Release Notes

Total Page:16

File Type:pdf, Size:1020Kb

Release Notes Net-Net OS-E Release 3.6.0M5 Release Notes 780-0004-00 Revision 1.51 March 22, 2013 Notices © 2013 Acme Packet, Inc., Bedford, Massachusetts. All rights reserved. Acme Packet, Session Aware Networking, Net-Net, and related marks are trademarks of Acme Packet, Inc. All other brand names are trademarks, registered trademarks, or service marks of their respective companies or organizations. Patents Pending, Acme Packet, Inc. The Acme Packet Documentation Set and the Net-Net systems described therein are the property of Acme Packet, Inc. This documentation is provided for informational use only, and the information contained within the documentation is subject to change without notice. Acme Packet, Inc. shall not be liable for any loss of profits, loss of use, loss of data, interruption of business, nor for indirect, special, incidental, consequential, or exemplary damages of any kind, arising in any way in connection with the Acme Packet software or hardware, third party software or hardware, or the documentation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above exclusions may not apply. These limitations are independent from all other provisions and shall apply notwithstanding the failure of any remedy provided herein. Copying or reproducing the information contained within this documentation without the express written permission of Acme Packet, Inc., 100 Crosby Drive, Bedford, MA 01730, USA is prohibited. No part may be reproduced or retransmitted. Proprietary & Confidential iii Contents NNOS-E Release Notes, Version 3.6.0 Contacting Acme Packet ................................................................................. 1-18. Evaluation Site Information ....................................................................... 1-18. Technical Documentation .......................................................................... 1-18. Release Note Revision History ................................................................. 1-19. Third-Party Platforms and Blades ................................................................... 1-20. OS-E Virtual Machine ..................................................................................... 1-20. Software Download and Commissioning Process .......................................... 1-21. Upgrading to Release 3.6.0 ............................................................................ 1-21. Upgrading To Release 3.6.0m5 From Release 3.6.0m4 ........................... 1-21. Upgrading To Release 3.6.0m5 From Release 3.6.0, 3.6.0m1, 3.6.0m2, 3.6.0m3, and 3.6.0m4 .............................................................................................. 1-23. Upgrading To Release 3.6.0 From Release 3.5.x ..................................... 1-24. Upgrading To Release 3.6.0 From Release 3.4.x or later ......................... 1-28. Special Considerations After Running the Upgrade .................................. 1-28. Release 3.6.0m5 ............................................................................................. 1-29. New Features ............................................................................................ 1-29. Route Server Multi-Stage Routing Support ..........................................1-30 On-Demand Three-Way Conferencing .................................................1-43 Media Forking ......................................................................................1-44 Attended Voice Insertion ......................................................................1-44 On-Demand Call Monitoring and Recording ........................................1-46 Named Variable Actions .......................................................................1-52 Net-Net OS-E Release 3.6.0 Proprietary & Confidential iv Release Notes Contents RCSE Static Endpoint Support .............................................................1-53 Structured Data Return from Actions ...................................................1-56 Call Control DTMF Event Handling ......................................................1-58 Wideband Codec Support ....................................................................1-60 OS-E Licensing Enhancements ...........................................................1-61 OS-E Event Enhancements .................................................................1-61 Rendezvous Session Support ..............................................................1-80 Manually Attaching and Detaching From an Endpoint .........................1-81 Call Logs Search Enhancement ...........................................................1-82 OS-E Embedded Web Server ..............................................................1-83 Redirecting a Call-Control Action .........................................................1-90 Injecting a SIP MESSAGE into a Call-Control Action ..........................1-91 Multimedia Streaming Server Support .................................................1-91 Free-Form Accounting for CDRs ........................................................1-100 Broadsoft Survivability ........................................................................1-107 Echo Cancellation ..............................................................................1-109 Media Scanner Services Enhancements .................................................1-110. On-Demand Media Scanner ..............................................................1-110 On-Demand Mute and Un mute ......................................................... 1-111 Media-Scanner Per Call-leg ............................................................... 1-111 Configuring Media-Scanner-Settings ................................................. 1-111 Properties of In/Out-Media-Scanner-Settings .................................... 1-111 Status Providers For Media Scanner .................................................1-114 Installing the OS-E on a Hyper-V VM .................................................1-115 Displaying Exceptions and Core Dumps ............................................1-122 Configuration Changes in Release 3.6.0m5 ........................................... 1-124. New Objects in Release 3.6.0m5 .......................................................1-125 New properties in Release 3.6.0m5 ...................................................1-170 Changed Properties in Release 3.6.0m5 ...........................................1-179 MIB Changes in Release 3.6.0m5 .......................................................... 1-180. New MIB Tables in Release 3.6.0m5 .................................................1-180 New MIB Objects in Release 3.6.0m5 ...............................................1-181 Net-Net OS-E Release 3.6.0 Proprietary & Confidential Release Notes v Contents Changed Tables in Release 3.6.0m5 ................................................. 1-182 New Traps in Release 3.6.0m5 ......................................................... 1-182 Changed Traps in Release 3.6.0m5 .................................................. 1-182 Known Problems, Restrictions, and Operational Considerations in 3.6.0m5 1-183. Call Logs - Sessions - Play. Issues launching the recorded file via the play link with IE8 & 9 and Windows Media Player ........................................... 1-183 Local File-System with Postgres Format ........................................... 1-183 TLS Event Log Messages Issue ........................................................ 1-183 Show active-sessions status provider is not working and causing loop issues 1-184 Multiple copies of mixed-media .wav file present in on-demand recording archive ............................................................................................... 1-184 The call-control connect action does not support the appending of “;postd+<#*>” to the URI to do post dial digit injection ...................... 1-184 Release 3.6.0m4 ...........................................................................................1-185. New Features ..........................................................................................1-185. Named Variable Support .................................................................... 1-186 CDR Custom Data Fields and Reserved Keywords .......................... 1-190 Custom Data Fields in OS-E Events .................................................. 1-193 Embedded Route Server Import Tool Support ................................... 1-193 HTTPS Support for Call Rate Files Transferring ............................... 1-203 OS-E DID Range Enhancements ...................................................... 1-207 DTMF Translation Framework ........................................................... 1-231 Threaded Session Mixing Action ....................................................... 1-234 ARP Heartbeat Configuration on VM Clusters .................................. 1-234 Dual HA Heartbeat Configuration Enhancements ............................. 1-235 TCP/TLS Ephemeral Port Range Configuration ................................ 1-235 Event Log Translation into SNMP Traps ............................................ 1-235 ToS Marking for H.323 Packets ......................................................... 1-237 302 Redirect Messages for Cross-Cluster Load Balancing ............... 1-239 Archiving Enhancements ................................................................... 1-242 RTCP QoS Accounting .....................................................................
Recommended publications
  • The New Standard for Data Archiving
    The new standard for data archiving 1 Explosively increasing 2 Why data management digital data is important Ever-increasing volumes of digital data are mounting up every day due to rapidly growing Today, files can be lost from computers in any number of ways—you might accidentally internet technology, widespread use of SNS, data transmission between network- connected delete a file, a virus might wipe one out, or there could be a complete hard drive failure. devices, and other trends. Within the video production industry, data-heavy video content When a hard drive dies an untimely death, it can feel like a house has burnt down. (for example, 4K, 8K, and 4K/8K high-frame-rate video) is becoming a major source of video Important personal items are usually gone forever—photos, significant documents, broadcasting. Many companies and research institutes are creating high volumes of data downloaded music, and more. (big data) for use in AI systems. Somehow, these newly created assets need to be managed effectively, stored safely, and utilized along with the old assets. There are many options for backing up content without any sophisticated equipment—you can 163,000 EB use DVDs, external hard drives, optical discs, or even online storage. It’s a good idea to back up data to multiple places. Computer Natural Viruses Disasters 4% Other 2% 40,026 EB 3% 2,837 EB 8,591 EB 1,227 EB Software Corruption 9% 2010 2012 2015 2020 2025 System/ Hardware 1 EB = 1,000,000 TB Malfunction 56% User Error Performance 26% Source: Ontrack Data Recovery High Performance www.ontrack.co.uk/understandingdataloss E-commerce, Financial HOT SSD RAM Capacity Optimized Back O­ce, General Service WARM HDD Sony's Optical Disc Archive storage system offers the solution, Long-Term Archive COLD with a low total cost of ownership through the use of long-life Auto Loader, O-line Tape Optical Disc Cost media, and it includes inter-generational compatibility based on the same optical disc technology used in DVDs and Blu-ray discs.
    [Show full text]
  • Restoring in All Situations
    Restoring in all situations Desktop and laptop protection 1 Adapt data restore methods to different situations Executive Summary Whether caused by human error, a cyber attack, or a physical disaster, data loss costs organizations millions of euros every year (3.5 million euros on average according to the Ponemon Institute). Backup Telecommuting Office remains the method of choice to protect access to company data and ensure their availability. But a good backup strategy must necessarily be accompanied by a good disaster recovery strategy. Nomadization The purpose of this white paper is to present the best restore practices depending on the situation you are in, in order to save valuable time! VMs / Servers Apps & DBs NAS Laptops Replication 2 Table of Contents EXECUTIVE SUMMARY .......................................................................................................................... 2 CONTEXT ................................................................................................................................................ 4 WHAT ARE THE STAKES BEHIND THE RESTORING ENDPOINT USER DATA? ................................. 5 SOLUTION: RESTORING ENDPOINT DATA USING LINA ................................................................... 6-7 1. RESTORE FOR THE MOST NOVICE USERS ................................................................................ 8-10 2. RESTORE FOR OFF SITE USERS ................................................................................................11-13 3. RESTORE FOLLOWING LOSS,
    [Show full text]
  • IBM Connect:Direct for Microsoft Windows: Documentation Fixpack 1 (V6.1.0.1)
    IBM Connect:Direct for Microsoft Windows 6.1 Documentation IBM This edition applies to Version 5 Release 3 of IBM® Connect:Direct and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1993, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Release Notes.......................................................................................1 Requirements...............................................................................................................................................1 Features and Enhancements....................................................................................................................... 2 Special Considerations................................................................................................................................ 3 Known Restrictions...................................................................................................................................... 4 Restrictions for Connect:Direct for Microsoft Windows........................................................................ 4 Restrictions for Related Software.......................................................................................................... 6 Installation Notes.........................................................................................................................................6
    [Show full text]
  • A Survey of Distributed File Systems
    A Survey of Distributed File Systems M. Satyanarayanan Department of Computer Science Carnegie Mellon University February 1989 Abstract Abstract This paper is a survey of the current state of the art in the design and implementation of distributed file systems. It consists of four major parts: an overview of background material, case studies of a number of contemporary file systems, identification of key design techniques, and an examination of current research issues. The systems surveyed are Sun NFS, Apollo Domain, Andrew, IBM AIX DS, AT&T RFS, and Sprite. The coverage of background material includes a taxonomy of file system issues, a brief history of distributed file systems, and a summary of empirical research on file properties. A comprehensive bibliography forms an important of the paper. Copyright (C) 1988,1989 M. Satyanarayanan The author was supported in the writing of this paper by the National Science Foundation (Contract No. CCR-8657907), Defense Advanced Research Projects Agency (Order No. 4976, Contract F33615-84-K-1520) and the IBM Corporation (Faculty Development Award). The views and conclusions in this document are those of the author and do not represent the official policies of the funding agencies or Carnegie Mellon University. 1 1. Introduction The sharing of data in distributed systems is already common and will become pervasive as these systems grow in scale and importance. Each user in a distributed system is potentially a creator as well as a consumer of data. A user may wish to make his actions contingent upon information from a remote site, or may wish to update remote information.
    [Show full text]
  • File Server Scaling with Network-Attached Secure Disks
    Appears in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics ‘97), Seattle, Washington, June 15-18, 1997. File Server Scaling with Network-Attached Secure Disks Garth A. Gibson†, David F. Nagle*, Khalil Amiri*, Fay W. Chang†, Eugene M. Feinberg*, Howard Gobioff†, Chen Lee†, Berend Ozceri*, Erik Riedel*, David Rochberg†, Jim Zelenka† *Department of Electrical and Computer Engineering †School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 [email protected] http://www.cs.cmu.edu/Web/Groups/NASD/ Abstract clients with efficient, scalable, high-bandwidth access to stored data. This paper discusses a powerful approach to fulfilling this By providing direct data transfer between storage and client, net- need. Network-attached storage provides high bandwidth by work-attached storage devices have the potential to improve scal- directly attaching storage to the network, avoiding file server ability for existing distributed file systems (by removing the server store-and-forward operations and allowing data transfers to be as a bottleneck) and bandwidth for new parallel and distributed file striped over storage and switched-network links. systems (through network striping and more efficient data paths). The principal contribution of this paper is to demonstrate the Together, these advantages influence a large enough fraction of the potential of network-attached storage devices for penetrating the storage market to make commodity network-attached storage fea- markets defined by existing distributed file system clients, specifi- sible. Realizing the technology’s full potential requires careful cally the Network File System (NFS) and Andrew File System consideration across a wide range of file system, networking and (AFS) distributed file system protocols.
    [Show full text]
  • An Advanced Solution for Long-Term Retention of Enterprise Digital
    Data Management, Simplified. Enterprise Edition An Advanced Solution for Long-term Retention of Enterprise Digital Assets A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes, long-term retention requirements, and e-discovery mandates. Atempo Digital Archive, Enterprise Edition, is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving data in long-term storage platforms, Atempo Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. An Answer to Each Archiving Need Addressing Today’s Storage Management Challenges Enabling the Long-term Retention of Digital Assets Today, organizations must manage more, and more Digital information represents both the lifeblood of a critical, data than ever before—and data volumes continue business today, and the basis of records that may need to grow at an explosive pace. Traditional backup and to be accessed for generations. With its integrated recovery solutions have proven ill-equipped to keep up capabilities for full content indexing, search, and metadata with these demands. To ensure these increasing volumes indexing, Atempo Digital Archive allows users to retrieve of critical information are always available when needed, information quickly and easily. In addition, it offers organizations require advanced new archiving capabilities. refreshing mechanisms that verify whether storage Atempo Digital Archive is the one solution that enables media is still readable, and that ensure information IT organizations to address their storage management can continue to be accessed on an ongoing basis.
    [Show full text]
  • Overview Addressing Today's Storage Management Challenges Enabling
    DATA PROTECTION ATEMPO-DIGITAL ARCHIVE High performance file archiving software for large data volumes OVERVIEW A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes and long-term retention requirements. Atempo-Digital Archive is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving large data volumes in long-term storage platforms, Atempo-Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. ADDRESSING TODAY’S STORAGE MANAGEMENT CHALLENGES Today, organizations must manage more critical data than ever before - and data volumes continue to grow at an explosive pace. Traditional backup and recovery solutions have proven ill-equipped to keep up with these demands. To ensure these increasing volumes of critical information are always available when needed, organizations require advanced new archiving capabilities. Atempo-Digital Archive (ADA) is the one solution that enables IT organizations to address their storage management challenges today and in the long term. By managing data in a secure, centrally-managed archive, Atempo-Digital Archive represents the most efficient, reliable, and cost-effective way to protect critical business information. This solution ensures that an organization’s most valuable data is organized and easily accessible - while at the same time freeing up expensive disk space, lowering storage costs, and reducing the backup window for data that is infrequently accessed. ENABLING THE LONG-TERM RETENTION OF DIGITAL ASSETS Digital information represents both the lifeblood of a business today, and the basis of records that may need to be accessed for generations.
    [Show full text]
  • Optical Disc Archive File Manager2
    5-000-611-15(1) Optical Disc Archive File Manager2 Help ODS-FM2 © 2018 Sony Imaging Products & Solutions Inc. Overview ODS-FM2 is a software application for archiving and retrieving using the Optical Disc Archive System. In addition to systems using ODS-L10 and ODS-L30M devices, it can also be used with drive units connected directly to a server. ODS-FM2 can be used to manage not just cartridges inserted in an Optical Disc Archive System, but also cartridges for shelf management. 2 File Manager Mode This section describes the screens and operation in File Manager mode. • Archive screen • Archiving • Archiving using watched folders • Retrieving • Displaying/editing file metadata • Deleting cartridge information • Deleting files/folders on cartridges • Duplicating cartridges • Adding a network drive Archive Screen Archive and retrieve operations are performed from this screen. The Archive screen is made up of the following sections. (1) (2) (3) (4) Common operations Tree area (left side of Desktop/Library area) • Multiple selections are not supported. List area (right side of Desktop/Library area, Job area, [Placeholder] dialog) The operating method is analogous to both Explorer (Windows) and the Finder (macOS). • Select multiple files using the Shift key, Ctrl key (Windows), and Command key (macOS). • Select all files using Ctrl+A (Windows) or Command+A (macOS). 3 (1) Global menu Click the icons to move between screens. • (Archive): Displays the Archive screen to perform archive/retrieve operations. • (Settings): Displays the Settings screen. • (Help): Displays the Help and version information. • (Logout): Logs the user out. (2) Desktop area Displays the folders and files on the local computer and computers on the network.
    [Show full text]
  • Gigabit Ethernet Hard Drive User Guide
    Gigabit Ethernet Hard Drive User Guide Contents Introduction ...................................................................................2 Controls, Connectors and Indicators .................................................2 Front Panel Area ...............................................................................2 Rear Panel Area ................................................................................3 About the Hard Disk ..........................................................................4 Locating NAS Drive on Your Desk ......................................................5 Bundled Software ..............................................................................5 Finder.exe ........................................................................................5 Backup Software ..............................................................................5 TorrentFlux .......................................................................................5 Connecting To Your Network ..............................................5 About NAS Drive User Accounts ........................................................7 Connecting The NAS Drive To Your LAN ............................................8 Web-Based Administration Tool .....................................................10 Administration Login .....................................................................10 Basic Settings For Initial Setup ......................................................11 NAS Drive Operation .............................................................17
    [Show full text]
  • LISTSERV 16.0 Installation Manual for VM
    ©2010 L-Soft Sweden AB This document describes the installation of the LISTSERV 16.0 for VM with a build date of December 9, 2009. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. L-Soft international, Inc. does not endorse or approve the use of any of the product names or trademarks appearing in this document. Permission is granted to copy this document, at no charge and in its entirety, provided that the copies are not used for commercial advantage, that the source is cited, and that the present copyright notice is included in all copies so that the recipients of such copies are equally bound to abide by the present conditions. Prior written permission is required for any commercial use of this document, in whole or in part, and for any partial reproduction of the contents of this document exceeding 50 lines of up to 80 characters, or equivalent. The title page, table of contents and index, if any, are not considered part of the document for the purposes of this copyright notice, and can be freely removed if present. Copyright 2010, L-Soft international, Inc. All Rights Reserved Worldwide. LISTSERV is a registered trademark licensed to L-Soft international, Inc. ListPlex, CataList, and EASE are service marks of L-Soft international, Inc. UNIX is a registered trademark of X/Open Company Limited. AIX and IBM are registered trademarks of International Business Machines Corporation. Alpha AXP, Ultrix and VMS are trademarks of Digital Equipment Corporation.
    [Show full text]
  • NAS-235 the Airlive 2Bay Diskmaster NAS-235
    NAS-235 The AirLive 2Bay DiskMaster NAS-235 he NAS-235 inserts Terabytes of storage T space into your network without the cost, space, and maintenance hassles of a full- fledged file server. The NAS-235 provides solid data transfer performance for multiple client connections. And you can add as many NAS-235 to your network as you like. Compared to using a standard PC as a File Server, the NAS-235 offers lower cost, easier management, and increased reliability. Moreover, NAS-235 supports WN- 200USB for changing it into wireless, and hence avoids the annoying cabling issue. 10/100/ SATA RAID USB 1000 II 0, 1 2.0 Mbps BitTorrent WiFi Samba Capability* Client UPnP Share 3.5 inch SATA or IDE Drive Wirelessly With WN-200USB, NAS-235 become a wireless file server with up to two 3.5" SATA Hard Drives. Therefore, you can install any 3.5" SATA Hard Drive and share it instantly on the network. Users can use My Network Place to access the Hard Drive. Even set it as a network Drive. So you can save or read files directly. The NAS-235 can set username and password to limit access only to certain users. Best of all, Internet user can access the device throughput standard FTP client. Wireless File Sharing Automatic File Download BiTorrent HTTP FTP NAS-235 Internet NAS-235 WN-200USB File Download From Internet Wireless Router NoteBook PC WN-200USB 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan BitTorrent Client Built-in Bit-Torrent download engine, this engine allows you to download the legally shared contents on the Internet without leaving your PC power-ON all the time.
    [Show full text]
  • Primary Storage Concepts and Library Attachment Methods
    PRIMARY STORAGE CONCEPTS AND LIBRARY ATTACHMENT METHODS TECHNICAL WHITE PAPER TABLE OF CONTENTS FORWARD 1 DATA APPLICATIONS USING PRIMARY STORAGE 2 DATA ACCESS LEVELS 2 BLOCK LEVEL 2 FILE LEVEL 2 DISK DRIVE OVERVIEW 3 INTERNAL VERSUS EXTERNAL DISK 4 JBOD OVERVIEW 4 RAID OVERVIEW 5 STRIPING 5 REDUNDANCY 6 RAID 0 7 RAID 1 8 RAID 3 – RAID 4 8 RAID 5 9 RAID 10 9 HOST SYSTEM ATTACHMENT METHODS 10 SAS/DAS 10 Backup Methods 10 NAS 11 Servers 11 Backup Methods 12 LAN-free Backup 13 NAS Boxes 13 Backup Methods 15 NDMP 17 Future Overland NDMP Support 17 SAN 18 Enterprise Class Fibre Channel RAID subsystems 18 SAN Vision 19 SAN Reality 20 IPSAN 21 Server Clustering 22 HA (Highly Available) SANs 23 SAN Backup Methods 24 SAN Island Backup 25 Serverless Backup 26 SAN NAS CONVERGENCE 28 APPENDIX A – HAVING FUN WITH EXCLUSIVE OR’ING 29 FORWARD This Primary Storage Choices document is intended to provide an overview of the choices available and the tradeoffs involved for: • Users and Managers of Information Technology resources – particularly storage • Overland Sales and Technical team members • Overland Executives and Managers 1 DATA APPLICATIONS USING PRIMARY STORAGE Data applications using Data applications using primary storage consist of two types, Data Creation and Data Manipulation primary storage consist of applications. two types, Data Creation and Data Manipulation Loosely defined, a data creation application is any program that generates data in the form of files, applications. PowerPoint, Word, Excel, Etc. The vast amount of enterprise storage is occupied with data that has been created.
    [Show full text]