Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.4.1

  • Viewing Options

  • PDF (684.6 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.4.1

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.4.1

Contents

Introduction

System Requirements

Cisco CRS-1

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

New and Changed Information

New Software Features in Cisco IOS XR Software Release 3.4.1

New Hardware Features Supported in Cisco IOS XR Software Release 3.4.1

Important Notes

Caveats

Open Caveats—Release 3.4.1

Quality of Service (QoS) Units of Measure Changes

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Resolved Cisco IOS XR Software PSIRT-Related Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation

Cisco.com

Product Documentation DVD

Ordering Documentation

Documentation Feedback

Cisco Product Security Overview

Reporting Security Problems in Cisco Products

Product Alerts and Field Notices

Obtaining Technical Assistance

Cisco Support Website

Submitting a Service Request

Definitions of Service Request Severity

Obtaining Additional Publications and Information


Release Notes for Cisco IOS XR Software Release 3.4.1


March 19, 2013

Cisco IOS XR Software Release 3.4.1

Text Part Number OL-12373-04


Note Please see the "Important Notes" section for important information about Cisco IOS XR Software Release 3.4.1.



Note You can find the most current Cisco IOS XR software documentation on the World Wide Web at http://www.cisco.com/univercd/cc/td/doc/product/ioxsoft/iox34/index.htm. These electronic documents may contain updates and modifications. See the "Obtaining Documentation" section for more information on obtaining Cisco documentation.


These release notes describe the features provided in Cisco IOS XR Software Release 3.4.1 and are updated as needed.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.4.1, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected, at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation

Documentation Feedback

Cisco Product Security Overview

Product Alerts and Field Notices

Obtaining Technical Assistance

Obtaining Additional Publications and Information

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Layer 2 virtual private network (L2VPN), and Layer 3 VPN (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally, the operating systems support modular QoS command-line interface (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; authentication, authorization, and accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); and Simple Network Management Protocol Versions 3 (SNMPv3). Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works interface (CWI)—The CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

See the "New and Changed Information" section for a detailed list of new features by platform for Cisco IOS XR Software Release 3.4.1.

System Requirements

The Cisco IOS XR Software Release 3.4.1 is supported on the following platforms:

Cisco CRS-1

Cisco XR 12000 Series Router

Cisco CRS-1

This section describes the system requirements for Cisco IOS XR Software Release 3.4.1 supported on Cisco CRS-1 routers and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.1 features. Table 1 and Table 2 list the Cisco IOS XR software feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.4.1 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.1 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.4.1

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.vm-3.4.1

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.4.1

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.4.1

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, RSVP, Layer 2 VPN, and Layer 3 VPN

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.4.1

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD), and BIDIR-PIM.

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.4.1

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Documentation Package

hfr-doc.pie-3.4.1

Manual pages for Cisco IOS XR CLI commands

Cisco IOS XR FPD Package

hfr-fpd.pie-3.4.1

Firmware for ROM Monitor and Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.4.1

Diagnostic utilities for Cisco IOS XR routers

1 Packages are installed individually.


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.1 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.4.1.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.4.1.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR Software Release 3.4.1 are:

2 GB memory on the route processors (RPs)

2 GB memory on the modular services cards (MSCs)

Hardware Supported

Cisco IOS XR Software Release 3.4.1 supports Cisco CRS-1 routers. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 3 lists the hardware components supported on the Cisco CRS-1 and the minimum software versions required. See the "Determining the Software Version" section.

Table 3 Cisco CRS-1 Supported Hardware and Minimum Software Requirements 

Component
Part Number
Min. Software Version Required
Cisco CRS-1 Series 16-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

CRS-16-LCC

3.2

Cisco CRS-1 Fan Tray for 16-Slot LCC

CRS-16-LCC-FAN-TR

3.2

Cisco CRS-1 Fan Controller for 16-Slot Line Card Chassis

CRS-16-LCC-FAN-CT

3.2

Cisco CRS-1 16-Slot Alarm Board

CRS-16-ALARM

3.2

Cisco CRS-1 AC Delta Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACD

3.2

Cisco CRS-1 AC Wye Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACW

3.2

Cisco CRS-1 DC Power Shelf for 16-Slot LCC

CRS-1-LCC-PS-DC

3.2

Cisco CRS-1 LCC Front AC Power Panel

CRS-16-ACGRILLE

3.2

Cisco CRS-1 LCC Front DC Power Panel

CRS-16-DCGRILLE

3.2

Cisco CRS-1 Line Card Chassis Front Doors

CRS-16-LCC-DRS-F

3.2

Cisco CRS-1 Line Card Chassis Front Cable Mgmt

CRS-16-LCC-FRNT

3.2

Cisco CRS-1 LCC Expanded Front Cable Mgmt

CRS-16-LCC-FRNT-E

3.2

Cisco CRS-1 Line Card Chassis Rear Cable Mgmt

CRS-16-LCC-BCK-CM

3.2

Cisco CRS-1 Line Card Chassis Rear Doors

CRS-16-LCC-DRS-R

3.2

Cisco CRS-1 Lift for LCC 16 and FCC

CRS-16-LIFT/B

3.2

Cisco CRS-1 Series 8-Slot Line Card Chassis

Cisco CRS-1 8-Slot Install Kit

CRS-8-INSTALL-KT

N/A

Cisco CRS-1 8-Slot Fork Lift Tube

CRS-8-LIFT-TUBE

N/A

Cisco CRS-1 8-Slot Front Badge Panel

CRS-8-BDG-PANEL

N/A

Cisco CRS-1 8-Slot Front Inlet Grill

CRS-8-FRNT-GRILL

N/A

Cisco CRS-1 8-Slot Horizontal Install Rails

CRS-8-HRZ-RAILS

N/A

Cisco CRS-1 8-Slot Line Card Chassis

CRS-8-LCC

3.2

Cisco CRS-1 Fan Tray for 8-Slot Line Card Chassis

CRS-8-LCC-FAN-TR

3.2

Cisco CRS-1 Line Card Chassis Filter Pack

CRS-8-LCC-FILTER

3.2

Cisco CRS-1 AC Pwr Rectifier for 8-Slot LCC

CRS-8-AC-RECT

3.2

Cisco CRS-1 DC Power Entry Module for 8-Slot LCC

CRS-8-DC-PEM

3.2

Cisco CRS-1 AC & DC Power Module Filter for 8-Slot LCC

CRS-8-PWR-FILTER

3.2

Cisco CRS-1 AC Delta PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACD

3.2

Cisco CRS-1 AC Wye PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACW

3.2

Cisco CRS-1 DC PDU for CRS-8 LCC

CRS-8-LCC-PDU-DC

3.2

Cisco CRS-1 Series 4-Slot Line Card Chassis

Cisco CRS-1 4-Slot Single-Shelf System

CRS-4/S

3.4

Cisco CRS-1 General Chassis Hardware

Cisco CRS-1 Memory Module 2 GB

CRS-MEM-2G

3.2

Cisco CRS-1 PCMCIA Flash Disk 1 GB

CRS-FLASH-DISK-1G

3.2

Cisco CRS-1 Modular Services Card

CRS-MSC

3.2

Cisco CRS-1 SFPs

Cisco CRS-1 2.5 G SFP LR Optic

POM-OC48-LR2-LC-C

3.2

Cisco CRS-1 2.5 G SFP SR Optic

POM-OC48-SR-LC-C

3.2

Cisco CRS-1 Fabric Cards

Cisco CRS-1 4-Slot Fabric Card / Single

CRS-4-FC/S

3.2

Cisco CRS-1 8-Slot Fabric Card / Single

CRS-8-FC/S

3.2

Cisco CRS-1 8-Slot Fabric Card Blank

CRS-8-FC-BLANK

3.2

Cisco CRS-1 8-Slot Fabric Handle

CRS-8-FC-HANDLE

3.2

Cisco CRS-1 16-Slot Fabric Card / Single

CRS-16-FC/S

3.2

Cisco CRS-1 Fabric Chassis Hardware

CRS-FCC= Cisco CRS-1 Series Fabric Card Chassis Only

CRS-FCC=

3.2

CRS-1 Fabric Chassis AC Delta Power Kit

CRS-FCC-ACD-KIT

3.2

CRS-1 Fabric Chassis AC Grille

CRS-FCC-ACGRILLE

3.2

CRS-1 Fabric Chassis AC-Wye Power Kit

CRS-FCC-ACW-KIT

3.2

CRS Fabric Chassis DC Power Kit

CRS-FCC-DC-KIT

3.2

CRS-1 Fabric Chassis DC Power Grille

CRS-FCC-DCGRILLE

3.2

CRS Fabric Chassis Lift Bracket

CRS-FCC-LIFT-BRKT

3.2

CRS Fabric Chassis OIM Modules

CRS-FCC-OIM-1S=

3.2

Cisco CRS-1 Series FC Chassis Shelf/Fan/Enet cntr

CRS-FCC-SC-GE=

3.2

CRS-1 Fabric Chassis AC Intake Grille

CRS-FCC-ACGRILLE=

3.2

CRS-1 Fabric Chassis DC Intake Grille

CRS-FCC-DCGRILLE=

3.2

Cisco CRS-1 Series Fan Tray for FCC

CRS-FCC-FAN-TR=

3.2

CRS-1 Fabric Card Chassis Fan Tray Filters

CRS-FCC-FILTER=

3.2

CRS-1 Fabric Chassis Front Cosmetic Kit

CRS-FCC-FRNT-CM=

3.2

Cisco CRS-1 Series Fabric Card Chassis Fiber Module LED

CRS-FCC-LED=

3.2

Cisco CRS-1 Series DC Power Shelf for FCC

CRS-FCC-PS-DC=

3.2

CRS-1 Fabric Chassis Rear Cosmetic Kit

CRS-FCC-REAR-CM=

3.2

CRS-LIFT Brackets for Fabric Chassis

CRS-FCC-LIFT-BRKT=

3.2

CRS Fabric Chassis OIM Module

CRS-FCC-OIM-1S

3.2

CRS-1 Fabric Chassis AC Delta Power Supply

CRS-FCC-PS-ACD

3.2

CRS-1 Fabric Chassis AC Wye Option

CRS-FCC-PS-ACW

3.2

CRS-1 Fabric Chassis DC Power Option

CRS-FCC-PS-DC

3.2

Cisco CRS-1 Series Fabric Card Chassis Switch Fabric Card

CRS-FCC-SFC=

3.2

Cisco CRS-1 Interface and Router Processor Cards

Cisco CRS-1 8-Slot Route Processor

CRS-8-RP

3.2

Cisco CRS-1 8-Slot Route Processor Blank

CRS-8-RP-BLANK

3.2

Cisco CRS-1 8-Slot Route Processor Handle

CRS-8-RP-HANDLE

3.2

Cisco Carrier 1 Series SPA Interface Processor 40G

CRS1-SIP-800

3.2

Cisco CRS-1 16-Slot Route Processor

CRS-16-RP

3.2

Cisco CRS-1 Distributed Route Processor

CRS-DRP

3.3.0

Cisco CRS-1 16-slot route processor

CRS-16-RP-B

3.3.0

Cisco CRS-1 SONET Interface Modules and SPAs

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/VS

4OC192-POS/DPT-VS

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/SR

4OC192-POS/DPT-SR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/IR

4OC192-POS/DPT-IR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

3.2

Cisco CRS-1 16xOC-48/STM16 POS/DPT Interface Module

16OC48-POS/DPT

3.2

Cisco CRS-1 1xOC-768/STM256 POS Interface Module/SR

1OC768-POS-SR

3.2

Cisco CRS-1 8-Port OC-12 Shared Port Adapter

SPA-8XOC12-POS

3.3.0

Cisco CRS-1 2-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-2XOC48-POS/RPR

3.4

Cisco CRS-1 4-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-4XOC48-POS/RPR

3.4

Cisco CRS-1 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

Cisco CRS-1 4-Port OC-3 Shared Port Adapter

SPA-4XOC3-POS

3.2

ITU grid 40G PLIM

1OC768-ITU/C

3.3.0

Cisco CRS-1 Ethernet Interface Modules and SPAS

Cisco CRS-1 8x10 GbE Interface Module/LR

8-10GBE

3.2

10GBASE-LR XENPAK Module for CRS-1

CRS-XENPAK10GB-LR

3.2

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter

SPA-8X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

10GBASE-DWDM XENPAK

CRS 1 CRS-XENPAK10GB-DWDM

3.2.2

ITU grid 4X10G PLIM

4-10GE-ITU/C

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.1 is compatible with the Cisco CRS-1 systems:

Cisco CRS-1 4-Slot Line Card Chassis

Cisco CRS-1 8-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.4.1.00[Default]
Copyright (c) 2007 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 1.43(20061109:045749) [CRS-1 ROMMON],  
 
   
Shanghai uptime is 11 minutes
System image file is "disk0:hfr-os-mbi-3.4.1/mbihfr-rp.vm"
 
   
cisco CRS-16/S (7455) processor with 4194304K bytes of memory.
7455 processor at 800Mhz, Revision 3.4
 
   
4 DWDM controller(s)
4 E3 Port controller(s)
8 GigabitEthernet/IEEE 802.3 interface(s)
1 Ethernet/IEEE 802.3 interface(s)
25 Packet over SONET/SDH network interface(s)
4 Serial network interface(s)
25 SONET/SDH Port controller(s)
4 TenGigabitEthernet/IEEE 802.3 interface(s)
2043k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
1000592k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
 
   
Configuration register on node 0/1/CPU0 is 0x102
Boot device on node 0/1/CPU0 is disk0:
Package active on node 0/1/CPU0:
hfr-lc, V 3.4.1[Default], Cisco Systems, at disk0:hfr-lc-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-fwdg, V 3.4.1[Default], Cisco Systems, at disk0:hfr-fwdg-3.4.1
    Built on Mon Jan 22 06:50:34 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.4.1[Default], Cisco Systems, at disk0:hfr-admin-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.4.1[Default], Cisco Systems, at disk0:hfr-base-3.4.1
    Built on Mon Jan 22 06:52:30 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.4.1[Default], Cisco Systems, at disk0:hfr-os-mbi-3.4.1
    Built on Mon Jan 22 06:51:28 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
Configuration register on node 0/2/CPU0 is 0x102
Boot device on node 0/2/CPU0 is disk0:
Package active on node 0/2/CPU0:
hfr-lc, V 3.4.1[Default], Cisco Systems, at disk0:hfr-lc-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-fwdg, V 3.4.1[Default], Cisco Systems, at disk0:hfr-fwdg-3.4.1
    Built on Mon Jan 22 06:50:34 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.4.1[Default], Cisco Systems, at disk0:hfr-admin-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.4.1[Default], Cisco Systems, at disk0:hfr-base-3.4.1
    Built on Mon Jan 22 06:52:30 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.4.1[Default], Cisco Systems, at disk0:hfr-os-mbi-3.4.1
    Built on Mon Jan 22 06:51:28 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
Configuration register on node 0/3/CPU0 is 0x102
Boot device on node 0/3/CPU0 is disk0:
Package active on node 0/3/CPU0:
hfr-lc, V 3.4.1[Default], Cisco Systems, at disk0:hfr-lc-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
hfr-fwdg, V 3.4.1[Default], Cisco Systems, at disk0:hfr-fwdg-3.4.1
    Built on Mon Jan 22 06:50:34 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.4.1[Default], Cisco Systems, at disk0:hfr-admin-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.4.1[Default], Cisco Systems, at disk0:hfr-base-3.4.1
    Built on Mon Jan 22 06:52:30 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.4.1[Default], Cisco Systems, at disk0:hfr-os-mbi-3.4.1
    Built on Mon Jan 22 06:51:28 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
Configuration register on node 0/RP0/CPU0 is 0x102
Boot device on node 0/RP0/CPU0 is disk0:
Package active on node 0/RP0/CPU0:
hfr-rout, V 3.4.1[Default], Cisco Systems, at disk0:hfr-rout-3.4.1
    Built on Mon Jan 22 06:50:33 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-lc, V 3.4.1[Default], Cisco Systems, at disk0:hfr-lc-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-fwdg, V 3.4.1[Default], Cisco Systems, at disk0:hfr-fwdg-3.4.1
    Built on Mon Jan 22 06:50:34 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.4.1[Default], Cisco Systems, at disk0:hfr-admin-3.4.1
    Built on Mon Jan 22 06:51:38 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.4.1[Default], Cisco Systems, at disk0:hfr-base-3.4.1
    Built on Mon Jan 22 06:52:30 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.4.1[Default], Cisco Systems, at disk0:hfr-os-mbi-3.4.1
    Built on Mon Jan 22 06:51:28 UTC 2007
    By edde-bld1 in /vws/aga/production/3.4.1/hfr/workspace for c2.95.3-p8

Other Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.45. For detailed information on ROMMON specifications, see http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html.

The minimum CPUCNTRL version required for this release is 2.07.


Note For detailed information on ROMMON, see the Cisco IOS XR ROM Monitor Guide.


Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software Release 3.4.1 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Determining the Software Version

Other Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.1 features. Table 4 and Table 5 list the Cisco IOS XR software feature set matrix and associated filenames available for Cisco IOS XR Software Release 3.4.1 supported on the Cisco XR 12000 Series Router.

Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.1 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-c12k-mini.pie-3.4.1

Contains the required core packages, including OS, Admin, Base, Line Cards, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.4.1

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.4.1

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.4.1

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.4.1

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.4.1

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.4.1

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.4.1

Session Border Controller Package for a Cisco XR 12000 Series Router.

Cisco IOS XR Service IPsec Controller Package

c12k-ipsec-service.pie-3.4.1

Support for service-ipsec and service-gre interfaces in IOS XR.

Cisco IOS XR Documentation Package

c12k-doc.pie-3.4.1

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

c12k-fpd.pie-3.4.1

Firmware for Cisco Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.4.1

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.


Table 5 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.1 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.4.1.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.4.1.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.4.1 are:

2-GB route memory on Performance Route Processor 2 (PRP-2)

1-GB ATA flash storage on PRP-2

1-GB line card route memory on all Engine 3 line cards

1-GB line-card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-600 is 1 GB

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB


Note The Performance Route Processor 1 (PRP-1) is not supported in production environments.


Hardware Supported

Cisco IOS XR Software Release 3.4.1 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 6 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Determining the Software Version" section.

Table 6 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Minimum Software Version Required
Cisco XR 12000 Series Router Line Card Chassis
   

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2.0

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2.0

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2.0

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2.0

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2.0

Cisco XR 12000 Series Router Chassis Hardware
   

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3.0

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3.0

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3.0

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3.0

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3.0

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 800Gbps Fabric Option (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric option can only be configured in the enhanced Cisco XR-12000 10-slot Router with part number XR-12000/10.

12810E/800

3.4.0

Enhanced 800-Gbps Fabric Kit (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800=

3.4.0

Enhanced 1280-Gbps Fabric Option (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric option can be configured only in the enhanced Cisco XR-12000 16-slot router with part number XR-12000/16.

12816E/1280

3.4.0

Enhanced 1280-Gbps Fabric Kit (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 16-slot router with part number XR-12000/16.

12816E/1280=

3.4.0

Cisco XR 12000 Series Router Interface and Router Processor Cards

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2.0

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2.0

Cisco XR 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2.0

Cisco XR 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2.0

Cisco XR 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2.0

Cisco XR 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2.0

Cisco XR 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2.0

Cisco XR 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2.0

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192-POS-VSR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192-POS-LR

3.2.0

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192-POS-XFP

3.2.0

2-port OC48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3.0

Cisco XR 12000 Series Router Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2.0

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2.0

Cisco 2-Port Gigabit Ethernet Shared Port Adapter

SPA-2X1GE-V2

3.4.1

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4.0

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4.0

Cisco 8-Port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4.0

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3.0

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4.0

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4.0

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4.0

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2.0

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2.0

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2.0

Cisco Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3.0

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3.0

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3.0

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.1 is compatible with the Cisco XR 12000 Series Router systems:

Cisco XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

Cisco XR 12810 Router

Cisco XR 12816 Router

For the existing installed base, the following chassis are supported:

Cisco 12006 Router

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/0/CPU0:router# show version
 
   

The following version information is displayed:

RP/0/0/CPU0:PE6_C12410# show version
 
   
Cisco IOS XR Software, Version 3.4.1[00]
Copyright (c) 2007 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20051020:160303)
Copy,  Inc.
 
   
PE6_C12410 7 hours, 41 minutes
System image file is "disk0:c12k-os-mbi-3.4.1[00]/mbiprp-rp.vm"
 
   
cisco 12410/PRP (7450) processor with 1048576K bytes of memory.
7450 processor at 666Mhz, Revision 2.1
 
   
2 1 Port ISE Packet Over SONET OC-48c/STM-16 Controllers (2 POS)
2 Cisco 12000 Series Performance Route Processors
4 Ethernet/IEEE 802.3 interface(s)
2 Packet over SONET/SDH network interface(s)
2 SONET/SDH Port controller(s)
2042k bytes of non-volatile configuration memory.
1000496k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Boot device on node 0/2/CPU0 is mem:
Package active on node 0/2/CPU0:
 
   
Package active on node 0/2/CPU0: 
c12k-mcast, V 3.4.1[00], Cisco Systems, at disk0:c12k-mcast-3.4.1[00]
    Built on Tue Jan 16 18:23:13 CET 2007
    By edde-bld1 in /auto/ioxbuild1/production/3.4.1[00]/prp/workspace for c2.95.3-p8
 
   
c12k-mpls, V 3.4.1[00], Cisco Systems, at disk0:c12k-mpls-3.4.1[00]
    Built on Tue Jan 16 18:22:47 CET 2007
    By edde-bld1 in /auto/ioxbuild1/production/3.4.1[00]/prp/workspace for c2.95.3-p8
 
   
c12k-lc, V 3.4.1.[00], Cisco Systems, at disk0:c12k-lc-3.4.1[00]
    Built on Tue Jan 16 18:31:55 CET 2007
    By edde-bld1 in /auto/ioxbuild1/production/3.4.1[00]/prp/workspace for c2.95.3-p8
 
   
c12k-fwdg, V 3.4.1[00], Cisco Systems, at disk0:c12k-fwdg-3.4.1[00]
    Built on Tue Jan 16 18:30:49 CET 2007
    By edde-bld1 in /auto/ioxbuild1/production/3.4.1[00]/prp/workspace for c2.95.3-p8
 
   
c12k-admin, V 3.4.1[00], Cisco Systems, at disk0:c12k-admin-3.4.1[00]
    Built on Tue Jan 16 18:30:03 CET 2007
    By edde-bld1 in /auto/ioxbuild1/production/3.4.1[00]/prp/workspace for c2.95.3-p8
.
.

Other Firmware Code

The following firmware code is supported by the Cisco XR 12000 Series Router:

LCs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 17.1

Fabric Downloader version used 6.5 (ROM version is 6.5)

RPs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 1.14

The flashdisk Cisco part numbers are: MEM-12KRP-FD512M (=) and MEM-12KRP-FD1G(=)

New and Changed Information

The following sections contain information on new features in Cisco IOS XR Software Release 3.4.1:

New Software Features in Cisco IOS XR Software Release 3.4.1

New Hardware Features Supported in Cisco IOS XR Software Release 3.4.1

New Software Features in Cisco IOS XR Software Release 3.4.1

The following new software features are supported in Cisco IOS XR Software Release 3.4.1:

Cisco CRS-1 and Cisco XR 12000 Series Router Software Features

OSPF Multi-Area Adjacency—In an OSPF multi-area adjacency network, the multi-area OSPF interface is an unnumbered point-to-point interface that has the same interface handle as the primary interface. The multi-area interface establishes itself as a neighbor with the corresponding multi-area interface on the neighboring router. The multi-area interface can exist only if the primary interface is configured in OSPF as well. The multi-area interface feature adds a logical construct over the normal OSPF interface. By default, the multi-area interface inherits the interface characteristics of the primary interface, except for the network type of the interface.

RSVP Authentication—(Resource Reservation Protocol) RSVP protocol mechanisms provide a method for creating and maintaining a distributed reservation state across a mesh of nodes across a delivery path. Corrupted or spoofed reservation requests can potentially lead to theft of service by unauthorized parties, or in certain cases, to complete denial of service caused by exhausting all available network resources. RSVP protects against such attacks with a hop-by-hop authentication mechanism using an encrypted hash function that digitally signs all RSVP signaled messages, and allows the receiver of those messages to verify the sender without relying on the IP address of the sender. The mechanism is supported by INTEGRITY object that may appear in RSVP messages. These objects use a keyed cryptographic digest technique that assumes that RSVP neighbors share a secret.

Using this method, it is possible to effectively control from which nodes RSVP messages will be accepted by sharing the secret key with those RSVP neighbors. Any RSVP neighbor that does not belong to a security domain will have its messages rejected.

RSVP authentication software is responsible for carrying out the following tasks:

Setting up a secure relationship with a neighbor using secret keys shared with the neighbor.

Configuring RSVP authentication in global, interface, or neighbor configuration submodes.

Authenticating incoming messages by checking that there is a valid security relationship associated with it based on the key-identifier and sender's address.

Adding integrity object with message digest to the outgoing message.

Using Sequence numbers in the integrity object to detect replay attacks and out-of-order packets.

Virtual Circuit Connection Verification (VCCV) on L2VPN MPLS—Allows network operators to run IP-based PE-to-PE keepalive protocol across a specified pseudowire to insure that the pseudowire, data path forwarding has no faults. The disposition provider edge (PE) receives VCCV packets on a control channel that is associated with the specified pseudowire itself. The control channel type and the connectivity verification type used for VCCV are negotiated when the pseudowire is established between the PEs in each direction.

The following two types of packets that can arrive at the disposition-egress are normal EoMPLS data packets and VCCV packets. Both types are supported in this release. The VCCV echo reply is sent as IPv4 (meaning that the reply mode is IPv4). This reply is forwarded either as IP or MPLS, or a combination of both.

Cisco CRS-1 Software Features

Access-list Based Forwarding (ABF)—Helps route packets along specific paths, instead of using the regular routing table, in a manner similar to Policy Based Routing (PBR).

The following commands were added:

permit (IPv4)

show access-lists ipv4

Ethernet over Multiprotocol Label Switching (EoMPLS) with QoS—Enables deployment of scalable Layer 2 virtual private network (L2VPN) edge services. Semantics of L2VPN technology require that QoS feature and policies on provider edge (PE) routers have a strictly Layer 2 payload based on the edge-facing interfaces. Existing Layer 3 (MPLS and IP)-based QoS features are adequate on the core-facing interfaces of the provider edge (PE).

Integrated Switch—Ethernet switches with 22 Gigabit ports integrated with the system controller cards in the fabric chassis. All 22 Gigabit Ethernet ports are dedicated to interconnecting Line Card Chassis (LCC) and Fabric Chassis (FCC) in the Cisco CRS-1 Multi-Chassis configuration and cannot be used for any other purposes. For the special required cabling see the Cisco CRS-1 Carrier Routing System Multishelf System Interconnection and Cabling Guide.

MDR L2 Control Protocol Spoofing—Minimum Disruption Restart (MDR) allows software on a Cisco IOS XR node (route processor, service processor, fabric processor or line card main CPU) to be restarted without resetting the hardware for that node. For line cards (LCs), MDR allows CPU restart so that traffic loss is minimized or eliminated. Before Release 3.4.1, the sessions of the Layer 2 control protocols like PPP, cHDLC with the neighbors, if they are still enabled, could still go down during MDR, depending on these protocol timers and the MDR duration. Now features both necessary and sufficient to maintain Layer 2 cHDLC sessions that stay up during the MDR are supported. Serial Line Address Resolution Protocol (SLARP) keepalive messages are sent periodically during this timeframe. This release also introduces features to maintain and establish PPP LCP sessions and to maintain NCP session state changes.

MPLS Netflow Enhancements—NetFlow is traditionally used by customers for key applications such as billing, network planning and analysis, and network monitoring. In Release 3.4.1, we added the following enhancements:

IPv4 fields within an MPLS packet

Labeling for MPLS packets

In addition to the current MPLS-aware NetFlow, you can collect and export the IPv4 fields in the MPLS packet. You can also specify how many labels (up to 6) in the MPLS label stack should be used as key for the MPLS NetFlow. In order not to disturb the existing deployment of MPLS aware NetFlow, the current implementation of MPLS aware NetFlow remains the default behavior. The collection of IPv4 fields in the MPLS aware NetFlow and N-label are options to the MPLS flow record.

MPLS Aware Netflow commands added:

record ipv4 command

record mpls command

show flow monitor-map

Onboard Fault Logging (OBFL) Syslog—Enables the gathering of initial boot, environmental, and critical hardware failure data into the nonvolatile memory of a field-replaceable unit (FRU). The purpose of OBFL is to use stored information to focus troubleshooting and testing for diagnosis of "root cause of failure" the returned FRU. OBFL stored data is retained from the time a customer installs the card OBFL features enabled, until the card is returned to Cisco and OBFL information is retrieved at GPS. The retrieved data can provide information about the historical data on temperature, voltage, uptime, and syslog errors of severity 0 and 1 only, as well as environmental data such as serial number, OS version, and firmware version.

The following commands were added:

test logging onboard

hw-module (logging onboard)

show logging onboard

Traffic Engineering (TE) Tunnels and Fast Re-route (TE/FRR) over Link Bundles—Support is extended to over Bundle interfaces including POS, Ethernet, and VLAN over Bundles. The bundle interface is a logical interface constituting of a set of physical interfaces (member links) of the same type—either POS or Ethernet but not a mix of both, and VLANs over Ethernet Bundle interface. All features supported on TE tunnels over physical interfaces are supported on TE tunnels over bundle interfaces. In this feature, FRR, which switches traffic to take the backup path, is triggered when the number of active member links or the total bandwidth of active links falls below the configured thresholds.

Cisco XR 12000 Series Router Features

The following are new features in Cisco IOS XR Software Release 3.4.1 supported only on the Cisco XR 12000 Series Router platform:

Onboard Fault Logging (OBFL)—A complete list of errors, failures, and faults are logged on failed cards that are returned to Cisco. OBFL configuration and hw-module commands work on Cisco XR 12000 Series Routers.

Ethernet over MPLS—Ethernet over MPLS (EoMPLS) provides a tunneling mechanism for Ethernet traffic through an MPLS-enabled Layer 3 core.

QoS on EoMPLS—Matching VLAN and all MqC; modular QoS on CLI.

Ethernet Port Mode—In Ethernet port mode, both ends of the pseudowire are connected to Ethernet ports.

VLAN Mode—VLAN mode provides Ethernet VLAN-to-VLAN connectivity.

QinQ Mode—In QinQ mode, each customer edge VLAN is carried by a service provider VLAN.

QinAny Mode—In the QinAny mode, the service provider VLAN (outer) tag is configured on both the ingress and the egress nodes of the provider edge VLAN.

Multilink PPP—Multilink Point-to-Point Protocol (MLPPP) provides a method for combining multiple physical links into one logical link. The following new commands were added:

ppp multilink minimum-active links

bundle

multilink fragment-size

multilink group

multilink

New MIBs:

DS3-MIB (RFC 2496)

CISCO-DS3-MIB (extension to RFC 2496)

Cisco XR 12000 Series Router Services

Session Border Controller (SBC):

Adjacency Groups

Codec Restriction

Data Border Element (DBE) Overload

DoS Prevention and Dynamic Blacklisting

Early Media

Fax Support

Header Whitelisting and Blacklisting

IP Packet Marking

Media Address Pools

Media Bypass

Method Whitelisting and Blacklisting

Passthrough Codec

Policy Failure Statistics

SIP 3xx

SIP Call Hold

SIP Call Transfer

SIP Digest

SIP Tel URI

SIP Timer

Unexpected Source Address Alarming

Routing Policy Enhancements

SIP TLS

SIP Outbound Authentication


Note For the Routing Policy Enhancements, SIP TLS, and SIP Outbound Authentication features, contact your Cisco SE for scale information.


New Hardware Features Supported in Cisco IOS XR Software Release 3.4.1

The following are new hardware features supported in Cisco IOS XR Software Release 3.4.1:

Cisco CRS-1 Hardware Features

22-Port Shelf Controller Gigabit Ethernet—Brings external switching capability on to the SC-GE-22 boards, eliminating entirely Catalyst 65xx, adding ease of configuration and better manageability for a MC control network.

SPA 2XT3E3/4XT3E3—Serial SPAs that support HDLC/PPP encapsulation. The SPAs come in both 2 Port and 4 Port versions. Each SPA can be operated in dual mode (T3 or E3) and the mode is changed using the software. In T3 mode the SPA operates at 44210 Kbit and in E3 mode it operates at 34010 Kbit.

1xOC192-POS-VSR (SPA)—Identical to the 1XOC192-XFP SPA in all respects except for the Optics used on this SPA. The Optics type used on this SPA is Very Short Range (VSR) and is non-pluggable.

Cisco XR 12000 Series Router Hardware Features

2-Port Gigabit Ethernet Shared Port Adapter

See the following documents for detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs):

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.4.1

Cisco IOS XR Interface and Hardware Components Configuration Guide, Release 3.4.0

Important Notes

In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

When upgrading a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the upgrade instructions provided to minimize traffic impact. For detailed instructions, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router, document for procedures.

Follow the instructions provided by Cisco for all card removal and replacement (fabric cards, line cards, fan controller and RP, and so on) to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

If you intend to test beyond the combined maximum configuration tested and published by Cisco, please contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your testing.

Cisco SIP-600 line cards (for the Cisco XR 12000 Series Router) draw more power than previous line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

Open Caveats—Release 3.4.1

This section lists the caveats for Cisco IOS XR Software Release 3.4.1. The caveats are organized as follows:

Quality of Service (QoS) Units of Measure Changes

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Quality of Service (QoS) Units of Measure Changes

Since the default units of measure may no longer be the same, care must be taken when taking a configuration earlier than Cisco IOS XR Software Release 3.3.0 and applying it to Cisco IOS XR Software Release 3.3.0 or later. Table 7 lists the changes to QoS units of measure.

Table 7 Changes to Quality of Service Units of Measure 

Command
Cisco IOS XR Release 3.2 (Default)
Cisco IOS XR Release 3.3.x and Cisco IOS XR Release 3.4.x (Default)

bandwidth

kbps

kbps

police rate

kbps

bps (change)

queue-limit

bytes

packets (change)

random-detect

bytes

packets (change)

shape average

kbps

packets (change)



Note The default units of measure (see Table 7) will be inserted into the QoS policy following the upgrade. This will result in a change to the policy's behavior. Therefore, manual review and keyword changes must be performed by the operator to ensure the policy operates as expected.


Keywords cannot be inserted into the running configuration on a router running Cisco IOS XR Release 3.2.x in advance of the upgrade. An option is to edit the configuration offline, and add the necessary keywords.


Note To make change to a QoS policy, the policy must first be removed from any interfaces making a reference to it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

When the policy is removed from any interfaces, the edited policy is applied. See the following Cisco IOS XR command reference sections:

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.3

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a008069e202.html

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.4

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a00806b06ab.html

Platform-Independent Caveats

The following caveats apply to both platforms:


Note Secure domain routers should be configured with lower case letters in order for specific installation operations to succeed. For more information, see the Cisco IOS XR Getting Started Guide, Release 3.4 on Cisco.com.


CSCse83983

Basic Description:

IA tunnel does NOT go down and come up on topo change in non-head area.

Symptom:

When IOS XR Release 3.4 MPLS Traffic Engineering node is a non-head area node and there is a topology change triggered either due to IGP link add/removal or any other topology change in the IGP (say) Level 1 to Level 2 for the links on that node. The inter-area tunnels originating from the Head and going via that link will NOT flap as a result of this topology change.

Conditions:

This behavior is seen in IOS XR Release 3.4 in a non-head area node and inter-area TE tunnel is being setup with loose hop in the path ERO.

Additional Notes:

Path verification and tunnel reoptimization indication are not done by the midpt ABR node. This is similar to the IOS behavior today. This feature will be added in a future release.

Workaround:

None.

CSCse97786

Basic Description:

L2VPN: Control word cant be set if PW is established with cbit=0

Symptom:

Router not sending Control Word even when Controlk word is enabled.

Conditions:

If a PW is established with cbit=0, and later using config we enabled control word or if neighbor sends a label mapping with control word cbit=1, IOX will still send cbit=0.

Workaround:

The workaround is to delete and reconfigure the PW on both the PE's

CSCse80235

Basic Description:

L2VPN: Support destination with Rtg ID different than LDP rtr Id

Symptom:

Can't establish PW to a non LDP router ID address

Conditions:

PW can be established on to the LDP router ID. Currently IOX does not support PW to non LDP router ID's

Workaround:

None

Cisco CRS-1-specific Caveats

The following caveats are specific to the Cisco CRS-1 platform:

CSCsd39371

Basic Description:

10GE requires XGXS reset after OIR of Xenpack (lane issue).

Symptom:

A 10 Gigabit interface may remain in a down/down state when attached to a no good port or with an external loopback applied.

The show controller tengige r/s/0/p mac output for the stuck interface will report the PLA is disabled and loopback is enabled.

RP/0/RP0/CPU0:crs#show controller tengig 0/0/0/3 mac

MAC (PLA) device is disabled

MAC (PLA) device is in promiscuous mode

MAC (PLA) device loopback is enabled

If the show controller tengige r/s/0/p xgxs command is issued, the DTE XGXS Status will report a value other than 0x801f. The Status of 0x801f indicates that the DTE XGXS is operating normally with the lanes in sync. A value other than 0x801f indicates a problem.

RP/0/RP1/CPU0:CRS-D#sh controller tengige 0/0/0/3 xgxs

DTE XGXS (BCM8011):

Control = 0x0000 Status = 0x801f

Dev ID 0 = 0x0040 Dev ID 1 = 0x6092

Control 2 = 0x202f

Status 2 = 0x8b01

This problem cannot be recovered with a shut/no shut of the interface or replacement of the XENPAK module.

Conditions:

This problem has been reported with 8X10GE PLIMs on a CRS-1 running Cisco IOS XR 3.2 and 3.3 releases. The trigger event that causes this condition is unknown.

Workaround:

To recover from this condition reload the linecard with hw-module location 0/X/CPU0 reload.

CSCsf97940

Basic Description:

Bad SPA should not cause SIP800 to reload due to SP critical alarms.

Symptom:

SIP800 reloads when a bad SPA is inserted.

Conditions:

It happens when a defective SPA is inserted into any slot of the SIP800 board.

Workaround:

None

CSCsg18108

Basic Description:

netio process restarts when trying to restore config from disk.

Symptom:

An unexpected Netio process termination may occur when trying to restore configuration from disk or when changing the encapsulation of an interface from ppp to hdlc and vice versa.

Conditions:

Condition1: If the router has POS or serial interfaces and the configuration is cleared using following commands:

commit replace

yes

end

And then restored back from disk, the netio process can terminate.

Condition 2: If the encapsulation of serial interface is changed repeatedly from ppp to hdlc and viceversa, and if the packets are being sent out of that interface at the same time, the netio process can terminate

Workaround:

Workaround for Condition 1: When loading the configuration from disk, make sure the POS and serial interfaces are in a shut-down state. Once the configuration is loaded, the interfaces can be enabled again.

Workaround for Condition 2: If there is a need to change the encaps of a serial or POS interface, shut the interface before changing the encapsulation. The interface can be enabled after the configuration change has been made.

CSCsh16962

Basic Description:

SONET SPA fails to insert/clear PRDI.

Symptom:

SONET SPA occasionally fails to handle PRDI.

- PRDI is not inserted while LOS is being detected.

- PRDI is not cleared when remote peer is restarted or shut/no shut the controller.

Conditions:

This is specific to the SONET SPA ((SONET PLIM is not affected).

Workaround:

shut/no shut the SONET controller on the SPA.

CSCsh45459

Basic Description:

Line protocol state for SONET controller should be admin-down after LC reload.

Symptom:

When shutting down the SONET controller, Intf/LineP state shown in show controllers sonet should be admin-down/admin-down. However, LineP goes to the down state after LC reload.

Conditions:

After the LC reload.

Workaround:

No shutdown the controller once then shutdown it again.

CSCsh48689

Basic Description:

Unable to upgrade FPD for oc3/12 SPA.

Symptom:

FPGA upgrade may fail on OC3/12 SPA in a named SDR.

Conditions:

Normal operation.

Workaround:

Move the card in owner SDR, upgrade the FPGA and move it back to the named SDR.

CSCsh50644

Basic Description:

Continuos cons log %L2-ether_spa_plugin-6-ERRORRECOVER after spa pow up.

Symptom:

Traceback messages "%L2-ether_spa_plugin-6-ERRORRECOVER" may appear on console sporadically for about 3 minutes after power cycling the 8x1 GigE SPA and all traffic on the SPA will be dropped.

Conditions:

Need to power down and power up the 8x1 GigE SPA.

Workaround:

Reload the affected Line card using the fhw-mod loc $loc reload command.

CSCsh54040

Basic Description:

SPA-OC48: MSC Crash after loopback internal.

Symptom:

MSC Crash happens when you enable the loopback internal feature on the interface on OC48 SPA which has the clock source line feature configured.

Conditions:

When you enable the loopback internal feature on the interface of the OC48 SPA which has the clock source line configured.


Note We do not recommend this configuration.


Workaround:

Use the clock source internal command when you enable the loopback internal feature.

Cisco XR 12000 Series Router-specific Caveats

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsg19005

Basic Description:

Config roll back does not restore the configs completely.

Symptom:

Configuration rollback does not restore the full configuration if used after using the commit replace CLI. When configuration rollback to latest rollback point is used, the configuration restoration does not work properly.

Conditions:

This is observed with a large-scale configuration:

up to 60 cdp-enabled interfaces

up to 112 ospf adjacencies

in excess of 10,000 static routes

up to 4000 interfaces on a given line card

Workaround:

Copy the config from backup.

example: copy disk0: router-config running config

Further Problem Description:

Using this command can actually make all the config lost.

CSCsh11593

Basic Description:

Enabling CDP globally on peer [IOS]router flaps a E3-Tetra interface on.

Symptom:

Interface flaps on the connected Cisco IOS XR router, when CDP is enabled globally on Cisco IOS Router.

Conditions:

When an interface is enabled with CDP on a Sashimi line card on Cisco IOS router and when the CDP is enabled globally on Cisco IOS router than the connected interface on the Cisco IOS XR router flaps.

Workaround:

Its a one time flap and there is no work around.

Resolved Cisco IOS XR Software PSIRT-Related Caveats

CSCti62211

Basic Description:

BGP flaps due to unknown attribute

Symptom:

Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

Conditions:

Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending to neighboring devices, but neighboring devices may be running operating systems other than Cisco IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. This is per standards defining the operation of BGP.

Workaround:

No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free software maintenance upgrades (SMUs) progressively starting 28 August 2010.

A Security Advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml

Upgrading Cisco IOS XR Software

The following URL links to online information that describes how to upgrade Cisco IOS XR software on Cisco CRS-1 and Cisco XR 12000 Series Router systems from earlier releases to Release 3.4.1:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html


Note Before you install or upgrade the software, you must upgrade the ROM Monitor software to the correct version. If a Cisco CRS-1 system running Cisco IOS XR software Release 3.4.1 is brought up with the incorrect ROM Monitor software, the standby RP fails to boot and an error message appears. For information on correct ROM Monitor software on a single-shelf router, see "Upgrading and Downgrading ROM Monitor Software on Cisco CRS-1 Routers" in Cisco IOS XR ROM Monitor Guide.


Troubleshooting

See the Cisco IOS XR Getting Started Guide for information on troubleshooting the Cisco IOS XR software.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. These documents consist of hardware and software installation guides, Cisco IOS XR software configuration and command references, feature modules, and other documents.

Documentation is available as electronic documents, which are available online on Cisco.com.

Use these release notes with these documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at the following URLs:

Cisco CRS-1 Routers:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Routers:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR software documentation set consists of the Cisco IOS XR software configuration guides and command references, a getting started guide, and other supporting documents. See the About Cisco IOS XR Software Documentation for Release 3.4.0 for a list of Cisco IOS XR software documentation for Release 3.4.1.

You can find the most current software documentation at the following URL:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.

Cisco.com

You can access the most current Cisco documentation at this URL:

http://www.cisco.com/techsupport

You can access the Cisco website at this URL:

http://www.cisco.com

You can access international Cisco websites at this URL:

http://www.cisco.com/public/countries_languages.shtml

Product Documentation DVD

The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:

http://www.cisco.com/univercd/home/home.htm

The Product Documentation DVD is created and released regularly. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

Ordering Documentation

You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:

http://www.cisco.com/go/marketplace/docstore

If you do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do

Documentation Feedback

You can provide feedback about Cisco technical documentation on the Cisco Support site area by entering your comments in the feedback form available in every online document.

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

From this site, you will find information about how to do the following:

Report security vulnerabilities in Cisco products

Obtain assistance with security incidents that involve Cisco products

Register to receive security information from Cisco

A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:

http://www.cisco.com/go/psirt

To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:

http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:

For emergencies only — security-alert@cisco.com

An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

For nonemergencies — psirt@cisco.com

In an emergency, you can also reach PSIRT by telephone:

1 877 228-7302

1 408 525-6532


Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.

Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

The link on this page has the current PGP key ID in use.

If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.


Product Alerts and Field Notices

Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive these announcements by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.

To access the Product Alert Tool, you must be a registered Cisco.com user. Registered users can access the tool at this URL:

http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en

To register as a Cisco.com user, go to this URL:

http://tools.cisco.com/RPF/register/register.do

Obtaining Technical Assistance

Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Support website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.

Cisco Support Website

The Cisco Support website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:

http://www.cisco.com/en/US/support/index.html

Access to all tools on the Cisco Support website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:

http://tools.cisco.com/RPF/register/register.do


Note Before you submit a request for service online or by phone, use the Cisco Product Identification Tool to locate your product serial number. You can access this tool from the Cisco Support website by clicking the Get Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.



Tip Displaying and Searching on Cisco.com

If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.

To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. After using the Search box on the Cisco.com home page, click the Advanced Search link next to the Search box on the resulting page and then click the Technical Support & Documentation radio button.

To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.


Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:

http://www.cisco.com/techsupport/servicerequest

For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

To open a service request by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411
Australia: 1 800 805 227
EMEA: +32 2 704 55 55
USA: 1 800 553 2447

For a complete list of Cisco TAC contacts, go to this URL:

http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

Severity 1 (S1)—An existing network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

The Cisco Online Subscription Center is the website where you can sign up for a variety of Cisco e-mail newsletters and other communications. Create a profile and then select the subscriptions that you would like to receive. To visit the Cisco Online Subscription Center, go to this URL:

http://www.cisco.com/offer/subscribe

The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:

http://www.cisco.com/go/guide

Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:

http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training, and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:

http://www.ciscopress.com

Internet Protocol Journal is a quarterly journal published by Cisco for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/ipj

Networking products offered by Cisco, as well as customer support services, can be obtained at this URL:

http://www.cisco.com/en/US/products/index.html

Networking Professionals Connection is an interactive website where networking professionals share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:

http://www.cisco.com/discuss/networking

"What's New in Cisco Documentation" is an online publication that provides information about the latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of "What's New in Cisco Documentation" at this URL:

http://www.cisco.com/univercd/cc/td/doc/abtunicd/136957.htm

World-class networking training is available from Cisco. You can view current offerings at this URL:

http://www.cisco.com/en/US/learning/index.html