Guest

Cisco Unified Communications Manager IM & Presence Service

Release Notes for Cisco Unified Presence Release 8.6(4)

  • Viewing Options

  • PDF (323.9 KB)
  • Feedback
Release Notes for Cisco Unified Presence Release 8.6(4)

Table Of Contents

Release Notes for Cisco Unified Presence Release 8.6(4)

Contents

Introduction

System Requirements

Hardware Server Requirements

Server Software Requirements

Supported Browsers

How to Use Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Installation and Upgrade Notes

New System Installation

System Upgrade

Supported Upgrade Paths to Cisco Unified Presence Release 8.6(4)

Upgrade from Cisco.com

The Latest Software Upgrades for Cisco Unified Presence on Cisco.com

Additional Installation and Upgrade Considerations

Perform Cisco Unified Presence 8.6(4) Upgrade Before Cisco Unified Communications Manager 8.6(x) Upgrade

Licensing Requirements for Release 7.0(x) to 8.6(4) Upgrades

Software Licensing Requirements for VMware

Recommendations for Release 8.0(x), 8.5(x), or 8.6(x) to 8.6(4) Upgrades

Platform Manager is Not Supported

Limitations and Restrictions

Related Documentation

New and Changed Information

Refresh Upgrade

SAN and Wildcard Certificates

File Transfer

Single Sign-On

New In-Memory Database

Enhanced Audit Logging

Self-Signed Certificates

Platform Changes

High Availability Enhancements

VMware vSphere ESXi 5.0 Support

BAT Enhancements

Important Notes

CPU Spike Causes Database Connection Failure

Disaster Recovery System Fails to Backup Subscriber Node (CSCua09717)

Restore of Platform Component Fails (CSCua41825)

Network Interfaces May Load in Wrong Order (CSCua16730)

Caveats

Using Bug Toolkit

Open Caveats

Documentation Updates

Online Help Updates

Jabber for Everyone Solution Overview

Deployment Guide for Cisco Unified Presence Release 8.6

Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Command Line Interface Reference Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange

Integration Guide for Configuring Cisco Unified Presence Release 8.6 for Interdomain Federation

Serviceability Configuration and Maintenance Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Upgrade Guide for Cisco Unified Presence Release 8.6

Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Changing the IP Address and Hostname for Cisco Unified Presence Release 8.0, 8.5, 8.6

Obtaining Documentation and Submitting a Service Request


Release Notes for Cisco Unified Presence Release 8.6(4)


April 10, 2013

These release notes describe requirements, restrictions, and caveats for Cisco Unified Presence Release 8.6(4).


Note To view the release notes for previous versions of Cisco Unified Presence, go to the following URL: http://www.cisco.com/en/US/products/ps6837/prod_release_notes_list.html


Contents

Introduction

System Requirements

Installation and Upgrade Notes

Additional Installation and Upgrade Considerations

Limitations and Restrictions

Related Documentation

New and Changed Information

Important Notes

Caveats

Documentation Updates

Obtaining Documentation and Submitting a Service Request

Introduction

Cisco Unified Presence collects information about user availability, such as whether users are using communications devices (for example, a phone) at a particular time. Cisco Unified Presence can also collect information about individual user communications capabilities, such as whether web collaboration or video conferencing is enabled. Applications such as Cisco Jabber and Cisco Unified Communications Manager use this information to improve productivity amongst employees, that is, to help employees connect with colleagues more efficiently and determine the most effective way for collaborative communication.

These release notes describe new features, requirements, restrictions, and caveats for Cisco Unified Presence Release 8.6(4). These release notes are updated for every maintenance release but not for patches or hot fixes.

Before you install Cisco Unified Presence, Cisco recommends that you review the "Related Documentation" section for information about the documentation available for Cisco Unified Presence.

System Requirements

Hardware Server Requirements

Server Software Requirements

Supported Browsers

Hardware Server Requirements


Note With the exception of the 500 user and Business Edition 6000 OVA deployments, Cisco Unified Presence Release 8.6(4) has increased hardware requirements for RAM and hard disk size. Failure to meet these new requirements will result in the server booting up in bridged mode, thus preventing application services from starting. Refer to the Hardware and Software Compatibility Information for Cisco Unified Presence here http://www.cisco.com/en/US/docs/voice_ip_comm/cups/8_0/english/compatibility/cupcompatibility8x.html


The Cisco Unified Presence system is a software product that is loaded onto a hardware server. The hardware server must meet the following requirements:

One of the following server models:

Cisco 7800 Series Media Convergence Server (MCS) listed in the Hardware and Software Compatibility Information for Cisco Unified Presence. Go to Cisco.com for the latest information:
http://www.cisco.com/en/US/products/ps6837/products_device_support_tables_list.html


Note Cisco Unified Presence does not support MCS-xxxx-I1-IPC1 or MCS-xxxx-H1-IPC1 servers. However, a bridged upgrade is available to customers who need to migrate from any of the discontinued hardware, except for the following servers: MCS-7825-H1-IPC1, MCS-7825-I2-IPC1, MCS-7825-I1-IPC1, MCS-7825-I2-IPC2. For details about the unsupported hardware and the bridged upgrade, see the Upgrade Guide for Cisco Unified Presence Release 8.6 here:
http://www.cisco.com/en/US/products/ps6837/prod_installation_guides_list.html


Cisco-approved, customer-provided third-party server that is the exact equivalent of one of the supported Cisco MCS servers. Go to http://www.cisco.com/go/swonly.

Cisco Unified Computing System B-series blades or Cisco Unified Computing System C-series rackmount servers. For information about these Cisco Unified Computing System servers, see the Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.x here:
http://www.cisco.com/en/US/products/ps6837/products_device_support_tables_list.html

DVD-ROM drive

Keyboard, mouse, and monitor


Note Additional server requirements, such as port and IP address requirements, are described in Port Usage Information for Cisco Unified Presence.


The Cisco Unified Presence installer checks for the presence of the DVD-ROM drive, sufficient hard drive and memory sizes, and sufficient CPU type and speed.

Cisco Unified Presence supports bridged upgrades from any of the following servers:

MCS-7825-H2-IPC1

MCS-7825-H2-IPC2

MCS-7835-H1-IPC1

MCS-7835-I1-IPC1

MCS-7845-H1-IPC1

MCS-7845-H2-IPC1 (only if each of the two disks has less than 72GB of storage space, otherwise it is fully supported)

MCS-7845-I1-IPC1

The bridged upgrade allows you to create a DRS backup on the discontinued hardware. You can then restore the DRS backup on supported hardware after you complete a fresh Cisco Unified Presence installation on the supported hardware. If you attempt an upgrade on discontinued hardware, Cisco Unified Presence displays a warning on the interface and on the CLI, informing you that Cisco Unified Presence only supports the functionality to create a DRS backup on this server.

Server Software Requirements

The Cisco Unified Presence server runs on the Cisco Linux-based operating system. This operating system is included with the application.

Related Topic

Installation and Upgrade Notes

Supported Browsers

Use Microsoft Internet Explorer version 6.0 or a later release, or Mozilla Firefox version 3.0 or a later release, to access these interfaces: Cisco Unified Presence Administration, Cisco Unified Serviceability, and Cisco Unified Operating System Administration.


Note Cisco Unified Presence does not currently support Safari or Google Chrome on the Mac OS or Microsoft Windows.


How to Use Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol over Secure Sockets Layer (SSL), which secures communication between the browser client and the Apache Tomcat web server, uses a certificate and a public key to encrypt the data that is transferred over the Internet. HTTPS, which ensures the identity of the server, supports applications, such as Cisco Unified Serviceability. HTTPS also ensures that the user sign-in password is transported securely via the web.

HTTPS for Internet Explorer

The first time you (or a user) access Cisco Unified Presence Administration or other Cisco Unified Presence SSL-enabled virtual directories after a Cisco Unified Presence installation or upgrade, a Security Alert dialog box asks whether you trust the server. When the dialog box displays, you must respond in one of the following ways:

By selecting Yes, you select to trust the certificate for the current web session only. If you trust the certificate for the current session only, the Security Alert dialog box displays each time that you access the application: that is, until you install the certificate in the trusted folder.

By selecting View Certificate > Install Certificate, you indicate that you intend to perform certificate installation tasks, so you always trust the certificate. If you install the certificate in the trusted folder, the Security Alert dialog box does not display every time you access the web application.

By selecting No, you cancel the action. No authorization occurs, and you cannot access the web application. To access the web application, you must select Yes or install the certificate via the View Certificate > Install Certificate option.


Note The system issues the certificate using the hostname. If you attempt to access a web application using the IP address, the Security Alert dialog box displays, even though you installed the certificate on the client.


Saving the Certificate to the Trusted Folder

You can save the CA Root certificate in the trusted folder, so the Security Alert dialog box does not display each time that you access the web application.


Step 1 Perform the required steps depending on the Internet browser you are using:

Table 1 Saving the Certificate to the Trusted Folder 

If you are Using......
Actions
Troubleshooting Tips

Internet Explorer 6 and 8

a. Browse to the application on the Tomcat web server.

b. Select View Certificate when the Security Alert dialog box displays.

c. Select Install Certificate in the General pane of the Certificate dialog box.

d. Select Next in the Certificate Import Wizard dialog box.

a. Select Place all certificates in the following store.

b. Select Browse adjacent to the Certificate store field.

c. Browse to Trusted Root Certification Authorities.

d. Select OK.

e. Select Next.

f. Select Finish.

g. Select Yes to install the certificate.

h. Select OK after you receive a message stating that the import was successful.

i. Select OK in the lower, right corner of the Certificate dialog box.

j. Select Yes to trust the certificate, so you do not receive the dialog box again.

After you save the certificate to the trusted folder in Internet Explorer, the next time you browse to the server, ensure that you enter the fully qualified domain name (FQDN) of the server that is associated with the certificate.

You can verify that the certificate was installed successfully by selecting the Certificate Path tab in the Certificate pane.

Internet Explorer 7

a. Browse to the application on the Tomcat web server.

b. Select Continue to this website (not recommended) option to access the server.

c. Select View Certificate when the Security Alert dialog box displays.

d. Select Install Certificate in the General pane of the Certificate dialog box.

e. Select Next in the Certificate Import Wizard dialog box.

f. Select Automatically select the certificate store based on the type of certificate.

g. Browse Next.

h. Select Finish.

i. Select Yes in the Security Warning dialog box.

j. Select OK in the Certificate Import Wizard dialog box.

After you save the certificate to the trusted folder in Internet Explorer, the next time you browse to the server, ensure that you enter the FQDN of the server that is associated with the certificate.

To verify that the trust store contains the imported certificate, select Tools > Internet Options in the Internet Explorer toolbar and select the Contents tab. Select Certificates and select the Trusted Root Certifications Authorities tab. Scroll to find the imported certificate in the list.

After importing the certificate, the browser continues to display the address bar and a Certificate Error status in red. The status persists even if you re-enter the hostname or IP address or refresh or relaunch the browser.

You can verify that the certificate was installed successfully by selecting the Certification Path tab in the Certificate pane.

Netscape

a. Browse to the application using Netscape.

b. Select one of the following radio buttons:

Accept this certificate for this session

Do not accept this certificate and do not connect

Accept this certificate forever (until it expires)

Select OK in the Certificate Authority dialog box.

Select OK in the Security Warning dialog box

After you save the certificate to the trusted folder in Netscape, the next time you browse to the server, ensure that you enter the FQDN name of the server that is associated with the certificate.

If you select Do not accept this certificate and do not connect, the application does not open.

To view the certificate credentials before installing the certificate, select Examine Certificate.


Installation and Upgrade Notes

New System Installation

System Upgrade

The Latest Software Upgrades for Cisco Unified Presence on Cisco.com

New System Installation

For new installations, you must order the Cisco Unified Presence system software and adhere to licensing requirements. To order the software, go to http://www.cisco.com/en/US/ordering/index.shtml or contact your Cisco sales representative.

Each Cisco Unified Presence shipment comes with an installation DVD, which is required for all new installations of Cisco Unified Presence, for example, Cisco Unified Presence Release 8.6. The Cisco Unified Presence operating system and application software is installed from the installation DVD. For example, for new installations of the Cisco Unified Presence Release 8.6(4) software, use the DVD that indicates Cisco Unified Presence Release 8.6(4).

Related Topic

Software Licensing Requirements for VMware

System Upgrade

Supported Upgrade Paths to Cisco Unified Presence Release 8.6(4)

Upgrade from Cisco.com


Caution Upgrading to Cisco Unified Presence Release 8.6(4) is considered to be a refresh upgrade and is service impacting. As a result, Cisco highly recommends that you upgrade to Cisco Unified Presence Release 8.6(4) during a maintenance window. For more information, see the Upgrade Guide for Cisco Unified Presence Release 8.6, specifically the section entitled "Refresh Upgrade to Cisco Unified Presence Release 8.6(4) here: http://www.cisco.com/en/US/products/ps6837/prod_installation_guides_list.html

Supported Upgrade Paths to Cisco Unified Presence Release 8.6(4)

Cisco Unified Presence supports the following software upgrade paths to Release 8.6(4):

Table 2

Supported Upgrade Paths from Cisco Unified Presence...
Installation Instructions

Release 8.0(x), 8.5(x), or 8.6(x) to 8.6(4)

Before You Begin

Upgrades from 8.0(x) through to 8.6(1) require you to install a COP file on all nodes prior to starting the upgrade. Download the following COP file from Cico.com: ciscocm.cup.refresh_upgrade_v<latest_version>.cop


Note Prior to upgrading to Cisco Unified Presence Release 8.6(4), ensure that all MCS platforms meet the new hardware requirements (RAM and HD). For more information, see the Hardware and Software Compatibility Information for Cisco Unified Presence.


Perform these steps to proceed with the upgrade:

1. Go to http://www.cisco.com/upgrade.

2. Enter your software contract number.

3. Select the CUP<pre-upgrade release>-8-6-U-K9= option to order. If you do not see this option, contact your Cisco Account Team and/or Reseller to resolve your Contract issue.

4. Go to http://www.cisco.com/cisco/software/navigator.html.

5. Navigate to Products > Voice and Unified Communications > Unified Communications Applications > Cisco Unified Presence > Cisco Unified Presence 8.6 > Unified Presence Server Updates.

6. Choose one of the following options:

Download the complete ISO file: UCSInstall_CUP_8.6.4.10000-28.sgn.iso

Install the "Installation and Upgrade (8.0(x) to 8.6(x))" or "Installation and Upgrade (8.5(x) to 8.6(x))" upgrade DVD that Cisco provides.


Supported Upgrade Paths


Note Direct upgrades from Cisco Unified Presence Release 7.0(x) and earlier to Release 8.6(4) are not supported. You must first upgrade to an earlier 8.x release of Cisco Unified Presence. For more information about upgrading to Cisco Unified Presence Release 8.x, see the Upgrade Guide for Cisco Unified Presence:
http://www.cisco.com/en/US/products/ps6837/prod_installation_guides_list.html.


Upgrade from Cisco.com

Cisco does not support downloading major Cisco Unified Presence software releases from Cisco.com, for example, Cisco Unified Presence Release 8.0. From Cisco.com you can download upgrade-only software images that are used to upgrade from a previous major software release to a subsequent software maintenance release or point release of Cisco Unified Presence. For example, you can download Cisco Unified Presence Release 8.0(2) or Cisco Unified Presence Release 8.6(4) from Cisco.com.

To download this software, go to http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=278875240. You must have an account on Cisco.com to access the Software Center. The images posted at the Software Center require existing installations of Cisco Unified Presence.

Related Topics

Supported Upgrade Paths to Cisco Unified Presence Release 8.6(4)

The Latest Software Upgrades for Cisco Unified Presence on Cisco.com

The Latest Software Upgrades for Cisco Unified Presence on Cisco.com

Perform the following steps to access the upgrade file for Cisco Unified Presence release 8.5(x) to 8.6(4).

Before You Begin

You can only download point releases of Cisco Unified Presence software from Cisco.com.

Upgrades from 8.0(x) through to 8.6(1) require you to install a COP file on all nodes prior to starting the upgrade. Download the following COP file from Cico.com: ciscocm.cup.refresh_upgrade_v<latest_version>.cop

Procedure


Step 1 Download the UCSInstall files from Cisco Connection Online.

Step 2 Use an md5sum utility to verify that the MD5 sum of the final file is correct:

2f5b283b4e2fecba51bbbb60a8f9e9fb UCSInstall_CUP_8.6.4.10000-28.sgn.iso


Troubleshooting Tips

You can upgrade the ISO image onto a remote server as an alternative to using the upgrade DVD. Copy the ISO (UCSInstall_CUP_8.6.4.10000-28.sgn.iso) to your FTP or SFTP server.

Related Topics

New System Installation

Upgrade from Cisco.com

Additional Installation and Upgrade Considerations

Perform Cisco Unified Presence 8.6(4) Upgrade Before Cisco Unified Communications Manager 8.6(x) Upgrade

Licensing Requirements for Release 7.0(x) to 8.6(4) Upgrades

Software Licensing Requirements for VMware

Recommendations for Release 8.0(x), 8.5(x), or 8.6(x) to 8.6(4) Upgrades

Platform Manager is Not Supported

Perform Cisco Unified Presence 8.6(4) Upgrade Before Cisco Unified Communications Manager 8.6(x) Upgrade

You must perform the Cisco Unified Presence Release 8.6(4) upgrade before you perform the Cisco Unified Communications Manager Release 8.6(x) upgrade. Cisco does not support Cisco Unified Presence 8.0(x) servers running with Cisco Unified Communications Manager Release 8.5 or 8.6.

Licensing Requirements for Release 7.0(x) to 8.6(4) Upgrades

If you upgrade from Release 7.0(x) to Release 8.6(4), you require a new software version license for each Cisco Unified Presence server in your deployment. You must order a separate software version license for each Cisco Unified Presence server. However, you need to upload the license to the first node in a cluster. For information about Cisco Unified Presence licensing modes and requirements, see the Installation Guide for Cisco Unified Presence Release 8.6 here:

http://www.cisco.com/en/US/products/ps637/prod_installation_guides_list.html

Software Licensing Requirements for VMware

You can run this release of Cisco Unified Presence on a VMware virtual machine deployed on approved Cisco Unified Computing server hardware. For information about supported servers, see Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.x. For information about the VMware licensing requirements, see the License Activation for Cisco UC on UCS Docwiki here: http://docwiki.cisco.com/wiki/License_Activation_for_Cisco_UC_on_UCS

Recommendations for Release 8.0(x), 8.5(x), or 8.6(x) to 8.6(4) Upgrades

Before you upgrade from Cisco Unified Presence Release 8.0(x), 8.5(x), or 8.6(x) to Release 8.6(4), Cisco strongly advises that you follow the recommended upgrade procedure in the Upgrade Guide for Cisco Unified Presence Release 8.6 here:
http://www.cisco.com/en/US/products/ps6837/prod_installation_guides_list.html


Note Direct upgrades from Release 7.x and earlier to 8.6(4) are not supported. You must first upgrade to another 8.x release and then perform a Refresh Upgrade. A Refresh Upgrade is significantly different from a Standard Upgrade. For more information, see the Upgrade Guide for Cisco Unified Presence 8.6.


Important Notes

Publisher node—upgrade the publisher node and switch the software to the new software release prior to initiating an upgrade and switch version on the Subscriber nodes. If the Cisco Unified Presence Administration GUI is operational on the Publisher node, it is safe to initiate an upgrade and switch version on the Subscriber node. There are special considerations that need to be taken into account when upgrading to Release 8.6(4). Cisco recommends that you refer to the Upgrade Guide for Cisco Unified Presence 8.6 before you proceed with upgrading.


Note Services on the Publisher will not start until the Subscribers are switched, restarted, and replication is successfully established on that cluster.


High Availability User Support—Cisco Unified Presence Release 8.6(4) supports up to 45,000 Unified Communications mode users per cluster in a High Availability (HA) configuration. If, when you upgrade, you are left with a number of unsupported users, we recommend that you unlicense these surplus users on Cisco Unified Communications Manager before you perform the upgrade.

Contact List Size—the default maximum value is 200; however you can configure this to a higher value, or configure 0 to set it to unlimited value. After you perform the upgrade, check that the contact list size for users has not reached the maximum value. If you have a large number of contacts per user, the number of users that a Cisco Unified Presence node supports is reduced.

Platform Manager is Not Supported

Platform Manager (PM) can not be used to upgrade to Cisco Unified Presence Release 8.6(4).

Limitations and Restrictions

No caveats were closed in this release.

Related Documentation

The complete Cisco Unified Presence documentation set, with the latest information for Release 8.6(4), is now available here on Cisco.com.

http://www.cisco.com/en/US/products/ps6837/tsd_products_support_series_home.html

To search for documentation on any given release, we recommend that you use the Custom Google search capability introduced in the last release.

New and Changed Information

The following sections describe new features and changes that are pertinent to Cisco Unified Presence Release 8.6(4). The sections may include configuration tips, information about users, and where to find more information.

Refresh Upgrade

SAN and Wildcard Certificates

File Transfer

Single Sign-On

New In-Memory Database

Enhanced Audit Logging

Self-Signed Certificates

Platform Changes

High Availability Enhancements

VMware vSphere ESXi 5.0 Support

BAT Enhancements

For information about all available features and benefits, see the data sheet for Cisco Unified Presence at http://www.cisco.com/en/US/products/ps6837/products_data_sheets_list.html.

Refresh Upgrade

A refresh upgrade is required to upgrade to Cisco Unified Presence Release 8.6(4) in order to support the move to RedHat5. A COP file is required. For more information, see the Upgrade Guide for Cisco Unified Presence Release 8.6.

SAN and Wildcard Certificates

This feature allows the use of SAN and wildcard certificates for integration of Cisco Unified Presence with Microsoft Exchange. For more information, see the Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange.

File Transfer

This feature allows administrators to prevent XMPP clients from completing point-to-point file transfers. For more information, see the Deployment Guide for Cisco Unified Presence Release 8.6.

Single Sign-On

This feature allows a user to access the following Cisco Unified Presence applications without being required to enter login credentials providing they are accessing the browser from their active Windows login session:

Cisco Unified Presence Administration

Cisco Unified Serviceability

Disaster Recovery System

Cisco Unified OS Administration

Cisco Unified Reporting

Cisco Unified Presence User Options

For more information, see the Deployment Guide for Cisco Unified Presence Release 8.6.

New In-Memory Database

Cisco Unified Presence now uses a new in-memory database (IMDB). As a result, the Cisco UP Presence Engine Database service has been replaced with the following new services:

Cisco UP Presence Datastore

Cisco UP Route Datastore

Cisco UP Login Datastore

Cisco UP SIP Registration Datastore

Enhanced Audit Logging

This feature includes audit logging of the following actions:

End User actions—successful login, unsuccessful login, logout, chat room creation and joining. These end user interactions are logged in the Cisco Unified Presence Application Audit logs.

Admin User actions—service starts and stops, successful and unsuccessful login. These administrative actions are logged in the Cisco Unified Presence Application Audit logs.

System events relating to Cisco Unified Presence base platform—creation, modification, removal of OS user accounts, log tampering, and changes to file and directory permissions

Database operations—all activities related to the internal Cisco Unified Presence database (for example, changes to the rows and columns in the database tables)

For more information about configuring audit logs, see the Serviceability Guide for Cisco Unified Presence. For information about collecting audit logs, see the Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence.

Self-Signed Certificates

This feature has increased the number of bit keys used by Cisco Unified Presence self-signed certificates from 1024 to 2048. All Cisco Unified Presence self-signed certificates request 2048 bit keys in all Certificate Signing Requests. This value is not configurable.

For more information, see the following documents:

Integration Guide for Configuring Cisco Unified Presence Release 8.6 for Interdomain Federation

Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange

Platform Changes

New OVAs have been created to accommodate a larger range of users; There are now 500, 2000, 5000, and 15000 user OVAs that support RedHat5. For more information, see http://docwiki.cisco.com/wiki/OVA_Template_Details_for_Unified_Presence_Release_8.6(4)

High Availability Enhancements

The Automatic Fallback feature ensures that when a node recovers from a critical service failure, the system returns to the condition it was in prior to the failure after 30 minutes of stable network communication.

Portions of this software product are governed by certain open source and third-party licenses. For more information and acknowledgments of copyright, see the Licensing Information for Cisco Unified Presence:

http://www.cisco.com/en/US/products/ps6837/products_licensing_information_listing.html

VMware vSphere ESXi 5.0 Support

Cisco Unified Presence Release 8.6(4) supports ESXi 5.0. The following DocWiki page has been updated:

http://docwiki.cisco.com/wiki/Unified_Communications_VMware_Requirements#VMware_vSphere_ESXi_Version_Support_for_Messaging_and_Presence_Applications

BAT Enhancements

Additional Bulk Administration Tool (BAT) functionality allows the exporting of user contact lists from Cisco Unified Presence. For more information, see the Deployment Guide for Cisco Unified Presence Release 8.6.

Important Notes

The following sections contain information that may have been unavailable upon the initial release of documentation for Cisco Unified Presence Release 8.6(4):

CPU Spike Causes Database Connection Failure

Disaster Recovery System Fails to Backup Subscriber Node (CSCua09717)

Restore of Platform Component Fails (CSCua41825)

Network Interfaces May Load in Wrong Order (CSCua16730)

CPU Spike Causes Database Connection Failure

Problem

The following Cisco Unified Presence interfaces can become inaccessible due to database connectivity problems. When attempting to login to the following applications, the login will appear to hang and will not complete:

Cisco Unified Presence Administration

Cisco Unified Serviceability

Cisco Unified Reporting

Cisco Unified End User Options

Cause

This condition affects Cisco Unified Presence running on a virtualized environment where the virtual machine (VM) on which Cisco Unified Presence is running has only one CPU. A large CPU spike on the Cisco Unified Presence server can cause the database to become inaccessible. You can verify that you are experiencing this issue by performing the following procedure:


Step 1 From the Cisco Unified Presence CLI, execute the following command to view the database log file:
file view activelog /cm/log/informix/ccm.log

Step 2 Check the log file for entries similar to the following:
listener-thread: err = -25582: oserr = 0: errstr = : Network connection is broken.


Solution

To resolve this issue, add an additional CPU to the VM on which Cisco Unified Presence is running.

Disaster Recovery System Fails to Backup Subscriber Node (CSCua09717)

Problem

The Cisco Unified Presence Disaster Recovery System (DRS) can not connect to subscriber or subscriber backup fails after a reboot or upgrade.

Cause

This condition is caused by selinux blocking the regeneration of ipsec-trust certificates on the subscriber during bootup. Without these certificates, the subscriber DRS Local Agent can not connect to the publisher Master Agent.

Solution

After a reboot or upgrade of the Cisco Unified Presence server, and prior to attempting a manual or scheduled DRS backup, perform the following steps to load the certificates manually on to the subscriber:


Step 1 From the Cisco Unified Presence Operating System Administration page, select Security > Certificate Management.
The Certificate List window displays.

Step 2 Click Find to filter the certificate.

Step 3 Select the ipsec.pem file and download the certificate.

Step 4 Go to the Certificate Management page of the affected subscriber node.

Step 5 Upload the downloaded ipsec.pem file with the cert type of ipsec-trust.

Step 6 Restart the DRF Master Agent (MA)/DRF Local Agent (LA) services on the publisher node and affected subscriber node.


Restore of Platform Component Fails (CSCua41825)

Problem

The platform component fails during a Disaster Recovery System (DRS) restore.

Solution


Step 1 Enable root account.

Step 2 Replace the /usr/local/platform/bin/platform_sso_restore.py file with the .py file attached to the caveat here:
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCua41825

Step 3 Make sure the attributes of the file (755) and the owner information (drf:platform) are preserved.

Step 4 Retry the DRS restore.


Network Interfaces May Load in Wrong Order (CSCua16730)

Problem

For some SIP traffic types, SIP Federation in particular, it may be observed that the Cisco UP SIP Proxy attempts to route inbound SIP requests to a link-local IP address rather than its own IP address, when routing the requests to internal Cisco Unified Presence components. Link-local IPv4 addresses are defined in the address block 169.254.0.0/16. The defect is only seen on versions of Cisco Unified Presence that run Redhat 5.

Cause

This condition is related to the order in which the nework interfaces of the server are loaded. On most servers (virtual or physical), the typical load order is as follows: loopback, eth0, eth1, followed by any other interface. It has been observed that on some newer physical servers, such as MCS-7845-I3, MCS-7835-I3, and MCS-7825-I5, there exists an interface known as usb0. This interface is usually assigned a Link Local IP address by the operating system.

Upon server boot-up, the usb0 interface may intermittently preempt the Ethernet interfaces, thus changing the order of the interfaces: loopback, usb0, eth0, eth1, and so on. When this order change occurs, the Cisco UP SIP Proxy begins experiencing the issues listed in the Problem section above.

To verify that the Cisco UP SIP Proxy is affected by the interface order, look at the first Cisco UP SIP Proxy log file that is generated after the Cisco UP SIP Proxy starts. At the beginning of the log file, you will see a log entry similar to the following:

"The proxy will listen on the following interfaces:\n127.0.0.1\n169.254.1.102\n192.168.20.171\n"
where the first entry is entry is the loopback address, the second entry is a link-local IP address, and the third entry is the IP address of the server.

The following log entry indicates the correct order:

"The proxy will listen on the following interfaces:\n127.0.0.1\n192.168.20.171\n169.254.1.102\n"
where the second entry is the actual IP address of the server.

Solution

This defect occurs intermittently upon server boot up. If the defect occurs, you must try to boot up again until the issue is no longer present.

Caveats

Using Bug Toolkit

Open Caveats

Using Bug Toolkit

Known problems (bugs) are graded according to severity level. These release notes contain descriptions of the following:

All severity level 1 or 2 bugs.

Significant severity level 3 bugs.

All customer-found bugs.

You can search for problems by using the Cisco Software Bug Toolkit.

Before You Begin

To access Bug Toolkit, you need the following items:

Internet connection

Web browser

Cisco.com user ID and password

Procedure


Step 1 To access the Bug Toolkit, go to http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs.

Step 2 Sign in with your Cisco.com user ID and password.

Step 3 To look for information about a specific problem, enter the bug ID number in the "Search for Bug ID" field, then select Go.


For information about how to search for bugs, create saved searches, and create bug groups, select Help on the Bug Toolkit page.

Open Caveats

The caveats in Table 3 describe possible unexpected behavior in the latest Cisco Unified Presence release. These caveats may also be open in previous releases. Bugs are listed in alphabetical order by component and then in numerical order by severity.

Table 3 Open Caveats for Cisco Unified Presence Release 8.6(4) 

Identifier
Severity
Component
Headline

CSCtw75780

3

bat

Some imported contacts' presence not showing when max contacts size set.

CSCtx01262

3

config-agent

Config Agent drops all CNs as the ChangeManagerSipdConf queue is full.

CSCtz67093

3

ctigw

CUPS truncates called party after 20 digit.

CSCtz96671

3

cupxcpconfig

Incorrect restart notification for sub

CSCtz38528

3

database-install

L2 upgrade of PUB node in fully provisioned 45k System taking 27hrs

CSCtz88557

3

database

CPU spike causes database connection failure.

CSCty85346

3

database

CLI `dbreplication forcedatasyncsub' does not work on Cisco Unified Presence.

CSCto77824

3

database

Users have inconsistent presence after Cisco Unified Presence upgrade.

CSCua12285

3

database

Boot up after switch back hanging at `Starting cupOnL2BootInitd'

CSCtz64227

3

database

Carriage return control characters in db data can cause upgrade failure

CSCtz55120

3

epe

Possible memory leak on soak test run

CSCtz26168

3

epe

Presence Engine core when calendaring enabled on Cisco Unified Presence release 8.6(1)

CSCtz99702

3

epe

Relogin of Jabber causes error impacting presence composition.

CSCtz26163

3

epe

Presence Engine core on startup when calendaring GW is configured

CSCua16730

2

esp

Network Interfaces may load in wrong order causing proxy routing issues

CSCua20741

3

esp

408 Error responses in Intradomain Federation at Scale

CSCtz83598

3

esp

SIP retransmits result in shared memory exhaustion

CSCtz06790

3

gui-accessibility

When admin locks user on CUCM, user can always access GUI pages with SSO.

CSCty35767

4

gui-accessibility

User in same Groups can not access same webapps with and without SSO

CSCtz83131

3

gui-admin

Incorrect CUCM hostname can cause subscriber install to fail.

CSCtz34968

3

gui-admin

Tomcat hangs after End-User query filter times out.

CSCtr36119

3

gui-troubleshooter

Exchange server status reports false positives.

CSCtz96324

3

gui

Audit user does not have exclusive permission to audit log files.

CSCty29379

3

gui

CUP GUI not working when some services are restarted while SSO enabled.

CSCty82764

3

gui

SSO logout screen not consistent.

CSCtn13881

3

intercluster

ICSA Certs are not sync'ed if an existing peer certs are available

CSCtz62315

3

intercluster

ICSA handling errors for CNs being sent

CSCtz62036

3

intercluster

Can't exchange certs via ICSA between FIPS enabled & FIPS disabled peers

CSCts53870

3

oamagent

Delay in writing pe_cfg.xml upon L2 causes PE to start in bad state.

CSCua09717

3

security

DRF fails to backup Subscriber node

CSCtz55287

4

security

Text when enable FIPS too CUCM specific

CSCts28606

3

serviceability

"UNKNOWN_ALARM" alerts sent to remote syslog server on router restart

CSCts61745

3

serviceability

Syslog messages dropped when Router debug logging enabled

CSCtt79854

3

serviceability

AlertCentral and CoreDumpFileFound alert properties XML parse error

CSCtz10360

3

serviceability

Server status not reliably retrieved on Cluster Topology page.

CSCtz12616

3

serviceability

Can not delete CUP remote access account.

CSCtz23921

3

serviceability

Pub fails to communicate with subscriber servm when enable/disable HA

CSCtz74208

3

serviceability

SNMP query unable to distinguish between services.

CSCtz23921

3

srm

Publisher fails to communicate with subscriber servm when enable/disable high availability.

CSCua41825

3

vos

Restore of Platform Component failing

CSCtz26078

3

vos

OpenSSH: DSA/DSS connections do not work in FIPS mode

CSCty44483

3

xcp-jabberwerx

JID getting displayed in the top-left corner of chat window

CSCty14182

3

xcp-jsm

XMPP login failures due to bind errors at scale.

CSCts40539

3

xcp-routefabric

8.5 routers in an 8.6 mesh can corrupt routing table


Documentation Updates

For the latest versions of all Cisco Unified Presence documentation, go to http://www.cisco.com/en/US/products/ps6837/tsd_products_support_series_home.html

This section contains updates to the following documents:

Online Help Updates

Jabber for Everyone Solution Overview

Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Command Line Interface Reference Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange

Serviceability Configuration and Maintenance Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Upgrade Guide for Cisco Unified Presence Release 8.6

Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.0, 8.5, and 8.6

Changing the IP Address and Hostname for Cisco Unified Presence Release 8.0, 8.5, 8.6

Online Help Updates

BAT Configuration to Export Users' Contact Lists

Cluster Topology Configuration

Enterprise Parameters Configuration

Presence Gateway Configuration

BAT Configuration to Export Users' Contact Lists

This topic was added to describe how to use the Bulk Administration Tool (BAT) to export the contact lists of users to a CSV data file.

Cluster Topology Configuration

This topic was updated to describe the Enable Automatic Fallback parameter.

This topic was also updated to include options for the new Cisco UP Datastore service.

Enterprise Parameters Configuration

This topic was added to describe the new Enterprise Parameters menu option.

Presence Gateway Configuration

This topic was updated to include a troubleshooting tip for configuring a presence gateway for use with a Wildcard certificate. The SSL Connection/Certificate Verification Failed - SAN Mismatch GUI option is also described here.

Jabber for Everyone Solution Overview

The Jabber for Everyone Solution Overview is a new document that describes how to deploy the Jabber for Everyone offer. The Jabber for Everyone offer makes presence and instant messaging (IM) and Cisco Jabber IM clients available to all employees of Cisco Unified Communications Manager customers, regardless of whether the users are Cisco IP telephony users.

For more information, see the Jabber for Everyone Solution Overview here:
http://www.cisco.com/en/US/products/ps6837/products_installation_and_configuration_guides_list.html

Deployment Guide for Cisco Unified Presence Release 8.6

The Deployment Guide for Cisco Unified Presence Release 8.6 was updated with the following new sections:

Web Interface Timeout

Automatic Fallback

Bulk Export of User Contact Lists

Single Sign-On Configuration

Creating a Login Banner

Configuring FIPS 140-2 Mode

Enabling File Transfer

Configuring the Maximum Number of Logon Session

The following sections were updated with information about the new Automatic Fallback feature:

High Availability in a Subcluster

Cisco UP Server Recovery Manager (SRM)

Node States, Causes and Recommended Actions

Configuring the Advanced Service Parameters for the Server Recovery Manager

The "Automatic Failover Detection" section was updated to include the Cisco UP Datastore service in the list of critical services monitored by Cisco Unified Presence nodes.

The "6 GB Active/Active" and "Active/Standby Profile" sections were updated to include new values for both standard and IM-only deployments.

For more information, see the Deployment Guide for Cisco Unified Presence Release 8.6 here:
http://www.cisco.com/en/US/products/ps6837/products_installation_and_configuration_guides_list.html

Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

The Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence was updated to include the General Performance Monitoring section. This section includes a series of performance counters that an administrator can use to gauge how active the Cisco Unified Presence server currently is by monitoring various statistics including the number of XMPP clients logged in, the number of text conferencing rooms, and instant message traffic.

The "Collecting Audit Logs" section was also added to this document to describe the new audit logging feature.

For more information, see the Real-Time Monitoring Tool Administration Guide for Cisco Unified Presence:
http://www.cisco.com/en/US/products/ps6837/prod_maintenance_guides_list.html

Command Line Interface Reference Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

The Command Line Interface Reference Guide for Cisco Unified Presence was updated to include the following new commands:

set cli session timeout

set password complexity character

set password complexity character difference

set password complexity character max-repeat

set password complexity minimum-length

set webapp session timeout

show cli session timeout

show password complexity character

show password complexity length

show webapp session timeout

utils auditd

utils sso

utils fips

The following commands were updated:

run pe sql

show password

The following commands are not supported in this release:

show pe dbstatus

show pe dbconnections

utils pe replication-agent

For more information, see the Command Line Interface Reference Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6 here:
http://www.cisco.com/en/US/products/ps6837/prod_maintenance_guides_list.html

Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange

The Integration Guide for Configuring Cisco Unified Presence with Microsoft Exchange was updated as follows:

"Certificate Support" and "Configuring the Presence Gateway on Cisco Unified Presence for Microsoft Exchange Integration" sections were updated with Subject Alternative Name (SAN) and Wildcard certificate information.

"Troubleshooting SSL Connection/Certificate Status" section was updated to include a new test.

"Enabling Authentication on the Exchange 2003/2007 Virtual Directories", "Enabling Authentication on Exchange 2007 Running Windows Server 2003", "Enabling Authentication on Exchange 2010 Running Windows Server 2008" sections were updated to include steps for enabling Forms Based Authentication.

"Microsoft Exchange 2010 Configuration Checklist (EWS)" section was updated to include a new value of NULL for the EWSMaxSubscriptions parameter.

References to 1024 bit key length were changed 2048.

For more information, see the Integration Guide for Configuring Cisco Unified Presence Release 8.5 and 8.6 with Microsoft Exchange here:
http://www.cisco.com/en/US/products/ps6837/products_installation_and_configuration_guides_list.html

Integration Guide for Configuring Cisco Unified Presence Release 8.6 for Interdomain Federation

The Integration Guide for Configuring Cisco Unified Presence for Interdomain Federation was updated to replace instances of 1024 bit key length with 2048.

For more information, see the Integration Guide for Configuring Cisco Unified Presence for Interdomain Federation here:
http://www.cisco.com/en/US/products/ps6837/products_installation_and_configuration_guides_list.html

Serviceability Configuration and Maintenance Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6

The Serviceability Configuration and Maintenance Guide for Cisco Unified Presence was updated as follows:

"Audit Log Configuration" section was added

New services were added:

Cisco UP Login Datastore

Cisco UP Route Datastore

Cisco UP Presence Datastore

Cisco UP SIP Registration Datastore

For more information, see the Serviceability Configuration and Maintenance Guide for Cisco Unified Presence Release 8.0, 8.5, and 8.6 here:
http://www.cisco.com/en/US/products/ps6837/prod_maintenance_guides_list.html

Upgrade Guide for Cisco Unified Presence Release 8.6

The Upgrade Guide for Cisco Unified Presence was updated as follows:

"Switch Versions from Cisco Unified Presence Release 8.6(4) or Later" section was added. This section indicates that this release of Cisco Unified Presence does not support the Cisco UP Presence Engine. If you want to revert to a previous release, you must install a COP file to regain access to the Cisco UP Presence Engine.

"Upgrading to Cisco Unified Presence Release 8.6(4) on a Virtual Server" section was added.

"Perform an Intercluster Upgrade" section was updated to indicate that intercluster upgrades from Cisco Unified Presence 7.0(x) to 8.6(2) are not supported in this release.

"Multi-node Software Upgrades" section was restructured to include taskflows for standard upgrades and refresh upgrades.

Troubleshooting chapter was updated to include new sections for "Failed Refresh Upgrade" and "Refresh Upgrade Error".

The following upgrade paths are supported with the required COP file:

8.0(1) - 8.6(4)

8.0(2) - 8.6(4)

8.0(3) - 8.6(4)

8.0(4) - 8.6(4)

8.5(1) - 8.6(4)

8.5(2) - 8.6(4)

8.5(3) - 8.6(4)

8.5(4) - 8.6(4)

8.6(1) - 8.6(4)

The following upgrade paths are supported without a COP file:

8.6(2) - 8.6(4)

8.6(3) - 8.6(4)

For more information, see the Upgrade Guide for Cisco Unified Presence here:
http://www.cisco.com/en/US/products/ps6837/prod_installation_guides_list.html

Hardware and Software Compatibility Information for Cisco Unified Presence Release 8.0, 8.5, and 8.6

The following tables in the Hardware and Software Compatibility Information for Cisco Unified Presence were updated:

Table 1 Cisco Unified Presence Server Support—footnotes were added to 8.6(x) server support

Table 6 Supported Cisco Unified Presence Integrations from Release 8.x—Cisco Unified Personal Communicator, Cisco Jabber for Windows 9.0.1, Cisco Jabber IM for Blackberry 8.6, and Cisco Jabber IM for iPhone 8.6, and Cisco Unified Applications Environment support for various Cisco Unified Presence releases was changed.

Table 7 Cisco Unified Presence IP Phone Support—Cisco Phone Model 7925 support was changed

For more information, see the Hardware and Software Compatibility Information for Cisco Unified Presence here:
http://www.cisco.com/en/US/products/ps6837/products_device_support_tables_list.html

Changing the IP Address and Hostname for Cisco Unified Presence Release 8.0, 8.5, 8.6

The Changing the IP Address and Hostname for Cisco Unified Presence document was updated with a new section "Modify the SIP Domain of a Cisco Unified Presence Cluster" that provides instructions for replacing and changing the domain name of a Cisco Unified Presence server.

Obtaining Documentation and Submitting a Service Request

For information about obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.