NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
advantagecom
Mar 25, 2009Novice
Firmware 7.3.1.7
Has anyone running a GSM or FSM series L3 managed switch tried firmware 7.3.1.7?
I'm really curious about stability of this new release. 7.1.1.7 and 7.2.1.6 were not very stable (IP routing, VLAN, spanning tree). We had first hand experience with 7.1.1.7 and others reported bad experiences with 7.2.1.6.
We're currently running 6.2.0.14 for stability reasons, but I wish we could make use of some of the new features found in the 7.x.x.x releases such as MAC based VLANs and LAG hash algorithm selection.
None of the release notes mention fixes related to IP routing, VLAN, or spanning tree stability problems, though, so I'm hesitant to actually use that version in production.
If I absolutely have to, I can break our stack apart to get a switch for testing because one of our GSM7352S doesn't have many ports in use and they can be moved to a different switch temporarily. It's a bit of a hassle after that, though, because you then have a switch that's not the same as the others and various split stack configuration issues.
I'm really curious about stability of this new release. 7.1.1.7 and 7.2.1.6 were not very stable (IP routing, VLAN, spanning tree). We had first hand experience with 7.1.1.7 and others reported bad experiences with 7.2.1.6.
We're currently running 6.2.0.14 for stability reasons, but I wish we could make use of some of the new features found in the 7.x.x.x releases such as MAC based VLANs and LAG hash algorithm selection.
None of the release notes mention fixes related to IP routing, VLAN, or spanning tree stability problems, though, so I'm hesitant to actually use that version in production.
If I absolutely have to, I can break our stack apart to get a switch for testing because one of our GSM7352S doesn't have many ports in use and they can be moved to a different switch temporarily. It's a bit of a hassle after that, though, because you then have a switch that's not the same as the others and various split stack configuration issues.
25 Replies
- advantagecomNoviceWe left our test switch with v8.0.1.2 exposed to the Internet for about 45 days. We never experienced any reloads or hangs. Given that we have about 6000 *new* malicious IP addresses attack or probe our network every day and there are thousands of attacks across our network every hour, I'd say that's a good result.
Our test switch is no longer connected to the Internet because we're using it in some internal server testing, but we're happy enough with the results that we will likely push this firmware out to production in the near future. - alex74Aspirant
advantagecom wrote: We left our test switch with v8.0.1.2 exposed to the Internet for about 45 days. We never experienced any reloads or hangs. Given that we have about 6000 *new* malicious IP addresses attack or probe our network every day and there are thousands of attacks across our network every hour, I'd say that's a good result.
Our test switch is no longer connected to the Internet because we're using it in some internal server testing, but we're happy enough with the results that we will likely push this firmware out to production in the near future.
Hi,
Is it worth upgrading to 8.* version from 7.1.1.7 ? Is it much more stable than 7.1 ?
Thanks, - advantagecomNovice
alex74 wrote: Hi,
Is it worth upgrading to 8.* version from 7.1.1.7 ? Is it much more stable than 7.1 ?
Thanks,
In our experience, the entire 7.x.x.x line of firmwares is buggy and unstable. 7.1.1.7 is even worse than 7.3.1.7. We had massive problems with STP and L3 routing with the 7.x.x.x firmwares. Furthermore, the 7.x.x.x firmwares are vulnerable to multiple remote DOS attacks that leave you with a hard-locked switch that requires a power cycle to get it going again.
Yes, it is definitely worth the upgrade. Just make sure you follow the instructions Netgear supplies. - alex74Aspirant
advantagecom wrote: In our experience, the entire 7.x.x.x line of firmwares is buggy and unstable. 7.1.1.7 is even worse than 7.3.1.7. We had massive problems with STP and L3 routing with the 7.x.x.x firmwares. Furthermore, the 7.x.x.x firmwares are vulnerable to multiple remote DOS attacks that leave you with a hard-locked switch that requires a power cycle to get it going again.
Yes, it is definitely worth the upgrade. Just make sure you follow the instructions Netgear supplies.
Upgraded to 8.*, had a big issue with switches as they didn't take older config and decided to go into infinite rebooting loop. I manually removed config - that worked so I just copy-pasted everything back in and that was it... There was no problem upgrading switch from 7.1->7.2->7.3 though. - vsuTutorJust a note which might be useful for FSM73xx switch users who are stuck with the 7.3.1.7 firmware (because there was no 8.x version released for these models, and now they are EOL).
Any attempt to connect to the switch using recent OpenSSH versions will crash and reboot the switch (this happens before the authentication, when the SSH2_MSG_KEXDH_INIT message is sent). The workaround which will allow SSH management connection is to put this in ~/.ssh/config:Host
HostKeyAlgorithms ssh-rsa,ssh-dss
The default HostKeyAlgorithms value is now a long string which probably overflows some buffer in the “FreSSH.0.8” server implementation used on this switch.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!