Driver Support Document
SYSOID Mapping | ||
SYSOID | MODEL | OS VERSION |
1.3.6.1.4.1.9.5.18 | wsc1900 | 9.x.x |
1.3.6.1.4.1.9.5.28 | wsc1900c | 9.x.x |
1.3.6.1.4.1.9.5.31 | wsc1900i | 9.x.x |
1.3.6.1.4.1.9.5.175 | wsc1900LiteFx | 9.x.x |
The Catalyst 1900 does not send syslog messages.
The product expects the default prompts for Cisco IOS devices, and cannot discover or otherwise interact with the device if it is unable to recognize these prompts.
Exec: >
Enable: #
Config: )#
If your organization routinely uses non-standard IOS device prompts, contact Customer Support to see whether the product can be reconfigured to match your environment.
Some Cisco devices support named routing contexts. If NA must use the command option "vrf <vrf>" for any device tasks, set the "vrf" custom access variable to contain the context used for device access.
Some older versions of Cisco IOS an have problems with SCP transfers; NA only supports a device SCP server for IOS versions 12.3 and later. It is recommended that SCP and TFTP are both enabled so TFTP will be used in the case that SCP fails.
NA has dropped support for SCP v1.5 due to known security issues. Some device/OS combinations have issues with SCP v2 and will fall back to SCP v1.5. Currently, the WS-C4006 with IOS 12.2(20)EW4 is the only confirmed case. As a result, these devices will fail to transfer files using SCP with current versions of NA.
Workaround:
If SCP issues persist, uncheck the SCP protocol and select TFTP to ensure correct operation.
Most Cisco models use a file named VLAN.DAT file to store vlan information; where avaiable, this driver attempts to retrieve that file and store it as a binary configuration. To enable the capture of the vlan.dat file, set the access variable "getvlan" to "true".
Because the file's location varies depending on the device model, the show version data is used to attempt to determine its location. The default location is "flash"; to override this, set the "vlanslot" custom variable to set the slot name.
During a Software Image Updater task, the product attempts to upload a new software image with the same filename as the existing image. Some IOS versions do not support this action. Choosing the option Delete files from selected slot, then compact memory can support the image update by deleting the existing file before attempting to upload the new image. However, this actions succeeds only if the existing image uses the default filename extension .bin.
If the image file has been renamed using a non-default extension, the product cannot find or delete the file and the new image cannot be uploaded. The Device Software Update task will fail. In these cases use a different image filename.
Alternatively, you can prepare the flash manually or via a custom command script before deploying the software image.
Note: The Delete Files operation deletes only .bin file extensions to prevent any configuration or crash information files in flash memory from being deleted.
Some older versions of Cisco IOS can have problems with SCP transfers. It is recommended that SCP and TFTP are both enabled so TFTP will be used in the case that SCP fails.
The driver supports the deployment of software images contained within TAR archives using the "archive" command. TAR extractions can take a long time to complete. As a result, the Update Device Software task could timeout.
Workaround:
Set the "archive_timeout" access variable to a sufficient number of seconds to complete the task. The default setting is 2,000 seconds.
The SWIM component is distributed by Cisco to allow consultation with Cisco.com to recommend IOS images that can be used on Cisco IOS devices. This code requires a certain level of support from the SNMP component of the IOS on the device, and some older versions of IOS are known to not work with the SWIM code, generally limited to IOS 12.1 and lower. Such failures are indistinguishable from simple SNMP timeouts or credential problems. If failures are seen, verify the device's SNMP credentials with other device tasks and check timeout settings.
The Archive Download-SW command supports several command arguments. "/overwrite" is used by default for image deployments, but the argument "/imageonly" can be added to the command by setting the device access variable "imageOnly" to "true". The argument "/leave-old-sw" can be added by setting the device access variable "leaveOld" to "true". Also, the arguments "/no-version-check /allow-feature-upgrade" can be added if the device access variable "featureUpgrade" is set to "true".
Cisco devices support installing TAR files that contain software images. However, the command used by IOS to install the file are atomic - no inspection of the software image's MD5 signature is possible, because the file is extracted and isntalled in one step. Clicking the 'verify' option for software images within a TAR file is not supported and will be ignored.
The ability to reboot a device via SNMP is not available, so deployment to startup with reboot requires CLI access to be successful.
Workaround:
Deploy configurations to running configuration, or enable CLI access.
Cisco devices with slower processors may time out an SNMP/TFTP Configuration Deployment task.
Workaround:
Deploy configurations via CLI/TFTP only.
Cisco devices can maintain multiple lines of "remarks" for access list specifications. The device does not check for duplication of remark lines, so any deployment of a remark back to the running configuration of the device will create another remark line (a duplicate).
Workaround:
Use the system persistent comments for ACL remarks. This capability is handled automatically by using ACL comments in the system.
Cisco devices have several different authentication methods available, including line (exec) passwords, enable, local users, and various AAA servers. The product Change Password task assumes the device is using only exec and enable passwords.
If your device uses local user or AAA passwords the Change Password task usually makes the device unreachable from the product and may make the device unreachable manually. Consider noting the Change Password limitation in the device Description for any Cisco device that uses local user or AAA passwords.
Some situations may require parsing inventory information that is not shown in the standard "show inventory" command. To switch this command to "show inventory raw", set the device access variable "raw_inventory" to "true"; parsing will continue based on the same output format, but will include the extra information.
Cisco IOS devices may allow users to enter more than one remark line per access list. When this access list is redeployed, the device replicates each remark line.
To eliminate this problem, use the product commenting feature to create and track configuration comments.
Some Cisco devices could retain a VLAN's port associations after the VLAN is deleted from the device. To ensure this does not occur, relocate the ports from a VLAN prior to deleting the VLAN from the device configuration.