Home

Avaya v.3.0.6 Release Notes

image

Contents

1. terminal To workaround this issue set the telnet time out value to less than 10 minutes The CR fix for 000585849 only applies to a pure stack of BPS2000 s and an allied stack BPS2000 and BS470 In a mixed BPS2000 and BS450 the issue is still reproducible 000691669 While staging unit replacement can t change Target Unit with 2 opened telent sessions Q00696227 While staging unit replacement Clear Target on renumber screen works only on the base unit Q00692114 IP address on the ping field only displays on unit 1 of allied stack c 2003 Nortel Networks Incorporated All rights reserved
2. Nortel Networks Part No 215788 B Policy Switch BPS BS460 BS470 Updated 12 04 2003 Version 3 0 6 Readme Version 1 3 RELEASE SUMMARY The Policy Switch v3 0 6 software is a patch release PLATFORMS SUPPORTED BPS2000 BS460 24TPWR BS470 24T BS470 48T NOTES FOR UPGRADE S Release Notes for the BayStack Operating System Switching Software BoSS 3 0 for BayStack 460 470 and BPS 2000 document No 215148 A dated May 2003 VERSION OF PREVIOUS RELEASE Version 3 0 3 COMPATIBILITY Same as Release v3 0 Managed by Java Device Manager v5 6 1 CUSTOMER CRs RESOLVED IN THIS RELEASE a Q00755313 Tagged packets counted twice at the ingress of BPS 2000 GE MDA Q00733678 IGMP report loop on MLT port with proxy disable Q00585849 BPS2000 4TX MDA port 25 speed duplex change after soft reset Q00748796 Console timeout sessions from any port configuration menus blocks access to those menus from telnet Q00607019 IGMP proxy may spoof IP adresses with pseudo queriers Q00764260 Connectivity issues for AppleTalk traffic on 470 and BPS Q00691410 No trap is sent after a BPS2000 unit which goes down and then comes back up NEW FEATURES IN THIS RELEASE RADIUS Access Challenge This feature requires no configuration on the switch and is automat
3. ically activated based upon the response from the RADIUS server The authentication process is as follows 1 User telnets to BPS2000 BS460 24TPWR BS470 24T BS470 48T 2 Switch queries user for RADIUS authentication info username and password 3 Info sent to RADIUS server access request RADIUS Password Fallback RADIUS server server E hallenge reply when so configured information c Switch receives E N respons sends request to a secure authentication with s te information and he server in turn sends back access c and displays a challenge scree he challenge reply information and ge he user s original username and th halleng ta n to the user with n the user hen sent to the ts a response f w respons ro E n ar step 4 on RADIUS server in a new access request access request then goes through t and may get more challenges 900604265 he same validatio or access accep n process as in t reject It is now possible to access the switch using a fallback password if the RADIUS servers are down or unavailable KNOWN ISSUES If you ar page and t will not be able to access remotely telneting to a swi he network connection is los the Port Co tch and accessing the Port Configuration t before the telnet session times out you nfiguration page locally through a console

Download Pdf Manuals

image

Related Search

Related Contents

Initiale F N°3 - Fondation Officielle de la Jeunesse  xTAG Bloodstream Pathogen Panel (BPP)  CTO Flight Planning - User Manual  Tucano Magnum  Manual de Instalação e Manutenção de Pressostato e    取扱説明書  "取扱説明書"    

Copyright © All rights reserved.
Failed to retrieve file