Release Notes for Cisco Mobility Services Engine Release 8.0.150.x
What’s New in Cisco MSE Release 8.0.150.0
Upgrading from Cisco MSE Release 8.x to Cisco CMX Release 10.x
Downgrading from Cisco CMX Release 10.x to Cisco MSE Release 8.x
Upgrading from Cisco MSE Release 8.0.120.0 through 8.0.140.9 to Cisco MSE to 8.0.150.x
Upgrading from Cisco MSE Release 7.4.x to Cisco MSE 8.0.120 through 8.0.140.9
Restoring an Old Cisco MSE Backup to Cisco MSE Release 8.0.140.x
Restoring an Old Cisco MSE Backup to Cisco MSE Release 8.0.150.x
Updated Software Version Shown in the Cisco Prime Infrastructure After Polling
Upgrading Cisco MSE High Availability
Configuring History Pruning Parameters
Cisco MSE Licensing Information
Cisco MSE License Product Numbers and SKUs
Ordering Support for Physical and Virtual Appliance
Base Location Services Licenses
Cisco CMX Licenses (Previously Known as Advanced Location Services)
Base Location Services to Cisco CMX Upgrade License
wIPS Enhanced Local Mode License
wIPS Monitor Mode/Monitor Module License
Cisco MSE Virtual Appliance Product Specifications
Operational Notes for Cisco MSE High Availability
VIP and Prime Infrastructure Configuration
Changing Cisco MSE HA Role from Primary to Secondary
Deleting HA Mode MSE from Prime Infrastructure
Operational Notes for Cisco MSE
Synchronizing Maps with Cisco MSE
Synchronizing Floor Maps in Location Service
Enabling TLS Version 1.0 for NMSP Connections
Resolution to NMSP/SHA2 Keyhash Mismatch Issue
Rebooting Cisco MSE After Fresh Installation or Upgrade
Automatic Installation Script for Initial Setup
Configuration Changes for Greater Location Accuracy
Wireless Security Module with Cisco Aironet 3600 and 3700 Series Access Points
AeroScout Engine Module Changes
Ports to be Opened for High Availability Between Cisco MSEs
Northbound Notification Name Issue
Operational Notes for Context-Aware Service
Floor Change or Minimum Distance for Location Transitions to Post to History Log
Non-Cisco Compatible Extensions Tags
Cisco Compatible Extensions Version
Tablets and Smartphones with Limited Probe Requests
Operational Notes for Upgrading Cisco MSE from CAS Licenses to wIPS Licenses
Operational Notes for Cisco CMX Analytics
Operational Notes for Facebook Wi-Fi
Operational Notes for Cisco CMX Connect and Engage
Operational Notes for Mobile SDK
Operational Notes for Cisco Access Points
Enabling Root Access Control in HA Mode
Resynchronizing Cisco WLC to Cisco MSE After an Upgrade
DoD Mode Is Enabled by Default
Troubleshooting Errors While Installing Device Certificate on Cisco MSE
Adding New Iptables Rules to Cisco MSE
Resolved Caveats in Cisco MSE Release 8.0.150.0
Communications, Services, and Additional Information
First Published: November 12, 2017
This document describes what is new and important in Cisco Mobility Services Engine (MSE) Release 8.0.150.x, including the requirements, upgrade instructions, open and resolved caveats, and related information. Unless otherwise noted, Cisco Mobility Services Engine is referred to as Cisco MSE in this document.
Note Before installing the Cisco MSE software, see the “Upgrading Cisco MSE” section for details on compatibility with the Cisco Wireless Controllers (WLC) and Cisco Prime Infrastructure. Complete compatibility information is provided in the Cisco Wireless Solutions Software Compatibility Matrix at: https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html.
Note Cisco MSE 3310 and Cisco MSE 3350 are not supported beyond Cisco MSE Release 7.3.
These release notes contain the following sections:
Note Licenses are required to run all services. For information about ordering, see the “Cisco MSE Licensing Information” section.
Cisco MSE supports these services within the overall Cisco Unified Wireless Network (CUWN):
For an improved Analytics experience, we recommend using Cisco CMX Release 10.2.2. No new features will be added to the Analytics engine for Cisco MSE Release 8.0.
Note From Cisco MSE Release 7.5 onwards, Cisco location engine is used to track clients and tags. If AeroScout engine is detected when you are upgrading from release 7.2 and later releases to release 7.5, then a warning message is displayed about removing the AeroScout license and engine. If you accept, the installer will remove all partner engine sub services. If you do not accept the removal of partner engine, then the installer will exit.
Note Starting from Cisco MSE release 7.4, the evaluation licenses for 100 clients, 100 tags, and 10 wIPS monitor mode access points are a standard on each Cisco MSE. The licenses are valid for a period of 120 days; from Release 6.0 till Release 7.3 the licenses were valid for a period of 60 days.
Note From Cisco MSE release 7.4 onwards, licensing is based on AP count and not on tracked device count.
This release delivers a number of critical bug-fixes. There are no new features added in this release. For bugs addressed in this release, see the “Caveats” section.
For more information about instructions on how to configure the Cisco MSE features, see the Cisco Connected Mobile Experiences Configuration Guide, Cisco Wireless Intrusion Prevention System Configuration Guide, Cisco CMX Analytics Service Configuration Guide, Cisco CMX Connect and Engage Configuration Guide, and Cisco MSE Virtual Appliance Configuration Guide at: https://www.cisco.com/en/US/products/ps9742/products_installation_and_configuration_guides_list.html
For information, see the “Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x” section in the Cisco Wireless Solutions Software Compatibility Matrix : https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html.
For instructions on automatically downloading the Cisco MSE software using Cisco Prime Infrastructure or for manually downloading the software using a local or remote connection, see the “Updating Mobility Services Engine Software” section in Chapter 2 of the Cisco Mobility Services Engine Getting Started Guide : https://www.cisco.com/en/US/products/ps9742/prod_installation_guides_list.html
Only users with Cisco MSE Release 7.4 or later will be able to upgrade to Cisco MSE Release 8.0.150.x. The following scenarios are available to upgrade from Cisco MSE Release 7.4x to Cisco MSE Release 8.0.150.x.
Note Do not uninstall the releases 7.4, 7.5, 7.6, or 8.x, instead stop the Cisco MSE and run the installer.
– Downgrading from Cisco CMX Release 10.x to Cisco MSE Release 8.x
If you download the Cisco MSE image *.gz file using the Cisco Prime Infrastructure, the Cisco MSE automatically decompresses (unzips) it, and you can proceed with the installation as described in the “Upgrading from Cisco MSE Release 7.4.x to Cisco MSE 8.0.120 through 8.0.140.9” section.
If you manually download the compressed *.gz file using FTP, you must decompress the files before running the installer. These files are compressed under the Linux operating system and must be decompressed by using the tar zxvf command. For more information, see the Manually Downloading Software section in the Cisco Connected Mobile Experiences Configuration Guide, Release 8.0.
To make the.bin file executable, use the chmod +x <filename.bin> command.
The Cisco MSE virtual appliance is distributed as Open Virtualization Format (OVF) for VMware
For more information on deploying the Cisco MSE virtual appliance, see the Cisco MSE Virtual Appliance Configuration Guide, Release 8.0.
To install Cisco CMX Release 10.x on a server running Cisco MSE Release 8.x, either:
Note We recommend that you back up the Cisco MSE by using Cisco Prime Infrastructure.
Note You also need to install the Encryption Upgrade patch during this upgrade process. Make sure to download this patch file when you download the Cisco MSE to 8.0.150.0 software image.
Step 1 You can either manually download the software image or download the software image by using Cisco Prime Infrastructure.
To manually download the software image:
a. Download the applicable 8.0.150.x software image from Cisco.com. For example, the image name for Cisco MSE Release 8.0.150.0 is CISCO-MSE-L-K9-8-0-150-0-64bit.bin.tar.gz.
Note If you are downloading the Cisco MSE image file on a Windows system, remember that some browsers modify the downloaded filename. If the downloaded filename is not correct, you must update it to the correct filename before using Cisco Prime Infrastructure to transfer the file, or directly copying the file to Cisco MSE.
b. Untar the Cisco MSE software image in the /opt/installers directory.
c. From the Cisco Prime Infrastructure UI, select Services > Mobility Services Engine to download the software to a Cisco MSE.
To download the software image by using Cisco Prime Infrastructure:
a. Click the name of the Cisco MSE to which you want to download the software.
b. Select System > Maintenance > Download Software from the left menu. The Upload Software Image screen displays.
c. Click Select File, and navigate to the local folder that contains the upgrade file.
d. Select the file and click Open. When the filename appears in the Upload Software Image field, click Import to send the software to the /opt/installers folder on the Cisco MSE.
e. When using Cisco Prime Infrastructure to transfer the image to Cisco MSE, the file will be decompressed, and the.gz will be removed from the filename. Verify that the Cisco MSE image file is in the Cisco MSE /opt/installers directory. For example, the image name for Cisco MSE Release 8.0.150.0 is CISCO-MSE-L-K9-8-0-150-0-64bit.bin.tar.gz.
Note When copying the Cisco MSE image file directly to the Cisco MSE without using Cisco Prime Infrastructure, the filename of Cisco MSE image will remain unchanged.
f. Use the cd /opt/installers command to navigate to the /opt/installers directory.
Step 2 Use the tar xvf <.tar.image-name > command to unpack the installation files. For example, for Cisco MSE Release 8.0.150.0:
This unpack action yields the following files. These files must be in the same directory when running the installer. The installation process uses the MSE_PUB.pem and signhash.bin files to validate the integrity of the Cisco MSE image.
Note If the Cisco MSE image file was transfered directly to the Cisco MSE and not downloaded by using Cisco Prime Infrastructure, use the tar xvf <.gz-image-name> command to decompress and unpack the installer files.
Note Do not untar or unzip the database package.
Step 3 Use the chown nobody:nobody./ < image-names > command to change the permissions of the files. For example, for Cisco MSE Release 8.0.150.0:
Note A space must be provided between the filenames in the chown command above.
Step 4 Make sure that the Cisco MSE bin file (for example, CISCO-MSE-L-K9-8-0-150-0-64bit.bin) has execute permissions for the root user.
If it does not, use the chown +x <.bin-image-name > command. For example, for Cisco MSE Release 8.0.150.0:
Step 5 Manually stop the Cisco MSE service by using the /etc/init.d/msed stop command or the service msed stop command.
Step 6 Apply the Encryption Upgrade patch:
a. Extract the Encryption Upgrade patch file (enc-upgrade-patch.tar.gz) to the /opt/installers folder:
b. Apply the patch by using the ./apply-patch.sh command.
Step 7 Use the /opt/installers/ <.bin-image-name > command to install the new Cisco MSE image. For example, for Cisco MSE Release 8.0.150.0:
Note The installation process takes a minimum of 30 minutes. The actual installation time depends on the amount of data present in your system. After the installation, reboot the system before starting Cisco MSE.
Step 8 After exiting the installer, enter the reboot command to reboot Cisco MSE.
See “Upgrading Cisco MSE High Availability” section for details on upgrading Cisco MSE high availability.
Note We recommend that you back up the Cisco MSE by using Cisco Prime Infrastructure.
Note If you already have Cisco MSE Release 8.0.120.0 installed (either with or without the CSCuv55645.zip patch), you can upgrade up to Cisco MSE Release 8.0.140.9 by using the upgrade procedure described in this section.
Step 1 You can either manually download the software image or download the software image by using Cisco Prime Infrastructure.
To manually download the software image:
a. Download the applicable 8.0.140.x software image from Cisco.com. For example, the image name for Cisco MSE Release 8.0.140.0 is CISCO-MSE-L-K9-8-0-140-0-64bit.bin.tar.gz.
Note If you are downloading the Cisco MSE image file on a Windows system, remember that some browsers modify the downloaded filename. If the downloaded filename is not correct, you must update it to the correct filename before using Cisco Prime Infrastructure to transfer the file, or directly copying the file to Cisco MSE.
b. Untar the Cisco MSE software image in the /opt/installers directory.
c. From the Cisco Prime Infrastructure UI, select Services > Mobility Services Engine to download the software to a Cisco MSE.
To download the software image by using Cisco Prime Infrastructure:
a. Click the name of the Cisco MSE to which you want to download the software.
b. Select System > Maintenance > Download Software from the left menu.
c. To download the software, perform one of the following tasks:
– To download a software listed in the Cisco Prime Infrastructure directory, click the Select from uploaded images to transfer into the Server radio button and choose a binary image from the drop-down list.
Cisco Prime Infrastructure downloads the binary image to the FTP server directory you specified during the Cisco Prime Infrastructure installation.
– To download a software that is available locally or over the network, select the Browse a new software image to transfer into the Server radio button and then click Choose File. After locating the file, click Open.
d. Click Download to send the software to the /opt/installers folder on the Cisco MSE.
e. When using Cisco Prime Infrastructure to transfer the image to Cisco MSE, the file will be decompressed, and the.gz will be removed from the filename. Verify that the Cisco MSE image file is in the Cisco MSE /opt/installers directory. For example, the image name for Cisco MSE Release 8.0.140.0 is CISCO-MSE-L-K9-8-0-140-0-64bit.bin.tar.gz.
Note When copying the Cisco MSE image file directly to the Cisco MSE without using Cisco Prime Infrastructure, the filename of Cisco MSE image will remain unchanged.
f. Use the cd /opt/installers command to navigate to the /opt/installers directory.
Step 2 Use the tar xvf <.tar.image-name > command to unpack the installation files. For example, for Cisco MSE Release 8.0.140.0:
This unpack action yields the following files. These files must be in the same directory when running the installer. The installation process uses the MSE_PUB.pem and signhash.bin files to validate the integrity of the Cisco MSE image.
Note If the Cisco MSE image file was transfered directly to the Cisco MSE and not downloaded by using Cisco Prime Infrastructure, use the tar xvf <.gz-image-name> command to decompress and unpack the installer files.
Note Do not untar or unzip the database package.
Step 3 Use the chown nobody:nobody./ < image-names > command to change the permissions of the files. For example, for Cisco MSE Release 8.0.140.0:
Note A space must be provided between the filenames in the chown command above.
Step 4 Make sure that the Cisco MSE bin file (for example, CISCO-MSE-L-K9-8-0-140-0-64bit.bin) has execute permissions for the root user.
If it does not, use the chown +x <.bin-image-name > command. For example, for Cisco MSE Release 8.0.140.0:
Step 5 Manually stop the Cisco MSE service by entering this command:
Step 6 Use the /opt/installers/ <.bin-image-name > command to install the new Cisco MSE image. For example, for Cisco MSE Release 8.0.140.0:
Note The installation process takes a minimum of 30 minutes. The actual installation time depends on the amount of data present in your system. After the installation, reboot the system before starting Cisco MSE.
Step 7 After exiting the installer, enter the reboot command to reboot Cisco MSE.
See “Upgrading Cisco MSE High Availability” section for details on upgrading Cisco MSE high availability.
Note Before you begin: If high availability is configured, delete the secondary Cisco MSE before restoring the historical data on the primary Cisco MSE. You can add the deleted Cisco MSE after restoration on the primary Cisco MSE successfully completes.
Note The regular restore option on the Cisco Prime Infrastructure cannot be used to restore a backup from an earlier Cisco MSE Releases such as 6.0, 7.0.105.0, or 7.0.110.0 to Cisco MSE Release 8.0.140.x.
To restore an old database to Cisco MSE Release 8.0.140.x, follow these steps:
Step 1 Stop the Cisco MSE service: /etc/init.d/msed stop
Step 2 Uninstall the software and select the option to delete the database.
Step 3 To restore backup data, you must first install the appropriate version of Cisco MSE software. Use the table below to determine the correct version of Cisco MSE to install.
Step 4 After you have installed the software, restore the desired database backup to the new Cisco MSE by using the regular procedure from Cisco Prime Infrastructure.
Step 5 To migrate data to 7.x.x.x, follow the steps provided in the “Upgrading from Cisco MSE Release 7.4.x to Cisco MSE 8.0.120 through 8.0.140.9” section.
Note A backup from Cisco MSE Release 8.0.140.9 or earlier cannot be restored directly to Cisco MSE Release 8.0.150.0.
To restore an old database to Cisco MSE Release 8.0.150.x, follow these steps:
Step 1 Restore backup data, as described in the “Restoring an Old Cisco MSE Backup to Cisco MSE Release 8.0.140.x” section.
Step 2 Upgrade Cisco MSE to Cisco MSE Release 8.0.150.x, as described in the “Upgrading from Cisco MSE Release 8.0.120.0 through 8.0.140.9 to Cisco MSE to 8.0.150.x” section.
After a software update, the new Cisco MSE software version does not immediately appear in Cisco MSE queries on the Cisco Prime Infrastructure. Up to 5 minutes are required for the new version to appear. By default, Cisco Prime Infrastructure queries the Cisco MSE for status every 5 minutes.
To upgrade for Cisco MSE high availability, follow these steps:
Step 1 Ensure that the HA pair that needs to be upgraded is in normal mode and not in Failover mode. In normal mode, the Primary Cisco MSE is active and the Secondary is in standby mode. The output of the gethainfo command on primary MSE will show PRIMARY_ACTIVE and the secondary MSE will show SECONDARY_ACTIVE.
Step 2 Log in to Cisco Prime Infrastructure and delete the Cisco MSE HA pair.
Step 3 Perform a full backup of the primary Cisco MSE.
Step 4 Stop the primary Cisco MSE and the secondary Cisco MSE by using the service msed stop command.
Step 5 Perform the upgrade on the Primary and Secondary Cisco MSE servers by following the instructions described in Upgrading from Cisco MSE Release 7.4.x to Cisco MSE 8.0.120 through 8.0.140.9.
Step 6 Start both the primary and secondary Cisco MSE instances by using the service msed start command.
Step 7 Recreate the Cisco MSE HA pair using Cisco Prime Infrastructure.
The History Pruning parameters are configured from the Cisco Prime Infrastructure or Cisco MSE user interface. This interface is used to:
Starting in Cisco MSE Release 8.0.130.0, the Cisco Prime Infrastructure and Cisco MSE user interface is used to enable/disable History tracking for clients/tags/rogue APs/rogue clients/interferers. The pruning of History data takes place every hour automatically. This hourly pruning task computes the number of history records that must be deleted to bring the record count to the platform limit. After the computation, the pruning task deletes the oldest history records so that the record count matches the platform limit. The history pruning task does not perform anything if the history record count is below the platform limit. The Cisco MSE Administrator cannot change the pruning interval or the history retention duration.
The history record count for various Cisco MSE platforms is as follows:
Client and wIPS licenses are installed from the Cisco Prime Infrastructure UI (Administration > License Center). See, Chapter 2: “Adding and Deleting Mobility Services Engines and Licenses” in the Cisco Connected Mobile Experiences Configuration Guide , Release 8.0, Cisco Wireless Intrusion Prevention System, Release 8.0, and Cisco Location Analytics Configuration Guide, Release 8.0.
For complete details on ordering and downloading licenses, see the Cisco Mobility Services Engine Licensing and Ordering Guide at: https://www.cisco.com/en/US/prod/collateral/wireless/ps9733/ps9742/data_sheet_c07-473865.html
Cisco MSE provides a wide variety of location-based services. To enable these services, the following are required:
– Physical Appliance—An activation license is not required.
– Virtual Appliance—Requires a Cisco MSE Virtual Appliance Activation license (L-MSE-7.0-K9). It is not sufficient to simply have a service or feature license on an Cisco MSE Virtual Appliance.
Three types of Cisco MSE licenses are available:
The Cisco CMX license, called Advanced Location license in release 7.4, supports new features, such as:
The CMX license includes the Base Location license features used for device tracking and the new additional features of Cisco CMX.
The part number format of this license is L-AD-LS-100AP. Here 'AD-LS' refers to Advanced Location services license and '100AP' gives the AP count supported.
All Cisco wIPS licenses come with the license name wIPS license
There are three deployment options:
Licensing is based on the number of access points in the environment. The licenses are additive.
The Cisco MSE Virtual Appliance activation license is required for every instance of a Cisco MSE Virtual Appliance. No separate license is required for high availability. To enable high availability, you need to deploy a primary Cisco MSE appliance with Cisco Connected Mobile Experiences and wIPS licenses, and a secondary Cisco MSE appliance without any Cisco CMX or wIPS license.
Cisco CMX licenses include the Base Location Service licenses. There is no need to purchase a separate Base Location Service license when purchasing a Cisco CMX license.
This section describes the operational notes and navigation changes for Connected Mobile Experiences, wIPS, and the Cisco MSE for Release 6.0.103.0 and later releases.
Features and operational notes are summarized separately for the Cisco MSE, Connected Mobile Experiences, and wIPS.
This section contains the following topics:
(CSCvb61125) When configuring High Availability on the Cisco MSE, make sure that the virtual IP address (VIP) is assigned first, and then set the Prime Infrastructure password through the setup.sh file.
If you change the VIP after setting the Prime Infrastructure password, you will need to reset the password through the setup.sh file. Otherwise, HA configuration cannot be completed.
(CSCvb59484) We do not recommend swapping HA roles. If the role or the VIP needs to be changed, follow these steps:
Step 3 If the new role is Primary, assign the VIP.
Step 4 Select the Verify and apply option to apply the changes.
Step 5 Restart the Cisco MSE services.
Step 6 Reboot the Cisco MSE, if needed.
Step 7 Run the setup script again.
Step 8 Change the Prime Infrastructure password of the Cisco MSE.
Step 9 Select the Verify and apply option to apply the changes.
Step 10 Restart the Cisco MSE services.
Step 11 From Prime Infrastructure, edit the Cisco MSE configuration so that the primary Cisco MSE uses the new Prime Infrastructure password.
Step 12 Verify that the reachability status for the primary Cisco MSE shows as Reachable.
Step 13 Continue with HA configuration from Prime Infrastructure.
(CSCve63054) If you need to change the Cisco MSE HA role from Primary to Secondary:
If you need to change the Cisco MSE HA role from Secondary to Primary:
To delete the Cisco MSE in HA mode from Prime Infrastructure, follow these steps.
Step 1 From Prime Infrastructure, go to the HA configuration of the primary Cisco MSE and click Delete to break the HA pair.
Step 2 After the secondary Cisco MSE is deleted from Prime Infrastructure, delete the primary Cisco MSE from Prime Infrastructure.
This section lists the operational notes for the Cisco MSE and contains the following topics:
While synchronizing floor maps in location service, we recommend that you synchronize floor maps in batches of 1000 APs at a time.
From Cisco MSE Release 8.0.150.0 and later, Transport Layer Security (TLS) version 1.0 is, by default, disabled for all types of connections. Cisco MSE uses only TLS versions 1.1 and 1.2 for all connections.
Cisco wireless controllers running releases 8.0.72.140 and earlier do not support TLS version 1.1 and above, causing Network Mobility Services Protocol (NMSP) connections to become inactive.
To make NMSP connections active again, enable TLS version 1.0 (only for NMSP connections) through the setup.sh script by following these steps:
1. From the Cisco MSE shell prompt, enter the /opt/mse/setup/setup.sh command.
3. Select the 23) Configure TLSv1.0 for NMSP option.
4. Follow the prompts to enable TLSv1.0.
5. Select the 25) ## Verify and apply changes ## option to apply the changes. Note that this restarts Cisco MSE services.
By default, Cisco MSE Release 8.0 supports SHA-2 keyhash algorithm for peer authentication with Cisco WLC Release 8.0 during the SSL handshake. Cisco Prime Infrastructure 1.4.2 and 2.1 supports only SHA-1 AP (or Cisco MSE) Authorization template when synchronizing Cisco WLC with the Cisco MSE. This causes keyhash mismatch issue because the Cisco Prime Infrastructure and Cisco MSE use different keyhash algorithm on Cisco WLC Release 8.0. An option is added to the Advanced Parameters page in the Cisco MSE user interface (UI) to allow the user to force Cisco MSE Release 8.0 to use SHA-1 keyhash algorithm.
Follow these instructions to configure SHA-1 Cipher:
Step 1 Launch the Cisco MSE admin UI by typing https://mseip/ mseui in a web browser.
Step 3 Choose System > Advanced Parameters from the left menu.
Step 4 Check the Enable Use of SHA-1 Ciphers check box (see Figure 1).
Step 6 Unsynchronize Cisco WLC from Cisco MSE, and then resynchronize Cisco WLC with Cisco MSE from Cisco Prime Infrastructure.
Step 7 The NMSP status should change to active state.
Note If the FIPS mode (also known as Root Access Control) is enabled on the Cisco MSE, then this option will not be available to the users as FIPS mode requires all operations in SHS-2.
After a new installation or upgrade of the Cisco MSE software, you must reboot the Cisco MSE by using the reboot command.
An automatic setup wizard is available to help you initially set up the Cisco MSE.
An example of the complete automatic setup script is provided in the Cisco Mobility Services Engine Getting Started Guide : https://www.cisco.com/en/US/products/ps9742/prod_installation_guides_list.html
Communication between the Cisco MSE, the Cisco Prime Infrastructure, and the Cisco WLC are in Coordinated Universal Time (UTC). Configuring the Network Time Protocol (NTP) on each system provides devices with the UTC time. An NTP server is required to automatically synchronize time between the Cisco WLC, Cisco Prime Infrastructure, and the Cisco MSE.
The Cisco MSE and its associated controllers must be mapped to the same NTP server and the same Cisco Prime Infrastructure server.
Local time zones can be configured on a Cisco MSE to assist the network operations center personnel in locate events within logs.
Note You can configure NTP server settings while running the automatic installation script. See the Cisco Mobility Services Engine Getting Started Guide Started Guide for details on the automatic installation script at https://www.cisco.com/en/US/products/ps9742/prod_installation_guides_list.html
You must change the default root password of the Cisco MSE while running the automatic installation script to ensure optimum network security.
You can also change the password by using the Linux passwd command.
Note During the initial login, even if you choose Skip (S), you will be prompted to enter the password. This is because it is mandatory to change the root password at the initial login.
You can configure the Cisco Prime Infrastructure communication password by using the Cisco MSE setup.sh script file.
The scenarios which you might encounter while configuring the Cisco Prime Infrastructure password are as follows:
Note The Cisco Prime Infrastructure communication users are API users, and they do not have corresponding operating system users on the Cisco MSE appliance.
In some RF environments, where location accuracy is around 60 to 70 percentage or where incorrect client or tag floor location map placements occur, you might have to modify the moment RSSI thresholds in the Context Aware Service > Advanced > Location Parameters page on the Cisco Prime Infrastructure.
The following RSSI parameters might require modification:
Contact Cisco TAC for assistance in modifying these parameters.
If you are attempting to deploy Wireless Security Module (WSM) with Cisco Aironet 3600 and 3700 Series APs, then APs should be placed in monitor mode with both submode wIPS and advanced wIPS engine enabled on the Cisco Prime Infrastructure.
Starting Release 7.5, the AeroScout engine module is removed from both the Cisco CMX setup and location code. During installation, if you are upgrading from Release 7.2 and later to Release 7.5, then you will be prompted to remove the AeroScout engine. If you agree to remove, the AeroScout engine is removed and by default, the Cisco Tag Engine is started as part of Cisco CMX. If you do not agree to remove the AeroScout engine, the installation will exit.
The following is the list of ports to be opened for High Availability between Cisco MSEs:
This section lists the operational notes for a Cisco MSE and contains the following topics:
When upgrading to Release 8.0.130.0 or later from Release 7.x, you must synchronize after the software upgrade and when CAD-generated floor images are imported into the Cisco Prime Infrastructure.
When history logging is enabled for any or all elements (client stations, asset tags, rogue clients, and access points), a location transition for an element is posted only if it changes floors, or the new location of the element is at least 30 feet (10 meters) from its original location.
Note The other conditions for history logging are as follows:
See Services > Mobility Services > Device Name > Context Aware Service > Administration > History Parameters.
Logs can be viewed at Services > Mobility Services > Device Name > Systems > Log.
The Cisco MSE does not support non-Cisco CX Wi-Fi tags. Additionally, these non-compliant tags are not used in location calculations or shown on the Cisco Prime Infrastructure maps.
Only Cisco CX Version 1 or later tags can be used in location calculations and mapped in the Cisco Prime Infrastructure.
In the Monitor > Clients page (when Location Debug field is enabled), you can view information on the last heard access point and its corresponding RSSI reading.
Calibration models always apply to wireless clients, interferers, rogue APs, and rogue clients.
See Chapter 7, “Context-Aware Planning and Verification” in the Cisco Connected Mobile Experiences Configuration Guide, Release 8.0 for more information about client calibration.
Settings for advanced location parameters related to RSSI, chokepoint usage, location smoothing, and assignment of outside walls on floors, are not applicable to tags.
See the “Editing Advanced Location Parameters” section in Chapter 7 of the Cisco Connected Mobile Experiences Configuration Guide, Release 8.0.
See Services > Mobility Services > D evice Name > Context Aware Service > Advanced > Location Parameters.
The Cisco Prime Infrastructure time stamp is based on the browser location and not on the Cisco MSE settings. Changing the time zone on the Cisco Prime Infrastructure or on the Cisco MSE does not change the time stamp for the location history.
Many tablets, smartphones, and other Wi-Fi devices with power save mode do not continuously send out probe requests after an initial association to the CUWN. Therefore, calculating the location accuracy of such devices by using RSSI readings is not always optimal.
In the relevant CAS API, the use of the parameter FLOORID is not guaranteed to return the same value on consecutive calls. It may get changed by such activities as resynchronizing the Cisco MSE. Instead, the parameter FLOORAESUID should be used. The API call getStationHistoryListByArgs can use both parameters in Cisco MSE Release 8.0.
A wIPS profile cannot be pushed to Cisco Wireless Controller (WLC) 7.5 or earlier by using the Cisco Prime Infrastructure 1.4.x or 2.x with Cisco MSE Release 7.6.
After converting the Context-Aware Services (CAS) licenses to Wireless Intrusion Prevention System (wIPS) licenses on the Cisco MSE, run the chown nobody:nobody /opt/mse/logs/framework/mse-framework.log command before restarting the Cisco MSE services.
While using the newer version of Firefox browser to connect to the Cisco MSE user interface or Cisco CMX Analytics user interface, an error message appears saying “Peer’s certificate has an invalid signature”. For more information on how to fix this, see https://support.mozilla.org/en-US/questions/776144.
To fix this, follow these steps:
Step 2 Enter about:config in the address bar.
Step 3 Enter browser.xul in the Filter field.
Step 4 Verify if the browser.xul.error_pages.expert_bad_cert property exists with a value of false.
Step 5 Right-click browser.xul.error_pages.expert_bad_cert and select Toggle. The value will change to true.
Step 7 Launch Firefox again and try the Cisco CMX Analytics user interface. You will be asked to add the exception.
The Cisco CMX Analytics in Release 8.0 the provides ability to view the analytic results in both 2D (Open Street Maps) and 3D Web Graphics Library (WebGL) environments. This provides improved understanding of results on multiple floor paths or when dwell times are calculated throughout a multistory building. The 3D environment presents the same information as the 2D environment.
WebGL is an advanced feature that provides graphic capabilities. All browsers do not support WebGL on a particular hardware. Verify your browser compatibility in the Get WebGL website. If your browser supports WebGL, then you must see a spinning cube.
Note If your system does not support 3D, then the analytic results are displayed only in 2D Open Street Maps view.
If your browser does not support WebGL, perform the following actions:
Step 1 Update your latest drivers for video card.
Step 2 For Google Chrome, follow the instructions given for WebGL and 3D Graphics in the Google Chrome support website.
1. Download the latest build of Firefox browser and launch Firefox on your computer.
2. In the browser address bar, enter about:config.
3. In the Search text field, enter webgl to filter the settings.
4. Double-click webgl.enabled_for_all_sites.
5. Set webgl.enabled_for_all_sites=true.
1. Choose Safari > Preferences.
3. Check the Show Develop menu in menu bar check box.
4. Choose Enable WebGL from the Develop menu.
Sometimes, the Cisco CMX Analytics service does not start up because of a stray JBoss process that runs as a root user. If Analytics engine does not start, and if you notice a stray JBoss process with root permissions running, perform the following actions:
Step 1 Stop Cisco CMX Analytics service from the Cisco Prime Infrastructure.
Step 2 Kill the Jboss process.
Step 3 Run the chown -R nobody:nobody /opt/mse/analytics command.
Step 4 Start Cisco CMX Analytics service from the Cisco Prime Infrastructure.
When you try to pair a location with the Facebook page, it may fail with no notification in Connect and Engage user interface. One of the reasons could be due to Facebook site outage. You can check Facebook API health at: https://developers.facebook.com/status/
Two different venues with the same Cisco MSEs receiving location updates result in the device location bouncing from one venue to another venue. The Mobile Application Server (MAS) receives updates and changes the location to the most recent update received. The client location then changes from the most recent location update, which can be from either venue.
For more information, see the Cisco Mobility Services Engine Ordering and Licensing Guide (up to Release 8.0 software) : https://www.cisco.com/c/en/us/products/collateral/wireless/mobility-services-engine/data_sheet_c07-473865.html
The supported antenna patterns are:
The supported band and antenna combinations are:
To enable Root Access Control (RAC) in HA mode, you need to enable RAC on both the primary and secondary Cisco MSEs. The RAC configuration is not synchronized across the primary and secondary servers. Therefore, you should enable it on both servers. This will enable the RAC configuration to work on the active server in case of a failover or failback.
After upgrading Cisco Prime Infrastructure or Cisco MSE, in some cases, the NMSP sync between the controllers and Cisco MSE may not work properly. Without performing the unsync and resync of the controllers to Cisco MSE, you may not able to push the wIPS profiles to Cisco WLC. We recommend that after you upgrade Cisco Prime Infrastructure or Cisco MSE, perform an unsync operation and then resync all the controllers with Cisco MSE.
(CSCuy95991) By default, the DoD mode is enabled on a newly installed or upgraded Cisco MSE.
When the DoD mode is enabled, the future restart date of the Cisco MSE cannot be later than 6 months.
You can disable the DoD mode, so that the future restart date of the Cisco MSE can be set up to 1 year later.
Do not manually delete the archive logs. Instead, use the /opt/mse/framework/bin/manualDeleteArchiveLogs.sh script to delete the archive logs.
If you encounter the Import Server Certificate failed.: Invalid input file
error while installing device certificate on Cisco MSE, perform the following steps:
Step 1 Combine all certificates in CA chain into single file by concatenating them (for example, ca-chain.pem).
Step 2 Combine the signed server certificate and server private key into single file by concatenating them (for example, server-cert-key.pem).
Step 3 Import the ca-chain.pem as the CA certificate.
Step 4 Import server-cert-key.pem as server certificate.
We recommend that you do not directly modify iptables, as those changes will not be retained when you restart the Cisco MSE services. Use the following procedure to add custom iptables rules.
Step 1 Create the f older /var/mse/firewall folder if it does not already exist:
g. Enter the mkdir /var/mse/firewall command.
h. Enter the cp -f /opt/mse/framework/bin/msefirewall-dod /var/mse/firewall/ command.
i. Enter the cp -f /opt/mse/framework/bin/msefirewall-no-dod /var/mse/firewall/ command.
j. Enter the cp -f /opt/mse/framework/bin/msefirewall-no-dod-enablehttp /var/mse/firewall/ command.
k. Enter the chown -R nobody:nobody /var/mse/firewall/ command.
l. Enter the chmod -R 755 /var/mse/firewall/ command.
Step 2 In the /var/mse/firewall/msefirewall-dod file, add your new rule(s) just before the DROP rule (which is the last line in the file).
The Bug Search Tool (BST), which is the online successor to the Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:
1. Access the BST (use your Cisco user ID and password) at https://tools.cisco.com/bugsearch/.
Use the BST to view the details of a caveat listed in this section. For more information about the BST, see the “Cisco Bug Search Tool” section.
Use the BST to view the details of a caveat listed in this section. For more information about the BST, see the “Cisco Bug Search Tool” section.
Cisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers. Join the forum at https://supportforums.cisco.com/index.jspa.
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
To submit a service request, visit Cisco Support.
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
To obtain general networking, training, and certification titles, visit Cisco Press.
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.