Important

   

Starting version 8.9.03, BMC Network Automation is renamed to TrueSight Network Automation. This space contains information about BMC Network Automation 8.9.02 and previous versions. For TrueSight Network Automation 8.9.03 and later releases, see the TrueSight Network Automation documentation.

Product announcements

This topic contains information about discontinued platforms and databases, and the changes in the default email distribution list and SSH clients.

Discontinued support for operating systems and databases

Starting from version 8.8.00, BMC Network Automation discontinues support for the following operating systems and databases:

  • SUSE Linux Enterprise Server 11, 11 SP1
  • SUSE Linux Enterprise Server 10 SP2
  • Ubuntu 11.04
  • Oracle Database 11g Release 1 (R1)
  • SQL Server 2008 R2 SP1, SP2

Changes in the default email distribution list

Starting with version 8.7.00, the email distribution list, BMC Software Support is no longer valid and will not be available for use as follows:

  • If you upgrade to version 8.9.x and this list is not in use before upgrade, it is deleted during upgrade.
  • If you upgrade to version 8.9.x and this list is in use or has been modified before upgrade, it is retained after upgrade.

Note

BMC will disable this email distribution list in the near future. See the Submit Issue Via Email page for instructions for opening and updating the BMC Customer Support issues.

Changes in supported SSH clients

Version 8.9.02 of BMC Network Automation uses a few updated cryptographic libraries for enhanced security. As a result, BMC Network Automation cannot support the use of older versions of a few SSH clients, such as, Putty and OpenSSH. Instead, you can use the following SSH clients to connect to the BMC Network Automation SSH proxy server:

  • (Windows) Bitvise SSH
  • (Linux) OpenSSH_6.4p1, OpenSSL 1.0.1e-fips
  • OpenSSH_5.8p1 Debian-1ubuntu3, OpenSSL 0.9.8o
  • Putty 0.68

Last updated date for the canned Common Vulnerability Reporting Framework (CVRF) files

BMC Network Automation is shipped with a canned set of security vulnerabilities that are derived from Cisco's Common Vulnerability Reporting Framework (CVRF) advisory repository. These vulnerabilities are a snapshot of the available CVRF files that are captured prior to the product release date. All advisories published by Cisco in CVRF format are included. Note that Cisco updates their advisories frequently. Therefore, BMC recommends that you import the updates regularly to keep the database current. BMC Network Automation does not update security vulnerabilities during the software upgrade process.

Note

The CVRF database shipped with BMC Network Automation version 8.9.02 is current as of August 16, 2017, with version 8.9.01 is current as of February 7, 2017, and with version 8.9.00 is current as of August 30, 2016.

Access restricted to all HTTP-based methods other than GET and POST

BMC Network Automation completes all user-requested tasks via GET and POST methods in case of SOAP API-based access and web-browser based access. For enhanced security, all other HTTP methods than GET and POST are restricted.

Was this page helpful? Yes No Submitting... Thank you

Comments