cc/td/doc/product/webscale/css/css_sca
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Note for the Cisco 11000 Series Secure Content Accelerator: SCA2
CD Contents
Firmware and Software Version Notes
Operational Notes

Release Note for the Cisco 11000 Series Secure Content Accelerator: SCA2


This release note applies to the Cisco 11000 Series Secure Content Accelerator, SCA2 version. The note supplements information found in the Cisco 11000 Series Secure Content Accelerator Configuration Guide distributed with version 4.0 of the firmware. The SCA2 offers significatly higher performance than the previous SCA device.

The Cisco 11000 Series Secure Content Accelerator is compatible with all Cisco content switches—the CSS 11500, the Cisco LocalDirector, the Content Switching Module for the Catalyst 6500, and the Cisco CSS 11000 Series Content Services Switches.

The following sections are presented in this note:

CD Contents

The CD-ROM contains the following resources:

The table below shows the configuration manager software versions appropriate for each operating system.

Operating System  Software Version 

Red Hat Linux

4.0

Windows NT 4

4.0

Windows 2000

4.0

Solaris Sparc

4.0

Firmware and Software Version Notes

The FW directory contains the firmware flash image for the SCA2. Use the flash image to replace the firmware image on the device.

Product Version Information

The CSS 11000 Secure Content Accelerator configuration utility, cscacfg, is only compatible with devices that have the same software version. Devices with a different firmware version must be configured using the configuration manager that matches the firmware on the device.

Release version refers to the CD software release and not to the firmware or configuration manager versions. Any reference to firmware or the configuration manager in these release notes or documentation is to CD software release version. The commands show version and show device display both the cscacfg (configuration manager) and firmware versions as well as the software release version. The end number of the text returned shows the build date and time stamp in the following format:

|Year|Month|Day|Time Stamp|

For example:

|2001|08|03|1046|

Reflashing the Firmware

The fw directory contains the firmware image of the SCA2. This file is described in the following table.

Filename  Description 

css-sca2-2fe-k9.phz

Image of the 4.0 software release. This image is used only to reflash the device.

Use the following instructions to reflash the firmware on the device and install the remote configuration manager software. Please read the entire document before proceeding with the flash procedure.

Serial Console CLI Instructions

1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator. An FTP URL is preferable.

2. Connect to the Secure Content Accelerator via a serial management session at 9600 baud.

3. Enter these commands to load the firmware image, where protocol is HTTP, FTP, or TFTP; serverip is the IP address of the server; and path is the path to the firmware image file. (If using a Windows operating system, use back slashes instead of forward slashes.)

enable
copy to flash protocol://serverip/path/css-sca-2fe-k9.phz
reload

4. Wait for several minutes for the device to reload and reboot.

5. Check the firmware version by using the show device command. The returned text should contain "MaxOS 4.0".

6. Continue with configuration as desired.

Telnet CLI Instructions

1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator. An FTP URL is preferable.

2. Connect to the Secure Content Accelerator using the IP address previously assigned to it.

3. Enter these commands to load the firmware image, where protocol is HTTP, FTP, or TFTP; serverip is the IP address of the server; and path is the path to the firmware image file. (If using a Windows operating system, use back slashes instead of forward slashes.)

enable
copy to flash protocol://serverip/path/css-sca-2fe-k9.phz
reload

4. You will see a status message stating the connection to the device was lost. Wait for several minutes for the device to reload and reboot. The telnet connection to the device is lost.

5. Reconnect to the device using a telnet management session.

6. Check the firmware version by using the show device command. The returned text should contain "MaxOS 4.0".

7. Continue with configuration as desired.

Remote CLI Instructions

1. Copy the firmware image to the computer from which you configure the SCA2.

2. Open the existing configuration manager application (cscacfg) using the desktop shortcut or the Start button (Windows) or entering cscacfg at a Unix or Linux prompt.

3. Display all Secure Content Accelerators found by the configuration manager by entering the show device list command. If the device is not listed, use the discover command.

4. The following commands assume only one device has been discovered by the configuration manager. If more than one Secure Content Accelerator is listed, use the on form of the command to specify the desired device.


Note    You can set the on-prefix to direct commands to a single device.

Use these commands to attach to and enter Privileged mode:

attach
enable

5. Enter these commands to load the firmware image, where path is the path to the firmware image file. (If using a Windows operating system, use back slashes instead of forward slashes.)

copy to flash path/css-sca-2fe-k9.phz
reload

6. Quit the configuration manager. If you wish to continue with configuration via the remote configuration manager, you must install the 4.0 version as described in the Configuration Guide.

7. To continue configuring the device with the remote configuration manager, open the application (cscacfg) using the desktop short cut or the Start button (Windows) or entering cscacfg at a Unix or Linux prompt.

8. Display all Secure Content Accelerators found by the configuration manager by entering the show device list command. If the device is not listed, use the discover command.

9. Attach to the device and check the firmware version using the show device command. The returned text should contain "MaxOS version 4.0".

10. Continue with configuration as desired.

GUI Instructions

1. Open a Web browser and connect to the Secure Content Accelerator.

2. Ensure that the General>Status page is displayed.

3. Click Tools to activate the Tools tabs.

4. Click the Firmware tab.

5. Type the path and firmware image file name or URL in the Upload Firmware text box, or click Browse and navigate to and select the firmware image file from the local file system.

6. Click Upload to load the firmware image into the GUI.

7. Click Install Image next to the file information in the Installable Firmware Images panel.

8. After the new firmware has uploaded, click the Restart tab.

9. Click Reboot to reload the device. Wait several minutes for the device to reboot.

10. Reconnect to the device using the GUI and the IP address assigned to it.

11. Click General to activate the General tabs.

12. The Release panel should contain "4.0".

13. Continue with configuration as desired.

Operational Notes

Network Design and Command Notes

Secure Server Notes

GUI Notes

access-list 10 permit 127.0.0.1 0.0.0.0
web-mgmt access-list 10

CLI Notes

SNMP Notes

The factory-set default SNMP community is "public"; however, "public" is not listed in the configuration. The behavior of setting and resetting the SNMP community is demonstrated in the table below.

Command  SNMP community is set to...  SNMP community in configuration is... 

snmp default community XYZ

XYZ

XYZ

no snmp default community

XYZ

No default community listed

snmp default community public

public

public

Syslog Usage Notes

The SSL device syslog implementation for firmware 3.2 and below supports only "kern" facility logging. A future release will offer "local" and custom facility support. The following are example syslogd.conf settings:

kern.debug;         /var/log/ssl-debug
kern.info;          /var/log/ssl-info
kern.none;          /var/log/ssl-none
kern.crit;          /var/log/ssl-crit
kern.warn;          /var/log/ssl-warn

Or you can use the settings displayed below:

*.debug;         /var/log/ssl-debug
*.info;          /var/log/ssl-info
*.none;          /var/log/ssl-none
*.crit;          /var/log/ssl-crit
*.warn;          /var/log/ssl-warn

Linux-Specific Issues

Solaris-Specific Issues

Windows NT 4.0-Specific Issues

CCIP, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Fast Step, Follow Me Browsing, FormShare, Internet Quotient, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That's Possible, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, GigaStack, IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0201R)

Copyright © 2002, Cisco Systems, Inc.
All rights reserved.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Dec 23 14:43:01 PST 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.