Table Of Contents
Release Notes for Cisco Prime Network Control System, Release 184.108.40.206
First Published: May 2012OL-25320-06
These release notes describe the requirements, features, limitations, restrictions (caveats), and related information for the Cisco Prime Network Control System (NCS) Release 220.127.116.11, which is a part of the Cisco Unified Network Solution. These release notes supplement the Cisco NCS documentation that is included with the product hardware and software release.
These release notes contain the following sections:
The NCS is the next generation network management platform for managing both wired and wireless access networks. NCS delivers converged user, access, and identity management, with complete visibility into endpoint connectivity regardless of the device, network, or location. NCS speeds up the troubleshooting of network problems related to client devices, which is one of the most reported customer pain points. NCS also provides identity security policy monitoring through integration with Cisco Identity Services Engine (ISE) to deliver visibility into compliance based on real-time contextual information from the network, users, and devices across the entire wired and wireless access network.
NCS is a scalable platform that meets the needs of small, mid-sized, and large-scale wired and wireless LANs across local, remote, national, and international locations. NCS gives IT managers immediate access to the tools they need, when they need them, so that they can more efficiently implement and maintain secure wireless LANs, monitor wired and wireless LANs, and view users and endpoints across both networks all from a centralized location.
Operational costs are significantly reduced through the workflow-oriented, simplified, and intuitive user experience of the platform, as well as built-in tools that improve IT efficiency, lower IT training costs, and minimize IT staffing requirements, even as the network grows. Unlike overlay management tools, NCS incorporates the full breadth of management requirements from radio frequency, to controllers, switches, endpoints, and users on wired and wireless networks, and to mobility and identity services to deliver a scalable and unified platform.
Key benefits of NCS 18.104.22.168 include the following:
•Ease of Use—Simple, intuitive user interface designed with focus on workflow management. It supports user-defined customization to display only the most relevant information.
•Scalability—Manages complete lifecycle management of 1250 Cisco wireless LAN controllers and 15,000 of Cisco Aironet lightweight access points from a centralized location. Additionally, NCS can also manage up to 5000 autonomous Cisco Aironet access points.
Note Each stack or chassis is counted as a single device.
•Wired Management—Comprehensive monitoring and troubleshooting support for maximum of 5000 Cisco Catalyst switches, which allows visibility into critical performance metrics for interfaces, ports, endpoints, users, and basic switch inventory.
•WLAN Lifecycle Management—Comprehensive wireless LAN lifecycle management includes a full range of planning, deployment, monitoring, troubleshooting, remediation, and optimization capabilities.
•Planning and deployment—Built-in planning and design tools simplify defining access point placement and coverage. Information from third-party site survey tools can be easily imported and integrated into NCS to aid in WLAN design and deployment. A broad array of integrated controller, access point, and command-line interface (CLI) configuration templates deliver quick and cost-effective deployment.
•Delivery Modes—Delivered as a physical or a virtual appliance allowing deployment scalability to help customers meet various deployment models.
In addition to these, NCS 22.214.171.124 supports non-English characters and provides greater stability.
This section contains the following topics:
NCS software is packaged with your physical appliance, can be downloaded as an image for installation, or can be downloaded as a software image to run as a virtual appliance on a customer-supplied server. The NCS virtual appliance can be deployed on any of the platforms listed in Table 1.
Note If you want to use a Cisco UCS server to deploy a virtual appliance for NCS, you can use the UCS C-Series or B-Series. Make sure the server you select matches the processor, RAM and hard disk requirements specified in the "Supported Hardware" section.
Note Non-English characters are supported from Cisco Prime Network Control System, Release 126.96.36.199.
Note These specifications relating to the number of clients supported on different NCS configurations are based on combination of internal lab tests and our experience with large customer installations.
The NCS user interface requires Mozilla Firefox 12.0 or Internet Explorer 8 with the Chrome plugin releases or Google Chrome 18.0.1025.168 m. The Internet Explorer versions less than 8 are not recommended. The client running the browser must have a minimum of 1 GB of RAM and a 2-GHz processor. The client device should not be running any CPU or memory-intensive applications.
Table 2 lists the NCS supported devices for controllers, access point images, Identity Services Engine (ISE), and mobility services engines (MSE).
Table 2 Supported Device Matrix
Supported Switches Supported Controllers Supported MSE Devices 1 Supported ISE Devices Supported Lightweight APs Supported Autonomous APs
Cisco Catalyst 2960, 2975 Switches [IOS12.2(50)SE],
Cisco Catalyst 3560 Switches [IOS12.2(50)SE],
Cisco Catalyst 3750 Switches [IOS12.2(50)SE],
Cisco Catalyst 4500 Switches [IOS12.2(50)SG],
Cisco Catalyst 6500 Switches [IOS12.2(33)SXI].
Cisco 2100 Series
Cisco 2500 Series
Cisco 4400 Series
Cisco 5500 Series
Cisco Flex 7500 Series Wireless LAN Controllers
Cisco Catalyst 3750G Series Integrated Wireless LAN Controllers
Cisco Catalyst 6500 Series Wireless Services Modules (WiSM/WiSM2)
Cisco Wireless LAN Controller Module on SRE
Cisco Wireless LAN Controller Module (WLCM and WLCM-E) for Integrated Services Routers
Cisco Wireless Controller on Service Ready Engine (WLCM2 on SRE)
Cisco MSE 3300 Series
Cisco ISE 3300 Series
Cisco 600 Series, Cisco 1040 AP, Cisco 1100 AP, Cisco 1120 AP, Cisco 1130 AP, Cisco 1140 AP, Cisco 1200 AP, Cisco 1230 AP, Cisco 1240 AP, Cisco 1250 AP, Cisco 1260 AP, Cisco 1500 AP, Cisco 1524 AP, Cisco 1552 AP, Cisco 2600 AP, Cisco 3500i AP, Cisco 3500e AP, Cisco 3500p AP, Cisco 3600i AP, Cisco 3600e AP, Cisco 801 AP, Cisco 802 AP
Cisco 1130 AP, Cisco 1200 AP, Cisco 1230 AP Cisco 1240 AP, Cisco 1250 AP, Cisco 1260 AP, Cisco 1141 AP, Cisco 1142 AP, Cisco 1800 and Cisco 800 ISR Series.
Cisco Aironet 1310 and 1410 Bridges
1 NCS does not support Cisco 2700 or 2710 Location Appliance.
Table 3 lists the NCS supported versions of controllers, access point images, Identity Services Engine (ISE), and mobility services engines (MSE).
Installing NCS Software
The following steps summarize how to install new NCS 188.8.131.52 software on supported hardware platforms (see the "Supported Hardware" section for support details).
Step 1 Click Cisco Download Software at http://www.cisco.com/cisco/software/navigator.html?a=a&i=rpm. You might be required to provide your Cisco.com login credentials.
Step 2 Choose Products > Wireless > Wireless LAN Management > Network Control > Cisco Prime Network Control System.
Step 3 Download the appropriate NCS software version .ova image (for example. NCS-VA-1.1.1.X-large/small/medium.ova) and deploy the OVA template.
Note For more information about small, medium, and large deployments, see the following URL:
Step 4 Reboot the virtual appliance to initiate the NCS installation process.
Step 5 Perform the initial NCS configuration according to the instructions in the Cisco Prime Network Control System Configuration Guide, Release 1.1. Before you run the setup program, ensure that you know the configuration parameters listed in Table 4.
This section contains the following topics:
NCS License Information
NCS is deployed through a physical or virtual appliance. Use the standard License Center Graphical User Interface to add new licenses, which are locked by the standard Cisco Unique Device Identifier (UDI). When NCS is deployed on a virtual appliance, the licensing is similar to a physical appliance, except instead of using a UDI, you use a Virtual Unique Device Identifier (VUDI). The VUDI is created using the product name, hostname, and serial number. The NCS license is recognized by the SKU, which is usually attached to every purchase order to clearly identify which software or package is purchased by a customer.
Note To see the VUDI information, choose Help > About NCS.
For more detailed information on license types and obtaining licenses for NCS, see the following URL:
For detailed information and license part numbers available for NCS, including licensing options for new installations as well as migration from an existing Cisco product like Cisco Wireless Control System, see the Cisco Network Control System Ordering Guidelines at the following URL:
Finding the Software Release
If NCS is already installed and connected, verify the software release by choosing Help > About Cisco NCS. To find more information on the software release that NCS is running, see the Cisco Prime Network Control System Configuration Guide, Release 1.1.
Migrating WCS to NCS 1.1
Note You must upgrade your Cisco WCS deployment to Release 184.108.40.206 or 220.127.116.11 or 18.104.22.168 or 22.214.171.124 before you attempt to perform the migration process to NCS 126.96.36.199.
This section provides instructions for migrating the WCS on either a Windows or Linux server to NCS. The NCS release is a major release to provide for converged management of wired and wireless devices, and increased scalability. The NCS platform is based on Linux 64 bit OS, and the backend database is Oracle DBMS. The existing WCS platforms are either Windows or Linux 32 bit and the backend database is Solid DB.
This section contains the following topics:
Note For steps on migrating NCS in a high availability environment, see Chapter 4, "Performing Maintenance Operations" of the Cisco Prime Network Control System Configuration Guide, Release 1.1.
Exporting WCS Data
Note There is no GUI for exporting data from WCS 7.x. The export all/userdata CLI command is available in WCS Release 7.x and later, which creates the .zip file containing the individual data file.
To export the WCS data, follow these steps:
Step 1 Stop the WCS server.
Step 2 Enter the following command (for Windows) through the script file and provide the path and export filename.
export.bat all zipfile.
Note Run this command in the location where the WCS is installed. For example, <Installation Dir>\WCS7.0.x.x\bin (for Windows) or <Installation Dir>/WCS7.0.x.x/bin (for Linux).
Example outputC:\Program Files\WCS188.8.131.52\bin>export.bat all c:\testdbStarting database server ...Database server is running.Starting data export.Creating export configuration files.Creating database configuration files.Exporting database data, size = 388.4 MB.Exported 3% of database.Exported 7% of database.Exported 10% of database.Exported 14% of database.Exported 18% of database.Exported 21% of database.Exported 25% of database.Exported 29% of database.Exported 32% of database.Exported 36% of database.Exported 40% of database.Exported 43% of database.Exported 47% of database.Exported 51% of database.Exported 54% of database.Exported 58% of database.Exported 61% of database.Exported 65% of database.Exported 69% of database.Exported 72% of database.Exported 76% of database.Exported 80% of database.Exported 83% of database.Exported 87% of database.Exported 91% of database.Exported 94% of database.Exported 98% of database.Completed exporting database data.Exporting reports, map images, accuracy test files,controller auto provisioning files.Exporting Mobility Service Engine, Location Server backups.Creating ChecksumFile.Creating compressed export file.Shutting down database server ...Database server successfully shutdown.Data export completed successfully.
Note For Linux, enter the export.sh all zipfile command. That is, navigate to the bin directory and enter the ./export.sh all /data/wcs.zip. Run this command from the location where WCS is installed. For example, #opt/WCS184.108.40.206/bin>. For an example output, see "Example output" section.
Migrating WCS Data to NCS
To migrate the WCS data, follow these steps:
Step 1 Place the WCS export .zip file (for example, wcs.zip) in a repository or folder (for example, repositories).
Step 2 Log in as admin user and stop the NCS server by entering the ncs stop command.
Step 3 Configure the FTP repository on the NCS appliance by entering the repository command:ncs-appliance/admin#configurencs-appliance/admin(config)#repository ncs-ftp-reponcs-appliance/admin(config-Repository)#url ftp://220.127.116.11//ncs-appliance/admin(config-Repository)#user ftp-user password plain ftp-user
Note Make sure the archived file is available using the show repository repositoryname command.
Step 4 Enter the ncs migrate command to restore the WCS database:ncs-appliance/admin# ncs migrate wcs-data wcs.zip repository ncs-ftp-repo
By default, the WCS events are not migrated.
The following example shows a sample output.ncs-appliance/admin# ncs migrate wcs-data wcs1.zip repository defaultRepoInitiating WCS 7x DB restore . Please wait...INFO: no staging url defined, using local space. rval:2Starting Network Control System...This may take a few minutes...Network Control System started successfully.Stopping Network Control System...This may take a few minutes...Network Control System successfully shutdown.Stage 1 of 5: Decompressing backup ...-- complete.Stage 2 of 5: Restoring Support Files ...: Restoring the Domain Maps ...: -- complete.: Restoring the Report files ...: -- complete.: Restoring the License files ...: -- complete.-- complete.Stage 3 of 5: Restoring Data ...-- complete.Stage 4 of 5: Updating Database Schema ...: This could take long time based on the backup size.-- complete.Stage 5 of 5: Re-enabling Database Settings ...-- complete.
Step 5 Enter the ncs start command to start the NCS server after the upgrade is completed.
Step 6 Log in to the NCS user interface using the root login and the root password.
The following data are not upgradable from WCS to NCS:
•Certain Reports (AP Image Predownload, AP Profile Status, AP Summary, Client Count, Client Summary, Client Traffic, PCI Report, PCI Compliance Detailed and Summary reports, Preferred Call Network Summary report, Rogue APs, Adhoc Rogues, New Adhoc Rogues, Security Summary, and Guest Session reports).
•Client Station Statistics information is not populated with old WCS data in clients charts, client details page, dashboards, and reports.
•Client historical session information does get upgraded.
•All events from WCS Release 7.0 are completely dropped and are not migrated to NCS.
•RADIUS/TACACS server IP and credentials are not migrated and need to be added again after the migration is complete. You need to copy the latest custom attributes from NCS and include them in AAA server for user authentication/authorization in TACACS+/RADIUS.
Note Make sure that you enable the RADIUS/TACACS server as AAA mode in the Administration > AAA > AAA Mode Settings page, and click Save.
•Only alarms with Root Virtual Domain are migrated from WCS Release 7.0 to NCS.
Note All WCS Release 7.0 alarms and event data are stored as CSV files along with other data in a .zip file during upgrade.
•The root password is not migrated from the WCS releases to NCS Release 18.104.22.168. The user must change the root password during the installation of the application. Non-root users and their credentials are migrated during migration.
•Alarm categories and subcategories are not restored after migration to NCS Alarm Summary.
Migrating WCS User Data to NCS 1.1 (for Multiple WCS Servers)
When you migrate multiple WCS servers to the NCS, follow these steps:
Step 1 Stop the WCS server.
Step 2 Export data from the WCS server which is running the most critical data. To do this, follow the steps in the "Exporting WCS Data" section.
Step 3 Export the user data from remaining WCS servers using the following command (for Windows):
export.bat userdata zipfile
Note You need to transfer the exported userdata .zip file from the WCS server to the NCS server.
Note For the remaining WCS servers, except the managed devices and maps, no other userdata (such as config templates, reports, users, virtual-domains, and so on) will not be imported. Also, all network-related data (such as events, alarms, statistics, clients, switches, and so on) will not be imported.
Example outputC:\Program Files\WCS22.214.171.124\bin>export.bat userdata c:\jmr3_exportdataStarting database server ...Database server is running.Starting data export.Initializing PersistenceService. This may take a minute.PersistenceService initialized. Performing export user data.Reading file: conf\userDataExportRules\ConfigTemplateExportRules.xml (1/6)Exporting user data related db tables under group: SECURITY_TEMPLATE_GROUPExporting user data related db tables under group: EAP_TEMPLATE_GROUPExporting user data related db tables under group: HREAP_TEMPLATE_GROUPExporting user data related db tables under group: CLIENT_TEMPLATE_GROUPExporting user data related db tables under group: ROGUE_TEMPLATE_GROUPExporting user data related db tables under group: CONTROLLER_TEMPLATE_GROUPExporting user data related db tables under group: SERVER_TEMPLATE_GROUPExporting user data related db tables under group: RADIO_TEMPLATE_GROUPExporting user data related db tables under group: MSE_TEMPLATE_GROUPExporting user data related db tables under group: LRAD_GENERAL_TEMPLATE_GROUPExporting user data related db tables under group: POLICY_TEMPLATE_GROUPExporting user data related db tables under group: SNMPANDSYSLOG_TEMPLATE_GROUPExporting user data related db tables under group: ACL_TEMPLATE_GROUPExporting user data related db tables under group: APGROUP_TEMPLATE_GROUPExporting user data related db tables under group: LRAD_TEMPLATE_GROUPExporting user data related db tables under group: WLAN_TEMPLATE_GROUPExporting user data related db tables under group: CONFIGGROUP_TEMPLATE_GROUPExporting user data related db tables under group: MSE_EVENT_GROUPExporting user data related db tables under group: SCHEDULER_GROUPReading file: conf\userDataExportRules\DeviceExportRules.xml (2/6)Exporting user data related db tables under group: DEVICE_GROUPExporting user data related db tables under group: CREDENTIAL_GROUPExporting user data related db tables under group: SCHEDULER_GROUPExporting user data related db tables under group: PARTITION_ASSOCIATION_GROUPReading file: conf\userDataExportRules\MapExportRules.xml (3/6)Exporting user data related db tables under group: MAP_GROUPReading file: conf\userDataExportRules\ReportExportRules.xml (4/6)Exporting user data related db tables under group: REPORT_SETTINGS_GROUPExporting user data related db tables under group: SCHEDULER_GROUPReading file: conf\userDataExportRules\UserExportRules.xml (5/6)Exporting user data related db tables under group: TEMPUSER_GROUPExporting user data related db tables under group: DASHBOARD_GROUPExporting user data related db tables under group: SEARCH_GROUPReading file: conf\userDataExportRules\VirtualDomainExportRules.xml (6/6)Exporting user data related db tables under group: PARTITION_GROUPExporting map data.Completed export of user data related db tables.Exporting reports, map images, accuracy test files,controller auto provisioning files.Exporting Mobility Service Engine, Location Server backups.Creating ChecksumFile.Creating compressed export file.Shutting down database server ...Database server successfully shutdown.Data export completed successfully.
Step 4 Do the following:
a. To import all the device data from the managed controllers into the NCS (as root user in ROOT-DOMAIN), choose Configure > Controllers > Add Controllers, choose Zip File from the Add Format Type drop-down list, enter the .zip filename, and then click Add.
b. To import all the device data from the managed autonomous APs into the NCS, choose Configure > Access Points > Add Autonomous Access Points, choose Zip File from the Add Format Type drop-down list, enter the .zip filename, and then click Add.
After you add devices, the NCS pulls all inventory/configuration data from the respective devices.
After you add devices, you can export map data from the WCS (choose Monitor > Maps > Export Map) and import it into the NCS (Monitor > Maps > Import Map).
Upgrading NCS 1.0 to NCS 126.96.36.199
You can upgrade from NCS Releases 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, and 22.214.171.124 to NCS 126.96.36.199.
Caution Ensure that you perform a backup before attempting to upgrade.
Caution Remove high availability before performing the upgrade.
Note For the TACACS+/RADIUS user authentication, the custom attributes related to the new features are required to be added/appended to the existing set of attributes in AAA server to access certain pages/views. For example, Monitor Media Stream page, Virtual Domain List (to view the list of virtual domains from the Create Report page), and so on.
Note Shut down NCS before performing the upgrade. To stop NCS, enter the ncs stop command.
Use the following command to upgrade from NCS 1.0 to NCS 188.8.131.52:# application upgrade NCS-upgrade-bundle-184.108.40.206.tar.gz ncs-ftp-repo
In the preceding command, NCS-upgrade-bundle-220.127.116.11.tar.gz is the upgrade bundle file, which is available for download.
The repository used in the example, ncs-ftp-repo, can be any valid repository.
Examples of repository configurations follow.
FTP Repository:# configure(config)# repository ncs-ftp-repo(config-Repository)# url ftp://ip-address(config-Repository)# user ftp-user password plain ftp-user(config-Repository)# exit(config)# exit#
SFTP Repository:# configure(config)# repository ncs-sftp-repo(config-Repository)# url sftp://ip-address(config-Repository)# user ftp-user password plain ftp-user(config-Repository)# exit(config)# exit#
(config)# repository ncs-tftp-repo
(config-Repository)# url tftp://ip-address
What's New in This Release?
The following new features are available in NCS Release 18.104.22.168.
Support for Fast Transition (802.11r)
802.11r refines the transition process of a mobile client as it moves between access points. The feature allows a wireless client to establish a security at a new access point before making a transition, which ensures minimal connectivity loss and application disruption.
Note Non-802.11r clients may not join the WLAN which has both 802.11i and 802.11r AKMs enabled. If the driver of the legacy clients is capable of understanding the new AKMs, it can associate with a WLAN which has both 802.11i and 802.11r AKMs enabled. For details, see the "Client Association With an 802.11r-enabled WLAN" section.
ISE Support for FlexConnect Access Points
The ISE functionalities that are supported in the WLC 22.214.171.124 release are also supported in locally switched and centrally authenticated clients that associate with the controller through FlexConnect access points.
External Web Authentication Support for Locally Switched WLANs
Local switching is enabled for packets that are destined to the external server at the access point itself. When a client associates with a WebAuth enabled WLAN, the AP gets the name of the FlexConnect ACL from the controller. Using this name, the AP searches the appropriate FlexConnect ACL and updates the client. The AP decides, on a per-packet basis, whether the packet should be dropped or forwarded depending on the information specified in the ACL.
Non-Bridge Mode Support for Outdoor APs
The Cisco outdoor APs, including 1520 and 1550, can only work in Local, Flexconnect and Bridge modes. They can only act as mesh APs in either RAP (root AP) or MAP (mesh AP) role. The indoor unified APs such as 1130, 1140, 1240, 1250, 1260, 3500 and 3600, support multiple modes such as local, FlexConnect, monitor, rogue detector, sniffer, and bridge.
Support for Cisco Wireless Controller on Service Ready Engine (WLCM2 on SRE)
This release supports Cisco Wireless Controller on Cisco Services-Ready Engine (SRE) (WLCM2) running on ISM 300, SM 700, SM 710, SM 900, and SM 910.
It is possible to determine the device type from the information received from the device during its association with a WLAN. The controller acts as the collector of the information and feeds the external analyzer (ISE) with the required data in optimal form. It is also possible to configure device profiling on a per-WLAN basis.
Formatted Warning Message
When you schedule a backup and see the result of the backup status, the status message is well formatted and easily readable.
Server Time Icon on the NCS GUI
The server time icon ()is added to the NCS graphical user interface. You can hover your mouse cursor over the icon to see the current server time.
Enhancement to the AP Template Page
A cancel button has been added to the AP Template page. When you click the Cancel button, the APs which are already provisioned will remain in tact. The AP whose provisioning is in progress will complete its provision. The uninitiated APs will remain as "Not-Initated".
Documentation Roadmap Link
The Learning Modules link is renamed as Documentation Roadmap. The documentation roadmap explains how to access the Cisco Prime Network Control System (NCS) documents, learning modules, and related documents on Cisco.com. To access the Documentation Roadmap page, perform the following steps:
•Log into the NCS user interface.
•From the Help menu, choose Documentation Roadmap. The Help menu is located in the bottom left corner of the Global Toolbar in the NCS page.
This section describes important information about NCS.
This section contains the following topics:
Physical and Virtual Appliance
The NCS is available as a physical or virtual appliance. Both are self-contained, and include the operating system, application, and database. These availability options speed up deployments and deliver greater deployment flexibility.
New License Structure
The NCS is deployed through physical or virtual appliances. Use the License Center Graphical User Interface (Choose Administration > License Center from the NCS home page) to add new licenses, which is locked by the Cisco Unique Device Identifier (UDI). When the NCS is deployed on a virtual appliance, the licensing is similar to a physical appliance, except instead of using a UDI, you use a Virtual Unique Device Identifier (VUDI). The NCS license is recognized by the SKU, which is usually attached to every purchase order to clearly identify which software or package is purchased by a customer. For more information about UDI or VUDI, see the Cisco Prime Network Control System Configuration Guide, Release 1.1.
Wired Client Discovery
Wired client discovery depends on the Content Address Memory (CAM) table on the switch and this table is populated with the clients data. When a wired client is not active (not sending traffic) for a certain amount of time, usually five minutes, the corresponding client entry in the CAM table times out and is removed. In this case, the client is not discovered in the NCS.
Autonomous AP Migration Analysis
Migration Analysis used to run autonomous AP during discovery can be configured by selecting the Run Autonomous AP Migration Analysis on discovery check box in the Administrator > Settings > CLI Session page. By default, this option is disabled.
The Aeroscout engine fails to start MSE if the importing map names contain special characters such as '&'.
Monitoring Disk Usage
You can monitor the current disk usage from the NCS > Administration > Appliance page.
When the NCS backup background task fails, it indicates that there is an issue with disk space. Choose NCS > Administration > Background Tasks to check the status of the NCS Backup Task.
Recommendations for Managing Disk Usage
We recommend the following to effectively utilize and manage disk space in the NCS server:
•Clean up some of the old files in the /dev/mapper/smosvg-localdiskvol partition so that there is some space available in this partition. This partition is the user-accessible area of the disk where any reports, FTP files, and local repository files are stored. This partition should have some free space so that files can be stored in this location. If this partition is full then any attempt to store files will fail.
There are two ways to clean up the files located in this partition:
–Log in to the NCS CLI as an admin User and enter the delete disk:/dir/filename command to delete files from the /dev/mapper/smosvg-localdiskvol partition.
–Log in to the NCS CLI as an admin User and enter the ncs cleanup command. You are prompted to confirm if you want to delete all files in the local disk partition.
•Configure the NCS backup background task so that it uses a remote repository. This helps you to manage the space in the local disk partition effectively. You can configure a remote repository using any of the following protocols:
Example remote repository configuration:ncs-appliance/admin# configureEnter configuration commands, one per line. End with CNTL/Z.ncs-appliance/admin(config)# repository remote_repositoryncs-appliance/admin(config-Repository)# url ?<WORD> Enter repository URL, including server and path info (Max Size - 80)cdrom: Local CD-ROM drive (read only)disk: Local hard disk storageftp: URL using a FTP serverhttp: URL using a HTTP server (read only)https: URL using a HTTPS server (read only)nfs: URL using a NFS serversftp: URL using a SFTP servertftp: URL using a TFTP serverncs-appliance/admin(config-Repository)# url ftp://hostname/rootDir.
•Ensure the used disk space in the /dev/mapper/smosvg-optvol partition is below 70% so that the backup attempts do not fail. If you encounter backup failures then you can configure a remote NFS mount for the backup task. This remote NFS mount should be an open share with read and write permissions.
Note The /opt partition contains the application and the database. There is no estimate of how much space is used by the database. The space occupied by the database depends on the on the data size.
Example remote staging area configuration:ncs-appliance/admin# configureEnter configuration commands, one per line. End with CNTL/Z.ncs-appliance/admin(config)# backup-staging-url ?<WORD> NFS URL for staging area (Max Size - 2048)ncs-appliance/admin(config)# backup-staging-url nfs://hostname:/mountncs-appliance/admin(config)# exitncs-appliance/admin#
•Add additional disk space in a virtual appliance if you encounter disk space issues.
If you have additional disk space available with your deployed virtual appliance, you can modify that virtual appliance to use more of that space. For this release, contact Cisco TAC to help in increasing the disk space available to the virtual appliance.
•Change the data retention period for aggregated data if you want to manage the disk space. To change the retention period for aggregated data, choose NCS > Administration > Settings > Data Management and change the values.
Table 5 provides the recommendations for changing the data retention period for aggregated data.
Table 5 Data Retention Period for Aggregated Data - Recommendations
Aggregation Default Recommendation for systems with more than 5000 clients
Note All statistics data is part of the data retention period. Statistics data contains only number which can be aggregated such as CPU utilizations, client counts, and so on. All data associated with timestamp is either aggregated data or historical data. Aggregated data consists with numbers that can be aggregated as minimum, maximum, average, and sum. Historical data consists with other information (may also include numbers) that cannot be computed, such as client association history, alarms and events. The reports showing as charts usually are using aggregated data. For example, client count, device utilizations, and so on.
The settings decide how long the NCS retains the aggregated data. The NCS polls for statistics data every hour, day, and week. The statistics data is used to generate trending charts or reports. You can significantly reduce the size of many aggregated tables by reducing the size of the aggregation period. The drawback being the granularity of trending charts or reports might be bigger.
For example, if you create a four weeks long Client Count chart, with the default setting, the hourly data is used. It means it has 4*7*24=672 data points (samples). With the new setting, the daily data is used and it has 4*7=28 data points. You see no change if you create a chart or report for less than 2 weeks.
RADIUS Server Authentication
During the RADIUS Server request and response cycles, the packets size cannot exceed 4096 characters, per IETF RFCs for RADIUS. Because of this reason, the attribute list sent from the RADIUS server may not contain all tasks in the authorization info for user.
Client Association With an 802.11r-enabled WLAN
Legacy clients may not associate with a WLAN which has both 802.11i and 802.11r AKMs enabled. The driver of the supplicant who parses the Robust Security Network Information Element (RSNIE) will be old and hence it will be unaware of the additional AKM suites in the RSNIE. Because of this limitation in the client, it does not send the association request. These clients can associate only with a non-802.11r WLAN.
However, an 802.11r-capable client can associate as an 802.11i client on a WLAN which has both 802.11i and 802.11r Authentication and Key Management (AKM) suites enabled. If the driver of the legacy client is made to understand the new 802.11r AKM, it can send the association request and successfully associate with the previously mentioned WLAN.
This section lists open and resolved caveats in the NCS Release 126.96.36.199. For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are taken directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation might be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•Commands are in boldface type.
•Product names and acronyms may be standardized.
•Spelling errors and typos may be corrected.
Note If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:
Note To become a registered cisco.com user, go to the following website:
This section contains the following topics:
Table 6 lists the open caveats in NCS Release 188.8.131.52.
Table 7 lists the resolved caveats in NCS 184.108.40.206.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use the Cisco Bug Toolkit to find caveats of any severity. See the following URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website:
Click Wireless and Wireless LAN Management and then choose Network Control System.
For information on the Cisco Unified Network Solution and for instructions on how to configure and use the NCS, see the Cisco Prime Network Control System Configuration Guide and the Cisco Wireless LAN Controller Configuration Guide.
Table 8 provides a list of the documentation for the NCS 220.127.116.11.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2012 Cisco Systems, Inc. All rights reserved.