Hi Pierre,
> We are currently upgrading the code version on our Avaya 5520's and > 5510's from 6.1.1 to 6.2.4. After the upgrade, the > secureMacAddrViolation traps are being detected by packetfence as > being sent from unit 1 of a stack at all times. This is demonstrated > below, the machine was plugged into unit 1 port 43 of the stack, then > plugged into unit 2 port 43. > > Has anyone experienced similar issues when upgrading Avaya 5500 series > switches? Any ideas out there of how we might be able to fix this? If the switch sends the trap with the wrong ifIndex, we cannot do much on our side. Did you contact Avaya about this? Any new updates of the code that would address that? I will open a ticket in our BTS, and add this info to the POD of the modules. Thanks! -- Francois Gaudreault, ing. jr [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
