This site will be decommissioned on December 31st 2024. After that date content will be available at techdocs.broadcom.com.

The release notes cover the following topics

About VMware Smart Assurance IP Certification Patch

A patch provides one or more fixes to a VMware Smart Assurance product. A patch can only be applied to the specific major or minor release and Service Pack of the particular product for which it is intended, this is called the product’s baseline.

What's New in this Release

  • Following System OIDs are certified in this release: 

Certified Devices

This section describes the devices certified and the certification impact in this patch.

Simple Certification

Simple certification involves only in configure file changes and the qualification of new OID in the currently existing driver. This section describes the devices certified in this patch.

Simple devices certified in the patch:

SR/TASC Number Vendor Name                                                                                   Description
SASS-15291 / 305422 ARISTA Certified the following components for the DCS-7280CR2A-30 SWITCH (System OID:.1.3.6.1.4.1.30065.1.3011.7280.2727.2.3648.30):
Interface, Memory, Port, Processor, and Vlan.
SASS-15066 / 305853 ARISTA Certified the following components for the DCS-7280SR2-48YC6 SWITCH (System OID:.1.3.6.1.4.1.30065.1.3011.7280.3735.2.48.1654.6):
Interface, Memory, Port, Processor, and Vlan.
SASS-15069 / 305833 CISCO Certified the following components for the ASA5508sc FIREWALL (System OID:.1.3.6.1.4.1.9.1.2121):
Interface, Memory, and Processor.
SASS-15085 / 305854 ARISTA Certified the following components for the DCS-7304 SWITCH (System OID:.1.3.6.1.4.1.30065.1.3011.7304):
Interface, Memory, Port, Processor, and Vlan.
SASS-15291 / 305975 FORTINET Certified the following components for the faz3700F FIREWALL (System OID:.1.3.6.1.4.1.12356.103.3.37006):
Disk, Interface, Memory, and Processor.
SASS-15082 / 305877 F5NETWORKS Certified the following components for the BIG-IP-i10800 LOADBALANCER (System OID:.1.3.6.1.4.1.3375.2.1.3.4.113):
AggregatePort, Disk, Fan, FileSystem, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, and Vlan.
SASS-15111 / 305896 FORTINET Certified the following components for the fgt1200D FIREWALL (System OID:.1.3.6.1.4.1.12356.101.1.12000):
Disk, Fan, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.

SASS-15255 / 305525

CHECKPOINT Certified the following components for the checkPointSmart-5050 FIREWALL (System OID:.1.3.6.1.4.1.2620.1.6.123.1.75):
Disk, Fan, FileSystem, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15109 / 305881 FORTINET Certified the following components for the fgt400E FIREWALL (System OID:.1.3.6.1.4.1.12356.101.1.4007):
Disk, Fan, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15257 / 305758 HP Certified the following components for the HP 2530-24G-POE+ SWITCH (J9773A) SWITCH (System OID:.1.3.6.1.4.1.11.2.3.7.11.137):
Fan, Interface, Memory, Port, PowerSupply, Processor, and VLAN.
SASS-15093 / 305859 ARUBA Certified the following components for the 5412R zl2 (J9851A) SWITCH (System OID:.1.3.6.1.4.1.11.2.3.7.11.161):
Card, CardRedendancyGroup, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15095 / 305858 ARUBA Certified the following components for the Aruba 8325-48Y8C (JL635A) SWITCH (System OID:.1.3.6.1.4.1.47196.4.1.1.1.50):
FileSystem, Interface, Memory, Port, and Processor.
SASS-15113 / 305828 CISCO Certified the following components for the Cisco RAIE-1783BMS20CGP ROUTER (System OID:.1.3.6.1.4.1.9.1.1492):
AggregateInterface, Fan, Memory, Interface, PowerSupply, Processor, TemperatureSensor, and Vlan.
SASS-15089 / 305855 CISCO Certified the following components for the cisco921J4PK9 ROUTER (System OID:.1.3.6.1.4.1.9.1.2715):
Card, Interface, Memory, Processor, and TemperatureSensor.
SASS-15261 / 305772 CISCO Certified the following components for the CISCO-ISR4461 ROUTER (System OID:.1.3.6.1.4.1.9.1.2680):
Card, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15263 / 305776 HP Certified the following components for the HP551024G4SFPPlusHI1Slot SWITCH (System OID:.1.3.6.1.4.1.25506.11.1.215):
Card, CardRedudancyGroup, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15135 / 305782 NETSCOUT Certified the following components for the nGenius 3903 SWITCH (System OID:.1.3.6.1.4.1.38692.1.2.3903):
Port.
SASS-15137 / 305909 HUAWEI Certified the following components for the Eudemon1000E-G FIREWALL (System OID:.1.3.6.1.4.1.2011.2.321.1.216):
AggregateInterface, AggregatePort, Card, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
 
SASS-15167 / 305898 AVAYA Certified the following components for the Avaya-Call-Management-System-CMS-SNMP HOST (System OID:.1.3.6.1.4.1.6889.1.72):
FileSystem, Interface, Memory, MemoryGroup, Processor, and ProcessorGroup.
SASS-15130 / 305899 AVAYA Certified the following components for the Avaya-Aura-Collaboration-Environment HOST (System OID:.1.3.6.1.4.1.6889.1.63):
FileSystem, Interface, Memory, MemoryGroup, Processor, and ProcessorGroup.
SASS-15269 / 305779 HP Certified the following components for the HP2920-48G(J9728A) SWITCH (System OID:.1.3.6.1.4.1.11.2.3.7.11.154):
Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, and Vlan.
SASS-15267 / 305778  HP Certified the following components for the hpFF570032XGT8XG2QSFPPlus SWITCH (System OID:.1.3.6.1.4.1.25506.11.1.174):
AggregatePort, Card, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15265 / 305777 HP Certified the following components for the hp551048G4SFPPlusHI1Slot SWITCH (System OID:.1.3.6.1.4.1.25506.11.1.216):
Card, CardRedudancyGroup, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15079 / 305831 CISCO Certified the following components for the ciscoNCS55A148T6H ROUTER (System OID:.1.3.6.1.4.1.9.1.2867):
Card, Fan, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15188 / 305903 CISCO Certified the following components for the Cisco IE-1000-8P2S-LM SWITCH (System OID:.1.3.6.1.4.1.9.1.2333):
Interface, and Port.
SASS-15283 / 305793 TELDAT Certified the following components for the Teldat Teldat-Atlas-60 ROUTER (System OID:.1.3.6.1.4.1.2007.1.1.187):
Interface.
SASS-15273 / 305780 CISCO Certified the following components for the cevChassisCSP2100 HOST (System OID:.1.3.6.1.4.1.9.12.3.1.3.1831):
FileSystem, Interface, Memory, Port, MemoryGroup, Processor, ProcessorGroup, and TemperatureSensor.
SASS-15281 / 305807 FORTINET Certified the following components for the Fortinet FAC-VM-BASE FIREWALL (System OID:.1.3.6.1.4.1.12356.113.100.101):
Interface, Memory, and Processor.
SASS-15172 / 305932 FORTINET Certified the following components for the fgt3HD FIREWALL (System OID:.1.3.6.1.4.1.12356.101.1.3006):
Disk, Fan, Interface, Memory, Processor, TemperatureSensor, and VoltageSensor.
SASS-15169 / 305914 CISCO Certified the following components for the UcsE140S HOST (System OID:.1.3.6.1.4.1.9.1.1864):
Card, Disk, Interface, Memory, MemoryGroup, TemperatureSensor, and VoltageSensor.
SASS-15074 / 305830 FORTINET Certified the following components for the 301E FIREWALL (System OID:.1.3.6.1.4.1.12356.101.1.3008):
Disk, Fan, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15148 / 305848 CISCO Certified the following components for the CSP5444 HOST (System OID:.1.3.6.1.4.1.9.12.3.1.3.2376):
FileSystem, Interface, Memory, MemoryGroup, Processor, ProcessorGroup, and TemperatureSensor.
SASS-15285 / 305883 INFOBLOX Certified the following components for the IB-4015 HOST (System OID:.1.3.6.1.4.1.7779.1.1521):
Disk, Fan, FileSystem, Interface, Memory, MemoryGroup, PowerSupply, Processor, ProcessorGroup, and TemperatureSensor.
SASS-15277 / 305921 CISCO Certified the following components for the cevChassisN9KC93108TCFX3P SWITCH (System OID:.1.3.6.1.4.1.9.12.3.1.3.2377):
Card, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15196 / 305927 JUNIPER Certified the following components for the MX960 ROUTER (System OID:.1.3.6.1.4.1.2636.1.1.1.2.21):
Card, CardRedendancyGroup, Fan, Interface, Memory, PowerSupply, Processor, and TemperatureSensor.
SASS-15279 / 305894 ARISTA Certified the following components for the DCS-7280CR3MK-32P4-F SWITCH (System OID:.1.3.6.1.4.1.30065.1.3011.7280.2727.3.1810.32.2129.4):
Interface, Memory, Port, Processor, and Vlan.
SASS-15275 / 305916 CISCO Certified the following components for the cevChassisDSC9396TK9 FIBERCHANNELSWITCH (System OID:.1.3.6.1.4.1.9.12.3.1.3.2055):
Card, Fan, Interface, Memory, PowerSupply, Processor, and TemperatureSensor.
SASS-15271 / 305918 HP Certified the following components for the HPE 6125G/XG Blade SWITCH (System OID:.1.3.6.1.4.1.25506.11.1.51):
Card, Interface, Memory, Port, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15245 / 306026 CISCO Certified the following components for the ciscoNCS54016G ROUTER (System OID:.1.3.6.1.4.1.9.1.3009):
AggregateInterface, Interface, and Memory.
SASS-15016 / 305756 NETSCOUT Certified the following components for the Protector 408 HOST (System OID:.1.3.6.1.4.1.21671.1.2):
Verified with ICMP ONLY: Interface.

Complex Certifications

Complex certifications involve re-certification, new device certifications, and involve new driver creations or multiple file changes. This section describes the devices certified in this patch.

Complex devices certified in the patch:

SR /TASC Number Vendor Name Description
SASS-15184 / 305886 VMWARE Certified the following components for the Avi Networks Controller LOADBALANCER (System OID:.1.3.6.1.4.1.45468):
Disk, FileSystem, Interface, Memory, and Processor.
SASS-15156 / 305851 CISCO Certified the following components for the ciscoC11174PLteEA ROUTER (System OID:.1.3.6.1.4.1.9.1.2522):
Interface, Memory, PowerSupply, Processor, and TemperatureSensor.
SASS-15154 / 305879 CISCO Certified the following components for the ciscoNCS55A148Q6H ROUTER (System OID:.1.3.6.1.4.1.9.1.2866):
Card, Fan, Interface, Memory, PowerSupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15289 / 305762 CISCO Certified the following components for the cat35xxStack STACKSWITCHSYSTEM (System OID:.1.3.6.1.4.1.9.1.2277):
Card, Fan, Interface, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15202 / 305956 CISCO Certified the following components for the cevChassisN9KC93360YCFX2 SWITCH (System OID:.1.3.6.1.4.1.9.12.3.1.3.2237):
AggregatePort, Card, Fan, Memory, Port, PowerSupply, Processor, TemperatureSensor, VoltageSensor, and Vlan.
SASS-15061 / 305827 ALCATEL Certified the following components for the 7750 SR ROUTER (System OID:.1.3.6.1.4.1.6527.1.3.9):
Card, CardRedendancyGroup, Fan, Interface, Memory, Powersupply, Processor, TemperatureSensor, and VoltageSensor.
SASS-15076 / 305850 CISCO Certified the following components for the cisco9214PLTEGBK9 ROUTER (System OID:.1.3.6.1.4.1.9.1.2711):
Card, Interface, Memory, PowerSupply, Processor, and TemperatureSensor.

Certification impact

This section lists the impacted drivers and SysOIDs as a result of certification changes.

TASC Number Impacted Drivers Impacted SysOIDs
305850 HEALTH = Cisco-Router-CRS-EntSensor

.1.3.6.1.4.1.9.1.348
.1.3.6.1.4.1.9.1.925
.1.3.6.1.4.1.9.1.822
.1.3.6.1.4.1.9.1.1116
.1.3.6.1.4.1.9.1.610
.1.3.6.1.4.1.9.1.2068
.1.3.6.1.4.1.9.1.2093
.1.3.6.1.4.1.9.1.1861
.1.3.6.1.4.1.9.1.2157
.1.3.6.1.4.1.9.1.1935
.1.3.6.1.4.1.9.1.2101
.1.3.6.1.4.1.9.1.2143
.1.3.6.1.4.1.9.1.2155
.1.3.6.1.4.1.9.1.2102
.1.3.6.1.4.1.9.1.2500
.1.3.6.1.4.1.9.1.2501
.1.3.6.1.4.1.9.1.2520
.1.3.6.1.4.1.9.1.2505
.1.3.6.1.4.1.9.1.2668
.1.3.6.1.4.1.9.1.2664
.1.3.6.1.4.1.9.1.2530
.1.3.6.1.4.1.9.1.2506
.1.3.6.1.4.1.9.1.2423
.1.3.6.1.4.1.9.1.2347
.1.3.6.1.4.1.9.1.2401
.1.3.6.1.4.1.9.1.2567
.1.3.6.1.4.1.9.1.2746
.1.3.6.1.4.1.9.1.2339
.1.3.6.1.4.1.9.1.2711
.1.3.6.1.4.1.9.1.2680
.1.3.6.1.4.1.9.1.3009

305827 HEALTH = Alcatel-Timex
CPU/Memory = AlcatelTimex

.1.3.6.1.4.1.6527.1.3.4
.1.3.6.1.4.1.6527.1.3.3
.1.3.6.1.4.1.6527.6.1.1.2.5
.1.3.6.1.4.1.6527.6.1.1.2.1
.1.3.6.1.4.1.6527.6.1.1.2.11
.1.3.6.1.4.1.6527.1.15.1
.1.3.6.1.4.1.6527.6.2.1.2.2.2
.1.3.6.1.4.1.6527.1.3.8
.1.3.6.1.4.1.6527.6.2.1.2.2.1
.1.3.6.1.4.1.6527.1.3.6
.1.3.6.1.4.1.6527.1.18.3
.1.3.6.1.4.1.6527.1.3.17
.1.3.6.1.4.1.6527.1.3.23
.1.3.6.1.4.1.6527.1.3.16
.1.3.6.1.4.1.6527.6.2.1.2.8.1
.1.3.6.1.4.1.6527.1.3.9

305956
HEALTH = Nexus-Entity-EntSensor
 

.1.3.6.1.4.1.9.12.3.1.3.616
.1.3.6.1.4.1.9.12.3.1.3.1107
.1.3.6.1.4.1.9.12.3.1.3.1105
.1.3.6.1.4.1.9.12.3.1.3.1238
.1.3.6.1.4.1.9.12.3.1.3.1308
.1.3.6.1.4.1.9.12.3.1.3.1237
.1.3.6.1.4.1.9.12.3.1.3.1467
.1.3.6.1.4.1.9.12.3.1.3.1508
.1.3.6.1.4.1.9.12.3.1.3.1390
.1.3.6.1.4.1.9.12.3.1.3.1507
.1.3.6.1.4.1.9.12.3.1.3.1388
.1.3.6.1.4.1.9.12.3.1.3.1627
.1.3.6.1.4.1.9.12.3.1.3.1625
.1.3.6.1.4.1.9.12.3.1.3.1409
.1.3.6.1.4.1.9.12.3.1.3.1489
.1.3.6.1.4.1.9.12.3.1.3.1626
.1.3.6.1.4.1.9.12.3.1.3.1619
.1.3.6.1.4.1.9.12.3.1.3.1491
.1.3.6.1.4.1.9.12.3.1.3.1666
.1.3.6.1.4.1.9.12.3.1.3.1239
.1.3.6.1.4.1.9.12.3.1.3.1660
.1.3.6.1.4.1.9.12.3.1.3.1712
.1.3.6.1.4.1.9.12.3.1.3.1824
.1.3.6.1.4.1.9.12.3.1.3.1175
.1.3.6.1.4.1.9.12.3.1.3.1812
.1.3.6.1.4.1.9.12.3.1.3.1570
.1.3.6.1.4.1.9.12.3.1.3.1697
.1.3.6.1.4.1.9.12.3.1.3.1743
.1.3.6.1.4.1.9.12.3.1.3.1758
.1.3.6.1.4.1.9.12.3.1.3.1759
.1.3.6.1.4.1.9.12.3.1.3.1839
.1.3.6.1.4.1.9.12.3.1.3.1726
.1.3.6.1.4.1.9.12.3.1.3.1843
.1.3.6.1.4.1.9.12.3.1.3.1389
.1.3.6.1.4.1.9.12.3.1.3.1454
.1.3.6.1.4.1.9.12.3.1.3.1744
.1.3.6.1.4.1.9.12.3.1.3.1519
.1.3.6.1.4.1.9.12.3.1.3.1291
.1.3.6.1.4.1.9.12.3.1.3.1850
.1.3.6.1.4.1.9.12.3.1.3.1921
.1.3.6.1.4.1.9.12.3.1.3.1954
.1.3.6.1.4.1.9.12.3.1.3.2039
.1.3.6.1.4.1.9.12.3.1.3.2010
.1.3.6.1.4.1.9.12.3.1.3.1506
.1.3.6.1.4.1.9.12.3.1.3.1648
.1.3.6.1.4.1.9.12.3.1.3.1727
.1.3.6.1.4.1.9.12.3.1.3.1788
.1.3.6.1.4.1.9.12.3.1.3.1609
.1.3.6.1.4.1.9.12.3.1.3.1621
.1.3.6.1.4.1.9.12.3.1.3.1746
.1.3.6.1.4.1.9.12.3.1.3.2238
.1.3.6.1.4.1.9.12.3.1.3.1893
.1.3.6.1.4.1.9.1.2804
.1.3.6.1.4.1.9.12.3.1.3.2272
.1.3.6.1.4.1.9.12.3.1.3.2237

305762 HEALTH = Cisco-Catalyst .1.3.6.1.4.1.9.1.2277
.1.3.6.1.4.1.9.1.2275 
.1.3.6.1.4.1.9.1.2273
.1.3.6.1.4.1.9.1.2274
305879
HEALTH = Cisco-IOSXR-Health .1.3.6.1.4.1.9.1.2866
305851 HEALTH = Cisco-IOSXR-Health .1.3.6.1.4.1.9.1.2522
305886 HOSTRESRCS  = MIB2 .1.3.6.1.4.1.207.1.14.47
.1.3.6.1.4.1.207.1.14.48
.1.3.6.1.4.1.5003.8.1.1.56
.1.3.6.1.4.1.5003.8.1.1.3
.1.3.6.1.4.1.5003.8.1.1.47
.1.3.6.1.4.1.5003.8.1.1.71
.1.3.6.1.4.1.5003.8.1.1.67
.1.3.6.1.4.1.5003.8.1.1.70
.1.3.6.1.4.1.5003.8.1.1.83
.1.3.6.1.4.1.5003.8.1.1.72
.1.3.6.1.4.1.5003.8.1.1.86
.1.3.6.1.4.1.5003.8.1.1.49
.1.3.6.1.4.1.99.1.1.3.28
.1.3.6.1.4.1.6889.1.27.1.1
.1.3.6.1.4.1.6889.2.42.1.2
.1.3.6.1.4.1.6889.1.35
.1.3.6.1.4.1.6889.1.36
.1.3.6.1.4.1.6889.1.50
.1.3.6.1.4.1.6889.1.73.2
.1.3.6.1.4.1.6889.2.42.1.1.0
.1.3.6.1.4.1.6889.2.42.3.2
.1.3.6.1.4.1.6889.1.73.1
.1.3.6.1.4.1.6889.2.42.3.1
.1.3.6.1.4.1.6889.1.77
.1.3.6.1.4.1.8638.1.1
.1.3.6.1.4.1.8638
.1.3.6.1.4.1.6889.1.63
.1.3.6.1.4.1.6889.1.72
.1.3.6.1.4.1.10418.26.1.4
.1.3.6.1.4.1.10418.26.1.1
.1.3.6.1.4.1.37538.1
.1.3.6.1.4.1.37538.2.1000.2.674.6000.1
.1.3.6.1.4.1.3417.1.2.3
.1.3.6.1.4.1.3417.1.5.4
.1.3.6.1.4.1.3417.1.5.3
.1.3.6.1.4.1.3417.1.5.2
.1.3.6.1.4.1.14501.6
.1.3.6.1.4.1.6321.1.2.2.5.2
.1.3.6.1.4.1.6321.1.2.2.5.4
.1.3.6.1.4.1.6321.1.2.2.5.5
.1.3.6.1.4.1.6321.1.2.2
.1.3.6.1.4.1.9.1.504
.1.3.6.1.4.1.9.1.492
.1.3.6.1.4.1.9.1.505
.1.3.6.1.4.1.9.1.491
.1.3.6.1.4.1.9.1.517
.1.3.6.1.4.1.9.1.411
.1.3.6.1.4.1.9.1.409
.1.3.6.1.4.1.9.1.410
.1.3.6.1.4.1.9.1.433
.1.3.6.1.4.1.9.1.412
.1.3.6.1.4.1.9.1.432
.1.3.6.1.4.1.9.1.486
.1.3.6.1.4.1.9.1.487
.1.3.6.1.4.1.9.1.454
.1.3.6.1.4.1.9.1.582
.1.3.6.1.4.1.9.1.583
.1.3.6.1.4.1.9.1.584
.1.3.6.1.4.1.9.1.585
.1.3.6.1.4.1.9.1.586
.1.3.6.1.4.1.9.1.587
.1.3.6.1.4.1.9.1.622
.1.3.6.1.4.1.9.1.623
.1.3.6.1.4.1.9.1.595
.1.3.6.1.4.1.9.1.693
.1.3.6.1.4.1.9.10.56
.1.3.6.1.4.1.9.1.601
.1.3.6.1.4.1.9.1.630
.1.3.6.1.4.1.9.1.631
.1.3.6.1.4.1.9.1.752
.1.3.6.1.4.1.9.1.708
.1.3.6.1.4.1.9.1.710
.1.3.6.1.4.1.9.1.596
.1.3.6.1.4.1.9.1.759
.1.3.6.1.4.1.9.1.761
.1.3.6.1.4.1.9.1.786
.1.3.6.1.4.1.9.1.776
.1.3.6.1.4.1.9.1.777
.1.3.6.1.4.1.9.1.787
.1.3.6.1.4.1.9.1.899
.1.3.6.1.4.1.9.1.314
.1.3.6.1.4.1.9.1.746
.1.3.6.1.4.1.9.1.907
.1.3.6.1.4.1.9.1.957
.1.3.6.1.4.1.9.1.908
.1.3.6.1.4.1.9.1.985
.1.3.6.1.4.1.2496.1.1
.1.3.6.1.4.1.9.1.986
.1.3.6.1.4.1.9.1.987
.1.3.6.1.4.1.9.1.800
.1.3.6.1.4.1.99.1.1.3.34
.1.3.6.1.4.1.9.1.1167
.1.3.6.1.4.1.9.1.898
.1.3.6.1.4.1.9.12.3.1.9.2.250
.1.3.6.1.4.1.9.1.1212
.1.3.6.1.4.1.9.1.1288
.1.3.6.1.4.1.9.1.1353
.1.3.6.1.4.1.9.1.1348
.1.3.6.1.2.1.47.1.1.1.1.13.1
.1.3.6.1.4.1.9.1.1350
.1.3.6.1.4.1.9.1.1351
.1.3.6.1.4.1.9.1.1213
.1.3.6.1.4.1.9.1.1595
.1.3.6.1.4.1.9.1.1524
.1.3.6.1.4.1.9.1.1210
.1.3.6.1.4.1.9.1.1003
.1.3.6.1.4.1.9.1.1523
.1.3.6.1.4.1.9.1.1354
.1.3.6.1.4.1.9.1.1424
.1.3.6.1.4.1.9.1.1298
.1.3.6.1.4.1.9.1.1349
.1.3.6.1.4.1.9.1.1117
.1.3.6.1.4.1.9.1.1297
.1.3.6.1.4.1.9.1.1352
.1.3.6.1.4.1.9.1.1681
.1.3.6.1.4.1.9.1.1423
.1.3.6.1.4.1.9.1.1611
.1.3.6.1.4.1.9.1.1426
.1.3.6.1.4.1.9.1.2307
.1.3.6.1.4.1.9.1.2140
.1.3.6.1.4.1.9.1.2265
.1.3.6.1.4.1.9.1.1301
.1.3.6.1.4.1.49736
.1.3.6.1.4.1.9.1.996
.1.3.6.1.4.1.9.1.982
.1.3.6.1.4.1.9.1.2352
.1.3.6.1.4.1.9.1.2786
.1.3.6.1.4.1.42229.1.2
.1.3.6.1.4.1.19746.3.1.25
.1.3.6.1.4.1.19746.3.1.27
.1.3.6.1.4.1.19746.3.1.19
.1.3.6.1.4.1.19746.3.1.34
.1.3.6.1.4.1.19746.3.1.0
.1.3.6.1.4.1.21343.3.2.17
.1.3.6.1.4.1.21343.3.2.24
.1.3.6.1.4.1.674.11000.5000.100.2.3.2
.1.3.6.1.4.1.674.11000.5000.100.2.2.2
.1.3.6.1.4.1.674.11000.5000.100.2.1.22
.1.3.6.1.4.1.12356.103.1.1001
.1.3.6.1.4.1.12356.103.1.30003
.1.3.6.1.4.1.12356.103.1.40005
.1.3.6.1.4.1.12356.103.3.10005
.1.3.6.1.4.1.12356.103.1.4005
.1.3.6.1.4.1.12356.113.100.404
.1.3.6.1.4.1.12356.113.100.101
.1.3.6.1.4.1.3534.7.2.3.5
.1.3.6.1.4.1.11.5.7.5.1
.1.3.6.1.4.1.232.167
.1.3.6.1.4.1.47196.4.1.1.1.5
.1.3.6.1.4.1.11.10.3.1.3.27
.1.3.6.1.4.1.47196.4.1.1.1.1
.1.3.6.1.4.1.47196.4.1.1.1.102
.1.3.6.1.4.1.47196.4.1.1.1.50
.1.3.6.1.4.1.20301.1.18.13
.1.3.6.1.4.1.2.3.1.2.1.1.3
.1.3.6.1.4.1.2.6.11
.1.3.6.1.4.1.94.1.21.2.1.5
.1.3.6.1.4.1.2021.250.10
.1.3.6.1.4.1.2021.250.3
.1.3.6.1.4.1.23.1.6.4.11
.1.3.6.1.4.1.23.1.6.5
.1.3.6.1.4.1.23.1.6
.1.3.6.1.4.1.546
.1.3.6.1.4.1.311.1.1.3.1
.1.3.6.1.4.1.1751.1.30
.1.3.6.1.4.1.169.3.155.1
.1.3.6.1.4.1.8072.3.2.3
.1.3.6.1.4.1.8072.3.2.8
.1.3.6.1.4.1.8072.3.2.255
.1.3.6.1.4.1.5713.1.1.2.4
.1.3.6.1.4.1.94.1.21.2.1.11
.1.3.6.1.4.1.191.1.32
.1.3.6.1.4.1.1977.1.6.1279.1
.1.3.6.1.4.1.8072.3.2.10.1
.1.3.6.1.4.1.23.100.1
.1.3.6.1.4.1.8072.3.2.15
.1.3.6.1.4.1.9070.1.2.3.1.5
.1.3.6.1.4.1.2021.250.255
.1.3.6.1.4.1.141.1.1.9903
.1.3.6.1.4.1.141.1.1.4910
.1.3.6.1.4.1.141.1.1.9981
.1.3.6.1.4.1.2312
.1.3.6.1.4.1.141.1.1.9320
.1.3.6.1.4.1.42.2.2
.1.3.6.1.4.1.42.2.15
.1.3.6.1.4.1.311.1.1.3.3
.1.3.6.1.4.1.13315.100.101
.1.3.6.1.4.1.7779.250.4.3.4.0
.1.3.6.1.4.1.9793
.1.3.6.1.4.1.7779.3.4
.1.3.6.1.4.1.7779.2.5
.1.3.6.1.4.1.7779.3.2
.1.3.6.1.4.1.7779.550.4.3.4.0
.1.3.6.1.4.1.7779.1550.4.3.4.0
.1.3.6.1.4.1.7779.2.6
.1.3.6.1.4.1.7779.3.1
.1.3.6.1.4.1.7779.2.3
.1.3.6.1.4.1.7779.1.1
.1.3.6.1.4.1.13315.100.200
.1.3.6.1.4.1.7779.2.2
.1.3.6.1.4.1.2925.5
.1.3.6.1.4.1.2879.1.5.3
.1.3.6.1.4.1.850.1
.1.3.6.1.4.1.25461.2.3.1
.1.3.6.1.4.1.25461.2.3.2
.1.3.6.1.4.1.25461.2.3.4
.1.3.6.1.4.1.8072.3.2.14
.1.3.6.1.4.1.7779.1.1307
.1.3.6.1.4.1.7779.1.1304
.1.3.6.1.4.1.7684.1.2.1
.1.3.6.1.4.1.7779.1.1203
.1.3.6.1.4.1.7779.1.1302
.1.3.6.1.4.1.7779.1.1202
.1.3.6.1.4.1.7244.1.1.1
.1.3.6.1.4.1.36.2.15.22.1
.1.3.6.1.4.1.7779.1.1205
.1.3.6.1.4.1.22610.1.3.8
.1.3.6.1.4.1.18552.1
.1.3.6.1.4.1.244.23
.1.3.6.1.4.1.37560.1.8
.1.3.6.1.4.1.2935
.1.3.6.1.4.1.18552.2
.1.3.6.1.4.1.18418.2.1
.1.3.6.1.4.1.14988.1
.1.3.6.1.4.1.25461.2.3.5
.1.3.6.1.4.1.25461.2.3.11
.1.3.6.1.4.1.25461.2.3.3
.1.3.6.1.4.1.25461.2.3.6
.1.3.6.1.4.1.1226
.1.3.6.1.4.1.11829
.1.3.6.1.4.1.7779.1.1303
.1.3.6.1.4.1.3097.1.5.9
.1.3.6.1.4.1.25461.2.3.9
.1.3.6.1.4.1.7779.1.1301
.1.3.6.1.4.1.25461.2.3.12
.1.3.6.1.4.1.13315.2.1
.1.3.6.1.4.1.7779.1.1403
.1.3.6.1.4.1.7779.1.1413
.1.3.6.1.4.1.7779.1.1421
.1.3.6.1.4.1.7779.1.1423
.1.3.6.1.4.1.9999.1.1
.1.3.6.1.4.1.11829.2.3.12
.1.3.6.1.4.1.25433.3.1
.1.3.6.1.4.1.25461.2.3.8
.1.3.6.1.4.1.25651.1.2
.1.3.6.1.4.1.26866
.1.3.6.1.4.1.25461.2.3.17
.1.3.6.1.4.1.33049.2.1
.1.3.6.1.4.1.7779.1.1201
.1.3.6.1.4.1.10449.1
.1.3.6.1.4.1.30803
.1.3.6.1.4.1.3279.2.1
.1.3.6.1.4.1.7779.1.1402
.1.3.6.1.4.1.7779.1.1404
.1.3.6.1.4.1.7779.1.1444
.1.3.6.1.4.1.7779.1.1411
.1.3.6.1.4.1.16858.2.1
.1.3.6.1.4.1.15397.2
.1.3.6.1.4.1.3534.7.1.8.7
.1.3.6.1.4.1.11829.2.3.7
.1.3.6.1.4.1.25461.2.3.30
.1.3.6.1.4.1.11789.1.1.2
.1.3.6.1.4.1.25461.2.3.31
.1.3.6.1.4.1.1230.2.7.1.1
.1.3.6.1.4.1.25461.2.3.19
.1.3.6.1.4.1.25461.2.3.34
.1.3.6.1.4.1.25461.2.3.35
.1.3.6.1.4.1.25461.2.3.18
.1.3.6.1.4.1.17337.2.1.3.1.4
.1.3.6.1.4.1.8712.1.1
.1.3.6.1.4.1.7779.1.1407
.1.3.6.1.4.1.26866.3.5
.1.3.6.1.4.1.26866.3.6
.1.3.6.1.4.1.11829.2.3.28
.1.3.6.1.4.1.11829.2.3.24
.1.3.6.1.4.1.7779.1.1004
.1.3.6.1.4.1.25461.2.3.22
.1.3.6.1.4.1.25461.2.3.24
.1.3.6.1.4.1.25461.2.3.23
.1.3.6.1.4.1.25461.2.3.33
.1.3.6.1.4.1.25461.2.3.37
.1.3.6.1.4.1.141.1.1.4595
.1.3.6.1.4.1.141.1.1.4795
.1.3.6.1.4.1.141.1.1.9795
.1.3.6.1.4.1.25461.2.3.38
.1.3.6.1.4.1.25461.2.3.36
.1.3.6.1.4.1.26866.3.10
.1.3.6.1.4.1.2793
.1.3.6.1.4.1.26866.3.8
.1.3.6.1.4.1.26866.2.2
.1.3.6.1.4.1.26866.3.15
.1.3.6.1.4.1.26866.3.11
.1.3.6.1.4.1.168.1.101
.1.3.6.1.4.1.25461.2.3.40
.1.3.6.1.4.1.9070.1.2.5.7.4
.1.3.6.1.4.1.10830.3.2
.1.3.6.1.4.1.41112.1.5
.1.3.6.1.4.1.25461.2.3.21
.1.3.6.1.4.1.25461.2.3.7
.1.3.6.1.4.1.37220.1.2.8
.1.3.6.1.4.1.37220.2.2.3
.1.3.6.1.4.1.25461.2.3.44
.1.3.6.1.4.1.4935.1000.100.100.600
.1.3.6.1.4.1.367.1.1
.1.3.6.1.4.1.25461.2.3.29
.1.3.6.1.4.1.25461.2.3.39
.1.3.6.1.4.1.5597.30
.1.3.6.1.4.1.25461.2.3.43
.1.3.6.1.4.1.45468
.1.3.6.1.4.1.8239.1.2.5
.1.3.6.1.4.1.8239.1.2.1
.1.3.6.1.4.1.8239.1.2.12
.1.3.6.1.4.1.19046.1.7.30
.1.3.6.1.4.1.23128.1000.11.1
.1.3.6.1.4.1.23128.1000.1.1
.1.3.6.1.4.1.23128.1000.7.1
.1.3.6.1.4.1.23128.1000.3.1
.1.3.6.1.4.1.3132.12.2.1
.1.3.6.1.4.1.94.1.21.2.1.147
.1.3.6.1.4.1.94.1.21.2.1.148
.1.3.6.1.4.1.94.1.21.2.1.139
.1.3.6.1.4.1.562.3
.1.3.6.1.4.1.562.3.21
.1.3.6.1.4.1.562.37.1.4
.1.3.6.1.4.1.562.37.1.8
.1.3.6.1.4.1.562.3.11.5
.1.3.6.1.4.1.562.3.7
.1.3.6.1.4.1.562.3.13
.1.3.6.1.4.1.562.3.12
.1.3.6.1.4.1.2505.1750
.1.3.6.1.4.1.562.3.14
.1.3.6.1.4.1.2505.5000
.1.3.6.1.4.1.2505.1050
.1.3.6.1.4.1.25049.1.61
.1.3.6.1.4.1.25049.1.42
.1.3.6.1.4.1.25049.1.91
.1.3.6.1.4.1.841.2.26
.1.3.6.1.4.1.841.2.11
.1.3.6.1.4.1.168.1.100
.1.3.6.1.4.1.17163.1.2
.1.3.6.1.4.1.17163.1.4
.1.3.6.1.4.1.17163.1.51
.1.3.6.1.4.1.17163.1.52
.1.3.6.1.4.1.17163.1.200
.1.3.6.1.4.1.17163.1.100
.1.3.6.1.4.1.11610.1.4.1
.1.3.6.1.4.1.18837.3.2
.1.3.6.1.4.1.1397.2.29

 

Supported Operating Systems and Version Details

Product Supported Operating System Version Number Details
IP Red Hat Enterprise Linux 6.8, 6.9 and 6.10– 64 bit
Red Hat Enterprise Linux 7.4, 7.5 and 7.6– 64 bit
VMware® ESX Version 5.x,6.x

From <BASEDIR>/smarts/bin/, type the following command:
./sm_server --version (Linux)
The following output is displayed:
sm_server:
linux_rhAS50-x86-64/301032700

IP_NETWORK_SUITE: V10.1.0.12(191808), 18-Jan-2021 12:02:32 Copyright 2021, VMware Inc - Build 87
Foundation V10.1.0.1(180141), 20-Sep-2019 10:10:52 Copyright 2019, VMware Inc - Build 7

Installation

A patch installs files to the <BASEDIR>/smarts/local directory of the product. The Installation software performs the following actions:

  • Backs up all files that are being replaced or merged.
  • Merges changes from your current, user-modifiable configuration files into the new versions of the files from the patch.
  • Displays complete summary at the end of patch installation.
  • Displays the location of a log file that lists the results of merging the files.

Note: If the original product was installed on one computer and then was copied to another computer, the patch cannot be applied to the copied installation. You must apply the patch to the computer with the original installation, and then the results can be copied to another computer.

Patch Installation File

You can install the patch on the host where the IP product is running. 

Binary detail for IP-10.1.0.12 release is:

IP:setup-IP-linux-10_1_0_12-20210118-64BIT.bin

Note: You can download the binary from https://support.vmware.com.

Installation directory

In this document, the term <BASEDIR> represents the location where Smarts software is installed.

For UNIX, the default location is:/opt/InCharge/<productsuite>.

The <productsuite>; represents the Smarts product suite to which the product belongs.

Optionally, you can specify the root of <BASEDIR> to be something other than /opt/InCharge (on UNIX) but you cannot change the name of the <productsuite> that is part of the <BASEDIR>.

Install a new patch over an older patch

Patches are cumulative each successive patch includes all of the fixes from any previous patches. As a result, a newer patch can be installed on top of an older patch. The patch number, which increments itself for each successive patch, indicates the version. A patch with higher version number can be installed over a patch with a lower version number.

The Installation software checks the version of the installed product and the version to be installed at the beginning of its process. It will not allow an older version to be installed on top of a newer version.

Apply patch using CLI mode

CLI mode provides a text-based method for invoking the Installation software. This mode is intended for UNIX platforms with non-graphic (text-only) consoles. The CLI mode installation follows the same process as the wizard mode but displays text on the terminal screen and requires user responses on the keyboard.

Run CLI mode

  1. Change directory to the directory where you typically store patches, for example, ./opt.
  2. Run following setup command and then press Enter. Replace xx with the relevant product name, for example: ESM. For exact name, see the Patch Installation File section:

           Setup command syntax for CLI mode (Linux): ./setup-IP-linux-10_1_0_12-20210118-64BIT.bin.

           A welcome message with information about the installation appears.

Note: Stop all VMware Smart Assurance services and processes that use programs or libraries from the product being upgraded or installed before performing the installation.

User selections and navigation in CLI mode

  • During the patch installation process, at the end of each screen of text, you are prompted with a set of options. For example:

           type 'back' - to go to the previous step

           type 'quit' - to cancel anytime

  • Select a choice by typing the text and press Enter.
  • Accept the default choice, and press Enter.
  • Other screens have different choices. For example when the license agreement is displayed, the following prompt appears:

           Press any key to continue to read license agreement or press '0' to advance to end.

  • At the end of the license agreement, the installation process displays the first of several menus.

           Choose from the following (Y/N) options:

           Y - to accept the terms of the license agreement.

           N - not to accept the terms of the license agreement.

  • Type the desired selection and press Enter. In the case of the license agreement, you must accept the agreement by typing Y and pressing Enter.

           The screen is displayed with an Get User Input. Choose the base location by entering the correct number.

            For example, type 1 to choose the default location for installation and press Enter.

      Get User Input

      1) /opt/InCharge 10.1.0.*

           For example, if the product name is ESM and default install folder is /opt/InCharge, the installer displays:

           VMware Smart Assurance Server Manager Suite will be installed in the following location:

           Product Name: ESM

           Install Folder: /opt/InCharge

  • Press Enter to continue the installation.
  • Press Enter to exit the installer.

           When the patch installation is complete, reconcile the configuration files as described in Reconcile user-modifiable files.

Apply patch using Unattended (Silent) mode

Unattended mode installs the patch without user input or a response file. When invoking the install program, specify the location of the product suite to be patched.

In order to invoke an unattended installation of the patch, type the appropriate setup command from below table and then press Enter. Replace “xx” with the relevant product name, for example, ESM. For exact name, see the Patch Installation File section:

Setup command syntax for unattended mode (Linux):setup-IP-linux-10_1_0_12-20210118-64BIT.bin -i silent -DrpProduct.installLocation=/opt/InCharge.

Where xx represents the product name.

Note: You must provide the correct base installation location. For example: base10.1 build is installed inside /opt/InCharge.

Once the installation is completed inside /tmp ** log file will be created with the summary. When the patch installation is complete, reconcile the configuration files as described in Reconcile user-modifiable files.

Log Files

Patch report and log file locations, lists the files that the Installation software creates during the install process.

Patch report and log file locations:

Name Path File Name
Install log <BASEDIR>/smarts/setup/logs Install.<product>_SUITE. <patchversion>.log
Merged files log <BASEDIR>/smarts/setup/logs merge-summary-<patch version>.log

Install log

The installer creates an Install log file listing all actions performed by the installation. You need not read this file unless you suspect an installation failure.

If the installation process fails, the log files are located in a temporary directory, for example /tmp or C:\temp. A non-zero status indicates a failure.

Merged files Log

This log lists the files in the BASEDIR/smarts/local directory structure that were merged. For each merged file, the log lists the location and name of the file. If any file cannot be merged due to conflicts, this is also noted. In addition, the log lists the name and location for unmerged versions of all user-modifiable files that are included in the patch.

For example, in case of ESM: 

  • Summary of merge operation can be found at location: /opt/InCharge/ESM/smarts/setup/logs/merge-summary-10.x.x.x.log
  • For more detail logs: /opt/InCharge/ESM/smarts/setup/logs/detail-merge-10.1.0.5.log

If there were any conflict during the merge operation, the old local backup file will be saved as "File_Name.bkp" in its same location. These conflict files needs to be merged manually before starting the server.

Review the results of the reconciliation process

The results of the reconciliation analysis performed during the installation and all actions taken are included in the merged files log located in <BASEDIR>/smarts/setup/logs. The name of the log file is: install.merge.<patch version>.log

Reconcile User-modifiable Files

The Installation software is designed to preserve your changes to user-modifiable files when installing new versions of these files. Existing changes to user-modifiable files are always automatically merged. All files are merged by default.

The Installation software also creates a backup of all the versions of the user-modifiable files to ensure that you will not lose any configuration data.

Review the results of the reconciliation process

The results of the reconciliation analysis performed during the installation and all actions taken are included in the merged files log located in <BASEDIR>/smarts/setup/logs. The name of the log file is: install.merge.<patch version>.log.

Determine which files require action by reviewing the merged files log generated by the install process:

  1. Using any editor, open and review the log:

    <BASEDIR>/smarts/setup/log/Install.Merge.10.x.x.x.log.

  2. Review the log:

    1. Resolve conflicts in files manually. See Resolve the issue in conflict files.
    2. During the installation, the entries that indicate file merges without conflicts that resulted in automerge files.

Resolve issues in conflict files

If a conflict occurs for any file in the same local directory of the file location, you can find the below files:

  • One is the conflict file. For example, <filename>
  • Another file is .bak.001. For example, <filename>.bak.001

Review the conflict files and resolve issues using the following procedure:

  1. Open the user-modifiable file where the conflict occurs using sm_edit.

    For example, the conflict file for esm.param.conf is named esm-param.conf.

  2. Review and resolve the conflict manually.
  3. Save and close the file.

To use patch introduced file (for example, esm-param.conf):

  1. Rename the original conflict file. (For example, if the conflict file name is esm-param.conf, rename the file esm-param.conf to esm-param.conf_old).
  2. Rename the <filename>.bak.001 file to the original file name <filename> by removing .bak.001 extension.

    For example, if the patch file name is esm-param.conf.bak.001, rename it to the esm-param.conf to use the original file.

  3. Save and close the file.

Note: All the user-modifiable unmerged files before patch installation, are backed up in "<BASEDIR>/<Product Name>/smarts" location. By default, the backup directory is hidden.

Uninstallation

Uninstalling a patch removes all previously applied patches and returns the software to the baseline product version.

Note:Root privileges are required to uninstall a patch. Use either the uninstaller program to uninstall a patch. Failure to use one of these methods can result in an unstable system and/or inconsistent product directories.

Before uninstallation

You must complete the following task before uninstalling the patch:

  • Stop all VMware Smart Assurance services and processes that use programs or libraries from the product.

Roll back to a previous patch

If you want to revert to a previous patch, you must:

  • Uninstall the currently installed patch to return to the baseline version.

  • Reinstall the previous patch.

For example, to revert from Patch 2 to Patch 1, uninstall Patch 2, and then reinstall Patch 1.

Uninstall Patch Using the Uninstaller Program

Use the uninstaller program to uninstall a patch:

Note: Do not to use the uninstaller program in the _uninst directory because it will remove the entire product.

  1. Change the directory or use the file navigator to find the _rpuninst directory.

    For Example: /opt/InCharge/<Product>/_rpuninst on UNIX systems.

  2. Invoke the uninstaller program.

    For example: ./uninstaller on UNIX systems.

  3. Press Enter to continue the uninstallation.

Uninstall Patch Using Unattended (Silent) Mode

Use the uninstaller program to uninstall a patch.

Note: Do not to use the uninstaller program in the _uninst directory because it will remove the entire product.

  1. Change the directory or use the file navigator to find the _rpuninst directory.

    For Example: /opt/InCharge/<Product>/_rpuninst on UNIX systems.

  2. Execute the uninstaller program.

    ./uninstaller -i silent on UNIX systems.

  3. Press Enter to continue the uninstallation.
check-circle-line exclamation-circle-line close-line
Scroll to top icon