Table Of Contents
Release Notes for Cisco Aironet 340 and 350 Series Access Points and 350 Series Bridges Running VxWorks Firmware Version 12.03T
June 21, 2003
These release notes describe features and caveats for Cisco Aironet 340 and 350 Series Access Points and 350 Series Bridges running VxWorks firmware version 12.03T.
A Cisco Aironet Access Point is a wireless LAN transceiver that can act as the connection point between wireless and wired networks or as the center point of a standalone wireless network. Cisco Aironet Bridges are wireless LAN transceivers that connect two or more remote networks into a single LAN.
The access point and bridge use a browser-based management system. The system settings are on web pages in the system firmware. You use your Internet browser to view and adjust the system settings.
You can find the latest release of access point and bridge firmware at this URL:
Installation in Environmental Air Space
Cisco Aironet 350 Series Bridges and metal-case access points are suitable for use in environmental air space in accordance with Section 300-22(c) of the National Electrical Code.
Caution The Cisco Aironet Power Injector has a smaller operating temperature range (32 to 104 oF; 0 to 40 oC) than the 350 series bridge and metal-case access point. The power injector is not intended for use in extremely high or low temperatures or in environmental air spaces, such as above suspended ceilings.
For instructions on the proper installation and grounding of external antennas, refer to the National Fire Protection Association's NFPA 70, National Electrical Code, Article 810, and the Canadian Standards Association's Canadian Electrical Code, Section 54.
Warning Do not locate the antenna near overhead power lines or other electric light or power circuits, or where it can come into contact with such circuits. When installing the antenna, take extreme care not to come into contact with such circuits, as they may cause serious injury or death.
Caution The operational voltage range for 350 series access points and bridges is 24 to 60 VDC, and the nominal voltage is 48 VDC. Voltage higher than 60 VDC can damage the equipment.
Caution Cisco Aironet power injectors are designed for use with 350 series access points and 350 series bridges only. Do not use the power injector with any other Ethernet-ready device. Using the power injector with other Ethernet-ready devices can damage the equipment.
You must have a 340 or 350 series access point or a 350 series bridge to install VxWorks firmware version 12.03T.
Your access point must be running VxWorks firmware version 10.x or later to install VxWorks firmware version 12.03T. Your bridge must be running version 11.07 or later to install VxWorks firmware version 12.03T.
Upgrading to a New Firmware Release
Determining the VxWorks Firmware Version
The VxWorks firmware version number is in the upper-left corner of most management screens in the web-browser interface and at the top of the home (Summary Status) page in the command-line interface.
Follow these instructions to install access point and bridge firmware:
Step 1 Follow this link to the Software Center on Cisco.com and download VxWorks firmware version 12.03T:
Step 2 Select Option #1: Aironet Wireless Software Selector. The Aironet Wireless Software Selector window appears.
Step 3 Click the drop-down arrow to view the valid values for the Product Type field.
Step 4 Click Access Point or Wireless Bridge.
Step 5 Click Submit. The Step 2 of 3 page appears.
Step 6 Click the drop-down arrow to view the valid values in the Model Number field.
Step 7 Select the model number of your access point or bridge:
a. 340 or 350 series for access points
b. 340, 350, or 4800 series for bridges
Step 8 Click Submit. The Step 3 of 3 page appears.
Step 9 To download the current release, click the Current Release (Recommended) radio button.
Step 10 Click Submit. The software selector displays the categories you selected and lists the available download methods.
Step 11 Review your selections. If you want to change anything, use your browser's back button to return to the previous software selector page.
Step 12 When you are ready to download the firmware, go to the Standard Installation section and click Access Point Bundle or Wireless Bridge Bundle. The Aironet Software Selector encryption authorization form appears.
Step 13 Complete the required fields on the authorization form and check the boxes indicating agreement with the download agreement.
Step 14 Type your name exactly as you entered it in the First Name and Last Name fields.
Step 15 Click Submit. The Software Download Software License Agreement page appears.
Step 16 Review the license agreement and click Accept. The File Download window appears.
Step 17 Click Save and select a location at which to save the file.
Note To upgrade firmware from a file server, you must enter settings on the access point's or bridge's FTP Server Setup page. Refer to Chapter 6 in the Cisco Aironet Access Point Software Configuration Guide for more information.
Limitations and Restrictions
This section describes limitations and restrictions for 340 and 350 series access points and 350 series bridges.
Cisco Aironet 350 Series Bridges Incompatible with 340 Series Bridges
Cisco Aironet 340 and 350 Series Bridges can be connected to the same LAN segments, but they cannot communicate wirelessly. Although you can disable STP on non-root 350 series bridges, 350 and 340 series bridges are not designed to interoperate. If you use both 340 and 350 series bridges on your network, make sure the 340 series bridges have radio bridge links only to other 340 series bridges, and that 350 series bridges have radio bridge links only to other 350 series bridges.
Removing Power During Firmware Update Can Corrupt Radio Firmware
When you update the firmware on an access point or bridge, allow the unit to finish its start-up sequence before removing power.
Caution If you update the firmware and remove power before the unit finishes the start-up sequence, the radio firmware might be corrupted, making the unit inoperable.
If the radio firmware is corrupted, the radio indicator (the bottom of the three indicators on top of the access point or bridge) lights continuously red, and the following error message appears when the access point or bridge starts up:
If the radio firmware is corrupted, you should try to reset the unit to factory defaults using the :resetall command in the CLI; see Chapter 9 of the Cisco Aironet Access Point Software Configuration Guide for instructions on resetting the access point. If the unit cannot be reset to defaults, you must return the unit to Cisco for service.
You can safely shut off power after a firmware update when the configuration management pages reappear in the command-line or web-browser interfaces, or when the three status indicators on top of the unit complete the following pattern:
1. All three indicators are continuously green, meaning that the access point is beginning to update the firmware.
2. The middle indicator is steady green and the top and bottom indicators are off, indicating that the access point or bridge is updating the radio firmware.
When the middle indicator blinks or the top and bottom indicators blink, you can remove power.
EAP Authentication Requires Matching 802.1x Protocol Drafts
Note This section applies to wireless networks set up to use LEAP. If you do not use LEAP on your wireless network, you can skip this section.
Wireless client devices use Extensible Authentication Protocol (EAP) to log onto a network and generate a dynamic, client-specific WEP key for the current logon session. If your wireless network uses WEP without EAP, client devices use the static WEP keys entered in the Aironet Client Utilities.
If you use Network-EAP authentication on your wireless network, your client devices and access points must use the same 802.1x protocol draft. For example, if the radio firmware on the client devices that will associate with an access point is 4.16, the access point should be configured to use Draft 8 of the 802.1x protocol. Table 1 lists firmware versions for Cisco Aironet products and the draft with which they comply.
Table 1 802.1x Protocol Drafts and Compliant Client Firmware
Firmware Version Draft 7 Draft 8 802.1x-2001
PC/PCI cards 4.13
PC/PCI cards 4.16
PC/PCI cards 4.23
PC/PCI cards 4.25 and later
WGB34x/352 8.61 or later
AP34x/35x 11.05 and earlier
AP34x/35x 11.06 and later1
AP34x/35x 11.07 and later
AP34x/35x and BR35x 11.21 through 12.03T
AP12xx 11.40T and later
1 The default setting in access point VxWorks firmware version 11.06 and later is 802.1x-2001.
Note Draft standard 8 is the default setting in VxWorks firmware version 11.05 and earlier, and it might remain in effect when you upgrade the VxWorks firmware to version 11.06 or later. Verify the setting on the Authenticator Configuration page in the management system to make sure that the best draft standard for your network is selected.
Use the Authenticator Configuration page in VxWorks firmware version 11.06 or later to select the draft of the 802.1x protocol the access point or bridge radio should use. Follow these steps to set the draft for your access point or bridge:
Step 1 Browse to the Authenticator Configuration page in the access point management system:
a. On the Summary Status page, click Setup.
b. On the Setup page, click Security.
c. On the Security Setup page, click Authentication Server.
Step 2 Use the 802.1x Protocol Version (for EAP authentication) drop-down menu to select the draft of the 802.1x protocol the access point or bridge radio should use. Menu options include:
•Draft 7—No radio firmware versions compliant with Draft 7 have LEAP capability, so you should not need to select this setting.
•Draft 8—Select this option if LEAP-enabled client devices that associate with this access point or bridge use radio firmware versions 4.13, 4.16, or 4.23.
•802.1x-2001 (formerly Draft 10)—This is the default setting in firmware versions 11.06 and later. Select this option if client devices that associate with this access point or bridge use Microsoft Windows XP EAP authentication or if LEAP-enabled client devices that associate with this access point or bridge use radio firmware version 4.25 or later.
Step 3 Click Apply or OK to apply the setting. The access point or bridge reboots.
Select WEP Key 1 as Transmit Key for EAP Authentication
If you use Network-EAP as the authentication type on your wireless network, you must select key 1 as the transmit key on the access point or bridge AP Radio Data Encryption page. The access point or bridge uses the WEP key you enter in key slot 1 to encrypt multicast and broadcast data signals that it sends to EAP-enabled client devices. Because the access point or bridge transmits the WEP key used for multicast messages to the EAP-enabled client device during the EAP authentication process, that key does not have to appear in the EAP-enabled device's WEP key list. The access point or bridge uses a dynamic WEP key to encrypt unicast messages to EAP-enabled clients. When you set up a non-root bridge or repeater access point to authenticate as a LEAP client, the bridge or repeater derives a dynamic WEP key and uses it to communicate with the root bridge or access point. Bridges and repeaters not set up for LEAP authentication use static WEP keys when communicating with other bridges and access points.
Note If you do not use EAP authentication on your wireless network, you can select any WEP key as the transmit key. If you use EAP authentication and you enable broadcast key rotation, you can enable WEP without entering WEP keys.
This section lists important information about access points and bridges running VxWorks firmware version 12.03T.
Cisco Aironet Software Requires Completion of Encryption Authorization Form
In order to access Cisco Aironet software from the Software Center on Cisco.com, you must now fill out a form to receive authorization to download encrypted software. Registered Cisco.com users are required to fill out the form only once, but public users must do so once each session, each time software is downloaded. A form is automatically created for public users. The form for Registered Cisco.com users is located at the following URL:
Reboot of Workgroup Bridges Required When Allowing More Than 20
With VxWorks firmware version 12.03T, you can select no for the Classify Workgroup Bridges as Network Infrastructure setting on the AP/Root Radio Advanced page to allow up to 20 workgroup bridges to associate to the access point or bridge. After selecting no for this setting, you must reboot workgroup bridges associated to the access point or bridge.
The `Reliable multicast messages from the access point to workgroup bridges' setting limits reliable delivery of multicast messages to approximately 20 Cisco Aironet Workgroup Bridges that are associated to the access point. The default setting, disabled, reduces the reliability of multicast delivery to allow more workgroup bridges to associate to the access point.
Access points and bridges normally treat workgroup bridges not as client devices but as infrastructure devices, like access points or bridges. Treating a workgroup bridge as an infrastructure device means that the access point reliably delivers multicast packets, including Address Resolution Protocol (ARP) packets, to the workgroup bridge.
The performance cost of reliable multicast delivery—duplication of each multicast packet sent to each workgroup bridge—limits the number of infrastructure devices, including workgroup bridges, that can associate to the access point. To increase beyond 20 the number of workgroup bridges that can maintain a radio link to the access point, the access point must reduce the delivery reliability of multicast packets to workgroup bridges. With reduced reliability, the access point cannot confirm whether multicast packets reach the intended workgroup bridge, so workgroup bridges at the edge of the access point's coverage area might lose IP connectivity. When you treat workgroup bridges as client devices, you increase performance but reduce reliability.
Cisco Discovery Protocol Re-Enabled for Individual Interfaces on Reboot
The Cisco Discovery Protocol (CDP) feature is enabled by default, and CDP is enabled for each of the access point's or bridge's individual interfaces by default. However, if you disable CDP for one of the individual interfaces, the access point or bridge re-enables CDP for that interface when it reboots. If you disable CDP completely, the access point or bridge does not re-enable CDP on reboot.
Adding or Deleting Proxy Mobile IP AAPs
If you need to add or delete proxy Mobile IP authoritative access points (AAPs), you must disable proxy Mobile IP before changing the configuration. Follow these steps.
Step 1 Browse to the Setup page.
Step 2 In the Services section, click Proxy Mobile IP. The Proxy Mobile IP Setup page appears.
Step 3 Click General. The Proxy Mobile IP General page appears.
Step 4 Change the Enable Proxy Mobile IP setting to no.
Step 5 Add or delete AAPs as necessary.
Step 6 Change the Enable Proxy Mobile IP setting to yes.
Symbol IP Phone Issues
When a Symbol IP phone is associated to a VoIP VLAN (Symbol extensions enabled), the phone associates to the access point and is authenticated approximately every 2 seconds. the Symbol phone shows a "No Network" error every 1 to 2 minutes. It also appears that Symbol phones do not work well when using a non-primary SSID. It is possible that the phone does not perform an active probe and therefore does not detect information about the SSID it associated with in the beacon, causing it to reassociate and authenticate.
Symbol phones may disconnect and be unable to roam between subnets when the access point passes multicast or FTP traffic. If there are no FTP or multicast sessions in progress the Symbol phone operates normally and is able to roam between subnets. To work around this issue, limit multicast and FTP traffic if you are using Symbol IP phones in a proxy Mobile IP environment.
Hot Standby Not Supported on 350 Series Bridges
Although the hot standby feature appears on the menu, hot standby is not supported on 350 series bridges.
This section lists open and resolved software issues in VxWorks firmware version 12.03T.
Getting Bug Information on Cisco.com
If you are a registered Cisco user, you can use the Cisco TAC Software Bug Toolkit, which consists of three tools (Bug Navigator, Bug Watcher, and Search by Bug ID Number) that help you identify existing bugs (or caveats) in Cisco software products. Access the TAC Software Bug Toolkit at:
The following caveats have not been resolved for VxWorks firmware version 12.03T:
•CSCea04960—Packet loss, LEAP failure, and possible memory leak issue.
This caveat is being investigated.
•CSCdx35804—RADIUS attributes in documentation is incomplete or inaccurate.
This caveat is being investigated.
•CSCdy49857—VxWorks event descriptions in documentation are incomplete.
Events displayed on the Event Log page are not described in the software configuration guides for 350 and 1200 series devices. The information is in final review and, when approved, will be released as an appendix to the appropriate software configuration guides.
•CSCdz30285—The Configuring the Cisco Wireless Security Suite application note is incorrect.
The screen capture in section 3.1 of this document shows Add AAA Server, which is incorrect as the Aironet device is a client of the ACS, not a server.
Workaround: Call the TAC for setup instructions.
•CSCin46049—Client is always forced to EAP-associate with multiple VLANs.
When multiple VLANs with different encryption schemes are configured on an access point, the client is forced to authenticate using EAP-TLS. The access point's association table shows that the client is associated to the correct VLAN but shows it as EAP associated.
•CSCin46604—The Solicitations Sent counter on the authoritative access point is always incremented by 2 instead of 1.
•CSCin46620—Resetting All System Factory Defaults does not delete existing VLAN numbers.
When the access point is reset to factory defaults, any VLANs created remain in the Existing VLAN box and with the VLAN name No Name.
•CSCin46639—Access point does not switch to repeater mode when Ethernet link is down.
When the Ethernet interface is shut down through a console command, the access point does not switch to repeater mode. However, when the Ethernet cable is unplugged, the access point switches to repeater mode after the default timeout of 2 seconds.
•CSCin45850—A valid access point is not reporting a rogue access point in its logs when an invalid RADIUS server IP address is used in the rogue access point.
•CSCin46851—After roaming from its home network to the foreign network, the mobile node fails to reach the home or foreign agent but associates to the authoritative access point on the foreign network. The mobile node must fully reathenticate to reach the entire network.
The following caveats are resolved in version 12.03T:
•CSCdy10787—The access point no longer aborts configurations containing an unknown MIB variable.
•CSCdv17999—The antenna alignment utility now displays correct signal strength.
•CSCdy57203—Contrary to user settings, the Always Block Eth setting reverts to disabled.
•CSCdy62052—Hot standby with LEAP no longer disables the radio on the primary access point.
•CSCdy83165—Access points no longer lose connectivity.
•CSCdx81372—The access point now accepts version 11.21-generated ini file.
•CSCdz03100—340 series bridge links are now stable when you replace a 340 series bridge with a 350 series bridge.
•CSCdz07823—An access point in hot standby mode no longer sporadically associates with its parent access point.
•CSCdz09445—Spanning Tree Protocol now works with MIC on 350 bridges.
•CSCdz32962—Enabling MIC no longer causes immediate hot standby takeover by the standby unit.
•CSCdz34132—Aironet Client Utility (ACU) now displays IP address with EAP-TLS instead of MAC address.
•CSCdz38726—Eliminated possible confusion for exiting console.
•CSCdz41180—The Clear Alert Statistics button in the Event Handling Setup page is correctly documented.
•CSCdz47442—IP Setup Utility (IPSU) returns incorrect IP addresses in large networks.
This caveat is closed. Based on testing, the problem occurs only with old VxWorks or IOS software releases. If a network has mixed access points with old and new software releases, the problem may exist. Upgrading all access points to a new software release eliminates the problem.
•CSCdz48575—The access point now defaults to No Action on loss of Ethernet.
•CSCdz61465—Build process no longer fails with the latest IEEE MIB file version 6.2.
•CSCdz67252—The access point no longer becomes unresponsive when issuing a Telnet :? command.
•CSCdz77680—The 350 series bridge no longer fails when handling a large amount of traffic.
•CSCea09515—VxWorks access points now provide three EAP retries.
•CSCea27480—A partial configuration is no longer applied when an error in the ini file is encountered.
•CSCea30474—The time zone can now be configured with SNTP enabled.
•CSCea41998—The 350 series access point no longer disconnects when CDP is enabled.
•CSCea45758—Documentation describing EAP authentication has been expanded and corrected.
•CSCea66535—The hot standby feature now works with LEAP, TKIP, MIC, and Broadcast key rotation.
•CSCeb18758—Documentation now better explains workgroup bridge limitations in network infrastructure mode.
See the "Reboot of Workgroup Bridges Required When Allowing More Than 20" section for more information.
•CSCin46076—Client now gets DHCP IP address with EAP-MD5 and VLAN.
The following is a status of caveats published in the release notes for previous versions that were not resolved in version 12.03T:
•CSCdz04380—Incorrect values are advertised for CWMin and CWMax on Voice VLAN.
This caveat is postponed. The issue is to be resolved in a future maintenance release for VxWorks access points and will advertise the CWMin and CWMax values as defined by IEEE 802.11e.
•CSCdy11906—When WEP is enabled and you set all WEP keys to not set, WEP is still enabled but the web-browser page indicates that WEP is disabled.
This caveat is closed. Disable encryption by changing the WEP setting instead of removing the key.
•CSCin18914—IP release or renew not occurring with EAP-TLS+MIC+KH+BWR.
This caveat is closed. Instances of DHCP failure are no longer occurring.
•CSCdy27831—Access point must be rebooted after you set the Ethernet Unicast Filter to disallowed.
This caveat is closed.
•CSCdy29556—Symbol IP phone continuously associates and authenticates to an access point configured with multiple VLANs.
This caveat is closed. See "Symbol IP Phone Issues" section for additional information.
•CSCdz43069—Symbol phone not working when multicast or FTP traffic is passed.
This caveat is closed. See "Symbol IP Phone Issues" section for additional information.
•CSCdz58192—Root bridges with LEAP enabled on the native VLAN must have the security setting matching that set on the Advanced Radio Setup page.
This caveat is a duplicate of CSCdz03100, which is resolved in version 12.03T.
•CSCdy73695—An error is displayed when a repeater access point receives packets from a root access point while attempting to associate.
This caveat is closed due to lack of severity.
•CSCdy76093—Proxy Mobile IP with multiple authoritative access points continuously sends update packets.
This caveat is closed.
•CSCdw89705—All Ethernet devices behind a client bridge show up as roamed.
This caveat is closed. No further action is planned.
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at http://www.cisco.com/tac. In the Tools and Utilities section, Select Wireless Troubleshooting Center. The Wireless Troubleshooting Center page appears. Choose the link that best suits your troubleshooting needs.
Use the following documents with this document:
•Quick Start Guide: Cisco Aironet Access Points
•Cisco Aironet Access Point Hardware Installation Guide
•Cisco Aironet Access Point Software Configuration Guide
•Quick Start Guide: Cisco Aironet 350 Series Bridges
•Cisco Aironet 350 Series Bridge Hardware Installation Guide
•Cisco Aironet 350 Series Bridge Software Configuration Guide
•Cisco Internetworking Design Guide
•Cisco Internetworking Technology Handbook
•Cisco Internetworking Troubleshooting Guide
Cisco provides several ways to obtain documentation, technical assistance, and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
You can access the most current Cisco documentation on the World Wide Web at this URL:
You can access the Cisco website at this URL:
International Cisco websites can be accessed from this URL:
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which may have shipped with your product. The Documentation CD-ROM is updated regularly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual or quarterly subscription.
Registered Cisco.com users can order a single Documentation CD-ROM (product number DOC-CONDOCCD=) through the Cisco Ordering tool:
All users can order monthly or quarterly subscriptions through the online Subscription Store:
You can find instructions for ordering documentation at this URL:
You can order Cisco documentation in these ways:
•Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).
You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page.
You can e-mail your comments to email@example.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center (TAC) website, as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from the Cisco TAC website. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC website, including TAC tools and utilities.
Cisco.com offers a suite of interactive, networked services that let you access Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com provides a broad range of features and services to help you with these tasks:
•Streamline business processes and improve productivity
•Resolve technical issues with online support
•Download and test software packages
•Order Cisco learning materials and merchandise
•Register for online skill assessment, training, and certification programs
To obtain customized information and service, you can self-register on Cisco.com at this URL:
Technical Assistance Center
The Cisco TAC is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two types of support are available: the Cisco TAC website and the Cisco TAC Escalation Center. The type of support that you choose depends on the priority of the problem and the conditions stated in service contracts, when applicable.
We categorize Cisco TAC inquiries according to urgency:
•Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration. There is little or no impact to your business operations.
•Priority level 3 (P3)—Operational performance of the network is impaired, but most business operations remain functional. You and Cisco are willing to commit resources during normal business hours to restore service to satisfactory levels.
•Priority level 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively impacted by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
•Priority level 1 (P1)—An existing network is "down," or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Cisco TAC Website
The Cisco TAC website provides online documents and tools to help troubleshoot and resolve technical issues with Cisco products and technologies. To access the Cisco TAC website, go to this URL:
All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC website. Some services on the Cisco TAC website require a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:
If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC website, you can open a case online at this URL:
If you have Internet access, we recommend that you open P3 and P4 cases online so that you can fully describe the situation and attach any necessary files.
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:
Before calling, please check with your network operations center to determine the Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:
•Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
•Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:
•iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
•Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Copyright © 2003 Cisco Systems, Inc.
All rights reserved.