Specifications
Page 2 ExtremeWare v6.2.1 Release Notes
Release Notes for ExtremeWare v6.2.1
• MAC Address Security: MAC-based security allows you to control the way the FDB is learned and
populated. By managing entries in the FDB, you can block, assign priority (queues), and control
packet flows on a per-address basis. The new MAC address security feature allows you to limit the
number of MAC addresses that can be learned on a virtual port. Once the learning limit has been
reached, any additional addresses will be blocked. This feature is implemented through a new
option in the
configure ports command.
See Chapter 6, “FDB Commands” in the ExtremeWare Software Command Reference Guide for a detailed
description of the commands related to this feature.
• NetFlow Version 1: NetFlow flow statistics provide a way for a switch to capture and export traffic
classification or precedence information as data traverses, or flows, across portions of a network. A
network flow is defined as a unidirectional sequence of packets between a particular source device
and destination device that share the same protocol and transport-layer information. Flows are
defined by the combination of their source IP address, destination IP address, source port,
destination port, and protocol type.
See Chapter 12, “Status Monitoring and Statistics” in the ExtremeWare Software Command Reference
Guide for a detailed description of the commands related to this feature.
• Virtual Router Redundancy Protocol (VRRP): VRRP is a proposed IETF standard protocol that allows
multiple switches to provide redundant routing services to users, by enabling a group of routers to
function as a single virtual default gateway. Like ESRP, VRRP is used to eliminate the single point of
failure associated with manually configuring a default gateway address on each host in a network.
Because VRRP is a standards-based protocol, it can be used in multi-vendor installations.
See Chapter 15, “Virtual Router Redundancy Protocol” in the ExtremeWare Software Command
Reference Guide for a detailed description of the commands related to this feature.
• Extreme Multiple Instance Spanning Tree Protocol (EMISTP): EMISTP mode is an extension of STP
that allows a physical port to belong to multiple STPDs by assigning the port to multiple VLANs.
EMISTP adds significant flexibility to STP network design.
See Chapter 13, “Spanning Tree Protocol” in the ExtremeWare Software Command Reference Guide for a
detailed description of the commands related to this feature.
• Network Login: Network login is a feature designed to control the admission of user packets into a
network by giving addresses only to users that have been properly authenticated. Network login is
controlled by an administrator on a per port, per VLAN basis and uses an integration of DHCP, user
authentication over the web interface, and, sometimes, a RADIUS server to provide a user database
or specific configuration details.
Network Login is described Chapter 3 of the ExtremeWare Software User Guide. See Chapter 3,
“Managing the Switch” in the ExtremeWare Software Command Reference Guide for a detailed
description of the commands related to this feature.
• Ethernet Automatic Protection Switching (EAPS): The EAPS protocol provides fast protection
switching to Layer 2 switches interconnected in an Ethernet ring topology, such as a Metropolitan
Area Network (MAN) or large campuses. EAPS protection switching is similar to what can be
achieved with the Spanning Tree Protocol (STP), but offers the advantage of converging in less than
a second when a link in the ring breaks.
This new feature is documented in Chapter 11 of the ExtremeWare Software User Guide. The
commands related to this feature are documented in detail in Chapter 11 of the ExtremeWare Software
Command Reference Guide.
• Software Controlled Redundant Port: The Software Controlled Redundant Port feature provides a
way to back up a specified ethernet port with a redundant dedicated ethernet port. Should the
active port go down, the backup port will establish a link and take over for the failed port.