Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 7.1_122
Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 7.1_122
Downloads: This chapterpdf (PDF - 1.26MB) The complete bookPDF (PDF - 1.98MB) | Feedback

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 7.1_122

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 7.1_122

Introduction

The Cisco Virtualization Experience Client (VXC) 2112 and 2212 are workstation-class virtualization clients for use with the Independent Computing Architecture (ICA) and the Remote Desktop Protocol (RDP). The ICA and RDP protocols are designed to deliver a user desktop from a centralized host server across standard IP networks, enabling you to use applications and desktop peripherals as if you were using them locally.

This release supports the following Cisco Virtualization Experience Clients (VXC) clients using WTOS firmware:

  • Cisco VXC 2112, integrated
  • Cisco VXC 2212, standalone

The Cisco VXC 2112 attaches to the Cisco Unified IP Phone 8961, 9951, or 9971 through a spine connector cable. The Cisco Unified IP Phone 8961, 9951, or 9971 must run Firmware Release 9.1(2) or later.

The Cisco VXC 2212 operates independently and is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches.

Related documentation

For more information, see the documents available at the following URLs:

New and Changed Information

Cisco VXC Manager Settings

The Central Configuration dialog box (System Settings > Central Configuration) now provides a Cisco VXC Manager tab.

Figure 1. Cisco VXC Manager tab



This tab allows you to specify the following methods for device discovery:

  • DNS Name Record—(Dynamic Discovery) Allows devices to use the DNS Hostname lookup method to discover a Cisco VXC Manager Server.
  • DNS SRV Record—(Dynamic Discovery) Allows devices to use the DNS SRV record lookup method to discover a Cisco VXC Manager Server.
  • DHCP Option Tags—(Dynamic Discovery) Allows devices to use DHCP option tags to discover a Cisco VXC Manager.
  • Manual Discovery in Management Console—(Manual Discovery from Cisco VXC Manager) If no Dynamic Discovery method is used, you can use the Find Devices dialog box to discover devices from Cisco VXC Manager (Cisco VXC Manager Agents respond to the server discovery by storing the discovered Web Server IP address and port and beginning regular check-ins).
  • Enable Automatic Discovery After Missed Check-ins—Set the number of Cisco VXC Manager check-ins that the device can miss before the device reenables the specified discovery methods to locate Cisco VXC Manager. (0 specifies to not enable discovery if Cisco VXC Manager checkins fail.)

By default, all discovery methods listed are enabled. After the device is discovered, the discovery preferences specified on Cisco VXC manager (under Configuration Manager > Preferences > Discovery) take precedence over the settings specified on the client.

Important:

Due to this additional security feature, the default behavior of WTOS has changed. By default, WTOS now searches for the Cisco VXC Manager server upon initial boot-up. However, administrators and high privilege users can modify this process according to your needs as follows:

  1. You can disable the Cisco VXC Manager discovery feature entirely (for example, if you are not using Cisco VXC Manager) by entering the following parameter entry into your wnos.ini file:
    RapportDisable=yes
  2. You can enable or disable the following two options in your wnos.ini file:
    DnsLookup=no
    DhcpInform=no
  3. You can manually disable any of the discovery features using the WTOS GUI (uncheck any of the check box options in the VXCM tab of the Central Configuration dialog box— System Settings icon > Central Configuration).
  4. You can select which discovery features you want to use from the Cisco VXC Manager Console (see Cisco VXC Manager documentation) and the client then enables or disables options based upon the Cisco VXC Manager selections. Additionally due to this security feature, WTOS 7.1_122 honors supported realtime commands only from Cisco VXC Manager release 4.9.1 or later.

VNC Remote Shadow Disabled by Default

Starting with release 7.1_122, Remote Shadowing using VNC is disabled by default to provide increased security. To enable remote shadowing, include the following parameters in your INI file:

Service=vncd disable=no

To use VNC Shadow, you must define a password. If you are using a Base64 encrypted password (you can use any third party Base64 encoder/decoder), you must set encrypt to yes (VncPassword=<Base64 encoded password> encrypt=yes). If you are using a plain text password, you must set encrypt to no (VncPassword=<plain text> encrypt=no).

New and Changed INI Parameters

The following table describes the New and Change INI Parameters in Firmware Release 7.1_122.

Table 1 New and Changed INI Parameters

Parameter

Description

VncPassword=password [encrypt={no, yes}]

VncPassword and encrypt option descriptions modified to include requirements and Base64 encoding information.

VncPassword=password — Specifies a string of up to 16 bytes as the password used for shadowing.

encrypt — Yes/no option to set according to whether or not the vncpassword you are using is Base64 encrypted. Default is no.

Important: To use VNC Shadow, you must define a password. If you are using a Base64 encrypted password (you can use any third party Base64 encoder/decoder), you must set encrypt to yes (for example: VncPassword=<Base64 encoded password> encrypt=yes). If you are using a plain text password, you must set encrypt to no (for example: VncPassword=<plain text> encrypt=no).

IPProto=ICMP REMOVED

Caution   

This parameter is no longer supported and cannot be used.

Smart Card Support

The Cisco VXC 2112/2212 supports Gemalto .NET Smart cards. For detailed information, see http:/​/​www.cisco.com/​en/​US/​docs/​solutions/​Enterprise/​Data_Center/​VXI/​VXI_​GemaltoNET.pdf.

Additional Notes

See the following additional notes and relevant information for release 7.1_122:

  • Unsupported Headsets:
    • When a headset is not supported by WTOS, it can be force redirected into the session using the following parameter:
      Vusbaudio=Yes
       

      Note


      If you are using ICA redirection, this configuration does not work. This is due to the fact that RAVE looks for the local device to also bring the audio from the remote session. When you force the headset into the remote session, it is no longer recognized as a local device, in which case the headset receives no sound.


  • Video or sound pauses with H.264 Redirected Playback within XD5 and XD5 SP1:
    • As a workaround, under HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\SpeedScreen, you can change the SkipFlowControl registry value to 1, as follows: "SkipFlowControl"=dword:00000001
  • To use Citrix Access Gateway (CAG) in some situations, you must enact the following policy:
    • REQ.HTTP.HEADER USER-Agent CONTAINS WYSE THINOS; not citrix receiver.
  • In some situations, the Timezone parameter does not display properly. As a workaround to this issue, set the timezone using single brackets with Manualoverride enabled, as follows:
    TimeZone='GMT+05:30' Manualoverride=yes

Installation Notes

For installation instructions, see Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2112/2212.

Install Firmware Release 7.1_122


Caution


After you upgrade to release 7.1_122, you must upgrade Cisco VXC Manager to release 4.9.1 to ensure full interoperability. For details, see the Release Notes for Cisco Virtualization Experience Client Manager Release 4.9.1.


Procedure
    Step 1   Go to the following URL:

    http:/​/​www.cisco.com/​cisco/​software/​navigator.html

    Step 2   Log in to the Download Software page.
    Step 3   Choose Products > Voice and Unified Communications > IP Telephony > Virtualized Endpoints.
    Step 4   Choose Cisco Virtualization Experience Client 2000 Series.
    Step 5   Choose your client type.
    Step 6   In the Latest Releases folder, choose 7.1.122.
    Step 7   Select the desired firmware files, click the Download Now or Add to cart button, and follow the prompts.
    Step 8   To update the firmware using Cisco VXC Manager, see the Administration Guide for Cisco VXC Manager. For more information about using central configuration for client upgrades, see the "Central Configuration: Automating Updates and Configuration" section of the Administration Guide for Cisco Virtualization Experience Client 2112/2212.

    Important Notes

    This section provides general information about using and supporting the Cisco VXC 2112/2212 in your environment.

    Cisco VXC Manager Compatibility

    Firmware Release 7.1_122 is compatible with Cisco VXC Manager 4.9.1


    Caution


    WTOS Firmware Release 7.1_122 is not compatible with prior versions of Cisco VXC Manager.


    ICA Compatibility

    For best experience and performance, use Citrix XenDesktop 5.6 or Citrix XenApp 6.5 with Firmware Release 7.1_122.

    RDP Compatibility

    Firmware Release 7.1_122 supports RDP 7.1 including the use of VMware View for RDP deployments.

    Cisco VXC VPN with Cisco IP Phones

    Cisco IP Phones 8961, 9951, or 9971 running Firmware Release 9.3(1) or later provide support for the Cisco VXC VPN feature, which provides integrated VPN functionality for the Cisco VXC 2112. You can use this feature to enable VPN tunneling for the Cisco VXC 2112 clients when they are attached to Cisco Unified IP Phones 8961, 9951, or 9971. This feature is not supported on the Cisco VXC 2212.

    The Cisco VXC clients require no configuration to support the VPN. All VPN configuration is performed for the phone only.

    To support the Cisco VXC VPN feature, the Cisco VXC 2112 clients must be running the minimum ICA Firmware Release 7.1_118 or later.

    For more information, see Cisco Unified IP Phone 8961, 9951, and 9971 Release Notes for Firmware Release 9.3(1).

    LLDP Required for Cisco VXC 2212 Power Negotiation

    To allow PoE-powered Cisco VXC 2212 clients to negotiate power requirements with the connected switch, you must enable LLDP on the connected switch. Otherwise, the client may not be able to draw sufficient power to operate properly.

    RDP USB Redirection

    The USB redirection feature does not function with RDP as it does with ICA. In ICA when USB devices are plugged in, the client displays the auto-play dialog window and the device appears as removable storage (which can be ejected). In RDP, the client maps the device as network storage, which can cause issues if the application that has the file open for writing crashes, causing a locked file. For USB redirection to work the same way with RDP as it does with ICA, the virtual machine must be Windows 7 running on a Hyper-V hypervisor.

    To enable USB redirection, you must enable disk mapping using the mapdisks parameter in the INI file or using the Disks option on the Global Connection Settings > Session tab.

    Maximum Resolution for Windows Media Viewer with RDP

    The following table describes the maximum and recommended resolution and bit rate for Windows Media Viewer (WMV) files in RDP sessions.

    Table 2 Maximum Resolution and Bit Rate for WMV Files with RDP
    Protocol

    RDP

    Decoder

    WMV

    Maximum Resolution/Bit Rate

    720p/6.5 Mbit/s

    Recommended Resolution/Bit Rate

    480p/3 Mbit/s

    Comments

    At a higher resolution or bit rate, audio and video may not be fully synchronized.

    Caveats

    Using bug toolkit

    Known problems (bugs) are graded according to severity level. These release notes contain descriptions of:

    • All severity level 1 or 2 bugs
    • Significant severity level 3 bugs

    You can search for problems by using the Cisco Software Bug Toolkit.

    To access Bug Toolkit, you need the following items:

    • Internet connection
    • Web browser
    • Cisco.com user ID and password

    To use the Software Bug Toolkit, follow these steps:

    1. To access the Bug Toolkit, go to: http:/​/​tools.cisco.com/​Support/​BugToolKit/​action.do?hdnAction=searchBugs
    2. Log in with your Cisco.com user ID and password.

    To look for information about a specific problem, enter the bug ID number in the "Search for bug ID" field, then click Go.

    Open Caveats

    The following table lists severity 1, 2, and 3 defects that are open for the Cisco Virtualization Experience Client 2112/2212 using Firmware Release 7.1_122.

    For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

    Because defect status continually changes, be aware that the following table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in the Using bug toolkit.

    Table 3  Open Caveats for the Cisco Virtualization Experience Client 2112/2212

    Identifier

    Severity

    Headline

    CSCtu48455 2 VXC2112 keeps link up when user already power-off device
    CSCua23049 2 All EAP and dot1x authentication methods fail when using re-authentication
    CSCud96539 2 VXC2212 - RDP connection to Windows RDS disconnect intermittently
    CSCtz55392 3 ICA_7.1_118:Power source field is always displayed as "AF PSE".
    CSCua18656 3 Domain name is being sent for Authentication although Hide Domain set
    CSCua33949 3 Deleting "Self service" server address causes no applications to be list
    CSCuc41029 3 SubNet walk through discovery beyond CVO router not working for 2x12.
    CSCuc40944 3 ICA-2212 devices gets new IP every time its reboots beyond CVO router.
    CSCuc41091 3 IP range walk through discovery beyond CVO router not working for 2x12.
    CSCud38673 3 VXC-2212 - ICA_118:<ACS4.2> ERR_CERT_BAD_SUBJECT_NAME displayed cert srv

    Resolved Caveats

    Not applicable.

    Limitations and Restrictions

    The following table lists known limitations that will not be fixed, and for which there is not always a workaround.

    Table 4 Limitations and Restrictions

    Identifier

    Severity

    Headline

    CSCua88411 3 VXC 2212 will not pass dual display through a Microsoft RDS Broker

    Documentation changes

    This section provides documentation changes that will be implemented in the next major update of WTOS firmware.

    Internal Button Cell Battery: Nonreplaceable

    The Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2112/2212 states that the internal button cell battery in the Cisco VXC 2112/2212 client is replaceable by Cisco. This information is incorrect.

    The internal button cell battery in the Cisco VXC 2112/2212 client is not replaceable by Cisco. If issues arise with the battery, you must return the Cisco VXC client.

    Obtaining documentation and submitting a service request

    For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

    http:/​/​www.cisco.com/​en/​US/​docs/​general/​whatsnew/​whatsnew.html

    Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.