Guest

Cisco MGX 8880 Media Gateways

Release Notes for Cisco Voice Interworking Service Module Release 3.3

 Feedback

Table Of Contents

Release Notes for Cisco Voice Interworking Service Module Release 3.3

Table of Contents

About Release 3.3

Overview

New Features Introduced in Release 3.3

VISM Management Information Base

VISM Redundancy

VISM Call Rate

Compatibility

Limitations and Restrictions

Upgrade Procedures

Prerequisites

Check Domain Name Length

VISM/VISM-PR Upgrades with PXM1

VISM-PR Upgrades with PXM1E and PXM45

VISM/VISM-PR Downgrade Procedure

VISM to VISM-PR Hardware Upgrade

Caveats in Release 3.3

Resolved Caveats in Release 3.3

Open Caveats

Related Documentation

Obtaining Documentation

Cisco.com

Documentation DVD

Ordering Documentation

Documentation Feedback

Cisco Product Security Overview

Reporting Security Problems in Cisco Products

Obtaining Technical Assistance

Cisco Technical Support Website

Submitting a Service Request

Definitions of Service Request Severity

Obtaining Additional Publications and Information


Release Notes for Cisco Voice Interworking Service Module Release 3.3


These release notes are part number OL-5357-01 Rev. C0, May 17, 2005.

The Voice Interworking Service Module (VISM) product is supported by MGX Voice Media Gateways. Refer to these release notes for Media Gateway and version level support guidelines.

The VISM/VISM-PR software release notes are supported by the Cisco Voice Interworking Services (VISM) Configuration Guide and Command Reference Release 3.3, which is available on cisco.com.

Table of Contents

About Release 3.3

The VISM/VISM-PR Release 3.3 is a new release. For a list of new features, see "New Features Introduced in Release 3.3" section. For a list of the open and resolved caveats this release, see "Caveats in Release 3.3" section.


Note The content of VISM Release 3.3 supersedes previous releases.


Overview

These release notes contain the following sections:

"New Features Introduced in Release 3.3" section

"VISM Management Information Base" section

"VISM Redundancy" section

"VISM Call Rate" section

"Compatibility" section

"Limitations and Restrictions" section

"Upgrade Procedures" section

"Caveats in Release 3.3" section

"Related Documentation" section

"Obtaining Documentation" section

"Documentation Feedback" section

"Cisco Product Security Overview" section

"Obtaining Technical Assistance" section

"Obtaining Additional Publications and Information" section

New Features Introduced in Release 3.3

VISM Release 3.3 is applicable to VISM and VISM-PR hardware. Table 1 summarizes the new features in VISM/VISM-PR Release 3.3.

Table 1 VISM/VISM-PR Release 3.3 Features 

Feature
Summary

ATM Fax Relay

VISM-PR can transport fax over an ATM trunk using less bandwidth than fax pass through.

Filtering Traps

To reduce the load on CWM, you can filter the VISM-PR traps while the card is being configured.

VISM-PR Bulk Statistics Upload to CWM

You can upload history statistics data collected on a VISM-PR card to Cisco WAN Manager (CWM).

Display History Statistics

VISM and VISM-PR can collect history statistics.

Display All Static Configuration

On the VISM/VISM-PR card, you can use the dspall command to display static configurations, run-time statistics, and real-time dynamic data.

TDM Companding Law

VISM-PR supports non-standard law companding on the TDM interface.

G.729a Codec with 20 ms

VISM/VISM-PR cards contain a custom profile to support G.729a with 20 milliseconds (ms) packetization period.

Priority Bumping

On the VISM-PR card, you can set up high priority connections even if the available resources on the links are not enough to route the call.

Bearer IP Address Ping

On the VISM/VISM-PR card, you can ping both the controller traffic IP address and the bearer traffic IP address.

Call Throttling

VISM-PR card supports call throttling to maintain the stability of the card when the call rate exceeds the maximum allowable limit.


VISM Management Information Base

VISM Release 3.3 uses Management Information Base (MIB) Version 53.

Load the MIBs available with MGX Release 1.3.11 located at the following URL: http://www.cisco.com/public/sw-center/wan/wan-planner.shtml

VISM MIBs are compatible with both PXM1-based and PXM1E/PXM45-based chassis.

VISM Redundancy

Table 2 provides the support level for 1:N Service Module Redundancy (N = 1 through 11).

Table 2 Service Module Redundancy 

Front Card Model Number
Redundancy Support

MGX-VISM-8T1

1:N redundancy (bulk mode support for T1 lines only).

MGX-VISM-8E1

1:N redundancy (bulk mode support for E1 lines only).

MGX-VISM-PR-8T1

1:N redundancy (bulk mode support for T1 lines only).

MGX-VISM-PR-8E1

1:N redundancy (bulk mode support for E1 lines only).



Note You can use a VISM-PR card as a redundant card for a VISM card, but a VISM card cannot be used as a redundant card for a VISM-PR card.


VISM/VISM-PR cards support bulk distribution using the SRM-3T3 and SRM-E (OC3) cards. In a redundancy configuration VISM/VISM-PR cards in bulk distribution mode do not require any backcards.

VISM Call Rate

Software Release 3.3 for VISM/VISM-PR handles 10 CAS, SS7, or PRI calls per second per VISM/VISM-PR card.

Compatibility

VISM/VISM-PR software interoperability with Cisco MGX 8230, Cisco MGX 8250, Cisco MGX 8830, and Cisco MGX 8850 (PXM1, PXM1E, PXM45) platform software is listed in Table 3.

Table 3 VISM/VISM-PR Software Interoperability 

Product
CW2000 Name
Latest Firmware
Minimum Firmware

PXM1

MGX 8850

1.3.10

1.2.13

PXM1E

MGX 8850/MGX 8830

5.0.10

3.0.25

PXM45

MGX 8850

5.0.10

3.0.25

SRME

SRM-E

FC-C0 BC-B0

FC-C0 BC-B0

SRM-3T3/C

SRM-C

FC-CA BC-A0

FC-CA BC-A0

RPM-PR

RPM-PR

12.2(8)T1

12.2(8)T1

RPM-XF

RPM-XF

12.3(7)T3

12.2(15)T5

AXSM

AXSM

5.0.10

5.0.10

CWM

CWM

15.0 Patch 21

15.0 Patch 2

1 Bulk Statistics Upload and Historical Statistics are the only new VISM/VISM-PR Release 3.3 features that are supported by CWM 15.0.00 Patch 2.


Table 4 shows VISM and VISM-PR compatibility with the PXM controller cards.

Table 4 VISM/VISM-PR Compatibility with PXM Cards

 
PXM1
PXM1E
PXM45 (A/B/C)

VISM

Yes

No

No

VISM-PR

Yes

Yes

Yes


Table 5 shows VISM and VISM-PR compatibility with the Cisco MGX chassis.

Table 5 VISM/VISM-PR Compatibility with Cisco MGX Chassis

 
Cisco MGX 8230
Cisco MGX 8250
Cisco MGX 8830
Cisco MGX 8850 (PXM1)
Cisco MGX 8850
(PXM1E or PXM45)
Cisco MGX 8880 (PXM45)

VISM

Yes

Yes

No

Yes

No

No

VISM-PR

Yes

Yes

Yes

Yes

Yes

Yes


Table 6 describes the VISM/VISM-PR software interoperability with other Cisco products.

Table 6 VISM/VISM-PR Release 3.3 Interoperability with Other Cisco Products 

Product
CW2000 Name
Latest Firmware
Minimum Firmware

BTS

BTS 10200

4.2(0)V07

4.2(0)V07

PGW

PGW 2200

9.3(2)

9.3(2)

CISCO 2421

CISCO 2421

12.3.10a

12.3.10a

AS5400

AS5400

12.3.9

12.3.9

AS5300

AS5300

12.3.9 with vcware 11.32

12.3.9 with vcware 11.32


Table 7 describes the software images available for Release 3.3 for VISM/VISM-PR.

Table 7 Software Images for VISM/VISM-PR Release 3.3 

Product Name
Software Version
Firmware Image Name
Description

MGX-VISM-SW3300

003.003.000.200.FW

vism-8t1e1-003.003.000.200.fw

This image does not support the CALEA1 feature.

MGX-VISM-LISW3300

003.053.000.200.FW

vism-8t1e1-003.053.000.200.fw

This image supports the CALEA2 feature.

1 CALEA = Commission on Accreditation for Law Enforcement Agencies.

2 The CALEA implementation supports the CALEA law intercept confirmation interface.


Table 8 describes the software boot code requirements for VISM/VISM-PR Release 3.3.

Table 8 VISM/VISM-PR Software 3.3 Boot Code Requirements 

Board Pair
Boot Code Image Name
Boot Code Version

MGX-VISM-8T1

vism_8t1e1_VI8_BT_3.2.00.fw

VI8_BT_3.2.00

MGX-VISM-8E1

vism_8t1e1_VI8_BT_3.2.00.fw

VI8_BT_3.2.00

MGX-VISM-PR-8T1

vism_8t1e1_VI8_BT_3.2.00.fw

VI8_BT_3.2.00

MGX-VISM-PR-8E1

vism_8t1e1_VI8_BT_3.2.00.fw

VI8_BT_3.2.00



Note Loading this release of the backup boot code is required for existing VISM/VISM-PR cards not using this new release.


Limitations and Restrictions

The following limitations and restrictions are valid for software Release 3.3 for VISM/VISM-PR:

If you are upgrading the VISM-PR image to Release 3.2.1x or later and the PXM1E or PXM45 image from Release 4.x or earlier to Release 5.x, first upgrade the VISM-PR cards. Then, upgrade the PXM1E or PXM45 cards in the same node.

Do not configure the new VISM features until you have fully upgraded the network. After you upgrade your network to PXM1E or PXM45 Release 5.x or later and VISM-PR to Release 3.2.1x or later, apply the standard upgrade process.

Cisco recommends that you use the cnfcodecjtrdelay command to configure the fixed jitter-delay argument to 20 msec when using VISM 3.3.

In a PNNI network, upspeeding SVC fax or modem calls requires an increase in bandwidth between the voice codec and the vbd codec. For fax calls to go through, you must disable policing.

Switched AAL2 PVC mode is not recommended as this mode requires a meshed PVC network topology, which does not scale.

The following commands are not supported:

cnfmaxconfnum

dspconferences

dspmaxconfnum

GR-303 is not supported for the LAPD commands.

In AAL2 SVC mode, all active calls on VISMs are dropped upon PXM hard and soft switchover.

For VISM-PR cards that are running on a PXM45 chassis, you can add connections to a maximum of 11 VISM-PR cards.

To add more cards and connections, you must enable the expanded memory option on the PXM45 card by using the cnfndparms (option 4) command.

When configuring VoIP for modem or fax upspeed (passthrough), set the EventNegoPolicy parameter of the cnfvoiptransparams command to the value all.

This configuration is required for all related upspeed codecs to function correctly. An upspeed codec is defined as the codec that is switched to G.711a/u law, Clear Channel, or G.726.

For a list of open issues and mitigations in VISM Release 3.3, see "Caveats in Release 3.3" section.

Upgrade Procedures

This section describes the following upgrade procedures:

Prerequisites

VISM/VISM-PR Upgrades with PXM1

VISM-PR Upgrades with PXM1E and PXM45

VISM/VISM-PR Downgrade Procedure

VISM to VISM-PR Hardware Upgrade

VISM/VISM-PR Release 3.3 provides a procedure for the graceful upgrade (one in which the existing VISM/VISM-PR configuration is preserved throughout the upgrade procedure) from one of the following releases:

From VISM 1.5(9) and 1.5(10) to VISM 3.3

From VISM 2.2.1 to VISM 3.3

From VISM 3.1(2) to VISM 3.3

From VISM 3.1.3 to VISM 3.3

From VISM 3.2 to VISM 3.3

From VISM 3.2.11 to VISM 3.3

Prerequisites

To ensure that the VISM/VISM-PR configuration is preserved throughout the upgrade procedure, you must complete the prerequisites listed in this section.

Before starting the graceful upgrade procedure, complete the following prerequisites:

Configure your MGX 8000 Series shelf with at least two VISM cards in a redundant configuration.

For more information on adding redundancy, refer to the add redundancy, addred, command in the Cisco MGX 8250, Cisco MGX 8230, and Cisco MGX 8850 PXM1-based Command Reference documentation and the Cisco MGX 8830 and Cisco MGX 8850 PXM1E/ PXM45-based Command Reference documentation.

Ensure that the VISM cards are running at least Release 2.1, and the VISM-PR cards are running at least Release 3.0.

Download software Release 3.3 for VISM/VISM-PR to the MGX 8000 Series shelf.

If you are using the CALEA feature, ensure that you have the version of VISM/VISM-PR software that supports CALEA.

Before you upgrade to 3.3, delete all domain names that are greater than 32 characters on the VISM/VISM-PR card. See the Check Domain Name Length section. After you complete the upgrade to 3.3, add the domain names that are greater than 32 characters.

Check Domain Name Length

Before you upgrade to 3.3, delete all domain names and domain name IPs that are greater than 32 characters on the VISM/VISM-PR card. After the upgrade, re-add the domain names and domain name IPs.

Complete the following steps.


Step 1 Log in to the VISM/VISM-PR card.

Step 2 Display the list of domain names by entering the dspdns command.

MGX1E.1.11.VISM8.a > dspdns
DomainNumber    DomainName               ResolutionType
------------  --------------             --------------
1      mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.com  internalOnly 
2      mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.dom  internalOnly 
3      mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.eom  internalOnly 

Step 3 For each domain number, count the number of characters in the DomainName field.

If the characters are greater than 32 for each domain number, go to Step 4.

Step 4 Check for the IP addresses associated with the domain names by entering the dspdnallips command.

MGX1E.1.11.VISM8.a > dspdnallips

ResolutionIndex    DomainName                     IP           State    Pref
---------------   ------------                ------------   ---------  -----
1 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.com  10.1.3.25 Inactive   1

Step 5 If IP addresses are present, make a note of them in the order that they appear.

Step 6 Since you cannot delete the domain name or domain name IPs if MGCs exist, use the following commands to check for MGCs and delete them if they exist for each domain name:

a. Check for the MGC group protocols by entering the dspmgcgrpprotocols command.

MGX1E.1.11.VISM8.a > dspmgcgrpprotocols

MgcGrp Prot    Qrntn     Qrntn      Sign           Prov      RspAck    Disc    Cancel  
 Num   Num     Persist    Def       OnOff          Resp       Attr      Proc   
Graceful
--------------------------------------------------------------------------------------
 1   MGCP 1.0     Qrtn StepProcess      DelNegEvt     Send     Send  Enable     Send

b. Check for MGC group entries by entering the dspmgcprpparams command.

MGX1E.1.11.VISM8.a > dspmgcgrpparams

Mgc Grp Num     Comm State    State Chg Notification    Priority
-----------     ----------    ----------------------    --------
     1           CommLoss              Enabled              1

c. Check for MGC entries by entering the dspmgcs command.

MGX1E.1.11.VISM8.a > dspmgcs

mgcNumber   mgcName
---------   -------
     1      mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.co

Step 7 If any entries exist for the domain name in Step 6 a. to Step 6 c., delete the MGC entries by entering the following commands as required:

delmgcgrpprotocol

delmggrpentry

delmgc

Step 8 Delete the domain name IP address by entering the deldnip command.

Step 9 Delete the domain name by entering the deldn command.

Step 10 Perform the upgrade using the procedures in the "Upgrade VISM/VISM-PR Firmware with PXM1 Card" section or "Upgrade VISM-PR Firmware with PXM1E and PXM45 Cards" section.

Step 11 After you complete the upgrade, add the domain name entries, IP addresses, and MGCs as previously configured using the following commands:

adddn

adddnip

addmgc

addmgcgrpentry

addmgcgrpprotocol

Step 12 To check that you added the entries successfully, use the corresponding display commands from Step 2 to Step 6.


VISM/VISM-PR Upgrades with PXM1

This section describes the procedures for upgrading VISM/VISM-PR software when the VISM/VISM-PR is used with a PXM1 card.

Download VISM/VISM-PR Boot Code and Firmware to PXM1

To download the VISM/VISM-PR boot code and firmware to the PXM1 card, use TFTP.


Step 1 Log in to your TFTP server.

Step 2 Download the bootcode and firmware images from the Cisco website.

Step 3 Download the selected revision of service module boot code into the service module.

a. tftp <node_name or IP address>

b. bin

c. put <backup boot> POPEYE@SM_1_0.BT

d. quit

Step 4 Download the selected firmware file.

To upgrade all VISM cards, proceed to Step 4 c. To upgrade an individual VISM card, proceed to Step 4 d.

a. tftp <node_name or IP address>

b. bin

c. put <FW file> POPEYE@SM_1_0.FW

quit

d. put <FW file> POPEYE@SM_1_<slot number of card to upgrade>.FW

quit


Note Do not enter two put commands in the same TFTP session.


Step 5 Proceed to the "Upgrade VISM/VISM-PR Firmware with PXM1 Card" section to install the download.


Upgrade Boot Code with PXM1 Cards

Complete the following steps to upgrade the new backup boot code when you are using PXM1 cards in in a Cisco MGX 8230, Cisco MGX 8250, and Cisco MGX 8850 chassis:


Step 1 Log in to the active PXM1 card (slot 7 or 8 for Cisco MGX 8250 and Cisco MGX 8850 chassis; slot 1 or 2 for Cisco MGX 8230 and Cisco MGX 8830 chassis).


Note VISM/VISM-PR must be in the active state in order to update the VISM/VISM-PR boot code.


Step 2 Execute the PXM1 install command.

nodename.1.27.VISM8.a > install [bt] [sm <slot>] <version>

Caution Do not touch the VISM/VISM-PR card until the status comes back ('Sent xxx bytes in yyy seconds'). Failure to follow this recommendation corrupts the boot code, which cannot be recovered.

When the boot code is being written to PROM, you see comments displayed at the VISM/VISM-PR prompt. This behavior is normal and expected.

Step 3 Type the version command to verify the correct boot code.


Note Step 3 is optional.



Upgrade VISM/VISM-PR Firmware with PXM1 Card

Software Release 3.3 is for VISM and VISM-PR cards. Ensure that the VISM and VISM-PR cards have the minimum boot code version of vism_8t1e1_VI8_BT_3.2.00.fw.

The following versions of VISM software Release 3.3 are available:

003.003.000.200.FW—without CALEA

003.053.000.200.FW—with CALEA

In this procedure the following conditions apply:

If two VISM or VISM-PR cards are part of a redundancy group, initially the primary card is in the active state, and the secondary card is in the standby state.

Old-rev refers to the firmware, Release 3.2 and prior.

New-rev refers to the firmware after the upgrade, Release 3.3.

Perform the firmware upgrade on the VISM or VISM-PR cards. Do not remove the VISM cards and replace them with VISM-PR cards at this time.


Step 1 Log in to the active PXM1 card (slot 7 or 8 for Cisco MGX 8250 and Cisco MGX 8850 chassis; slot 1 or 2 for Cisco MGX 8230 and Cisco MGX 8830 chassis).

Step 2 Save the existing configuration as a contingency plan by entering:

nodename.1.8.PXM.a > savesmcnf <SM slot#>

This command saves the existing configuration in the C:CNF directory. This file can be used during the downgrade procedure.

Step 3 To obtain the correct version of VISM/VISM-PR firmware, enter the dspfwrevs command.

nodename.1.8.PXM.a > dspfwrevs
Card Type   Date       Time     Size     Version             File Name
----------- ------------------- -------- -------------------------------------
VISM-8T1E1  04/26/2004 20:06:04 248688   VI8_BT_3.2.00       sm150.bt
PXM1        01/04/2004 08:19:52 2602836  1.2.11              pxm_1.2.11.fw
PXM1        01/04/2004 11:03:02 2620132  1.2.21              pxm_1.2.21.fw
VISM-8T1E1  09/10/2004 16:22:32 4135208  003.003.000.200     sm150_12.fw
VISM-8T1E1  09/10/2004 15:37:52 4077560  003.002.010.200     sm150.fw
VISM-8T1E1  06/16/2004 13:29:38 3863768  003.051.002.000     sm150_11.fw
PXM1        01/04/2004 11:01:56 1346844  1.2.21              pxm_bkup_1.2.21.fw
VISM-8T1E1  03/08/2004 08:20:16 4037880  003.002.000.000     sm150_3.fw
VISM-8T1E1  03/08/2004 08:19:44 248688   VI8_BT_3.2.00       sm150_3.bt
PXM1        01/04/2004 07:58:44 1345328  1.2.11              pxm_bkup_1.2.11.fw
VISM-8T1E1  01/07/2004 23:33:02 3863768  003.051.002.000     sm150_2.fw
VISM-8T1E1  03/08/2004 08:21:12 248688   VI8_BT_3.2.00       sm150_4.bt
VISM-8T1E1  04/26/2004 19:59:52 4037880  003.002.000.000     sm150_1.fw
VISM-8T1E1  03/08/2004 08:20:58 4037880  003.002.000.000     sm150_4.fw

Step 4 Execute the PXM install command.

nodename.1.8.PXM.a > install sm <SM slot#> <new-rev>

Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.

Replace <new-rev > with the version of the new firmware (for example, 003.003.000.200).


Caution Ensure that you perform Step 4. If you do not perform Step 4, the boot code is corrupted and not recoverable.

This command causes the secondary VISM or VISM-PR card to reset and come up in the standby state, running the new-rev firmware. The primary VISM or VISM-PR card is unaffected by this command.

Step 5 Execute the PXM newrev command.

nodename.1.8.PXM.a > newrev sm <SM slot#> <new-rev>

Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.

Replace <new-rev> with the version of the new firmware.

This command causes the primary VISM or VISM-PR card to reset. The secondary VISM or VISM-PR card becomes active and is running the new-rev firmware.

Step 6 Execute the PXM commit command.

nodename.1.8.PXM.a > commit sm <SM slot#> <new-rev>

Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.

Replace <new-rev> with the version of the new firmware.

The two VISM or VISM-PR cards are now back to their original condition except that both cards are now running the new-rev firmware.

Step 7 Log in to the active VISM or VISM-PR card and use the display commands (for example, dspendpts, dspcasvar, and so forth) to confirm that the configuration has been preserved through the upgrade process.


Note For more than one primary VISM or VISM-PR card in a redundancy group, ensure that the secondary card is in the standby state and repeat Step 5 and Step 6 for each VISM/VISM-PR card in the redundancy group.


Step 8 Perform the following verifications:

Make minor modifications to the configuration.

Check that the changes have been executed correctly.

Change the configuration back again.



Note If the VISM or VISM-PR card is not part of a redundancy group, complete Step 1 to Step 4.


VISM-PR Upgrades with PXM1E and PXM45

This section describes the procedures for upgrading VISM-PR software when the VISM-PR is used with a PXM1E or PXM45 card.

If you are upgrading the VISM-PR image to Release 3.2.1x or later and the PXM1E or PXM45 image from Release 4.x or earlier to Release 5.x, first upgrade the VISM-PR cards. Then, upgrade the PXM1E or PXM45 cards in the same node.

Do not configure the new VISM features until you have fully upgraded the network. After you upgrade your network to PXM1E or PXM45 Release 5.x or later and VISM-PR to Release 3.2.1x or later, apply the standard upgrade process.

Download VISM-PR Boot Code and Firmware to PXM1E and PXM45

To download the VISM-PR boot code and firmware to the PXM1E or PXM45 card, use FTP.


Step 1 Access the images on the Cisco Web site.

Step 2 To download the images, enter the ftp command.

ftp node-ip

where node-ip is the IP address of the node to which you want to download the image.

Step 3 Enter your user name and password.

Step 4 Enter bin.

Step 5 Access the appropriate directory.

cd C:FW

Step 6 Download the images to your C:FW directory.

a. To download one file at a time, use the put image-version command.

b. To download multiple files at the same time, use the mput <image-version> <image-version> command.

where image-version is the downloaded image from Step 1.

Step 7 To exit the download procedure, enter bye.


Upgrade Boot Code with PXM1E and PXM45 Cards

Complete the following steps to upgrade the new backup boot code when you are using PXM1E or PXM45 cards in your MGX 8000 Series chassis:


Step 1 Complete the steps in Download VISM-PR Boot Code and Firmware to PXM1E and PXM45.

Step 2 Log in to the active PXM1E or PXM45 card.

Step 3 To upgrade the VISM-PR boot, enter the burnboot command.

nodename.1.7.PXM.a > burnboot <slot> <revision>

Replace <slot> with the number of the VISM-PR card that you want to upgrade.

Replace <revision> with the version of the bootcode you downloaded from Step 1.

The following example shows the burnboot.

nodename.1.7.PXM.a > burnboot 12 3.2(0.0)

The card in slot 12 will be reset.
burnboot:Do you want to proceed (Yes/No)? yes

For VISM-PR cards without redundancy, the card automatically resets and becomes active with the latest boot code image.

For VISM-PR cards with redundancy, the active card takes approximately 60 seconds to reset as standby. For the original standby card, complete Step 2- Step 3. This card now resets back to standby, and the standby card is now active.


Upgrade VISM-PR Firmware with PXM1E and PXM45 Cards

Ensure that the VISM-PR cards have the minimum boot code version of vism_8t1e1_VI8_BT_3.2.00.fw.

The following versions of VISM-PR software Release 3.3 are available:

003.003.000.200.FW—without CALEA

003.053.000.200.FW—with CALEA

Perform the firmware upgrade on the VISM-PR cards.


Step 1 Log in to the active PXM1E or PXM45 card.

Step 2 Ensure that the card is in the redundant mode, where the active card is the primary card.

Step 3 To save the existing configuration as a contingency plan, enter the saveallcnf command.

nodename.1.7.PXM.a > saveallcnf

Step 4 To load the new software, enter the loadrev command.

nodename.1.7.PXM.a > loadrev <sm-primary-slot-num> <new-rev> 

Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.

Replace <new-rev> with the new firmware version number for the VISM-PR software.


Caution Temporary traffic loss occurs.

Step 5 Ensure that the redundant card is returned to the standby state by executing the dspcds command.


Note You must wait for the redundant card to return to the standby state. If you issue the runrev command too early, an error message is generated. The rev change does not occur.


Step 6 To execute the download, enter the runrev command.

nodename.1.7.PXM.a > runrev <sm-primary-slot-num> <new-rev>

Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.

Replace <new-rev> with the new firmware version number for the VISM-PR software.


Caution Temporary traffic loss occurs.

Step 7 Ensure that the primary slot completes booting and goes into the standby state by executing the dspcds command.


Note You must wait for the primary slot to finish booting and get to standby state. Issuing the commitrev command early might be accepted without an error. However, the active and standby cards might not be swapped back to their original state. For example, the original primary card might be left in standby, and the original redundant card might be left as active.


Step 8 To commit the new download to the VISM-PR card, enter the commitrev command.

nodename.1.7.PXM.a > commitrev <sm-primary-slot-num> <new-rev>

Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.

Replace <new-rev> with the new firmware version number for the VISM-PR software.

The commitrev command switches the primary card from a standby state to an active state and the redundant card from an active state back to a standby state.

Step 9 To verify the card states, execute the dspcds command.


VISM/VISM-PR Downgrade Procedure

Use this procedure to downgrade VISM/VISM-PR software from software Release 3.3 to an earlier VISM/VISM-PR release. By following the downgrade procedure described here, the configurations are retained after the downgrade.


Note The configurations that existed with old-rev firmware should have been saved earlier. You cannot downgrade from VISM-PR to VISM.


Complete the following steps to downgrade the VISM/VISM-PR software:


Step 1 If the VISM/VISM-PR card is in a redundancy group, remove the redundancy.

nodename.1.7.PXM.a > delred <SM slot#>

Step 2 Download the old-rev firmware onto the MGX shelf.

Step 3 Execute the PXM clrsmcnf command:

nodename.1.7.PXM.a > clrsmcnf <SM slot#>

Replace <SM slot#> with the slot number of the VISM/VISM-PR card to be downgraded.

Wait for the card to become active. The VISM/VISM-PR card resets after you execute this command.

Step 4 Execute the PXM restoresmcnf command:


Caution The restoreallcnf command reconfigures all of the cards in the chassis.

nodename.1.7.PXM.a > restoresmcnf -f <filename> -s <SM slot#>

Replace <filename> with the name of the old configuration file that was saved while the old-rev firmware was running. The file can be found in the C:CNF directory on the MGX shelf.

Replace <SM slot#> with the slot number of the VISM/VISM-PR card to be downgraded.

The VISM/VISM-PR card resets again. The card becomes active, running the old-rev firmware with the old configuration.


Note For PXM1E/PXM45 cards, you cannot restore the configuration for an individual VISM-PR service module. You can save and restore the configuration of all cards in a chassis using the saveallcnf and restoreallcnf commands.


Step 5 Reconfigure the redundancy group, if required.


VISM to VISM-PR Hardware Upgrade

Complete the following steps to upgrade your system from VISM cards to VISM-PR cards.


Caution You must install the redundant (standby) VISM-PR card first. Failure to follow this recommendation results in traffic loss. In addition, do not remove an active VISM card from your chassis. Ensure that you configure an active VISM card to the standby state before you remove it and replace it with a VISM-PR card.


Step 1 Remove the redundant (standby) VISM card from your chassis.

Step 2 Install a VISM-PR card in the slot you removed the VISM card from in Step 1.

Step 3 Administratively configure the VISM-PR card you installed in Step 2 as primary (active).

Step 4 Remove the now redundant VISM card from your chassis.

Step 5 Install a VISM-PR card in the slot you removed the VISM card from in Step 4.

Step 6 Log in to the redundant (secondary) VISM-PR card and execute the dspcd command. Verify that the output from the dspcd command lists the card type under FunctionModuleType as a VISM-PR card. If the card type still indicates the VISM card, execute the resetcd slot-num command from the PXM and repeat the dspcd command to ensure that the correct card type is shown.

Step 7 Log in to the active VISM-PR card and execute the dspcd command. Verify that the output from the dspcd command lists the card type under FunctionModuleType as a VISM-PR card.

If the card type still indicates the VISM card, execute the resetcd slot-num command from the PXM. Repeat the dspcd command to ensure that the correct card type is shown.

Step 8 If you have no other VISM cards in your chassis, you have completed the hardware upgrade procedure; do not proceed to Step 9. If you have more VISM cards in your chassis, proceed to Step 9.

Step 9 Remove a standby VISM card from your chassis.

Step 10 Install a VISM-PR card in the slot you removed the VISM card from in Step 9.

Step 11 Repeat Step 9 and Step 10 to remove any remaining VISM cards in your chassis and replace them with VISM-PR cards.

Step 12 Repeat Step 6 and Step 7 on the remaining VISM-PR cards to insure the correct card type is shown.


Caveats in Release 3.3

This section describes the resolved and open software caveats in VISM/VISM-PR Release 3.3. Caveats describe unexpected behavior or defects in VISM/VISM-PR software.

Resolved Caveats in Release 3.3

Table 9 describes the caveats that have been resolved in VISM/VISM-PR Release 3.3.

Table 9 Resolved Caveats in VISM/VISM-PR Release 3.3 

DDTS Issue
Description

CSCed10672

VISM supports 217 AAL2 SVC calls on VISM-PR-E1 only.

CSCed43103

VISM should not send any P2P messages in Alarm mode.

CSCed43668

Display of AIS delay time should display remaining time also.

CSCed66304

Video conference freezing under mixed traffic condition.

CSCed74024

T.38 CA controlled mode calls fail after successful initial run.

CSCed83124

CIDs oos while adding when the con is down even enough BW available.

CSCed84289

Wrong encoding of bits type in ABCD incoming and outgoing pattern.

CSCed85909

Proper error message should be thrown if Channel Modification not possible.

CSCed86492

VISM does not send busybearercode on random endpts with bulk ATM alarms.

CSCed86763

MIB gets set to none no matter which value is set.

CSCed87750

Line alarms with restoration of ATM trunks.

CSCed88798

During VISM line alarm VISM sends voice packets to network.

CSCed88838

Implement OAM CC cells transmission on VISM.

CSCed89176

Walk on rsvpIfRefreshInterval does not work.

CSCed89221

JitterInitialDelay cannot be SET to non-multiples of 5 for lossless.

CSCed91157

Wrong Transtbl is associated with DSX0 though returns failure.

CSCed92129

Adding CIDs on the second PVC puts all the CIDs oos.

CSCed92165

CID stays in fail state even after LOS got cleared.

CSCed95335

AAL2 Trunking - cnfcodectmpl does not check for CIDs codec types.

CSCee03210

T38 interop fails between VISM and 2421.

CSCee07416

No trap is sent when only BearerBusyCode is change through SNMP set.

CSCee07440

Switch agent should reject SET on BearereBusyCode, if TrunkCond disable.

CSCee09073

VISM 3.2.1-vism_cid table is not updated when changed admin state.

CSCee13138

VISM-PR unreachable from IP cloud.

CSCee20389

tstdelay measurement reported as us instead of ms.

CSCee21753

CAS template allowed to create with out-of-range index 21 by SNMP.

CSCee22756

Media Start package-Packet detector work only on first DSP channel.

CSCee29268

REG5+: VISM MSG #9059 missing from legacy/vismGlobals.c.

CSCee31685

VISM sends extra concealment when init delay is 20 ms and 3 packet lost.

CSCee32065

911 Operator Ringback Fails on VISM.

CSCee35515

CAS signaling channel not programmed during DSP redownload.

CSCee37609

Adding multiple endpoints succeeds but failure reported.

CSCee54848

Spurious upspeed on VISM 3.2.10.

CSCee61267

Increase of PVC BW should be allowed when CIDs are active.

CSCee66023

DSPs failed when running calls on Clear Channel with timestamp enable.

CSCee68257

Support 64 character domain name on VISM.

CSCef23824

VISM card resets when multiple DSPs fail.

CSCef26389

Clock slips on VISM while running load.

CSCin69879

VISM resets on giving addcon with MBS = 0.


Open Caveats

Table 10 describes the open caveats in VISM/VISM-PR Release 3.3 as of September 27, 2004.

Table 10 Open Caveats for VISM/VISM-PR Release 3.3 

DDTS Issue
Description

CSCec54765

Symptom: VISM regenerates incorrect DTMF on-times in VoIP Trunking mode.

Conditions: When DTMF digits with on-times of less than 50 ms are detected on the near-end VISM, the digits are regenerated with inconsistent on/off times on the far end VISM.

Workaround: Ensure the DTMF digits that are detected have an on-time value greater than 50-60 ms (preferably greater than 60 ms).

CSCed59217

Symptom: VISM-PR keeps sending DTMF digits when no digit is pressed.

Conditions: By random press of the digits on both on-net and off-net phone or the combination of various digits at the same time, the VISM-PR card sends out the DTMF payload type 101 packets every 50 ms (like retransmission) even when digit is entered from the TDM side.

Workaround: Press another digit in the normal fashion to clear the problem.

CSCed83268

Symptom: Lower than expected throughput on V.90 modem calls over AAL2. Some modem calls speed shift to V.34 speeds and/or retrain.

Conditions: This symptom occurs with VISM to VISM calls as well as VISM to VXSM calls.

Workaround: None.

CSCee92429

Symptom: Voice quality issue due to AAL2 packet drops.

Conditions: Configure 248 CIDS with G.711a 5 ms with VAD off and subcell muxing enabled from one VISM-PR-E1 to another VISM-PR-E1.

Delete some CIDS on one VISM-PR and re-add. The following errors are seen on other side thus causing voice quality issue:

AAL2 HEC errors

AAL2 invalid OSF cells

AAL2 invalid length

Workaround:

1. Turn subcell muxing off and/or turn VAD on.

2. Use G.729 or other 10 ms/20 ms codecs.

CSCef02022

Symptom: VISM advertising the NTE capability with DTMF relay disabled.

Conditions: When DTMF Relay is disabled on the VISM, the NTE capability is still advertised by the VISM.

Specifically, when the VISM is configured for DTMF relay off (cnfvoiptransparams 2 1 1 1), VISM response to the call agent still advertises the VISM bearer capability to use NTE for digits 0-15.

Workaround: None.

CSCef32606

Symptom: DSPs stop responding to ping after re-download is initiated when DSPs failed.

Conditions: This condition is random. Some DSPs might or might not re-download. This symptom happens when you have connections that are associated with the DSPs prior to the failure. DSP status is not in active state.

Workaround: Reset the card.

CSCef39465

Symptom: When the cell rate on one of the VISM connection exceeds its PCR value, HEC Errors and Invalid OSF cell counters starts incrementing on all of the connections on the VISM card.

Conditions: This problem happens only in AAL2 trunking mode and with subcell multiplexing on.

Workaround: Having a sufficient PCR value on all the VISM connections so that the cell rate on any of the connections exceeds the PCR value is the only solution.

CSCef55005

Symptom: When running high traffic load scenarios with eight fully loaded E1 spans in VoIP switching mode, traffic might include upspeed to G.711, clear channel, or nailed up G.711 voice connections.

Packet loss might be encountered on occasion.

Conditions: This symptom occurs when concurrent traffic load of G.711 or clear channel with VAD off is sustained on lines with greater than 220 DS0s.

Workaround: For G.711 use VAD on because this issue does not occur with VAD on. Currently for clear channel the recommendation is not to load more than seven spans when utilizing 3.3 release.

CSCef55425

Symptom: Path confirmation failures—G.729a codec, adaptive jitter delay.

Conditions: At 11 calls per second, 3% of the voice calls fail with path confirmation errors (subsequent).

VISM configuration is ISDN-G729a with template 1. Jitter buffer is adaptive with initial delay set at 60 ms.

Workaround: Configure fixed jitter buffer delay of any value should resolve this problem for G.729a codec.

CSCef69692

Symptom: Mibwalk stuck in loop on catsAal2PvcHistoryTable.

Conditions: Multiple PVCs with multiple bucket interval updates for statistics causes this symptom to occur.

Workaround: No workarounds exist for the mibwalk. Except, run the mibwalks right after a card reset.

Note SNMP gets for objects within the table work correctly.

CSCef72611

Symptom: Path confirmation failures with CCD calls and VISM 3.1(3.x).

Conditions: Voice quality degrades (hiss) when running Clear Channel codec when the originating and terminating VISM cards are running different images, for example 3.1.3.x and 3.2.x.x.

This problem is not seen with any other codec or when running the Clear Channel codec on both VISM cards that are running the same version.

Workaround: Configure VISM to utilize a different codec during upgrades. And/or upgrade both VISM cards to the same version before running Clear Channel voice traffic.

CSCef81423

Symptom: BTS VoIP Switch T1 CAS 15 CPS load causes card resets.

Conditions: This problem exists only during CAS call load. VISM supports call rates up to a maximum call load of 10 cps.

Workaround: Ensure the call rate for a fully loaded VISM card that is configured for CAS voice traffic does not exceed the supported rate of 10 cps.


Related Documentation

The following documents contain information that may be useful to software Release 3.3 for VISM/VISM-PR:

Cisco Voice Interworking Services (VISM) Configuration Guide and Command Reference, Release 3.3

Cisco MGX 8830, MGX 8850 (PXM45 and PXM1E), and MGX 8950 Command Reference, Release 5

Cisco MGX 8850 (PXM45 and PXM1E) Hardware Installation Guide, Release 5

Cisco MGX 8850 (PXM45) and MGX 8950 Software Configuration Guide, Release 5

Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com

You can access the most current Cisco documentation at this URL:

http://www.cisco.com/univercd/home/home.htm

You can access the Cisco website at this URL:

http://www.cisco.com

You can access international Cisco websites at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation DVD

Cisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit.

Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.

Cisco Ordering tool:

http://www.cisco.com/en/US/partner/ordering/

Cisco Marketplace:

http://www.cisco.com/go/marketplace/

Ordering Documentation

You can find instructions for ordering documentation at this URL:

http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:

http://www.cisco.com/en/US/partner/ordering/

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).

Documentation Feedback

You can send comments about technical documentation to bug-doc@cisco.com.

You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

From this site, you can perform these tasks:

Report security vulnerabilities in Cisco products.

Obtain assistance with security incidents that involve Cisco products.

Register to receive security information from Cisco.

A current list of security advisories and notices for Cisco products is available at this URL:

http://www.cisco.com/go/psirt

If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:

http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:

Emergencies —  security-alert@cisco.com

Nonemergencies —  psirt@cisco.com


Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x.

Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one that has the most recent creation date in this public key server list:

http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&exact=on


In an emergency, you can also reach PSIRT by telephone:

1 877 228-7302

1 408 525-6532

Obtaining Technical Assistance

For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service contract, contact your reseller.

Cisco Technical Support Website

The Cisco Technical Support Website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, 365 days a year, at this URL:

http://www.cisco.com/techsupport

Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do


Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support Website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.


Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:

http://www.cisco.com/techsupport/servicerequest

For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

To open a service request by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447

For a complete list of Cisco TAC contacts, go to this URL:

http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

Severity 1 (S1)—Your network is "down," or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:

http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:

http://www.ciscopress.com

Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:

http://www.cisco.com/packet

iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL:

http://www.cisco.com/go/iqmagazine

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/ipj

World-class networking training is available from Cisco. You can view current offerings at this URL:

http://www.cisco.com/en/US/learning/index.html