cc/td/doc/product/ismg/policy/ver20
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco Secure Policy Manager Version 2.0

Release Notes for Cisco Secure Policy Manager Version 2.0

March 2000

These release notes pertain to Cisco Secure Policy Manager Version 2.0.


Warning Please see the READMEFIRST file on the CD-ROM for late breaking information.

Contents

Introduction

Cisco Secure Policy Manager is a scalable, comprehensive security policy management system for Policy Enforcement Points, specifically Cisco Secure PIX Firewalls and Cisco IOS Routers that include either the Cisco Secure Integrated Software or the Cisco Secure Integrated VPN Software. With Cisco Secure Policy Manager, customers can define, distribute, enforce, and audit multiple distributed security policies from a central location. As the management cornerstone of the Cisco end-to-end security product line and a fundamental element of CiscoAssure Policy Networking, Cisco Secure Policy Manager can dramatically simplify firewall and IPSec VPN management.

Features and Functionality Changes

This section describes the significant changes in a feature or functionality found in Cisco Secure Policy Manager. However, this section does not address the caveats resolved as part of the ongoing maintenance and development of this product.

New or Improved Features and Functionality

New or improved features and functionality in Cisco Secure Policy Manager improve your experience and provide enhanced support for managing your network security. The following list identifies such features and functionality:

Deprecated Features and Functionality

Deprecated features are those features and functionality that will be removed from Cisco Secure Policy Manager in an upcoming release. You should avoid becoming dependent on these features and familiarize yourself with those features that replace the deprecated ones. You should consider the following features, found in Cisco Secure Policy Manager Version 1.0 and Version 1.1, deprecated:

System Requirements

You can install Cisco Secure Policy Manager on any computer that meets the minimum hardware requirements and that runs Microsoft Windows NT Server version 4.0 or Windows NT Workstation version 4.0 using an NTFS file partition. You can also install the GUI client for Cisco Secure Policy Manager on a computer that runs Windows NT 4.0, Windows 95, or Windows 98. The demo version also runs on Windows NT 4.0, Windows 95, or Windows 98.

Cisco Secure Policy Manager also requires several pieces of requisite software to operate as intended, including the following:

You must also have the TCP/IP protocol stack installed and operating correctly on each computer before you begin installation. The Autostart utility makes fulfilling the software requirements easy by checking the target computer for all requisites and then allowing you to install any missing requisites before continuing with the setup program. You cannot proceed with the setup program unless you install all requisite software.

The computer or computers on which you install Cisco Secure Policy Manager must meet the minimum hardware requirements; otherwise, we cannot guarantee the integrity and functionality of the system that you install. To ensure optimal performance, though, you should install Cisco Secure Policy Manager on computers that meet or exceed these recommended hardware requirements.


Note You should define the virtual memory settings for your Windows NT computer to be at least two times the physical memory installed in the computer. To reduce fragmented memory allocation and improve efficiency, you should also specify the same value for the Initial Size and Maximum Size boxes in the Virtual Memory dialog box, which you can access from the Performance panel of the My Computer property sheet.

Minimum Hardware Requirements

Recommended Hardware Requirements

Hardware Supported

This section identifies the Policy Enforcement Points, such as Cisco Secure PIX Firewalls, currently managed by Cisco Secure Policy Manager.

Table 1 lists the Cisco Secure PIX Firewall and IOS versions (for Cisco router/firewalls and Cisco VPN Gateways) currently supported by Cisco Secure Policy Manager. Certain versions of the Cisco Secure PIX Firewall require connection to the inside interface to receive commands from the Policy Distribution Point host. These dependencies are listed in the following table.


Table 1: Supported Policy Enforcement Points and Interface Dependencies
Policy Enforcement Point Supported Version Managed Interface Dependency

Cisco Secure PIX Firewall

4.2(4)

Inside

4.2(5)

Inside

4.4(x)

Inside

5.1(x)

(none)

Cisco Router/Firewall and Cisco VPN Gateway

IOS 12.0(5)T

(none)

IOS 12.0(5)XE

(none)

IOS 12.0(7)T

(none)


Note A Cisco Router/Firewall is Cisco router running the firewall feature set. A Cisco VPN Gateway is a Cisco router running the IPSec VPN feature set. These feature sets are part of the Cisco Secure Integrated Software and Cisco Secure Integrated VPN Software solutions for Cisco routers.

Policy Enforcement Points, though managed by Cisco Secure Policy Manager, are not part of the installed system. Therefore, before you can manage a Policy Enforcement Point, you must ensure that it has a basic configuration that enables it to receive commands from Cisco Secure Policy Manager. Cisco Secure Policy Manager supports Ethernet, Token Ring, and FDDI interfaces installed in the Cisco Secure PIX Firewalls.

The following table identifies supported IOS Router images and memory requirements for those routers that are managed by Cisco Secure Policy Manager Version 2.0.


Table 2: Supported IOS Images and Memory Requirements
Memory Needed
Image Name Features Flash RAM

c1700-bnor2sy56i-mz.120-7.T1

IP/IPX/AT/IBM/FW Plus IPSec 56

8

24

c1700-osy56i-mz.120-7.T1

IP/FW Plus IPSec 56

8

20

c2600-io3s56i-mz.120-7.T1

IP/FW/IDS IPSec 56

8

32

c2600-jo3s56i-mz.120-7.T1

Enterprise/FW/IDS Plus IPSec 56

16

40

c3620-io3s56i-mz.120-7.T1

IP/FW/IDS IPSec 56

16

32

c3620-jo3s56i-mz.120-7.T1

Enterprise/FW/IDS Plus IPSec 56

16

48

c3640-io3s56i-mz.120-7.T1

IP/FW/IDS IPSec 56

16

48

c3640-jo3s56i-mz.120-7.T1

Enterprise/FW/IDS Plus IPSec 56

16

48

c7100-io3s56i-mz.120-5.XE5

IP/FW/IDS IPSec 56

16

64

c7100-jo3s56i-mz.120-5.XE5

Enterprise/FW/IDS Plus IPSec 56

16

64

c7200-io3s56i-mz.120-7.T1

IP/FW/IDS IPSec 56

16

64

c7200-jo3s56i-mz.120-7.T1

Enterprise/FW/IDS Plus IPSec 56

16

64

Table Key:

FW: Firewall Feature Set
IPSec 56: 56-bit IPSec
IBM: IBM Support
AT: Appletalk Protocol Support
IPX: IPX Protocol Support
Enterprise: All features

Software Compatibility

The following software either is known to conflict with Cisco Secure Policy Manager or has not been extensively tested with this product:

Currently, the only supported operating system is the U.S. version of Windows NT 4.0, running Service Pack 5. This product has not been tested with non-U.S. versions of the operating system.
This product has not been tested with Windows NT Service Pack 6 or Windows 2000. As a result, you cannot install Cisco Secure Policy Manager on a host that is running Service Pack 6 or Windows 2000.
Cisco Secure Policy Manager operates from 01/01/1999 through 12/31/2035. If you attempt to run the Cisco Controlled Host Component outside this time range, it may stop responding to the Windows NT Service Control Manager (SCM) and you may get an application event that states the service hung on starting. The only way to get the service working properly again is to change the date to a valid date (within the operational period specified above) and reboot the computer.

Installation Notes

For instructions about managing your installed Cisco Secure Policy Manager server, refer to the "Upgrading, Reinstalling, and Uninstalling" section of Appendix B, "Working with Cisco Secure Policy Manager"of the Cisco Secure Policy Manager Installation Guide document.

The following note applies to installing any release or installation type of Cisco Secure Policy Manager:

To install the Demo, your computer only needs Internet Explorer 3.02 or later. However, the CD-ROM does not include this version of Internet Explorer. It only includes Internet Explorer 5.0 and the Windows NT Service Pack 5 setup programs.
To use the videos, your computer must have a sound card and speakers installed and configured properly.

License Key Information (Evaluation Version Only)

The following list identifies where to locate the license disk that is required to install the evaluation version of Cisco Secure Policy Manager, as well as identifies the limitations and password associated with the license.

Limitations and Restrictions

Address Translation on Unmanaged Gateway Objects

Cisco Secure Policy Manager does not support the use of address translation rules on unmanaged gateway objects defined within the Network Topology tree. In other words, Cisco Secure Policy Manager cannot model any type of address translation rules that affect a traffic flow that traverses unmanaged devices.

Caveats

This section identifies caveats and issues for Cisco Secure Policy Manager.

Platform Caveats

Refer to the appropriate release notes for information about hardware caveats that might affect Cisco Secure Policy Manager. You can access these release notes online at the following URLs:

Cisco Secure PIX Firewall

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/

Cisco IOS Release 12.0

http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120cavs/
index.htm

Open Caveats---Version 2.0

This section identifies known caveats and issues with Cisco Secure Policy Manager Version 2.0.

Importing Previously Defined Configurations

After you import a *.cpm file, you must perform a Save operation and allow that operation to complete before you perform a Save and Update operation. This order of operations is necessary to generate the device-specific command sets correctly. The first operation stores the new data in the Policy Database, and the second operation generates the command sets.

Topology Definition

If you generate command sets that are too large for the rich edit control supported by Windows 95 and Windows 98, the Command panel will appear blank after you generate the command sets by performing a Save and Update operation.
Workaround/Solution: Currently, the only workaround is to generate the command sets on a host that this running Windows NT 4.0.
When you define a topology that contains a large number of network shortcuts (over 30) that connect the bottom most legs of a network, a loop is created in the router calculation.
Workaround/Solution: Currently, the only workaround is to remove the additional network shortcuts.
If you rename an interface in a gateway object, any rules that reference that interface in the Disable paths to box of the Path Restrictions list in the Mapping panel of any gateway object are deleted the next time that you perform a Save and Update operation.
Workaround/Solution: You must manually redefine any such rules using the GUI client.
If you change the name of a Cisco Secure PIX Firewall node in the GUI client, a corresponding hostname command is not distributed to that Cisco Secure PIX Firewall. Instead, you must use either the epilogue or prologue command set in the Command panel to manually specify the hostname for that Cisco Secure PIX Firewall.
AAA must be configured outside Cisco Secure Policy Manager. It is not supported in Version 1.0, Version 1.1, or Version 2.0.

Policy Definition

If you define a security policy abstract with an IF Service is condition value of All IP or a mix of All IP and HTTP, Cisco Secure Policy Manager does not generate the correct command set that filters Java applets found within HTTP.
Workaround/Solution: Create an explicit HTTP policy with Java blocking, followed by the All IP policy. For example:
    If source is This Network Object and service is HTTP and destination is Network 1 then
    	Block Java
    	Permit
    ELSE If source is This Network Object and service is All IP and destination is Network 1 then
    	Permit
     
    
In cases where you select a Syslog server as a target for the Syslog data streams generated by a Policy Enforcement Point and that Syslog server is not a member of the network that is directly connected to an interface in that Policy Enforcement Point, Cisco Secure Policy Manager does not automatically generate and apply the security policies (in the Cisco System Folder of the Policy Enforcement branch) that enable this network service to traverse managed gateway objects along the path to that Syslog server. The documentation provided does indicate that such policies are generated.
Workaround/Solution: You must manually define and apply the security policies that enable the Syslog network service to reach the target Syslog server.

Policy Generation, Distribution, and Enforcement

The following caveats are related to generated/distributed the command sets.

Specific to Cisco Secure Policy Manager
When you select a Policy Distribution Point in a Policy Enforcement panel of a managed gateway object, you should also select an IP address for the Policy Enforcement Point that is associated with the interface installed in that managed gateway object that is attached to the network directly connected to the selected Policy Distribution Point. However, if you do not select an IP address, Cisco Secure Policy Manager does not generate a warning or error message stating that the IP address is not one associated with the interface that is directly connected to a network that reaches the Policy Distribution Point.
Workaround/Solution: Verify that the IP address is attached to the correct network.
If you have two Policy Enforcement Points that act as peers for a tunnel through which all traffic or Telnet can pass and you publish the derived command set to the local peer Policy Enforcement Point first, you can break connectivity to the remote peer. This break in connectivity occurs because nothing is configured for the tunnel to be created on the remote Policy Enforcement Point.
Workaround/Solution: When you publish the derived command sets to a Policy Enforcement Point, your best choice is to manually publish them so that they are not automatically sent to managed Policy Enforcement Points. This setting enables you to distribute commands from the farthest Policy Enforcement Point to the closest Policy Enforcement Point, which prevents tunnels from being created on the nearer Policy Enforcement Point while you are trying to distribute command sets to the farther Policy Enforcement Point. First, publish the generated command sets to the remote Policy Enforcement Point and then to the nearer Policy Enforcement Point. Thus, when the nearer Policy Enforcement Point tries to establish a tunnel with the remote Policy Enforcement Point, the configuration information exists on both Policy Enforcement Points and the tunnels can be negotiated and accepted.
The case, referred to as nested network address translation (NAT), is not currently supported. It typically seems plausible in a nested Cisco Secure PIX Firewall scenario. You cannot nest any forms of address translation within the defined topology.
Workaround/Solution: Currently, no workaround exists.
When Cisco Secure Policy Manager generates the logging host commands for the Cisco Secure PIX Firewall, some of the commands may point the Syslog stream out an interface where the host does not reside (for example, the statement could read logging host outside when the actual Syslog server resides somewhere off the inside interface). This problem is caused by a routing discrepancy that only affects the Syslog servers and Policy Monitor Points. Depending upon your network topology, this caveat can increase network traffic as the Syslog data is sent out the wrong interface.
Workaround/Solution: The workaround involves two steps:

Step 1 Using the Enforcement panel on the Cisco Secure PIX Firewall node in the GUI client, disable the Cisco Secure PIX Firewall from sending its Syslog data stream to that particular host.

Step 2 In the Epilogue box of the Command panel on the same Cisco Secure PIX Firewall node, type the logging host command and specify the correct interface information.

This workaround prevents Syslog traffic from being sent over the incorrect interface.


When Cisco Secure Policy Manager generates conduit commands permitting network access, it generates a duplicate set of conduit commands that deny the same network access. These deny commands are generated immediately following the permit commands. Although this does not harm the usability of the config (because conduits are processed in order), it does take up config memory. This problem occurs quite frequently, but it is harmless.
Workaround/Solution: Currently, no workaround exists.
When you define a network service that has only one port (such as Telnet), the outbound command generated by Cisco Secure Policy Manager uses the port-port format (for Telnet, it generates 23-23). This command entry format is acceptable to the Cisco Secure PIX Firewall. Therefore, you can safely ignore entries with two ports.
Workaround/Solution: Currently, no workaround exists.
Specific to PIX Firewall Support
If a PIX Firewall is configured and later an interface is disabled, no commands are generated to actually shut down the interface
Workaround/Solution: Manually shut down the interface.
Cisco Secure Policy Manager generates incorrect SMTP configuration when creating a device-specific command set to resolve a policy that enables an e-mail server to send SMTP mail to the Internet via an interface at a higher security level than the one on which the mail server resides. The result is that the conduit commands that enable this network service are generated incorrectly.
Workaround/Solution: Manually edit the command set to remove/revise the incorrectly generated commands.
Extra conduit commands are being generated when you define a policy that permits access to a certificate server.
Workaround/Solution: Currently, no workaround exists.
The KBytes box in the Renegotiate Protocols After area in the Protocol panel of the tunnel template properties specifies the amount of traffic, in kilobytes, that can pass through the tunnel before the session is renegotiated. Setting this field to 0 (zero) disables this setting. Cisco Secure PIX Firewall does not currently support disabling this setting, and it will specify a default value in the generated commands if this field is set to 0.
Workaround/Solution: When using Cisco Secure Policy Manager to manage Cisco Secure PIX Firewall, you do not have the option of disabling the KBytes setting. You can, however, set the option sufficiently high so that renegotiation will occur at less frequent intervals, or so that the time specified in the Time field will elapse and cause session renegotiation before the KBytes setting is reached.
The maximum value that you can enter in the KBytes field is 536870912 (the KBytes field does not accept commas as input with large numbers).
Currently, even if an interface is marked as being administratively down, Cisco Secure Policy Manager generates commands for that interface. This problem arises when you discover a Cisco Secure PIX Firewall.
Workaround/Solution: You can resolve this issue by specifying that the interface is disabled in the Interfaces panel of the PIX Firewall node within the Network Topology tree.

IPSec Tunnel Definition

Cisco Secure PIX Firewall OS 5.1 has a command sysopt ipsec pl-compatible that enables IPSec packets to bypass the Cisco Secure PIX Firewall's NAT and ASA features and allows incoming IPSec packets to terminate on the inside interface. It is often used when generating IPSec commands that could cause conflicts and dropped traffic.
Workaround/Solution: Currently, no workaround exists.
The GRE packets do not trigger CBAC for Cisco Secure Integrated Software. Currently this is being researched with the IOS Router development team.
Workaround/Solution: Currently, no workaround exists.
The IPSec check box is automatically selected whenever a new gateway object is created. In addition, if you use the Topology Wizard to define a new managed gateway object, you can rediscover the settings for that gateway object until you perform a Save operation.
Workaround/Solution: Manually clear the IPSec check box, or rediscover the settings for that gateway object. If you downgrade the support of a managed gateway object, you must rediscover the settings to correct the IPSec support value.

Reporting and Monitoring

If you install the Cisco Documentation CD-ROM on a host that is running the reporting agent for Cisco Secure Policy Manager, a port conflict can arise between the web server software used by the CD-ROM application and the reporting agent. If this configuration exists, the following error message is generated when you attempt to access the CD-ROM: "Error accessing files on Cisco CD-ROM in your CDROM drive."
Workaround/Solution: You can reassign the port used by the reporting agent by modifying the Cisco Policy Reporter network service definition and then re-selecting that service in the Policy Reports panel for each primary or secondary server installed on your network. After you complete this setting change, you are able to use the documentation CD-ROM and the reports generated by Cisco Secure Policy Manager.
When you rename the Cisco Secure PIX Firewall node, the network service activity reports use the old name until the Cisco Secure Policy Manager server that is monitoring that Cisco Secure PIX Firewall is rebooted. To work around this problem, exit the GUI client (saving your changes first) and then restart it.
When accessing a generated report from the GUI client, the web browser caches the first report that is viewed. If you regenerate the report, you will still see the first one until you click Refresh. You can ensure current reports are seen by changing the browser settings for Internet Explorer so that you reload each page for all requests.
To verify that your pages are reloaded on each page visit, perform the following task:

Step 1 To access the shortcut menu, right-click the Internet Explorer icon on your desktop.

Step 2 To view the Internet Explorer Properties dialog box, click Properties on the shortcut menu.

Step 3 To specify that the pages are reloaded each time, click Settings under Temporary Internet Files in the General panel.

Step 4 Under Check for newer versions of stored pages, click Every visit to the page.

Step 5 To save your changes and close the Settings dialog box, click OK.

Step 6 To apply your changes and close the Internet Explorer Properties box, click OK in the General panel.


Note If you use Netscape Navigator, you may also experience this problem. You can configure Netscape Navigator with similar settings to resolve this problem.

System Configuration and Maintenance

The default certificate used by the VPN client is "none." To use certificates for IPSec-based communications between Cisco Secure Policy Manager servers and a remote host, you must manually specify the Cisco Secure VPN Client settings that enable those specific communications to a remote party and select the correct certificate for the "My Identity" option. In addition, for each specific connection, you must specify that the "Remote Party Identity Type" option is "IP_range" and identify the correct IP subnet and net mask.
If you manually change the IP address of a host running some component of the Cisco Secure Policy Manager system, the system does not detect that address change automatically, unless you uninstall and reinstall that feature type.
Workaround/Solution: You can use the GUI client to change the IP address of the primary or secondary server manually. If you change the network on which the primary or secondary server is running, you must perform a drag-and-drop operation to move the Host node onto that network in the Network Topology tree first, and then modify the IP address in the General panel of that Host node. Any references to that Host node will be lost. You must redefine these references, such as those in the Policy Enforcement panel of a Policy Distribution Point.
This issue arises within large topologies when a Save and Update operation takes a long time to complete. If the GUI client returns from the Save and Update operation before the command sets are generated by the control agents and you perform a second Save and Update operation, it can cause the Policy Database to crash.
Workaround/Solution: After you perform a Save and Update operation, you should allow the device-specific command set to generate completely before you perform another Save and Update operation. The best way to avoid this situation is to ensure that the "Current Policy Generation" number matches the "Processing Complete" number of each Policy Enforcement Point in the System Inconsistencies panel.
The following maximum threshold values exist for the specified hardware configurations:
When the system is under high stress, frequently saving or requesting reports (every 10 minutes) may disable the system. Error messages similar to the following appear in the Windows NT Event Viewer when this error occurs:
Krs error 28772: Database terminating with message: Failed to map page.
Krs error 28801: The process cannot access the file because another process has locked a portion of the file. Failed to create file mapping for backing file d:\csm\data\memory\memfrm1730.mmf.
You must define the disk space settings for the Policy Database in all primary and secondary server panels (hosts running components of Cisco Secure Policy Manager). In addition, this setting must be less than the total available disk space on the host. If you fail to define these settings, the system can become unusable.
Backing up the Policy Database can take a long time, depending on the size of the database. You should be patient during backups because feedback is not provided about the progress of the backup.
Workaround/Solution: Currently, no workaround exists.

Related Documentation

The following documents directly support Cisco Secure Policy Manager:

In addition to these documents, an extensive Help system is provided with the GUI client, the user interface that configures Cisco Secure Policy Manager.

Platform Documents

The following sections identify the documents and associated web pages for the various platforms supported by Cisco Secure Policy Manager.

Cisco Secure PIX Firewall

The following documents provide information about configuring the Cisco Secure PIX Firewall hardware and provide references to the command sets that can be specified in the Command panel associated with each Cisco Secure PIX Firewall node defined under the Network Topology tree of the GUI client.

All these documents, including these release notes, apply to all Cisco Secure PIX Firewall hardware versions, including the Cisco Secure PIX Firewall, PIX 10000, PIX 510, and PIX 520 models.

Cisco provides Cisco Secure PIX Firewall technical tips at

Cisco IOS Release 12.0

The following link provides a list of documents and information about configuring Cisco IOS Release 12.0 and provides references to the command sets that can be specified in the Command panel associated with each IOS Router node defined under the Network Topology tree of the GUI client:

Obtaining Documentation

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.

Ordering Documentation

Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.

Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).

Obtaining Technical Assistance

Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed docs, or by sending mail to Cisco.

Cisco Connection Online

Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.

CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.

You can access CCO in the following ways:

You can e-mail questions about using CCO to cco-team@cisco.com.

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.

To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.

To contact by e-mail, use one of the following:

Language E-mail Address

English

tac@cisco.com

Hanzi (Chinese)

chinese-tac@cisco.com

Kanji (Japanese)

japan-tac@cisco.com

Hangul (Korean)

korea-tac@cisco.com

Spanish

tac@cisco.com

Thai

thai-tac@cisco.com

In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.

Documentation Feedback

If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.

You can e-mail your comments to bug-doc@cisco.com.

To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:

Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate and value your comments.

This document is to be used in conjunction with the documents listed in the "Related Documentation" section.

Access Registrar, AccessPath, Any to Any, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, the Cisco logo, Cisco Certified Internetwork Expert logo, CiscoLink, the Cisco Management Connection logo, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, the Cisco Technologies logo, ConnectWay, Fast Step, FireRunner, Follow Me Browsing, FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, IP/VC, Kernel Proxy, MGX, MultiPath Data, MultiPath Voice, Natural Network Viewer, NetSonar, Network Registrar, the Networkers logo, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, ScriptShare, Secure Script, ServiceWay, Shop with Me, SlideCast, SMARTnet, SVX, The Cell, TrafficDirector, TransPath, ViewRunner, Virtual Loop Carrier System, Virtual Service Node, Virtual Voice Line, VisionWay, VlanDirector, Voice LAN, WaRP, Wavelength Router, Wavelength Router Protocol, WebViewer, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and ASIST, BPX, Catalyst, Cisco, Cisco IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastLink, FastPAD, FastSwitch, GeoTel, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Post-Routing, Pre-Routing, Registrar, StrataView Plus, Stratm, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any of its resellers. (9912R)

Copyright © 2000, Cisco Systems, Inc.
All rights reserved.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu May 25 12:47:06 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.