Class Snap

Class Snap

Saturday, February 24, 2018

CUCM 10.5 - MGCP w/ BRI not supported with Single Number Reach - Incoming calls to In-Dial Numbers failing when dialing from a Mobile Phone whose number is registered in CUCM as a Remote Destination for Single Number Reach


So we had an issue for months where if Single Number Reach (Mobility Connect Features) were enabled for users and if they would then use their mobile phones to dial in to the in-dial range (company extensions) the calls would fail, they would then have to block their CLID on their mobile phones before making the call for it to work.

Issue: Users having to have to block their caller-id to dial in to the office main line or that their SNR has stopped working all of a sudeen.


CUCM 10.5.2.10000-5


Temp fix: 
The root cause of the issue turned out to be the following:

So we basically had MGCP BRI in our environment with SNR activated. The option to get away from this was to NOT use BRI in your environment if we want to implement SNR function, need to get rid of the BRI MGCP irrespective of whether it's in use or no. 

Cisco developers confirmed that BRI is the source of “CellProxyCdpc” leaking which cause SNR call reaches the limit.  Document “Features and Services Guide for Cisco Unified Communications Manager, Release 10.0(1)” chapter “Cisco Mobility” says:

"Gateways and Ports  Both H.323 and SIP VoIP gateways are supported for Mobile Voice Access.  Cisco Unified Mobility features do not get supported for T1 CAS, FXO, FXS and BRI."

MGCP and BRI is not supported by the SNR feature because  BRI couldn’t tell the SNR process to terminate the call.

Mobile Connect features do not get supported for T1 CAS, FXO, FXS and BRI.
These SNR calls through MGCP GWs cause CellProxyCdpc  process leaked hence the problem

UCCX Data Source Offline - Environment has 3rd Party Wallboard

Had an ongoing issue with the UCCX Data Source going offline and we were using a third party wallboard application... this would result in Agents not being able to view realtime stats on the wallboard.

If you have a similar issue with a similar setup then you would want to rule out any bugs on the CCX (we had to apply a few cop files for what looked like a bug) however finally the issue turned out to be the settings on the 3rd party app ...

Basically Cisco does not support issues if you have a 3rd party wallboard using the UCCXHR User for polling (reading from the CUIC DB), it should use the UCCXWallboard User for it's queries.


  • Cisco recommend you don’t poll faster than 5 seconds on uccxwallboard user
  • If the timers are too aggressive on the wallbaord app (like every 2 seconds) then you will face UCCX DB crashing issues, the polling timers should be changed to poll every 5 or 10 seconds at minimum
  • UCCX is not supported by TAC if a 3rd party wallboard is installed and using the UCCXHRUser as opposed to the UCCXWallboardUser. 

UCCX 11.5 - Second Node Installation Error "Configuration validation with UCCXSRV failed. Configured first node UCCXSRV is not a first node -is UCCXSRV entered correctly? -is UCCXSRV the correct first node for this node"

To summarize: Make sure if you reset the security password on the Publisher (even if it's right) using the procedure below and then try installing again if you hit this error.

Had a nightmare with this issue (both servers on the LAN).

Verified the security password was correct as it tells you when you try to reset it back to the same old password so then after taking log dumps over the serial port and analysing the logs it said the below which meant there was an issue with the security password.

02/23/2018 01:22:30 IPM|(CAPTURE) head: cannot open `/usr/local/platform/.security/CCMEncryption/keys/encrypted_Dkey.txt' for reading: No such file or directory|<LVL::Debug>
02/23/2018 01:22:30 IPM|(CAPTURE) isftp using password failed (15). Trying sftp using keys.|<LVL::Debug>
02/23/2018 01:22:30 IPM|(CAPTURE) Required file /usr/local/platform/conf/platformConfig.xml not present on first node (active)|<LVL::Debug>

02/23/2018 01:22:30 IPM|(CAPTURE) isftp using password failed (15). Trying sftp using keys.|<LVL::Debug>

Procedure
Step 1  Log in to the system with the following username and password:
  • Username: pwrecovery
  • Password: pwreset
    The Welcome to platform password reset window appears.
Step 2  Press any key to continue.
Step 3  If you have a CD or DVD in the disk drive, remove it now.
Step 4  Press any key to continue.
The system tests to ensure that you removed the CD or DVD from the disk drive.
Step 5  Insert a valid CD or DVD into the disk drive.
Note   
For this test, you must use a data CD, not a music CD. The system tests to ensure that you have inserted the disk.
Step 6  After the system verifies that you have inserted the disk, you are prompted to enter one of the following options to continue:
  • Enter a to reset the Administrator password.
  • Enter s to reset the security password.
  • Enter q to quit.
Step 7  Enter a new password of the type that you chose.
Step 8  Reenter the new password.
The password must contain at least six characters. The system checks the new password for strength. If the password does not pass the strength check, you are prompted to enter a new password.
Step 9  After the system verifies the strength of the new password, the password is reset. You are prompted to press any key to exit the password reset utility.


So used the above procedure to change the Security Password on the Publisher and rebooted the node, then went over the install again and it went through fine (did ask me for "more time") but ultimately went through fine. 

Then tried installing a .cop file to math what's on the publisher and hit the following bug so had to restart the install from the CLI and all good.

Attempted to upgrade the system to ES03 but we ran into the defect:

Saturday, February 17, 2018

Cisco CCNA Routing and Switching - 3 Weeks Bootcamp

The next Cisco CCNA R&S Bootcamp starts March 18, 2018. Below are details of the topics covered in the course. Topics marked with a "*" are topics that will be covered in very much detail in the lab with hands-on, the rest of topics will be covered in the lab as well but not in as much detail and are also topics that are very important from an administrator/network engineer point of view. Completing this class will enable to you be competitive in the job market as well as on your job, we focus o lot on hands-on and lab practice with scenarios.

To view the list of topics on the CCNA Exam below is a link:
https://learningnetwork.cisco.com/community/certifications/ccna/ccna-exam/exam-topics

Topics: 

- Introduction to Networking (Firewalls, AP's, Route Switch, Voice, Virtualization, etc..)
- VLAN's *
- CDP
- Link Aggregation (PAGP, LACP)
- LLDP
- STP *
- IP Subnetting *
- Basics of Routing
- Routing Concepts
- SVI
- OSPF *
- EIGRP *
- RIP v2 *
- Static Routing *
- Qos
- DMVPN/S2S VPN/ VPN Technology/GRE
- TFTP, DHCP, DNS and Basic Infrastructure Components
- NAT and HSRP
- Port Security *
- ACL's *
- TACAC's and RADIUS
- Network Monitoring - SFTP, FTP, TFTP, Syslog, SPAN

Class Format - Classes are conducted thrice a week (dates are decided on the first day of the class in consensus with all attending)

Class Fee - AUD 1200/- to be paid in cash or via paypal. To reserve a seat on the class you may do so by paying a booking fee of AUD 300/- which is non-refundable should you decide not to attend however if you decided to postpone you can join a later class by paying the difference. Class fee is to be paid in total prior to the start of the class, you may attend a demo class with an on-going batch free of charge.



Class Session Booking Payment