Table Of Contents
Release Notes for
Cisco IP Solution Center, 4.1.2
June 27, 2007
All documentation, including this Release Notes for Cisco IP Solution Center, 4.1.2 document and any or all of the parts of the Release 4.1 documentation set: http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1 and Release Notes for Cisco IP Solution Center, 4.1.1 (http://www.cisco.com/en/US/products/sw/netmgtsw/ps4748/prod_release_note09186a00806ae8ea.
html), might be upgraded.
Cisco IP Solution Center software is referred to as ISC.
This document gives you an overview of this maintenance release and helps you understand what has changed since ISC 4.1.1. Please read this document prior to reading any other manual for ISC.
The information in this document is organized into the following sections:
Cisco IP Solution Center (ISC) 4.1.2 is a maintenance release for ISC 4.1, which includes Cisco MPLS Diagnostics Expert (MDE) 1.0.2. The system recommendations for ISC 4.1.2 are based on those for ISC 4.1.1. To see these system recommendations, go to the "System Recommendations" section.
URLs for base information about ISC 4.1 and an overview and suggested reading order of these documents is given in Cisco IP Solution Center Getting Started and Documentation Guide, 4.1. (http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/docguide/index.htm)
Customer-found problems that were found in ISC 4.1.1 and fixed in this maintenance release are documented in the "Problems Fixed in ISC 4.1.2" section. Some of the problems resulted in product enhancements and behavioral changes. The changes are highlighted in the "New and Changed Information in ISC 4.1.2" section.
Steps for installing ISC 4.1.2 are found in the "Installation Notes" section, and other important information is found in the "Important Notes" section. For problems that were found and might still exist in ISC 4.1.2, see the URL in the "Known Problems in ISC 4.1.2" section.
The system recommendations and requirements are listed in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm.
The recommendation is to thoroughly review this information before even planning your installation, to be sure you have all the hardware and software you must successfully install.
Due to the additional support of Solaris 10 in ISC 4.1.2, the section ISC Server Solaris Configuration in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1 remains valid and the additional information for Solaris 10 is specified in ISC Server Solaris Configuration for Solaris 10 Support in this document.
Network devices supported in ISC 4.1.2 are listed with the tested IOS release in the section, Network Devices and Related Software Supported in this document.
ISC Server Solaris Configuration for Solaris 10 Support
This section is in addition to the section ISC Server Solaris Configuration for Solaris 8 support in Chapter 1, "System Recommendations" of Cisco IP Solution Center Installation Guide, 4.1.
Solaris 10 with recommended patches of at least 118822-25 for the kernel level of the patch cluster and JDK 1.4.2_08 patches are found at: http://sunsolve.sun.com. As a minimum, you must get your system up to the 118822-25 Kernel patch level. For installation instructions, see the README file which is at the same location as the patch bundle.
Note When you install Solaris 10, be sure to choose either the Developer Solaris Support Group or the Entire Solaris Software Group. Do not choose the End User System software group. The Developer System Support and Entire Distribution software groups contain the software required for a correct operating system installation (such as the SUNWbtool and SUNWsprot packages).
Caution Make sure that the file descriptor limit is not set in the ISC workstation login shell file (which can be the .login file, the .cshrc file, the .profile file, or the .kshrc file). If the login shell file contains a line with the ulimit -n command (for example, "
ulimit -n <number>"), comment out this command line in the file. Log out and then log back in to ensure that the ulimit is no longer set.
ISC cannot override the file descriptor limitation setting in the login shell file. If the value is set incorrectly, ISC might experience operational problems.
Network Devices and Related Software Supported
Table 2, "Network Devices and Related Software Supported with ISC 4.1.2," in this document replaces Table 1-3 in Cisco IP Solution Center Installation Guide, 4.1 (http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/bookinst.pdf)
and Table 1 in Release Notes for Cisco IP Solution Center, 4.1.1 (http://www.cisco.com/en/US/products/sw/netmgtsw/ps4748/prod_release_note09186a00806ae8ea.
This new table gives all the current information listed alphabetically, beginning with the application name.
Problems Fixed in ISC 4.1.2
New and Changed Information in ISC 4.1.2
The following are enhancement and changed behavior topics for this ISC Release 4.1.2 (listed alphabetically):
Cisco ME 6524 Ethernet Switch Supported by L2VPN and Metro Ethernet Services
For L2VPN and Metro Ethernet, the Cisco ME 6524 Ethernet Switch is only supported as a PE-AGG and U-PE, not as an N-PE.
Ethernet QoS Support for Cisco ME 3400 Series Ethernet Access Switches
Ethernet QoS now supports the Per Port Per VLAN (PPPV) feature on the Cisco ME 3400 Series Ethernet Access Switches on Cisco IOS 12.2(25) SEG, acting as a U-PE. Due to the platform limitation, this PPPV feature on the Cisco ME 3400 Series Ethernet Access Switches is applicable for Ethernet Relay Service (ERS) and Ethernet Relay Multi-point Service (ERMS) only. For Ethernet Private Line (Ethernet Wire Service (EWS) and Ethernet Multi-point Service (EMS)) the QoS policy is per port only.
The ISC Service Policy screen (Service Design > Policies) includes a set of predefined Ethernet QoS policies. For ERS and ERMS, the predefined policies are 3400-COS and 3400-DSCP. For EWS and EMS, the predefined policy is 3400-EWS. These are provided so you can copy these for your use or use these as a base and modify some of the attribute values for your use.
L2VPN Access to MPLS for Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches
This release now supports Layer 2 access into MPLS for the Cisco ME 3400 Series Ethernet Access Switches and Cisco Catalyst 4500 Series Switches. Specifically, for the Cisco ME 3400 Series Ethernet Access Switches, the shared virtual local-area network (VLAN) function, the User-Network Interface (UNI), and the secure Media Access Control (MAC) address limit range are now fully supported. And for the Cisco Catalyst 4500 Series Switches, the non-negotiate option was added for the link speed for the PE-AGG and U-PE UNI.
L2VPN EWS Hybrid Support
Previously, the only Layer2 VPN support for Ethernet Wire Service (EWS) was from EWS to EWS. For this release, support is also from EWS to Network to Network Interface (NNI) as a trunk port. To create this new type of Service Request, you need to create an EWS hybrid policy by unchecking the standard UNI flag. When using the EWS hybrid policy for Service Request creation, for the EWS side of the connection, check the standard UNI flag, for the NNI side of the connection, the standard UNI flag must remain unchecked.
Ethernet QoS is also available for EWS hybrid for the Cisco ME 3400 Series Ethernet Access Switches and the Cisco Catalyst 3550 Series Switches.
ME QoS Policy Support on SVIs, Interfaces, and Subinterfaces on the Cisco 6500 Series and Cisco 7600 Series Routers Acting as a U-PE and N-PE
In compliance with Broadband Model 4A for Cisco 6500 Series or Cisco 7600 Series Routers acting as a U-PE and N-PE, generated Metro Ethernet (ME) QoS policies can be attached to the actual Layer 3 interface or subinterface. To do this, navigate Service Design > Policies > L2VPN Policy and in the L2VPN (Point To Point) Policy Editor window, uncheck the N-PE pseudo-wire on SVI check box.
Previously in ISC, the ME QoS policy was always attached to the Software Virtual Interface (SVI).
MFR Support for MPLS
Previous versions of ISC included Layer 2 support of Multi-link Frame Relay (MFR). In this release, ISC now supports the MFR as a virtual interface during MPLS VPN provisioning.
Solaris 10 Supported
In this ISC 4.1.2 release, Solaris 10 is supported in addition to Solaris 8. Details are provided in ISC Server Solaris Configuration for Solaris 10 Support.
This section contains the following information:
ISC 4.1.2 supports upgrading from ISC 3.2.2, 126.96.36.199, 188.8.131.52, 4.0, 4.0.1, 4.1, or 4.1.1, after ISC 4.1 is installed.
If you have an existing VPNSC 1.x or 2.x repository, you must migrate it to be able to use it with ISC 4.1. Get the migration package, including the documentation that lists limitations, from firstname.lastname@example.org.
You must have ISC 4.1 or 4.1 plus 4.1.1 installed before you download the software to upgrade to ISC 4.1.2 on the same server. Support for upgrading from 1SC 3.2.2, 184.108.40.206, 220.127.116.11, 4.0, or 4.0.1 to 4.1 is explained in Cisco IP Solution Center Installation Guide, 4.1.
Note If you are upgrading from an ISC release prior to ISC 4.1 and have an external Oracle database, you must upgrade your database to Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - 64bit Production
with the Partitioning, OLAP, and Data Mining options.
Then follow these steps:
Step 1 Before upgrading to this Maintenance Release, complete the discovery workflow. Otherwise, when you upgrade these previously initiated discovery workflows, the data discovered during that process might be lost.
Step 2 Before proceeding to install the ISC 4.1.2 Maintenance Release, be sure to back up your repository, as explained in Appendix C of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm
Note If you need to revert to your prior version of ISC, this backed up repository is the one you need to point to after uninstalling ISC 4.1.2. When you uninstall ISC 4.1.2, you do not remove modifications made to the repository in Step 11. Any Service Requests provisioned under ISC 4.1.2 will then need to be reprovisioned.
Step 3 Go to http://www.cisco.com/cgi-bin/tablebuild.pl/isc (where, in tablebuild.pl, the last character is the lower-case letter "l") to retrieve the ISC 4.1.2 Maintenance Release (isc-4.1.2-maint.tar.gz) and the database schema upgrade package (ISC412_UpgradeTool.tar.gz).
Note Patches that use ISC 4.1.2 as the base will also be located at http://www.cisco.com/cgi-bin/tablebuild.pl/isc
Step 4 Prior to installing the ISC 4.1.2 Maintenance Release, verify that you have 100 MB of free space in the $ISC_HOME directory and that you are logged in with the same username as the owner of your supported version of ISC.
Step 5 Navigate to a directory other than $ISC_HOME.
Step 6 Use the following command to untar and unzip the appropriate isc-4.1.2-maint.tar.gz file:
gunzip -c isc-4.1.2-maint.tar.gz | tar xf -
Step 7 If ISC is running, use the following command to stop the database, name server, and WatchDog on the machine on which it is running:
Step 8 If you are running on ISC 3.2.2,18.104.22.168, 22.214.171.124, 4.0, or 4.0.1, install ISC 4.1, as documented in Cisco IP Solution Center Installation Guide, 4.1.
Note Prior to installing ISC 4.1, if you are moving a repository from one machine to another, the schema upgrade fails unless the repository has been initialized on the new machine. This requires that you successfully run initdb.sh on the repository to update the host entry.
Thus, when you are upgrading from an ISC version prior to ISC 4.0.1, you must have a running ISC installation on your new machine that is the same version as that on your old machine so that initdb.sh can be used to initialize your repository with the correct hostname.
Step 9 Use the following command to run the patch installation script:
b. To accept the default value for a prompt indicated in [ ], for example, [n] or [y], press Enter. To terminate the installer at any time, press Ctrl-C. Specifically you will be asked to enter a new path or press Enter for the default [/opt/isc-4.1].
c. At the end of the installation, you will receive a message that the patch installation is complete.
Step 10 Use the following command on the ISC server to untar and unzip the database schema upgrade package:
gunzip -c ISC412_UpgradeTool.tar.gz | tar xf -
The directory ISC412_UpgradeTool is created. Before you proceed, read the README file that is located in this directory.
Step 11 Use the following commands on the ISC server to use the upgrade tool:
./upgradeISCSchema.sh <full path of ISC_HOME>
The log messages are printed on the window and written in the log file contained in the log directory under the directory ISC412_UpgradeTool.
Step 12 If you choose to uninstall this patch after successfully installing, follow the steps in the "Uninstall" section.
Note For all Cisco 7600 Series Routers, you must do a config collection to synchronize the Service Requests in the repository. This is needed because ISC changed the way it detects Cisco 7600 Series Routers hardware information.
To uninstall the ISC 4.1.2 Maintenance Release that was successfully installed by following the steps in the "Upgrade Paths" section, follow these steps:
Step 1 Log in with the same username as the owner of ISC.
Step 2 If ISC 4.1.2 is running, use the following command to stop the database, name server, and WatchDog on the machine on which it is running:
Step 3 Navigate to the directory $ISC_HOME/patch/isc126.96.36.199-patch, where all the files replaced by the ISC 4.1.2 Maintenance Release were stored.
Step 4 Use the following command to run the patch script to uninstall:
b. To accept the default value for a prompt indicated in [ ], for example, [n] or [y], press Enter. To terminate the installer at any time, press Ctrl-C.
c. At the end of the uninstall, you will receive a message that the patch rollback is complete.
Step 5 Restore the repository that you backed up in Step 2 of the "Upgrade Paths" section, as explained in Appendix C of Cisco IP Solution Center Installation Guide, 4.1 http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/isc/4_1/install/index.htm
Note When you uninstall ISC 4.1.2, you do not remove modifications made to the repository. Any Service Requests provisioned under ISC 4.1.2 will then need to be reprovisioned.
1. All ISC patches are available at: http://www.cisco.com/cgi-bin/tablebuild.pl/isc
2. The supported Sybase and Oracle databases behave differently. All GUI queries are case-insensitive for Sybase and case-sensitive for Oracle.
3. ISC does not work with pop-up blockers in a web browser. If you have pop-up blockers installed, disable them.
4. When using an external Oracle database, the embedded Sybase database is still automatically launched for SLA support.
5. For all APIs, the Service Request name is unique and therefore, each Create Service Request API call needs to maintain this uniqueness.
Known Problems in ISC 4.1.2
To find known problems in Cisco IP Solution Center, use the following URL:
You must log into CCO.
You can search for specific bugs or search for a range by product name. This tool enables you to query for keywords, severity, range, or version.
The results display bug ID and title, found-in version, fixed-in version, and status. The bug ID is a hyperlink to detailed information for the bug ID's product, component, severity, first found-in, and release notes.
The results could be displayed in a feature matrix or spreadsheet.
Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.
You can access the most current Cisco documentation at this URL:
You can access the Cisco website at this URL:
You can access international Cisco websites at this URL:
Product Documentation DVD
The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:
The Product Documentation DVD is created monthly and is released in the middle of the month. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:
You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:
If you do not have a user ID or password, you can register at this URL:
You can provide feedback about Cisco technical documentation on the Cisco Technical Support & Documentation site area by entering your comments in the feedback form available in every online document.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
From this site, you will find information about how to do the following:
•Report security vulnerabilities in Cisco products
•Obtain assistance with security incidents that involve Cisco products
•Register to receive security information from Cisco
A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:
To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:
•For emergencies only — email@example.com
An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.
•For nonemergencies — firstname.lastname@example.org
In an emergency, you can also reach PSIRT by telephone:
•1 877 228-7302
•1 408 525-6532
Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.
Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.
Product Alerts and Field Notices
Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive Cisco Product Alerts and Cisco Field Notices by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.
To access the Product Alert Tool, you must be a registered Cisco.com user. (To register as a Cisco.com user, go to this URL: http://tools.cisco.com/RPF/register/register.do) Registered users can access the tool at this URL: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.
Cisco Technical Support & Documentation Website
The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
Note Use the Cisco Product Identification Tool to locate your product serial number before submitting a request for service online or by phone. You can access this tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Tip Displaying and Searching on Cisco.com
If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.
To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. On the Cisco.com home page, click the Advanced Search link under the Search box and then click the Technical Support & Documentation.radio button.
To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411
Australia: 1 800 805 227
EMEA: +32 2 704 55 55
USA: 1 800 553 2447
For a complete list of Cisco TAC contacts, go to this URL:
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—An existing network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:
•Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
•Cisco Press publishes a wide range of general networking, training, and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
•Packet magazine is the magazine for Cisco networking professionals. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can subscribe to Packet magazine at this URL:
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
•Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL:
•Networking Professionals Connection is an interactive website where networking professionals share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:
•"What's New in Cisco Documentation" is an online publication that provides information about the latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of "What's New in Cisco Documentation" at this URL:
•World-class networking training is available from Cisco. You can view current offerings at this URL:
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental
Copyright © 2006 Cisco Systems, Inc. All rights reserved.