the total number of map rules used in a map as well as
the limit. If the limit is 1024, the output of the show filter-resource command
displays 1023, even though the actual limit is 1022, or two less than the limit. Before
upgrading to software version 5.0 from a previous release, if you already are at the
maximum number of map rules, delete one rule from each map that is at 100%.
Reduce it to 99% on each node or slot.
HD-35093 For any configuration involving a GigaSMART operation (GSOP) with inline network
ports as the source and an out-of-band map with a tool port as the destination, an
error might be seen during configuration, the node might enter safe mode, or the
traffic path might be broken after a reload. The workaround is as follows:
• Configure a passall map with the inline network ports as the source and a hybrid
port as the destination.
• Configure a second map, a rule-based map, with the hybrid port as the source
and the out-of-band tool as the destination, with the GSOP.
This workaround is represented by the following diagram:
HD-35087 For inline SSL decryption on GigaVUE-HC2 with Control Card version 2 (HC2
CCv2), multiple engines in a GigaSMART group are only supported when advanced
hashing is configured as follows:
• gigastream advanced-hash slot cc1 fields ipsrc ipdst protocol
HD-35037 On GigaVUE-HC3, the cluster management stack port link (eth3) is displayed as up
in the output of the show interfaces command, even after the cable was
disconnected. The workaround is to view the link on/off LED on the front panel of the
node.
HD-34914 For inline SSL decryption on GigaVUE-HC2, the inbound SSL deployment does not
work if the primary CA is not configured. The workaround is to configure the primary
CA even though it is unused.
HD-34888 For inline SSL decryption on GigaVUE-HC2, device decrypts inbound SSL traffic
even when both SNI and certificate fingerprint does not match.
HD-34694 After a cluster reload, GigaVUE-TA100 ports that are broken out into subports in 4x
mode do not support NetFlow, which results in incorrect interface names and port
IDs being exported.
HD-34496 Port “ifIndex” re-indexing of the SNMP ifTable on GigaVUE nodes occurs when
upgrading from 4.6.xx or earlier releases to 4.7.xx or later releases. This might
potentially impact monitoring for customers using third party management
applications. As our SNMP implementation is compliant to RFC-2863, it is
recommended the management applications account for agent side re-indexing by
monitoring HOST-RESOURCE-MIBs, for example “sysUpTime”, and have the server
side ifIndex in sync for monitoring the correct ports on GigaVUE nodes.
HD-34349 For inline SSL decryption on GigaVUE-HC2, the behavior of the apps inline-ssl
profile alias <alias> no-decrypt tool-bypass <enable | disable> command differs
depending on the rule type configured in the profile. The rule type is configured with
the apps inline-ssl profile alias <alias> rule add command. If traffic is no-decrypt
and the rule type is IPv4, L4port, or VLAN, traffic is sent through the inline tools.
However, if the rule type is domain, category, or issuer, traffic is not sent through the
inline tools.
HD-34265 For GTP overlap flow sampling maps, when editing the first level map involved in a
map-group, traffic is incorrectly passed to the associated second level port-groups.
Instead, traffic might be passed to other port-groups. The workaround for editing the
first level map is as follows:
• Delete the map-group associated with the virtual port in the first level map by
issuing the no map-group alias <alias> command.
• Edit the first level map.
• Reconfigure the map-group by issuing the map-group alias <alias> command.
HD-34048 When a GigaVUE node that joined a cluster has a local database that is different
from the master database and when the node is reloaded without saving the
downloaded master database, the node enters safe mode because of potential
conflicts between the local database and the master database. Refer to the following
best practices:
1. Before joining a node to a cluster, wipe the local database.
2. If any node in the cluster is offline, avoid modifying the configuration from the
master.
3. If 2. cannot be avoided and the offline node enters safe mode, to fix it, take the
node out of the cluster, wipe the local database, and then join the node back to
the cluster.
HD-34029 On GigaVUE-TA100 and GigaVUE-TA100-CXP, if a GigaStream tool port is disabled
before the GigaStream is created, traffic is not redistributed correctly, although
advanced hashing is configured. The workaround is to disable and re-enable the
GigaStream tool port.
HD-33985 Remote usernames that include a forward slash (/) are not supported in GigaVUE-
OS. A remote username is one created in a remote server. The workaround is to use
the backward slash (\) in remote usernames.
HD-33478 On GigaVUE-HC3 with 4 modules and 4 power supply units (PSUs) installed, the
following sequence will result in all modules to be powered up irrespective of
insufficient power:
• Remove 3 PSUs.
• Reboot the chassis with only a single PSU.
The workaround is to install one more PSU into the node.
HD-33444 For inline SSL decryption on GigaVUE-HC2, an out-of-band map cannot have more
than one destination port. The workaround is to use a hybrid port as a way of
sending decrypted traffic to multiple out-of-band tools as follows:
• Configure a hybrid port (hPort)
• Configure a second level map to hPort
• Use hPort as a source in a conventional map or maps to any tool ports or
GigaStream
HD-32482 On GigaVUE-HC1, GigaVUE-TA100, and GigaVUE-TA100-CXP use the interface
eth0 speed auto command, instead of the manual settings (10/100/1000) as they
have no effect. If the speed has been set manually, the keyword auto is displayed in
the output of the show interface command. For example: Speed: 100Mb/s
(auto).
HD-31932 On some GigaVUE platforms, the MTU size is fixed at 9600 while on other GigaVUE
platforms the MTU size is fixed at 9400. The recommendation is to set the MTU to
9400 on all platforms.
HD-31367 When the configuration switch-to <filename> command is issued on GigaVUE-
HC2 nodes with Control Card version 2, under certain cases the command may fail
and the node may enter safe mode. The workaround is to use the configuration
text filename <filename> apply command with the same configuration.
HD-31158 For GigaVUE-HC2 with Control Card version 2, under certain traffic configurations
involving network, tool, and GigaStream on the same PRT-HC0-X24 module, traffic
on the GigaStream may be affected after a hot swap of the module. The
recommendation is to reload the GigaVUE-HC2 after swapping the PRT-HC0-X24
module.
HD-30686, HD-30687
When using NetFlow v9 or v5, the default size of the interface port ID is 2 bytes, but
the actual interface port ID is 4 bytes. The default for IPFIX is 4 bytes. For v9, do not
use the default of 2. The workaround for v9 is to specify the width of 4 in the
following CLI commands. There is no workaround for v5 because it is predefined.
apps netflow record alias <alias> collect add interface input physical width 4
apps netflow record alias <alias> collect add interface output physical width 4
apps netflow record alias <alias> match add interface input physical width 4
apps netflow record alias <alias> match add interface output physical width 4
HD-30324, HD-33681
In an out-of-band cluster, a GigaVUE-HC2 with Control Card version 2 lost its
chassis ID when its state changed from standby to master. The workaround is as
follows:
issue the cluster enable command on the GigaVUE-HC2 with Control Card
version 2 and wait for the state of this node to change to master
issue the cluster enable command on the second node in the cluster, a
GigaVUE-HC2 with a lower cluster preference
activate all the cards on the standby node from the master node
HD-30193 When more than one whitelist is used across nodes within a cluster environment,
IMSIs are not properly updated. For example, if the master node has Whitelist-1 and
the standby node has Whitelist-2, when the user adds an IMSI entry on Whitelist-2,
the IMSI addition/fetch is initiated from the master node. But instead of adding the
IMSI to Whitelist-2, which is in standby, the system adds it to the local node’s
whitelist (master). As a result, the master node contains unwanted GTP subscriber
traffic that will be whitelisted. The workaround is to use the same whitelist for all
nodes in the cluster.
HD-29965 When using H-VUE to upgrade older software versions (pre-4.7 software versions),
an error message is displayed if a 4.7.xx image has also been fetched. The error is:
IndexError: list index out of range. The workaround is to delete the 4.7.xx image and
continue to upgrade to the pre-4.7 software version using H-VUE.
HD-29886 When GigaVUE-TA100 is clustered with other GigaVUE node types, inserting and
removing transceivers causes other ports to bounce (come up, go down, then come
HD-26981 For the PRT-HD0-C06X24 on GigaVUE HD Series nodes, the packet counters may
wrap, thus providing incorrect packet counts when traffic is either entering or leaving
the card at or close to line rate and the statistics have not been collected for an
extended period of time. In the output of the show port stats command, the
IfInUcastPkts and IfOutUcastPkts counters do not match.
HD-26853 The tcpdump command is not supported.
HD-26042 The GigaVUE-HC2 node and inline bypass BPS modules (BPS-HC0-D25A4G, BPS-
HC0-D25B4G, BPS-HC0-D35C4G) do not support 1Gb ZX SFP optic.
HD-25402 In H-VUE, the Quick View only displays regular network and tool ports, not inline-
network, inline-tool, or hybrid ports. For example, inline-network ports appear to be
mapped to network ports and inline-tool ports appear to be mapped to tool ports in
the Quick View. For physical ports such as inline-network, inline-tool, or hybrid, the
workaround is to use the Port page, or for inline types of ports, the workaround is to
use the Inline Bypass tab.
HD-25195 For the PRT-HC0-C02 module on the GigaVUE-HC2 with Control Card version 2,
after hot swapping the module, the module comes up but the link status of the ports
is down. The workaround is to use the reload command to reboot the chassis to
bring up the port links.
HD-22898, HD-23356
Force link-up is not supported on the 100Gb CFP2 ports on the PRT-HD0-C02X08
line card on GigaVUE HD Series nodes.
HD-20208, HD-25658
For inline bypass on the GigaVUE-HC2, if the protected inline network configuration
involves the traffic-path attribute of to-inline-tool, there is no map configured from
the respective inline-network, and the physical-bypass attribute of disable is saved
as the current active configuration without any map associated with this inline
network, then a power cycle, reload, or configuration restore (via switch-to) of the
GigaVUE-HC2 system will result in enabling the physical protection for this inline
network while presenting the physical-bypass attribute of disable. To disable the
actual physical protection, change the physical-bypass attribute to enable and then
to disable.
Available Documentation
Document Summary
GigaVUE HD Series Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE HD Series nodes
GigaVUE -HC3 Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE-HC3 nodes
GigaVUE -HC2 Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE-HC2 nodes
GigaVUE -HC1 Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE-HC1 nodes
GigaVUE HB Series Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE HB Series nodes
GigaVUE-TA1 Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE-TA1 nodes
GigaVUE TA Series Hardware how to unpack, assemble, rack-mount, connect, and perform the
Installation Guide initial configuration of GigaVUE-TA10, GigaVUE-TA40, GigaVUE-
TA100, and GigaVUE-TA100-CXP nodes
GigaVUE-OS Installation Guide on how to install the GigaVUE-OS on Certified Traffic Aggregation
a White Box White Boxes
GigaVUE-OS CLI User’s Guide all about the GigaVUE H Series nodes, including Initial
Configuration, and CLI usage in this software release
Inline SSL Decryption Guide SSL decryption for inline tools and how to configure it using the
CLI and H-VUE
Application Session Filtering step-by-step recipes that show how to extract relevant flows with
Cookbook ASF, such as filtering YouTube traffic or email with attachments
GigaVUE H Series Upgrade Guide how to upgrade GigaVUE H Series nodes to this software release
GigaVUE TA Series Upgrade Guide how to upgrade GigaVUE TA Series nodes to this software release
GigaVUE-OS H-VUE User’s Guide how to install, connect, configure, and operate the H-VUE Web-
Based GUI for the GigaVUE H Series nodes
Documentation Feedback
To send feedback and report issues in our documentation, complete the short survey at the following
link: https://www.surveymonkey.com/r/gigamondocumentationfeedback
Copyright
Copyright © 2018 Gigamon Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
stored in a retrieval system, or translated into any language in any form or by any means without Gigamon’s written permission
Trademark Attributions
Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks
can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners.