Hello, We are currently upgrading the code version on our Avaya 5520's and 5510's from 6.1.1 to 6.2.4. After the upgrade, the secureMacAddrViolation traps are being detected by packetfence as being sent from unit 1 of a stack at all times. This is demonstrated below, the machine was plugged into unit 1 port 43 of the stack, then plugged into unit 2 port 43.
Has anyone experienced similar issues when upgrading Avaya 5500 series switches? Any ideas out there of how we might be able to fix this? Please note that we are running an old version of packetfence, 1.8.7. 2012-05-08|13:51:18|UDP: [172.16.8.5]:1031|172.16.8.5|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.4.1.45.1.6.5.3.12.1.1.1.43 = INTEGER: 1|.1.3.6.1.4.1.45.1.6.5.3.12.1.2.1.43 = INTEGER: 43|.1.3.6.1.4.1.45.1.6.5.3.12.1.3.1.43 = Hex-STRING: D4 BE D9 22 0F 08 END VARIABLEBINDINGS 2012-05-08|13:52:08|UDP: [172.16.8.5]:1031|172.16.8.5|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.4.1.45.1.6.5.3.12.1.1.1.43 = INTEGER: 1|.1.3.6.1.4.1.45.1.6.5.3.12.1.2.1.43 = INTEGER: 43|.1.3.6.1.4.1.45.1.6.5.3.12.1.3.1.43 = Hex-STRING: D4 BE D9 22 0F 08 END VARIABLEBINDINGS Thank you in advance and let me know if any other information is required. Pierre ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
