Release Note

Cisco Unified ICM/Contact Center Enterprise & Hosted Editions, Release 7.5,
Hardware and System Software Specification
©2008-2011 Cisco Systems, Inc. 13
Maximum Limit Limit
Value
Unified
SCCE
Unified
CCE
Unified
ICME
Unified
CCH
Unified
ICMH
Comments
TDM PIMs per PG 5 N/A N/A
N/A
Multiple PIMs on a PG can
impact performance, thus
lowering the total number of
agents and IVR ports and call
volume supported when
compared to a single PIM per
PG. There is a maximum of
one PIM per TDM PG with
CTI OS co-resident.
MR PIMs per PG 10 N/A
MR PIMs per PG in
System CCE
1
N/A c N/A N/A
PGs per server 2 N/A
N/A N/A
This is not applicable to
multi-instance CTI OS in a
Unified CCH environment.
PGs per CICM
instance
80 N/A N/A N/A
N/A This is only applicable to
Unified CCH with multi-
instance CTI OS deployment.
PGs per server for
System CCE
3
N/A N/A N/A N/A One each: Agent PG, VRU
PG, MR PG
Duplex PGs per ICM
instance
150 N/A
Not to exceed maximum
number of PIMs per system
and also not to exceed
configured agents per system
(see below)
PIMs per system
(total)
200 N/A
Configured agents
per system (total)
65,000
N/A N/A
Maximum of 150 PIMs
Configured agents
per system (total)
36,000
N/A
N/A N/A N/A Maximum of 150 PIMs
Skill groups per
peripheral gateway
3000 N/A
HDS servers per
Logger side
2
Deployments approaching these limits are at risk of performance degradation and failed call routing, especially if one or more
contending capacity limitations are themselves approaching maximum thresholds. For this reason, Cisco strongly recommends partner
and/or professional services engagement for expert assistance with capacity-related system planning. The set of most impacting related
parameters with large numbers of configured agents include total number of system peripherals, routes, number of active (vs. configured)
agents, and overall call load. The point at highest risk for degradation are busy hours and the half-hour update period, during which PG-
generated reporting data is sent to the Central Controller. System administrators can lessen their exposure to these issues by purging
unused configured agents, retiring inactive peripherals, and maintaining systems at current maintenance release levels.