H3C SecPath ACG1000-AI-50 Series

Release time:2025-09-04
HomeSupportSecurityH3C SecPath ACG1000H3C SecPath ACG1000Software DownloadACG1000 Series

 

H3C SecPathACG1000-IMW110-R6614P11 Release Notes

 

 


Contents

Introduction· 5

Version information· 5

Version number 5

Version history· 5

Hardware and software compatibility matrix· 5

Upgrade restrictions and guidelines· 5

Hardware feature updates· 6

Software feature and command updates· 6

MIB updates· 6

Operation changes· 6

Restrictions and cautions· 6

Restrictions· 6

cautions· 8

Licensing· 9

About licensing· 9

Registering and installing licenses· 9

Open problems and workarounds· 9

List of resolved problems· 10

Resolved problems in SecPathACG1000-IMW110-R6614P11· 10

Troubleshooting resources· 10

Related documentation· 11

Technical support 11

Appendix A Feature list 11

Hardware features· 11

Software features· 12

Appendix B Upgrading software· 15

Overview·· 15

Software types· 15

System software image· 15

Configuration files· 15

Upgrade methods· 15

Preparing for the upgrade· 16

Upgrading the system software image· 16

Upgrading the system software image from the CLI 16

Upgrading the system software image from the Web interface· 20

Upgrading the system software image from the boot menu· 21

Upgrade time· 23

Handling software upgrade failures· 23


List of tables

Table 1 Version history......................................................................................................... 5

Table 2 Hardware and software compatibility matrix.......................................... 5

Table 3 Hardware features............................................................................................... 11

Table 4 Software features................................................................................................. 12

Table 5 Default Web login information.................................................................... 20

Table 6 Boot menu parameters..................................................................................... 22

 


Introduction

This document describes the features, restrictions and guidelines, open problems, and workarounds for version SecPathACG1000-IMW110-R6614P11. Before you use this version on a live network, back up the configuration and test the version to avoid software upgrade affecting your live network.

Use this document in conjunction with H3C SecPathACG1000-IMW110-R6614P11 Release Notes (Software Feature Changes) and the documents listed in "Related documentation."

Version information

Version number

i-Ware software, Version 1.10, Release 6614P11

Note: You can see the version number with the display version command in any view. Please see Note①.

Version history

Table 1 Version history

Version number

Last version

Release date

Release type

Remarks

R6614P11

First English version

2023-10-19

Formal version

First English version

 

Hardware and software compatibility matrix

CAUTION:

To avoid an upgrade failure, use Table 2 to verify the hardware and software compatibility before performing an upgrade.

 

Table 2 Hardware and software compatibility matrix

Item

Specifications

Hardware platform

ACG1000-AI-50

Host software and MD5 checksum

Upgrade package: SecPathACG1000-IMW110-R6614P11-ARM_NXP.BIN

MD5:F50E07F6289F1B47869BEAB13D4CDE58

Remarks

N/A

Upgrade restrictions and guidelines

Before upgrading the version, back up the original configuration file. To roll back the version, clear the current configuration and import the original configuration file.

For other upgrade restrictions and guidelines, see "Restrictions and cautions."

Hardware feature updates

None.

Software feature and command updates

For more information about the software feature and command update history, see H3C SecPathACG1000-IMW110-R6614P11 Release Notes (Software Feature Changes).

MIB updates

None.

Operation changes

None.

Restrictions and cautions

Before performing an upgrade, see H3C SecPathACG1000-IMW110-R6614P11 Release Notes (Software Feature Changes) and related documentation to see the software feature changes and evaluate the influence on the service.

Restrictions

Log and file storage or download on a disk with a high disk usage on R6614Pxx

When the usage of a disk exceeds 90%, logs will be deleted. The device checks the disk usage every 30 minutes and deletes the oldest day's logs each time. A maximum of 100000 original files of emails, email attachments, and network disk files can be retained per day (with shared count limit). No limit is applied to the number of logs that can be stored. The device still records logs when the number of logs exceeds 100000, but you cannot download the original log files.

User import

Importing a large number of users is CPU intensive. If CPU resources are insufficient, other processes might become unresponsive.

Authentication delay in simultaneous login of over 20 users through third-party authentication

Because of PHP performance, the authentication delay for third-party RADIUS or LDAP authentication is about 5 seconds when more than 20 users log in simultaneously per second. As a best practice, use IMC or local authentication in scenarios where a large number of users attempt to come online.

Occasional empty application traffic statistics

When the device is fully loaded with high traffic, the statistics of some applications in the detailed application traffic statistics might be empty. You cannot obtain information about the applications and corresponding user information.

Misidentification of shared Internet access behaviors

The system cannot accurately identify shared Internet access behaviors.

Packet order-preserving in QoS rate limit

Enabling packet order-preserving cannot entirely prevent packet disorder in QoS rate limit, which might cause occasional slow downloads.

Low IPsec performance

The performance of the IPsec feature is low.

Log export

Log export has limitations. You can export logs within a specified time range, with a maximum time range of 14 days each time. A maximum of 100000 logs can be exported each time. If the number of logs exceeds 100000, the system prompts the end time of this export. You can then set the prompted time as the start time to continue exporting remaining logs.

Login to the same PC in a domain

When different users log in to the same PC used for test in a domain, only one account is displayed in online user information.

Configuration file import

After you import a configuration file, you must reboot the device for the configuration to take effect. Do not click Save Configuration before reboot, because this operation will overwrite the imported file with the current configuration, and the original configuration remains effective after the reboot.

Enabling real-time configuration saving on devices

·         As a best practice, do no enable real-time saving configuration on newly deployed devices. With this feature enabled, excessive resource will be consumed during frequent and quick operations or in collaboration with HA. Potential issues include:

¡  During SNMP user synchronization, two consecutive user registration tasks might be generated, and the user information in the first task might not be synchronized to the backup device.

¡  If you apply an empty URL object in an IPv4 control policy and then add content on the URL object page, you might not view the application relationship.

¡  A message indicating error information will prompt if you delete multiple users when the device saves configuration automatically.

·         If you enable real-time configuration saving, after you complete the configuration each time, wait 1 to 2 minutes for the device to fully save the configuration.

Supported features in collaboration with Cloud Security O&M Management Platform

In collaboration between the device and Cloud Security O&M Management Platform, the following features are supported:

·         Viewing the device information, performance status, and device status of monitored ACG devices on the platform.

·         Events and alarms.

·         Graphical Web reverse links.

·         Version management, license management, and configuration management.

Features that require hard drive support

Features such as audit logs, Web protection, security analysis, statistical reports, and BA platform configuration are only supported on ACG devices with hard drives. For more information, see the corresponding specification document.

Statistical report loading

The loading speed of statistical reports in data center is affected by the volume of log data. The larger volume of data, the longer loading time and waiting time.

Identification of AD domain usernames

An AD domain username with commas (,) will be displayed as vertical lines (|) on after synchronization to the device. This makes it difficult to distinguish between users with usernames containing vertical lines (|) and those who are synchronized from the LDAP server and have usernames containing commas (,) in the local user list, online user list, and online/offline logs.

Dual-factor authentication

Importing a configuration file will not restore the administrator's dual-factor authentication settings.

Interface status detection

After you configure interface status detection with address detection linkage for an interface, if the interface is also used as the outgoing interface for address detection, you cannot execute the shutdown or no shutdown command to restore the interface status.

Application cache file upload

In the application cache, you cannot upload a file that contains Chinese characters through CLI.

Configurations containing SQL injection risk characters

You can import a configuration containing SQL injection risk characters, but cannot submit the configuration on the edit page. This issue occurs in multiple configuration modules of the device. To resolve this issue, modify the configuration through CLI, or delete the risk characters from the configuration and then create a new configuration without risk characters on the Web interface.

USB drive mounting

USB drive mounting is not supported.

Force negotiation mode

Because of hardware and software limitations, some interfaces do not support forced interface speed negotiation at 1000 Mbps.

cautions

QoS maximum bandwidth

If packets are fragmented, the QoS maximum bandwidth cannot be reached. As a best practice to avoid this situation, set the MTU to the greatest value.

HA

·         After an HA switchover, the application traffic statistics and user traffic statistics are not synchronized.

·         Web portal settings are not synchronized during HA configuration synchronization.

·         If both monitoring interface address synchronization and address detection are configured in Master-Master mode, the Master-Master mode cannot be successfully negotiated after the interface does down and then comes up. As a best practice, do not configure address detection.

Advertisement settings

·         HTTPS is not supported.

·         Local customized advertisement settings are not synchronized during HA configuration synchronization. Reconfigure local customized advertisement settings after an HA switchover.

·         Local customized advertisement settings can be configured only from the Web interface.

·         A domain name whitelist for advertisement pushing can be configured only at the CLI.

·         If the Internet speed is low, advertisements will be displayed slowly.

·         If advertisements are displayed slowly, refresh the page or wait for the page to load.

·         To push advertisements successfully, make sure the device management IP address is reachable to all users.

·         For websites that use the frameset framework, advertisement pictures will be displayed because the main page contains multiple requests. As a best practice, add such websites to the domain name whitelist.

·         If advertisements fail to be displayed, use the debug http hijack command to identify whether HTTP requests match an advertisement policy.

 

·         If a website fails to be accessed because advertisement pushing is enabled, add it to the domain name whitelist.

·         As a best practice to save memory resources, do not configure more than 1000 subinterfaces, 1000 control policies, 1000 audit policies, or 1000 routes.

·         The security module commands are complex. As a best practice, configure IPS, anti-virus, security protection, Web protection, and risk scanning only from the Web interface. Use CLI commands only for troubleshooting and configuration recovery.

Licensing

About licensing

To use license-based features, you must purchase licenses from H3C and install the licenses.

For more information about license-based features and supported licenses, see H3C SecPath ACG1000 Series Application Control Gateway Licensing Guide.

Registering and installing licenses

H3C License Management Platform provides product licensing services for H3C customers. You can access this system to obtain an activation file or transfer licenses.

H3C License Management Platform is accessible at http://www.h3c.com/en/License/.

For more information about license registration, activation file installation, and license transfer, see H3C SecPath ACG1000 Series Application Control Gateway Licensing Guide.

Open problems and workarounds

202206281257

·    Symptom: When editing an existing custom URL object on the Policy > Object Management > URL Object > Custom URL page, add a period and a space (. ) in the associated URL. The action can be successfully submitted. However, after saving and returning to the editing page, the space disappears and resubmitting results in an error. The same error occurs when you create a new custom URL object.

·    Condition: This symptom occurs when you configure a custom URL object.

·    Workaround: Avoid using a period and then a space (. ).

202206280915

·         Symptom: When there are a large number of data tables on the device, exporting data for statistics will continuously indicate that the file is being generated. Even after waiting for a long time, it still cannot be completed, and there is no file available for export after refreshing. The reason is that there are too many data tables in the database, which caused an error and stopped the generation process. It needs to be associated with the log retention period.

·         Condition: This symptom occurs if you export data for analysis when the device has a large number of data tables.

·         Workaround: None. The situation only occurs occasionally when the device is running for a long time with a large number of data tables.

202212080983

·         Symptom: Unable to view attachment name after clicking email log details.

·         Condition: This symptom occurs when you view email log details.

·         Workaround: None. This is a display issue, with a relatively small impact.

202306291911

·         Symptom: WeChat mini-program authentication is used. On some mobile phone models, there is occasional inability to open the mini-program through the browser.

·         Condition: This symptom might occur if the WeChat mini-program authentication method is used.

·         Workaround: Perform authentication by opening the wireless network authentication interface.

202306291879

·         Symptom: When WeChat mini-program authentication is selected, the system also verifies the authentication step description for the authentication URL authentication method.

·         Condition: This symptom occurs if you configure unsupported characters in the authentication step description and use the WeChat mini-program authentication method.

·         Workaround: Use supported characters in the authentication step description.

List of resolved problems

Resolved problems in SecPathACG1000-IMW110-R6614P11

First release, no list of resolved problems

Troubleshooting resources

To obtain troubleshooting resources for the product:

1.       Access Technical Documents at http://www.h3c.com/en/Technical_Documents.

2.       Select the device category and model.

3.       Select the Maintain or Maintenance menu.

Related documentation

·         H3C SecPath ACG1000 Series Application Control Gateway Installation Quick Start

·         H3C SecPath ACG1000 Series Application Control Gateway Installation Guide

·         H3C SecPath ACG1000 Series Application Control Gateway Licensing Guide

·         H3C SecPath ACG1000 Series Application Control Gateway Web Configuration Guide (R6614)

·         H3C SecPath ACG1000 Series Application Control Gateway Configuration Examples (R6614)

·         H3C SecPath ACG1000 Series Application Control Gateway Command References (R6614)

·         H3C SecPath ACG1000 Series Application Control Gateway Configuration Guides (R6614)

Technical support

To obtain technical assistance, contact H3C by using one of the following methods:

·         Email:

[email protected] (countries and regions except Hong Kong, China)

[email protected] (Hong Kong, China)

·         Technical support hotline number. To obtain your local technical support hotline number, go to the H3C Service Hotlines website: https://www.h3c.com/en/Support/Online_Help/Service_Hotlines/

To access documentation, go to the H3C website at http://www.h3c.com/en/.

Appendix A Feature list

Hardware features

Table 3 Hardware features

Item

ACG1000-AI-50

Management ports

1 × GE (copper) + any service port

Service ports

4 × GE (combo) + 16 × GE (copper) + 6×GE(fiber)+2 × 10-GE fiber ports

Bypass ports

N/A

Expansion slots

0

Interface modules

N/A

PoE ports

N/A

Dimensions (H × W × D)

44.2 × 440 × 435 mm (1.74 × 17.32 × 17.13 in)

Max power consumption

46 W

Power supply

100 V to 240 Vac@ 50Hz or 60Hz, 2.0 A

Availability

≥ 100000 hours

Weight

5.4 kg (11.9 lb)

 

Software features

Table 4 Software features

Category

Subcategory

Description

Network access behavior management

Traffic management

Support for virtual link and hierarchical bandwidth management, and 4-level channel nesting.

Support for bandwidth limits based on users, applications, services, IPs, or time.

Support for per-IP rate limit, bandwidth guaranteeing, and multi-priority management.

Application filtering and audit

Control over network communities, P2P, file transmission, e-commerce, IM, stock trading, network media, online games, and remote control.

Application audit targeting at an application category or a single application.

Support for auditing application behavior actions.

Support for auditing application behavior content.

Support for filtering and auditing websites, emails, forum posting, and searched keywords.

Audit log levels (emergency, alert, critical, error, warning, notification, and informational).

URL filtering

Built-in URL classification library. Support for filtering and auditing the following websites: advertising, adult, art, online music, BBS, lottery, business, crime, education, entertainment, gambling, games, healthcare, immorality, and job recruitment.

Support for malicious URL and custom URL filtering.

User management

User

Support for importing and exporting users or user groups in bulk.

User attributes for local users, RADIUS users, LDAP users, and users with statically bound IP addresses.

Online user management

Displaying online user status (username, group to which the user belongs, login address, authentication method, login time/freezing time, status, and online duration).

Online user operations: freezing or unfreezing unauthenticated accounts, and logging out, freezing, or unfreezing authenticated users.

Linkage with IMC

Linkage with IMC.

For unidentified user traffic, an authentication policy redirects the Web access traffic to the specific portal page.

Recording the user information after successful user authentication.

Identifying and periodically updating access traffic after successful user authentication.

Granular service control for authentication users.

Pushing the authentication page and receiving authentication information of portal users.

Initiating user authentication requests and user offline notifications.

Providing user self-service by linking to the self-service page provided by the central RADIUS server.

Forcing users to be redirected to the specific portal server and authenticated when they access Web pages.

Logging user online and offline information.

Sending accounting-on packets to the IMC server to log out corresponding users.

Authentication server management

Support for RADIUS and LDAP authentication servers and server groups.

Support for Wi-Fi authentication for Internet access via SMS verification code.

Support for Wi-Fi authentication for Internet access by following the WeChat public account.

Statistics set

Application traffic statistics

Displaying application statistics overview.

Displaying application ratio chart.

Application statistics trend overview.

Displaying detailed information about application statistics.

Coupling of the application and user dimensions.

TOP 11 application statistics.

User traffic statistics

User statistics overview.

Displaying user statistics in bar charts.

Displaying detailed information about user statistics coupled with the application dimension.

Support for displaying the application trend and top application list for a user.

Top 15/50/100 user statistics.

Basic network features

Interface

Support for subinterfaces, bridge interfaces, and aggregate interfaces.

DHCP

Support for DHCP relay agents, DHCP servers, and DHCP clients.

The DHCP server supports IP-MAC binding, lease management, and excluded IP addresses.

Session management

Support for limit on address objects, number of sessions that can exist for each IP address, and number of sessions per second that can be created for each IP address.

Session statistics: Number of connections initiated by IP addresses.

NAT

NAT ALG for DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP.

Source address translation, destination address translation, one-to-one address translation, one-to-many address translation, and many-to-many address translation.

Routing

Support for static routing, dynamic routing (RIP or OSPF), and policy-based routing.

Support for policy-based routing based on the source address, destination address, service, user or application.

Support for ISP routing, predefined ISP route tables, and customized ISP routes.

VPN

AH and ESP.

Manual or automatic establishment of security associations through IKE.

ESP supports multiple encryption algorithms such as DES, 3DES, and AES.

Support for MD5 and SHA-1 authentication algorithms.

Support for main-mode IKE, aggressive-mode IKE, NAT traversal, and DPD.

Interface detection

Support for the PING address detection type.

Support for the TCP address detection type.

Support for the DNS address detection type.

Supported interface types: physical interface, subinterface, bridge interface, aggregate interface, and tunnel interface.

Address detection group

Strict mode or non-strict mode.

In strict mode, all detection items within the address group must succeed for the status of the detection group to be considered successful. In non-strict mode, as long as one detection item in the detection group succeeds, the detection group is considered successful.

Support for configuring descriptions for address detection groups.

Route detection

Support for route detection to ensure route validity.

Supported scenarios and deployment modes

Support for linkage with static routes or ISP routes.

Support for linkage with interface status.

Support for linkage with HA.

Logs

Logging address detection failure and successful address detection.

Security protection

Attack prevention

Support for interface-based IP and port scanning protection.

Support for SYN flood, UDP flood, ICMP flood, and DNS flood attack protection and abnormal message attack (ping of death, land-based, teardrop, TCP flag, Winnuke, smurf, IP options, IP-spoof, or Jolt2) protection.

Linkage with the IP address blacklist feature to disable access from specific IP addresses.

Support for IP-MAC binding and uniqueness check.

System management

Deployment method

Bypass, inline, and hybrid deployment.

Configuration file

Importing and exporting configuration files.

Dual-backup configuration.

System upgrade

Support for local and remote system software upgrade.

Signature libraries support automatic and manual upgrade.

SNMP

Support for SNMP agents.

Supported versions: v1, v2, and v3.

SNMP users: Support for creating, editing, or deleting users. Authentication methods: None, MD5, or SHA.

Log settings

Support for a maximum of three syslog sending servers and can send logs to the remote log analysis and management platform.

Support for filtering logs by level and the device mapping table.

 

Appendix B Upgrading software

Overview

This chapter describes types of software and how to upgrade software for the device from the CLI, Web interface, and boot menu. The output on the device might differ depending on the version of the device.

The default storage medium on the device is the CF card.

Software types

The device supports the system software image and Boot ROM image.

System software image

The system software image is a program file used to start up the device.

Typically, the system software image is a .bin file, for example, SecPathACG1000-IMW110-R6603P02.BIN.

Configuration files

A configuration file stores the configuration information of the device. Save configuration to configuration files for the following purposes:

·         Save the running configuration to a configuration file for the configuration to survive a device reboot.

·         Facilitate users to retrieve configuration information.

By default, the device has configuration files syscfg.con and syscfg.bcp. The syscfg.con file stores settings configured both at the CLI and on the Web interface. The syscfg.bcp file is a backup configuration file. You can also save configuration to other files and specify the files as the startup and backup configuration files.

·         You can execute the copy running-config backup-config command to copy the running configuration to the backup configuration file.

·         You can execute the copy startup-config backup-config command to copy the settings in the startup configuration file to the backup configuration file.

·         You can execute the copy backup-config startup-config command to restore the startup configuration file with the settings in the backup configuration file.

Upgrade methods

Upgrade object

Upgrade method

Description

System software image

Upgrading the system software image from the CLI

·     To upgrade the system software image from the Web interface, you do not need to enable the TFTP or FTP server.

·     Because of the incompatibility of configuration file information between different software versions, the configuration of the device after the upgrade might differ from the configuration before the upgrade. You must carefully review the corresponding section to confirm the feature changes in the version being upgraded.

Upgrading the system software image from the Web interface

Upgrading the system software image from the boot menu

 

Preparing for the upgrade

The device does not come with the TFTP or FTP server. You can purchase and install the software as needed.

Trivial File Transfer Protocol (TFTP) is a protocol within the TCP/IP protocol suite that allows for simple file transfer between a client and server. It provides a simple and resource-friendly file transfer service. The device can act as the TFTP client to upload its system software image to a file server (typically a PC) or download a system software image file from the file server to it after you execute the corresponding commands through the configuration terminal.

File Transfer Protocol (FTP) is an application-layer protocol within the TCP/IP protocol suite. It primarily provides file transfer services between remote hosts for users. The device acts as the FTP client and a file server (typically a PC) acts as the FTP server.

Before you upgrade the system software image, complete the following tasks:

·         Configure the IP address of the management port on the device.

·         Enable the TFTP or FTP server on the file server.

·         Log in to the CLI through the configuration terminal.

·         Copy the upgrade file for the system software image to the file server and correctly set the access path of the TFTP or FTP server.

Figure 167 Upgrade environment

Upgrading the system software image

Upgrading the system software image from the CLI

To upgrade the system software image from the CLI, use one of the following methods:

·         Using TFTP to upgrade the system software image

·         Using FTP to upgrade the system software image

Using TFTP to upgrade the system software image

The device acts as the TFTP client to access the specified path on the TFTP server and complete the backup and upgrade operations for the system software image. The procedure is as follows:

1.       Back up the current system software image and running configuration:

# In any view, save the running configuration.

H3C# save config

Building configuration...

 

Save configuration ok !

# In user view, identify the current version number of the device.

H3C# display version

i-Ware software,Version 1.10, Release 6605, Build time is Jan 28 2015 17:31:46

System uptime: 0 days 0 hours 42 minutes

Firmware is SecPathACG1000-IMW110-R6605.BIN

 

Application signature version: ACG-APP-R3.1.4

 

Software S/N    : 110100100115022860784559

Model           : ACG1000-S

Platform        : PLATFORM_MC1220

 

Basic Functionality                             : License valid

Application Audit and Control                   : License valid

Malware URL Category                            : License valid

Virtual Private Network                         : License valid

Application Audit and Control Update Service    : License valid

Malware URL Category Update Service             : License valid

Virtual Private Network Tunnel Limit            : License valid

# In user view, copy configuration file syscfg.con to the TFTP server.

H3C# copy startup-config tftp 192.168.0.2 syscfg.con

H3C#

2.       Upgrade the system software image:

In the example, the upgrade file is SecPathACG1000-IMW110-F6603P02.BIN with version 1.10 in Release 6603P02. In actual situations, upgrade the system software image based on the real name of the upgrade file.

# In user view, import file SecPathACG1000-IMW110-F6603P02.BIN to the CF card.

H3C# copy tftp 192.168.2.185 SecPathACG1000-IMW110-F6603P02.BIN ver

Download file SecPathACG1000-IMW110-F6603P02.BIN ....

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

#####################################################

Download file(SecPathACG1000-IMW110-F6603P02.BIN) success.

Checking images valid success.

Install system................................................ success

Update images success.

# In user view, reboot the device.

H3C# reboot

Save current configuration? Please enter "y/n"  to confirm:  y

Building configuration...

 

Save configuration ok !

The system will be rebooted! Please enter "y/n"  to confirm:  y

...

# Verify that the current version information of the device is consistent with that of the upgrade file.

H3C# display version

i-Ware software,Version 1.10, Release 6603P02, Build time is Mar  5 2015 15:32:26

System uptime: 0 days 0 hours 5 minutes

Firmware is SecPathACG1000-IMW110-F6603P02.BIN

 

Application signature version: ACG-APP-R3.1.4

 

Software S/N    : 110100100115022860784559

Device S/N      : 219801A0QQ914AP00001

Model           : ACG1000-S

Platform        : PLATFORM_MC1220

 

Basic Functionality                             : License valid

Application Audit and Control                   : License valid

Malware URL Category                            : License valid

Virtual Private Network                         : License valid

Application Audit and Control Update Service    : License valid

Malware URL Category Update Service             : License valid

Virtual Private Network Tunnel Limit            : License valid

Using FTP to upgrade the system software image

The device acts as the FTP client to access the specified path on the FTP server and complete the backup and upgrade operations for the system software image. The procedure is as follows:

1.       Back up the current system software image and running configuration:

# In user view, save the running configuration of the device.

H3C# save config

Building configuration...

Save configuration ok !

# In user view, identify the current version number of the device.

H3C# display version

i-Ware software,Version 1.10,Release 6603P01, Build time is Jan 28 2015 17:31:46

System uptime: 0 days 0 hours 42 minutes

Firmware is SecPathACG1000-IMW110-R6603P01.BIN

 

Application signature version: ACG-APP-R3.1.4

 

Software S/N    : 110100200114052620813527

Model           : ACG1000-M

Platform        : PLATFORM_MC5200

 

Basic Functionality                             : License valid

Application Audit and Control                   : License valid

Malware URL Category                            : License valid

Virtual Private Network                         : License valid

Application Audit and Control Update Service    : License valid

Malware URL Category Update Service             : License valid

Virtual Private Network Tunnel Limit            : License valid

# In user view, copy configuration file syscfg.con to the FTP server.

H3C# copy startup-config ftp anonymous test 192.168.0.2 syscfg.con

2.       Upgrade the system software image:

In the example, the upgrade file is SecPathACG1000-IMW110-F6603P02.BIN with version 1.10 in Release 6603P02. In actual situations, upgrade the system software image based on the real name of the upgrade file.

# In user view, import upgrade file SecPathACG1000-IMW110-R6603.BIN to the CF card of the device.

H3C# copy ftp user password 192.168.2.185 SecPathACG1000-IMW110-F6603P02.BIN ver

Download file SecPathACG1000-IMW110-F6603P02.BIN ....

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

#####################################################

Download file(SecPathACG1000-IMW110-F6603P02.BIN) success.

Checking images valid success.

Install system................................................ success

Update images success.

# In user view, reboot the device.

H3C# reboot

Save current configuration? Please enter "y/n"  to confirm:  y

Building configuration...

Save configuration ok !

The system will be rebooted! Please enter "y/n"  to confirm:  y

# Verify that the current version information of the device is consistent with that of the upgrade file.

H3C# display version

i-Ware software,Version 1.10, Release 6603P02, Build time is Mar  5 2015 15:32:26

System uptime: 0 days 0 hours 5 minutes

Firmware is SecPathACG1000-IMW110-F6603P02.BIN

 

Application signature version: ACG-APP-R3.1.4

 

Software S/N    : 110100100115022860784559

Device S/N      : 219801A0QQ914AP00001

Model           : ACG1000-S

Platform        : PLATFORM_MC1220

 

Basic Functionality                             : License valid

Application Audit and Control                   : License valid

Malware URL Category                            : License valid

Virtual Private Network                         : License valid

Application Audit and Control Update Service    : License valid

Malware URL Category Update Service             : License valid

Virtual Private Network Tunnel Limit            : License valid

Upgrading the system software image from the Web interface

About this task

The device supports the Web management function. You can use the Web interface to conveniently and intuitively manage, maintain, and upgrade the device.

The device is shipped with default Web login information, allowing users to directly log in to the Web interface using this default information.

Table 5 Default Web login information

Item

Default configuration

Username

admin

Password

admin

Management IP address

192.168.1.1/24

 

Procedure

1.       Connect the device and PC.

Use an Ethernet cable to connect the PC to an Ethernet interface of the device.

2.       Configure an IP address for the PC to ensure that the PC and device can reach each other.

Change the IP address to an IP address in subnet 192.168.1.0/24, excluding 192.168.1.1. For example, use 192.168.1.2.

3.       Open a browser and enter login information:

a.    On the PC, open a browser, and enter IP address 192.168.1.1 in the address bar to open the Web login page of the device.

b.    On the Web login page, enter the default username and password and the verification code, and then click Login.

4.       Navigate to the System Management > System Maintenance > Software Update page.

Figure 176 Software Update page

 

5.       Click Upload.

 

CAUTION:

Software upgrade takes some time. Please be patient. You must manually reboot the device after the upgrade is complete.

 

Upgrading the system software image from the boot menu

To upgrade the system software image from the boot menu, use the following method:

·         Using FTP to upgrade the system software image through an Ethernet interface

Using a console cable to connect to the device and accessing the boot menu

The output might differ depending on the device condition.

When the device starts up or reboots, press Ctrl+C as prompted to access the boot menu.

PrRss Ctrl+C to stop auto start : 03

reading menuboot

.......................................[   25.391419] tmp421 0-004c: Could not read configuration register (-5)

/sbin/rc starting

Mounting file systems

Setting up loopback

...

        ===============================================================

        |            BOOT MENU(V2.0-20140812)                         |

        |  1. Upgrade image by FTP.                                   |

        |  2. Upgrade menuboot by FTP.                                |

        |  3. Check and repare file system.                           |

        |  4. Reset administrator passowrd.                           |

        |  5. Producing test.                                         |

        |  6. Aging test.                                             |

        |  7. Display production and aging recored.                   |

        |  8. Advance functions.                                      |

        |  0. Reboot.                                                 |

        |                                                             |

        ===============================================================

Table 6 Boot menu parameters

Field

Description

<1> Upgrade image by FTP

Upgrades the system software image by FTP.

<2> Upgrade menuboot by FTP

Upgrades the boot menu by FTP.

<3> Check and repare file system

Checks and repairs the file system.

<4> Reset administrator passowrd

Resets the password of the administrator to the default password.

<5> Producing test

Used to check the basic communication functionality of ports.

<6> Aging test

Long-duration stress test in sending and receiving packets.

<7> Display production and aging recored

Displays the results of the producing test and aging test.

<8> Advance functions

Not supported in the current software version.

<0> Reboot

Reboots the device.

 

Using FTP to upgrade the system software image through an Ethernet interface

1.       Enter 1 to upgrade the system software image by FTP and configure FTP parameters as follows:

Please input your choice[0-8]:1

Local IP[A.B.C.D/M]:192.168.0.1/24

Server IP[A.B.C.D]:192.168.0.2

Gateway IP[A.B.C.D]:192.168.0.254

image name[xxx.bin]:SecPathACG1000-IMW110-F6603P02.BIN

Table 7 Ethernet parameters

Field

Description

Local IP

IP address of the device.

Server IP

IP address of the FTP server.

Gateway IP

Gateway IP address. Configure the gateway IP address if the device and the FTP server do not belong to the same subnet.

image name

Name of the upgrade file.

 

2.       Enter 0 to reboot the device for the upgrade file to take effect.

Download file SecPathACG1000-IMW110-F6603P02.BIN ....

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

################################################################

##############################################

Download file(SecPathACG1000-IMW110-F6603P02.BIN) success.

Checking images valid success.

Install system......................................................................... success

Update images success.

 

        ===============================================================

        |            BOOT MENU(V2.0-20140812)                         |

        |  1. Upgrade image by FTP.                                   |

        |  2. Upgrade menuboot by FTP.                                |

        |  3. Check and repare file system.                           |

        |  4. Reset administrator passowrd.                           |

        |  5. Producing test.                                         |

        |  6. Aging test.                                             |

        |  7. Display production and aging recored.                   |

        |  8. Advance functions.                                      |

        |  0. Reboot.                                                 |

        |                                                             |

        ===============================================================

 

Please input your choice[0-8]: 0

Upgrade time

It takes about 2 minutes for the device to load the upgrade file.

It takes about 3 minutes for the device to restart.

Handling software upgrade failures

To handle a software upgrade failure:

1.       Check the physical ports for a loose or incorrect connection, and verify that the LEDs are reflecting the correct port status.

2.       If you are using the console port for file transfer, check the HyperTerminal settings (including the baud rate and data bits) for any incorrect setting.

3.       Check the FTP or TFTP server for incorrect settings.

4.       If the image desc magic check fail message is generated after the device loads the upgrade file, verify that the file is available.

5.       If the issue persists, contact H3C Support.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网