THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|
Base Software | RI | RI.2023.12, RI.2024.01 |
Defect ID | Headline |
CSCwj00043 | OCS fails to open a secure connection to NS (NSOSS/NSOC) |
After the release of Cisco Broadworks Application Server 2023.12_1.340, the Open Client Server (OCS) is no longer able to open a secure connection to the Network Server (NS) for the Network Server Open Client Interface (NSOCI) protocol.
When opening a secure connection to the NS, the OCS fails to validate the identity of the NS because it is using the IP address rather than the fully qualified domain name (FQDN).
The OCS fails to open a secure connection to the NS for the NSOCI protocol. This causes all NS provisioning requests that are sent to the OCS to fail.
Workaround
Disable the peer identity validation.
In the CLI, under System/SSLCommonSettings/GeneralSettings, set validatePeerIdentity to false.
Solution
Upgrade to a more recent OCS or Application Server (2024.01_1.436 or later):
Version | Description | Section | Date |
1.0 | Initial Release | — | 2024-MAR-14 |
For further assistance or for more information about this field notice, contact the Cisco Technical Assistance Center (TAC) using one of the following methods:
To receive email updates about Field Notices (reliability and safety issues), Security Advisories (network security issues), and end-of-life announcements for specific Cisco products, set up a profile in My Notifications.