Product Support Notice

Similar documents
Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

AE Services 6.1 Super Patch 2 Release Notes

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Product Support Notice

Windows Security Updates for August (MS MS06-051)

Product Support Notice

Product Support Notice

Product Support Notice

Product Correction Notice (PCN) Issue Date: February 1, 2008 Archive Date: NA PCN Number: 1632P

Service Pack Release Notes

Avaya Aura 6.2 Feature Pack 3

Converged Network Analyzer Command Reference Guide Addendum

Product Support Notice

Product Support Notice

StoneGate SSL VPN Release Notes for Version 1.2.0

Polycom RealPresence Resource Manager System

StoneGate SSL VPN Release Notes for Version 1.2.1

StoneGate SSL VPN Release Notes for Version 1.3.1

Product Correction Notice (PCN) Issue Date: August 9, 2010 Archive Date: Not Applicable Supplement 3 Date: March 22, 2011 PCN Number: 1738P

Product Correction Notice (PCN) Issue Date: December 19, 2008 Archive Date: NA Supplement 6 Date: June 7, 2010 PCN Number: 1655P

Avaya Aura 6.2 Feature Pack 2

AVAYA Avaya Aura System Platform R6.2.2 Release Notes Issue 1.3

Product Correction Notice (PCN) Issue Date: June 1, 2009 Archive Date: NA Supplement 5 date: February 1, 2010 PCN Number: 1685P

NCD ThinPATH PC Installation Guide and Release Notes

Product Support Notice

StoneGate SSL VPN Release Notes for Version 1.3.2

IBM/Lenovo BCS RSSM firmware Update

Stonesoft User Agent. Release Notes for Version 1.1.3

Installing and Upgrading Avaya Aura System Manager

Synchronizer Installation Notes and Examples

Stonesoft IPsec VPN Client. Release Notes for Version 5.4.1

Cisco UCS Performance Manager Release Notes

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Installing Enterprise Switch Manager

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

NetXplorer. Installation Guide. Centralized NetEnforcer Management Software P/N D R3

Enterprise Chat and Upgrade Guide, Release 11.6(1)

Version 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260

R5.2.2 Server and Client Release Notes Issue 2.1 October 2010

Polycom RealPresence Platform Director

One Identity Active Roles 7.2

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

One Identity Management Console for Unix 2.5.1

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Release Notes for Cisco Virtualization Experience Client 2111/2211 PCoIP Firmware Release 4.0.2

Tanium Network Quarantine User Guide

Cisco Meeting Management

Installing Enterprise Switch Manager

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWALL CDP 2.1 Agent Tool User's Guide

UPGRADE GUIDE. Log & Event Manager. Version 6.4

SonicWall Analyzer 8.4

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide

Avaya Aura Messaging Service Pack 8 Release Notes

SonicWall Secure Mobile Access

SonicWall Security 9.0.6

December 2011 vsp-patch noarch.rpm Avaya Aura System Platform R6.0 June 2010 vsp iso

SonicWall SMA 8200v. Getting Started Guide

Deploying Avaya Aura Communication Manager in Virtual Appliance

System Manager Unit (SMU) Hardware Reference

Symantec Security Information Manager FIPS Operational Mode Guide

Metalogix ControlPoint 7.6. for Office 365 Installation Guide

July SonicWall SonicOS 6.2 Upgrade Guide

Release Notes. BlackBerry Enterprise Identity

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0 Maintenance Release: 1. Release Notes

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

Quest Collaboration Services 3.6. Installation Guide

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.7

Avaya Port Matrix: Avaya Aura Performance Center 7.1

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

BrightStor ARCserve Backup for Linux

Transcription:

PSN # PSN004730u Product Support Notice Original publication date: 19-May-16. This is Issue #01, published date: 20-May-16. Severity/ risk level Name of problem Avaya Aura Application Enablement (AE) Services 7.0.1 Super Patch 2 Release Notes Products affected Avaya Aura Application Enablement (AE) Services Release 7.0.1 (all offer types) Problem description Medium Urgency 2016 Avaya Inc. All Rights Reserved. When convenient What is fixed in this Patch? This patch contains the following updates to the DMCC Service: Issue AES-14860: The RouteSelect request would always fail with a CSTAError for DMCC applications when the UserProvidedCode was specified in the request. This patch solves this issue. This patch contains the following updates to the ASAI Service: Issue AES-15034: This patch fixes an ASAI library crash while processing an ASAI transferred event. This patch contains the following updates to the AE Services Management Console: Issue AES-15081: On the AE Services Management Console screen, Security > Certificate Management > CA Trusted Certificates, the Avaya installed CA certificates can be deleted after applying this patch. This patch contains the following updates to the AE Services Server: Issue AES-14855: If a customer chooses to restore the data of an AE Services 7.0 server on an AE Services 7.0.1 server, then the information associated with the TLS protocol version being used is not preserved during the data restore process. This patch solves this issue and ensures that the same TLS protocols are used as before the restoration. In addition, if a customer enables OOBM, the ciphers for the tomcat connector associated with the 127.0.0.1 interface are not configured correctly based on the configured TLS protocol. This patch solves this issue as well and ensures that the appropriate ciphers are used for the 127.0.0.1 interface after enabling OOBM. Issue AES-15037, AES-15085, AES-15087, AES-15099: Several log files were not rotating properly which could cause the disk to fill up. This patch fixes this issue. Issue AES-15025: The logging of error messages was updated to log to mvap.log and trace.out, in addition, to some rsyslog config changes in this patch. Issue AES-14991: The supported TLS 1.2 ciphers were updated to include a cipher supported by the Chrome and Mozilla browser when only TLS 1.2 is enabled. Otherwise, the Chrome and Mozilla browser will not be able to access the AE Services Management Console.

Resolution Install Super Patch 2 for AE Services 7.0.1 Workaround or alternative remediation Remarks 1. What AE Services rpm/s is updated by AE Services 7.0.1 Super Patch 2? aesvcs-install-scripts-hooks-7.0.1.0.2.269-0.noarch.rpm aesvcs-linux-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-tomcat-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-callcontrol-7.0.1-124.i386.rpm aesvcs-platform-7.0.1.0.2.269-0.noarch.rpm aesvcs-alarmservice-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-mvap-snmp-7.0.1-124.i386.rpm aesvcs-hmdc-7.0.1.0.2.269-0.noarch.rpm aesvcs-watchdog-config-7.0.1.0.2.269-0.noarch.rpm 2. Are there new features or enhancements included in AE Services 7.0.1 Super Patch 2? No. 3. What must application suppliers do to be compatible with AE Services 7.0.1 Super Patch 2? (recompile, re-link, etc.) This patch is fully compatible with AE Services 7.0 Clients and SDKs. 4. Is applying AE Services 7.0.1 Super Patch 2 service affecting? The AE Services server will be out of service for 20 to 30 minutes while the patch is being applied. 5. With which Application Enablement Services release(s) is AE Services 7.0.1 Super Patch 2 compatible? This patch is compatible with all AE Services 7.0.1 offer types. 6. Is the AE Services 7.0.1 Super Patch 2 cumulative? Yes, this patch includes the fixes provided by the previous AE Services 7.0.1 patches. 7. Is the AE Services 7.0.1 Super Patch 2 compatible with Application Enablement Services 7.0 and earlier servers? No. The AE Services 7.0.1 Super Patch is only supported with AE Services 7.0.1. 8. Is the AE Services 7.0.1 Super Patch 2 available for all Offer Types? Yes. Please use the appropriate procedure for the upgrade, i.e. directly on the AE Services server for VMware or Software Only. 9. What are the CM requirements for the Application Enablement Services 7.0.1 Super Patch 2? AE Services 7.0.1 supports CM 7.x and later. Note: Certain functionality on AE Services 7.0.1 requires CM versions later than CM 7.x 2016 Avaya Inc. All Rights Reserved. Page 2

Patch Notes The information in this section concerns the patch, if any, recommended in the Resolution above. Backup before applying the patch Please take a backup of the AE Services server data before applying the AE Services 7.0.1 Super Patch 2. Follow these steps to back up the AE Services server data: 1. Login to the AE Services Management Console using a browser. 2. From the main menu, select Maintenance Server Data Backup. AE Services backs up the database, and displays the Database Backup screen, that displays the following message: The backup file can be downloaded from Here. 3. Click the "Here" link. A file download dialog box is displayed, that allows you to either open or save the backup file (named as: servername_rsoftwareversion_mvapdbddmmyyyy.tar.gz, where ddmmyyyy is a date stamp). 4. Click Save, and download the backup file to a safe location that the upgrade will not affect. For example, save the file to your local computer or another computer used for storing backups. Download To download the AE Services patch, go to: A. Avaya Support (http://support.avaya.com/downloads). On the Downloads screen, in the textbox labeled Enter Product Name, enter Avaya Aura Application Enablement Services and the release option 7.0.x. If the option Select a content type is displayed select the Download radio button and click the button labeled Enter. If the Documents table is displayed, select the link, View downloads, on the right-hand side of the screen above the Documents table. In the Downloads table locate and select the entry, Avaya Aura Application Enablement Services 7.0.1 Super Patch 2 (new entries are inserted at the top of the list). B. PLDS (https://plds.avaya.com). Select View Downloads. Use the search engine to locate the available downloads for Application Enablement Services using version 7.0 to narrow the search. Locate the entry, Avaya Aura Application Enablement Services 7.0.1 Super Patch 2 (new entries are inserted at the end of the list). Alternatively, you can search for the Download ID, which is AES00000536. Note: All AE Services Software Downloads are now in PLDS, while the Release Notes documents are provided on the Support Site. There will be cross references between the corresponding download entries for patches. File Name File Size MD5 Sum 7-0-1-0-SuperPatch_2.zip 116.73 MB (122397445 Bytes) e35d1d78430c0389483e63d8cc6c5c09 Before you start with the installation of the SuperPatch, check the md5 checksum of the file. Run the following from the command line: md5sum 7-0-1-0-SuperPatch_2.zip Note: If the MD5 checksum does not match what is stated above, do not proceed with the installation of the patch. Download the patch again and check the MD5 checksum again. Patch install instructions How to check the detailed AE Services version Service-interrupting? Yes For the VMware and Software Only offer, use the AE Services Linux console (and hence see whether the patch has been applied already): 1. Start a Linux console session on the AE Services server (locally, via service port, or remotely using e.g. putty or SSH) 2. As the root user, execute the following command: swversion 2016 Avaya Inc. All Rights Reserved. Page 3

3. If the patch is not listed, continue to the next section, How to install the Patch to the AE Services server. How to install the Patch to the AE Services server. Patch Installation Instructions for the VMware or Software Only offer: 1. Start a Linux console session on the AE Services server (locally, via service port, or remotely using e.g. putty or SSH) 2. Secure copy 7-0-1-0-SuperPatch_2.zip to the /tmp directory on the AE Services server. 3. As the root user, execute the following from the command line: cd /tmp update -u --force 7-0-1-0-SuperPatch_2.zip 4. Follow the on-screen instructions. After applying the Patch, reboot the AE Services server. For the VMware or Software Only offer SSH into the AE Services server and, as the root user, execute the following command from the command line: shutdown r now Post Patch Installation Verification: 1. Start a Linux console session on the AE Services server (locally, via service port, or remotely, using e.g. putty) 2. Login as sroot or root 3. Run the following command to verify the installation of SuperPatch 2: swversion The swversion command should return something similar to the following if SuperPatch 2 is installed: ************* Patch Numbers Installed in this system are ************* 7.0.1.0.2 In case you used swversion -a, the RPMs will be listed as well below the patch number this is the 7.0.1 output: ************* Patch Numbers Installed in this system are ************* 7.0.1.0.2 aesvcs-install-scripts-hooks-7.0.1.0.2.269-0.noarch.rpm aesvcs-linux-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-tomcat-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-callcontrol-7.0.1-124.i386.rpm aesvcs-platform-7.0.1.0.2.269-0.noarch.rpm aesvcs-alarmservice-config-7.0.1.0.2.269-0.noarch.rpm aesvcs-mvap-snmp-7.0.1-124.i386.rpm aesvcs-hmdc-7.0.1.0.2.269-0.noarch.rpm aesvcs-watchdog-config-7.0.1.0.2.269-0.noarch.rpmm 4. Login to the AE Services Management Console using a browser. 5. From the main menu, click Status. 6. On the Status page, verify that all previously licensed services are running. 7. Validate the server configuration data, as follows: 2016 Avaya Inc. All Rights Reserved. Page 4

From the main menu, click Networking. Under AE Service IP (Local IP), verify that the settings are correct. Under Network Configure, verify that the settings are correct. Under Ports, verify that the settings are correct. 8. Check all of the remaining Management Console pages listed under AE Services and Communication Manager Interface. Verify that the information is complete and correct. This completes the installation of the SuperPatch. Follow this procedure only if the AE Services server configuration data has changed. Follow this procedure to restore the AE Services server data: 1. From the main menu of the AE Services Management Console, select Maintenance Server Data Restore. The Management Console displays the Restore Database Configuration screen. The initial state of the Restore Database page provides you with two basic functions: Text box with the Browse button, which provides the means to select a backup file to use for the Restore process. Alternatively, you can type a fully qualified name of the backup file in the text box. Restore button, that starts the Restore process 2. Click Browse and locate the AE Services database backup file that you intend to use (For example: servername_r7-0-0-0-0-288-0_mvapdb01012015.tar.gz). 3. Click Restore. The Management Console redisplays the Restore Database Configuration page, with the following message. "A database restore is pending. You must restart the Database Service and the AE Server for the restore to take effect. To restart these services now, click the Restart Services button below." 4. Click Restart Services. AE Services restarts the Database Service and the AE Services, thereby completing the Restore process. Verification See the Post Patch Installation Verification section above. Failure Patch uninstall instructions Follow the Patch Uninstall Instructions: Patch Uninstall Instructions for the VMware or Software Only offer: 1. Start a Linux console session on the AE Services server (locally, via service port, or remotely using e.g. putty or SSH). 2. As the root user, execute the following from the command line: update -e 7.0.1.0.2 3. Follow the on-screen instructions. Follow this procedure to restore the AE Services server data using the backup data saved during the patch install process: 1. From the main menu of the AE Services Management Console, select Maintenance Server Data Restore. The Management Console displays the Restore Database Configuration screen. The initial state of the Restore Database page provides you with two basic functions: Text box with the Browse button, which provides the means to select a backup file to use for the Restore process. Alternatively, you can type a fully qualified name of the backup file in the text box. Restore button, that starts the Restore process 2. Click Browse and locate the AE Services database backup file that you intend to use (For example: servername_r7-0-0-0-0-288-0_mvapdb01012015.tar.gz). 2016 Avaya Inc. All Rights Reserved. Page 5

3. Click Restore. The Management Console redisplays the Restore Database Configuration page, with the following message. "A database restore is pending. You must restart the Database Service and the AE Server for the restore to take effect. To restart these services now, click the Restart Services button below." After removing SuperPatch 2 and scheduling the restore, reboot the AE Services server. For the VMware or Software Only offer SSH into the AE Services server and, as the root user, execute the following command from the command line: shutdown r now Do I have to perform any additional steps if I am uninstalling the Patch? No. Security Notes The information in this section concerns the security risk, if any, represented by the topic of this PSN. Security risks Avaya Security Vulnerability Classification Not Susceptible Mitigation If you require further information or assistance please contact your Authorized Service Provider, or visit support.avaya.com. There you can access more product information, chat with an Agent, or open an online Service Request. Support is provided per your warranty or service contract terms unless otherwise specified in the Avaya support Terms of Use. Disclaimer: ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED AS IS. AVAYA INC., ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS AVAYA ), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA. All trademarks identified by or TM are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. 2016 Avaya Inc. All Rights Reserved. Page 6