NN42030-403 MCG 3100 Release 2.0 Standard 01.03 November 2007
8
Copyright © 2007 Nortel Networks
7
Restart the Mobility Gateway servlet.
8
Configure the MCG 3100 elements from the Web pages.
9
Restart the Mobility Gateway servlet.
10 To upload the license file to the MCG 3100, use
Tools
>
License
Upload
.
11 To activate the license, restart the Mobility Gateway from the
Gateways page.
For Nokia usage, you must follow the certificate management
instructions from the installation guide. After adding certificates to
the keystore, use
sudo /sbin/service mobilitygw restart
to
refresh the keystore. Restarting the mobility gateway server from
the administration web user interfaces does not refresh the
keystore.
Updates
•
Q01771386: "Configuration saved... Wait for server restart" does
not disappear after restart: FIXED
•
Q01766921-01: MCG3100 does not start if the service DN field is
not populated: FIXED
•
Q01771404: MCG3100 does not use the nortel user to create the
keystore: FIXED
•
7906: Filtering Does not work across multiple pages of users:
FIXED
•
7887: Nortel KRS and incremental licenses (MA-MG): FIXED
•
Q01776377: MCC3100 clients stops taking calls during capacity
testing of 7000 calls per hr: FIXED
Limitations
The MCG 3100 is vulnerable to denial of service attacks, such as
those generated by the Sivus Tool. If a denial of service attack
launches against the MCG 3100, users may not be able to make or
receive calls on the MCC 3100. MCG 3100 impairment from a denial
of service attack does not impact the operation of the BlackBerry or
Nokia mobile device using the native cellular support from the cellular
provider. In network impairment conditions, such as during a denial of
service attack within the Enterprise where the MCG3100 resides,
users can use the mobile phone service provided by the cellular
provider. After the Enterprise network administrator clears the
network impairment condition, the MCG3100 operates without further
administrative action. To minimize the possibility of the MCG 3100
coming under a denial of service attack within the Enterprise, an
external security appliance, such as a firewall, can be used to limit