- Print
- PDF
Assurance Sensor Control Release Notes 24.09
These release notes cover the requirements, new features, changes, and corrected issues for the Assurance Sensor Control version 24.09. Read all release notes before installing this firmware version.
Requirements
This firmware version applies to Assurance Sensor Control.
Product Name | Software Version | Build Number | Software Files |
Assurance Sensor Control | 24.09 | VCX_24.09.0_25920 FWSUITE_VCX_24.09.0_15981 | FWSUITE_VCX_24.09_15981.afl Accedian_MIBS_25920 AMD_24.09.0_25920.afl VCX_24.09.0_25920.afl VCX_24.09.0_25920_KVM.tar.bz2 VCX_24.09.0_25920_VMWare.ova VCX_24.09.0_25920_SingleDiskKVM.tar.bz2 VCX_24.09.0_25920_SingleDiskVMWare.ova |
Note: This firmware release includes the images needed to deploy the Assurance Sensor Control using a KVM or VMware Hypervisor, as well as the .afl upgrade file that is typically part of an Assurance Sensor Control release.
Assurance Sensor Control 24.09 requires Skylight orchestrator 23.12 or newer.
Important: In Sensor Control 24.09, remote device upgrades from firmware versions before the VCX 2.2 FWSuite (FWSUITE_VCX_2.2_10190) have been blocked to protect against a potential complete loss of connectivity/functionality that cannot be recovered. To upgrade a remote device from an older FWSuite version, an older version of Sensor Control must be used to first upgrade the remote device to FWSUITE_VCX_2.2_10190.
Upgrade Considerations
Upgrading the Sensor Control firmware version does not automatically upgrade the remote device firmware suite.
As of Sensor Control 22.12, you can use remote devices that have older firmware suite versions with the current release. For this release, the supported remote device firmware suite starts with version 19.12.
Caution: The upgrade process was hardened in VCX 2.7. Under specific circumstances, the remote device upgrade can still fail. This happens if the remote device management is lost, and the remote device performs an automatic rollback. The remote device can brick if the power is lost in a critical short period. This was seen in a lab environment only and never reported by a customer.
Before doing the upgrade, it is recommended to enable Extra Reconnection Delay with the previous release (refer to the Assurance Sensor Control user manual section “Adding Remote Devices” for more details on how to enable Extra Reconnection Delay).
The downgrade is still executed using the previous software that still has the update process deficiencies. The downgrade can still cause remote devices to fail and should be avoided at the exception of VCX 2.5.0.2 and VCX 2.6.0.1 for which the downgrade is supported without issue.
It is not recommended to change any other remote device configuration when operating with a different firmware version. Changing the configuration can result in unknown behavior. A factory reset using the Module Dock may be required in some cases. In a future release, Sensor Control software will prevent changing configuration for remote devices running a different firmware version.
For cases where all remote devices cannot be upgraded at the same time, it is recommended to run different Sensor Control instances with different software versions. Remote devices to be upgraded should be moved between Sensor Controls. When downgrading Sensor Control software, the remote devices firmware version shall also be downgraded. The downgrade process shall follow these steps to successfully downgrade Sensor Control software and remote devices firmware. Note that downgrades are not recommended (see Caution above).
System Capabilities
The Sensor Control offers the following system capabilities:
Feature | Maximum | Changes in Sensor Control 24.09 |
Remote Device | ||
Remote devices configured and supported | 1500 | |
Remote device ports | 6000 | |
Interfaces, remote devices | 3000 | |
Discovery | ||
Discovery instances | 500 | |
Discovered remote devices | 2000 | |
Sensor Control Local Port & Interface | ||
Local ports (typically referred to as LOCAL-xyz) | 10 (including the Management port) | |
Sensor Control local route | 4092 | |
Interfaces, local ports | 100 | |
CFM | ||
Number of modules supporting CFM MEP session | 500 | |
CFM MEP session per second generation module | 8 | |
CFM Maximum number of Remote MEP | 99 | |
CFM MEP smallest interval | 1 second | |
Number of CFM MEP per Sensor Control | 4000 | |
Number of Packet loss per Sensor Control | 4000 | |
Number of Packet loss per second generation module | 8 | |
Number of DMM session per Sensor Control | 4000 | |
Number of DMM session per second generation module | 8 | |
DMM smallest interval | 1 second | |
Number of SLM session per Sensor Control | 4000 | |
Number of SLM session per Sensor Control | 4000 | |
Number of SLM session per second generation module | 8 | |
SLM smallest interval | 100 ms | |
SAT | ||
SAT Traffic Generation configuration (up to four flows) | 1000 | |
SAT Traffic Generation execution (up to four flows) | 500 | |
SAT Test Suites in the system (one test suite per device) | 500 | |
Y.1564 (8 flows) | 500 (tested 4) | |
SAT reports | 500 | |
TWAMP reflection instances (module) | 1500 | |
TWAMP reflection, stateful per module | 16 | |
DMM reflection instances (module) | 1500 | |
Loopback reflection per remote device | 2 | |
Flowmeter | ||
Flowmeter flows supported per remote port | 28 per device | |
Flowmeter flows supported per Sensor Control instance | 4000 | |
Flow broker | ||
Flow broker Analyzers | 100 | |
Flow broker Analyzers in an Analyzer set | 4 | |
Flow broker rules per Sensor Control | 1000 | |
Flow broker capture bandwidth per 1G module | 300 Mbps with 1 ms RTT 50 Mbps with 20 ms RTT | |
Flow broker capture bandwidth per Sensor SFP 1G | 300 Mbps with 1 ms RTT 50 Mbps with 20 ms RTT | |
Flow broker capture bandwidth per 10G module | 700 Mbps with 1 ms RTT 100 Mbps with 8 ms RTT | |
Flow broker capture bandwidth per Sensor SFP 10G | Not supported | |
Flow broker capture bandwidth per Skylight element: FSX | 100 Mbps with 1 ms RTT | |
Flow broker ERSPAN streaming bandwidth | 200 Mbps | |
Flow broker PCAP streaming bandwidth | 150 Mbps using SCP 500 Mbps using FTP | |
Flow broker Port Streaming bandwidth | 150 Mbps | |
Flow Probes | ||
PM Accuracy direct actuation (i350) | 50 us | |
NFV PM Accuracy | 15 us | |
PM Accuracy with SR-IOV | 500 µs for P99 | |
Sensor Control Actuator maximum number of probes | 4000 | |
Sensor Control Actuator maximum number of packets per second (receive and transmit) | 80 K in TX and 80 K in RX | |
Maximum number of probe reflection | 4000 | |
Maximum number of probes per module | 2000 | |
Maximum number of packets per second (receive and transmit) per module | 40 K in TX and 40 K in RX for 128-byte frames | |
PPS accuracy | ± 1.0 % | |
NFV TWAMP support | Yes | |
NFV ETH-DM support | Yes | |
NFV UDP Echo support | Yes | |
NFV ICMP Echo support | Yes | |
NFV ETH-VSP support | Yes | |
NFV ETH-LB support | Yes | |
NFV CFM maximum number of PPS | E-Line 500 remote device per Sensor Control. E-LAN 100 remote device per Sensor Control. CFM instances: E-LAN: 1 MEP (each 99 RMEP) per RD 1 SLM per MEP per RD 1 DMM per MEP per RD. Tx: 11 pps, RX: 111 pps per RD CFM instances: E-LINE: 8 MEP per Module 6 SLM@10pps for 1 MEP per Module 8 DMM@1pps for 1 MEP per Module Tx: 76 pps, Rx: 76 pps per Module | |
NFV Tunnel | ||
Packet loss requirement | 10^-6 | |
RTT requirement | Validated with RTT between 5 ms and 50 ms | |
NFV Tunnel bandwidth | 42 Mbps for NFV TWAMP deployment 84 Mbps for Reduced NFV PM footprint deployment | |
Virtual-Connection | ||
VCE with IP domain enabled | 500 | |
VCE without IP domain | 50000 | |
Number of VCEs route | 2500 | |
VCA | 30000 | |
Synchronization | ||
ARTS | 500 | |
PTP TC layer-2 | Yes (Sensor Module 1G, Sensor Module 10G, Sensor SFP Copper and Sensor SFP Optical) | |
SyncE | Yes (Sensor Module 1G, Sensor SFP Copper and Sensor SFP Optical) No (Sensor Module 10G) | |
PTP OC for module | NA | |
Service Creation | ||
Policies and traffic filters per remote device | 10 for second generation 2 for Sensor SFP 10G | |
Bandwidth Regulator per second generation module | 16 | |
Bandwidth Regulator per Sensor Control | 24000 | |
PCP CoS mapping per port | 1 | |
CoS mapping per Sensor Control | 50 | |
DSCP CoS mapping per port | 1 | |
Alarms | ||
Number of trap alarm per second | 1000 | |
Users | ||
Local users | 15 | |
User groups | 8 | |
Sessions | ||
CLI sessions | 5 | |
WEB UI sessions | 15 | |
Total maximum sessions | 20 | |
Supported Filters | ||
Layer-2 filter | 6500 | |
Ipv4 filter | 6500 | |
Ipv6 filter | 6500 | |
Total maximum sessions | 19500 |
New Features
This Assurance Sensor Control release introduces the following new features and enhancements.
Cisco Branding for Sensor Control
The graphical user interface and product name has been rebranded. The Skylight sensor: control firmware has been rebranded to display the new name of Cisco Provider Connectivity Assurance Sensor Control and user interface branding changes have been made in alignment with Cisco branding.
Cisco Hardware Branding for Module Dock
Hardware units have been rebranded for the Cisco Provider Connectivity Assurance Module Dock.
Cisco Software Branding for Module Dock
Software has been rebranded for the Cisco Provider Connectivity Assurance Module Dock.
EVC Fault Propagation
This release supports EVC fault propagation upon a remote MEP failure. This feature addresses instances where connectivity is disrupted, the Sensor Module does not receive the ETH-CSF signal, and only the CCM alarm is triggered.
Cisco Hardware Branding for Sensor Modules
Hardware units have been rebranded for the following Cisco Provider Connectivity Assurance Sensor Modules:
Module 1G
Module 10G
Automatic Assignment of the TWAMP UDP Source Port
Added support for automatic discovery and assignment of the TWAMP sender's UDP port without requiring manual configuration by the user when performing TWAMP reflector sessions.
Cisco PIDs for Sensor SFP
Added Cisco Product Identification (PID) for Sensor SFP devices:
S1G-TE-PM-D-I SFP-1GbE Performance Monitoring, 100/1000bT I-temp
S1G-SX-PM-D-I SFP-1GbE Performance Monitoring, SX, 850nm, 550m I-temp
S1G-LH-PM-D-I SFP-1GbE Performance Monitoring, LH, 1310nn, I-temp
S10G-SR-PM-D-I SFP-10GbE Performance Monitoring, SR, MM, 850nm, 150/150/150m OM3/4/5, E-Temp
S10G-LR-PM-D-I SFP-10GbE Performance Monitoring, LR, SM, 1310nm, 10km, I-Temp
S10G-ER-PM-D-I SFP-10GbE Performance Monitoring, ER, SM, 1550nm, 40km, I-Temp
S10G-10G-BD-PM-D-I SFP-10GbE Performance Monitoring, LR-BiDi, SM, 1310/1270nm, 10km, I-Temp
S10G-10G-BU-PM-D-I SFP-10GbE Performance Monitoring, LR-BiDi, SM, 1270/1310nm, 10km, I-Temp
S10G-10G-B40D-PM-D-I SFP-10GbE Performance Monitoring, ER-BiDi, SM, 1330/1270nm, 10km, I-Temp
S10G-10G-B40U-PM-D-I SFP-10GbE Performance Monitoring, ER-BiDi, SM, 1270/1330nm, 10km, I-Temp
Metadata for VCE and Local Interface
Added a string field to the VCE and local interface to identify endpoint location.
Cisco UDI on Sensor Modules and Module Dock
Added Cisco Unique Device Identifier (UDI) into the EEPROM, which is readable in software, using board show info or equivalent from the CLI only. This UDI is composed of the product ID, Version, and Cisco serial number.
Test Sensor Modules with Cisco Standard SFP 1G
Sensor Modules have been tested with Cisco standard 1G SFP.
Test Sensor Module 10G with Cisco Standard SFP 10G
Sensor Module 10G has been tested with Cisco standard 10G SFP.
Sensor Control Official Change Branding Name
Product name for Skylight sensor: control has changed to Cisco Provider Connectivity Assurance Sensor Control. This includes:
Assurance Sensor Modules (1G and 10G)
Assurance Sensor SFP (1G and 10G)
Module Dock
Change Default Password
Upon initial login, the system shall force the user to change the default password when the unit is in the factory-default state
The minimum password length is 1 character, and the maximum is 128 characters.
Any character is acceptable Note: No leading and trailing spaces on the password should be used.
Note: The system shall NOT force the user to change the default password when the configuration is imported from another system or upgraded from a previous version.
Update OpenSSL and Dropbear Libraries
The version for OpenSSL has been updated to the correct version (3.0.14) and dropbear has been updated to the correct version 2024.85 and the following issues have also been fixed:
CVE-2013-2094
CVE-2014-3153
* Security compliances (CSDL/CSERV, Corona, TPSCRM)
Corrected Issues
This Assurance Sensor Control release corrects the following issues:
Sensor SFP 10G Link Status
There are differences between the Accedian Skylight sensor: SFP compute 10G and the Cisco Provider Connectivity Assurance Sensor SFP 10G when establishing a link-up status.
Security Vulnerabilities
The following issues have been fixed:
Local privilege escalation
Insufficient input sanitization
Read permissions for sensitive data
Unable to Use Netcracker to Configure the Device
The device is sending inaccurate information after performing unsuccessful configuration import via Netcracker. It shows import success and reboot success, however the device did not have the imported file and was then unable to reboot.
Some Cisco Standard SFP 10G Devices May Not Work with Sensor Module 10G
Inserting some Cisco standard SFP 10G devices to the Sensor Module 10G may not establish a link.
NNI Port Detected as 100M When Inserted into the Sensor Module
When discovering a new Sensor Module after inserting a Sensor SFP into the NNI side, the port comes up as 1G. However, SFP information shows that the actual speed is 100M.
Port Link Status Flapping in Cisco Nexus 9000 Switch
Hosting the Sensor SFP 10G in a Cisco Nexus 9000 switch causes a port link status flapping error.
Drop Opposite Traffic Warning Was Not Present
When enabling the checkbox of “Drop Opposite Traffic” in OAM Loopback, there was no warning that dropping opposite traffic would drop all the traffic entering the device on the opposite port. Warning has been added via pop-up: “Configuration changes are service affecting, Are you sure you want to proceed?” to warn users of the implications.
False PTP Alarm Not Clearing
System-Configuration-Time was showing PTP synchronization status as synchronized, however the device was raising alarm error code 7.0001.05, even though there was no network changes or changes that would trigger this alarm.
Security Vulnerabilities
The following issues have been fixed:
Weak ssh--dss host key algorithm
Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094)
GoAhead Server HTTP Header Injection Vulnerability (CVE-2019-16645)
Security Vulnerabilities
Security vulnerabilities check. The following issues have been fixed:
Maximum SSH connection to device (5 sessions): Verify able to connect up to 5 SSH session to device successfully
Netconf connection to device: Enable Netconf on device, establish the Netconf connection to device by the below command: ssh admin@10.231.82.31 -p 830 -s netconf
Terrapin Scanner tool to scan the issue (CVE-2023-48795)
SSH to device with debug option
Update dropbear to v2024.85
Release 24.09 Lifecycle
This section lists the planned lifecycle dates for this release.
Milestone | Description | Date |
General Availability | Date where the product is available for general field deployment for both new installations and upgrades. | 2024-09-13 |
End of Security Support | Date where security patches will no longer be delivered for this release. Any correctives for security defects required after this date will be delivered using the next major release of the software. | Next Major Release |
Last Time Buy / Last Time Ship | Date where this release can no longer be purchased. | 2026-09-13 |
End of Product Support | Date where functional patches will no longer be delivered for this release. Any correctives for functional defects required after this date will be delivered using the next major release of the software. | 2026-09-13 |
End of Technical Support | Date where technical assistance is no longer available from the Technical Assistance Center for this release. | 2029-09-13 |
© 2024 Cisco and/or its affiliates. All rights reserved.
For more information about trademarks, please visit: Cisco trademarks
For more information about legal terms, please visit: Cisco legal terms
For legal information about Accedian Skylight products, please visit: Accedian legal terms and tradmarks