Guest

Cisco Unified IP Phone 7900 Series

Cisco IP Phone 7905G (H.323) Release Notes for Firmware Release 1.0(1)

  • Viewing Options

  • PDF (206.0 KB)
  • Feedback
Release Notes for Cisco IP Phone 7905G for H.323, Version 1.0(1)

Table Of Contents

Release Notes for Cisco IP Phone 7905G for H.323, Version 1.0(1)

What's New

Installing Required Firmware for the Cisco IP Phone

Related Documentation

Resolved Defects

Obtaining Documentation

Cisco.com

Ordering Documentation

Documentation Feedback

Obtaining Technical Assistance

Cisco TAC Website

Opening a TAC Case

TAC Case Priority Definitions

Obtaining Additional Publications and Information


Release Notes for Cisco IP Phone 7905G for H.323, Version 1.0(1)


These release notes are for use with the Cisco IP Phone 7905G for H.323 running firmware version 1.0(1).

These release notes include the following sections:

What's New

Installing Required Firmware for the Cisco IP Phone

Related Documentation

Resolved Defects

Obtaining Documentation

Obtaining Technical Assistance

Obtaining Additional Publications and Information

What's New

This release includes the new EncryptKeyEx configuration parameter. This parameter provides a stronger profile encryption key than the previous EncryptKey parameter.

The syntax for the EncryptKeyEx parameter is as follows:

EncryptKeyEx:RC4key[/mac_address]

where:

RC4key is the RC4 encryption key, specified as a hex string of 1 to 64 characters.

/mac_address is the optional six-byte MAC address of the phone that will download the profile. You can use this option to allow only a certain phone to download a profile. This optional MAC address is preceded by a slash (/).

To use the EncryptKeyEx parameter, you must create a new profile that can encrypted and decrypted by this parameter.

If the EncryptKeyEx parameter is set to 0:

When the phone powers up, it will make a request to the TFTP server for the configuration profile ldmac_address (where mac_address is the MAC address of the phone), or for the value specified in the DHCP bootfile option field if one is provided.

The value of the EncryptKey (if nonzero) will be used to encrypt the profile.

If the EncryptKeyEx parameter is set to a nonzero value:

When the phone powers up, it will make a request to the TFTP server for the configuration profile ldmac_address.x (where mac_address is the MAC address of the phone)

The value of EncryptKeyEx will be used to encrypt the profile.

To generate the profile for the EncryptKeyEx format, you must download and use the cfgfmt tool version 2.1a. This tool will create two configuration profiles, one in the ldmac_address format and one in the ldmac_address.x format.

The EncryptKeyEx parameter can be set through the web page configuration method or through the more scalable TFTP provisioning method.

Example 1

For this example, assume that:

A new phone has a firmware version earlier than 1.0(1)

The phone needs to upgrade to firmware version 1.0(1)

The phone needs to use EncryptKeyEx to encrypt its profile.

The MAC address of the phone is 102030405060:

To upgrade this example phone and use the EncryptKeyEx parameter, follow these steps:

1. Create a new profile from the sccp_example.txt profile file. Name the new profile ld102030405060.txt.

2. Modify ld102030405060.txt with the appropriate parameter values.

Keep EncryptKey value as 0 since the phone does not yet have an EncryptKey value.

Set the EncryptKeyEx parameter to the desired encryption key for the profile. You can also optionally restrict the EncryptKeyEx value to be applicable only to the phone with a particular MAC address. For example, if the desired key value is 231e2a7f10bd7fe, specify EncryptKeyEx as:

EncryptKeyEx:231e2a7f10bd7fe/102030405060

3. Update the upgradecode parameter to instruct phone to upgrade to firmware version 1.0(1) through TFTP configuration. For example:

upgradecode:3,0x301,0x400,0x200,0,69,0x030909a,CP7905010202SCCP031217B.sbin

4. Run the cfgfmt tool as follows:

cfgfmt -g phone102030405060.txt ld102030405060

This command will generate the files ld102030405060 and ld102030405060.x. The file ld102030405060 is unencrypted.


Note Certain parameters, specified in the ptag.dat file used by cfgfmt tool, are marked as sensitive information. These parameters include UIPassword, UID, and PWD0. Those parameters are not included in the ld102030405060 file because the -g switch is specified.


The file ld102030405060.x is encrypted with EncryptKeyEx value.

Place these two files in the TFTP server that the phone will contact for its profile.

When the phone powers up, it will obtain its IP from the DHCP server. If the DHCP server specifies the TFTP server address, the phone will contact the TFTP server obtained from DHCP because it is not preconfigured with a TFTP server address. The boot process will be as follows:

Download ld102030405060

Apply parameter values in the ld102030405060 file to the phone, but ignore the EncryptKeyEx parameter (because the older firmware in the phone phone does not understand the EncryptKeyEx parameter).

Upgrade to the 1.0(1) firmware load

reboot

Download the ld102030405060 file

Apply EncryptKeyEx value to the phone

Reboot

Provision EncryptKeyEx so from now on, the phone will download the ld102030405060.x file at each time it reboots or requests a new configuration file.

Although the EncryptKeyEx is encrypted in the ldmac_address file and the ldmac_address file does not contain other sensitive information, for absolute safety, Cisco recommends that you preprovision the phone this way in a private network or remove the ldmac_address file after EncryptKeyEx is provisioned.

Example 2

For this example, assume that:

A new phone is already deployed with the EncryptKey value set

The a firmware version earlier than 1.0(1)

The phone needs to upgrade to firmware version 1.0(1)

The phone needs to use EncryptKeyEx to encrypt its profile.

To upgrade this example phone and use the EncryptKeyEx parameter, follow the steps in Example 1, with the following exception:

In Step 1, make the new EncryptKey value equal to the previously provisioned EncryptKey value. The phone expects the ldmac_address file to be encrypted with EncryptKey and must use this key to decode the ldmac_address file and begin using the ldmac_addres.x file encrypted with EncryptKeyEx.

Installing Required Firmware for the Cisco IP Phone

Before using the Cisco IP Phone 7905G for H.323, you must install the latest firmware image on the phone. For instructions, refer to Cisco IP Phone 7905G Administration Guide for H.323.

The firmware image names are:

CP7905010001H323031212A.sbin

CP7905010001H323031212A.zup


Note A firmware image can contain a signature that allows a phone to verify the authenticity of the image. A firmware image with such a signature has the extension .sbin. A firmware image without such a signature has the extension .zup. For the Cisco IP Phone 7905G, you should obtain both the .sbin version and the latest .zup version of a firmware image. After a phone upgrades to the latest .zup firmware image, it will request .sbin firmware images for future firmware upgrades. If a phone upgrades to the latest .zup firmware image, the phone cannot be upgraded or downgraded to any other .zup firmware image. In addition, a phone cannot be downgraded from a .sbin firmware image to a .zup firmware image.


Related Documentation

For more information about Cisco IP Phones, refer to the following publications, which are available at this URL:

http://www.cisco.com/univercd/cc/td/doc/product/voice/c_ipphon/index.htm

Cisco IP Phone 7905G Administration Guide for H.323

At a Glance Cisco IP Phone Model 7905G

Regulatory Compliance and Safety Information for the Cisco IP Phone 7900 Series

Resolved Defects

This section contains a list of severity 1 through severity 3 defects that were resolved in this release.

You can search for more information about these and other resolved defects using the Cisco bug tracking system tool, called Bug Navigator II.

To access Bug Navigator II, perform one of the following actions:

Go to this URL: http://www.cisco.com/support/bugtools

Log in to Cisco.com, click Technical Support, then click Tools & Utilities, then click Software Bug Toolkit under Troubleshooting Tools.


Defect Number: CSCec77152

Severity Level: 2

Headline: 7905 phone does not respond after receiving invalid packet


Defect Number: CSCdz37938

Severity Level: 3

Headline: 7905 IP Phone does not mark QOS on H.323 signaling packets


Defect Number: CSCec05034

Severity Level: 3

Headline: 7905G does not handle ReleaseComplete(102) correctly


Defect Number: CSCec42596

Severity Level: 3

Headline: rc4 encryption of config files not working properly


Defect Number: CSCed21895

Severity Level: 3

Headline: H323:7905 rings when press Answr softkey to answer call waiting call


Defect Number: CSCed23077

Severity Level: 3

Headline: H323/7905: No Select & Back softkeys displayed for Missed Calls log


Defect Number: CSCed23155

Severity Level: 3

Headline: H323/7905: No busy tone played when calls a busy number


Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com/univercd/home/home.htm

You can access the Cisco website at this URL:

http://www.cisco.com

International Cisco websites can be accessed from this URL:

http://www.cisco.com/public/countries_languages.shtml

Ordering Documentation

You can find instructions for ordering documentation at this URL:

http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:

http://www.cisco.com/en/US/partner/ordering/index.shtml

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit e-mail comments about technical documentation to bug-doc@cisco.com.

You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour-a-day, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance. If you do not hold a valid Cisco service contract, please contact your reseller.

Cisco TAC Website

The Cisco TAC website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year. The Cisco TAC website is located at this URL:

http://www.cisco.com/tac

Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:

http://tools.cisco.com/RPF/register/register.do

Opening a TAC Case

Using the online TAC Case Open Tool is the fastest way to open P3 and P4 cases. (P3 and P4 cases are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using the recommended resources, your case will be assigned to a Cisco TAC engineer. The online TAC Case Open Tool is located at this URL:

http://www.cisco.com/tac/caseopen

For P1 or P2 cases (P1 and P2 cases are those in which your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.

To open a case by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447

For a complete listing of Cisco TAC contacts, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

TAC Case Priority Definitions

To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.

Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Go to this URL to visit the company store:

http://www.cisco.com/go/marketplace/

The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:

http://cisco.com/univercd/cc/td/doc/pcat/

Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press online at this URL:

http://www.ciscopress.com

Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:

http://www.cisco.com/packet

iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:

http://www.cisco.com/go/iqmagazine

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/ipj

Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:

http://www.cisco.com/en/US/learning/index.html