Certificate CUCM

Hello,
When your regenerate the certificate CERTS on the call manager (OS Administration), all of the main certificate CERTS are regenerate (IP SEC/TOMCAT/CAPF..)
But how regenerate the trust-cert ?  How to know which ressource use this trust-cert certificate ? End after the generation, what's the impact on my network ?
Thanks for ur help guys

Deleting certificates isn't as simple as hitting "Delete" :-/
http://www.cisco.com/c/en/us/support/docs/unified-communications/unified-communications-manager-callmanager/117299-problemsolution-product-00.html
GTG

Similar Messages

  • Addon Phone liceses for BE6K

    Hi,
    Is there a top level SKU for adding phone licenses to a existing Business Edition setup?
    I beleive the SKU for standard CUCM should also work for BE 6K as well.
    L-CUCM-USR-LIC-ADD
    Top Level Sku For Adding User   License
    CM-RTU
    Unified CM RTU claim certificate
    CUCM-PAK
    Include PAK Auto-expanding PAK   for CUCM
    CUCM-USR
    Include PAK Auto-expanding User   for CUCM
    LIC-CUCM-ESS-A
    UC Manager Essential - Less than   1K Users
    LIC-CUCM-USR-A
    Unified Communications Manager   Enhanced Single User-Under 1K
    Please suggest.
    Thanks,
    Nirmal

    Blake,
    So you are saying both "R-UNIFIED-CMBE5K" and "L-CM-DL-100=" part codes are valid if we have to order addon licenses for Business Edition server running call manager version 7.1.2 ?
    I am confirming this beacuse my local Cisco SE told me that "L-CM-DL-100=" part code will not work and aksed us to go with other one.
    Can you also clarify how the licenses work in the backend for BE servers, I beleive it should be same as call manager where you associate license mac with the file and the uploaded license gets converted into DLUs for phones to use?
    I am really confused here, please help.
    Thanks,
    Nirmal

  • Unity Connection - Certificate from cucm no more trusted for encrypted calls after upgrade to 10.5(1)

    Hello Support Community,
    i have a strange problem:
    after upgrading my cucm and unity connection from 9.1 to 10.5(1) enctrypted calls are no more working.
    situation 1: CUCM is down, Subscriber is up: Encrypted call to Unity Connection work correctly
    situation 2: CUCM is up: Encrypted Calls to Unity Connection not working.
    i get the following Info in the log for the Connection Conversion Manager:
    19:35:21.053 |15865,,,MiuGeneral,25,Invalid Certificate: Received Certificate -----BEGIN CERTIFICATE-----
    MIID8zCCAtugAwIBAgIQc/fBdUz1Zdh4CXhcPqGVuDANBgkqhkiG9w0BAQsFADBw
    MQswCQYDVQQGEwJERTELMAkGA1UEChMCSVQxGzAZBgNVBAsTEkhlbGxnYXRlIFRl
    XD0oD9d5MQ==
    -----END CERTIFICATE-----
     doesn't match with stored Certificate: -----BEGIN CERTIFICATE-----
    MIIC2DCCAkGgAwIBAgIIJWCm4bSdt+kwDQYJKoZIhvcNAQEFBQAw
    -----END CERTIFICATE-----
    so where does Unity Connection cache this certificate and how can i delete/replace it?
    the cert shown in the logs is the one from cucm: ("CallManager"), i recreated it through cucm os administration, now i see the same error message on unity connection for the new recreated certificate.

    Actually It doesn't. It says he's on a MacBook. I don't know all the different types of Macs. I was having a ton of problems with iChat. I opened DMZ to my computer, knocked down all firewalls etc and left everything exposed, still with bad results. A few weeks ago my power supply went out on my D-Link. I bought a linksys. Since I'd left all firewalls off I figured it couldn't be the router. I power cycled everything n the netork, still no luck. Today I bought a universal Power supply and started up my D-Link Router. Everything worked perfectly. My wifes computer - a laptop running Tiger worked fine with the Linksys and did my machine before the Leopard upgrade. Now that I've got the D-Link online everythings working.
    Message was edited by: graphico
    Message was edited by: graphico

  • Fail to install a trusted(SSL) certificate on CUCM 10.5

    Hi Guys,
    I have generated CSR from CUCM and have got it signed by CA.:
    There are two kinds of certs in the cert chain - CA certs and end-entity certs. For example, the cert represent your box is "cucm01.acme.local". This is end-entity cert.
    "cucm01.acme.local" was issued by a CA called "parent.someCA.com".
    "parent.someCA.com" was issued by a CA called "grandparent.someCA.com".
    And "grandparent.someCA.com" is the top (root) CA.
     I'm trying to upload the signed CA by following steps:
    1.Upload "grandparent.someCA.com" as "Tomcat Trust" cert.
    2.Upload "parent.someCA.com" as "Tomcat Trust" cert.
    3. Upload "cucm01.acme.local" as "Tomcat" cert. In the "Root Certificate" field, you should fill in the .pem file name of its parent.on the OS admin page > Security > Certificate Management.
    The issue is on step 3, I couldn't find any  "Root Certificate" field in both "Tomcat" cert and "Tomcat Trust" cert.  Please see attached screenshot.
    Is there any step I missed or wrong?
    Please advise,
    Thanks,
    Cherry

    when I try to access CUCM with its hostname, it still shows "There is a problem with this website's security certificate."
    I click errors to view the details. It shows."This CA Root certificate is not trusted because it is not in the Trusted Root Certification Authorities store."
    But I have opened the root CA and installed them into Trusted Root Certification Authorities.

  • CUCM OS Administration - Certificate Monitor

    Does anybody know if more than one email address can be entered in the "E-mail IDs" box in the OS Administration / Security / Certificate Monitor configuration item?  The fact that it states "E-Mail IDs" plural makes me think that you can, but I have tried a list of email addresses separated with spaces, commas and semicolons and each time I click save, I get two error messages: "An invalid email address was given" and "Email Addresses is invalid".  All of the documentation I can find on this states "Enter the e-mail address to which you want notifications sent." but it doesn't say anything about a separated list of email addresses.  I know I can send it to a distribution list, as that is what I am currently doing but I get complaints from some of the members since these notifications don't apply to them.  I would rather enter multiple email addresses than have to create a new DL just for these notifications. By the way, incase it varies by product/version, I am specifically asking about a CUCM 7.1.5 installation.

    Try restarting tomcat
    Also please post in the right forum, this one is for video over ip
    Sent from Cisco Technical Support iPad App

  • CUCM certificate expire

    we have CUCM cluster  Ver. 7.1  run in secure mode we get the below error :
    At Sun May 25 08:00:05 EEST 2014 on node 10.20.30.40, the following SyslogSeverityMatchFound events generated: SeverityMatch - Emergency : 356: May 25 05:00:00.27 UTC : %CCM_UNKNOWN-CERT-0-CertExpiryEmergency: Certificate Expiry EMERGENCY_ALARM Message:Certificate expiration Notification. Certificate name:CAPF-1f03103a Unit:CallManager-trust Type:trust-cert Expiration:Sun May 18 App ID:Cisco Certificate Monitor Cluster ID: Node ID:CUCM-PUB SeverityMatch - Emergency : 357: May 25 05:00:00.27 UTC : %CCM_UNKNOWN-CERT-0-CertExpiryEmergency: Certificate Expiry EMERGENCY_ALARM Message:Certificate expiration Notification. Certificate name:CAPF-1f03103a Unit:CAPF-trust Type:trust-cert Expiration:Sun May 18 23:40:0 App ID:Cisco Certificate Monitor Cluster ID: Node ID:CUCM-PUB At Sun May 25 08:00:05 EEST 2014 on node 10.20.30.40, the following SyslogSeverityMatchFound events generated: SeverityMatch - Emergency : 356: May 25 05:00:00.27 UTC : %CCM_UNKNOWN-CERT-0-CertExpiryEmergency: Certificate Expiry EMERGENCY_ALARM Message:Certificate expiration Notification. Certificate name:CAPF-1f03103a Unit:CallManager-trust Type:trust-cert Expiration:Sun May 18 App ID:Cisco Certificate Monitor Cluster ID: Node ID:CUCM-PUB SeverityMatch - Emergency : 357: May 25 05:00:00.27 UTC : %CCM_UNKNOWN-CERT-0-CertExpiryEmergency: Certificate Expiry EMERGENCY_ALARM Message:Certificate expiration Notification. Certificate name:CAPF-1f03103a Unit:CAPF-trust Type:trust-cert Expiration:Sun May 18 23:40:0 App ID:Cisco Certificate Monitor Cluster ID: Node ID:CUCM-PUB 
    and we had modify the time on the server from one week and since this we get this error ,
    any one can help urgent please 

    If that matches the CAPF.pem from the publisher that signed all of your LSCs, you'll need to regenerate the CAPF certificate, restart CAPF service, re-run the CTL client, and then do a CAPF Install/Upgrade on all phones to push out new LSCs in bulk signed by the new CAPF certificate.  Once that is all done, you can delete the old CallManager-trust certificates for the expired CAPF certificate.
    You can visit most phones' web pages via HTTPS and check what cert is shown in the browser to see which certificate signed the LSC on each phone.  There's tools out there to do this kind of thing in bulk.
    If the CAPF certificate that signed the phones' LSCs expires and the phones have a security profile configured, they will fail to re-register if they reset for any reason.  If they don't reset, they'll be fine forever but it's a ticking time-bomb situation.  Extension Mobility environments are affected immediately since every login/logout resets the phones.
    I'd suggest opening a TAC case under the CUCM Security/CTL sub-technology keyword so that they can take a look at your specific situation.

  • Installing new SSL certificate on CUCM 7.1 (Verisign or Geotrust)

    Hello,
    I am trying to search CCO for a guide for installing a trusted certificate on a CUCM server to eliminate the SSL browser warnings.  Could anyone point me to such a guide?
    Thanks!

    http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/cucos/7_1_2/cucos/iptpch6.html#wp1046223
    Michael
    http://htluo.blogspot.com

  • How to regenerate security certificates? CUCM 6.1.3

    Hi,
    Company has a call manager with 3 nodes on version 6.1.3:
    - NODO1: 10.102.224.254
    - NODO2: 10.102.224.253
    - NODO3: 10.102.239.20
    From S.O. web can be seen that some certs are going to expire. We have received a warning via e-mail. And we have checked opening certifications that expiration date is about to happen.
    This is the security mode configuration:
    Service parameters --> Publisher --> Call Manager-->Security Parameters
    Cluster Security Mode: 1
    CAPF Phone port:3804
    CAPF Operation expires in (days):10
    Enable caching: false
    Certificates that are going to expire are the following:
    CallManager_pem
    CallManager_der
    CAPF_pem
    CAPF_der
    CAPF-e09c40eb_pem
    CAPF-e09c40eb_der
    ipsec_cert_der
    ipsec_cert_pem
    NODO1_der
    NODO1_pem
    tomcat_cert_der
    tomcat_cert_pem
    At publisher, it can be seen no CTI file,
    show itl
    Executed command unsuccessfully
    No valid command entered
    There is only a CTL file, and it´s the following:
    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.02.19 17:47:46 =~=~=~=~=~=~=~=~=~=~=~=
    show ctl   //Note: at the following file, some digits of the "SIGNATURE" have been changed with "*". And some name. Nothing else.
    Length of CTL file: 5946
    Parse CTL File
    Version:          1.2
    HeaderLength:          304 (BYTES)
    BYTEPOS          TAG                    LENGTH          VALUE
    3          SIGNERID          2          117
    4          SIGNERNAME          56
    5          SERIALNUMBER          10
    6          CANAME          42
    7          SIGNATUREINFO          2          15
    8          DIGESTALGORTITHM          1
    9          SIGNATUREALGOINFO          2          8
    10          SIGNATUREALGORTITHM          1
    11          SIGNATUREMODULUS          1
    12          SIGNATURE          128
    8d  e3  61  8a  d9  8  e  a3
    8d  5b  82  6f  51  81  a3  1b
    e2  fe  e5  57  66  f7  ab  54
    f  69  fb ** 72  bf  3f  a1
    ee  ea  a3  fb  b5  80  0  af
    74  20  ac  b  92  b0  c5  fd
    fa  f6  6e  52  c3  90  25  e1
    2a  ** 83  f0  ee  4f  d3  9b
    2e  6b  c4  4d  45  79  40  41
    f2  b7  3  7e  7f  7a  **  b4
    76  cc  45  e2  52  b1  4e  63
    74  b1  a7  d8  36  97  22  47
    8a  80  63  88  67  7e  7a  8d
    2d ** eb  24  57  7b  c2  74
    cf  4  bb  9d  dd  b1  a  a
    e7  a9  5a  58  88  0  3f  67
    14          FILENAME          12
    15          TIMESTAMP          4
    CTL Record #:1
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          1186
    2          DNSNAME                    1
    3          SUBJECTNAME          56          cn="SAST-ADN597e8314        ";ou=IPCBU;o="Cisco Systems
    4          FUNCTION          2          System Administrator Security Token
    5          ISSUERNAME          42          cn=Cisco Manufacturing CA;o=Cisco Systems
    6          ISSUERNAME          10
    7          PUBLICKEY          140
    9          CERTIFICATE          902
    10          IPADDRESS          4
    This etoken was not used to sign the CTL file.
    CTL Record #:2
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          1180
    2          DNSNAME                    1
    3          SUBJECTNAME          56          cn="SAST-ADN592dfe14        ";ou=IPCBU;o="Cisco Systems
    4          FUNCTION          2          System Administrator Security Token
    5          ISSUERNAME          42          cn=Cisco Manufacturing CA;o=Cisco Systems
    6          ISSUERNAME          10
    7          PUBLICKEY          141
    9          CERTIFICATE          895
    10          IPADDRESS          4
    This etoken was used to sign the CTL file.
    CTL Record #:3
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          765
    2          DNSNAME                    15          10.102.224.253
    3          SUBJECTNAME          13          cn=NODO2
    4          FUNCTION          2          CCM+TFTP
    5          ISSUERNAME          13          cn=NODO2
    6          ISSUERNAME          8
    7          PUBLICKEY          140
    9          CERTIFICATE          541
    10          IPADDRESS          4
    CTL Record #:4
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          765
    2          DNSNAME                    15          10.102.224.254
    3          SUBJECTNAME          13          cn=NODO1
    4          FUNCTION          2          CCM+TFTP
    5          ISSUERNAME          13          cn=NODO1
    6          ISSUERNAME          8
    7          PUBLICKEY          140
    9          CERTIFICATE          541
    10          IPADDRESS          4
    CTL Record #:5
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          982
    2          DNSNAME                    15          10.102.224.254
    3          SUBJECTNAME          43          cn=CAPF-e09c40eb;ou=AREA TIC;o=NOMBREX
    4          FUNCTION          2          CAPF
    5          ISSUERNAME          43          cn=CAPF-e09c40eb;ou=AREA TIC;o=NOMBREX
    6          ISSUERNAME          8
    7          PUBLICKEY          140
    9          CERTIFICATE          698
    10          IPADDRESS          4
    CTL Record #:6
    BYTEPOS          TAG                    LENGTH          VALUE
    1          RECORDLENGTH          2          764
    2          DNSNAME                    14          10.102.239.20
    3          SUBJECTNAME          13          cn=NODO3
    4          FUNCTION          2          CCM+TFTP
    5          ISSUERNAME          13          cn=NODO3
    6          ISSUERNAME          8
    7          PUBLICKEY          140
    9          CERTIFICATE          541
    10          IPADDRESS          4
    The CTL file was verified successfully.
    Certificates at publisher are the following:
    admin:show cert list own
    tomcat
    ipsec
    CallManager
    CAPF
    admin:show cert list
    ipsec-trust/NODO1.pem
    ipsec-trust/NODO1.der
    ipsec-trust/c92d8a04.0
    CallManager-trust/CAP-RTP-001.pem
    CallManager-trust/CAP-RTP-002.pem
    CallManager-trust/Cisco_Manufacturing_CA.pem
    CallManager-trust/Cisco_Root_CA_2048.pem
    CallManager-trust/a0440f4c.0
    CallManager-trust/a69d2e04.0
    CallManager-trust/f7a74b2c.0
    CallManager-trust/dcc12642.0
    CallManager-trust/0d40b14e.0
    CallManager-trust/CAPF-7EC94D72.pem
    CallManager-trust/CAPF-97FA3FDE.pem
    CallManager-trust/CAPF-e09c40eb.pem
    CallManager-trust/3e92ebd9.0
    CallManager-trust/8eb380b0.0
    CAPF-trust/CAP-RTP-001.pem
    CAPF-trust/CAP-RTP-002.pem
    CAPF-trust/Cisco_Manufacturing_CA.pem
    CAPF-trust/Cisco_Root_CA_2048.pem
    CAPF-trust/a0440f4c.0
    CAPF-trust/a69d2e04.0
    [1mPress <enter> for 1 line, <space> for one page, or <q> to quit [0m
    [KCAPF-trust/f7a74b2c.0
    CAPF-trust/CAPF.der
    CAPF-trust/CAPF.pem
    CAPF-trust/dcc12642.0
    CAPF-trust/8eb380b0.0
    admin:utils service list
    Requesting service status, please wait...
    System SSH [STARTED]
    Cluster Manager [STARTED]
    Service Manager is running
    Getting list of all services
    >> Return code = 0
    A Cisco DB[STARTED]
    A Cisco DB Replicator[STARTED]
    Cisco AMC Service[STARTED]
    Cisco AXL Web Service[STARTED]
    Cisco Bulk Provisioning Service[STARTED]
    Cisco CAR Scheduler[STARTED]
    Cisco CAR Web Service[STARTED]
    Cisco CDP[STARTED]
    Cisco CDP Agent[STARTED]
    Cisco CDR Agent[STARTED]
    Cisco CDR Repository Manager[STARTED]
    Cisco CTIManager[STARTED]
    Cisco CTL Provider[STARTED]
    Cisco CallManager[STARTED]
    Cisco CallManager Admin[STARTED]
    Cisco CallManager Attendant Console Server[STARTED]
    Cisco CallManager Cisco IP Phone Services[STARTED]
    Cisco CallManager Personal Directory[STARTED]
    Cisco CallManager SNMP Service[STARTED]
    Cisco CallManager Serviceability[STARTED]
    Cisco CallManager Serviceability RTMT[STARTED]
    Cisco Certificate Authority Proxy Function[STARTED]
    Cisco Certificate Expiry Monitor[STARTED]
    Cisco DRF Local[STARTED]
    Cisco DRF Master[STARTED]
    Cisco Database Layer Monitor[STARTED]
    Cisco Dialed Number Analyzer[STARTED]
    Cisco DirSync[STARTED]
    Cisco Extended Functions[STARTED]
    Cisco Extension Mobility Application[STARTED]
    Cisco IP Manager Assistant[STARTED]
    Cisco IP Voice Media Streaming App[STARTED]
    Cisco License Manager[STARTED]
    Cisco Log Partition Monitoring Tool[STARTED]
    Cisco RIS Data Collector[STARTED]
    Cisco RTMT Reporter Servlet[STARTED]
    Cisco SOAP - CDRonDemand Service[STARTED]
    Cisco Serviceability Reporter[STARTED]
    Cisco Syslog Agent[STARTED]
    Cisco Tftp[STARTED]
    Cisco Tomcat[STARTED]
    Cisco Tomcat Stats Servlet[STARTED]
    Cisco Trace Collection Service[STARTED]
    Cisco Trace Collection Servlet[STARTED]
    Cisco UXL Web Service[STARTED]
    Cisco WebDialer Web Service[STARTED]
    Host Resources Agent[STARTED]
    MIB2 Agent[STARTED]
    Native Agent Adapter[STARTED]
    SNMP Master Agent[STARTED]
    SOAP -Log Collection APIs[STARTED]
    SOAP -Performance Monitoring APIs[STARTED]
    SOAP -Real-Time Service APIs[STARTED]
    System Application Agent[STARTED]
    Cisco DHCP Monitor Service[STOPPED]  Service Not Activated
    Cisco Extension Mobility[STOPPED]  Service Not Activated
    Cisco Messaging Interface[STOPPED]  Service Not Activated
    Cisco TAPS Service[STOPPED]  Service Not Activated
    Cisco Unified Mobile Voice Access Service[STOPPED]  Service Not Activated
    Primary Node =true
    admin:
    Perfil de seguridad Ej:para un CP-7960
    -Phone Security Profile Info
    Device Protocol: SCCP
    Name: SP_7960_Encriptado
    Description: Migrated Profile: Sec_mode 3 Auth_mode 2
    Device Security Mode: Encrypted
    -Phone Security profile CAPF Info
    Authentication mode: By null string
    Key Size: 1024
    At this forum, it says for version 5x to /7x I have simply to regenerate certificates:
    http://www.cisco.com/c/en/us/support/docs/voice-unified-communications/unified-communications-manager-version-50/99815-ccm-sec-cert.html
    These are the doubts I have:
    - Is it necessary to regenerate any certificate in first plase?, if so ¿what is the place I should follow for each certificate?
    - Is it necessary to restart any service before regenerating the certificates? for version 8.0 and higher, I saw that it´s necessary to restart TFTP and Call Manager services.
    - After regenerating certificates, is it necessary to create a new CTL file? If so, Do I need the two tokens we used to create CTL file at the begining?
    - Regarding CAPF certificate. Do i need to push the LSC certificates to the phones? Or I just need to reset phones to do so?
    Thank you in advance!

    Found the answer - Need to "Enable Advance Ad-Hoc Conference" under service parameters.

  • CUCM - Tomcat.der certificate expired

     I got an RTMT alert related to tomcat.der certificate expired.
     At Mon Aug 04 21:00:16 CDT 2014 on node 10.203.12.10, the following SyslogSeverityMatchFound events generated: 
    SeverityMatch : Critical
    MatchedEvent : Aug  4 21:00:01 CUCM01 local7 2 : 195: CUCM01.TEST.COM: Aug 05 2014 02:00:01.21 UTC :  %UC_CERT-2-CertValidfor7days: %[Message=Certificate expiration Notification. Certificate name:tomcat.der Unit:tomcat Type:own-cert Expiration:Wed Aug 6 14:42:00:000 CDT ][AppID=Cisco Certificate Monitor][ClusterID=][NodeID=CUCM01]: Alarm to indicate that Certificate has Expired or Expires in less than seven days AppID : Cisco Syslog Agent ClusterID : 
    NodeID : CUCM01
     Could you please help me how to solve this problem.
    Regards
    Sathya

    How can I find whether the previous certificate is self signed or not.
    Two methods:
    1 - Go to OS Administration ( https://SERVER/cmplatform/ )  and login. (Remember, this is the operating system ID and password and NOT the ID/Password you use to login to ccmadmin with.) Go to Security -> Certificate Management and click find. This will list all your certificates. The tomcat one is usually at the top. The right hand column will tell you if it's self-signed or not.
    2 - Go to https://SERVER/cmplatform (no need to login) and click on the padlock to examine the certificate.
    whether the new certificate can be upload after the previous certificate is expired, will there be any problem.
    You can replace a certificate any time you want. You don't have to replace an expired certificate - but it's good practise too. (And it stops those annoying emails too!)
    Any services or server needs to be rebooted.
    For the Tomcat certificate, you have to restart the Tomcat service. This can only be done from the server CLI. So either login to the console, or SSH in (again, with the operating system ID & password) and type the command "utils service restart Cisco Tomcat" (NOTE: This is CaSe SeNsItIvE) Whilst this is restarting, all the web apps (ccmadmin, cmplatform, etc.) will be offline.
    How can we verify whether the certificates are proper.
    Not sure what you mean by this. If you mean: "How can I be sure the server is using the new certificate?" go to https://SERVER/ccmadmin and in your browser click the padlock to examine the certificate. HINT: You *may* have to restart your browser for it to notice the certificate change.
    GTG

  • Exporting record of phones without certificat on CUCM

    Hi,
    how can i export record of phones without certification or with expired one on cisco unified callmanger?
    thanks.

    Hi Caleb,
    I would check your DLU licenses. It sounds to me like you are
    out of licenses and that's why you can't add any additional phones
    Cheers!
    Rob
    "Celebration it's around us, every nations, all around us.
    Singin' forever young, singin' songs underneath that sun" - K'naan

  • Cisco phone proxy will support on cucm 8.6 or not

    Hi as per document i can see that Cisco phone proxy . Without using vpn connect . Customer want to keep configured Cucm on there Jabber or cisco mobile on the iphone and need to get connected when ever they have an internet access .
    And also by keeping a small end router at branches havin only one cisco phone needs to connect to the corprate office using proxy.
    Is that possible and also is it possible on 8.6 cucm version . Here am just attaching a document info which says version supported
    Supported Cisco UCM and IP Phones for the Phone Proxy
    Cisco Unified Communications Manager
    The following release of the Cisco Unified Communications Manager are supported with the phone proxy:
    •Cisco Unified CallManager Version 4.x
    •Cisco Unified CallManager Version 5.0
    •Cisco Unified CallManager Version 5.1
    •Cisco Unified Communications Manager 6.1
    •Cisco Unified Communications Manager 7.0

    I understand the VPN solution is a good one, but we have already 100 proxy phones deployed and from what I read I'd need to first set up a VPN phone on the cluster before deploying it in the field. This would be difficult to do with users all over the country. Or am I missing something?
    I have a question about our ASA though if anyone can answer it. We have to move from an ASA 5510 to a 5520 due to the 100 UC proxy-phone license limitation (even though we have 70 phones it appears that a UC license is taken up for each TFTP server configured on the phone - primary and secondary). When I configured the 5520 I can register new phones no problem. None of the existing phones will register until the CTL file is manually deleted on each phone. Is there a way to seamlessly migrate to the 5520? Such as using the same certs, CTL file etc.. on the 5520? When I configured it it generated it's own self-signed key and CTL file. I did import the certificates from CUCM...

  • Problem in upgrading from CUCM 8.5.1 to CUCM 8.6.2

    Unable to upgarde cucm 8.5 to 8.6 ,
    installed referesh upgrade cop file . tried on SFTP and using local DVD same below error displayed . Any one have any solution please share .
    Installation Status
    File
    UCSInstall_UCOS_8.6.2.21900-5.sgn.iso
    Start Time
    Mon Dec 10 14:31:47 GST 2013
    Status
    Error encountered: An unknown error occurred while accessing the upgrade file.
    12/10/2013 13:44:37 file_list.sh|Starting file_list.sh|<LVL::Info>
    12/10/2013 13:44:37 file_list.sh|Parse argument method=remote_sftp|<LVL::Debug>
    12/10/2013 13:44:37 file_list.sh|Parse argument source_dir=/|<LVL::Debug>
    12/10/2013 13:44:37 file_list.sh|Parse argument dest_file=/var/log/install/downloaded_versions|<LVL::Debug>
    12/10/2013 13:44:37 file_list.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
    12/10/2013 13:44:37 file_list.sh|Parse argument user_name=cisco|<LVL::Debug>
    12/10/2013 13:44:37 file_list.sh|Process remote SFTP request|<LVL::Info>
    12/10/2013 13:44:37 file_list.sh|Calling SFTP command with metering off|<LVL::Debug>
    12/10/2013 13:44:38 file_list.sh|SFTP command complete (0)|<LVL::Debug>
    12/10/2013 13:44:38 file_list.sh|List file (pre-filtered):|<LVL::Debug>
    12/10/2013 13:44:38 file_list.sh|(CAPTURE) UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
    12/10/2013 13:44:38 file_list.sh|(CAPTURE) ciscocm.refresh_upgrade_v1.1.cop.sgn|<LVL::Debug>
    12/10/2013 13:44:38 file_list.sh|/opt/cisco/install/bin/filter file=/var/log/install/downloaded_versions|<LVL::Debug>
    12/10/2013 13:44:38 filter|Parse argument file=/var/log/install/downloaded_versions|<LVL::Debug>
    12/10/2013 13:44:38 filter|No patch type specified. Optional.|<LVL::Debug>
    12/10/2013 13:44:38 filter|No upgrade mode specifed. Optional.|<LVL::Debug>
    12/10/2013 13:44:43 filter|Processing filter candidate names|<LVL::Debug>
    12/10/2013 13:44:43 filter|Process "UCSInstall_UCOS_8.6.2.21900-5.sgn.iso"|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|INorOUT=IN UCSInstall_UCOS_8.6.2.21900-5.sgn.iso: Filter passed.|<LVL::Debug>
    12/10/2013 13:44:43 filter|Process "ciscocm.refresh_upgrade_v1.1.cop.sgn"|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern Signed Standard upgrade patch file (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:43 filter|    Match against patch pattern  (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against es pattern  (UCSInstall_UCOS_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against es pattern  (UCSInstall_UCOS_UNRST_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against es pattern  (UCSInstall_UCOS_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against es pattern  (UCSInstall_UCOS_UNRST_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against su pattern  (UCSInstall_UCOS_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against su pattern  (UCSInstall_UCOS_UNRST_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against su pattern  (UCSInstall_UCOS_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against su pattern  (UCSInstall_UCOS_UNRST_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (dp-ffr.[1-9]-[0-9]-[0-9]+.*.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (dp-ffr.[1-9]-[0-9]-[0-9]+.*.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cm-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cm-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (po-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (po-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cmterm-devicepack[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cmterm-devicepack[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cmterm-.*\.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (cmterm-.*\.cop\.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (uc-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (uc-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:44 filter|    Match against cop pattern  (uc-friendly-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
    12/10/2013 13:44:45 filter|    Match against cop pattern  (uc-friendly-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:45 filter|    Match against cop pattern  (ciscocm..*.cop)|<LVL::Debug>
    12/10/2013 13:44:45 filter|    Match against cop pattern  (ciscocm..*.cop.sgn)|<LVL::Debug>
    12/10/2013 13:44:45 filter|INorOUT=IN ciscocm.refresh_upgrade_v1.1.cop.sgn: Filter passed.|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|List file (post-filtered):|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|(CAPTURE) <?xml version="1.0" encoding="UTF-8"?>|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|(CAPTURE) <InstallList>|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|(CAPTURE)     <InstallItem type="patch" secure-file="UCSInstall_UCOS_8.6.2.21900-5.sgn.iso" version="8.6.2.21900-5" file="UCSInstall_UCOS_8.6.2.21900-5.sgn.iso" reboot="no" signed="yes"/>|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|(CAPTURE)     <InstallItem type="cop" secure-file="ciscocm.refresh_upgrade_v1.1.cop.sgn" version="0.0.0.0-0" file="ciscocm.refresh_upgrade_v1.1.cop" reboot="no" signed="yes"/>|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|(CAPTURE) </InstallList>|<LVL::Debug>
    12/10/2013 13:44:45 file_list.sh|success|<LVL::Info>
    12/10/2013 13:44:45 file_list.sh|file_list.sh complete (rc=0)|<LVL::Info>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Starting upgrade_validate_file.sh|<LVL::Info>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument method=remote_sftp|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument source_dir=/|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument user_name=cisco|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_type=patch|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_signed=yes|<LVL::Debug>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Process remote SFTP request|<LVL::Info>
    12/10/2013 13:44:53 upgrade_validate_file.sh|Get //UCSInstall_UCOS_8.6.2.21900-5.sgn.iso size via sftp|<LVL::Debug>
    12/10/2013 13:44:54 upgrade_validate_file.sh|Size of file obtained from sftp is 4793341952|<LVL::Debug>
    12/10/2013 13:44:54 upgrade_validate_file.sh|Total space needed is 9586683904|<LVL::Debug>
    12/10/2013 13:44:54 upgrade_validate_file.sh|Check free space|<LVL::Info>
    12/10/2013 13:44:54 upgrade_validate_file.sh|There is enough space on device to proceed.|<LVL::Info>
    12/10/2013 13:44:54 upgrade_validate_file.sh|(CAPTURE)   Free space : 25916985344|<LVL::Debug>
    12/10/2013 13:44:54 upgrade_validate_file.sh|(CAPTURE) Space needed : 19827077120|<LVL::Debug>
    12/10/2013 13:44:54 upgrade_validate_file.sh|Remote SFTP request complete (0)|<LVL::Info>
    12/10/2013 13:44:54 upgrade_validate_file.sh|success|<LVL::Info>
    12/10/2013 13:44:54 upgrade_validate_file.sh|upgrade_validate_file.sh complete (rc=0)|<LVL::Info>
    12/10/2013 13:44:54 upgrade_validate_file.sh|Unmount DVD|<LVL::Info>
    12/10/2013 13:44:57 upgrade_get_file.sh|Starting upgrade_get_file.sh|<LVL::Info>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument method=remote_sftp|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument source_dir=/|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument dest_dir=/common/download/|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument user_name=cisco|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument version=8.6.2.21900-5|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_type=patch|<LVL::Debug>
    12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_signed=yes|<LVL::Debug>
    12/10/2013 13:45:08 upgrade_get_file.sh|Process remote SFTP request|<LVL::Info>
    12/10/2013 13:45:08 upgrade_get_file.sh|source_dir=/, dest_file=/common/download//UCSInstall_UCOS_8.6.2.21900-5.sgn.iso, file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
    12/10/2013 13:45:08 upgrade_get_file.sh|Starting SFTP|<LVL::Debug>
    12/10/2013 14:29:34 upgrade_get_file.sh|Mount /common/download//UCSInstall_UCOS_8.6.2.21900-5.sgn.iso on /mnt/source|<LVL::Info>
    12/10/2013 14:29:34 upgrade_get_file.sh|Download of iso file RTMTStart|<LVL::Notice>
    12/10/2013 14:29:34 upgrade_get_file.sh|Create md5 "/common/download/UCSInstall_UCOS_8.6.2.21900-5.sgn.iso.md5"|<LVL::Info>
    12/10/2013 14:30:49 upgrade_get_file.sh|MD5(/common/download/UCSInstall_UCOS_8.6.2.21900-5.sgn.iso)= e8:da:df:9a:3a:61:ee:27:4d:c5:4f:7b:77:78:bc:f1|<LVL::Debug>
    12/10/2013 14:30:49 upgrade_get_file.sh|Create md5 complete|<LVL::Info>
    12/10/2013 14:30:49 upgrade_get_file.sh|Authenticate file "/common/download/8.6.2.21900-5/checksum_file.sgn"|<LVL::Info>
    12/10/2013 14:30:49 upgrade_get_file.sh|File authentication complete|<LVL::Debug>
    12/10/2013 14:30:49 upgrade_get_file.sh|authenticating ISO name, filename=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso, isoname=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
    12/10/2013 14:30:49 upgrade_get_file.sh|Download of iso file RTMTFinish|<LVL::Notice>
    12/10/2013 14:30:49 upgrade_get_file.sh|Checking for preflight script|<LVL::Debug>
    12/10/2013 14:30:49 upgrade_get_file.sh|Executing preflight script: /mnt/source/Cisco/install/bin/preflight isolocation=/mnt/source|<LVL::Info>
    12/10/2013 14:30:49 preflight|Starting preflight|<LVL::Info>
    12/10/2013 14:30:49 preflight|Validate preflight data|<LVL::Info>
    12/10/2013 14:30:49 preflight|Preflight data validation complete|<LVL::Info>
    12/10/2013 14:30:49 preflight|Determine upgrade type|<LVL::Info>
    12/10/2013 14:30:50 preflight|Active RH version = 4AS|<LVL::Debug>
    12/10/2013 14:30:50 preflight|New os version(xml) = 5Server|<LVL::Debug>
    12/10/2013 14:30:50 preflight|HW model = VMware|<LVL::Debug>
    12/10/2013 14:30:50 preflight|Upgrade type = RU|<LVL::Debug>
    12/10/2013 14:30:50 preflight|Obtain product type|<LVL::Info>
    12/10/2013 14:30:53 preflight|Obtained product type CallManager|<LVL::Info>
    12/10/2013 14:30:53 preflight|Processing preflight install mode|<LVL::Info>
    12/10/2013 14:30:53 preflight|Set preflight cancel utility|<LVL::Info>
    12/10/2013 14:30:53 preflight|Execute install preflight commands for CallManager:RU from /mnt/source/Cisco/install/preflight.xml|<LVL::Info>
    12/10/2013 14:30:53 preflight|Found 10 preflight commands to execute|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (1/10): mkdir -p /common/preflight/CM/RU|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (2/10): cp -f /usr/local/platform/conf/dynamicConfig.xml /common/preflight/CM/RU/dynamicConfig.xml|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 1|<LVL::Debug>
    12/10/2013 14:30:53 preflight|(CAPTURE) cp: cannot stat `/usr/local/platform/conf/dynamicConfig.xml': No such file or directory|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command did not complete (1). Continuing command processing...|<LVL::Warn>
    12/10/2013 14:30:53 preflight|Execute preflight command (3/10): cp -f /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp /common/preflight/CM/RU/dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 1|<LVL::Debug>
    12/10/2013 14:30:53 preflight|(CAPTURE) cp: cannot stat `/usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp': No such file or directory|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command did not complete (1). Continuing command processing...|<LVL::Warn>
    12/10/2013 14:30:53 preflight|Execute preflight command (4/10): cp -f /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp /common/preflight/CM/RU/install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (5/10): cp -f /mnt/source/Cisco/install/dynamicConfig_RU.xml /usr/local/platform/conf/dynamicConfig.xml|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (6/10): mkdir -p /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (7/10): cp -f /mnt/source/Cisco/install/dynamic_RU.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (8/10): cp -f /mnt/source/Cisco/install/install-confirm-content_RU.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:53 preflight|Execute preflight command (9/10): /mnt/source/Cisco/install/bin/tempDynamic.preflight /mnt/source/Cisco/install/dynamic_RU.jsp dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53  starting tempDynamic.preflight...|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53  Source dir/file = /mnt/source/Cisco/install/dynamic_RU.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53  Destination file name = dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  ... tempDynamic.preflight completed|<LVL::Debug>
    12/10/2013 14:30:54 preflight|Execute preflight command (10/10): /mnt/source/Cisco/install/bin/tempDynamic.preflight /mnt/source/Cisco/install/install-confirm-content_RU.jsp install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|Preflight command returns 0|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  starting tempDynamic.preflight...|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Source dir/file = /mnt/source/Cisco/install/install-confirm-content_RU.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Destination file name = install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
    12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54  ... tempDynamic.preflight completed|<LVL::Debug>
    12/10/2013 14:30:54 preflight|Exiting with result 0|<LVL::Info>
    12/10/2013 14:30:54 upgrade_get_file.sh|preflight rc=0|<LVL::Debug>
    12/10/2013 14:30:54 upgrade_get_file.sh|Preflight completed successfully|<LVL::Info>
    12/10/2013 14:30:56 upgrade_get_file.sh|success|<LVL::Info>
    12/10/2013 14:30:56 upgrade_get_file.sh|upgrade_get_file.sh complete (rc=0)|<LVL::Info>
    12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling active side processes
    12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling active side processes done
    12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling inactive side processes
    12/30/2014 14:31:50 sd_cancelInstall.sh|Canceling inactive side processes done
    12/10/2013 14:31:55 upgrade_install.sh|Starting Upgrade -- upgrade_install.sh|<LVL::Info>
    12/10/2013 14:31:55 upgrade_install.sh|Parse argument version=8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:31:55 upgrade_install.sh|Parse argument dest_dir=/common/download/|<LVL::Debug>
    12/10/2013 14:31:55 upgrade_install.sh|Parse argument work_dir=/var/log/install|<LVL::Debug>
    12/10/2013 14:31:59 upgrade_install.sh|/usr/local/platform/bin/startcsa status|<LVL::Debug>
    12/10/2013 14:31:59 upgrade_install.sh|CSA Status = 0|<LVL::Debug>
    12/10/2013 14:31:59 upgrade_install.sh|(CAPTURE) Cisco Security Agent is running with pid 23124|<LVL::Debug>
    12/10/2013 14:31:59 upgrade_install.sh|CSA Status = 0|<LVL::Debug>
    12/10/2013 14:31:59 upgrade_install.sh|/etc/init.d/ciscosec stop|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_install.sh|(CAPTURE) Stopping ciscosec:  [  OK  ]|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_install.sh|Upgrade the system|<LVL::Info>
    12/10/2013 14:32:14 upgrade_install.sh|Copy /mnt/source/Cisco/base_scripts/upgrade_manager.sh to /common/download/8.6.2.21900-5/upgrade_manager.sh|<LVL::Info>
    12/10/2013 14:32:14 upgrade_install.sh|Copy /mnt/source/Cisco/base_scripts/upgrade_manager.sh to /common/download/8.6.2.21900-5/upgrade_manager.sh complete|<LVL::Info>
    12/10/2013 14:32:14 upgrade_install.sh|Start upgrade manager|<LVL::Info>
    12/10/2013 14:32:14 upgrade_install.sh|/common/download/8.6.2.21900-5/upgrade_manager.sh type=upgrade basepath=/common/download/8.6.2.21900-5 file_name= logfile=/var/log/install/install_log_2013-12-30.13.44.35.log resultfile=/var/log/install/upgrade-results.xml work_dir=/var/log/install intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Cleanup data from a prior upgrade attempt|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Removing any /grub/boot/grub/grub.conf.recovery|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Invalidate upgrade partition|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Clean up rpm any stale __db. files in rpmdb on the to side|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Removing any master RPM from /partB|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Removing any /partB/etc/opt/cisco/install.conf|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Invalidate any product configuration file|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument type=upgrade|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument basepath=/common/download/8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument file_name=|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument logfile=/var/log/install/install_log_2013-12-30.13.44.35.log|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument resultfile=/var/log/install/upgrade-results.xml|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument work_dir=/var/log/install|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Parse argument intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|upgrade_type="upgrade"|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|L2 upgrade|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Initialize install support functions|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Calling "source /mnt/source/Cisco/install/bin/install_func"|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Initialize install support functions complete|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Check for Refresh Upgrade|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Check if /mnt/source/upgradeConfig.xml exists|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Checking RedHat release version (4AS, 5Server)|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Initiate Refresh Upgrade|<LVL::Info>
    12/10/2013 14:32:14 upgrade_manager.sh|Copy /mnt/source/Cisco/install/bin/refresh_upgrade to /common/download/8.6.2.21900-5/refresh_upgrade|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Check that /common/download/8.6.2.21900-5/refresh_upgrade exists and is executable|<LVL::Debug>
    12/10/2013 14:32:14 upgrade_manager.sh|Calling exec /common/download/8.6.2.21900-5/refresh_upgrade type=upgrade basepath=/common/download/8.6.2.21900-5 file_name= logfile=/var/log/install/install_log_2013-12-30.13.44.35.log resultfile=/var/log/install/upgrade-results.xml work_dir=/var/log/install intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument type=upgrade|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument basepath=/common/download/8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument file_name=|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument logfile=/var/log/install/install_log_2013-12-30.13.44.35.log|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument resultfile=/var/log/install/upgrade-results.xml|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument work_dir=/var/log/install|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Parse argument intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|No 'to' version specified. Extracting it from base path.|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|NEW_VERSION updated to 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:32:14 refresh_upgrade|Refresh Upgrade Starting|<LVL::Info>
    12/10/2013 14:32:14 refresh_upgrade|IOWAIT monitor starting|<LVL::Info>
    12/10/2013 14:32:14 refresh_upgrade|Checksum the upgrade source on /mnt/source|<LVL::Info>
    12/10/2013 14:32:14 refresh_upgrade|Calling sha1sum -c /common/download/8.6.2.21900-5/checksum_file|<LVL::Debug>
    12/10/2013 14:34:14 refresh_upgrade|Checksum complete|<LVL::Info>
    12/10/2013 14:34:14 refresh_upgrade|Initialize staging area|<LVL::Info>
    12/10/2013 14:34:14 refresh_upgrade|Initialize globals for hard drive|<LVL::Debug>
    12/10/2013 14:34:14 refresh_upgrade|Calling rm -rf /common/refresh_upgrade /common/component|<LVL::Debug>
    12/10/2013 14:34:23 refresh_upgrade|Copy /mnt/source to /common/refresh_upgrade|<LVL::Info>
    12/10/2013 14:34:23 refresh_upgrade|Execute find /mnt/source and cpio to /common/refresh_upgrade. This may take several minutes.|<LVL::Debug>
    12/10/2013 14:37:31 refresh_upgrade|Copy source files to staging area complete|<LVL::Info>
    12/10/2013 14:37:31 refresh_upgrade|Initialize staging area complete|<LVL::Info>
    12/10/2013 14:37:31 refresh_upgrade|Prepare Refresh Upgrade support directory|<LVL::Info>
    12/10/2013 14:37:31 refresh_upgrade|Make /common/mnt/product_img mount point|<LVL::Info>
    12/10/2013 14:37:32 refresh_upgrade|Calling umount /common/mnt/product_img|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Setup support directories|<LVL::Info>
    12/10/2013 14:37:33 refresh_upgrade|Calling rm -rf /common/download/8.6.2.21900-5/Cisco|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling mkdir -p /common/download/8.6.2.21900-5/Cisco|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Create /common/cisco link to /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
    12/10/2013 14:37:33 refresh_upgrade|Calling rm -rf /common/cisco|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling ln -s /common/download/8.6.2.21900-5/Cisco /common/cisco|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Copy files from /common/refresh_upgrade/images/product.img to /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
    12/10/2013 14:37:33 refresh_upgrade|Calling mount /common/refresh_upgrade/images/product.img /common/mnt/product_img -o loop|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/iproduct.sh /common/download/8.6.2.21900-5/Cisco/bin/iproduct.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/ihardware.sh /common/download/8.6.2.21900-5/Cisco/bin/ihardware.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/ihistory.sh /common/download/8.6.2.21900-5/Cisco/bin/ihistory.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xproduct.sh /common/download/8.6.2.21900-5/Cisco/bin/xproduct.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xcomponent.sh /common/download/8.6.2.21900-5/Cisco/bin/xcomponent.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xplatformconfig.sh /common/download/8.6.2.21900-5/Cisco/bin/xplatformconfig.sh|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/install_emailer /common/download/8.6.2.21900-5/Cisco/bin/install_emailer|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/component_install /common/download/8.6.2.21900-5/Cisco/bin/component_install|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Calling umount /common/mnt/product_img|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|Setup install information in /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
    12/10/2013 14:37:33 refresh_upgrade|Calling ln -s /common/refresh_upgrade/Cisco/install /common/download/8.6.2.21900-5/Cisco/install|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) Mail notification cancelled - smtp server address for email not found! [/usr/local/platform/conf/platformConfig.xml]|<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|Setting up cisco specific enviroment|<LVL::Info>
    12/10/2013 14:37:36 refresh_upgrade|PATH=/common/download/8.6.2.21900-5/Cisco/bin:/usr/local/sbin:/sbin:/usr/sbin:/bin:/usr/bin:/usr/X11R6/bin:/sbin:/home/sftpuser:/root/.security|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|LD_LIBRARY_PATH=/common/download/8.6.2.21900-5/Cisco/lib:/opt/cisco/install/lib:|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|PYTHONPATH=/common/download/8.6.2.21900-5/Cisco/python:/usr/local/cm/lib:/usr/local/cm/lib:/usr/local/cm/lib:|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_CONF_PATH=/common/download/8.6.2.21900-5/Cisco/install/conf|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_BIN_PATH=/common/download/8.6.2.21900-5/Cisco/bin /opt/cisco/install/bin /usr/local/bin/base_scripts|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|CISCO_PLATFORMCONF_PATH=/common/cisco /usr/local/platform/conf|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_LIB_PATH=/usr/local/bin/base_scripts|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|Set logging globals for upgrade|<LVL::Info>
    12/10/2013 14:37:36 refresh_upgrade|Before: ILOG_CONTEXT="Upgrade", ILOG_FILE="/var/log/install/install_log_2013-12-30.13.44.35.log", ILOG_RESULTS_FILE="/var/log/install/upgrade-results.xml"|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|After: ILOG_CONTEXT="Upgrade", ILOG_FILE="/common/log/install/install_log_2013-12-30.13.44.35.log", ILOG_RESULTS_FILE="/common/log/install/upgrade-results.xml"|<LVL::Debug>
    12/10/2013 14:37:36 refresh_upgrade|Initialize APIs|<LVL::Info>
    12/10/2013 14:37:36 refresh_upgrade|Initializing the product API|<LVL::Info>
    12/10/2013 14:37:37 refresh_upgrade|Initializing the hardware API|<LVL::Info>
    12/10/2013 14:37:38 ServerApiManager|INITIALIZE: sam_legacy_mode_init=1|<LVL::Debug>
    12/10/2013 14:37:46 ServerApiManager|INITIALIZE: sam_hssi_mode_init=0|<LVL::Debug>
    12/10/2013 14:37:46 refresh_upgrade|Initializing the history log API|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Initializing the xplatformconfig API|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Initializing the xproduct API|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Initialize setup functions|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Calling "source /common/download/8.6.2.21900-5/Cisco/install/setup/utils.sh"|<LVL::Debug>
    12/10/2013 14:37:46 refresh_upgrade|Initialize setup functions complete|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Getting deployment ID from active side|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Copy /usr/local/platform/conf/platformConfig.xml to /common/cisco/platformConfig.xml|<LVL::Info>
    12/10/2013 14:37:46 refresh_upgrade|Calling "cp /usr/local/platform/conf/platformConfig.xml /common/cisco/platformConfig.xml"|<LVL::Debug>
    12/10/2013 14:37:48 refresh_upgrade|Check if the upgrade is allowed|<LVL::Info>
    12/10/2013 14:37:48 refresh_upgrade|Validate hardware for the upgrade|<LVL::Info>
    12/10/2013 14:37:48 refresh_upgrade|Hardware is supported for the upgrade|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Validate hardware for "callmanager" deployment|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Hardware is supported for "callmanager" deployment|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Validate from version 8.5.1.10000-26|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Upgrade from 8.5.1.10000-26 allowed|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Validate free space for the upgrade|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|(CAPTURE) Free space: 26040668160, Needed space: 15014745300|<LVL::Debug>
    12/10/2013 14:37:50 refresh_upgrade|Free space validation complete|<LVL::Info>
    12/10/2013 14:37:50 refresh_upgrade|Run component export scripts|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Initializing xproduct.sh API|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Initializing xcomponent.sh API|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Initializing xplatformconfig.sh API|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Parse argument export|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Parse argument mode=refresh-upgrade|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Parse argument install_root=/common/refresh_upgrade/Cisco|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Parse argument data_root=/common|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Run component export scripts, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize product data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize "to" side product version|<LVL::Info>
    12/10/2013 14:37:50 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Initialize "to" side product version complete|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize "from" side product version|<LVL::Info>
    12/10/2013 14:37:50 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:50 component_install|Initialize "from" side product version complete|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize product data complete|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:50 component_install|Initialize ucos "to" side version|<LVL::Info>
    12/10/2013 14:37:50 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Initialize ucos "to" side version complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize ucos "from" side version|<LVL::Info>
    12/10/2013 14:37:51 component_install|Component ucos available on active side|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Initialize ucos "from" side version complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize global data complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Build the command list for ucos|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize command list|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Build ucos export phase commands|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Processing ucos export element|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Building the command list for ucos is complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Command execution for ucos component RTMTStart|<LVL::Notice>
    12/10/2013 14:37:51 component_install|Execute commands in the command list for ucos component|<LVL::Info>
    12/10/2013 14:37:51 component_install|No commands to execute for ucos component|<LVL::Info>
    12/10/2013 14:37:51 component_install|Command execution for ucos component is complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Command execution for ucos component RTMTFinish|<LVL::Notice>
    12/10/2013 14:37:51 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize ucplatform "to" side version|<LVL::Info>
    12/10/2013 14:37:51 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Initialize ucplatform "to" side version complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize ucplatform "from" side version|<LVL::Info>
    12/10/2013 14:37:51 component_install|Component ucplatform available on active side|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Initialize ucplatform "from" side version complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize global data complete|<LVL::Info>
    12/10/2013 14:37:51 component_install|Build the command list for ucplatform|<LVL::Info>
    12/10/2013 14:37:51 component_install|Initialize command list|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Build ucplatform export phase commands|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Processing ucplatform export element|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:51 component_install|Add "security_prepare RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "password_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "ssh_keys_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "installed_options_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "platform_certs_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "servm_export RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "network_files_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Add "drf_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Building the command list for ucplatform is complete|<LVL::Info>
    12/10/2013 14:37:52 component_install|Command execution for ucplatform component RTMTStart|<LVL::Notice>
    12/10/2013 14:37:52 component_install|Execute commands in the command list for ucplatform component|<LVL::Info>
    12/10/2013 14:37:52 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/security_prepare|<LVL::Debug>
    12/10/2013 14:37:52 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/security_prepare RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Parse arguments|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Validate arguments|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Initialize global variables|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Handle Security Information|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export security information|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export /etc/shadow file|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export login warning message|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export SFTP data|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export DRF data|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export CCM Service Data|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export IPSec Data|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|get_fips_status returning partB fips_cnf as 0|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export Racoon Data|<LVL::Debug>
    12/10/2013 14:37:52 security_prepare|Export Tomcat Data|<LVL::Debug>
    12/10/2013 14:37:53 security_prepare|security information prepare successful|<LVL::Info>
    12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/password_migrate|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/password_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:53 password_migrate|Handle password information|<LVL::Debug>
    12/10/2013 14:37:53 password_migrate|Export password information|<LVL::Info>
    12/10/2013 14:37:53 password_migrate|Calling mkdir -p /common/component/ucplatform/etc/pam.d|<LVL::Info>
    12/10/2013 14:37:53 password_migrate|password information migrate successful|<LVL::Info>
    12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/ssh_keys_migrate|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/ssh_keys_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/installed_options_migrate|<LVL::Debug>
    12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/installed_options_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:55 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:55 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/platform_certs_migrate|<LVL::Debug>
    12/10/2013 14:37:55 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/platform_certs_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:55 platform_certs_migrate|Source major version: 8|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|Export platform certificates|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|starting refresh upgrade export certs copy|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|starting refresh upgrade export certs copy|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|exporting certmon config|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform/config|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|copy /usr/local/platform/conf/certMonitorConfig.xml /common/component/ucplatform/conf/|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|Export bulk sftp config|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|sftp config not available|<LVL::Info>
    12/10/2013 14:37:55 platform_certs_migrate|platform certificates migrate successful|<LVL::Info>
    12/10/2013 14:37:55 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:55 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/servm_export|<LVL::Debug>
    12/10/2013 14:37:55 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/servm_export RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:56 servm_export|Start servm Export processing|<LVL::Info>
    12/10/2013 14:37:56 servm_export|Copying /usr/local/cm//../platform/conf/activate.conf to /common/component/ucplatform|<LVL::Info>
    12/10/2013 14:37:56 servm_export|Copying /usr/local/cm//../platform/conf/services.conf to /common/component/ucplatform|<LVL::Info>
    12/10/2013 14:37:56 servm_export|SUCCESS: servm Export processing completed|<LVL::Info>
    12/10/2013 14:37:56 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:56 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/network_files_migrate|<LVL::Debug>
    12/10/2013 14:37:56 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/network_files_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:56 network_files_migrate|Export network configuration files to /common/component/ucplatform/etc/sysconfig/network-scripts|<LVL::Info>
    12/10/2013 14:37:56 network_files_migrate|Calling mkdir -p /common/component/ucplatform/etc/sysconfig/network-scripts|<LVL::Debug>
    12/10/2013 14:37:56 network_files_migrate|Calling mkdir -p /common/component/ucplatform/common|<LVL::Debug>
    12/10/2013 14:37:56 network_files_migrate|Copy network configuration files|<LVL::Info>
    12/10/2013 14:37:56 network_files_migrate|Copying /etc/sysconfig/network-scripts/ifcfg-eth0 to /common/component/ucplatform/etc/sysconfig/network-scripts/ifcfg-eth0|<LVL::Debug>
    12/10/2013 14:37:56 network_files_migrate|Copying /etc/sysconfig/network to /common/component/ucplatform/etc/sysconfig/network|<LVL::Debug>
    12/10/2013 14:37:56 network_files_migrate|Copying /etc/hosts to /common/component/ucplatform/etc/hosts|<LVL::Debug>
    12/10/2013 14:37:57 network_files_migrate|Copying /etc/resolv.conf to /common/component/ucplatform/etc/resolv.conf|<LVL::Debug>
    12/10/2013 14:37:57 network_files_migrate|Copying //etc/nsswitch.conf to /common/component/ucplatform/etc/nsswitch.conf|<LVL::Debug>
    12/10/2013 14:37:57 network_files_migrate|Copy network configuration files complete|<LVL::Info>
    12/10/2013 14:37:57 network_files_migrate|Export network configuration files complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/drf_migrate|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/drf_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Command execution for ucplatform component is complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Command execution for ucplatform component RTMTFinish|<LVL::Notice>
    12/10/2013 14:37:57 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "to" side version|<LVL::Info>
    12/10/2013 14:37:57 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "to" side version complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "from" side version|<LVL::Info>
    12/10/2013 14:37:57 component_install|Component ucplatform_cluster available on active side|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "from" side version complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Initialize global data complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Build the command list for ucplatform_cluster|<LVL::Info>
    12/10/2013 14:37:57 component_install|Initialize command list|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Build ucplatform_cluster export phase commands|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Processing ucplatform_cluster export element|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Processing ucplatform_cluster script element|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Add "platform_sso_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform_cluster /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Building the command list for ucplatform_cluster is complete|<LVL::Info>
    12/10/2013 14:37:57 component_install|Command execution for ucplatform_cluster component RTMTStart|<LVL::Notice>
    12/10/2013 14:37:57 component_install|Execute commands in the command list for ucplatform_cluster component|<LVL::Info>
    12/10/2013 14:37:57 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform_cluster/scripts:/usr/local/cm/script|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform_cluster/scripts/platform_sso_migrate|<LVL::Debug>
    12/10/2013 14:37:57 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform_cluster/scripts/platform_sso_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform_cluster /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
    12/10/2013 14:37:58 platform_sso_migrate|Source major version: 8|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for ucplatform_cluster component is complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for ucplatform_cluster component RTMTFinish|<LVL::Notice>
    12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize thirdparty "to" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize thirdparty "to" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize thirdparty "from" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Component thirdparty available on active side|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize thirdparty "from" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Build the command list for thirdparty|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize command list|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Build thirdparty export phase commands|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Processing thirdparty export element|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Building the command list for thirdparty is complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for thirdparty component RTMTStart|<LVL::Notice>
    12/10/2013 14:37:58 component_install|Execute commands in the command list for thirdparty component|<LVL::Info>
    12/10/2013 14:37:58 component_install|No commands to execute for thirdparty component|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for thirdparty component is complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for thirdparty component RTMTFinish|<LVL::Notice>
    12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize serviceability_core "to" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize serviceability_core "to" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize serviceability_core "from" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Component serviceability_core available on active side|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize serviceability_core "from" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Build the command list for serviceability_core|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize command list|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Build serviceability_core export phase commands|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Processing serviceability_core export element|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Building the command list for serviceability_core is complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for serviceability_core component RTMTStart|<LVL::Notice>
    12/10/2013 14:37:58 component_install|Execute commands in the command list for serviceability_core component|<LVL::Info>
    12/10/2013 14:37:58 component_install|No commands to execute for serviceability_core component|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for serviceability_core component is complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Command execution for serviceability_core component RTMTFinish|<LVL::Notice>
    12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize database "to" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize database "to" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize database "from" side version|<LVL::Info>
    12/10/2013 14:37:58 component_install|Component database available on active side|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
    12/10/2013 14:37:58 component_install|Initialize database "from" side version complete|<LVL::Info>
    12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>

    hi gupta ,
    admin:run sql car select * from tbl_event_log
    Failed  to get Connection.Connector(NOT CONNECTED:  Driver=com.informix.jdbc.IfxDr                                                 iver;)
    admin:run sql car select * from tbl_system_preferences
    Failed to get Connection.Connector(NOT CONNECTED: Driver=com.informix.jdbc.IfxDriver;)
    restarted the below sevices
    Cisco CDR Agent
    Cisco Database Layer Monitor
    Cisco CDR Repository Manager
    Cisco CAR                 Scheduler
    Cisco SOAP - CDRonDemand                 Service
    Cisco CAR Web                 Service
    while accessing cdr reporting showing below error .
    ------------------------------------------WARNING-----------------------------------------
    *  Cluster wide parameter 'Call Diagnostics Enabled flag' is set  to false.  Hence no QoS information will be generated on calls. If  required,  please configure the same from service parameter page for Call  Manager  service. 
    *  Problem in determining 2M/HWM breach status.  Tbl_System_Preferences  table might be corrupted. Please click on the  'Restore Defaults' button  to update the table with default values. 
    *  Tbl_System_Preferences table is corrupted. Please click on the  'Restore  Defaults' button to update the table with default values. 
    *  Problem in determining Loader Configuration.  Tbl_System_Preferences  table might be corrupted. Please click on the  'Restore Defaults' button  to update the table with default values. 
    -------------------------------------------NOTICE------------------------------------------
    * Problem in determining Billing Tables status. Please check the  CAR DB for tables Tbl_Billing_Data and Tbl_Billing_Error. 
    *  Problem in getting the Mail parameters. It might result in   mails/alerts/notifications not been sent to CAR Administrators. Please   configure this at CAR->System->System Parameters->Mail   Parameters. 
    * Mail  id for 'ccmadmin' is not available. CAR  Reports/Notifications/Alert  Emails might not be able to sent to this  user properly. Please  configure a mail id in end user configuration  page.
    if we apllied Restore Defaults ,geting below error
    Error Code
    Error Description
    30029
    Direct access to this screen is not allowed.
    and try to access system and data base , getting below error
    Error Code
    Error Description
    10012
    Database Error. Contact System Administrator.
    Does any other way to avoid cdr and do the istallation .

  • J4W 9.2.6 and Jabber for Mobile 9.6 : Certificate Management

    Hello,
    I have deployed 2 Cisco IM & P servers 9.1.1. When client jabber log in, the server presents 3 certificates (IM&P Pub, IM&P Sub, CUCM) to be validated and saved in local trust store.
    What are the certificates that I have to sign against the Private CA ? Or Do I only upload Root CA of the company into IM&P servers ?

    Hi Driss,
    Per my understanding the certificates that are presented are the Tomcat self-signed Certificates that are created during CUPS Pub&Sub and CUCM installation.
    http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/Windows/9_2/JABW_BK_C9731738_00_jabber-windows-install-config/JABW_BK_C9731738_00_jabber-windows-install-config_chapter_01001.html
    Here I see you have 3 options:
    a) Complex: Install thirdparty certs in your CUCM/CUPS servers, those certs should be issued by a Certificate Authority which root certificate is already part of your Truststore in Mobile client (Example: Verisign, Godaddy, etc.)
    This process in CUCM/CUPS has been there for a while, you can look up how to install third party certs for CUCM/CUPS. Process is very straight forward, you generate a CSR (Tomcat), provide the CSR to your CA and then obtain the new cert, once you have the new cert, import it to your CUCM. The CA must be a trusted one by your clients (Example: Verisign, Godaddy, etc)
    b) Simple: Import those default Tomcat CUCM/CUP self-signed certificates into your Desktops/Mobile clients trust store.
    c) Annoying: Educate users to select Accept certificates
    -Gonzalo

  • Jabber 9.2.5 and above forced Certificates

    Hello all,
    As some of you may already know as of Jabber version 9.2.5 the client force’s Certificates. If there is not a Certificate that is signed by a trusted CA, then the self-signed Cert is used.
    There is no way that I have found to get around this unfortunately and the end result is the first time Jabber client is launched on a PC the person must accept in my case 7 certificate warnings (2xUCM,2xCUC,2xIMP,1xCWMS) that the host it’s connecting to is using self-signed Certs.
    You have 3 options to avoid this
    Stay on version 9.2.4 for the rest of your life, or until Cisco makes this an option we can opt out of
    Deploy the 7 self-signed certs out to all the PC’s (not sure why this is even a real option!!!!)
    Lastly you can generate CSR requests from CUCM, CUC, IMP and CWMS servers to be signed by a trusted CA
    I will set the record straight first. I know very little about Cert's except the fact I dont' like working with them.
    Now for my questions: I have 3
    There are dozens of Cert providers out there, how do I find a LIST of CA’s that the application servers above already trust so I can avoid deploying ROOT CA’s as well to my Applications servers and PC's?
    I'm following the guild below, in it there is a section called "What methods are available for certificate validation?
    http://www.cisco.com/c/en/us/support/docs/unified-communications/unified-presence/116917-technote-certificate-00.html
    In this section it describes 
    Here is a possible requirement you might encounter:
    One Certificate Per FQDN: Some public CAs sign only one certificate per fully qualified domain name (FQDN).
    For example, in order to sign the HTTP and XMPP certificates for a single CUCM IM and Presence node, you might need to submit each CSR to different public CAs.
    I really don't understand this? Surely they dont' mean get the cert for HTTP from one CA and the XMPP from another CA??
    Lastly:
    Is there a roadmap to make this Feature and or Annoyance user customizable? I'm happy to stay on 9.2.4 if there is a less costly / annoying version in the works for the near future.
    Appreciate your help and feedback
    Ryan

    Hi,
    We use the Last jabber 9.6 Build. To avoid the cert question we use dring the Installation the following switches, the cert Switch is here the Import Switch..
    msiexec.exe /i CiscoJabberSetup.msi CLEAR=1 AUTHENTICATOR=CUP CUP_ADDRESS=vCUPPUB1.example.com SERVICES_DOMAIN=example.com CERTIFICATE_VALIDATION=DISABLE
    -joerg

  • CTSMan 1.9.1 and CUCM 8.6.2 sync problems Error 502407

    Hi,
    I ran into recent problem synchronizing CUCM 8.6.2(b) into CTSman 1.9.1
    CTSMan is getting an Error message: 502407
    Details
    ID:
    502407
    Severity:
    critical
    Module:
    DiscoveryMgr
    SubModule:
    CTIAdapter
    Summary:
    Communication to Unified CM failure
    Recommendation:
    Verify CCM App User credentials. Verify CTIManager service is activated on the primary application server.
    Message:
    Unable to create CTI adapter to Unified CM 'CUCM-xxx' because Provider is null.
    I researched this earlier in CTSman admin guides, and this error points to CUCM CTI Manager service to be restarted.  I did restart this as well as other services, including CUCM hardware itself and, but in vain.
    Among other things, i followed the CUCM/CTSman guides when bringing CUCM into CTSman to: created an application user account within CUCM and allocate a proper permissions/user groups etc... it was done. 
    Among other things there are other servers like Exchange being synchronized with it ( had problems with it earlier that dealt with certificates, it was corrected.).
    Can anyone help with this issue.
    Responses will be greatly appreciated.
    Thank you.

    Thanks Manish again for this.
    I did get few MediaReosurceListExhausted events from RTMT alerts but was not paying much attention to them. Location bandwidth settings have been checked and increased a bit for sites which were repeatedly getting these events. I will monitor to see if that reduces these alerts. Could you please advise how I can verify it is hitting the maximum limit?
    I have also raised this with Cisco TAC and some cores were found on the CUC subscriber server. We seemed to have run into a bug according to Cisco TAC as in here https://tools.cisco.com/bugsearch/bug/CSCug61581/?reffering_site=dumpcr and both CUC servers have been upgraded to 8_6_2_24901_1. It has fixed cores and we are now monitoring the voicemail service for few days to see if it will reoccur.
    Regards,

Maybe you are looking for