Release Notes PN 93000490_C Digi CM 16 and Digi CM 32 Firmware 80007051_C (Digi CM 16) 80007050_C (Digi CM 32) v 1.1.0 May 12th, 2003 INTRODUCTION This is the production release of firmware for the Digi CM 16 and Digi CM 32. These devices provide console management access to various servers, devices, and systems that may be accessed by a serial cable to a console port. These devices feature console management through a console menu or web interface to allow configuration of network settings, serial settings, administration settings, and user settings. High-end features include Telnet/SSHv1/SSHv2/RawTCP protocols, Local, RADIUS, TACACS+, and LDAP authentication, Port logging through Local, NFS, and Memory cards, PCMCIA slot and configuration, custom menus, keyword monitoring and SMTP/SNMP notification, 10/100 mbps Ethernet network interface, and Digi Discovery server to allow discovery and network configuration from the Digi Discovery Applet. SUPPORTED PRODUCTS Digi CM 16 Digi CM 32 ENHANCEMENTS - Added Microsoft System Special Administration Console (SAC) support. - Added Shadow password support. - Added ability to switch directly between serial port configuration pages - Port Access Menu to access slave units in clustered scenerio. - Add option to launch telnet sesssion instead of Java applet for port connection. - Added support for Kerberos authentication. - Added remote Authentication to WebUI. - One Step Save and Apply. - Configurable escape sequence per port. - Checkbox to allow all users with port access to sniff. - Added ability for sniff users to switch between read only access and read/write access on a port. - Added an in-use and by-use comment field in serial port connection screen. - Customizable port log filename to NFS Server. - Reduce character limit of usernames down to 3. - Add secondary NFS Server option for System and Port logs. - Add Date/Time stamp option to Port logs. - Use LED graphics in the web UI instead of on/off text. - Added SNMP trap for alert. - Added prompt before sending break key to applet window. - Increased limit of sniff sessions per port to 15. - Upgraded SSH Client to current version (3.5p1). - Added the ability to disable Alternate IPs. IMPROVEMENTS - Fixed problem with F-Secure SSH client causing a port lockup when disconnecting from the port. - Fixed problem with SecureCRT SSH client causing a port lockup when disconnecting from the port. - Fixed problem with Port Log causing panics while logging to CF Card. - Fixed problem with sending a Break from a Dial-in modem. - Fixed problem with Port Log Mail Alerts having information within the mail header. - Fixed problem where an SNMP Trap could lock up the Web Interface. KNOWN LIMITATIONS - Cannot access a clustered port from command line interface (CLI) or Custom menu. To access clustered ports, use the Web Interface or an external host. - Local users must be added to all clustered units (masters and slaves) in order to authenticate remotely to clustered ports when using Local Authentication. - Masters and Slaves must all have the same authentication configuration for RADIUS, TACACS+, or LDAP in order to remotely authenticate on clustered ports. - Web UI, Discovery Applet, and Serial Connection Applet require Netscape 4.76 or higher or Internet Explorer 5 or higher. - The Discovery Applet and Serial Connection Applet also require the Java Runtime Environment (JRE) 1.3 or higher. - Netscape 4 on Windows: the serial port connection applet will not accept so the user cannot login through the applet. - Using cancel button when removing Custom Menus or Copying custom menus causes the page to be submitted and the menus removed or copied, respectively. To cancel without causing this effect, use the browser's Back button. ADDITIONAL INFORMATION - When using the SUN Java Runtime Environment in Windows, you may need to verify the browser you are using has been enabled with the Java plugin. To verify, use the following steps: 1. Go to Control Panel in Windows (may be accessed through My Computer or Start menu) 2. If you are using "Category View", click "Switch to Classic View". 3. Click Java Plug-In icon. (if this icon does not exist, verify JRE is correctly installed) 4. Click on the "Basic" tab. 5. Verify "Enable Java Plug-In" is checked. 6. Click on the "Browser" tab. 7. Verify appropriate browser or browsers are checked. 8. Click on the "About" tab. 9. Verify Java Plug-in version is 1.3 or later. HISTORY 93000490_C: v1.1.0 05-12-2003 * Added Microsoft System Special Administration Console (SAC) support. * Added Shadow password support. * Added ability to switch directly between serial port configuration pages * Port Access Menu to access slave units in clustered scenerio. * Add option to launch telnet sesssion instead of Java applet for port connection. * Added support for Kerberos authentication. * Added remote Authentication to WebUI. * One Step Save and Apply. * Configurable escape sequence per port. * Checkbox to allow all users with port access to sniff. * Added ability for sniff users to switch between read only access and read/write access on a port. * Added an in-use and by-use comment field in serial port connection screen. * Customizable port log filename to NFS Server. * Reduce character limit of usernames down to 3. * Add secondary NFS Server option for System and Port logs. * Add Date/Time stamp option to Port logs. * Use LED graphics in the web UI instead of on/off text. * Added SNMP trap for alert. * Added prompt before sending break key to applet window. * Increased limit of sniff sessions per port to 15. * Upgraded SSH Client to current version (3.5p1) 93000490_B1: v1.0.03.01 05-21-2003 * Port lockup with F-Secure or SSH 3.2.3 clients is fixed 93000490_A1: v1.0.03 03-06-2003 * Bug for WYSE dumb terminals support is fixed * Bug for setting the date in the bootloader is fixed * Bug for setting the system time in the bootloader is fixed 93000490_A: v1.0.02 02-26-2003 * Initial release