Guest

Cisco Virtualization Experience Client 2000 Series

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0_215

  • Viewing Options

  • PDF (1.6 MB)
  • EPUB (506.0 KB)
  • Feedback
Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0_215

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0_215

Introduction

The Cisco Virtualization Experience Client (VXC) 2112 and 2212 are workstation-class virtualization clients for use with the Independent Computing Architecture (ICA) and the Remote Desktop Protocol (RDP). The ICA and RDP protocols are designed to deliver a user desktop from a centralized host server across standard IP networks, enabling you to use applications and desktop peripherals as if you were using them locally.

This release supports the following Cisco Virtualization Experience Clients (VXC) clients using WTOS firmware:

  • Cisco VXC 2112, integrated
  • Cisco VXC 2212, standalone

The Cisco VXC 2112 attaches to the Cisco Unified IP Phone 8961, 9951, or 9971 through a spine connector cable. The Cisco Unified IP Phone 8961, 9951, or 9971 must run Firmware Release 9.1(2) or later.

The Cisco VXC 2212 operates independently and is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches.

Related Documentation

For more information, see the documents available at the following URLs:

New and Changed Information

IPv6 Tab in System Information

The IPv6 tab in the System Information dialog box displays IPv6 information when IPv6 is enabled in the Network Setup > General tab.

Figure 1. System Information > IPv6 Tab



Figure 2. Network Setup > General Tab



Local Date and Time Configuration

Use the Change Date and Time button (System Setup > System Preference > Time / Date > Change Date and Time) to change the date and time (for secure environments requiring a solution to outside server access). When you connect to a file server over HTTPS, the proper time must be defined on the Cisco VXC 2112/2212 for SSL/certificate validation. Note that the year range is from 2000 to 2099.

Figure 3. Time/Date Tab



In Classic Desktop mode and Cisco VXC Desktop mode with StoreFront enabled, you can right-click the time label on the desktop to open and use the Change Date and Time window (you can also hover over the time label and then right-click the popup message).

Figure 4. Change Date and Time



StoreFront Authentication

Firmware Release 8.0_215 supports Citrix StoreFront 2.0 and StoreFront 2.1.

The following StoreFront authentication methods are supported:

  • User name and password
  • Domain pass-through
  • Smart card
  • Pass-through from NetScaler Gateway

    Note


    For NetScaler Gateway logon, NetScaler 10 or 10.1 configured with StoreFront 2.0 or 2.1 is supported. The recommended policy is still "REQ.HTTP.HEADER User-Agent Contains WTOS". Remember to configure the NetScaler session profile "Account Services Address" text box using your StoreFront access URL, for example: https://sf01.xen.bjqa.com. If you are using NetScaler 9.3, you only can configure it with the Storefront legacy site URL, for example: http://sf01.xen.bjqa.com/citrix/StoreName/PNAgent/config.xml, as the NetScaler session profile "Web Interface Address" is supported as well as the former NetScaler + Web Interface configuration.


To log on to StoreFront, use the Remote Connections dialog box (System Settings icon > Remote Connections) to configure one of the following three kinds of Citrix Server addresses:

  1. StoreFront Server IP or FQDN (for example: sf01.xen.bjqa.com)
  2. HTTP(S) with StoreFront Server IP or FQDN (for example: https://sf01.xen.bjqa.com)
  3. Full Store URL (for example: https://sf01.xen.bjqa.com/Citrix/StoreName)
Figure 5. Remote Connections Dialog Box




Note


The Visual Experience tab is grayed out if the Enable StoreFront check box is selected or a Citrix Broker Server is entered in the Broker Setup tab.


Figure 6. Remote Connections Dialog Box with Visual Experience Tab Grayed Out



If your StoreFront Server is configured with multiple stores and you log on using Citrix Server address 1 or 2 above, you must select a store as follows, and then click OK.

Figure 7. Select Account




Note


StoreFront supports legacy XenApp Services URLs (for example: http(s):// sf01.xen.bjqa.com/Citrix/StoreName/PNAgent/config.xml).


Click on applications listed in the APPs page to add the applications to your home page.

Figure 8. Applications List



NOTES:

To remove your subscribed applications or desktops, simply right-click on the application and select the Remove option or you can click on the X in the upper-left corner of the application icon.

Figure 9. Application Icon



To search applications or desktops, enter key words into the search text box in the upper-right corner of the desktop.

Figure 10. Search Text Box



To switch application pages (for example, if you have several subscribed applications and one application page cannot show them all), you can click on the small white point at the bottom of the Apps screen to switch application pages.

Figure 11. Application Page



To launch an application or desktop session do one of the following:

  • Click on the application icon on your home page.
  • Select the Start option in the application icon right-click menu.
  • Click on the link of the application listed under the APPs page.
  • Click on the link of the application listed under the Search text box.

To switch application pages in a full screen session using the mouse, left hover the mouse to display a bar to click to open a switch window (similar to the Ctrl+Alt+Down shortcut).

USB Interface Redirection Support

USB Interface Redirection allows you to separate the USB device redirection with multiple types of components. For example, you can redirect certain HID controls on the USB device without redirecting the whole device.

Important:

Applicable to RDP USB redirection and ICA HDX USB redirection only.

By default this feature is disabled (to enable, use the InterfaceRedirect option of the Device=vusb parameter; see INI Files Reference Guide for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0_215 for details).

VMware View Broker with Radius Authentication Enhancement

The GUI now displays the Radius label instead of SecurID in the authentication window when the broker is configured with Radius authentication. To enable the feature, simply configure the View Connection Server with Radius Authentication.

Figure 12. Radius Label



The Logon View Broker will prompt the two-factor authentication window and display the Radius Authenticator Label.

Figure 13. Radius Login




Note


The rest of the View Radius authentication operates as in previous releases (without any functional changes).


AutoConnectList

AutoConnectList is a new GUI parameter that applies to all brokers. In addition to the already supported AutoConnectList INI setting, you can set the parameter using the Auto Connect List field in the GUI (the setting is saved into NVRAM). The input field of the Auto Connect List only displays the value stored in the NVRAM. If the AutoConnectList parameter is set in the INI file, this locally cached GUI AutoConnectList setting is invalid.

System Tools

The Device Viewer tab displays all the locally attached devices, including USB, Serial, and Parallel on applicable platforms. The Device Viewer button was previously found in the Devices tab of the System Information dialog box.

Important:

The Mirror File Server tab has been removed from the System Tools dialog box as it can now be viewed in the Device Viewer tab.

Figure 14. Device Viewer Tab



Audio Sound Recorder

The sound recorder is contained in the Audio tab of the Peripherals dialog box. It allows you to:

  • Collect information about the speaker and microphone currently being used
  • Examine the performance of the speaker and microphone currently being used
  • Export the recorded audio sample to a USB key for archiving and further analysis
Figure 15. Audio Tab



New and Modified INI Parameters

The following are the new and modified INI parameters and options in this release.

Reference

Description

General Settings (wnos.ini Files Only)

AutoLoad

AutoLoad values and descriptions are updated to increase usability.

TerminalName

TerminalName description are updated for increased usability.

Connection Settings (wnos.ini Files Only)

ConnectionBroker

ConnectionBroker options are updated to include:

  • Microsoft
  • VMware

Dualhead

Dualhead values and descriptions are updated to increase usability. and options updated to include:

  • Swap to use with older ThinOS 7.x builds to swap dual monitors when Mainscreen=2 is set. Swap=yes puts monitor 2 on the left or top of monitor 1 according to the orientation.

MultiLogon

MultiLogon parameter is re-added to support multiple logons.

SignOn

SignOn options are updated to include:

  • LockTerminal to lock the terminal.
  • SCShowCNName to force the use of the CN name of the certificate as the user name when using smartcard signon.
  • SCSecurePINEntry to enable Secure PIN entry function for pkcs15 card with Cherry keyboard.

Connection Settings (wnos.ini, username.ini, and $MAC.ini Files)

Device=vusb

Device options are updated to include:

  • InterfaceRedirect to enable part of a composite device to run locally and part of the device to run on a remote session.

OneSignServer

Note   

The OneSignServer parameter is for use with the Imprivata OneSign Server, which Cisco does not support.

OneSignServer options are updated to include:

  • DisableBeep to set the Rfideas reader to mute when a card is tapped.
  • KioskMode to allow the OneSign user to share the client desktop.
  • EnableFUS to set the Citrix client to remain running when users are switched.
  • TapToLock to specify tap.

PnliteServer

PnliteServer options are updated to include:

  • CAGAuthMethod={LDAP+RSA, RSA+LDAP} to set CAG authentication configuration.
  • StoreFront to support the StoreFront feature. The value will be saved into NVRAM.

SessionConfig=RDP

SessionConfig=RDP options are updated to include:

  • AutoDetectNetwork to enable an RDP session to adapt its data transfer to the bandwidth of the network.

ICA Connect Options

Color option of ICA

Description of ICA color option is updated for increased usability.

RDP Connect Options

Color, Fullscreen, and Resolution options of RDP

Description of RDP color, Fullscreen, and Resolution options are updated for increased usability.

Smart Card Support

The Cisco VXC 2112/2212 supports Gemalto .NET Smart cards. For detailed information, see http:/​/​www.cisco.com/​en/​US/​docs/​solutions/​Enterprise/​Data_Center/​VXI/​VXI_​GemaltoNET.pdf.

The Cisco VXC 2112/2212 firmware can support other smart cards, but Cisco does not provide support for additional smart card solutions. For information about additional smart cards, contact your smart card vendor.

Installation Notes

For installation instructions, see Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2112/2212.

Install Firmware Release 8.0_215


Caution


To ensure full interoperability with Firmware Release 8.0_215, you must run Cisco VXC Manager Release 4.9.1. For details, see the Release Notes for Cisco Virtualization Experience Client Manager Release 4.9.1.


Procedure
    Step 1   Go to the following URL:

    http:/​/​www.cisco.com/​cisco/​software/​navigator.html

    Step 2   Log in to the Download Software page.
    Step 3   Choose Products > Collaboration Endpoints > Virtual Endpoints.
    Step 4   Choose Cisco Virtualization Experience Client 2000 Series.
    Step 5   Choose your client type.
    Step 6   In the Latest Releases folder, choose 8.0.215.
    Step 7   Select the desired firmware files, click the Download or Add to cart button, and follow the prompts.
    Step 8   To update the firmware using Cisco VXC Manager, see the Administration Guide for Cisco Virtualization Experience Manager. For more information about using central configuration for client upgrades, see the "Central Configuration: Automating Updates and Configuration" section of the Administration Guide for Cisco Virtualization Experience Client 2112/2212.

    Important Notes

    Cisco VXC Manager Compatibility

    Firmware Release 8.0_215 is compatible with Cisco VXC Manager 4.9.1


    Caution


    WTOS Firmware Release 8.0_215 is not compatible with prior versions of Cisco VXC Manager.


    ICA Compatibility

    For best experience and performance, use Citrix XenDesktop 7.0 or Citrix XenApp 6.5 with Firmware Release 8.0_215.

    RDP Compatibility

    Firmware Release 8.0_215 supports RDP 8.0 including the use of VMware View for RDP deployments.

    Cisco VXC VPN with Cisco IP Phones

    Cisco IP Phones 8961, 9951, or 9971 running Firmware Release 9.3(1) or later provide support for the Cisco VXC VPN feature, which provides integrated VPN functionality for the Cisco VXC 2112. You can use this feature to enable VPN tunneling for the Cisco VXC 2112 clients when they are attached to Cisco Unified IP Phones 8961, 9951, or 9971. This feature is not supported on the Cisco VXC 2212.

    The Cisco VXC clients require no configuration to support the VPN. All VPN configuration is performed for the phone only.

    To support the Cisco VXC VPN feature, the Cisco VXC 2112 clients must be running the minimum ICA Firmware Release 7.1_118 or later.

    For more information, see Cisco Unified IP Phone 8961, 9951, and 9971 Release Notes for Firmware Release 9.3(1).

    LLDP Required for Cisco VXC 2212 Power Negotiation

    To allow PoE-powered Cisco VXC 2212 clients to negotiate power requirements with the connected switch, you must enable LLDP on the connected switch. Otherwise, the client may not be able to draw sufficient power to operate properly.

    Caveats

    Using Bug Toolkit

    Known problems (bugs) are graded according to severity level. These release notes contain descriptions of:

    • All severity level 1 or 2 bugs
    • Significant severity level 3 bugs

    You can search for problems by using the Cisco Software Bug Toolkit.

    To access Bug Toolkit, you need the following items:

    • Internet connection
    • Web browser
    • Cisco.com user ID and password

    To use the Software Bug Toolkit, follow these steps:

    1. To access the Bug Toolkit, go to: http:/​/​tools.cisco.com/​Support/​BugToolKit/​action.do?hdnAction=searchBugs
    2. Log in with your Cisco.com user ID and password.

    To look for information about a specific problem, enter the bug ID number in the "Search for bug ID" field, then click Go.

    Open Caveats

    The following table lists severity 1, 2, and 3 defects that are open for the Cisco Virtualization Experience Client 2112/2212 using Firmware Release 8.0_215.

    For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

    Because defect status continually changes, be aware that the following table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in the Using Bug Toolkit.

    Table 1  Open Caveats for the Cisco Virtualization Experience Client 2112/2212

    Identifier

    Severity

    Headline

    CSCuc40944 3 ICA-2212 devices gets new IP every time its reboots beyond CVO router.

    Resolved Caveats

    The following table lists severity 1, 2, and 3 defects that are resolved for the Cisco Virtualization Experience Client 2112/2212 using Firmware Release 8.0_215.

    For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

    Because defect status continually changes, be aware that this table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in Using Bug Toolkit.

    Table 2  Resolved Caveats for the Cisco Virtualization Experience Client 2112/2212

    Identifier

    Severity

    Headline

    CSCum24642 2 VXC2x12 clients very slow performance

    Obtaining Documentation and Submitting a Service Request

    For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

    http:/​/​www.cisco.com/​en/​US/​docs/​general/​whatsnew/​whatsnew.html

    Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.

     

    THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:/​/​www.cisco.com/​go/​trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)