The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes the UCCX 11.6 Pre-Release communication.
Note: The Unified Contact Center Express (UCCX) 11.6 release is a very important release with important updates to critical features and serviceability updates that will help partners and customers. This pre-release communication provides an overview of critical updates and important information that helps to plan a quick, smooth upgrade to UCCX 11.6.
UCCX 11.6 has a number of features aimed to enhance the product feature set and productivity of agents, supervisors and administrators. Major updates have gone in the email, chat functionality while updates to the Cisco Unified Intelligence Center (CUIC) reporting and Finesse Desktop updates greatly enhance the experience of the contact center users. Important serviceability updates such as the Context Service Dashboard have been added too while updates have been made to the system to provide benefits such as reduced time taken for upgrades
A summary of the new features (refer to the release notes for a detailed list):
Cisco Finesse | UCCX Email | UCCX Chat | CUIC and Reporting |
|
|
|
|
Scripting Enhancements | Outbound Campaign Enhancements | SSO | Other |
|
|
|
|
UCCX 11.6 supports direct upgrades from these paths:
10.x | 11.0 | 11.5 |
10.5(1)SU1 | 11.0(1) | 11.5(1) |
10.6(1) | 11.0(1)SU1 | 11.5(1)SU1 |
10.6(1)SU1 | ||
10.6(1)SU2 |
Any Engineering Specials (ES) applied on the above versions does not affect the upgrade path, the upgrade can be performed from any of the above versions irrespective of which ES is installed on the system. If there is a software release after the publication date of this document, check the UCCX Software Compatibility Matrix to verify the availability of an upgrade path.
The UCCX interacts with SocialMiner for all email and chat functionality. The 11.6 upgrade should be planned to ensure that both the UCCX and the SocialMiner servers are upgraded to 11.6 in the same maintenance window. In UCCX 11.6, the email and chat features have undergone major updates. Using these features of UCCX 11.6, with SocialMiner still on 11.5, has unexpected results and errors/warnings are displayed.
The recommended sequence for upgrade is to upgrade the SocialMiner server and the UCCX server(s) in the same maintenance window.
UCCX 11.6 solution supports Microsoft Exchange Server 2013 and 2016 - Enterprise and Standard Edition for the UCCX Email functionality. If you use Microsoft Exchange Server 2013, ensure to install Cumulative Update 15 for Exchange Server 2013 (KB3197044) so that TLS 1.2 is supported by Exchange. Without this patch, the communication between SocialMiner and Microsoft Exchange Server 2013 fails and email routing fails. If you already have a Microsoft Exchange Server 2013 server setup with UCCX, ensure to install this patch before it goes into production with UCCX 11.6.
This is not needed for Microsoft Exchange Server 2016.
Note: If you do not wish to use TLS 1.2 for connections to Exchange, the minimum server TLS version can be set to 1.0 on the SocialMiner server (see details in the TLS section below). If there is a TLS mismatch between Exchange and SocialMiner, all email feeds will fail.
In UCCX 11.6, the default is TLS 1.2 for connections when UCCX acts as either a client or a server in the connection. Customers, who upgrade to UCCX 11.6 and have third party applications that interact with UCCX and uses TLS are to be aware of this change.
UCCX 11.6 also provides the ability to update the minimum TLS version for both client and server connections:
Example: set tls server min-version 1.2
The command has to be run on both the nodes if this is a high availability system. One the command is run, the system has to be restarted using the utils system restart command.
The minimum TLS version being supported can also be verified by running the commands:
Note: If the minimum version is set to 1.0, that means the connection will support 1.0, 1.1 and 1.2.
Due to the security standards to have TLS 1.2, and this being the standard, all UCCX plugins such as RTMT and Script Editor are re-installed so that they can continue to work with UCCX 11.6. Post the upgrade to UCCX:
To start from UCCX 11.6, ESXi 6.5 is supported. Due to performance issues with VMFS 6 and ongoing investigations from VMWare, ESXi 6.5 is supported with VMFS 5 only.
ESXi 6.5 Support | VMFS version with ESXi 6.5 | Comments | |
BE6K | Yes | VMFS 5 | Dependency on other applications prevent use of VMFS 6 |
non-BE6k | Yes | VMFS 5 and VMFS 6 | Upgrade of ESXi and VMFS might require migration of the VMs |
Ensure that you use the latest OVA template published for 11.6.
Note: Support for VMFS 6 can be updated in the future for previous releases. Refer to the UCCX Virtualization wiki for the latest update.
In UCCX 11.6, updates have been done to reduce the total time taken for a complete upgrade exercise. As part of the switch-version process, a number of scripts run sequentially to migrate data for individual applications such as Finesse, CUIC and historical data. In UCCX 11.6, the design is updated to have the scripts run in parallel and thereby reduce the time taken for switch-version significantly.
While the actual time for switch-version cannot be displayed due to the size of the customer database, internal testing has shown about 30% time reduction in the switch-version process.
In UCCX 11.6, there is only 1 ISO released that is posted on Cisco.com and this ISO can be used for either an upgrade or a fresh install. The ISO follows the regular naming convention of UCSInstall_UCCX _11.6.XXXXX-XX.sgn.iso
This ISO is provided with both boot options, so serves as a bootable image as well.
The Real Time Reporting Tool is no longer fully browser based, but uses the Java Applet that requires to be downloaded on the PC to be accessed. With security updates introduced in most browsers regarding Java security, it is necessary to introduce the UCCX Real Time Reporting (RTR) tool as a Java Applet that is downloaded during the first time install.
Updated behaviour in 11.6:
Note: This needs to be done in every PC that wishes to access RTR after the upgrade. Once the RTR applet is downloaded, any user who has access to the PC can open the same.
Recommended Java version for using RTR is Java 8. If the user has Java 7, the user must enable TLS 1.2 in the Java Control Panel.
If you are using Internet Explorer (IE), Finesse desktop does not support Compatibility mode. Changes are done to show a warning to an agent if compatibility mode is enabled. The only scenario where the compatibility mode is required is for the accesses of old-UI for CUIC which contains features such as Security drawer, Scheduler and so on.
UCCX now supports Integrated windows authentication. Refer to the UCCX Release Notes and related documents for more details.
In UCCX 11.6, a number of new Identity Providers (IDP) are qualified and added for support:
UCCX 11.6 also works with any IDP that works with SAML v2.0. As long as the IDP confirms to the SAML v2.0 standard and is able to cater to the UCCX (IdS) configuration, the IDP can be used for UCCX SSO even if it is not part of the above list.
To start from UCCX 11.6, the failover behavior is enhanced to ensure agent productivity during a Finesse failover without doing a full system failover. It is important to understand the same so that agents are made aware of the changes in behavior.
Overview of change in behavior.
Scenario | UCCX HA Behaviour | Finesse Service on Node1 | Finesse Service on Node2 | Finesse Client Behaviour |
CCX Engine Failure on Node1 |
CCX Engine on SideB becomes master |
Finesse goes Out Of Service and returns to IN_SERVICE as soon as it connects to the new master engine. |
Finesse goes Out Of Service and returns to IN_SERVICE as soon as it connects to the new master engine. |
Agent sees the red disconnection bar, and automatically re-logins into the Finesse side that comes to IN_SERVICE first. It can be either Node1 or Node2. |
CCX Engine Failure on Node2 |
CCX Engine on SideA continues master |
Finesse continues to be IN_SERVICE |
Finesse goes Out Of Service and returns to IN_SERVICE as soon as it connects to the master engine. |
Agents connected to Node1 continues to be logged in. Agents connected to Node2 are temporarily disconnected and gets connects to the Finesse Service on the node that is IN_SERVICE. |
Finesse Service OOS on Node1 |
Engine mastership is not affected |
OUT_OF_SERVICE |
Finesse on Node2 continues to be IN_SERVICE |
Any agents connected to Node1 are temporarily disconnected and gets connected to Finesse on Node2. Agents connected to Node2 will not be impacted. |
Finesse Service OOS on Node2 |
Engine mastership is not affected |
Finesse on Node1 will continue to be IN_SERVICE |
OUT_OF_SERVICE |
Any agents connected to Node2 are temporarily disconnected and gets connected to Finesse on Node2. Agents connected to Node1 will not be impacted. |
CCX Notification Service Failure on Node1 |
Engine mastership is not affected |
OUT_OF_SERVICE |
Finesse on Node2 will continue to be IN_SERVICE |
Any agents connected to Node1 are temporarily disconnected and gets connected to Finesse on Node2. Agents connected to Node2 are not impacted. |
CCX Notification Service Failure on Node2 |
Engine mastership is not affected |
Finesse on Node1 continues to be IN_SERVICE |
OUT_OF_SERVICE |
Any agents connected to Node2 are temporarily disconnected and gets connected to Finesse on Node2. Agents connected to Node1 are not impacted. |
Island Mode |
Both HA nodes become Master |
Finesse on Node1 continues to be IN_SERVICE and will be connected to Engine on Node1. |
Finesse goes Out Of Service and will return to IN_SERVICE as soon as it connects to the engine on Node2 which is also the master. |
Agents connected to Node1 continues to be logged in. Agents connected to Node2 are temporarily disconnected and gets connected to the Finesse Service on the second node. |
In UCCX 11.6, there is a dashboard provided to verify the status of all components registered to Context Service. The dashboard can be accessed on the UCCX Serviceability page, as you navigate to Tools > Context Service Status page.
These are a few statuses to interpreted:
Registered | Connectivity Status | Status Displayed |
YES | 200 | • ONLINE |
YES | NON-200 | • ONLINE |
YES | N/A | • OFFLINE |
NO | 200 | • OFFLINE |
NO | NON-200 | • OFFLINE |
N/A | N/A | • STOPPED |
N/A | N/A | • UNKNOWN* |
*When the CS dashboard is unable to retrieve status due to errors or timeouts.
This information can be exported in a JSON/text format too.
In addition to the dashboard, an RTMT alert isadded as well: ContextServiceStepsExecutionIssue
This is triggered when:
Starting from UCCX 11.6, both LiveData and Historical Reports use the Reporting User password for setting up the Datasource. If the passwords do not match between the nodes, reporting is impacted.
Before you upgrade, ensure the password is consistent between both the nodes. You can verify through these steps:
The Cisco Unified Intelligent Center (CUIC) allows access to reports based on the permissions assigned to the user accessing. Based on the permission level, the user is provided access to either the agent reports or the supervisor reports or the complete report set to the reporting administrator.
These permissions are synced from the Unified Contact Center Express (UCCX) based on the role assigned to the user on the UCCX. The user can be specifically made a CUIC administrator by running the command utils cuic user make-admin CCX\<username>
During the upgrade process, the permissions between the UCCX and the CUIC applications gets re-synced and therefore the elevated CUIC administrator rights given to the user get overwritten. The user, therefore, sees only those reports that his original role allows.
To provide access to the reports that the user had before the upgrade:
In UCCX 11.6, the limits on the size of attachments is updated to these:
While the UCCX solution allows the increased attachment size, the Message Size Limit is updated on the Exchange (mail server) so that the attachments are not blocked. The limit might be applied based on enterprise wide IT policy. If the Exchange server blocks the message, the agent sees the error: "Unable to reply to customer's email. Click Send to retry or requeue. If problem persists, contact you system administrator."
Message size = Size of email include attachments + Base64 encoding
Base64 encoding = ~33% of the size of the message
Suggested formula is Message size = 1.5*Size of email include attachments
Example: If the size of the message is 9MB (include attachments), the message size to be set as limit should be (9*1.5) = 14MB.
Given that UCCX 11.6 allows attachment size upto 20MB, the message size limit to be set is 1.5*20MB=30MB if you have to take advantage of this increased limit on the UCCX solution side.
The limit can be set on the Exchange server by running the command:
Set-TransportConfig -ExternalDsnMaxMessageAttachSize 30 MB -InternalDsnMaxMessageAttachSize 30MB -MaxReceiveSize 30MB -MaxSendSize 30MB
For information on how to obtain documentation, use the Cisco Bug Search Tool (BST), submit a service request, and gather additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies are considered un-Controlled copies and the original on-line version should be referred to for latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
© 2016 Cisco Systems, Inc. All rights reserved.