Cisco Unified CallManager Device Package 6.0.1
(3129-1)
Release Notes
These Device Package
release notes contain important information about installation procedures and
resolved caveats for Cisco Unified CallManager Device
Package release 6.0.1(3129-1).
1. Note: Before you install this Cisco Unified CallManager Device Package, Cisco recommends that you review the “Important Notes” section for information about issues that may affect your system.
Determining the Software Version
Compatibility Matrix and Supported Upgrades
Important Notes & Recommendations
Resolved Caveats for Cisco Unified CallManager Device
Package
This Device Package includes the following resolved DDTS’s:
Locale Installer for Cisco Unified CallManager
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Obtaining Technical Assistance
Cisco Technical Support Website
Definitions of Service Request Severity
Obtaining Additional Publications and Information
This document provides installation instructions
for this Cisco Unified CallManager Device Package and
endpoint related changes.
2. Note: Failure to follow installation instructions as described may result in inconsistent Cisco Unified CallManager behavior.
Make sure that you
install and configure this release of Cisco Unified CallManager
on approved Cisco hardware. You can access the correct Cisco-approved server
configuration at the following URL: http://www.cisco.com/en/US/products/hw/voiceapp/ps378/prod_brochure_list.html.
You can determine the
version of Cisco Unified CallManager software that is
running on your server by accessing Cisco Unified CallManager
Administration and then clicking Help/About.
This Cisco Unified CallManager Device Package release is compatible with the
following Cisco Unified CallManager versions.
6.0(1) |
3. Note: Review the Show/Software on the Cisco Unified OS Administration in order to determine what, if any Device Package you currently have installed. It is recommended to not install an older version of the Device Package.
4. NOTE:
Be aware that the release of Cisco IP telephony
5. Endpoint firmware: http://www.cisco.com/cgi-bin/tablebuild.pl/ip-7900ser Endpoint documentation, including release notes: http://www.cisco.com/univercd/cc/td/doc/product/voice/c_ipphon/english/
Firmware Versions
File |
MD5 |
cmterm-devicepack6.0.1.3129-1.cop.sgn |
95:5f:2f:92:57:1e:8a:9e:8b:b2:9d:fc:50:6f:61:6b |
Device-type |
Load-name |
Version |
3911_3951-sip |
3911_3951-sip.8-1-2 |
8.1(2.0) |
6608 |
6608-4.0.0.32-mgcp |
D00404000032.bin/D0054322.bin |
6608cfb |
6608cfb-4.0.0.03-sccp |
C00104000003.bin/C002E031.bin |
6608mtp |
6608mtp-4.0.0.06-sccp |
M00104000006.bin/M002E031.bin |
6624 |
6624-4.0.0.13-mgcp |
A00204000013.bin/A0034322.bin |
7902 |
7902-8.0.2-sccp |
8.0(2.0) |
7905 |
7905-8.0.1.1-sip |
8.0(1.1) |
7905 |
7905-8.0.3-sccp |
8.0(3.0) |
7910 |
7910-5.0.7.0-sccp |
5.0(7.0) |
7911_7906-sccp |
7911_7906-sccp.8-5-3 |
8.5(3.0) |
7911_7906-sip |
7911_7906-sip.8-5-3 |
8.5(3.0) |
7912 |
7912-8.0.1.1-sip |
8.0(1.1) |
7912 |
7912-8.0.3-sccp |
8.0(3.0) |
7914-sccp |
7914-sccp.5-0-4 |
5.0(4.0) |
7915 |
7915.1-0-4 |
1.0(4.0) |
7916 |
7916.1-0-4 |
1.0(4.0) |
7920-sccp |
7920-sccp.3-0-2 |
3.0(2.0) |
7921-sccp |
7921-sccp.1-3-3 |
1.3(3.0) |
7925-sccp |
7925-sccp.1-3-3 |
1.3(3.0) |
7931-sccp |
7931-sccp.8-5-3 |
8.5(3.0) |
7935-sccp |
7935-sccp.3-2-19 |
3.2(19.0) |
7936-sccp |
7936-sccp.3-3-20 |
3.3(20.0) |
7937-sccp |
7937-sccp.1-3-4 |
1.3(4.0) |
7940-7960 |
7940-7960-8.12.00-sip |
8.12(0.0) |
7940-7960-sccp |
7940-7960-sccp.8-1-2 |
8.1(2.0) |
7941_7961-sccp |
7941_7961-sccp.8-5-3 |
8.5(3.0) |
7941_7961-sip |
7941_7961-sip.8-5-3 |
8.5(3.0) |
7942_7962-sccp |
7942_7962-sccp.8-5-3 |
8.5(3.0) |
7942_7962-sip |
7942_7962-sip.8-5-3 |
8.5(3.0) |
7945_7965-sccp |
7945_7965-sccp.8-5-3 |
8.5(3.0) |
7945_7965-sip |
7945_7965-sip.8-5-3 |
8.5(3.0) |
7970_7971-sccp |
7970_7971-sccp.8-5-3 |
8.5(3.0) |
7970_7971-sip |
7970_7971-sip.8-5-3 |
8.5(3.0) |
7975-sccp |
7975-sccp.8-5-3 |
8.5(3.0) |
7975-sip |
7975-sip.8-5-3 |
8.5(3.0) |
7985 |
7985-4-1-7-0-sccp |
4.1(7.0) |
ata |
ata-3.2.4-sccp |
3.2(4.0) |
Cisco provides the following guidance to help you
successfully install and/or upgrade Cisco Unified CallManager
software:
·
To minimize call-processing
interruptions during the upgrade process, make sure that all servers are
running the same version of Cisco Unified CallManager software before beginning this upgrade.
·
Make sure that the servers are online
before you begin this Device Package installation.
6.
Note: Cisco recommends that you apply this Device Package during a
maintenance window.
Procedure
NOTE: Apply this patch to all of your
Cisco Unified CallManager servers, beginning with the
publisher server and TFTP server.
When applying this Device Package to enable new
device support, a cluster-wide reboot is required for those devices to register
successfully. A clusterwide reboot IS NOT
required when running to update existing firmware/support.
For
Cisco Unified CallManager 6.0, you must do all
software installations and upgrades by using the Software Upgrades menu
options. The system can upload and process only software that Cisco Systems
approved. You cannot install or use third-party or Windows-based software
applications that you may have been using with a previous version of Cisco
Unified CallManager with Cisco Unified CallManager 6.0.
7.
Note: In order to change the loads manually, you do NOT need to reinstall
this Device Package. The new files will be present in the TFTP folder. Go to CCMAdmin->Device->Device Settings->Device Defaults
and manually change the name of the load file (for specific device(s)) to the
new load and click UPDATE.
Note: If
you are rebooting the cluster, the next step does not need to be done.
8.
The
Cisco TFTP service now must be stopped and restarted on the TFTP server, then reset the affected devices for them to upgrade
to the new load.
The Device Package cannot be uninstalled. However, you can change
the device defaults for devices you wish to roll back. From the Cisco
Unified CallManager Administration page go to
System/Device/Device Settings/Device Defaults and set the devices that were
changed previously back to their previous firmware setting. Select
update, and then reset those devices.
Log File Information
The system creates log files which may be viewed via the
following process:
·
Using Cisco Unified CallManager Serviceability Real-Time Monitoring Tool,
select Trace & Log Central\Remote Browse\Install and Upgrade
Logs.
·
Using Cisco Unified CallManager Serviceability Real-Time Monitoring Tool,
select Trace & Log Central\Collect Files\Install and Upgrade
Logs.
·
Using Cisco Unified CallManager Serviceability Real-Time Monitoring Tool,
select Trace & Log Central\Query Wizard\Install and Upgrade
Logs.
·
Using Cisco Unified CallManager Serviceability Real-Time Monitoring Tool,
select Trace & Log Central\Schedule Collection\Install
and Upgrade Logs.
6.0.(1.3129-1) |
|
Without
the Load Server and Log Server parameters for 7931 on CUCM |
6.0.(1.3128-1) |
|
Check
in BKEM loads in to CUCM Branch companied the 853 phone load |
6.0.(1.3127-1) |
|
Checking
in phone load 853 firmware |
|
7937
134 CUCM vob check in defect |
6.0.(1.3126-1) |
|
Checkin SCCP 812 79407960 firmware into callmanager |
6.0.(1.3125-1) |
|
Noise
Reduction causes saturated speech on Handsfree Send
|
|
Noise
Reduction causes saturated speech on Handsfree Send
|
|
Placeholder
of CIA1859 HeadsetHandset Monitor |
|
7911
Turbo CR2 LCD flicker in normal condition |
6.0.(1.3124-1) |
|
Update
Cisco 7921 7925 support files for Release 133 |
|
Checkin Cisco 7925 firmware version 133 to CUCM |
|
JPNKatakana strings used on 7937s QRT EM CallBack and Corp Dir |
6.0.(1.3123-1) |
|
Check
in 794060 SIP P0S381200 COP files to Clearcase for
Linux CCM |
6.0.(1.3122-1) |
|
7911 QEDs
error in 601 devpack |
6.0.(1.3121-1) |
|
844
Phone load check in to CUCM branch |
|
844 QED files check in |
|
7970 JPN half width katakana help shown when
menu items are followed |
6.0.(1.3119-1) |
|
Check-in
ATA SCCP firmware version 3.2(4) to CUCM |
|
844
QED files check in |
|
Checkin SCCP 811 79407960 firmware into callmanager |
|
7937
1.3(3) CUCM vob check in defect |
|
Check
in 794060 SIP P0S3081100 COP files to Clearcase for
Linux CCM |
6.0.(1.3118-1) |
|
Check-in
Cisco 7921 firmware version 1.3(2) to CUCM |
|
7940s
and 7960s cannot register with the 810 SIP phone load |
|
7921
not updating phone load during ES install |
|
Check
in 794060 SIP P0S3081000 COP files to Clearcase for
Linux CCM |
6.0.(1.3117-1) |
|
7936
3.3(20) CUCM vob check in defect |
6.0.(1.3116-1) |
|
7985
-- Checkin new image 4.1.7 |
|
Update
Cisco 7921 & 7925 support files for Release 1.3.2 |
|
Adding
842 phone firmware |
|
7937
1.3(2) CUCM vob check in defect |
|
Adding
842 QED features |
|
Add
remote hold icon to 7914 |
6.0.(1.3114-1) |
|
Check-in
Cisco 7925 firmware version 1.3(1) to CUCM |
|
Checkin 8010 firmware into CUCM vob |
6.0.(1.3112-1) |
|
Update
7925 |
6.0.(1.3111-1) |
|
Adding
Display Refresh Flicker Correction feature |
|
Adding
3rd Gen firmware 841SR1 to CUCM |
6.0(1.3109.1) |
|
Adding
841 to CUCM |
6.0(1.3108.1) |
|
Check-in
Cisco 7921 firmware version 1.2(1) to CUCM |
|
Update
7921 support files for Release 1.2 |
6.0(1.3107.1) |
|
3.3(16)
and 3.2(19) CCM vob commit |
|
791516
Load info in Device Defaults dont work |
6.0(1.3106.1) |
|
7936
Restricted Access to the phones setting menu QED Change |
|
6.0(1.3104.1) |
|
Add
7925 support files ( |
6.0.1.3103-1 |
|
7985-
incorrrect load302.txt file in 4.1(6) cop |
6.0.1.3102-1 |
|
Checkin 7985 4.1(6) copfiles to
all relevant UCM branches |
6.0.1.3101-1 |
|
Adding
835 phone firmware to CUCM |
6.0.1.2136-1 |
|
Merge
794060 SCCP phone load 8090 to CallManager branch |
6.0.1.2135-1 |
|
7937
121 CUCM vob check in defect |
|
Need
to add devices for CTS500 CTS1000 CTS3000 CTS3200 |
6.0.1.2134-2 |
|
Locale
not displayed properly after changing from Japanese to English |
6.0.1.2132-1 |
|
Device
Package installation reliabilty enhancements
|
|
Adding
834SR1 phone firmware to CUCM |
|
Remove
the User Guide download link for Phones without 5x User Guides |
6.0.1.2131-1 |
|
7937
111 CUCM vob check in defect |
6.0.1.2127-1 |
|
Check-in
Cisco 7921 firmware version 1.1(1) to CallManager |
6.0.1.2125-1 |
|
Update
7921 |
6.0.1.2124-1 |
|
E1
Port on WS6608 542 not replying to external ping ICMP packets |
6.0.1.2121-1 |
|
Check-in
Cisco 7921 firmware version 1.0(5) to CallManager |
|
3911
CLI command shows wrong network locale information |
6.0.1.2119-1 |
|
7911
LCD glimmer flicker when neon light is on |
6.0.1.2118-1 |
|
7985-Need
to checkin cmterm_7985.4-1-5-0.bin to all relevant
UCM branc |
|
CCMUser user guide missing for 7931 |
6.0.1.2117-1 |
|
Adding
833Sr2 to all UCM builds |
|
Ehook CCM Feature Description uses Ehook
term |
6.0.1.2115-1 |
|
Removing
eHook feature from 11/06, 31, 41/61 and 70/71 phone
models |
|
Adding
833 features |
6.0.1.2113-1 |
|
Adding
833 to CUCM |
6.0.1.2112-1 |
|
Checkin enabler of 3911 in CM branches |
|
7985
Can not disable advertisement of g.722 codec |
6.0.1.2109-1 |
|
KeepAlive interval with CM6608 CFBMTP resources |
6.0.1.2108-1 |
|
Check-in
Cisco 7921 firmware version 1.0(4) to CallManager |
|
Update
the QED setting for the 7937 phone guide |
|
Extra
button templates are displayed for 7937 |
6.0.1.2107-1 |
|
Check
in 794060 SIP P0S308800 COP files to Clearcase for
Linux CCM |
|
Update
English locale Files into the CCM branches for 833 release |
|
Checkin F |
6.0.1.2106-1 |
|
3911
enabler display errors on CCMAdmin page |
|
6608
T1 resets due to bugtrap |
6.0.1.2105-1 |
|
Check
in Guinness phone firmware to CallManager |
6.0.1.2104-1 |
|
Missing
SCCP term in 7911 Phone Button Template in SD 50151366 |
6.0.1.2103-1 |
|
Lowdown
MR 802 needs to be checked in CUCM Branches |
|
multiple
issue after upgrade to 335sr2b |
|
7970
plays loud comfortable noise when using G.729 codec |
6.0.1.1103-1 |
|
Product
Specific Configuration Layout missing for 3951 |
6.0.1.1102-1 |
|
Enable
Guinness Model phones to appear in CUCM Admin Pages |
|
Check
in 7935 3217 COP files to clearcase for SD CCM |
|
790611
display square symbol when the Caller ID too long |
|
Phone
does not display full status message when registration fails |
|
Installing
devpack51121041 on 51110002 doesnt update all loads
|
6.0.1.1101-5 |
|
Commit
806 firmware to CCM VOB |
For optimal performance, be sure
that you use the Cisco Unified CallManager Locale
Installer that is specific to the version of Cisco Unified CallManager
that you use. Be aware that all phrases
may not display in the desired locale when you upgrade to a different version
of Cisco Unified CallManager. Refer to the readme file that is posted with
the Cisco Unified CallManager Locale Installer
software on the following URL for the complete list of supported
languages: http://www.cisco.com/univercd/cc/td/doc/product/voice/c_callmg/locinst/index.htm.
Each release of Cisco Unified CallManager may support a different number of locales. The
full suite of Locale Installers that work with each applicable version of Cisco
Unified CallManager can be found on http://www.cisco.com after the English version becomes available. You can download the
Locale Installers for all languages that are supported with Cisco Unified CallManager from the following location: http://www.cisco.com/kobayashi/sw-center/telephony/callmgr/locale-installer.shtml.
9. Note: When using locales, Cisco recommends that you wait until the locale installer that specifically supports the version of Cisco Unified CallManager that you use becomes available before you upgrade your system. Because some incompatibilities may exist between releases, be sure to only use the locale installer that specifically supports your version of Cisco Unified CallManager.
Obtaining Documentation
Cisco documentation and additional literature are
available on Cisco.com. Cisco also provides several ways to obtain technical
assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation
at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
You can access international Cisco websites at this
URL:
http://www.cisco.com/public/countries_languages.shtml
For additional
information about Cisco Unified CallManager, refer to
the following documentation:
To access the
documentation suite for voice products, navigate to the following URL: http://www.cisco.com/univercd/cc/td/doc/product/voice/.
To access the latest
software upgrades and related documentation for
Cisco Unified CallManager, navigate to the following
URL and then choose the applicable version:
http://www.cisco.com/kobayashi/sw-center/sw-voice.shtml.
Cisco
documentation and additional literature are available in a Documentation DVD
package, which may have shipped with your product. The Documentation DVD is
updated regularly and may be more current than printed documentation. The
Documentation DVD package is available as a single unit.
Registered
Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD
(product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco
Marketplace:
http://www.cisco.com/go/marketplace/
You can find instructions for ordering
documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
Documentation Feedback
You can send comments about technical documentation
to bug-doc@cisco.com.
You can submit comments by using the response card
(if present) behind the front cover of your document or by writing to the
following address:
Cisco Systems
Attn: Customer Document Ordering
We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability
Policy portal at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:
A current list of security advisories and notices
for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they
are updated in real time, you can access a Product Security Incident Response Team
Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Cisco is
committed to delivering secure products. We test our products internally before
we release them, and we strive to correct all vulnerabilities quickly. If you
think that you might have identified a vulnerability
in a Cisco product, contact PSIRT:
We
encourage you to use Pretty Good Privacy (PGP) or a compatible product to
encrypt any sensitive information that you send to Cisco. PSIRT can work from
encrypted information that is compatible with PGP versions 2.x through
8.x. Never use a revoked or an expired
encryption key. The correct public key to use in your correspondence with PSIRT
is the one that has the most recent creation date in this public key server
list:
http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&exact=on
In an
emergency, you can also reach PSIRT by telephone:
Obtaining Technical Assistance
For all customers, partners, resellers, and
distributors who hold valid Cisco service contracts, Cisco Technical Support
provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical
Support Website on Cisco.com features extensive online support resources. In
addition, Cisco Technical Assistance Center (TAC) engineers provide telephone
support. If you do not hold a valid Cisco service contract, contact your reseller.
The Cisco Technical Support Website provides online
documents and tools for troubleshooting and resolving technical issues with
Cisco products and technologies. The website is available 24 hours a day, 365
days a year, at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support
Website requires a Cisco.com user ID and password. If you have a valid service contract
but do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do
10.
Note:
Use the Cisco Product Identification
(CPI) tool to locate your product serial number before submitting a web or
phone request for service. You can access the CPI tool from the Cisco Technical
Support Website by clicking the Tools & Resources link under Documentation
& Tools. Choose Cisco Product Identification Tool from the Alphabetical
Index drop-down list, or click the Cisco Product Identification Tool link under
Alerts & RMAs. The CPI tool offers three search
options: by product ID or model name; by tree view; or for certain products, by
copying and pasting show command output. Search results show an illustration of
your product with the serial number label location highlighted. Locate the
serial number label on your product and record the information before placing a
service call.
Using the online TAC Service Request Tool is the
fastest way to open S3 and S4 service requests. (S3 and S4 service requests are
those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service
Request Tool provides recommended solutions. If your issue is not resolved
using the recommended resources, your service request is assigned to a Cisco
TAC engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or
if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down
or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and
S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of
the following numbers:
Asia-Pacific: +61 2 8446 7411
(Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447
For a complete list of Cisco TAC contacts, go to
this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in
a standard format, Cisco has established severity definitions.
Severity 1 (S1)—Your
network is “down,” or there is a critical impact to your business
operations. You and Cisco will commit all necessary resources around the clock
to resolve the situation.
Severity 2 (S2)—Operation of an existing network is
severely degraded, or significant aspects of your business operation are
negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the
situation.
Severity 3 (S3)—Operational performance of
your network is impaired, but most business operations remain functional.
You and Cisco will commit resources during normal business hours to restore
service to satisfactory levels.
Severity 4 (S4)—You
require information or assistance with Cisco product capabilities,
installation, or configuration. There is little or no effect on your business
operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and
network solutions is available from various online and printed sources.
·
Cisco Marketplace provides a variety of Cisco books, reference guides,
and logo merchandise. Visit Cisco Marketplace, the company store, at this
URL: http://www.cisco.com/go/marketplace/
·
Cisco Press publishes
a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco
Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com/
·
Packet
magazine is the Cisco Systems technical user magazine for maximizing Internet
and networking investments. Each quarter, Packet delivers coverage of the
latest industry trends, technology breakthroughs, and Cisco products and
solutions, as well as network deployment and troubleshooting tips,
configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet
magazine at this URL: http://www.cisco.com/packet
·
iQ Magazine is the quarterly
publication from Cisco Systems designed to help growing companies learn how
they can use technology to increase revenue, streamline their business, and
expand services. The publication identifies the challenges facing these
companies and the technologies to help solve them, using real-world case
studies and business strategies to help readers make sound technology investment
decisions. You can access iQ
Magazine at this URL: http://www.cisco.com/go/iqmagazine
·
Internet Protocol
Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and
private internets and intranets. You can access the Internet Protocol Journal
at this URL: http://www.cisco.com/ipj
·
World-class networking training is available from Cisco. You can view
current offerings at this URL: http://www.cisco.com/en/US/learning/index.html
C
All other
trademarks mentioned in this document or Website are
the property of their respective owners. The use of the word partner does not
imply a partnership relationship between
Copyright ©
2010 Cisco Systems, Inc. All rights reserved.