Cisco IP DECT 6800 Series Release Notes for Firmware Release 5.1(3)
These release notes support the Cisco IP DECT 6800 Series running Firmware Release 5.1(3).
This release supports the following devices:
-
Cisco IP DECT 110 Single-Cell Base Station
-
Cisco IP DECT 210 Multi-Cell Base Station
-
Cisco IP DECT 110 Repeater
-
Cisco IP DECT Phone 6823 Handset
-
Cisco IP DECT Phone 6825 Handset
-
Cisco IP DECT Phone 6825 Ruggedized Handset
The Cisco IP DECT 6800 Series is compatible with the following systems:
-
BroadSoft BroadWorks 22.0 and later
-
Asterisk 13.1 and later
The firmware release versions are:
-
Base station version 5.1(3): Displayed on the device as firmware version:
-
DBS-110: IPDect-DBS110-5-1-3-MPP0001-3_REL.zip
-
DBS-210: IPDect-DBS210_5-1-3-MPP0001-3_REL.zip
-
-
Handset version 5.1(3): Displayed on the device as firmware version:
-
6823: IPDect-PH6823_5-1-3-MPP0001-3_REL.zip
-
6825: IPDect-PH6825_5-1-3-MPP0001-3_REL.zip
-
6825-RGD: IPDect-PH6825RGD_5-1-3-MPP0001-3_REL.zip
-
-
Repeater version 5.1(3): Displayed on the device as firmware version:
-
IPDect-RPT-110_5-1-3-MPP0001-3_REL.zip
-
Related Documentation
Cisco IP DECT 6800 Series Documentation
See the publications that are specific to your language and firmware release. Navigate from the following Uniform Resource Locator (URL):
New and Changed Features
DHCP Option 60 Vendor ID and 66 and 15 FQDN Handling
DHCP option 66 can provide either hostname or IP address of a TFTP server, or an entire Fully Qualified Domain Name (FQDN). If a domain name is required, this domain name can be provided separately through option 15. This helps in flexibility in network configurations, as the TFTP server and the domain used for DNS resolution do not necessarily need to be in the same domain.
DHCP option (60) Vendor class identifier is an option to identify the product engaging DHCP conversation towards the DHCP server.
Where to Find More Information
- Cisco IP DECT 6800 Series Administration Guide
EAP 802.1x Authentication
With this release, the IP DECT 6800 Series supports IEEE 802.1x authentication. When 802.1X authentication is enabled, the base station uses 802.1X authentication to request network access. When 802.1x authentication is enabled on the base station, after successful installation of a certificate, two types of authentications are supported, EAP-TLS Authentication and EAP-MD5 Challenge.
-
EAP-TLS Authentication: Port-based authentication using TLS protocol version 1.2.
-
EAP-MD5 Challenge: Port-based authentication, where a username and password are encrypted using MD5 Hash.
Where to Find More Information
- Cisco IP DECT 6800 Series Administration Guide
- XML Reference Guide for Cisco IP DECT 6800 Series
EDOS Handling
With this release, if DHCP options are present in the network, but don't produce a valid response for a longer time, then the base continues to reach out to EDOS and looks for configuration files.
Where to Find More Information
Cisco IP DECT 6800 Series Administration Guide
Loud Ringer for a New Contact
You can add a loud ringer ringtone to a new contact added to your handset. Any incoming call from that contact rings loudly in a noisy enviroment. This setting overrides the custom ringtone for a local contact. This setting however allows the handset volume adjustment and the handset in silent mode to ring.
Where to Find More Information
Cisco IP DECT 6800 Series User Guide
Cisco IP DECT 6800 Series Administration Guide
Ringtone Customization in Charger Warning and Coverage Warning
You can now customize the ringtone when you set the charger warning or the coverage warning of the handset.You can also set a desired volume and duration of the ringtone. For example, while setting up coverage warning of the handset, if you choose the Melody and Custom ring as Loud Ringer and when in a call you move away from the base station, the handset will play a loud ringtone before the connection is lost.
Where to Find More Information
Cisco IP DECT 6800 Series User Guide
Cisco IP DECT 6800 Series Administration Guide
XML Reference Guide for Cisco IP DECT 6800 Series
Open Profile Encryption
Symmetric key encryption can be used to encrypt an open configuration profile, whether the file is compressed or not. Compression, if applied, must be applied before encryption.
The provisioning server uses HTTPS to handle initial provisioning of the phone after deployment. Pre-encrypting configuration profiles offline allows the use of HTTP for resyncing profiles subsequently. This reduces the load on the HTTPS server in large-scale deployments.
When the base station received an encrypted config file the file should be decrypted. The config file can be encrypted in two ways:
- AES-256-CBC encryption
- RFC 8188-based HTTP content encryption with AES-128-GCM ciphering
Where to Find More Information
Cisco IP DECT 6800 Series Administration Guide
XML Reference Guide for Cisco IP DECT 6800 Series
Override of Dual-cell or Multicell ID
This feature allows you to configure to override the auto-assignment cell ID and provide cell ID on his own. It allows the override of Dualcell and Multicell ID in the configuration in the DBS-110.
When you set the Dualcell ID and the Multicell ID in the configuration file, DBS-110 honors the value in the file and forms the dual cell.
Where to Find More Information
Cisco IP DECT 6800 Series Administration Guide
Upgrade the Firmware
You can upgrade the base station and handset firmware with TFTP, HTTP, or HTTPS. You upgrade the base station first and then upgrade the handsets after the base station upgrade completes. The base station upgrade may take about 30 minutes to 1 hour to complete and reboot. The handset upgrade may take 20-30 minutes to download and verify, and an extra few minutes to load the new firmware file. The handset must be placed in the charger and not removed until the handset loads the firmware file and reboots.
You can upgrade Cisco IP DECT 210 Multi-Cell Base Station to Firmware Release 5.1(2) only if the base station is currently running release 5.0(1) or 4.8(1) SR1. If the base station is currently running release 4.7 or 4.8, you must upgrade the base station to release 5.0(1) or 4.8(1) SR1 before upgrading to release 5.1(3). If the base station is currently running release 4.5, you must upgrade the base station to release 4.6 in factory reset mode before upgrading to release 4.8(1) SR1.
You can upgrade Cisco IP DECT 110 Single-Cell Base Station to Firmware Release 5.1(3) if the base station is currently running release 5.0(1) or 4.8(1) SR1. If the base station is currently running release 4.8, you must upgrade the base station to release 5.0(1) or 4.8(1) SR1 before upgrading to release 5.1(3).
You access the Cisco Software Download page to get the firmware in zip files. The zip files contain these firmware files:
-
For the base station, the zip filename starts with:
-
IPDect-DBS110 for Cisco IP DECT 110 Single-Cell Base Station.
-
IPDect-DBS210 for Cisco IP DECT 210 Multi-Cell Base Station.
-
-
For the repeater, the zip filename starts with IPDect-RPT-110.
-
For the handset, the zip filename starts with:
-
IPDect-PH6823 for Cisco IP DECT Phone 6823 Handset.
-
IPDect-PH6825 for Cisco IP DECT Phone 6825 Handset.
-
IPDect-PH6825RGD for Cisco IP DECT Phone 6825 Ruggedized Handset.
-
-
Base station:
-
Cisco IP DECT 110 Single-Cell Base Station: IPDect-DBS110_5-1-3-MPP0001-3_REL.zip
-
Cisco IP DECT 210 Multi-Cell Base Station: IPDect-DBS210_5-1-3-MPP0001-3_REL.zip
-
-
Cisco IP DECT 110 Repeater: IPDect-RPT-110_5-1-3-MPP0001-3_REL.zip
-
Handsets:
-
Cisco IP DECT Phone 6823 Handset: IPDect-PH6823_5-1-3-MPP0001-3_REL.zip
-
Cisco IP DECT Phone 6825 Handset: IPDect-PH6825_5-1-3-MPP0001-3_REL.zip
-
Cisco IP DECT Phone 6825 Ruggedized Handset: IPDect-PH6825RGD_5-1-3-MPP0001-3_REL.zip
-
![]() Note |
|
For detailed information about the upgrade or downgrade procedure, refer to the "Maintenance" chapter in the Cisco IP DECT 6800 Series Administration Guide.
Before you begin
You need the TFTP, HTTP, or HTTPS server information.
Procedure
Step 1 |
From your browser, go to https://software.cisco.com/download/home/286323307. |
Step 2 |
If required, sign in with your user ID and password. |
Step 3 |
Click IP DECT 110 Repeater with Multiplatform Firmware.
|
Step 4 |
Click IP DECT 110 Single-Cell Base Station with Multiplatform Firmware.
|
Step 5 |
Click IP DECT 210 Multi-Cell Base Station with Multiplatform Firmware.
|
Step 6 |
Click IP DECT 6823 with Multiplatform Firmware.
|
Step 7 |
Click IP DECT 6825 with Multiplatform Firmware. |
Step 8 |
Unzip the downloaded files to your computer. |
Step 9 |
Access the TFTP server file system. |
Step 10 |
If not available, create a Cisco directory. |
Step 11 |
Open the Cisco directory. |
Step 12 |
Copy the new base station firmware file to the Cisco folder. |
Step 13 |
Copy the new handset firmware file to the Cisco folder. |
Step 14 |
Complete the upgrade as described in the Cisco IP DECT 6800 Series Administration Guide. |
Limitations and Restrictions
System Behavior During Times of Network Congestion
Anything that degrades network performance can affect phone system voice quality, and in some cases, can cause a call to drop. Sources of network degradation can include, but are not limited to, the following activities:
-
Administrative tasks, such as an internal port scan or security scan
-
Attacks that occur on your network, such as a Denial of Service attack
Caller Identification and Other Phone Functions
Caller identification or other phone functions have not been verified with third-party applications for the visually or hearing impaired.
Base Station Firmware Downgrade Limitation
After the upgrade for V460 B4, a downgrade of the base to a firmware version earlier than V460 B2 requires you to factory reset the base. This factory reset will reset the login credentials to the defaults. If you don't perform the factory reset, you can't log into the administration web pages.
After the upgrade to Firmware version 5.0(1), you can downgrade the base station only to the latest branch of the Firmware version 4.8(1) SR1. This downgrade requires you to factory reset the base station. The factory reset will reset the login credentials to the defaults. If you don't perform the factory reset, you can't log into the administration web pages.
Base Station Alert Due to a Clock Synchronization Error
The base station self-check process fails if there’s a clock synchronization error. When this error occurs, the LED on the base station flashes red, amber, and green. In this case, we recommend the standard RMA process.
Open Caveats
The following caveats are open at the time of the release.
-
CSCwm64069 When the LDAP Virtual list is enabled, the virtual list filter doesn’t work
-
CSCwk04628 DECT 6825 phone cannot page the 3rd paging group
-
CSCwj90396 Documentation Discrepancy in "Secure_Call_Option_n_" Parameter for the 6800 DECT Base Stations.
-
CSCwj32584 French letter"é" shown as Ac on a handset
-
CSCwj09771 XSI reverse lookup for outgoing calls is not invoked
- CSCwf42230 incorrect source SIP port used in contact header
- CSCwf14341 DECT 6823 handset - 'Loud Ringer' melody not available for 'Contacts' configured in handset
- CSCwd83296 DECT 110/210: Handset Upgrade Rules can't be overwritten by blank rule from CM services.
Resolved Caveats
The following caveats were resolved for the release:
-
CSCwk69197 LAN SYNC page is not shown in Diagnostic Trace zip file
-
CSCwj06660 read request for $PSN.xml and $MA.cfg is backwards for DHCP based provisioning
-
CSCwi76847 DECT handset unresponsive after receiving a voicemail notification
-
CSCwi22689 Time zone data for Yukon, Canada is wrong
-
CSCwi22427 central directory parameter regression
-
CSCwi12269 Text messaging UDP packets being sent to inverted IP address
-
CSCwh92720 DECT Company ID mismatch causing E911 location service to fail intermittently
-
CSCwh73394 RSSI in site survey moves slower on later handset f/w builds
-
CSCwf83229 DECT base using ipv6 for resync when only ipv4 selected as <IP_Mode>
-
CSCwf58578 Cisco IP Phone Stored Cross Site Scripting Vulnerability
-
CSCwf36615 redundant SAC credentials sent by base
Cisco IP Phone Firmware Support Policy
For information on the support policy for phones, see the Cisco IP Phone Firmware Support Policy.