H3C SecPath vFW1000 Series

Release time:2025-01-08
HomeSupportSecurityvFW1000 SeriesSoftware DownloadvFW1000 Series

H3C SecPath vFW1000-CMW710-E1260P45-X64 Release Notes

Contents

Version information· 1

Version number 1

Version history· 1

Software operating environments· 2

Hardware and software compatibility· 3

ISSU upgrade type matrix· 5

Upgrade restrictions and guidelines· 6

Hardware feature updates· 6

Software feature and command updates· 6

MIB updates· 6

Operation changes· 7

Operation changes in vFW1000-CMW710-E1260P45-X64· 7

Operation changes in vFW1000-CMW710-E1260P39-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P29-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P26-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P21-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P18-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P1213-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P1211-X64· 8

Operation changes in vFW1000&vFW2000-CMW710-E1185P1210-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1185P12-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1185P09-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1185P07-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1184P01-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1711P14-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1711P13-X64· 9

Operation changes in vFW1000&vFW2000-CMW710-E1711P11-X64· 10

Operation changes in vFW1000&vFW2000-CMW710-E1711P02-X64· 10

Restrictions and cautions· 10

Open problems and workarounds· 11

List of resolved problems· 11

Resolved problems in vFW1000-CMW710-E1260P45-X64· 11

Resolved problems in vFW1000-CMW710-E1260P39-X64· 14

Related documentation· 15

Documentation set 15

Obtaining documentation· 16

Technical support 16

Handling software upgrade failures· 25


List of tables

Table 1 Version history. 1

Table 2 Software operating environments of vFW1000. 2

Table 3 Software operating environments of vFW1000-V. 2

Table 4 Software operating environments of vFW1000-E-Cloud. 2

Table 5 Hardware and software compatibility matrix. 3

Table 6 ISSU version compatibility matrix. 6

Table 7 Upgrade methods. 22

 

 


This document introduces the features, usage restrictions, issues, and workarounds of version vFW1000-CMW710-E1260P45-X64. Before loading this version, back up the configuration file and perform internal verification to avoid potential risks as a best practice.

Use this document in conjunction with H3C SecPath vFW1000-CMW710-E1260P45-X64 Release Notes (Software Feature Changes) and the documents listed in "Related documentation."

Version information

Version number

H3C Comware Software, Version 7.1.064, ESS 1260P45

Version history

Table 1 Version history

Version number

Last version

Release date

Release type

Remarks

vFW1000-CMW711-E1260P45-X64

vFW1000-CMW710-E1185P39-X64

April 27, 2023

ESS versions

Fixed bugs

vFW1000-CMW711-E1260P39-X64

vFW1000-CMW710-E1185P29-X64

September 25, 2023

ESS versions

Fixed bugs

vFW1000-CMW711-E1185P29-X64

vFW1000-CMW710-E1185P26-X64

November 11, 2022

ESS versions

Released for TR4A and TR5 of vFW-E-Cloud

vFW1000-CMW711-E1185P26-X64

vFW1000-CMW710-E1185P21-X64

July 29, 2022

ESS versions

Fixed bugs

vFW1000-CMW711-E1185P21-X64

vFW1000-CMW710-E1185P1218-X64

February 25, 2022

ESS versions

Fixed bugs

vFW1000-CMW711-E1185P18-X64

vFW1000-CMW710-E1185P1213-X64

November 27, 2021

ESS versions

Fixed bugs

vFW1000-CMW711-E1185P1213-X64

vFW1000-CMW710-E1185P1211-X64

October 22, 2021

ESS versions

Fixed bugs

vFW1000-CMW711-E1185P1211-X64

vFW1000-CMW710-E1185P1210-X64

July 16, 2021

ESS versions

Fixed bugs

vFW1000-CMW710-E1185P1210-X64

vFW1000-CMW710-E1185P12-X64

June 19, 2021

ESS versions

Fixed bugs

vFW1000-CMW710-E1185P12-X64

vFW1000-CMW710-E1185P09-X64

May 18, 2021

ESS versions

Fixed bugs

vFW1000-CMW710-E1185P09-X64

vFW1000-CMW710-E1185P07-X64

February 23, 2021

ESS versions

Fixed bugs

vFW1000-CMW710-E1185P01-X64

vFW1000-CMW710-E1171P14-X64

May 26, 2020

ESS versions

Fixed bugs

vFW1000-CMW710-E1171P14-X64

vFW1000-CMW710-E1171P13-X64

April 17, 2020

ESS versions

Fixed bugs

vFW1000-CMW710-E1171P13-X64

vFW1000-CMW710-E1171P11-X64

March 27, 2020

ESS versions

Fixed bugs

 

Software operating environments

Table 2 Software operating environments of vFW1000

Hypervisor

Hardware requirements

VMware/KVM/CAS

1 vCPU (clock speed ≥ 2.0 GHz)

4 vCPU (clock speed ≥ 2.0 GHz)

8 vCPU (clock speed ≥ 2.0 GHz)

Virtual memory capacity: 2GB or above

Virtual memory capacity: 4GB or above

Virtual memory capacity: 8GB or above

Virtual disk capacity: 8GB or above

Virtual network interfaces: Two or more virtual Ethernet NICs

 

Table 3 Software operating environments of vFW1000-V

Hypervisor

Hardware requirements

VMware/KVM/CAS

vFW1000-V2

vFW1000-V4

vFW1000-V8

4 vCPU (clock speed ≥ 2.0 GHz)

8 vCPU (clock speed ≥ 2.0 GHz)

8 vCPU (clock speed ≥ 2.0 GHz)

Virtual memory capacity: 4GB or above

Virtual disk capacity: 256GB or above

Virtual memory capacity: 8GB or above

Virtual disk capacity: 512GB or above

Virtual memory capacity: 16GB or above

Virtual disk capacity: 1T or above

Virtual network interfaces: Two or more virtual Ethernet NICs

 

Table 4 Software operating environments of vFW1000-E-Cloud

Hypervisor

Hardware requirements

VMware/KVM/CAS

vFW-E-Cloud-100[300][500]

vFW-E-Cloud-1000[3000][5000]

4 vCPU (clock speed ≥ 2.0 GHz)

8 vCPU (clock speed ≥ 2.0 GHz)

Virtual memory capacity: 8GB or above

Virtual memory capacity: 16GB or above

Virtual disk capacity: 8GB or above

Virtual network interfaces: Two or more virtual Ethernet NICs

 

Hardware and software compatibility

CAUTION:

To avoid an upgrade failure, use the following table to verify the hardware and software compatibility before performing an upgrade.

 

Table 5 Hardware and software compatibility matrix

Product series

vFW1000/vFW-E-Cloud/vFW1000-V virtual firewalls

Models

vFW1000/vFW-E-Cloud/vFW1000-V

Server processors

x86 servers with Intel or Hygon processors:

·          Intel Gold 5218R, processor clock speed ≥ 2.0 GHz

·          UNIS Server R3830 G3/CPU

·          Hygon G3-RS4M1CHG7280-7280B

CPU computing capabilities affect the performance of VIPS virtual devices. The CPU computing capabilities vary by CPU model.

Hypervisor

·          VMware ESXi 4.1, 5.0, 5.1, 5.5, 6.0

·          Linux KVM (Linux kernel > 2.6.25). As a best practice, use the following Linux release versions:

¡  CentOS 7.0

¡  Ubuntu 14.04

¡  Red Hat Enterprise Linux (RHEL) 6.3

¡  SUSE Linux Enterprise Server 11SP2

·          H3C CAS E0306H07

As a best practice, use the KVM version that comes with the server system. Use the VFIO network adapter driver.

Virtual NICs

·          E1000

·          VirtIO

·          VMXNET3

·          Intel 82599VF

·          Intel X540VF/X710VF/X722VF

NIC performance varies by NIC model.

NIC driver

The system comes with open-source/H3C drivers.

The driver version affects SRIOV compatibility. As a best practice, use driver versions 2.10 through 2.15 for X710 network adapters.

Some network adapter models with open-source drivers do not support virtual MAC and VLAN promiscuous modes (involving virtual interfaces and VLAN termination scenarios). In such scenarios, H3C drivers are required.

Deployment mode

SRIOV and VIRTIO.

As a best practice to ensure high performance, use the SRIOV deployment mode and compatible network adapters and drivers.

Performance optimization configuration, restrictions, and guidelines

Performance improvement configuration: Core binding, core isolation, HugePages memory, and inter-NUMA avoidance. For more information, see the deployment guide.

Compatibility considerations: In Intel environments, consider KVM, network adapter driver, and network adapter model compatibility.

Performance factors: Resource allocation, network adapter deployment mode, server performance optimization configuration, and actual server load all affect performance. Performance varies by deployment mode. Specific performance data depends on the deployment environment and configuration.

Boot ROM version

1.03 or above

Image file names and MD5 values

vFW1000_H3C-CMW710-E1260P45-X64.ipe

MD5 checksum: 75b0eb6caee13c03128cca8aeda1c7f0

vFW1000_H3C-CMW710-E1260P45-X64.iso

MD5 checksum: d6cf2e4c15d7fe300d3f71f925292619

vFW1000_H3C-CMW710-E1260P45-X64.ova

MD5 checksum: eeb5be03055247e86c649c6698817540

vFW1000_H3C-CMW710-E1260P45-X64.qco

MD5 checksum: adf37e7ff923a2803b34dae3f2d66f15

vFW1000_H3C-CMW710-E1260P45-X64.descriptor

toMarketToolsV2.02.zip

vFW1000-CMW710-E1260P45-X64.ova is required only in the first installation of the VMware hypervisor. For more information, see H3C NFV Series Products Installation and Startup Guide.

vFW1000-CMW710-E1260P45-X64.ova is based on VMware VM version 8. It is compatible with hosts of ESXi 5.0 and later versions.

IMC versions

iMC PLAT 7.3 (E0706P09)

iMC PLAT(ACLM) 7.3 (E0706P09)

iMC PLAT(DM) 7.3 (E0706P09)

iMC PLAT(ICC) 7.3 (E0706P09)

iMC PLAT(VLAN)(E0706P09)

iMC UBA 7.3 (E0707L06)

iMC IVM 7.3 (E0506)

iMC EIA 7.3 (E0611P13)

iMC SHM 7.3 (E0707L06)

iNode version

iNode PC 7.3 (E0585)

License server version

E1205

CSAP-S version

E1143P0601

Security Management Platform (SMP) version

E1112P02

SecCloud OMP version

E1301P01

Unified Platform

Not supported

AD-NET

E0709

U-Center AOM

E0706P01

Application-Driven Campus Network (AD-Campus)

Not supported

Application-Driven Data Center (AD-DC)

E6103

Application-Driven Wide Area Network (AD-WAN)

Not supported

Cloudnet

Not supported

 

To display the host software and BootWare version of vFW1000, perform the following:

<H3C> display version

H3C Comware Software, Version 7.1.064, ESS 1260P45

Copyright (c) 2004-2024 New H3C Technologies Co., Ltd. All rights reserved.

H3C SecPath vFW1000 uptime is 0 weeks, 2 days, 18 hours, 39 minutes

Last reboot reason : IRF merge

Boot image: flash:/vFW1000-CMW710-BOOT-E1260P45-X64.bin

Boot image version: 7.1.064, ESS 1260P45 

Compiled Mar 19 2024 14:00:00

System image: flash:/vFW1000-CMW710-SYSTEM-E1260P45-X64.bin

System image version: 7.1.064, ESS 1260P45 

Compiled Mar 19 2024 14:00:00

 

CPU ID: 0x01000107, vCPUs: Total 8, Available 8

16.00G bytes RAM Memory

Basic    BootWare Version:  1.13

Extended BootWare Version:  1.13

[SUBSLOT  1]VNIC-VIRTIO            (Driver)1.0

[SUBSLOT  2]VNIC-VIRTIO            (Driver)1.0

[SUBSLOT  3]VNIC-VIRTIO            (Driver)1.0

 

[H3C-probe]display  system internal  version           

H3C SecPath vFW1000 V100R001B02D660SP45

Comware V700R001B64D060SP45

 

UniCloud Uniware Software, Version 7.1.064, ESS 1260P45

Copyright (c) 2024 UniCloud Tech Co., Ltd. All rights reserved.

UniCloud SecPath vFW1000 uptime is 0 weeks, 2 days, 20 hours, 0 minutes

Last reboot reason : User reboot

Boot image: flash:/vFW1000G-UNW710-BOOT-E1260P45-X64.bin

Boot image version: 7.1.064, ESS 1260P45 

Compiled Mar 19 2024 14:00:00

System image: flash:/vFW1000G-UNW710-SYSTEM-E1260P45-X64.bin

System image version: 7.1.064, ESS 1260P45 

Compiled Mar 19 2024 14:00:00

[VFW-probe]display  system internal  version                                   

UniCloud SecPath vFW1000 V100R002B02D660SP45

Uniware V700R001B64D060SP45

ISSU upgrade type matrix

ISSU provides two upgrade types: compatible upgrade and incompatible upgrade. Table 6 provides the approved ISSU upgrade types only between the current version and the history versions within the past 18 months. This matrix does not include history versions that are 18 months earlier than the current version, for which, no ISSU upgrade verification is performed.

For more information about ISSU, see the fundamental configuration guide for the device.

Table 6 ISSU version compatibility matrix

Current version

History version

ISSU upgrade method

vFW1000-CMW710-E1260P45-X64

vFW1000&vFW2000-CMW710-E1185P39-X64

Compatible

vFW1000-CMW710-E1260P39-X64

vFW1000&vFW2000-CMW710-E1185P29-X64

Incompatible

ISSU upgrade with versions earlier than D060SP36 is not supported.

vFW1000&vFW2000-CMW710-E1185P29-X64

vFW1000&vFW2000-CMW710-E1185P26-X64

Incompatible

First release. vFW-E-Cloud and vFW shares the same IPE file and do not support ISSU.

vFW1000&vFW2000-CMW710-E1185P26-X64

vFW1000&vFW2000-CMW710-E1185P21-X64

Compatible

vFW1000&vFW2000-CMW710-E1185P21-X64

vFW1000&vFW2000-CMW710-E1185P18-X64

Compatible

 

vFW1000&vFW2000-CMW710-E1185P1213-X64

Incompatible

IRF network. ISSU upgrade is not recommended.

 

Upgrade restrictions and guidelines

Do not upgrade the device through remote login.

Hardware feature updates

None.

Software feature and command updates

For more information about the software feature and command update history, see H3C vFW1000_H3C-CMW710-E1260P45-X64 Release Notes (Software Feature Changes).

MIB updates

Version number

Item

MIB file

Module name

Description

vFW1000-CMW710-E1260P45-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000-CMW710-E1260P39-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P29-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P26-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P21-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P18-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P1213-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P1211-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P1210-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P12-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1185P09-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1184P01-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1171P14-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1171P13-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1171P11-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

vFW1000&vFW2000-CMW710-E1171P02-X64

New

N/A

N/A

 

Modified

N/A

N/A

 

Modified

N/A

N/A

First release

 

Operation changes

Operation changes in vFW1000-CMW710-E1260P45-X64

None.

Operation changes in vFW1000-CMW710-E1260P39-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P29-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P26-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P21-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P18-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P1213-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P1211-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P1210-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P12-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P09-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1185P07-X64

First release of the D060SP branch.

Operation changes in vFW1000&vFW2000-CMW710-E1184P01-X64

First release of the D059SP branch.

Operation changes in vFW1000&vFW2000-CMW710-E1711P14-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1711P13-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1711P11-X64

None.

Operation changes in vFW1000&vFW2000-CMW710-E1711P02-X64

First release of the D045SP branch.

Restrictions and cautions

·            If no license is installed on a vFW1000, vFW2000, or vFW1000-V device, the performance and features of the device are strictly limited. Make sure you have purchased and installed a formal license before you use the device. After installing a license, you must reboot the device for the license to take effect. After the license changes, for example, the license capacity is expanded, you must reboot the device to obtain the full performance and functionality of the new license.

·            The durations for a single-feature license and a multi-feature license cannot be combined.

·            The xxv710 network card's virtual port (25G) is displayed as a 10G interface because its device_id is the same as the x710 network card's virtual port (10G). The network card speed is obtained in the later stage of driver initialization, and the interface information has already been reported to the interface management module at this time. Therefore, it is impossible to distinguish the interface type based on the network card speed. Changing the timing of obtaining the network card speed requires altering the entire driver process. However, Mellanox provides a driver interface to obtain interface capabilities (including speed), allowing interface types to be distinguished based on speeds.

·            Because the vFW device is installed in a server, its ports are not fixed. In the default configuration, the black hole forwarding mode does not include ports, and the DPI configurations have been added to the default configuration.

·            Because the underlying chip cannot distinguish whether an X722 network card is a 1G or 10G one, the vFW product identifies the 1G interfaces on the X722 network card as 10G interfaces. However, this does not affect the network card functions. When the rate exceeds 1000 M/s, the network card automatically drops packets, and the actual maximum rate can only reach 1 Gbps.

·            The VIRTIO interfaces on the vFW1000 are all displayed as 1G interfaces because the virtualization platform prevents the system from detecting whether the physical network card is a 1G card or a 10G card. If a VIRTIO interface is a 10G interface, the interface forwarding function is not affected because the system capability can meet the forwarding requirement.

·            An X722 (1G copper ports) network card can be added through PCI.

¡  When the X722 network card (PCI passthrough) is not loaded, the vFW1000 upgrades the IPE version (2 cores and 4 GB memory) and functions correctly.

¡  When the X722 network card (PCI passthrough) is loaded, the vFW1000 is installed with an ISO image (4 cores and 4 GB memory) and functions correctly.

·            Switchover between vFW product models

The vFW-E-Cloud only supports authorization through a License Server, and does not support local authorization.

The vFW1000, vFW-E-Cloud, and vFW1000-V use the same version file (for example, vFW1000-X64.ipe). To switch a vFW1000 to a vFW-E-Cloud, edit the ovf-env.xml file as follows:

a.    Identify whether the current device is a vFW-E-Cloud.

[H3C]license client install standard ?  

1vcpu-1year        License for 1 vCPU with a validity period of 1 year

The output shows that the device is a vFW1000.

b.    To change the device model, upload the following XML file to the /mnt/flash\:/ directory through FTP or TFTP.

c.    Restart the device.

d.    After the device starts up, execute the [H3C] license client install standard command.

[H3C]license client install standard ?

100M-common-1year        License for 256 vCPU with a bandwidth upper limit of 100M and a validity period of 1 year

The output shows that the device is a vFW-E-Cloud.

·            After you address the vulnerabilities caused by low encryption algorithm strength, the iNode client carried by B64D060SP22 (which uses TLS1.0 for negotiation by default) cannot successfully log in to the SSLVPN gateway. You must use an iNode client in a version later than E0582.

Open problems and workarounds

None.

List of resolved problems

Resolved problems in vFW1000-CMW710-E1260P45-X64

202401110943

·            Symptom: When MAD is performed in a dual-member IRF fabric, slot 2 has a higher priority. The member devices might be shut down by MAD if heartbeat channels and MAD channels are reconnected after a physical link disconnection.

·            Condition: This symptom might occur if heartbeat channels and MAD channels are reconnected after a physical link disconnection in a dual-member IRF fabric where MAD is performed and slot 2 has a higher priority.

202312052180

·            Symptom: The device might get stuck when large configurations such as a large number of security policies and ACL rules are deployed. To resolve this issue, you can execute the undo cfg-change log enable command to disable configuration logging for all modules. However, the undo cfg-change log enable command might cause an RBM backup failure. To perform RBM backup, execute the cfg-change log enable command again.

·            Condition: This symptom might occur if large configurations such as a large number of security policies and ACL rules are deployed.

202210191379

·            Symptom: NAT ALG RTSP is enabled by default. Then, if an error occurs when the ALG service processes specific RTSP packets on the device, the device will restart.

·            Condition: This symptom might occur if NAT or AFT is used for service processing on a standalone device and NAT ALG and AFT ALG are enabled by default.

202101071262

·            Symptom: The ipoe process enters a dead loop, causing high CPU usage.

·            Condition: This symptom might occur if a primary/backup switchover is performed after an IPoE user comes online and goes offline in an IRF environment.

202310200813

·            Symptom: The httpd process is abnormal, resulting in the generation of core files on the device.

·            Condition: This symptom might occur if an HTTP fuzz testing tool is used to initiate HTTP attacks on the device.

202401091404

·            Symptom: Errors occur on the device intermittently.

·            Condition: This symptom might occur if you use a Python script to SSH to the device and execute three display commands.

202401261208

·            Symptom: The Web interface displays abnormally.

·            Condition: This symptom might occur if a large number of SSL VPN users come online or go offline and resource access logging is enabled.

202401221344

·            Symptom: On the Web interface, for static routes with the egress interface as a dialer interface, change the next hop address requirement from mandatory to optional.

·            Condition: This symptom might occur if you configure the settings on the Web interface in a PPPOE dial-up scenario.

202403010923

·            Symptom: The DNS server cannot connect to the database through the firewall.

·            Condition: This symptom might occur if the server acts as the DNS proxy and the value of the answer RRs field is incorrect in the DNS response packet.

202402080028

·            Symptom: The last 6 rules of global NAT were not issued to the kernel, causing the service to be disrupted.

·            Condition: This symptom might occur in an RBM network after the master device restarts.

202404092037

·            Symptom: The object-group dns-aging time 70000000 configuration gets lost after a master/backup switchover.

·            Condition: This symptom might occur after a master/backup switchover.

202309210057

·            Symptom: The system prompts that the file download failed. You must return to the root firewall, perform a successful downloading, and then switch back to the user context to succeed.

·            Condition: This symptom might occur if you create a new user context, enable the gateway, and click to enter template management to download the system or default template.

202309191742

·            Symptom: After the upgrade, the next hop VPN of the IPv6 static route for the loopback interface is incorrect, causing the SYN-ACK packets to mismatch the VPN and be discarded.

·            Condition: This symptom might occur in the scenario of IPv6 cross-VPC access if you perform a version upgrade using binary configuration recovery.

202309141186

·            Symptom: The system enters KDB.

·            Condition: This symptom might occur under heavy attack traffic if you upgrade the signature library and frequently query for rule hits during the upgrade process.

202309131661

·            Symptom: The IP address of the backup device's aggregate interface cannot be used to reach the directly connected addresses.

·            Condition: This symptom might occur in an EVPN networking environment with branch IRF stacking if the master and the backup devices each have a physical port joined to different aggregate interfaces, with IPs configured under the aggregate interfaces.

202309120975

·            Symptom: The global NAT-associated VRRP configuration gets lost.

·            Condition: This symptom might occur in an RBM+VRRP network if global NAT is configured after you upgrade the system from D045SP to D060SP.

202309120324

·            Symptom: A memory out-of-bounds issue occurred in the driver code.

·            Condition: This symptom might occur if you use the Kasan version to enable virtual context.

202309062224

·            Symptom: WEB upload failed and the system prompts that the file is invalid. You must add a JS file for uploading to the device.

·            Condition: This symptom might occur if you upload a single-point-login encrypted file from the Web interface.

202309051138

·            Symptom: The driver will clear the bypass flag, causing the bypass function to fail.

·            Condition: This symptom occurs when the device performs Layer 3 inline forwarding.

202309010341

·            Symptom: The device reboots unexpectedly.

·            Condition: This symptom occurs if an alarm template has been configured in the anti-virus policy, and the device receives HTTP traffic when a security policy has used the anti-virus policy.

202308301581

·            Symptom: In a security zone, the configuration that includes the vpn-instance parameter is lost. For example, the import ip 0.0.0.0 0 vpn-instance b and import ipv6 :: 1 vpn-instance b commands configured in a security zone are lost.

·            Condition: This symptom occurs if you restore the device configuration by using a binary configuration file after the device restarts.

202307100879

·            Symptom: The system prompts an import failure for a row of data.

·            Condition: This symptom occurs if you navigate to the Policies > Security Policies page, and then export security policies and then import them.

Resolved problems in vFW1000-CMW710-E1260P39-X64

202308232731

·            Symptom: The NAT66 configuration is lost.

·            Condition: This symptom occurs if NAT66 is configured on the device and then the device version is upgraded from the D045SP branch to the D060SP branch.

202308150080

·            Symptom: The RBM secondary device enters KDB state.

·            Condition: This symptom occurs in an RBM asymmetric environment where the user context is under attack for a period of time.

202308140047

·            Symptom: When the offset is 0, the calculated offset is exactly 8 bytes, which is the same as the length of the fragment extension header, therefore no error occurs. When the offset is not 0, the protocol number and source/destination port numbers obtained based on the offset are incorrect.

·            Condition: This symptom occurs in the security policy match process for packets, during which the device incorrectly uses the Reserved octet field from the extension header of IPv6 fragmented packets as the offset variable for subsequent queries.

202307260561

·            Symptom: In an RBM network, the configuration consistency check reports an error.

·            Condition: This symptom occurs if a configuration consistency check is performed in an RBM network where the nas-ip is the local host's IP address.

202306160682

·            Symptom: The buffer is not released after traffic stops.

·            Condition: This symptom occurs when 9000-byte transparent relay packets are injected into a dual-active F5000-CN40 network.

202208150532

·            Symptom: The IP reputation feature of TCP is unavailable.

·            Condition: This symptom occurs when you enable the TCP reassembly and IP reputation features.

202309160373

·            Symptom: The device reboots due to a memory issue.

·            Condition: This symptom occurs if you repeat the following operations multiple times:

a.    Repeatedly replay faulty packets in an IRF fabric configured with master and subordinate devices.

b.    Change the license status for the primary and secondary devices when traffic exists.

c.    Restart the subordinate device.

202309131420

·            Symptom: OSPF flapping and session interruption occur.

·            Condition: This symptom occurs if you configure the context-capability inbound drop-logging enable command in an aggregated OSPF network, and upgrade the version from D060P27 to D060P36.

202309010743

·            Symptom: The NAT policy does not take effect.

·            Condition: This symptom occurs if you perform the following operations:

a.    Configure two rules for a NAT policy, which match the same object group specified for the source address and destination address.

b.    Add a new server address to the object group. Two seconds later, the NAT translation does not take effect for traffic destined to this new server address.

202308250059

·            Symptom: When URL filtering and HTTPS traffic filtering are enabled for the device, HTTPS traffic cannot be intercepted.

·            Condition: This symptom occurs if you enable URL filtering and HTTPS traffic filtering for the device, and create HTTPS traffic matching the filtering conditions.

202307251310

·            Symptom: When you install or remove 10-GE copper-port module 0231AH0W (10G_BASE_T_AN_SFP) for 10-GE ports 26 to 29 on the F1000-AI-75/65 device, an error message is displayed that Transceiver type not supported!.

·            Condition: This symptom occurs if you install or remove 10-GE copper-port module 0231AH0W (10G_BASE_T_AN_SFP) for 10-GE ports 26 to 29 on the F1000-AI-75/65 device.

202306021249

·            Symptom: If you associate a static route with control-mode BFD, the device continuously reports BFD logs.

·            Condition: This symptom occurs if you configure a static route and associate it with control-mode BFD.

202309070275

·            Symptom: After you configure RBM settings on the master device, which are then auto synced to the backup device, the settings are not automatically saved.

·            Condition: This symptom occurs if you configure RBM settings on the master device, which are then auto synced to the backup device.

Related documentation

Documentation set

·            H3C NFV Products Installation and Startup Guide

·            H3C Security Products Licensing Guide(Comware 7)

·            H3C Firewall Products Comware 7 Web Configuration Guide

·            H3C SecPath F1000[F5000][VFW] Firewalls Series Configuration Guides(V7)

·            H3C SecPath F1000[F5000][VFW] Firewalls Series Command Reference(V7)

·            H3C Security Products Comware 7 System Log Messages Reference

Obtaining documentation

To obtain the latest documents, go to the H3C website www.h3c.com/en

1.      To obtain the most recent drive and firmware, access http://www.h3c.com/en/Technical_Documents

2.      Select the product category and product model. Then, you can search for and download documents related to the product.

Technical support

Email: [email protected]

Website: http://www.h3c.com/en


Appendix A Feature list

Hardware features

None.

Software features

Item

Description

Network security

AAA

Portal authentication

RADIUS

HWTACACS authentication

Local authentication

Firewall

Security zone division.

Prevention of multiple attacks, including Land, Smurf, Fraggle, Ping of Death, Tear Drop, IP Spoofing, IP fragment, ARP spoofing, ARP active reverse lookup, TCP packet invalid flag, oversized ICMP packets, address scanning, port scanning, SYN Flood, UPD flood, and ICMP flood attacks

Basic and advanced ACLs

Interface-based ACLs

Time range-based ACLs

Dynamic packet filtering

ASPF

Static and dynamic blacklists

Connection limit

NAT

Mapping multiple internal addresses to the same public address

Mapping multiple internal addresses to multiple public addresses

One-to-one mapping of internal addresses to public addresses

Simultaneous conversion of source and destination addresses

External network hosts accessing internal servers

Direct mapping of internal addresses to interface public IP addresses

DNS mappings

Validity period setting for address translation

Multiple NAT ALG settings, including DNS, FTP, TFTP, PPTP, H.323, SIP, RSH, ILS, MSN, and NBT.

Content filtering and auditing

Content filtering and auditing

Recipient and sender filtering

Attachment name and content check

Email subject and content check

Filtering files uploaded or downloaded through FTP

Matching Chinese encoding methods

Bandwidth management

Bandwidth management

Setting the maximum uplink bandwidth

Setting the maximum downlink bandwidth

Setting the guaranteed uplink bandwidth

Setting the guaranteed downlink bandwidth

Bandwidth channels can be specified based on different parameters (source security zone, destination security zone, source address, destination address, application or application group, time range, and user)

Configuring parent/child traffic profiles

Configuring interface-specific bandwidth

AVC reports and logs (user logs, local logs, and local reports)

Traffic blocking and rate-limiting

VPN

L2TP VPN

Initiating connections to the specified LNSs based on VPN user full username and user domain

Assigning addresses to VPN users

LCP renegotiation and secondary CHAP authentication

IPSec/IKE

AH and ESP protocols

Manual or IKE-based automatic setup of SAs

ESP support for DES, 3DES, and AES algorithms

MD5 and SHA-1 authentication algorithms

IKE main mode and aggressive mode

NAT traversal

DPD detection

GRE VPN

 

Network connectivity

LAN protocols

Layer 3 Ethernet interfaces/subinterfaces

Layer 2 Ethernet interfaces

MAC forwarding

ARP

VLAN Terminating

Link layer protocols

PPPoE Client

Network protocols

IP services

IP Forwarding/Fast Forwarding

TCP, UDP, IP Option

Ping, Trace

DHCP Server, DHCP Relay, DHCP Client

DNS Client, DNS Proxy, DDNS

FTP Server, FTP Client, TFTP Client

Telnet Server. Telnet Client

NTP/SNTP

IP routing

Static routing

RIP v1/2

OSPF

Policy-based routing

High availability

High availability

VRRP/VRRPv3

BFD

Configuration management

CLI

Local configuration through the console port

Local or remote configuration via Telnet or SSH

Command-level protection to ensure unauthorized users cannot infiltrate the device

Providing detailed debugging information for troubleshooting

User interface configuration, providing various authentication and authorization methods for users

SNMPv3, compatible with SNMP v1 and SNMP v2c

NETCONF, Syslog

H3C IMC

IPv6

IPv6 services

TELNET/ICMP

Configuring DNS

DHCP relay

DHCP client

IPv6 ND, IPv6 PMTU, IPv6 FIB, IPv6 ACL

IPv6 routing

Static routing

Policy-based routing

RIPng

OSPFv3

IPv6 security

IPv6 packet filter

IPv6 ASPF

IPv6 inter-domain policies

IPv6 attack prevention

 

Appendix B Fixed security vulnerabilities

Fixed security vulnerabilities in E1260P45 and earlier versions

CVE-2017-3735

Attackers can exploit this vulnerability to bypass security restrictions and perform unauthorized actions.

CVE-2019-3855

The input validation error vulnerability in libssh2, a client C library that implements the SSH2 protocol, allows execution of remote commands and file transfers while providing a secure transmission channel for remote programs.

HSVD-201904-001

The TCP/IP SYN + FIN packet filtering vulnerability occurs when the remote host does not discard TCP SYN packets set with the FIN flag. Depending on the type of firewall you use, attackers may exploit this vulnerability to bypass its rules.

HSVD-201902-001

The remote host exploits the TCP timestamp vulnerability to ascertain the actual uptime of the system.

HSVD-201901-016

CVE-2019-548: A information leakage vulnerability in the Linux kernel.

Vulnerabilities in JavaScript framework libraries

Vulnerabilities in JavaScript framework libraries and the presence of internal IP address leakage vulnerabilities in the target URL.

CVE-2020-10188

Netkit telnet is a telnet client program used on Linux platforms, primarily for interactive communication with another host using the TELNET protocol. A buffer overflow vulnerability exists in the `utility.c` file of the `telnetd` component in Netkit telnet version 0.17 and earlier. Remote attackers can exploit this vulnerability to execute arbitrary code.

WEB js vulnerability

A web vulnerability scan has detected a minor vulnerability in JavaScript (js).

WEB CSRF vulnerability

The SSLVPN Web page has a CSRF vulnerability.

HTTPmethod vulnerability

By invoking the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

CRLF injection vulnerability

When an HTTP request containing Cookie information is sent, and the domain in the Cookie is a domain value configured on a device, or the request is GET/enterdomain.cgi?domain=%0d%0aSomeCustomInjectedHeader:%0d%0aset-cookie:iamyy HTTP1/1, a CRLF injection vulnerability is triggered.

CVE-2019-1547

Attackers can exploit this vulnerability to obtain sensitive information.

CVE-2019-1563

Attackers can exploit this vulnerability to recover encrypted keys transmitted by CMS/PKCS7 or decrypt messages encrypted with a public RSA key by sending a large number of encrypted messages.

CVE-2016-7056

The vulnerability arises because the ecdsa_sign_setup() function in the crypto/ec/ecdsa_ossl.c file fails to properly set the BN_FLG_CONSTTIME flag. Local attackers can exploit this vulnerability to carry out cache-timing attacks and obtain the ECDSA P-256 private key.

CVE-2018-0739

The vulnerability originates from the use of excessively recursive malicious input. The constructed ASN.1 type can cause a stack overflow, leading to a denial of service attack.

CVE-2019-1559

Attackers can exploit this vulnerability to bypass access restrictions and obtain sensitive information.

CVE-2018-0737

The generation algorithm has a security vulnerability. Attackers can exploit this vulnerability to carry out timing attacks and recover private keys.

CVE-2018-0732

Attackers can exploit this vulnerability to cause a denial of service (hang).

CVE-2019-1552

Security vulnerability in OpenSSL, which attackers can exploit to bypass security protections.

CVE-2019-1563

Attackers can exploit this vulnerability by sending a large number of encrypted messages to recover the encryption keys transmitted by CMS/PKCS7 or to decrypt messages encrypted with a public RSA key.

CVE-2018-5407

Local information leakage vulnerability in OpenSSL. A local attacker can exploit this vulnerability to obtain sensitive information, which may assist in further attacks.

X-Frame-Options attribute vulnerability

The HTTP message does not set the X-Frame-Options field, which may lead to the insertion of iframes from different origins, thus causing clickjacking.

CVE-2011-1473

SSL in the kernel does not process the field for disabling SSL renegotiation. As a result, an SSL client can renegotiate successfully.

CVE-2021-23841/CVE-2021-23840/CVE-2020-1971

Fixed the security vulnerabilities in OpenSSL: When OpenSSL is processing EDIPartyName (of the X.509GeneralName type), the used GENERAL_NAME_cmp function has one null pointer dereference. When the two parameters that use this function for comparison both contain EDIPartyName, the security vulnerability is triggered.

CVE-2016-6329

The issue with the encryption algorithm itself, if by default it is modified to not support several encryption algorithms involved in the vulnerability, may lead to users being unable to log in to the WEB after upgrading. Mitigation plan: Under [UNIS-ssl-server-policy-fxm] ciphersuite, do not choose ciphers with a block length of 8 bytes such as DES, 3DES, RC2. Instead, opt for algorithms like aes_256_cbc, then restart the HTTPS service.

CVE-2022-0778

The OpenSSL BN_mod_sqrt DoS vulnerability is fixed: The BN_mod_sqrt() function used for parsing certificates contains a bug that can cause it to loop forever for non-prime moduli. The infinite loop is triggered through generating a certificate containing invalid explicit curve parameters. Because certificate parsing is executed before the certificate signature is verified, any program of parsing external certificate might encounter a DoS attack. Additionally, when a crafted private key (containing explicit elliptic curve parameters) is parsed, an infinite loop will be triggered. Thus vulnerable situations include: TLS clients consuming server certificates; TLS servers consuming client certificates; Hosting providers taking certificates or private keys from customers; Certificate authorities parsing certification requests from subscribers; Anything else which parses ASN.1 elliptic curve parameters.

CVE-2021-3711

Fixed OpenSSL SM2 decryption buffer overflow vulnerability. This vulnerability is caused by an error in calculating buffer size when the API function EVP_PKEY_decrypt is called to decrypt SM2 encrypted data, leading to buffer overflow.

CVE-2021-3712

To fix the OpenSSL ASN.1 strings buffer overflow vulnerability, it is crucial to address the issue where the ASN_1_String structure, used by OpenSSL to store ASN.1 strings, does not strictly enforce a null byte ending during creation. This oversight can lead to a buffer overflow during printing.

Stack overflow vulnerability

When the Comware system processes the flag parameter, it copies data to the stack buffer based on the user-provided string length. It does not adequately limit the copy length, leading to a stack overflow vulnerability. If an attacker repeatedly exploits this vulnerability, it can ultimately render web management unusable, resulting in a denial-of-service attack.

Appendix C Upgrading software

About startup software images

A startup software image is used to boot device software. Startup software images can be classified into the following categories:

·            Boot image—Contains the Linux operating system kernel. It provides process management, memory management, file system management, and the emergency shell.

·            System image—Contains the Comware kernel and basic software features, including device management, interface management, configuration management, and routing.

·            Feature image—Contains one or multiple advanced software features for users to purchase as needed. Support for feature images depends on the device model.

·            Patch image—Fixes software bugs. One patch image corresponds to one software version. A patch image can fix only vulnerabilities for the corresponding startup software image, and does not add or delete features.

The boot image and system image are required for the system to run correctly. Install feature images as needed, and install patch images to fix specific software bugs.

vFW1000 supports the following types of image files:

·            BIN file—A BIN file is a startup software image. Before upgrading the software by using a BIN file, make sure the target and current version images are compatible.

·            IPE file—An Image Package Envelope (IPE) file is a set of software images that are released as a whole. After you upload an IPE file to the device, the device decompresses the file automatically to load the software images. Typically, an IPE file is used for upgrade.

Upgrade methods

Table 7 Upgrade methods

Upgrade method

Description

Upgrading vFW1000 through the CLI

You must reboot vFW1000 to complete the upgrade.

This method interrupts services.

Upgrading vFW1000 through the ISO image

You must reboot vFW1000 to complete the upgrade.

 

Preparing for the upgrade

IMPORTANT:

You must reboot vFW1000 after upgrading its startup image. During the reboot, vFW1000 cannot provide any services.

 

Before you upgrade the system software image, complete the following tasks:

·            Configure routes to make sure vFW1000 and the file server can reach each other.

·            Enable the TFTP or FTP server on the file server.

·            Log in to the CLI of vFW1000 through the configuration terminal.

·            Copy the upgrade file for the system software image to the file server and correctly set the access path of the TFTP or FTP server.

Figure 1 Network diagram

 

Upgrading vFW1000

Upgrading vFW1000 through the CLI

1.      Log in to the CLI of vFW1000, and download the target vFW1000 IPE file through FTP or TFTP.

For more information about FTP and TFTP configuration, see the fundamentals configuration guide in H3C SecPath vFW1000 Configuration Guides.

2.      Configure the downloaded vFW1000 IPE file as the new startup configuration file.

In vFW1000 user view, execute the boot-loader file ipe-filename { backup | main } command to extract all software packages from the IPE file and use the file as the next-startup configuration file.

3.      In user view, execute the display irf command to view IRF fabric information. To upgrade the vFW stacked over a Layer 2 network from version E1166 to E1166P02 or above, execute this step and record the device's Topo-domain ID.

< Sysname>display irf

Member ID    Role    Priority  CPU MAC         Description

  *+1        Master  1         5254-0037-973c  ---

    2        Standby 1         5254-0058-5060  ---

--------------------------------------------------

The asterisk (*) indicates the master.

The plus sign (+) indicates the device through which you are logged in.

The right angle bracket (>) indicates the device's stack capability is disabled.

 

Bridge MAC of the IRF: 7425-8ae3-c430

Auto upgrade         : Enabled

MAC persistence      : 6 min

Topo-domain ID       : 8540

Auto merge           : Enabled

4.      Save the configuration and restart the system to complete the upgrade.

Execute the save command to save the current configuration, and then execute the reboot command to restart vFW1000 to complete the upgrade.

For more information about software upgrade, see the fundamentals configuration guide in H3C SecPath vFW1000 Configuration Guides.

Upgrading vFW1000 through the ISO image

1.      Access the page for installing vFW1000 through ISO image. For details, see installing vFW1000 (VMware) through ISO image and installing vFW1000 (KVM) through ISO image in H3C NFV Series Products Installation and Startup Guide.

2.      Select (2) Upgrade Install from the menu to upgrade vFW1000 to the ISO image version.

Figure 2 Upgrading vFW1000 through the ISO image

 

3.      After the installation completes, disconnect the CD/DVD driver, and then restart the system.

Figure 3 Disconnecting the CD/DVD driver

 

Restoring vFW1000 through the ISO image

1.      Access the page for installing vFW1000 through ISO image. For details, see installing vFW1000 (VMware) through ISO image and installing vFW1000 (KVM) through ISO image in H3C NFV Series Products Installation and Startup Guide.

2.      Select (3) Recovery Install from the menu to restore vFW1000 to the ISO image version.

Figure 4 Restoring vFW1000 through the ISO image

 

3.      After the restoration completes, disconnect the CD/DVD driver (only required in VMware), and then restart the system.

Handling software upgrade failures

If a software upgrade fails, the system runs the old software version of the startup file.

To handle a software failure:

1.      View the information displayed on the HyperTerminal to verify that the file transfer settings are correct:

¡  If TFTP is used, make sure you enter the same TFTP server IP address, file name, and working directory as set on the TFTP server.

¡  If FTP is used, make sure you enter the same FTP server IP address, file name, working directory, and FTP username and password as set on the FTP server.

2.      Verify that the FTP or TFTP server software is running correctly and has correct settings.

3.      Verify that the flash has sufficient space for the upgrade files.

4.      Verify that the upgrade files are correct and available.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网