Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.3

  • Viewing Options

  • PDF (595.4 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.3.0

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.3.0

Contents

Introduction

System Requirements

Cisco CRS-1

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

New and Changed Information

New Software Features in Cisco IOS XR Software Release 3.3.0

New Hardware Features Supported in Cisco IOS XR Software Release 3.3.0

Important Notes

Caveats

Release 3.2 Caveats—Resolved in Release 3.3.0

Open Caveats—Release 3.3.0

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Upgrading Cisco IOS XR Software

Turbobooting PRP cards

Installing Optional Packages

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation, Obtaining Support, and Security Guidelines


Release Notes for Cisco IOS XR Software Release 3.3.0


March 10, 2013

Cisco IOS XR Software Release 3.3.0

Text Part Number OL-10228-05


Note Please see the "Important Notes" section for important information on Cisco IOS XR Software Release 3.3.0.



Note You can find the most current Cisco IOS XR software documentation on the World Wide Web at http://www.cisco.com/univercd/cc/td/doc/product/ioxsoft/iox33/index.htm. These electronic documents may contain updates and modifications. See the "Obtaining Documentation, Obtaining Support, and Security Guidelines" section for more information on obtaining Cisco documentation.


These release notes describe the features provided in Cisco IOS XR Software Release 3.3.0 and are updated as needed.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.3.0, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected. If you have an account on Cisco.com, you can find field notices at http://www.cisco.com/public/support/tac/fn_index.html. If you do not have a Cisco.com login account, you can find field notices at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation, Obtaining Support, and Security Guidelines

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), and Label Distribution Protocol (LDP).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally the operating systems support Modular QoS CLI (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs), routing authentications, AAA/TACACS+, Secure Shell (SSH), and SNMPv3. Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works interface (CWI)—The CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

See the "New and Changed Information" section for a detailed list of new features by platform for Cisco IOS XR Software Release 3.3.0.

System Requirements

The Cisco IOS XR Software Release 3.3.0 is supported on the following platforms:

Cisco CRS-1

Cisco XR 12000 Series Router

Cisco CRS-1

This section describes the system requirements for Cisco IOS XR Software Release 3.3.0 supported on Cisco CRS-1 routers and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.3.0 features. Table 1 and Table 2 list the Cisco IOS XR software feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.3.0 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.3.0 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.3.0

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, and Routing packages.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.3.0

CORBA agent, XML Parser, HTTP server, SNMP Agent, and Alarm correlation.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.3.0

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.3.0

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD), and BIDIR.

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.3.0

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

1 Packages are installed individually.


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.3.0 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.3.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Diagnostic Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.3.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package

Cisco IOS XR Diagnostic Package


Memory Requirements

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR Software Release 3.3.0 are:

2-GB memory on the route processors (RPs)

1-GB memory on the modular services cards (MSCs)

Hardware Supported

Cisco IOS XR Software Release 3.3.0 supports Cisco CRS-1 routers. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 3 lists the hardware components supported on the Cisco CRS-1 and the minimum software versions required. See the "Determining the Software Version" section.

Table 3 Cisco CRS-1 Supported Hardware and Minimum Software Requirements 

Component
Part Number
Min. Software Version Required
Cisco CRS-1 Series 16-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

CRS-16-LCC

2.0

Cisco CRS-1 Fan Tray for 16-Slot LCC

CRS-16-LCC-FAN-TR

2.0

Cisco CRS-1 16-Slot Fabric Card / Single

CRS-16-FC/S

2.0

Cisco CRS-1 Fan Controller for 16-Slot Line Card Chassis

CRS-16-LCC-FAN-CT

2.0

Cisco CRS-1 16-Slot Route Processor

CRS-16-RP

2.0

Cisco CRS-1 Memory Module 2 GB

CRS-MEM-2G

2.0

Cisco CRS-1 PCMCIA Flash Disk 1 GB

CRS-FLASH-DISK-1G

2.0

Cisco CRS-1 Modular Services Card

CRS-MSC

2.0

Cisco CRS-1 LCC Front AC Power Panel

CRS-16-ACGRILLE

2.0

Cisco CRS-1 LCC Front DC Power Panel

CRS-16-DCGRILLE

2.0

Cisco CRS-1 16-Slot Alarm Board

CRS-16-ALARM

2.0

Cisco CRS-1 AC Delta Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACD

2.0

Cisco CRS-1 AC Wye Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACW

2.0

Cisco CRS-1 DC Power Shelf for 16-Slot LCC

CRS-1-LCC-PS-DC

2.0

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/VS

4OC192-POS/DPT-VS

2.0

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/SR

4OC192-POS/DPT-SR

2.0

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/IR

4OC192-POS/DPT-IR

2.0

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

2.0

Cisco CRS-1 16xOC-48/STM16 POS/DPT Interface Module

16OC48-POS/DPT

2.0

Cisco CRS-1 2.5 G SFP LR Optic

POM-OC48-LR2-LC-C

2.0

Cisco CRS-1 2.5 G SFP SR Optic

POM-OC48-SR-LC-C

2.0

Cisco CRS-1 Line Card Chassis Front Doors

CRS-16-LCC-DRS-F

2.0

Cisco CRS-1 Line Card Chassis Front Cable Mgmt

CRS-16-LCC-FRNT

2.0

Cisco CRS-1 LCC Expanded Front Cable Mgmt

CRS-16-LCC-FRNT-E

2.0

Cisco CRS-1 Line Card Chassis Rear Cable Mgmt

CRS-16-LCC-BCK-CM

2.0

Cisco CRS-1 Line Card Chassis Rear Doors

CRS-16-LCC-DRS-R

2.0

Cisco CRS-1 Lift for LCC 16 and FCC

CRS-16-LIFT/B

2.0

Cisco CRS-1 Series 8-Slot Line Card Chassis

Cisco CRS-1 8-Slot Line Card Chassis

CRS-8-LCC

3.0

Cisco CRS-1 Fan Tray for 8-Slot Line Card Chassis

CRS-8-LCC-FAN-TR

3.0

Cisco CRS-1 Line Card Chassis Filter Pack

CRS-8-LCC-FILTER

3.0

Cisco CRS-1 AC Pwr Rectifier for 8-Slot LCC

CRS-8-AC-RECT

3.0

Cisco CRS-1 DC Power Entry Module for 8-Slot LCC

CRS-8-DC-PEM

3.0

Cisco CRS-1 AC & DC Power Module Filter for 8-Slot LCC

CRS-8-PWR-FILTER

3.0

Cisco CRS-1 AC Delta PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACD

3.0

Cisco CRS-1 AC Wye PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACW

3.0

Cisco CRS-1 DC PDU for CRS-8 LCC

CRS-8-LCC-PDU-DC

3.0

Cisco CRS-1 8-Slot Fabric Card / Single

CRS-8-FC/S

3.0

Cisco CRS-1 8-Slot Fabric Card Blank

CRS-8-FC-BLANK

3.0

Cisco CRS-1 8-Slot Fabric Handle

CRS-8-FC-HANDLE

3.0

Cisco CRS-1 8-Slot Route Processor

CRS-8-RP

3.0

Cisco CRS-1 8-Slot Route Processor Blank

CRS-8-RP-BLANK

3.0

Cisco CRS-1 8-Slot Route Processor Handle

CRS-8-RP-HANDLE

3.0

Cisco CRS-1 8x10 GbE Interface Module/LR

8-10GBE

3.0

10GBASE-LR XENPAK Module for CRS-1

CRS-XENPAK10GB-LR

3.0

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

3.0

Cisco CRS-1 1xOC-768/STM256 POS Interface Module/SR

1OC768-POS-SR

3.0

Cisco Carrier 1 Series SPA Interface Processor 40G

CRS1-SIP-800

3.2

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

Cisco 8-Port Gigabit Ethernet Shared Port Adapter

SPA-8X1GE

3.2

Cisco 4-Port OC-3 Shared Port Adapter

SPA-4XOC3-POS

3.2

10GBASE-DWDM XENPAK

CRS 1 CRS-XENPAK10GB-DWDM

3.2.2

Cisco 8-Port OC-12 Shared Port Adapter

SPA-8XOC12-POS

3.3.0

ITU grid 4X10G PLIM

4-10GE-ITU/C

3.3.0

ITU grid 40G PLIM

1OC768-ITU/C

3.3.0

Cisco CRS-1 Distributed Route Processor

CRS-DRP

3.3.0

Cisco CRS-1 16-slot route processor

CRS-16-RP-B

3.3.0

Cisco CRS-1 8-Slot Install Kit

CRS-8-INSTALL-KT

N/A

Cisco CRS-1 8-Slot Fork Lift Tube

CRS-8-LIFT-TUBE

N/A

Cisco CRS-1 8-Slot Front Badge Panel

CRS-8-BDG-PANEL

N/A

Cisco CRS-1 8-Slot Front Inlet Grill

CRS-8-FRNT-GRILL

N/A

Cisco CRS-1 8-Slot Horizontal Install Rails

CRS-8-HRZ-RAILS

N/A


Software Compatibility

Cisco IOS XR Software Release 3.3.0 is compatible with the Cisco CRS-1 systems:

Cisco CRS-1 8-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.3.0[Default]
Copyright (c) 2006 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 1.18(20041215:203844) [CRS-1 ROMMON],
 
   
router uptime is 4 hours, 14 minutes
System image file is "tftp://crs-1/images/comp-hfr-mini.vm"
 
   
cisco CRS-16/S (7455) processor with 4194304K bytes of memory.
7455 processor at 800Mhz, Revision 3.4
 
   
8 Packet over SONET network interface(s)
8 SONET/SDH Port controller(s)
1 Ethernet/IEEE 802.3 interface(s)
2043k bytes of non-volatile configuration memory.
11423M bytes of hard disk.
1000592k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
 
   
Package active on node 0/0/SP:
sysdb, V 0.0.22[ci/24], Cisco Systems, at mem:sysdb-0.0.22
    Built on Tue Apr 24 13:15:34 UTC 2006
 
   
hfr-admin, V 3.3.0[Default], Cisco Systems, at mem:hfr-admin-3.3.0
    Built on Tue Apr 24 10:21:17 UTC 2006
 
   
hfr-base, V 3.3.0[Default], Cisco Systems, at mem:hfr-base-3.3.0
    Built on Tue Apr 24 10:19:01 UTC 2006
 
   
hfr-os-mbi, V 3.3.0[Default], Cisco Systems, at mem:hfr-os-mbi-3.3.0
    Built on Tue Apr 24 10:08:29 UTC 2006
 
   
Package active on node 0/0/CPU0:
sysdb, V 0.0.22[ci/24], Cisco Systems, at mem:sysdb-0.0.22
    Built on Tue Apr 24 13:15:34 UTC 2006
hfr-lc, V 3.3.0[Default], Cisco Systems, at mem:hfr-lc-3.3.0
    Built on Tue Apr 24 10:25:24 UTC 2006
 
   

Other Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.38.

The minimum CPUCNTRL version required for this release is 2.07.

For detailed information on ROMMON, refer to the Cisco IOS XR Getting Started Guide.

Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software Release 3.3.0 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.3.0 features. Table 4 and Table 5 list the Cisco IOS XR software feature set matrix and associated filenames available for Cisco IOS XR Software Release 3.3.0 supported on the Cisco XR 12000 Series Router.

Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software Release 3.3.0 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.3.0

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing packages.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.3.0

CORBA agent, XML Parser, HTTP server, SNMP Agent, and Alarm correlation.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.3.0

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.3.0

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.3.0

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.3.0

Support for booting the Standby RP on a Cisco XR 12000 Series router (PRP).

Cisco IOS XR SBC Service Card Boot Image

mbiprp-drp.vm-3.3.0

Support for booting the SBC Service Card on Cisco XR 12000 Series router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.3.0

Session Border Controller Package for Cisco XR 12000 Series router (PRP).

1 Packages are installed individually.


Table 5 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software Release 3.3.0 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.3.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.3.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Router routers running Cisco IOS XR Software Release 3.3.0 are:

2-GB route memory on Performance Route Processor 1 (PRP-1) and Performance Route Processor 2 (PRP-2)

512-MB ATA flash storage on PRP-1 and PRP-2 (1-GB ATA flash is recommended)

1-GB line-card route memory on all line Engine 3 cards installed in the system

1-GB line-card route memory on all engine 5 based SPA Interface Processors installed in the system:

The default route memory on the 1200-SIP-600 is 1G.

The default route memory on the 1200-SIP-401, 1200-SIP-501, and 1200-SIP-601 is 2G.

Hardware Supported

Cisco IOS XR Software Release 3.3.0 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 6 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Determining the Software Version" section.

Table 6 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Minimum Software Version Required

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2.0

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2.0

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2.0

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2.0

Cisco XR 12000 Series Performance Route Processor 1 (PRP-2 is strongly recommended)

PRP-1

3.2.0

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2.0

Cisco 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2.0

Cisco 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2.0

Cisco 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2.0

Cisco 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2.0

Cisco 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2.0

Cisco 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2.0

Cisco 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2.0

Cisco 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2.0

Cisco 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2.0

Cisco 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2.0

Cisco 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2.0

Cisco 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2.0

Cisco 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2.0

Cisco 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192-POS-VSR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192-POS-LR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192-POS-XFP

3.2.0

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2.0

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2.0

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3.0

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3.0

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3.0

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3.0

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3.0

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3.0

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3.0

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3.0

4-port Clear Channel T3/E3 Shared Port Adap

SPA-4XT3/E3

3.3.0

2-port OC48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3.0

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.3.0 is compatible with the Cisco XR 12000 Series Router systems:

Cisco XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

For the existing installed base, the following chassis are supported:

Cisco 120006 Router

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.3.0[Default]
Copyright (c) 2006 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20040624:164256) [assafb-misc1 1.14dev(0.91)
] DEVELOPMENT SOFTWARE
Copyright (, Inc.
BOOTFLASH: GS Software (C12KPRP-BOOT-M), Version 12.0(30)S, RELEASE SOFTWARE (f
c1)
 
   
router uptime is 4 days, 14 hours, 5 minutes
System image file is "tftp://xr12000/images/c12k-mini.vm.ins2"
 
   
cisco 12410/PRP (7450) processor with 524288K bytes of memory.
7450 processor at 666Mhz, Revision 2.1
 
   
2 Cisco 12000 Series Performance Route Processors
1 8 port ISE OC3 Controller (8 POS)
1 4 Port ISE Packet Over SONET OC-12c/STM-4 Controller (4 POS)
2 Cisco 12000 4 Port Gigabit Ethernet Controllers (8 GigabitEthernet)
2 1 Port ISE Packet Over SONET OC-48c/STM-16 Controllers (2 POS)
14 Packet over SONET network interface(s)
14 SONET/SDH Port controller(s)
2 PLIM QoS controller(s)
2 Ethernet/IEEE 802.3 interface(s)
8 GigabitEthernet/IEEE 802.3 interface(s)
2042k bytes of non-volatile configuration memory.
250452k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
62576k bytes of ATA PCMCIA card at disk 1 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Configuration register on node 0/0/CPU0 is 0x0
Package active on node 0/0/CPU0:
c12k-mgbl, V 3.3.0[Default], Cisco Systems, at mem:c12k-mgbl-3.3.0 Built on Fri May 10 
16:15:38 PST 2006
    By edde-view5 in /xr12000/images for c2.95.3-p8
 
   
c12k-rout, V 3.3.0[Default], Cisco Systems, at mem:c12k-rout-3.3.0
    Built on Tue May 10 16:41:01 PST 2006
    By edde-view5 in /xr12000/images for c2.95.3-p8
 
   
c12k-lc, V 3.3.0[Default], Cisco Systems, at mem:c12k-lc-3.3.0
    Built on Tue May 10 16:40:46 PST 2006
    By edde-view5 in /xr12000/images for c2.95.3-p8
.
.
.

Other Firmware Code

The following firmware code is supported by the Cisco XR 12000 Series Router:

The minimum ROMMON version required for this release is 1.15. For more information on the minimum ROMMON version required for this release, ROMMON upgrade procedures, and flashdisk information, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router document.

The flashdisk Cisco part numbers are: MEM-12KRP-FD512M (=) and MEM-12KRP-FD1G(=)

New and Changed Information

The following sections contain information on new features in Cisco IOS XR Software Release 3.3.0:

New Software Features in Cisco IOS XR Software Release 3.3.0

New Hardware Features Supported in Cisco IOS XR Software Release 3.3.0

New Software Features in Cisco IOS XR Software Release 3.3.0

The following are new features in Cisco IOS XR Software Release 3.3.0 supported on the Cisco CRS-1 and Cisco XR 12000 Series Router platforms:

Multiprotocol Label Switching (MPLS) Layer 3 Virtual Private Network (VPN)—This feature enables the service provider and the customer routers to exchange Layer 3 routing information. MPLS VPNs are easier to manage and expand than conventional VPNs. When a new site is added to an MPLS VPN, only the edge router of the service provider that provides services to the customer site needs to be updated.

MPLS OAM—This feature provides MPLS label switched path (LSP) verification commands which allow you to detect and diagnose data plane failures. These represent the first set of commands in the MPLS Operations, Administration, and Maintenance (OAM) solution.

Border Gateway Protocol (BGP) Nexthop Tracking—This feature lets you specify the delay for triggering nexthop calculations. It allows for a dynamic way for Interior Gateway Protocol (IGP) to converge so that BGP can accumulate all notifications, trigger less walks, result in fewer interprocess communication connections (IPCs) to routing information base (RIB) for route addition/deletion/modification and also less updates to peers.

Generalized Multiprotocol Label Switching (GMPLS) Traffic Engineering (TE)—This feature consists of extensions to the MPLS-TE mechanisms to control a variety of device types, including optical switches. When GMPLS-TE is used to control an hierarchical optical network—a network with a core of optical switches surrounded by outer layers of routers—it can provide unified control of devices that have very different hardware capabilities. Other control plane solutions for such network architectures typically use an overlay model, using separate control planes to manage the optical core and the routed network, respectively, with little or no knowledge passing between them. GMPLS-TE protocols and extensions include: Resource Reservation Protocol (RSVP) for signaling, Interior Gateway Protocols (IGP) such as Open Shortest Path First (OSPF), and Link Management Protocol (LMP) for managing link information.


Note Beta quality delivery in 3.3.0; FCS quality delivery in 3.3.1.


Multicast Enhancements—This feature includes:

v6 BSR

ECMP

MSDP MD5

MSDP MIB

PIM RPF Vector

Loop Prevention—When Open Shortest Path First (OSPF) version 2 is used as the provider edge-customer edge (PE-CE) protocol, BGP carries the OSPF route information in the backbone. Some of the information needed to prevent loops may be lost during this process. Draft-ietf-ospf-2547-dnbit-04.txt defines a procedure to prevent looping by using one of the options bits in the link-state advertisement (LSA).

Virtual router redundancy protocol (VRRP) support—The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of failure inherent in the static default routed environment. VRRP specifies an election protocol between multiple routers that provide the appearance of a single router on the LAN segment. routers share the same virtual IP and MAC addresses on the LAN segment; therefore, in the event of failure of one router, the hosts on the LAN are able to continue forwarding packets to a consistent IP and MAC address. The process of transferring the routing responsibilities from one device to another is transparent to the user.

Diff-Serv TE with Maximum Allocation Model (DS-TE with MAM)—This feature is an extension of the common MPLS-TE feature. Common traffic engineering does not provide bandwidth guarantees to different traffic classes. A single bandwidth constraint is used in regular TE that is shared by all traffic. To support various classes of service (CoS), users can configure multiple bandwidth constraints. These bandwidth constraints can be treated differently based on the requirement for the traffic class using that constraint. MPLS diff-serv traffic engineering provides the ability to configure multiple bandwidth constraints on an MPLS-enabled interface. Available bandwidths from all configured bandwidth constraints are advertised using IGP. TE tunnel is configured with bandwidth value and class-type requirements. Path calculation and admission control take the bandwidth and class-type into consideration. RSVP is used to signal the TE tunnel with bandwidth and class-type requirements. Diff-Serv TE can be deployed with either Russian Doll Model (RDM) or Maximum Allocation Model (MAM) for bandwidth calculations.

Label Distribution Protocol (LDP)—This feature includes:

LDP Session Protection—Lets you configure LDP to automatically protect sessions with all or a given set of peers. When configured, LDP initiates backup targeted hellos automatically for neighbors for which primary link adjacencies already exist. These backup targeted hellos maintain LDP sessions when primary link adjacencies go down.

Inbound label filtering for LDP—Filters remote bindings for a defined set of prefixes.

LDP Local label allocation—By default, LDP allocates local labels for all prefixes that are not Border Gateway Protocol (BGP) prefixes. This is acceptable when LDP is used for applications other than Layer 3 virtual private networks (L3VPN) core transport. When LDP is used to set up transport LSPs for L3VPN traffic in the core, it is not efficient or even necessary to allocate and advertise local labels for, potentially, thousands of IGP prefixes. In such an instance, LDP is typically required to allocate and advertise local label for Loopback /32 addresses for provider edge routers. This is accomplished using LDP local label allocation control, where an access list can be used to limit allocation of local labels to a set of prefixes. Limiting local label allocation provides several benefits, including reduced memory usage requirements, fewer local forwarding updates, and fewer network and peer updates.

LDP Interior Gateway Protocol (IGP) synchronization—Lets you synchronize LDP and IGP to advertise links with regular metrics only when MPLS LDP is converged on that link. LDP considers a link converged when at least one LDP session is up and running on the link for which LDP has sent its applicable label bindings and received at least one label binding from the peer. LDP communicates this information to IGP upon link up or session down events and IGP acts accordingly, depending on synchronization state.

Keychain Management—Key chain management is a common method of authentication that lest you configure shared secrets on all entities to exchange secrets before establishing trust with each other. Routing protocols and network management applications on Cisco IOS XR software often use authentication to enhance security while communicating with peers.

Fault Manager—Embedded Event Manager (EEM) TCL script works with AAA/task ID model. To register a Fault Manager policy, you must specify the username that is used to run the script. This name can be different from the user who is currently logged in, but the registering user must have permissions that are a superset of the username that runs the script. Otherwise, the script is not registered and the command be rejected. In addition, the username that runs the script must have access privileges to the commands run by the Fault Manager policy being registered.

IP Service Level Agreements (IP SLAs)—This feature originated from the technology previously known as Service Assurance Agent (SAA). IP SLA performs active monitoring by generating and analyzing traffic to measure performance, either between the router or from a router to a remote IP device such as a network application server. Measurement statistics (provided by IP SLA operations) are used for troubleshooting, problem analysis, and designing network topologies.

Craft Works Interface (CWI)—This feature includes:

enhanced configuration editor with IDE functionality

hyperlinks to referenced portions of configuration

RPL syntax highlighting

simplified installation from a router or HTTP server

support for new inventory schema

Secure domain router (SDR) support—This features lets you activate Cisco IOS XR software packages for specific SDRs. SDR-specific activation is supported for specific packages and upgrades, including optional packages and SMUs.

Support for fast-reroute (FRR) for shared media.

Support for the following MIBs:

CISCO-RTTMON-MIB

MPLS-L3VPN-STD-MIB

RADIUS-AUTH-CLIENT-MIB

RADIUS-ACC-CLIENT-MIB

VPN-TC-STD-MIB

Cisco CRS-1-specific Features

The following are new features in Cisco IOS XR Software Release 3.3.0 supported only on the Cisco CRS-1 platform:

Provides support for configurable Fabric quality-of-service (QoS), NetFlow VLAN support, additional classification features and QoS for VLAN over bundled-interfaces.

Link Bundling (VLAN / LDP)—802.1Q VLAN sub-interfaces can be configured on 802.3ad ethernet link bundles.

MAC Accounting (on existing 10GE PLIM)—On existing 10GE PLIM, the media access control (MAC) address accounting feature provides accounting information for IP traffic based on the source and destination MAC addresses on LAN interfaces. This feature calculates the total packet and byte counts for a LAN interface that receives or sends IP packets to or from a unique MAC address. It also records a time stamp for the last packet received or sent.

LDP ether-bundle—Provides a new interface-media support over EtherBundle interfaces.

Packet Length Filter (ACL)—Enables packet classification and filtering based on the L3 packet length in the IP header. This is supported on all interfaces and in any direction, ingress or egress.

Support for static route bidirectional forwarding detection (BFD) over VLAN over ether-bundles—When running a BFD session on an interface, the BFD session is active as long as the VLAN bundle is up. As long as the VLAN bundle is active, the following events do not cause the BFD session to fail:

Failure of a component link: Fibre unplugged.

Online insertion and removal (OIR) of a line card which hosts one or more of the component links.

Addition of a component link (by configuration) to the bundle.

Removal of a component link (by configuration) from the bundle.

Shutdown of a component link.

RP failover.


Note Beta quality delivery in 3.3.0; FCS quality delivery in 3.3.1.


1:1 redundancy—You can configure the minimum number of active links using the bundle minimum-active links command. To support the 1:N redundancy feature, you can configure the minimum bandwidth in kbps using the bundle minimum-active links command.


Note Beta quality delivery in 3.3.0; FCS quality delivery in 3.3.1.


Quality of Service (QoS) units of measurement changes—Provides support for a number of new units of measurement that have been introduced as options within the various Modular QoS command-line interface (MQC) that are applied within policy-maps for Cisco IOS XR Software Release 3.3.0 and later releases.

Since the default units of measurement may no longer be the same, care must be taken when taking a configuration earlier than Cisco IOS XR Software Release 3.3.0 and applying it to Cisco IOS XR Software Release 3.3.0 or later. Table 7 lists the changes to QoS units of measurement.

Table 7 Changes to Quality of Service Units of Measurement 

Command
Cisco IOS XR Release 3.2 (Default)
Cisco IOS XR Release 3.3.x and Cisco IOS XR Release 3.4.x (Default)

bandwidth

kbps

kbps

police rate

kbps

bps (change)

queue-limit

bytes

packets (change)

random-detect

bytes

packets (change)

shape average

kbps

packets (change)



Note The default units of measurement (see Table 7) will be inserted into the QoS policy following the upgrade. This will result in a change to the policy's behavior. Therefore, manual review and keyword changes must be performed by the operator to ensure the policy operates as expected.


Keywords cannot be inserted into the running configuration on a router running Cisco IOS XR Release 3.2.x in advance of the upgrade. An option is to edit the configuration offline, and add the necessary keywords.


Note To make change to a QoS policy, the policy must first be removed from any interfaces making a reference to it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

When the policy is removed from any interfaces, the edited policy is applied. Refer to the following Cisco IOS XR command reference sections:

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.3

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a008069e202.html

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.4

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a00806b06ab.html

Cisco XR 12000 Series Router-specific Features

The following are new features in Cisco IOS XR Software Release 3.3.0 supported only on the Cisco XR 12000 Series Router platform:

Quality of service (QoS) features—Support for To-Fab QoS, dynamic queue allocation, hierarchical queuing, label sharing, and class map scalability.

IPv6 multicast—Support added for IPv6 multicast.

Multicast QoS—Cisco IOS XR software provides for the configuration of multicast QoS. When configured on specific interfaces, system-wide, general QoS operations are applied to multicast traffic as well as general network traffic. QoS expedites the handling of mission-critical applications, while sharing network resources with noncritical applications. QoS also ensures available bandwidth and minimum delays required by time-sensitive multimedia and voice applications. It also gives network managers control over network applications, improves cost
efficiency of WAN connections, and enables advanced differentiated services.

Sampled NetFlow—Support for NetFlow data collection in sampled mode. Sampled NetFlow provides configurable sampling rates that ensure accuracy and allow the user to control the consumption of router resources.

Session Border Controller (SBC) support—SBCs control and manage real-time multimedia traffic flows between IP network borders, handling signaling and media; perform native IP interconnection functions required for real-time communications, such as access control, NAT/firewall traversal, bandwidth policing, accounting, signaling, interworking, and QoS management.

Local Packet Transport Services (LPTS)—Support for protection of locally source traffic, including rate limiting of control plane traffic, peer filtering (TCP/UDP unicast), and packet priority for egress/ingress traffic to the RP.

Unicast Reverse Path Forwarding (URPF) support—uRPF aids in the prevention and mitigation of network attacks by limiting an attacker's ability to spoof source IP addresses of network packets. Version 4 supports Loose mode on E3 and E5 cards; version 6 supports Loose mode on E3 and E5 and support for Strict mode on E5 cards only.

Layer 3 virtual private network (L3VPN) single autonomous system (AS) support—An AS is a single network or group of networks that is controlled by a common system administration group using a single, clearly-defined routing protocol.

New Hardware Features Supported in Cisco IOS XR Software Release 3.3.0

The following are new hardware features supported in Cisco IOS XR Software Release 3.3.0:

Cisco CRS-1 hardware:

ITU grid 4X10G PLIM

ITU grid 40G PLIM

SPA: 8xOC12/3 POS

Distributed application (DRP)

Cisco XR 12000 Series Router hardware:

Fuji power supplies and power management 12.0(31)S Parity

12006,12010,12016 chassis

Line card: E5 Multi-rate SIP

Packet Services Card (PSC-1)

SPA: (2x) 4xCT3

SPA: (2x) 4xT3/E3

SPA: 2xOC48

See the following documents for detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs):

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.3.0

Cisco IOS XR Interface and Hardware Component Configuration Guide, Release 3.3.0

Important Notes

In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

When upgrading a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the upgrade instructions provided to minimize traffic impact. For detailed instructions, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router, Release 3.3.0 document for procedures.

Follow the instructions provided by Cisco for all card removal and replacement (fabric cards, line cards, fan controller and RP, and so on) to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

If you intend to test beyond the combined maximum configuration tested and published by Cisco, please contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your testing.

Cisco SIP-600 line cards (for the Cisco XR 12000 Series Router) draw more power than previous line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

Release 3.2 Caveats—Resolved in Release 3.3.0

This section lists the resolved caveats for Cisco IOS XR Software Release 3.3.0.

CSCsd68855

Basic Description: Upgrading from Release 3.2.x to 3.3.y results in partial loss of configuration if a banner is present within the configuration before conducting the upgrade.

Conditions: N/A

Workaround: To avoid this problem, remove the banner prior to upgrade, perform the upgrade, then reapply the banner configuration.

Open Caveats—Release 3.3.0

This section lists the caveats for Cisco IOS XR Software Release 3.3.0. The caveats are organized as follows:

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Platform-Independent Caveats

The following caveats apply to both platforms:

CSCej72142

Basic Description: The link local address may not be enabled on an interface using IPv6. This can happen when bringing up the interface (during boot, manual config or flap) due to a race condition between Interface Manager and the external DAD request coming in on the link.

Symptom: IPv6 adjacency is not formed on the interface and all ipv6 packets are dropped.

Conditions: If it receives a request for duplicate address detection on the link local address before it has received an UP notification from IM, it won't enable link local address on that interface (and all packets punted for resolving glean on that interface are dropped).

Workaround: Shut/no-shut the interface.

CSCek38505

Basic Description: The debug qos control hardware command should show that the EA is not getting correct init data.

Symptom: QoS policy programming on bundle interfaces is corrupted or removed and QoS ceases. The show policy and show qos command output is incorrect for QoS policy applied on the bundle interface in the following scenarios:

1) IM restart on the RP or RP failover

2) qos_ma_ea or improxy is restarted on the line card or the line card is OIR'd. The line card referred above is where the members of the bundles lie.

Physical interfaces are unaffected by these restarts.

Conditions: This condition is caused only after ifmgr restart on RP for bundle interfaces or on line cards for physical interfaces and VLANs. ifmgr is restarted when an ifmgr SMU is activated, ifmgr crashes, or when process restart ifmgr loc is used.

Workaround:

1) Reload the affected line card.

2) Remove and reapply the policy map on the interface.

CSCsd52703

Basic Description: When router is reloaded by means of the admin reload location all, on named lr configuration is lost when the router comes back up after reload.

Symptom: Customer will report missing configuration for a named SDR after reloading the router.

Conditions: Named SDRs must have been created on the router. The lost config must be for a named SDR, not for the owner SDR. Lost config must be after a reload. The version of software must be different before and after the reload, or the package contents on the router before and after the reload must be different for this problem to occur.

Workaround: Before issuing the reload location all command on the dSC node, connect to the dSDRSC node for each SDR and issue the cfs check command to ensure that the configuration database for that SDR has been fully synchronized after recent configuration commits.

Cisco CRS-1-specific Caveats

The following caveats are specific to the Cisco CRS-1 platform:

CSCsd29893

Basic Description: Traffic can be dropped when a additional equal-cost path is added with MPLS LDP-enabled.

Symptom: When an equal-cost path is brought up and load balancing is modified to take this new path into consideration, some traffic is lost.

Conditions: The interface is the only one used on the MSC.

Workaround: None

Cisco XR 12000 Series Router-specific Caveats

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsd79716

Basic Description: The non-owner SDR or standby owner SDR RP gets stuck in MBI and fails to boot correctly during a rollback from Release 3.3.y to Release 3.2.x.

Symptom: Non-owner SDR or standby owner SDR continues to reload.

Conditions: Chassis c12416 used with 4 SDR's configured. This happens only when an install commit is omitted and a failover is performed on non-owner SDR or owner SDR right after upgrade from Release 3.2.x to Release 3.3.87.

Workaround: Reload whole router that takes system back to Release 3.2.x. Repeat the 3.3 upgrade procedure and make sure that the install commit is applied after install activation and before failover.

Upgrading Cisco IOS XR Software

Cisco IOS XR software is installed and activated as modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without impacting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node). Cisco IOS XR software packages are installed from package installation envelopes (PIE) files that contain one or more software components.

Below are several URLs that link to the online information that describes how to upgrade or downgrade Cisco IOS XR software from Release 3.2 or EFT/Beta versions of Release 3.3 to the FCS version of Release 3.3.0.

To upgrade the software on the Cisco CRS-1 Router, go to:

http://www.cisco.com/cgi-bin/tablebuild.pl/crs1upgrade

Select "CRS-1_Upgrade_Procedure_3.2.x_to_3.3.0.htm" to upgrade from Release 3.2.x release, and select "CRS-1_Upgrade_Procedure_EFT-BETA_to_3.3.0.htm" to upgrade from an early field trial (EFT) or Beta release to Release 3.3.0.

To upgrade the software on the Cisco XR 12000 Series Router, go to:

http://www.cisco.com/cgi-bin/tablebuild.pl/c12000upgrade

Select "XR12000_Upgrade_Procedure_3.2.x_to_3.3.0.htm" to upgrade from Release 3.2.x release, and select "XR12000_Upgrade_Procedure_EFT-BETA_to_3.3.0.htm" to upgrade from an early field trial (EFT) or Beta release to Release 3.3.0.


Note Before you install or upgrade the software, first upgrade the ROM Monitor software to the correct version. If a Cisco CRS-1 system running Cisco IOS XR software release 3.3.0 is brought up with the incorrect ROM Monitor software, the standby RP fails to boot and an error message appears. To address this issue in a single-shelf router, refer to the "Upgrading and Downgrading ROM Monitor Software on Cisco CRS-1 Routers" chapter of Cisco IOS XR ROM Monitor Guide.


Turbobooting PRP cards


Step 1 Boot the dSC RP with the composite image:

rommon> confreg 0x0
rommon> reset
rommon> unset BOOT
rommon> TURBOBOOT=on,disk0
rommon> sync
rommon> boot tftp://../c12k-mini.vm-3.3.0
 
   

The confreg step ensures that ROMMON won't autoboot from previously installed software.

The following is TURBOBOOT ROMMON variable usage:

TURBOBOOT=option1, option2,...

Available options:

on

Turns Turboboot procedure on.

disk0, disk1, compactflash

Specifies the target boot device (default: disk0).

clean, format

Clean (deletes any existing package dirs/files) or format target device before installing the software.


For example:

rommon> TURBOBOOT=on,disk0,format
rommon> sync
 
   

Step 2 Without waiting, netboot all other RPs with the MBI:

rommon> unset TURBOBOOT
rommon> unset BOOT
rommon> sync
rommon> boot tftp://../mbiprp-rp.vm-3.3.86
 
   

Note The TURBOBOOT variable should not be set on other RPs.


Step 3 Wait for the Turboboot process to finish (approximately 30 minutes).

The DSC netboots (image is loaded in memory).

Target boot devices are cleaned and formatted (depending on the TURBOBOOT option).

Software is copied from memory to the target boot device.

All RPs that are found in MBI Running state by the dSC are turbobooted.

ROMMON variables (confreg and BOOT) is set appropriately

When all cards are done, the dSC resets and reload the software from disk

All other RP cards self-resets and reloads from disk.

Installing Optional Packages

Steps in Step 3 (above) must be performed prior to any of the steps in this section.

All installation commands must be performed in admin EXEC mode.

Action/Description
Sample Commands

Install optional packages.

RP/0/0/CPU0(admin)# install add 
tftp://../c12k-mpls.pie-3.3.86 

RP/0/0/CPU0(admin)# install activate 
disk0:/c12k-mpls-3.3.86

For automated execution, we recommended that the synchronous option is used for all package/PIE activation or deactivation commands. This ensures that the console prompt does not come back until the system finishes the package/PIE activations/deactivations.

Troubleshooting

Refer to the Cisco IOS XR Getting Started Guide for information on troubleshooting the Cisco IOS XR software.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. These documents consist of hardware and software installation guides, Cisco IOS XR software configuration and command references, feature modules, and other documents.

Documentation is available as electronic documents, which are available online on Cisco.com.

Use these release notes with these documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/core/crs/index.htm

Software Documents

The Cisco IOS XR software documentation set consists of the Cisco IOS XR software configuration guides and command references, a getting started guide, and other supporting documents. Refer to the About Cisco IOS XR Software Documentation for Release 3.3.0 for a list of Cisco IOS XR software documentation for Release 3.3.0.

You can find the most current software documentation at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/ioxsoft/iox33/index.htm

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information about how to obtain documentation or support, on how to provide documentation feedback, for security guidelines, as well as on recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

This document is to be used in conjunction with the documents listed in the "Related Documentation" section.