0% found this document useful (0 votes)
18 views

PortWise 4.6 Release Notes

Uploaded by

tna.teszt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

PortWise 4.6 Release Notes

Uploaded by

tna.teszt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

PORTWISE 4.

6
RELEASE NOTES

PortWise 4.6 Release Notes


INTRODUCTION
Welcome to PortWise 4.6, the latest release of the PortWise Identity and Access Management product suite.
Be sure to read this document prior to installing PortWise 4.6.

Contacting PortWise
For information about support, training and other services in your area please visit our website
http://www.portwise.com.

NEW FEATURES
The following features are highlighted in PortWise 4.6

APPLICATION SINGLE SIGN-ON


In addition to standard Web applications, such as Citrix Web Interface, Outlook Web Access, and Microsoft
Sharepoint Portal, PortWise 4.6 has been extended to also include support for specific non-web applications.
Included in PortWise 4.6 is support for Windows Fileshares and Microsoft Terminal Server, and more applica-
tions will be supported in future versions.

ADAPTIVE WEB SINGLE SIGN-ON


Adaptive Single Sign-On (SSO) provides a self-configuring form based SSO mechanism to web applications
that require login forms. The PortWise SSO engine automatically configures the form based logon settings by
examining the web application’s logon page. Standard form based SSO is still available as an option if some
web application requires manual configuration.

IDENTITY FEDERATION
PortWise has extended its support for Identity Federation to include support for both SAML v2 and Microsoft
ADFS (Active Directory Federation Services). With Identity Federation, an organisation’s users may access re-
sources at external organizational domains after logging in to the user’s home domain. Logon credentials are
passed to external resources in SAML assertions to enable inter-domain Application Single Sign-On.

STANDARD RESOURCE ADMINISTRATION


PortWise 4.6 includes support for even more standard resources. A standard resource creates a wizard-based
configuration interface to the administrator for easy and time-efficient configuration of common applica-
tions.

PORTWISE.COM | INFO@PORTWISE.COM
01
PORTWISE 4.6
RELEASE NOTES

MICROSOFT ACTIVE SYNC


Utilize the PortWise Access platform to enable secure push mail from a Microsoft Exchange environment to
any Active Sync enabled handheld device. The new device lock mechanism in PortWise 4.6 provides in-
creased security in addition to static username & password authentication. If a device gets lost or stolen, it
can easily be disabled in PortWise to prevent it from further access.

PORTWISE ACCESS CLIENT


The PortWise Access Client (on-demand or pre-installed SSL VPN Client) is enhanced to require less admin
permissions when performing advanced networking operations

ACCOUNT MANAGEMENT WITH SELF SERVICE


Users can now create new accounts and reopen locked accounts via Internet with the use of system- and
user-defined challenges, thus saving the IT helpdesks valuable time.

MICROSOFT WINDOWS VISTA


PortWise now supports Microsoft Windows Vista.

SERVER PLATFORM SUPPORT


PortWise 4.6 enhances operating system support, giving companies the freedom to choose their preferred
operating system. Windows and Linux (RedHat 5 & SUSE Enterprise Linux 10).

SUPPORT FOR ONLINE CERTIFICATE STATUS PROTOCOL (OCSP)


PortWise now supports OCSP in addition to standard x.509 certificate revocation lists. OCSP is a standard for
obtaining the revocation status of an x.509 certificate in real-time and is superior to revocation lists in
large-scale PKI implementations.

PASSWORD MANAGEMENT INTEGRATION FOR IBM TIVOLI LDAP AND IBM RACF
PortWise 4.6 includes new authentication mechanisms that fully integrates with IBM Tivoli and RACF user
directories. PortWise can now completely reuse user and group information and interact with the catalogue’s
policies for password management to enable user password set/reset through PortWise.

PASSWORD MANAGEMENT INTEGRATION FOR NOVELL eDIRECTORY


PortWise user authentication linked to Novell eDirectory can now fully integrate with eDirectory’s user login
properties in order to allow set/reset of user password through PortWise, compliant to the organization’s
password policy settings implemented in the directory service.

PORTWISE EXTENSIBLE PROGRAMMING INTERFACE


The PortWise programming interface has been improved for better handling of user account management
using the PortWise web services interface.

SUPPORT FOR NESTED AND PRIMARY GROUPS IN ACTIVE DIRECTORY


PortWise 4.6 now supports nested and primary groups in Active Directory which significantly reduces
administration.

PORTWISE.COM | INFO@PORTWISE.COM
02
PORTWISE 4.6
RELEASE NOTES

REPORTS ARE STORED IN PDF FORMAT BY DEFAULT


In PortWise 4.6 Report are now stored in PDF format by default.

ENHANCED FEATURES
PortWise 4.6 contains over 100 enhancements through-out the product suite.

INSTALLATION
Installing PortWise is straigth forward and easy. Just run the appropriate installer for your operating system
and the setup wizard will guide you through the tasks. Please study the release notes and the PortWise 4.6
documentation prior to installing. You will also need a valid license file. If you are upgrading your existing
PortWise 4.x installation please study the upgrading documentation prior to an upgrade.

Product Component Matrix

Name Version (Build number)

PortWise Administration Service 4.6 (5020)


PortWise Access Point 4.6 (5333)
PortWise Policy Service 4.6 (4748)
PortWise Authentication Service 4.6 (5069)
PortWise Access Client 4.6 (5055)
PortWise Distribution Service 4.6 (5064)
PortWise Mobile ID 4.6 (5063)

Software License Agreement


Use of PortWise 4.6 is governed by a license agreement included in the PortWise 4.6 installers. During the
installation you will be prompted to accept the license agreement and if you do not accept the license
agreement you will not be able to install and use PortWise 4.6.

License
Portwise 4.6 requires a valid license. If you are upgrading from an existing installation you will be able to start
the system on an earlier PortWise 4.x license but will not have access to all features. Please contact your resel-
ler or PortWise to obtain a PortWise 4.6 license.

Upgrading
You can install PortWise 4.6 on any previous PortWise 4.0 or PortWise 4.5 release. For upgrades from earlier
releases please contact PortWise support. Please note that upgrades from PortWise 4.6 betas are not suppor-
ted. NOTE: You must upgrade all components to the same version.

PORTWISE.COM | INFO@PORTWISE.COM
03
PORTWISE 4.6
RELEASE NOTES

REQUIREMENTS
Hardware Requirements
A full installation of PortWise 4.6 includes five different services;

• PortWise Administration Service, the central management console for all other components.
• PortWise Access Point, the gateway beween users and applications.
• PortWise Policy Service, the authoriztion engine which determines what users may access.
• PortWise Authentication Service, the OTP server which authenticates users.
• PortWise Distribution Service (add-on to PortWise Authentication Service), used to distribute
Port Wise Mobile ID clients

NOTE: It is only the PortWise Administration Service that is mandatory to install, you then select the
services you need. Also note that the service can be deployed on one or multiple servers.

Minimum hardware requirements for PortWise 4.6 are listed below;

• Single Intel Pentium III, Pentium 4, or Xeon 1 GHz processor or higher


• 256 MB of physical RAM per service running on the server, plus an additional 256 MB for the opera
ting system
• Hard disk drive with at least 300 MB of free space

NOTE: Log files can generate large amounts of data, thus consuming vast amounts of hard
disk space. It is advisable to provide as much hard disk space as possible.

Performance
It is possible to deploy each of the PortWise services on separate servers, or to combine some or all of the
services on a single server. However, to increase performance you need to increase the amount of RAM in ac-
cordance with the number of PortWise services that are running on a single machine.

Note that for security reasons, it is strongly recommended that the PortWise Access Point is installed on a se-
parate machine on a DMZ. Only install the PortWise Access Point on the same machine as the other PortWise
services for demonstration or test purposes.
PortWise allows available memory to be most efficiently used by Java-based services (i.e. all services ex-
cept PortWise Access Point) through tuning of Java heap sizes. For details, please refer to the technical note
TN2070 Performance & Optimization.

PORTWISE.COM | INFO@PORTWISE.COM
04
PORTWISE 4.6
RELEASE NOTES

Hardware Configuration Example


The following example shows the recommended configuration for a PortWise 4.6 installation on two servers.
Server for PortWise Access Point:
• Single Intel Pentium III, Pentium 4, or Xeon 1 GHz processor or higher
• 512 MB of RAM
• Hard disk drive with at least 40 GB of free space

Server for PortWise Administration Service, PortWise Policy Service, and PortWise Authentication Service:
• Single Intel Pentium III, Pentium 4, or Xeon 1 GHz processor or higher
• 1 GB of RAM
• Hard disk drive with at least 40 GB of free space

Platform Requirements
Requirements for operating systems and directory services are listed below

Server Operating Systems


PortWise 4.6 supports the following server operating systems:

• Red Hat Enterprise Linux 5.0


• SUSE Linux Enterprise Server 10
• Windows 2003 Server SP2

Contact PortWise for support on additional platforms such as Solaris and Debian. PortWise 4.6 is also availible
as a VMware Virtual Appliance

Directory Servers
PortWise 4.6 is fully LDAP v3 compliant but has been tested and verified with;

• Microsoft Active Directory 2003


• Novell eDirectory
• OpenLDAP
• Sun Java System Directory Server
• Oracle Internet Directory (tested for authentication)
• Tivoli Directory Server (tested for authentication)
• IBM RACF LDAP (tested for authentication)

PORTWISE.COM | INFO@PORTWISE.COM
05
PORTWISE 4.6
RELEASE NOTES

Third-party Authentication Products


PortWise 4.6 supports a wide range of authentication products and standards including;

• LDAP
• RADIUS
• RSA SecurID
• Secure Computing SafeWord RemoteAccess
• X.509 certificates / PKI
• SAML (Web Browser SSO profile with HTTP Redirect and HTTP POST bindings)
• ADFS (WS-Federation Passive Requestor Interoperability Profile)

Please refer to the PortWise Administrator for the full range of authentication products.

Browser Requirements
PortWise Administrator
Browser requirements for the PortWise Administrator are listed per operating system in the table below.

NOTE: The requirements apply to the Web interface that constitutes the
PortWise Administrator, not the PortWise Administration Service.

Operating System Browser Requirements


• Microsoft Windows XP Home Edition (SP1, SP2)
• Microsoft Windows XP Professional (SP1, SP2) • Microsoft Internet Explorer 6.0
• Microsoft Windows 2003 Server (SP2) • Microsoft Internet Explorer 7.0
• Microsoft Windows Vista Enterprise • Mozilla Firefox 2.0
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 • Safari 1.3.2 (Mac OS X 10.3.9)


• Apple Mac OS X 10.4 (Tiger) • Safari 2.0.4 (Mac OS X 10.4.7)
• Mozilla Firefox 2.0

• Red Hat Linux Enterprise 5.0


• Mozilla Firefox 2.0

• SUSE Linux Enterprise Server 10


• Mozilla Firefox 2.0

PORTWISE.COM | INFO@PORTWISE.COM
06
PORTWISE 4.6
RELEASE NOTES

PortWise Application Portal


Browser requirements for PortWise Application Portal are listed per operating system in the table below.

Operating System Browser Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) • Microsoft Internet Explorer 6.0
• Microsoft Windows XP Professional (SP1, SP2) • Microsoft Internet Explorer 7.0
• Microsoft Windows 2003 Server (SP2) • Mozilla Firefox 2.0
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 • Safari 1.3.2 (Mac OS X 10.3.9)


• Apple Mac OS X 10.4 (Tiger) • Safari 2.0.4 (Mac OS X 10.4.7)
• Mozilla Firefox 1.5
• Mozilla Firefox 2.0

• Red Hat Linux Enterprise 5.0 • Mozilla Firefox 1.5


• Mozilla Firefox 2.0

• SUSE Linux Enterprise Server 10 • Mozilla Firefox 1.5


• Mozilla Firefox 2.0

PORTWISE.COM | INFO@PORTWISE.COM
07
PORTWISE 4.6
RELEASE NOTES

PortWise Web
Browser requirements for PortWise Web authentication method are listed per operating system in the table
below.

Operating System Browser Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) • Microsoft Internet Explorer 5.5
• Microsoft Windows XP Professional (SP1, SP2) • Microsoft Internet Explorer 6.0
• Microsoft Windows 2003 Server (SP2) • Microsoft Internet Explorer 7.0
• Microsoft Windows Vista Enterprise • Mozilla Firefox 1.5
• Microsoft Windows Vista Business • Mozilla Firefox 2.0
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 • Safari 1.3.2 (Mac OS X 10.3.9)


• Apple Mac OS X 10.4 (Tiger) • Safari 2.0.4 (Mac OS X 10.4.7)
• Mozilla Firefox 2.0

• Red Hat Linux Enterprise 5.0 • Mozilla Firefox 2.0

• SUSE Linux Enterprise Server 10 • Mozilla Firefox 2.0

PORTWISE.COM | INFO@PORTWISE.COM
08
PORTWISE 4.6
RELEASE NOTES

Client Requirements
Runtime requirements and supported platforms for PortWise clients are listed below.

PortWise Web
Runtime requirements for PortWise Web authentication method are listed per operating system in the table
below.

Operating System Requirement Runtime Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) Sun Java Runtime Environment 1.1.8 or later, or
• Microsoft Windows XP Professional (SP1, SP2) ActiveX Client
• Microsoft Windows 2003 Server (SP2)
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 Java, included in Mac OS X


• Apple Mac OS X 10.4 (Tiger)

• Red Hat Linux Enterprise 5.0 Sun Java Runtime Environment 1.1.8 or later

• SUSE Linux Enterprise Server 10 Sun Java Runtime Environment 1.1.8 or later

PORTWISE.COM | INFO@PORTWISE.COM
09
PORTWISE 4.6
RELEASE NOTES

PortWise Mobile ID
Runtime requirements for PortWise Mobile ID are listed per operating system in the table below.

Operating System Requirement Runtime Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) Sun Java Runtime Environment 1.5.0_12 or later
• Microsoft Windows XP Professional (SP1, SP2)
• Microsoft Windows 2003 Server (SP2)
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 Universal Application


• Apple Mac OS X 10.4 (Tiger)

Red Hat Linux Enterprise 5.0 Sun Java Runtime Environment 1.5.0_12 or later

SUSE Linux Enterprise Server 10 Sun Java Runtime Environment 1.5.0_12 or later

Any cellular phone with Java support • MIDP 1.0 or later


• CLDC 1.0 or later

Sony Ericsson P800/P900 PersonalJava

Pocket PC 2002/2003 Native Application

Palm OS 4.1/5.2.1 Native Application

Windows Mob ile Native Application

Blackberry/RIM Native Application

PORTWISE.COM | INFO@PORTWISE.COM
010
PORTWISE 4.6
RELEASE NOTES

PortWise Access Client


The requirements for PortWise Access Client are separated in two sections: platform requirements for the in-
stallable version of the client, and platform/runtime requirements for the downloadable version of the client.

NOTE: PortWise Access Point 4.6 IS NOT backward compatible with pre PortWise 4.6 Access Clients.
Users running pre PortWise 4.6 Access Clients will be asked to automatically upgrade their client.
PortWise is working on a solution for backward compatibility.

Dynamic Tunnels

Operating System Requirement Runtime Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) Native Application
• Microsoft Windows XP Professional (SP1, SP2)
• Microsoft Windows 2003 Server (SP2)
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

Statics Tunnels

Operating System Requirement Runtime Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) Sun Java Runtime Environment 1.1.8 or later, or
• Microsoft Windows XP Professional (SP1, SP2) ActiveX Client
• Microsoft Windows 2003 Server (SP2)
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

• Apple Mac OS X 10.3.9 Sun Java Runtime Environment 1.1.8 or later


• Apple Mac OS X 10.4 (Tiger)

• Red Hat Linux Enterprise 5.0 Sun Java Runtime Environment 1.1.8 or later

• SUSE Linux Enterprise Server 10 Sun Java Runtime Environment 1.1.8 or later

PORTWISE.COM | INFO@PORTWISE.COM
011
PORTWISE 4.6
RELEASE NOTES

PortWise End Point Integrity and Protection

Operating System Requirement Runtime Requirements


• Microsoft Windows XP Home Edition (SP1, SP2) Sun Java Runtime Environment 1.1.8 or later, or
• Microsoft Windows XP Professional (SP1, SP2) ActiveX Client
• Microsoft Windows 2003 Server (SP2)
• Microsoft Windows Vista Enterprise
• Microsoft Windows Vista Business
• Microsoft Windows Vista Home-premium

RESOLVED ISSUES
The following issues found in previous release have been resolved in PortWise 4.6.

PortWise Administration Service

#17776 The tabs are not displayed on edit tunnel resource network pages
#17780 Manage Users - admin should warn if user has more than one unique user atrribute
#17836 DNS forwarding with or without authentication
#17882 Can’t add two access rule items of different types to an reusable access rule
#17897 User session search is case sensitive
#17914 Citrix standard resource uses wrong cookies
#17957 Incorrect default value for group-search-rules (Active Directory)
#17965 Manage User Import - Imported users missing search rule in link
#17983 The search limit displaying users and groups should be configurable

PORTWISE.COM | INFO@PORTWISE.COM
012
PORTWISE 4.6
RELEASE NOTES

PortWise Administration Service (Contd.)

#18063 Manage Assessment - Admin displays ‘match’ when it should be ‘wildcard match’
#18077 Active Directory authentication method does not support userPrincipalName
#18078 Encoding towards RADIUS server is fixed
#18108 Standard Resources Filters do not accept variable input fields
#18109 Adding port 2598 to Citrix Standard Resource
#18110 When searching for a user session the search is case sensitive
#18115 Too long server certificate strings breaks line in admin
#18256 Not possible to delete DNS name from Access Point
#18260 F-secure can not be alone as antivirus
#18482 Impossible to add more than one pair of Mirrored Access Points
#18491 Sorting Resources is not supported
#18526 It doesnt work to list user sessions using ‘All’ mechanisms
#18537 Back-button re-creates session and grants access in Admin
#18553 Invalid time range in charts used in reporting
#18558 Can not remove user if Directory Link is broken
#18568 MenuItems without resource gives internal error in save web resource root
#18569 Citrix Standard Resource does not work
#18628 Delegated Super Administrator can not see Manage User Storages
#18647 Can not see notification by SMS in list although configured SMS channel

PortWise Access Point

#17880 Can’t add two access rule items of Assessment plugins


#18238 Access Client cannot handle more than one network resource at a time
#18472 Not possible to remove trusted commands in 4.5.3
#18561 Proxy detection with PAC script adds https:// in fron of host name
#18616 User variables doesn’t work in Tunnel Set configurations
#18782 Encrypted certificate private keys does not work

PortWise Authentication Service

#18071 Setting expiry time for passwords/PIN to 0 does not turn of expiry
#18073 PortWise Web Authentication Client renders double buttons
#18382 Policy Server stops responding possibly after Storage write problem
#18787 Incorrect branding for mID

PORTWISE.COM | INFO@PORTWISE.COM
013
PORTWISE 4.6
RELEASE NOTES

PortWise Policy Service

#17639 Active Directory authentication method does not support userPrincipalName


#17749 Encoding towards RADIUS server is fixed
#17763 Tcp and udp ports do not show up on Tunnel Resource Root
#17774 Internal Error when adding exception host to tunnel resource network
#17890 Error in sending SMS increases user login failed counter
#17953 Access Control Expression not updated when updating a user property group
#17958 Problem searching for users based on custom-attributes
#18091 Cannot set Multiple CA in BankID
#18368 Authorization may fail when using both tcp and udp tunnel resources
#18369 The Policy Server stops responding possibly after Storage write problem
#18372 The inactivity timeout isn’t reset after re-authentication
#18418 Nullpointer cause in Certificate method if no Directory Service is enabled
#18433 Automatic user linkning does not validate user password before linkning user
#18512 Policy Server fails to find tunnel resource due to IP conflict

PORTWISE.COM | INFO@PORTWISE.COM
014
PORTWISE 4.6
RELEASE NOTES

KNOWN ISSUES
Known issues in PortWise 4.6 are listed below. Brief descriptions and possible workaround are provided for
each known issue

PortWise Access Point


1. PortWise 4.6 Access Point is not backward compatible with pre PortWise 4.6 Access Clients
PortWise Access Clients for releases earlier than PortWise 4.6 cannot be used with PortWise 4.6
Access Points. A user will be asked to upgrade the client which can be done automatically. Since an
upgrade requires administration rights this can cause issues for users with non-administration
access.

2. SSL Cipher Suites with Windows Vista


To make Windows Vista run with PortWise server you must change the “Cipher Suites”
for the Access Point under “Manage Global Access Point Settings”, replace all default TLS 1.0/SSL v3
ciphers with the following;

RSA_DES_CBC_SHA
RSA_EXP_DES40_CBC_SHA
RSA_EXP_DES_CBC_SHA
RSA_EXP_RC2_CBC_40_MD5
RSA_EXP_RC2_CBC_56_MD5
RSA_EXP_RC4_40_MD5
RSA_EXP_RC4_56_MD5
RSA_EXP_RC4_56_SHA
RSA_RC4_128_MD5
RSA_RC4_128_SHA

3. Single Sign-on to Microsoft fileshares requires NTLM authentication


Single Sign-On to Windows Fileshare requires that the file server allows NTLM authentication. On
Windows 2003 servers, this can be configured by setting: Administrative Tools ->
Local Security Policy -> Local Policies -> Security Options -> “Microsoft network server: Digitally sign
communications (always)” to Disabled

4. Single Sign-on for Terminal Server does not support RDP over SSL
The RDP client must not be configured to use SSL encryption in order for Single Sign-on to work.
When utilizing the PortWise Access Client to provide RDP access, the SSL encryption is taken care of
by the Access Client.

5. It is not allowed to run tunnelled server/client applications on the same machine as the Access
Point
The Access Point can not provide a tunnel interface to applications that reside locally on the Access Point
machine.

PORTWISE.COM | INFO@PORTWISE.COM
015
PORTWISE 4.6
RELEASE NOTES

PortWise Access Client


1. PortWise 4.6 Access Client is not backward compatible with pre PortWise 4.6 Access Points
PortWise Access Clients for releases earlier than PortWise 4.6 cannot be used with PortWise 4.6
Access Points. A user will be asked to upgrade the client which can be done automatically. Since an
upgrade requires administration rights this can cause issues for users with non-administration
access.

2. Microsoft Windows Vista Personal Firewall


To use access client together with Vista local firewall, add an incoming rule for both the access client
and any server programs (on the client machine, for reverse traffic) you will be using via the VPN.

3. Access Client on Microsoft Windows Vista requires admin rights


The access client currently requires admin rights to run properly on Windows Vista

4. PortWise ActiveX Client Loader requirements


To run the ActiveX access client loader successfully with Windows Vista UAC you must add the access
point server https address to the list of trusted sites in Internet Explorer.

5. Drive letter mapping in Windows Vista


The use of a single drive letter (ex. “F:”), as a startup command, cannot be used in Vista since all
commands must be executed using “runas” to elevate to admin mode (since the mapping is done
in admin mode) and “F:” is not a valid executable. Use the startup command “explorer /root,F:”
instead, it will work on both XP and Vista.

PortWise End Point Integrity


1. Uploaded plug-ins must be updated
End Point Integrity plug-ins must be updated to PortWise 4.6. It is not possible to use plug-ins from
earlier releases.

PORTWISE.COM | INFO@PORTWISE.COM
016
PORTWISE 4.6
RELEASE NOTES

PORTWISE SUPPORT
Registering your product entitles you to technical support. Terms may vary depending on the country of
residence. For more information, refer to the technical support at http://www.portwise.com/support, or
contact your local sales representative

Document Revision History


Date Notes
September 13, 2007 First published
September 17, 2007 First revison, added known issues
September 19, 2007 Release version
September 20, 2007 Updated administrator build number
September 25 2007 Updated build numbers

PORTWISE.COM | INFO@PORTWISE.COM
017

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy