Cisco Expressway Upgrade Process
Cisco Expressway Upgrade Process
Customer:
Change Request:
TABLE OF CONTENTS
Table of Contents.................................................................................................................... 2
Change details........................................................................................................................ 4
Affected devices...................................................................................................................... 4
Associated devices.................................................................................................................. 4
Contacts.................................................................................................................................. 5
Supplemental information....................................................................................................... 5
Terminal Servers.................................................................................................................. 5
Vendor Documentation........................................................................................................ 5
Purpose................................................................................................................................... 5
Description........................................................................................................................... 5
Technical impact/Risk............................................................................................................. 5
Requirements.......................................................................................................................... 5
Preliminary steps.................................................................................................................... 6
Virtualization requirements.................................................................................................. 6
certificates........................................................................................................................... 7
UCM.................................................................................................................................. 7
IMP.................................................................................................................................... 7
exp....................................................................................................................................... 7
ciphers.............................................................................................................................. 8
license.............................................................................................................................. 8
Implementation plan............................................................................................................... 9
Implementation.................................................................................................................... 9
Verification......................................................................................................................... 10
Backout Plan......................................................................................................................... 10
Backout Implementation.................................................................................................... 10
Final Steps............................................................................................................................ 11
CHANGE DETAILS
Information Details
ATSG Ticket # ESR Case
Customer Ticket #
Vendor Ticket #
Estimated Duration of
00 hrs and 00 mins
Pre-Checks
Estimated Change
00 hrs and 00 mins
Duration
AFFECTED DEVICES
ASSOCIATED DEVICES
The following list contains devices that will NOT be modified but may be indirectly impacted.
CONTACTS
The following list contains all individuals involved with the change (including vendors):
SUPPLEMENTAL INFORMATION
TERMINAL SERVERS
Jump box
VENDOR DOCUMENTATION
Security advisory:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
expressway-csrf-KnnZDMj3
Upgrade Guide:
https://www.cisco.com/c/en/us/support/docs/unified-communications/expressway/217743-
upgrade-of-video-communication-server-v.html#anc2
Smart Licensing
https://www.cisco.com/c/en/us/support/docs/unified-communications/expressway/215633-
configuring-smart-licensing-on-cisco-exp.html
PURPOSE
DESCRIPTION
TECHNICAL IMPACT/RISK
REQUIREMENTS
Function Required Details (if function required)
Onsite support ☒
Vendor or TAC ☐
Hardware RMA ☐
PRELIMINARY STEPS
Review all steps in the implementation plan before proceeding
If applicable, create outage for associated device(s) to suppress alarms
If required, join bridge
Update case with details from the above steps taken and change case status to “Work in
progress”.
Notify all listed in the Contact(s) section via email, please follow the format specified in
the Change Management documentation.
VIRTUALIZATION REQUIREMENTS
Production settings meet the requirement, but both venter and ESXi run on EoL
version.
o Potential bug -https://bst.cisco.com/bugsearch/bug/CSCvy07347
Ref: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/expressway/config_guide/X14-
3/mra/exwy_b_mra-deployment-guide-x143/exwy_m_requirements-for-mra.html
UC servers meet the requirements.
o Push Notification is not enabled on UCM.
Endpoints meet minimum requirements.
CERTIFICATES
UCM
Reference:
o Bug CSCvz20720 -- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz20720
o https://www.cisco.com/c/en/us/support/docs/unified-communications/expressway/
218018-troubleshoot-expressway-traffic-server-c.html
Due to the bug CSCvz20720, Root and intermediate certificates of exp-c are required to
be uploaded to UCM publisher.
o Snaponglobal Enterprise Certificate Authority is the CA, it’s uploaded as
tomcat-trust but not callmanager-trust
Upload root certificate to the Publisher as callmanager-trust (pending)
o Confirm it’s distributed to other UCM nodes
o If not, upload it to each node manually
Restart below services on all UCM nodes (pending)
o Cisco Tomcat
o Cisco callmanager
o Cisco TFTP
o Cisco HAProxy is restarted automatically when Tomcat is restarted.
If it’s not restarted, restart it via cli utils service restart Cisco HAProxy
IMP
EXP
CIPHERS
LICENSE
Starting from x14.2, smart license is the only available license mode (pending)
o If the EXP is used only for MRA, no license is needed
o If any other feature is used, e.g B2B, it’s customer’s responsibility to make sure that
EXPs are able to communicate with Cisco smart software Manager.
o It’s also customer’s responsibility to get license assigned and be able to access
license portal for any troubleshooting if needed.
VIA GUI:
Review the following and save screenshots:
VIA CLI:
cd / && ./sbin/verify-syskey
o It must not provide any output. If you got an “error” as a result, open CTAC tickt to fix
the issue prior to upgrade.
o At the time of this writing, there was no error output from all exps. This verification
needs to perform again prior to the upgrade.
Backups:
IMPLEMENTATION PLAN
IMPLEMENTATION
UPGRADE
https://software.cisco.com/download/home/286255326/type/286332039/release/X14.3.4
2. Start upgrade from EXP-E primary following by EXP-E secondary, EXP-C primary and EXP-C
secondary one at a time.
3. Go to Maintenance > Maintenance mode
b. Follow the prompt, press Continue to proceed with the upgrade and Reboot to switch
to new version.
c. After the server is up run xConfiguration Security CSRFProtection status: “Enabled”
SMART LICENSING
VERIFICATION
1. go to Status > Overview, make sure all EXPs are on x14.3.4
2. go to Status > Alarms, confirm no cluster alarms
3. go to System > Clustering and confirm cluster status
4. go to Configuration > Zones > Zones, ensure that Unified communication
traversal shows as Active
5. Test MRA log in, calls. If everything works fine, jump to step 8. Otherwise, go to step 6.
6. go to Maintenance > Security > Ciphers, confirm ciphers order.
a. After the upgrade, the ECDSA could be preferred, which uses callmanager-ECDSA
and tomcat-ECDSA certificates (self-signed) to be uploaded to EXPs.
Note: EXP has a known bug – CSCwa12905 and it’s impossible to upload two different
certificates with the same common name. So CA signed certificate is preferred.
BACKOUT PLAN
BACKOUT IMPLEMENTATION
Note: EXP keeps two sets of partitions after an upgrade: one for upgraded version and one
for previous version.
1. Ssh to EXP with root account.
2. Issue the command selectsw to identify the active set.
a. If the output is “1”, then the current version is set 1.
3. To switch to another version, issue command selectsw <>
a. The output is based on the output of step 2.
b. If output is 1, then issue the command selectsw 2; if the output is 2, then issue
selectsw 1.
4. Reboot the device
a. After switch version, if CLI prompt for restart, press Y and enter
b. If no prompt, go to GUI to reboot
BACKOUT VERIFICATION
FINAL STEPS
Ensure that all debugs and elevated traces are disabled unless explicitly stated
otherwise
Please refer to the Operations documentation, Change Management, and complete all
steps to finalize the change and to communicate effectively on the change
status/completion.