|
Table Of Contents
Release Notes for
Cisco Media Gateway Manager, Release 3.0.1Cisco MGM Hardware Requirements
Cisco MGM Software Requirements
Cisco MGX 8000 Series Software Requirements
Media Gateway Controller Software Requirements
Obtaining Technical Assistance
Obtaining Additional Publications and Information
Release Notes for
Cisco Media Gateway Manager, Release 3.0.1
Contents
This document is divided into the following sections:
• Limitations and Restrictions
• Caveats
• Obtaining Technical Assistance
• Obtaining Additional Publications and Information
Introduction
Cisco Media Gateway Manager (MGM) is a component of the network management strategy for the MGX 8000 series Carrier Voice Gateway (CVG) products. This strategy has five major aspects:
•Provides a common, carrier class element management (EM) system for MGX 8000 series CVG networks in VoIP applications that have an IP core transport.
•Provides a common, carrier class network management system to support an integrated EM layer and network concept across Cisco and third party voice network elements via interfaces to EMSs.
•Supports integration with upstream NML/OSS applications via a common CORBA IDL interface.
•Where possible, provides EMS integration with partner and Cisco call agent EMSs.
•Provides open standards-based interfaces across element and network management systems.
These release notes describe new features and caveats in system software release 3.0.1 for the Cisco MGM. Use these release notes in conjunction with the documentation listed in the "Related Documentation" section.
System Requirements
Cisco MGM and MGX 8000 Series hardware and software requirements are listed in the following sections.
• Cisco MGM Hardware Requirements
• Cisco MGM Supported Hardware
• Cisco MGM Software Requirements
• Cisco MGX 8000 Series Software Requirements
• Media Gateway Controller Software Requirements
Cisco MGM Hardware Requirements
The hardware resources you need for Cisco MGM depends on the number of Cisco MGX 8000 Series CVGs and associated MGCs that Cisco MGM will manage. Additional client or presentation servers may be added as necessary to maintain good operator response time in large networks with heavy alarm traffic. Presentation and management servers may run co-resident for medium networks when faster processors are used or operator loads are light. Adding presentation servers increases the number of supported operators.
Although Cisco MGX 8000 Series CVG components are managed by Cisco MGM, the number of VISMs in the network help determine the workstation sizing appropriate to the installation. A small network, for example, might consist of 240 VISMs; a medium is defined as up to 1200 VISMs; and a large network includes more than 1200 VISMs.
General hardware recommendations include:
•Sun MicroSystems™ UltraSPARC II or III workstations
Sun MicroSystems™ UltraSPARC II and III servers and desktops are recommended for use with the Cisco MGM EMS, but not required. Alternate platforms that have been tested include: Sun MicroSystems™ Ultra 60, 220r, 420r, 280r, and Netra 20, t1400.
•Solaris 8 operating system
Note System testing conducted using Solaris 8 patch 108528-17.
•19-inch color monitor
The use of 1280 x 1020 resolution of the monitor is recommended for Xwindows-Motif display.
•24-bit graphics card
Additional miscellaneous resources may include:
•Local or remote CD-ROM drive
•Digital archive tape (DAT) drive
DAT drive is only applicable to stand-alone or server workstations for archiving system backups.
The following table lists the server and client recommendations for small, medium, and large Cisco MGM installations.
Table 1 Cisco MGM Platform Recommendations
Network Size
Small Network1 Medium Network2 Large Network3 One machine Client Management Server Client or
Presentation Server Management ServerMemory
2 GB RAM
1 GB RAM
2 GB RAM
2 GB RAM
4 GB RAM
Disk space
(9 GB or larger)2 hard disks
1 hard disk
4 hard disks
1 hard disk
4-6 hard disks
Processor
2 x 440 MHz
1 x 650 MHz
2 x 1.05 GHz
2 x 1.05 GHz
2 x 1.05 GHz
Swap space4
4 GB
2 GB
4 GB
2 GB
8 GB
Power supply5
1
1
1 or 2
1
1 or 2
1 One to three operators; 240 VISMs
2 Four to six operators; up to 1200 VISMs
3 Seven to ten or more operators; more than 1200 VISMs
4 If CiscoView is running on the same system as Cisco MGM, an additional 1 GB swap space is required
5 Second power supply, where noted, is optional for high availability installations
Cisco MGM Supported Hardware
Cisco MGM manages Cisco MGX 8000 Series CVGs based on the Cisco processor switch modules (PXM1, PXM1-E, and PXM45). In addition, Cisco MGM provides management of VISM, VISM-PR, RPM-PR, RPM-XF, SRM, SRM-E, AXSM, and AXSM-E cards. The following table lists the processor switch and services modules supported by chassis.
In the preceding table, "yes" indicates that the module listed in the left-hand column is supported by the chassis type displayed at the top of the column. An entry of "N/A" indicates that the module listed in the left-hand column is not supported by the chassis type displayed at the top of the column.
For information on card-to-card compatibility, see the appropriate Cisco MGX software release notes.
Cisco MGM Software Requirements
This version of Cisco MGM requires the following software components:
•Cisco EMF Release 3.2 Service Pack 4, patch 6 or greater
•CiscoView 5.4
•WANCV package release 4.11 (included with Cisco MGM package)
Note To ensure optimal system performance and the inclusion of critical security updates, it is recommended that you install the latest Solaris patches available. Cisco MGM has been tested against Solaris 8 patch 108528-17.
Cisco MGX 8000 Series Software Requirements
The Cisco processor switch and service modules require the installation of specific firmware releases in order to function properly in Cisco MGX 8000 series chassis running Cisco MGM. Depending on the Cisco processor switch module present in the chassis, different service modules may be supported. For each processor module and service module within a particular chassis, the firmware release may vary.
The following table lists Cisco MGM and Cisco MGX 8000 Series CVG compatibility, including the supported firmware release. Other firmware versions may be used; however, some functionality may not be compatible with other firmware releases.
Table 3 Cisco MGM and Cisco MGX 8000 Series CVG Compliance Matrix
Chassis Module Supported Firmware Release1 Processor Module Service ModuleMGX 8230
MGX 8250
MGX 8850
PXM1
N/A
MGX 1.2.10
VISM/VISM-PR
VISM 3.1
RPM-PR
RPM 1.2.13
SRM/SRM-E
N/A
MGX 8830
MGX 8850
PXM1-E
N/A
MGX 3.0.20
VISM-PR
VISM 3.1
RPM-PR
RPM 1.2.13
SRM/SRM-E
N/A
MGX 8850
PXM45
N/A
MGX 3.0.20
VISM-PR
VISM 3.1
RPM-PR/RPM-XF
RPM 1.2.13
SRM/SRM-E
N/A
AXSM/AXSM-E
AXSM 3.0.20
1 For other Cisco MGX firmware versions, see the corresponding Cisco MGX software release notes to determine the appropriate firmware version supported for the specific service module(s).
Media Gateway Controller Software Requirements
Cisco EMF and Cisco MGM provide integrated connection to the management interfaces of the following Media Gateway Controllers (MGCs):
•Cisco BTS 10200 Softswitch
•Tekelec VXi Media Gateway Controller (MGC)
•NexVerse ipVerse ControlSwitch
The following table shows the software requirements for each supported MGC.
Table 4 Media Gateway Controller Software Requirements
Cisco BTS 10200
Release 3.3
Tekelec Vxi
Release 4.0
NexVerse ipVerse
Release 5.1
New Features
In addition to all of the features supported by previous releases of Cisco MGM, Cisco MGM 3.0.1 enhances clear correlation rules and provides alarm severity customization capabilities. The following features have been added or enhanced in Cisco MGM 3.0.1:
Cisco Voice CORBA Gateway
The Cisco MGM 3.0.1 package includes the Cisco Voice CORBA Gateway (Cisco VCG) application. Cisco VCG installs independently from Cisco MGM, but the necessary scripts and documentation are available in the Cisco MGM 3.0.1 package.
Note For information on the features Cisco VCG provides, refer to the Cisco Voice CORBA Gateway Developer Reference Guide, Software Release 2.0.
Clear Correlation Rules
Cisco MGM 3.0.1 includes additional clear correlation rules. Clear correlation rules automatically clear traps listed in the Event Browser when the specified criteria is met. Files describing clear correlation rules for each supported packages are available in the following directory:
CEMF_ROOT/config/dataload/clearCorrelationRules/
For a complete listing of the traps and associated clear correlation rules Cisco MGM 3.0.1 supports, see the following file:
CEMF_ROOT/config/dataload/clearCorrelationRules/cmgmvClearCorrelations
For a complete listing of the traps and associated clear correlation rules Cisco BTS supports, see the following file:
CEMF_ROOT/config/dataload/clearCorrelationRules/btsClearCorrelations
Note Replace CEMF_ROOT in the previous statements with the name of the directory where Cisco EMF is installed.
Alarm Severity Modification
Cisco MGM 3.0.1 provides the capability to adjust the trap severity level shown within the Event Browser application as required. Trap severity mapping is controlled by the trap mapping file that installs with the EM. In order to modify default alarm severities, the trap mapping file must be modified manually. The Cisco MGM trap mapping file is located in the following directory:
CEMF_ROOT/config/cmgmvCtlr/trapMappingFiles/cmgmvTrapMappingFile
(Replace CEMF_ROOT with the name of the directory where Cisco EMF is installed.)
Modification of the Cisco MGM trap mapping file is possible through the editor of your choice. Specifically, the MGX 8000 trap severity value(s) are modifiable as required. Possible severity values are 1 through 8, as the following table defines.
Note For further information in regards to alarm severity mapping, refer to the Cisco Element Management Framework Installation and Administration Guide.
In order to utilize the trap severity mapping revisions, the Cisco MGM controller must be restarted after updating the Cisco MGM trap mapping file.
Stop and restart the Cisco MGM controller by performing the following:
Step 1 Open a cemf shell by entering the following at a command prompt:
cemf shell
Step 2 Kill the Cisco MGM controller by entering the following at a command prompt:
CEMF_ROOT/sysmgrClient -k cmgmvCtlr
(Replace CEMF_ROOT with the name of the directory where Cisco EMF is installed.)
Note To verify the termination of the Cisco MGM controller, enter cemf status at the command prompt and review the corresponding Run Status.
Step 3 Execute the Cisco MGM controller by entering the following at a command prompt:
CEMF_ROOT/sysmgrClient -x cmgmvCtlr
(Replace CEMF_ROOT with the name of the directory where Cisco EMF is installed.)
Note To verify the execution of the Cisco MGM controller, enter cemf status at the command prompt and review the corresponding run status.
After restarting the Cisco MGM controller, the revised alarm severity definitions in the trap mapping file are utilized within the EM.
Limitations and Restrictions
•Cisco MGM supports only Solaris 8.
•Cisco MGM GUI does not support the Open Windows environment.
•The CiscoView 5.4 server can run on a local or remote machine. If it is running on a remote machine, you must manually run the CiscoView security integration script and WanCV installation by executing the following commands from the Cisco MGM on the remote machine:
/cmgm3.0.1pkg/ciscoview/cvsecurity/cvsecurityinstall
/cmgm3.0.1pkg/ciscoview/wancv/wancvinstall
•Cisco MGX 8000 Series CVGs do not send traps to Cisco MGM when you enter clrallcnf commands. The clrallcnf command erases the gateway configuration in Cisco MGM, but this does not show in the Map Viewer because no trap is sent. You must perform a manual chassis synchronization from Cisco MGM to reset the gateway configuration in the Map Viewer.
•The system reset CLI command may cause the chassis to be out-of-reach from the network, which leads to loss of traps from the device to the Cisco MGM management server. Redundant card failover may not report all the necessary information in the alarm for Cisco MGM to recovery its configuration on the Map Viewer. If the operator executes a resetsys command on a chassis or if Cisco MGM receives traps indicating card failover, the Cisco MGM operator should perform a manual sub-chassis synchronization. The 24-hour periodic resync task will eventually pick up the correct inventory for all the chassis managed by Cisco MGM as well.
•Cisco MGM coresidency, as described in the Cisco Media Gateway Manager User Guide, has not been verified at this time.
Installation Notes
•Installing the latest Solaris patches available ensures optimal system performance and the inclusions of critical security updates.
•In order to support databases of 2 GB or larger, the Cisco EMF application ObjectStore must be configured for RAW File System (RAWFS) partitions. Cisco EMF software is installed with standard UNIX File System partitions. Detailed information regarding the configuration of the Cisco EMF ObjectStore is available in the Cisco Element Management Framework Installation and Administration Guide, Chapter 5, "ObjectStore Installation Options".
•If the Cisco MGM server does not have DNS or NIS service, add the following line to the server /etc/hosts file to access the Cisco MGM user guide:
198.133.219.25 www.cisco.com www.cisco.com
•Before uninstalling the Cisco MGM server or client, backup your Cisco EMF database according to the procedures described in the Cisco Element Management Framework Installation and Administration Guide, Chapter 10, "Cisco EMF Database Backup and Restore".
•Uninstalling Cisco MGM does not uninstall WanCV and other CiscoView integration files that were previously installed. The following directory and files remain in your CiscoView installation:
<CiscoView Root>/www/classpath/ems
<CiscoView Root>/www/classpath/cvpars.properties
<CiscoView Root>/www/classpath/com/cisco/nm/cvw/devpkgs/MGX8*.zip
<CiscoView Root>/htdocs/CmgmSessionTimeOut.htmlFor detailed Cisco MGM installation instructions, refer to the Cisco Media Gateway Manager User Guide.
Important Notes
•Do not interrupt the Cisco MGM installation or uninstallation with Ctrl-C or the kill command. After such an interruption, the system might not successfully install or uninstall Cisco MGM when you try to perform these actions again, or the system might enter an abnormal state.
•Do not interrupt the cemf backup operation using Ctrl-C or the kill command.
•In rare cases, installation fails with a pkgadd error. If this occurs, manually set the file permissions for the /tmp directory to rwx.
•Always run cemf stop to gracefully shut down Cisco EMF and Cisco MGM processes before rebooting the machine. If the machine is accidentally rebooted (or restarted due to a power failure), the Cisco MGM database integrity can be damaged, and you might need to run cemf reset and rediscover the network to restore normal operation. Running low on swap space leads to the same problem. Make sure that a minimum of 2 GB of swap space is allocated on the server machine.
•If the cemf stop operation hangs while suspending the participant service, wait for at least 1 hour for the cemf stop command to complete. If the cemf stop command continues to hang, enter the /opt/cemf/bin/sysmgrClient -q command to stop Cisco EMF core processes, and then run cemf stop and cemf reset to reset the database.
•If the following error messages appear when you are running cemf session, run cemf stop and cemf start to restart the Cisco EMF and Cisco MGM processes.
ERROR: "/opt/cemf/config/scripts/session" command failed.
ERROR: Cannot connect to Session
•Do not use the Deployment menu on the Cisco MGM GUI to delete site objects that contain chassis underneath them. Doing so might cause the MapViewer window to stop working correctly. If this occurs, close the MapViewer window and reopen it from the Cisco EMF LaunchPad. Always delete chassis one at a time.
•Before launching CiscoView from a Cisco MGM session, make sure that you do not have any Netscape processes already running. ((If a Netscape process is running before you launch CiscoView for the first time in your Cisco MGM session, Netscape will incorrectly prompt you to install the java plug-in every time CiscoView is launched.)
•The object indicator color on the Cisco MGM GUI represents the highest severity of alarm on the object, but not necessarily the status of the resource on the chassis. To find out the status of the resource that the object represents, use the Object Configuration window.
•The alarm indicator next to the object name on the left side of the Cisco MGM GUI sometimes does not show the correct color of the highest outstanding alarm. If this occurs, close the MapViewer window and open a new one. For information about Cisco MGM alarm colors, refer to the Cisco Media Gateway Manager User Guide, Chapter 6, "Fault and Performance Management".
Caveats
Resolved Caveats
The following limitations which existed in previous versions Cisco MGM have been resolved in Cisco MGM 3.0.1.
Open Caveats
The following caveats exist in Cisco MGM. Generally, caveats include unexpected behaviors or defects in the software release. This document addresses caveats which directly impact user functionality and indicates alternative approaches (workarounds) where available. A complete listing of caveats is available in the Cisco bug tracking tool at the following URL:
http://www.cisco.com/support/bugtools
•CSCdy73770
Symptom: Image download failure; creates new file of 0 byte size
Conditions: For a PXM1-based MGX 8000 Series chassis, the ComMat.dat file is overwritten on the MGX 8000 when firmware images are downloaded using the Image Download dialog in Cisco Media Gateway Manager (CMGM). This is not a problem for PXM-45 or PXM1-E based MGX 8000 Series chassis.
Workaround: Have a valid ComMat.dat file in the same directory as the firmware files on the CMGM server.
•CSCdz28089
Symptom: CMGM install gives ERROR while CV security files install
Conditions: While running the CiscoView Security script (cvsecurityinstall), that will be executed if CiscoView is installed on the same workstation as Cisco Media Gateway Manager (CMGM), an ERROR message could appear. However, the install of the CV Security is successful.
Workaround: Ensure that the CiscoView processes are running after the error message is displayed.
•CSCdz32875
Symptom: Customer cannot upgrade the CiscoView device package for the MGX 8000 Series Voice Gateway because a lack of documentation.
Conditions: CMGM does not support CiscoView device package upgrading. CMGM installs a version of the CiscoView device package for the MGX 8000 Series Voice Gateway.
Workaround: Refer to CiscoView documentation to upgrade the CiscoView device packages.
•CSCdz69509
Symptom: Install script does not recognize local CiscoView on multiple IP server.
Conditions: When the CMGM Server has multiple IP addresses during installation, the CiscoView security install script (cvsecurityinstall) and WAN CiscoView (wancvinstall) install scripts are not executed. The CMGM install script (cmgminstall) determines if CiscoView is installed on the same workstation that the cmgminstall script is running on. The IP address that is entered during install is compared to the IP address determined by the cmgminstall script. If the IP addresses are equal, CiscoView is installed on the workstation and the CiscoView scripts are run automatically. In this case the IP addresses are not equal because another IP address is determined for the local IP. The CiscoView scripts are not run automatically
Workaround: Execute the CiscoView Security install script (cvsecurityinstall) and WAN CiscoView (wancvinstall) install script manually as outlined in the CMGM User's Guide.
•CSCdz78023
Symptom: functionModuleState is not updated after VISM switchover.
Conditions: VISM redundancy is setup on the MGX 8000 Series Voice Gateway. After the VISM switchover due to failure, the functionModuleState is not updated with the proper values for the new Active and Standby VISMs after the switchover. Only DS1 lines are reparented.
Workaround: No workaround is currently available.
•CSCdz80286
Symptom: MapViewer adjustments (Region) and object reassignments are not saved.
Conditions: Map Viewer allows the user to reorganize chassis, but then resets back to default after the next sub chassis sync up. This makes it difficult for the customer to organize his chassis into meaningful regions.
Workaround: Set the SNMP variable "sysLocation" to the container name; for example, set sysLocation to "East" or "West" on the MGX 8000. This will put the CMGM chassis in a "CMGM_Site_East" or CMGM_Site_West" site on the Map Viewer. The SNMP set on "sysLocation" can be performed by selecting the MGX 8000 and selecting "Tools -> Open Object Configuration ...". A new Object Configuration dialog is displayed. Select "SNMPv2-MIB.systemCMGMVMGX..." for the Object Type, enter the new value in the "sysLocation" text box, and select "File -> Save".
•CSCeb40950
Symptom: Install order of components causes problems with MGC device.
Conditions: Installing the Cisco UGM software package after the Cisco MGM package causes the ENTITY-MIB file, which both EMs require, to be overwritten. The ENTITY-MIB file contained by the Cisco UGM package is older than that of the Cisco MGM package, creating the inability to discover PXM-1Es and PXM-45s.
Workaround: Install the Cisco UGM package prior to installing the Cisco MGM package to ensure the newer ENTITY-MIB is available. The proper order in which to install these co-resident software packages is as follows:
1. Cisco EMF 3.2
2. Cisco EMF 3.2, patch 6
3. Java 1.3.1 SDK
4. CiscoView
5. Cisco UGM 2.1
6. Cisco VSPT 2.4(1)
7. Cisco MGM 3.0
8. Cisco MNM 2.4(1)•CSCuk33887
Symptom: Cisco MGM documentation must clarify how to change CMGM_Default_Site name.
Conditions: An improvement will be implemented whereby sites can be added through a CEMF dialog. The user guide should provide more explanations on the feature.
Workaround: The CMGM site name can be changed by performing a SNMP set on the SNMP variable "sysLocation". The SNMP set can be performed using the Object Configuration dialog from the Map Viewer.
•CSCuk35100
Symptom: CiscoView security and wancv packages are not installed without DNS
Conditions: The CMGM install script (cmgminstall) determines if CiscoView is installed on the same workstation that the cmgminstall script is running on. The IP address that is entered during install is compared to the IP address that is determined by the cmgminstall script. If the IP addresses are equal, CiscoView is installed on the workstation and the CiscoView scripts are run automatically. In this case, the IP addresses are not equal because the nslookup fails and the CiscoView scripts will not execute automatically.
Workaround: Execute the CiscoView Security install script (cvsecurityinstall) and WAN CiscoView (wancvinstall) install script manually as outlined in the CMGM User's Guide.
•CSCuk36859
Symptom: Cisco MGM does not download ComMat.dat file into the PXM card.
Conditions: In Cisco MGM, when the user downloads a PXM image, the ComMat.dat file is downloaded for PXM1 firmware images; it is not tied to RPM images.
Workaround: Have a "ComMat.dat" file in the same directory as the firmware files for PXM1 based devices. This is not a problem for PXM45 or PXM1E based MGX Voice Gateways.
Related Documentation
The following Cisco publications contain additional information related to the operation of Cisco MGM:
While you can access all related documentation on the Cisco website, URLs which are available at the time of publication are noted in the following lists.
The following Cisco EMF documentation is available for reference:
•Quick Start Guide Cisco EMF Version 3.2 SP4
Cisco Element Manager November 2002 Upgrade•Cisco Element Management Framework Installation and Administration Guide
Version 3.2 Service Pack 4 (Cisco Element Manager November 2002 Upgrade)•Cisco Element Management Framework User Guide Version 3.2 Service Pack 4
(Cisco Element Manager November 2002 Upgrade)•Release Notes for Cisco Element Management Framework v3.2 Service Pack 4
Cisco Element Manager November 2002 Upgradehttp://www.cisco.com/en/US/partner/products/sw/netmgtsw/ps829/prod_release_note09186a0080128a9c.html
In addition to this document, the following Cisco MGM documentation is available for reference:
•Cisco Media Gateway Manager User Guide, Release 3.0
•Release Notes for Cisco Media Gateway Manager, Release 3.0
The following Cisco BTS documentation is available for reference:
•Cisco BTS 10200 Softswitch—Release Notes for Release 3.3 V04
http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_2/relnotes/btsrnv04.pdf
•Cisco BTS 10200 Softswitch System Description, Software Release 900-03.01.00
http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_0/sysdesc/sysds_31.pdf
•Cisco BTS 10200 Softswitch Command Line Interface Reference Guide,
Software Release 3.2, 3.3, and 3.5http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_2/cmdref/cli3233.pdf
•Cisco BTS 10200 Softswitch Application Installation, Release 3.3
http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_2/applinst/duplex33/01app.pdf
•Cisco BTS 10200 Softswitch CORBA Adapter Interface Specification Programmer Guides,
Software Releases 3.2, 3.3, and 3.5http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_2/corba/prgguide/corba33.pdf
•Cisco BTS 10200 Softswitch Cabling, VLAN, and IRDP Procedures
http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/bts3_2/cabling/bts33cbl.pdf
The following CiscoView documentation is available for reference:
•Using CiscoView 5.4
•WAN CiscoView Release 3 for the MGX 8230 Edge Concentrator, Release 1
•WAN CiscoView Release 3 for the MGX 8250 Edge Concentrator, Release 1
•WAN CiscoView Release 3 for the MGX 8850 Edge Switch, Release 1
•WAN CiscoView Release 2 of the MGX 8850
The following Cisco MGX 8000 Series CVGs documentation is available for reference:
•Cisco MGX 8850 and MGX 8950 Switch Software Configuration Guide, Release 2.1
•Cisco MGX 8850 (PXM1E) and MGX 8830 Switch Software Configuration Guide, Release 3
•Cisco MGX 8850 (PXM45) and MGX 8950 Switch Software Configuration Guide, Release 3
•Cisco MGX 8230 Multiservice Gateway Command Reference, Release 1.1.4
•Cisco MGX 8250 Multiservice Gateway Command Reference, Release 1.1.31
•Cisco MGX 8830, MGX 8850 (PXM45 and PXM1E), and MGX 8950 Command Reference, Release 3
Obtaining Documentation
Cisco provides several ways to obtain documentation, technical assistance, and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
International Cisco websites can be accessed from this URL:
http://www.cisco.com/public/countries_languages.shtml
Documentation CD-ROM
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which may have shipped with your product. The Documentation CD-ROM is updated regularly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual or quarterly subscription.
Registered Cisco.com users can order a single Documentation CD-ROM (product number DOC-CONDOCCD=) through the Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/ordering_place_order_ordering_tool_launch.html
All users can order annual or quarterly subscriptions through the online Subscription Store:
http://www.cisco.com/go/subscription
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
•Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:
http://www.cisco.com/en/US/partner/ordering/index.shtml
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).
Documentation Feedback
You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page.
You can send your comments in e-mail to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance.
Cisco TAC Website
The Cisco TAC website ( http://www.cisco.com/tac) provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year.
Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:
http://tools.cisco.com/RPF/register/register.do
Opening a TAC Case
The online TAC Case Open Tool ( http://www.cisco.com/tac/caseopen) is the fastest way to open P3 and P4 cases. (Your network is minimally impaired or you require product information). After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using these recommendations, your case will be assigned to a Cisco TAC engineer.
For P1 or P2 cases (your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.
To open a case by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447For a complete listing of Cisco TAC contacts, go to this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
TAC Case Priority Definitions
To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.
Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://www.cisco.com/en/US/products/products_catalog_links_launch.html
•Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
•Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/go/packet
•iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html
•Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:
http://www.cisco.com/en/US/learning/index.html
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Copyright © 2003, Cisco Systems, Inc. All rights reserved.
Posted: Tue Dec 21 13:06:01 PST 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.