Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.4.3

  • Viewing Options

  • PDF (575.3 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.4.3

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.4.3

Contents

Introduction

Cautions

System Requirements

Cisco CRS-1

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Supported Firmware Code

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Supported Firmware Code

Determining Your Software Version

Cisco CRS-1 Series Router

Cisco XR 12000 Series Router

New and Changed Information

Important Notes

Caveats

Quality of Service Units of Measure Changes

Platform-Independent Caveats

Caveats Specific to Cisco CRS-1

Caveats Specific to Cisco XR 12000 Series Router

Resolved Cisco IOS XR Software PSIRT-Related Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation and Submitting a Service Request

Open Source License Acknowledgements

OpenSSL/OpenSSL Project

License Issues


Release Notes for Cisco IOS XR Software Release 3.4.3


March 19, 2013

Cisco IOS XR Software Release 3.4.3

Text Part Number OL-15745-02


Note Please see the "Cautions" section and the "Important Notes" section for important information on Cisco IOS XR Software Release 3.4.3.


These release notes describe the features provided in Cisco IOS XR software for the current release and are updated as needed.

For a list of caveats that apply to Cisco IOS XR software for the current release, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We also recommend that you view the field notices for this release to see if your software or hardware platforms are affected at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

Cautions

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation and Submitting a Service Request

Open Source License Acknowledgements

Introduction

Cisco IOS XR software is a distributed operating system that provides the following features:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Routing Information Protocol (RIP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Layer 2 virtual private network (L2VPN), and Layer 3 VPN (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally, the operating systems support modular QoS command-line interface (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; authentication, authorization, and accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); and Simple Network Management Protocol Versions 3 (SNMPv3). Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works Interface (CWI)—The CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

For a detailed list of new features by platform for Cisco IOS XR software for the current release, see the "New and Changed Information" section.

Cautions

Carefully observe all applicable safety procedures and warnings when dealing with potential hazardous energy sources.


Caution Hazardous energy may still be present when a DC FAIL alarm is active. The console message of Low or No Input Voltage detected is generated when voltage reaches 40 volts +/- 1 volt. The command show-env-power is inaccurate at that voltage level and may show 0.0 for the readings. Before performing any maintenance, measure Battery and Return with a volt ohm meter on all failed PEMS.

System Requirements

To learn about Cisco IOS XR software system requirements for the current release that affect your router, and to find out which software version your router is running, see the following modules:

Cisco CRS-1

Cisco XR 12000 Series Router

Determining Your Software Version

Cisco CRS-1

This module describes the system requirements for Cisco IOS XR software for the current release for Cisco CRS-1 routers:

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Supported Firmware Code

To determine the software versions or levels of your current system, see Determining Your Software Version.

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.3 features. Table 1 and Table 2 list the Cisco IOS XR feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.4.3 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR SoftwareRelease 3.4.3 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.4.3

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.vm-3.4.3

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.4.3

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.4.3

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, RSVP, Layer 2 VPN, and Layer 3 VPN.

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.4.3

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD), and BIDIR-PIM.

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.4.3

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Documentation Package

hfr-doc.pie-3.4.3

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

hfr-fpd.pie-3.4.3

Firmware for ROM Monitor and Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.4.3

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.4.3 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.4.3.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.4.3.tar

Tar file containing:

Cisco IOS XR Diagnostic Package

Cisco IOS XR Documentation Package

Cisco IOS XR FPD Package

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR Software, Release 3.4.3 are the following:

2 GB of memory on the route processors (RPs)

2 GB of memory on the modular services cards (MSCs)

Supported Hardware

Cisco IOS XR Software for the current release supports Cisco CRS-1 routers. All hardware features are supported on Cisco IOS XR Software, subject to the memory requirements specified in "Memory Requirements."

For the hardware components supported on the platform, minimum software versions required, and the compatibility matrix, see the Software/Firmware Compatibility Matrix at: http://www.cisco.com/web/Cisco_IOS_XR_Software

Software Compatibility

Cisco IOS XR Software, Release 3.4.3 is compatible with the following Cisco CRS-1 systems:

Cisco CRS-1 4-slot line card chassis

Cisco CRS-1 8-slot line card chassis

Cisco CRS-1 16-slot line card chassis

Supported Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.45.

The minimum CPUCNTRL version required for this release is 2.07.


Note For detailed information on ROMMON, see the Cisco IOS XR ROM Monitor Guide.


Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software, Release 3.4.3 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Supported Hardware

Software Compatibility

Supported Firmware Code

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.4.3 features. Table 3 and Table 4 list the Cisco IOS XR feature set matrix and associated filenames available for current release and supported on the Cisco XR 12000 Series Router.

Table 3 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software Release 3.4.3 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.pie-3.4.3

Contains the required core packages, including OS, Admin, Base, Line Cards, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.4.3

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.4.3

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.4.3

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.4.3

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.4.3

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.4.3

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.4.3

Session Border Controller Package for a Cisco XR 12000 Series Router.

Cisco IOS XR Service IPSec Controller Package

c12k-ipsec-service.pie-3.4.3

Support for service-ipsec and service-gre interfaces in Cisco IOS XR.

Cisco IOS XR Documentation Package

c12k-doc.pie-3.4.3

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

c12k-fpd.pie-3.4.3

Firmware for Cisco Shared Port Adapters (SPA) supported in Cisco IOS XR software.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.4.3

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.


Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software Release 3.4.3 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.4.3.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.4.3.tar

Tar file containing:

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.4.3 follow:

2-GB route memory on performance route processor 2 (PRP-2)

1-GB ATA flash storage on PRP-2

1-GB line card route memory on all Engine 3 line cards

1-GB line-card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-600 is 1 GB

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB


Note The Performance Route Processor 1 (PRP-1) is not supported in production environments.


Supported Hardware

Cisco IOS XR Software Release 3.4.3 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software subject to the memory requirements specified in the "Memory Requirements" section.

Table 5 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Supported Firmware Code" section.

Table 5 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Minimum Software Version Required
Cisco XR 12000 Series Router Line Card Chassis
 

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2.0

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2.0

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2.0

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2.0

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2.0

Cisco XR 12000 Series Router Chassis Hardware
 

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3.0

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3.0

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3.0

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3.0

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3.0

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3.0

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3.0

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 800Gbps Fabric Option (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric option can only be configured in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800

3.4.0

Enhanced 800-Gbps Fabric Kit (5xSFC and 2xCSC) for Cisco 12810

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR-12000 10-slot router with part number XR-12000/10.

12810E/800=

3.4.0

Enhanced 1280-Gbps Fabric Option (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric option can be configured only in the enhanced Cisco XR-12000 16-slot router with part number XR-12000/16.

12816E/1280

3.4.0

Enhanced 1280-Gbps Fabric Kit (3xSFC and 2xCSC) for Cisco 12816

Note This Fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 16-slot router with part number XR-12000/16.

12816E/1280=

3.4.0

Cisco XR 12000 Series Router Interface and Router Processor Cards

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2.0

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC-12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2.0

Cisco XR 12000 Series 4xOC-12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2.0

Cisco XR 12000 Series 16xOC-3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2.0

Cisco XR 12000 Series 16xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2.0

Cisco XR 12000 Series 8xOC-3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 8xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2.0

Cisco XR 12000 Series 4xOC-3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2.0

Cisco XR 12000 Series 1xOC-48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2.0

Cisco XR 12000 Series 1xOC-48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2.0

Cisco XR 12000 Series 4-port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4.0

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192-POS-VSR

3.2.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192-POS-LR

3.2.0

Cisco 1-port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192-POS-XFP

3.2.0

2-port OC-48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3.0

Cisco XR 12000 Series Router Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2.0

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2.0

Cisco 2-port Gigabit Ethernet Shared Port Adapter

SPA-2X1GE-V2

3.4.1

Cisco 5-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4.0

Cisco 8-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4.0

Cisco 8-port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4.0

Cisco 8-port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3.0

Cisco 10-port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4.0

Cisco 1-port 10 Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4.0

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4.0

Cisco 5-port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2.0

Cisco 10-port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2.0

Cisco 1-port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2.0

Cisco Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3.0

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3.0

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3.0

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3.0


Software Compatibility

Cisco IOS XR Software Release 3.4.3 is compatible with the following Cisco XR 12000 Series Router systems:

Cisco IOS XR 12404 Router

Cisco IOS XR 12406 Router

Cisco IOS XR 12410 Router

Cisco IOS XR 12416 Router

Cisco IOS XR 12810 Router

Cisco IOS XR 12816 Router

For the existing installed base, the following chassis are supported:

Cisco 12006 Router

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router

Supported Firmware Code

The following minimum firmware code is supported by the Cisco XR 12000 Series Router:

LCs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 17.1

Fabric Downloader version 6.5 (ROM version is 6.5)

RPs

MBUS Agent Software version 2.51 (RAM) (ROM version is 3.47)

ROM Monitor version 1.14

Determining Your Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command, as illustrated below.


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

Cisco CRS-1 Series Router

On the Cisco CRS-1 Series Router, you should see a response similar to the following:

Cisco IOS XR Software, Version 3.4.3[00]
Copyright (c) 2008 by cisco Systems, Inc.
 
ROM: System Bootstrap, Version 1.48(20070928:224557) [CRS-1 ROMMON],  
 
MPLS-MR-1 uptime is 9 hours, 18 minutes
System image file is "disk0:hfr-os-mbi-3.4.3/mbihfr-rp.vm"
 
cisco CRS-16/S (7457) processor with 4194304K bytes of memory.
7457 processor at 1197Mhz, Revision 1.2
 
18 GigabitEthernet/IEEE 802.3 interface(s)
2 Ethernet/IEEE 802.3 interface(s)
24 Packet over SONET/SDH network interface(s)
24 SONET/SDH Port controller(s)
8 TenGigabitEthernet/IEEE 802.3 interface(s)
2043k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
981440k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
 
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is mem:
Package active on node 0/0/CPU0:
hfr-fpd, V 3.4.3[00], Cisco Systems, at disk0:hfr-fpd-3.4.3
    Built on Thu Feb 14 22:11:49 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-diags, V 3.4.3[00], Cisco Systems, at disk0:hfr-diags-3.4.3
    Built on Thu Feb 14 22:11:21 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-mcast, V 3.4.3[00], Cisco Systems, at disk0:hfr-mcast-3.4.3
    Built on Thu Feb 14 21:09:20 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-mpls, V 3.4.3[00], Cisco Systems, at disk0:hfr-mpls-3.4.3
    Built on Thu Feb 14 21:04:42 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-lc, V 3.4.3[00], Cisco Systems, at disk0:hfr-lc-3.4.3
    Built on Thu Feb 14 20:26:22 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-fwdg, V 3.4.3[00], Cisco Systems, at disk0:hfr-fwdg-3.4.3
    Built on Thu Feb 14 20:15:26 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-admin, V 3.4.3[00], Cisco Systems, at disk0:hfr-admin-3.4.3
    Built on Thu Feb 14 20:08:03 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-base, V 3.4.3[00], Cisco Systems, at disk0:hfr-base-3.4.3
    Built on Thu Feb 14 19:59:45 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8
 
hfr-os-mbi, V 3.4.3[00], Cisco Systems, at disk0:hfr-os-mbi-3.4.3
    Built on Thu Feb 14 19:05:47 PST 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/hfr/workspace for c2.95.3-p8

Cisco XR 12000 Series Router

On the Cisco XR 12000 Series Router, you should see a response similar to the following:

 
   
Cisco IOS XR Software, Version 3.4.3[00]
Copyright (c) 2008 by cisco Systems, Inc.
 
ROM: System Bootstrap, Version 12.0(20040128:214555) [assafb-PRP1P_20040101 1.8dev(2.83)] 
DEVELOPMENT SOFTWARE
Cop,  Inc.
 
   
pireg-c12k2-r5 uptime is 3 hours, 38 minutes
System image file is "disk0:c12k-os-mbi-3.4.3/mbiprp-rp.vm"
 
cisco 12404/PRP (7457) processor with 2097152K bytes of memory.
7457 processor at 1266Mhz, Revision 1.2
 
1 Cisco 12000 Series Performance Route Processor
1 8 port ISE OC3 Controller (8 POS)
1 Cisco 12000 4 Port Gigabit Ethernet Controller (4 GigabitEthernet)
4 GigabitEthernet/IEEE 802.3 interface(s)
3 Ethernet/IEEE 802.3 interface(s)
1 PLIM QoS controller(s)
8 Packet over SONET/SDH network interface(s)
8 SONET/SDH Port controller(s)
2042k bytes of non-volatile configuration memory.
1000496k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is disk0:
Package active on node 0/0/CPU0:
c12k-infra-test, V 3.4.3[00], Cisco Systems, at disk0:c12k-infra-test-3.4.3
    Built on Fri Feb 15 13:44:26 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-mgbl, V 3.4.3[00], Cisco Systems, at disk0:c12k-mgbl-3.4.3
    Built on Fri Feb 15 12:38:33 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-mcast, V 3.4.3[00], Cisco Systems, at disk0:c12k-mcast-3.4.3
    Built on Fri Feb 15 12:38:06 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-mpls, V 3.4.3[00], Cisco Systems, at disk0:c12k-mpls-3.4.3
    Built on Fri Feb 15 12:37:44 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-rout, V 3.4.3[00], Cisco Systems, at disk0:c12k-rout-3.4.3
    Built on Fri Feb 15 06:14:22 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-lc, V 3.4.3[00], Cisco Systems, at disk0:c12k-lc-3.4.3
    Built on Fri Feb 15 06:13:42 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-fwdg, V 3.4.3[00], Cisco Systems, at disk0:c12k-fwdg-3.4.3
    Built on Fri Feb 15 06:12:41 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-admin, V 3.4.3[00], Cisco Systems, at disk0:c12k-admin-3.4.3
    Built on Fri Feb 15 06:11:52 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-base, V 3.4.3[00], Cisco Systems, at disk0:c12k-base-3.4.3
    Built on Fri Feb 15 06:10:32 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
c12k-os-mbi, V 3.4.3[00], Cisco Systems, at disk0:c12k-os-mbi-3.4.3
    Built on Fri Feb 15 06:04:25 UTC 2008
    By edde-bld1 in /auto/srcarchive2/production/3.4.3/c12k/workspace for c2.95.3-p8
 
   

New and Changed Information

Cisco IOS XR Software Release 3.4.3 is a maintenance release only. Therefore, no new software or hardware features are being introduced.


Note For the Routing Policy Enhancements, SIP TLS, and SIP Outbound Authentication features, contact your Cisco SE for scale information.


See the following documents for detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs):

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.4.0

Cisco IOS XR Interface and Hardware Component Configuration Guide, Release 3.4.0

Important Notes

In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

When migrating from Cisco IOS to Cisco IOS XR software on a Cisco XR 12000 Series Router, follow the migration instructions provided to minimize traffic impact. For detailed procedures, see the document Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router.

Follow the instructions provided by Cisco for all card removal and replacement (fabric cards, line cards, fan controller and RP, and so on) to avoid impact to traffic. For more information, see the Cisco IOS XR Getting Started Guide.

If you intend to test beyond the combined maximum configuration tested and published by Cisco, contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your testing.

Cisco SIP-600 line cards (for the Cisco XR 12000 Series Router) draw more power than previous line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM.

Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered off for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.



Note When using the HW-Module location all reload command, VLAN ARP is not resolved, and pings on 5-port Ethernet SPA fails. To resolve this issue, load SMU (CSCsj33183), which is available at http://www.cisco.com/cgi-bin/tablebuild.pl/iosxr-smu.


Caveats

Caveats describe unexpected behavior in Cisco IOS XR Software releases. Severity-1 caveats are the most serious caveats; severity-2 caveats are less serious.

This section lists the caveats for Cisco IOS XR Software Release 3.4.3. The caveats are organized as follows:

Quality of Service Units of Measure Changes

Platform-Independent Caveats

Caveats Specific to Cisco CRS-1

Caveats Specific to Cisco XR 12000 Series Router

Quality of Service Units of Measure Changes

Because the default units of measure may no longer be the same, care must be taken when taking a configuration earlier than Cisco IOS XR Software, Release 3.3.0 and applying it to Cisco IOS XR Software, Release 3.3.0 or later. Table 6 lists the changes to Quality of Service (QoS) units of measure.

Table 6 Changes to Quality of Service Units of Measure 

Command
Cisco IOS XR Release 3.2 (Default)
Cisco IOS XR Release 3.3.x and Cisco IOS XR Release 3.4.x (Default)

bandwidth

kbps

kbps

police rate

kbps

bps (change)

queue-limit

bytes

packets (change)

random-detect

bytes

packets (change)

shape average

kbps

packets (change)



Note The default units of measure (see Table 6) will be inserted into the QoS policy following the upgrade. This will result in a change to the policy's behavior. Therefore, manual review and keyword changes must be performed by the operator to ensure the policy operates as expected.


Keywords cannot be inserted into the running configuration on a router running Cisco IOS XR Release 3.2.x in advance of the upgrade. An option is to edit the configuration offline, and add the necessary keywords.


Note To make change to a QoS policy, the policy must first be removed from any interfaces making a reference to it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

When the policy is removed from any interfaces, the edited policy is applied. See the following Cisco IOS XR command reference sections:

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.3

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a008069e202.html

Cisco IOS XR Modular Quality of Service Command Reference, Release 3.4

http://www.cisco.com/en/US/partner/products/ps5845/products_command_reference_book09186a00806b06ab.html

Platform-Independent Caveats

The following caveats apply to both Cisco CRS-1 and Cisco XR 12000 Series Routers:


Note Secure domain routers should be configured with lowercase letters in order for specific installation operations to succeed. For more information, see the Cisco IOS XR Getting Started Guide, Release 3.4 on www.cisco.com.


CSCsh97041

Description:

VPN V4/V6 routes are in BGP table, but not installed in RIB.

Symptom:

Following ios/syslog message appears:

RP/0/0/CPU0:Mar 20 11:39:01 : bgp[124]: %ROUTING-BGP-3-RIB_FAIL : [4] : Failed to send 
batched routes for VPNv4 Unicast while calling the RIB instance 0: 'Subsystem(8191)' 
detected the 'unknown' condition 'Code(63)': Unknown Error(507) 
 
   
RP/0/0/CPU0:Mar 20 11:41:36 : bgp[124]: %ROUTING-BGP-3-RIB_FAIL : [5] : Failed to send 
batched routes for VPNv6 Unicast while calling the RIB instance 1: 'Subsystem(8191)' 
detected the 'unknown' condition 'Code(63)': Unknown Error(507)
routes will be in bgp table like 10.1.16.42/32 is in vrf 16 bgp table but same prefix 
is not found in RIB.
RP/0/0/CPU0:IOXR-1#sh bgp vpnv4 unicast vrf 16 10.1.16.42/32
BGP routing table entry for 10.1.16.42/32, Route Distinguisher: 300:16
Versions:
  Process           bRIB/RIB  SendTblVer
  Speaker            3217398     3217398
    Local Label: 975896
Paths: (1 available, best #1)
  Advertised to update-groups (with more than one peer):
    0.2 
  Path #1: Received by speaker 0
  100 6000
    10.1.16.2 from 10.2.16.2 (10.2.44.2)
      Origin incomplete, localpref 100, valid, external, best, import-candidate
      Extended community: RT:16:16 
 
   
RP/0/0/CPU0:IOXR-1#sh route vrf 16 10.1.16.42/32
% Network not in table.
 
   

Conditions:

The problem is encountered with more than 300 VRFs configured on the router. Removing all the VRF configurations and reconfiguring the VRFs back again quickly might expose you to this problem.

Workaround:

Restart the BGP process.

CSCsk59453

Basic Description:

The chkpt_proxy process crashed after OSPF unconfig/rollback.

Conditions:

In some cases, an ospf chkpt_proxy terminates due to an OSPF uncofig/rollback.

Symptom:

The chkpt_proxy process is terminated for OSPF. No visible effect on the router.

Workaround:

None. Functionality impact is minimal, because after its termination, the chkpt_proxy restarts and resyncs all essential information from its parent process on the active RP.

CSCse83983

Basic Description:

A tunnel does NOT go down and come up on topo change in non-head area.

Symptom:

When IOS XR Release 3.4 MPLS Traffic Engineering node is a non-head area node and there is a topology change triggered either due to IGP link add/removal or any other topology change in the IGP (say) Level 1 to Level 2 for the links on that node. The inter-area tunnels originating from the Head and going via that link will NOT flap as a result of this topology change.

Conditions:

This behavior is seen in IOS XR Release 3.4 in a non-head area node and inter-area TE tunnel is being setup with loose hop in the path ERO.

Additional Notes:

Path verification and tunnel reoptimization indication are not done by the midpt ABR node. This is similar to the IOS behavior today. This feature will be added in a future release.

Workaround:

None.

CSCse97786

Basic Description:

L2VPN: Control Word cannot be set if pseudowire (PW) is established with cbit=0

Symptom:

Router not sending Control Word even when Control Word is enabled.

Conditions:

If a PW is established with cbit=0, and later using config we enabled control word or if neighbor sends a label mapping with control word cbit=1, Cisco IOS XR will still send cbit=0.

Workaround:

The workaround is to delete and reconfigure the PW on both the PEs.

CSCse80235

Basic Description:

L2VPN: Support destination with Rtg ID different than LDP rtr ID.

Symptom:

Cannot establish PW to a non-LDP router ID address.

Conditions:

PW can be established on to the LDP router ID. Currently, Cisco IOS XR does not support PW to non-LDP router IDs.

Workaround:

None.

CSCsi59202

Basic Description:

Command show mpls lsd forwarding displays invalid format_tbl:136.

Symptom:

Command show mpls lsd forwarding displays invalid format_tbl:136.

Conditions:

Under normal scenarios.

Workaround:

There is no workaround for this as of now.

Caveats Specific to Cisco CRS-1

The following caveats are specific to the Cisco CRS-1 platform:

CSCsg18108

Basic Description:

Netio process restarts when trying to restore configuration from disk.

Symptom:

An unexpected netio process termination may occur when trying to restore configuration from disk or when changing the encapsulation of an interface from ppp to hdlc and vice versa.

Condition1: If the router has POS or serial interfaces and the configuration is cleared the following command and then restored back from disk, the netio process may terminate:

commit replace

yes

end

Condition 2: If the encapsulation of a serial interface is changed repeatedly from ppp to hdlc and vice versa, and if the packets are being sent out of that interface at the same time, the netio process may terminate.

Workaround:

Workaround for Condition 1: When loading the configuration from disk, make sure the POS and serial interfaces are in a shut-down state. Once the configuration is loaded, the interfaces can be enabled again.

Workaround for Condition 2: If there is a need to change the encaps of a serial or POS interface, shut the interface before changing the encapsulation. The interface can be enabled after the configuration change has been made.

CSCsh45459

Basic Description:

Line protocol state for SONET controller should be admin-down after LC reload.

Symptom:

When shutting down the SONET controller, Intf/LineP state shown in show controllers sonet should be admin-down/admin-down. However, LineP goes to the down state after LC reload.

Conditions:

Occurs after the LC reload.

Workaround:

Perform the no shutdown command on the controller, and then perform the shutdown again to clear the state.

CSCsh48689

Basic Description:

Unable to upgrade FPD for oc3/12 SPA.

Symptom:

FPGA upgrade may fail on OC3/12 SPA in a named SDR.

Conditions:

Normal operation.

Workaround:

Move the card in owner SDR, upgrade the FPGA and move it back to the named SDR.

CSCsj09823

Basic Description:

syslogd process crashed.

Symptom:

syslogd process crashed.

Conditions:

The logging level was debug and cctl debugs were enabled.

Workaround:

The syslogd process was automatically restarted.

CSCsj24973

Basic Description:

After FailOver instdir process crashed twice on the RP.

Symptom:

After FailOver instdir process crashed twice on RP.

Conditions:

Active RP reload.

Workaround:

None. The instdir process was restarted after the two crashed.

CSCsj10619

Basic Description:

Garbled character of authentication string on entering show vrrp detail command.

Symptom:

The last portion of the string value for show vrrp detail command is garbled.

Conditions:

When the eight alphanumeric characters are used by authentication string for VRRP.

Workaround:

None. The string value of show vrrp detail command is normal when the alphanumeric characters from one to seven are used for authentication.

Caveats Specific to Cisco XR 12000 Series Router

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsk20479

Basic Description:

vty-pool config timeout messages appear after reload.

Symptoms:

On reboot or during a commit of a configuration change, the following pair of messages may appear:

sysdb_svr_shared[596]: %SYSDB-SYSDB-7-TIMEOUT_APPLY : Apply callback for 
'cfg/gl/vty/pools/default' from 'cfgmgr-rp' (jid 180, node 0/10/CPU0). No response 
from 'devc-vty' (jid 193, node 0/10/CPU0) within the timeout period (120 seconds), 
system may now be in an inconsistent state
 
   
sysdb_mc[593]: %SYSDB-SMC-7-TIMEOUT : Message #2011, destined for shared plane, timed 
out having received 0 of 1 expected responses: returning error to client cfgmgr-rp. 
Check for potential transport issues within the system, or deadlocked SysDB processes. 

Conditions:

The problem is seen when the startup configuration, or the configuration change being committed, contains vty-pool configuration items.

Workaround:

If the problem is seen during startup, no workaround is required. The vty-pool configuration should be present in the running configuration. To verify this, use the show running-config command.

If the problem is seen during a commit, also use the show running-config command to verify whether or not the committed configuration is present.

If it is not present, repeat the commit of the vty-pool commands, this time using the best-effort option in conjunction with the commit command.

Finally, run the cfs check command to re-synchronize the persistent configuration on disk with the running configuration.

CSCsj08727

Basic Description:

CEF is inconsistent on active and standby RP.

Symptom:

Active RP CPU utilization is relatively high with fabric_prp_driver and netio consuming most of the CPU cycles. The router would expose issues with control plane traffic drops, among other things, in this condition.

Conditions:

Occurs when a dual RP system with a management Ethernet interface for each RP has a different IP addresses from the same subnet.There must be prefixes that resolve over these management interfaces. If we end up with a state where the CEF entries of one of these prefixes is inconsistent, then high CPU state is observed. You can check inconsistency by looking at the CEF entry of this prefix from the active RP and the standby RP. At the active RP, we would see a CEF entry pointing to the standby RP management interface as outgoing for this prefix. The CEF entry for this prefix on the standby RP would show the active RP management interface as the outgoing one.

Workaround:

Perform a shut/unshut of the management interface of the standby RP.

CSCsi46306

Basic Description:

An ipv4_io_ea times out during a commit replace due to FIB.

Symptom:

Performing a commit replace command from an empty configuration to a scaled configuration such as FR with 4k DLCIs causes an ipv4_io_ea timeout.

Conditions:

The user has to have an empty or minimal configuration and switch to the scaled configuration such as FR with 4k DLCIs.

Workaround:

None.

CSCsj21527

Basic Description:

ACL not getting attached to the interface.

Symptom:

When performing a SPA OIR followed by a redundancy switchover.

Conditions:

This only happens if the following two conditions are met:

1. If you have ACL configurations attached to the interfaces of a SPA.

2. If you a perform a SPA OIR immediately followed by a redundancy switchover.

Workaround:

Reapply the ACL configurations into the interfaces after the redundancy switchover.

CSCsj19998

Basic Description:

QoS service policies are not attached to interface after SPA OIR.

Symptom:

Occurs when performing a SPA OIR followed by a redundancy switchover.

Conditions:

This only happens if the following two conditions are met:

1. If you have QoS service policy configurations attached to the interfaces of a SPA.

2. If you perform a SPA OIR followed immediately by a redundancy switchover.

Workaround:

Reapply the QoS service policy configurations to the interfaces after the redundancy switchover.

Resolved Cisco IOS XR Software PSIRT-Related Caveats

CSCti62211

Basic Description:

BGP flaps due to unknown attribute

Symptom:

Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

Conditions:

Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending to neighboring devices, but neighboring devices may be running operating systems other than Cisco IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. This is per standards defining the operation of BGP.

Workaround:

No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free software maintenance upgrades (SMUs) progressively starting 28 August 2010.

A Security Advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml

Upgrading Cisco IOS XR Software

The following URL links to online information that describes how to upgrade Cisco IOS XR Software on Cisco CRS-1 and Cisco XR 12000 Series Router systems from earlier releases to Release 3.4.3 at http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html


Note Before you install or upgrade the software, you must upgrade the ROM Monitor software to the correct version. If a Cisco CRS-1 system running Cisco IOS XR Software Release 3.4.3 is brought up with the incorrect ROM Monitor software, the standby RP fails to boot and an error message appears. For information on correct ROM Monitor software on a single-shelf router, see "Upgrading and Downgrading ROM Monitor Software on Cisco CRS-1 Routers" in the Cisco IOS XR ROM Monitor Guide.


Troubleshooting

For information on troubleshooting Cisco IOS XR Software, see Cisco IOS XR Getting Started Guide.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. These documents consist of hardware and software installation guides, Cisco IOS XR Software configuration and command references, feature modules, and other documents.

Documentation is available as electronic documents, which are available online on www.Cisco.com.

Use these release notes with these documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at:

Cisco CRS-1 Routers:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Router:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR Software documentation set consists of the Cisco IOS XR configuration guides and command references, a getting started guide, and other supporting documents. For a list of Cisco IOS XR documentation for Release 3.4.3, see the About Cisco IOS XR Software Documentation for Release 3.4.0.

You can find the most current software documentation at the following location:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.

Open Source License Acknowledgements

The following acknowledgements pertain to this software license.

OpenSSL/OpenSSL Project

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

License Issues

The OpenSSL toolkit stays under a dual license, i.e., both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License:

© 1998-1999 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS"' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License:

© 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscape's SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)".

The word `cryptographic' can be left out if the routines from the library being used are not cryptography-related.

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)".

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].