Hello,

We are currently upgrading the code version on our Avaya 5520's and  
5510's from 6.1.1 to 6.2.4.  After the upgrade, the  
secureMacAddrViolation traps are being detected by packetfence as  
being sent from unit 1 of a stack at all times.  This is demonstrated  
below, the machine was plugged into unit 1 port 43 of the stack, then  
plugged into unit 2 port 43.

Has anyone experienced similar issues when upgrading Avaya 5500 series  
switches?  Any ideas out there of how we might be able to fix this?

Please note that we are running an old version of packetfence, 1.8.7.

2012-05-08|13:51:18|UDP: [172.16.8.5]:1031|172.16.8.5|BEGIN TYPE 6 END  
TYPE BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS  
.1.3.6.1.4.1.45.1.6.5.3.12.1.1.1.43 = INTEGER:  
1|.1.3.6.1.4.1.45.1.6.5.3.12.1.2.1.43 = INTEGER:  
43|.1.3.6.1.4.1.45.1.6.5.3.12.1.3.1.43 = Hex-STRING: D4 BE D9 22 0F 08  
  END VARIABLEBINDINGS

2012-05-08|13:52:08|UDP: [172.16.8.5]:1031|172.16.8.5|BEGIN TYPE 6 END  
TYPE BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS  
.1.3.6.1.4.1.45.1.6.5.3.12.1.1.1.43 = INTEGER:  
1|.1.3.6.1.4.1.45.1.6.5.3.12.1.2.1.43 = INTEGER:  
43|.1.3.6.1.4.1.45.1.6.5.3.12.1.3.1.43 = Hex-STRING: D4 BE D9 22 0F 08  
  END VARIABLEBINDINGS


Thank you in advance and let me know if any other information is required.

Pierre


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to