Guest

Cisco IOS Software Releases 12.2 Special and Early Deployments

Cisco SOHO 70 and Cisco 800 Series - Cisco IOS Release 12.2(2)XK

  • Viewing Options

  • PDF (435.9 KB)
  • Feedback
Release Notes for the SOHO 70 Series Routers and the Cisco 800 Series Routers for Cisco IOS Release 12.2(2)XK

Table Of Contents

Release Notes for the SOHO 70 Series Routers and the Cisco 800 Series Routers for Cisco IOS Release 12.2(2)XK

Contents

System Requirements

Memory Requirements

Hardware Supported

SOHO 77 Routers

SOHO 78 Routers

Cisco 801-804 Routers

Cisco 806 Routers

Cisco 826, Cisco 827, and Cisco 827-4V Routers

Cisco 828 Routers

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

New and Changed Information

New Features in Release 12.2(2)XK

ATM OAM F5 Segment Continuity Check

Committed Access Rate

DHCP Server Import

IP Control Protocol Subnet Mask Delivery

IP Security Through Network Address Translation Support

NAT Default Inside Server Enhancement

RADIUS Support

VoDSL ATM AAL2 Profile 9 Support

New Software Features in Release 12.2 T

Important Notes

Upgrading the ROMMON Image

Updating in ROMMON Mode

Updating in IOS EXEC Mode

Configuring PPPoE on a Cisco 806 Router

Caveats

Resolved Caveats—Releases 12.2(2)XK2 and 12.2(2)XK3

Management

Resolved Caveats—Release 12.2(2)XK1

Miscellaneous

CSCdv62649

CSCdu62677

Open Caveats—Release 12.2(2)XK

Miscellaneous

CSCdt55603

CSCdt93933

CSCdt93965

CSCdu52623

CSCdu55044

CSCdu55062

CSCdu55195

CSCdu55959

CSCdu56183

CSCdu56201

CSCdu73718

CSCdu74709

CSCdu83902

CSCdu89082

CSCdv00104

CSCdv01383

CSCdv01412

CSCdv02381

CSCdv02785

CSCdv03686

CSCdv12488

CSCdv17664

CSCdv17679

CSCdv17691

CSCdv20646

CSCdv20689

CSCdv22493

CSCdv23896

CSCdv24610

CSCdv27169

CSCdv32198

CSCdv34472

CSCdv35467

CSCdv37323

CSCdv46730

CSCdv48918

Related Documentation

Release-Specific Documents

Platform-Specific Documents

SOHO 70 and Cisco 800 Series Routers

Software Configuration

Obtaining Documentation and Technical Assistance


Release Notes for the SOHO 70 Series Routers and the Cisco 800 Series Routers for Cisco IOS Release 12.2(2)XK


May 20, 2002

These release notes for the SOHO 70 Series Routers and Cisco 800 Series Routers describe the enhancements provided in Cisco IOS Release 12.2(2)XK3. These release notes are updated as needed. Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.2 T located on Cisco.com and the Documentation CD.

For a list of the software caveats that apply to Cisco IOS Release 12.2(2)XK3, see the "Caveats" section and Caveats for Cisco IOS Release 12.2 T. The caveats document is updated for every maintenance release and is located on Cisco.com and the Documentation CD.

Contents

These release notes discuss the following topics:

System Requirements

New and Changed Information

Important Notes

Caveats

Related Documentation

Obtaining Documentation and Technical Assistance

Obtaining Documentation and Technical Assistance

System Requirements

This section describes the system requirements for Release 12.2(2)XK3 and includes the following sections:

Memory Requirements

Hardware Supported

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

Memory Requirements

Table 1 and Table 2 provide the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.2(2)XK3 on the SOHO 70 Series Routers and Cisco 800 Series Routers.

Table 1 Recommended Memory for the SOHO 70 Series Routers 

Platforms
Image Name
Feature Set
Image
Recommended Flash Memory
Recommended DRAM Memory
Runs From

SOHO 77 Router

Cisco soho70 Series IOS IP

IP

soho70-y1-mz

8 MB

16 MB

RAM

SOHO 78 Router

Cisco soho78 Series IOS IP

IP

soho78-y1-mz

8 MB

16 MB

RAM


Table 2 Recommended Memory for the Cisco 800 Series Routers 

Platforms
Image Name
Feature Set
Image
Recommended Flash Memory
Recommended DRAM Memory
Runs From

Cisco 806 Router

Cisco 806 Series IOS IP/FW Plus 3DES

IP/FW Plus 3DES

c806-k9osy6-mz

8 MB

20 MB

RAM

Cisco 806 Series IOS IP/FW

IP/FW

c806-oy6-mz

8 MB

16 MB

RAM

Cisco 806 Series IOS IP Plus

IP Plus

c806-sy6-mz

8 MB

16 MB

RAM

Cisco 806 Series IOS IP

IP

c806-y6-mz

8 MB

16 MB

RAM

Cisco 820 Series Routers

Cisco 820 Ser IOS IP/FW/Voice Plus 3DES

IP/FW/Voice Plus 3DES

c820-k9osv6y6-mz

8 MB

32 MB

RAM

 

Cisco 820 Ser IOS IP/FW Plus IPSec 3DES

IP/FW Plus IPSec 3DES

c820-k9osy6-mz

8 MB

24 MB

RAM

 

Cisco 820 Ser IOS IP/FW/ Voice

IP/FW/Voice

c820-ov6y6-mz

8 MB

24 MB

RAM

 

Cisco 820 Ser IOS IP/FW

IP/FW

c820-oy6-mz

8 MB

20 MB

RAM

 

Cisco 820 Ser IOS IP/Voice Plus

IP/Voice Plus

c820-sv6y6-mz

8 MB

24 MB

RAM

 

Cisco 820 Ser IOS IP Plus

IP Plus

c820-sy6-mz

8 MB

20 MB

RAM

Cisco 820 Series Routers (continued)

Cisco 820 Ser IOS IP/Voice

IP/Voice

c820-v6y6-mz

8 MB

24 MB

RAM

Cisco 820 Ser IOS IP

IP

c820-y6-mz

8 MB

16 MB

RAM

Cisco 828 Router

IP/FW Plus 3DES

IP/FW Plus 3DES

c828-k9osy6-mz

8 MB

24 MB

RAM

IP/FW

IP/FW

c828-oy6-mz

8 MB

20 MB

RAM

IP Plus

IP Plus

c828-sy6-mz

8 MB

16 MB

RAM

IP

IP

c828-y6-mz

8 MB

16 MB

RAM


Hardware Supported

Cisco IOS Release 12.2(2)XK3 supports the following Cisco routers:

SOHO 70 series routers:

SOHO 77 Routers

SOHO 78 Routers

Cisco 800 series routers:

Cisco 801-804 Routers

Cisco 806 Routers

Cisco 820 series routers:

Cisco 826 Routers

Cisco 827 Routers

Cisco 827-V Routers

Cisco 828 Routers

For detailed descriptions of new hardware features and which features are supported on each router, see the "New and Changed Information" section.

SOHO 77 Routers

The SOHO 77 router provides the following key hardware features:

Connection to an ADSL network through an asymmetric digital subscriber line (ADSL) port.

A central processing unit: 50 MHz MPC 855T RISC processor.

Ability to be stacked or mounted on a wall.

Locking power connectors and a Kensington-compatible locking slot.

Table 4 summarizes Cisco SOHO 77 router ports.

Table 3 Supported Interfaces for the SOHO 77 Routers

Router
Ethernet Ports
ADSL Ports
Console Ports

SOHO 77

One 10BaseT (RJ-45)

RJ-11

RJ-45


SOHO 78 Routers

The SOHO 78 router provides the following key hardware features:

Connection to an ADSL network through an asymmetric digital subscriber line (ADSL) port.

A central processing unit: 50 MHz MPC 855T RISC processor.

Ability to be stacked or mounted on a wall.

Locking power connectors and a Kensington-compatible locking slot.

Table 4 summarizes Cisco SOHO 78 router ports.

Table 4 Supported Interfaces for the SOHO 78 Routers

Router
Ethernet Ports
ADSL Ports
Console Ports

SOHO 78

One 10BaseT (RJ-45)

RJ-11

RJ-45


Cisco 801-804 Routers

The Cisco 801-804 routers provide the following key hardware features:

Cisco 802 and Cisco 804 routers have an integrated NT-1, which eliminates the need for an external NT-1 in North America.

Cisco 803 and Cisco 804 routers provide connection to analog telephones or fax machines, which are connected to telephone services through an ISDN line.

Flash memory: Default is 8 MB, expandable to 12 MB. (4MB Flash soldered to the motherboard.)


Note To add additional Flash memory to the Cisco 801-804, remove the existing Flash card and install a new one.


Dynamic RAM: Default is 4 MB, expandable to 12 MB. (4MB Dynamic RAM soldered to the motherboard.)

ISDN B-channel LEDs are a different color from the other LEDs, which make them easy to distinguish.

Color-coded ports and cable reduce the chance of cabling errors.

Ability to be stacked or mounted on a wall.

Table 5 Supported Interfaces for the Cisco 801-804 Series Routers 

Router
Ethernet Ports
ISDN Ports
Telephone Ports
Console Ports

Cisco 801

One 10BASE-T (RJ-45)

ISDN BRI S/T (RJ-45)

RJ-45

Cisco 802

One 10BASE-T (RJ-45)

ISDN BRI U, integrated Network Termination 1 (NT-1) (RJ-45)

RJ-45

Cisco 803

Four-port 10BASE-T (RJ-45) hub

ISDN BRI S/T (RJ-45)

Two (RJ-11)

RJ-45

Cisco 804

Four-port 10BASE-T (RJ-45) hub

ISDN BRI U, integrated NT-1 (RJ-45)

Two (RJ-11)

RJ-45


Table 5 summarizes Cisco 801-804 router ports.

Cisco 806 Routers

Cisco 806 routers provide the following key hardware features:

Provide connection to 10BaseT (10-Mbps) Ethernet networks and is compatible with 10/100-Mbps devices.

Flash memory: The Cisco IOS uses the current default of 8 MB for loading Cisco IOS images.

Webflash: 2 MB of Flash memory reserved for use by the Cisco Router Web Setup software.

Cisco 806 Router Dynamic RAM: Default is 12 MB of DRAM and is expandable to 32 MB, using 4-MB, 8-MB, and 16-MB DIMM cards.

The central processing unit is a 50 MHz MPC 855T RISC processor.

Support Cisco IOS software.

Color-coded ports and cable reduce the chance of cabling errors.

Ability to be stacked or mounted on a wall.

Accept a cable lock for physically securing the router.

The routers provide locking power connectors and a Kensington-compatible locking slot.

Table 6 summarizes Cisco 806 router ports.

Table 6 Cisco 806 Router Ports

Port Type
Description

Ethernet Port

One 10BaseT (RJ-45). Connects to broadband modem or Ethernet switch.

Ethernet Hubbed Ports

Four 10BaseT (RJ-45). Connect to Ethernet network devices.

Console Port

One (RJ-45).


Cisco 826, Cisco 827, and Cisco 827-4V Routers

The Cisco 826, Cisco 827, and Cisco 827-4V Series Routers provide the following key hardware features:

The routers provide connection to an ADSL network or telephones and fax machines through an ADSL port.

Flash memory: Default is 12 MB and is expandable to 20 MB. If 12 MB is Flash is installed, 8 MB is used for the Cisco IOS images and 4 MB hosts the ROMMON and NVRAM. Additional memory can be added using Flash cards.

Cisco 826 and Cisco 827 routers Dynamic RAM: Default is 16 MB of DRAM and is expandable to 32 MB.

Cisco 827-4V router Dynamic RAM: Default is 24 MB and is expandable to 32 MB. The Cisco 827-4V router also contains an 8-MB DIMM card.

The central processing unit is a 50 MHz MPC 855T RISC processor.

Color-coded ports and cable reduce the chance of cabling errors.

Ability to be stacked or mounted on a wall.

The routers provide locking power connectors and a Kensington-compatible locking slot.

Table 7 Supported Interfaces for the Cisco 826, Cisco 827, and Cisco 827-4V Router 

Router
Ethernet Ports
ADSL Ports
Telephone Ports
Console Ports

Cisco 826

One 10BaseT (RJ-45)

RJ-45

-

RJ-45

Cisco 827

One 10BaseT (RJ-45)

RJ-45

-

RJ-45

Cisco 827-4V

One 10BaseT (RJ-45)

RJ-45

Four (RJ-11)

RJ-45


Table 7 lists the supported interfaces for the Cisco 826, Cisco 827, and Cisco 827-4V routers.

Cisco 828 Routers

Cisco 828 routers provide the following key hardware features:

Provide connection to 10BaseT (10-Mbps) Ethernet networks and is compatible with 10/100-Mbps devices.

Provide connection to G.991.2 (digital-encoding standard) symmetrical high-speed digital subscriber line (G.SHDSL) networks.

Flash memory: The Cisco IOS uses the current default of 8 MB for loading Cisco IOS images, upgradable to 16 MB.

Webflash: 2 MB of Flash memory reserved for use by the Cisco Router Web Setup software.

Dynamic RAM: Default is 16 MB of DRAM and is expandable to 32 MB, using 4-MB, 8-MB, and 16-MB DIMM cards.

The central processing unit is a 50 MHz MPC 855T RISC processor.

Support Cisco IOS software.

Color-coded ports and cables, which reduce the chance of cabling errors.

Ability to be stacked or mounted on a wall.

Accept a cable lock for physically securing the routers.

Provide locking power connectors.

Table 8 summarizes Cisco 828 router ports.

Table 8 Cisco 828 Router Ports

Port Type
Description

Ethernet Hubbed Ports

Four 10BaseT (RJ-45). Connect to Ethernet network devices.

G. SHDSL Port

One (RJ-11). Provides connection to G. SHDSL networks.

Console Port

One (RJ-45).


Determining the Software Version

To determine the version of Cisco IOS software running on your Cisco router, log in to the router and enter the show version EXEC command. The following sample displays command output from a Cisco 806 router running Release 12.2(2)XK3:

Router> show version
Cisco Internetwork Operating System Software 
IOS (tm) 12.2 Software (c806-y6-mz), Version 12.2(2)XK3, RELEASE SOFTWARE

Upgrading to a New Software Release

For general information about upgrading to a new software release, see Software Installation and  Upgrade Procedures located at: http://www.cisco.com/warp/public/130/upgrade_index.shtml. 

Feature Set Tables

The Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features. Release 12.2(2)XK3 supports the same feature sets as Releases 12.2 T, but Release 12.2(2)XK3 can include new features supported by the SOHO 70 Series Routers and Cisco 800 Series Routers.

Table 9 through Table 14 list the features and feature sets supported in Cisco IOS Release 12.2(2)XK3:

Table 9—SOHO 77 routers

Table 10—SOHO 78 routers

Table 11—Cisco 806 routers

Table 12—Cisco 826 routers

Table 13—Cisco 827 routers

Table 14—Cisco 828 routers

The tables use the following conventions:

Yes—The feature is supported in the software image.

No—The feature is not supported in the software image.

In—The number in the "In" column indicates the Cisco IOS release in which the feature was introduced. For example, "12.2(2)XK" means the feature was introduced in Release 12.2(2)XK. If a cell in this column is empty, the feature was included in the initial base release.


Note These feature set tables only contain a selected list of features. These tables are not cumulative—nor do they list all the features in each image.


Table 9 Feature List by Feature Set for the SOHO 77 Routers 

 
Feature Set
Features
In
IP
Addressing
   

IP Control Protocol Subnet Mask Delivery

 

No

NAT Default Inside Server Enhancement

 

No

Management
   

DHCP Server Import

 

No

Quality of Service
   

Committed Access Rate (CAR)

 

No

Security
   

IP Security Through Network Address Translation

 

No

RADIUS Support for New Platforms

 

No

WAN
   

ATM OAM F5 Segment Continuity Check

12.2(2)XK

Yes

VoDSL ATM AAL2 Profile 9

 

No


Table 10 Feature List by Feature Set for the SOHO 78 Routers 

 
Feature Set
Features
In
IP
Addressing
   

IP Control Protocol Subnet Mask Delivery

 

No

NAT Default Inside Server Enhancement

 

No

Management
   

DHCP Server Import

 

No

Quality of Service
   

Committed Access Rate (CAR)

 

No

Security
   

IP Security Through Network Address Translation

12.2(2)XK

Yes

RADIUS Support for New Platforms

 

No

WAN
   

ATM OAM F5 Segment Continuity Check

 

No

VoDSL ATM AAL2 Profile 9

 

No


Table 11 Feature List by Feature Set for the Cisco 806 Routers 

 
Feature Sets
Features
In
IP/FW Plus 3DES
IP/FW
IP Plus
IP
Addressing
         

IP Control Protocol Subnet Mask Delivery

12.2(2)XK

Yes

Yes

Yes

Yes

NAT Default Inside Server Enhancement

12.2(2)XK

Yes

Yes

Yes

Yes

Management
         

DHCP Server Import

12.2(2)XK

Yes

Yes

Yes

Yes

Quality of Service
         

Committed Access Rate (CAR)

12.2(2)XK

No

Yes

Yes

Yes

Security
         

IP Security Through Network Address Translation

 

No

No

No

No

RADIUS Support for New Platforms

 

No

No

No

No

WAN
         

ATM OAM F5 Segment Continuity Check

 

No

No

No

No

VoDSL ATM AAL2 Profile 9

 

No

No

No

No


Table 12 Feature List by Feature Set for the Cisco 826 Routers, Part 1 of 2 

 
Feature Sets
Features
In
IP/FW/Voice Plus IPSec 3DES
IP/FW Plus IPSec 3DES
IP/FW
IP/FW/Voice
Addressing
         

IP Control Protocol Subnet Mask Delivery

 

No

No

No

No

NAT Default Inside Server Enhancement

 

No

No

No

No

Management
         

DHCP Server Import

 

No

No

No

No

Quality of Service
         

Committed Access Rate (CAR)

 

No

No

No

No

Security
         

IP Security Through Network Address Translation

12.2(2)XK

Yes

Yes

Yes

No

RADIUS Support for New Platforms

12.2(2)XK

No

Yes

No

No

WAN
         

ATM OAM F5 Segment Continuity Check

12.2(2)XK

No

Yes

Yes

No

VoDSL ATM AAL2 Profile 9

12.2(2)XK

Yes

Yes

Yes

Yes


Table 12 Feature List by Feature Set for the Cisco 826 Series Routers, Part 2 of 2 

 
Feature Sets
Features
In
IP/Voice Plus
IP Plus
IP/Voice
IP
Addressing
         

IP Control Protocol Subnet Mask Delivery

 

No

No

No

No

NAT Default Inside Server Enhancement

 

No

No

No

No

Management
         

DHCP Server Import

 

No

No

No

No

Quality of Service
         

Committed Access Rate (CAR)

 

No

No

No

No

Security
         

IP Security Through Network Address Translation

12.2(2)XK

No

Yes

No

Yes

RADIUS Support for New Platforms

12.2(2)XK

No

Yes

No

No

WAN
         

ATM OAM F5 Segment Continuity Check

12.2(2)XK

No

Yes

No

Yes

VoDSL ATM AAL2 Profile 9

12.2(2)XK

Yes

Yes

Yes

Yes


Table 13 Feature List by Feature Set for the Cisco 827 Series Routers, Part 1 of 2 

 
Feature Sets
Features
In
IP/FW/Voice Plus IPSec 3DES
IP/FW Plus IPSec 3DES
IP/FW
IP/FW/Voice
Addressing
         

IP Control Protocol Subnet Mask Delivery

 

No

No

No

No

NAT Default Inside Server Enhancement

 

No

No

No

No

Management
         

DHCP Server Import

 

No

No

No

No

Quality of Service
         

Committed Access Rate (CAR)

 

No

No

No

No

Security
         

IP Security Through Network Address Translation

12.2(2)XK

No

Yes

No

Yes

RADIUS Support for New Platforms

12.2(2)XK

Yes

Yes

No

No

WAN
         

ATM OAM F5 Segment Continuity Check

12.2(2)XK

Yes

Yes

Yes

Yes

VoDSL ATM AAL2 Profile 9

12.2(2)XK

Yes

Yes

Yes

Yes


Table 13 Feature List by Feature Set for the Cisco 827 Series Routers, Part 2 of 2 

 
Feature Sets
Features
In
IP/Voice Plus
IP Plus
IP/Voice
IP
Addressing
         

IP Control Protocol Subnet Mask Delivery

 

No

No

No

No

NAT Default Inside Server Enhancement

 

No

No

No

No

Management
         

DHCP Server Import

 

No

No

No

No

Quality of Service
         

Committed Access Rate (CAR)

 

No

No

No

No

Security
         

IP Security Through Network Address Translation

12.2(2)XK

Yes

Yes

Yes

No

RADIUS Support for New Platforms

12.2(2)XK

Yes

Yes

No

No

WAN
         

ATM OAM F5 Segment Continuity Check

12.2(2)XK

Yes

Yes

Yes

Yes

VoDSL ATM AAL2 Profile 9

12.2(2)XK

Yes

Yes

Yes

Yes


Table 14 Feature List by Feature Set for the Cisco 828 Routers 

 
Feature Sets
Features
In
IP/FW Plus 3DES
IP/FW
IP Plus
IP
Addressing
         

IP Control Protocol Subnet Mask Delivery

 

No

No

No

No

NAT Default Inside Server Enhancement

 

No

No

No

No

Management
         

DHCP Server Import

 

No

No

No

No

Quality of Service
         

Committed Access Rate (CAR)

12.2(2)XK

Yes

No

Yes

No

Security
         

IP Security Through Network Address Translation

12.2(2)XK

Yes

Yes

Yes

Yes

RADIUS Support for New Platforms

12.2(2)XK

Yes

No

Yes

No

WAN
         

ATM OAM F5 Segment Continuity Check

 

No

No

No

No

VoDSL ATM AAL2 Profile 9

 

No

No

No

No


New and Changed Information

The following sections list the new software features supported by routers for Release 12.2(2)XK and above:

New Features in Release 12.2(2)XK

The following sections list the new software features supported by Cisco IOS Release 12.2(2)XK3 on the and the Cisco 800 Series Routers.

ATM OAM F5 Segment Continuity Check

Committed Access Rate

DHCP Server Import

IP Control Protocol Subnet Mask Delivery

IP Security Through Network Address Translation Support

NAT Default Inside Server Enhancement

RADIUS Support

VoDSL ATM AAL2 Profile 9 Support

ATM OAM F5 Segment Continuity Check

If a communication problem occurs on a permanent virtual circuit (PVC) that causes no traffic to travel in either direction, the PVC remains UP on the end-devices. Routing entries pointing to that PVC remain in the routing table for a certain time, which results in lost packets. Operation Administration and Maintenance (OAM) is one solution to detect this type of failure. An ATM OAM F5 segment continuity check (CC) cell, now supported by Cisco IOS Release 12.2(2)XK3, is another type of OAM cell to detect such failures.

Committed Access Rate

Release 12.2(2)XK3 supports committed access rate (CAR) on Cisco 828 routers, to limit bandwidth transmission rates to traffic sources and destinations. The CAR feature also specifies policies for handling traffic that breaches the specified bandwidth allocations. To enable CAR, enter the command rate-limit in ATM-interface-configuration mode. Additional feature configuration instructions and examples are available in the Software Enhancements for the Cisco 800 Routers and SOHO Routers  publication.

DHCP Server Import

Prior to Release 12.1(5), DHCP options on the IOS DHCP server could only be configured through the command-line interface (CLI). You can now configure the same DHCP options on multiple DHCP servers by configuring one remote master DHCP server located on the corporate backbone. Using this capability causes all local DHCP servers to have the same DHCP options as those on the remote DHCP server.

To enable this feature, the Cisco IOS DHCP server allows configuration information to be updated automatically by PPP. You can enable PPP to automatically configure the Domain Name Server (DNS), the Windows Information Name Server (WINS), or the NetBIOS Name Service (NBNS), and the server IP address information within a Cisco IOS DHCP server pool. For instructions on configuring DHCP server import and configuration examples, see the document Software Enhancements for the Cisco 800 Routers and SOHO Routers. 

IP Control Protocol Subnet Mask Delivery

The IP Control Protocol (IPCP) feature assigns IP address pools to customer premises equipment (CPE) devices. These devices then assign IP addresses to the CPE and to a DHCP pool.

The IPCP feature provides the following functions:

The IOS CPE device requests and uses the subnet.

The Authentication, Authorization, and Accounting (AAA) Remote Authentication Dial-In User Service (RADIUS) provides the subnet and inserts the framed route into the proper virtual route forwarding (VRF) table.

The provider edge or the edge router helps in providing the subnet through IPCP.

DHCP support is no longer on the client side because the CPE can now receive both the IP address and the subnet mask during the PPP setup negotiation. If the CPE uses the DHCP servers to allocate addresses for its own network, subnets can be assigned through the node route processor (NRP) on the network access server (NAS) and distributed to the remote CPE DHCP servers. For instructions on configuring IPCP subnet mask delivery and configuration examples, see the document Software Enhancements for the Cisco 800 Routers and SOHO Routers. 

IP Security Through Network Address Translation Support

Cisco IOS network address translation (NAT) supports IP Security (IPSec) client software that does not use Transmission Control Protocol (TCP) wrapping or User Datagram Protocol (UDP) wrapping. On Cisco routers, this feature allows the simultaneous use of multiple, PC-based IPSec clients on which IPSec packet wrapping is disabled or is not supported. When PCs connected to the router create an IPSec tunnel, NAT on the router translates the private IP addresses in these packets to public IP addresses. This NAT feature also supports multiple Point-to-Point Tunnel Protocol (PPTP) sessions, which may be initiated by PCs with PPTP client software.

NAT Default Inside Server Enhancement

NAT syntax has been extended to allow you to specify an inside local address to receive packets that do not match criteria in other NAT statements in the configuration. Prior to Cisco IOS Release 12.2(2)XK, if a received packet did not match the criteria in any of the NAT statements in the configuration file, address translation did not occur, and the packet was dropped. The new syntax allows you to specify a default address to which all packets not matching other NAT criteria can be routed.

RADIUS Support

Cisco IOS release 12.2(2)XK supports the RADIUS feature for remote dial-in user authentication. For instructions on configuring RADIUS, refer to the Cisco 806 Router Software Configuration Guide, and to the Cisco  IOS Security Configuration Guide. 

VoDSL ATM AAL2 Profile 9 Support

Release 12.2(2)XK3 supports voice over a digital subscriber line (ADSL) using the ATM Adaptation Layer 2 (VOAAL2) and ATM Forum profile 9. ATM Forum Profile 9 supports a 44-byte payload, which optimizes voice transport efficiency, and makes interoperability with TDSoft gateways possible.

This feature enables the Cisco routers to operate with GR.303 and V5.2 gateways and communicate with Class 5 switches. The voice PVC is routed to a VoAAL2 gateway that supports either the General Recommendation 303 (GR.303) or the V5.2 protocol. This gateway converts the AAL2-encoded voice cells to a format that can be sent over a time division multiplexed connection to a Class 5 switch. The data PVC can be routed through the DSLAM or aggregator to the data network.

New Software Features in Release 12.2 T

For information regarding the features supported in Cisco IOS Release 12.2 T, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com and the Documentation CD-ROM:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/index.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click on the following path:

Service & Support: Technical Documents: Release 12.2 (from the Cisco IOS Software drop-down list)

Important Notes

The following sections contain important notes about Cisco IOS Release 12.2(2)XK3 that can apply to SOHO 70 and Cisco 800 series routers. (Also, see the "Caveats" section.)

Upgrading the ROMMON Image

Use one of the following two procedures to update the ROMMON image for Cisco 827-4V routers. For a description of when to update the ROMMON image, see the description of caveat CSCdv34472 in the "Caveats" section.

Updating in ROMMON Mode

Complete the steps below to upgrade the ROMMON image in ROMMON mode.


Step 1 Download the ROMMON image from CCO and place it on your TFTP server.

Step 2 Place your Cisco 827-4V router in ROMMON mode by sending the telnet command break during a router reboot sequence. The following prompt is displayed when the router is in ROMMON mode:

rommon 1 >
 

Step 3 Set the following parameters.

rommon 1 > IP_ADDRESS=ip_address 
rommon 1 > IP_SUBNET_MASK=ip_subnet_mask 
rommon 1 > DEFAULT_GATEWAY=default_gateway 
rommon 1 > TFTP_SERVER=TFTP_server 
rommon 1 > TFTP_FILE=TFTP_file 
rommon 1 >  

The parameters above have the following meanings:

Table 15 ROMMON Parameters

Parameter
Value

IP_ADDRESS=

IP address of the router.

IP_SUBNET_MASK=

Router subnet mask.

DEFAULT_GATEWAY=

IP address of the router default gateway.

TFTP_SERVER=

IP address of the TFTP server on which the ROMMON image is located.

TFTP_FILE=

The path and file name of the ROMMON image.


Step 4 Verify parameter settings using the command set. Correct any errors by reentering the parameters and their values. For example:

rommon> set
TFTP_CHECKSUM=0
IP_SUBNET_MASK=255.255.255.0
DEFAULT_GATEWAY=1.6.0.1
TFTP_SERVER=223.255.254.254
IP_ADDRESS=1.6.97.20
TFTP_FILE=/auto/tftpload/ROMMON/C820_RM_ALT.srec.122-1r.XE2

Step 5 Upgrade the ROMMON image using the command tftpdnld -u.


Note You might be prompted to reset the router in ROMMON mode by entering the command reset. If you receive this prompt, reset the router before again performing Step 1 through Step 5, above.


rommon >tftpdnld -u
IP_ADDRESS: 1.6.97.20
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 1.6.0.1
TFTP_SERVER: 223.255.254.254
FTP_FILE: /auto/tftpload/ROMMON/C820_RM_ALT.srec.122-1r.XE2
WARNING: alternate copy of rommon exists, filename: C820_RM_ALT.srec all existing data in 
the alternate copy of rommon will be lost.
 Do you wish to continue? y/n:  [n]:

Step 6 Enter y to start the download. Successive exclamation points (!!!!!!) indicate the download is occurring. The router reboots when the download is complete.


Updating in IOS EXEC Mode


Step 1 Download the ROMMON image from CCO and place it on your TFTP server.

Step 2 In EXEC mode, save the current configuration using the command copy running-config startup-config.

Step 3 Enter the command copy tftp: rommon:, and answer the prompts. Replace the variables shown in the following example with the correct values for your facility:

820-2#copy tftp: rommon:
 Address or name of remote host []? IP_address_of_remote_host
 Source filename []? rommon_image_source_file_name
 Destination filename [rommon]? rommon_image_destination_file_name

Successive exclamation points (!!!!!!) indicate the download is occurring. The router reboots when the download is complete.


Configuring PPPoE on a Cisco 806 Router

When specifying the method of authentication while configuring PPPoE and connecting to a Service Provider, the optional argument might be required to successfully authenticate the connection. For example:

interface Dialer0
 ppp authentication pap optional

or

interface Dialer0
 ppp authentication chap optional

Caveats

Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.

Caveats in Cisco IOS Releases 12.2 and 12.2 T are also in Cisco IOS Release 12.2(2)XK3. For information on caveats in Cisco IOS Release 12.2, see Caveats for Cisco IOS Release 12.2. For information on caveats in Cisco IOS Release 12.2 T, see Caveats for Cisco IOS Release 12.2 T. These two documents list severity 1 and 2 caveats and are located on CCO and the Documentation CD-ROM.


Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl. 


Resolved Caveats—Releases 12.2(2)XK2 and 12.2(2)XK3

This section describes unexpected behavior that is fixed in Releases 12.2(2)XK2 and 12.2(2)XK3.

Management

CSCdw65903

An error can occur with management protocol processing. Please use the following URL for further information:

http://www.cisco.com/cgi-bin/bugtool/onebug.pl?bugid=CSCdw65903 

Resolved Caveats—Release 12.2(2)XK1

Cisco IOS Release 12.2(2)XK1 is a rebuild release for Cisco IOS Release 12.2(2)XK. The caveats in this section are resolved in Cisco IOS Release 12.2(2)XK1 but might be open in previous Cisco IOS releases.

Miscellaneous

CSCdv62649

The command ip tacacs source-interface does not work correctly. If a router is configured to use "loopback interface" for TACACS packets, the router might still use "interface address".

CSCdu62677

The command ip addr dhcp hostname is now disabled.

Open Caveats—Release 12.2(2)XK

This section describes possibly unexpected behavior by Release 12.2(2)XK. Only severity 1 through 3 caveats are included.

Miscellaneous

CSCdt55603

The object cikeTunRemoteName is always an IP address regardless whether the peers have the isakmp key as a name peer or ipaddress peer. This caveat is a duplicate to caveat CSCds04437.

CSCdt93933

Cisco routers return a zero-length string when queried for the SNMP object isdnBearerPeerAddress, instead of the actual value. The command show call active voice bried displays the PeerAddress value.

CSCdt93965

Not able to create new rows in isdnSignalingTable. This caveat is a duplicate to caveat CSCdp57230.

CSCdu52623

When X.25 encapulation is directly configured under the D channel on a Cisco 800 series router, at power up Layer 2 does not come up, even when isdn tei-negotiation powerup is set. To work around this problem, either enter the command no shut or a clear int bri 0 to bring up interface or use X.25 encapsulation under a dialer interface.

CSCdu55044

The CISCO-VOICE-DIAL-CONTROL-MIB object cvCallActiveCallerIDBlock returns incorrect values.

CSCdu55062

The object cvCallActiveSessionTarget returns incorrect values.

CSCdu55195

DS1 failure on repetitive patterns.

CSCdu55959

Cisco 800 series routers do not boot with TinyROM 1.4(1) or burned-in versions 1.2(0) or 1.0(3). One workaround is to upgrade to TinyROM burned-in version 1.2(2). Other TinyROM versions have not been tested.

CSCdu56183

The CISCO-VOICE-DIAL-CONTROL-MIB values cannot be set through SNMP for the object cvVoIPPeerCfgFaxBytes.

CSCdu56201

Setting the CISCO-VOICE-DIAL-CONTROL-MIB object cvVoIPPeerCfgDigitRelay results in an error.

CSCdu73718

The following IPSec MIB variables return incorrect values: cikeGlobalOutNotifys, cikeTunOutNotifys, cikeTunHistOutNotifys, cikeGlobalOutP2SaDelRequests, cikeTunOutP2SaDelRequests and cikeTunHistOutP2SaDelRequests.

CSCdu74709

The objects cikeGlobal[In/Out]P2Exchgs and cikeTun[In/Out]P2Exchgs return incorrect values.

CSCdu83902

The CISCO-IPSEC-MIB object cips3DesCapable returns incorrect values.

CSCdu89082

There is a very short delay while the command IP DHCP hostname becomes effective. If consecutive entries of the command ip address dhcp hostname are applied to an interface, the command show running config does not display the command ip add dhcp in a running configuration. The intention is to allow previous hostnames to be written over with later hostnames.

CSCdv00104

The CISCO-IPSEC-FLOW-MONITOR-MIB object cipSecTunHistTotalSas returns incorrect values. This caveat is a duplicate to caveat CSCds10702.

CSCdv01383

Packets are not dropped when partial encryption maps or empty dynamic access lists are applied during IPSec negotiation.

CSCdv01412

Voice loopback does not work.

CSCdv02381

The IPSEC-FLOWMONITOR-MIB objects cipSecTunLifeSize and cipSecTunLifeTime return incorrect values.

CSCdv02785

Some Caller-ID devices display the message "Number not available" with the calling number. For example, in Italy some Caller-ID devices display "NON disponibile", meaning "Number not available". This occurs when the name of a calling-party is not available. Therefore, this message means "No name", that is, the name of the calling side is not known. To associate a name with a given voice-port on the calling-side, configure the command station-id name station-name on the voice-port from which calls are made.

CSCdv03686

Caller-ID does not always display if calls on a voice port are received in quick succession and the "cptone" configured on the voice-port is Denmark(DK). To work around this problem, configure the voice-port with the command timing digit 70 whenever the cptone configured on a voice-port is Denmark.

CSCdv12488

Some packets are dropped due to cyclical redundancy check (CRC) errors.

CSCdv17664

The demandNbrName MIB object is not populated when initially queried. To work around this problem, use SNMP to set the variable.

CSCdv17679

The traps demandNbrCallDetails and demandNbrCNANotification are not sent when ISDN calls are made on the Voice NT or TE BRI interfaces.

CSCdv17691

Cisco routers unexpectedly reset when the object entLogical community is set to a longer string length than the range specified in the associated MIB file.

CSCdv20646

The objects entPhysicalVendorType and entPhysicalContainedIn return incorrect values.

CSCdv20689

The object entPhysicalTable returns empty strings as a result of some entries.

CSCdv22493

After a voice-capable Cisco router reloads, when a fractional T1 WIC is installed in Slot 0 and a BRI is installed in Slot 2, the FXS port in Slot 1 intermittently fails to come up. To work around this problem, reload the router again.

CSCdv23896

Under heavy traffic conditions using two parallel serial links, load balancing does not work correctly; the serial Slot and Port 0/0 drops noticeably more packets than the other serial interface.

CSCdv24610

Cisco routers unexpectedly reset if the command service-policy {input | output} policy-map-name is configured for a permanent virtual circuit (PVC) or virtual-template interface.

CSCdv27169

When voice calls are in progress between local voice ports (such as Port 1 calling Port 2), and the command ping executes, voice quality degrades on those internal calls. This occurs when the DSLAM profile is set to 192 kbps both upstream and downstream; and no PVC data rate limiting is set. To correctly limit the bandwidth allocated to the data PVC, rate-limit the PV when using UBR. Rate limiting is not set by default, therefore, if no rate limiting is set for the PVC, the traffic from the PVC take away all the available bandwidth, at the cost of all other rate-limited traffic.

CSCdv32198

On SOHO 70 and Cisco 800 series routers, AAL2 calls clear before a reanswer timeout. To work around this problem, configure the reanswer timer to 5 seconds instead of 15 seconds, or provision the DSL line to use fast path instead of interleaved path.

CSCdv34472

Cisco 827-4V routers shipped before the distribution of Release 12.2(2)XK3 contain a ROMMON image that does not support the VoAAL2 Profile 9 feature. Therefore, to ensure proper router VoAAL2 Profile 9 functionality and avoid rendering a Cisco 827-4V router inoperable, upgrade the ROMMON image to "C820_RM_ALT.srec.122-1r.XE2" before downloading Release 12.2(2)XK3 and above. This ROMMON image is backwards compatible with all previously-released Cisco 827-4V software images.


Caution Cisco 827-4V routers do not properly operate and enter into an unrecoverable state if you attempt to load Release 12.2(2)XK3 without first upgrading the ROMMON image. This problem occurs even if AAL2 profile 9 parameters are not configured on the router.

This issue affects all Cisco 827-4V routers shipped before the availability of Release 12.2(2)XK3. Routers shipped after the distribution of Release 12.2(2)XK3 likely already contain a compatible ROMMON image. See "Upgrading the ROMMON Image" section for ROMMON image upgrade instructions.

CSCdv35467

When configuring the mtu 1500 for an ATM interface in a Cisco router, after the router reloads, the PVC associated with the ATM interface remains in the INAC state.

CSCdv37323

When a Cisco 827 router functions with a tdSoft VonGate (V5.2 gateway) for a VoAAL2 application, data packets are dropped even though the DSLAM has a speed profile of 640 kbs upstream and 8 MB downstream. This occurs when an ATM interface is not properly configured to allocate sufficient bandwidth to data packets while there are voice calls in progress. For proper bandwidth allocation and prioritization to voice and data, configure the command no atm cell-clumping-disable under the ATM interface.

CSCdv46730

The OAM F5 CC feature is not active after a router reload if OAM F5 loopback is configured and enabled. The workaround is to configure the OAM F5 CC feature only after a router has fully rebooted. If no OAM F5 loopback function is configured or enabled during a router reboot, the OAM F5 CC function activates as expected.

CSCdv48918

On a Cisco 827 router, when configuring the command compand-type A-law under a voice-port, voice quality degrades and becomes distorted. To work around this problem, note that the Cisco 827 router does not support configuring the compand-type under a voice-port; instead, configure the command type/compand-type under dial-peer.

Related Documentation

The following sections describe the documentation available for the SOHO 70 and Cisco 800 series routers. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.

Documentation is available as printed manuals or electronic documents, except for feature modules and the Cisco IOS release notes, which are available online on Cisco.com and the Documentation CD-ROM.

Use these release notes with the documents listed in the following sections:

Release-Specific Documents

Platform-Specific Documents

Obtaining Documentation and Technical Assistance

Release-Specific Documents

The following documents are specific to Release 12.2 and apply to Release 12.2(2)XK3. They are located on Cisco.com and the Documentation CD-ROM (under the heading Service & Support):

To reach the Release Notes for the Cisco 800 Series Routers for Cisco IOS  Release 12.2(2)XK, click this path:

Technical Documents: Cisco IOS Software: Release 12.2: Release Notes: Cisco 800 Series  Routers: Cisco 800 Series - Release Notes for Release 12.2(2)XK 

To reach the Cross-Platform Release Notes for Cisco IOS Release 12.2 T, click this path:

Technical Documents: Cisco IOS Software: Release 12.2: Release Notes: Cisco IOS  Release 12.2 T 

To reach product bulletins, field notices, and other release-specific documents, click this path:

Technical Documents: Product Bulletins 

The Caveats for Cisco IOS Release 12.2 and Caveats for Cisco IOS Release 12.2 T  documents contain caveats applicable to all platforms for all maintenance releases of Release 12.2. To reach the caveats documents, click this path:

Technical Documents: Cisco IOS Software: Release 12.2: Caveats 


Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl. 


Platform-Specific Documents

Hardware installation guides, configuration and command reference guides, and additional documents are available for the SOHO 70 and Cisco 800 series routers on Cisco.com and the Documentation CD-ROM.

SOHO 70 and Cisco 800 Series Routers

Documentation specific to the SOHO 70 Series Routers and Cisco 800 Series Routers is available on Cisco.com and the Documentation CD at the following location:

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_fix/index.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Cisco Product Documentation: Access Servers and Access Routers: Fixed Configuration Access  RoutersCisco 1700 Series Routers: <platform_name>

Software Configuration

The document Cisco Router Web Setup User Guide is available for the SOHO 70 and Cisco 800 series routers at the following location:

http://www.cisco.com/univercd/cc/td/doc/clckstrt/crws/ugcrws30.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com or the Documentation CD, and click the following path:

Technical Documents: Router Configuration Tools: Cisco Router Web Setup 

Obtaining Documentation and Technical Assistance

The Cross-Platform Release Notes for Cisco IOS Release 12.2 T contains the latest descriptions and locations of the following sources for obtaining documentation and technical assistance from Cisco Systems. See the section "Release-Specific Documents" for the location of the Cross-Platform Release Notes for Cisco IOS Release 12.2 T.

Additional sources of documentation and technical assistance are listed below:

World Wide Web, Cisco.com—Cisco Systems website: http://www.cisco.com.

Documentation CD—Cisco documentation and additional literature are available in a CD package, which ships with your product.

Ordering documentation—Methods for ordering documentation include Networking Products MarketPlace, the online Subscription Store, and calling a local account representative using the Cisco corporate headquarters or North America phone numbers.

Documentation feedback—When using the World Wide Web, you can submit technical comments electronically. You can also send e-mail, mail in the response card that is behind the front cover of many documents, or send correspondence to Cisco Systems. We appreciate your comments.

Technical Assistance Center (TAC)—The Cisco TAC website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract. You can contact the TAC using Cisco.com or by phone. Toll-free numbers are available for many countries.