Guest

Cisco Virtualization Experience Client 2000 Series

Release Notes for Cisco Virtualization Experience Client 2111/2211 PCoIP Firmware Release 4.1.0

  • Viewing Options

  • PDF (1.4 MB)
  • EPUB (194.1 KB)
  • Feedback
Release Notes for Cisco Virtualization Experience Client 2111/2211 PCoIP Firmware Release 4.1.0

Release Notes for Cisco Virtualization Experience Client 2111/2211 PCoIP Firmware Release 4.1.0

Introduction

The Cisco Virtualization Experience Client (VXC) 2111 and 2211 are workstation-class virtualization clients for use with PC-over-IP (PCoIP). The PCoIP protocol is designed to deliver a user desktop from a centralized host server across standard IP networks, enabling you to use applications and desktop peripherals as if you were using them locally.

This release supports the following Cisco Virtualization Experience Client (VXC) clients using PCoIP Zero Client firmware:
  • Cisco VXC 2111, integrated
  • Cisco VXC 2211, standalone

The Cisco VXC 2111 attaches to, and obtains its power from, the Cisco Unified IP Phone 8961, 9951, or 9971 through a spine connector cable. The phone is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches. The Cisco Unified IP Phone 8961, 9951, or 9971 must run Firmware Release 9.1(2) or later.

The Cisco VXC 2211 operates independently and is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches.

Related Documentation

For more information, see the documents available at the following URLs:

New and changed information

  • Security features
    • Modified login behavior such that, following three failed attempts to access the Administrative Web Interface or the On Screen Display, each subsequent failed attempt now requires additional time to complete.
    • Added option to force the changing of the administrative password upon the next access of the Administrative Web Interface or On Screen Display (selected password may be blank). See figures below.
    • Added support for logging of failed access attempts to the Administrative Web Interface, On Screen Display, or management interface (for example PCoIP Management Console).
    • Added options to disable the Administrative Web Interface and the management console interface. If you disable the management console interface (using either the Administrative Web Interface or the On Screen Display), Cisco VXC 2111/2211 devices cannot be managed by Cisco VXC Manager or PCoIP Management Console. See figures below. The following figure shows the Configuration > Access web page
      Figure 1. Configuration > Access Web Page



      The following figure shows the OSD Configuration > Access options.
      Figure 2. OSD Configuration > Access Options

  • Other new features:
    • For all zero client session connection types, you can now populate the Differentiated Services Code Point (DSCP) field in the IP header to allow intermediate network nodes to prioritize PCoIP traffic accordingly. You can also enable transport congestion notification to allow PCoIP endpoints to react accordingly if an intermediate network node sets the congestion notification bit in either the IP header or PCoIP transport header. These settings are available at the bottom of the Advanced Options section on all Session pages.
    • The maximum size for certificates has been increased in this release. From the Administrative Web Interface, the maximum certificate size you can upload to a zero client is now 10,239 bytes (up from 6,143 bytes). From the PCoIP Management Console, the maximum certificate size you can upload to a profile is now 8,176 (up from 6,143 bytes). You can upload up to 16 certificates per device as long as the maximum storage space of 98,112 bytes is not exceeded.
    • The zero client Power page has been moved from the Administrative Web Interface Permissions menu to the Configuration menu. This page now also provides an option to configure a screen saver timeout to put attached displays in low-power mode after a specified period of inactivity.
    • Added support for Portuguese (Brazilian ABNT) and Slovak (AWERTY and AWERTZ) keyboard layouts.

Installation Notes

For installation instructions, see the Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2111/2211.

Install Firmware Release 4.1.0

To download and install the Cisco VXC 2111/2211 PCoIP firmware, follow these steps:


Note


Changes in PCoIP firmware 3.4.0 onwards resulted in Default Device Configuration (DDC) not being supported for these releases in Cisco VXC Manager 4.8.5. With Cisco VXC Manager 4.8.5, the recommendation is to use Drag and Drop. To use DDC, use Cisco VXC Manager 4.9 or 4.9.1 and the 4.9.x-based packages.


Procedure
    Step 1   Go to the following URL:

    http:/​/​www.cisco.com/​cisco/​software/​navigator.html

    Step 2   Log in to the Tools & Resources > Download Software page.
    Step 3   Choose Products > Voice and Unified Communications > IP Telephony > Virtualized Endpoints.
    Step 4   Choose Cisco Virtualization Experience Client 2000 Series.
    Step 5   Choose your client type.
    Step 6   In the Latest Releases folder, choose 4.1.0.
    Step 7   Select one of the desired firmware files, click the Download Now or Add to cart button, and follow the prompts.
    Note    If you added the firmware file to the cart, click the Download Cart link when you are ready to download the file.
    Step 8   To update the firmware using Cisco VXC Manager, see the Administration Guide for Cisco VXC Manager.
    Step 9   To update the firmware using the Cisco VXC administrative web interface, see the “Uploading to the device” section of the Cisco Virtualization Experience Client 2111/2211 PCoIP Administration Guide.

    Additional Recommended Upgrade Procedure

    To avoid connection issues after the upgrade, Cisco recommends that you push the View connection settings to the Cisco VXC 2111/2211 devices using the Cisco VXC Manager ThreadX configuration package for all upgraded Cisco VXC 2111/2211 devices.

    Procedure
      Step 1   In the tree pane of the Administrator Console, expand Package Manager > ThreadX Configuration.
      Step 2   In the details pane, right-click the VMware View package and choose View Package Script to open the Package Script dialog box displaying the script of the Cisco VXC Manager package.
      Step 3   Check the Edit and Save Script to Database ONLY check box, specify the IP address of the View server in the IP= parameter, and make any other changes to the script as required for your setup (for example, to enable SSL, you can set the SSL parameter to SSL=1.)
      Caution    To include the Port= parameter in the script, you must set a valid value for it. If the Port= parameter is blank, delete it from the script to avoid errors. You only need to specify the Port= parameter if you are using a port other than the default value of 80 for HTTP or 443 for HTTPS.
      Step 4   After completing your changes, click OK.
      Step 5   Schedule the package update using Drag and Drop (supported on Release 4.8.5 and 4.9.x of Cisco VXC Manager) or DDC (supported on Cisco VXC Manager 4.9.x only). See the Administration Guide for Cisco Virtualization Experience Client Manager for details.

      Important Notes

      DVI to VGA Adapter Requirements

      If you use a DVI to VGA adapter to connect a VGA monitor to the Cisco VXC client, use only the adapter that your device supports. Do not use an adapter that is shipped with a different Cisco VXC model because doing so can cause display issues, such as a blank monitor.

      The following table shows the Cisco DVI to VGA adapters supported by each Cisco VXC model:

      Table 1 Supported Cisco DVI to VGA Adapters

      Cisco VXC model

      Supported Cisco DVI to VGA Adapter

      Cisco VXC 2111 74-9352-01 DVI/VGA cable
      Cisco VXC 2211 74-9355-01 DVI/VGA adapter
      Cisco VXC 2112 Not applicable
      Cisco VXC 2212 Not applicable
      Cisco VXC 6215 74-10414-01 DVI/VGA adapter

      USB Device Operation

      The following tables describe the mode in which USB devices operate based on device type, session type, and device configuration.

      Table 2  EHCI Disabled (Devices operate in USB 1.1 mode only)
        Root Port Behind USB 1.1 and 2.0 Hub
      View Desktop All devices operate in USB 1.1 mode.
      Table 3  EHCI Enabled (USB 2.0 support is enabled)
        Root Port Behind USB 1.1 Hub Behind USB 2.0 Hub
      View Desktop All devices operate in their native mode (USB 1.1 or USB 2.0 isochronous devices, [for example, audio devices, and webcams]). USB 2.0 isochronous devices operate in USB 1.1 mode. All devices operate in USB 1.1 mode. All non-isochronous devices operate in their native mode (USB 1.1 or USB 2.0). Isochronous devices are not supported (a warning overlay may appear).

      USB Transfer Speed

      Each USB port is capable of supporting a maximum of 15Mb/s. However, the total bandwidth shared across all USB ports cannot exceed 18Mb/s.

      LLDP Required for Cisco VXC 2211 Power Negotiation

      To allow PoE-powered Cisco VXC 2211 clients to negotiate power requirements with the connected switch, you must enable LLDP on the connected switch. Otherwise, the client may not be able to draw sufficient power to operate properly.

      Analog Audio Support

      System Requirements

      The following are the system requirements for support of the analog audio driver.

      • Cisco VXC 2111/2211 with firmware 3.3.1 or later
      • View 4.5 hosts or later
      • Guest OS
        • Microsoft Windows XP (32 bit)
        • Microsoft Windows 7 (32 bit)
        • Microsoft Windows 7 (64 bit)

      Support for Analog Audio Input

      The Cisco VXC 2111/2211 supports analog audio input in PCoIP connections with View 4.5 and later. To support analog audio input, you must install a Teradici audio driver in the virtual desktop. This driver is not installed by the View Agent installer and is not officially supported by VMware. To obtain the audio driver or for any technical support issues, see the Teradici support page.

      Installing the Analog Audio Driver

      To install the analog audio driver:

      1. In the View virtual machine, run the PCoIP Component installer.
      2. Follow the instructions in the Teradici PCoIP Component Installer Setup dialog.
      3. If you agree to the license, choose Install (the Teradici Audio Driver is automatically selected). After the installation completes, verify under Control Panel (Sounds) that the Teradici Virtual Audio Driver is the default playback and recording device.
      4. Restart the virtual machine.

      Uninstalling the Analog Audio Driver

      To uninstall the Teradici Virtual Audio Driver, open the Windows Device Manager and under Sound, Video and Game Controllers, delete the Teradici Audio Driver.

      Operating Instructions

      If you disable and then reenable the audio driver from the device manager, you must do one of the following steps to make the driver function properly:

      • Reboot the virtual machine
      • Log off and log back on to the virtual machine
      • Disconnect and reconnect the PCoIP session

      Secure Connection Troubleshooting

      This section provides information for troubleshooting secure connections to the View Connection Server (VCS).

      Issue: Connection to the VCS is failing after removing the VCS certificate with the certificate security set to the default, warn only

      This is the expected behavior because the zero client keeps a cached list of the trusted View connection servers when the security mode is set to Warn if the connection may be insecure (Default).

      If you remove the issuing certificate and attempt to connect to the same VCS, this compromises View client security. To establish a connection after you remove the certificate, you must also clear your trusted VCS address cache list.

      To clear your trusted VCS address cache and confirm the expected connection behavior:

      1. From the Administrative Web Interface, select Configuration > Session.
      2. Click the Show Advanced Options button.
      3. Click the Clear button beside Trusted View Connection Servers.
      4. Click Apply.
      5. From the OSD select Options > User Settings.
      6. Confirm the VCS Certificate Check Mode is set to Warn if Connection may be insecure (Default) and select this option if it is not selected.
      7. Click OK.
      8. Click the Connect button.
      9. Observe the warning message.
      10. Click the Continue button.
      11. Confirm there is a red strikethrough through the https in the VCS address field in the connection dialog box.

      Note


      Alternatively, you can reset the zero client and reconfigure your parameters on the zero client. This clears both the Trusted View Connection Servers cache and the certificate store. Follow steps 5-10 above to confirm the expected connection behavior.


      Issue: No VCS warning message displays when the VCS Certificate Check Mode is set to Warn if Connection may be insecure (Default)

      This is the expected behavior for non-interactive session modes, which do not display VCS Warning messages in Warn if the connection may be insecure (Default) security mode.

      The following are non-interactive session types:

      • View Connection Server + Auto-Logon
      • View Connection Server + Kiosk
      • View Connection Server + Imprivata OneSign (not currently supported on Cisco VXC 2111/2211)

      The following is the interactive session type:

      • View Connection Server

      Compatibility

      Release 4.1.0 is compatible with VMware View 5.0, 5.1, and 5.2 deployments using Cisco VXC client devices to connect to View virtual desktops.


      Note


      You can view the firmware version on the Info > Version web page for the device.


      Cisco VXC Manager compatibility

      Release 4.1.0 is compatible with Cisco VXC Manager 4.8.5, 4.9, and 4.9.1.


      Note


      To manage the Cisco VXC 2111/2211, you do not require the Cisco VXC Manager. As an alternative for device management, you can use the PCoIP Management Console from Teradici (release 1.7.0 or newer; it is recommended to use the latest release of the PCoIP Management Console).


      Caveats

      Using Bug Toolkit

      Known problems (bugs) are graded according to severity level. These release notes contain descriptions of:

      • All severity level 1 or 2 bugs
      • Significant severity level 3 bugs

      You can search for problems by using the Cisco Software Bug Toolkit.

      To access Bug Toolkit, you need the following items:

      • Internet connection
      • Web browser
      • Cisco.com user ID and password

      To use the Software Bug Toolkit, follow these steps:

      1. To access the Bug Toolkit, go to: http:/​/​tools.cisco.com/​Support/​BugToolKit/​action.do?hdnAction=searchBugs
      2. Log in with your Cisco.com user ID and password.

      To look for information about a specific problem, enter the bug ID number in the "Search for bug ID" field, then click Go.

      Open caveats

      The following table lists severity 1, 2, and 3 defects that are open for the Cisco Virtualization Experience Client 2111/2211 using Firmware Release 4.1.0.

      For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

      Because defect status continually changes, be aware that this table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in Using the Bug Toolkit.

      Table 4 Open Caveats for the Cisco Virtualization Experience Client 2111/2211
      Identifier Severity Headline
      CSCue20903 3 View 5.0.1 or earlier may experience USB device connectivity problems

      Resolved caveats

      The following table lists severity 1, 2, and 3 defects that are resolved for the Cisco Virtualization Experience Client 2111/2211 using Firmware Release 4.1.0.

      For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

      Because defect status continually changes, be aware that this table reflects a snapshot of the defects that were resolved at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in Using the Bug Toolkit.

      Table 5 Resolved Caveats for the Cisco Virtualization Experience Client 2111/2211
      Identifier Severity Headline
      CSCty11055 3 No connection and no feedback when Imprivata in lockdown mode
      CSCua88400 3 PCOIP4.0:Successful secured trusted connection, no event log is created

      Obtaining Documentation and Submitting a Service Request

      For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

      http:/​/​www.cisco.com/​en/​US/​docs/​general/​whatsnew/​whatsnew.html

      Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.