Release Notes

Important Notes
Topics:
Keywords
Security
Ethernet Switch firmware update
Keywords
From OME-Modular version 1.30, references to the following keywords shall be deprecated:
MSM, LEX, Lexington, EC, Enclosure Controller, Poleg, CMC, Pathfinder, Sojourner, Senna, Insight, Galileo
Weaver, Spinner, HE Switch, LE Switch, WeaverSwitch, HE, LE, DNV
HEIOM, HE-IOM, HE_IOM, HE IOM, LEIOM, LE-IOM, LE_IOM, LE IOM
FCIOM, FC-IOM, FC_IOM, FC IOM, Starlynx, Skylynx
Security
OpenVAS vulnerability scanner may report the following issues:
NVT: OpenSSH 'sftp-server' Security Bypass Vulnerability (Linux) (OID: 1.3.6.1.4.1.25623.1.0.812051). This is a false positive based on
the OpenSSH version that OME–Modular carries. No SFTP is exposed or supported.
NVT: SSH Weak Encryption Algorithms Supported (OID: 1.3.6.1.4.1.25623.1.0.105611). OME–Modular supports secure algorithms and
upgrades SSH clients to the appropriate option. Configure your SSH client to autonegotiate the crypto algorithms used.
Security best practices
SNMP
Security scanners may identify SNMP. If you do not use SNMP in your deployment, you can disable SNMP.
If SNMP is required, Dell EMC recommends that the default community name is changed from public.
By default, a self-signed certificate is generated to enable HTTPS communication. Dell EMC recommends generating a CSR and
installing a valid non-self signed certificate.
Besides improving the security of OME-Modular, these actions eliminate warnings that are produced by vulnerability scanners relating to
the default self-signed web server certificate and default SNMP community name.
NOTE: Dell EMC recommends changing the default password for OME–Modular.
Ethernet Switch firmware update
For instructions about updating network IOMs, see the Dell EMC OpenManage Enterprise - Modular Edition Version 1.20.00 for
PowerEdge MX Chassis User's Guide.
A firmware update for passthrough and MX7116n modules is staged for deployment on the next power cycle or virtual reseat of the
module.
5
10 Important Notes