Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.5.2

  • Viewing Options

  • PDF (670.8 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.5.2

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.5.2

Contents

Introduction

System Requirements

Cisco CRS-1

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Code

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Code

Determining Your Software Version

New and Changed Information

New Software Features in Cisco IOS XR Software Release 3.5.2

Cisco CRS-1 and Cisco XR 12000 Series Router Platforms

Cisco CRS-1 Router-Specific Features Only

Cisco XR 12000 Series Router-Specific Features Only

New Hardware Features Supported in Cisco IOS XR Software Release 3.5.2

Important Notes

Caveats

Open Caveats—Release 3.5.2

Cisco CRS-1 and Cisco XR 12000 Series Router Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-Specific Caveats

Resolved Cisco IOS XR Software PSIRT-Related Caveats

Upgrading Cisco IOS XR Software

Product Life Cycle of Cisco IOS XR Software Release 3.5

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation, Support, and Security Guidelines


Release Notes for Cisco IOS XR Software Release 3.5.2


April 5, 2013

Cisco IOS XR Software Release 3.5.2

Text Part Number OL-14867-05


Note Please see the "Important Notes" section for important information on Cisco IOS XR Software Release 3.5.2.



Note You can find the most current Cisco IOS XR software documentation on the World Wide Web at http://www.cisco.com/en/US/partner/products/ps5845/tsd_products_support_series_home.html. These electronic documents may contain updates and modifications. See the "Obtaining Documentation, Support, and Security Guidelines" section for more information on obtaining Cisco documentation.


These release notes describe the features provided in Cisco IOS XR Software Release 3.5.2 and are updated as needed.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.5.2, see the "Caveats" section. The caveats are updated for every release and are located on the World Wide Web at www.cisco.com.

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected at http://www.cisco.com/public/support/tac/fn_index.html.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Product Life Cycle of Cisco IOS XR Software Release 3.5

Troubleshooting

Related Documentation

Obtaining Documentation, Support, and Security Guidelines

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; such as Border Gateway Protocol (BGP), Routing Information Protocol (RIP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP).

BGP Prefix Independent Convergence—Provides the ability to converge BGP routes within subseconds instead of multiple seconds. The Forwarding Information Base (FIB) is updated, independent of a prefix, to converge multiple 100K BGP routes with the occurrence of a single failure. This convergence is applicable to both core and edge failures and with or with out MPLS. This fast convergence innovation is unique to Cisco IOS XR software.

Multiprotocol Label Switching (MPLS)—Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Layer 2 virtual private network (L2VPN), and Layer 3 VPN (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM). The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of service (QoS)—Supports rich QoS mechanisms, including policing, marking, queuing, dropping, and shaping. Additionally, the operating systems support modular QoS command-line interface (MQC). MQC is used to configure various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; authentication, authorization, and accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); and Simple Network Management Protocol Versions 3 (SNMPv3). Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection.

Craft Works Interface (CWI)—CWI is a client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF).

Multicast service delivery in SP NGN—MVPNv4 support carries customer multicast traffic over an ISP IPv4 core network.

Edge support for L2TPv3 transport—Support for Ethernet over L2TPv3 and support for L3VPN over L2TPv3 (Cisco XR 12000 Series Router only).

6PE: Edge support for IPv6 applications—Delivers IPv6 traffic over an IPv4/MPLS core with 6PE support (Cisco XR 12000 Series Router only).

6VPE—Delivers IPv6 VPN traffic over an IPv4/MPLS core with 6VPE support (Cisco XR 12000 Series Router only).

6VPE over L2TPv3: Delivers IPv6 VPN traffic over L2TPv3 core with 6VPE support (Cisco XR 12000 Series Router only).

Enhanced core competencies:

Support for IS-IS and OSPF.

IP fast convergence with Fast Re-route support for IS-IS.

Traffic engineering support for unequal load balancing.

Path Computation Element (PCE) capability for traffic engineering.

Firewall Services—Seamless insertion of Firewall Services in the data path with Virtual Firewall support on the Multi Service Blade (XR-12K-MSB) for the Cisco XR 12000 Series Router.

Voice Video interconnect between providers with SBC on the Cisco CRS-1 Router.

L2TPv3 tunneling mechanism—Service Providers who do not use MPLS in the core, but want to offer VPN services can use the L2TPv3 tunneling mechanism. The feature support includes IPv4 (VPNv4) and IPv6 (6VPE) VPN services using L2TPv3 encapsulation. The L2TPv3 packet is encapsulated in an IPv4 delivery header and is carried across an IPv4 backbone. VPN prefixes are advertised with BGP labels and resolved over L2TPv3 tunnels.

See the "New and Changed Information" section for a detailed list of new features by platform for Cisco IOS XR Software Release 3.5.2.

System Requirements

Cisco IOS XR Software Release 3.5.2 is supported on the following platforms:

Cisco CRS-1

Cisco XR 12000 Series Router

Determining Your Software Version

Cisco CRS-1

This section describes the system requirements for Cisco IOS XR Software Release 3.5.2 supported on Cisco CRS-1 routers and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Code

To determine the software versions or levels of your current system, see Determining Your Software Version.

Feature Set Table

The Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.5.2 features. Table 1 and Table 2 list the Cisco IOS XR software feature set matrix and associated filenames available for the Cisco IOS XR Software Release 3.5.2 supported on the Cisco CRS-1 router.

Table 1 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.5.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.5.2

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.vm-3.5.2

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.5.2

CORBA2 agent, XML3 Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.5.2

MPLS-TE,4 LDP,5 MPLS Forwarding, MPLS OAM,6 LMP,7 OUNI,8 RSVP,9 and Layer-2 and Layer-3 VPNs.

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.5.2

Multicast Routing Protocols (PIM, MSDP,10 IGMP,11 Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB,12 MURIB13 , MFWD14 ), and BIDIR-PIM.15

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.5.2

Support for Encryption, Decryption, IPSec,16 SSH,17 SSL,18 and PKI.19

Cisco IOS XR Documentation Package

hfr-doc.pie-3.5.2

Manual pages for Cisco IOS XR CLI commands

Cisco IOS XR FPD Package

hfr-fpd.pie-3.5.2

Firmware for Fixed PLIM and SPA modules as well as ROMMON images for CRS chassis.

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.5.2

Diagnostic utilities for Cisco IOS XR routers.

Cisco IOS XR Session Border Controller Package

hfr-sbc-p.pie-3.5.2

Session Border Controller package for a Cisco CRS-1 Series Router.

1 Packages are installed individually.

2 Common Object Request Broker Architecture

3 Extensible Markup Language

4 MPLS Traffic Engineering

5 Label Distribution Protocol

6 Operations, Administration, and Maintenance

7 Link Manager Protocol

8 Optical User Network Interface

9 Resource Reservation Protocol

10 Multicast Source Discovery Protocol

11 Internet Group Management Protocol

12 Multicast Routing Information Base

13 Multicast-Unicast RIB

14 Multicast forwarding

15 Bidirectional Protocol Independent Multicast

16 IP Security

17 Secure Shell

18 Secure Socket Layer

19 Public-key infrastructure


Table 2 Cisco CRS-1 Supported Feature Sets (Cisco IOS XR Software Release 3.5.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.5.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle.

Cisco IOS XR Manageability Package.

Cisco IOS XR MPLS Package.

Cisco IOS XR Multicast Package.

Cisco IOS XR Diagnostic Package.

Cisco IOS XR Session Border Controller Package.

Cisco IOS XR FPD Package.

Cisco IOS XR Documentation Package.

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.5.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle.

Cisco IOS XR Manageability Package.

Cisco IOS XR MPLS Package.

Cisco IOS XR Multicast Package.

Cisco IOS XR Security Package.

Cisco IOS XR Session Border Controller Package.

Cisco IOS XR Diagnostic Package.

Cisco IOS XR FPD Package.

Cisco IOS XR Documentation Package.


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 routers running Cisco IOS XR Software Release 3.5.2 consist of the following:

2-GB memory on the route processors (RPs)

2-GB memory on the modular services cards (MSCs)

Hardware Supported

Cisco IOS XR Software Release 3.5.2 supports Cisco CRS-1 routers. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 3 lists the hardware components supported on the Cisco CRS-1 and the minimum software versions required. See the "Other Firmware Code" section.

Table 3 Cisco CRS-1 Supported Hardware and Minimum Software Requirements 

Component
Part Number
First Supported in Version
Cisco CRS-1 Series 16-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

CRS-16-LCC

3.2

Cisco CRS-1 Fan Tray for 16-Slot LCC

CRS-16-LCC-FAN-TR

3.2

Cisco CRS-1 Fan Controller for 16-Slot Line Card Chassis

CRS-16-LCC-FAN-CT

3.2

Cisco CRS-1 16-Slot Alarm Board

CRS-16-ALARM

3.2

Cisco CRS-1 AC Delta Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACD

3.2

Cisco CRS-1 AC Wye Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACW

3.2

Cisco CRS-1 DC Power Shelf for 16-Slot LCC

CRS-1-LCC-PS-DC

3.2

Cisco CRS-1 LCC Front AC Power Panel

CRS-16-ACGRILLE

3.2

Cisco CRS-1 LCC Front DC Power Panel

CRS-16-DCGRILLE

3.2

Cisco CRS-1 Line Card Chassis Front Doors

CRS-16-LCC-DRS-F

3.2

Cisco CRS-1 Line Card Chassis Front Cable Mgmt

CRS-16-LCC-FRNT

3.2

Cisco CRS-1 LCC Expanded Front Cable Mgmt

CRS-16-LCC-FRNT-E

3.2

Cisco CRS-1 Line Card Chassis Rear Cable Mgmt

CRS-16-LCC-BCK-CM

3.2

Cisco CRS-1 Line Card Chassis Rear Doors

CRS-16-LCC-DRS-R

3.2

Cisco CRS-1 Lift for LCC 16 and FCC

CRS-16-LIFT/B

3.2

Cisco CRS-1 Series 8-Slot Line Card Chassis

Cisco CRS-1 8-Slot Install Kit

CRS-8-INSTALL-KT

N/A

Cisco CRS-1 8-Slot Fork Lift Tube

CRS-8-LIFT-TUBE

N/A

Cisco CRS-1 8-Slot Front Badge Panel

CRS-8-BDG-PANEL

N/A

Cisco CRS-1 8-Slot Front Inlet Grill

CRS-8-FRNT-GRILL

N/A

Cisco CRS-1 8-Slot Horizontal Install Rails

CRS-8-HRZ-RAILS

N/A

Cisco CRS-1 8-Slot Line Card Chassis

CRS-8-LCC

3.2

Cisco CRS-1 Fan Tray for 8-Slot Line Card Chassis

CRS-8-LCC-FAN-TR

3.2

Cisco CRS-1 Line Card Chassis Filter Pack

CRS-8-LCC-FILTER

3.2

Cisco CRS-1 AC Pwr Rectifier for 8-Slot LCC

CRS-8-AC-RECT

3.2

Cisco CRS-1 DC Power Entry Module for 8-Slot LCC

CRS-8-DC-PEM

3.2

Cisco CRS-1 AC & DC Power Module Filter for 8-Slot LCC

CRS-8-PWR-FILTER

3.2

Cisco CRS-1 AC Delta PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACD

3.2

Cisco CRS-1 AC Wye PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACW

3.2

Cisco CRS-1 DC PDU for CRS-8 LCC

CRS-8-LCC-PDU-DC

3.2

Cisco CRS-1 Series 4-Slot Line Card Chassis

Cisco CRS-1 4-Slot Single-Shelf System

CRS-4/S

3.4

Cisco CRS-1 Fabric Chassis Hardware

CRS-FCC= Cisco CRS-1 Series Fabric Card Chassis Only

CRS-FCC=

3.2

CRS-1 Fabric Chassis AC Delta Power Kit

CRS-FCC-ACD-KIT

3.2

CRS-1 Fabric Chassis AC Grille

CRS-FCC-ACGRILLE

3.2

CRS-1 Fabric Chassis AC-Wye Power Kit

CRS-FCC-ACW-KIT

3.2

CRS Fabric Chassis DC Power Kit

CRS-FCC-DC-KIT

3.2

CRS-1 Fabric Chassis DC Power Grille

CRS-FCC-DCGRILLE

3.2

CRS Fabric Chassis Lift Bracket

CRS-FCC-LIFT-BRKT

3.2

CRS Fabric Chassis OIM Modules

CRS-FCC-OIM-1S=

3.2

Cisco CRS-1 Series FC Chassis Shelf/Fan/Enet cntr

CRS-FCC-SC-GE=

3.2

CRS-1 Fabric Chassis AC Intake Grille

CRS-FCC-ACGRILLE=

3.2

CRS-1 Fabric Chassis DC Intake Grille

CRS-FCC-DCGRILLE=

3.2

Cisco CRS-1 Series Fan Tray for FCC

CRS-FCC-FAN-TR=

3.2

CRS-1 Fabric Card Chassis Fan Tray Filters

CRS-FCC-FILTER=

3.2

CRS-1 Fabric Chassis Front Cosmetic Kit

CRS-FCC-FRNT-CM=

3.2

Cisco CRS-1 Series Fabric Card Chassis Fiber Module LED

CRS-FCC-LED=

3.2

Cisco CRS-1 Series DC Power Shelf for FCC

CRS-FCC-PS-DC=

3.2

CRS-1 Fabric Chassis Rear Cosmetic Kit

CRS-FCC-REAR-CM=

3.2

CRS-LIFT Brackets for Fabric Chassis

CRS-FCC-LIFT-BRKT=

3.2

CRS Fabric Chassis OIM Module

CRS-FCC-OIM-1S

3.2

CRS-1 Fabric Chassis AC Delta Power Supply

CRS-FCC-PS-ACD

3.2

CRS-1 Fabric Chassis AC Wye Option

CRS-FCC-PS-ACW

3.2

CRS-1 Fabric Chassis DC Power Option

CRS-FCC-PS-DC

3.2

Cisco CRS-1 Series Fabric Card Chassis Switch Fabric Card

CRS-FCC-SFC=

3.2

CRS-1 Fabric Chassis Integrated Switch Controller Card

CRS-FCC-SC-22GE Integrated Switch

3.4.1

Cisco CRS-1 General Chassis Hardware

Cisco CRS-1 Memory Module 2 GB

CRS-MEM-2G

3.2

Cisco CRS-1 PCMCIA Flash Disk 1 GB

CRS-FLASH-DISK-1G

3.2

Cisco CRS-1 Modular Services Card

CRS-MSC

3.2

Cisco CRS-1 SFPs

Cisco CRS-1 2.5 G SFP LR Optic

POM-OC48-LR2-LC-C

3.2

Cisco CRS-1 2.5 G SFP SR Optic

POM-OC48-SR-LC-C

3.2

Cisco CRS-1 Fabric Cards

Cisco CRS-1 8-Slot Fabric Card / Single

CRS-8-FC/S

3.2

Cisco CRS-1 8-Slot Fabric Card Blank

CRS-8-FC-BLANK

3.2

Cisco CRS-1 8-Slot Fabric Handle

CRS-8-FC-HANDLE

3.2

Cisco CRS-1 16-Slot Fabric Card / Single

CRS-16-FC/S

3.2

Cisco CRS-1 Interface and Router Processor Cards

Cisco CRS-1 8-Slot Route Processor

CRS-8-RP

3.2

Cisco CRS-1 8-Slot Route Processor Blank

CRS-8-RP-BLANK

3.2

Cisco CRS-1 8-Slot Route Processor Handle

CRS-8-RP-HANDLE

3.2

Cisco Carrier 1 Series SPA Interface Processor 40G

CRS1-SIP-800

3.2

Cisco CRS-1 16-Slot Route Processor

CRS-16-RP

3.2

Cisco CRS-1 Distributed Route Processor

CRS-DRP

3.3

Cisco CRS-1 Distributed Route Processor CPU Module

CRS-DRP-B-CPU

3.4.1

Cisco CRS-1 Distributed Route Processor PLIM Module

CRS-DRP-B-PLIM

3.4.1

Cisco CRS-1 16-slot Route Processor, revision B

CRS-16-RP-B

3.3

Cisco CRS-1 SONET Interface Modules and SPAs

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/VS

4OC192-POS/DPT-VS

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/SR

4OC192-POS/DPT-SR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/IR

4OC192-POS/DPT-IR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

3.2

Cisco CRS-1 16xOC-48/STM16 POS/DPT Interface Module

16OC48-POS/DPT

3.2

Cisco CRS-1 1xOC-768/STM256 POS Interface Module/SR

1OC768-POS-SR

3.2

Cisco CRS-1 8-Port OC-12 Shared Port Adapter

SPA-8XOC12-POS

3.3

Cisco CRS-1 2-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-2XOC48-POS/RPR

3.4

Cisco CRS-1 4-Port OC48c/STM-16c POS/RPR Shared Port Adapter

SPA-4XOC48-POS/RPR

3.4

Cisco CRS-1 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

Cisco CRS-1 4-Port OC-3 Shared Port Adapter

SPA-4XOC3-POS

3.2

Cisco CRS-1 4-Port T3/E3 Serial Shared Port Adapter

SPA-4XT3/E3

3.4.1

Cisco CRS-1 1-Port OC-192/STM-64 POS/RPR SPA VSR Optics

SPA-OC192POS-VSR

3.4.1

ITU grid 40G PLIM

1OC768-ITU/C

3.3

Cisco CRS-1 Ethernet Interface Modules and SPAS

Cisco CRS-1 8x10 GbE Interface Module/LR

8-10GBE

3.2

10GBASE-LR XENPAK Module for Cisco CRS-1

CRS-XENPAK10GB-LR

3.2

10GBASE-LR XENPAK Module for Cisco CRS-1

XENPAK-10GB-LR+

3.4

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter

SPA-8X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

10GBASE-DWDM XENPAK

CRS 1 CRS-XENPAK10GB-DWDM

3.2.2

ITU grid 4X10G PLIM

4-10GE-ITU/C

3.3


Software Compatibility

Cisco IOS XR Software Release 3.5.2 is compatible with the following Cisco CRS-1 systems:

Cisco CRS-1 4-Slot Line Card Chassis

Cisco CRS-1 8-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

Other Firmware Code

The following firmware code is supported by the Cisco CRS-1 router:

The minimum ROMMON version required for this release is 1.45. For detailed information on ROMMON specifications, see http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html.

The minimum CPUCNTRL version required for this release is 2.07. For more information, see http://www.cisco.com/en/US/products/ps5845/products_configuration_guide_chapter09186a00807e018c.html#wp68039.

Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software Release 3.5.2 supported on the Cisco XR 12000 Series Router and includes the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Code

To determine the software versions or levels of your current system, see Determining Your Software Version.

Feature Set Table

Cisco IOS XR Software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.5.2 features. Table 4 and Table 5 list the Cisco IOS XR Software feature set matrix and associated filenames available for Cisco IOS XR Software Release 3.5.2, supported on the Cisco XR 12000 Series Router.

Table 4 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.5.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.pie-3.5.2

Contains the required core packages, including OS, Admin, Base, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.5.2

Contains the required core packages including, OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.5.2

CORBA agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.5.2

MPLS-TE, LDP, MPLS Forwarding, MPLS OAM, LMP, OUNI, and RSVP.

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.5.2

Multicast Routing Protocols (PIM, MSDP, IGMP, Auto-RP, BSR), Tools (SAP, MTrace, MRINFO), and Infrastructure (MRIB, MURIB, MFWD).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.5.2

Support for Encryption, Decryption, IPSec, SSH, SSL, and PKI.

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.5.2

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Session Border Controller Package

c12k-sbc.pie-3.5.2

Session Border Controller Package for a Cisco XR 12000 Series Router.

Cisco IOS XR Service IPsec controller package

c12k-ipsec-service.pie-3.5.2

Support for service-ipsec and service-gre interfaces in Cisco IOS XR Software.

Cisco IOS XR Firewall package

c12k-firewall.pie-3.5.2

Support for Virtual Firewall (vFW) on a Cisco XR 12000 Series Router.

Cisco IOS XR Documentation Package

c12k-doc.pie-3.5.2

Manual pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

c12k-fpd.pie-3.5.2

Firmware for shared port adapters (SPA) and for fixed port line cards supported in Cisco IOS XR.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.5.2

Diagnostic utilities for Cisco IOS XR routers.

1 Packages are installed individually.

1


Table 5 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.5.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.5.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle.

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.5.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package.

Cisco IOS XR MPLS Package.

Cisco IOS XR Multicast Package.

Cisco IOS XR Security Package.


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.5.2 consist of the following:

2-GB route memory on Performance Route Processor 2 (PRP-2)

1-GB ATA flash storage on PRP-2

1-GB line card route memory on all Engine 3 line cards

1-GB line card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-600 is 1 GB.

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB.


Note The Performance Route Processor 1 (PRP-1) is not supported in production environments.


Hardware Supported

Cisco IOS XR Software Release 3.5.2 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 6 lists the hardware components supported on the Cisco XR 12000 Series Router and the minimum software versions required. See the "Determining Your Software Version" section.

Table 6 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
First Supported in Version
Cisco XR 12000 Series Router Line Card Chassis
   

Cisco XR 12000 Series 12404/80 Chassis

GSR4/80-xx

3.2

Cisco XR 12000 Series 12406/120 Chassis

GSR6/120-AC

3.2

Cisco XR 12000 Series 12410/200 Chassis

GSR10/200-xx

3.2

Cisco XR 12000 Series 12416/320 Chassis

GSR16/320-xx

3.2

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2

Cisco XR 12000 Series Router Chassis Hardware
   

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 AC

12010-AC

3.3

12010 50 Gbps; 1PRP, 2 CSC, 5 SFC, 2 Alarm, 2 DC

12010-DC

3.3

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 AC

12006-AC

3.3

12006 30 Gbps; 1PRP, 2 CSC, 3 SFC, 2 Alarm, 2 DC

12006-DC

3.3

80Gbps Fabric Option with 3xSFC and 2xCSC for 12016 Chassis

12016/80

3.3

Multirate 2.5G IP Service (Modular)

12000-SIP-401

3.3

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 800 Gbps Fabric Option (5xSFC and 2xCSC) for Cisco 12810

Note This fabric option can be configured only in the enhanced Cisco XR 12000 Series Router with 10 slots, part number XR-12000/10.

12810E/800

3.4

Enhanced 800-Gbps Fabric Kit (5xSFC and 2xCSC) for Cisco 12810

Note This fabric kit can be used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 Series Router with 10 slots, part number XR-12000/10.

12810E/800=

3.4

Enhanced 1280-Gbps Fabric Option (3xSFC and 2xCSC) for Cisco 12816

Note This fabric option can be configured only in the enhanced Cisco XR 12000 Series Router with 16 slots, part number XR-12000/16.

12816E/1280

3.4

Enhanced 1280-Gbps Fabric Kit (3xSFC and 2xCSC) for Cisco 12816

Note This fabric kit can used to upgrade the switching capacity to 40G/slot in the enhanced Cisco XR 12000 Series Router with 16 slots, part number XR-12000/16.

12816E/1280=

3.4

Cisco XR 12000 Series Router Interface and Router Processor Cards

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2

Cisco XR 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192POS-VSR

3.2

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192POS-LR

3.2

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

2-port OC48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3

1-Port Channelized STM-1/OC-3 Shared Port Adapters

SPA-1xCHSTM1/OC3

3.5

1-Port Channelized STM-4/OC-12 Shared Port Adapters

SPA-1xCHOC12/DS0

3.5

1-Port OC-192c/STM-64 POS Shared Port Adapters

SPA-OC192POS

3.5

4-Port OC-3c/STM-1 POS Shared Port Adapters

SPA-4XOC3POS

3.5

8-Port OC-3c STM-1/OC-12c STM-4 POS Shared Port Adapters

SPA-8XOC12-POS

3.5

1-Port OC-12c/STM-4 POS Shared Port Adapters

SPA-OC12POS

3.5

1-Port OC-48c/STM-16 POS Shared Port Adapters

SPA-OC48POS

3.5

4-Port OC-48c/STM-16 POS/RPR Shared Port Adapters

SPA-4XOC48POS

3.5

Cisco XR 12000 Series Router Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2

Cisco 2-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-2X1GE-V2

3.4.1

Cisco Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3

Cisco Cisco XR 12000 Series Router Services

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4

Cisco Multi Service Blade (MSB)

XR-12K-MSB

3.4.1 for SBC

3.5 for Virtual Firewall


Software Compatibility

Cisco IOS XR Software Release 3.5.2 is compatible with the Cisco XR 12000 Series Router systems:

Cisco  XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

Cisco XR 12810 Router

Cisco XR 12816 Router

For the existing installed base, the following chassis are supported:

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router

Cisco 12016 Router


Note If you are running IOS XR on a 120xx system with SIP 600, 401, 501 and 601, you must upgrade the fabric. For ROMMON, MBUS, and Fabric Downloader versions, see Other Firmware Code.


Other Firmware Code

The following minimum firmware code is supported by the Cisco XR 12000 Series Router:

LCs

MBUS Agent Software version 2.54 (RAM) (ROM version is 3.53)

ROM Monitor version 17.1

Fabric Downloader version 6.5 (ROM version is 6.5)

RPs

MBUS Agent Software version 2.54 (RAM) (ROM version is 3.53)

ROM Monitor version 1.14

Minimum Cisco IOS Image Level and Boot Helper Version for Migration to Cisco IOS XR on the Cisco XR 12000 Series Router

If you are migrating from Cisco IOS to Cisco IOS XR software on the Cisco XR 12000 Series Router, you must have the following minimum Cisco IOS Image Level and Boot Helper version to support Release 3.5.2:

Cisco IOS image—12.0(32).S

Cisco IOS Boot Helper—12.0(31).S0a

If you have an older version of this system, you must upgrade to the minimum level supported before performing a migration. Otherwise, your migration will fail. For more detailed information, see the document Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router.

Determining Your Software Version

To determine the version of Cisco IOS XR software running on your router, log in to the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command:

RP/0/RP0/CPU0:router# show version
 
   

Cisco CRS-1

On the Cisco CRS-1, you should see a response similar to the following:

Wed Nov  7 15:52:04.955 PST PDT
Cisco IOS XR Software, Version 3.5.2.00[00]
Copyright (c) 2007 by Cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 1.45(20070517:152402) [CRS-1 ROMMON],  
 
   
BB01 uptime is 1 day, 3 hours, 5 minutes
System image file is "disk0:hfr-os-mbi-3.5.2.00/mbihfr-rp.vm"
 
   
cisco CRS-16/S (7455) processor with 4194304K bytes of memory.
7455 processor at 800Mhz, Revision 3.4
 
   
4 E3 Port controller(s)
18 GigabitEthernet/IEEE 802.3 interface(s)
6 Ethernet/IEEE 802.3 interface(s)
25 Packet over SONET/SDH network interface(s)
4 Serial network interface(s)
25 SONET/SDH Port controller(s)
9 TenGigabitEthernet/IEEE 802.3 interface(s)
2043k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
981440k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
 
   
Boot device on node 0/0/SP is bootflash:
Package active on node 0/0/SP:
hfr-fpd, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-fpd-3.5.2.00
    Built on Mon Nov  5 22:17:58 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-diags, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-diags-3.5.2.00
    Built on Mon Nov  5 22:17:25 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-admin, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-admin-3.5.2.00
    Built on Mon Nov  5 21:34:21 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-base, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-base-3.5.2.00
    Built on Mon Nov  5 21:36:17 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-os-mbi, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-os-mbi-3.5.2.00
    Built on Mon Nov  5 21:34:55 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is disk0:
Package active on node 0/0/CPU0:
hfr-sbc, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-sbc-3.5.2.00
    Built on Mon Nov  5 23:05:46 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-fpd, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-fpd-3.5.2.00
    Built on Mon Nov  5 22:17:58 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-doc, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-doc-3.5.2.00
    Built on Mon Nov  5 22:18:21 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-diags, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-diags-3.5.2.00
    Built on Mon Nov  5 22:17:25 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mgbl, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-mgbl-3.5.2.00
    Built on Mon Nov  5 21:20:05 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mcast, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-mcast-3.5.2.00
    Built on Mon Nov  5 21:33:22 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
 
   
hfr-mpls, V 3.5.2.00[00], Cisco Systems, at disk0:hfr-mpls-3.5.2.00
    Built on Mon Nov  5 21:23:30 PST 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/hfr/workspace for c2.95.3-p8
.
.
.

Cisco XR 12000 Series Router

On the Cisco XR 12000 Series Router, you should see a response similar to the following:

Cisco IOS XR Software, Version 3.5.2.00[00]
Copyright (c) 2007 by Cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20040624:164256) [assafb-misc1 1.14dev(0.91)] 
DEVELOPME
NT SOFTWARE^M
Copyright (,  Inc.^M
 
   
ds-gsr-2 uptime is 1 day, 8 minutes
System image file is "disk0:c12k-os-mbi-3.5.2.00/mbiprp-rp.vm"
 
   
cisco 12410/PRP (7450) processor with 2097152K bytes of memory.
7450 processor at 666Mhz, Revision 2.1
 
   
1 Cisco 12000 Series SPA Interface Processor-600
3 Cisco 12000 4 Port Gigabit Ethernet Controllers (12 GigabitEthernet)
2 Cisco 12000 Series Performance Route Processors
12 GigabitEthernet/IEEE 802.3 interface(s)
2 Ethernet/IEEE 802.3 interface(s)
5 PLIM QoS controller(s)
2 Packet over SONET/SDH network interface(s)
2 SONET/SDH Port controller(s)
2043k bytes of non-volatile configuration memory.
1000496k bytes of ATA PCMCIA card at disk 0 (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Boot device on node 0/0/CPU0 is mem:
Package active on node 0/0/CPU0:
c12k-ipsec-service, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-ipsec-service-3.5.2.00
    Built on Tue Nov  6 08:42:55 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-diags, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-diags-3.5.2.00
    Built on Tue Nov  6 11:05:45 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-mcast, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-mcast-3.5.2.00
    Built on Tue Nov  6 08:11:22 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
c12k-mpls, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-mpls-3.5.2.00
    Built on Tue Nov  6 08:10:56 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-k9sec, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-k9sec-3.5.2.00
    Built on Tue Nov  6 08:12:16 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-lc, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-lc-3.5.2.00
    Built on Tue Nov  6 08:20:39 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-fwdg, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-fwdg-3.5.2.00
    Built on Tue Nov  6 08:19:32 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-admin, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-admin-3.5.2.00
    Built on Tue Nov  6 08:18:43 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-base, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-base-3.5.2.00
    Built on Tue Nov  6 08:17:17 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-os-mbi, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-os-mbi-3.5.2.00
    Built on Tue Nov  6 08:13:11 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
Boot device on node 0/2/CPU0 is mem:
Package active on node 0/2/CPU0:
c12k-ipsec-service, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-ipsec-service-3.5.2.00
    Built on Tue Nov  6 08:42:55 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
c12k-diags, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-diags-3.5.2.00
    Built on Tue Nov  6 11:05:45 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
 
   
c12k-mcast, V 3.5.2.00[00], Cisco Systems, at disk0:c12k-mcast-3.5.2.00
    Built on Tue Nov  6 08:11:22 UTC 2007
    By edde-bld1 in /auto/srcarchive2/production/3.5.2/c12k/workspace for c2.95.3-p8
.
.
.
 
   

New and Changed Information

The following sections contain information on new features in Cisco IOS XR Software Release 3.5.2:

New Software Features in Cisco IOS XR Software Release 3.5.2

New Hardware Features Supported in Cisco IOS XR Software Release 3.5.2

New Software Features in Cisco IOS XR Software Release 3.5.2

Cisco CRS-1 and Cisco XR 12000 Series Router Platforms

The following new features in Cisco IOS XR Software Release 3.5.2 are supported on the Cisco CRS-1 router and Cisco XR 12000 Series Router platforms:

MVPNv4:

Basic MVPN with default MDT

Data MDT switchover

VRF side support for IGMP, PIM-SM (static-rp, BSR), bi-direction, PIM-SSMPIM support in core for SM and SSM

PIM support in core for SM (static-rp, BSR, auto-rp), bi-direction, and SSM

PIM-SM auto-rp in VRF (Cisco XR 12000 Series Router)

Hitless Key Exchange:

IS-IS support for HMAC-MD5

OSPF support for MD5, SHA1, HMAC-SHA1, HMAC-MD5

Path Computation Element (PCE):

Interarea traffic engineering (TE) with both PCC and PCE support

TE tunnels over regular bandwidth pool (non-DS TE)

PCE discovery

Manual or dynamic PCE discovery

Backward recursive path computation

Stateless PCE support

LDP auto-configuration consisting of IS-IS and OSPF support

TTL/GTSM for OSPF

Management plane protection:

In-band interface configuration to handle traffic

RP Ethernet interface supported as default out-of-band interface

Support for HTTP, HTTPs, SNMPv3, Telnet, SSH, and TFTPD servers

IP SLA enhancements:

MPLS LSP monitor

LSP ping and trace automation

Support for VCCV for PW

MIB support:

TE-FFR-MIB

Cisco-BGP4-MIB enhancement to support version 6 peer monitoring

BGP Prefix Independent Convergence:

Convergence in sub-seconds

Applicable to both core and edge failures, with or with out MPLS

Cisco CRS-1 Router-Specific Features Only

The following new features in Cisco IOS XR Software Release 3.5.2 are supported only on the Cisco CRS-1 platform:

IP fast re-route (FRR) consisting of IS-IS support (level 1 or 2)

IPv6 Sampled NetFlow:

v9 export format

Interface support for physical, sib-interface, bundles, VLAN over bundles

Ingress and egress

NetFlow key (v6 SRC address, v6 DST address, v6 flow label, L4 SRC/DST port, input interface, L4 protocol type, TOS)

Flow cache fields (destination prefix length, egress interface, number of packets, number of bytes, first and last timestamp, TCP flags, bitmask for TCP options header)

Export for incoming and outgoing packet TOS

MDR enhancements:

IPv6 neighbor discovery spoofing for physical interfaces

LACP spoofing

TE unequal load balancing

Per interface ACL statistics

InterAS support for L2VPN

Local switching support for EoMPLS

Mac-in-mac

Changes to Modular Quality of Service (QoS) units of measure within policy-maps for Cisco IOS XR Software Release 3.3.0 and later releases. Table 7 lists the changes to QoS units of measure.

Table 7 Changes to Quality of Service Units of Measure 

Command
Cisco IOS XR Release 3.2 Units of Measure
Cisco IOS XR Release 3.3.x and Higher Units of Measure

bandwidth

kbps

kbps

police rate

kbps

bps

queue-limit

bytes

packets

random-detect

bytes

packets

shape average

kbps

bps



Note The units of measure (see Table 7) are inserted into the QoS policy, which results in a change to policy behavior. You must manually change the keywords to ensure that the policy operates as expected.


Use caution when applying a configuration earlier than Cisco IOS XR Software Release 3.3.0 to Cisco IOS XR Software Release 3.3.0 or later releases.

Keywords cannot be inserted into the running configuration on a router using Cisco IOS XR Release 3.2.x in advance of the upgrade. One option is to edit the configuration offline and add the necessary keywords.


Note To make a change to a QoS policy, you must first remove the policy from any interfaces that reference it.


To remove a service policy from an input or output interface, use the no form of the service-policy command in interface configuration mode, as shown in the following syntax:

no service-policy {input | output}
 
   

For an ATM or Frame Relay interface, use the following syntax:

no service-policy {input | output} name
 
   

When the policy is removed from an interface, the edited policy is applied. See Cisco IOS XR Modular Quality of Service Command Reference for the applicable release, which is available at http://www.cisco.com/en/US/products/ps5845/prod_command_reference_list.html.

Session Border Controller (SBC)

Only data broker element (DBE) support exists for the following features:

Context Attribute Descriptor Support

H.248 Historical Event Notification

H.248 Segmentation Package Support

H.248 Configurable T-Max

H.248 Gateway Profile Configuration

H.248 Traffic Management (Tman) properties: Peak Data

H.248 Gate Management Package

Rate and Delay Variation Tolerance

Ia Profile Support

IPv4/IPv6 Voice Clipping Avoidance

Interleaving and Non-Interleaving VOD

Configurable Base Root Package

MGC Information Package Support

Address Reporting Package

Cisco XR 12000 Series Router-Specific Features Only

The following new features in Cisco IOS XR Software Release 3.5.2 are supported only on the Cisco XR 12000 Series Router platform:

Link Fragmentation and Interleaving (LFI)—Designed for MLPPP interfaces, LFI is required when integrating voice and data on low-speed interfaces that run at less than 768 Kbps. LFI reduces delay and jitter by fragmenting large datagrams and interleaving them with low-delay traffic packets.

LFI for MLPPP is supported on the SPA-1XCHSTM1/OC3 SPA.


Note Low-priority traffic takes up to 30 seconds before recovering from a SPA shutdown or a SPA reload.


Multilink PPP (MLPPP)—Supports QoS on MLPPP interfaces. MLPPP is supported on SPA-1XCHSTM1/OC3 SPA and Cisco 1-Port Channelized DS0/OC-12.

RP Flexible Slot—Supports the presence of an active and a standby RP in any slot of the router.

Strict Unicast IPv4 and IPv6 Reverse-Path Forwarding (uRPF)—Allows the source address of the packet to be checked in the FIB. If the packet is received on the same interface used to forward the traffic to the source of the packet, the packet passes the check and is processed further; otherwise, it is dropped.

MPLS Sampled Netflow—Supports configuration of Fixed NetFlow in sampled mode on an interface for incoming or outgoing MPLS traffic. Fixed NetFlow is also supported on subinterfaces (for example, GE VLAN, ATM VC, and POS FR).

Edge Support for IPv6 Applications—Delivers IPv6 traffic over an IPv4/MPLS core with 6PE support. Delivers IPv6 VPN traffic over an IPv4/MPLS core with 6VPE support. Delivers IPv6 VPN traffic over L2TPv3 core with 6VPE support. Supports IPv6 over Frame-Relay.

Channelized SONET/SDH—Provides the ability to transport SONET frames across multiplexed T3/E3, VT1.5, and POS channels.

Channelized SONET is supported on the following shared port adapters (SPAs):

Cisco 1-Port Channelized STM-1/OC-3 shared port adapter

Cisco 1-Port Channelized DS0/OC-12 shared port adapter

Channelized SONET over POS is supported only on the following shared port adapter (SPA):

Cisco 1-Port Channelized DS0/OC-12 shared port adapter

Channelized SDH is supported only on the following shared port adapter (SPA):

Cisco 1-Port Channelized STM-1/OC-3 shared port adapter

Bi-directional Forwarding Detect (BFD)—Supports MLPPP links.

New MIBs for VFR awareness support:

CISCO-IPSEC-FLOW-MONITOR-MIB

CISCO-IPSEC-MIB

Cisco XR 12000 Series Router Services

SBC:

Context Attribute Descriptor Support

H.248 Historical Event Notification

H.248 Segmentation Package Support

H.248 Configurable VRF

H.248 Gateway Profile Configuration

Ia Profile Support

IPv4/IPv6 Voice Clipping Avoidance

Secure Media Support

RADIUS VRF Support

Configurable Base Root Package

MGC Information Package Support

SIP Inbound Authentication

SIP-I Transparency and Profile Support

SIP Configuration Flexibility

Integration of Resource Management and SIP

P-CSCF Support

IBCF Processing Support

H.323 Privacy

Virtual Firewall (VFW)—The VFW feature is provided through the MSB. The vFW service allows you to apply a firewall policy on traffic traveling in or out of a Cisco XR 12000 Series Router interface. A VFW provides multiple logical firewalls for multiple networks on a single system. You can provide firewalls that separate and secure individual network users and manage them from one system by establishing "security domains" that are controlled by the VFWs—with each firewall having its own domain defined.

Cisco IOS XR VPN IPSec Aggregation—Support for the following new IPSec features was added on the Cisco XR 12000 Series Router:

Multiprotocol Label Switching (MPLS) Encapsulated Packets on Inbound Direction

VPN Monitoring

Support for a mixture of SPA types

Enhancement to debug and manageability

New Hardware Features Supported in Cisco IOS XR Software Release 3.5.2

The following new hardware features are supported in Cisco IOS XR Software Release 3.5.2:

Cisco CRS-1 hardware:

Cisco 1-port 10GE LAN/WAN-PHY Shared Port Adapter (WAN PHY SPA-1X10GE-WL-V2)

Cisco XR 12000 Series Router hardware:

Sphere Fabric (12010 and 12016)

SPA-1XCHSTM1/OC3

SPA-1XOC12/DS0

SPA-2XOC12-POS, SPA-4XOC12-POS, SPA-8XOC12-POS

SPA-4XOC3-POS-V2, SPA-8XOC3-POS

SPA-1XOC48POS/RPR

For detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs), see the following documents:

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide, Release 3.5.0

Cisco IOS XR Interface and Hardware Components Configuration Guide, Release 3.5.0

Important Notes

Country-specific laws, regulations, and licences—In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router—When migrating a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR Software, follow the instructions provided in Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router, Release 3.5.0.

Card, fan controller, and RP removal—For all card removal and replacement (including fabric cards, line cards, fan controller, and RP) follow the instructions provided by Cisco to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

Exceeding Cisco testing—If you intend to test beyond the combined maximum configuration tested and published by Cisco, please contact your Cisco representative to discuss how to engineer a large-scale configuration maximum for your purpose.

More power required for Cisco SIP-600 line cards on the Cisco XR 12000 Series Router—These line cards draw more power than the previous ones. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
.
.
.
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Per-interface ICMP disable feature unsupported on Cisco XR 12000 Series Routers.

Disable the preempt feature in the VFW application—In Cisco IOS XR Release 3.5.2, you must disable the preempt feature in the VFW application. Make sure that you configure no preempt for all fault-tolerant groups under the Admin context on the VFW application. See the following example:

ft group 1
  peer 1
  no preempt
  associate-context ctx1
  inservice

Caveats

Caveats describe unexpected behavior in Cisco IOS XR Software Releases. Severity-1 caveats are the most serious caveats; severity-2 caveats are less serious.

Open Caveats—Release 3.5.2

This section lists the caveats for Cisco IOS XR Software Release 3.5.2:

Cisco CRS-1 and Cisco XR 12000 Series Router Caveats

Cisco CRS-1-specific Caveats

Cisco XR 12000 Series Router-Specific Caveats

Cisco CRS-1 and Cisco XR 12000 Series Router Caveats

The following caveat applies to both platforms:

CSCsj93281

Basic Description:

Make OSPF max-metric router-lsa on RP failover deterministic default.

Symptom:

OSPF max-metric router LSA is not sent on FO even when "max-metric router-lsa on-startup..." is configured.

Conditions:

It is only on 3.4 releases and the LSA with max metric is sent only on power on, not on switchover.

Workaround:

An SMU is available to make max-metric the default. Contact technical support for the location.

CSCsk34353

Basic Description:

IOS XR Scale- snmpd crash while polling walking enterprises.

Symptom:

While executing snmpwalk (.1.3.6.1.4.1.9.9.166.1.5.1.1.2) on a router with scale config as given below and performing a SPA reload or OIR simultaneously, sometimes the snmpd process crashes. The snmpd process automatically restarts and during the time the query could timeout or be delayed.

Conditions:

Running config with:

1. 2000 connections

2. 700 ospf interfaces

3. All ipv4 L3VPN

4. 250 vFW interfaces—200 non-VASI, 50 VASI

Workaround:

Since snmpd is restarted, there is no impact to subsequent MIB queries. Or, stop the MIB query when SPA reload or OIR is attempted.

CSCsk66032

Basic Description:

SPF scheduling problem when receiving changed LSAs constantly.

Symptom:

The following error message may be seen:

RP/0/RP1/CPU0:Sep 26 08:33:13.975 : ospf[419]: %ROUTING-OSPF_RIB-3-ERR_PATH_ADD : 
Error adding path to batching buffer RP/0/RP1/CPU0:Sep 26 08:33:13.975 : ospf[419]: 
%ROUTING-OSPF_RIB-3-ERR_PATH_DELETE : Error deleting path from batching buffer 
RP/1/RP1/CPU0:Sep 26 08:33:19.445 : ipv4_rib[238]: %ROUTING-RIB-3-ERR_DELETE : Path 
delete failure for Table 0xe0000000, prefix 10.10.50.2/32, protocol 5, intf 0x3580180, 
tunnelid 0, nexthop_table 0xe0000000, nexthop 10.10.200.2 
 
   

Conditions:

This may be seen on IOS-XR systems running OSPF protocol when changed LSAs are received constantly.

Workaround:

None.

Cisco CRS-1-specific Caveats

The following caveats are specific to the Cisco CRS-1 platform:

CSCsl01722

Basic Description:

RIB/PIM interaction after RP FO on multi-chassis causes temporary multicast loss.

Symptom:

After performing a Fail-Over some multicast traffic streams might be affected for up to three minutes and then recovers.

Conditions:

This was seen on a multi-chassis system with several multicast streams (both SM and SSM). The traffic hit was seen on few streams only and for 2-3 minute period.

Workaround:

Traffic recovers after few minutes of FO with no other side effects.

CSCsl04567

Basic Description:

FO with TE multicast-intact has multicast traffic loss on Multi-Chassis.

Symptom:

Several minutes of multicast traffic loss (up to 10 minutes) was seen after performing a fail-over on DSC rack in a Multi-Chassis platform.

Conditions:

This happened after FO on a Multi-Chassis platform with " mpls traffic-eng multicast-intact" configured under ISIS.

After removing this multicast-intact configuration, this issue was not seen.

Workaround:

This problem is limited to multicast-intact, so the only validated workaround is to remove the configuration, if possible. Also co-locating rib and rump on the same node reduces the loss considerably even if mcast-intact is configured.

An example config to co-locate ipv4_rump with ipv4_rib is shown below:

placement program ipv4_rump
affinity location-set 1/RP0/CPU0 attract 400
 
   

CSCsj97654

Basic Description:

cfgmgr-rp[132]: %MGBL-CONFIG-0-INIT_FAILURE logs keep popping up on LR.

Symptom:

Error log keeps popping up on LR after UUT is reloaded.

Conditions:

Router reload.

Workaround:

Restart rdsfs process.

CSCsl03448

Basic Description:

Show diagnostic schedule is not working after upgrade from 3.3.5 to 3.5.x.

Symptom:

Show diagnostic schedule is not displaying the schedule diagnostic time. The diagnostic configuration items which are not effective after an upgrade can be identified by missing card-type field when displayed with sh run command in admin mode.

Conditions:

This is happening after an upgrade from 3.3.5 to 3.5.2. It can happen with any upgrade from pre 3.4.1 to 3.4.1 and later release upgrade.

Workaround:

Re-apply the existing non-working configuration and everything starts working.

CSCsk78968

Basic Description:

With negotiation mismatch GIG-E flaps continuously.

Symptom:

GIG-E interface continuously flaps.

Conditions:

This happens when there is a negotiation mismatch.

Workaround:

Set correct negotiation.

CSCsl09342

Basic Description:

In MC, sysdb responds nothing to show rib and show static.

Symptom:

On multi-chassis systems, the show rib and show route commands show no routes. The symptom is purely cosmetic. All routes remain in operation, and no traffic forwarding or routing is impacted.

Conditions:

The problem can occur after a switchover of a non-dLRSC RP pair.

Workaround:

Use the process restart to restart sysdb_mc on each active RP, followed by sysdb_svr_shared on the dLRSC node.

CSCsf02904

Basic Description:

After reload, show route summary shows zero routes.

Symptom:

After reloading the router using admin reload location all, the output of the show route summary and show route commands shows zero routes, even though routes are known to be configured on the router. Local and remote interfaces are pingable. In a multi-rack system, this problem is seen when executing the show commands from any active management node.

Conditions:

This bug has been observed in IOS-XR release 3.3.2, but it may also exist in the 3.4 release. It is a rare-occurring issue, which is seen after reloading the router using the admin reload location all command.

Workaround:

This is believed to be an issue in the System Database component (SysDB). Restarting the sysdb_mc process on the dSDRSC node, using the process restart sysdb_mc command, most likely fixes the issue. Restarting sysdb_mc is non-traffic-impacting and should not have any other adverse effect on the router.

CSCsj20726

Basic Description:

Active RP in Multishelf does not allow intra-rack heartbeats across racks.

Symptom:

In absence of full mesh of cabling between the LCC & FCC SC-GE-22 cards, there is a likelihood that standby SC card may keep reloading due to loss of heartbeats.

Conditions:

In absence of full mesh cabling between the control Ethernet ports of RPs and SC-GE-22. The full mesh details are documented in customer documentation on Cisco.com.

This may occur in spite of an L2 path that is present between the SCs through multiple switches in RPs / SC-GE-22. You may be able to successfully ping across SCs through ctrl eth, but still heartbeats are not passed across.

Workaround:

Complete the full-mesh cabling as recommended in customer documentation on Cisco.com.

Further Problem Description:

This is due to the unexpected behavior of the switch in Active RP to not forward the heartbeats (reserved MAC address) to be passed across the racks.

CSCsk58509

Basic Description:

Fib convergence degraded 7% from releases prior to 3.5.2 on 1MSC for LDP.

Symptom:

IGP in LDP scenario convergence degraded 7% from earlier images compared to 3.5.2.FCS image.

Conditions:

This issue occurs with a plain MPLS LDP setup. LDP sync in IGP (OSPF/ISIS) is enabled on LSRs. Either hop-change or 2-1 tests could trigger it. This only happens in 1 MSC case. Two MSC cases have significant improvement. Image in problem is 3.5.2.16I.

Workaround:

There is no workaround.

Cisco XR 12000 Series Router-Specific Caveats

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsj96786

Basic Description:

Link flaps cause excessive messaging.

Symptom:

A 10 gigabit link with a SPA-1XTENGE-XFP= might see very sporadic short time flap although the fiber and signal are clean.

Conditions:

None.

Workaround:

Configure carrier-delay under the interface of the remote end to prevent the flap. Short packet drop might still be seen.

CSCsk41393

Basic Description:

Rollback config fails due to OSPF exiting before processing requests.

Symptom:

Rollback configuration {last | to} may fail if OSPF is enabled and rollback does not change OSPF config.

Conditions:

The problem was observed on routers running IOS-XR Release 3.5 and may occur in earlier releases.

Workaround:

Reconfigure OSPF from failed configuration.

CSCsk62338

Basic Description:

Active SBC restart after failover.

Symptom:

Active SBC restart after failover.

Conditions:

This issue is seen after multiple failovers.

Workaround:

None.

CSCsk81099

Basic Description:

Configuring SDR with a '/' in the sdr name crashes LRD process.

Symptom:

Configuring SDR with a sdr-name containing the character '/' causes a crash of the lrd process. Subsequent operations are stalled because SDR configuration fails.

Conditions:

Config operation involving SDR carve operation.

Workaround:

Avoid using / in the sdr-name during configuration. If configuration already exists, replace the sdr-name and reapply configuration.

CSCsk86218

Basic Description:

Ensure MBI are compatible before the SW Upgrade.

Symptom:

1. While upgrading lower releases to 3.5.2, the standby PRP gets stuck in MBI state.

2. While downgrading from 3.5.2 to lower releases, the standby PRP gets stuck in MBI state.

Conditions:

1. This issue occurs during and after the upgrade, if standby is not coming up (stuck in MBI state). This can happen since there is a version mismatch in the Active and Standby PRPs. One is 3.5.2 and other one is 3.x.x. Then, the standby card may not come up since there is incompatibility in the images. Follow the Workaround 1 or 2 below.

2. This issue occurs during and after the downgrade if standby is not coming up (stuck in MBI state). This can happen since there is a version mismatch in the Active and Standby PRPs. One is 3.x.x and other one is 3.5.2. Then the standby card may not come up since there is incompatibility in the images. Follow the Workaround 3 below.

3. This issue occurs mainly when there is MBI incompatibility encountered between software versions and install commit is not issued for one of the software. In the situation when RP reloads it will try to load last committed software that is when the issue occurs.

Workaround:

1. If the issue is encountered after the successful upgrade to 3.5.2 from 3.4.x, but any of the non-dSC RPs reloaded due to an error condition when booting up or an OIR event before "install commit" was issued. Non-dSC RP is either a standby RP or an RP in non-Owner SDR. Below instructions mention standby RP, the steps are the same for non-Owner RPs.

(a) Verify that this is the issue/situation. Check for the following:

- Install operation completed successfully before issuing a reload for all nodes (console logs).

- Wait for active RP to come up and verify that it's running 3.5.2 ("show install active").

- Verify that standby RP is trying to boot 3.4.2, this can be seen on the standby console in the banner when the image is booting (e.g. "Cisco IOS XR Software for the Cisco XR c12000-mbiprp, Version 3.4.2[1]").

- There should be the following error displayed periodically on the standby console:

Insthelper encountered a fatal error condition, and is exiting:
Error value = (1341786888), Error string = ('Subsystem(8180)' detected the 'warning' condition 'Code(5)': Host is down)

(b) Bring standby RP to ROMMON. This can be done, for example:

- Issue "hw-module loc <location> reload" from dSC.

- Issue "send break" on the standby RP console line when the following displayed:

DRAM DIMM Slot 1: 2048M found, Slot 2: Empty 
MPC7457 platform with 2097152 Kbytes of main memory
 
   

(c) Reset BOOT variable to a new value.

- Check its current value. It should be pointing to disk0:c12k-os-mbi-3.4.2/mbiprp-rp.vm

- Check if 3.5.2 MBI exists on disk, for example:

rommon 7 > dir disk0:c12k-os-mbi-3.5.2.14I 
File size Perms File name 
0 drw- etc 
0 drw- instdb_v 
0 drw- mbi 
0 drw- drp 
0 drw- gsr 
10088776 -rw- mbiprp-rp.vm 
0 drw- instdb
 
   

- Set BOOT variable to new 3.5.2 MBI value, for example:

rommon 8 > BOOT=disk0:c12k-os-mbi-3.5.2.14I/mbiprp-rp.vm 
rommon 9 > sync
 
   

- Do "reset" to reload this node and let it come up with 3.5.2 MBI.

If you changed config-register value when bringing to ROMMON, change it back to the original value.

If 3.5.2 MBI is not present on disk, need to go through "diskboot procedure" for standby, refer to scenario 2 below.

(d) Verify, "install commit"

- Verify that the node comes up successfully with 3.5.2, wait until it's in IOX-RUN state.

- When all non-dSC RP nodes are up, issue "install commit".

2. If the router is running 3.5.2 sw and a new standby (or non-Owner) RP is inserted that was diskbooted with 3.4.x previously.

Prepare the new RP in the same way as with original diskboot procedure for standby. For example, by booting mbiprp-rp.vm from tftp or ftp. For example, on the standby console:

rommon 1 > boot tftp address://directory/mbiprp-rp.vm-3.5.2 192.85.16.23
 
   

For more documentation on diskboot procedure refer to Migrating From Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router, Release 3.5 document on Cisco.com.

3. If the issue is encountered when:

- Downgrading from 3.5.2 to 3.4.x, but a non-dSC RP rebooted/OIR and booting 3.5.2 while the dSC RP is 3.4.x.

- The router is booted with 3.4.x sw, and a new RP is inserted that was baked with 3.5.2 previously.

CSCsk94045

Basic Description:

IKE crash on aaa avpair

Symptom:

Remote Access tunnels are not authenticated because of IKE process crash.

Conditions:

When AAA tries to use the fallback option for a user who is not able to authenticate from primary location, for example, from RADIUS to local or from local to RADIUS, IKE process crashes.

Workaround:

Do not use fallback option for AAA authentication.

CSCsk96844

Basic Description:

RA fall back option for Radius broken using IKE/Xauth.

Symptom:

Remote Access tunnels are not authenticated when fallback option is configured for AAA authentication.

Conditions:

When AAA tries to use fallback option for a user who is not able to authenticate from primary location, for example, from RADIUS to local or from local to RADIUS, IKE process crashes.

Workaround:

Do not use fallback option for AAA authentication.

Resolved Cisco IOS XR Software PSIRT-Related Caveats

CSCti62211

Basic Description:

BGP flaps due to unknown attribute

Symptom:

Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

Conditions:

Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending to neighboring devices, but neighboring devices may be running operating systems other than Cisco IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. This is per standards defining the operation of BGP.

Workaround:

No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free software maintenance upgrades (SMUs) progressively starting 28 August 2010.

A Security Advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml

Upgrading Cisco IOS XR Software

Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).

Software packages are installed from package installation envelope (PIE) files that contain one or more software components.

The following URL contains links to information about how to upgrade or downgrade Cisco IOS XR Software to Release 3.5.2:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html

Product Life Cycle of Cisco IOS XR Software Release 3.5

The Cisco IOS XR Software release strategy is time-based with a fixed release date and life cycle, as opposed to being a feature-based release strategy with a variable release date.

Table 8 lists the major milestones of Cisco IOS XR Software Release 3.5.

Table 8 Major Release End-of-Life Milestones of Cisco IOS XR Software Release 3.5 

Milestone
Definition
Date
Release Available Date

The date that the Cisco IOS XR Software Release 3.5 got published on Cisco.com and became available to the general public.

November 9, 2007

End-of-Life Announcement Date

The date that the official End-of-Life document announces the end of sale and end of life of a product that is distributed to the general public.

August 9, 2008

End-of-Sale Date and End of Maintenance Date

The last date to order Cisco IOS XR Software Release 3.5 through Cisco point-of-sale mechanisms. The product is no longer for sale after this date.

This also marks end of engineering, maintenance rebuilds, and software fixes through rebuilds of Cisco IOS XR Software Release 3.5. After this date, maintenance rebuilds and software-fix support will be provided only through rebuilds of Cisco IOS XR Software Release 3.6 or later.

May 9, 2009

End of Application Software Maintenance Releases Through Migration: Operating System Software

The last date that Cisco Engineering may release any final software maintenance releases or bug fixes via SMU. From May 9, 2009 until May 9, 2010, maintenance rebuilds and software fix-via SMU support for Cisco IOS XR Software Release 3.5 will be provided only through migration to rebuilds of Cisco IOS XR Software Release 3.6. After June 21, 2010, Cisco Engineering will no longer develop, repair, maintain, or test Cisco IOS XR Software Release 3.5.

May 9, 2010

Last Date of Support

The last date to receive service and support for the Cisco IOS XR Software Release 3.5. After this date, all support services for the Cisco IOS XR Software Release 3.5 are unavailable and the product becomes obsolete.

May 9, 2014


Troubleshooting

For information on troubleshooting Cisco IOS XR Software, see the Cisco IOS XR Getting Started Guide and the document Cisco IOS XR Troubleshooting.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 and Cisco XR 12000 Series Router. Documentation is available in the form of PDF and HTML files and is available on www.Cisco.com.

Use these release notes with the following documents:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at the following URLs:

Cisco CRS-1 Series Router:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Router:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR Software documentation set includes the Cisco IOS XR software configuration guides and command references, as well as a getting started guide. For a full list, see About Cisco IOS XR Software Documentation for Release 3.5.0 for a list of Cisco IOS XR Software documentation for Release 3.5.0.

You can find the most current software documentation at the following URL:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

Obtaining Documentation, Support, and Security Guidelines

For information on how to obtain documentation or support, on how to provide documentation feedback, for security guidelines, as well as on recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html