Cisco Systems 15.3.00P1 manual Network Monitor Limitations, Chassis View Operation

Page 31

CWM Feature Limitations

The Configurator can be started on either the primary CWM or the secondary CWMs, but devices can be added, modified, or deleted using the Configurator only on the primary CWM.

The CWM gateway role is undefined or unknown when links between the primary and corresponding secondaries are unstable. When a CWM gateway is in an undefined or unknown role, a core dump sometimes occurs.

All of the above CWM-to-CWM communication limitations listed also apply to the SCM gateway.

Network Monitor Limitations

Network nodes are managed differently depending on the network configuration. See the following configurations:

In a single routing node PNNI network, the node is managed by using the IP address specified in the network.conf file.

In the case of a PXM45-based or PXM1E-based MGX network, these PXM45-based or PXM1E-based MGX nodes are managed by using the primary IP address, which is specified by using the cnfndparms command and specifying Option 7 or 8 (depending on chassis type). Configure the trap IP address with the primary IP address.

PXM1-based MGX nodes connected to PXM45-based MGX nodes are managed through the atm0 IP address. If atm0 is not set, the LAN IP address is used to manage the PXM1-based MGX nodes. Use the cnftrapip command to configure the trap IP address accordingly.

As of CWM 15.0.00 and later, the SHOW_TOPO_VIEW flag in the CMSCClient.conf file is used to configure if nodes and trunks are displayed in the topology display of the Network Monitor application at CWM startup. Each flag determines what you see when the NWTopology opens:

SHOW_TOPO_VIEW 1 = You see nodes and trunks in the topology.

SHOW_TOPO_VIEW 0 = You cannot see nodes and trunks in the topology.

In releases prior to CWM 15.0.00, a flag named TOPO_SHOW_MAP in the /usr/users/svplus/config/CwmGs.conf file was used to configure if nodes and trunks were displayed in the topology display of the Network Monitor application at CWM startup. Because this flag is now obsolete, you should use the SHOW_TOPO_VIEW flag in the CMSCClient.conf file instead.

Chassis View Operation

This section describes different aspects of the Chassis View operation in the CWM:

Chassis View Card Operation in a Redundant Setup, page 32

RPM Card Behavior based on the Chassis View Flag Value, page 32

Chassis View Operation after Card and Line Switchover, page 32

 

 

Release Notes for the Cisco WAN Manager, Release 15.3.00 P1

 

 

 

 

 

 

 

OL-11190-01, Rev. C0

 

 

31

 

 

 

 

 

Image 31
Contents Release Notes for the Cisco WAN Manager Release 15.3.00 P1 ContentsReleases Supported by CWM 15.3.00, Patch Switch Platform Supported Software ReleaseCWM Server Requirements System RequirementsStandalone Statistics Manager Requirements Java Client RequirementsSwap Min Endpoints No. Speed Intervals Cisco TestingMin Average Stats Files Max. No. Connection Min SegmentInstalling the Patches Before You Begin Installing PatchesSolaris Patch Requirements Informix Requirements HP OpenView RequirementsPatches Solaris Scmsa CWM PackagingSoftware JDKNew Hardware Supported by CWM 15.3.00, Patch Supported HardwareExisting Hardware Supported by CWM 15.3.00, Patch Front Card Back Card IGX 8400 SeriesBPX 8600 Series MGX 8220 Series MGX 8230 Series MGX 8250 Series MGX 8850 Series MGX-VXSM-6T3 VXSM-BC-SMB-3T3E3 MGX-RPM-128M/B MGX-MMF-FE MGX-RJ45-FEPXM1E on MGX 8830, 8830/B, 8850, and 8850/B Series PXM1E-COMBO PXM-UI-S3/B MGX-SRME MGX-SRME/B MGX-BNC-3T3-M MGX-STM1-EL-1MMF/SMFIR/SMFLR-1-155-SFP PXM-UI-S3/BFront Card Back Cards MGX 8830/B PXM 45/C SeriesMGX 8850 and 8850/B PXM 45 Series VXSM-BC-24T1E1 MGX-VXSMPXM45/B PXM-HD PXM-UI-S3 PXM45/C PXM-UI-S3/B MGX 8950 PXM 45 Series MGX 8880 PXM45/C SeriesMGX-VXSM-155 MGX-VXSM-T1E1 VXSM-BC-24T1E1 MGX-VXSM-6T3 VXSM-BC-SMB-3T3E3PXM1 PXM-UI PXM-UI-S3 SES Pnni ControllerReleases Certified for CWM 15.3.00 P1 Card, Shelf, or SwitchCWM Feature Limitations New Features and EnhancementsFeatures Not Supported Forceload sys/shmsys Forceload sys/semsys Feature LimitationsShmbase 0x0A000000L CWM Feature Limitations CWM Feature Limitations CWM Feature Limitations SSM Issues Configuration Center LimitationsHP OpenView Limitations CWM-to-CWM Communication Limitations Chassis View Operation Network Monitor LimitationsWhen set to true Chassis View Card Operation in a Redundant SetupChassis View Operation after Card and Line Switchover When set to falseCWM Notes and Cautions Installing and Uninstalling CWM 15.3.00 P1Before You Start Installing and Uninstalling CWM 15.3.00 P1 SSC Installing PatchComponent File CWMBacking Up the Existing Database Installing the CWM Server PatchRemove the disk1 directory if it exists # dbimport stratacom -d datadbs -i dbexport-location Verifying and Restoring Your Saved DatabaseIf no separate partition exists for datadbs, do these Installing the CWM SNMPAgent ServiceAgent PatchInstalling the SSM Patch Installing the SSC PatchInstalling the RTM Proxy Patch Creating a CWM Auto-Restart Shell Script Uninstalling PatchInstalling Wandest 2.7.00, Patch Installing Wandest 2.7.00, PatchInstalling the Wandest Client Patch Installing the Wandest Server PatchSnmp Service Agent Trap Limitation Bug ID Headline Issues Resolved in the CWM 15.3.00, Patch 1 SoftwareCaveats Bug ID Description Details and WorkaroundRelated Documentation Obtaining Documentation, Support, and Security Guidelines OL-11190-01, Rev. C0

15.3.00P1 specifications

Cisco Systems 15.3.00P1 is a pivotal release in the evolution of Cisco's IOS (Internetwork Operating System). This version introduces a range of features and enhancements aimed at improving network reliability, security, and performance. Built to support various networking scenarios, 15.3.00P1 serves as a robust platform for enterprises and service providers alike.

One of the standout features of 15.3.00P1 is its enhanced support for IPv6, which is increasingly vital as the internet continues to evolve. This version includes improved routing protocols and mechanisms that allow seamless integration and transition between IPv4 and IPv6. This dual-stack support ensures that network operators can manage their resources efficiently while preparing for the future.

Quality of Service (QoS) enhancements in Cisco IOS 15.3.00P1 help prioritize critical traffic flows, enabling organizations to allocate bandwidth according to application needs. This is particularly beneficial in environments where latency-sensitive applications, such as VoIP and video conferencing, are prevalent. The precise control over traffic helps reduce congestion and ensures a smooth user experience.

Security features have been significantly bolstered in this release. It includes advanced threat detection capabilities and improved access control lists (ACLs), allowing for more granular security policies. The enhanced security framework helps protect network devices from a variety of threats, ensuring that data integrity and confidentiality are maintained.

Another critical improvement in this version is its enhanced multicast routing capabilities. This is particularly essential for organizations utilizing video or other bandwidth-intensive applications that require efficient data delivery to multiple endpoints. The use of protocols such as Protocol Independent Multicast (PIM) facilitates efficient routing and reduces bandwidth consumption.

Cisco 15.3.00P1 also features better support for various hardware platforms, ensuring compatibility and optimal performance across Cisco routers and switches. The architecture enhancements allow for improved system resource management, reducing operational overhead while maximizing performance.

In addition to these features, the release incorporates several bug fixes and performance optimizations, addressing issues in previous versions. This attention to detail not only enhances system stability but also contributes to a more streamlined user experience.

Overall, Cisco Systems 15.3.00P1 represents a significant step forward in network operating systems, with its array of security, performance, and management enhancements making it an ideal choice for modern networking environments. Organizations deploying this version can expect improved operational efficiency and a more secure networking experience.