Important

   

Starting from version 8.9.03, BMC Network Automation is renamed to TrueSight Network Automation. This space contains information about TrueSight Network Automation 8.9.03 and the later service packs for 8.9. For earlier releases, see BMC Network Automation 8.9.

Product announcements

This topic contains information about discontinued platforms and databases, and the changes in the default email distribution list and SSH clients.

Discontinued support for operating systems and databases

Starting from version 8.8.00, the product discontinues support for the following operating systems and databases:

  • SUSE Linux Enterprise Server 11, 11 SP1
  • SUSE Linux Enterprise Server 10 SP2
  • Ubuntu 11.04
  • Oracle Database 11g Release 1 (R1)
  • SQL Server 2008 R2 SP1, SP2

Changes in the default email distribution list

Starting with version 8.7.00, the email distribution list, BMC Software Support is no longer valid and will not be available for use as follows:

  • If you upgrade to version 8.9.x and this list is not in use before upgrade, it is deleted during upgrade.
  • If you upgrade to version 8.9.x and this list is in use or has been modified before upgrade, it is retained after upgrade.

Note

BMC will disable this email distribution list in the near future. See the Submit Issue Via Email page for instructions for opening and updating the BMC Customer Support issues.

Changes in supported SSH clients

Tthe product uses a few updated cryptographic libraries for enhanced security. As a result, the product cannot support the use of older versions of a few SSH clients, such as, Putty and OpenSSH. Instead, you can use the following SSH clients to connect to the SSH proxy server:

  • (Windows) Bitvise SSH
  • (Linux) OpenSSH_6.4p1, OpenSSL 1.0.1e-fips
  • OpenSSH_5.8p1 Debian-1ubuntu3, OpenSSL 0.9.8o
  • Putty 0.68

Last updated date for the canned Common Vulnerability Reporting Framework (CVRF) files

TrueSight Network Automation is shipped with a canned set of security vulnerabilities that are derived from Cisco's Common Vulnerability Reporting Framework (CVRF) advisory repository. These vulnerabilities are a snapshot of the available CVRF files that are captured prior to the product release date. All advisories published by Cisco in CVRF format are included. Note that Cisco updates their advisories frequently. Therefore, BMC recommends that you import the updates regularly to keep the database current. TrueSight Network Automation does not update security vulnerabilities during the software upgrade process.

Note

The CVRF database shipped with the product version 8.9.02 is current as of August 16, 2017, with version 8.9.01 is current as of February 7, 2017, and with version 8.9.00 is current as of August 30, 2016.

The publicly available Cisco CVRF database is currently devoid of specific operating system version information and is not suitable for generating compliance rules. For that reason, the canned database of CVRF files is frozen as of August 16, 2017, where the operating system versions are still present. Reports made by Cisco dated after August 16, 2017, and contain the necessary operating system version data can be imported from NVD instead. A new canned importer named "Import Cisco Advisories From NVD XML File, Published After 08/15/17" is provided for this purpose.

Access restricted to all HTTP-based methods other than GET and POST

TrueSight Network Automation completes all user-requested tasks via GET and POST methods in case of SOAP API-based access and web-browser based access. For enhanced security, all other HTTP methods than GET and POST are restricted.

Deprecated support for local HTML help

From TrueSight Network Automation version 8.9.03, the local HTML (offline) help is deprecated. You are encouraged to use the online help or the ready-made PDF for offline viewing. You can also create your own PDF.  For more information, see PDFs and videos. 

Was this page helpful? Yes No Submitting... Thank you

Comments