Diagnostic signatures¶
This page provides you the list of the 193 diagnostic signatures and 84 CSA-DS that are executed in CSA. If a diagnostic signature has the status ‘internal’, this means that this check is not performed on the version available for customer and partner. This is because we are currently testing the code, making sure that the code runs correctly, that all issue are correctly detected and that there is no false positive. if you want to contribute to the automatic detection in CSA please consult this page: Plugin .
Product |
Name |
Status |
Description |
Creator |
---|---|---|---|---|
multiple |
any_faulty_sip_messgaes |
internal |
Checks if there is faulty sip messages in the analysis. |
hocao |
multiple |
stun_allocate_fail_insufficient_capacity |
external |
Check if a STUN allocate requests fail with insufficient capacity error code |
hocao |
multiple |
stun_binding_request_not_permitted |
internal |
None |
hocao |
multiple |
any_duplicated_packets |
external |
Check if duplicate packets are seen as part of a RTP stream. |
belhoest |
multiple |
call_no_ack |
external |
Checks if any call could not connect because there was no ack to 200 OK |
hocao |
multiple |
any_detect_missing_stream |
external |
This DS will check if all streams going from device1 to device2 and from device2 to device1 arrive safe and sound at destination |
emarecha |
multiple |
any_sip_message_changed_by_firewall |
external |
Checks if there is any difference between SIP message sent from firstNode to secondNode and the same message received by secondNode. |
hocao |
multiple |
any_call_cscve90209 |
external |
Checks if cscve90209 is hit :return: |
hocao |
multiple |
any_binding_response_not_received |
external |
Check if a Binding Response has been sent by a party but not received by the other. |
hocao |
multiple |
multi_packets_statistics_over_stream_link |
internal |
emarecha |
|
multiple |
any_attendee_cannot_share |
internal |
Checks if CSCvg91403 is hit :return: |
belhoest |
multiple |
cms_cluster_lync_benotify_fail |
external |
hocao |
|
multiple |
any_only_host_candidate |
external |
Check for calls that only have host candidates in the SDP and no relay candidates as this can cause calls without media. |
hocao |
multiple |
bfcp_one_way |
external |
Checks if there is one way BFCP communication for any Call and alerts about the presentation sharing failing over separate content channel. |
vsidimak |
multiple |
stun_allocate_wrong_credentials |
external |
Check if a STUN allocate requests with credentials was responded with 401 unauthorised |
hocao |
multiple |
bfcp_floor_request_not_granted |
external |
Checks if there is negative response to BFCP Floor request which indicates issue with presentation sharing. |
vsidimak |
vcs |
vcs_acme_longer_san_CSCvs42174 |
external |
Check if ACME related errors for LetsEncrypt with large amount of SANs are present in Expressway log, and suggest workaround to the defect CSCvs42174 |
lbogdano |
vcs |
vcs_ssh_tunnel_alarm |
external |
Check for occurrence of bug CSCvf21540 where it reports a SSH tunnel alarm while the tunnel is working fine |
stejanss |
vcs |
vcs_wrong_dscp_values |
external |
Checks if Edge server marks packets with wrong DSCP value due to CSCvg76528. |
belhoest |
vcs |
vcs_CSCvn51723 |
external |
Check if we are hit by CSCvn51723 (Unable to clear alarm “Failed to update key file” after upgrade to X8.11) |
stejanss |
vcs |
vcs_e_no_public_address |
external |
Checks if a public IP address has been configured on -E server. |
hocao |
vcs |
vcs_IdenTrust_CA |
external |
Checks if we have potential impact on the Cisco Root CA change by checking for following: a) Webex calls: DNS zone with TLS verify enabled OR Webex Zone b) SMART licensing enabled (with direct connection) c) Connector or Hybrid service running on Expressway |
stejanss |
vcs |
vcs_CSCvp16250 |
external |
Check if Authentication Trust Mode is set to “on” in the webex zone |
acalleba |
vcs |
vcs_duplicate_dns_a_rule |
external |
Check if there are 2 A records resolving to VCS-E IP address |
hamoshen |
vcs |
vcs_traversal_zones |
internal |
Check the status and failure message for the traversal zones. |
belhoest |
vcs |
vcs_certificate |
external |
Check if VCS certificate match the requirements. |
belhoest |
vcs |
vcs_old_generation_hw_check |
external |
Check if there is an unsupported software version running on 1st generation hardware. |
belhoest |
vcs |
vcs_ce1200_fan_issue |
internal |
Check for EXWY-35973 on CE1200 |
nomat |
vcs |
vcs_cscvc58081 |
external |
Check if vcs is affected by CSCvc58081. |
kvancoil |
vcs |
vcs_64optionkeys_max |
external |
Check if VCS option keys don’t succeed more than 65 as not all will be taken |
stejanss |
vcs |
vcs_cscvn78568 |
external |
None |
ftenerel |
vcs |
vcs_domain_csr_failed |
internal |
Check if error specific to domain csr creation is seen on Expressway-E logs on domain(s) enabled for MRA. |
jalero |
vcs |
vcs_CSCvv46033 |
external |
Check if the external interface is configured to be eth0. This is an unsupported configuration. ——————————- BLACKLISTING IN DS MANAGER BASED ON THE FOLLOWING JASON BROWN COMMENT IN JIRA: https://jira-eng-gpk1.cisco.com/jira/browse/EXWY-39045?focusedCommentId=352180&page=com.atlassian.jira.plugin.system.issuetabpanels%3Acomment-tabpanel#comment-352180 |
ftenerel |
vcs |
vcs_packets_arrive_with_nat_ip |
internal |
Check whether the VCS/Expressway node has received a packet with the destination IP being a static NAT IP configured on the server. If it is the case, the packet will be discarded by the OS. |
hocao |
vcs |
vcs_CSCvi62029 |
external |
Checks if there is a error line on SIP parsing from warn-agent header where it starts with a number. |
acalleba |
vcs |
vcs_CSCvq03446 |
external |
Look for CRL issuer in the certificate as this results in clustering failures before X12.5.6. |
acalleba |
vcs |
vcs_deployment_resourcecheck |
external |
Check if Expressway has been set up with the proper resources (CPU frequency) matching the profile (medium/large) and potentially this has come from a backup file from a medium VM that got restored on a large VM as per CSCvs59766 (seen when taking a backup of version before X12.6) |
stejanss |
vcs |
vcs_traversal_client_on_e |
internal |
Check the status and failure message for the traversal zones. |
belhoest |
vcs |
vcs_CSCvs42093 |
external |
Check for CSCvs42093 on CE1200 where UCS HUU upgrade causes Intel X710 Drivers to stop functioning and network connectivity is lost |
nomat |
vcs |
vcs_space_in_search_rule |
external |
Check if a regex starts or ends with a space. |
belhoest |
vcs |
vcs_cscvn58620 |
external |
Checks if the service domain field is used on the neighbor zone and if srv queries for _sip._tcp for the domain is being queried and responses received. |
jalero |
vcs |
vcs_no_cn_in_cert_CSCvc47500 |
external |
check for CSCvc47500: VCS doesn’t start properly if server cert is missing common name |
hocao |
vcs |
vcs_exwy26045 |
internal |
Check if the system was unable to handle a certificate with validity date 2050 or later. |
kvancoil |
vcs |
vcs_alarm |
external |
Check if there is alarm raised on vcs. |
belhoest |
vcs |
vcs_wrong_external_lan |
external |
Checks if the external LAN has been set to the correct interface. |
hocao |
vcs |
vcs_uc_zone_tlsverify_name_check |
internal |
Check the TLS verify name configured on ExpE UC traversal zone and make sure that name exists in ExpC certificate |
nomat |
vcs |
vcs_webrtc_badrequest |
internal |
Checks if a WebRTC Proxy connection fails with 400 Bad Request because the URL on the C is configured different than the request that came in (it needs to match). |
stejanss |
vcs |
vcs_CSCus26094 |
internal |
Checks if there is a CUCM added to Expressway where the name starts with a number. |
acalleba |
vcs |
vcs_CSCvn28805 |
external |
None |
zzdravko |
vcs |
vcs_cscvu20511_response_not_sha256 |
internal |
None |
hocao |
vcs |
vcs_CSCvt94292 |
external |
Checks if there is a error line on SIP parsing from warn-agent header where it starts with a number. |
acalleba |
vcs |
vcs_e_sip_udp_enabled |
internal |
Check if SIP UDP is enabled. |
hocao |
vcs |
vcs_certificate_chain_validation |
internal |
Check the whole certificate chain to find if server cert or server CA are going to expire soon/ are expired. |
ftenerel |
vcs |
vcs_cscvu93713 |
external |
CSCvu93713 MRA Logins failing with Incorrect Username and Password after upgrade or refresh of Unified CM nodes on Expressway. |
ftenerel |
vcs |
vcs_cert_verification_invalid_CSCvq14399 |
external |
Checks if there are invalid certificates reported by the certificate verification function which could be due to various reasons like CRL unreachability or expired, OCSP unreachability or expired, duplicate CA entries in trust store, expired certificates, … Example line: 2018-11-10T20:54:07.155+01:00 videogtwe02 cvs: UTCTime=”2018-11-10 19:54:07,152” Module=”developer.cvs.verifier” Level=”INFO” CodeLocation=”cvs_certificate_verifier(446)” Detail=”Certificate Invalid” SubjectCommonName=”videogtwi.ebu.ch” Error=”[3, 0, ‘unable to get certificate CRL’]” |
stejanss |
vcs |
vcs_ds_wrong_notify_route |
external |
Dual Home presentation sharing failed due to wrong NOTIFY message forwarding |
ftenerel |
vcs |
vcs_cscvx07831 |
internal |
CSCvx07831 |
ftenerel |
vcs |
vcs_traversal_client_on_e_fake |
internal |
Check the status and failure message for the traversal zones. |
belhoest |
vcs |
vcs_gw_to_external_int |
external |
Check if the default gateway of expressway-E points to the external interface. |
asuchank |
vcs |
vcs_verification_error |
external |
Check if TLS handshake failed because of a missing CA certificate in the trust store or certificate received is invalid (in time). |
hocao |
vcs |
vcs_clustering_nat |
external |
Check if clustering is enabled and if external interface has static NAT configured. |
sdekunst |
vcs |
vcs_cscvn63274 |
external |
CSCvn63274 Expressway attempting IP instead of FQDN for CUCM causing Certificate Check Failure |
ftenerel |
vcs |
vcs_CSCvo41221 |
external |
Checks if per-domain configuration is present and if DNS lookup for the domain is failing. |
jalero |
vcs |
vcs_cscvm52774 |
external |
CSCvm52774 Provisioning service not targeting per domain DNS |
ftenerel |
vcs |
vcs_cscvk18309 |
external |
CCSCvk18309 Expressway Fails to lookup LDAP server using DNS AAAA Resolution fails & user login fails |
ftenerel |
vcs |
vcs_searchrules_priority_check |
external |
Check if 2 search rules have the same priority for the same protocol that can leads into call failures. |
hamoshen |
vcs |
vcs_clock_synchronisation |
external |
Check if clock synchronisation issue causing MRA phone registration failures. |
kvancoil |
vcs |
vcs_detect_expired_certificates |
external |
Check if certificates have valid dates. |
evfedoto |
vcs |
vcs_CSCvr24185 |
external |
Look for ‘No handlers could be found for logger developer.platform.platforminfo upon upgrade to 12.5.5’ in the log. Affects only x12.5.5 and X12.5.6 |
nomat |
vcs |
vcs_zone_peer_is_clusterfqdn |
external |
Checks if one of the peers on a zone is configured with a cluster FQDN |
belhoest |
vcs |
vcs_smartlicensing_firewall |
external |
Check if a VCS or Expressway system is able to communicate fine with the smart receiver in cloud. |
acalleba |
vcs |
vcs_ios_cert_requirements_HT210176 |
internal |
Check whether the certificate of Expressway-E for WebRTC proxy comply with https://support.apple.com/en-us/HT210176 for proper iOS and MacOS support. It can be checked if we have existing WebRTC sessions using iOS or Mac on those versions or higher |
stejanss |
vcs |
vcs_cve_checker |
internal |
Check if all the cve for vcs. |
hocao |
vcs |
vcs_spark_config_check |
external |
Check if Expressway-E configurations for Spark Hybrid are correctly configured. |
kogami |
vcs |
call_webrtc_cscve37570 |
external |
Check if CSCve37570 is hit. |
hocao |
vcs |
vcs_call_CSCvn49463 |
external |
Check if there is a Microsoft call between neighbor zone of FE server and neighbor zone of CMS (for example) which should not use a RMS license but it does due to CSCvn49463 |
stejanss |
vcs |
vcs_call_CSCvq46646 |
external |
Compares the inbound and outbound call leg to see if the isFocus parameter is being dropped. |
acalleba |
vcs |
call_cmr |
external |
Check if there is a SIP call to WebEx for CMR Hybrid Deployment or CMR Cloud and when there is verifies that all requirements are met: early offer, encryption, video support, enough bandwidth and correct version. |
kvancoil |
vcs |
vcs_sdp_too_large |
external |
Detects if a SIP message received was too big, leading VCS to be unable to decode the message |
hocao |
vcs |
vcs_call_CSCvc47502 |
external |
check if CSCvc47502 is hit: B2BUA SRTCP SSRC context limit causes EPs to report ‘replay detected’ |
hocao |
vcs |
vcs_call_CSCvo20736 |
internal |
Checks if there is a TCP connection failed on port 5080 |
acalleba |
vcs |
vcs_call_cscvn97847 |
external |
Checks if there’s media quality issues (mostly packet loss and Jitter) on outgoing streams when running VCS on appliance of the version X8.11.3 to X12.5.1. |
jalero |
vcs |
call_msd_prior_tcs |
internal |
None |
nomat |
vcs |
vcs_call_CSCux85276 |
external |
Check issues in interworked calls missing videoBadMBsCap in the CapSet for H263 causing potential no video issues or call connect issues. |
stejanss |
vcs |
call_packet_loss_jitter |
external |
Check for packet loss and high jitter values in RTP streams as these have direct impact on quality. |
kvancoil |
vcs |
call_no_media |
external |
Check if packet capture is available and if so iterates over all the calls and finds if the media is supposed to pass through the box if we receive RTP. If not we verify the pcap covers the time of the call and an alert is raised. |
kvancoil |
vcs |
vcs_call_CSCvn76809 |
external |
None |
zzdravko |
vcs |
vcs_call_cscvn07425 |
external |
Checks if there are interworking calls while VCS/Expressway is in maintenance mode. If so this confirms CSCvn07425 a hit and returns the signature output. |
jalero |
vcs |
call_skype_server_timeout |
external |
Check if there is a (Microsoft) SIP call to Skype (on-prem deployment or Office365) and when there is verifies the requirements of Skype on DNS and certificates when there is a 504 Server time-out response. |
stejanss |
vcs |
vcs_call_cscvm75060 |
external |
Checks if there are WebRTC proxy present and stunRefreshRequests with lifetime of 600 showing the presence of RTC-like stun traffic. Outputs the general warning message. |
jalero |
vcs |
vcs_CSCvi29770 |
external |
Check if CSCvi29770 is hit where Users experience one-way audio using Intercom feature over MRA |
nomat |
vcs |
vcs_call_skype_no_media |
external |
Diagnostic signature that checks if there is a (Microsoft) SIP call to O365 Skype and and if there is an ICE negotiation failure with Microsoft. |
kogami |
vcs |
vcs_call_CSCvm51105 |
external |
CSCvm51105 SIP/H323 IWF Session Refresh Not working |
ftenerel |
vcs |
vcs_call_cscvo02181 |
external |
Checks if calls are failing with with request timeout when tcp connections to 5071 fails. |
jalero |
vcs |
vcs_call_CSCuy64490 |
external |
Check if CSCuy64490 is hit. |
hocao |
vcs |
vcs_h245_tcp_connection |
external |
Check issues in h245 tcp connections. |
evfedoto |
vcs |
vcs_not_responding_to_binding_request |
external |
Check if STUN binding request received by VCS is not answered because VCS has not route to send the response |
hocao |
vcs |
vcs_call_CSCvv87246 |
external |
Check if B2BUA is engaged and if there is an incoming 183 SIP message with Reason header that is stripped off |
stejanss |
vcs |
vcs_CSCvq14504 |
external |
Check if CSCvq14504 is hit where VCS B2BUA drops RTCP packets received from an endpoint and does not forward those packets, this happens for secure calls only and for video stream RTCP |
nomat |
vcs |
vcs_call_cscvn17342 |
external |
Checks if we resend re-invite after receiving 491 message to a previously send re-invite with the same CSeq. |
jalero |
vcs |
im_microsoft_407 |
internal |
Check if there is a 407 returned by IM&P for instance messaging with Microsoft Federation via Expressway. |
kvancoil |
vcs |
vcs_call_CSCvd57073 |
external |
Check if CSCvd57073 is hit. |
hocao |
vcs |
vcs_CSCvr91082 |
external |
Check if CSCvr91082 is hit where an MRA Call disconnects when escalated from audio to video |
nomat |
vcs |
vcs_CSCve82299 |
internal |
Check if CSCve82299 is hit. |
kvancoil |
vcs |
vcs_call_CSCvg15240 |
internal |
Check “400 Malformed route header error” from S4B causes skype users cannot see presence of the Jabber users. |
evfedoto |
vcs |
vcs_call_cscvk38038 |
external |
Checks if the received 486 message on the B2BUA containing Reason header is not forwarded to the CUCM with the header in place. Returns the output if bug CSCvk38038 is hit. |
jalero |
vcs |
vcs_call_cscvn48431 |
external |
Checks if the VCS/Expressway is interworking BFCP FloorRequestStatus=Accepted to H.323 responseType:Reject instead of ignoring it and waiting for FloorRequestStatus=Granted. |
jalero |
vcs |
vcs_call_CSCui14790 |
external |
Check issues in H.323 calls with FECC enabled as Expressway uses the same ports for Data and Video on OLC. |
stejanss |
vcs |
vcs_cscve41422_dual_home |
external |
Dual Home through VCS/Expressway fails because of CSCve41422 |
hocao |
vcs |
vcs_call_b2bua_not_listening |
external |
Check if a TCP connection to the B2BUA could be successfully established. The B2BUA is used for calls that involve any zone that have the encryption setting set to anything other than auto. |
hocao |
vcs |
vcs_b2b_call_dns_tcp_failure_CSCvn27081 |
external |
Check if a outgoing B2B call failed because of DNS or TCP issue |
hocao |
vcs |
vcs_call_CSCvu78961 |
external |
None |
ftenerel |
vcs |
vcs_call_cscvu13745 |
external |
CSCvu13745 - Expressway Edge not forwarding received invite from Jabber to Expressway Core Conditions: 1. isEdge is True 2. Expressway-E replies with {{407 Proxy Authorization Required}} to INVITE (check that in CSeq there is INVITE) 3. The next invite received from the internet (CSeq of previous +1) check: * record-route Sip Invite header for {{zone-id-delegation=1}} entry * {{Proxy-Authorization: Bearer}} 4. Check that this invite is not forwarded, looking at the internal callLeg for the same CSeq |
ftenerel |
vcs |
vcs_call_CSCuw93156 |
external |
Check issues in interworked calls missing H.264 in the SDP out from VCS leading to one-way or no video issues. |
stejanss |
vcs |
vcs_call_cscvo05522 |
external |
Checks if Expressway received initial invite with transport=tcp in the contact header and confirms that it sends 20O OK with refresher=uas. This would mean that it will send the refresher after 15 mins without establishing TLS connection even if TLS and port 5061 is set in the VIA header from the far end. |
jalero |
vcs |
vcs_CSCvr79898 |
external |
Check if CSCvr79898 is hit where VCS does not process RTP sequence correctly if it receives two packets in a row that are delayed from their original position by 100+ packets |
nomat |
vcs |
vcs_call_CSCvp03856 |
external |
Compares the inbound and outbound callleg to see if the isFocus parameter is being dropped. |
acalleba |
vcs |
vcs_call_CSCvp97128 |
external |
Look for calls with silent monitoring and check re-invite if it contains silent mode. |
acalleba |
vcs |
vcs_call_CSCvs10250 |
external |
Check if there are any calls that are being loadbalanced and that have an incorrect BFCP behavior as Expressway does not reply back correctly to both ends |
stejanss |
vcs |
vcs_call_CSCvc98425 |
external |
Check if CSCvc98425 is hit. |
hocao |
vcs |
vcs_wrong_route_header |
internal |
Check if a call is answered with 404 Not Found because the route header value is incorrect. |
belhoest |
vcs |
vcs_webrtc_ff_cscvo80624 |
external |
hocao |
|
vcs |
vcs_call_cscvn17342_far_end |
external |
Checks if the far end re-sends re-invite after we sent 491 message to a previously received re-invite with the same CSeq. If the far end doesn’t re-send the re-invite with the same CSeq, we alert the far end to take action. |
jalero |
vcs |
vcs_call_CSCvh31290 |
external |
Check “400 Malformed route header error”. Expressway-E not forwarding all record-route info to Microsoft side on INFO, causing instant messages fails with Skype for Business. |
evfedoto |
vcs |
vcs_call_cscvt21924 |
external |
CSCvt21924 SIP/H323 IWF Session Refresh Not working * Version from x12.5.6 and x12.5.7 * collect all ExpC Neighbor zone to CUCM with two or more peers and list them * ExpC receives NOTIFY with event-type: “KPML” on traversal client zone * if a 408 request timeout is sent with the same cseq of the previous notify * in the time between the notify and the 408 there is a tcp connection failed: “ Dst-port=”5061” Detail=”TCP Connection Closed” Reason=”Peer’s TLS certificate identity was unacceptable” * the destination needs to be a neighbor from the zones taken above. |
ftenerel |
vcs |
vcs_call_cscvo39943 |
external |
Checks if there are MS presentation calls with linked stun and if 400 Bad request is a response sent to ConnectionBindRequest on that particular call. |
jalero |
vcs |
vcs_identity_unacceptable_default_zone |
external |
hocao |
|
vcs |
vcs_call_cscvw31967 |
external |
Checks if Expressway-E receives SIP 407 proxy authentication message and forwards 404 not found to the calling party and the B2BUA generated 500 Server internal error. |
jalero |
vcs |
vcs_appsharing_skype_tcp_syn_received_for_ice |
external |
Check if application sharing fails for call from skype is failing due to tcp syn not received. |
hocao |
vcs |
mra_not_matched_in_allow_list |
external |
Check if some request could not be forwarded because some entries are missing in the allow list. |
hocao |
vcs |
mra_cscvc90758 |
external |
Check for occurrence of bug CSCvc90758 for not being able to add IM&P 11.5 server to C from X8.8 (case-sensitive). |
stejanss |
vcs |
mra_cscvc33543_cscvf14623 |
external |
Check whether we run into bug CSCvc33543 and CSCvf14623 by checking the symptoms for which a restart of Expressway-C is required. |
stejanss |
vcs |
mra_xmpp_traversal_down |
external |
Check if XMPP connection for MRA from Expressway-C to Expressway-E on port 7400 fails. |
kvancoil |
vcs |
mra_domain_not_configured |
external |
Check if -E is failing to find a path to send SASL authentication query. |
hocao |
vcs |
mra_apns_not_supported_by_imp |
external |
Checks if Jabber Android is trying to login via Expressway. If Expressway is running X12.6 or higher and IM&P is not running 12.5.1Su3+ or 14.x+ Jabber will get disconnected |
hocao |
vcs |
mra_CSCvn10906 |
external |
This DS checks if VCS has hit CSCvn10906 where MRA login failed because IM&P lookup failed as Expressway makes a IMP home cluster node query using the xdb ‘get’ method |
stejanss |
vcs |
mra_jid_different_than_userid_CSCvk75664 |
external |
This DS checks if VCS has hit CSCvk75664 where MRA login failed because the userID of the user trying to login is different than its JID |
hocao |
vcs |
mra_cscur92743 |
external |
Check if we are hit by CSCur92743 (MRA: Call license limit reached alarm) |
stejanss |
vcs |
vcs_wrong_pick_oauth_zone_cucm |
internal |
EXWY-C is picking the TLS over Oauth Zone to CUCM for Register Message |
ftenerel |
vcs |
mra_round_robin_algorithm |
external |
Check if VCS can find XCP service. |
hocao |
vcs |
mra_oauth_min_cucm_version |
internal |
hocao |
|
vcs |
mra_CSCvo47769 |
external |
Look for attempted Directory traversal attacks |
acalleba |
vcs |
vcs_cscuz57929 |
external |
CSCuz57929 HTTP GET(Jabber Guest link) is getting slow response from Expressway/VCS |
ftenerel |
vcs |
mra_external_uds_missing |
external |
Check if Expressway-C can resolve the cisco-uds external domain. |
hocao |
vcs |
mra_cscuu06649 |
external |
Check if cscuu06649 is hit. |
belhoest |
vcs |
mra_CSCvb77703 |
internal |
None |
ftenerel |
vcs |
mra_CSCvo55619_intrusion |
external |
Checks for connectivity issues for MRA users caused by CSCvo55619 |
hocao |
vcs |
mra_CSCwd46586 |
internal |
MRA calls intermittently failing with 404 Not Found at ExpE |
jalero |
vcs |
mra_CSCvm60672 |
external |
CSCvm60672 MRA login failing when Presence Redundancy Groups configured |
ftenerel |
vcs |
mra_phone_register_ucm_set_as_domain |
external |
Check if a phone registration over MRA failed because the Unified CM FQDN is configured as domain on Expressway-C |
hocao |
vcs |
mra_cscvo15089 |
external |
Checks if MRA token refresh requests are being answered with 403 forbidden and for the error ‘UC node verify mismatched deployment_id errors’ relating to OAuth/SSO in the logs. |
jalero |
vcs |
mra_phoneservices_cucm_rfc2392_noncompliant |
external |
Check for occurrence of bug CSCuv65202 for phone services over MRA failing due to Content Length issue on the CUCM (certain versions). If we hit this bug, phone services fail for Jabber. |
stejanss |
vcs |
mra_sip_tcp_disabled |
external |
Check if phone registration failed via over MRA because protocol is not enabled. |
hocao |
vcs |
mra_missing_sip_domain |
external |
Check if -C with MRA activated has at least 1 domain activated for SIP and IM&P |
belhoest |
vcs |
mra_dh_key_too_small |
external |
Check if CUCM/IM&P offerts DH key >= 1024 which is a requirement as of X8.7.2. |
hocao |
vcs |
mra_reverse_dns |
external |
Check for reverse DNS lookup failures as this causes MRA login to fail as of X8.8. |
vsidimak |
vcs |
mra_core_cannot_download_config |
external |
Check if Jabber is able to retreive it’s phone configuration. |
belhoest |
vcs |
mra_cscwc76776 |
external |
Check if we are hit by CSCwc76776 (Expressway-E not responding to TCP 5222 connections) |
acalleba |
vcs |
mra_bug_space_in_userid |
external |
Check if CSCvb29050 is hit. |
evfedoto |
vcs |
mra_conflicting_sip_trunk |
external |
Check if there is a registration attempt towards CUCM on a connection that is in use by a SIP Trunk on CUCM as CUCM does not allow registrations on a SIP Trunk. |
belhoest |
vcs |
mra_nat_exprc_cscvb95283 |
external |
Check if Expr-C is being NATted to the same ip address as configured as static NAT address on Expr-E. |
hocao |
vcs |
mra_get_edge_config_forbidden |
external |
Check if a 403 is returned for a get_edge_config. |
hocao |
vcs |
mra_xmpp_cert_failed |
external |
Check if TLS connection for XMPP fails when reverse DNS lookup of Expr-E is not present in the certificate of Expr-E. |
kvancoil |
vcs |
mra_basic_auth_disabled |
external |
Check if Basic auth is disabled. Applicable for X8.10+. |
hocao |
vcs |
mra_mutual_tls_phone_failure |
internal |
Check if the system was unable to get phone services because it is setup with mutual TLS on SIP TLS 5061 port. |
imdr |
vcs |
mra_capf_authentication_failure |
external |
Check requirements for MRA login with capf. |
belhoest |
vcs |
mra_homecluster |
external |
Check system for “Unable to determine home CUCM” error. |
evfedoto |
vcs |
mra_CSCvz20720 |
internal |
This DS checks if Expressway has hit CSCvz20720 where MRA login failed because the ExpC certificate is not trusted by CUCM |
nomat |
vcs |
mra_connection_cucm_disconnect |
internal |
Check if we find a TCP disconnection caused by a decode error of an incoming SIP message and if that caused the TCP connection with CUCM to disconnect. |
kvancoil |
vcs |
mra_jabberd_service |
external |
Check if the Jabberd service started properly on VCS. If not, MRA will fail. |
hocao |
vcs |
mra_no_device |
external |
Check that a device is configured on CUCM for the platform the MRA client is logging in with. |
kvancoil |
vcs |
mra_cscvs68759 |
external |
Check the length of CUCM FQDN and if MRA is enabled for the CUCM domain. Returns warning relating to bug. |
jalero |
vcs |
mra_CSCvq43182 |
external |
Check for occurrence of bug CSCvq43182 where CUCM nodes could not be added or refreshed with TLS verify mode set to On |
stejanss |
vcs |
mra_cvsverifier |
external |
Check if the certificate requirements are met between VCS-C and IM&P. |
hocao |
vcs |
mra_edge_config_checker |
internal |
Check if a UDS server is specified in the edgeConfigResponse. |
hocao |
vcs |
mra_UCversion_compatibility_check |
external |
Check if Expressway-C version is compatible with versions of the IM&P and CUCM added. |
belhoest |
vcs |
mra_cscvx80771 |
internal |
CSCvx80771 - Unified CM configuration inconsistent data warning post upgrade |
ftenerel |
vcs |
mra_softphone_badrequest |
external |
Check if phone registration failed via over MRA because expressway failed to decode a message |
belhoest |
vcs |
mra_CSCwa25108 |
external |
This DS checks if Expressway has hit CSCwa25108/CSCwc69661 where MRA login failed because the CUCM/IM&P/Unity node certificates are not trusted by Expressway-C |
stejanss |
vcs |
mra_403_response_to_get_edge_config |
internal |
Check if system is affected by CSCvk06236 which causes Expressway to reject the endpoint get_edge request even if the domain in the request was enabled for MRA, in addition, if 403 is found in the logs but the version is not affected by the defect, then report a DS without the defect |
nomat |
vcs |
vcs_cscvb43528 |
external |
Check if vcs is affected by CSCvb43528. |
kvancoil |
vcs |
mra_c_responds_with_http_502 |
external |
Checks if a MRA login fails because Expressway-C was unable to resolve fqdn for one of the HTTP requests for MRA |
hocao |
vcs |
mra_CSCvi37792 |
external |
MRA login failures if ExpC restarts when UDS servers are unavailable. If an ExpC restarts and finds that the UDS servers are unavailable it appears to cache this state, causing MRA logins to fail from then on (despite the fact that the UDS servers have come back online). Workaround: Restart Exp-C once again while UDS server(s) are up and running. Check if there are authentication errors in the logginsnapshot logs file. If yes check if UDS lookups return valid UDS servers or not. |
hamoshen |
vcs |
mra_cscvf25604 |
external |
Check for occurrence of bug CSCvf25604. SSH tunnels are down on E nodes, but up on C nodes. |
evfedoto |
vcs |
mra_cscvm76492 |
external |
Check for occurrence of bug CSCvm76492. Jabber BIB recording over Expressway results in single recording with incoming & outgoing audio mixed together |
belhoest |
vcs |
mra_sso_CSCvf37587 |
external |
Check if system is affected by CSCvf37587 which causes MRA login with SSO to fail. |
hocao |
vcs |
mra_cscva26845 |
external |
Check for occurrence of bug CSCva26845 for not being able to add IM&P 11.5 server to C from X8.8 (case-sensitive). |
stejanss |
vcs |
mra_cscut91464 |
external |
Check if Jabber softphone failed to failover via MRA due to Jabber limitation (cscut91464). |
evfedoto |
vcs |
mra_xcp_checker |
internal |
Check if there is xcp issue on traversal zone between -C and -E. |
vsidimak |
vcs |
mra_cscvs68685 |
external |
CSCvs68685 - Trying to communicate with a CUCM Node that is no longer configured Conditions: 1. Version from X12.5, fixed in X12.5.8 2. Lines: * 2019-11-12T17:08:39.571+02:00 DPMExpWC01 edgeconfigprovisioning: Level=”ERROR” Service=”UDSManager” Detail=”UDS get version request failed” UDS=”10.7.8.3” Reason=”User timeout caused connection failure.” 3. The attempted server is not in UDS list |
ftenerel |
vcs |
mra_phone_reg_fail_digest_authentication |
external |
Checks if any phone registration failed because Digest Authentication is enabled on the phone security profile |
hocao |
vcs |
mra_registration_fail_service_438_invalid_identity_header |
external |
Check if SIP Service between Exp-E and Exp-C failed. Which lead to inability to register phone over MRA |
hocao |
vcs |
vcs_tls_timeout |
external |
Check if a TLS handshake timed out. |
hocao |
CSA-DS¶
Product |
Name |
Status |
Creator |
---|---|---|---|
cucm |
cucm_offnet_to_offnet_block2 |
silent |
radrabik molszowy |
cucm |
cucm_fromHeaderTruncated_CSCuq20108 |
external |
radrabik molszowy |
cucm |
cucm_refer_while_invite_491_CSCup30280 |
internal |
orybak radrabik |
cucm |
cucm_sip_se_timer_expiry |
internal |
radrabik molszowy sspyriad |
cucm |
cucm_agenaInterface_leak_CSCva31765 |
internal |
radrabik |
cucm |
cucm_srtpWithRtp_noFallback_detection |
internal |
radrabik |
cucm |
cucm_sip_200_different_cseq_CSCus20387 |
internal |
kogami |
cucm |
cucm_sip_referto_phone_context_CSCuq21941 |
internal |
kogami |
cucm |
cucm_sip_update_183_sdp_CSCvd54314 |
internal |
kogami |
cucm |
cucm_sip_reject_after_422_CSCuv29584 |
internal |
kogami |
cucm |
cucm_unnecesary_transcoder_request_CSCup13318 |
internal |
kogami |
cucm |
cucm_process_leak_cdcc_CSCuw26299 |
internal |
kogami |
cucm |
cucm_fax_mline_stripped_CSCur32841 |
internal |
radrabik |
cucm |
cucm_sip_bye_mismatched_CSCun15762 |
internal |
kogami |
cucm |
cucm_unsol_notify_hold_resume_CSCvc91499 |
internal |
kogami |
cucm |
cucm_update_not_supported_CSCus24732 |
internal |
kogami |
cucm |
cucm_multi_crypto_sdp_CSCvg38060 |
internal |
kogami |
cucm |
CSCuq22701 |
internal |
pdukat |
cucm |
CSCvc35766_detector_CSA_DS |
internal |
michamen |
cucm |
CSCvd02517 |
internal |
pdukat |
cucm |
cucm_no_ringbacktone_do_em |
ignore |
kogami |
cucm |
CSCvj63648_detector_CSA_DS |
ignore |
josevil |
cucm |
CUCM_CSA_Call_Preservation_Detect |
internal |
adawabsh kogami pdukat |
cucm |
cucm_Geolocation_Check |
internal |
radrabik |
cucm |
mid_invite_expire_timeout |
internal |
rosreedh |
cucm |
Detect_MTP_allocation_failed |
internal |
adawabsh |
cucm |
cucm_sip_not_sending_200OK_CSCvd01097 |
internal |
kogami |
cucm |
cucm_sip_dual_mode_alert_timer |
internal |
kogami |
cucm |
cucm_lync_no_sdp_CSCuw23493 |
external |
kogami |
cucm |
cucm_SIPPeriodicReINVITETimer_CSCun66998 |
internal |
kogami |
cucm |
cucm_t38_fax_CSCun32496 |
internal |
kogami |
cucm |
cucm_488_quick_reinvite_CSCur60158 |
internal |
kogami |
cucm |
cucm_source_port_bib_CSCuw19185 |
internal |
kogami |
cucm |
cucm_recognize_update_CSCuv25343 |
internal |
kogami |
cucm |
cucm_180sdp_update_CSCuu20587 |
internal |
kogami |
cucm |
cucm_not_recorded_refer_CSCux37689 |
internal |
kogami |
cucm |
cucm_dpark_not_working_CSCuw63041 |
internal |
kogami |
cucm |
cucm_snr_path_timer_CSCvf10487 |
external |
kogami |
cucm |
cucm_RPID_unknown_CSCum06402 |
internal |
kogami |
cucm |
cucm_CFA_loop_CSCue01891 |
internal |
kogami |
cucm |
Pickup_Issue_CSCuj16559 |
external |
apiskuno |
cucm |
cucm_stuck_LBM_CSCul57618 |
internal |
kogami |
cucm |
cucm_183_update_CSCuu67940 |
internal |
kogami |
cucm |
cucm_meetme_tone_CSCup27560 |
external |
kogami |
cucm |
cucm_DevName_not_upper_CSCvf56538 |
internal |
apiskuno molszowy |
cucm |
CSCuz28160_CSA_Module |
silent |
sbraichu |
cucm |
cucm_ivr_dtmf_not_received_CSCuw79671 |
external |
molszowy wsyrnick belhoest |
cucm |
cucm_Advertise_Globally_via_ILS_inserts_Alternate_Number_into_Local_DA_CSCuu62577 |
internal |
wsyrnick molszowy |
cucm |
cucm_Phone_disconnects_call_while_on_hold_or_being_redirected_CSCvd12396 |
internal |
wkoziol molszowy |
cucm |
cucm_Dual_Ringback_heard_in_Secure_Mode_180_Ringing_after_183_CSCuq67163 |
ignore |
wsyrnick |
cucm |
cucm_MGCP_state_not_updated_after_OLC_stuck_in_waitForMGCPResponse_state_CSCuj23331 |
internal |
wsyrnick |
cucm |
cucm_CUCM_Park_feature_cannot_retrieve_calls_CSCut84956 |
ignore |
wkoziol |
cucm |
cucm_Audio_m_line_is_stripped_in_200OK_while_answering_to_the_T38_ReInvite_CSCur32841 |
silent |
wsyrnick |
cucm |
cucm_dpark_not_working_CSCuy45449 |
external |
kogami |
cucm |
cucm_H245_SIP_OOB_DTMF_Conversion_fails_with_No_Preference_on_SIP_Trunk_CSCum50133 |
internal |
sspyriad wsyrnick |
cucm |
cucm_CallManager_is_sending_out_duplicate_dtmf_digits_CSCux54464 |
external |
wsyrnick molszowy belhoest |
cucm |
cucm_Cannot_use_Mobility_Softkey_to_switch_from_the_desk_phone_to_a_mobile_CSCux22567 |
internal |
sspyriad wsyrnick |
cucm |
MTP_Media_connect_issue |
internal |
adawabsh |
cucm |
cucm_eoeo_CSCuy8355 |
ignore |
adawabsh |
cucm |
cucm_Calls_from_dual_mode_phones_to_overlapping_translation_patterns_CSCvk54291 |
external |
sspyriad wsyrnick |
cucm |
cucm_Call_index_not_consist_after_barge_a_transfered_call_CSCuo96552 |
ignore |
wkoziol |
cucm |
cucm_CUCM_responds_with_400_Bad_Request_to_SIP_INFO_during_mid_call_CSCux30379 |
silent |
sspyriad wsyrnick molszowy |
cucm |
cucm_SME_routed_call_fail_SIP_4025_CSCut40980 |
internal |
sspyriad wsyrnick |
cucm |
cucm_Native_Call_Queue_call_rings_back_in_0s_when_parked_by_88XX_phone_CSCux73307 |
silent |
sspyriad wsyrnick molszowy |
cucm |
RPID_incorrect_CobferenceNow_CSCvi43802 |
ignore |
apiskuno molszowy |
cucm |
cucm_Block_CTI_Unencrypted_CSCvj93561 |
silent |
apiskuno |
cucm |
INC_Call_Matching_FAC_Enabled_RP |
internal |
mokalam |
cucm |
H323_TCP_socket_failure |
external |
mokalam |
cucm |
cucm_Add_RD_via_CTI_fails_when_it_overlaps_with_pattern_ending_exclamaton_CSCuv03102 |
ignore |
kteper |
cucm |
cucm_CCM_VM_leaks_slowly_contributed_due_to_media_interfaces_being_leaked_CSCuv34143 |
silent |
wkoziol |
cucm |
SIP_MGCP_DTMF_BUG_CSCvh79219 |
internal |
mokalam |
cucm |
cucm_Recording_is_not_working_for_CIPC_device_if_the_transport_is_UDP_CSCvj77290 |
silent |
kteper |
cucm |
H245_TCP_Socket_Failure |
internal |
mokalam |
cucm |
CSCvo80917_detector_CSA_DS |
external |
josevil |
vcs |
vcs_kpml_fail_404_CSCuv39848 |
external |
tfedosie belhoest kvancoil |
vcs |
vcs_encrypted_call_dns_truncated |
internal |
kogami hocao vsidimak |
vcs |
vcs_cucm_unescaped_CSCvf73537 |
internal |
kogami |
vcs |
mra_sip_mtls_enabled |
internal |
sdekunst |
cucm |
cucm_CSCvn78228 |
ignore |
nanzai kogami |
cucm |
cucm_CSCvp43928 |
ignore |
nanzai kogami |
sysdump |
Expressway_Crash_Finder_For_Csa |
internal |
belhoest |
bwrks |
Test_BWRKS_CSA_DS |
ignore |
visimard |
broadworks |
callengineDsigTest |
ignore |
visimard |
Jabber |
test_jabber_csa_ds |
ignore |
hocao |