Release Notes for Cisco IoT Device Manager 5.6


Note

The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.


IoT Device Manager

Cisco IoT Device Manager (IoT-DM or Device Manager) is a Windows-based application that field technicians can use to manage the Cisco 1000 Series Connected Grid Routers (CGR 1000) running Cisco IOS, the Cisco 800 Series Industrial Integrated Services Routers (IR800), and the Cisco 500 Series WPAN Industrial Routers (IR500).

Cisco IoT-DM does not manage CGR 1000 routers running CG-OS.


Note

This application was previously named Cisco Connected Grid Device Manager (CG-DM).



Note

You must uninstall any instance of CG-DM Release 4.x or earlier, before you install IoT-DM 5.x on your laptop. The installer will not recognize the older installation given the different product name.


Cisco 1000 Series Connected Grid Routers (CGR 1000) are multi-service communications platforms designed for use in field area networks (FANs). The portfolio consists of two models–Cisco CGR 1240 and Cisco CGR 1120–both ruggedized to varying degrees for outdoor and indoor deployments. Both models are modular and support a wide range of communications interfaces such as 2G/3G/4G LTE, Ethernet, and WiFi. Device Manager connects to the CGR 1000 by using a secure Ethernet or WiFi link.

The Cisco 800 Series Industrial Integrated Services Routers are compact, ruggedized, Cisco IOS Software routers. They offer support for integrated 4G LTE wireless WAN (both 809 and 829 models) and wireless LAN capabilities (829 model only). Device Manager connects to the IR809 by using a secure Ethernet link, and to the IR829 by using a secure Ethernet or WiFi link. The IR809 must have IPv6 option enabled to connect with work order.

Cisco IR500 is a distribution automation (DA) gateway that provides secure IPv4/IPv6 connectivity over the IPv6-based Cisco Resilient Mesh (formerly known as CG-Mesh) to DA devices such as capacitor bank controllers, reclosers, or other SCADA devices. Device Manager connects to the IR500 directly over the laptop COM port.

For some activities on the CGR 1000, IR800, and IR500, IoT-DM connects to the Cisco IoT Field Network Director (Cisco IoT-FND).

Conventions

This document uses the following conventions.

Conventions

Indication

bold font

Commands and keywords and user-entered text appear in bold font.

italic font

Document titles, new or emphasized terms, and arguments for which you supply values are in italic font.

[ ]

Elements in square brackets are optional.

{x | y | z }

Required alternative keywords are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

courier font

Terminal sessions and information the system displays appear in courier font.

< >

Nonprinting characters such as passwords are in angle brackets.

[ ]

Default responses to system prompts are in square brackets.

!, #

An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.


Note

Means reader take note . Notes contain helpful suggestions or references to material not covered in the manual.

Caution

Means reader be careful. In this situation, you might perform an action that could result in equipment damage or loss of data.



DANGER

IMPORTANT SAFETY INSTRUCTIONSMeans danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device.SAVE THESE INSTRUCTIONS


Regulatory: Provided for additional information and to comply with regulatory and customer requirements.

New Features for This Release

The following new feature is supported in IoT-DM, Release 5.6:

  • Offline authorization for FTT—Introducing an authorization security procedure between IoT-DM FTT wireless console and target node (IR510) by using wireless console authorize TLV 342. This feature is supported on Cisco Resilient Mesh Release 6.2 and later.

For configuration details for the feature highlighted above, see Cisco IoT Device Manager Installation and Configuration User Guide, Release 5.x.

System Requirements

Laptop

  • Microsoft Windows 10 or Microsoft Windows 7 Enterprise.

  • 2 GHz or faster processor recommended.

  • 1 GB RAM minimum (for potential large log file processing).

  • WiFi or Ethernet interface.

  • 4 GB disk storage space.

  • Windows login enabled.

  • Utility-signed Certificate Authority (CA) and Client Certificate for router authentication (obtained from your network administrator).

  • Customer-specific IT security hardening to keep the Device Manager laptop secure.

CGR 1000

  • Cisco IOS Release 15.9(3)M1 or greater to support connectivity to the 4G LTE module.


Note

The CGR 1000 must run Cisco IOS Release 15.5(1)T1 or greater to support connectivity to the IR500.

IR800

  • Cisco IOS Release 15.9(3)M1 or greater.

IR500

  • Firmware version 6.2 (cg-mesh-dagw-6.2-6219-ir510-1bf449d.bin) or greater.

  • Cisco IOS Release 15.9(3)M1 or greater.

IoT-FND

  • Cisco IoT-FND Release 4.6 or greater.

Important Notes

Cisco IoT-DM does not support CGR 1000 routers running CG-OS.

Caveats

This section addresses the open caveats in this release and provides information on how to use the Bug Search Tool to find further details on those caveats. This section includes the following topics.

Accessing Bug Search Tool

You can use the Bug Search Tool to find information about caveats for this release, including a description of the problems and available workarounds. The Bug Search Tool lists both open and resolved caveats.

To access Bug Search Tool, you need the following items:

  • Internet connection

  • Web browser

  • Cisco.com user ID and password

To access the Bug Search Tool, enter the following URL:

https://tools.cisco.com/bugsearch/search

To access the Bug Search Tool to search on a specific caveat, enter the following URL:

https://tools.cisco.com/bugsearch/search/<BUGID>

Related Documentation