Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-71-1507746.1
Update Date:2017-07-05
Keywords:

Solution Type  Technical Instruction Sure

Solution  1507746.1 :   Oracle Fibre Channel (FC) SAN Switch Firmware Patch Matrix for Firmware Upgrade - Brocade - Cisco - McData - Qlogic  


Related Items
  • McData SAN Switch Hardware
  •  
  • QLogic SANbox 5600 Switch
  •  
  • Cisco SAN Switch Hardware
  •  
  • Qlogic SAN Switch Hardware
  •  
  • Brocade SAN Switch Hardware
  •  
  • Brocade 3200 Fabric Switch
  •  
  • Brocade 5100 Switch
  •  
  • McData 3232 Switch
  •  
Related Categories
  • PLA-Support>Sun Systems>DISK>Switch>SN-DK: Brocade Switch
  •  
  • _Old GCS Categories>Sun Microsystems>Switches>Cisco
  •  
  • _Old GCS Categories>Sun Microsystems>Switches>Qlogic
  •  
  • _Old GCS Categories>Sun Microsystems>Switches>Brocade
  •  
  • _Old GCS Categories>Sun Microsystems>Switches>McData
  •  




In this Document
Goal
Solution
 1) BROCADE SWITCHES
 Silkworm 3200 / Silkworm 3800
 Silkworm 3x50/3900/12K/24K
 Silkworm 4100
 Silkworm 200E/48000
 Silkworm 4900
 Silkworm 7500
 Silkworm 7500E
 Silkworm 5000
 DCX
 DCX-4S
 Brocade 300/5100/5300
 Brocade 7800/8000
 Brocade 6505/6520
 Brocade 6510
 DCX 8510
 DCX 8510-4s
 Brocade Data Center Fabric Manager (DCFM)
 Brocade EFCM
 Brocade Fabric Manager
 Brocade Network Advisor   (BNA)
 2) CISCO SWITCHES
 Cisco MDS 9506/9509/9513
 Cisco MDS 9216
 Cisco MDS 9222i
 Cisco MDS 9120/9140
 Cisco MDS 9124/9134
 Cisco SSM Module
 Cisco Data Center Network Manager (DCNM)
 Cisco Fabric Manager
 3) McDATA SWITCHES
 McData 6064/6140/4500
 McData 6064/6140/4500/4300
 McData 6064/6140/4300/4500/4400/4700
 McData 10000 (i10K)
 McData 4300v2
 McData 4500v2
 McData 1620 Router
 McData EFCM Software
 4) QLOGIC SWITCHES
 Sanbox1 (8-port and 16-port)
 Sanbox2 (8-port, 16-port, and 64-port)
 Qlogic SANbox 5200
 Qlogic SANbox 5600/5602
 Sun Switch 5802
 Qlogic SANbox 9000
References


Applies to:

Qlogic SAN Switch Hardware - Version Not Applicable to Not Applicable [Release N/A]
Brocade SAN Switch Hardware - Version Not Applicable to Not Applicable [Release N/A]
QLogic SANbox 5600 Switch - Version Not Applicable to Not Applicable [Release N/A]
McData SAN Switch Hardware - Version Not Applicable to Not Applicable [Release N/A]
McData 3232 Switch - Version Not Applicable to Not Applicable [Release N/A]
Information in this document applies to any platform.

Goal

The intent of this document is to provide the reader with the available firmware versions for the FC SAN Switches (Brocade, Cisco, McData and Qlogic) supported by Oracle

Connected switches

Before upgrading the firmware on a switch, check the connected switches to ensure compatibility and that any older versions are supported.
See the "Fabric OS Administrator's Guide" for version being installed.
Refer to the Fabric Operating System (FOS) Compatibility section of the FOS Release Notes for the recommended firmware version matrix showing the firmware levels that can run on connected switches.
For Brocade FC Switches, about how to access latest and old documentation, see:  Accessing Brocade Fibre Channel (FC) Switch Documentation (Doc ID 1917430.1)

 

FC Switch Firmware Patch Matrix.

Some notes about firmware upgrade

Note.1. See the README files of the patch for any questions regarding how to install the firmware. In general, if possible, it is recommended before changing fc switch firmware to:

- verify switch health/status

- collect support data

<Document 1016141.1> Cisco MDS switch - What logs are required to troubleshoot a Cisco MDS switch?
<Document 1003754.1> Brocade: What logs are required to troubleshoot a Brocade switch?
<Document 1270583.1> Qlogic Switch - What logs are required to troubleshoot a Qlogic Fibre Channel switch
<Document 1015572.1> McData - What logs are required to troubleshoot a McData switch?

- backup configuration

<Document 1917431.1> Brocade Fibre Channel (FC) Switch Configuration Backup and Restore

 

Note.2. These are the only firmware version and the only FC switches supported by Oracle. (It is possible that when Oracle starts the support of a recent new FC switch, it may not be in the list for a small period of time, until this document is updated)

Note.3. FC switch firmware upgrades are performed by customers. If you want an Oracle engineer onsite to do the firmware upgrade, this is a paid service and must go through Oracle ACS. About how to contact and the many benefits to using Oracle ACS, see Oracle Advanced Customer Support Services

If a MOS SR has already been created, transfer SR to ACS per latest ACS Billing EDP Training procedure.

Note.4. As an example for Brocade switches, see document  1014778.1 - Brocade 3250/3850/3900/12000/24000 - How to Upgrade Firmware on Switch

 

 

How to download a FC Switch Firmware Patch in MOS:


1.Go to My Oracle Support Portal

2.Select the 'Patches & Updates' tab

3.In the 'Patch Search' frame, click on 'Number/Name or Bug Number (Simple)'

4.In field next to 'Patch Name or Number', enter the patch number , ie 149139-01
        
To Run your query, click on the 'Search' button.

 

Or

3.In the 'Patch Search' frame, click on 'Product or Family (Advanced)'

4.In 'Product' field, enter the product name

To Run your query, click on the 'Search' button.

 

 

To discuss this information further with Oracle experts and industry peers, we encourage you to review, join or start a discussion in the My Oracle Support Community - Disk/Tape Storage Area Networks

 NOTE: Help to improve this document and knowledge base by selecting "Comments" and/or "Rate this document".

Solution

1) BROCADE SWITCHES

NOTE. For Brocade switches, Oracle supports Fabric Operating System (FOS) upgrades within one feature release
(a feature release is a major release indicated by the second digit "Y" of the release number, for example, vX.Y.Z)

Following are the major upgrade versions for the Fabric OS:
...
- v5.2x <<< 124898-06 Brocade FOS v5.2.2
- v5.3x <<< 124898-09 Brocade FOS v5.3.0b
- v6.0x <<< 137057-02 Brocade FOS v6.0.0c
- v6.1x <<< 138148-02 Brocade FOS v6.1.0a
 
This firmware upgrade procedure will not cause I/O interruption if upgrading from v5.3.0 or greater.
For new installs and switches not in production it is still recommended for FOS upgrade steps to be within one feature release in order to verify access and operation at each stage.
Here is a possible example of the patches you would need to use in case Brocade 300 FOS is v6.4.0c

    144917-04: v6.4.0c << if switch is currently at this FOS version
    144882-01: v6.4.1
    144882-02: v6.4.1a
    144882-03: v6.4.1b
    144882-04: v6.4.2
    144882-05: v6.4.2a
    144882-06: v6.4.2b
    144882-07: v6.4.3
    144882-08: v6.4.3b
    144882-09: v6.4.3c
    150018-01: v7.0.0d << first step, install patch and upgrade to this version
    149139-01: v7.0.1a
    149139-02: v7.0.2c
    150481-01: v7.1.0c1
    150481-02: v7.1.1a << second step, install patch and upgrade to this version

 

For questions related to which hardware is supported with the latest FOS version,
see the Brocade interoperability site:
https://www.brocade.com/solutions-technology/technology/compatibility/index.page 

 

Silkworm 3200 / Silkworm 3800

  • 115360-01: v3.1.0
  • 115360-02: v3.1.1b
  • 115360-03: v3.1.2a
  • 115360-04: v3.1.3
  • 115360-05: v3.2.0a
  • 115360-06: v3.2.1a
  • 115360-07: v3.2.1c

Silkworm 3x50/3900/12K/24K

  • 115361-02: v4.1.0 [does not apply to 3x50 or 24K]
  • 115361-03: v4.1.1a [does not apply to 3x50 or 24K]
  • 115361-04: v4.2.0b
  • 115361-05: v4.2.2
  • 115361-07: v4.4.0b
  • 115361-08: v4.4.0e
  • 119552-01: v5.0.1a
  • 119552-02: v5.0.3
  • 119552-03: v5.0.4a [12K only]
  • 119552-04: v5.0.5b [12K only]
  • 119552-05: v5.0.5c [12K only]
  • 119552-06: v5.0.5d [12K only]
  • 119552-07: v5.0.5e [12K only]
  • 119552-08: v5.0.5f [12K only]
  • 122185-01: v5.1.0a [does not apply to 12K]
  • 122185-02: v5.1.0d [does not apply to 12K]
  • 124898-01: v5.2.0a [does not apply to 12K]
  • 124898-03: v5.2.1b [does not apply to 12K]
  • 124898-04: v5.2.2 [does not apply to 12K]
  • 124898-06: v5.3.0 [does not apply to 12K]
  • 124898-07: v5.3.0b [does not apply to 12K]
  • 124898-09: v5.3.1 [does not apply to 12K]
  • 124898-10: v5.3.1a [does not apply to 12K]
  • 124898-11: v5.3.1b [does not apply to 12K]
  • 124898-13: v5.3.2a [does not apply to 12K]
  • 124898-14: v5.3.2b [does not apply to 12K]
  • 124898-15: v5.3.2c [does not apply to 12K]

Silkworm 4100

  • 115361-07: v4.4.0b
  • 115361-08: v4.4.0e
  • 119552-01: v5.0.1a
  • 119552-02: v5.0.3
  • 122185-01: v5.1.0a
  • 122185-02: v5.1.0d
  • 124898-01: v5.2.0a
  • 124898-03: v5.2.1b
  • 124898-04: v5.2.2
  • 124898-06: v5.3.0
  • 124898-07: v5.3.0b
  • 124898-08: 6.0.0 - Withdrawn: Use 137057
  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-01: v6.1.1a
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b
  • 142801-05: v6.3.2
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0
  • 144917-02: v6.4.0a
  • 144917-03: v6.4.0b
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h

Silkworm 200E/48000

  • 119552-01: v5.0.1a
  • 119552-02: v5.0.3
  • 122185-01: v5.1.0a
  • 122185-02: v5.1.0d
  • 124898-01: v5.2.0a
  • 124898-03: v5.2.1b
  • 124898-04: v5.2.2
  • 124898-06: v5.3.0
  • 124898-07: v5.3.0b
  • 124898-08: v6.0.0 - Withdrawn: Use 137057
  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a [48K ONLY. NOT FOR 200E] - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b [48K ONLY. NOT FOR 200E] - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a [48K ONLY. NOT FOR 200E]
  • 142801-04: v6.3.1b [48K ONLY. NOT FOR 200E] - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 [48K ONLY. NOT FOR 200E] - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a [48K ONLY. NOT FOR 200E]
  • 142801-07: v6.3.2d [48K ONLY. NOT FOR 200E]
  • 142801-08: v6.3.2e [48K ONLY. NOT FOR 200E]
  • 144917-01: v6.4.0 [48K ONLY. NOT FOR 200E] - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a [48K ONLY. NOT FOR 200E] - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b [48K ONLY. NOT FOR 200E] - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c [48K ONLY. NOT FOR 200E]
  • 144882-01: v6.4.1 [48K ONLY. NOT FOR 200E]
  • 144882-02: v6.4.1a [48K ONLY. NOT FOR 200E]
  • 144882-03: v6.4.1b [48K ONLY. NOT FOR 200E]
  • 144882-04: v6.4.2 [48K ONLY. NOT FOR 200E]
  • 144882-05: v6.4.2a[48K ONLY. NOT FOR 200E]
  • 144882-06: v6.4.2b[48K ONLY. NOT FOR 200E]
  • 144882-07: v6.4.3[48K ONLY. NOT FOR 200E]
  • 144882-08: v6.4.3b[48K ONLY. NOT FOR 200E]
  • 144882-09: v6.4.3c[48K ONLY. NOT FOR 200E]
  • 144882-10: v6.4.3e[48K ONLY. NOT FOR 200E]
  • 144882-11: v6.4.3f[48K ONLY. NOT FOR 200E]
  • 144882-12: v6.4.3f3 [48K ONLY. NOT FOR 200E] Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g [48K ONLY. NOT FOR 200E]
  • 144882-14: v6.4.3h [48K ONLY. NOT FOR 200E]

Silkworm 4900

  • 122185-01: v5.1.0a
  • 122185-02: v5.1.0d
  • 124898-01: v5.2.0a
  • 124898-03: v5.2.1b
  • 124898-04: v5.2.2
  • 124898-06: v5.3.0
  • 124898-07: v5.3.0b
  • 124898-08: v6.0.0 - Withdrawn: Use 137057
  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h

Silkworm 7500

  • 122185-02: v5.1.0d
  • 124898-01: v5.2.0a
  • 124898-03: v5.2.1b
  • 124898-04: v5.2.2
  • 124898-06: v5.3.0
  • 124898-07: v5.3.0b
  • 124898-08: v6.0.0 - Withdrawn: Use 137057
  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h

Silkworm 7500E

  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h

Silkworm 5000

  • 124898-03: v5.2.1b
  • 124899-01: v5.2.1_NI [ Note: Only needed for native interop to McData ]
  • 124898-04: v5.2.2
  • 124898-06: v5.3.0
  • 124898-07: v5.3.0b
  • 124898-08: v6.0.0 - Withdrawn: Use 137057
  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b
  • 142801-05: v6.3.2
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0
  • 144917-02: v6.4.0a
  • 144917-03: v6.4.0b
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h

DCX

  • 137057-01: v6.0.0
  • 137057-02: v6.0.0c
  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3 - Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h
  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e

FOS 7.x.x is last release version see release notes.

DCX-4S

  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - Susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - Susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - Susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - Susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - Susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h
  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e

FOS 7.x.x is last release version see release notes.

Brocade 300/5100/5300

  • 138148-01: v6.1.0
  • 138148-02: v6.1.0a
  • 138148-03: v6.1.0b
  • 138148-05: v6.1.0c
  • 138148-06: v6.1.0h
  • 140188-01: v6.1.1a
  • 140188-02: v6.1.1d
  • 148361-01: v6.1.2b
  • 140810-01: v6.2.0a
  • 140810-02: v6.2.0c
  • 140810-03: v6.2.0e
  • 140810-04: v6.2.0g
  • 140810-05: v6.2.1
  • 140810-06: v6.2.1b
  • 140810-07: v6.2.2
  • 140810-08: v6.2.2b
  • 140810-09: v6.2.2f
  • 140810-10: v6.2.2f9 - Contains the BASH fix (CVE-2014-6271)
  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - 5300 is susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - 5300 is susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - 5300 is susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - 5300 is susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - 5300 is susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h
  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e

FOS 7.x.x is last release version see release notes.

Brocade 7800/8000

  • 142801-01: v6.3.0a - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-02: v6.3.0b - Not Recommended. See Brocade TSBs 2010-075-A & 2010-076-A
  • 142801-03: v6.3.1a
  • 142801-04: v6.3.1b - 8000 is susceptible to Brocade TSB 2010-096-A
  • 142801-05: v6.3.2 - 8000 is susceptible to Brocade TSB 2010-096-A
  • 142801-06: v6.3.2a
  • 142801-07: v6.3.2d
  • 142801-08: v6.3.2e
  • 144917-01: v6.4.0 - 8000 is susceptible to Brocade TSB 2010-096-A
  • 144917-02: v6.4.0a - 8000 is susceptible to Brocade TSB 2010-096-A
  • 144917-03: v6.4.0b - 8000 is susceptible to Brocade TSB 2010-096-A
  • 144917-04: v6.4.0c
  • 144882-01: v6.4.1
  • 144882-02: v6.4.1a
  • 144882-03: v6.4.1b
  • 144882-04: v6.4.2
  • 144882-05: v6.4.2a
  • 144882-06: v6.4.2b
  • 144882-07: v6.4.3
  • 144882-08: v6.4.3b
  • 144882-09: v6.4.3c
  • 144882-10: v6.4.3e
  • 144882-11: v6.4.3f
  • 144882-12: v6.4.3f3  Contains the BASH fix (CVE-2014-6271)
  • 144882-13: v6.4.3g
  • 144882-14: v6.4.3h
  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)  
  • 151054-01: v7.2.0b - 7800 only. 8000 not supported with v7.2.0+ (From the Brocade Release Notes, the 8000 is not supported with FOS v7.2.0 and later, the README files of these patches has a typo)
  • 151054-02: v7.2.0d - 7800 only. 8000 not supported with v7.2.0+
  • 151130-01: v7.2.1 - 7800 only. 8000 not supported with v7.2.0+
  • 151130-02: v7.2.1a - 7800 only. 8000 not supported with v7.2.0+
  • 151130-03: v7.2.1b - 7800 only. 8000 not supported with v7.2.0+
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271) - 7800 only. 8000 not supported with v7.2.0+
  • 151130-05 : v7.2.1d - 7800 only. 8000 not supported with v7.2.0+
  • 151680-01: v7.3.0b - 7800 only. 8000 not supported with v7.2.0+
  • 151680-02: v7.3.1 - 7800 only. 8000 not supported with v7.2.0+
  • 151680-03: v7.3.1a - 7800 only. 8000 not supported with v7.2.0+
  • 151680-04: v7.3.1b - 7800 only. 8000 not supported with v7.2.0+
  • 151680-05: v7.3.1c - 7800 only. 8000 not supported with v7.2.0+
  • 152204-01: v7.4.0a - 7800 only. 8000 not supported with v7.2.0+
  • 152204-02: v7.4.1b - 7800 only. 8000 not supported with v7.2.0+
  • 152204-03: v7.4.1c - 7800 only. 8000 not supported with v7.2.0+
  • 152204-04: v7.4.1d - 7800 only. 8000 not supported with v7.2.0+
  • 152204-05: v7.4.1e - 7800 only. 8000 not supported with v7.2.0+

 FOS 7.x.x is last release version see release notes.

Brocade 6505/6520

  • 151130-05: v7.2.1d This is the RR release for 6505/6520
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e
  • 152603-01: v8.0.1b
  • 152655-01: v8.1.0
  • 152655-02: v8.1.0a

Brocade 6510

  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e
  • 152603-01: v8.0.1b
  • 152655-01: v8.1.0
  • 152655-02: v8.1.0a

DCX 8510

  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e
  • 152603-01: v8.0.1b
  • 152655-01: v8.1.0
  • 152655-02: v8.1.0a

DCX 8510-4s

  • 150018-01: v7.0.0d
  • 149139-01: v7.0.1a
  • 149139-02: v7.0.2c
  • 149139-03: v7.0.2e1 - Contains the BASH fix (CVE-2014-6271)
  • 150481-01: v7.1.0c1
  • 150481-02: v7.1.1a
  • 151499-01: v7.1.2a
  • 151499-02: v7.1.2b
  • 151499-03: v7.1.2b1 Contains the BASH fix (CVE-2014-6271)
  • 151054-01: v7.2.0b
  • 151054-02: v7.2.0d
  • 151130-01: v7.2.1
  • 151130-02: v7.2.1a
  • 151130-03: v7.2.1b
  • 151130-04: v7.2.1c1 - Contains the BASH fix (CVE-2014-6271)
  • 151130-05 : v7.2.1d
  • 151680-01: v7.3.0b
  • 151680-02: v7.3.1
  • 151680-03: v7.3.1a
  • 151680-04: v7.3.1b
  • 151680-05: v7.3.1c
  • 152204-01: v7.4.0a
  • 152204-02: v7.4.1b
  • 152204-03: v7.4.1c
  • 152204-04: v7.4.1d
  • 152204-05: v7.4.1e
  • 152603-01: v8.0.1b
  • 152655-01: v8.1.0
  • 152655-02: v8.1.0a

 

Brocade Data Center Fabric Manager (DCFM)

Note: DCFM is not supported with Brocade FOS 7.x.x or above. Brocade Network Advisor (BNA) would be needed for FOS 7.x and above.

See Also

<Document ID 2035163.1> Issues and errors with Brocade Data Center Fabric Manager (DCFM) 10.x install on a Solaris 11 x86 and Linux Platforms

  • 139860-01: Brocade DCFM Enterprise 10.0.02 for Solaris
  • 139860-02: Brocade DCFM Enterprise 10.1.0 for Solaris
  • 139860-03: Brocade DCFM Enterprise 10.1.1 for Solaris
  • 139860-04: Brocade DCFM Enterprise 10.1.4 for Solaris
  • 139860-05: Brocade DCFM Enterprise and Pro Plus 10.3.1 for Solaris
  • 139860-06: Brocade DCFM Enterprise and Pro Plus 10.3.2 for Solaris
  • 139860-07: Brocade DCFM Enterprise and Pro Plus 10.3.3 for Solaris
  • 139860-08: Brocade DCFM Enterprise and Pro Plus 10.4.2 for Solaris
  • 139860-09: Brocade DCFM Enterprise and Pro Plus 10.4.3 for Solaris
  • 139860-10: Brocade DCFM Enterprise and Pro Plus 10.4.4 for Solaris
  • 139860-11: Brocade DCFM Enterprise and Pro Plus 10.4.5 for Solaris
  • 139861-01: Brocade DCFM Enterprise 10.0.02 for Windows
  • 139861-02: Brocade DCFM Enterprise 10.1.0 for Windows
  • 139861-03: Brocade DCFM Enterprise 10.1.1 for Windows
  • 139861-04: Brocade DCFM Enterprise 10.1.4 for Windows
  • 139861-05: Brocade DCFM Enterprise and Pro Plus 10.3.1 for Windows
  • 139861-06: Brocade DCFM Enterprise and Pro Plus 10.3.2 for Windows
  • 139861-07: Brocade DCFM Enterprise and Pro Plus 10.3.3 for Windows
  • 139861-08: Brocade DCFM Enterprise and Pro Plus 10.4.2 for Windows
  • 139861-10: Brocade DCFM Enterprise and Pro Plus 10.4.3 for Windows
  • 139861-11: Brocade DCFM Enterprise and Pro Plus 10.4.4 for Windows
  • 139861-12: Brocade DCFM Enterprise and Pro Plus 10.4.5 for Windows
  • 139862-01: Brocade DCFM Enterprise 10.0.02 for Linux
  • 139862-02: Brocade DCFM Enterprise 10.1.0 for Linux
  • 139862-03: Brocade DCFM Enterprise 10.1.1 for Linux
  • 139862-04: Brocade DCFM Enterprise 10.1.4 for Linux
  • 139862-05: Brocade DCFM Enterprise and Pro Plus 10.3.1 for Linux
  • 139862-06: Brocade DCFM Enterprise and Pro Plus 10.3.2 for Linux
  • 139862-07: Brocade DCFM Enterprise and Pro Plus 10.3.3 for Linux
  • 139862-08: Brocade DCFM Enterprise and Pro Plus 10.4.2 for Linux
  • 139862-09: Brocade DCFM Enterprise and Pro Plus 10.4.3 for Linux
  • 139862-10: Brocade DCFM Enterprise and Pro Plus 10.4.4 for Linux
  • 139862-11: Brocade DCFM Enterprise and Pro Plus 10.4.5 for Linux
  • 139863-01: Brocade DCFM Professional 10.0.02 for Solaris
  • 139863-02: Brocade DCFM Professional 10.1.0 for Solaris
  • 139863-03: Brocade DCFM Professional 10.1.1 for Solaris
  • 139863-04: Brocade DCFM Professional 10.1.4 for Solaris
  • 139863-05: Brocade DCFM Professional 10.3.1 for Solaris
  • 139863-06: Brocade DCFM Professional 10.3.2 for Solaris
  • 139863-07: Brocade DCFM Professional 10.3.3 for Solaris
  • 139863-08: Brocade DCFM Professional 10.4.2 for Solaris
  • 139863-09: Brocade DCFM Professional 10.4.3 for Solaris
  • 139863-10: Brocade DCFM Professional 10.4.4 for Solaris
  • 139863-11: Brocade DCFM Professional 10.4.5 for Solaris
  • 139864-01: Brocade DCFM Professional 10.0.02 for Windows
  • 139864-02: Brocade DCFM Professional 10.1.0 for Windows
  • 139864-03: Brocade DCFM Professional 10.1.1 for Windows
  • 139864-04: Brocade DCFM Professional 10.1.4 for Windows
  • 139864-05: Brocade DCFM Professional 10.3.1 for Windows
  • 139864-06: Brocade DCFM Professional 10.3.2 for Windows
  • 139864-07: Brocade DCFM Professional 10.3.3 for Windows
  • 139864-08: Brocade DCFM Professional 10.4.2 for Windows
  • 139864-09: Brocade DCFM Professional 10.4.3 for Windows
  • 139864-10: Brocade DCFM Professional 10.4.4 for Windows
  • 139864-11: Brocade DCFM Professional 10.4.5 for Windows
  • 139865-01: Brocade DCFM Professional 10.0.02 for Linux
  • 139865-02: Brocade DCFM Professional 10.1.0 for Linux
  • 139865-03: Brocade DCFM Professional 10.1.1 for Linux
  • 139865-04: Brocade DCFM Professional 10.1.4 for Linux
  • 139865-05: Brocade DCFM Professional 10.3.1 for Linux
  • 139865-06: Brocade DCFM Professional 10.3.2 for Linux
  • 139865-07: Brocade DCFM Professional 10.3.3 for Linux
  • 139865-08: Brocade DCFM Professional 10.4.2 for Linux
  • 139865-09: Brocade DCFM Professional 10.4.3 for Linux
  • 139865-10: Brocade DCFM Professional 10.4.4 for Linux
  • 139865-11: Brocade DCFM Professional 10.4.5 for Linux

Brocade EFCM

  • See the McData EFCM section below.

Brocade Fabric Manager

  • 117583-01: Brocade Fabric Manager 4.1.1
  • 117583-02: Brocade Fabric Manager 4.4.0
  • 117583-03: Brocade Fabric Manager 5.3.0
  • 117583-04: Brocade Fabric Manager 5.4.0a
  • 117583-05: Brocade Fabric Manager 5.5.0

 

Brocade Network Advisor   (BNA)

Note: DCFM is not supported with Brocade FOS 7.x.x or above. Brocade Network Advisor (BNA) would be needed for FOS 7.x and above.

BNA is not installible on Solaris OS systems.

BNA 12.1.x and above will not support McData FC Switches.

 

  • 151093-01:  Brocade BNA 12.1.4 Software for Windows
  • 151094-01:  Brocade BNA 12.1.4 Software for Linux
  • 151581-01:  Brocade BNA 12.3.1 Software for Windows
  • 151581-02:  Brocade BNA 12.3.3 Software for Windows
  • 151581-03:  Brocade BNA 12.4.0 Software for Windows
  • 151581-04:  Brocade BNA 12.4.1 Software for Windows
  • 151581-05:  Brocade BNA 12.4.4 Software for Windows
  • 151581-06:  Brocade BNA 14.0.1 Software for Windows
  • 151581-07:  Brocade BNA 14.2.0 Software for Windows

 

 

2) CISCO SWITCHES

 

Cisco MDS 9506/9509/9513

 

  • 126484-01: SAN-OS v3.0(3) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-02: SAN-OS v3.1(2) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-03: SAN-OS v3.1(3a) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-04: SAN-OS v3.2(1a) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-05: SAN-OS v3.2(2c) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-06: SAN-OS v3.3(1a) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-07: SAN-OS v3.3(1c) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-08: SAN-OS v3.3(2) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-09: SAN-OS v3.3(3) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-10: SAN-OS v3.3(4a) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-11: SAN-OS v3.3(5) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126484-12: SAN-OS v3.3(5b) [ Not for 9513. 9506/9509 with Supervisor-1 cards only ]
  • 126485-01: SAN-OS v3.0(3) [ 95xx with Supervisor-2 cards only ]
  • 126485-02: SAN-OS v3.1(2) [ 95xx with Supervisor-2 cards only ]
  • 126485-03: SAN-OS v3.1(3a) [ 95xx with Supervisor-2 cards only ]
  • 126485-04: SAN-OS v3.2(1a) [ 95xx with Supervisor-2 cards only ]
  • 126485-05: SAN-OS v3.2(2c) [ 95xx with Supervisor-2 cards only ]
  • 126485-06: SAN-OS v3.3(1a) [ 95xx with Supervisor-2 cards only ]
  • 126485-07: SAN-OS v3.3(1c) [ 95xx with Supervisor-2 cards only ]
  • 126485-08: SAN-OS v3.3(2) [ 95xx with Supervisor-2 cards only ]
  • 126485-09: SAN-OS v3.3(3) [ 95xx with Supervisor-2 cards only ]
  • 126485-10: SAN-OS v3.3(4a) [ 95xx with Supervisor-2 cards only ]
  • 126485-11: SAN-OS v3.3(5b) [ 95xx with Supervisor-2 cards only ]
  • 140045-01: NX-OS v4.1(1b) [ 95xx with Supervisor-2 cards only ]
  • 140045-02: NX-OS v4.1(1c) [ 95xx with Supervisor-2 cards only ]
  • 140045-03: NX-OS v4.1(3a) [ 95xx with Supervisor-2 cards only ]
  • 140045-04: NX-OS v4.2(1b) [ 95xx with Supervisor-2 cards only ]
  • 140045-05: NX-OS v4.2(3) [ 95xx with Supervisor-2 cards only ]
  • 140045-06: NX-OS v4.2(7b) [ 95xx with Supervisor-2 cards only ]
  • 144694-01: NX-OS v5.0(1a) [ 95xx with Supervisor-2 cards only ]
  • 144694-02: NX-OS v5.0(4) [ 95xx with Supervisor-2 cards only ]
  • 144694-03: NX-OS v5.0(7) [ 95xx with Supervisor-2 cards only ]
  • 148607-01: NX-OS v5.2(1) [ 95xx with Supervisor-2 cards only ]
  • 148607-02: NX-OS v5.2(8) [ 95xx with Supervisor-2 cards only ]
  • 150994-01: NX-OS v6.2(3) [ 95xx with Supervisor-2 cards only ]
  • 150994-02: NX-OS v6.2(7) [ 95xx with Supervisor-2 cards only ]
  • 150994-03: NX-OS v6.2(9a) [ 95xx with Supervisor-2 cards only ]

Cisco MDS 9216

  • 126486-01: SAN-OS v3.0(3)
  • 126486-02: SAN-OS v3.1(2)
  • 126486-03: SAN-OS v3.1(3a)
  • 126486-04: SAN-OS v3.2(1a)
  • 126486-05: SAN-OS v3.2(2c)
  • 126486-06: SAN-OS v3.3(1a)
  • 126486-07: SAN-OS v3.3(1c)
  • 126486-08: SAN-OS v3.3(2)
  • 126486-09: SAN-OS v3.3(3)
  • 126486-10: SAN-OS v3.3(4a)
  • 126486-11: SAN-OS v3.3(5b)
  • 140042-01: NX-OS v4.1(1b)
  • 140042-02: NX-OS v4.1(1c)
  • 140042-03: NX-OS v4.1(3a)
  • 140042-05: NX-OS v4.2(1b)
  • 140042-06: NX-OS v4.2(3)
  • 140042-07: NX-OS v4.2(7b)

Cisco MDS 9222i

  • 126489-01: SAN-OS v3.2(1a)
  • 126489-02: SAN-OS v3.2(2c)
  • 126489-03: SAN-OS v3.3(1a)
  • 126489-04: SAN-OS v3.3(1c)
  • 126489-05: SAN-OS v3.3(2)
  • 126489-06: SAN-OS v3.3(3)
  • 126489-08: SAN-OS v3.3(5b)
  • 140044-01: NX-OS v4.1(1b)
  • 140044-02: NX-OS v4.1(1c)
  • 140044-03: NX-OS v4.1(3a)
  • 140044-04 -OS v4.2(1b)
  • 140044-05: NX-OS v4.2(3)
  • 140044-06: NX-OS v4.2(7b)
  • 144695-01: NX-OS v5.0(1a)
  • 144695-02: NX-OS v5.0(4)
  • 144695-03: NX-OS v5.0(7)
  • 148606-01: NX-OS v5.2(1)
  • 148606-02: NX-OS v5.2(8)
  • 150996-01: NX-OS v6.2(3)
  • 150996-02: NX-OS v6.2(7)
  • 150994-03: NX-OS v6.2(9a)

Cisco MDS 9120/9140

  • 126487-01: SAN-OS v3.0(3)
  • 126487-02: SAN-OS v3.1(2)
  • 126487-03: SAN-OS v3.1(3a)
  • 126487-04: SAN-OS v3.2(1a)
  • 126487-05: SAN-OS v3.2(2c)
  • 126487-06: SAN-OS v3.3(1a)
  • 126487-07: SAN-OS v3.3(1c)
  • 126487-08: SAN-OS v3.3(2)
  • 126487-09: SAN-OS v3.3(3)
  • 126487-10: SAN-OS v3.3(4a)

Cisco MDS 9124/9134

  • 126488-02: SAN-OS v3.1(3a) [ 9124 ONLY ]
  • 126488-04: SAN-OS v3.2(1a)
  • 126488-05: SAN-OS v3.2(2c)
  • 126488-06: SAN-OS v3.3(1a)
  • 126488-07: SAN-OS v3.3(1c)
  • 126488-08: SAN-OS v3.3(2)
  • 126488-09: SAN-OS v3.3(3)
  • 126488-10: SAN-OS v3.3(4a)
  • 126488-11: SAN-OS v3.3(5b)
  • 140043-01: NX-OS v4.1(1b)
  • 140043-02: NX-OS v4.1(1c)
  • 140043-03: NX-OS v4.1(3a)
  • 140043-05: NX-OS v4.2(1b)
  • 140043-06: NX-OS v4.2(3)
  • 140043-07: NX-OS v4.2(7a)
  • 144693-01: NX-OS v5.0(1a)
  • 144693-02: NX-OS v5.0(4)
  • 144693-03: NX-OS v5.0(7)
  • 144693-04: NX-OS v5.2(8)
  • 144693-05: NX-OS v5.2(8e)

Cisco SSM Module

  • 126491-01: SAN-OS SSI image v3.0(3) for SSM module
  • 126491-02: SAN-OS SSI image v3.1(2) for SSM module
  • 126491-03: SAN-OS SSI image v3.2(2b) for SSM module
  • 126491-04: SAN-OS SSI image v3.3(1a) for SSM module
  • 126491-06: SAN-OS SSI image v3.3(2) for SSM module
  • 126491-07: SAN-OS SSI image v3.3(3) for SSM module
  • 140046-01: NX-OS SSI image v4.1(1b) for SSM module
  • 140046-02: NX-OS SSI image v4.2(1b) for SSM module
  • 140046-03: NX-OS SSI image v4.2(3) for SSM module

Cisco Data Center Network Manager (DCNM)

  • 150995-01: Data Center Network Manager v6.2(3) for Windows
  • 151021-01: Data Center Network Manager v6.2(3) for Linux

Cisco Fabric Manager

    • 126490-01: Cisco Fabric Manager v3.0(3)*
    • 126490-02: Cisco Fabric Manager v3.1(2)*
    • 126490-03: Cisco Fabric Manager v3.1(3a)*
    • 126490-04: Cisco Fabric Manager v3.2(1a)
    • 126490-05: Cisco Fabric Manager v3.2(2c)
    • 126490-06: Cisco Fabric Manager v3.3(1a)
    • 126490-07: Cisco Fabric Manager v3.3(1c)
    • 126490-08: Cisco Fabric Manager v3.3(2)
    • 126490-09: Cisco Fabric Manager v3.3(3)
    • 140047-01: Cisco Fabric Manager v4.1(1b)
    • 140047-02: Cisco Fabric Manager v4.1(1c)
    • 140047-03: Cisco Fabric Manager v4.1(3a)
    • 140047-05: Cisco Fabric Manager v4.2(1b)
    • 140047-06: Cisco Fabric Manager v4.2(3)
    • 144696-01: Cisco Fabric Manager v5.0(4)
      * FM is already embedded within the corresponding SAN-OS firmware image. It can be retrieved
      by pointing your browser at a switch that is running that firmware. FM versions 3.2.x and
      higher require the separate FM patch to be downloaded.

 

 

3) McDATA SWITCHES

 

McData 6064/6140/4500

  • 116001-01: E/OS 5.01.00
  • 116001-02: E/OS 5.02.00

McData 6064/6140/4500/4300

  • 116003-01: E/OS 6.01.00
  • 116003-02: E/OS 6.02.00
  • 119550-01: E/OS 7.01.00

McData 6064/6140/4300/4500/4400/4700

  • 119554-01: E/OS(c) 8.02.00
  • 122187-01: E/OS(c) 9.00.00
  • 122187-02: E/OS(c) 9.01.00
  • 122187-03: E/OS(c) 9.02.01
  • 122187-04: E/OS(c) 9.06.00
  • 122187-05: E/OS(c) 9.06.01
  • 122187-06: E/OS(c) 9.06.02
  • 122187-07: E/OS(c) 9.07.00
  • 122187-08: E/OS(c) 9.07.01
  • 122187-09: E/OS(c) 9.07.02
  • 122187-10: E/OS(c) 9.08.01
  • 122187-11: E/OS(c) 9.09.02
  • 122187-12: E/OS(c) 9.09.03
  • 122187-13: E/OS(c) 9.09.06

McData 10000 (i10K)

  • 122186-01: EOS/n 6.05.00
  • 122186-02: EOS/n 9.01.00
  • 122186-03: EOS/n 9.02.00
  • 122186-04: EOS/n 9.06.00
  • 122186-05: EOS/n 9.06.01
  • 122186-06: EOS/n 9.06.02
  • 122186-07: EOS/n 9.07.00
  • 122186-08: EOS/n 9.07.01
  • 122186-09: EOS/n 9.07.02
  • 122186-10: EOS/n 9.08.01
  • 122186-11: EOS/n 9.09.01
  • 122186-12: EOS/n 9.09.02
  • 122186-13: EOS/n 9.09.03
  • 122186-14: EOS/n 9.09.06
  • 122186-15: EOS/n 9.09.08

McData 4300v2

  • 116002-01: McDATA 4300v2 downgrade from E/OS 6.02.00 to 5.05.01

McData 4500v2

  • 116004-01: McDATA 4500v2 downgrade from E/OS 6.02.00 to 5.03.01

McData 1620 Router

  • 119551-01: E/OSi 4.5
  • 119551-02: E/OSi 4.7
  • 119551-03: E/OSi 5.0
  • 119551-04: E/OSi 5.1

McData EFCM Software

  • 124901-01: EFCM 9.1 for Solaris
  • 124901-02: EFCM 9.5 for Solaris
  • 124901-03: EFCM 9.6 for Solaris
  • 124901-04: EFCM 9.6.1 for Solaris
  • 124901-05: EFCM 9.7 for Solaris
  • 124901-06: EFCM 9.7.1 for Solaris
  • 124901-07: EFCM 9.7.3 for Solaris
  • 124901-08: EFCM 9.7.4 for Solaris
  • 124902-01: EFCM 9.1 for Windows
  • 124902-02: EFCM 9.5 for Windows
  • 124902-03: EFCM 9.6 for Windows
  • 124902-04: EFCM 9.7 for Windows
  • 124902-05: EFCM 9.7.1 for Windows
  • 124902-06: EFCM 9.7.3 for Windows
  • 124902-07: EFCM 9.7.4 for Windows
  • 124903-01: EFCM 9.1 for Linux
  • 124904-01: EFCM 9.1 for RDC
  • 126492-01: EFCM 9.1 for AIX
  • 126493-01: EFCM 9.1 for HPUX

 

 

4) QLOGIC SWITCHES

Note. Sun/QLogic Switch FW/GUI Compatibility Matrix - Match up FW versions to the GUI that is compatible  

Sanbox1 (8-port and 16-port)

  • 110696-04: 30462 (includes patch for SUNWsmgr)
  • 112429-01: 40230 (includes patch for SUNWsmgr2 version 1.03.40)
  • 112429-08: 40233 (includes patch for SUNWsmgr2 version 1.03.46)
  • 112433-03: 40242 (includes patch for SUNWsmgr2 version 1.05.14)

Sanbox2 (8-port, 16-port, and 64-port)

  • 112429-01: 1.3.43.00 (includes patch for SUNWsmgr2 version 1.03.40)
  • 112429-08: 1.3.60.00 (includes patch for SUNWsmgr2 version 1.03.46)
  • 112434-04: 2.0.0.5 (includes patch for SUNWsmgr2)
  • 118809-01: 4.0.2.04
  • 118809-02: 4.0.2.05
  • 119553-01: 5.0.0.31
  • 119553-03: 5.0.1.10

Qlogic SANbox 5200

  • 118809-01: 4.0.2.04
  • 118809-02: 4.0.2.05
  • 119553-01: 5.0.0.31
  • 119553-03: 5.0.1.10
  • 128175-01: 6.7.0.07
  • 128175-02: 6.8.0.03
  • 128175-03: 7.4.0.13
  • 128175-04: 7.4.0.22

Qlogic SANbox 5600/5602

  • 119553-01: 5.0.0.31
  • 119553-03: 5.0.1.10
  • 128175-01: 6.7.0.07
  • 128175-02: 6.8.0.03
  • 128175-03: 7.4.0.13
  • 128175-04: 7.4.0.22

Sun Switch 5802

  • 138907-01: 7.4.0.11

Qlogic SANbox 9000

  • 124900-01: 6.2.1.01
  • 124900-02: 6.6.0.15
  • 124900-03: 6.8.0.03
  • 124900-04: 7.8.0.08

 

 

 

Switch firmware patch matrix site.
This doc should contains the same information as internal site:

http://tsc-storage.us.oracle.com/products/Switch/switch_fw_matrix.html

References

<NOTE:1014778.1> - Brocade 3250/3850/3900/12000/24000 - How to Upgrade Firmware on Switch
<NOTE:1917430.1> - Accessing Brocade Fibre Channel (FC) Switch Documentation

Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback