Release Notes

Important Notes
Topics:
Security
Ethernet Switch firmware update
Upgrading or downgrading OME-Modular
Security
OpenVAS vulnerability scanner may report the following issues:
NVT: OpenSSH 'sftp-server' Security Bypass Vulnerability (Linux) (OID: 1.3.6.1.4.1.25623.1.0.812051). This is a false positive
based on the OpenSSH version that OMEModular carries. No SFTP is exposed or supported.
NVT: SSH Weak Encryption Algorithms Supported (OID: 1.3.6.1.4.1.25623.1.0.105611). OMEModular supports secure
algorithms and upgrades SSH clients to the appropriate option. Configure your SSH client to autonegotiate the crypto
algorithms used.
Security best practices
SNMP
Security scanners may identify SNMP. If you do not use SNMP in your deployment, you can disable SNMP.
If SNMP is required, Dell EMC recommends that the default community name is changed from public.
By default, a self-signed certificate is generated to enable HTTPS communication. Dell EMC recommends generating a CSR
and installing a valid non-self signed certificate.
Besides improving the security of OME-Modular, these actions eliminate warnings that are produced by vulnerability scanners
relating to the default self-signed web server certificate and default SNMP community name.
NOTE: Dell EMC recommends changing the default password for OMEModular.
Ethernet Switch firmware update
For instructions about updating network IOMs, see the Dell EMC OpenManage Enterprise - Modular Edition Version 1.20.10 for
PowerEdge MX Chassis User's Guide.
NOTE:
You can update up to six IOMs simultaneously. However, the OME-Modular web interface displays a
recommendation message to update only four IOMs simultaneously to ensure network stability.
Upgrading or downgrading OME-Modular
Clear the browser cache before or after upgrading or downgrading OME-Modular.
5
8 Important Notes