Hi Pierre,

> We are currently upgrading the code version on our Avaya 5520's and
> 5510's from 6.1.1 to 6.2.4.  After the upgrade, the
> secureMacAddrViolation traps are being detected by packetfence as
> being sent from unit 1 of a stack at all times.  This is demonstrated
> below, the machine was plugged into unit 1 port 43 of the stack, then
> plugged into unit 2 port 43.
>
> Has anyone experienced similar issues when upgrading Avaya 5500 series
> switches?  Any ideas out there of how we might be able to fix this?
If the switch sends the trap with the wrong ifIndex, we cannot do much 
on our side.  Did you contact Avaya about this?  Any new updates of the 
code that would address that?

I will open a ticket in our BTS, and add this info to the POD of the 
modules.

Thanks!

-- 
Francois Gaudreault, ing. jr
[email protected]  ::  +1.514.447.4918 (x130) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to