Cisco 4000 Series Integrated Services Routers Overview


Note

Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


The Cisco 4000 Series ISRs are modular routers with LAN and WAN connections that can be configured by means of interface modules, including Cisco Enhanced Service Modules (SM-Xs), and Network Interface Modules (NIMs).


Note

The Cisco IOS XE Bengaluru 17.4.1a is the first release for Cisco 4000 Series Integrated Services Routers in the Cisco IOS XE Bengaluru 17.4.1 release series.


The following table lists the router models that belong to the Cisco 4000 Series ISRs.

Cisco 4400 Series ISR

Cisco 4300 Series ISR

Cisco 4200 Series ISR

Cisco 4431 ISR

Cisco 4321 ISR

Cisco 4221 ISR

Cisco 4451 ISR

Cisco 4331 ISR

Cisco 4461 ISR

Cisco 4351 ISR

System Requirements

The following are the minimum system requirements:


Note

There is no change in the system requirements from the earlier releases.


  • Memory: 4GB DDR3 up to 16GB

  • Hard Drive: 200GB or higher (Optional). (The hard drive is only required for running services such as Cisco ISR-WAAS.)

  • Flash Storage: 4GB to 32GB


    Note

    There is no change in the flash storage size from the earlier releases. The flash storage size must be equal to the system memory size.


  • NIMs and SM-Xs: Modules (Optional)

  • NIM SSD (Optional)

For more information, see the Cisco 4000 Series ISRs Data Sheet.

Determining the Software Version

You can use the following commands to verify your software version:

  • For a consolidated package, use the show version command

  • For individual sub-packages, use the show version installed command

Upgrading to a New Software Release

To install or upgrade, obtain a Cisco IOS XE Gibraltar 16.12.1a consolidated package (image) from Cisco.com. You can find software images at http://software.cisco.com/download/navigator.html. To run the router using individual sub-packages, you also must first download the consolidated package and extract the individual sub-packages from a consolidated package.


Note

When you upgrade from one Cisco IOS XE release to another, you may see %Invalid IPV6 address error in the console log file. To rectify this error, enter global configuration mode, and re-enter the missing IPv6 alias commands and save the configuration. The commands will be persistent on subsequent reloads.


For more information on upgrading the software, see the How to Install and Upgrade the Software section of the Software Configuration Guide for the Cisco 4000 Series ISRs.

Recommended Firmware Versions

Table 1 provides information about the recommended Rommon and CPLD versions for releases prior to Cisco IOS XE Everest 16.4.1.

Table 1. Recommended Firmware Versions

Cisco 4000 Series ISRs

Existing RoMmon

Cisco Field-Programmable Devices

Cisco 4451 ISR

16.7(4r)

15010638

Note 
Upgrade CLI output has a typo and it would show the version incorrectly as 15010738 instead of 15010638. This does not impact the upgrade.

Cisco 4431 ISR

16.7(4r)

15010638

Note 
Upgrade CLI output has a typo and it would show the version incorrectly as 15010738 instead of 15010638. This does not impact the upgrade.

Cisco 4351 ISR

16.7(5r)

14101324

Cisco 4331 ISR

16.7(5r)

14101324

Cisco 4321 ISR

16.7(5r)

14101324

Cisco 4221 ISR

16.7(5r)

14101324

Upgrading Field-Programmable Hardware Devices

The hardware-programmable firmware is upgraded when Cisco 4000 Series ISR contains an incompatible version of the hardware-programmable firmware. To do this upgrade, a hardware-programmable firmware package is released to customers.

Generally, an upgrade is necessary only when a system message indicates one of the field-programmable devices on the Cisco 4000 Series ISR needs an upgrade, or a Cisco technical support representative suggests an upgrade.

From Cisco IOS XE Release 3.10S onwards, you must upgrade the CPLD firmware to support the incompatible versions of the firmware on the Cisco 4000 Series ISR. For upgrade procedures, see the Upgrading Field-Programmable Hardware Devices for Cisco 4000 Series ISRs.

Feature Navigator

You can use Cisco Feature Navigator to find information about feature, platform, and software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on cisco.com is not required.

Limitations and Restrictions

The following limitations and restrictions apply to all releases:

Cisco Unified Threat Defense

The Cisco Unified Threat Defense (UTD) service requires a minimum of 1 to 4 GB of DRAM.

Cisco ISR-WAAS and AppNav-XE Service

The Cisco ISR-WAAS/AppNav service requires a system to be configured with a minimum of 8GB of DRAM and 16GB flash storage. For large service profiles, 16GB of DRAM and 32GB flash storage is required. Also, Cisco ISR-WAAS requires a minimum of 200GB SSD.

IPsec Traffic

IPsec traffic is restricted on the Cisco 4000 Series ISR. The router has the same IPsec functionality as a Cisco ISR G2. The default behavior of the router will be as follows (unless an HSECK9 license is installed):

  • If the limit of 1000 concurrent IPsec tunnels is exceeded, no more tunnels are allowed and the following error message appears:


%CERM-4-TUNNEL_LIMIT: Maximum tunnel limit of 1000 reached for Crypto functionality with securityk9 technology package license.
  • The throughput encrypted traffic supports 250 Mbps.

  • The Cisco 4000 Series ISR does not currently support nested SA transformation such as:


crypto ipsec transform-set transform-1 ah-sha-hmac esp-3des esp-md5-hmac 
crypto ipsec transform-set transform-1 ah-md5-hmac esp-3des esp-md5-hmac 
  • The Cisco 4000 Series ISR does not currently support COMP-LZS configuration.

CUBE–SRTP Calls

Cisco IOS XE Everest release 16.5.1 is not recommended for Cisco Unified Border Element deployment involving SRTP calls.

Encrypted Traffic Analytics Record

When the router is reloaded with large configuration, the router generates a high number of messages for initializing the features in data plane and the Encrypted Traffic Analytics (ETA) record may not be exported. This happens only when the ETA inactive timeout command is configured on the router. To avoid this issue, you can configure the inactive timeout commad after the router reloads.

USB Etoken

USB Etoken is not supported on Cisco IOS XE Denali 16.2.1.

Unified Communication on Cisco 4000 Series ISR

  • For T1/E1 clocking design and configuration changes, For detailed information, see the following Cisco document: T1/E1 Voice and WAN Configuration Guide.

  • For Cisco ISR 4000 Series UC features interpretation with CUCM versions, For detailed information, see the following Cisco document: Compatibility Matrix .

  • For High density DSPfarm PVDM (SM-X-PVDM) and PVDM4 DSP planning, For detailed information, see the following Cisco document: DSP Calculator for DSP planning .

Yang Data Models

Effective with Cisco IOS XE Everest 16.5.1b, the Cisco IOS XE YANG models are available in the form of individual feature modules with new module names, namespaces and prefixes. Revision statements embedded in the YANG files indicate if there has been a model revision.

Navigate to https://github.com/YangModels/yang > vendor > cisco > xe >1651, to see the new, main cisco-IOS-XE-native module and individual feature modules attached to this node.

There are also XPATH changes for the access-list in the Cisco-IOS-XE-acl.yang schema.

The README.md file in the above Github location highlights these and other changes with examples.

New Features and Important Notes About Cisco 4000 Series ISRs Release Fuji 16.8.1

This section describes new features in Cisco IOS XE Fuji 16.8 that are supported on the Cisco 4000 Series ISRs.

New and Changed Information

New Software Features in Cisco 4000 Series ISR Release Cisco IOS XE Fuji 16.8.1

The following features are supported by the Cisco 4000 Series Integrated Services Routers for Cisco IOS XE Fuji 16.8.1:

Configure the Router for Web User Interface

This section explains how to configure the router to access Web User Interface. Web User Interface require the following basic configuration to connect to the router and manage it.

  • An HTTP or HTTPs server must be enabled with local authentication.

  • A local user account with privilege level 15 and accompanying password must be configured.

  • Vty line with protocol ssh/telnet must be enabled with local authentication. This is needed for interactive commands.

  • For more information on how to configure the router for Web User Interface, see Cisco 4000 Series ISRs Software Configuration Guide, Cisco IOS XE 17.

Entering the Configuration Commands Manually

To enter the Cisco IOS commands manually, complete the following steps:

Before you begin

If you do not want to use the factory default configuration because the router already has a configuration, or for any other reason, you can use the procedure in this section to add each required command to the configuration.

Procedure


Step 1

Log on to the router through the Console port or through an Ethernet port.

Step 2

If you use the Console port, and no running configuration is present in the router, the Setup command Facility starts automatically, and displays the following text:

--- System Configuration Dialog ---
 
Continue with configuration dialog? [yes/no]:

Enter no so that you can enter Cisco IOS CLI commands directly.

If the Setup Command Facility does not start automatically, a running configuration is present, and you should go to the next step.

Step 3

When the router displays the user EXEC mode prompt, enter the enable command, and the enable password, if one is configured, as shown in the following example:

Router> enable
password password
Step 4

Enter config mode by entering the configure terminal command, as shown in the following example.

Router> config terminal
Router(config)#
Step 5

Using the command syntax shown, create a user account with privilege level 15.

Step 6

If no router interface is configured with an IP address, configure one so that you can access the router over the network. The following example shows the interface GigabitEthernet 0/0/0 configured.

Router(config)# interface gigabitethernet 0/0/0
Router(config-if)# ip address 10.10.10.1 255.255.255.248
Router(config-if)# no shutdown
Router(config-if)# exit
Step 7

Configure the router as an http server for nonsecure communication, or as an https server for secure communication. To configure the router as an http server, enter the ip http server command shown in the example:

Router(config)# ip http secure-server
Step 8

Configure the router for local authentication, by entering the ip http authentication local command, as shown in the example:

Router(config)# ip http authentication local
Step 9

Configure the vty lines for privilege level 15. For nonsecure access, enter the transport input telnet command. For secure access, enter the transport input telnet ssh command. An example of these commands follows:

Router(config)# line vty 0 4
Router(config-line)# privilege level 15
Router(config-line)# login local
Router(config-line)# transport input telnet
Router(config-line)# transport output telnet
Router(config-line)# transport input telnet ssh
Router(config-line)# transport output telnet ssh
Router(config-line)# exit
Router(config)# line vty 5 15
Router(config-line)# privilege level 15
Router(config-line)# login local
Router(config-line)# transport input telnet
Router(config-line)# transport output telnet
Router(config-line)# transport input telnet ssh
Router(config-line)# transport output telnet ssh
Router(config-line)# end
 

Resolved and Open Bugs

This section provides information about the caveats in Cisco 4000 Series Integrated Services Routers and describe unexpected behavior. Severity 1 caveats are the most serious caveats. Severity 2 caveats are less serious. Severity 3 caveats are moderate caveats. This section includes severity 1, severity 2, and selected severity 3 caveats.

The open and resolved bugs for this release are accessible through the Cisco Bug Search Tool . This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about bugs and vulnerabilities in this product and other Cisco hardware and software products. Within the Cisco Bug Search Tool, each bug is given a unique identifier (ID) with a pattern of CSCxxNNNNN, where x is any letter (a-z) and N is any number (0-9). The bug IDs are frequently referenced in Cisco documentation, such as Security Advisories, Field Notices and other Cisco support documents. Technical Assistance Center (TAC) engineers or other Cisco staff can also provide you with the ID for a specific bug. The Cisco Bug Search Tool enables you to filter the bugs so that you only see those in which you are interested.

In addition to being able to search for a specific bug ID, or for all bugs in a product and release, you can filter the open and/or resolved bugs by one or more of the following criteria:

  • Last modified date

  • Status, such as fixed (resolved) or open

  • Severity

  • Support cases

You can save searches that you perform frequently. You can also bookmark the URL for a search and email the URL for those search results.


Note

If the defect that you have requested cannot be displayed, this may be due to one or more of the following reasons: the defect number does not exist, the defect does not have a customer-visible description yet, or the defect has been marked Cisco Confidential.

We recommend that you view the field notices for the current release to determine whether your software or hardware platforms are affected. You can access the field notices from the following location:

http://www.cisco.com/en/US/support/tsd_products_field_notice_summary.html

Using the Cisco Bug Search Tool

For more information about how to use the Cisco Bug Search Tool , including how to set email alerts for bugs and to save bugs and searches, see Bug Search Tool Help & FAQ .

Before You Begin


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool . If you do not have one, you can register for an account.

SUMMARY STEPS

  1. In your browser, navigate to the Cisco Bug Search Tool .
  2. If you are redirected to a Log In page, enter your registered Cisco.com username and password and then, click Log In.
  3. To search for a specific bug, enter the bug ID in the Search For field and press Enter.
  4. To search for bugs related to a specific software release, do the following:
  5. To see more content about a specific bug, you can do the following:
  6. To restrict the results of a search, choose from one or more of the following filters:

DETAILED STEPS


Step 1

In your browser, navigate to the Cisco Bug Search Tool .

Step 2

If you are redirected to a Log In page, enter your registered Cisco.com username and password and then, click Log In.

Step 3

To search for a specific bug, enter the bug ID in the Search For field and press Enter.

Step 4

To search for bugs related to a specific software release, do the following:

  1. In the Product field, choose Series/Model from the drop-down list and then enter the product name in the text field. If you begin to type the product name, the Cisco Bug Search Tool provides you with a drop-down list of the top ten matches. If you do not see this product listed, continue typing to narrow the search results.

  2. In the Releases field, enter the release for which you want to see bugs.

    The Cisco Bug Search Tool displays a preview of the results of your search below your search criteria.

Step 5

To see more content about a specific bug, you can do the following:

  • Mouse over a bug in the preview to display a pop-up with more information about that bug.

  • Click on the hyperlinked bug headline to open a page with the detailed bug information.

Step 6

To restrict the results of a search, choose from one or more of the following filters:

Filter

Description

Modified Date

A predefined date range, such as last week or last six months.

Status

A specific type of bug, such as open or fixed.

Severity

The bug severity level as defined by Cisco. For definitions of the bug severity levels, see Bug Search Tool Help & FAQ .

Rating

The rating assigned to the bug by users of the Cisco Bug Search Tool .

Support Cases

Whether a support case has been opened or not.

Your search results update when you choose a filter.


Resolved and Open Bugs in Cisco 4000 Series Integrated Services Routers

This section contains the following topics:

Open Caveats - Cisco IOS XE Fuji 16.8.1

All open bugs for this release are available in the Cisco Bug Search Tool.

Caveat ID Number

Description

CSCvf34608

Excessive "Reflector" Tracelogs

CSCvg93505

Cisco 4400 Series ISRs as primary KS crashed while removing gikev2(suite-b) group from KS

CSCvg95213

Cisco 4400 Series ISRs: speed/duplex disappear from show run after shut down and reload.

CSCvh02575

PLATFORM_INFRA-5-IOS_INTR_OVER_LIMIT error with traceback.

CSCvh24986

Failed to get LSC certificate from Microsoft CA.

CSCvh47124

Next-hop is wrong in route-import table on branch when you delete the WAN interface and reconfigure it

.

CSCvh57108

CPUHOG on QoS statistics collection for DMVPN. QoS crash with DMVPN/NHRP.

CSCvh60766

Cisco4431 ISR crashed while verifying performance at IPv6 MPLS scale.

CSCvh62615

There is junk entry in route-import table on branch when shutdown/no shutdown WAN interface

.

CSCvh66033

IKEv2 - Crash with segmentation fault when debugs crypto ikev2 are enabled.

CSCvh66642

uIDB leaks at the DMVPN hub if the route to remote NBMA is not learned.

CSCvh78116

IOS-XE: HTTP WebUI works even when disabled.

CSCvh79640

Cisco 4000 Series ISRs: BDI unreachable when interface has HSRP-enabled subinterfaces.

CSCvh89773

Bootloop due to file system errors.

CSCvh91443

Cisco 4000 Series ISRs: Crashed due to CPUHOG Net background.

CSCvh97818

The show voice call command missing print out dsp statistics in Cisco 4000 Series ISRs.

CSCvi01745

cpp_cp_svr crashes, causing reload.

CSCvi02816

ZBF not able to identify the WAAS optimized flow and drops ACK.

CSCvf82853

RPID not updated in Transfer Scenario involving TDM trunk.

CSCvg06563

BE4K Memory leak during bulk register request from portal.

CSCvg30991

IOS-XE routers: Memory leak observed on process ivr: peer_item_t in AFW_application_process.

CSCvg40933

MoH not heard when conf initiator drops from conference [specifically when Holdee xfers the call]

CSCvg42218

BE4K VRF failed to associate if binding is used in tenant.

CSCvh41761

Media failure when RTP port 6784 is allocated by CUBE.

CSCvh61030

Present Call Idle State does not work with Seq Vhg with Shared lines.

CSCvh63857

Memory leak in some SBC functions.

CSCvh82112

Memory leak under process RECMSPAPP in IOSd.

CSCvh89821

Router crash due to oce_process_ipv4_adj_perf

.

CSCvh95689

CME SIP: MWI stops updating when using Solicited Notify option with CUE

.

CSCvh97268

Vcube doesnot stream audio from a .wav file on bootflash.

CSCvh97818

The show voice call command is missing print out dsp statistics in Cisco 4000 Series ISRs.

CSCvi00751

Network information title is not localized to Japanese.

CSCvi00768

Directory "records" string is displaying with invalid characters.

CSCvi00998

Session transport tcp in voice register template is not working with autoreg phone configs.

CSCvi01650

SIP Out-of-Dialog option Ping Group Shows Dial-Peers Marked as none.

CSCvi03536

Local Directory search returns "No Records Found" when a Day 2 entry is used in "Last Name" field

.

CSCvi06417

SIP stack matching the dial-peer when processing NOTIFY message causing call routing issues

.

CSCvi06897

Dialpeer matching for inbound SIP profile fails with VRFs

.

Resolved Caveats - Cisco IOS XE Fuji 16.8.1

All resolved bugs for this release are available in the Cisco Bug Search Tool.

Caveat ID Number

Description

CSCvf68261

Crashes when printing IPSEC anti-replay error.

CSCvf87437

High memory utilization in the QFP of QM RM process.

CSCvf92182

The show platform software rg f0 services rg-id 1 verbose shows network address backwards.

CSCvf95141

Zone-based Firewall crashes on standby.

CSCvg01760

Traceback-CPUHog seen on the device.

CSCvg28614

Cisco 4000 Series ISR dialer interface traceroute is abnormal although communication is OK.

CSCvg36246

SM-X-ES3s port connected to Ethernet-Internal x/0/0 always become block port.

CSCvg38872

Crash observed while sending 40K 4Kb pkt size html session with ETA configured on ESP 100.

CSCvh69641

Cisco 4000 Series ISR core file is seen @cvmx_pow_work_response_async.

CSCvg34986

Media recording on IOS-XE does not work if a refer is received immediately after the call is answered

.

CSCvh04245

TDM-IP, QoS marking is varying to 0 and EF for the same RTP stream.

Open Caveats - Cisco IOS XE Fuji 16.8.2

All open bugs for this release are available in the Cisco Bug Search Tool.

Caveat ID Number

Description

CSCvj17326

Cisco 4400 ISR crashes in o2_cavm_pci_unlock when forwarding large packets for VPLS

CSCvj71660

IKEv2 IPSec Tunnel stops passing traffic after two days, Tunnel remains up.

CSCvj78876

CUBE: FPI Hung Sessions and Provisioning Failures observed in Standby CUBE.

CSCvk02072

Hoot-n-holler multicast traffic marked with DSCP 0.

CSCvk02773

Standby crashed when defaulting vlan config reconfig vlan config with fnf/et-analytics.

CSCvk60184

Random crash of data plane with SRTP-SRTP / SRTP-RTP load tests.

CSCvk69075

No calls shown in output "show call active voice brief" on CUBE & stale entries are present.

CSCvk71907

Adaptive QOS : Target shape rate is set to floor rate when lower floor and ceiling rates are used

CSCvm01420

CUBE crashes at sipSPI_ipip_vcc_CheckCodecSetTyp.e

CSCvm02627

Incorrect Contact port 5060 used instead of 5061 by CUBE in "302 Moved Temporarily" message.

CSCvm16619

CPP-mcplo-ucode crash while encrypting SIP packets with ALG NAT for SIP.

CSCvm20374

Polaris Router - CPUHog - SNMP ENGINE crashed with Watchdog timeout.

CSCvm41298

qfp-ucode-utah crashed with memory corruption.

CSCvm45589

The initial IVR is not played when using custom BACD script in Cisco 4000 Series ISRs.

CSCvm51112

"clear crypto sa vrf MyVrf" triggers crash after updating pre-shared-keys

CSCvm55465

BGP updates missing ISIS advertising-bits led to LDP label purge on peer.

Resolved Caveats - Cisco IOS XE Fuji 16.8.2

All resolved bugs for this release are available in the Cisco Bug Search Tool.

Caveat ID Number

Description

CSCuz14861

IOS-XE Fails to correctly populate RTCP SSRC Field

CSCvf07576

router reloaded when doing show BGP RT filter routes

CSCvf29213

PFRV3: Site Prefix shows unreachable after removing and adding the specific route for the prefix

CSCvg29037

Traceback is observed during mid-call media IP and port change

CSCvg62161

Prefix SID delete after SSO.

CSCvh57108

CPUHOG on QoS statistics collection for DMVPN. QoS crash with DMVPN/NHRP.

CSCvh57657

NAT MIB not populated when using traditional NAT

CSCvh82112

Polaris Routers - Memory leak under process RECMSPAPP in IOSd

CSCvh83319

Interop vrrp doesnt work between cedge and vedge

CSCvh85788

Local LAN-only prefix present in master route-import table but not present in site prefix DB

CSCvh91443

ISR4k Crashed due to CPUHOG Net background.

CSCvh92275

QoS Overrides loadbalancing to per prefix even with only session level policing applied

CSCvi01558

iBGP dynamic peer using TTL 1

CSCvi02816

ZBF not able to identify the WAAS optimized flow and drops ACK

CSCvi06312

Subsystem stopped: ios-emul-oper-db due to bgp table issue

CSCvi08303

Standby RP Reloads due to Config Sync Failure When Applied Service-insertion WAAS on Physical Int

CSCvi08470

OSPF: process crashed when the interface priority is configured for 0.

CSCvi16454

Router crash due to PuntInject Keepalive Process - kmalloc failures

CSCvi22835

Vz: Non-Polaris to Polaris ISSU compatibility issue

CSCvi25380

Cisco IOS XE Software Authent., Author., and Accounting Login Authent. Remote Code Execution Vuln.

CSCvi26061

RP crash @policymap_associated_to_multiple_instances

CSCvi34314

ISR/C1100: interface down/up does not renew dhcp assigned ip address

CSCvi35232

CME/BE4K crashes when trying to check help command for new device type BEKEM

CSCvi36875

Restored DB is session-lock locked out with insane timeout after boot

CSCvi44988

C1111-8P: random commands may trigger TACACS+ to crash

CSCvi54878

Memory leaks seen at PKI_name_list_add(0xa139cc0)+0x3e

CSCvi55920

ISR 4K Crashes issuing "show call active voice"

CSCvi62764

OSPF SSPF/SRTE: absolute value configured for the SRTE tunnel not configured by OSPF.

CSCvi65958

Standby RP crashes due to Memory usage in ospf_insert_multicast_workQ

CSCvi72996

NMR TTL is wrongly considering eid-record of 0.0.0.0/0 for its calculation

CSCvi74088

link local multicast packets are received when the SVI is in down state

CSCvi83419

Router crash when removing route-target and with hard clear

CSCvi91714

IPv6 address not assigned or delayed when RA Guard is enabled

CSCvi95775

Reverse-tunnel routes under PMIPv6 MAG config not using configured distance metric

CSCvi96450

Router crashed when lsp-mtu is changed

CSCvi98373

msmr+xtr carsh during scale wireless roaming

CSCvj17682

MAC filtering incorrectly set on builtin ports of ISR4300

CSCvj20302

ISR4k MTP not performing RFC2833 payload type conversion

CSCvj29593

debug platform condition start causes keepalive failures with Vasi interface

CSCvj41224

Crash when doing SNMP walk and applying QOS over a GRE tunnel

CSCvj49476

Telnet Sessions Hang/Become unavailable at execution of "show run"

CSCvj52681

dynamic vlan assignment causes all sisf entires under the port to be deleted

CSCvj71845

Backup path incorrect for ring topology where high ISIS cost is configured on 1 link.

CSCvj73544

ospf routing loop for external route with multiple VLINKs/ABRs

CSCvj78083

Path of Last Resort Sending Probes in Standby State

CSCvj90089

Crash while doing a conference call

CSCvj95351

OSPF SR uloop : After issuing "clear ip ospf process". ospf process crashed.

CSCvk00824

ISR1100 drops incoming ISIS Hello packets with "point-to-point" enabled, session is down

CSCvk37875

High Availability system with two Voice Gateways - Crash

CSCvk50734

Device Tracking - Memory leak observed with IPv6 NS/NA Packets .

CSCvk52495

IP SLA multicast appear as "Unknown"

CSCvk66880

CUBE incorrectly fomats SIP SDP

CSCvk69093

CUBE is not responding to SIP INFO

CSCvm32630

Crash due to out-of-memory condition Memory leak@CENT-BR-0

Related Documentation

Cisco IOS Software Documentation

The Cisco IOS XE Fuji 16.x software documentation set consists of Cisco IOS XE Fuji 16.x configuration guides and Cisco IOS command references. The configuration guides are consolidated platform-independent configuration guides organized and presented by technology. There is one set of configuration guides and command references for the Cisco IOS XE Fuji 16.x release train. These Cisco IOS command references support all Cisco platforms that are running any Cisco IOS XE Fuji 16.x software image.

See http://www.cisco.com/en/US/products/ps11174/tsd_products_support_series_home.html

Information in the configuration guides often includes related content that is shared across software releases and platforms.

Additionally, you can use Cisco Feature Navigator to find information about feature, platform, and software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on cisco.com is not required.

Communications, Services, and Additional Information

  • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.

  • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.

  • To submit a service request, visit Cisco Support.

  • To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.

  • To obtain general networking, training, and certification titles, visit Cisco Press.

  • To find warranty information for a specific product or product family, access Cisco Warranty Finder.

Cisco Bug Search Tool

Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.