Release Notes
25
Release Notes for Cisco CDA Visual Quality Experience Application Release 3.10
Supporting Software Hardening Guides and VQE
Step 1 When the CDE111/ CDE250 2V0 completes the final reboot, you are required to log in as root and
change the password for root:
localhost.localdomain login: root
You are required to change your password immediately (root enforced)
You can now choose the new password or passphrase.
A valid password should be a mix of upper and lower case letters,
digits, and other characters. You can use an 8 character long
password with characters from at least 3 of these 4 classes, or
a 7 character long password containing characters from all the
classes. An upper case letter that begins the password and a
digit that ends it do not count towards the number of character
classes used.
A passphrase should be of at least 3 words, 12 to 40 characters
long and contain enough different characters.
Enter new password:
Re-type new password:
Step 2 Enter the new password for root.
Step 3 Set the password for the vqe user ID.
Note No passwords are copied over to the new set of installed files.
Step 4 Check the /var/log/vqe/vqe.log file to ensure that no significant errors occurred during the ISO full
upgrade.
Step 5 If you made changes to earlier VQE Release /etc configuration parameters that are not now under the
control of the VQE CMS, the ISO full upgrade does not preserve these changes in new VQE Release. It
is possible for you to manually recreate the customized configurations in the new VQE Release /etc
configuration files. However, making manual changes in this manner is not supported or recommended.
You can examine the /vqe-etc/etc-diff file to determine the /etc file parameters (beyond the control of the
VQE CMS) that have been changed.
Supporting Software Hardening Guides and VQE
Customers who wish to apply the security recommendations published by SysAdmin, Audit, Network,
Security Institute (SANS) or National Security Agency (NSA), as described in the documents referenced
in the following sections, should be aware of some issues in using these recommendations that may
affect the correct operation of the VQE-S.
The following sections describe the particular areas where customers should exercise care in following
the security recommendations in these hardening guides:
• Linux Security Checklist, page 26
• The 60 Minute Network Security Guide, page 26