![]() |
Table Of Contents
Release Notes for
Cisco Configuration Professional 2.4Required IP Address Configuration Information
Router Configuration Requirements
Cisco CP Minimum Screen Resolution
Pop-up Screens Appearing on Primary Monitor if Cisco CP is moved to Extended Monitor
Cisco IOS Enforces One-Time Use of Default Credentials
Cisco CP Merge and Replace Configuration Functions Fail Under Some Conditions
Cisco CP Security Dashboard May Display Threats Unrelated to Your Cisco IOS IPS Installation
Cisco CP May Lose Connection to Network Access Device
Popup Blockers Disable Cisco CP Online Help
Screencasts for Cisco CP Features
Temporary Internet Files—Impact on Launch
Internet Explorer Zoom Level - Impact on Some Cisco CP Screens
Release Notes for
Cisco Configuration Professional 2.4
December 15, 2010
OL-23724-01These release notes support Cisco Configuration Professional (Cisco CP) version 2.4. They should be used with the documents listed in the "Related Documentation" section.
These release notes are updated as needed. To ensure that you have the latest version of these release notes, go to http://www.cisco.com/go/ciscocp. In the Support box, choose General Information > Release Notes, and then find the latest release notes for your release.
Contents
This document contains the following sections:
Introduction
Cisco CP is a GUI-based device management tool for Integrated Service Routers. Cisco CP simplifies router, Firewall, Intrusion Prevention System, VPN, Unified Communications, WAN, and basic LAN configurations through GUI-based, easy-to-use wizards. Cisco CP is installed on a PC.
Routers that are ordered with Cisco CP are shipped with Cisco CP Express installed in router flash memory. Cisco CP Express is a light-weight version of Cisco CP that you can use to configure LAN and WAN interfaces.
System Requirements
This sections describes PC and router system requirements. It contains the following parts:
PC System Requirements
Table 1 lists the system requirements for a PC running Cisco CP. Although the Cisco CP application requires Java Runtime Environment (JRE) to run, the Cisco CP Express application included with Cisco CP can run under the native Java Virtual Machine in the supported browsers and JRE.
Router System Requirements
Router System Requirements are described in the following parts:
•
Required IP Address Configuration Information
•
Router Configuration Requirements
Supported Routers
Table 2 and Table 3 list the routers that Cisco CP supports.
.
Supported Phones
Table 4 lists the phones that Cisco CP supports:
Supported Network Modules
Table 5 and Table 6 list the network modules that Cisco CP supports.
Supported Interface Cards
Table 7 lists the interface cards that Cisco CP supports.
Connected Grid
Table 8 lists the connected grid devices that Cisco CP supports
.
Cisco IOS Releases
Cisco CP is compatible with the Cisco IOS releases listed in Table 9.
Determining the Cisco IOS Release
To determine the release of Cisco IOS software currently running on your Cisco router, log in to the router and enter the show version EXEC command. The following sample output from the show version command indicates the Cisco IOS release on the second output line:
Router> show versionCisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.1(2)T1"Required IP Address Configuration Information
Table 10 provides the required IP address configuration for the PC. Use this information to complete the "Task 4: Configure the IP Address On the PC" section in Cisco Configuration Professional Quick Start Guide.
Router Configuration Requirements
To run Cisco CP, a router configuration must meet the requirements shown in Table 11.
The default configuration file meets all Cisco CP requirements. The default configuration file has the name cpconfig-model_number.cfg. For example, the configuration file for the Cisco 860 and Cisco 880 routers is cpconfig-8xx.cfg.
Cisco CP Ordering Options
Table 12 describes the ordering options under which Cisco CP can be ordered. Cisco CP Express is a product that is shipped in router flash memory when the router is ordered with Cisco CP.
New and Changed Information
This section contains new information about Cisco CP and any information about Cisco CP that has changed.
This section contains the following parts:
New and Changed Features
Cisco CP 2.4 supports the following new and changed features:
•
MAC Address
Cisco CP now supports static and secure MAC addresses, in addition to dynamic addresses. Static and secure MAC address support is currently available only on the Cisco 2520 series switches.•
SIP Trunk Enhancements
Advanced SIP UA header parameters such as retry options, retry connect, and timer are now available. These parameters are available from the Advanced tab.•
SRSV-CUE
Cisco CP now supports the Cisco Unity Express SRSV module (SRSV-CUE) which handles voicemail services during a network failure. This module is embedded in a Cisco Integrated Services Router (ISR) or Cisco Integrated Service Routers Generation 2 (ISR G2) platform. Cisco SRSV-CUE protects your communications with voicemail survivability for your organization's remote sites, such as branch offices or other small sites. When a remote site does not have access to your central voicemail system, as during a network service interruption, Cisco Unified Survivable Remote Site Voicemail provides voicemail backup services. This helps to ensure your remote site continues to have voicemail and auto-attendant service. For more information, see http://www.cisco.com/web/go/srsv•
VDSL multi mode (ATM/Ethernet) support
Cisco CP now provides ADSL/ATM mode support along with VDSL/Ethernet mode support for the CISCO886VA-K9, CISCO887VA-K9, and CISCO887VA-M-K9 platforms. Depending on the DSLAM running mode, you have the option of configuring your router either in the VDSL/Ethernet mode in the ADSL/ATM mode.•
Voice Class Codec
Cisco CP now supports offer-all keyword.•
Voice Service VoIP
The following new input fields are now available:–
Bind interface
–
Session transport SIP/UDP
–
Registrar server
•
VoIP Dial Peer
The following new input fields are now available:–
DTMF relay
–
Voice-class SIP early-offer forced
–
Bind interface
•
VoIP Settings
The VoIP Settings page now displays the configured VoIP parameters with their values. You can configure general VoIP settings, SIP settings, and H.323 settings from the Edit VoIP Settings page.For the following features, the look-and-feel has changed:
•
Interface Management > Cellular WAN > Edit Cellular WAN Interface
•
Utilities > Flash File Management
•
Utilities > Configuration Editor
•
Utilities > View > Default Rules
Note
Licenisng feature is not supported in this release.
New Hardware Support
The new devices supported are:
•
CISCO886VA-K9
•
CISCO887VA-K9
•
CISCO887VA-M-K9
•
CISCO887V-K9
•
C888ESRSTW-GNA-K9
•
C888ESRSTW-GNE-K9
•
CISCO888EG-K9
•
CISCO888EGW-GNA-K9
•
CISCO888EGW-GNE-K9
•
CISCO888E-K9
•
CISCO888EW-GNA-K9
•
CISCO888EW-GNE-K9
•
CISCO892F-K9
•
CISCO892FW-AGN-A-K9
•
CISCO892FW-AGN-E-K9
•
CISCO892-K9
•
CISCO892W-AGN-E-K9
•
EHWIC-4ESG
•
EHWIC-4ESG-P
•
EHWIC-8ESG-P
•
EHWIC-D-8ESG
•
HWIC-1VDSL
•
HWIC-4SHDSL-E
Limitations and Restrictions
This section describes restrictions and limitations that may apply to Cisco CP. It contains the following parts:
•
Cisco CP Minimum Screen Resolution
•
Pop-up Screens Appearing on Primary Monitor if Cisco CP is moved to Extended Monitor
Cisco CP Minimum Screen Resolution
Cisco CP requires a screen resolution of at least 1024 x 768.
JRE Settings for Cisco CP
The following JRE settings are needed for Cisco CP to function properly:
Step 1
Go to Start > Control Panel > Java.
Step 2
Click View under Java Applet Runtime Settings.
Step 3
Select your JRE in use.
Step 4
Set the "Java runtime parameters" with the value "-Xmx256m -Dsun.java2d.d3d=false".
In addition, if JRE is upgraded to versions 1.6.0_11 or above, following settings are needed after Cisco CP installation.
Step 1
Go to Start > Control Panel > Java > Advance.
Step 2
Select "Java Plug-in" tree.
Step 3
Uncheck the check box for Enable next-generation Java Plug-in.
Step 4
Restart Cisco CP.
Pop-up Screens Appearing on Primary Monitor if Cisco CP is moved to Extended Monitor
If Cisco CP is running on a laptop which is also connected to an external monitor, and if the screen is set for extended display, pop-up screens are seen in all SDM applet security and routing, and help pages. The steps to reproduce this are:
Step 1
Connect the monitor to a laptop and set the screen for extended display.
Step 2
Launch Cisco CP and move it to a secondary screen.
Step 3
Go to security audit and click perform security audit.
The audit screen appears in the primary monitor; whereas, Cisco CP is still in the secondary monitor.
Important Notes
This section contains important information for Cisco CP. It contains the following sections:
•
Cisco IOS Enforces One-Time Use of Default Credentials
•
Cisco CP Merge and Replace Configuration Functions Fail Under Some Conditions
•
Cisco CP Security Dashboard May Display Threats Unrelated to Your Cisco IOS IPS Installation
•
Cisco CP May Lose Connection to Network Access Device
•
Popup Blockers Disable Cisco CP Online Help
•
Screencasts for Cisco CP Features
•
Temporary Internet Files—Impact on Launch
•
Internet Explorer Zoom Level - Impact on Some Cisco CP Screens
Cisco IOS Enforces One-Time Use of Default Credentials
To address CSCsm25466, Cisco IOS images included with recent shipments of Cisco 800, Cisco 1800, Cisco 2800, Cisco 2900 , Cisco 3800 and Cisco 3900 routers, enforce the one-time use of the default user name and password provided in the Cisco CP configuration file. If you bypass Cisco CP or Cisco CP Express and use a console or Telnet connection to log into the router, the login and exec banners warn you that you must change the user name to "cisco" and the password to "cisco" before you log off the router. If you do not change the credentials as directed, you will not be able to log into the router the next time that you attempt to do so.
The following Cisco IOS releases enforce the one-time use of the default credentials:
•
12.4(11)T or later
•
12.4(11)SW, 12.4(11)SW1, 12.4(11)XV, 12.4(11)XJ
•
12.4(9)T5, 12.4(9)T6
Follow the procedure in this section to secure the router by creating a new username and password, to remove the login banner and exec banner warnings, and to save the configuration changes to the router startup configuration.
Note
If you log into the router using a Telnet or a console connection but do not complete the steps in this procedure, be aware of the following:
•
If you do not change the default username and password, and then log off the router, you will not be able to log into the router again without entering the reload command. No additional warning is given before you log off.
•
If you do not change the default username and password, but do enter the write memory command before ending the session, future logins will be disabled. In this case, you will need to follow the password recovery procedure at the following link:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_tech_note09186a00801746e6. shtml
To secure the router, remove the banner warnings and save the changes to the router startup config, complete the following steps:
Step 1
Connect the blue console port on your router to a serial port on your PC using the light blue console cable, included with your router. Refer to your router's hardware installation guide for instructions.
Step 2
Connect the power supply to your router, plug the power supply into a power outlet, and turn on your router. Refer to your router's quick start guide for instructions.
Step 3
Use HyperTerminal or a similar terminal emulation program on your PC, with the terminal emulation settings of 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control, to connect to your router.
Step 4
When prompted, enter the username cisco, and password cisco.
Step 5
Enter configuration mode by entering the following command:
yourname# configure terminalStep 6
Create a new username and password by entering the following command:
yourname(config)# username username privilege 15 secret 0 passwordReplace username and password with the username and password that you want to use.
Step 7
Remove the default username and password by entering the following command:
yourname(config)# no username ciscoStep 8
To remove the login banner, enter the following command:
yourname(config)# no banner loginThe login banner warning will no longer appear.
Step 9
To remove the exec banner, enter the following command:
yourname(config)# no banner execThe exec banner warning will no longer appear.
Step 10
Leave configuration mode, by entering the following command:
yourname(config)# endStep 11
Copy the configuration changes to the startup configuration by entering the following command:
yourname# copy running-config startup-config
When logging into the router in the future, use the username and password that you created in Step 6.
Cisco CP Merge and Replace Configuration Functions Fail Under Some Conditions
The problem described here is caveat CSCsj21989. If you attempt to merge configuration changes made using the Cisco CP Config Editor feature, or replace the running configuration with a configuration from the Config Editor, the router configuration will not be changed if there is a network device with a Network Address Translation (NAT) IP address, or a cache engine in the connection between the PC and the router. If you need to make changes to the router configuration that you would normally make using the Cisco CP Config Editor, use the Cisco IOS CLI instead.
Another problem described here is caveat CSCtj28175. Replacing the running configuration could fail because of various reasons. The following are a few of the possible causes:
•
Running configuration contains one or more interactive commands which are not supported in Cisco CP.
•
Port 21 is already in use for other applications, for example, FTP server. If this is the case, disable the FTP server and try this operation again.
•
Connection to the device was lost.
Cisco CP Security Dashboard May Display Threats Unrelated to Your Cisco IOS IPS Installation
Some (or all) of the top threats you obtain using the Cisco CP Security Dashboard may not pertain to your Cisco IOS IPS installation. After you deploy the signatures applicable to the top threats displayed by the Cisco CP Security Dashboard, the dashboard may still display some (or all) top threats with a red icon because applicable signatures could not be found. Those remaining top threats are unrelated to your Cisco IOS IPS installation and are not a danger to your router running Cisco IOS software.
Cisco CP May Lose Connection to Network Access Device
This note concerns the Network Admission Control (NAC) feature.
If the PC used to invoke Cisco CP returns a posture state (Healthy, Infected, Checkup, Quarantine, or Unknown) and if the group policy on the ACS server attached to the posture token assigned to the PC has a redirect URL configured, the connection between Cisco CP and the router acting as the Network Access Device (NAD) may be lost. The same problem can occur if an exception list entry attached to a policy with a redirect URL is configured with the IP address or MAC address of the PC.
If you try to reinvoke Cisco CP from this type of PC, you will not be able to do so because the browser will be redirected to the location specified in the redirect URL.
There are two workarounds for this problem:
•
Ensure that the PC that you use to invoke Cisco CP attains a posture token that has an associated group policy on the ACS server that is not configured with a redirect URL.
•
Alternatively, use Cisco CP to create a NAC exception list entry with the IP address or MAC address of the PC you use to invoke Cisco CP. Note that the exception list entry created for the PC should be associated to an exception policy that does not have a redirect URL configured in it.
For more information, see the links on the Cisco CP NAC online help pages.
Popup Blockers Disable Cisco CP Online Help
If you have enabled popup blockers in the browser you use to run Cisco CP, online help will not appear when you click the help button. To prevent this from happening, you must disable the popup blocker when you run Cisco CP. Popup blockers may be enabled in search engine toolbars, or may be standalone applications integrated with the web browser.
Microsoft Windows XP with Service Pack 2 blocks popups by default. To turn off popup blocking in Internet Explorer, go to Tools > Pop-up Blocker > Turn Off Pop-up Blocker.
If you have not installed and enabled third-party pop up blockers, go to Tools > Internet Options > Privacy, and uncheck the Block popups checkbox.
Screencasts for Cisco CP Features
Instead of online help, screencasts have been provided for the following Cisco CP 2.4 features:
•
3G Feature Enhancements
•
Bulk Import
•
Cisco Unified CME B-ACD
•
Configuration Editor
•
Flash File Management
•
Module Configuration
•
SIP Trunk
•
VoIP Dial Peer
These screencasts are located at: http://www.cisco.com/en/US/docs/net_mgmt/cisco_configuration_professional/scrcst/ccpsc.html
You must have Internet access to view the screencasts.
Temporary Internet Files—Impact on Launch
Because of Microsoft Windows Java caching issues, Cisco CP is sometimes unable to complete discovery of a device. To fix this issue, complete the following steps:
Step 1
Choose Application > Exit to shut down Cisco CP.
Step 2
Close all existing IE windows.
Step 3
Go to Start > Control Panel > Java. The General tab is displayed.
Step 4
In the Temporary Internet Files box, click Delete Files.
Step 5
In the displayed dialog, leave all file types checked, and click OK.
Step 6
Click OK in the Java control panel to close it.
Step 7
Restart Cisco CP.
Internet Explorer Zoom Level - Impact on Some Cisco CP Screens
If the browser's zoom level is set to a value other than 100%, some portions of the Java screens in Cisco CP are not seen. To fix this issue, complete the following steps:
Step 1
Close the Cisco CP application.
Step 2
Launch Internet Explorer and reset the zoom level to 100% using the "zoom level" selection on the status bar.
Step 3
Close Internet Explorer.
Step 4
Launch Cisco CP.
Caveats
Caveats describe unexpected behavior in Cisco CP. This section contains the following:
Resolved Caveats
Table 13 lists caveats that are resolved in Cisco CP 2.4.
Open Caveats
Table 14 lists caveats that are open in Cisco CP 2.4.
Related Documentation
Table 15 describes the related documentation available for Cisco CP.
Note
For information on obtaining documentation and technical assistance, product security, and additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Glossary
ACEs—Access List Elements
ACLs—Access Control Lists
B-ACD—Basic Automatic Call Distribution
CUBE—Cisco Unified Border Element
HWIC—High-Speed WAN Interface Card
HSPA—High-Speed Packet Access
HSPA—A—High-Speed Packet Access for Americas
HSPA—G—High-Speed Packet Access for Global
MQC—Modular QoS Command
PCEX—PC Express
SID—System Identification Number
NID—Network Identification Number
ESN—Electronic Serial Numbers
PDP—Packet Data Protocol (PDP)
PPP—Point-to-Point Protocol (PPP) PDP type
REP—Resilient Ethernet Protocol
STP—Spanning Tree Protocol
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/web/siteassets/legal/trademark.html. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
© 2010 Cisco Systems, Inc. All rights reserved.