Introduction

Cisco Connected Mobile Experiences (Cisco CMX) Release 11.0.0 is a high-performing scalable software solution that addresses the mobility services requirements of high-density Wi-Fi deployments. Unless otherwise noted, Cisco Connected Mobile Experiences is referred to as Cisco CMX in this document.

This release is suitable for on-premise deployments where the following features are required:

  • Detect and Locate

  • Analytics

  • Hyperlocation

  • FastLocate

  • Integration with Cisco Prime Infrastructure Release 3.4 or later

  • Integration with Cisco Catalyst Center (formerly known as Cisco DNA Center) Release 2.1 or later

  • Single sign-on through Security Assertion Markup Language (SAML)

This release is not suitable for deployments where the following are required:

Cisco Adaptive Wireless Intrusion Prevention System (aWIPS)

What's New in Cisco CMX Release 11.0.0

This release includes the deployment of a new image version of Cisco CMX 11.0.0-154, which is packed with an Alma Linux operating system upgrade. Cisco CMX Release 11.0.0 is a new installation for Cisco CMX. You cannot upgrade from any previous releases of Cisco CMX.

Cisco CMX Release 11.0.0 supports migration of your data from Cisco CMX Release 10.6.3-146 to the latest Cisco CMX Release 11.0.0-154. You must install the Cisco CMX Release 10.6.3-146 patch if you want to migrate data.


Note


  • Cisco CMX Release 11.0.0 is not supported on Cisco 3375 Appliance for Cisco Connected Mobile Experiences and Cisco Mobility Services Engine (MSE) 3365 Appliance.

  • You can only migrate data from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0-154. If you are on Cisco CMX releases earlier than Release 10.6.3-146, you need to upgrade to Cisco CMX Release 10.6.3-146 and then install the Cisco CMX Release 10.6.3-146 patch, and then migrate the data.


For more information about installing the patch, see Installing Cisco CMX Release 10.6.3-146 Patch Release for Data Migration.

To install Cisco CMX OVA, follow these steps:

  1. Download the CISCO_CMX-11.0.0-154.ova file available on the Software Download page.

  2. Install the Cisco CMX Release 11.0.0-154 OVA build on the primary and secondary servers.

  3. Migrate data from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0-154. For detailed instructions, see Data Migration.

Table 1. What's New in Cisco CMX Release 11.0.0
Feature Description

Migration from CentOS 7 to AlmaLinux 8

Migrated to an enterprise Linux distribution - AlmaLinux 8 - that has fewer vulnerabilities and security patches compared to CentOS 7.

Data migration

The High Availability feature supports data migration from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0. For more information, see Data Migration.

High Availability

The High Availability feature is enhanced to include revamped and more comprehensive logs.

Expiring certificate alert

New alerts for expiring certificates are displayed in the Cisco CMX > System > Alerts window.

These alerts are generated 30 days before a certificate expires.

Token-based Root Access

The root patch is replaced by a token-based root access. This feature enables you to generate a root password that is valid for six hours. For more information, see Generate Root Password.

New scalable API server

Revamped API server with improvements in response time and concurrency.

Cisco CMX Analytics

By default, Cisco CMX Analytics is disabled in Cisco CMX Release 11.0.0. However, you can enable the service if required.

To enable Cisco CMX Analytics, run the cmxctl enable analytics command followed by the cmxctl status analytics command to verify the status. If the status is displayed as Stopped, run the cmxctl start analytics command.

Product rebranding

Cisco DNA Spaces is now Cisco Spaces.

Critical bug fixes

Includes critical bug fixes.

Installing Cisco CMX Release 10.6.3-146 Patch Release for Data Migration

This patch release for Cisco CMX Release 10.6.3-146, prepares Cisco CMX to enable High Availability with a newly installed Cisco CMX Release 11.0.0-154. Install this patch release on the primary server running Cisco CMX Release 10.6.3-146, only if you want to migrate data from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0-154.

To migrate the data, install the patch release only on the primary server running Cisco CMX Release 10.6.3-146. This enables High Availability with the secondary server running Cisco CMX Release 11.0.0-154.

You must perform a fresh install of Cisco CMX Release 11.0.0-154 and convert it into a secondary server before enabling High Availability.

After High Availability pairing is complete, data is migrated from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0-154. High Availability features such as Failover, Failback, and Active Synchronizing are not supported with this High Availability configuration.

The State Overview status change to Primary is actively synchronizing with the secondary server indicates that data migration is complete. After successfully migrating data, disable High Availability, stop all the services in CMX Release 10.6.3-146, and switch over to Cisco CMX Release 11.0.0-154.


Note


You do not have to restart the Cisco CMX server for this patch install.


To install the Cisco CMX Release 10.6.3-146 patch, follow these steps:

  1. Download the cmx-11-migration-readiness-patch-10.6.3-1.cmxp file available on the Software Download page.

  2. Use the Secure Copy Protocol (SCP) and copy the cmx-11-migration-readiness-patch-10.6.3-1.cmxp file to the Cisco CMX /home/cmxadmin/directory of Cisco CMX Release 10.6.3-146.

  3. Use Secure Shell (SSH) to connect to the Cisco CMX console as cmxadmin.

  4. Navigate to /home/cmxadmin/directory.

  5. To view the currently installed patches, run the cmxos patch list command.

  6. To install the patch, run the cmxos patch install command.

  7. At the Please enter the patch file name: prompt, enter the patch name as cmx-11-migration-readiness-patch-10.6.3-1.cmxp.

    After successful installation, the following message is displayed:

    Patch installed successfully.

  8. To view the installed patches again, run the cmxos patch list command.

System Requirements

Supported Hardware

  • Cisco CMX can be installed as a virtual Cisco MSE appliance, that requires a version from VMware ESXi 6.0 to ESXi 6.7. The OVA deployment using a VMware vCenter is supported on VMware ESXi 6.5 and above. The VMware vCenter version must be 6.7 or above and earlier versions are not supported.

    For information about installing a virtual Cisco MSE appliance, see the Cisco MSE Virtual Appliance Installation Guide for this release at:

    https://www.cisco.com/c/en/us/support/wireless/mobility-services-engine/products-installation-guides-list.html.


    Note


    • Data migration support is only available from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0 using the Cisco CMX Release 11.0.0-154 migration patch and with both primary and secondary servers in High Availability.

    • If you are on Cisco CMX releases earlier than Release 10.6.3-146, you need to upgrade to Cisco CMX Release 10.6.3-146 and then install the Cisco CMX Release 10.6.3-146 patch, and then migrate the data.

    • Cisco CMX does not support VMware tools.


    The following table lists the Cisco CMX hardware guidelines for a virtual Cisco MSE appliance on VMware. For complete requirements, see the Cisco Connected Mobile Experiences Data Sheet at:

    https://www.cisco.com/c/en/us/products/wireless/mobility-services-engine/datasheet-listing.html.

    Table 2. Hardware Guidelines
    Hardware Platform Low-End Appliance Standard Appliance High-End Appliance

    CPU

    8 vCPU

    4 physical cores

    16 vCPU

    8 physical cores

    20 vCPU

    10 physical cores

    RAM

    24 GB RAM

    48-GB RAM

    64-GB RAM

    HDD1

    550 GB

    550 GB

    1 TB

    1

    For Cisco CMX OVA installation, 250 GB is the default hard disk drive (HDD) on all virtual machines. We strongly recommend that immediately after deploying the OVA file and before powering on the VM, you should increase the disk space to the recommended amount specified in this table, so that the HDD resource does not run low while using Cisco CMX. If you do not know how to increase the disk space before powering on the VM, see the VMWare 6.7 guidelines on how to increase disk space.

    If you do not select the recommended disk space, the basic installation defaults to 160 GB of the disk space.


    Note


    Cisco Hyperlocation is only supported on the High-End Cisco CMX appliances for Cisco Connected Mobile Experiences. By default, Cisco Hyperlocation is disabled on Low-End appliances.


  • For compatibility information, see the “Cisco Connected Mobile Experiences (CMX) Compatibility Matrix” section in the Cisco Wireless Solutions Software Compatibility Matrix at:

    https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html.

Cisco Access Points Support

Cisco CMX Release 11.0.0 supports Cisco Catalyst IW9167E Heavy Duty Access Point and Cisco Catalyst IW9167I Heavy Duty Access Point.

Software Requirements

Before you deploy Cisco CMX, we strongly recommend that you see the following documents:

Licensing Information

Table 4. Cisco CMX License
Cisco CMX License Features
  • Cisco CMX Base

  • Cisco DNA

  • Cisco CMX RSSI-based location calculation of clients, interferers, and rogues for Cisco products such as Cisco Catalyst Center, Cisco Prime Infrastructure, and Cisco Identity Services Engine

  • Use of Cisco CMX location data in Catalyst Center

  • Use of Cisco CMX location data in Cisco Prime Infrastructure

  • Tethering of Cisco CMX to Cisco Spaces

  • Use of Business Insights and other capabilities of Cisco Spaces as and when available

  • Use of Basic Detect and Locate capabilities of Cisco Spaces as and when available

  • Use of Basic Location Analytics capabilities of Cisco Spaces as and when available

  • Access to the DETECT, MANAGE, and SYSTEMS tabs in the Cisco CMX or Cisco Spaces user interface

  • Cisco CMX Advanced

  • Cisco Spaces ACT/EXT

  • Cisco CMX advanced location calculation capabilities, including Cisco FastPath and Cisco Hyperlocation

  • Use of Captive Portal capability of Cisco Spaces as and when available

  • Use of Profile and Engagement capability of Cisco Spaces as and when available

  • Use of Advanced Location Analytics capability of Cisco Spaces as and when available

  • Use of Operational Insights capability of Cisco Spaces as and when available

  • Use of Advanced Detect and Locate capability of Cisco Spaces as and when available

  • The Cisco CMX Evaluation License provides full functionality for a period of 120 days. The countdown starts when you start Cisco CMX and enable a service.

    Two weeks before the evaluation license expires, you will receive a daily alert for obtaining a permanent license. If the evaluation license expires, you will not be able to access the Cisco CMX GUI or APIs. Cisco CMX will continue to run in the background and collect data until you add a permanent license and regain access to it.

  • A Cisco Spaces license (SEE or ACT/EXT) is required to connect Cisco CMX to a cloud. The cloud license includes the Cisco CMX license required to enable Cisco CMX.

  • Cisco CMX now includes license changes that warn that the use of Cisco Hyperlocation capabilities requires the Cisco CMX Advanced License. If you have any questions about licensing, contact your Cisco account team.

  • The High-Availability feature on Cisco CMX is part of the Cisco CMX Base license, which you should install on the primary HA server. The secondary HA server automatically receives a copy of the Cisco CMX license during synchronization. There is no HA-specific license to install.

  • When a third-party certificate is installed in an HA setup, the certificate must be installed separately on both the primary and secondary Cisco CMX servers. For additional information and procedures, see the “Installing a CA-Signed Certificate for High Availability in Cisco CMX” section in the Cisco CMX Configuration Guide at:

    https://www.cisco.com/c/en/us/td/docs/wireless/mse/10-6/cmx_config/b_cg_cmx106/getting_started_with_cisco_cmx.html#id_122557.

For information about procuring Cisco CMX licenses, see the Cisco Connected Mobile Experiences (CMX) Version 10 Ordering and Licensing Guide for this release at:

https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/connected-mobile-experiences/guide-c07-734430.html.

For information about adding and deleting licenses, see the “Managing Licenses” section in the Cisco CMX Configuration Guide for this release at:

https://www.cisco.com/c/en/us/support/wireless/connected-mobile-experiences/products-installation-and-configuration-guides-list.html.

Installation and Upgrade Information

  • Cisco CMX Release 11.0.0 is a new OVA installation for Cisco CMX. Inline upgrade from Cisco CMX Release 10.6.3 to Cisco CMX Release 11.0.0 is not supported.

  • Database migration is supported only from Cisco CMX Release 10.6.3-146 to Cisco CMX Release 11.0.0. You must install the Cisco CMX Release 10.6.3-146 Patch Release on the primary server running Cisco CMX Release 10.6.3-146 to migrate data.

  • After upgrading to Cisco CMX Release 10.6.3, the Cisco Prime Infrastructure stops displaying clients on the Cisco Prime Infrastructure map. This is due to the deprecation of V1 and V2 client API calls in Cisco CMX Release 10.6.3. Cisco Prime Infrastructure Release 3.8 and earlier versions use V1and V2 API calls to Cisco CMX to get the client information, and hence, fails. To work around this issue, in the Cisco Prime Infrastructure Release 3.9, there is an option to specify the Cisco CMX V3 API credentials while adding Cisco CMX in Cisco Prime Infrastructure, resulting in Cisco CMX Release 10.6.3 working with Cisco Prime Infrastructure Release 3.9.

  • Downgrading from any Cisco CMX release is not supported.

Limitations, Restrictions, and Important Notes

  • (CSCve28851) The following error message is displayed because MATLAB only counts heavy walls for location calculation, while Java counts all the obstacles on the floor map. Ignore this message because the heat maps are now correctly generated and stored:

    ERROR com.cisco.mse.matlabengine.heatmap.BaseMatlabHeatmapBuilder - 
    MatlabHeatmapBuilder#createApInterfaceHeatmap Number of heavy walls used by Matlab: 
    <nn> not equal to count reported by Java: <nn> during heatmap calculation for AP Interface: 88:f0:31:08:06:70-5.0-2.
  • (CSCve37513) Cisco CMX detects the same sources of interferences as the Cisco CleanAir system. For more information, see the “Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI)” section in the Chapter “Wireless Quality of Service” of the Cisco Wireless Controller Configuration Guide, Release 8.4 at:

    https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-4/config-guide/b_cg84/wireless_quality_of_service.html#ID51.

    The sources of interference are:

    • Bluetooth Paging Inquiry: A Bluetooth discovery (802.11b/g/n only)

    • Bluetooth Sco Acl: A Bluetooth link (802.11b/g/n only)

    • Generic DECT: A digital, enhanced cordless communication-compatible phone

    • Generic TDD: A time division duplex (TDD) transmitter

    • Generic Waveform: A continuous transmitter

    • Jammer: A jamming device

    • Microwave: A microwave oven (802.11b/g/n only)

    • Canopy: A canopy bridge device

    • Spectrum 802.11 FH: An 802.11 frequency-hopping device (802.11b/g/n only)

    • Spectrum 802.11 inverted: A device using spectrally inverted Wi-Fi signals

    • Spectrum 802.11 non std channel: A device using nonstandard Wi-Fi channels

    • Spectrum 802.11 SuperG: An 802.11 SuperAG device

    • Spectrum 802.15.4vAn 802.15.4 device (802.11b/g/n only)

    • Video Camera: An analog video camera

    • WiMAX Fixed: A WiMAX fixed device (802.11a/n/ac only)

    • WiMAX Mobile: A WiMAX mobile device (802.11a/n/ac only)

    • XBox: A Microsoft Xbox (802.11b/g/n only)

  • (CSCvg10317) Cisco MSE virtual machine (VM) appliance running Cisco CMX might not function properly after being powered on after a power outage. If this occurs:

    1. Use the cmxos date command to make sure that the Cisco CMX system date matches the current date. If the dates do not match, use the NTP server to synchronize the dates.

    2. Enter the cmxctl stop –a command to shut down Cisco CMX services.

    3. Enter the cmxctl start command to restart the services.

  • (CSCvg28274) If NMSP tunnel flapping occurs, ping an external address to check if the DNS resolution is slow. If it is slow, delete all the external DNS server entries in the /etc/resolv.conf file, except for the entry that maps to the localhost.

  • (CSCvg79749) In Cisco CMX Release 10.4.0, the v3 client API was introduced, and the v2 client API was deprecated. We recommend that you use the v3 API instead of the v2 API. High CPU usage by the Cisco CMX Location service occurs when the v2 API is used for a long duration. Restart the Cisco CMX Location service to correct the condition.

  • (CSCvi07385) With VMware vSphere ESXi 6.5 Update 2, you can successfully deploy the Cisco CMX OVA file. Update 2 displays the deployment options (Low-end, Standard, and High-end). Minor erroneous text such as [object Object] is also displayed.

    With VMware vSphere ESXi 6.5 and VMware vSphere ESXi 6.5 Update 1, the deployment options are not displayed.

  • (CSCvi84935) High CPU usage of the Cisco CMX Analytics and Location services might occur during initial HA synchronization, causing incomplete synchronization. If this occurs, remove the Cisco controller from the system to decrease the CPU usage of the Cisco CMX Analytics service. This provides enough memory for the initial HA synchronization to get completed.

  • (CSCvj52515) There is significant overhead in maintaining the compact history, which allows you to query the unique clients seen on a floor or zone per day. This does not affect the regular clients history that is stored in the Cassandra database.


    Note


    From Cisco CMX Release 10.4.1-15, the Feature Flags setting for compact location history is disabled by default. If your system is running an earlier release of Cisco CMX, we recommend that you disable the Feature Flags setting.


    To disable the Feature Flags setting, enter these commands:

    1. cmxctl config featureflags location.compactlocationhistory false

    2. cmxctl agent restart

    3. cmxctl location stop

    4. cmxctl location start

  • (CSCvn98927) We recommend that you assign an IP address to a single interface (ens32). Assigning IP addresses to two interfaces allows data to go to both the interfaces, which causes Cisco CMX to drop packets, which in turn, leads to issues related to client tracking.

  • (CSCvo14248) Generating scheduled reports in PDF format is not supported on Cisco CMX Release 10.5.0 and later. Use the PrtSc option instead. This feature set will be removed from the product.

  • (CSCvo60319) On Cisco CMX, using OAuth with Instagram might not always display the Log In portal. If the portal is not displayed, refresh your browser.

  • (CSCvp00432) As of Cisco CMX Release 10.6.0, Cisco CMX no longer supports the Historylite (/api/location/v1/historylite) API. The API requires he collection of the compact location history, which causes performance issues.

  • (CSCvp11685) If FIPS mode is enabled on Cisco CMX, the Maps online sync (Import from Cisco Prime Infrastructure) fails for Cisco Prime Infrastructure Release 3.5.

    To import maps from Cisco Prime Infrastructure Release 3.5 to Cisco CMX with FIPS mode enabled, you must download the tar file of Cisco Prime Infrastructure, and then upload the tar file to Cisco CMX, as described in the “Importing Maps” section in the Cisco CMX Configuration Guide at:

    https://www.cisco.com/c/en/us/support/wireless/connected-mobile-experiences/products-installation-and-configuration-guides-list.htm.

  • (CSCvp19413) If you need to use round brackets (such as parentheses) in a Cisco CMX API regex expression, use a backslash (\) to escape the next character. For example, instead of this string:

    Global->System Campus>1212 Deming Way (TTD)>Floor 1

    use this string:

    Global->System Campus>1212 Deming Way \(TTD\)>Floor 1
  • (CSCvp31400) Cisco CMX in FIPS mode does not support the aes128-ctr and aes256-ctr ciphers (while Cisco CMX in non-FIPS mode supports them). If a Cisco Catalyst 9800 wireless controller is using either of these ciphers, it will not be able to communicate with Cisco CMX in FIPS mode.

    Cisco CMX in FIPS mode supports only the aes128-cbc, aes256-cbc, aes128-gcm@openssh.com, and aes256-gcm@openssh.com ciphers.

  • (CSCvp25049) The Repeat Devices API does not provide all the required information because it requires information from history location data, which is managed by the compacthistory feature flag. The feature flag causes performance issues and is disabled by default.

  • (CSCvp92688) Cisco CMX might not be able to process a large amount of history data from the Cassandra database if the duration between locatedAfterTime and locatedBeforeTime for the All Client History API is either 1 hour or 20 minutes. We recommend that you use the Cassandra export tool to extract history data.

  • (CSCvq81962) When the Cisco CMX session idle timeout period is reached, users are logged out of their Cisco CMX UI session whether the session is idle or is actively being used. Users must then log in to Cisco CMX again.

    Use the cmxctl config auth settings command to configure the Session idle timeout in minutes setting. The time range is 1 to 720 minutes. The default value is 30 minutes.

    This timeout period does not apply to Cisco CMX CLI sessions.

  • (CSCvq82147) Cisco CMX supports VMware Snapshot.

  • (CSCvq82305) Location data is poor when too few Angle of Arrival (AoA) measurements are reported in a network, with both hyperlocation and nonhyperlocation access points.

  • (CSCvr16016) The issue of the Cisco CMX Analytics Service not processing data is now fixed in Cisco CMX Release 10.6.2-72 but for the fix to come into effect, you must reboot Cisco CMX.

  • (CSCvr26395 and CSCvr26398) The Cisco CMX Troubleshooting Tool supports only Cisco Hyperlocation-capable access points.

  • (CSCvs57713) With Cisco CMX Release 10.5 and later and Cisco WLC Release 8.7 and later, the Cisco CMX Group Subscription feature allows one Cisco Hyperlocation-enabled wireless controller to connect to multiple Cisco CMX servers.

  • (CSCvs68618) When collecting client data from the Cisco CMX v3 Location API, the last seen time stamp is different from the time stamp displayed on the Cisco CMX GUI.

  • In Cisco CMX Release 10.6.2-89, the floorRefId component is replaced with floorId.

  • (CSCvs89951) If your network has a Cisco Catalyst 9800 wireless controller, do not check the Exclude Probing Only Clients check box located in the Settings > Filtering section on the System > Dashboard window on Cisco CMX. Checking the Exclude Probing Only Clients check box causes all the clients (probing and associated clients) to be excluded from the controller, and hence will not be displayed on Cisco CMX.

  • (CSCvt83715) We recommend that you disable the Cisco CMX Analytics service if you are not using the service.

    • If you are running Cisco CMX Release 10.6.2-72 or earlier, install the cmx-disableanalytics-patch-10.6.2-1.cmxp patch file. Contact Cisco Customer Support (https://www.cisco.com/c/en/us/support/index.html) for the patch file.

    • If you are running Cisco CMX Release 10.6.2-89 or later, use the cmxctl disable analytics command.


    Note


    The cmxctl disable analytics command is supported only on Cisco CMX Release 10.6.2-89 and later.


  • (CSCvt83902) Cisco CMX displays an authentication error during SSO login if the SAML response from the IDP does not include the User.email, User.FirstName, and User.LastName attributes.

  • (CSCvu18413) Due to FIPS/CC/UCAPL compliance, root access is no longer available as of Cisco CMX Release 10.6.0. Only Cisco Customer Support has access to a root patch for troubleshooting. Contact Cisco Customer Support (https://www.cisco.com/c/en/us/support/index.html) for assistance.

Caveats

Caveats describe unexpected behavior in the Cisco CMX application. The Open Caveats and Resolved Caveats sections list the caveats in this release.

Open Caveats

This section lists the open caveats in this release of Cisco CMX 11.0.0

Table 5. Cisco CMX 11.0.0 Open Caveats
Bug ID Description

CSCwe88428

Unable to SSH to FIPS-enabled Cisco CMX

CSCwe20242

Cisco CMX RADIUS authentication fails for password longer than 16 characters

CSCwf31042

Cisco CMX 11 on IPv6: Most services not shown as running after initial configuration

CSCwf38238

Cisco CMX 11: Tracking CDETS for CLI that are deprecated or not working

Resolved Caveats

This section lists the caveats that have been resolved in this release of Cisco CMX 11.0.0

Table 6. Cisco CMX 11.0.0 Resolved Caveats
Bug ID Description

CSCwc99232

Cannot create notification when DeviceType is RFID Tag, clients or anything other than all

CSCwe88364

Cisco CMX is detected as vulnerable with Allows Password Auto-Completion vulnerability

CSCwd97603

Cisco CMX cannot add/integrate Cisco Catalyst 9800 Series Wireless Controllers using TACACS+ user

CSCvx69297

Cisco CMX API Server Enhancement

CSCwd18424

Typo in the Cisco CMX cloud connection message

Documentation and Support

Cisco Support Community

Cisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers. Join the forum at Cisco Community.

Communications, Services, and Additional Information

  • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.

  • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.

  • To submit a service request, visit Cisco Support.

  • To discover and browse secure, validated enterprise-class apps, products, solutions, and services, visit Cisco DevNet.

  • To obtain general networking, training, and certification titles, visit Cisco Press.

  • To find warranty information for a specific product or product family, access Cisco Warranty Finder.

Cisco Bug Search Tool

Cisco Bug Search Tool (BST) is a gateway to the Cisco bug-tracking system, which maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. The BST provides you with detailed defect information about your products and software.

Documentation Feedback

To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.