Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.4

  • Viewing Options

  • PDF (695.5 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.4

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.4

Contents

Introduction

System Requirements

Cisco CRS-1

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

New and Changed Information

New Software Features in Cisco IOS XR Software Release 3.4.0

New Hardware Features Supported in Cisco IOS XR Software Release 3.4.0

Important Notes

Caveats

Open Caveats—Release 3.4.0

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation

Cisco.com

Product Documentation DVD

Ordering Documentation

Documentation Feedback

Cisco Product Security Overview

Reporting Security Problems in Cisco Products

Product Alerts and Field Notices

Obtaining Technical Assistance

Cisco Technical Support & Documentation Website

Submitting a Service Request

Definitions of Service Request Severity

Obtaining Additional Publications and Information


Release Notes for Cisco IOS XR Software Release 3.4


March 19, 2013

Cisco IOS XR Software Release 3.4.0

Text Part Number OL-11443-06


Note Please see the "Important Notes" section for important information on Cisco IOS XR Software Release 3.4.0.



Note You can find the most current Cisco IOS XR software documentation on the World Wide Web at http://www.cisco.com/univercd/cc/td/doc/product/ioxsoft/iox34/index.htm. These electronic documents may contain updates and modifications. See the "Obtaining Documentation" section for more information on obtaining Cisco documentation.


These release notes describe the features provided in Cisco IOS XR Software Release 3.4.0 and are updated as needed.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.4.0, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation

Documentation Feedback

Cisco Product Security Overview

Product Alerts and Field Notices

Obtaining Technical Assistance

Obtaining Additional Publications and Information

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Layer 2 virtual private network (L2VPN), and Layer 3 VPN (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally, the operating systems support modular QoS command-line interface (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; authentication, authorization, and accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); and Simple Network Management Protocol Versions 3 (SNMPv3). Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works interface (CWI)—The CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

See the "New and Changed Information" section for a detailed list of new features by platform for Cisco IOS XR Software Release 3.4.0.

System Requirements

The Cisco IOS XR Software Release 3.4.0 is supported on the following platforms:

Cisco CRS-1

Cisco XR 12000 Series Router

Cisco CRS-1

This section describes the system requirements for Cisco IOS XR Software Release 3.4.0 supported on Cisco CRS-1 routers and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.0 features. Table 1 and Table 2 list the Cisco IOS XR software feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.4.0 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.0 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.4.0

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

hfr-mini.vm-3.4.0

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.4.0

CORBA2 agent, XML3 Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.4.0

MPLS-TE,4 LDP,5 MPLS Forwarding, MPLS OAM,6 LMP,7 OUNI,8 RSVP,9 Layer 2 VPN, and Layer 3 VPN

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.4.0

Multicast Routing Protocols (PIM, MSDP,10 IGMP,11 Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB,12 MURIB13 , MFWD14 ), and BIDIR-PIM.15

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.4.0

Support for Encryption, Decryption, IPSec,16 SSH,17 SSL,18 and PKI.19

Cisco IOS XR Documentation Package

hfr-doc.pie-3.4.0

Manual pages for Cisco IOS XR CLI commands

Cisco IOS XR FPD Package

hfr-fpd.pie-3.4.0

Firmware for Shared Port Adapters (SPA) supported in Cisco IOS XR

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.4.0

Diagnostic utilities for Cisco IOS XR routers

1 Packages are installed individually.

2 Common Object Request Broker Architecture

3 Extensible Markup Language

4 MPLS Traffic Engineering

5 Label Distribution Protocol

6 Operations, Administration, and Maintenance

7 Link Manager Protocol

8 Optical User Network Interface

9 Resource Reservation Protocol

10 Multicast Source Discovery Protocol

11 Internet Group Management Protocol

12 Multicast Routing Information Base

13 Multicast-Unicast RIB

14 Multicast forwarding

15 Bidirectional Protocol Independent Multicast

16 IP SecurityF

17 Secure Shell

18 Secure Socket Layer

19 public-key infrastructure


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.0 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.4.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Diagnostic Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.4.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package

Cisco IOS XR Diagnostic Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR Software Release 3.4.0 are:

2 GB memory on the route processors (RPs)

2 GB memory on the modular services cards (MSCs)

Hardware Supported

Cisco IOS XR Software Release 3.4.0 supports Cisco CRS-1 routers. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 3 lists the hardware components supported on the Cisco CRS-1 and the minimum software versions required. See the "Determining the Software Version" section.

Table 3 Cisco CRS-1 Supported Hardware and Minimum Software Requirements 

Component
Part Number
Min. Software Version Required
Cisco CRS-1 Series 16-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

CRS-16-LCC

3.2

Cisco CRS-1 Fan Tray for 16-Slot LCC

CRS-16-LCC-FAN-TR

3.2

Cisco CRS-1 Fan Controller for 16-Slot Line Card Chassis

CRS-16-LCC-FAN-CT

3.2

Cisco CRS-1 16-Slot Alarm Board

CRS-16-ALARM

3.2

Cisco CRS-1 AC Delta Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACD

3.2

Cisco CRS-1 AC Wye Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACW

3.2

Cisco CRS-1 DC Power Shelf for 16-Slot LCC

CRS-1-LCC-PS-DC

3.2

Cisco CRS-1 LCC Front AC Power Panel

CRS-16-ACGRILLE

3.2

Cisco CRS-1 LCC Front DC Power Panel

CRS-16-DCGRILLE

3.2

Cisco CRS-1 Line Card Chassis Front Doors

CRS-16-LCC-DRS-F

3.2

Cisco CRS-1 Line Card Chassis Front Cable Mgmt

CRS-16-LCC-FRNT

3.2

Cisco CRS-1 LCC Expanded Front Cable Mgmt

CRS-16-LCC-FRNT-E

3.2

Cisco CRS-1 Line Card Chassis Rear Cable Mgmt

CRS-16-LCC-BCK-CM

3.2

Cisco CRS-1 Line Card Chassis Rear Doors

CRS-16-LCC-DRS-R

3.2

Cisco CRS-1 Lift for LCC 16 and FCC

CRS-16-LIFT/B

3.2

Cisco CRS-1 Series 8-Slot Line Card Chassis

Cisco CRS-1 8-Slot Install Kit

CRS-8-INSTALL-KT

N/A

Cisco CRS-1 8-Slot Fork Lift Tube

CRS-8-LIFT-TUBE

N/A

Cisco CRS-1 8-Slot Front Badge Panel

CRS-8-BDG-PANEL

N/A

Cisco CRS-1 8-Slot Front Inlet Grill

CRS-8-FRNT-GRILL

N/A

Cisco CRS-1 8-Slot Horizontal Install Rails

CRS-8-HRZ-RAILS

N/A

Cisco CRS-1 8-Slot Line Card Chassis

CRS-8-LCC

3.2

Cisco CRS-1 Fan Tray for 8-Slot Line Card Chassis

CRS-8-LCC-FAN-TR

3.2

Cisco CRS-1 Line Card Chassis Filter Pack

CRS-8-LCC-FILTER

3.2

Cisco CRS-1 AC Pwr Rectifier for 8-Slot LCC

CRS-8-AC-RECT

3.2

Cisco CRS-1 DC Power Entry Module for 8-Slot LCC

CRS-8-DC-PEM

3.2

Cisco CRS-1 AC & DC Power Module Filter for 8-Slot LCC

CRS-8-PWR-FILTER

3.2

Cisco CRS-1 AC Delta PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACD

3.2

Cisco CRS-1 AC Wye PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACW

3.2

Cisco CRS-1 DC PDU for CRS-8 LCC

CRS-8-LCC-PDU-DC

3.2

Cisco CRS-1 Series 4-Slot Line Card Chassis

Cisco CRS-1 4-Slot Single-Shelf System

CRS-4/S

3.4

Cisco CRS-1 Fabric Chassis Hardware

CRS-FCC= Cisco CRS-1 Series Fabric Card Chassis Only

CRS-FCC=

3.2

CRS-1 Fabric Chassis AC Delta Power Kit

CRS-FCC-ACD-KIT

3.2

CRS-1 Fabric Chassis AC Grille

CRS-FCC-ACGRILLE

3.2

CRS-1 Fabric Chassis AC-Wye Power Kit

CRS-FCC-ACW-KIT

3.2

CRS Fabric Chassis DC Power Kit

CRS-FCC-DC-KIT

3.2

CRS-1 Fabric Chassis DC Power Grille

CRS-FCC-DCGRILLE

3.2

CRS Fabric Chassis Lift Bracket

CRS-FCC-LIFT-BRKT

3.2

CRS Fabric Chasis OIM Modules

CRS-FCC-OIM-1S=

3.2

Cisco CRS-1 Series FC Chassis Shelf/Fan/Enet cntr

CRS-FCC-SC-GE=

3.2

CRS-1 Fabric Chassis AC Intake Grille

CRS-FCC-ACGRILLE=

3.2

CRS-1 Fabric Chassis DC Intake Grille

CRS-FCC-DCGRILLE=

3.2

Cisco CRS-1 Series Fan Tray for FCC

CRS-FCC-FAN-TR=

3.2

CRS-1 Fabric Card Chassis Fan Tray Filters

CRS-FCC-FILTER=

3.2

CRS-1 Fabric Chassis Front Cosmetic Kit

CRS-FCC-FRNT-CM=

3.2

Cisco CRS-1 Series Fabric Card Chassis Fiber Module LED

CRS-FCC-LED=

3.2

Cisco CRS-1 Series DC Power Shelf for FCC

CRS-FCC-PS-DC=

3.2

CRS-1 Fabric Chassis Rear Cosmetic Kit

CRS-FCC-REAR-CM=

3.2

CRS-LIFT Brackets for Fabric Chassis

CRS-FCC-LIFT-BRKT=

3.2

CRS Fabric Chassis OIM Module

CRS-FCC-OIM-1S

3.2

CRS-1 Fabric Chassis AC Delta Power Supply

CRS-FCC-PS-ACD

3.2

CRS-1 Fabric Chassis AC Wye Option

CRS-FCC-PS-ACW

3.2

CRS-1 Fabric Chassis DC Power Option

CRS-FCC-PS-DC

3.2

Cisco CRS-1 Series Fabric Card Chassis Switch Fabric Card

CRS-FCC-SFC=

3.2

Cisco CRS-1 General Chassis Hardware

Cisco CRS-1 Memory Module 2 GB

CRS-MEM-2G

3.2

Cisco CRS-1 PCMCIA Flash Disk 1 GB

CRS-FLASH-DISK-1G

3.2

Cisco CRS-1 Modular Services Card

CRS-MSC

3.2

Cisco CRS-1 SFPs

Cisco CRS-1 2.5 G SFP LR Optic

POM-OC48-LR2-LC-C

3.2

Cisco CRS-1 2.5 G SFP SR Optic

POM-OC48-SR-LC-C

3.2

Cisco CRS-1 Fabric Cards

Cisco CRS-1 8-Slot Fabric Card / Single

CRS-8-FC/S

3.2

Cisco CRS-1 8-Slot Fabric Card Blank

CRS-8-FC-BLANK

3.2

Cisco CRS-1 8-Slot Fabric Handle

CRS-8-FC-HANDLE

3.2

Cisco CRS-1 16-Slot Fabric Card / Single

CRS-16-FC/S

3.2

Cisco CRS-1 Interface and Router Processor Cards

Cisco CRS-1 8-Slot Route Processor

CRS-8-RP

3.2

Cisco CRS-1 8-Slot Route Processor Blank

CRS-8-RP-BLANK

3.2

Cisco CRS-1 8-Slot Route Processor Handle

CRS-8-RP-HANDLE

3.2

Cisco Carrier 1 Series SPA Interface Processor 40G

CRS1-SIP-800

3.2

Cisco CRS-1 16-Slot Route Processor

CRS-16-RP

3.2

Cisco CRS-1 Distributed Route Processor

CRS-DRP

3.3.0

Cisco CRS-1 16-slot route processor

CRS-16-RP-B

3.3.0

Cisco CRS-1 SONET Interface Modules and SPAs

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/VS

4OC192-POS/DPT-VS

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/SR

4OC192-POS/DPT-SR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/IR

4OC192-POS/DPT-IR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

3.2

Cisco CRS-1 16xOC-48/STM16 POS/DPT Interface Module

16OC48-POS/DPT

3.2

Cisco CRS-1 1xOC-768/STM256 POS Interface Module/SR

1OC768-POS-SR

3.2

Cisco CRS-1 8-Port OC-12 Shared Port Adapter

SPA-8XOC12-POS

3.3.0

Cisco CRS-1 2-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-2XOC48-POS/RPR

3.4

Cisco CRS-1 4-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-4XOC48-POS/RPR

3.4

Cisco CRS-1 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

Cisco CRS-1 4-Port OC-3 Shared Port Adapter

SPA-4XOC3-POS

3.2

ITU grid 40G PLIM

1OC768-ITU/C

3.3.0

Cisco CRS-1 Ethernet Interface Modules and SPAS

Cisco CRS-1 8-Port 10-Gigabit Ethernet Interface Module

8-10GBE=

3.2

Cisco 10-GBASE-LR XENPAK Module for CRS-1

CRS-XENPAK10GB-LR

3.3.3, 3.4.0

Cisco 10-GBASE Extended Range XENPAK Module for SMF

XENPAK-10GB-ER+=

3.3.3, 3.4.0

Cisco 10-GBASE Long Range XENPAK Module for SMF

XENPAK-10GB-LR+=

3.3.3, 3.4.0

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter

SPA-8X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

10GBASE-DWDM XENPAK

CRS 1 CRS-XENPAK10GB-DWDM

3.2.2

ITU grid 4X10G PLIM

4-10GE-ITU/C

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.0 is compatible with the Cisco CRS-1 systems:

Cisco CRS-1 4-Slot Line Card Chassis

Cisco CRS-1 8-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.4.0[00]
Copyright (c) 2006 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 1.42(20060413:002654) [CRS-1 ROMMON], 
 
   
P1_CRS-8 uptime is 13 hours, 37 minutes
System image file is "disk0:hfr-os-mbi-3.4.0[00]/mbihfr-rp.vm"
 
   
cisco CRS-8/S (7457) processor with 4194304K bytes of memory.
7457 processor at 1197Mhz, Revision 1.2
 
   
24 GigabitEthernet/IEEE 802.3 interface(s)
2 Ethernet/IEEE 802.3 interface(s)
20 Packet over SONET/SDH network interface(s)
20 SONET/SDH Port controller(s)
2043k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
1000592k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
1000640k bytes of ATA PCMCIA card at disk 1 (Sector size 512 bytes).
 
   
Configuration register on node 0/1/CPU0 is 0x102
Package active on node 0/1/CPU0:
 
   
hfr-diags, V 3.4.0[00], Cisco Systems, at disk0:hfr-diags-3.4.0[00]
    Built on Mon Aug 28 11:12:59 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].hfr/workspace for c2.95.3-p8
 
   
hfr-mcast, V 3.4.0[00], Cisco Systems, at disk0:hfr-mcast-3.4.0[00]
    Built on Mon Aug 28 08:35:39 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].hfr/workspace for c2.95.3-p8
 
   
hfr-mpls, V 3.4.0[00], Cisco Systems, at disk0:hfr-mpls-3.4.0[00]
    Built on Mon Aug 28 08:29:05 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].hfr/workspace for c2.95.3-p8

Other Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.42.

The minimum CPUCNTRL version required for this release is 2.07.

For detailed information on ROMMON, refer to the Cisco IOS XR ROM Monitor Guide.

Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software Release 3.4.0 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.0 features. Table 4 and Table 5 list the Cisco IOS XR software feature set matrix and associated filenames available for Cisco IOS XR Software Release 3.4.0 supported on the Cisco XR 12000 Series Router.

Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.0 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-c12k-mini.pie-3.4.0

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.4.0

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.4.0

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.4.0

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.4.0

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.4.0

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.4.0

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.4.0

Session Border Controller Package for a Cisco XR 12000 Series Router.

Cisco IOS XR service IPsec controller package

c12k-ipsec-service.pie-3.4.0

Support for service-ipsec and service-gre interfaces in IOS XR

Cisco IOS XR Documentation Package

c12k-doc.pie-3.4.0

Manual pages for Cisco IOS XR CLI commands

Cisco IOS XR FPD Package

c12k-fpd.pie-3.4.0

Firmware for Shared Port Adapters (SPA) supported in Cisco IOS XR

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.4.0

Diagnostic utilities for Cisco IOS XR routers

1 Packages are installed individually.

1


Table 5 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.0 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.4.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.4.0.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.4.0 are:

2 GB route memory on Performance Route Processor 2 (PRP-2)

1 GB ATA flash storage on PRP-2

1 GB line card route memory on all Engine 3 line cards

1 GB line-card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-600 is 1 GB

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB


Note The Performance Route Processor 1 (PRP-1) is not supported in production environments.


Hardware Supported

Cisco IOS XR Software Release 3.4.0 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 6 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Determining the Software Version" section.

Table 6 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Minimum Software Version Required
Cisco XR 12000 Series Router Line Card Chassis
   

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2.0

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2.0

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2.0

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2.0

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2.0

Cisco XR 12000 Series Router Chassis Hardware
   

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3.0

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3.0

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3.0

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3.0

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3.0

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 800Gbps Fabric Option (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric option can only be configured in the enhanced Cisco XR-12000 10-slot Router with part number XR-12000/10.

12810E/800

3.4.0

Enhanced 800-Gbps Fabric Kit (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800=

3.4.0

Enhanced 1280-Gbps Fabric Option (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric option can be configured only in the enhanced Cisco XR-12000 16-slot router with part number XR-12000/16.

12816E/1280

3.4.0

Enhanced 1280-Gbps Fabric Kit (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 16-slot router with part number XR-12000/16.

12816E/1280=

3.4.0

Cisco XR 12000 Series Router Interface and Router Processor Cards

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2.0

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2.0

Cisco XR 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2.0

Cisco XR 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2.0

Cisco XR 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2.0

Cisco XR 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2.0

Cisco XR 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2.0

Cisco XR 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2.0

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192POS-VSR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192POS-LR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2.0

2-port OC48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3.0

Cisco XR 12000 Series Router Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2.0

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2.0

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4.0

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4.0

Cisco 8-Port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4.0

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3.0

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4.0

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4.0

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4.0

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2.0

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2.0

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2.0

Cisco Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3.0

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3.0

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3.0

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.0 is compatible with the Cisco XR 12000 Series Router systems:

Cisco XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

Cisco XR 12810 Router

Cisco XR 12816 Router

For the existing installed base, the following chassis are supported:

Cisco 12006 Router

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/0/CPU0:router# show version
 
   

The following version information is displayed:

RP/0/0/CPU0:PE6_C12406# show version
 
   
Cisco IOS XR Software, Version 3.4.0[00]
Copyright (c) 2006 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20040128:214555) [assafb-PRP1P_20040101 1.8E
Cop, Inc.
 
   
PE6_C12406 uptime is 16 hours, 3 minutes
System image file is "disk0:c12k-os-mbi-3.4.0[00]/mbiprp-rp.vm"
 
   
cisco 12406/PRP (7457) processor with 2097152K bytes of memory.
7457 processor at 1265Mhz, Revision 1.2
 
   
1 Cisco 12000 Series Performance Route Processor
1 Cisco 12000 Series - Service Engine Card Controller (4294967295 Unknown)
1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM)
1 Cisco 12000 Series SPA Interface Processor- Controller (4294967295 Unknown)
1 Cisco 12000 Series SPA Interface Processor-600 Controller (4294967295 Unknown)
1 Cisco 12000 Series Packet Service Card 1 (PSC-1)
4 ATM Network Interface(s)
16 FastEthernet/IEEE 802.3 interface(s)
5 GigabitEthernet/IEEE 802.3 interface(s)
6 Ethernet/IEEE 802.3 interface(s)
1 Multilink controller(s)
6 PLIM QoS controller(s)
2 Packet over SONET/SDH network interface(s)
11 Serial network interface(s)
6 SONET/SDH Port controller(s)
56 T1 Port controller(s)
4 T3 Port controller(s)
2042k bytes of non-volatile configuration memory.
1000432k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
1000432k bytes of ATA PCMCIA card at disk 1 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Configuration register on node 0/0/CPU0 is 0x102
Package active on node 0/0/CPU0:
c12k-sbc, V 3.4.0[00], Cisco Systems, at disk0:c12k-sbc-3.4.0[00]
    Built on Mon Aug 28 11:08:58 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
 
   
c12k-doc, V 3.4.0[00], Cisco Systems, at disk0:c12k-doc-3.4.0[00]
    Built on Mon Aug 28 13:28:54 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
 
   
c12k-diags, V 3.4.0[00], Cisco Systems, at disk0:c12k-diags-3.4.0[00]
    Built on Mon Aug 28 13:15:07 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
 
   
c12k-mgbl, V 3.4.0[00], Cisco Systems, at disk0:c12k-mgbl-3.4.0[00]
    Built on Mon Aug 28 11:00:57 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
 
   
c12k-mcast, V 3.4.0[00], Cisco Systems, at disk0:c12k-mcast-3.4.0[00]
    Built on Mon Aug 28 11:00:32 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
 
   
c12k-mpls, V 3.4.0[00], Cisco Systems, at disk0:c12k-mpls-3.4.0[00]
    Built on Mon Aug 28 11:00:06 UTC 2006
    By edde-bld1 in /vws/aga/production/3.4.0[00].prp/workspace for c28
.
.
.

Other Firmware Code

The following firmware code is supported by the Cisco XR 12000 Series Router:

The minimum ROMMON version required for this release is 1.14. For more information on the minimum ROMMON version required for this release, ROMMON upgrade procedures, and flashdisk information, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router document.

The flashdisk Cisco part numbers are: MEM-12KRP-FD512M (=) and MEM-12KRP-FD1G(=)

New and Changed Information

The following sections contain information on new features in Cisco IOS XR Software Release 3.4.0:

New Software Features in Cisco IOS XR Software Release 3.4.0

New Hardware Features Supported in Cisco IOS XR Software Release 3.4.0

New Software Features in Cisco IOS XR Software Release 3.4.0

The following are new features in Cisco IOS XR Software Release 3.4.0 supported on the Cisco CRS-1 and Cisco XR 12000 Series Router platforms:

Pseudo Wire Emulation Edge to Edge (PWE3) and Ethernet over Multiprotocol Label Switching (MPLS)—Enables deployment of scalable L2VPN edge services:

Support for both static and targeted LDP label distribution

Equal-cost multipath selection (ECMP) based on Pseudo Wire label

L2VPN High Availability via LDP GR

PWE3 Ethernet attachment circuit to pseudo wire mapping

Ethernet port attachment circuit type

PWE3 tagged and raw Ethernet support

Enhancements to MPLS VPN—Provides support for scalable IPv4 Layer 3 VPN backbone services.

Carrier Supporting Carrier (CSC)—Allows an MPLS VPN service provider to connect geographically isolated sites using another backbone service provider and still maintain a private address space for its customer VPNs. Based on IETF RFC 4364.

IP Service Level Agreement (SLA)—Performs active monitoring by generating and analyzing traffic to measure performance, either among routers or from the router or from a router to a remote IP device such as a network application server. Measurement statistics (provided by IP SLA operations) are used for troubleshooting, problem analysis, and designing network topologies. This feature is derived from the technology previously known as Service Assurance Agent (SAA). Cisco IOS XR enhancements include:

Support for UDP Echo, Internet Control Message Protocol (ICMP) Echo, User Datagram Protocol (UDP) Jitter, ICMP Path Echo and ICMP Path Jitter in VRF context.

Label Switched Path (LSP) Ping and LSP Trace Route Operations for MPLS VPN Monitoring and Diagnosis

DHCPv4 Option 82 and DHCPv6 support:

DHCPv4 Option 82—Allows for a Relay Agent to pass DHCP messages between the DHCP clients and DHCP servers. DHCP Option 82, Relay Agent Information, was introduced in RFC 3046 to address security and scalability issues in public use. The remote ID and circuit ID sub-options are supported in this release.

DHCPv6—DHCPv6 performs the same address assignment and host configuration functions for IPv6 as DHCPv4 does for IPv4. DHCPv6 is based on IETF RFC 3315.

Craft Works Interface (CWI)—Allows administrators to manage, monitor, and configure a single device or a network of devices. CWI Enhancements include:

JAVA Runtime Environment (JRE) v1.5 support

Scripted login

Parallel multi-network login

Custom end-user applications

CLI and XML scripted monitoring

Service domain router (SDR) installation enhancements—Enhances per-SDR software management and installation by removing the Owner SDR involvement that was required in Cisco IOS XR Release 3.3:

Per SDR package management (install, add, remove)

Per SDR software management (install, activate, deactivate, commit)

Per SDR software rollback

Border Gateway Protocol (BGP) authentication key chaining—Provides the following BGP enhancements for authentication key chaining:

Hitless key lifetime and graceful rollover (using accept-lifetime and send-lifetime)

Key-string encryption

Key acceptance tolerance

Authentication algorithm support for Message Digest 5. (MD5), Secure Hash Algorithm 1 (SHA1), Hash Message Authentication Code SHA1 (HMAC-SHA1), or HMAC-MD5

BGP 4-Byte ASN—Increases the range of supported autonomous systems from 2 bytes to 4 bytes to scale with expected Internet growth.

BGP next-hop tracking—Provides the following enhancements:

New show command to see next hops used by various BGP tables and state associated with each next hop entry

New reset command to reset the next hop cache entries.

Support for two-level trigger delay for critical and non-critical next hop change events.

Support for policy-based filtering for the next hops.

Routing Policy Language (RPL) policy-based filtering based on source protocol and prefix and prefix-length. This filtering helps to avoid resolving Next Hops over some aggregate routes.

BGP IETF RFC 4273 BGP4-Management Information Base (MIB) enhancement to support reflect neighbor indexing.

BGP MIB MIBv2 draft-ietf-idr-bgp4-mibv2-05.txt.

Bidirectional Forwarding Detection (BFD) to aid Protocol Independent Multicast (PIM) in subsecond detection of failures between adjacent systems; uses BFD functionality to enable scalable subsecond fault detection for PIM.

MT-ISIS—Enables the Intermediate System-Intermediate System (IS-IS) IPv4 multicast address family in IS-IS, which allows for a multicast topology that is independent of the unicast topology created by IS-IS.

TE Forwarding Adjacency Support for IS-IS and OSPF—Adds support for TE Forwarding Adjacency (FA) for IS-IS and OSPF routing protocols. Forwarding Adjacency is described in IETF RFC 4206.

The forwarding adjacency feature provides a way to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. First a label switching router (LSR) creates a traffic engineering label switched path (TE LSP) and the LSR forms a forwarding adjacency (FA) for that LSP by announcing the LSP as a TE link into IS-IS/Open Shortest Path First (OSPF). Other LSRs can then use the FA for their path computation.

MPLS TE enhancements—Enhances the Cisco IOS XR MPLS Traffic Engineering (TE) feature set:

Multiarea/instances:

Support TE configurations in multiple OSPF areas or IS-IS instances

Support for TE topology and tunnel setup in multiple OSPF areas or IS-IS instances

Link record advertisement for multiple OSPF areas or IS-IS instances

Handle multiple TE router IDs

Interarea TE:

Support for loose hop configuration in Explicit Path

Support for loose hop ERO expansion

Checkpoint expanded ERO and path setup information at midpoint.

Interarea TE reoptimization:

Support for reoptimization query from tunnel head

Reoptimization query at midpoint

Support for new path error at head and midpoint

Fast ReRoute (FRR):

Insert node ID sub-object in Record Route Object (RRO)

Use node ID sub-object from RRO for FRR backup assignment

TE link coloring

Support for global color-name to value mapping

Support for assigning link colors using the new style

Support for four types of color constraints under TE tunnel (include, exclude, include-strict, exclude-all)

Addition of new MIBS:

CISCO-IETF-PW-TC-MIB

CISCO-IETF-PW-MIB

CISCO-IETF-PW-ENET-MIB

CISCO-IETF-PW-MPLS-MIB

TCP/UDP MIB

OSPF-TRAP-MIB

NOTIFICATION-LOG-MIB

CISCO-IP-STAT-MIB

The following MIBS have been enhanced:

CISCO-RTTMON-MIB

ENTITY-MIB

IF-MIB

Cisco CRS-1 Specific Features

The following are new features in Cisco IOS XR Software Release 3.4.0 supported only on the Cisco CRS-1 platform:

MPLS VPN Inter-Autonomous System (AS)—Enables a VPN service provider network to exchange IPv4 routes with MPLS labels. Using Inter-AS, a local provider edge (PE) router must know the routes and label information for the remote PE router. This information can be exchanged between the PE routers and autonomous system boundary routers (ASBRs) in one of the following ways:

The ASBR can redistribute the IPv4 routes and MPLS labels that it learned from EBGP into IGP and LDP, and vice versa.

The ASBR and provider edge (PE) router can use direct iBGP sessions to exchange VPNv4 and IPv4 routes and MPLS labels.

CRS-1 IPv6 link bundling support—Provides support for IPv6 over both Packet over SONET/SDH (POS) and Ethernet link bundling

IPv6 BGP Policy Accounting—Allows per-interface accounting of ingress or egress IP traffic-based on AS number, AS-path, community-list. The BGP table-policy command is used to classify the prefixes BGP puts into the routing table according to routing policies based on AS number, AS-path, and community list. Based on the routing policy, BGP policy accounting assigns each prefix a bucket associated with an interface.

Packet time to live (TTL) filter access control list (ACL)—Enables packet classification and filtering based on the TTL field of the IP header for IPv4 packets or Hop Limit field of the IP header for IPv6 packets. This is supported on all interfaces and in both ingress and egress directions.

VLAN Attachment Circuit Type support

Ethernet Interworking

The following new MIBS are added:

CISCO-RF-MIB

CISCO-IF-EXTENSION-MIB

Quality of Service (QoS) units of measurement changes—Provides support for a number of new units of measurement that have been introduced as options within the various Modular QoS command-line interface (MQC) that are applied within policy-maps for Cisco IOS XR Software Release 3.3.0 and later releases.

Since the default units of measurement may no longer be the same, care must be taken when taking a configuration earlier than Cisco IOS XR Software Release 3.3.0 and applying it to Cisco IOS XR Software Release 3.3.0 or later. Table 7 lists the changes to QoS units of measurement.

Table 7 Changes to Quality of Service Units of Measurement 

Command
Cisco IOS XR Release 3.2 (Default)
Cisco IOS XR Release 3.3.x and Cisco IOS XR Release 3.4.x (Default)

bandwidth

kbps

kbps

police rate

kbps

bps (change)

queue-limit

bytes

packets (change)

random-detect

bytes

packets (change)

shape average

kbps

packets (change)



Note The default units of measurement (see Table 7) will be inserted into the QoS policy following the upgrade. This will result in a change to the policy's behavior. Therefore, manual review and keyword changes must be performed by the operator to ensure the policy operates as expected.


Keywords cannot be inserted into the running configuration on a router running Cisco IOS XR Release 3.2.x in advance of the upgrade. An option is to edit the configuration offline, and add the necessary keywords.


Note To make change to a QoS policy, the policy must first be removed from any interfaces making a reference to it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

When the policy is removed from any interfaces, the edited policy is applied. Refer to the following Cisco IOS XR command reference sections:

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.3

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a008069e202.html

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.4

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a00806b06ab.html

Cisco XR 12000 Series Router-specific Features

The following are new features in Cisco IOS XR Software Release 3.4.0 supported only on the Cisco XR 12000 Series Router platform:

Packet Length Filter ACL—Supports packet classification and filtering based on the Layer 3 packet length in the IP header. This is supported on all interfaces and in both ingress and egress directions.
Previously, this feature was supported only on the Cisco CRS-1.

IEEE 802.1adQ-in-Q Stacked VLAN (QinQ)—Supports QnQ on the Cisco XR 12000 Series Router. Expands the VLAN space by creating an additional layer 802.1q VLAN tag for a double-tagged frame. Support includes:

IPv4 Layer 3 services

IPv6 Layer 3 services

RFC2547bis MPLS Layer 3 VPN

Frame Relay Encapsulation:

Frame Relay Encapsulation (IETF and Cisco)

Virtual circuit (VC) management for terminated VCs (permanent virtual circuit (PVC) support)

p2p subinterface support

Local Management Interface (LMI) with data terminal equipment (DTE) and data communications equipment (DCE) support

Cisco Discovery Protocol (CDP) over Frame Relay (FR)

Connectionless Network Service (CLNS) over FR

IPv4 (unicast/multicast), MPLS, and MPLS VPN over FR

IPv4 InARP (reply only)

Layer 3 QoS

Asynchronous Transfer Mode (ATM) encapsulation:

ATM Layer

ATM Uni 3.0/3.1 with terminating PVC

User network interface and network-network interface cell format

Integrated Local Management Interface (ILMI) 4.0 User Side with backward 3.0/3.1 compatibility

Protocols

Classical IP over ATM

IPv4 Client Address Resolution using InArp - response only [RFC 1577]

Multiprotocol encapsulation over ATM for routed protocols [RFC 1483]

ATM traffic management

Constant bit rate (CBR), variable bit rate (rt-VBR, nrt-VBR, UBR (w/ PCR))

Native ATM virtual circuit-shaping

Shaped virtual path tunnel

Layer 3 QoS features

Per- virtual circuit queuing and buffering

Configurable queue depth

Per- virtual circuit Weighted Random Early Detection (WRED)

Per- virtual circuit Modified Deficit Round Robin (MDRR), including low-latency queueing (LLQ)

CLP bit setting on egress

Packet Layer

IPv4 & IPv6 and MPLS forwarding

Layer 3 MPLS VPN

Multirouter (MR) APS

New MIBs:

ATM2-MIB (RFC 3606)

ATM-MIB (RFC 2515)

CISCO-ATM-EXT-MIB

CISCO-ATM-QOS-MIB

CISCO-IPSEC-FLOW-MONITOR-MIB

CISCO-IPSEC-POLICY-MAP-MIB

CISCO-OAM-MIB

Cisco XR 12000 Series Router Services

Session Border Controller (SBC):

Protocol and Media Interworking (SIP and H.323)

Call Routing

Admission Control and Policing

Quality Monitoring, Enforcement & Billing

Security and AAA

Intra and Inter VPN Interconnect/Optimization

Distributed Model with H.248 control of Data Border Element (DBE)

Cisco IOS XR VPN IPSec aggregation

secure on-net and off-net remote access

remote site-to-site services

New Hardware Features Supported in Cisco IOS XR Software Release 3.4.0

The following are new hardware features supported in Cisco IOS XR Software Release 3.4.0:

Cisco CRS-1 and Cisco XR 12000 Series Router hardware:

5-Port Gigabit Ethernet Shared Port Adapter, Version 2 SPA-5X1GE-V2

8-Port Gigabit Ethernet Shared Port Adapter, Version 2 SPA-8X1GE-V2

10-Port Gigabit Ethernet Shared Port Adapter, Version 2 SPA-10X1GE-V2

1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2 SPA-1X10GE-L-V2

Cisco CRS-1 hardware:

Cisco CRS-1 4-Slot Single-Shelf System CRS-4/S 3.4

Multichassis 2+1, 2+2, and 2+4 Scale (CRS-1)

SPA: 2xOC48 and 4xOC48

Cisco XR 12000 Series Router hardware:

128xx Chassis

4-Port OC-3c/STM-1c ATM ISE Line Card, multimode 4OC3X/ATM-MM-SC

4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode 4OC3X/ATM-IR-SC

4-port OC-12/STM-4 ATM multimode ISE line card with SC connector 4OC12X/ATM-MM-SC

4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector 4OC12X/ATM-IR-SC

SPA-IPSEC-2G-2

Multi-Service Blade (MSB)

8x1GE GSR Shared Port Adapter

Cisco XR12000 IPSec VPN Shared Port Adapter (SPA)

See the following documents for detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs):

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.4.0

Cisco IOS XR Interface and Hardware Components Configuration Guide, Release 3.4.0

Important Notes

In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

When upgrading a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the upgrade instructions provided to minimize traffic impact. For detailed instructions, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router, Release 3.4.0 document for procedures.

Follow the instructions provided by Cisco for all card removal and replacement (fabric cards, line cards, fan controller and RP, and so on) to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

If you intend to test beyond the combined maximum configuration tested and published by Cisco, please contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your testing.

Cisco SIP-600 line cards (for the Cisco XR 12000 Series Router) draw more power than previous line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

Open Caveats—Release 3.4.0

This section lists the caveats for Cisco IOS XR Software Release 3.4.0. The caveats are organized as follows:

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Platform-Independent Caveats

The following caveats apply to both platforms:

CSCsg12719

Basic Description:

Configuration commits fail due to missing vinfo directory after RP failover

Symptom:

After a failover, configuration commits may fail with the following error message:

% Failed to commit. As an error (Unknown) encountered during commit operation. Changes 
may not have been committed: No such file or directory 
 
   

Also, the configuration version files on disk0 will be missing. To check if this is the case, run the following commands:

cd /disk0:/config/running/vinfo 
dir 
 
   

If you're encountering the same issue, the "vinfo" directory will be empty.

Conditions:

This issue can occur in IOS XR Release 3.3.2 and higher.

Workaround:

Running clear configuration inconsistency will rebuild the configuration file system, and enable config commits to proceed. This command may need to be run from both the LR exec prompt and the admin exec prompt.

Further Problem Description:

This is a rare scenario in which the replication of configuration version files to standby nodes is unsuccessful or only partially successful. The root cause of this problem is currently unknown, but it is believed to be linked to restarts of processes on which the file replication depends.

CSCek58687

Basic Description:

sconbkup process gets triggered periodically and does running-config backup after config commit.

Symptom:

The sconbkup process can consume a lot of CPU for an extended period of time (5 to 10 min).

Conditions:

This is observed following a config commit with a large config of about 4MB.

Workaround:

There is no workaround for this issue.

CSCse83983

Basic Description:

IA tunnel does NOT go down and come up on topo change in non-head area.

Symptom:

When IOS XR Release 3.4 MPLS Traffic Engineering node is a non-head area node and there is a topology change triggered either due to IGP link add/removal or any other topology change in the IGP (say) Level 1 to Level 2 for the links on that node. The inter-area tunnels originating from the Head and going via that link will NOT flap as a result of this topology change.

Conditions:

This behavior is seen in IOS XR Release 3.4 in a non-head area node and inter-area TE tunnel is being setup with loose hop in the path ERO.

Additional Notes:

Path verification and tunnel reoptimization indication are not done by the midpt ABR node. This is similar to the IOS behavior today. This feature will be added in a future release.

Workaround:

None.

CSCse97786

Basic Description:

L2VPN: Control word cant be set if PW is established with cbit=0

Symptom:

Router not sending Control Word even when Controlk word is enabled.

Conditions:

If a PW is established with cbit=0, and later via config we enabled control word or if neighbor sends a label mapping with control word cbit=1, IOX will still send cbit=0.

Workaround:

The workaround is to delete and reconfigure the PW on both the PE's

CSCse80235

Basic Description:

L2VPN: Support destination with Rtg ID different than LDP rtr Id

Symptom:

Can't establish PW to a non LDP router ID address

Conditions:

PW can be established on to the LDP router ID. Currently IOX does not support PW to non LDP router ID's

Workaround:

None

Cisco CRS-1-specific Caveats

The following caveats are specific to the Cisco CRS-1 platform:

CSCsg33747

Basic Description:

System instability after all fabric racks are OIRed

Symptom:

Multi-chassis system installability. Multiple processes will restart.

Conditions:

Following a power-down of all of the fabric-card chassis' within a multi-chassis system, the router will not operate in a stable manner.


Note Operating without at least one fabric chassis in service is not a supported configuration.


Workaround:

None

CSCsg18108

Basic Description:

netio process restarts when trying to restore config from disk.

Symptom:

An unexpected Netio process termination may occur when trying to restore configuration from disk or when changing the encapsulation of an interface from ppp to hdlc and vice versa.

Conditions:

Condition1: If the router has POS or serial interfaces and the configuration is cleared using following commands:

commit replace

yes

end

And then restored back from disk, the netio process can terminate.

Condition 2: If the encapsulation of serial interface is changed repeatedly from ppp to hdlc and viceversa, and if the packets are being sent out of that interface at the same time, the netio process can terminate

Workaround:

Workaround for Condition 1: When loading the configuration from disk, make sure the POS and serial interfaces are in a shut-down state. Once the configuration is loaded, the interfaces can be enabled again.

Workaround for Condition 2: If there is a need to change the encaps of a serial or POS interface, shut the interface before changing the encapsulation. The interface can be enabled after the configuration change has been made.

CSCek58420

Basic Description:

Bundle intf shut / no-shut causes autorp pkts to stop being sent to PIM

Symptom:

The auto-rp messages do not get delivered to the PIM process running on the RP. RP group mapping will not be known to PIM as a result.

Conditions:

The mhost default interface is configured to be one of the multicast enabled physical interfaces (and hence is a forwarding interface for the auro-rp routes). If an incoming interface is a bundle interface, when the bundle interface is 'bounced' (shut and unshut) the IC bit is not set on the egress forwarding interface, as expected by PIM.

Workaround:

Perform a shut/no shut on the mhost default interface

CSCek56221

Basic Description:

HFR large combinational config - QOS config failed during router reload with EA error

Symptom:

The process hfr_pm may terminate unexpectedly during linecard bootup.

Conditions:

On linecard boot up, hfr_pm process may terminate. This will occur as a result of a failure in the L2VPN stats process initialization.

Workaround:

Reload the LC on which the problem occurred.

CSCse67625

Basic Description:

When TCP packets of size that exactly equals the interface Maximum Transmission Unit (MTU) are transmitted, TCP does not receive back the acknowledgement leading to TCP retransmissions which further delays packets in the TCP send queue.

Symptom:

When this problem happens, the TCP send queue looks stuck for the duration TCP is attempting the retransmission. Depending on how long this condition persists and keepalive configuration on the router, some control sessions may flap.

Conditions:

When the router uses the default TCP Maximum Segment Size (MSS), which is derived from interface MTU, and the packet size exactly equals the MTU, the problem is seen.

Workaround:

Using tcp mssvalue command, set the TCP MSS to be smaller than interface MTU value.

Further Problem Description:

This only happens with specific PE scenarios as mentioned in Conditions and should not be a usual occurance.

Cisco XR 12000 Series Router-specific Caveats

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsf08316

Basic Description:

ATM PVCs can flap when OAM is configured and certain changes are made.

Symptom:

After large-scale changes are made to the configuration, ATM PVCs may flap. This flap may occur up to 2 hours after the changes were initiated.

Conditions:

1000 PVCs configured, each with:

ipv4 address

ipv6 address

OAM (one end of PVC)

service-policy (other end of PVC)

The symptoms may occur after removing the IPV6 addresses from all of the PVCs, or after removing the OSPF portion of the config.

Workaround:

None known.

CSCsg09471

Basic Description:

MTU changes on POS SPA interface can potentially reset the linecard.

Symptom:

A POS SPA can experience a reset after the MTU value is changed while traffic is running.

Conditions:

More than 750 subinterfaces configured on POS SPA and traffic is currently flowing through the SPA when MTU is changed.

Workaround:

None

CSCsg19005

Basic Description:

Config roll back does not restore the configs completely

Symptom:

Configuration rollback does not restore the full configuration if used after using the commit replace CLI. When configuration rollback to latest rollback point is used, the configuration restoration does not work properly.

Conditions:

This is observed with a large-scale configuration:

up to 60 cdp-enabled interfaces

up to 112 ospf adjacencies

in excess of 10,000 static routes

up to 4000 interfaces on a given line card

Workaround:

Copy the config from backup.

example: copy disk0: router-config running config

Further Problem Description:

Using this command can actually make all the config lost.

CSCsg07623

Basic Description:

IPv6 Multicast drops when OSPF Adjacency flaps

Symptom:

IPv6 Multicast traffic can potentially be dropped

Conditions:

Engine-5 linecard

Up to 8,000 MLD joins sent.

OSPF adjacencies flap

Workaround:

None.

CSCsg30178

Basic Description:

Buffer leak during long duration load test

Symptom:

During a load condition the SBC will suddenly halt call process and then return a SIP 487 message Request Terminated.

Conditions:

No calls are processed

Workaround:

None

CSCsg40065

Basic Description:

Standby card goes into endless loop after switchover

Symptom:

After an SBC switchover the standby card is stuck in PreStandby

Conditions:

Under small load conditions and HA enabled

Workaround:

No workaround

Resolving the Cisco IOS XR Software BGP-Related PSIRT Issue

To resolve the Border Gateway Protocol Vulnerability issue, upgrade to Cisco IOS XR software release 3.4.3 and refer to the section "Resolved Cisco IOS XR Software PSIRT-Related Caveats" in the Release Notes for Cisco IOS XR Software Release 3.4.3. Also refer to the "Software Versions and Fixes" section in the security advisory at: http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml

Upgrading Cisco IOS XR Software

Cisco IOS XR software is installed and activated as modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without impacting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node). Cisco IOS XR software packages are installed from package installation envelopes (PIE) files that contain one or more software components.

Below are URLs that link to the online information that describes how to upgrade or downgrade Cisco IOS XR software from Release 3.2.x, 3.3.x or EFT/Beta versions of Release 3.4 to the FCS version of Release 3.4.0.

To upgrade the software on the Cisco CRS-1 Router, go to:

http://www.cisco.com/cgi-bin/tablebuild.pl/crs1upgrade

To upgrade the software on the Cisco XR 12000 Series Router, go to:

http://www.cisco.com/cgi-bin/tablebuild.pl/c12000upgrade

Troubleshooting

Refer to the Cisco IOS XR Getting Started Guide for information on troubleshooting the Cisco IOS XR software.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. These documents consist of hardware and software installation guides, Cisco IOS XR software configuration and command references, feature modules, and other documents.

Documentation is available as electronic documents, which are available online on Cisco.com.

Use these release notes with these documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at the following URLs:

Cisco CRS-1 Routers:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Routers:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR software documentation set consists of the Cisco IOS XR software configuration guides and command references, a getting started guide, and other supporting documents. Refer to the About Cisco IOS XR Software Documentation for Release 3.4.0 for a list of Cisco IOS XR software documentation for Release 3.4.0.

You can find the most current software documentation at the following URL:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.

Cisco.com

You can access the most current Cisco documentation at this URL:

http://www.cisco.com/techsupport

You can access the Cisco website at this URL:

http://www.cisco.com

You can access international Cisco websites at this URL:

http://www.cisco.com/public/countries_languages.shtml

Product Documentation DVD

The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:

http://www.cisco.com/univercd/home/home.htm

The Product Documentation DVD is created monthly and is released in the middle of the month. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

Ordering Documentation

You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

If you do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do

Documentation Feedback

You can provide feedback about Cisco technical documentation on the Cisco Technical Support & Documentation site area by entering your comments in the feedback form available in every online document.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

From this site, you will find information about how to do the following:

Report security vulnerabilities in Cisco products

Obtain assistance with security incidents that involve Cisco products

Register to receive security information from Cisco

A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:

http://www.cisco.com/go/psirt

To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:

http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:

For emergencies only — security-alert@cisco.com

An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

For nonemergencies — psirt@cisco.com

In an emergency, you can also reach PSIRT by telephone:

1 877 228-7302

1 408 525-6532


Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.

Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

The link on this page has the current PGP key ID in use.

If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.


Product Alerts and Field Notices

Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive Cisco Product Alerts and Cisco Field Notices by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.

To access the Product Alert Tool, you must be a registered Cisco.com user. (To register as a Cisco.com user, go to this URL: http://tools.cisco.com/RPF/register/register.do) Registered users can access the tool at this URL: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en

Obtaining Technical Assistance

Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.

Cisco Technical Support & Documentation Website

The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:

http://www.cisco.com/techsupport

Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do


Note Use the Cisco Product Identification Tool to locate your product serial number before submitting a request for service online or by phone. You can access this tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.



Tip Displaying and Searching on Cisco.com

If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.

To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. On the Cisco.com home page, click the Advanced Search link under the Search box and then click the Technical Support & Documentation.radio button.

To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.


Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:

http://www.cisco.com/techsupport/servicerequest

For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

To open a service request by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411
Australia: 1 800 805 227
EMEA: +32 2 704 55 55
USA: 1 800 553 2447

For a complete list of Cisco TAC contacts, go to this URL:

http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

Severity 1 (S1)—An existing network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:

http://www.cisco.com/go/guide

Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:

http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training, and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:

http://www.ciscopress.com

Packet magazine is the magazine for Cisco networking professionals. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can subscribe to Packet magazine at this URL:

http://www.cisco.com/packet

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/ipj

Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL:

http://www.cisco.com/en/US/products/index.html

Networking Professionals Connection is an interactive website where networking professionals share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:

http://www.cisco.com/discuss/networking

"What's New in Cisco Documentation" is an online publication that provides information about the latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of "What's New in Cisco Documentation" at this URL:

http://www.cisco.com/univercd/cc/td/doc/abtunicd/136957.htm

World-class networking training is available from Cisco. You can view current offerings at this URL:

http://www.cisco.com/en/US/learning/index.html