Thursday, April 12, 2018

Cisco RTMT can not connect to some subscribers with the following error.


Unified reported show the following
Restarted A Cisco DB service on all server in the cluster


utils service restart A Cisco DB



Friday, April 6, 2018

SIP TRUNK ISSUE

Experienced a very strange issue on SIP trunk the other day. when an external call come in via SIP trunk, user answer the call and then transfer the call to another internal user, if that other user doesn't pick up the phone the call forward no answer to Unity voicemail system and external caller hears nothing. spent hours troubleshooting with Cisco and they couldn't find the issue. Tried a lot of setting change on CUCM and CUBE and finally found a solution.

under voice service voip > sip I had to do "no session refresh" and that fixed the issue.

Tuesday, April 3, 2018

Cisco 3850 downgrade from 16.6 to 3.7.5E


TEST-3850#request platform software package install switch all file flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin new
--- Starting install local lock acquisition on switch 1 ---
Finished install local lock acquisition on switch 1

Expanding image file: flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin
[1]: Expanding file
[1]: Finished expanding all-in-one software package in switch 1
SUCCESS: Finished expanding all-in-one software package.
[1]: Performing install
  SUCCESS: install finished
[1]: install package(s) on switch 1
--- Starting list of software package changes ---
Old files list:
  Removed cat3k_caa-guestshell.16.06.02.SPA.pkg
  Removed cat3k_caa-rpbase.16.06.02.SPA.pkg
  Removed cat3k_caa-rpcore.16.06.02.SPA.pkg
  Removed cat3k_caa-srdriver.16.06.02.SPA.pkg
  Removed cat3k_caa-webui.16.06.02.SPA.pkg
New files list:
  Added cat3k_caa-base.SPA.03.07.05E.pkg
  Added cat3k_caa-drivers.SPA.03.07.05E.pkg
  Added cat3k_caa-infra.SPA.03.07.05E.pkg
  Added cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
  Added cat3k_caa-platform.SPA.03.07.05E.pkg
  Added cat3k_caa-wcm.SPA.10.3.150.0.pkg
Finished list of software package changes
SUCCESS: Software provisioned.  New software will load on reboot.
[1]: Finished install successful on switch 1
Checking status of install on [1]
[1]: Finished install in switch 1
SUCCESS: Finished install: Success on [1]
TEST-3850#
TEST-3850#
TEST-3850#
TEST-3850#sh ver
Cisco IOS XE Software, Version 16.06.02
Cisco IOS Software [Everest], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.6.2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Wed 01-Nov-17 04:27 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 4.68, RELEASE SOFTWARE (P)

TEST-3850 uptime is 1 hour, 24 minutes
Uptime for this control processor is 1 hour, 28 minutes
System returned to ROM by Power Failure
System image file is "flash:packages.conf"
Last reload reason: Power Failure



This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


Technology Package License Information:

-----------------------------------------------------------------
Technology-package                   Technology-package
Current             Type             Next reboot
------------------------------------------------------------------
lanbasek9           Permanent        lanbasek9

cisco WS-C3850-48P (MIPS) processor (revision X0) with 853402K/6147K bytes of memory.
Processor board ID FCW1943D1AG
1 Virtual Ethernet interface
52 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of WebUI ODM Files at webui:.

Base Ethernet MAC Address          : 18:8b:45:4f:c8:00
Motherboard Assembly Number        : 73-15800-07
Motherboard Serial Number          : FOC19432LAD
Model Revision Number              : X0
Motherboard Revision Number        : B0
Model Number                       : WS-C3850-48P
System Serial Number               : FCW1943D1AG


Switch Ports Model              SW Version        SW Image              Mode
------ ----- -----              ----------        ----------            ----
*    1 56    WS-C3850-48P       16.6.2            CAT3K_CAA-UNIVERSALK9 INSTALL


Configuration register is 0x102

TEST-3850#dir
Directory of flash:/

 7747  -rw-          2097152   Apr 3 2018 02:54:46 -07:00  nvram_config
 7748  -rw-             1096   Apr 3 2018 01:33:09 -07:00  vlan.dat
 7746  -rw-            35460  Dec 29 2015 09:51:12 -08:00  startup-config
 7749  -rw-              298  Mar 19 2018 03:29:03 -07:00  eem_script.py
 7751  drwx             4096   Apr 3 2018 01:29:10 -07:00  .installer
30983  -rw-         16181884  Jan 19 2018 03:04:22 -08:00  cat3k_caa-webui.16.06.02.SPA.pkg
54210  drwx             4096   Oct 4 2016 08:11:27 -07:00  vman_fdb
 7760  drwx             4096  Mar 19 2018 05:18:27 -07:00  onep
 7757  -rw-               76   Apr 3 2018 01:29:55 -07:00  boothelper.log
 7750  -rw-                0   Apr 3 2018 02:56:38 -07:00  .onreboot
 7772  -rw-         82000420   Apr 3 2018 02:55:04 -07:00  cat3k_caa-base.SPA.03.07.05E.pkg
 7770  -rw-             1236   Apr 3 2018 02:56:20 -07:00  packages.conf
 7765  -rw-          5663420   Apr 3 2018 02:55:01 -07:00  cat3k_caa-drivers.SPA.03.07.05E.pkg
30979  -rw-         19167872  Jan 19 2018 03:04:06 -08:00  cat3k_caa-guestshell.16.06.02.SPA.pkg
30980  -rw-         27906419  Jan 19 2018 03:04:06 -08:00  cat3k_caa-rpbase.16.06.02.SPA.pkg
30981  -rw-        331268728  Jan 19 2018 03:04:16 -08:00  cat3k_caa-rpcore.16.06.02.SPA.pkg
30982  -rw-         15323776  Jan 19 2018 03:04:22 -08:00  cat3k_caa-srdriver.16.06.02.SPA.pkg
 7752  -rw-              222   Apr 3 2018 01:29:35 -07:00  bootloader_evt_handle.log
 7753  drwx             4096  Jan 19 2018 03:18:26 -08:00  core
 7754  drwx             4096  Jan 19 2018 03:10:47 -08:00  .prst_sync
15493  drwx             4096  Jan 19 2018 03:10:50 -08:00  .rollback_timer
 7769  -rw-         36965384   Apr 3 2018 02:55:03 -07:00  cat3k_caa-infra.SPA.03.07.05E.pkg
 7767  -rw-         46449984   Apr 3 2018 02:55:03 -07:00  cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
38723  drwx             4096   Oct 4 2016 08:11:27 -07:00  virtual-instance
61954  drwx             4096   Apr 3 2018 01:29:52 -07:00  dc_profile_dir
61956  drwx             4096   Oct 4 2016 08:12:56 -07:00  wnweb_store
15494  drwx             4096  Jan 19 2018 03:22:46 -08:00  gs_script
 7756  -rw-            98869   Apr 3 2018 01:30:13 -07:00  memleak.tcl
 7759  -rw-          2097152   Apr 3 2018 02:54:46 -07:00  nvram_config_bkup
 7768  -rw-         28959628   Apr 3 2018 02:55:03 -07:00  cat3k_caa-platform.SPA.03.07.05E.pkg
 7771  -rw-             1236   Apr 3 2018 02:55:51 -07:00  cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.conf
 7766  -rw-        128574272   Apr 3 2018 02:55:02 -07:00  cat3k_caa-wcm.SPA.10.3.150.0.pkg
 7764  -rw-             4754   Apr 3 2018 02:56:20 -07:00  packages.conf.00-

1621966848 bytes total (718438400 bytes free)

TEST-3850#reload
          Chassis 1 reloading, reason - Reload command
                                                      Apr  3 02:58:04.867 FP0/0: %PMAN-5-EXITACTI                                  ON: Process manager is exiting: reload fp action requested
Apr  3 02:58:08.779 RP0/0: %PMAN-5-EXITACTION: Process manager is exiting: process exi
octeon_wdt: WDT device closed unexpectedly.  WDT will not stop!
reboot: Restarting system



Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.

Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address    : 0x5377734c
Kernel Size       : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size    : 0xd47c7e/13925502
Compression Format: .mzip

Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf

### Launching Linux Kernel (flags = 0x5)

All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0


FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled


Front-end Microcode IMG MGR: found 4 microcode images for 1 device.
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_0
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_1
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_2
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_3

Front-end Microcode IMG MGR: Preparing to program device microcode...
Front-end Microcode IMG MGR: Preparing to program device[0]...594412 bytes.
Front-end Microcode IMG MGR: Programming device 0...rwRrrrrrrw..0%...............................................................................................................10%..............................................................................................................20%..............................................................................................................30%..............................................................................................................40%..............................................................................................................50%...............................................................................................................60%..............................................................................................................70%..............................................................................................................80%..............................................................................................................90%..............................................................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...393110 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%.........................................................................10%........................................................................20%..........................................................................30%........................................................................40%........................................................................50%..........................................................................60%.........................................................................70%..........................................................................80%........................................................................90%........................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...25166 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%....10%....20%......30%...40%......50%....60%......70%...80%......90%....100%w

Front-end M▒


Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.

Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address    : 0x5377734c
Kernel Size       : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size    : 0xd47c7e/13925502
Compression Format: .mzip

Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf

### Launching Linux Kernel (flags = 0x5)

All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0


FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled


              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706



Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.07.05E RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Fri 10-Feb-17 07:59 by prod_rel_team

Cisco IOS-XE software, Copyright (c) 2005-2015 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.
(http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.





FIPS: Flash Key Check : Begin
FIPS: Flash Key Check : End, Not Found, FIPS Mode Not Enabled

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco WS-C3850-48P (MIPS) processor with 4194304K bytes of physical memory.
Processor board ID FCW1943D1AG
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of Dummy USB Flash at usbflash0:.
0K bytes of  at webui:.

Base Ethernet MAC Address          : 18:8b:45:4f:c8:00
Motherboard Assembly Number        : 73-15800-07
Motherboard Serial Number          : FOC19432LAD
Model Revision Number              : X0
Motherboard Revision Number        : B0
Model Number                       : WS-C3850-48P
System Serial Number               : FCW1943D1AG


no platform punt-keepalive disable-kernel-core
     ^
% Invalid input detected at '^' marker.

hw-switch switch 1 logging onboard message
^
% Invalid input detected at '^' marker.

iox
 ^
% Invalid input detected at '^' marker.

control-plane
^
% Invalid input detected at '^' marker.

 service-policy input system-cpp-policy
 ^
% Invalid input detected at '^' marker.



Press RETURN to get started!


Cisco 8865 calls out to SIP trunk will be disconnected when put on hold on firmware sip8845_65.12-0-1-11 but not on firware sip8845_65.11-5-1-18. After working with Cisco it was determined that video was the cause of the issue with call disconnect.


Reason: Q.850;cause=47
Server: Cisco-SIPGateway/IOS-15.5.3.S4b
Session-Expires:  1800;refresher=uac
Require: timer
Supported: timer
Content-Type: application/sdp
Content-Length: 266

v=0
o=BroadWorks 623081374 2 IN IP4 67.14.90.83
s=-
c=IN IP4 65.156.9.178
t=0 0
m=audio 18748 RTP/AVP 18 0 101
a=rtpmap:18 G729/8000
a=rtpmap:0 PCMU/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=sendrecv
a=bsoft: 1 image udptl t38
a=ptime:20


the workaround is to not send video capabilities over SIP trunk

voice class sip-profiles 100
request INVITE sdp-header Video-Attribute remove
request INVITE sdp-header Video-Media modify "m=video(.*)" ""
request INVITE sdp-header Video-Bandwidth-Info remove