Guest

Cisco Virtualization Experience Client 2000 Series

Release Notes for Cisco Virtualization Experience Client 2111/2211 PCoIP Firmware Release 4.0

  • Viewing Options

  • PDF (1.3 MB)
  • Feedback
Release Notes

Release Notes

Use these release notes with the Cisco Virtualization Experience Client 2111/2211 running PCoIP Zero Client Firmware Release 4.0.

Introduction

The Cisco Virtualization Experience Client (VXC) 2111 and 2211 are workstation-class virtualization clients for use with PC-over-IP (PCoIP). The PCoIP protocol is designed to deliver a user desktop from a centralized host server across standard IP networks, enabling you to use applications and desktop peripherals as if you were using them locally.

This release supports the following Cisco Virtualization Experience Client (VXC) clients using PCoIP Zero Client firmware:
  • Cisco VXC 2111, integrated
  • Cisco VXC 2211, standalone

The Cisco VXC 2111 attaches to, and obtains its power from, the Cisco Unified IP Phone 8961, 9951, or 9971 through a spine connector cable. The phone is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches. The Cisco Unified IP Phone 8961, 9951, or 9971 must run Firmware Release 9.1(2) or later.

The Cisco VXC 2211 operates independently and is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches.

Related Documentation

For more information, see the documents available at the following URLs:

Cisco Virtualization Experience Client 2000 Series

http://www.cisco.com/en/US/products/ps11499/tsd_products_support_series_home.html

Cisco Virtualization Experience Client Manager

http://www.cisco.com/en/US/products/ps11582/tsd_products_support_series_home.html

Installation Notes

For installation instructions, see the Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2111/2211.

Cisco VXC 2111/2211 Firmware

The Cisco VXC 2111/2211 devices run PCoIP Zero Client firmware, also known as ThreadX firmware.

Installing Firmware Release 4.0 for Cisco VXC 2111/2211

To download and install the Cisco VXC 2111/2211 PCoIP firmware, follow these steps:


Note


Changes in PCoIP firmware 3.4.0 onwards resulted in Default Device Configuration (DDC) not being supported for these releases in Cisco VXC Manager 4.8.5. With Cisco VXC Manager 4.8.5, the recommendation is to use Drag and Drop. To use DDC, use Cisco VXC Manager 4.9 and the 4.9-based packages for 3.4.0, 3.4.1, 3.5.1, and 4.0.
Procedure
    Step 1   Go to the following URL:

    http://www.cisco.com/cisco/software/navigator.html

    Step 2   Log in to the Tools & Resources > Download Software page.
    Step 3   Choose Products > Voice and Unified Communications > IP Telephony > Virtualized Endpoints.
    Step 4   Choose Cisco Virtualization Experience Client 2000 Series.
    Step 5   Choose your client type.
    Step 6   In the Latest Releases folder, choose 4.0.
    Step 7   Select one of the following firmware files, click the Download Now or Add to cart button, and follow the prompts:

    Firmware Files Supported with Cisco VXC Manager 4.8.5

    • 40rc_tera_r4_0-12593.zip (Package containing Release 4.0 PCoIP Zero Client Firmware for Cisco VXC 2111/2211 and supporting files for upgrades using Cisco VXC Manager 4.8.5)
    • 40rc_tera_r4_0-12593-fw.zip (Release 4.0 PCoIP Zero Client Firmware for Cisco VXC 2111/2211, supported on Cisco VXC Manager 4.8.5)

    Firmware Files Supported with Cisco VXC Manager 4.9

    • 40rc_tera_r4_0_at_12593.zip (Package containing Release 4.0 PCoIP Zero Client Firmware for Cisco VXC 2111/2211 and supporting files for upgrades using Cisco VXC Manager 4.9)
    • 40rc_tera_r4_0_at_12593-fw.zip (Release 4.0 PCoIP Zero Client Firmware for Cisco VXC 2111/2211, supported on Cisco VXC Manager 4.9)
    Note    If you added the firmware file to the cart, click the Download Cart link when you are ready to download the file.
    Step 8   To update the firmware using Cisco VXC Manager, see the Administration Guide for Cisco VXC Manager.
    Step 9   To update the firmware using the Cisco VXC administrative web interface, see the “Uploading to the device” section of the Cisco Virtualization Experience Client 2111/2211 PCoIP Administration Guide.

    Additional Recommended Upgrade Procedure

    To avoid issues with connecting to VMware View after the upgrade, Cisco recommends that you push the VMware View connection settings to the Cisco VXC 2111/2211 devices using the Cisco VXC Manager ThreadX configuration package for all upgraded Cisco VXC 2111/2211 devices.

    Procedure
      Step 1   In the tree pane of the Administrator Console, expand Package Manager > ThreadX Configuration.
      Step 2   In the details pane, right-click the VMware View package and choose View Package Script to open the Package Script dialog box displaying the script of the Cisco VXC Manager package.
      Step 3   Check the Edit and Save Script to Database ONLY check box and then specify the IP address of the VMware View server in the IP= parameter, and make any other changes to the script as required for your setup (for example, to enable SSL, you can set the SSL parameter to SSL=1.)
      Caution    To include the Port= parameter in the script, you must set a valid value for it. If the Port= parameter is blank, delete it from the script to avoid errors. You only need to specify the Port= parameter if you are using a port other than the default value of 80 for HTTP or 443 for HTTPS.
      Step 4   After completing your changes, click OK.
      Step 5   Schedule the package update using Drag and Drop (supported on Release 4.8.5 and 4.9 of Cisco VXC Manager) or DDC (supported on Cisco VXC Manager 4.9 only). See the Administration Guide for Cisco VXC Manager for details.

      Important Notes

      USB Devices

      Operation

      The following tables describe the mode USB devices operate in based on device type, session type, and device configuration.

      Table 1  EHCI Disabled (Devices operate in USB 1.1 mode only)
        Root Port Behind USB 1.1 and 2.0 Hub
      View Desktop All devices operate in USB 1.1 mode.
      Table 2  EHCI Enabled (USB 2.0 support is enabled)
        Root Port Behind USB 1.1 Hub Behind USB 2.0 Hub
      View Desktop All devices operate in their native mode (USB 1.1 or USB 2.0 isochronous devices (i.e., audio devices, WebCams). USB 2.0 isochronous devices operate in USB 1.1 mode. All devices operate in USB 1.1 mode. All non-isochronous devices operate in their native mode (USB 1.1 or USB 2.0) Isochronous devices are not supported (a warning overlay may appear).

      Transfer Speed

      Each USB port is capable of supporting a maximum of 15Mb/s. However, the total bandwidth shared across all USB ports cannot exceed 18Mb/s.

      Compatibility

      Release 4.0 is compatible with VMware View 4.x, 5.0, and 5.1 deployments using Cisco VXC client devices to connect to View virtual desktops.


      Note


      You can view the firmware version on the Info > Version web page for the device.


      Cisco VXC Manager Compatibility

      Release 4.0 is compatible with Cisco VXC Manager 4.8.5 and 4.9.


      Note


      To manage the Cisco VXC 2111/2211, you do not require the Cisco VXC Manager. As an alternative, you can use the PCoIP Management Console from Teradici for device management.


      LLDP Required for Cisco VXC 2211 Power Negotiation

      To allow PoE-powered Cisco VXC 2211 clients to negotiate power requirements with the connected switch, you must enable LLDP on the connected switch. Otherwise, the client may not be able to draw sufficient power to operate properly.

      Support for Analog Audio Input

      The Cisco VXC 2111/2211 supports analog audio input in PCoIP connections with VMware View 4.5 and later. To support analog audio input, you must install a Teradici audio driver in the virtual desktop. This driver is not installed by the VMware View Agent installer and is not officially supported by VMware. To obtain the audio driver or for any technical support issues, see the Teradici support page.

      System Requirements

      The following are the system requirements for support of the analog audio driver.

      • Cisco VXC 2111/2211 with firmware 3.3.1 or newer
      • VMware View 4.5 hosts or later
      • Guest OS
        • Microsoft Windows XP (32 bit)
        • Microsoft Windows 7 (32 bit)
        • Microsoft Windows 7 (64 bit)

      Installing the Analog Audio Driver

      To install the analog audio driver:

      1. In the VMware View virtual machine, run the PCoIP Component installer.
      2. Follow the instructions in the Teradici PCoIP Component Installer Setup dialog.
      3. If you agree to the license, choose Install (the Teradici Audio Driver is automatically selected). After the installation completes, verify under Control Panel (Sounds) that the Teradici Virtual Audio Driver is the default playback and recording device.
      4. Restart the virtual machine.

      Uninstalling the Analog Audio Driver

      To uninstall the Teradici Virtual Audio Driver, open the Windows Device Manager and under Sound, Video and Game Controllers, delete the Teradici Audio Driver.

      Operating Instructions

      If you disable and then reenable the audio driver from the device manager, you must do one of the following steps to make the driver function properly:

      • Reboot the virtual machine
      • Log off and log back on to the virtual machine
      • Disconnect and reconnect the PCoIP session

      Secure Connection Troubleshooting

      This section provides information for troubleshooting secure connections to the View Connection Server (VCS).

      Issue: Connection to the VCS is failing after removing the VCS certificate with the certificate security set to the default, warn only

      This is the expected behavior as the zero client keeps a cached list of the trusted view connection servers when the security mode is set to Warn if the connection may be insecure (Default).

      If you remove the issuing certificate and attempt to connect to the same VCS, this compromises VMware View client security. To establish a connection after you remove the certificate, you must also clear your trusted VCS address cache list.

      To clear your trusted VCS address cache and confirm the expected connection behavior:

      1. From the Administrative Web Interface, select Configuration > Session .
      2. Click the Show Advanced Options button.
      3. Click the Clear button beside Trusted View Connection Servers.
      4. Click Apply.
      5. From the OSD select Options > User Settings .
      6. Confirm the VCS Certificate Check Mode is set to Warn if Connection may be insecure (Default) and select this option if it is not selected.
      7. Click OK.
      8. Click the Connect button.
      9. Observe the warning message.
      10. Click the Continue button.
      11. Confirm there is a red strikethrough through the https in the VCS address field in the connection dialog box.

      Note


      Alternatively, you can reset the zero client and reconfigure your parameters on the zero client. This clears both the Trusted View Connection Servers cache and the certificate store. Follow steps 5-10 above to confirm the expected connection behavior.


      Issue: No VCS warning message displays when the VCS Certificate Check Mode is set to Warn if Connection may be insecure (Default)

      This is expected behavior for non-interactive session modes, which do not display VCS Warning messages in Warn if the connection may be insecure (Default) security mode.

      Non-interactive session types:

      • View Connection Server + Auto-Logon
      • View Connection Server + Kiosk
      • View Connection Server + Imprivata OneSign (not currently supported on Cisco VXC 2111/2211)

      Interactive session type:

      • View Connection Server

      New Features

      • Security enhancement: Added support for configuring the VCS Certificate Check Mode and VCS Certificate Check Mode Lockout settings on the Configuration > Session web page.

        Note


        This feature is only supported with VMware View 5.1.


        Figure 1. Configuration > Session VCS Advanced Web Page



        Figure 2. VCS Certificate Check Mode Options



        Three modes are supported:
        • Reject the unverifiable connection (Secure) - requires a trusted, valid certificate.
        • Warn if the connection may be insecure (Default) - warns when using unsigned (View default), expired certificates or when the certificate is not self-signed and the zero client trust-store is empty.
        • Allow the unverifiable connection (Not Secure) - connects even if the connection may be compromised. The VMware View tab on the OSD Options > User Settings screen lets users view and potentially modify the VCS Certificate Check Mode. Users cannot modify the mode when the VCS Certificate Check Mode Lockout setting is checked.
        Figure 3. VCS Certificate Check Mode Options



      • Security enhancement: Added support for configuring the Session Negotiation Cipher setting on the Configuration > Session web page. This setting applies to all session connection types. The Cisco VXC 2111/2211 supports one cipher setting.

        Note


        This feature is only supported with VMware View 5.1.


        Figure 4. Session Negotiation Cipher Options



        • Maximum Compatibility: TLS 1.0 with RSA keys and AES-256 or AES-128 encryption.

          Note


          Cisco VXC 2111/2211 only supports AES-128 encryption.


      • Updated the OSD look and feel:
        • Revised color scheme
        • Revised logo placement
      • OSD enhancement: Added support for configuring the Desktop Name to Select and Enable Preparing Desktop Overlay settings on the Advanced Session settings for VCS connections.
        Figure 5. OSD Configuration > Session VCS Advanced Options



      • OSD enhancement: Added support for setting Session Connection Type equal to View Connection Server + Auto-Logon using the OSD. Previous releases support configuring this connection type through the web interface.
        Figure 6. OSD Configuration > Session VCS + Auto-Logon Options



        Figure 7. OSD Configuration > Session VCS + Auto-Logon Advanced Options



      • OSD enhancement: Added support for configuring the native resolution of each display when the display override feature is enabled.
        Figure 8. OSD Configuration > Display Options



      • OSD enhancement: Modified the display topology setting page.
      • OSD enhancement: Removed requirement to reboot zero client after changing display topology Rotation setting.
        Figure 9. OSD User Settings > Display Topology Options



      • Changed default OSD screen saver timeout to 300 seconds. Previous releases disabled the OSD screen saver by default.

      VPN for Cisco VXC 2111

      Cisco IP Phones 8961, 9951, or 9971 running Firmware Release 9.3(1) or later provide support for the Cisco VXC VPN feature, which provides integrated VPN functionality for the Cisco VXC 2111. You can use this feature to enable VPN tunneling for the Cisco VXC 2111 clients when they are attached to Cisco Unified IP Phones 8961, 9951, or 9971. This feature is not supported on the Cisco VXC 2211.

      The Cisco VXC clients require no configuration to support the VPN. All VPN configuration is performed for the phone only.

      To support the Cisco VXC VPN feature, the Cisco VXC 2111 clients must be running the minimum PCoIP Firmware Release 4.0 or later.

      For more information, see Cisco Unified IP Phone 8961, 9951, and 9971 Release Notes for Firmware Release 9.3(1).

      Caveats

      Using the Bug Toolkit

      Known problems (bugs) are graded according to severity level. These release notes contain descriptions of the following:

      • All severity level 1 or 2 bugs
      • Significant severity level 3 bugs
      • All customer-found bugs

      Procedure

      1. To access the Bug Toolkit, go to http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs.
      2. Sign in with your Cisco.com user ID and password.
      3. Enter the ID number in the Search for Bug ID field, and click Go to look for information about a specific problem.

      For more information about how to search for bugs, create saved searches, and create bug groups, click Help on the Bug Toolkit page.

      Open Caveats

      The following table lists severity 1, 2, and 3 defects that are open for the Cisco Virtualization Experience Client 2111/2211 using Firmware Release 4.0.

      For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

      Because defect status continually changes, be aware that Table 1 reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in Using the Bug Toolkit.

      Table 3 Open Caveats for the Cisco Virtualization Experience Client 2111/2211

      Identifier

      Severity

      Headline

      CSCty22509 3 VXC 2211: Choppy audio when using USB headsets
      CSCty95805 3 Cisco VXC 2111: Unable to Power USB Key when Using Power Cube
      CSCty95824 3 Cisco VXC 2111: Attaching USB Camera to 9971 Ends Remote Desktop Session
      CSCua88400 3 PCOIP4.0-Successful secured connection, no event log created.
      CSCub28199 3 PCOIP4.0:View5.1-Expired Certificate Connection failing

      Resolved Caveats

      The following table lists severity 1, 2, and 3 defects that are resolved for the Cisco Virtualization Experience Client 2111/2211 using Firmware Release 4.0.

      For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

      Because defect status continually changes, be aware that this table reflects a snapshot of the defects that were resolved at the time this report was compiled. For an updated view of resolved defects, access Bug Toolkit as described in Using the Bug Toolkit.

      Table 4 Resolved Caveats for the Cisco Virtualization Experience Client 2111/2211

      Identifier

      Severity

      Headline

      CSCts54346 3 VXC 21xx device does not re-do DHCP request upon ethernet link down & up

      Obtaining Documentation and Submitting a Service Request

      For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

      http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

      Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.