Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.4.2

  • Viewing Options

  • PDF (550.5 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.4.2

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.4.2

Contents

Introduction

System Requirements

Cisco CRS-1 Requirements

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Determining the Software Version

Supported Firmware Code

Cisco XR 12000 Series Router Requirements

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Determining the Software Version

Supported Firmware Code

New and Changed Information

Important Notes

Caveats

Open Caveats—Release 3.4.2

Quality of Service Units of Measure Changes

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Resolved Cisco IOS XR Software PSIRT-Related Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation, Obtaining Support, and Security Guidelines


Release Notes for Cisco IOS XR Software Release 3.4.2


March 19, 2013

Cisco IOS XR Software Release 3.4.2

Text Part Number OL-13467-02


Note For important information about Cisco IOS XR Software Release 3.4.2, see the "Important Notes" section.



Note You can find the Cisco IOS XR software documentation on the World Wide Web at http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html. These electronic documents may contain updates and modifications. See the "Obtaining Documentation, Obtaining Support, and Security Guidelines" section for more information on obtaining Cisco documentation.


These release notes describe the features provided in Cisco IOS XR Software Release 3.4.2 and are updated as needed.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.4.2, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected, at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation, Obtaining Support, and Security Guidelines

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Layer 2 virtual private network (L2VPN), and Layer 3 VPN (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally, the operating systems support modular QoS command-line interface (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; authentication, authorization, and accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); and Simple Network Management Protocol Versions 3 (SNMPv3). Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works interface (CWI)—The CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

In Service Software Upgrade (ISSU)—Supports a modular-packaging-based release model to minimize impact of upgrades and supports ISSU with NSF, where possible.

SDR—Secure domain router (SDR) is a full-function router that is partitioned from one physical router running IOS XR. Each SDR can act as an independent router and perform all routing function as a physically separate router. SDR provides hardware fault isolation amongst other SDR running in router. SDR shares limited resource, such as fabric, power, and cooling. SDR allows multiple end-to-end service specific network aggregation on one physical router. SDR allows the ability to collapse many smaller service routers into one system. At a minimum, a management node such as RP/DRP and line card is needed to create SDR. SDR provides levels of isolation where a bug fix patch can be installed on an SDR without affecting other SDRs. SDRs interconnect using physical line card ports.

System Requirements

The Cisco IOS XR Software Release 3.4.2 is supported on the following platforms:

Cisco CRS-1 Requirements

Cisco XR 12000 Series Router Requirements

Cisco CRS-1 Requirements

This section describes the system requirements for Cisco IOS XR Software Release 3.4.2 supported on Cisco CRS-1 routers and includes the following information:

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Determining the Software Version

Supported Firmware Code

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.2 features. Table 1 and Table 2 list the Cisco IOS XR software feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.4.2 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.4.2

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.vm-3.4.2

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.4.2

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.4.2

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, RSVP, Layer 2 VPN, and Layer 3 VPN.

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.4.2

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD), and BIDIR-PIM.

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.4.2

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Documentation Package

hfr-doc.pie-3.4.2

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

hfr-fpd.pie-3.4.2

Firmware for ROM Monitor and Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.4.2

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.4.2.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.4.2.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR software Release 3.4.2 are:

2 GB memory on the route processors (RPs)

2 GB memory on the modular services cards (MSCs)

Supported Hardware

Cisco IOS XR Software Release 3.4.2 supports Cisco CRS-1 routers. All hardware features are supported in Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

For the hardware components supported on the platform, minimum software versions required, and the compatibility matrix, see the Software/Firmware Compatibility Matrix at: http://www.cisco.com/web/Cisco_IOS_XR_Software

Software Compatibility

Cisco IOS XR Software Release 3.4.2 is compatible with the Cisco CRS-1 systems:

Cisco CRS-1 4-slot line card chassis

Cisco CRS-1 8-slot line card chassis

Cisco CRS-1 16-slot line card chassis

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.4.2[00]
Copyright (c) 2007 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 1.45(20070510:194146) [CRS-1 ROMMON],  
 
   
Router uptime is 1 hour, 11 minutes
System image file is "disk0:hfr-os-mbi-3.4.2/mbihfr-rp.vm"
 
   
cisco CRS-8/S (7457) processor with 4194304K bytes of memory.
7457 processor at 1197Mhz, Revision 1.2
 
   
4 DWDM controller(s)
8 GigabitEthernet/IEEE 802.3 interface(s)
2 Ethernet/IEEE 802.3 interface(s)
17 Packet over SONET/SDH network interface(s)
17 SONET/SDH Port controller(s)
12 TenGigabitEthernet/IEEE 802.3 interface(s)
2043k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
1000592k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
 
   
Configuration register on node 0/RP0/CPU0 is 0x102
Boot device on node 0/RP0/CPU0 is disk0:
Package active on node 0/RP0/CPU0:
hfr-fpd, V 3.4.2[00], Cisco Systems, at disk0:hfr-fpd-3.4.2
    Built on Wed Jun 27 21:58:29 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-doc, V 3.4.2[00], Cisco Systems, at disk0:hfr-doc-3.4.2
    Built on Wed Jun 27 21:58:51 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-diags, V 3.4.2[00], Cisco Systems, at disk0:hfr-diags-3.4.2
    Built on Wed Jun 27 21:57:59 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mgbl, V 3.4.2[00], Cisco Systems, at disk0:hfr-mgbl-3.4.2
    Built on Wed Jun 27 21:10:18 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mcast, V 3.4.2[00], Cisco Systems, at disk0:hfr-mcast-3.4.2
    Built on Wed Jun 27 21:21:23 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mpls, V 3.4.2[00], Cisco Systems, at disk0:hfr-mpls-3.4.2
    Built on Wed Jun 27 21:13:32 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-rout, V 3.4.2[00], Cisco Systems, at disk0:hfr-rout-3.4.2
    Built on Wed Jun 27 21:21:56 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-k9sec, V 3.4.2[00], Cisco Systems, at disk0:hfr-k9sec-3.4.2
    Built on Wed Jun 27 21:50:37 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-lc, V 3.4.2[00], Cisco Systems, at disk0:hfr-lc-3.4.2
    Built on Wed Jun 27 21:22:14 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-fwdg, V 3.4.2[00], Cisco Systems, at disk0:hfr-fwdg-3.4.2
    Built on Wed Jun 27 21:21:54 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.4.2[00], Cisco Systems, at disk0:hfr-admin-3.4.2
    Built on Wed Jun 27 21:22:14 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.4.2[00], Cisco Systems, at disk0:hfr-base-3.4.2
    Built on Wed Jun 27 21:23:50 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.4.2[00], Cisco Systems, at disk0:hfr-os-mbi-3.4.2
    Built on Wed Jun 27 21:22:46 PDT 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/hfr/workspace for c2.95.3-p8
 
   

Supported Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.45.

The minimum CPUCNTRL version required for this release is 2.07.


Note For detailed information on ROMMON, see the Cisco IOS XR ROM Monitor Guide.


Cisco XR 12000 Series Router Requirements

This section describes the system requirements for Cisco IOS XR Software Release 3.4.2 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Determining the Software Version

Supported Firmware Code

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.2 features. Table 3 and Table 4 list the Cisco IOS XR software feature set matrix and associated filenames available for Cisco IOS XR Software Release 3.4.2 supported on the Cisco XR 12000 Series Router.

Table 3 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.pie-3.4.2

Contains the required core packages, including OS, Admin, Base, Line Cards, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.4.2

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.4.2

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.4.2

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.4.2

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.4.2

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.4.2

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.4.2

Session Border Controller Package for a Cisco XR 12000 Series Router.

Cisco IOS XR Service IPSec Controller Package

c12k-ipsec-service.pie-3.4.2

Support for service-ipsec and service-gre interfaces in Cisco IOS XR.

Cisco IOS XR Documentation Package

c12k-doc.pie-3.4.2

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

c12k-fpd.pie-3.4.2

Firmware for Cisco Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.4.2

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.


Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.4.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.4.2.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.4.2.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.4.2 are:

2-GB route memory on Performance Route Processor 2 (PRP-2)

1-GB ATA flash storage on PRP-2

1-GB line card route memory on all Engine 3 line cards

1-GB line-card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-600 is 1 GB

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB


Note The Performance Route Processor 1 (PRP-1) is not supported in production environments.


Supported Hardware

Cisco IOS XR Software Release 3.4.2 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 5 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Determining the Software Version" section.

Table 5 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Minimum Software Version Required
Cisco XR 12000 Series Router Line Card Chassis
 

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2.0

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2.0

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2.0

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2.0

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2.0

Cisco XR 12000 Series Router Chassis Hardware
 

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3.0

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3.0

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3.0

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3.0

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3.0

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 800Gbps Fabric Option (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric option can only be configured in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800

3.4.0

Enhanced 800-Gbps Fabric Kit (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800=

3.4.0

Enhanced 1280-Gbps Fabric Option (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric option can be configured only in the enhanced Cisco XR-12000 16-slot router with part number XR-12000/16.

12816E/1280

3.4.0

Enhanced 1280-Gbps Fabric Kit (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 16-slot router with part number XR-12000/16.

12816E/1280=

3.4.0

Cisco XR 12000 Series Router Interface and Router Processor Cards

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2.0

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC-12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2.0

Cisco XR 12000 Series 4xOC-12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2.0

Cisco XR 12000 Series 16xOC-3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2.0

Cisco XR 12000 Series 16xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2.0

Cisco XR 12000 Series 8xOC-3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 8xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2.0

Cisco XR 12000 Series 1xOC-48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2.0

Cisco XR 12000 Series 1xOC-48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2.0

Cisco XR 12000 Series 4-port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192-POS-VSR

3.2.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192-POS-LR

3.2.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192-POS-XFP

3.2.0

2-port OC-48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3.0

Cisco XR 12000 Series Router Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2.0

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2.0

Cisco 2-port Gigabit Ethernet Shared Port Adapter

SPA-2X1GE-V2

3.4.1

Cisco 5-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4.0

Cisco 8-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4.0

Cisco 8-port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4.0

Cisco 8-port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3.0

Cisco 10-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4.0

Cisco 1-port 10 Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4.0

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4.0

Cisco 5-port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2.0

Cisco 10-port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2.0

Cisco 1-port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2.0

Cisco Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3.0

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3.0

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3.0

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.2 is compatible with the following Cisco IOS XR Series  Router systems:

Cisco IOS XR 12404 Router

Cisco IOS XR 12406 Router

Cisco IOS XR 12410 Router

Cisco IOS XR 12416 Router

Cisco IOS XR 12810 Router

Cisco IOS XR 12816 Router

For the existing installed base, the following chassis are supported:

Cisco 12006 Router

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router

Determining the Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/0/CPU0:router# show version
 
   

The following version information is displayed:

Cisco IOS XR Software, Version 3.4.2[00]
Copyright (c) 2007 by cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20041108:104740) [ashp-cisp-rommon 1.16dev(0.1)] 
DEVELOPMENT SOFTWARE
Copyrigh,  Inc.
 
   
ds-gsr-1 uptime is 1 hour, 27 minutes
System image file is "disk0:c12k-os-mbi-3.4.2/mbiprp-rp.vm"
 
   
cisco 12416/PRP (7457) processor with 2097152K bytes of memory.
7457 processor at 1265Mhz, Revision 1.1
 
   
2 Cisco 12000 Series SPA Interface Processor-601/501/401
1 Cisco 12000 Series - Multi-Service Blade Controller
3 Cisco 12000 4 Port Gigabit Ethernet Controllers (12 GigabitEthernet)
2 Cisco 12000 Series Performance Route Processors
17 GigabitEthernet/IEEE 802.3 interface(s)
3 Ethernet/IEEE 802.3 interface(s)
1 Controller for the management of multilink interfacess
28 Multilink network interface(s)
11 PLIM QoS controller(s)
2 Packet over SONET/SDH network interface(s)
56 Serial network interface(s)
2 SONET/SDH Port controller(s)
56 T1 Port controller(s)
4 T3 Port controller(s)
2042k bytes of non-volatile configuration memory.
977M bytes of compact flash card.
38145M bytes of hard disk.
1000544k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Boot device on node 0/0/CPU0 is mem:
Package active on node 0/0/CPU0:
c12k-sbc, V 3.4.2[00], Cisco Systems, at disk0:c12k-sbc-3.4.2
    Built on Thu Jun 28 03:40:37 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-ipsec-service, V 3.4.2[00], Cisco Systems, at disk0:c12k-ipsec-service-3.4.2
    Built on Thu Jun 28 00:20:12 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-diags, V 3.4.2[00], Cisco Systems, at disk0:c12k-diags-3.4.2
    Built on Thu Jun 28 01:43:36 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-mcast, V 3.4.2[00], Cisco Systems, at disk0:c12k-mcast-3.4.2
    Built on Wed Jun 27 23:51:14 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-mpls, V 3.4.2[00], Cisco Systems, at disk0:c12k-mpls-3.4.2
    Built on Wed Jun 27 23:50:47 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-k9sec, V 3.4.2[00], Cisco Systems, at disk0:c12k-k9sec-3.4.2
    Built on Wed Jun 27 23:52:08 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-lc, V 3.4.2[00], Cisco Systems, at disk0:c12k-lc-3.4.2
    Built on Wed Jun 27 22:15:19 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-fwdg, V 3.4.2[00], Cisco Systems, at disk0:c12k-fwdg-3.4.2
    Built on Wed Jun 27 22:14:10 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
 
   
c12k-admin, V 3.4.2[00], Cisco Systems, at disk0:c12k-admin-3.4.2
    Built on Wed Jun 27 22:13:13 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.4.2/c12k/workspace for c2.95.3-p8
.
.
.

Supported Firmware Code

The following minimum firmware code is supported by the Cisco XR 12000 Series Router:

LCs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 17.1

Fabric Downloader version 6.5 (ROM version is 6.5)

RPs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 1.14

New and Changed Information

No new software or hardware features are introduced in Cisco IOS XR Software Release 3.4.2.


Note For the Routing Policy Enhancements, SIP TLS, and SIP Outbound Authentication features, contact your Cisco SE for scale information.


See the following documents for detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs):

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.4.0

Cisco IOS XR Interface and Hardware Components Configuration Guide, Release 3.4.0

Important Notes

In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

When upgrading a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the upgrade instructions provided to minimize traffic impact. For detailed instructions, see the Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router document for procedures.

Follow the instructions provided by Cisco for all card removal and replacement (fabric cards, line cards, fan controller and RP, and so on) to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

If you intend to test beyond the combined maximum configuration tested and published by Cisco, contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your testing.

Cisco SIP-600 line cards (for the Cisco XR 12000 Series Router) draw more power than previous line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered off for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.



Note When using the HW-Module location all reload command, VLAN ARP is not resolved, and pings on 5-port Ethernet SPA fails. To resolve this issue, load SMU (CSCsj33183), which is available at: http://www.cisco.com/cgi-bin/tablebuild.pl/iosxr-smu.


Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

Open Caveats—Release 3.4.2

This section lists the caveats for Cisco IOS XR Software Release 3.4.2. The caveats are organized as follows:

Quality of Service Units of Measure Changes

Platform-Independent Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-specific Caveats

Quality of Service Units of Measure Changes

Because the default units of measure may no longer be the same, care must be taken when taking a configuration earlier than Cisco IOS XR Software Release 3.3.0 and applying it to Cisco IOS XR Software Release 3.3.0 or later. Table 6 lists the changes to Quality of Service (QoS) units of measure.

Table 6 Changes to Quality of Service Units of Measure 

Command
Cisco IOS XR Release 3.2 (Default)
Cisco IOS XR Release 3.3.x and Cisco IOS XR Release 3.4.x (Default)

bandwidth

kbps

kbps

police rate

kbps

bps (change)

queue-limit

bytes

packets (change)

random-detect

bytes

packets (change)

shape average

kbps

packets (change)



Note The default units of measure (see Table 6) will be inserted into the QoS policy following the upgrade. This will result in a change to the policy's behavior. Therefore, manual review and keyword changes must be performed by the operator to ensure the policy operates as expected.


Keywords cannot be inserted into the running configuration on a router running Cisco IOS XR Release 3.2.x in advance of the upgrade. An option is to edit the configuration offline, and add the necessary keywords.


Note To make change to a QoS policy, the policy must first be removed from any interfaces making a reference to it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

When the policy is removed from any interfaces, the edited policy is applied. See the following Cisco IOS XR command reference sections:

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.3

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a008069e202.html

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.4

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a00806b06ab.html

Platform-Independent Caveats

The following caveats apply to Cisco CRS-1 and Cisco XR 12000 Series Routers:


Note Secure domain routers should be configured with lower case letters in order for specific installation operations to succeed. For more information, see the Cisco IOS XR Getting Started Guide, Release 3.4 on Cisco.com.


CSCse83983

Basic Description:

IA tunnel does NOT go down and come up on topo change in non-head area.

Symptom:

When IOS XR Release 3.4 MPLS Traffic Engineering node is a non-head area node and there is a topology change triggered either due to IGP link add/removal or any other topology change in the IGP (say) Level 1 to Level 2 for the links on that node. The inter-area tunnels originating from the Head and going via that link will NOT flap as a result of this topology change.

Conditions:

This behavior is seen in IOS XR Release 3.4 in a non-head area node and inter-area TE tunnel is being setup with loose hop in the path ERO.

Additional Notes:

Path verification and tunnel reoptimization indication are not done by the midpt ABR node. This is similar to the IOS behavior today. This feature will be added in a future release.

Workaround:

None.

CSCse97786

Basic Description:

L2VPN: Control word cant be set if PW is established with cbit=0

Symptom:

Router not sending Control Word even when Controlk word is enabled.

Conditions:

If a PW is established with cbit=0, and later using config we enabled control word or if neighbor sends a label mapping with control word cbit=1, IOX will still send cbit=0.

Workaround:

The workaround is to delete and reconfigure the PW on both the PE's

CSCse80235

Basic Description:

L2VPN: Support destination with Rtg ID different than LDP rtr Id

Symptom:

Can't establish PW to a non LDP router ID address

Conditions:

PW can be established on to the LDP router ID. Currently IOX does not support PW to non LDP router ID's

Workaround:

None

CSCsi59202

Basic Description:

`show mpls lsd forwarding' displays invalid format_tbl:136

Symptom:

`show mpls lsd forwarding' displays invalid format_tbl:136

Conditions:

Under normal scenarios.

Workaround:

There is no workaround for this as of now.

Cisco CRS-1-specific Caveats

The following caveats are specific to the Cisco CRS-1 platform:

CSCsg18108

Basic Description:

netio process restarts when trying to restore config from disk.

Symptom:

An unexpected Netio process termination may occur when trying to restore configuration from disk or when changing the encapsulation of an interface from ppp to hdlc and vice versa.

Conditions:

Condition1: If the router has POS or serial interfaces and the configuration is cleared using following commands:

commit replace

yes

end

And then restored back from disk, the netio process can terminate.

Condition 2: If the encapsulation of serial interface is changed repeatedly from ppp to hdlc and viceversa, and if the packets are being sent out of that interface at the same time, the netio process can terminate

Workaround:

Workaround for Condition 1: When loading the configuration from disk, make sure the POS and serial interfaces are in a shut-down state. Once the configuration is loaded, the interfaces can be enabled again.

Workaround for Condition 2: If there is a need to change the encaps of a serial or POS interface, shut the interface before changing the encapsulation. The interface can be enabled after the configuration change has been made.

CSCsh45459

Basic Description:

Line protocol state for SONET controller should be admin-down after LC reload.

Symptom:

When shutting down the SONET controller, Intf/LineP state shown in show controllers sonet should be admin-down/admin-down. However, LineP goes to the down state after LC reload.

Conditions:

After the LC reload.

Workaround:

No shutdown the controller once then shutdown it again.

CSCsh48689

Basic Description:

Unable to upgrade FPD for oc3/12 SPA.

Symptom:

FPGA upgrade may fail on OC3/12 SPA in a named SDR.

Conditions:

Normal operation.

Workaround:

Move the card in owner SDR, upgrade the FPGA and move it back to the named SDR.

CSCsj09823

Basic Description:

syslogd process crashed.

Symptom:

syslogd process crashed.

Conditions:

The logging level was debug and cctl debugs were enabled.

Workaround:

The syslogd process was automatically restarted.

CSCsj24973

Basic Description:

After FailOver instdir process crashed twice on RP.

Symptom:

After FailOver instdir process crashed twice on RP.

Conditions:

Active RP reload.

Workaround:

None. The instdir process was restarted after the two crashed.

CSCsj10619

Basic Description:

Garbled character of authentication string on "show vrrp detail".

Symptom:

The last portion of the string value for "show vrrp detal" command is garbled.

Conditions:

When the eight alphanumeric characters are used by "authentication string" for VRRP.

Workaround:

None. The string value of "show vrrp detail" is normal when the alphanumeric characters from one to seven are used for authentication.

Cisco XR 12000 Series Router-specific Caveats

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsj08727

Basic Description:

CEF is inconsistent on active and standby RP.

Symptom:

After "hw-module reload loc all" on dual rp system when mgmt subnet has multiple interfaces mgmt-1 on actv rp and mgmt-2 on sby rp, it is possible that CEF entry for a nbr hanging of this connected subnet can be criss-crossed on act/sby rp. As result of this when pkt to such nbr is to be sent out of rtr, it can loop between Act/Sby rp and result in high cpu util on act/sby rp (fabric_driver_rp).

Conditions:

This happens only when we execute "hw-module reload loc all" on a router which has dual RP card.

Recovery:

shut/unshut of mgmt interface of the standby rp.

CSCsi46306

Basic Description:

ipv4_io_ea times out during commit replace due to FIB

Symptom:

commit replace from an empty config to a scaled config like FR with 4k DLCIs causes ipv4_io_ea timeout.

Conditions:

The user has to have an empty or minimal config and swtch to the scaled config like FR with 4k DLCIs.

Workaround:

None.

CSCsj21527

Basic Description:

acl not getting attached to the interface

Symptom:

When we do a SPA OIR follwoed by a redundancy switchover and if the SPA interfaces are going to have ACL configs attached to its interfaces we will hit with this issue.

Conditions:

This only happens if the following 2 conditions are met
1.If you have acl configs attached to the interfaces of a SPA.
2.and if you a do SPA OIR immediately followed by a redundancy switchover.

Recovery:

Reapply the acl configs into the interfaces after the redundancy switchover.

CSCsj19998

Basic Description:

qos service policies not getting attached to interface after SPA OIR

Symptom:

When we do a SPA OIR follwoed by a redundancy switchover and if the SPA interfaces are going to have qos service policy configs attached to its interfaces we will hit with this issue.

Conditions:

This only happens if the following 2 conditions are met
1.If you have qos service policy configs attached to the interfaces of a SPA.
2.and if you a do SPA OIR immediately followed by a redundancy switchover.

Recovery:

Reapply the qos service policy configs into the interfaces after the redundancy switchover.

Resolved Cisco IOS XR Software PSIRT-Related Caveats

CSCti62211

Basic Description:

BGP flaps due to unknown attribute

Symptom:

Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

Conditions:

Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending to neighboring devices, but neighboring devices may be running operating systems other than Cisco IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. This is per standards defining the operation of BGP.

Workaround:

No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free software maintenance upgrades (SMUs) progressively starting 28 August 2010.

A Security Advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml

Upgrading Cisco IOS XR Software

The following URL links to online information that describes how to upgrade Cisco IOS XR software on Cisco CRS-1 and Cisco XR 12000 Series Router systems from earlier releases to Release 3.4.2 at http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html


Note Before you install or upgrade the software, you must upgrade the ROM Monitor software to the correct version. If a Cisco CRS-1 system running Cisco IOS XR software Release 3.4.2 is brought up with the incorrect ROM Monitor software, the standby RP fails to boot and an error message appears. For information on correct ROM Monitor software on a single-shelf router, see "Upgrading and Downgrading ROM Monitor Software on Cisco CRS-1 Routers" in the Cisco IOS XR ROM Monitor Guide.


Troubleshooting

See the Cisco IOS XR Getting Started Guide for information on troubleshooting the Cisco IOS XR software.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. These documents consist of hardware and software installation guides, Cisco IOS XR software configuration and command references, feature modules, and other documents.

Documentation is available as electronic documents, which are available online on Cisco.com.

Use these release notes with these documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at:

Cisco CRS-1 Routers:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Routers:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR software documentation set consists of the Cisco IOS XR software configuration guides and command references, a getting started guide, and other supporting documents. See the About Cisco IOS XR Software Documentation for Release 3.4.0 for a list of Cisco IOS XR software documentation for Release 3.4.2.

You can find the most current software documentation at:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

lhttp://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.htm

© 2008 Cisco Systems, Inc. All rights reserved.