|
Table Of Contents
Release Notes for Cisco Voice Interworking Service Module Release 3.3
New Features Introduced in Release 3.3
VISM Management Information Base
VISM/VISM-PR Upgrades with PXM1
VISM-PR Upgrades with PXM1E and PXM45
VISM/VISM-PR Downgrade Procedure
VISM to VISM-PR Hardware Upgrade
Resolved Caveats in Release 3.3
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Obtaining Technical Assistance
Cisco Technical Support Website
Definitions of Service Request Severity
Obtaining Additional Publications and Information
Release Notes for Cisco Voice Interworking Service Module Release 3.3
These release notes are part number OL-5357-01 Rev. C0, May 17, 2005.
The Voice Interworking Service Module (VISM) product is supported by MGX Voice Media Gateways. Refer to these release notes for Media Gateway and version level support guidelines.
The VISM/VISM-PR software release notes are supported by the Cisco Voice Interworking Services (VISM) Configuration Guide and Command Reference Release 3.3, which is available on cisco.com.
Table of Contents
About Release 3.3
The VISM/VISM-PR Release 3.3 is a new release. For a list of new features, see "New Features Introduced in Release 3.3" section. For a list of the open and resolved caveats this release, see "Caveats in Release 3.3" section.
Note The content of VISM Release 3.3 supersedes previous releases.
Overview
These release notes contain the following sections:
• "New Features Introduced in Release 3.3" section
• "VISM Management Information Base" section
• "Limitations and Restrictions" section
• "Upgrade Procedures" section
• "Caveats in Release 3.3" section
• "Related Documentation" section
• "Obtaining Documentation" section
• "Documentation Feedback" section
• "Cisco Product Security Overview" section
• "Obtaining Technical Assistance" section
• "Obtaining Additional Publications and Information" section
New Features Introduced in Release 3.3
VISM Release 3.3 is applicable to VISM and VISM-PR hardware. Table 1 summarizes the new features in VISM/VISM-PR Release 3.3.
VISM Management Information Base
VISM Release 3.3 uses Management Information Base (MIB) Version 53.
Load the MIBs available with MGX Release 1.3.11 located at the following URL: http://www.cisco.com/kobayashi/sw-center/wan/wan-planner.shtml
VISM MIBs are compatible with both PXM1-based and PXM1E/PXM45-based chassis.
VISM Redundancy
Table 2 provides the support level for 1:N Service Module Redundancy (N = 1 through 11).
Note You can use a VISM-PR card as a redundant card for a VISM card, but a VISM card cannot be used as a redundant card for a VISM-PR card.
VISM/VISM-PR cards support bulk distribution using the SRM-3T3 and SRM-E (OC3) cards. In a redundancy configuration VISM/VISM-PR cards in bulk distribution mode do not require any backcards.
VISM Call Rate
Software Release 3.3 for VISM/VISM-PR handles 10 CAS, SS7, or PRI calls per second per VISM/VISM-PR card.
Compatibility
VISM/VISM-PR software interoperability with Cisco MGX 8230, Cisco MGX 8250, Cisco MGX 8830, and Cisco MGX 8850 (PXM1, PXM1E, PXM45) platform software is listed in Table 3.
Table 3 VISM/VISM-PR Software Interoperability
Product CW2000 Name Latest Firmware Minimum FirmwarePXM1
MGX 8850
1.3.10
1.2.13
PXM1E
MGX 8850/MGX 8830
5.0.10
3.0.25
PXM45
MGX 8850
5.0.10
3.0.25
SRME
SRM-E
FC-C0 BC-B0
FC-C0 BC-B0
SRM-3T3/C
SRM-C
FC-CA BC-A0
FC-CA BC-A0
RPM-PR
RPM-PR
12.2(8)T1
12.2(8)T1
RPM-XF
RPM-XF
12.3(7)T3
12.2(15)T5
AXSM
AXSM
5.0.10
5.0.10
CWM
CWM
15.0 Patch 21
15.0 Patch 2
1 Bulk Statistics Upload and Historical Statistics are the only new VISM/VISM-PR Release 3.3 features that are supported by CWM 15.0.00 Patch 2.
Table 4 shows VISM and VISM-PR compatibility with the PXM controller cards.
Table 4 VISM/VISM-PR Compatibility with PXM Cards
PXM1 PXM1E PXM45 (A/B/C)VISM
Yes
No
No
VISM-PR
Yes
Yes
Yes
Table 5 shows VISM and VISM-PR compatibility with the Cisco MGX chassis.
Table 6 describes the VISM/VISM-PR software interoperability with other Cisco products.
Table 7 describes the software images available for Release 3.3 for VISM/VISM-PR.
Table 7 Software Images for VISM/VISM-PR Release 3.3
Product Name Software Version Firmware Image Name DescriptionMGX-VISM-SW3300
003.003.000.200.FW
vism-8t1e1-003.003.000.200.fw
This image does not support the CALEA1 feature.
MGX-VISM-LISW3300
003.053.000.200.FW
vism-8t1e1-003.053.000.200.fw
This image supports the CALEA2 feature.
1 CALEA = Commission on Accreditation for Law Enforcement Agencies.
2 The CALEA implementation supports the CALEA law intercept confirmation interface.
Table 8 describes the software boot code requirements for VISM/VISM-PR Release 3.3.
Note Loading this release of the backup boot code is required for existing VISM/VISM-PR cards not using this new release.
Limitations and Restrictions
The following limitations and restrictions are valid for software Release 3.3 for VISM/VISM-PR:
•If you are upgrading the VISM-PR image to Release 3.2.1x or later and the PXM1E or PXM45 image from Release 4.x or earlier to Release 5.x, first upgrade the VISM-PR cards. Then, upgrade the PXM1E or PXM45 cards in the same node.
Do not configure the new VISM features until you have fully upgraded the network. After you upgrade your network to PXM1E or PXM45 Release 5.x or later and VISM-PR to Release 3.2.1x or later, apply the standard upgrade process.
•Cisco recommends that you use the cnfcodecjtrdelay command to configure the fixed jitter-delay argument to 20 msec when using VISM 3.3.
•In a PNNI network, upspeeding SVC fax or modem calls requires an increase in bandwidth between the voice codec and the vbd codec. For fax calls to go through, you must disable policing.
•Switched AAL2 PVC mode is not recommended as this mode requires a meshed PVC network topology, which does not scale.
•The following commands are not supported:
–cnfmaxconfnum
–dspconferences
–dspmaxconfnum
•GR-303 is not supported for the LAPD commands.
•In AAL2 SVC mode, all active calls on VISMs are dropped upon PXM hard and soft switchover.
•For VISM-PR cards that are running on a PXM45 chassis, you can add connections to a maximum of 11 VISM-PR cards.
To add more cards and connections, you must enable the expanded memory option on the PXM45 card by using the cnfndparms (option 4) command.
•When configuring VoIP for modem or fax upspeed (passthrough), set the EventNegoPolicy parameter of the cnfvoiptransparams command to the value all.
This configuration is required for all related upspeed codecs to function correctly. An upspeed codec is defined as the codec that is switched to G.711a/u law, Clear Channel, or G.726.
•For a list of open issues and mitigations in VISM Release 3.3, see "Caveats in Release 3.3" section.
Upgrade Procedures
This section describes the following upgrade procedures:
• VISM/VISM-PR Upgrades with PXM1
• VISM-PR Upgrades with PXM1E and PXM45
• VISM/VISM-PR Downgrade Procedure
• VISM to VISM-PR Hardware Upgrade
VISM/VISM-PR Release 3.3 provides a procedure for the graceful upgrade (one in which the existing VISM/VISM-PR configuration is preserved throughout the upgrade procedure) from one of the following releases:
•From VISM 1.5(9) and 1.5(10) to VISM 3.3
•From VISM 2.2.1 to VISM 3.3
•From VISM 3.1(2) to VISM 3.3
•From VISM 3.1.3 to VISM 3.3
•From VISM 3.2 to VISM 3.3
•From VISM 3.2.11 to VISM 3.3
Prerequisites
To ensure that the VISM/VISM-PR configuration is preserved throughout the upgrade procedure, you must complete the prerequisites listed in this section.
Before starting the graceful upgrade procedure, complete the following prerequisites:
•Configure your MGX 8000 Series shelf with at least two VISM cards in a redundant configuration.
For more information on adding redundancy, refer to the add redundancy, addred, command in the Cisco MGX 8250, Cisco MGX 8230, and Cisco MGX 8850 PXM1-based Command Reference documentation and the Cisco MGX 8830 and Cisco MGX 8850 PXM1E/ PXM45-based Command Reference documentation.
•Ensure that the VISM cards are running at least Release 2.1, and the VISM-PR cards are running at least Release 3.0.
•Download software Release 3.3 for VISM/VISM-PR to the MGX 8000 Series shelf.
•If you are using the CALEA feature, ensure that you have the version of VISM/VISM-PR software that supports CALEA.
•Before you upgrade to 3.3, delete all domain names that are greater than 32 characters on the VISM/VISM-PR card. See the Check Domain Name Length section. After you complete the upgrade to 3.3, add the domain names that are greater than 32 characters.
Check Domain Name Length
Before you upgrade to 3.3, delete all domain names and domain name IPs that are greater than 32 characters on the VISM/VISM-PR card. After the upgrade, re-add the domain names and domain name IPs.
Complete the following steps.
Step 1 Log in to the VISM/VISM-PR card.
Step 2 Display the list of domain names by entering the dspdns command.
MGX1E.1.11.VISM8.a > dspdns
DomainNumber DomainName ResolutionType
------------ -------------- --------------
1 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.com internalOnly
2 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.dom internalOnly
3 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.eom internalOnly
Step 3 For each domain number, count the number of characters in the DomainName field.
If the characters are greater than 32 for each domain number, go to Step 4.
Step 4 Check for the IP addresses associated with the domain names by entering the dspdnallips command.
MGX1E.1.11.VISM8.a > dspdnallips
ResolutionIndex DomainName IP State Pref
--------------- ------------ ------------ --------- -----
1 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.com 10.1.3.25 Inactive 1
Step 5 If IP addresses are present, make a note of them in the order that they appear.
Step 6 Since you cannot delete the domain name or domain name IPs if MGCs exist, use the following commands to check for MGCs and delete them if they exist for each domain name:
a. Check for the MGC group protocols by entering the dspmgcgrpprotocols command.
MGX1E.1.11.VISM8.a > dspmgcgrpprotocols
MgcGrp Prot Qrntn Qrntn Sign Prov RspAck Disc Cancel
Num Num Persist Def OnOff Resp Attr Proc Graceful
--------------------------------------------------------------------------------------
1 MGCP 1.0 Qrtn StepProcess DelNegEvt Send Send Enable Send
b. Check for MGC group entries by entering the dspmgcprpparams command.
MGX1E.1.11.VISM8.a > dspmgcgrpparams
Mgc Grp Num Comm State State Chg Notification Priority
----------- ---------- ---------------------- --------
1 CommLoss Enabled 1
c. Check for MGC entries by entering the dspmgcs command.
MGX1E.1.11.VISM8.a > dspmgcs
mgcNumber mgcName
--------- -------
1 mga-SOLSYS1CA.234567890987654321234567890123456789.sol.cisco.co
Step 7 If any entries exist for the domain name in Step 6 a. to Step 6 c., delete the MGC entries by entering the following commands as required:
•delmgcgrpprotocol
•delmggrpentry
•delmgc
Step 8 Delete the domain name IP address by entering the deldnip command.
Step 9 Delete the domain name by entering the deldn command.
Step 10 Perform the upgrade using the procedures in the "Upgrade VISM/VISM-PR Firmware with PXM1 Card" section or "Upgrade VISM-PR Firmware with PXM1E and PXM45 Cards" section.
Step 11 After you complete the upgrade, add the domain name entries, IP addresses, and MGCs as previously configured using the following commands:
•adddn
•adddnip
•addmgc
•addmgcgrpentry
•addmgcgrpprotocol
Step 12 To check that you added the entries successfully, use the corresponding display commands from Step 2 to Step 6.
VISM/VISM-PR Upgrades with PXM1
This section describes the procedures for upgrading VISM/VISM-PR software when the VISM/VISM-PR is used with a PXM1 card.
Download VISM/VISM-PR Boot Code and Firmware to PXM1
To download the VISM/VISM-PR boot code and firmware to the PXM1 card, use TFTP.
Step 1 Log in to your TFTP server.
Step 2 Download the bootcode and firmware images from the Cisco website.
Step 3 Download the selected revision of service module boot code into the service module.
a. tftp <node_name or IP address>
b. bin
c. put <backup boot> POPEYE@SM_1_0.BT
d. quit
Step 4 Download the selected firmware file.
To upgrade all VISM cards, proceed to Step 4 c. To upgrade an individual VISM card, proceed to Step 4 d.
a. tftp <node_name or IP address>
b. bin
c. put <FW file> POPEYE@SM_1_0.FW
quit
d. put <FW file> POPEYE@SM_1_<slot number of card to upgrade>.FW
quit
Note Do not enter two put commands in the same TFTP session.
Step 5 Proceed to the "Upgrade VISM/VISM-PR Firmware with PXM1 Card" section to install the download.
Upgrade Boot Code with PXM1 Cards
Complete the following steps to upgrade the new backup boot code when you are using PXM1 cards in in a Cisco MGX 8230, Cisco MGX 8250, and Cisco MGX 8850 chassis:
Step 1 Log in to the active PXM1 card (slot 7 or 8 for Cisco MGX 8250 and Cisco MGX 8850 chassis; slot 1 or 2 for Cisco MGX 8230 and Cisco MGX 8830 chassis).
Note VISM/VISM-PR must be in the active state in order to update the VISM/VISM-PR boot code.
Step 2 Execute the PXM1 install command.
nodename.1.27.VISM8.a > install [bt] [sm <slot>] <version>
Caution Do not touch the VISM/VISM-PR card until the status comes back ('Sent xxx bytes in yyy seconds'). Failure to follow this recommendation corrupts the boot code, which cannot be recovered.
When the boot code is being written to PROM, you see comments displayed at the VISM/VISM-PR prompt. This behavior is normal and expected.
Step 3 Type the version command to verify the correct boot code.
Note Step 3 is optional.
Upgrade VISM/VISM-PR Firmware with PXM1 Card
Software Release 3.3 is for VISM and VISM-PR cards. Ensure that the VISM and VISM-PR cards have the minimum boot code version of vism_8t1e1_VI8_BT_3.2.00.fw.
The following versions of VISM software Release 3.3 are available:
•003.003.000.200.FW—without CALEA
•003.053.000.200.FW—with CALEA
In this procedure the following conditions apply:
•If two VISM or VISM-PR cards are part of a redundancy group, initially the primary card is in the active state, and the secondary card is in the standby state.
•Old-rev refers to the firmware, Release 3.2 and prior.
•New-rev refers to the firmware after the upgrade, Release 3.3.
Perform the firmware upgrade on the VISM or VISM-PR cards. Do not remove the VISM cards and replace them with VISM-PR cards at this time.
Step 1 Log in to the active PXM1 card (slot 7 or 8 for Cisco MGX 8250 and Cisco MGX 8850 chassis; slot 1 or 2 for Cisco MGX 8230 and Cisco MGX 8830 chassis).
Step 2 Save the existing configuration as a contingency plan by entering:
nodename.1.8.PXM.a > savesmcnf <SM slot#>
This command saves the existing configuration in the C:CNF directory. This file can be used during the downgrade procedure.
Step 3 To obtain the correct version of VISM/VISM-PR firmware, enter the dspfwrevs command.
nodename.1.8.PXM.a > dspfwrevs
Card Type Date Time Size Version File Name
----------- ------------------- -------- -------------------------------------
VISM-8T1E1 04/26/2004 20:06:04 248688 VI8_BT_3.2.00 sm150.bt
PXM1 01/04/2004 08:19:52 2602836 1.2.11 pxm_1.2.11.fw
PXM1 01/04/2004 11:03:02 2620132 1.2.21 pxm_1.2.21.fw
VISM-8T1E1 09/10/2004 16:22:32 4135208 003.003.000.200 sm150_12.fw
VISM-8T1E1 09/10/2004 15:37:52 4077560 003.002.010.200 sm150.fw
VISM-8T1E1 06/16/2004 13:29:38 3863768 003.051.002.000 sm150_11.fw
PXM1 01/04/2004 11:01:56 1346844 1.2.21 pxm_bkup_1.2.21.fw
VISM-8T1E1 03/08/2004 08:20:16 4037880 003.002.000.000 sm150_3.fw
VISM-8T1E1 03/08/2004 08:19:44 248688 VI8_BT_3.2.00 sm150_3.bt
PXM1 01/04/2004 07:58:44 1345328 1.2.11 pxm_bkup_1.2.11.fw
VISM-8T1E1 01/07/2004 23:33:02 3863768 003.051.002.000 sm150_2.fw
VISM-8T1E1 03/08/2004 08:21:12 248688 VI8_BT_3.2.00 sm150_4.bt
VISM-8T1E1 04/26/2004 19:59:52 4037880 003.002.000.000 sm150_1.fw
VISM-8T1E1 03/08/2004 08:20:58 4037880 003.002.000.000 sm150_4.fw
Step 4 Execute the PXM install command.
nodename.1.8.PXM.a > install sm <SM slot#> <new-rev>
Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.
Replace <new-rev > with the version of the new firmware (for example, 003.003.000.200).
Caution Ensure that you perform Step 4. If you do not perform Step 4, the boot code is corrupted and not recoverable.
This command causes the secondary VISM or VISM-PR card to reset and come up in the standby state, running the new-rev firmware. The primary VISM or VISM-PR card is unaffected by this command.
Step 5 Execute the PXM newrev command.
nodename.1.8.PXM.a > newrev sm <SM slot#> <new-rev>
Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.
Replace <new-rev> with the version of the new firmware.
This command causes the primary VISM or VISM-PR card to reset. The secondary VISM or VISM-PR card becomes active and is running the new-rev firmware.
Step 6 Execute the PXM commit command.
nodename.1.8.PXM.a > commit sm <SM slot#> <new-rev>
Replace <SM slot#> with the slot number of the primary VISM or VISM-PR card.
Replace <new-rev> with the version of the new firmware.
The two VISM or VISM-PR cards are now back to their original condition except that both cards are now running the new-rev firmware.
Step 7 Log in to the active VISM or VISM-PR card and use the display commands (for example, dspendpts, dspcasvar, and so forth) to confirm that the configuration has been preserved through the upgrade process.
Note For more than one primary VISM or VISM-PR card in a redundancy group, ensure that the secondary card is in the standby state and repeat Step 5 and Step 6 for each VISM/VISM-PR card in the redundancy group.
Step 8 Perform the following verifications:
•Make minor modifications to the configuration.
•Check that the changes have been executed correctly.
•Change the configuration back again.
Note If the VISM or VISM-PR card is not part of a redundancy group, complete Step 1 to Step 4.
VISM-PR Upgrades with PXM1E and PXM45
This section describes the procedures for upgrading VISM-PR software when the VISM-PR is used with a PXM1E or PXM45 card.
If you are upgrading the VISM-PR image to Release 3.2.1x or later and the PXM1E or PXM45 image from Release 4.x or earlier to Release 5.x, first upgrade the VISM-PR cards. Then, upgrade the PXM1E or PXM45 cards in the same node.
Do not configure the new VISM features until you have fully upgraded the network. After you upgrade your network to PXM1E or PXM45 Release 5.x or later and VISM-PR to Release 3.2.1x or later, apply the standard upgrade process.
Download VISM-PR Boot Code and Firmware to PXM1E and PXM45
To download the VISM-PR boot code and firmware to the PXM1E or PXM45 card, use FTP.
Step 1 Access the images on the Cisco Web site.
Step 2 To download the images, enter the ftp command.
ftp node-ip
where node-ip is the IP address of the node to which you want to download the image.
Step 3 Enter your user name and password.
Step 4 Enter bin.
Step 5 Access the appropriate directory.
cd C:FW
Step 6 Download the images to your C:FW directory.
a. To download one file at a time, use the put image-version command.
b. To download multiple files at the same time, use the mput <image-version> <image-version> command.
where image-version is the downloaded image from Step 1.
Step 7 To exit the download procedure, enter bye.
Upgrade Boot Code with PXM1E and PXM45 Cards
Complete the following steps to upgrade the new backup boot code when you are using PXM1E or PXM45 cards in your MGX 8000 Series chassis:
Step 1 Complete the steps in Download VISM-PR Boot Code and Firmware to PXM1E and PXM45.
Step 2 Log in to the active PXM1E or PXM45 card.
Step 3 To upgrade the VISM-PR boot, enter the burnboot command.
nodename.1.7.PXM.a > burnboot <slot> <revision>
Replace <slot> with the number of the VISM-PR card that you want to upgrade.
Replace <revision> with the version of the bootcode you downloaded from Step 1.
The following example shows the burnboot.
nodename.1.7.PXM.a > burnboot 12 3.2(0.0)
The card in slot 12 will be reset.
burnboot:Do you want to proceed (Yes/No)? yes
For VISM-PR cards without redundancy, the card automatically resets and becomes active with the latest boot code image.
For VISM-PR cards with redundancy, the active card takes approximately 60 seconds to reset as standby. For the original standby card, complete Step 2- Step 3. This card now resets back to standby, and the standby card is now active.
Upgrade VISM-PR Firmware with PXM1E and PXM45 Cards
Ensure that the VISM-PR cards have the minimum boot code version of vism_8t1e1_VI8_BT_3.2.00.fw.
The following versions of VISM-PR software Release 3.3 are available:
•003.003.000.200.FW—without CALEA
•003.053.000.200.FW—with CALEA
Perform the firmware upgrade on the VISM-PR cards.
Step 1 Log in to the active PXM1E or PXM45 card.
Step 2 Ensure that the card is in the redundant mode, where the active card is the primary card.
Step 3 To save the existing configuration as a contingency plan, enter the saveallcnf command.
nodename.1.7.PXM.a > saveallcnf
Step 4 To load the new software, enter the loadrev command.
nodename.1.7.PXM.a > loadrev <sm-primary-slot-num> <new-rev>
Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.
Replace <new-rev> with the new firmware version number for the VISM-PR software.
Caution Temporary traffic loss occurs.
Step 5 Ensure that the redundant card is returned to the standby state by executing the dspcds command.
Note You must wait for the redundant card to return to the standby state. If you issue the runrev command too early, an error message is generated. The rev change does not occur.
Step 6 To execute the download, enter the runrev command.
nodename.1.7.PXM.a > runrev <sm-primary-slot-num> <new-rev>
Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.
Replace <new-rev> with the new firmware version number for the VISM-PR software.
Caution Temporary traffic loss occurs.
Step 7 Ensure that the primary slot completes booting and goes into the standby state by executing the dspcds command.
Note You must wait for the primary slot to finish booting and get to standby state. Issuing the commitrev command early might be accepted without an error. However, the active and standby cards might not be swapped back to their original state. For example, the original primary card might be left in standby, and the original redundant card might be left as active.
Step 8 To commit the new download to the VISM-PR card, enter the commitrev command.
nodename.1.7.PXM.a > commitrev <sm-primary-slot-num> <new-rev>
Replace <sm-primary-slot-num> with the slot number of the VISM-PR card on which you want to install the new software.
Replace <new-rev> with the new firmware version number for the VISM-PR software.
The commitrev command switches the primary card from a standby state to an active state and the redundant card from an active state back to a standby state.
Step 9 To verify the card states, execute the dspcds command.
VISM/VISM-PR Downgrade Procedure
Use this procedure to downgrade VISM/VISM-PR software from software Release 3.3 to an earlier VISM/VISM-PR release. By following the downgrade procedure described here, the configurations are retained after the downgrade.
Note The configurations that existed with old-rev firmware should have been saved earlier. You cannot downgrade from VISM-PR to VISM.
Complete the following steps to downgrade the VISM/VISM-PR software:
Step 1 If the VISM/VISM-PR card is in a redundancy group, remove the redundancy.
nodename.1.7.PXM.a > delred <SM slot#>
Step 2 Download the old-rev firmware onto the MGX shelf.
Step 3 Execute the PXM clrsmcnf command:
nodename.1.7.PXM.a > clrsmcnf <SM slot#>
Replace <SM slot#> with the slot number of the VISM/VISM-PR card to be downgraded.
Wait for the card to become active. The VISM/VISM-PR card resets after you execute this command.
Step 4 Execute the PXM restoresmcnf command:
Caution The restoreallcnf command reconfigures all of the cards in the chassis.
nodename.1.7.PXM.a > restoresmcnf -f <filename> -s <SM slot#>
Replace <filename> with the name of the old configuration file that was saved while the old-rev firmware was running. The file can be found in the C:CNF directory on the MGX shelf.
Replace <SM slot#> with the slot number of the VISM/VISM-PR card to be downgraded.
The VISM/VISM-PR card resets again. The card becomes active, running the old-rev firmware with the old configuration.
Note For PXM1E/PXM45 cards, you cannot restore the configuration for an individual VISM-PR service module. You can save and restore the configuration of all cards in a chassis using the saveallcnf and restoreallcnf commands.
Step 5 Reconfigure the redundancy group, if required.
VISM to VISM-PR Hardware Upgrade
Complete the following steps to upgrade your system from VISM cards to VISM-PR cards.
Caution You must install the redundant (standby) VISM-PR card first. Failure to follow this recommendation results in traffic loss. In addition, do not remove an active VISM card from your chassis. Ensure that you configure an active VISM card to the standby state before you remove it and replace it with a VISM-PR card.
Step 1 Remove the redundant (standby) VISM card from your chassis.
Step 2 Install a VISM-PR card in the slot you removed the VISM card from in Step 1.
Step 3 Administratively configure the VISM-PR card you installed in Step 2 as primary (active).
Step 4 Remove the now redundant VISM card from your chassis.
Step 5 Install a VISM-PR card in the slot you removed the VISM card from in Step 4.
Step 6 Log in to the redundant (secondary) VISM-PR card and execute the dspcd command. Verify that the output from the dspcd command lists the card type under FunctionModuleType as a VISM-PR card. If the card type still indicates the VISM card, execute the resetcd slot-num command from the PXM and repeat the dspcd command to ensure that the correct card type is shown.
Step 7 Log in to the active VISM-PR card and execute the dspcd command. Verify that the output from the dspcd command lists the card type under FunctionModuleType as a VISM-PR card.
If the card type still indicates the VISM card, execute the resetcd slot-num command from the PXM. Repeat the dspcd command to ensure that the correct card type is shown.
Step 8 If you have no other VISM cards in your chassis, you have completed the hardware upgrade procedure; do not proceed to Step 9. If you have more VISM cards in your chassis, proceed to Step 9.
Step 9 Remove a standby VISM card from your chassis.
Step 10 Install a VISM-PR card in the slot you removed the VISM card from in Step 9.
Step 11 Repeat Step 9 and Step 10 to remove any remaining VISM cards in your chassis and replace them with VISM-PR cards.
Step 12 Repeat Step 6 and Step 7 on the remaining VISM-PR cards to insure the correct card type is shown.
Caveats in Release 3.3
This section describes the resolved and open software caveats in VISM/VISM-PR Release 3.3. Caveats describe unexpected behavior or defects in VISM/VISM-PR software.
Resolved Caveats in Release 3.3
Table 9 describes the caveats that have been resolved in VISM/VISM-PR Release 3.3.
Open Caveats
Table 10 describes the open caveats in VISM/VISM-PR Release 3.3 as of September 27, 2004.
Related Documentation
The following documents contain information that may be useful to software Release 3.3 for VISM/VISM-PR:
•Cisco Voice Interworking Services (VISM) Configuration Guide and Command Reference, Release 3.3
•Cisco MGX 8830, MGX 8850 (PXM45 and PXM1E), and MGX 8950 Command Reference, Release 5
•Cisco MGX 8850 (PXM45 and PXM1E) Hardware Installation Guide, Release 5
•Cisco MGX 8850 (PXM45) and MGX 8950 Software Configuration Guide, Release 5
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Documentation DVD
Cisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
•Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:
•Report security vulnerabilities in Cisco products.
•Obtain assistance with security incidents that involve Cisco products.
•Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:
•Emergencies — security-alert@cisco.com
•Nonemergencies — psirt@cisco.com
Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one that has the most recent creation date in this public key server list:
http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&exact=on
In an emergency, you can also reach PSIRT by telephone:
•1 877 228-7302
•1 408 525-6532
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, 365 days a year, at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support Website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—Your network is "down," or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
•Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
•Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:
•iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
•World-class networking training is available from Cisco. You can view current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0502R)
Copyright © 2005, Cisco Systems, Inc.
All rights reserved.
Posted: Wed Feb 1 13:39:50 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.