Release Notes for Cisco Prime Infrastructure Plug and Play Gateway Patch 2.2.0.15
Plug and Play Gateway Patch Installation in Standalone Configuration
Plug and Play Gateway Patch Installation in High Availability Configuration
Obtaining Documentation and Submitting a Service Request
This Release Notes document contains the following sections:
The Cisco Prime Infrastructure Plug and Play (PnP) Gateway patch 2.2.0.15 provides the following feature support for Prime Infrastructure 2.2.1 and later.
For information on hardware requirements, see the “Prime Infrastructure Plug and Play Gateway Server Requirements” section of the Cisco Prime Infrastructure 3.1 Quick Start Guide.
The Cisco Prime Infrastructure Plug and Play Gateway patch 2.2.0.15 must be installed on the Cisco Prime Infrastructure Plug and Play Gateway Server 2.2.1 or 3.0 or 3.1. The system requirements are the same as that for the Cisco Prime Infrastructure 2.2 Plug and Play gateway server.
This section contains instructions for installing the Cisco Prime Infrastructure Plug and Play Gateway.
The Plug and Play Gateway standalone server patch is available in the pnp-packaging-2.2.0.15.tar.gz file. The patch upgrade procedure requires an FTP or TFTP server containing the patch file.
You can access this server from the Cisco Prime Infrastructure 2.2.1 Plug and Play Gateway standalone server by following these steps:
Step 1 Log in to the Plug and Play Gateway standalone server as admin user. The following is a sample output of the patch upgrade with the url FTP:
Step 2 Use the application upgrade command to install the pnp-packaging-2.2.0.15.tar.gz Plug and Play Gateway standalone patch. The following is a sample output of the Plug and Play gateway patch upgrade:
Step 3 Exit from the current terminal (shell) and re-login as admin user.
Step 4 Execute the pnp setup command to reconfigure the Plug and Play standalone server and start the plug and play process.
Plug and Play-gateway 2.2.0.15 provides fix for POODLE vulnerability and for enabling/disabling SSLv3 on your server. You can disable SSLv3 and other lower versions only if you setup the Plug and Play gateway in Advanced mode.
To disable SSLv3, follow these steps:
Step 1 After upgrading to 2.2.0.15, use the following command to setup the Plug and Play gateway in Advanced mode.
Step 2 The following prompt appears after you setup the Plug and Play gateway 2.2.0.15 in Advanced mode.
Do you want to disable SSLv3 and below (y/n) ? [n]
Step 3 If SSLv3 is enabled by default, enter ‘y’ in the prompt to disable SSLv3.
Note If SSLv3 is disabled on Standalone Plug and Play server, then IOS image of the devices must be upgraded to a version which supports protocols other than SSLv3 such as TLS. The Plug and Play gateway does not work if this upgrade is not done.
If the Plug and Play Gateway is configured in high availability mode, then follow the below steps to upgrade the patch on both primary or secondary servers:
Step 1 Stop primary Plug and Play gateway server.
Step 2 Install the patch in primary server as explained in Step 2 in Plug and Play Gateway Patch Installation in Standalone Configuration.
Step 3 After successful upgradation, start the primary Plug and Play gateway server.
Step 4 Stop the secondary Plug and Play gateway server.
Step 5 Install the patch in secondary server as explained in Step 2 in Plug and Play Gateway Patch Installation in Standalone Configuration
Step 6 After successful upgradation, start the secondary Plug and Play gateway server.
This section lists the open and resolved caveats for Cisco Prime Infrastructure Plug and Play Gateway Patch 2.2.0.15:
There are no open caveats for Cisco Prime Infrastructure Plug and Play Gateway Patch 2.2.0.15.
You can access the following additional Cisco Prime Infrastructure documentation on Cisco.com:
For information on obtaining documentation, submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.