-
1
- #1
jimbojimbo
Vendor
Just as an FYI,
Avaya is supposed to be deleting all software below CM6.3.11 in September from PLDS. For everyone out there I strongly suggest you download archive, copy, backup, store, and use any other process to maintain a copy of your software (including phone firmware). For those on some version of 6.x below 6.3.11.1 I strongly suggest you plan on upgrading immediately. I would recommend changing from the .124 base load to the .141 base load (6.3.111 or higher). Do not expect to receive reasonable support from Avaya for any release below the 6.3.11. For those on CM5.x who have any PCI-DSS compliance requirements I would suggest you plan now for an upgrade to CM7. Even for those without PCI-DSS requirements I suggest the same.
Some things to keep in mind for upgrading
1. MCC/SCC/CMC cabinets are not longer supported and must be replaced when upgrading to CM7.x. NOTE: After extensive back and forth with Avaya this was clarified in the latest CM7 Offer Definition.
2. AES 6.3 deprecated the Client 4.2 SDK. Many legacy CTI integrations will fail when AES is upgraded. Plan to upgrade your adjunct CTI applications accordingly. (NOTE: AES Machine Preserving High Availability (MPHA)is available on AES 6.3 running on System Platform but is not available when migrating to VMware or Avaya's Appliance Virtualization Platform (AVP). Geo-Redundant High Availability (GRHA) is available on VMware.
3. CMS 17 or 18 is required with CM7.x. Unlike the last several releases of CMS the current version is not backwards compatible. CMS 18 is only compatible back to CM5.2.1
4. Be prepared to have a lengthy discussion with your vendor on the use of certificates, TLS 1.0 versus 1.1/1.2 (PCI-DSS 3.2 requires migration off of TLS 1.0 by 2018), SRTP (AES encryption standards relative to the November update of DISA SP800-131Ar1), and the use of personal certificates with one-X Communicator and the upcoming release of Avaya Communicator 3.0 and the Availability of Client Certificate Validation on Session Manager. For those in a Microsoft AD environment I strongly suggest using System Manager as a SubCA of the Enterprise RootCA or as a stand alone CA with the System Manager RootCA certificate imported into the default Group Policy Object.
5. Upgrading of Hardphones and the requirement to import Root Certificates vi the 46xxsettings.txt file and the limitation of importing (6) CA certificates.
These are just a few of the majors.
Avaya is supposed to be deleting all software below CM6.3.11 in September from PLDS. For everyone out there I strongly suggest you download archive, copy, backup, store, and use any other process to maintain a copy of your software (including phone firmware). For those on some version of 6.x below 6.3.11.1 I strongly suggest you plan on upgrading immediately. I would recommend changing from the .124 base load to the .141 base load (6.3.111 or higher). Do not expect to receive reasonable support from Avaya for any release below the 6.3.11. For those on CM5.x who have any PCI-DSS compliance requirements I would suggest you plan now for an upgrade to CM7. Even for those without PCI-DSS requirements I suggest the same.
Some things to keep in mind for upgrading
1. MCC/SCC/CMC cabinets are not longer supported and must be replaced when upgrading to CM7.x. NOTE: After extensive back and forth with Avaya this was clarified in the latest CM7 Offer Definition.
2. AES 6.3 deprecated the Client 4.2 SDK. Many legacy CTI integrations will fail when AES is upgraded. Plan to upgrade your adjunct CTI applications accordingly. (NOTE: AES Machine Preserving High Availability (MPHA)is available on AES 6.3 running on System Platform but is not available when migrating to VMware or Avaya's Appliance Virtualization Platform (AVP). Geo-Redundant High Availability (GRHA) is available on VMware.
3. CMS 17 or 18 is required with CM7.x. Unlike the last several releases of CMS the current version is not backwards compatible. CMS 18 is only compatible back to CM5.2.1
4. Be prepared to have a lengthy discussion with your vendor on the use of certificates, TLS 1.0 versus 1.1/1.2 (PCI-DSS 3.2 requires migration off of TLS 1.0 by 2018), SRTP (AES encryption standards relative to the November update of DISA SP800-131Ar1), and the use of personal certificates with one-X Communicator and the upcoming release of Avaya Communicator 3.0 and the Availability of Client Certificate Validation on Session Manager. For those in a Microsoft AD environment I strongly suggest using System Manager as a SubCA of the Enterprise RootCA or as a stand alone CA with the System Manager RootCA certificate imported into the default Group Policy Object.
5. Upgrading of Hardphones and the requirement to import Root Certificates vi the 46xxsettings.txt file and the limitation of importing (6) CA certificates.
These are just a few of the majors.