|
Table Of Contents
Release Notes for Cisco 3200 Series Mobile Access Routers for Cisco IOS Release 12.3(2)JK1
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Release 12.3(2)JK1
New Hardware Features in Release 12.3(2)JK
New Software Features in Release 12.3(2)JK1
New Software Features in Release 12.3.(2)JK
Resolved Caveats - Release 12.3(2)JK1
Resolved Caveats - Release 12.3(2)JK
Open Caveats - Release 12.3(2)JK
Cisco IOS Software Documentation Set
Obtaining Technical Assistance
Obtaining Additional Publications and Information
Release Notes for Cisco 3200 Series Mobile Access Routers for Cisco IOS Release 12.3(2)JK1
September 19, 2005
These release notes describe new features and significant software components for the Cisco 3200 Series Mobile Access Router that support the Cisco IOS Release 12.3(2)T, up to and including Release 12.3(2)JK1.
These release notes are updated as needed to describe new memory requirements, new features, new hardware support, software platform deferrals, microcode or modem code changes, related document changes, and any other important changes. Use these release notes with the Cross-Platform Release Notes and Caveats for Cisco IOS Release 12.3T located on Cisco.com.
For a list of the software caveats that apply to 12.3(2)JK1, see the "Caveats" section. The online caveats document is updated for every maintenance release and is located on Cisco.com.
Contents
• Limitations and Restrictions
• Caveats
• Obtaining Technical Assistance
• Obtaining Additional Publications and Information
System Requirements
This section describes the system requirements for Cisco IOS 12.3(2)JK1, and includes the following sections:
• Determining the Software Version
• Upgrading to a New Software Release
Memory Requirements
Table 1 describes the memory requirements for the Cisco IOS feature sets supported by the Cisco IOS 12.3(2)JK1 on the Cisco 3200 series routers.
Hardware Supported
The Cisco IOS Release 12.3(2)JK1 supports the 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) of Cisco 3200 Series Mobile Access Router.
For descriptions of existing hardware features and supported modules, see the configuration guides and additional documents specific to the Cisco 3200 Series Mobile Access Router, which are available on Cisco.com at the following location:
http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/index.htm
This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:
Technical Documentation: Access Servers & Routers: Mobile Access Router
Determining the Software Version
To determine which version of Cisco IOS software is currently running on your Cisco 3200 series WMIC, log in to the WMIC and enter the show version EXEC command. The following sample output from the show version command indicates the version number.
bridge> show version
Cisco Internetwork Operating System Software
IOS (tm) C3202 Software (C3202-K9W7-M), Version 12.3(2)JK1, EARLY DEPLOYMENT RELEASE SOFTWARE (fcl)
Copyright (c) 1986-2005 by cisco Systems, Inc.
Upgrading to a New Software Release
For general information about upgrading to a new software release, refer to the Software Installation and Upgrade Procedures located at http://www.cisco.com/warp/public/130/upgrade_index.shtml.
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software images, depending on the platform. Each feature set contains a specific set of Cisco IOS features.
Caution The Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States will likely require an export license. Customer orders can be denied or subject to delay as a result of United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.
Table 2 lists the features and feature sets supported in Cisco 3200 Series Mobile Access Router software with which Release 12.3(2)JK1 software interacts.
The table uses the following conventions:
•In—The number in the "In" column indicates the Cisco IOS release in which the feature was introduced. For example, "12.3(2)JK" indicates that the feature was introduced in 12.3(2)JK. If a cell in this column is empty, the feature was included in a previous release or in the initial base release.
•Yes—The feature is supported in the software image.
•No—The feature is not supported in the software image.
Note This feature set table contains only a list of selected features, which are cumulative for Release 12.3(2)nn early deployment releases only (nn identifies each early deployment release). The table does not list all features in each image; additional features are listed in Cross-Platform Release Notes for Cisco IOS Release 12.3T and in Release 12.3T Cisco IOS documentation.
New and Changed Information
The following sections list the features supported by the Cisco 3200 Series Mobile Access Router for Cisco IOS Release 12.3(2)JK1. Cisco IOS Release 12.3(2)JK1 supports the same features as Cisco IOS Release 12.3(2)JK.
New Hardware Features in Release 12.3(2)JK1
There are no new hardware features in Cisco IOS Release 12.3(2)JK1.
New Hardware Features in Release 12.3(2)JK
The 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) is a mobile interface card (MIC) in a standard PC/104-Plus form factor. It is one component of the Cisco 3200 Series Mobile Access Router and provides a 4.9-GHz (US Only, Public Safety) wireless interface.
The 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) can be configured as an
•wireless access point
•wireless root bridge
•wireless work group bridge
•wireless non-root bridge without clients.
The Wireless Mobile Interface Card (WMIC) connects to the router internally through a 10/100 Fast Ethernet interface on the Fast Ethernet Switch Mobile Interface Card (FESMIC).
The key features of the Wireless Mobile Interface Card (WMIC) include the following:
•Ruggedized components.
•One autosensing switched 10/100 Fast Ethernet interface.
The FCC has recently allocated a 50MHz licensed bandwidth in the 4.9GHz frequency band for public safety applications in the United States of America. The 4.9GHz WMIC is a new addition to the Cisco 3200 Series router product line, the foundation for Cisco Metro Mobile Networks (MMN) architecture. The Cisco MMN offers the benefits of a combined Layer 2 and Layer 3 (routing) functionality, with multiple integrated radios (up to five), that supports Mesh topology and eliminates unnecessary WAN backhauls.
As an end-to-end solution, Cisco MMN creates a broadband wireless access infrastructure for public safety personnel and vehicles with Cisco 3200 Series routers that leverage MoIP for seamless roaming across different types of wireless networks.
The 4.9-GHz (US Only, Public Safety) WMIC integrates into the Cisco 3200 Series router, together with other mobile interface cards (MICs) including the 802.11b/g 2.4GHz WMIC. The 4.9-GHz (US Only, Public Safety) WMIC, as well as the entire Cisco 3200 Series router product line, are fully ruggedized and suitable for both outdoor and vehicular deployments.
To reduce the cross channel interference and in compliance with FCC Docket #00-32 on 4.9GHz ruling, the WMIC supports Direct Short Range Communications (DSRC) Mask C for all power output levels. As a component of the MMN, the 4.9-GHz (US Only, Public Safety) WMIC is independently configurable (through CLI or management) to operate as either a Root Bridge (RB), a Non Root Bridge (NRB), a Work Group Bridge (WGB), or an Access Point. For additional flexibility in the deployment of the 4.9GHz based MMN, the router supports 5MHz and 10MHz channels.
New Software Features in Release 12.3(2)JK1
There are no new software features in Cisco IOS Release 12.3(2)JK1.
New Software Features in Release 12.3.(2)JK
For information regarding the features supported in Cisco IOS Release 12.3(2)JK, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123relnt/xprn123t/index.htm
This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:
Service & Support: Technical Documents: Cisco IOS Software: Release 12.3: Release Notes: Cross-Platform Release Notes (Cisco IOS Release 12.3(2)T)
Limitations and Restrictions
The following sections contain limitations that apply to the Cisco 3200 Series Mobile Access Router for Cisco IOS Release 12.3(2)T.
•CSCed79373
Drop rate is not updated by the show policy-map interface d0 command.
•CSCee15368
IAPP lost for WGB to Cisco Aironet 1100 access point while configuring LEAP.
Caveats
Caveats describe unexpected behavior or defects in the Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Resolved Caveats - Release 12.3(2)JK1
•CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow vulnerability. Cisco has included additional integrity checks in its software, as further described below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected customers.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml.
•CSCei57922
Update channelization scheme as per TIA TR-8 spec.
•CSCeb85136
IP packets with invalid checksum are not discarded.
•CSCeg15044
Not able to telnet to card (No Free TTYs error).
•CSCsa54608
The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow condition.
Devices that do not support, or are not configured for Firewall Authentication Proxy for FTP and/or Telnet Services are not affected.
Devices configured with only Authentication Proxy for HTTP and/or HTTPS are not affected.
Only devices running certain versions of Cisco IOS are affected.
Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.
This advisory will be posted at http://www.cisco.com/warp/public/707/cisco-sa-20050907-auth_proxy.shtml
Resolved Caveats - Release 12.3(2)JK
•CSCin82407
Cisco Internetwork Operating System (IOS) Software release trains 12.2T, 12.3 and 12.3T may contain vulnerabilities in processing certain Internet Key Exchange (IKE) Xauth messages when configured to be an Easy VPN Server.
Successful exploitation of these vulnerabilities may permit an unauthorized user to complete authentication and potentially access network resources.
This advisory will be posted to http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml
•CSCef68324
Cisco Internetwork Operating System (IOS) software is vulnerable to a Denial of Service (DoS) and potentially an arbitrary code execution attack from a specifically crafted IPv6 packet. The packet must be sent from a local network segment. Only devices that have been explicitly configured to process IPv6 traffic are affected. Upon successful exploitation, the device may reload or be open to further exploitation.
Cisco has made free software available to address this vulnerability for all affected customers.
More details can be found in the security advisory that is posted at http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml.
•CSCee45312
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed.
Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected.
Only the systems that are running certain versions of Cisco IOS are affected.
Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected.
Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.
Refer to the Security Advisory at the following URL for more details
http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml
•CSCeh96419
Description: WGB may crash after roaming (due to a weak signal) between two roots for a half hour or longer. After roaming (with mobile station and open authentication), the WGB may also lose association and the dot11 interface will go down and stay down.
Workaround: Kick start the uplink state machine to scan whenever the WGB link is down after it has associated more than one time. To bring back up a down dot11 interface, toggle the dot11 interface.
Open Caveats - Release 12.3(2)JK
•CSCef91557
UUT can not pass traffic with packet size 256 B with IPSec.
•CSCef88449
Traceback is displayed after bootup.
•CSCei22618
Description: With Mobile Station enabled, the WGB sometimes roams from Root (with good signal strength) to another Root2 (with weaker signal strength).
Workaround: There is no workaround.
•CSCei15816
Description: After the WMIC configured as root device boots up, changing it to non-root bridge or workgroup bridge may cause it to crash.
Workaround: To avoid the reload, shutdown interface do before changing the station role from Root Bridge to Workgroup Bridge or Non-Root Bridge. Then perform "no shutdown" on interface do to bring the link back up.
•CSCeh80367
Description: When all radios are configured with CCKM and AES, after clearing the interface Dot11Radio 0 on the AP, the WGB will continue to show association to the AP. The AP will not show that the WGB is associated. Ping traffic cannot pass at this state.
Workaround: This issue will not happen on the WDS master or when the WDS client is configured as a root bridge.
•CSCei03750
Description: After the WDS master has been up for several days, it may fail to send any traffic to the ACS.
Workaround: Reload the WDS master with the same running configuration.
•CSCei20888
Description: The config interface dot110 to bridge-group 2 command causes the error message "STP was not added to Dot11Radio0" and a traceback message.
Workaround: None. This feature is not supported in this Cisco IOS release.
•CSCeh65092
Description: The WMIC FE LED does not blink continuously when pinging. When the WMIC initiate a ping to the MARC, the WMIC FE LED blinks once every 3 seconds. When the MARC initiate a ping to the WMIC, the WMIC FE LED blinks once every 7 seconds.
Workaround: There is no workaround.
•CSCeg89199
Description: The RF LED appears solid green when there is continuous traffic on the RF link.
Workaround: There is no workaround.
•CSCeh90990
Description: Two WMICs will not ping each other when the following situation occurs:
–The first WMIC boots up as "root ap-only."
–The second WMIC boots up as "WGB."
–The role on the first WMIC is switched to "root."
–The role on the second WMIC is switched to "non-root."
Workaround: Save the configuration and reload, booting up the first WMIC as "root."
•CSCei15259
Description: After station role change, a WMIC configured with "root ap-only" and "infrastructure client" will not ping a WGB but can ping clients behind the WGB. The problem occurs when the following situation occurs:
–Boot up the WMIC as "root"
–Switch role to "root ap-only" with "infrastructure client" configured by default.
Workaround: Save the WMIC configuration and reload (boot up as "root ap-only").
•CSCeh54703
Description: The following MIBs reflect the supported data rates of the 2.4 GHz radio, and not the 4.9 GHz radio, for the objects listed below:
–CISCO-DOT11-IF-MIB:
cd11IfPrivacyOptionMaxRate.1 = 108
cd11IfSuppDataRatesPrivacyValue.1.1 = 12
cd11IfSuppDataRatesPrivacyValue.1.2 = 18
cd11IfSuppDataRatesPrivacyValue.1.3 = 24
cd11IfSuppDataRatesPrivacyValue.1.4 = 36
cd11IfSuppDataRatesPrivacyValue.1.5 = 48
cd11IfSuppDataRatesPrivacyValue.1.6 = 72
cd11IfSuppDataRatesPrivacyValue.1.7 = 96
cd11IfSuppDataRatesPrivacyValue.1.8 = 108
cd11IfPhyDsssMaxCompatibleRate.1 = 108
–2. IEEE802DOT11-MIB:
dot11SupportedDataRatesTxValue.1.2 = 18
dot11SupportedDataRatesTxValue.1.3 = 24
dot11SupportedDataRatesTxValue.1.4 = 36
dot11SupportedDataRatesTxValue.1.5 = 48
dot11SupportedDataRatesTxValue.1.6 = 72
dot11SupportedDataRatesTxValue.1.7 = 96
dot11SupportedDataRatesTxValue.1.8 = 108
dot11SupportedDataRatesRxValue.1.1 = 12
dot11SupportedDataRatesRxValue.1.2 = 18
dot11SupportedDataRatesRxValue.1.3 = 24
dot11SupportedDataRatesRxValue.1.4 = 36
dot11SupportedDataRatesRxValue.1.5 = 48
dot11SupportedDataRatesRxValue.1.6 = 72
dot11SupportedDataRatesRxValue.1.7 = 96
dot11SupportedDataRatesRxValue.1.8 = 108
–3.CISCO-DOT11-ASSOCIATION-MIB:
cDot11ClientDataRateSet = 0c 12 18 24 30 48 60 6c
Workaround: There is no workaround.
Related Documentation
The following sections describe the documentation available for the Cisco 3200 series routers. These documents consist of hardware and software installation guides, Cisco IOS configuration guides and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and http://www.cisco.com/univercd/home/index.htm.
Use these release notes with these documents:
Release-Specific Documents
The following documents are specific to Cisco IOS Release 12.2 and are located on Cisco.com and http://www.cisco.com/univercd/home/index.htm:
• Cross-Platform Release Notes for Cisco IOS Release 12.2(15)T
On Cisco.com at:
Products and Solutions: Cisco IOS Software: Cisco IOS Software Releases 12.2: Instructions and Guides: Release Notes
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes
Note Cross-Platform Release Notes for Cisco IOS Release 12.2 T are located on Cisco.com or on http://www.cisco.com/univercd/home/index.htm at Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Cisco IOS Release 12.2 T.
•Product bulletins, field notices, and other release-specific documents at http://www.cisco.com/univercd/home/index.htm
• Caveats for Cisco IOS Release 12.2
As a supplement to the caveats listed in these release notes, see Caveats for Cisco IOS Release 12.2 and Caveats for Cisco IOS Release 12.2 T, which contain caveats applicable to all platforms for all maintenance releases of Cisco IOS Release 12.2 and Cisco IOS Release 12.2 T.
On Cisco.com at:
Products & Services: IOS Software: Cisco IOS Software Releases 12.2: Instructions and Guides: Release Notes: Release Notes for Cisco IOS Release 12.3, Part 5: Caveats
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Caveats
•If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Products and Solutions: Cisco IOS Software: Cisco IOS Software Releases 12.2: Troubleshooting: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Platform-Specific Documents
Documentation specific to the Cisco 3200 Series Mobile Access Router is available on Cisco.com and the Documentation CD at the following location:
http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/index.htm
On Cisco.com at:
Products and Solutions: Routers: All Routers: Cisco 3200 Series Mobile Access Routers
On http://www.cisco.com/univercd/home/index.htm at:
Technical Documentation: Access Servers & Routers: Mobile Access Router
Cisco Feature Navigator
Cisco IOS software is packaged in feature sets that are supported on specific platforms. To get updated information regarding platform support for this feature, access Cisco Feature Navigator. Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature.
Cisco Feature Navigator is a web-based tool that enables you to quickly determine which Cisco IOS software images support a specific set of features and which features are supported in a specific Cisco IOS image. You can search by feature or release. Under the release section, you can compare releases side by side to display both the features unique to each software release and the features in common.
To access Cisco Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions found at this URL:
http://tools.cisco.com/RPF/register/register.do
Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur. For the most current information, go to the Cisco Feature Navigator home page at the following URL:
http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. The Cisco IOS software documentation set is shipped with your order in electronic form on the Documentation CD-ROM—unless you specifically ordered the printed versions.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
On Cisco.com at:
Products and Solutions: Cisco IOS Software: Cisco IOS Releases 12.3: Instructions and Guides
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software: Cisco IOS Release 12.3: Configuration Guides and Command References
Cisco IOS Release 12.3 Documentation Set Contents
Table 3 lists the contents of the Cisco IOS Release 12.3 software documentation set, which is available in electronic form and in printed form if ordered.
On Cisco.com at:
Products and Solutions: Cisco IOS Software: Cisco IOS Releases 12.3: Instructions and Guides
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software: Cisco IOS Release 12.3
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
International Cisco websites can be accessed from this URL:
http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
•Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/index.shtml
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).
Documentation Feedback
You can submit e-mail comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour-a-day, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance. If you do not hold a valid Cisco service contract, please contact your reseller.
Cisco TAC Website
The Cisco TAC website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year. The Cisco TAC website is located at this URL:
Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:
http://tools.cisco.com/RPF/register/register.do
Opening a TAC Case
Using the online TAC Case Open Tool is the fastest way to open P3 and P4 cases. (P3 and P4 cases are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using the recommended resources, your case will be assigned to a Cisco TAC engineer. The online TAC Case Open Tool is located at this URL:
http://www.cisco.com/tac/caseopen
For P1 or P2 cases (P1 and P2 cases are those in which your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.
To open a case by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447
For a complete listing of Cisco TAC contacts, go to this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
TAC Case Priority Definitions
To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.
Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://www.cisco.com/en/US/products/products_catalog_links_launch.html
•Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
•Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:
iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private Internets and Intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html
Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:
http://www.cisco.com/en/US/learning/index.html
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Copyright © 2005 Cisco Systems, Inc. All rights reserved.
Posted: Wed Nov 2 09:00:17 PST 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.