Guest

Cisco Virtualization Experience Client 2000 Series

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0

  • Viewing Options

  • PDF (1.4 MB)
  • EPUB (198.1 KB)
  • Feedback
Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0

Release Notes for Cisco Virtualization Experience Client 2112/2212 ICA Firmware Release 8.0

Introduction

Last modified: October 29, 2013

The Cisco Virtualization Experience Client (VXC) 2112 and 2212 are workstation-class virtualization clients for use with the Independent Computing Architecture (ICA) and the Remote Desktop Protocol (RDP). The ICA and RDP protocols are designed to deliver a user desktop from a centralized host server across standard IP networks, enabling you to use applications and desktop peripherals as if you were using them locally.

This release supports the following Cisco Virtualization Experience Clients (VXC) clients using WTOS firmware:

  • Cisco VXC 2112, integrated
  • Cisco VXC 2212, standalone

The Cisco VXC 2112 attaches to the Cisco Unified IP Phone 8961, 9951, or 9971 through a spine connector cable. The Cisco Unified IP Phone 8961, 9951, or 9971 must run Firmware Release 9.1(2) or later.

The Cisco VXC 2212 operates independently and is powered by either an AC adapter (CP-PWR-CUBE-4) or by Power over Ethernet (PoE) capable Cisco Switches.

Related documentation

For more information, see the documents available at the following URLs:

New and changed information

Citrix Features

Broker INI and GUI updates

Default optimizations for XenApp and XenDesktop.

Citrix Receiver 3.x integration

  • LAN Improvements
    • 2D optimizations providing increased response rate and better user experience in virtual sessions. This will also allow higher resolution and better user experience with server side flash content successfully played on the clients.
    • Supports both H.264 and WMV codecs.
    • HDX MediaStream with Multi-Stream ICA policies that are fully supported.
    • Virtual Channel priority and Bandwidth limit control per virtual channel.
    • Improvements in session reliability.
    • Automatic optimization for Xen Desktop and Xen App environments.
  • WAN Improvements
    • ZLC or Client Local Text Echo aka SpeedScreen latency reduction will give a much better user experience over WAN connections.
    • Bandwidth Estimation is supported allowing for dynamically controlled content based on the client's network performance.
    • Citrix EdgeSight support.
    • Access Gateway and Secure Access Gateway supported. Both appliances and virtual machines can now successfully be connected.

XenApp features

  • SpeedScreen Latency Reduction Speed Screen Latency Reduction is a collective term used to describe two separate technologies, namely Local Text Echo and Mouse Click Feedback (which helps enhance the user experience over a high latency connection). Local text echo accelerates the display of the input text on the client device, effectively shielding the user from experiencing latency on the network. Mouse click feedback provides visual feedback for mouse-clicks. To use Speed Screen Latency Reduction, launch a seamless application in the XenApp server, do mouse-click, and notice the visual feedback; input any text, and notice the display of the text on the client device is accelerated. NOTE: You must enable it in both the XenApp server and the WTOS client. To enable it on the WTOS client use the SessionConfig=ICA options for ZLKeyboardMode and ZLMouseMode. To enable it on the XenApp server go to Start > Administrative Tools > Citrix > Administration Tools > SpeedScreen Latency Reduction Manager.

  • Prelaunch/Lingering (XenApp v6.5 only) Prelaunch is a feature that helps to reduce the application starting time during peak traffic. Lingering is a function that decides how to deal with disconnected sessions and existing sessions after a timer interval. You can set it in XenApp policies. To enable Prelaunch: A Pre-Launch Session is based on an existing published application on your XenApp farm. To create one, pick an app, right-click on it in the AppCenter console and select Other Tasks, and then select Create Session Pre-Launch Application. This will create a Pre-Launch MyAppName you can use. To use Prelaunch, launch a seamless application from the XenApp server for which a pre-launch application has been created. A window Starting PreLaunch-xxx will display on the WTOS client. After the Prelaunch is finished, launch any seamless application and notice it will be launched quickly without the Citrix License Warning Notice dialog and application launching window.

RDP 8.0 features

The following RDP 8.0 features and capabilities are supported:

Multi-stream

Multi-stream is a technique to support UDP connect and TCP connect at the same time, in order to improve the user experience in the cases of multimedia playback. Some data goes through TCP and some through UDP. This is decided by the server according to the media nature and other factors.

TS Gateway

Support for RDP connections with TS Gateway. Users can specify the TS Gateway settings in the RDP connection configurations. If users sign on with the Microsoft broker, the applications can obtain the TS Gateway settings from the RDS server.

Copy/paste files directly between active sessions

Users can now copy and paste files directly between active sessions, and not just the content. Between RDP sessions there is no restriction. Note that it also works between ICA sessions but the files must sit within a shared folder accessible to both sessions. Copy/paste of files between RDP and ICA sessions is not supported.

RemoteFX USB redirection

Note the following:

  • Users can exclude device redirection in Global Connection Settings > Session > USB devices redirection.
  • Users must select the Play on remote computer option in RDP Properties > Options to redirected audio devices.
  • USB DVD-ROM redirection is not supported in Windows 8/Windows 2012 RemoteFX sessions.

Connectivity improvements (bandwidth estimation)

RDP 8 has made significant modifications to the code base to enhance the end user experience. Some of these features come into play at initial connection, while others are in flight during a session. The protocol senses the available connection speed through timing code inserted in the standard communications within the packet data. As result a new option Auto detect network was added to the build and enabled by default in the RDP connection properties/options/INI parameters (which also disables the Optimize for low speed link option and the Desktop Experience option by default).

Additional supported features

  • Load Balance
  • Web Single Sign-On (SSO) and Web forms-based authentication
  • Access to personal virtual desktops by using RD Connection Broker
  • Access to virtual desktop pools by using RD Connection Broker
  • Bidirectional audio
  • Windows Media Player redirection
  • Multiple monitors support
  • Enhanced video playback

New and changed INI parameters

Reference

Description

$MAC

$MAC.ini file information added throughout the guide.

AutoDetectNetwork={yes, no}

New parameter AutoDetectNetwork added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to enable RDP auto detect network feature.

DelCertificate has the following new option:

  • builtin

DelCertificate options in "Connection Settings (wnos.ini files only)" updated to include:

  • builtin to delete all certificates including the public certificates included by default.

Device=Ethernet has the following new value for the speed option:

  • 1000M

Device=Ethernet value for the speed option in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to include:

  • 1000M

FileServer= has the following new option:

  • [SecurityMode={No,Warning,Full}]

FileServer options in "Connection Settings (wnos.ini files only)" updated to include:

  • SecurityMode to set the security level for the file server during client verification of the server certificate (only valid when connecting to an https file server).

IPProto=ICMP

Parameter added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini files)" to configure the ICMP protocol.

KeySequence as the following new option:

  • [Win+L key={no,yes}]

KeySequence options in "General Settings (wnos.ini files, {username}.ini, and $MAC.ini files) updated to include:

  • Use Win+L key to lock the client.

MaxVNCD={0, 1}

MaxVNCD in "Connection Settings (wnos.ini files only)" updated to new default value of 0. Default value is 0 means VNC shadowing is disabled. Set to 1 to enable shadowing.

NoticeFile=filename has the following new options:

  • [Title="notice_title"]
  • [ButtonCaption="button_caption"]

NoticeFile options in "Connection Settings (wnos.ini files only)" updated to include:

  • Title and ButtonCaption to specific the notification window title and button (can be customized).

OneSignServer=onesign_server

New parameter OneSignServer=onesign_server added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify a list of host names or IP addresses with optional TCP port number or URLs of Imprivata OneSign servers. An https protocol must be used.

PnliteServer has the following new option:

  • [DefaultSettings={XenApp, XenDesktop}]
  • [SmartcardPassthrough={yes, no}]

PnliteServer=List of {IP address, DNS names, or URLs} options in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to include:

  • DefaultSettings to specify the default settings for XenApp or XenDesktop.
  • SmartcardPassthrough to enable/disable the smartcard passthrough mode.

Privilege has the following new options:

  • [CoreDump={ide, disabled]
  • [EnableNetworkSetup={yes, no}]
  • [DisableNetworkOptions={yes, no}]
  • [EnableSystemPreferences={yes,no}]
  • [DisableTerminalName={yes, no}]
  • [DisableSerial={yes, no}]

Privilege options in "General Settings (wnos.ini files, {username}.ini, and $MAC.ini files)" updated to include:

  • CoreDump to specific to disable the core dump function.
  • EnableNetworkSetup to enable and disable the network setup.
  • DisableNetworkOptions to enable and disable the network options.
  • EnableSystemPreferences to enable and disable the system preferences.
  • DisableTerminalName to enable and disable the terminal name.
  • DisableSerial to enable and disable the serial table in peripherals.

Reboot={no, yes} Time=hh:mm [-hh:mm]

Reboot Time value in "Connection Settings (wnos.ini files only)" updated to include:

[-hh:mm] to have the client reboot at a random time between two times. For example: To have the client reboot on local time 20:30, set: Reboot=yes time=20:30 To have the client reboot at a random time between 20:30 and 4:30, set: Reboot=yes time=20:30-4:30

RTPTosDscp={Default/CS1 /CS2/CS3/CS4/CS5/CS6/CS7/AF 11/AF12/AF13/AF22/AF23/AF31 /AF32/AF33/AF42/AF43}

New parameter RTPTosDscp added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to set RTP/UDP audio channel in the TOS fields.

Rules and Recommendations for Constructing the INI Files updated

Rules and Recommendations for Constructing the INI Files updated to include detailed information for increased usability.

SessionConfig=ALL has the following new options:

  • FontSmoothing={yes, no}
  • [AutoConnect={yes,no}]
  • [MultiMonitor={yes,no}]

SessionConfig options in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to include:

  • FontSmoothing to enable or disable font smoothing.
  • AutoConnect to enable or disable auto connect function.
  • MultiMonitor to set multiple monitor layout. Set MultiMonitor=no to disable multiple monitor layout function. The session has the same desktop width and height with local virtual desktop size, spanning across multiple monitors, if necessary.

SessionConfig=ICA has the following new options:

  • [TosDscp={Default/CS1/CS2/CS3/CS4/ CS5/CS6/CS7/AF11/AF12/AF13/AF22/ AF23/AF31/AF32/AF33/AF42/AF43}]
  • [TosIpPrecedence={0-5}]
  • [ZLKeyboardMode={0, 1, 2}]
  • [ZLMouseMode={0, 1, 2}]

SessionConfig=ICA options in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to include:

  • TosDscp to set IP DSCP in the TOS fields.
  • TosIpPrecedence to set IP Precedence in the TOS fields.
  • ZLKeyboardMode to accelerate the display of the input text on the client device over a high latency connection.
  • ZLMouseMode to accelerate the visual feedback for mouse-clicks on the client device over a high latency connection.

SessionConfig=ICA is deprecating the following option:

  • [BranchRepeater={no, yes}]

SessionConfig=ICA options in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to remove:

  • BranchRepeater - IMPORTANT: DO NOT USE as this option is being deprecated

SessionConfig=RDP has the following new options:

  • [EnableUDP={yes,no}]
  • [TosIpPrecedence={0-5}]
  • [TosDscp={Default/CS1/CS2/CS3/CS4/ CS5/CS6/CS7/AF11/AF12/AF13/AF22/ AF23/AF31/AF32/AF33/AF42/AF43}]

SessionConfig=RDP options in "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" updated to include:

  • EnableUDP=yes enables RDP8 UDP traffic channel.
  • TosDscp to set IP DSCP in the TOS fields.
  • TosIpPrecedence to set IP Precedence in the TOS fields.

Shutdown={standby, turnoff}

Shutdown default setting modified to standby in "General Settings (wnos.ini files, {username}.ini, and $MAC.ini files)."

SignOn= has the following new options: [IconGroupLayout={Vertical, Horizontal}] [UnlockRefresh={yes, no}]

SignOn options in "Connection Settings (wnos.ini files only)" updated to include:

  • IconGroupLayout to configure the direction of the icongroup on the desktop. The default is vertical.
  • UnlockRefresh to specify the refresh action after unlocking the system in classic mode.

Supported INI Files You can Construct updated

Supported INI Files You can Construct updated to include information on the INI file processing hierarchy.

SysName IMPORTANT: DO NOT USE as this parameter is being deprecated.

SysName in "Connection Settings (wnos.ini files only)" is being deprecated. IMPORTANT: DO NOT USE as this parameter is being deprecated.

TerminalName

TerminalName in "General Settings: wnos.ini files only" updated to allow it to be also configured as system variable such as $MAC, $SN or $IP etc.

TimeZone

Information on TimeZone parameter and options/values updated/ clarified in "General Settings: wnos.ini files only."

TimeZone values

New section "TimeZone Parameter: Values" added to the guide to list TimeZone parameter supported values.

TSGWDomainName=[domain]

New parameter TSGWDomainName added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the TS Gateway Domain for RDP session

TSGWENABLE={yes, no}

New parameter TSGWENABLE added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to enable TS gateway.

TSGWNAME=[hostname]

New parameter TSGWNAME added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the TS Gateway host address.

TSGWPassword=[password]

New parameter TSGWPassword added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the TS Gateway Password for the RDP session.

TSGWPassword-enc=[encrypted-password]

New parameter TSGWPassword-enc added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the encrypted TS Gateway Password for RDP session.

TSGWSERVER=[hostname]

New parameter TSGWSERVER added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the TS Gateway host address.

TSGWUsername=[username]

New parameter TSGWUsername added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the TS Gateway Username for RDP session.

TSGWUsername-enc=[encrypted-username]

New parameter TSGWUsername-enc added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to specify the encrypted TS Gateway Username for RDP session.

TSGWUSESAMEINFO={no, yes}

New parameter TSGWUSESAMEINFO added to "Connection Settings (wnos.ini files, {username}.ini, and $MAC.ini Files" to apply RDP connection credential to Gateway credential.

Use of System Variables updated

Rules and Recommendations for Constructing the INI Files updated to include information on how parameters can use supported system variables.

VncPassword has additional information

VncPassword and encrypt option descriptions modified to include requirements and Base64 encoding information in "Connection Settings (wnos.ini files only)."

WakeOnLAN={yes, no}

WakeOnLAN default setting modified to yes in "General Settings (wnos.ini files, {username}.ini, and $MAC.ini files)."

Smart card support

The Cisco VXC 2112/2212 supports Gemalto .NET Smart cards. For detailed information, see http:/​/​www.cisco.com/​en/​US/​docs/​solutions/​Enterprise/​Data_Center/​VXI/​VXI_​GemaltoNET.pdf.

The Cisco VXC 2112/2212 firmware can support other smart cards, but Cisco does not provide support for additional smart card solutions. For information about additional smart cards, contact your smart card vendor.

Installation notes

For installation instructions, see Quick Start Guide: Cisco Virtualization Experience Client (VXC) 2112/2212.

Install Firmware Release 8.0


Caution


To ensure full interoperability with Firmware Release 8.0, you must run Cisco VXC Manager Release 4.9.1. For details, see the Release Notes for Cisco Virtualization Experience Client Manager Release 4.9.1.


Procedure
    Step 1   Go to the following URL:

    http:/​/​www.cisco.com/​cisco/​software/​navigator.html

    Step 2   Log in to the Download Software page.
    Step 3   Choose Products > Collaboration Endpoints > Virtual Endpoints.
    Step 4   Choose Cisco Virtualization Experience Client 2000 Series.
    Step 5   Choose your client type.
    Step 6   In the Latest Releases folder, choose 8.0.
    Step 7   Select the desired firmware files, click the Download or Add to cart button, and follow the prompts.
    Step 8   To update the firmware using Cisco VXC Manager, see the Administration Guide for Cisco Virtualization Experience Manager. For more information about using central configuration for client upgrades, see the "Central Configuration: Automating Updates and Configuration" section of the Administration Guide for Cisco Virtualization Experience Client 2112/2212.

    Important Notes

    Cisco VXC Manager compatibility

    Firmware Release 8.0 is compatible with Cisco VXC Manager 4.9.1


    Caution


    WTOS Firmware Release 8.0 is not compatible with prior versions of Cisco VXC Manager.


    ICA compatibility

    For best experience and performance, use Citrix XenDesktop 5.6 or Citrix XenApp 6.5 with Firmware Release 8.0.

    RDP compatibility

    Firmware Release 8.0 supports RDP 8.0 including the use of VMware View for RDP deployments.

    Cisco VXC VPN with Cisco IP Phones

    Cisco IP Phones 8961, 9951, or 9971 running Firmware Release 9.3(1) or later provide support for the Cisco VXC VPN feature, which provides integrated VPN functionality for the Cisco VXC 2112. You can use this feature to enable VPN tunneling for the Cisco VXC 2112 clients when they are attached to Cisco Unified IP Phones 8961, 9951, or 9971. This feature is not supported on the Cisco VXC 2212.

    The Cisco VXC clients require no configuration to support the VPN. All VPN configuration is performed for the phone only.

    To support the Cisco VXC VPN feature, the Cisco VXC 2112 clients must be running the minimum ICA Firmware Release 7.1_118 or later.

    For more information, see Cisco Unified IP Phone 8961, 9951, and 9971 Release Notes for Firmware Release 9.3(1).

    LLDP Required for Cisco VXC 2212 Power Negotiation

    To allow PoE-powered Cisco VXC 2212 clients to negotiate power requirements with the connected switch, you must enable LLDP on the connected switch. Otherwise, the client may not be able to draw sufficient power to operate properly.

    Caveats

    Using bug toolkit

    Known problems (bugs) are graded according to severity level. These release notes contain descriptions of:

    • All severity level 1 or 2 bugs
    • Significant severity level 3 bugs

    You can search for problems by using the Cisco Software Bug Toolkit.

    To access Bug Toolkit, you need the following items:

    • Internet connection
    • Web browser
    • Cisco.com user ID and password

    To use the Software Bug Toolkit, follow these steps:

    1. To access the Bug Toolkit, go to: http:/​/​tools.cisco.com/​Support/​BugToolKit/​action.do?hdnAction=searchBugs
    2. Log in with your Cisco.com user ID and password.

    To look for information about a specific problem, enter the bug ID number in the "Search for bug ID" field, then click Go.

    Open Caveats

    The following table lists severity 1, 2, and 3 defects that are open for the Cisco Virtualization Experience Client 2112/2212 using Firmware Release 8.0.

    For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

    Because defect status continually changes, be aware that the following table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in the Using bug toolkit.

    Will need updated caveat list:
    Table 1  Open Caveats for the Cisco Virtualization Experience Client 2112/2212

    Identifier

    Severity

    Headline

    CSCuc40944 3 ICA-2212 devices gets new IP every time its reboots beyond CVO router

    Resolved Caveats

    The following table lists severity 1, 2, and 3 defects that are resolved for the Cisco Virtualization Experience Client 2112/2212 using Firmware Release 8.0.

    For more information about an individual defect, you can access the online record for the defect by clicking the Identifier or going to the URL shown. You must be a registered Cisco.com user to access this online information.

    Because defect status continually changes, be aware that this table reflects a snapshot of the defects that were open at the time this report was compiled. For an updated view of open defects, access Bug Toolkit as described in Using bug toolkit.Will need updated caveat list

    Table 2  Resolved Caveats for the Cisco Virtualization Experience Client 2112/2212

    Identifier

    Severity

    Headline

    CSCtu48455 2 VXC2112 keeps link up when user already power-off device
    CSCua23049 2 All EAP and dot1x authentication methods fail when using re-authentication
    CSCud96539 2 VXC2212 - RDP connection to Windows RDS disconnect intermittently
    CSCua33949 3 Deleting "Self service" server address causes no applications to be list, Sev3

    Obtaining documentation and submitting a service request

    For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

    http:/​/​www.cisco.com/​en/​US/​docs/​general/​whatsnew/​whatsnew.html

    Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.

    THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:/​/​www.cisco.com/​go/​trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)