Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco IOS XR Software Release 3.8.2

  • Viewing Options

  • PDF (767.9 KB)
  • Feedback
Release Notes for Cisco IOS XR Software Release 3.8.2

Table Of Contents

Release Notes for Cisco IOS XR Software Release 3.8.2

Key Changes from Previous Releases in Cisco IOS XR Release 3.8.2

Contents

Introduction

System Requirements

Cisco CRS-1 Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Support

Cisco XR 12000 Series Router

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Firmware Support

Minimum and Preferred Cisco IOS Image and Boot Helper Levels for Migration

Minimum Firmware Requirement

Determining Your Software Version

New Software Features in Cisco IOS XR Software Release 3.8.2

New Software Features Supported on All Platforms

Multicast Only Fast Reroute

Cisco CRS-1 Router-Specific Software Features

Cisco XR 12000 Series Router-Specific Software Features

New Hardware Features for Cisco IOS XR Software Release 3.8.2

Cisco CRS-1 Router-Specific Hardware Features

Cisco XR 12000 Series Router-Specific Hardware Features

New Commands

router pim global maximum

show mrib route

Modified Commands

show pim summary

Important Notes

Minimum Flash Disk Requirements When Upgrading to Release 3.8.2

Caveats

Cisco IOS XR Caveats

Caveats Specific to the Cisco CRS-1 Router

Caveats Specific to the Cisco XR 12000 Series Router

Resolved Cisco IOS XR Software PSIRT-Related Caveats

Upgrading Cisco IOS XR Software

Product Life Cycle of Cisco IOS XR Software Release 3.8.2

Troubleshooting

Related Documentation

Hardware Documents

Software Documents

Obtaining Documentation and Submitting a Service Request


Release Notes for Cisco IOS XR Software Release 3.8.2


April 9, 2013

Cisco IOS XR Software Release 3.8.2

Text Part Number OL-20796-04

These release notes describe the features provided in the Cisco IOS XR Software Release 3.8.2 and are updated as needed.


Note For information about Cisco IOS XR Software Release 3.8.2, see the "Important Notes" section.


You can find the most current Cisco IOS XR software documentation on the World Wide Web at: http://www.cisco.com/en/US/partner/products/ps5845/tsd_products_support_series_home.html

These electronic documents may contain updates and modifications. For more information on obtaining Cisco documentation, see the "Obtaining Documentation and Submitting a Service Request" section on page 45.

For a list of software caveats that apply to Cisco IOS XR Software Release 3.8.2, see the "Caveats" section. The caveats are updated for every release and are described on the World Wide Web at: www.cisco.com

We recommend that you view the field notices for this release to see if your software or hardware platforms are affected at: http://www.cisco.com/public/support/tac/fn_index.html

Key Changes from Previous Releases in Cisco IOS XR Release 3.8.2

Cisco IOS XR Software Release 3.8.2 requires a 2-GB flash disk as a minimum. Therefore, you must upgrade an existing PCMCIA 1-GB flash disk to 2 GB or 4 GB before upgrading to Cisco IOS XR Software Release 3.8.2. For more information, see the "Minimum Flash Disk Requirements When Upgrading to Release 3.8.2" section.

Contents

These release notes contain the following sections:

Introduction

System Requirements

Determining Your Software Version

New Software Features in Cisco IOS XR Software Release 3.8.2

New Hardware Features for Cisco IOS XR Software Release 3.8.2

New Commands

Modified Commands

Important Notes

Caveats

Upgrading Cisco IOS XR Software

Product Life Cycle of Cisco IOS XR Software Release 3.8.2

Troubleshooting

Related Documentation

Obtaining Documentation and Submitting a Service Request

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software provides the following features and benefits:

IP and RoutingSupports a wide range of IPv4 and IPv6 services and routing protocols; such as Border Gateway Protocol (BGP), Routing Information Protocol (RIPv2), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), Hot Standby Router Protocol (HSRP), and Virtual Router Redundancy Protocol features (VRRP).

BGP Prefix Independent ConvergenceProvides the ability to converge BGP routes within sub seconds instead of multiple seconds. The Forwarding Information Base (FIB) is updated, independent of a prefix, to converge multiple 100K BGP routes with the occurrence of a single failure. This convergence is applicable to both core and edge failures and with or with out MPLS. This fast convergence innovation is unique to Cisco IOS XR software.

Multiprotocol Label Switching (MPLS)Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Virtual Private LAN Service (VPLS), and Layer 3 Virtual Private Network (L3VPN). The Cisco CRS-1 router supports Layer 2 Virtual Private Network (L2VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM) and Protocol Independent Multicast (PIM) in Sparse Mode only. The Cisco CRS-1 router supports Bidirectional Protocol Independent Multicast (BIDIR-PIM).

Quality of Service (QoS)—Supports QoS mechanisms including policing, marking, queuing, random and hard traffic dropping, and shaping. Additionally, Cisco IOS XR software also supports modular QoS command-line interface (MQC). MQC simplifies the configuration of various QoS features on various Cisco platforms.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces. Includes a comprehensive set of Syslog messaging.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; Authentication, Authorization, and Accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); Management Plane Protection (MPP) for control plan security; and Simple Network Management Protocol version3 (SNMPv3). Control plane protections integrated into line card Application-Specific Integrated Circuits (ASICs) include Generalized TTL Security Mechanism (GTSM), RFC 3682, and Dynamic Control Plane Protection (DCPP).

Craft Works Interface (CWI)—CWI is a client-side application used to configure and manage Cisco routers. Management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment; fault tolerance; fast switchover; link aggregation; nonstop routing for ISIS, LDP, BGP, and OSPF; and nonstop forwarding (NSF).

Multicast service delivery in SP NGN—MVPNv4 support carries multicast traffic over an ISP MPLS core network.

IPv6 Provider Edge Router support for IPv6 applications—Delivers IPv6 traffic over an IPv4/MPLS core with IPv6 provider edge router (6PE) support.

IPv6 VPN over MPLS (6VPE) support—Delivers IPv6 VPN over MPLS (IPv6) VPN traffic over an IPv4 or MPLS core with 6VPE support.

6VPE over L2TPv3 support—Delivers IPv6 VPN traffic over L2TPv3 core with 6VPE support (Cisco XR 12000 Series Router only). This feature is also available on Cisco IOS software.

Enhanced core competencies:

IP fast convergence with Fast Reroute (FRR) support for Intermediate System-to-Intermediate System (IS-IS)

Traffic engineering support for unequal load balancing

Path Computation Element (PCE) capability for traffic engineering

Firewall Services—Seamless insertion of Firewall Services in the data path with Virtual Firewall support on Multi Service Blade (XR-12K-MSB) for the Cisco XR 12000 Series Router.

VPN IPSec Aggregation —The IPSec Aggregation feature is provided through SPA-IPSEC-2G-2 card. The IPSec Aggregation feature allows you to terminate up to 64-K VPN tunnels, both site-to-site and remote access, if four VPN SPAs are used.

L2TPv3 Tunneling Mechanism—Service Providers who do not use MPLS in the core, but want to offer VPN services can use the L2TPv3 tunneling mechanism. This feature support includes IPv4 (VPNv4) and IPv6 (6VPE) VPN services using L2TPv3 encapsulation. The L2TPv3 packet is encapsulated in an IPv4 delivery header and is carried across an IPv4 backbone. VPN prefixes are advertised with BGP labels and resolved over L2TPv3 tunnels. This feature is supported only on the Cisco XR 12000 Series Router.

For more information about new features provided on various platforms for Cisco IOS XR Software Release 3.8.2, see the "New Software Features in Cisco IOS XR Software Release 3.8.2" section in this document.

System Requirements

Cisco IOS XR Software Release 3.8.2 supports the following platforms:

Cisco CRS-1 Router

Cisco XR 12000 Series Router

To determine the software versions or levels of your current system, see the "Determining Your Software Version" section.

Cisco CRS-1 Router

This section describes the system requirements for Cisco IOS XR Software Release 3.8.2 supported on the Cisco CRS-1 router platform. The system requirements include the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Support

To determine the software versions or levels of your current system, see Determining Your Software Version.

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.8.2 features. Table 1 lists the Cisco IOS XR software feature set matrix (PIE files) and associated filenames available for the Cisco IOS XR Software Release 3.8 supported on the Cisco CRS-1.

Table 1 Cisco CRS-1 Supported Feature Sets
(Cisco IOS XR Software Release 3.8.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.pie-3.8.2

Contains the required core packages, including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

comp-hfr-mini.vm-3.8.2

Contains the required core packages including OS, Admin, Base, Forwarding, Modular Services Card, Routing, SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

hfr-mgbl-p.pie-3.8.2

CORBA2 agent, XML3 Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

hfr-mpls-p.pie-3.8.2

MPLS-TE4 , LDP5 , MPLS Forwarding, MPLS OAM6 , LMP7 , OUNI8 , RSVP9 , and Layer 2 VPN and Layer 3 VPN.

Cisco IOS XR Multicast Package

hfr-mcast-p.pie-3.8.2

Multicast Routing Protocols (PIM, MSDP10 , IGMP11 , Auto-RP), Tools (SAP, MTrace), and Infrastructure (MRIB12 , MURIB13 , MFWD14 ), and BIDIR-PIM15 .

Cisco IOS XR Security Package

hfr-k9sec-p.pie-3.8.2

Support for Encryption, Decryption, IPSec16 , SSH17 , SSL18 , and PKI19 (Software based IPSec support—maximum of 500 tunnels)

Cisco IOS XR Documentation Package

hfr-doc.pie-3.8.2

Man pages for Cisco IOS XR CLI commands

Cisco IOS XR FPD Package

hfr-fpd.pie-3.8.2

Firmware for Fixed PLIM20 and SPA21 modules as well as ROMMON22 images for Cisco CRS-1 chassis.

Cisco IOS XR Diagnostic Package

hfr-diags-p.pie-3.8.2

Diagnostic utilities for Cisco IOS XR routers.

1 Packages installed individually

2 CORBA = Common Object Request Broker Architecture

3 Extensible Markup Language

4 MPLS Traffic Engineering

5 Label Distribution Protocol

6 Operations, Administration, and Maintenance

7 Link Manager Protocol

8 Optical User Network Interface

9 Resource Reservation Protocol

10 Multicast Source Discovery Protocol

11 Internet Group Management Protocol

12 Multicast Routing Information Base

13 Multicast-Unicast RIB

14 Multicast forwarding

15 Bidirectional Protocol Independent Multicast

16 IP Security

17 Secure Shell

18 Secure Socket Layer

19 Public-key infrastructure

20 Physical layer interface module

21 Shared port adapters

22 ROM monitor


Table 2 lists the Cisco CRS-1 TAR files.

Table 2 Cisco CRS-1 Supported Feature Sets
(Cisco IOS XR Software Release 3.8.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

CRS-1-iosxr-3.8.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Diagnostic Package

Cisco IOS XR FPD Package

Cisco IOS XR Documentation Package

Cisco IOS XR IP/MPLS Core Software 3DES

CRS-1-iosxr-k9-3.8.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package

Cisco IOS XR Diagnostic Package

Cisco IOS XR FPD Package

Cisco IOS XR Documentation Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco CRS-1 running Cisco IOS XR Software Release 3.8.2 consist of the following:

4-GB memory on the route processors (RPs)

2-GB memory on each modular services card (MSC)

2-GB PCMCIA flash disk


Note Cisco IOS XR Software Release 3.8.2 requires a 2-GB flash disk as a minimum. Therefore, you must upgrade an existing PCMCIA 1-GB flash disk to 2 GB or 4 GB before upgrading to Cisco IOS XR Software Release 3.8.2. For more information, see the "Minimum Flash Disk Requirements When Upgrading to Release 3.8.2" section.


Hardware Supported

All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

The following table lists the supported hardware components on the Cisco CRS-1 and the minimum required software versions. For more information, see the "Other Firmware Support" section.

Table 3 Cisco CRS-1 Supported Hardware and Minimum Software Requirements 

Component
Part Number
Support from Version
Cisco CRS-1 Series 16-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

CRS-16-LCC

3.2

Cisco CRS-1 Fan Tray for 16-Slot LCC

CRS-16-LCC-FAN-TR

3.2

Cisco CRS-1 Fan Controller for 16-Slot Line Card Chassis

CRS-16-LCC-FAN-CT

3.2

Cisco CRS-1 16-Slot Alarm Board

CRS-16-ALARM

3.2

Cisco CRS-1 AC Delta Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACD

3.2

Cisco CRS-1 AC Wye Power Shelf for 16-Slot LCC

CRS-16-LCC-PS-ACW

3.2

Cisco CRS-1 DC Power Shelf for 16-Slot LCC

CRS-1-LCC-PS-DC

3.2

Cisco CRS-1 LCC Front AC Power Panel

CRS-16-ACGRILLE

3.2

Cisco CRS-1 LCC Front DC Power Panel

CRS-16-DCGRILLE

3.2

Cisco CRS-1 Line Card Chassis Front Doors

CRS-16-LCC-DRS-F

3.2

Cisco CRS-1 Line Card Chassis Front Cable Mgmt

CRS-16-LCC-FRNT

3.2

Cisco CRS-1 LCC Expanded Front Cable Mgmt

CRS-16-LCC-FRNT-E

3.2

Cisco CRS-1 Line Card Chassis Rear Cable Mgmt

CRS-16-LCC-BCK-CM

3.2

Cisco CRS-1 Line Card Chassis Rear Doors

CRS-16-LCC-DRS-R

3.2

Cisco CRS-1 Lift for LCC 16 and FCC

CRS-16-LIFT/B

3.2

Cisco CRS-1 DC PEM for 16 slot LCC and FCC

CRS-16-DC-PEM

3.2

Cisco CRS-1 16 Slot System Reduced-Noise DC PEM

CRS-16-DC-PEM-B

3.8

Cisco CRS-1 16 Slot System Reduced-Noise Fan Tray

CRS-16-LCC-FNTR-B

3.8

Cisco CRS-1 Series 8-Slot Line Card Chassis

Cisco CRS-1 8-Slot Install Kit

CRS-8-INSTALL-KT

N/A

Cisco CRS-1 8-Slot Fork Lift Tube

CRS-8-LIFT-TUBE

N/A

Cisco CRS-1 8-Slot Front Badge Panel

CRS-8-BDG-PANEL

N/A

Cisco CRS-1 8-Slot Front Inlet Grill

CRS-8-FRNT-GRILL

N/A

Cisco CRS-1 8-Slot Horizontal Install Rails

CRS-8-HRZ-RAILS

N/A

Cisco CRS-1 8-Slot Line Card Chassis

CRS-8-LCC

3.2

Cisco CRS-1 Fan Tray for 8-Slot Line Card Chassis

CRS-8-LCC-FAN-TR

3.2

Cisco CRS-1 Line Card Chassis Filter Pack

CRS-8-LCC-FILTER

3.2

Cisco CRS-1 AC Pwr Rectifier for 8-Slot LCC

CRS-8-AC-RECT

3.2

Cisco CRS-1 DC Power Entry Module for 8-Slot LCC

CRS-8-DC-PEM

3.2

Cisco CRS-1 AC & DC Power Module Filter for 8-Slot LCC

CRS-8-PWR-FILTER

3.2

Cisco CRS-1 AC Delta PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACD

3.2

Cisco CRS-1 AC Wye PDU for CRS-8 LCC

CRS-8-LCC-PDU-ACW

3.2

Cisco CRS-1 DC PDU for CRS-8 LCC

CRS-8-LCC-PDU-DC

3.2

Cisco CRS-1 Series 4-Slot Line Card Chassis

Cisco CRS-1 4-Slot Single-Shelf System

CRS-4/S

3.4

Cisco CRS-1 Fabric Chassis Hardware

CRS-FCC= Cisco CRS-1 Series Fabric Card Chassis Only

CRS-FCC=

3.2

CRS-1 Fabric Chassis AC Delta Power Kit

CRS-FCC-ACD-KIT

3.2

CRS-1 Fabric Chassis AC Grille

CRS-FCC-ACGRILLE

3.2

CRS-1 Fabric Chassis AC-Wye Power Kit

CRS-FCC-ACW-KIT

3.2

CRS Fabric Chassis DC Power Kit

CRS-FCC-DC-KIT

3.2

CRS-1 Fabric Chassis DC Power Grille

CRS-FCC-DCGRILLE

3.2

CRS Fabric Chassis Lift Bracket

CRS-FCC-LIFT-BRKT

3.2

CRS Fabric Chassis OIM Modules

CRS-FCC-OIM-1S=

3.2

Cisco CRS-1 Series FC Chassis Shelf/Fan/Enet cntr

CRS-FCC-SC-GE=

3.2

CRS-1 Fabric Chassis AC Intake Grille

CRS-FCC-ACGRILLE=

3.2

CRS-1 Fabric Chassis DC Intake Grille

CRS-FCC-DCGRILLE=

3.2

Cisco CRS-1 Series Fan Tray for FCC

CRS-FCC-FAN-TR=

3.2

CRS-1 Fabric Card Chassis Fan Tray Filters

CRS-FCC-FILTER=

3.2

CRS-1 Fabric Chassis Front Cosmetic Kit

CRS-FCC-FRNT-CM=

3.2

Cisco CRS-1 Series Fabric Card Chassis Fiber Module LED

CRS-FCC-LED=

3.2

Cisco CRS-1 Series DC Power Shelf for FCC

CRS-FCC-PS-DC=

3.2

CRS-1 Fabric Chassis Rear Cosmetic Kit

CRS-FCC-REAR-CM=

3.2

CRS-LIFT Brackets for Fabric Chassis

CRS-FCC-LIFT-BRKT=

3.2

CRS Fabric Chassis OIM Module

CRS-FCC-OIM-1S

3.2

CRS-1 Fabric Chassis AC Delta Power Supply

CRS-FCC-PS-ACD

3.2

CRS-1 Fabric Chassis AC Wye Option

CRS-FCC-PS-ACW

3.2

CRS-1 Fabric Chassis DC Power Option

CRS-FCC-PS-DC

3.2

Cisco CRS-1 Series Fabric Card Chassis Switch Fabric Card

CRS-FCC-SFC=

3.2

CRS-1 Fabric Chassis Integrated Switch Controller Card

CRS-FCC-SC-22GE=

3.4.1

Cisco CRS-1 General Chassis Hardware

Cisco CRS-1 PCMCIA Flash Disk 1 GB

CRS-FLASH-DISK-1G

3.2

Cisco CRS-1 PCM CIA Flash Disk 2 GB

CRS-FLASH-DISK-2G

3.7

Cisco CRS-1 PCMCIA Flash Disk 4 GB

CRS-FLASH-DISK-4G

3.8

Cisco CRS-1 Modular Services Card

CRS-MSC

3.2

Cisco CRS-1 Modular Service Card B

CRS-MSC-B

3.6

Cisco CRS-1 Series Forwarding Processor 40G

CRS-FP40

3.8.1

Cisco CRS-1 SFPs

Cisco CRS-1 2.5 G SFP LR Optic

POM-OC48-LR2-LC-C

3.2

Cisco CRS-1 2.5 G SFP SR Optic

POM-OC48-SR-LC-C

3.2

Cisco CRS-1 Fabric Cards

Cisco CRS-1 8-Slot Fabric Card/Single

CRS-8-FC/S

3.2

Cisco CRS-1 8-Slot Fabric Card Blank

CRS-8-FC-BLANK

3.2

Cisco CRS-1 8-Slot Fabric Handle

CRS-8-FC-HANDLE

3.2

Cisco CRS-1 16-Slot Fabric Card/Single

CRS-16-FC/S

3.2

Cisco CRS-1 Interface and Router Processor Cards

Cisco CRS-1 8-Slot Route Processor

CRS-8-RP

3.2

Cisco CRS-1 8-Slot Route Processor Blank

CRS-8-RP-BLANK

3.2

Cisco CRS-1 8-Slot Route Processor Handle

CRS-8-RP-HANDLE

3.2

Cisco Carrier 1 Series SPA Interface Processor 40G

CRS1-SIP-800

3.2

Cisco CRS-1 16-Slot Route Processor

CRS-16-RP

3.2

Cisco CRS-1 Distributed Route Processor

CRS-DRP

3.3

Cisco CRS-1 Distributed Route Processor CPU Module

CRS-DRP-B-CPU

3.4.1

Cisco CRS-1 Distributed Route Processor PLIM Module

CRS-DRP-B-PLIM

3.4.1

Cisco CRS-1 16-slot Route Processor, revision B

CRS-16-RP-B

3.3

Cisco CRS-1 SONET Interface Modules and SPAs

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/VS

4OC192-POS/DPT-VS

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/SR

4OC192-POS/DPT-SR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/IR

4OC192-POS/DPT-IR

3.2

Cisco CRS-1 4xOC-192/STM64 POS/DPT Interface Module/LR

4OC192-POS/DPT-LR

3.2

Cisco CRS-1 16xOC-48/STM16 POS/DPT Interface Module

16OC48-POS/DPT

3.2

Cisco CRS-1 1xOC-768/STM256 POS Interface Module/SR

1OC768-POS-SR

3.2

Cisco CRS-1 8-Port OC-12 Shared Port Adapter

SPA-8XOC12-POS

3.3

Cisco CRS-1 2-Port OC-48c/STM-16c POS/RPR Shared Port Adapter

SPA-2XOC48-POS/RPR

3.4

Cisco CRS-1 4-Port OC-48c/STM-16c POS/RPR Shared Port Adapter

SPA-4XOC48-POS/RPR

3.4

Cisco CRS-1 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

Cisco CRS-1 4-Port OC-3 Shared Port Adapter

SPA-4XOC3-POS

3.2

Cisco CRS-1 4-Port T3/E3 Serial Shared Port Adapter

SPA-4XT3/E3

3.4.1

Cisco CRS-1 1-Port OC-192/STM-64 POS/RPR SPA VSR Optics

SPA-OC192POS-VSR

3.4.1

ITU grid 40G PLIM

1OC768-ITU/C

3.3

3-Port Clear Channel OC-3 ATM SPA

SPA-3XOC3-ATM-V2

3.7

1-Port Clear Channel OC-12 ATM SPA

SPA-1XOC12-ATM-V2

3.7

Cisco CRS-1 1-Port OC-768/STM-256c (C-band) DPSK DWDM PLIM

1OC768-DPSK/C

3.6

Cisco CRS-1 Ethernet Interface Modules and SPAS

Cisco CRS-1 8x10 GbE Interface Module/LR

8-10GBE

3.2

10GBASE-LR XENPAK Module for Cisco CRS-1

CRS-XENPAK10GB-LR

3.2

10GBASE-LR XENPAK Module for Cisco CRS-1

XENPAK-10GB-LR+

3.4

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter

SPA-8X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

10GBASE-DWDM XENPAK

CRS 1 CRS-XENPAK10GB-DWDM

3.2.2

ITU grid 4X10G PLIM

4-10GE-ITU/C

3.3

10GBASE-ER XENPAK Modular for Cisco CRS-1

XENPAK-10GB-ER+

3.4

1-port 10GbE SPA WAN/LAN PHY

SPA-1X10GE-WL-V2

3.5.2

Cisco CRS-1 Series 4x10GE Interface Module

4-10GE

3.8.1

Cisco CRS-1 Series 42x1GE Interface Module

42-1GE

3.8.1

Cisco CRS-1 Series 20x1GE Flexible Interface Module

20-1GE-FLEX

3.8.1

Cisco CRS-1 Series 2x10GE WAN/LAN Flexible Interface Module

2-10GE-WL-FLEX

3.8.1


Software Compatibility

Cisco IOS XR Software Release 3.8.2 is compatible with the following Cisco CRS-1 systems:

Cisco CRS-1 4-Slot Line Card Chassis

Cisco CRS-1 8-Slot Line Card Chassis

Cisco CRS-1 16-Slot Line Card Chassis

Cisco CRS-1 Multishelf

Other Firmware Support

The Cisco CRS-1 router supports the following firmware code:

The minimum ROMMON version required for this release is 1.53. For more information about ROMMON specifications, see http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html

For information about upgrading the ROMMON, see http://www.cisco.com/en/US/docs/ios_xr_sw/iosxr_r3.8/rommon/configuration/guide/rm38.html

The minimum CPUCNTRL version required for this release is 2.07. For more information about CPU controller bits, see http://www.cisco.com/en/US/docs/ios_xr_sw/iosxr_r3.8/system_management/configuration/guide/yc38hdwr.html

Cisco XR 12000 Series Router

This section describes the system requirements for Cisco IOS XR Software Release 3.8.2 supported on the Cisco XR 12000 Series Router. The system requirements include the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Firmware Support

To determine the software versions or levels of your current system, see "Determining Your Software Version" section.

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 3.8.2 features. Table 4 lists the Cisco IOS XR software feature set matrix (PIE files) and associated filenames available for Cisco IOS XR Software Release 3.8.2, supported on the Cisco XR 12000 Series Router.

Table 4 Cisco XR 12000 Series Router Supported Feature Set (Cisco IOS XR Software
Release 3.8.2 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.pie-3.8.2

Contains the required core packages, including OS, Admin, Base, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-3.8.2

Contains the required core packages including OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-3.8.2

CORBA2 agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-3.8.2

MPLS-TE3 , LDP 4 , MPLS Forwarding, MPLS OAM5 , LMP6 , OUNI7 , and RSVP8 .

Cisco IOS XR Multicast Package

c12k-mcast.pie-3.8.2

Multicast Routing Protocols (PIM9 ,MSDP10 , IGMP11 , Auto-RP, BSR12 ), Tools (SAP, MTrace, MRINFO), and Infrastructure (MRIB13 , MURIB14 , MFWD15 ).

Cisco IOS XR Security Package

c12k-k9sec.pie-3.8.2

Support for Encryption, Decryption, IPSec16 , SSH17 , SSL18 , and PKI19 .
Software based IPSec support: maximum of 500 tunnels or Hardware based IPSec: maximum of 64K tunnels using the SPA-IPSEC-2G-2

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-3.8.2

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR Service IPsec Controller Package

c12k-ipsec-service.pie-3.8.2

Support for service-ipsec and service-gre interfaces in Cisco IOS XR software.

Cisco IOS XR Firewall Package

c12k-firewall.pie-3.8.2

Support for Virtual Firewall (VFW) on a Cisco XR 12000 Series Router.

Cisco IOS XR Documentation Package

c12k-doc.pie-3.8.2

Man pages for Cisco IOS XR CLI commands.

Cisco IOS XR FPD Package

c12k-fpd.pie-3.8.2

Firmware for shared port adapters (SPA) and for fixed port line cards supported in Cisco IOS XR.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-3.8.2

Diagnostic utilities for Cisco IOS XR routers.

1 Packages installed individually

2 CORBA = Common Object Request Broker Architecture

3 MPLS Traffic Engineering

4 Label Distribution Protocol

5 Operations, Administration, and Maintenance

6 Link Manager Protocol

7 Optical User Network Interface

8 Resource Reservation Protocol

9 Protocol Independent Multicast

10 Multicast Source Discovery Protocol

11 Internet Group Management Protocol

12 Bootstrap router

13 Multicast Routing Information Base

14 Multicast-Unicast RIB

15 Multicast forwarding

16 IP Security

17 Secure Shell

18 Secure Socket Layer

19 Physical layer interface module


Table 5 lists the Cisco XR 12000 Series Router TAR files.

Table 5 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 3.8.2 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-3.8.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-3.8.2.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for Cisco XR 12000 Series Routers running Cisco IOS XR Software Release 3.8.2 consist of the following:

2-GB route memory on performance route processor 2 (PRP-2)


Note 4-GB route memory on PRP-2 is required if it is planned to scale to more than 64K IPsec tunnels per chassis.


2-GB or greater ATA flash storage on PRP-2

4-GB route memory on performance route processor 3 (PRP-3)

2-GB or greater Compact flash storage on PRP-3

1-GB line card route memory on all Engine 3 line cards

1-GB line card memory on Engine 5-based SPA interface processor (SIP-600)

The default route memory on the 12000-SIP-600 is 1GB.

2-GB line card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB.


Note The performance route processor 1 (PRP-1) is not supported in production environments.


2-GB PCMCIA flash disk


Note Cisco IOS XR Software Release 3.8.2 requires a 2-GB flash disk as a minimum. Therefore, you must upgrade an existing PCMCIA 1-GB flash disk to 2 GB before upgrading to Cisco IOS XR Software Release 3.8.2. For more information, see the "Minimum Flash Disk Requirements When Upgrading to Release 3.8.2" section.


Hardware Supported

Cisco IOS XR Software Release 3.8.2 supports the Cisco XR 12000 Series Router. All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 6 lists the supported hardware components on the Cisco XR 12000 Series Router and the minimum required software versions. For more information, see the "Determining Your Software Version" section.

Table 6 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Support from Version
Cisco XR 12000 Series Router Series Router Systems
   

Cisco XR 12000 Series 4-slot chassis

XR-12000/4

3.3

Cisco XR 12000 Series 6-slot chassis

XR-12000/6

3.3

Cisco XR 12000 Series 10-slot chassis

XR-12000/10

3.3

Cisco XR 12000 Series 16-slot chassis

XR-12000/16

3.3

Cisco XR 12000 Series Router Chassis Hardware

4-slot chassis & backplane, 1 Blower, 2 AC

12000/4-AC

3.3

4-slot chassis & backplane, 1 Blower, 2 DC

12000/4-DC

3.3

6-slot chassis & backplane, 2 Alarm, 1 Blower, 2 AC

12000/6-AC

3.3

6-slot chassis & backplane, 2 Alarm, 1 Blower, 2 DC

12000/6-DC

3.3

10-slot chassis & backplane, 2 Alarm, 1 Blower, 2 AC

12000/10-AC

3.3

10-slot chassis & backplane, 2 Alarm, 1 Blower, 2 DC

12000/10-DC

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 3 AC

12000/16-AC3

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 4 DC

12000/16-DC

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 4 AC

12000/16-AC4

3.3

Cisco XR12000 16-slots; 2 Alarms, Advanced 2 Blowers, up to 8 DC

12000E/16-DC

3.8

Cisco XR12000 16-slots; 2 Alarms, Advanced 2 Blowers, up to 8 AC

12000E/16-AC

3.8

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 20 Gbps Fabric & Alarm card for Cisco 12004

12004E/20

3.6

Enhanced 80 Gbps Fabric & Alarm card for Cisco 12404

12404E/80

3.6

Enhanced 30 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12006

12006E/30

3.6

Enhanced 120 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12406

12406E/120

3.6

Enhanced 50 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12010

12010E/50

3.5.2

Enhanced 200 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12410

12410E/200

3.5.2

Enhanced 800 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12810

12810E/800

3.4

Enhanced 80 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12016

12016E/80

3.5.2

Enhanced 320 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12416

12416E/320

3.5.2

Enhanced 1280 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12816

12816E/1280

3.4

80 Gbps Fabric & Alarm card for Cisco 12404

12404/80

3.3

30 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12006

12006/30

3.3

120 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12406

12406/120

3.3

50 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12010

12010/50

3.3

200 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12410

12410/200

3.3

80 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12016

12016/80

3.3

320 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12416

12416/320

3.3

Cisco XR 12000 Series Route Processor Hardware

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2

Cisco XR 12000 Series Performance Route Processor 3

PRP-3

3.8

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2

Cisco XR 12000 Series PRP-3 80G Hard Drive

HD-PRP3

3.8

Cisco XR 12000 Series General Chassis Hardware

Cisco XR 12000 Series PCMCIA Flash Disk 1 GB

MEM-FD1G

3.2

Cisco XR 12000 Series PCMCIA Flash Disk 2 GB

MEM-FD2G

3.2

Cisco XR 12000 Series PCMCIA Flash Disk 4 GB

MEM-FD4G

3.8

Cisco XR 12000 Series PRP-3 2GB Compact Flash

FLASH-PRP3-2G

3.8

Cisco XR 12000 Series PRP-3 4GB Compact Flash

FLASH-PRP3-4G

3.8

Cisco XR 12000 Series PRP-3 4GB Memory (2X2GB DIMM)

MEM-PRP3-4G

3.8

Cisco XR 12000 Series PRP-3 4GB Memory (2X4GB DIMM)

MEM-PRP3-8G

3.8

Cisco XR 12000 Series SPA Interface Processor Hardware

Multirate 2.5G IP Services Engine (Modular)

12000-SIP-401

3.3

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2

Cisco XR 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192POS-VSR

3.3

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192POS-LR

3.2

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

2-Port OC-48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3

1-Port Channelized OC-12/DS0 Shared Port Adapters

SPA-1XCHOC12/DS0

3.5

1-Port Channelized STM-1/OC-3 to DS0 Shared Port Adapter

SPA-1XCHSTM1/OC3

3.5

1-Port OC-48c/STM-16 POS/RPR Shared Port Adapter

SPA-1XOC48POS/RPR

3.5

2-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-2XOC12-POS

3.5

4-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-4XOC12-POS

3.5

4-Port OC-3c/STM-1 POS Shared Port Adapter

SPA-4XOC3-POS-V2

3.5

8-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-8XOC12-POS

3.5

8-Port OC-3c/STM-1 POS Shared Port Adapter

SPA-8XOC3-POS

3.5

Cisco 8-Port Channelized T1/E1 Shared Port Adapter

SPA-8XCHT1/E1

3.6

Cisco 1-Port Channelized OC-48/DS3 Optical Packet Processor Shared Port Adapter

SPA-1XCHOC48/DS3

3.6

1-Port Clear Channel OC-3 ATM SPA

SPA-1XOC3-ATM-V2

3.7

3-Port Clear Channel OC-3 ATM SPA

SPA-3XOC3-ATM-V2

3.7

1-Port Clear Channel OC-12 ATM SPA

SPA-1XOC12-ATM-V2

3.7

2-Port Channelized T3/E3 ATM CEoP SPA

SPA-2CHT3-CE-ATM

3.7

Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2

Cisco 2-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-2X1GE-V2

3.4.1

Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3

Cisco XR 12000 Series Router Services

IPSEC Shared Port Adapter with 2 Gbps DES/3DES/AES

SPA-IPSEC-2G-2

3.4

Cisco Multi Service Blade (MSB)

XR-12K-MSB

3.5

Cisco XR 12000 Series Router Channelized Line Cards

Cisco 1-Port Channelized OC-48 line card

CHOC48/DS3-SR-SC

3.6

Cisco 1-Port Channelized OC-12 line card

CHOC12/DS1-SR-SC

3.8

Cisco 4-Port Channelized OC-12 line card

4CHOC12/DS3-I-SCB

3.8


Software Compatibility

Cisco IOS XR Software Release 3.8.2 is compatible with the following Cisco XR 12000 Series Router systems:

Cisco XR 12004 Router

Cisco XR 12006 Router

Cisco XR 12010 Router

Cisco XR 12016 Router

Cisco XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

Cisco XR 12810 Router

Cisco XR 12816 Router

The following chassis are supported for an existing installed base:

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router


Note If you are running Cisco IOS XR software on a Cisco XR120xx system with SIP 600, 401, 501, or 601, you must upgrade the fabric. For ROMMON, MBUS, and Fabric Downloader versions, see the "Firmware Support" section.


Firmware Support

Table 7 Cisco XR 12000 Series Router Firmware Versions for Release 3.8.2

Firmware Type
Engine 3 LC
Engine 5 LC
Route Processor

Maintenance Bus (Mbus) Agent Software

RAM

ROM



4.4

4.4



4.4

4.4



4.4

4.4

ROM Monitor

17.1

17.1

1.20

Fabric Downloader

RAM version

ROM version

8.0

8.0

4.7

4.7



Minimum and Preferred Cisco IOS Image and Boot Helper Levels for Migration

If you are migrating from Cisco IOS to Cisco IOS XR software on the Cisco XR 12000 Series Router, you must have the following minimum Cisco IOS image level and Boot Helper version to support Release 3.8.2:

Cisco IOS and Boot Helper images—12.0(32)S

However, the recommended Cisco IOS image level to support migration to Release 3.8.2 can be either one of the following:

12.0(32)SY5

12.0(32)S6

If you have an earlier version of this system, you must upgrade to at least the minimum supported level before performing a migration. Otherwise, your migration may fail.

For more information, see the Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router document.

Table 8 lists the recommended firmware level for Cisco IOS 12.0(32)SY5 when migrating to Cisco IOS XR Software Release 3.8.2.

Table 8 Recommended Cisco IOS Firmware Versions for Migration to Cisco IOS XR 

Serial No.
Description
Version

1

Cisco 12000 Series Router line-card image

12

2

Mbus ROM firmware

3.51

3

Mbus RAM firmware

2.52

5

BFRP field diags

6.12(1.0)

6

PRP field diags

6.13(1.0)

9

Engine 3 LC fabric downloader

7

11

Engine 5 LC fabric downloader

4

12

Mbus downloader

1.1

13

RP MBus downloader

2

14

PRP MBus downloader

1

15

BFPRP ROM image

1.17(0.1)

16

LC ROMMON bootstrap

17.1

17

LC ROMMON upgrade

17.1

18

Cisco 12000 Series Router PRP Beetle FPGA

1.1

19

Cisco 12000 Series Router PRP Chopper FPGA

1.1

20

Cisco 12000 Series Router PRP Assembler FPGA

1.1

21

Cisco 12000 Series Router PRP-1 Chopper FPGA

1.1


Minimum Firmware Requirement

After completing an RMA the newly-received linecard may not have appropriate IOS XR firmware installed.

Depending on the type of firmware that needs upgrading the symptoms can vary as follows:

ROMMON needs updating the linecard will not boot up

MBUS needs updating the linecard may fail to boot or keeps reloading

Fabric Loader needs updating the linecard will take long time to boot

FPD needs updating the linecard experiences packet corruption / drop


Note The FPD PIE has to be installed in order to upgrade to the latest FPD image. Refer to the Upgrading FPD on Cisco IOS XR Software chapter of the Cisco IOS XR System Management Command Reference for the Cisco XR 12000 Router online.


RMA Card Firmware Upgrade Procedure:

To upgrade the fabric-downloader, ROMMON, Mbus, and current field-programmable device (FPD) image package on a single RMA linecard or on all modules installed in a router, use the upgrade all command in administration EXEC mode.

upgrade all location {node-id | all} [force]

Where location node-id specifies that all all firmware images (ROM, MBUS, Fabric Downloader and FPD) will be upgraded on the physical location of the line card received through RMA defined by the node-id argument. The node-id argument is entered in the rack/slot/module notation.

The upgrade all location all command upgrades all all firmware images (ROM, MBUS, Fabric Downloader and FPD) on all line cards (LCs) that are installed in the router.

For an RMA linecard firmware upgrade you'll want to use the upgrade all location node-id command.

The optional force parameter skips the version check and forces an upgrade.

The list of minimum supported firmware versions is available online in this matrix:

http://www.cisco.com/web/Cisco_IOS_XR_Software/pdf/XR12000SoftwareFirmwareCompatibilityMatrix.pdf

Links to PDF copies of the IOS XR Firmware Upgrade Guides are available online here:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html

Here's the link to the Cisco Systems IOS XR Firmware Upgrade Guide For CRS-1 and XR12000:

http://www.cisco.com/web/Cisco_IOS_XR_Software/pdf/IOSXRFirmwareUpgradeGuide.pdf

Refer to the Hardware Redundancy and Node Administration Commands on Cisco IOS XR Software chapter of the Cisco IOS XR System Management Command Reference, Release 3.8 for the upgrade all command syntax:

http://www.cisco.com/en/US/docs/ios_xr_sw/iosxr_r3.8/system_management/command/reference/yr38hw.html

Determining Your Software Version

To determine the version of Cisco IOS XR software running on your router, log into the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command from EXEC mode.

Cisco CRS-1

On the Cisco CRS-1, you should see a response similar to the following (which has been abbreviated for the Release Notes):

RP/0/RP0/CPU0:MPLS-PE5# show version
 
   
Thu Oct 29 10:14:26.269 PST
 
Cisco IOS XR Software, Version 3.8.2[00]
Copyright (c) 2009 by Cisco Systems, Inc.
 
ROM: System Bootstrap, Version 1.53(20090311:225342) [CRS-1 ROMMON],  
 
MPLS-MR-LR1-6 uptime is 1 hour, 2 minutes
System image file is "bootflash:disk0/hfr-os-mbi-3.8.2/mbihfr-rp.vm"
 
cisco CRS-16/S (7457) processor with 4194304K bytes of memory.
7457 processor at 1197Mhz, Revision 1.2
 
2 Management Ethernet
21 SONET/SDH
21 Packet over SONET/SDH
8 TenGigE
8 GigabitEthernet
4 T3
4 Serial network interface(s)
1019k bytes of non-volatile configuration memory.
38079M bytes of hard disk.
2053440k bytes of disk0: (Sector size 512 bytes).
 
 
   

Cisco XR 12000 Series Router

On the Cisco XR 12000 Series Router, you should see a response similar to the following (which has been abbreviated for the Release Notes):

RP/0/0/CPU0:PE6_C12406# show version
Wed Oct 28 16:44:58.425 PST
 
   
Cisco IOS XR Software, Version 3.8.2[00]
Copyright (c) 2009 by Cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.0(20090226:235859) [rtauro-sw30346-33S 1.23dev(0.35)] 
DEVELOPMENT SOFTWARE
Copyright (c) 1994-2009 by cisco Systems,  Inc.
 
   
P2_UUT uptime is 54 minutes
System image file is "disk0:c12k-os-mbi-3.8.2/mbiprp-rp.vm"
 
   
cisco 12416/PRP (7457) processor with 3670016K bytes of memory.
7457 processor at 1266Mhz, Revision 1.2
 
   
2 Cisco 12000 4 Port Gigabit Ethernet Controllers (8 GigabitEthernet)
3 Cisco 12000 Series SPA Interface Processor-601/501/401
2 Cisco 12000 Series Performance Route Processors
1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM)
1 Cisco 12000 4-Port ISE ATM Over SONET OC12/STM-4 Controller (4 ATM)
1 1 Port ISE Packet Over SONET OC-48c/STM-16 Controller (1 POS)
6 Management Ethernet
14 PLIM_QOS
11 SONET/SDH
3 Packet over SONET/SDH
18 GigabitEthernet/IEEE 802.3 interface(s)
2 T3
8 FastEthernet
10 Asynchronous Transfer Mode
2 TenGigE
1017k bytes of non-volatile configuration memory.
2053376k bytes of disk0: (Sector size 512 bytes).
2053376k bytes of disk1: (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Boot device on node 0/0/CPU0 is mem:
Package active on node 0/0/CPU0:
c12k-fpd, V 3.8.2[00], Cisco Systems, at disk0:c12k-fpd-3.8.2
    Built on Wed Oct 28 05:29:41 PST 2009
    By edde-bld1 in /auto/srcarchive3/production/3.8.2/c12k/workspace for c4.2.1-p0
 
   

New Software Features in Cisco IOS XR Software Release 3.8.2

The following sections contain information on new features and enhancements in Cisco IOS XR Software Release 3.8.2:

New Software Features Supported on All Platforms

Cisco CRS-1 Router-Specific Software Features

Cisco XR 12000 Series Router-Specific Software Features

New Software Features Supported on All Platforms

The following new software feature in Cisco IOS XR Software Release 3.8.2 is supported on both the Cisco CRS-1 and the Cisco XR 12000 Series Router:

Multicast Only Fast Reroute


Note Cisco Session Border Controller (SBC) is not supported on any platform.


Multicast Only Fast Reroute

Multicast only fast reroute (MoFRR) is a video feature that supports redundancy.

Two copies of the same multicast stream flow through disjoint paths in the network. At the point in the network where the two streams merge, one of the streams is accepted and forwarded on the downstream links, while the other stream is discarded.

MoFRR is triggered when a failure is detected on the primary path. MoFRR transmits a multicast join from a receiver towards a source on a primary path and then transmits a secondary multicast join message from the receiver towards the source on a backup path. Data packets are received from the primary and secondary paths, with the redundant packets being discarded at topology merge points based on reverse-path forwarding (RPF) checks.

When a failure is detected on the primary path, the repair occurs by changing the interface on which packets are accepted to the secondary interface. This redundancy improves the convergence times in the event of a node or link failure on the primary path.


Note After the primary path is repaired, the multicast stream does not automatically switch from the secondary to the primary path.


MoFRR switchover occurs at the software level based on routing information base (RIB) convergence. RIB events are used as triggers for a switchover.

Multipath and non-multipath modes support MoFRR. Better convergence time is achieved in multipath mode because of the load-balancing of traffic streams across different paths.

MoFRR supports equal cost multipath (ECMP) topologies, IPv4 and IPv6, and XML.

The flow monitoring metric may be used to trigger other network events like rerouting of multicast flows for fast convergence.

Prerequisites

Before you configure MoFRR, ensure that you have set up a multicast network. For information regarding configuring your network for multicast, refer to Cisco IOS XR Multicast Configuration Guide, Release 3.8.

Configuring MoFRR

This section describes how to configure MoFRR based on RIB convergence.

SUMMARY STEPS

1. configure

2. router pim

3. mofrr rib acl-name

4. end or commit

DETAILED STEPS

 
Command or Action
Purpose

Step 1 

configure

Example:

RP/0/RP0/CPU0:router# configure

Enters global configuration mode.

Step 2 

router pim
Example:

RP/0/RP0/CPU0:router(config)# router pim

Enters PIM configuration mode.

Step 3 

mofrr rib acl-name

Example:

RP/0/RP0/CPU0:router(config-pim)# mofrr rib acl1

Enables MoFRR for the specified access list source group with RIB events as switchover triggers.

Step 4 

end

or

commit

Example:

RP/0/RP0/CPU0:router(config-if)# end

or

RP/0/RP0/CPU0:router(config-if)# commit

Saves configuration changes.

When you issue the end command, the system prompts you to commit changes:

Uncommitted changes found, commit them 
before exiting (yes/no/cancel)? 
[cancel]:
 
        

Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode.

Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes.

Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.

Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.

Cisco CRS-1 Router-Specific Software Features

No new Cisco CRS-1 platform-specific features were added in Cisco IOS XR Software Release 3.8.2.

Cisco IOS XR Software Release 3.8.2 includes support for prefix-length notation for ACLs on the Cisco CRS-1 platform.

The following example shows how to define an access list named Internetfilter with prefix-length notation:

RP/0/RSP0/CPU0:router(config)# ipv4 access-list Internetfilter
10 permit ipv4 12.10.10.1/24 any
20 permit ipv4 125.10.10.1/16 any
30 permit ipv4 135.10.10.1/27 any
40 permit ipv4 135.200.10.1/24 any
50 permit ipv4 any any

Cisco XR 12000 Series Router-Specific Software Features

No new Cisco XR 12000 Series Router platform-specific features were added in Cisco IOS XR Software Release 3.8.2.

New Hardware Features for Cisco IOS XR Software Release 3.8.2

The following new hardware features were introduced in Cisco IOS XR Software Release 3.8.2:

Cisco CRS-1 Router-Specific Hardware Features

Cisco XR 12000 Series Router-Specific Hardware Features

Cisco CRS-1 Router-Specific Hardware Features

The following new features in Cisco IOS XR Software Release 3.8.2 are supported on the Cisco CRS-1 platform:

4 port 10GE LAN (4-10GE)

20 port 1GE Flex PLIM (20-1GE-FLEX)

2-10 GE-WL-FLEX PLIM (2-10 GE-WL-FLEX)

42 port 1GE (42-1GE)

40G forwarding processor (CRS-FP40)

CRS-FP40 Licenses

The following licenses apply to the CRS-FP40 on a per slot basis:

XC-L2L3VPN—This license applies to the line card that needs to enable L2 Attachment Circuit for L2VPN (VPWS and VPLS), and/or L3 VRF interface for L3VPN applications.

XC-PERF-NETFLOW—This license enables CRS-FP40 to support down to 1:360 Netflow sample rate running 45Mpps at a 40Gbps line rate. Without this license, the CRS-FP40 can support down to 1:1500 Netflow sample rate.

XC-ADV-IP—This license is a placeholder for IP features, for example Lawful Interception, GRE tunnel, and L2TPv3.

For GRE and L2TPv3, this license applies to the line card required to enable GRE and/or L2TPv3 encapsulation.

Restrictions

Link bundle cannot have members from CRS-MSC and CRS-FP40 at the same time.

OC-192 DPT is not supported by 20-1GE-WL-FLEX.

In general, the CRS-MSC and CRS-FP40 support the same features, but the CRS-FP40 requires a software license for some features.

CRS-FP40 is not supported in CRS16 single chassis and multichassis configurations.

A minimum ROMMON release of 1.53 is required to support the 20-port 1GE Flex PLIM (20-1GE-FLEX) and 42-port 1GE (42-1GE)

QoS Restrictions

MQC-based QoS configuration will be accepted only on the port level but not on the VLAN subinterface level.

CRS-FP40 supports Limited H-QoS on VLAN/VLAN-Group using L3/1C/1D, L3/1C/nD, and L3/nC/mD QoS Model with up to 8 queues per port in each direction.

Table 9 Chassis and Line Card Compatibility Matrix

Chassis
I/O Module
Line Card

Multichassis, CRS-16/S

4 port 10GE LAN (4-10GE)
42-1GE
20-1GE-FLEX
2-10 GE-WL-FLEX
All existing CRS-1 PLIM/SIP800

CRS-MSC-40G-B

CRS-8/S, CRS-4/S

4 port 10GE LAN (4-10GE)
42-1GE
20-1GE-FLEX
2-10 GE-WL-FLE

CRS-FP401 or CRS-MSC-40G-B

All existing CRS-1 PLIM/SIP800

CRS-MSC-40G-B

1 CRS-FP40 is supported only in 4/8 slot chassis and can be only paired with new PLIMs. New PLIMs can be paired with the CRS-FP40 and CRS-MSC-40G-B.


Table 10 SPA Support for FLEX PLIMs

FLEX PLIM
SPA Type
SPA

20-1GE-FLEX
2-10 GE-WL-FLEX

POS

SPA-4XOC3-POS

SPA-8XOC12-POS (Multi-rate1 )

SPA-2XOC48POS/RPR

SPA-4XOC48POS/RPR

SPA-OC192POS-VSR

SPA-OC192POS-XFP

Ethernet

SPA-1X10GE-L-V2

SPA-1X10GE-WL-V2

SPA-10X1GE-V2

SPA-8X1GE

SPA-8X1GE-V2

SPA-5X1GE-V2

1 Multi-rate: SPA-8XOC12-POS can support SFP-OC12-x and SFP-OC3-x.


Cisco XR 12000 Series Router-Specific Hardware Features

The following new features in Cisco IOS XR Software Release 3.8.2 are supported on the Cisco XR 12000 Series Router platform:

E5 ATM Layer-2 TPv3 and FRF12 Over L2 VP

SPA-OC3/STM1 1&3 port; SPA-OC12/STM4 1-port

SPA-2CTH3-CE-ATM

L2TPv3 ATM like-to-like pseudowires on Engine 5 LC (cell-relay, cell-packing, AAL5)

L2TPv3 IP Interworking on Engine 5 LCs:

Ethernet port mode / 1Q (VLAN) <—> ATM AAL5 (SNAP/Mux/NLPID)

Frame Relay point-to-point DLCI/MLFR <—> ATM AAL5 (SNAP/Mux/NLPID)


Note Contact gsr-pm@cisco.com for hardware availability.


New Commands

This section contains the new multicast commands that are introduced in Cisco IOS XR Software Release 3.8.2. These commands are supported on the Cisco CRS-1 and the Cisco XR 12000 Series Router.

router pim global maximum

To configure a global or per process maximum route-interface limit for Protocol Independent Multicast (PIM), use the router pim global maximum command.

router pim global maximum {register-states | route-interfaces | routes} threshold

Syntax Descriptionr

register-states

Maximum number of PIM source register states for all VPN routing and forwarding (VRF) instances. Range is from 0 to 75000.

route-interfaces

Maximum number of PIM interfaces on all routes for all VRF instances. Range is from 1 to 600000.

routes

Maximum number of PIM routes for all VRF instances. Range is from 1 to 200000.

threshold

Set threshold to print warning. Threshold value is from 1 to the maximum limit that you set.


Defaults

If this limit is not configured, the following default values apply:

Default Register States Limit—20000

Default Route Interfaces Limit—300000

Default Routes Limit—100000

Command Modes

Global configuration

Command History

Release
Modification

Release 3.8.2

This command was introduced on the Cisco CRS-1 and Cisco XR 12000 Series Router.


Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes the proper task IDs. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator. For detailed information about user groups and task IDs, refer to the Configuring AAA Services on Cisco IOS-XR Software module of the Cisco IOS-XR System Security Configuration Guide.

Task ID
Task ID
Operations

multicast

read, write


Examples

The following example shows how to enter the maximum number of 5000 PIM interfaces on all routes for all VRF instances:

RP/0/RP0/CPU0:router#configure
RP/0/RP0/CPU0:router(config)router pim global maximum route-interfaces 5000
RP/0/RP0/CPU0:router(config)commit
RP/0/RP0/CPU0:router(config)end

show mrib route

To display all entries in the Multicast Routing Information Base (MRIB), use the show mrib route command in EXEC mode.

show mrib [vrf vrf-name] [ipv4 | ipv6] [old-output] route [summary| [[outgoing-interface] [* | source-address] [group-address [/prefix-length]]] [detail]

Syntax Description

vrf vrf-name

(Optional) Specifies a VPN routing and forwarding (VRF) instance.

ipv4

(Optional) Specifies IPv4 address prefixes.

ipv6

(Optional) Specifies IPv6 address prefixes.

summary

(Optional) Displays a summary of the routing database.

outgoing-interface

(Optional) Displays the outgoing-interface information.

*

(Optional) Displays shared tree entries.

source-address

(Optional) Specifies a source IP address or hostname of the MRIB route. Format is:

A.B.C.D
or
X:X::X

group-address

(Optional) Specifies a group IP address or hostname of the MRIB route. Format is:

A.B.C.D
or
X:X::X

/prefix-length

(Optional) Specifies the prefix length of the MRIB group address. This decimal value indicates how many of the high-order contiguous bits of the address compose of the prefix (the network portion of the address). A slash must precede the decimal value. Format is:

A.B.C.D
or
X:X::X

detail

(Optional) Displays the routing database with the platform data.


Defaults

IPv4 addressing is the default.

Command Modes

EXEC

Command History

Release
Modification

Release 3.8.2

This command was introduced on the Cisco CRS-1 and Cisco XR 12000 Series Router.


Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes the proper task IDs. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator.

Each line card has an individual Multicast Forwarding Information Base (MFIB) table. The MFIB table maintains a subset of entries and flags updated from MRIB. The flags determine the forwarding and signaling behavior according to a set of forwarding rules for multicast packets. In addition to the list of interfaces and flags, each route entry shows various counters. Byte count is the number of total bytes forwarded. Packet count is the number of packets received for this entry.

The show mfib counter command displays global counters independent of the routes.

Task ID
Task ID
Operations

multicast

read


Examples

The following is sample output from the show mrib route command (the output fields are described in the header):

RP/0/RP0/CPU0:router# show mrib route
 
   
IP Multicast Routing Information Base
Entry flags: L - Domain-Local Source, E - External Source to the Domain,
    C - Directly-Connected Check, S - Signal, IA - Inherit Accept,
    IF - Inherit From, D - Drop, MA - MDT Address, ME - MDT Encap,
    MD - MDT Decap, MT - MDT Threshold Crossed, MH - MDT interface handle
    CD - Conditional Decap
Interface flags: F - Forward, A - Accept, IC - Internal Copy,
    NS - Negate Signal, DP - Don't Preserve, SP - Signal Present,
    II - Internal Interest, ID - Internal Disinterest, LI - Local Interest,
    LD - Local Disinterest, DI - Decapsulation Interface
    EI - Encapsulation Interface, MI - MDT Interface
 
   
(*,224.0.0.0/4) RPF nbr: 10.11.1.20 Flags: L C
 Outgoing Interface List
  Decapstunnel0 Flags: NS
 
   
(*,224.0.0.0/24) Flags: D
 
   
(*,224.0.1.39) Flags: S
 
   
(*,224.0.1.40) Flags: S
 Outgoing Interface List
  POS0/3/0/0 Flags: II LI
 
   
(*,238.1.1.1) RPF nbr: 10.11.1.20 Flags: C
 Outgoing Interface List
  POS0/3/0/0 Flags: F NS LI
  Decapstunnel0 Flags: A
 
   
(*,239.1.1.1) RPF nbr: 10.11.1.20 Flags: C
 Outgoing Interface List
  POS0/3/0/0 Flags: F NS
  Decapstunnel0 Flags: A
 
   

The following example shows the output when the vrf and detail keywords are used:

RP/0/RP0/CPU0:router# show mrib vrf vrf1 route detail
IP Multicast Routing Information Base
Entry flags: L - Domain-Local Source, E - External Source to the Domain,
    C - Directly-Connected Check, S - Signal, IA - Inherit Accept,
    IF - Inherit From, D - Drop, MA - MDT Address, ME - MDT Encap,
    MD - MDT Decap, MT - MDT Threshold Crossed, MH - MDT interface handle
    CD - Conditional Decap, MPLS - MPLS Decap, MF - MPLS Encap, EX - Extranet
Interface flags: F - Forward, A - Accept, IC - Internal Copy,
    NS - Negate Signal, DP - Don't Preserve, SP - Signal Present,
    II - Internal Interest, ID - Internal Disinterest, LI - Local Interest,
    LD - Local Disinterest, DI - Decapsulation Interface
    EI - Encapsulation Interface, MI - MDT Interface, LVIF - MPLS Encap,
    EX - Extranet
 
(*,0.0.0.101) Ver: 0x818 Flags: MA, FMA: 0x0
  MDT Address: 5.5.5.5
  Up: 6d01h
 
(*,0.0.0.102) Ver: 0x5337 Flags: MA, FMA: 0x0
  MDT Address: 225.101.1.1
  Up: 6d01h
 
(*,0.0.0.103) Ver: 0x6cea Flags: ML, FMA: 0x0
  Master Linecard Slot: 0/3/CPU0
  Up: 6d01h
 
(*,0.0.0.104) Ver: 0x7ca Flags: MBH, FMA: 0x0
  BGP IFH:  0x9000180
  Up: 6d01h
 
(*,0.0.0.105) Ver: 0x5b67 Flags: MLF, FMA: 0x0
  Master Linecard Fallback Slot: 0/3/CPU0
  Up: 6d01h
 
(*,0.0.0.107) Ver: 0x382c Flags: MDT_IFH, FMA: 0x0 
  Up: 6d01h 
  MDT IFH:  0x9043d80 
...

The following example shows the detailed output for a source VRF route in a receiver on the source PE router in an MVPN extranet topology) with the core multicast distribution tree (MDT) ID of the receiver VRF displayed:

RP/0/RP0/CPU0:router# show mrib vrf vrf15 route 18.18.15.2 225.0.0.1 detail
 
   
IP Multicast Routing Information Base
Entry flags: L - Domain-Local Source, E - External Source to the Domain,
    C - Directly-Connected Check, S - Signal, IA - Inherit Accept,
    IF - Inherit From, D - Drop, MA - MDT Address, ME - MDT Encap,
    MD - MDT Decap, MT - MDT Threshold Crossed, MH - MDT interface handle
    CD - Conditional Decap, MPLS - MPLS Decap, MF - MPLS Encap, EX - Extranet
Interface flags: F - Forward, A - Accept, IC - Internal Copy,
    NS - Negate Signal, DP - Don't Preserve, SP - Signal Present,
    II - Internal Interest, ID - Internal Disinterest, LI - Local Interest,
    LD - Local Disinterest, DI - Decapsulation Interface
    EI - Encapsulation Interface, MI - MDT Interface, LVIF - MPLS Encap,
    EX - Extranet

Related Commands

Command
Description

nsf lifetime (IGMP/MLD)

Configures the maximum time for the NSF timeout value on the IGMP.

show mfib counter

Displays the MFIB counter statistics for packets that have dropped.

show mrib mdt-interface

Helps in troubleshooting whether or not MRIB has correctly learned the MDT interface handles from PIM and whether or not the corresponding table ID for each handle is shown.

show mfib route

Displays all entries in the MFIB table.

show mrib route-collapse

Displays the contents of the MRIB route collapse database.


Modified Commands

This section contains the multicast commands that were modified in Cisco IOS XR Software Release 3.8.2. These commands are supported on the Cisco CRS-1 and the Cisco XR 12000 Series Router.

show pim summary

To display configured Protocol Independent Multicast (PIM) out-of-resource (OOR) limits and current counts, use the show pim summary command in EXEC mode.

show pim [global | vrf vrf-name] [ipv4 | ipv6] summary

Syntax Description

global

Specifies the PIM global summary.

vrf vrf-name

(Optional) Specifies a VRF instance associated with this count.

ipv4

(Optional) Specifies IPv4 address prefixes.

ipv6

(Optional) Specifies IPv6 address prefixes.


Defaults

IPv4 addressing is the default. If no VRF is specified, the default VRF is operational.

Command Modes

EXEC

Command History

Release
Modification

Release 2.0

This command was introduced on the Cisco CRS-1.

Release 3.0

No modification.

Release 3.2

This command was introduced on the Cisco XR 12000 Series Router.

Release 3.3.0

No modification.

Release 3.4.0

The ipv4 and ipv6 keywords were added.

Release 3.5.0

The vrf keyword and vrf-name argument were added.

Release 3.6.0

No modification.

Release 3.7.0

No modification.

Release 3.8.0

No modification.

Release 3.8.2

The Warning-threshold column was added.


Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes the proper task IDs. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator. For detailed information about user groups and task IDs, refer to the Configuring AAA Services on Cisco IOS-XR Software module of the Cisco IOS-XR System Security Configuration Guide.

The show pim summary command is used to identify configured OOR information for the PIM protocol, such as number of current and maximum routes.

Task ID
Task ID
Operations

multicast

read


Examples

The following example shows the PIM summary for vrf-1:

RP/0/RP0/CPU0:router# show pim vrf vrf-1 summary
Thu Jun  4 07:18:37.290 UTC
 
   
PIM Summary for VRF:vrf-1
                            Current        Maximum        Warning-threshold
Routes                      20001          100000           100000         
Routes x Interfaces         20001          300000           300000         
SM Registers                0              20000            20000          
Group Ranges from AutoRP    0              100            
 
   
 
   

Table 11 describes the significant fields shown in the display.

Table 11 show pim summary Field Descriptions 

Field
Description

Routes

Current number of routes (in the PIM topology table) and the maximum allowed before the creation of new routes is prohibited to avoid out-of-resource (OOR) conditions.

Routes x Interfaces

Current total number of interfaces (in the PIM topology table) present in all route entries and the maximum allowed before the creation of new routes is prohibited to avoid OOR conditions.

SM Registers

Current number of sparse mode route entries from which PIM register messages are received and the maximum allowed before the creation of new register states is prohibited to avoid OOR conditions.

Group Ranges from AutoRP

Current number of sparse mode group range-to-rendezvous point mappings learned through the auto-rendezvous point (Auto-RP) mechanism and the maximum allowed before the creation of new group ranges is prohibited to avoid OOR conditions.

Warning-threshold

Maximum number of multicast routes that can be configured per router.


Important Notes

pw-class class name encapsulation mpls default change for control-word option—In Cisco IOS XR Software Release 3.8.2 the control word is disabled by default. To configure the control word, enter the control-word keyword shown in the following example:

pw-class class1 encapsulation mpls control-word
 
   

Default timestamp setting—The timestamp prompt that precedes console output is enabled by default in Cisco IOS XR Software Release 3.8.2. To disable the timestamp prompt, use the timestamp disable command. For more information, see http://www.cisco.com/en/US/docs/ios_xr_sw/iosxr_r3.8/system_management/command/reference/yr38term.html#wp1311395.

For Cisco IOS XR Software Release 3.6.0 and later releases, WRED statements are collapsed, so that, if different random-detect statements using the same match types (EXP, DSCP, Prec, and so forth) are entered with identical minimum and maximum threshold values, a single configuration line is shown in the output of the show running config command. This reduces the length of the configuration, but creates a problem with backward compatibility with previous releases. In such a situation, on rollback, the QoS policy is rejected and must be manually entered again.

Configuration prior to Cisco IOS XR Software Release 3.6.0:

Policy-map wred_example
   Class class-default
       random-detect exp 0 384 packets 484 packets
       random-detect exp 1 384 packets 484 packets
       random-detect exp 2 384 packets 484 packets
       random-detect exp 3 484 packets 584 packets
       random-detect exp 4 484 packets 584 packets
       random-detect discard-class 0 384 packets 484 packets
      random-detect discard-class 1 384 packets 484 packets
      random-detect discard-class 2 484 packets 584 packets
      bandwidth remaining percent 20
  !
!
 
   
 
   

Cisco IOS XR Software Release 3.6.0 and later releases:

policy-map wred_example
 class class-default
  random-detect exp 0,1,2 384 packets 484 packets
  random-detect exp 3,4 484 packets 584 packets
  random-detect discard-class 0,1 384 packets 484 packets
  random-detect discard-class 2 484 packets 584 packets
  bandwidth remaining percent 20
 !
 end-policy-map
!
end 
 
   

In Cisco IOS XR Software Release 3.6.0 and later releases, the implicitly assigned QoS class class-default must have at least 1 percent bandwidth made available to it. This can be done either by assigning at least 1 percent explicitly (bandwidth remaining percent 1) or by ensuring that the total bandwidth assigned to all other classes in the policy is a maximum of 99 percent, leaving 1 percent available for the class-default. A QoS policy that does not have any bandwidth for class-default is rejected when upgrading to Cisco IOS XR Software Release 3.6.0 or later releases.

Country-specific laws, regulations, and licences—In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router—When migrating a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the instructions provided in Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router.

Card, fan controller, and RP removal—For all card removal and replacement (including fabric cards, line cards, fan controller, and RP) follow the instructions provided by Cisco to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for procedures.

Exceeding Cisco testing—If you intend to test beyond the combined maximum configuration tested and published by Cisco, contact your Cisco Technical Support representative to discuss how to engineer a large-scale configuration maximum for your purpose.

More power required for Cisco SIP line cards (SIP-401/501/600/601) on the Cisco XR 12000 Series Router—These line cards draw more power than previous generation line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
 
   
                      48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
 
   
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Per-interface Internet Control Message Protocol (ICMP) disable feature is not supported on Cisco XR 12000 Series Routers.

Online Diagnostics is not supported on the Cisco XR 12000 Series Router—If you execute the diagnostic command, an error appears stating that there is no online diagnostics process running on the router.

The rp mgmtethernet forwarding command is not supported on the Cisco XR 12000 Series Router.

mpls traffic engineering igp-intact command—This command must be used only when policy based tunnel selection is configured for all tunnels originating on the device.

L2TPv3 traffic is not supported on Ethernet bundle interfaces on the Cisco XR 12000 Series Router.

In Cisco IOS XR Release 3.8.2, the show running-config command includes an option to display the large configuration format. Using the formal option means that the output does not include submode indentations.

Layer 2 Tunnel Protocol Version 3 (L2TPv3) Limitations—These limitations are applicable to the 1-port OC3c/STM1 SFP Optics ATM SPA, 3-port OC3c/STM1 SFP Optics ATM SPA, and1-port OC12c/STM4 SFP Optics ATM SPA.

Sequence resync for L2TPv3 does not work on ATM L2VPNs.

Control word is processed by the SPA for ATM L2VPN. This process does not impact the L2VPN behavior. The following L2TPv3 commands do not work:

show l2tp session sequence

show l2vpn forwarding detail - This command does not show the sequence number for L2VPNs.

show l2tp session detail - The sequence numbers are not displayed.

clear l2vpn forwarding table

To see the sequence number for the L2VPNs, issue the following commands:

show controllers atm <> traffic vc <>—This command prints the CID.

show hw-module subslot <> memory sar cid <>—Use the CID obtained in the previous command.

Static ATM AAL5 L2VPN sessions support the control word. Per the standard, any AAL5 L2VPN must have the control word enabled.

Turboboot with disk mirroring is not supported in Cisco IOS XR Release 3.8.2.

Multicast Configuration Changes in Cisco IOS XR Release 3.8.2—In releases prior to Cisco IOS XR Release 3.8.2, each VRF under multicast-routing and router pim configurations were in a separate submode. In Cisco IOS XR Release 3.8.2, the configurations are in a hierarchical format, similar to other routing protocols. This change is required for the multicast XML support in Cisco IOS XR Release 3.8.2.

Due to this change, when downgrading from Cisco IOS XR Release 3.8.2 to earlier releases, the multicast-routing and router pim MVPN (VRF) configurations are rejected. This failure is shown in the output of the show configuration failed startup command.

Multicast-routing and router pim MVPN (VRF) configurations need to be corrected and reapplied manually. Since a downgrade is typically done following an upgrade, save a copy of the older-release running-configuration before doing the upgrade.

In Cisco IOS XR Release 3.8.2, the following multicast routing configurations are on separate lines:

 multicast-routing
  vrf vrf1
   address-family ipv4
    interface all enable
   !
  !
 !

To correct the multicast-routing configurations, the vrf <> and address-family <> lines should be combined into the same line as shown in the following example:

multicast-routing
  vrf vrf1 address-family ipv4
   interface all enable
  !

In Cisco IOS XR Release 3.8.2, the following router pim configurations are on separate lines:

router pim
  vrf vrf1
   address-family ipv4
    interface Loopback0
    !
   !
  !

To correct the router pim configurations, the vrf <> and address-family <> lines should be combined into the same line as the router pim shown in the following example:

router pim vrf vrf1 address-family ipv4
  interface Loopback0
  !
 !

The following commands are not supported on the Cisco CRS-1 Series Router:

affinity location set

affinity location type

affinity program

affinity self

When configuring the LDP (Label Distribution Protocol) GR (graceful restart) process in a network with multiple [link and/or targeted] LDP hello adjacencies with the same neighbor, make sure that GR is activated on the session before any hello adjacency times out due to neighbor control plane failures. One way of achieving this is by configuring a lower session hold time between neighbors such that session time out always occurs before hello adjacency can time out. Cisco recommends setting LDP session hold time using the following formula:

LDP session hold time <= (Hello hold time - Hello interval) * 3

This means that for default values of 15/5 seconds respectively for the link Hello hold time and the Hello interval, the LDP session hold time should be set to 30 seconds or less.

For more information, refer to the "Implementing MPLS Label Distribution Protocol on Cisco IOS XR Software" section of the Cisco IOS XR MPLS Configuration Guide, Release 3.8.2.

Minimum Flash Disk Requirements When Upgrading to Release 3.8.2

Cisco IOS XR Software Release 3.8.2 requires a 2-GB flash disk as a minimum, so if your Cisco CRS-1 or Cisco XR 12000 Series Router currently uses a 1-GB flash disk, you must upgrade it to 2-GB before upgrading to Cisco IOS XR Software Release 3.8.2.

The PCMCIA 1-GB flash disk was the default size for the Cisco CRS-1 running Cisco IOS XR Software Release 3.6 and earlier and for the Cisco XR 12000 Series Router running Cisco IOS XR Software Release 3.5 and earlier.

A 4-GB flash disk is available for both platforms and can be installed instead of the 2-GB for greater disk storage for Cisco IOS XR Software Release 3.4 and later.

To upgrade from a 1-GB flash disk to a 2-GB or greater flash disk, refer to the Cisco XR12000 and CRS-1 Flash Disk Upgrade Tasks document at: http://www.cisco.com/en/US/docs/routers/xr12000/xr_line_cards/flashdisk/flashdisk.pdf

Additional upgrade instructions for the Cisco CRS-1 router are available from: http://www.cisco.com/web/Cisco_IOS_XR_Software/pdf/ReplacingPCMCIACardOnCRS-1.pdf

Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity-1 caveats are the most serious.

The following caveats are open for Cisco IOS XR Software Release 3.8.2 on the router platforms indicated:

Cisco IOS XR Caveats

Caveats Specific to the Cisco CRS-1 Router

Caveats Specific to the Cisco XR 12000 Series Router

Cisco IOS XR Caveats

The following caveats apply to both platforms:

CSCsw23382

Basic Description:

devc_conaux crash—multiple triggers.

Symptom:

Under specific circumstances, the Devc-conaux process could crash and automatically restart. Sessions on the console or auxiliary port are terminated as a result.


Note Telnet or SSH connections are not affected.


Conditions:

This issue may occur during the following scenarios:

1. Turbo Boot

2. When using the break sequence "Ctrl-C" on the console or auxiliary port of the active or standby route processor to stop excessive output appearing on the terminal

Workaround:

Avoid the use of this break sequence on the active or standby route processor console or auxiliary port.

CSCta03608

Basic Description:

FR subinterface counters are taken from the engine, while main interface counters are taken from the SPA. This can result in a mismatch of counters at the sub interface and main interface levels.

Symptom:

o/p of show interface main interface and show interface sub interface may not match. Total sub interface counts (for all sub interfaces under the main interface) may be larger on the side or smaller on the ingress side.

Conditions:

This mismatch is seen between FR sub interface and main interface counts. Mismatch occurs when the packet rate becomes more than what the queuing ASIC can handle. This results in a queuing ASIC drop and a difference in the main interface and sub interface counts.

Workaround:

No workaround is available (recommended). This is an expected behavior.

CSCta83807

Basic Description:

Some processes not reoptimized are router reload.

Symptom:

If a router reloads, upon bootup, some processes may not be placed on the same nodes as they were before the reload. This is due to timing variations in the bootup sequence of the various nodes (cards).

Conditions:

This issue occurs during a router reload.

Workaround:

None.

Recovery:

Use the placement reoptimize command, which places processes on their optimal cards.

CSCtb25096

Basic Description:

Field diag on an LC with SPA-IPSEC-2G-2 SPA goes into Field Diag timeout.

Symptom:

Field diag is declared as failed and the card goes into Field Diag timeout state on an LC with a SPA-IPSEC-2G-2 SPA.

Conditions:

This behavior is observed when one of the SPAs is a SPA-IPSEC-2G-2 SPA. The total test time for the SPA-IPSEC-2G-2 SPAs is more than the current field diags timeout value. Even though all the tests pass, as the total test time exceeds the timeout the field diags reports a timeout.

Workaround:

None. When this is observed on a setup, if none of the actual tests have reported any failures, this issue can be safely ignored and the hardware under test can be considered to be good.

Recovery:

The card that went into "FDIAG TIMEOUT" state has to be reloaded to get it back to the normal state. Issue the following command:

hw-module location <R/S/I> reload

CSCtb83143

Basic Description:

Pie deactivation failed with one of the Rack1 RP not ready.

Symptom:

Software package activation and deactivation fail because a node is not ready.

RP/0/RP1/CPU0:CRS(admin)#install deactivate disk0:hfr-mpls-3.8.2 synchronous
Install operation 14 '(admin) install deactivate disk0:hfr-mpls-3.8.2 
synchronous' started by user 'lab' via CLI.
Error:    Cannot proceed with the deactivation because the following node is 
not ready:
Error:        1/RP1/CPU0
Error:    Suggested steps to resolve this:
Error:     - repeat the operation after waiting for a while.
Install operation 14 failed 
 
   

Conditions:

After a node reload (as part of LR uncarving), the insthelper process on the affected RP does not complete its initialization correctly. Install operations fail subsequently.

Workaround:

None.

Recovery:

Reloading the failing node.

CSCti50227

Basic Description:

Not able to modify RPL and delete prefix-set in a single commit.

Symptom:

When a policy that is attached directly or indirectly to an attach point needs to be modified, a single commit operation cannot be performed when:

Removing a set or policy referred by another policy that is attached to any attach point directly or indirectly.

Modifying the policy to remove the reference to the same set or policy that is getting removed.

Workaround:

The commit must be performed in two steps:

1. Modify the policy to remove the reference to the policy or set and then commit.

2. Remove the policy or set and commit.

Caveats Specific to the Cisco CRS-1 Router

The following caveats are specific to the Cisco CRS-1 platform:

CSCsz76809

Basic Description:

Verifier call back not getting called on configuration.

Symptom:

The system accepts an invalid SNMP MIB configuration.

Conditions:

When an SNMP MIB configuration is committed with invalid information, the system is accepts it, rather than rejecting it. Such configuration does not have any adverse effect to the system, but shows up in the running configuration. This issue is only in Cisco IOS XR Release 3.8 and subsequest Release 3.8 maintenance releases.

Workaround:

Upon committing a MIB configuration with invalid information, the system generates a syslog indicating the nature of problem.

Recovery:

Remove the invalid configuration and reapply with valid information.

Further Problem Description:

A configuration verification step which is supposed to verify the validity of MIB configuration does not function correctly, and proceeds to apply the configuration. This results in system accepting an invalid MIB configuration.

CSCtc36310

Basic Description:

The FabricMulticast ping health monitoring diagnostic test on a Cisco CRS-1 multi-chassis system does not reliably report which specific fabric plane or planes are at fault when the test indicates a failure. Failure detection is accurate. The FabricMulticast ping health monitoring diagnostic test is reliable in identifying the affected plane or plane when performed on a Cisco CRS-1 single chassis system.

Symptom:

FabricMulticast ping health monitoring diagnostic test does not identify the affected plane or planes.

Conditions:

This issue occurs when running the FabricMulticast ping health monitoring diagnostic test on a Cisco CRS-1 multi-chassis system and a fault is detected.

Workaround:

There is no known workaround.

Recovery:

Please contact your technical representative for technical support.

Caveats Specific to the Cisco XR 12000 Series Router

The following caveats are specific to the Cisco XR 12000 Series Router platform:

CSCsj40856

Basic Description:

show run with "/controller T1" shows T1''s out of order, not contiguous.

Symptom:

RP/0/0/CPU0:router#show run

Building configuration...
!! Last configuration change at Tue Jun 19 16:18:58 2007 by lab
!
....
controller T1 0/1/0/0/0/0
 channel-group 0
  timeslots 1-24
 !
!
controller T1 0/1/0/0/1/0
 channel-group 0
  timeslots 1-24
 !
!
controller T1 0/1/0/0/2/0
 channel-group 0
  timeslots 1-24
 !
!
controller T1 0/1/0/0/0/1  /* This controller instace not in order */
 channel-group 0
  timeslots 1-24
 !

Conditions:

The only issue is with showing the controller slots in sorted order. There is no other impact.

Workaround:

None.

CSCsq53944

Basic Description:

E5 LC clock is disrupted during boot.

Symptom:

Doing periodic show clock sync from RP during the Engine 5 boot reveals that when the LC becomes IOX-RUN, its clock is drifted by few seconds compared to the RP clock. The clock syncs and becomes accurate without user intervention 5-10 minutes after boot.

Conditions:

This issue is specific to Engine 5 and is not seen on Engine 3.

Workaround:

None.

CSCtb31299

Basic Description:

Bundle ether members flap on process restart netio on E5.

Symptom:

LACP protocol flaps and links are detached and then reattached to their bundles when NetIO on the linecard where the links are located is restarted. A message such as one of the following is seen:

RP/0/7/CPU0:Aug 11 02:59:54.030 : BM-DISTRIB[133]: %L2-BM-6-DISTRIBUTING : 
GigabitEthernet0/0/0/9 is no longer in Distributing state as part of Bundle-Ether14000 
(Link is in InSync state) 
 
   

Or

RP/0/7/CPU0:Aug 11 02:59:54.030 : BM-DISTRIB[133]: %L2-BM-6-DISTRIBUTING : 
GigabitEthernet0/0/0/9 is no longer in Distributing state as part of Bundle-Ether14000 
(Link is marked individual by partner) 
 
   

Conditions:

Links are running LACP using the short period (lacp period short) in one or both directions. The NetIO process is restarted on the card where the links are present.

Workaround:

Configure LACP on both connected devices to be running using the default long period (no lacp period short) before restarting NetIO.

CSCtd62429

Basic Description:

XBMA interrupts not getting reported to CPU and no action

Symptom:

XBMA interrupts not getting reported to CPU and no action

Conditions:

XBMA error interrupts can occur because of the following reasons:

1. Bad packets sent from the engine to the XBMA ASIC, because of a ucode bug.

2. Multi-bit errors (MBE) in XBMA.

Such errors do not get notified to the CPU, leading to a silent failure within XBMA ASICS.

Workaround:

None.

Resolved Cisco IOS XR Software PSIRT-Related Caveats

CSCti62211

Basic Description:

BGP flaps due to unknown attribute

Symptom:

Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.

Conditions:

Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending to neighboring devices, but neighboring devices may be running operating systems other than Cisco IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. This is per standards defining the operation of BGP.

Workaround:

No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free software maintenance upgrades (SMUs) progressively starting 28 August 2010.

A Security Advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtm

Upgrading Cisco IOS XR Software

Cisco IOS XR software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).

Software packages are installed from package installation envelope (PIE) files that contain one or more software components.

The following URL contains links to information about how to upgrade Cisco IOS XR software:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html


Note Cisco IOS XR Software Release 3.8.2 requires a 2-GB flash disk as a minimum. Therefore, you must upgrade an existing PCMCIA 1-GB flash disk to 2 GB before upgrading to Cisco IOS XR Software Release 3.8.2. For more information, see the "Minimum Flash Disk Requirements When Upgrading to Release 3.8.2" section.


Product Life Cycle of Cisco IOS XR Software Release 3.8.2

The Cisco IOS XR Software release strategy is time-based with a fixed release date and life cycle, as opposed to being a feature-based release strategy with a variable release date.

Table 12 lists the major milestones of Cisco IOS XR Software Release 3.8.2.


Note Cisco IOS XR Software Release 3.8.2 follows the Cisco IOS XR Software Release 3.8.0 product life cycle.


Table 12 Major Milestones for Cisco IOS XR Software Release 3.8.2 

Milestone
Definition
Date

Availability Date

The date that the Cisco IOS XR Software Release 3.8.0 information is published on Cisco.com and becomes available to the general public.

March 20, 2009

End-of-Life Announcement Date

The official End-of-Life document that announces the end of sale and end of life of Cisco IOS XR Software Release 3.8.0 is distributed to the public.

December 31, 2009

End-of-Sale Date

The last date to order the product through Cisco point-of-sale mechanisms. The product is no longer for sale after this date.

September 30, 2010

End-of-Maintenance Date

This marks end of engineering, maintenance rebuilds, and software fixes through rebuilds of Cisco IOS XR Software Release 3.8.x and through SMUs built off of Cisco IOS XR Software, Release 3.8.x. After this date, maintenance rebuilds and software-fix support will be provided only through rebuilds of Cisco IOS XR Software Release 3.9.x or later.

June 30, 2011

End of Software Maintenance Releases through migration: OS Software

The last date that Cisco Engineering may release any final software maintenance releases or bug fixes through SMU for issues seen on Cisco IOS XR Software, Release 3.8.x. From June 30, 2011 until June 30, 2012, maintenance rebuilds and software fix through SMU support for Cisco IOS XR Software Release 3.8.x will be provided only through migration to rebuilds of Cisco IOS XR Software Release 3.9.x or later releases, and through SMUs built off of Cisco IOS XR Software Release 3.9.x or later releases, as appropriate. After June 30, 2012, Cisco Engineering will no longer develop, repair, maintain, or test Cisco IOS XR Software Release 3.8.x.

June 30, 2012

Last Date of Support

The last date to receive service and support for the product. After this date, all support services for the product are unavailable and the product becomes obsolete.

September 30, 2015


For official End-of-Life and End-of-Sale announcements for Cisco IOS XR software, please visit: http://www.cisco.com/en/US/products/ps5845/prod_eol_notices_list.html or contact your local account representative.

Troubleshooting

For information on troubleshooting Cisco IOS XR software, see Cisco IOS XR Getting Started Guide and Cisco IOS XR Troubleshooting Guide.

Related Documentation

The following sections describe the documentation available for the Cisco CRS-1 Router and the Cisco XR 12000 Series Router. Documentation is available in the form of PDF and HTML files and is available on www.cisco.com:

Hardware Documents

Software Documents

Hardware Documents

You can find the most current hardware documentation at the following URLs:

Cisco CRS-1 Router:

http://www.cisco.com/en/US/products/ps5763/tsd_products_support_series_home.html

Cisco XR 12000 Series Router:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Software Documents

The Cisco IOS XR software documentation set includes the Cisco IOS XR software configuration guides and command references, as well as a getting started guide. See About Cisco IOS XR Software Documentation for Release 3.8 for a list of Cisco IOS XR Release 3.8.2 software documentation.

You can find the most current software documentation for the Cisco CRS-1 and Cisco XR 12000 Series Router at the following URL:

http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html

This document is to be used in conjunction with the documents listed in the "Related Documentation" section.

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.

Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.