Guest

Cisco IP Solution Center

Release Notes for Cisco IP Solution Center, 4.1.2

  • Viewing Options

  • PDF (309.0 KB)
  • Feedback
Release Notes for Cisco IP Solution Center, 4.1.2

Table Of Contents

Release Notes for
Cisco IP Solution Center, 4.1.2

Contents

Introduction

System Recommendations

ISC Server Solaris Configuration for Solaris 10 Support

Network Devices and Related Software Supported

Problems Fixed in ISC 4.1.2

New and Changed Information in ISC 4.1.2

Cisco ME 6524 Ethernet Switch Supported by L2VPN and Metro Ethernet Services

Ethernet QoS Support for Cisco ME 3400 Series Ethernet Access Switches

L2VPN Access to MPLS for Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches

L2VPN EWS Hybrid Support

ME QoS Policy Support on SVIs, Interfaces, and Subinterfaces on the Cisco 6500 Series and Cisco 7600 Series Routers Acting as a U-PE and N-PE

MFR Support for MPLS

Solaris 10 Supported

Installation Notes

Version Supported

Upgrade Paths

Uninstall

Important Notes

Known Problems in ISC 4.1.2

Obtaining Documentation

Cisco.com

Product Documentation DVD

Ordering Documentation

Documentation Feedback

Cisco Product Security Overview

Reporting Security Problems in Cisco Products

Product Alerts and Field Notices

Obtaining Technical Assistance

Cisco Technical Support & Documentation Website

Submitting a Service Request

Definitions of Service Request Severity

Obtaining Additional Publications and Information


Release Notes for
Cisco IP Solution Center, 4.1.2


June 27, 2007

All documentation, including this Release Notes for Cisco IP Solution Center, 4.1.2 document and any or all of the parts of the Release 4.1 documentation set: http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1 and Release Notes for Cisco IP Solution Center, 4.1.1 (http://www.cisco.com/en/US/products/sw/netmgtsw/ps4748/prod_release_note09186a00806ae8ea.
html
), might be upgraded.

Cisco IP Solution Center software is referred to as ISC.

This document gives you an overview of this maintenance release and helps you understand what has changed since ISC 4.1.1. Please read this document prior to reading any other manual for ISC.

Contents

The information in this document is organized into the following sections:

Contents

Introduction

System Recommendations

Problems Fixed in ISC 4.1.2

New and Changed Information in ISC 4.1.2

Installation Notes

Important Notes

Known Problems in ISC 4.1.2

Obtaining Documentation

Documentation Feedback

Cisco Product Security Overview

Product Alerts and Field Notices

Obtaining Technical Assistance

Obtaining Additional Publications and Information

Introduction

Cisco IP Solution Center (ISC) 4.1.2 is a maintenance release for ISC 4.1, which includes Cisco MPLS Diagnostics Expert (MDE) 1.0.2. The system recommendations for ISC 4.1.2 are based on those for ISC 4.1.1. To see these system recommendations, go to the "System Recommendations" section.

URLs for base information about ISC 4.1 and an overview and suggested reading order of these documents is given in Cisco IP Solution Center Getting Started and Documentation Guide, 4.1. (http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/docguide/index.htm)

Customer-found problems that were found in ISC 4.1.1 and fixed in this maintenance release are documented in the "Problems Fixed in ISC 4.1.2" section. Some of the problems resulted in product enhancements and behavioral changes. The changes are highlighted in the "New and Changed Information in ISC 4.1.2" section.

Steps for installing ISC 4.1.2 are found in the "Installation Notes" section, and other important information is found in the "Important Notes" section. For problems that were found and might still exist in ISC 4.1.2, see the URL in the "Known Problems in ISC 4.1.2" section.

System Recommendations

The system recommendations and requirements are listed in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm.

The recommendation is to thoroughly review this information before even planning your installation, to be sure you have all the hardware and software you must successfully install.

Due to the additional support of Solaris 10 in ISC 4.1.2, the section ISC Server Solaris Configuration in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1 remains valid and the additional information for Solaris 10 is specified in ISC Server Solaris Configuration for Solaris 10 Support in this document.

Network devices supported in ISC 4.1.2 are listed with the tested IOS release in the section, Network Devices and Related Software Supported in this document.

ISC Server Solaris Configuration for Solaris 10 Support

This section is in addition to the section ISC Server Solaris Configuration for Solaris 8 support in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1.

Solaris 10 with recommended patches of at least 118822-25 for the kernel level of the patch cluster and JDK 1.4.2_08 patches are found at: http://sunsolve.sun.com. As a minimum, you must get your system up to the 118822-25 Kernel patch level. For installation instructions, see the README file which is at the same location as the patch bundle.

Table 1, "Solaris Software Requirements," explains the Solaris requirements.

Table 1 Solaris Software Requirements

Requirements
Description

Solaris 10

Install Solaris 10 on the Sun server following these guidelines:

Full Distribution—Install the full distribution, which includes the following required packages. If you did not install the full distribution, you can install these packages at any time.

SUNWlldap—LDAP libraries

SUNWbzip—The bzip compression utility

To check if your installation includes these packages, enter:

pkginfo package

where: package is one of the three packages listed above.



Note When you install Solaris 10, be sure to choose either the Developer Solaris Support Group or the Entire Solaris Software Group. Do not choose the End User System software group. The Developer System Support and Entire Distribution software groups contain the software required for a correct operating system installation (such as the SUNWbtool and SUNWsprot packages).



Caution Make sure that the file descriptor limit is not set in the ISC workstation login shell file (which can be the  .login file, the  .cshrc file, the . profile file, or the  .kshrc file). If the login shell file contains a line with the ulimit -n command (for example, " ulimit -n <number>"), comment out this command line in the file. Log out and then log back in to ensure that the ulimit is no longer set.

ISC cannot override the file descriptor limitation setting in the login shell file. If the value is set incorrectly, ISC might experience operational problems.

Network Devices and Related Software Supported

Table 2, "Network Devices and Related Software Supported with ISC 4.1.2," in this document replaces Table 1-3 in Cisco IP Solution Center Installation Guide, 4.1 (http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/bookinst.pdf)
and Table 1 in Release Notes for Cisco IP Solution Center, 4.1.1 (http://www.cisco.com/en/US/products/sw/netmgtsw/ps4748/prod_release_note09186a00806ae8ea.
html
).

This new table gives all the current information listed alphabetically, beginning with the application name.

Table 2 Network Devices and Related Software Supported with ISC 4.1.2 

Application
P and PE Network Devices, Exceptions Noted
ISC Supported with Specified Software

L2TPv3

Cisco 7200 Series Routers

Cisco IOS 12.2(27) SBB

Cisco 7500 Series Routers

Cisco IOS 12.2(27) SBB

Cisco 12000 Gigabit Switch Router (GSR) Series Routers

Cisco IOS 12.0(31) S

L2VPN

Cisco Catalyst 2950 Series Switches, U-PE

Cisco IOS 12.1(22) EA1

Cisco ME 3400 Series Ethernet Access Switches, PE-AGG and U-PE

Cisco IOS 12.2(25) SEG

Cisco Catalyst 3550 Series Switches, PE-AGG and U-PE

Cisco IOS 12.1(22) EA1

Cisco Catalyst 3750 ME Series Switch, N-PE, PE-AGG, and U-PE

Cisco IOS 12.2(25) EY

Cisco Catalyst 4500 Series Switches, PE-AGG and U-PE

Cisco IOS 12.2(25) EWA

Cisco Catalyst 6500 Series Switches, N-PE, PE-AGG, and U-PE

Cisco IOS 12.2(18) SXF

Cisco ME 6524 Ethernet Switch, PE-AGG and U-PE

Cisco IOS 12.2(25) EX

Cisco 7200 Series Routers, N-PE

Cisco IOS 12.2(28) SB

Cisco 7600 Series Routers, N-PE, PE-AGG, and U-PE

Cisco IOS 12.2(33) SRA

Cisco 12000 (GSR) Series Routers, N-PE

Cisco IOS 12.0(32) SY

MPLS

Cisco 2800 Integrated Service
Routers (ISR) Series Routers

Cisco IOS 12.3(14) T

Cisco ME 3400 Series Ethernet Access Switches, PE-AGG and U-PE

Cisco IOS 12.2(25) SEG

Cisco Catalyst 3750 ME Series Switch, Multi-VRF CE

Cisco IOS 12.2(25) EYa

Cisco 3800 (ISR) Series Routers

Cisco IOS 12.3(14) T

Cisco Catalyst 4500 Series Switches, U-PE

Cisco IOS 12.2(25) EWA

Cisco 7200 Series Routers

Cisco IOS 12.2(28) SB

Cisco 7400 Series Routers, Multi-VRF CE

Cisco IOS 12.2(4) B3

Cisco 7500 Series Routers

Cisco IOS 12.2(28) SB

Cisco 7600 Series Routers

Cisco IOS 12.2(33) SRA

Cisco 10000 Edge Services Router (ESR) Series Routers

Cisco IOS 12.2(28) SB

Cisco 12000 (GSR) Series Routers

Cisco IOS 12.0(32) SY

Using EIGRP

Cisco IOS 12.0(31) S

MPLS Diagnostics Expert (MDE)

Cisco 7200 Series Routers

Cisco IOS 12.0(30) S1 and 12.2(28) SB

Cisco 7200 Series Routers, as PE only

Cisco IOS 12.3(10) e and 12.3(13) b

Cisco 7300 Series Routers

Cisco IOS 12.2(28) SB

Cisco 7300 Series Routers, as PE only

Cisco IOS 12.2(20) S9 and 12.2(25) S4

Cisco 7500 Series Routers

Cisco IOS 12.0(30) S1 and 12.2(28) SB

Cisco 7500 Series Routers, as PE only

Cisco IOS 12.2(18) S10

Cisco 7600 Series Routers

Cisco IOS 12.2(18) SXE and 12.2(18) SXF

Cisco 10000 (ESR) Series Routers, as PE only

Cisco IOS 12.2(28) SB and 12.3(7) X17a

Cisco 12000 (GSR) Series Routers

Cisco IOS 12.0(30) S1

QoS (Ethernet QoS)

Cisco ME 3400 Series Ethernet Access Switches, as U-PE only

Cisco IOS 12.2(25) SEG

Cisco Catalyst 3550 Series Switches

Cisco IOS 12.1(22) EA1a

Cisco Catalyst 3750 ME Series Switch

Cisco IOS 12.2(25) EYa

Catalyst 6500 Series Routers and Cisco 7600 Series Routers

Cisco IOS 12.2(33) SRA

QoS (IP QoS)

As a CE on Cisco 800, 1700, 2600, 3600, 3745, and 7200 Series Routers

Cisco IOS 12.3(5)

Cisco 2800 (ISR) Series Routers and Cisco 3800 (ISR) Series Routers (PE and CE)

Cisco IOS 12.3(14) T

Cisco 7200 Series Routers

Cisco IOS 12.2(28) SB

Cisco 7500 Series Routers

Cisco IOS 12.2(28) SB

Cisco 7600 Series Routers

Cisco IOS 12.2(33) SRA

Cisco 10000 (ESR) Series Routers

Cisco IOS 12.2(28) SB

Cisco 12000 (GSR) Series Routers

Cisco IOS 12.0(32) SY

Cisco Router Processor Model-PR (RPM-PR)

Cisco IOS 12.3(3)

Traffic Engineering Management (TEM)

Cisco 7200 Series Routers, in core

Cisco IOS 12.0(32) S

Cisco 7200 Series Routers, on edge

Cisco IOS 12.2(28) SB

Cisco 7500 Series Routers, in core

Cisco IOS 12.0(27) S4

Cisco 7600 Series Routers, in core

Cisco IOS 12.2(18) SXF

Cisco 10000 (ESR) Series Routers, in core

Cisco IOS 12.0(30) S3

Cisco 10000 (ESR) Series Routers, on edge

Cisco IOS 12.2(28) SB

Cisco 12000 (GSR) Series Routers, in core

Cisco IOS 12.0(32) S and Cisco IOS-XR 3.2

Cisco Carrier Routing System-1 (CRS-1) Series Routers

Cisco IOS-XR 3.2


Problems Fixed in ISC 4.1.2

Table 3, "Customer-found Problems Fixed in ISC 4.1.2," describes all the customer-found problems that were fixed in this maintenance release.

Table 3 Customer-found Problems Fixed in ISC 4.1.2 

CDETS Number
Subject

CSCsc57575

PE or multi-VPN routing and forwarding tables CE (MVRFCE) Service Request causes BGP loops due to as-override.

CSCsd98226

Template Manager Role Based Access Control (RBAC) response for non-Admin performance is unacceptable.

CSCsd98314

Query of data files has a very slow response.

CSCse01322

L3VPN Multi-link Frame Relay interface is not configured with VPN routing/forwarding instance (VRF).

CSCse30494

Cisco Discovery Protocol (CDP) device discovery failed.

CSCse42213

Traffic Engineering (TE) Discovery is unable to discover new nodes after migration.

CSCse49340

Audit fails when static route is applied in MVRFCE through templates.

CSCse49681

Platform information should not be set to null, if show version parsing failed.

CSCse50115

Lack of platform information should not default to the Cisco 7200; this breaks services.

CSCse54213

Failed Audit occurs when deploying Static Route for a PE-NO-CE policy.

CSCse57518

Invalid virtual channel identifier (VCI) value generated when using 32 as the VCI value.

CSCse66863

Config Audit failed on the Cisco with IOS 12.2(17) when issuing xconnect.

CSCse69807

Named Physical Circuit (NPC) Discovery hangs when multiple parallel links are used in rings.

CSCse69810

When Named Physical Circuit (NPC) is chosen with port-channel, User-Network Interface (UNI) parameters are removed from the graphical user interface (GUI).

CSCse70649

Attaching a template to a Service Request causes an internal exception.

CSCse77420

Ethernet QoS policy for User-Network Interface (UNI) parameters are removed from the graphical user interface (GUI).

CSCse81407

Collect Config failure with ASA Error -196.

CSCse82816

changeMaxRoute script needs to be enhanced to remove the Max Routes.

CSCsf06715

All customers are not copied from ISC into the scratch pad.


New and Changed Information in ISC 4.1.2

The following are enhancement and changed behavior topics for this ISC Release 4.1.2 (listed alphabetically):

Cisco ME 6524 Ethernet Switch Supported by L2VPN and Metro Ethernet Services

Ethernet QoS Support for Cisco ME 3400 Series Ethernet Access Switches

L2VPN Access to MPLS for Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches

L2VPN EWS Hybrid Support

ME QoS Policy Support on SVIs, Interfaces, and Subinterfaces on the Cisco 6500 Series and Cisco 7600 Series Routers Acting as a U-PE and N-PE

MFR Support for MPLS

Solaris 10 Supported

Cisco ME 6524 Ethernet Switch Supported by L2VPN and Metro Ethernet Services

For L2VPN and Metro Ethernet, the Cisco ME 6524 Ethernet Switch is only supported as a PE-AGG and U-PE, not as an N-PE.

Ethernet QoS Support for Cisco ME 3400 Series Ethernet Access Switches

Ethernet QoS now supports the Per Port Per VLAN (PPPV) feature on the Cisco ME 3400 Series Ethernet Access Switches on Cisco IOS 12.2(25) SEG, acting as a U-PE. Due to the platform limitation, this PPPV feature on the Cisco ME 3400 Series Ethernet Access Switches is applicable for Ethernet Relay Service (ERS) and Ethernet Relay Multi-point Service (ERMS) only. For Ethernet Private Line (Ethernet Wire Service (EWS) and Ethernet Multi-point Service (EMS)) the QoS policy is per port only.

The ISC Service Policy screen (Service Design > Policies) includes a set of predefined Ethernet QoS policies. For ERS and ERMS, the predefined policies are 3400-COS and 3400-DSCP. For EWS and EMS, the predefined policy is 3400-EWS. These are provided so you can copy these for your use or use these as a base and modify some of the attribute values for your use.

L2VPN Access to MPLS for Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches

This release now supports Layer 2 access into MPLS for the Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches. Specifically, for the Cisco ME 3400 Series Ethernet Access Switches, the shared virtual local-area network (VLAN) function, the User-Network Interface (UNI), and the secure Media Access Control (MAC) address limit range are now fully supported. And for the Cisco Catalyst 4500 Series Switches, the non-negotiate option was added for the link speed for the PE-AGG and U-PE UNI.

L2VPN EWS Hybrid Support

Previously, the only Layer2 VPN support for Ethernet Wire Service (EWS) was from EWS to EWS. For this release, support is also from EWS to Network to Network Interface (NNI) as a trunk port. To create this new type of Service Request, you need to create an EWS hybrid policy by unchecking the standard UNI flag. When using the EWS hybrid policy for Service Request creation, for the EWS side of the connection, check the standard UNI flag, for the NNI side of the connection, the standard UNI flag must remain unchecked.

Ethernet QoS is also available for EWS hybrid for the Cisco ME 3400 Series Ethernet Access Switches and the Cisco Catalyst 3550 Series Switches.

ME QoS Policy Support on SVIs, Interfaces, and Subinterfaces on the Cisco 6500 Series and Cisco 7600 Series Routers Acting as a U-PE and N-PE

In compliance with Broadband Model 4A for Cisco 6500 Series or Cisco 7600 Series Routers acting as a U-PE and N-PE, generated Metro Ethernet (ME) QoS policies can be attached to the actual Layer 3 interface or subinterface. To do this, navigate Service Design > Policies > L2VPN Policy and in the L2VPN (Point To Point) Policy Editor window, uncheck the N-PE pseudo-wire on SVI check box.

Previously in ISC, the ME QoS policy was always attached to the Software Virtual Interface (SVI).

MFR Support for MPLS

Previous versions of ISC included Layer 2 support of Multi-link Frame Relay (MFR). In this release, ISC now supports the MFR as a virtual interface during MPLS VPN provisioning.

Solaris 10 Supported

In this ISC 4.1.2 release, Solaris 10 is supported in addition to Solaris 8. Details are provided in ISC Server Solaris Configuration for Solaris 10 Support.

Installation Notes

This section contains the following information:

Version Supported

Upgrade Paths

Uninstall

Version Supported

ISC 4.1.2 supports upgrading from ISC 3.2.2, 3.2.2.3, 3.2.2.5, 4.0, 4.0.1, 4.1, or 4.1.1, after ISC 4.1 is installed.

If you have an existing VPNSC 1.x or 2.x repository, you must migrate it to be able to use it with ISC 4.1. Get the migration package, including the documentation that lists limitations, from isc-mktg@cisco.com.

Upgrade Paths

You must have ISC 4.1 or 4.1 plus 4.1.1 installed before you download the software to upgrade to ISC 4.1.2 on the same server. Support for upgrading from 1SC 3.2.2, 3.2.2.3, 3.2.2.5, 4.0, or 4.0.1 to 4.1 is explained in Cisco IP Solution Center Installation Guide, 4.1.


Note If you are upgrading from an ISC release prior to ISC 4.1 and have an external Oracle database, you must upgrade your database to Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - 64bit Production
with the Partitioning, OLAP, and Data Mining options.


Then follow these steps:


Step 1 Before upgrading to this Maintenance Release, complete the discovery workflow. Otherwise, when you upgrade these previously initiated discovery workflows, the data discovered during that process might be lost.

Step 2 Before proceeding to install the ISC 4.1.2 Maintenance Release, be sure to back up your repository, as explained in Appendix C of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm


Note If you need to revert to your prior version of ISC, this backed up repository is the one you need to point to after uninstalling ISC 4.1.2. When you uninstall ISC 4.1.2, you do not remove modifications made to the repository in Step 11. Any Service Requests provisioned under ISC 4.1.2 will then need to be reprovisioned.


Step 3 Go to http://www.cisco.com/cgi-bin/tablebuild.pl/isc (where, in tablebuild.pl, the last character is the lower-case letter "l") to retrieve the ISC 4.1.2 Maintenance Release (isc-4.1.2-maint.tar.gz) and the database schema upgrade package (ISC412_UpgradeTool.tar.gz).


Note Patches that use ISC 4.1.2 as the base will also be located at http://www.cisco.com/cgi-bin/tablebuild.pl/isc


Step 4 Prior to installing the ISC 4.1.2 Maintenance Release, verify that you have 100 MB of free space in the $ISC_HOME directory and that you are logged in with the same username as the owner of your supported version of ISC.

Step 5 Navigate to a directory other than $ISC_HOME.

Step 6 Use the following command to untar and unzip the appropriate isc-4.1.2-maint.tar.gz file:

gunzip -c isc-4.1.2-maint.tar.gz | tar xf -

Step 7 If ISC is running, use the following command to stop the database, name server, and WatchDog on the machine on which it is running:

$ stopall

Step 8 If you are running on ISC 3.2.2,3.2.2.3, 3.2.2.5, 4.0, or 4.0.1, install ISC 4.1, as documented in Cisco IP Solution Center Installation Guide, 4.1.


Note Prior to installing ISC 4.1, if you are moving a repository from one machine to another, the schema upgrade fails unless the repository has been initialized on the new machine. This requires that you successfully run initdb.sh on the repository to update the host entry.

Thus, when you are upgrading from an ISC version prior to ISC 4.0.1, you must have a running ISC installation on your new machine that is the same version as that on your old machine so that initdb.sh can be used to initialize your repository with the correct hostname.


Step 9 Use the following command to run the patch installation script:

$ ./iscpatchinstall

a. When you run this script, you will be asked to ensure that you have followed the equivalent of Step 7, and as part of the installation, you will be asked to confirm the equivalent of Step 4.

b. To accept the default value for a prompt indicated in [ ], for example, [n] or [y], press Enter. To terminate the installer at any time, press Ctrl-C. Specifically you will be asked to enter a new path or press Enter for the default [/opt/isc-4.1].

c. At the end of the installation, you will receive a message that the patch installation is complete.

Step 10 Use the following command on the ISC server to untar and unzip the database schema upgrade package:

gunzip -c ISC412_UpgradeTool.tar.gz | tar xf -

The directory ISC412_UpgradeTool is created. Before you proceed, read the README file that is located in this directory.

Step 11 Use the following commands on the ISC server to use the upgrade tool:

cd ISC412_UpgradeTool

./upgradeISCSchema.sh <full path of ISC_HOME>

The log messages are printed on the window and written in the log file contained in the log directory under the directory ISC412_UpgradeTool.

Step 12 If you choose to uninstall this patch after successfully installing, follow the steps in the "Uninstall" section.


Note For all Cisco 7600 Series Routers, you must do a config collection to synchronize the Service Requests in the repository. This is needed because ISC changed the way it detects Cisco 7600 Series Routers hardware information.



Uninstall

To uninstall the ISC 4.1.2 Maintenance Release that was successfully installed by following the steps in the "Upgrade Paths" section, follow these steps:


Step 1 Log in with the same username as the owner of ISC.

Step 2 If ISC 4.1.2 is running, use the following command to stop the database, name server, and WatchDog on the machine on which it is running:

$ stopall

Step 3 Navigate to the directory $ISC_HOME/patch/isc4.1.2.0-patch, where all the files replaced by the ISC 4.1.2 Maintenance Release were stored.

Step 4 Use the following command to run the patch script to uninstall:

$ ./iscpatchrollback

a. When you run this script, you will be asked to ensure that you have followed the equivalent of Step 1 and Step 2.

b. To accept the default value for a prompt indicated in [ ], for example, [n] or [y], press Enter. To terminate the installer at any time, press Ctrl-C.

c. At the end of the uninstall, you will receive a message that the patch rollback is complete.

Step 5 Restore the repository that you backed up in Step 2 of the "Upgrade Paths" section, as explained in Appendix C of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm


Note When you uninstall ISC 4.1.2, you do not remove modifications made to the repository. Any Service Requests provisioned under ISC 4.1.2 will then need to be reprovisioned.



Important Notes

1. All ISC patches are available at: http://www.cisco.com/cgi-bin/tablebuild.pl/isc

2. The supported Sybase and Oracle databases behave differently. All GUI queries are case-insensitive for Sybase and case-sensitive for Oracle.

3. ISC does not work with pop-up blockers in a web browser. If you have pop-up blockers installed, disable them.

4. When using an external Oracle database, the embedded Sybase database is still automatically launched for SLA support.

5. For all APIs, the Service Request name is unique and therefore, each Create Service Request API call needs to maintain this uniqueness.

Known Problems in ISC 4.1.2

To find known problems in Cisco IP Solution Center, use the following URL:

http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl

You must log into CCO.

You can search for specific bugs or search for a range by product name. This tool enables you to query for keywords, severity, range, or version.

The results display bug ID and title, found-in version, fixed-in version, and status. The bug ID is a hyperlink to detailed information for the bug ID's product, component, severity, first found-in, and release notes.

The results could be displayed in a feature matrix or spreadsheet.

Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.

Cisco.com

You can access the most current Cisco documentation at this URL:

http://www.cisco.com/techsupport

You can access the Cisco website at this URL:

http://www.cisco.com

You can access international Cisco websites at this URL:

http://www.cisco.com/public/countries_languages.shtml

Product Documentation DVD

The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:

http://www.cisco.com/univercd/home/home.htm

The Product Documentation DVD is created monthly and is released in the middle of the month. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

Ordering Documentation

You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

If you do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do

Documentation Feedback

You can provide feedback about Cisco technical documentation on the Cisco Technical Support & Documentation site area by entering your comments in the feedback form available in every online document.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

From this site, you will find information about how to do the following:

Report security vulnerabilities in Cisco products

Obtain assistance with security incidents that involve Cisco products

Register to receive security information from Cisco

A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:

http://www.cisco.com/go/psirt

To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:

http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:

For emergencies only — security-alert@cisco.com

An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

For nonemergencies — psirt@cisco.com

In an emergency, you can also reach PSIRT by telephone:

1 877 228-7302

1 408 525-6532


Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.

Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

The link on this page has the current PGP key ID in use.

If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.


Product Alerts and Field Notices

Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive Cisco Product Alerts and Cisco Field Notices by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.

To access the Product Alert Tool, you must be a registered Cisco.com user. (To register as a Cisco.com user, go to this URL: http://tools.cisco.com/RPF/register/register.do) Registered users can access the tool at this URL: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en

Obtaining Technical Assistance

Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.

Cisco Technical Support & Documentation Website

The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:

http://www.cisco.com/techsupport

Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do


Note Use the Cisco Product Identification Tool to locate your product serial number before submitting a request for service online or by phone. You can access this tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.



Tip Displaying and Searching on Cisco.com

If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.

To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. On the Cisco.com home page, click the Advanced Search link under the Search box and then click the Technical Support & Documentation.radio button.

To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.


Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:

http://www.cisco.com/techsupport/servicerequest

For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

To open a service request by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411
Australia: 1 800 805 227
EMEA: +32 2 704 55 55
USA: 1 800 553 2447

For a complete list of Cisco TAC contacts, go to this URL:

http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

Severity 1 (S1)—An existing network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:

http://www.cisco.com/go/guide

Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:

http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training, and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:

http://www.ciscopress.com

Packet magazine is the magazine for Cisco networking professionals. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can subscribe to Packet magazine at this URL:

http://www.cisco.com/packet

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/ipj

Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL:

http://www.cisco.com/en/US/products/index.html

Networking Professionals Connection is an interactive website where networking professionals share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:

http://www.cisco.com/discuss/networking

"What's New in Cisco Documentation" is an online publication that provides information about the latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of "What's New in Cisco Documentation" at this URL:

http://www.cisco.com/univercd/cc/td/doc/abtunicd/136957.htm

World-class networking training is available from Cisco. You can view current offerings at this URL:

http://www.cisco.com/en/US/learning/index.html