cc/td/doc/product/access/acs_soft/csacs4nt
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco Secure Access Control Server for Windows Server Version 3.1.2
Contents
Introduction
Documentation Roadmap
New and Changed Features in 3.1.1
Changed Features in 3.1.2
Installation Notes
Changes to Token Server Support
Changes to CiscoSecure Database Replication
Changes to Inter-Cisco Secure ACS Communication
Evaluation Version
Limitations and Restrictions
Caveats
Obtaining Documentation
Obtaining Technical Assistance
Obtaining Additional Publications and Information

Release Notes for Cisco Secure Access Control Server for Windows Server Version 3.1.2


September 2003

These release notes pertain to Cisco Secure Access Control Server for Windows Server (Cisco Secure ACS) version 3.1.2.

Contents

Introduction

Cisco Secure ACS provides authentication, authorization, and accounting (AAA—pronounced "triple A") services to network devices that function as AAA clients, such as a network access server, PIX Firewall, or router. A AAA client is any such device that provides AAA client functionality and uses one of the AAA protocols supported by Cisco Secure ACS. For a general description of Cisco Secure ACS and its features, see User Guide for Cisco Secure ACS for Windows Server.

Documentation Roadmap

With the exception of online documentation, all Cisco Secure ACS documentation is available in PDF format on the product CD. The documentation directory on the CD also contains a white paper about Cisco Secure ACS and related products and technologies.

Cisco Secure ACS documentation includes the following items:

You can also access Cisco Secure ACS documentation on Cisco.com at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/
index.htm

You can find other product literature, including white papers, data sheets, and product bulletins, at the following URL:

http://www.cisco.com/warp/public/cc/pd/sqsw/sq/prodlit/index.shtml

New and Changed Features in 3.1.1

We added the following features to Cisco Secure ACS 3.1.1:

Changed Features in 3.1.2

Cisco Secure ACS 3.1.2 includes the following changes:

Table 1   Changed Cisco VPN 3000 Concentrator RADIUS VSAs 

Attribute  Change  Number  Type of Value  Inbound/Outbound  Multiple 

CVPN3000-IPSec-
Authentication

Added an enumeration: "Kerberos-
Active-
Directory"

13

integer

Outbound

No

CVPN3000-DHCP-
Network-Scope

New VSA

61

ipaddr (maximum length 15 characters)

Outbound

No

CVPN3000-
Authorization-Type

New VSA

65

integer

Outbound

No

CVPN3000-

Authorization-Required

New VSA

66

integer

Outbound

No

CVPN3000-DN-Field

New VSA

67

string (maximum length 247 characters)

Outbound

No

CVPN3000-
Confidence-Interval

New VSA

68

integer

Outbound

No

CVPN3000-Cisco-
LEAP-Bypass

New VSA

75

integer

Outbound

No

Installation Notes

For information about installing Cisco Secure ACS, see Installation Guide for Cisco Secure ACS for Windows Server, version 3.1.

Changes to Token Server Support

With the exception of RSA SecurID token servers, Cisco Secure ACS supports token servers using RADIUS. This is a change from earlier versions, which used vendor-proprietary interfaces for token servers. Beginning with Cisco Secure ACS 3.0.1, we supported CRYPTOCard token servers using a standard RADIUS interface. Cisco Secure ACS 3.1 extends the use of RADIUS to all token servers except RSA SecurID. For RSA SecurID, the vendor-proprietary interface is used.

If you upgrade to Cisco Secure ACS 3.1, the installation program may prompt you for information about token servers, depending on the version of Cisco Secure ACS you are upgrading from and the token server databases detected by the upgrade process.

If you are upgrading from Cisco Secure ACS 3.0, the installation program prompts you for information if you have one of these token servers:

If you are upgrading from Cisco Secure ACS 2.6, the installation program prompts you for information if you have one of these token servers:

With this information, the installation program replaces the older token server configuration with a new one that uses the RADIUS interface of the token server. For more information about RADIUS support by your token server, see the applicable token server documentation.


Note   If a RADIUS-based token server, such as CRYPTOCard, runs on the same computer as Cisco Secure ACS, make sure that the token server uses UDP ports different from the ports used by Cisco Secure ACS to receive RADIUS requests. For information about RADIUS ports used by Cisco Secure ACS, see User Guide for Cisco Secure ACS for Windows Server. For information about RADIUS ports used by a token server, see the applicable token server documentation.

Changes to CiscoSecure Database Replication

We enhanced the CiscoSecure Database Replication feature to require a handshake between primary and secondary Cisco Secure ACSes. The handshake is based upon the shared secret of the primary Cisco Secure ACS.

Each Cisco Secure ACS has a AAA Servers table that lists itself and the other Cisco Secure ACSes that it is configured to communicate with. Each entry in the AAA Servers table records a shared secret for the Cisco Secure ACS that the list entry represents. The shared secret for the primary Cisco Secure ACS is defined in the AAA Servers table entry that the primary Cisco Secure ACS has for itself.

Each secondary Cisco Secure ACS must have a AAA Servers table entry for the primary Cisco Secure ACS. The shared secret in that entry must be identical to the shared secret in the AAA Servers table entry that the primary Cisco Secure ACS has for itself. When this is true, replication succeeds.

If a secondary Cisco Secure ACS has a AAA Servers table entry for the primary Cisco Secure ACS and the shared secret in that entry does not match the shared secret that the primary Cisco Secure ACS records for itself, replication fails.


Note   We do not support replication through gateway devices performing NAT. The pre-replication shared secret handshake does not permit replication when either the primary or secondary Cisco Secure ACS is behind a device performing NAT.


Tip If you are upgrading to Cisco Secure ACS version 3.1 and you use CiscoSecure Database Replication, we recommend that you verify that primary Cisco Secure ACSes and all their secondary Cisco Secure ACSes record identical shared secrets for the primary Cisco Secure ACS.

For more information, see User Guide for Cisco Secure ACS for Windows Server.

Changes to Inter-Cisco Secure ACS Communication

We enhanced communications between Cisco Secure ACSes to use 128-bit encryption. This change has the following effects:

Evaluation Version

The evaluation version of Cisco Secure ACS 3.1 provides full functionality for 90 days after the date of installation. This allows you to use all features of Cisco Secure ACS 3.1 while determining if it suits your needs. The evaluation version of Cisco Secure ACS 3.1 will be available within 30 days after the release of the commercial version of Cisco Secure ACS 3.1.

The evaluation version of Cisco Secure ACS 3.1 can be distinguished from the commercial version in the following ways:

When the evaluation period has elapsed, the CSRadius and CSTacacs services fail to start. You will receive a message upon accessing the HTML Cisco Secure ACS HTML interface notifying you that your evaluation period has elapsed.

Purchasing the Commercial Version

Please contact your Cisco Sales Representative(s) to inquire about purchasing the commercial version of Cisco Secure ACS. To purchase the commercial version of Cisco Secure ACS 3.1 online, use Part Number CSACS-3.1-WIN-K9 at the following URL:

http://www.cisco.com/pcgi-bin/cm/welcome.pl

Upgrading to the Commercial Version

After purchasing a commercial version of Cisco Secure ACS 3.1, you can upgrade your Cisco Secure ACS server from the evaluation version to the commercial version by installing the commercial version over the evaluation version. For information on installing Cisco Secure ACS 3.1, follow the instructions in Installation Guide for Cisco Secure ACS for Windows Server, version 3.1.

Limitations and Restrictions

The following limitations and restrictions apply to Cisco Secure ACS 3.1.

Downloadable ACLs

The next release of Cisco Secure ACS 3.2 includes expanded support for downloadable ACLs. With Cisco Secure ACS 3.2, you can use downloadable ACLs with Cisco VPN 3000-series concentrators that use version 4.0 or greater of the VPN 3000 operating system.

Cisco Secure ACS 3.1.1 supports downloadable ACLs only with Cisco PIX devices using a version of the PIX operating system capable of supporting downloadable ACLs. With Cisco Secure ACS 3.1.2, the Downloadable PIX ACLs feature remains limited to PIX devices.


Tip An easy way to distinguish whether a version of Cisco Secure ACS supports only Cisco PIX devices with downloadable ACLs is to determine the name of the downloadable ACL feature in the Shared Profile Components section of the Cisco Secure ACS HTML interface. In Cisco Secure ACS 3.0 and 3.1, that feature is named "Downloadable PIX ACLs", indicating the limitation of support to PIX devices. In Cisco Secure ACS 3.2, the corresponding feature is named "Downloadable IP ACLs", reflecting the expanded support.


Note   The Downloadable PIX ACL feature is not compatible with Cisco IOS lock-and-key security or the dynamic ACLs used with the lock-and-key feature of Cisco IOS.

Interoperability Testing

Cisco Secure ACS has not been interoperability tested with other Cisco software. Other than for the software and operating system versions listed in this document, we performed no interoperability testing. Using untested software with Cisco Secure ACS may cause undesired results. For the best performance of Cisco Secure ACS, we recommend that you use the versions of software and operating systems listed in this document.

Supported Upgrade Versions

We tested upgrading to Cisco Secure ACS 3.1.2 from the following previous versions:

Supported Operating System

The only supported operating system for Cisco Secure ACS for Windows Servers 3.1, is Windows 2000 Server. Both the operating system and the service pack must be English-language versions.

We tested Cisco Secure ACS 3.1.2 with the English-language version of Windows 2000 Service Pack 4 and with Microsoft patch MS03-026 applied.


Note   Windows 2000 Advanced Server and Windows 2000 Datacenter Server are not supported operating systems.

Upgrading from Windows NT 4.0

Cisco Secure ACS 3.1 runs only on Windows 2000 Server (for operating system requirements, see Installation Guide for Cisco Secure ACS for Windows Server. If you are upgrading from a previous version of Cisco Secure ACS that is running on Windows NT 4.0, you cannot upgrade the operating system to Windows 2000 Server. This is because the setup program for previous versions of Cisco Secure ACS detected which Windows operating system the computer used and customized Cisco Secure ACS for that operating system. As a result, upgrading the operating system to Windows 2000 Server without taking the necessary steps causes Cisco Secure ACS to fail.

For information about how to upgrade from Cisco Secure ACS on Windows NT 4.0, see Installation Guide for Cisco Secure ACS for Windows Server.

PEAP Limitations

The Cisco Secure ACS 3.1 implementation of PEAP has the following limitations:


Tip Unknown user processing can introduce large latencies during authentication. Be sure to configure the Unknown User Policy page to account for this possibility. For more information, see User Guide for Cisco Secure ACS for Windows Server.


Note   Cisco Secure ACS 3.2 implements PEAP without the limitations imposed by Cisco Secure ACS 3.1.2.

EAP-TLS Authentication with Active Directory

To perform EAP-TLS authentication using Active Directory as the external user database, Cisco Secure ACS must run on a domain controller. EAP-TLS authentication using Active Directory fails when Cisco Secure ACS runs on a member server.

Tested EAP-TLS Dialup with IOS

We tested Cisco Secure ACS 3.1.2 for EAP-TLS authentication with a dialup connection using Cisco IOS 12.3(1).

Tested Certificate Servers

We used Microsoft CA certificate servers to test Cisco Secure ACS 3.1.2.

Supported Web Browser Versions

We tested the HTML interface of Cisco Secure ACS 3.1.2 using an Microsoft Internet Explorer version 6.0. For administration of Cisco Secure ACS 3.1.2, we support only this browser, with the following additional restrictions:

To use a web browser to access the Cisco Secure ACS HTML interface, you must configure the browser as follows:

For more information about accessing the Cisco Secure ACS HTML interface, see User Guide for Cisco Secure ACS for Windows Server, version 3.1.

Tested Token Server Versions

We tested Cisco Secure ACS 3.1.2 with RSA ACE/Server version 5.0 and ACE/Client version 5.5 for Windows 2000


Note   Cisco Secure ACS 3.1.2 uses a RADIUS interface to support all token servers, with the exception of RSA ACE/Server. For more information, see Changes to Token Server Support.

Tested LDAP Server

We used Novell NDS v8.6 on Novell Netware 6.0 to test standard LDAP database support.

Tested Novell NDS and Novell Clients

We used Netware 6.0 to test Novell NDS v8.6 external user databases. We tested Cisco Secure ACS 3.1.2 with the Novell Requestor software found in Novell Client version 4.8.3 SP2 for Windows 2000. If you want to authenticate users with a Novell NDS external user database, you must install the Novell Requestor software on the computer that runs Cisco Secure ACS.

Tested Windows User Databases

We used Windows 2000 with Service Pack 4 and Windows NT 4.0 with Service Pack 6 to test Cisco Secure ACS 3.1.2 for Windows authentication.

Tested Platforms for CiscoSecure Authentication Agent

We have not tested CiscoSecure Authentication Agent specifically with Cisco Secure ACS 3.1.2; however, with Cisco Secure ACS 3.1.1, we tested CiscoSecure Authentication Agent on the following client platform operating systems:

Caveats

This section identifies caveats and issues for Cisco Secure ACS.

Platform Caveats

Refer to the appropriate release notes for information about hardware caveats that might affect Cisco Secure ACS. You can access these release notes online at the following URLs.

Cisco Aironet Access Point

http://www.cisco.com/univercd/cc/td/doc/product/wireless/

Cisco BBSM

http://www.cisco.com/univercd/cc/td/doc/product/aggr/bbsm/

Cisco Catalyst Switches

http://www.cisco.com/univercd/cc/td/doc/product/lan/

Cisco IOS

http://www.cisco.com/univercd/cc/td/doc/product/software/

Cisco Secure PIX Firewall

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/

Cisco VPN 3000 Concentrator

http://www.cisco.com/univercd/cc/td/doc/product/vpn/vpn3000/

http://www.cisco.com/univercd/cc/td/doc/product/vpn/vpn3002/

Cisco VPN 5000 Concentrator

http://www.cisco.com/univercd/cc/td/doc/product/aggr/vpn5000/

Resolved Caveats—Version 3.1.2


Note   Caveats are printed word-for-word as they appear in our caveat tracking system.

Resolved Caveats—Version 3.1.1


Note   Caveats are printed word-for-word as they appear in our caveat tracking system.

Open Caveats—Version 3.1.2


Note   Caveats are printed word-for-word as they appear in our caveat tracking system.

This section identifies known caveats and issues with Cisco Secure ACS 3.1.1.

A PPTP tunnel using a Cisco VPN 3000-series concentrator and MS-CHAP version 2 fails. The VPN concentrator indicates that authentication passed; however, tunnel establishment fails. When using the MS-CHAP version 1 method with the same configuration, tunnel establishment succeeds. When using the concentrator's internal user database with MS-CHAP version 2, tunnel establishment succeeds.

Workaround/Solution: There are few steps which needs to be filled when configuring Cisco Secure ACS to support PPTP Tunnel in MS-CHAP version 2 (and version 1) authentication methods:

Setup two users at least on Cisco Secure ACS, one as a tunnel user and the others as the authenticated users. The tunnel user and its password should be the same as the tunnel group name on the concentrator and its password.

The authenticated users must include the following settings in Cisco Secure ACS, as well:

Use the Windows 2000 PPTP client and establish the PPTP tunnel via MS-CHAP V2 authentication method.

When Installing Cisco Secure ACS, you may see the following error:

An error occurred during the move data process: -115
 

followed by several other errors, such as:

Cannot run command D:\Program Files\CiscoSecureACS vx.x\UtilsCSUpdate -install CSAuth - The system cannot find the file specified
Cannot run command D:\Program Files\CiscoSecureACS vx.x\UtilsCSUpdate-install CSLog - The system cannot find the file specified
Cannot run command D:\Program Files\CiscoSecureACS vx.x\UtilsCSUpdate-install CSRadius - The system cannot find the file specified
 

Workaround/Solution: Delete pdh.dll from the Windows system32 directory, then restart the installation.

When a Novell NDS database configuration in Cisco Secure ACS has a context list greater than 4095 characters long, editing the NDS configuration page results in incorrect HTMLin the browser interface.

Workaround/Solution: Use a context list no longer than 4096 characters.

Changes to user-defined fields in user records do not appear to replicate. After the user-defined fields are changed in the Interface Configuration section on the primary Cisco Secure ACS server and replication succeeds, the secondary Cisco Secure ACS server does not display the changes to the user-defined fields in the HTML interface.

Workaround/Solution: The changes to the user-defined fields do replicate successfully; however, to see the changes on the secondary Cisco Secure ACS server, restart the CSAdmin service.

Changes to HTTP Port Allocation settings do not appear to replicate. After the HTTP Port Allocation settings are changed on the Access Policy Setup page in the Administration Control section on the primary Cisco Secure ACS server and replication succeeds, the secondary Cisco Secure ACS server does not display the changes to the HTTP Port Allocation settings in the HTML interface.

Workaround/Solution: The changes to the HTTP Port Allocation settings do replicate successfully; however, to see the changes on the secondary Cisco Secure ACS server, restart the CSAdmin service.

In the System Configuration section, settings made on the VoIP Account Configuration page are not restored from backup. Neither are these settings preserved during reinstallation of Cisco Secure ACS 3.0 or upgrading to a later build of Cisco Secure ACS 3.0.

Workaround/Solution: Manually configure the VoIP Accounting Configuration page.

When using the "Use certificate from storage" option on the ACS Certificate Setup page in System Configuration, the error message "Cannot find certificate with specified common name in the ACS storage" occurs even though the server certificate was installed in the operating system local machine storage.

Workaround/Solution: To install a server certificate in local machine storage so that Cisco Secure ACS can find it, follow the instructions in "Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks", available at:

http://www.cisco.com/warp/public/cc/pd/sqsw/sq/tech/acstl_wp.htm

If you use implement HTTPS transport for access to the Cisco Secure ACS HTML interface and you use Netscape Communicator version 6.2.3 running on Windows 2000 Professional with Windows Service Pack 2, Cisco Secure ACS does not present the Navigation Bar that usually displays the section buttons on the left side of the page.

Workaround/Solution: The problem is caused by Netscape. If you implement HTTPS, use Microsoft Internet Explorer for Windows, version 5.5 or 6.0, to access the Cisco Secure ACS HTML interface.

Customer has run into a limitation on replication partners of 20. You can configure more, but the 21st partner in the list but it will not work - the master will say that it's not responding.

Workaround/Solution: If you delete one of the servers higher up in the list, thus moving the problem server into slot number 20, replication works.

If a shared profile component is deleted, user and group profiles previously configured to use the deleted component still reference it, causing authorization failures.

Workaround/Solution: When you delete a shared profile component, such as a network access restriction, command authorization set, or downloadable PIX ACL, be sure that no user or group profiles reference the component you want to delete.

Users authenticating with CryptoCard incorrectly receive a password prompt in addition to the username, challenge, and response prompts.

Workaround/Solution: Users can enter any string at the password prompt and press Enter, then continue CryptoCard authentication normally.\

Each time that you rename a "Network Device Group", the system is unable to keep track and to update the association that there is between the renamed group and the command set that is applied on that devices.

Workaround/Solution: You must manually delete the association between the old-named device group and the command set and add manually a new association with the renamed device group and the same command set.

The group list in Group Setup has inaccurate numbers of users if you reload the internal user database using CSUtil.exe. This can also occur after upgrading if you preserve the existing configuration during the upgrade process.

Workaround/Solution: None.

The problem occurs for TACACS+ with ActivCard token server as an external user database. If the asynchronous (challenge/response) OTP authentication mode is used, and users enter a wrong response, they cannot authenticate for the next 2-3 minutes. Authentication requests are denied even if the correct credentials are entered.

Workaround/Solution: After several minutes users can authenticate with the right credentials.

When using TACACS+ login and a static shell password prompt defined on "TACACS+ Shell configuration" for RADIUS OTP external databases the user OTP password (fixed or dynamic) is always echoed on TACACS+ AAA client input.

Workaround/Solution: None.

The problem occurs for TACACS+ with Vasco token server as an external user database. If the asynchronous (challenge/response) OTP authentication mode is used, and users enter a wrong response, they cannot authenticate for the next 2-3 minutes. Authentication requests are denied even if the correct credentials are entered.

Workaround/Solution: After several minutes users can authenticate with the right credentials.

A AAA server cannot be deleted from the "(Not Assigned) AAA Servers"

table in Network Configuration if the Synchronize"= list under Synchronization Partners on the RDBMS Synchronization Setup page is empty. An error message "x.x.x.x can not be deleted since it is an synchronization partner" appears.

Workaround/Solution: Move any other AAA server to the Synchronize list, then delete the AAA server.

When having ppp callback and only callin is authenticated (ppp authentication pap chap callin), then messaging to the CAA client will fail with all aging rules selected in ACS.

This is a documentation bug, the above won't work without changes.

Workaround/Solution: Either remove the "callin" keyword to enable authentication for callin and callout (callback in this scenario), or disable callback altogether.

After administrator has changed the Certificate Trust List (CTL), the services must be restarted in order to adopt new settings. The standard ACS restart message must be displayed.

Workaround/Solution: After modifying the CTL, go to the Service Control page in System Configuration and click Restart.

ACS documentation does not have examples with product setups.

Workaround/Solution: Locate deployment guides at http://www.cisco.com/warp/public/cc/pd/sqsw/sq/tech/index.shtml if there is one for the task in question.

If you configure the (Default) of "Proxy Distribution Table" in "Network Configuration" after backed up. Previously settings before backup are not restored. Example...

Workaround/Solution: There is no workaround.

With AAA Accounting for exec sessions configured on a NAS, a user shows up in the Logged-In User report on ACS. With Accounting also configured for going into enable mode, the user no longer appears in the Logged-In User report after authenticating successfully.

When using the User changeable passwords utility to change the passwords for the usernames which contain dot (".") character, after clicking on one of the links on the top, the links at the top in the subsequent screen contain only the part of the username before the dot.

Workaround/Solution: edit the passwd.htm and result.htm files in the cgi-bin directory to comment out the table with the links - so that the users would not be able to get confused.

Customer using NTLMv2 on their network for security will not allow Win2k users to authenticate through ACS. If customer changes the NTLMv2 to NTLM then authentication works fine

when using acs 3.1 with token card servers and tacacs, token caching fails.

Workaround/Solution: use radius if possible.

I have Group-Level Shared NAR and Group-Level NAR enabled. The Group display shows Per-User NAR which doesnt work when tried. This looks like a bug in the display of the Edit Group function.

CSNTERRORSTRING included in the return field from the ext ODB isnt logged with chap authentications. It is logged with pap authentications in auth.log

Workaround/Solution: none

Customer is cannot add ACL with special character like "-" or "/" in Shared profile components --> Downloadable PIX ACL

ACL like this one cannot be added in the ACL Definitions section.

remark tier1-vpn-access owa only
remark last modified mchase 5/28/2003 ver3
permit udp any 10.1.1.1 eq 53 log-input

Workaround/Solution: None.

The size of "CSDBSync.log" became large(60GByte) and it caused a system down, but the customer was not using RDBMS Sync. "WaitForMultipleObjects returned [-1]" fed up CSDBSync.log file.

Workaround/Solution: None.

On the "CSV VoIP Accounting File Configuration" cisco radius VSA are not appear on the attribute text area.

Workaround/Solution: The workaround that done for ITXS is a special registry file that add those missing VSA to the attribute list on this page.

With multi-administrator tries to add/edit/delete downloadable acl under the shared profile components, after the first admin submitted any changes, the other administrator's ACS session got locked up.

Workaround/Solution: There is no workaround. Administrators must inform each other when he/she is working on the downloadable ACLs.

Obtaining Documentation

Cisco provides several ways to obtain documentation, technical assistance, and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com/univercd/home/home.htm

You can access the Cisco website at this URL:

http://www.cisco.com

International Cisco websites can be accessed from this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which may have shipped with your product. The Documentation CD-ROM is updated regularly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual or quarterly subscription.

Registered Cisco.com users can order a single Documentation CD-ROM (product number DOC-CONDOCCD=) through the Cisco Ordering tool:

http://www.cisco.com/en/US/partner/ordering/ordering_place_order_ordering_t ool_launch.html

All users can order annual or quarterly subscriptions through the online Subscription Store:

http://www.cisco.com/go/subscription

Ordering Documentation

You can find instructions for ordering documentation at this URL:

http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

You can order Cisco documentation in these ways:

http://www.cisco.com/en/US/partner/ordering/index.shtml

Documentation Feedback

You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page.

You can send your comments in e-mail to bug-doc@cisco.com.

You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance.

Cisco TAC Website

The Cisco TAC website (http://www.cisco.com/tac ) provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year.

Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:

http://tools.cisco.com/RPF/register/register.do

Opening a TAC Case

The online TAC Case Open Tool (http://www.cisco.com/tac/caseopen ) is the fastest way to open P3 and P4 cases. (Your network is minimally impaired or you require product information). After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using these recommendations, your case will be assigned to a Cisco TAC engineer.

For P1 or P2 cases (your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.

To open a case by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447

For a complete listing of Cisco TAC contacts, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

TAC Case Priority Definitions

To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.

Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

http://www.cisco.com/en/US/products/products_catalog_links_launch.html

http://www.ciscopress.com

http://www.cisco.com/go/packet

http://www.cisco.com/go/iqmagazine

http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_ protocol_journal.html

http://www.cisco.com/en/US/learning/index.html

This document is to be used in conjunction with the documents listed in the "Obtaining Documentation" section.


Copyright © 2003 Cisco Systems, Inc. All rights reserved.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Sep 15 20:42:06 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.