CISCO Unified Intelligence Center Software User Guide

June 5, 2024
Cisco

CISCO Unified Intelligence Center Software

CISCO-Unified-Intelligence-Center-Software-product3

Introduction

The Cisco Options Package (COP) file provides a way to deploy software outside of the normal maintenance release processes. This document describes how to download and apply the COP file: ciscocuic.12.6.1.3.cop.sgn

Pre-requisites for Installing the COP
You can apply this COP file only to systems that have installed Cisco Unified Intelligence Center (CUIC) Release 12.6(1) FCS build 12.6.1.10000-21, or on top of earlier COP files applicable for this release.

COP

|

Unified Intelligence Center Standalone

| Unified Intelligence Center and LiveData

Coresident

|

LiveData Standalone

---|---|---|---
12.6.1.3 COP| Required| Required| Required

Patch Version

File Name MD5 sum
ciscocuic.12.6.1.3.cop.sgn 52948936abb5eb34139deda57ed0b510
ciscocuic.12.6.1.ES.Rollback.cop.sgn 9da734cefc1f182dfdfb7c991c2f5722

COP Contents and Supported Features List
This COP includes defect fixes as listed in the Resolved Caveats section.

Unsupported Features

None Cisco Unified Intelligence Center

Known Caveats
CSCwa57348: LD gadgets do not load when one side of proxy is down in VPNLess environment If either side of reverse-proxy server is not reachable on VPNLess setup, agents/supervisors logging into Finesse desktop will not be able to view the LiveData Gadgets. LiveData gadget should load properly when the reverse proxy server comes back online. Already logged-in agents should not see any problems if one side of reverse proxy server goes down.

  • Cisco Unified Intelligence Center

Feature Updates and Resolved Caveats in Release 12.6(1) ES03

New Features

All Users Group Access
The set cuic properties allow-allusers-group-ui command is used to enable or disable the access to AllUsers group in the permissions modal. By default, the value is set to off. By setting this parameter to on, AllUsers group will be visible in the permission modal for non-administrative entity owners to assign permissions. Any users who do not have Security Administrator role are called non-administrative entity owners.

Note: Restart the CUIC Reporting service after running the command on each node.

Configurable Reverse-Proxy Host Verification

You can enable and disable SSL certificate verification for connections that are established from reverse-proxy hosts to Cisco Web Proxy Service by using the utils system reverse-proxy client-auth CLI command. For more information about reverse-proxy host authentication see the Configure Reverse-Proxy Host Authentication section in Cisco Unified Contact Center Enterprise Features Guide.

Resolved Caveats in Release 12.6(1) ES03
This COP file resolves the following caveats.

Table 1: LiveData Caveats – Resolved in CUIC 12.6(1) ES03

Identifier Headline
CSCwa46810 log4j2 zero day vulnerability in LiveData

Unified Intelligence Center Caveats – Resolved in CUIC 12.6(1) ES03

Identifier Headline
CSCwa26057 Multiple Certificates offered to agent during finesse

desktop login
CSCwa24519| Webproxy service fails to restart if reverse proxy hostname is not resolvable from component
CSCwa23252| Proxy finesse trust is broken when depth is more than one for CA certs chain
CSCvz08764| Delete of allowed-hosts is not working as expected
CSCvz08779| IP tables rules are not getting retained after build to build upgrade across solution
CSCwa37849| MultipleIP resolution for Proxy hostnames is not supported on VOSboxes

when configuring VPNLessprox

CSCwa46525 log4j2 zero day vulnerability in CUIC

Feature Updates and Resolved Caveats in Release 12.6(1) ES02

Updated Features

VPN-Less Finesse
This feature enables the contact center agents and supervisors to access the Finesse desktop without using the VPN. The agents will now be able to access and load the LiveData gadgets without connecting to VPN. The supervisors will now be able to access LiveData and Historical gadgets without connecting to VPN.

Note:
To use VPN-Less access to Finesse desktop feature, you must upgrade Finesse, IdS, and CUIC to release 12.6(1) ES03. If you are using LiveData 12.6(1), LiveData should also be upgraded to 12.6(1) ES03. To enable this feature, please see section VPN-Less Access to Finesse Desktop in Cisco Unified Contact Center Enterprise Features Guide.

Table 3:  LiveData Caveats – Resolved in CUIC 12.6(1) ES02

Identifier Headline
CSCvz76584 Livedata APIs in SSO mode fails with LD auth header

Unified Intelligence Center Caveats – Resolved in CUIC 12.6(1) ES02

Identifier Headline
CSCvy96449 SQL query changes on Anonymous Block report definitions

causes filters loss on reports associated
CSCvz34912| Caching headers are not proper for cuicui
CSCvz84821| Incorrect logging for historical report execution and IDS SSOValve logs
CSCvz59094| CUIC:UCCE 12.5 unable to export reports intermittently
CSCwa07492| Reports taking server timezone after install of ES11 for 12.5.1
CSCwa11745| Threshold images are not shown in CUIC Report viewer

Support for ECDSA Certificates

ECDSA is an encryption algorithm that requires much shorter keys as compared to RSA but provides the same level of security as RSA encryption. Because of this it has an advantage of performance and scalability and requires a lesser load for the network. To enable this feature, run the set tls server cert_type command from CLI. Running this command will restart the node. For more information see, the section Enabling ECDSA Certificate in Security Guide for Cisco Unified ICM/Contact Center Enterprise.
Note: Clear the Finesse web proxy cache by running the CLI on all Finesse nodes, utils web proxy cache clear all to load the gadgets, and clear the browser cache to access CUIC with the new certificate type.
Note: After changing the Certificate Type, import the new certificates into the nodes that use these certificates:

  1. Import CUIC certificates to Finesse and LiveData.
  2. Import LiveData certificates to Finesse and CUIC.

VPN-Less Finesse
This feature enables the contact center agents to access the Finesse desktop without using the VPN. The agents will now be able to access and load the live data reports without connecting to VPN.
Note: To use VPN-Less access to the Finesse desktop feature, you must upgrade Finesse, IdS, and CUIC to Release 12.6(1) ES01. If you are using Unified CCE 12.6, you must update Live Data also to 12.6(1) ES01. In 12.6(1) ES01, VPN-less access to the Finesse Desktop is supported only for Agents. Supervisors must connect to VPN to access the Finesse desktop. To enable this feature, please see section VPN-Less Access to Finesse Desktop in Cisco Unified Contact Center Enterprise Features Guide.
Note:

  • CUIC application will not be accessible in the VPN-Less environment.
  • Historical and Real-Time Reports gadgets are not accessible in the VPN-Less environment

Cisco Unified Intelligence Center

LiveData Caveats – Resolved in CUIC 12.6(1) ES01

Identifier Headline
CSCvz06351 Handle SocketIO Authentication token in HTTP Header

Unified Intelligence Center Caveats – Resolved in CUIC 12.6(1) ES01

Identifier Headline
CSCvy19226 Few RTMT interval counters are not populated
CSCvy32170 Unauthenticated end point /rest/usersessiondetail/ gives

back session id and username
CSCvy35385| Address the UI issues caused by accessibility fixes
CSCvy35410| Accessibility UI issues on loading login/logout
CSCvy77589| CUIC Switcher: When in focus, one more text box appears in switcher search, in the reports filter dialog
CSCvy95404| CUIC Accessibility: Focus is incorrect with buttons and refresh icons
CSCvy84713| When in focus, one more text box appears in all search places -Report, Dashboard, RD, User, VL etc.
CSCvy29543| Session Token in URL
CSCvz06351| Handle SocketIO Authentication token in HTTP Header

Special Instructions

Live Data Compatibility
For LiveData Reports to function with 12.6 ES03, the latest ES needs to be applied on LiveData nodes. Please refer to the table below for compatible LiveData ES.

| LiveData 12.6| LiveData 12.5| LiveData 12.0
---|---|---|---
CUIC 12.6 ES03| ES03| ES11 or latest ES| ES17 or latest ES

Accessing Platform Web Applications using Chrome Browser

This section is applicable only if you are using a Chrome browser to access the Platform web applications, such as Cisco Unified OS Administration, Cisco Unified Serviceability, Disaster Recovery System and Cisco Unified Intelligence Center Administration. If you are using the self-signed certificates, add the certificates to the Client OS trust store to access the administrative web applications. Follow the instructions below:

  1. Downloading the Server Certificate from CUIC Node in Administration Console User Guide for Cisco Unified Intelligence Center  Cisco Unified Intelligence Center.
  2. Adding Certificate to Trusted Root Certification Authorities on Windows Client System in Administration Console User Guide for Cisco Unified Intelligence Center.
  3. Adding Certificate to Keychain Access in Mac Client Machine in Administration Console User Guide for Cisco Unified Intelligence Center.

Clear Browser Cache
After installing the Cisco Unified Intelligence Center 12.6(1) ES03 COP file, ensure that you clear your browser’s cache.

Clear Finesse Cache
If the Agent State History gadget does not load with proper UX on the Finesse desktop, follow these steps:

  • Step 1: Log in to Finesse CLI and enter the command utils web proxy cache clear all to clear the Finesse cache.
  • Step 2: Clear the browser cache.

Downloading the COP File

Download the COP file ciscocuic.12.6.1.3.cop.sgn from the Software Download Areas – Unified Intelligence Center 12.6(1). Place the COP file on an SFTP server that can be accessed from your Cisco Unified Intelligence Center 12.6(1) servers.

Installing the COP

The following procedure describes how to use the CUIC Command Line Interface (CLI) to install the COP file.

IMPORTANT: You must use the CLI to perform this upgrade. Do not use the Cisco Unified Operating System Administration page to perform this upgrade because the installation may hang.

  • Step 1: Log in to the Cisco Unified Intelligence Center CLI. To log in to the CLI, specify the System Administrator username and password.

  • Step 2: Enter the command utils system upgrade initiate to start the COP installation.

  • Step 3: Select source 1) Remote Filesystem via SFTP.

  • Step 4: Enter the remote path to the directory on the SFTP server where you downloaded the COP file.
    Note:

    • If the COP file is located on a Linux or UNIX server, enter a forward slash (/) at the beginning of the directory path. For example, if the COP file is in the patches directory, enter /patches.
    • If the COP file is located on a Windows server, check with your system administrator for the correct directory path.
      Cisco Unified Intelligence Center
  • Step 5: Enter the SFTP server name or IP address.

  • Step 6: Enter the Username and Password to the SFTP server.

  • Step 7: Press Enter to skip the prompt “Please enter SMTP Host Server (optional)”.

  • Step 8: Wait until the system displays a list of COP files available at the SFTP location. Select the number corresponding to the COP file that you want to install.

  • Step 9: Type Yes to continue the installation.

  • Step 10: Reboot the machine using the command utils system restart after the COP installation is complete.

  • Step 11: Check for the deployment type:

    • If this deployment is a single-node cluster, your installation ends here.
    • If this deployment is a multi-node cluster repeat the installation procedure (from Step 1) on the other nodes.

Note: Installing the ciscocuic.12.6.1.3.cop.sgn COP file uninstalls the existing language pack. Hence, you must reinstall the language pack COP.

Rollback COP

Use the following Rollback COP file to roll back to the First Customer Shipment (FCS) version.

Note: The CUIC Rollback COP file removes all the previous ESs installed on the system and reverts your system to the FCS version (in this case, Cisco Unified Intelligence Center Release 12.6(1)). Also, Rollback cannot be applied if the server certificate type is configured to ECDSA. To apply the Rollback COP, change the server certificate type to RSA. See set tls server cert_type section in Administration Console User Guide for Cisco Unified Intelligence Center.

  • Rollback COP file: ciscocuic.12.6.1.ES.Rollback.cop.sgn
  • MD5 Checksum: 9da734cefc1f182dfdfb7c991c2f5722

Note: To install the Rollback COP, follow the steps outlined in the Installing the COP section.

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals