Guest

Cisco IOS XR Software (End-of-Sale)

Release Notes for Cisco XR 12000 Series Router for Cisco IOS XR Software Release 4.0.3

  • Viewing Options

  • PDF (629.0 KB)
  • Feedback
Release Notes for Cisco XR 12000 Series Router for Cisco IOS XR Software Release 4.0.3

Table Of Contents

Release Notes for Cisco XR 12000 Series Router for Cisco IOS XR Software Release 4.0.3

Contents

Introduction

System Requirements

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Support

Minimum Firmware Requirement

Determining Your Software Version

New Features in Cisco IOS XR Software Release 4.0.3

New Software Feature on the Cisco XR 12000 Series Router

New Hardware Features on the Cisco XR 12000 Series Router

Important Notes

Minimum Flash Disk Requirements When Upgrading to Release 4.0.3

Caveats

Cisco IOS XR Caveats

Caveats Specific to the Cisco XR 12000 Series Router

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation and Submitting a Service Request


Release Notes for Cisco XR 12000 Series Router for Cisco IOS XR Software Release 4.0.3


April 24, 2013

Cisco IOS XR Software Release 4.0.3

Text Part Number OL-24345-01

These release notes describe the features provided in the Cisco IOS XR Software Release 4.0.3 for the Cisco XR 12000 Series Router and are updated as needed.


Note For information on the Cisco XR 12000 Series Router running Cisco IOS XR Software Release 4.0.3, see the "Important Notes" section.


You can find the most current Cisco IOS XR software documentation at

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

These electronic documents may contain updates and modifications. For more information on obtaining Cisco documentation, see the "Obtaining Documentation and Submitting a Service Request".

For a list of software caveats that apply to Cisco IOS XR Software Release 4.0.3, see the "Caveats" section. The caveats are updated for every release and are described at www.cisco.com.

We recommend that you view the field notices for this release located at the following URL to see if your software or hardware platforms are affected:

http://www.cisco.com/public/support/tac/fn_index.html

Contents

These release notes contain the following sections:

Introduction

System Requirements

Determining Your Software Version

New Features in Cisco IOS XR Software Release 4.0.3

Important Notes

Minimum Flash Disk Requirements When Upgrading to Release 4.0.3

Caveats

Upgrading Cisco IOS XR Software

Troubleshooting

Related Documentation

Obtaining Documentation and Submitting a Service Request, page 36

Introduction

Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and high performance.

Cisco IOS XR software running on the Cisco XR 12000 Series Router provides the following features and benefits:

IP and RoutingSupports a wide range of IPv4 and IPv6 services and routing protocols; such as Border Gateway Protocol (BGP), Routing Information Protocol (RIPv2), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), Hot Standby Router Protocol (HSRP), and Virtual Router Redundancy Protocol features (VRRP).

BGP Prefix Independent ConvergenceProvides the ability to converge BGP routes within sub seconds instead of multiple seconds. The Forwarding Information Base (FIB) is updated, independent of a prefix, to converge multiple 100K BGP routes with the occurrence of a single failure. This convergence is applicable to both core and edge failures and with or with out MPLS. This fast convergence innovation is unique to Cisco IOS XR software.

Multiprotocol Label Switching (MPLS)Supports MPLS protocols, including Traffic Engineering (TE), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), Virtual Private LAN Service (VPLS), and Layer 3 Virtual Private Network (L3VPN).

Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM) and Protocol Independent Multicast (PIM) in Sparse Mode only.

Quality of Service (QoS)—Supports QoS mechanisms including policing, marking, queuing, random and hard traffic dropping, and shaping. Additionally, Cisco IOS XR software also supports modular QoS command-line interface (MQC). MQC is used to configure QoS features.

Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces. Includes a comprehensive set of Syslog messages.

Security—Provides comprehensive network security features including access control lists (ACLs); routing authentications; Authentication, Authorization, and Accounting (AAA)/Terminal Access Controller Access Control System (TACACS+); Secure Shell (SSH); Management Plane Protection (MPP) for management plane security; and Simple Network Management Protocol version3 (SNMPv3). Control plane protections integrated into line card Application-Specific Integrated Circuits (ASICs) include Generalized TTL Security Mechanism (GTSM), RFC 3682, and Dynamic Control Plane Protection (DCPP).

Craft Works Interface (CWI)—CWI is a client-side application used to configure and manage Cisco routers. Management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks.

Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, nonstop routing for ISIS, LDP, BGP, and OSPF, and nonstop forwarding (NSF).

Multicast service delivery in SP NGN—MVPNv4 support carries multicast traffic over an ISP MPLS core network.

IPv6 Provider Edge Router support for IPv6 applications—Delivers IPv6 traffic over an IPv4/MPLS core with IPv6 provider edge router (6PE) support.

IPv6 VPN over MPLS (6VPE) support—Delivers IPv6 VPN over MPLS (IPv6) VPN traffic over an IPv4 or MPLS core with 6VPE support.

6VPE over L2TPv3 support—Delivers IPv6 VPN traffic over L2TPv3 core with 6VPE support. This feature is also available on Cisco IOS software.

Enhanced core competencies:

IP fast convergence with Fast Reroute (FRR) support for Intermediate System-to-Intermediate System (IS-IS) and OSPF

Path Computation Element (PCE) capability for traffic engineering

L2TPv3 Tunneling Mechanism—Service Providers who do not use MPLS in the core, but want to offer VPN services can use the L2TPv3 tunneling mechanism. This feature support includes IPv4 (VPNv4) and IPv6 (6VPE) VPN services using L2TPv3 encapsulation. The L2TPv3 packet is encapsulated in an IPv4 delivery header and is carried across an IPv4 backbone. VPN prefixes are advertised with BGP labels and resolved over L2TPv3 tunnels. This feature is supported only on the Cisco XR 12000 Series Router.

For more information about new features provided on the Cisco XR 12000 Series Router for Cisco IOS XR Software Release 4.0.3, see the "New Features in Cisco IOS XR Software Release 4.0.3" section in this document.

System Requirements

This section describes the system requirements for Cisco IOS XR Software Release 4.0.3 supported on the Cisco XR 12000 Series Router. The system requirements include the following information:

Feature Set Table

Memory Requirements

Hardware Supported

Software Compatibility

Other Firmware Support

To determine the software versions or levels of your current system, see the "Determining Your Software Version" section.

Feature Set Table

Cisco IOS XR software is packaged in feature sets (also called software images). Each feature set contains a specific set of Cisco IOS XR Software Release 4.0.3 features.

Table 1 lists the Cisco IOS XR software feature set matrix (PIE files) and associated filenames available for Cisco IOS XR Software Release 4.0.3, supported on the Cisco XR 12000 Series Router.

Table 1 Cisco XR 12000 Series Router Supported Feature Set (Cisco IOS XR Software
Release 4.0.3 PIE Files) 

Feature Set
Filename
Description
Composite Package

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.pie-4.0.3

Contains the required core packages, including OS, Admin, Base, Forwarding, Routing, SNMP Agent, and Alarm Correlation.

Cisco IOS XR IP Unicast Routing Core Bundle

c12k-mini.vm-4.0.3

Contains the required core packages including OS, Admin, Base, Forwarding, and Routing SNMP Agent, and Alarm Correlation.

Optional Individual Packages 1

Cisco IOS XR Manageability Package

c12k-mgbl.pie-4.0.3

CORBA2 agent, XML Parser, and HTTP server packages.

Cisco IOS XR MPLS Package

c12k-mpls.pie-4.0.3

MPLS-TE,3 LDP, 4 MPLS Forwarding, MPLS OAM,5 LMP,6 OUNI,7 and RSVP.8

Cisco IOS XR Multicast Package

c12k-mcast.pie-4.0.3

Multicast Routing Protocols (PIM,9 MSDP,10 IGMP,11 Auto-RP, BSR12 ), Tools (SAP, MTrace, MRINFO), and Infrastructure (MRIB,13 MURIB,14 MFWD)15 .

Cisco IOS XR Security Package

c12k-k9sec.pie-4.0.3

Support for Encryption, Decryption, IPSec16 , SSH,17 SSL,18 and PKI.19
Software based IPSec support: maximum of 500 tunnels

Cisco IOS XR Standby RP Boot Image

mbiprp-rp.vm-4.0.3

Support for booting the Standby RP on a Cisco XR 12000 Series Router.

Cisco IOS XR FPD Package

c12k-fpd.pie-4.0.3

Firmware for shared port adapters (SPA) and for fixed port line cards supported in Cisco IOS XR.

Cisco IOS XR Diagnostic Package

c12k-diags.pie-4.0.3

Diagnostic utilities for Cisco IOS XR routers.

Cisco IOS XR Documentation Package

c12k-doc.pie-4.0.0

.man pages for Cisco IOS XR software on the Cisco XR 12000 Series Router chassis.

1 Packages are installed individually

2 Common Object Request Broker Architecture

3 MPLS Traffic Engineering

4 Label Distribution Protocol

5 Operations, Administration, and Maintenance

6 Link Manager Protocol

7 Optical User Network Interface

8 Resource Reservation Protocol

9 Protocol Independent Multicast

10 Multicast Source Discovery Protocol

11 Internet Group Management Protocol

12 Bootstrap router

13 Multicast Routing Information Base

14 Multicast-Unicast RIB

15 Multicast forwarding

16 IP Security

17 Secure Shell

18 Secure Socket Layer

19 Physical layer interface module


Table 2 lists the Cisco XR 12000 Series Router TAR files.

Table 2 Cisco XR 12000 Series Router Supported Feature Sets (Cisco IOS XR Software
Release 4.0.3 TAR Files) 

Feature Set
Filename
Description

Cisco IOS XR IP/MPLS Core Software

XR12000-iosxr-4.0.3.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR IP/MPLS Core Software 3DES

XR12000-iosxr-k9-4.0.3.tar

Cisco IOS XR IP Unicast Routing Core Bundle

Cisco IOS XR Manageability Package

Cisco IOS XR MPLS Package

Cisco IOS XR Multicast Package

Cisco IOS XR Security Package


Memory Requirements


Caution If you remove the media in which the software image or configuration is stored, the router may become unstable and fail.

The minimum memory requirements for a Cisco XR 12000 Series Router running Cisco IOS XR Software Release 4.0.3 consist of the following:

2-GB route memory on performance route processor 2 (PRP-2)


Note 4-GB route memory on PRP-2 is required if it is planned to scale to more than 64K IPsec tunnels per chassis.


2-GB or greater ATA flash storage on PRP-2

4-GB route memory on performance route processor 3 (PRP-3)

2-GB or greater Compact flash storage on PRP-3

1-GB line card route memory on all Engine 3 line cards

1-GB line card memory on Engine 5-based SPA interface processor (SIP-600)

The default route memory on the 12000-SIP-600 is 1GB

2-GB line card memory on all Engine 5-based SPA interface processors (SIPs)

The default route memory on the 12000-SIP-401, 501, and 601 is 2 GB.


Note The performance route processor 1 (PRP-1) is not supported in production environments.


2-GB PCMCIA Flash Disk

Hardware Supported

All hardware features are supported on Cisco IOS XR software, subject to the memory requirements specified in the "Memory Requirements" section.

Table 3 lists the supported hardware components on the Cisco XR 12000 Series Router and the minimum required software versions. For more information, see the "Determining Your Software Version" section.

Table 3 Cisco XR 12000 Series Router Supported Hardware and Minimum Software Requirements 

Component
Part Number
Support from Version
Cisco XR 12000 Series Router Series Router Systems
   

Cisco XR 12000 Series 4-slot chassis

XR-12000/4

3.3

Cisco XR 12000 Series 6-slot chassis

XR-12000/6

3.3

Cisco XR 12000 Series 10-slot chassis

XR-12000/10

3.3

Cisco XR 12000 Series 16-slot chassis

XR-12000/16

3.3

Cisco XR 12000 Series Router Chassis Hardware

4-slot chassis & backplane, 1 Blower, 2 AC

12000/4-AC

3.3

4-slot chassis & backplane, 1 Blower, 2 DC

12000/4-DC

3.3

6-slot chassis & backplane, 2 Alarm, 1 Blower, 2 AC

12000/6-AC

3.3

6-slot chassis & backplane, 2 Alarm, 1 Blower, 2 DC

12000/6-DC

3.3

10-slot chassis & backplane, 2 Alarm, 1 Blower, 2 AC

12000/10-AC

3.3

10-slot chassis & backplane, 2 Alarm, 1 Blower, 2 DC

12000/10-DC

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 3 AC

12000/16-AC3

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 4 DC

12000/16-DC

3.3

16-slot chassis & backplane, 2 Alarm, 2 Blower, 4 AC

12000/16-AC4

3.3

Cisco XR12000 16-slots; 2 Alarms, Advanced 2 Blowers, up to 8 DC

12000E/16-DC

3.8

Cisco XR12000 16-slots; 2 Alarms, Advanced 2 Blowers, up to 8 AC

12000E/16-AC

3.8

Cisco XR 12000 Series Router Fabric Hardware

Enhanced 20 Gbps Fabric & Alarm card for Cisco 12004

12004E/20

3.6

Enhanced 80 Gbps Fabric & Alarm card for Cisco 12404

12404E/80

3.6

Enhanced 30 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12006

12006E/30

3.6

Enhanced 120 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12406

12406E/120

3.6

Enhanced 50 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12010

12010E/50

3.5.2

Enhanced 200 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12410

12410E/200

3.5.2

Enhanced 800 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12810

12810E/800

3.4

Enhanced 80 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12016

12016E/80

3.5.2

Enhanced 320 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12416

12416E/320

3.5.2

Enhanced 1280 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12816

12816E/1280

3.4

80 Gbps Fabric & Alarm card for Cisco 12404

12404/80

3.3

30 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12006

12006/30

3.3

120 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12406

12406/120

3.3

50 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12010

12010/50

3.3

200 Gbps Fabric (2xCSC and 5xSFC) for Cisco 12410

12410/200

3.3

80 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12016

12016/80

3.3

320 Gbps Fabric (2xCSC and 3xSFC) for Cisco 12416

12416/320

3.3

Cisco XR 12000 Series Route Processor Hardware

Cisco XR 12000 Series Performance Route Processor 2

PRP-2

3.2

Cisco XR 12000 Series Performance Route Processor 3

PRP-3

3.8

Cisco XR 12000 Series 40 GB Hard Drive Option

HD-PRP2-40G

3.2

Cisco XR 12000 Series PRP-3 80G Hard Drive

HD-PRP3

3.8

Cisco XR 12000 Series General Chassis Hardware

Cisco XR 12000 Series PCMCIA Flash Disk 1 GB

MEM-FD1G

3.2

Cisco XR 12000 Series PCMCIA Flash Disk 2 GB

MEM-FD2G

3.2

Cisco XR 12000 Series PCMCIA Flash Disk 4 GB

MEM-FD4G

3.8

Cisco XR 12000 Series PRP-3 2GB Compact Flash

FLASH-PRP3-2G

3.8

Cisco XR 12000 Series PRP-3 4GB Compact Flash

FLASH-PRP3-4G

3.8

Cisco XR 12000 Series PRP-3 4GB Memory (2X2GB DIMM)

MEM-PRP3-4G

3.8

Cisco XR 12000 Series PRP-3 8GB Memory (2X4GB DIMM)

MEM-PRP3-8G

3.8

Cisco XR 12000 Series SPA Interface Processor Hardware

Multirate 2.5G IP Services Engine (Modular)

12000-SIP-401

3.3

Multirate 5G IP Services Engine (Modular)

12000-SIP-501

3.3

Multirate 10G IP Services Engine (Modular)

12000-SIP-601

3.3

Cisco XR 12000 Series SPA Interface Processor 10G

12000-SIP-600

3.2

Cisco XR 12000 Series Router SONET Interface Modules and SPAs

Cisco XR 12000 Series 4xOC12c/STM4c POS Intermediate Reach Single-Mode optics

4OC12X/POS-I-SC-B

3.2

Cisco XR 12000 Series 4xOC12c/STM4c POS Short Reach Multi-Mode optics

4OC12X/POS-M-SC-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Short Reach Multi-Mode optics

16OC3X/POS-M-MJ-B

3.2

Cisco XR 12000 Series 16xOC3c/STM1c POS Intermediate Reach Single-Mode optics

16OC3X/POS-I-LC-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Short Reach Multi-Mode optics

8OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 8xOC3c/STM1c POS Intermediate Reach Single-Mode optics

8OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Short Reach Multi-Mode optics

4OC3X/POS-MM-MJ-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Intermediate Reach Single-Mode optics

4OC3X/POS-IR-LC-B

3.2

Cisco XR 12000 Series 4xOC3c/STM1c POS Long Reach Single-Mode optics

4OC3X/POS-LR-LC-B

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Short Reach Single-Mode optics

OC48X/POS-SR-SC

3.2

Cisco XR 12000 Series 1xOC48c/STM16c POS Long Reach Single-Mode optics

OC48X/POS-LR-SC

3.2

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, multimode

4OC3X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-Port OC-3c/STM-1c ATM ISE Line Card, single-mode

4OC3X/ATM-IR-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM multimode ISE line card with SC connector

4OC12X/ATM-MM-SC

3.4

Cisco XR 12000 Series 4-port OC-12/STM-4 ATM single-mode, intermediate-reach ISE line card with SC Connector

4OC12X/ATM-IR-SC

3.4

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with VSR Optics

SPA-OC192POS-VSR

3.3

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with LR Optics

SPA-OC192POS-LR

3.2

Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port Adapter with XFP Optics

SPA-OC192POS-XFP

3.2

2-Port OC-48/STM16 POS/RPR Shared Port Adapters

SPA-2XOC48POS/RPR

3.3

1-Port Channelized OC-12/DS0 Shared Port Adapters

SPA-1XCHOC12/DS0

3.5

1-Port Channelized STM-1/OC-3 to DS0 Shared Port Adapter

SPA-1XCHSTM1/OC3

3.5

1-Port OC-48c/STM-16 POS/RPR Shared Port Adapter

SPA-1XOC48POS/RPR

3.5

2-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-2XOC12-POS

3.5

4-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-4XOC12-POS

3.5

4-Port OC-3c/STM-1 POS Shared Port Adapter

SPA-4XOC3-POS-V2

3.5

8-Port OC-12c/STM-4 POS Shared Port Adapter

SPA-8XOC12-POS

3.5

8-Port OC-3c/STM-1 POS Shared Port Adapter

SPA-8XOC3-POS

3.5

Cisco 8-Port Channelized T1/E1 Shared Port Adapter

SPA-8XCHT1/E1

3.6

Cisco 1-Port Channelized OC-48/DS3 Optical Packet Processor Shared Port Adapter

SPA-1XCHOC48/DS3

3.6

1-Port Clear Channel OC-3 ATM SPA

SPA-1XOC3-ATM-V2

3.7

3-Port Clear Channel OC-3 ATM SPA

SPA-3XOC3-ATM-V2

3.7

1-Port Clear Channel OC-12 ATM SPA

SPA-1XOC12-ATM-V2

3.7

2-Port Channelized T3/E3 ATM CEoP SPA

SPA-2CHT3-CE-ATM

3.7

24-Port Channelized T1/E1 ATM CEoP SPA

SPA-24CHT1-CE-ATM

4.0.1

Ethernet Interface Modules and SPAs

Cisco XR 12000 Series 4xGE with SFP optics

4GE-SFP-LC

3.2

Cisco 5-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-5X1GE-V2

3.4

Cisco 8-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-8X1GE-V2

3.4

Cisco 8-Port 10BASE-T/100BASE-TX Fast Ethernet Shared Port Adapter, Version 2

SPA-8X1FE-TX-V2

3.4

Cisco 8-Port 100BASE-TX Fast Ethernet Shared Port Adapter

SPA-8XFE-TX

3.3

Cisco 10-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-10X1GE-V2

3.4

Cisco 1-Port Ten Gigabit Ethernet Shared Port Adapter, Version 2

SPA-1X10GE-L-V2

3.4

Cisco 5-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-5X1GE

3.2

Cisco 10-Port Gigabit Ethernet Shared Port Adapter with SFP optics

SPA-10X1GE

3.2

Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter with XFP optics

SPA-1XTENGE-XFP

3.2

Cisco 2-Port Gigabit Ethernet Shared Port Adapter, Version 2

SPA-2X1GE-V2

3.4.1

Cisco XR 12000 Series Router T3 and E3 Interface Modules and SPAs

2-port Channelized T3 to DS0 Shared Port Adapter

SPA-2XCT3/DS0

3.3

4-port Channelized T3 to DS0 Shared Port Adapter

SPA-4XCT3/DS0

3.3

2-port Clear Channel T3/E3 Shared Port Adapter

SPA-2XT3/E3

3.3

4-port Clear Channel T3/E3 Shared Port Adapter

SPA-4XT3/E3

3.3

Cisco XR 12000 Series Router Channelized Line Cards

Cisco 1-Port Channelized OC-48 line card

CHOC48/DS3-SR-SC

3.6

Cisco 1-Port Channelized OC-12 line card

CHOC12/DS1-SR-SC

3.8

Cisco 4-Port Channelized OC-12 line card

4CHOC12/DS3-I-SCB

3.8


Software Compatibility

Cisco IOS XR Software Release 4.0.3 is compatible with the following Cisco XR 12000 Series Router systems:

Cisco XR 12004 Router

Cisco XR 12006 Router

Cisco XR 12010 Router

Cisco XR 12016 Router

Cisco  XR 12404 Router

Cisco XR 12406 Router

Cisco XR 12410 Router

Cisco XR 12416 Router

Cisco XR 12810 Router

Cisco XR 12816 Router

The following chassis are supported for an existing installed base:

Cisco 12008 Router

Cisco 12010 Router

Cisco 12012 Router


Note If you are running Cisco IOS XR software on a Cisco XR120xx system with SIP 600, 401, 501, or 601, you must upgrade the fabric. For ROMMON, MBUS, and Fabric Downloader versions, see the "Other Firmware Support" section.


Check the firmware needed by running the show fpd package command in admin mode.

RP/0/8/CPU0:router(admin)#show fpd package 
Mon May  2 00:39:26.726 PST
 
   
=============================== ================================================
                                        Field Programmable Device Package
                                ================================================
                                                                 SW      Min Req   Min Req
Card Type            FPD Description            Type Subtype   Version   SW Ver    HW Vers
==================== ========================== ==== ======= =========== ======== ========
E3-OC12-ATM-4        Mickey FPGA                lc   fpga2   40971.00        0.0       0.0  
                     IOB FPGA                   lc   fpga3   41091.00        0.0       0.0  
                     SAF 0 FPGA                 lc   fpga4   45586.00        0.0       0.0  
                     Mouse FPGA                 lc   fpga1   40977.00        0.0       0.0  
------------------------------------------------------------------------------------------
E3-OC3-ATM-4         Mickey FPGA                lc   fpga2   40971.00        0.0       0.0  
                     IOB FPGA                   lc   fpga3   41091.00        0.0       0.0  
                     SAF 0 FPGA                 lc   fpga4   45586.00        0.0       0.0  
                     Mouse FPGA                 lc   fpga1   40977.00        0.0       0.0  
------------------------------------------------------------------------------------------
12000-ServEngCard    TREX FPGA                  lc   fpga2     162.45        0.0       0.0  
                     TREX FPGA                  lc   fpga1       0.41257     0.0       0.0  
------------------------------------------------------------------------------------------
12000-SIP            HABANERO FPGA              lc   fpga2     240.03        0.0       0.0  
                     JALAPENO FPGA              lc   fpga5     240.13        0.0       0.0  
                     JALAPENO FPGA              lc   fpga5     240.13        0.0       0.0  
                     JALAPENO FPGA              lc   fpga1     255.23        0.0       0.0  
------------------------------------------------------------------------------------------
E3-OC12-CH-1         Shiver FPGA                lc   fpga1       1.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-IPSEC-2G         Sequoia                    spa  fpga2       1.01        0.0       1.0  
                     Lodi                       spa  fpga1       1.22        0.0       1.0  
                     SPA PROM                   spa  rommon      1.01        0.0       1.0  
------------------------------------------------------------------------------------------
SPA-4XT3/E3          SPA E3 Subrate FPGA        spa  fpga2       1.04        0.0       0.0  
                     SPA T3 Subrate FPGA        spa  fpga3       1.04        0.0       0.0  
                     SPA I/O FPGA               spa  fpga1       1.01        0.0       0.0  
                     SPA ROMMON                 spa  rommon      2.12        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-2XT3/E3          SPA E3 Subrate FPGA        spa  fpga2       1.04        0.0       0.0  
                     SPA T3 Subrate FPGA        spa  fpga3       1.04        0.0       0.0  
                     SPA I/O FPGA               spa  fpga1       1.01        0.0       0.0  
                     SPA ROMMON                 spa  rommon      2.12        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-4XCT3/DS0        SPA T3 Subrate FPGA        spa  fpga2       0.11        0.0       
0.100
                     SPA T3 Subrate FPGA        spa  fpga2       1.04        0.0       
0.200
                     SPA I/O FPGA               spa  fpga1       2.08        0.0       
0.100
                     SPA ROMMON                 spa  rommon      2.12        0.0       
0.100
------------------------------------------------------------------------------------------
SPA-2XCT3/DS0        SPA T3 Subrate FPGA        spa  fpga2       0.11        0.0       
0.100
                     SPA T3 Subrate FPGA        spa  fpga2       1.04        0.0       
0.200
                     SPA I/O FPGA               spa  fpga1       2.08        0.0       
0.100
                     SPA ROMMON                 spa  rommon      2.12        0.0       
0.100
------------------------------------------------------------------------------------------
SPA-1XCHSTM1/OC3     SPA T3 Subrate FPGA        spa  fpga2       1.04        0.0       0.0  
                     SPA I/O FPGA               spa  fpga1       1.08        0.0       0.0  
                     SPA ROMMON                 spa  rommon      2.12        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-24CHT1-CE-ATM    SPA T3 Subrate FPGA        spa  fpga2       1.10        0.0       1.0  
                     SPA I/O FPGA               spa  fpga1       2.32        0.0       1.0  
                     SPA ROMMON                 spa  rommon      1.03        0.0       1.0  
------------------------------------------------------------------------------------------
SPA-2CHT3-CE-ATM     SPA T3 Subrate FPGA        spa  fpga2       1.10        0.0       1.0  
                     SPA I/O FPGA               spa  fpga1       2.22        0.0       1.0  
                     SPA ROMMON                 spa  rommon      1.04        0.0       1.0  
------------------------------------------------------------------------------------------
SPA-IPSEC-2G-2       Sequoia                    spa  fpga2       1.01        0.0       1.0  
                     Lodi                       spa  fpga1       1.22        0.0       1.0  
                     SPA PROM                   spa  rommon      1.01        0.0       1.0  
------------------------------------------------------------------------------------------
SPA-1XCHOC48/DS3     SPA I/O FPGA               spa  fpga2       1.00        0.0       
0.49 
                     SPA I/O FPGA               spa  fpga3       1.00        0.0       
0.52 
                     SPA I/O FPGA               spa  fpga1       1.36        0.0       
0.49 
                     SPA ROMMON                 spa  rommon      2.02        0.0       
0.49 
------------------------------------------------------------------------------------------
SPA-1XCHOC12/DS0     SPA I/O FPGA               spa  fpga2       1.00        0.0       
0.49 
                     SPA I/O FPGA               spa  fpga1       1.36        0.0       
0.49 
                     SPA ROMMON                 spa  rommon      2.02        0.0       
0.49 
------------------------------------------------------------------------------------------
SPA-OC192POS         SPA FPGA swv1.2            spa  fpga1       1.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-8XOC12-POS       SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.5  
------------------------------------------------------------------------------------------
SPA-8XCHT1/E1        SPA I/O FPGA               spa  fpga1       2.08        0.0       0.0  
                     SPA ROMMON                 spa  rommon      2.12        0.0       
0.140
------------------------------------------------------------------------------------------
SPA-OC192POS-XFP     SPA FPGA swv1.2            spa  fpga1       1.02        0.0       0.0  
                     SPA FPGA swv1.2 hwv2       spa  fpga1       1.02        0.0       2.0  
------------------------------------------------------------------------------------------
SPA-10X1GE           SPA FPGA swv1.10           spa  fpga1       1.10        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-5X1GE            SPA FPGA swv1.10           spa  fpga1       1.10        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-2XOC48POS/RPR    SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-4XOC48POS/RPR    SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-1XTENGE-XFP      SPA FPGA swv1.9            spa  fpga1       1.09        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-8X1FE            SPA FPGA swv1.1            spa  fpga1       1.01        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-1XOC48POS/RPR    SPA FPGA swv1.2            spa  fpga1       1.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-8XOC3-POS        SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.5  
------------------------------------------------------------------------------------------
SPA-2XOC12-POS       SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.5  
------------------------------------------------------------------------------------------
SPA-4XOC12-POS       SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.5  
------------------------------------------------------------------------------------------
SPA-10X1GE-V2        SPA FPGA swv1.10           spa  fpga1       1.10        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-8X1GE-V2         SPA FPGA swv1.10           spa  fpga1       1.10        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-5X1GE-V2         SPA FPGA swv1.10           spa  fpga1       1.10        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-2X1GE-V2         SPA FPGA swv1.1            spa  fpga1       1.01        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-1X10GE-L-V2      SPA FPGA swv1.11           spa  fpga1       1.11        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-8X1FE-V2         SPA FPGA swv1.1            spa  fpga1       1.01        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-4XOC3-POS-V2     SPA FPGA swv1.0            spa  fpga1       1.00        0.0       0.5  
------------------------------------------------------------------------------------------
SPA-1XOC3-ATM-V2     TATM SPA IOFPGA            spa  fpga1       2.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-2XOC3-ATM-V2     SPA TATM IOFPGA            spa  fpga1       2.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-3XOC3-ATM-V2     SPA TATM IOFPGA            spa  fpga1       2.02        0.0       0.0  
------------------------------------------------------------------------------------------
SPA-1XOC12-ATM-V2    SPA TATM IOFPGA            spa  fpga1       2.02        0.0       0.0  
------------------------------------------------------------------------------------------

Other Firmware Support

The Cisco XR 12000 Series Router supports the following firmware code:

Line cards (LCs)

For Engine 3 line card:

Maintenance Bus (MBUS) Agent Software-RAM version 4.7, ROM version 4.7

ROM Monitor version 19.0

Fabric Downloader - RAM version 10.1 , ROM version 10.1 (The ROM version will be the same as the RAM version if upgraded.)

For Engine 5 line card:

Maintenance Bus (MBUS) Agent Software-RAM version 4.7, ROM version 4.7

ROM Monitor version 19.0

Fabric Downloader - RAM version 6.1, ROM version 6.1 (The ROM version will be the same as the RAM version if upgraded.)

Route processors (RPs)

For Performance Route Processor 2 (PRP-2):

Maintenance Bus (MBUS) Agent Software-RAM version 4.7, ROM version 4.7

ROM Monitor version 1.24

For Performance Route Processor 3 (PRP-3):

Maintenance Bus (MBUS) Agent Software-RAM version 4.7, ROM version 4.7

ROM Monitor version 1.4.0

Minimum Firmware Requirement

After completing an RMA the newly-received linecard may not have appropriate IOS XR firmware installed.

Depending on the type of firmware that needs upgrading the symptoms can vary as follows:

ROMMON needs updating the linecard will not boot up

MBUS needs updating the linecard may fail to boot or keeps reloading

Fabric Loader needs updating the linecard will take long time to boot

FPD needs updating the linecard experiences packet corruption / drop


Note The FPD PIE has to be installed in order to upgrade to the latest FPD image. Refer to the Upgrading FPD on Cisco IOS XR Software chapter of the Cisco IOS XR System Management Command Reference for the Cisco XR 12000 Router online.


RMA Card Firmware Upgrade Procedure:

To upgrade the fabric-downloader, ROMMON, Mbus, and current field-programmable device (FPD) image package on a single RMA linecard or on all modules installed in a router, use the upgrade all command in administration EXEC mode.

upgrade all location {node-id | all} [force]

Where location node-id specifies that all ROM images will be upgraded on the physical location of the line card received through RMA defined by the node-id argument. The node-id argument is entered in the rack/slot/module notation.

The upgrade all location all command upgrades all ROM images on all line cards (LCs) that are installed in the router.

For an RMA linecard firmware upgrade you'll want to use the upgrade all location {node-id} command.

The optional force parameter skips the version check and forces an upgrade.

The list of minimum supported firmware versions is available online in this matrix:

http://www.cisco.com/web/Cisco_IOS_XR_Software/pdf/XR12000SoftwareFirmwareCompatibilityMatrix.pdf

Links to PDF copies of the IOS XR Firmware Upgrade Guides are available online here:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html

Here's the link to the Cisco Systems IOS XR Firmware Upgrade Guide For CRS-1 and XR12000:

http://www.cisco.com/web/Cisco_IOS_XR_Software/pdf/IOSXRFirmwareUpgradeGuide.pdf

Refer to the Hardware Redundancy and Node Administration Commands on Cisco IOS XR Software chapter of the Cisco IOS XR System Management Command Reference for the Cisco XR 12000 Router for the upgrade all command syntax:

http://www.cisco.com/en/US/docs/routers/xr12000/software/xr12k_r40/system_management/command/reference/yr40xr12k_chapter7.html

Requirement of Cisco IOS Image Level and Boot Helper Version for Migration

If you are migrating from Cisco IOS to Cisco IOS XR software on the Cisco XR 12000 Series Router, you must have the following minimum Cisco IOS image level and Boothelper version to support Release 4.0.3:

Cisco IOS image—12.0(32)S

Cisco IOS Boothelper—12.0(32)S0a

If you have an earlier version of this system, you must upgrade to the minimum supported level before performing a migration. Otherwise, your migration fails. For more information, see the Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router document.

Determining Your Software Version

To determine the version of Cisco IOS XR software running on your router, log into the router and enter the show version command:


Step 1 Establish a Telnet session with the router.

Step 2 Enter the show version command from EXEC mode.

RP/0/4/CPU0:router#show version
 
   
Thu May  5 20:23:40.522 PST
 
   
Cisco IOS XR Software, Version 4.0.3[Default]
Copyright (c) 2011 by Cisco Systems, Inc.
 
   
ROM: System Bootstrap, Version 12.00(20071023:043238) [sunnaik-rommon_hang 1.20] RELEASE 
SOFTWARE
Copyright (c) 1994-2007 by cisco Systems,  Inc.
 
   
PE1 uptime is 1 day, 23 hours, 6 minutes
System image file is "disk0:c12k-os-mbi-4.0.3/mbiprp-rp.vm"
 
   
cisco 12416/PRP (7457) processor with 3670016K bytes of memory.
7457 processor at 1266Mhz, Revision 1.1
Cisco 12416 320 Gbps
 
   
2 Cisco 12000 Series Performance Route Processors
1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM)
5 Cisco 12000 Series SPA Interface Processor-601/501/401
2 Cisco 12000 Series - Multi-Service Blade Controllers
1 1 Port ISE Packet Over SONET OC-48c/STM-16 Controller (1 POS)
1 4 Port ISE Packet Over SONET OC-12c/STM-4 Controller (4 POS)
2 Cisco 12000 4 Port Gigabit Ethernet Controllers (8 GigabitEthernet)
1 1 port ISE OC48 channelized STS-12c/STM-4, STS-3c/STM-1 or DS3/E3 Controller (1 SONET)
1 4 port ISE OC12 channelized STS-3c/STM-1 or DS3/E3 Controller (4 SONET)
6 Management Ethernet
22 PLIM_QOS
13 GigabitEthernet/IEEE 802.3 interface(s)
3 MgmtMultilink
30 T3
15 Multilink network interface(s)
392 T1
1604 Serial network interface(s)
23 SONET/SDH
9 Packet over SONET/SDH
7 Asynchronous Transfer Mode
8 FastEthernet
1 Serial network interface(s)
1018k bytes of non-volatile configuration memory.
2053376k bytes of disk0: (Sector size 512 bytes).
62708k bytes of disk1: (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
 
   
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is disk0:
Package active on node 0/0/CPU0:
c12k-fwding, V 4.0.3[00], Cisco Systems, at disk0:c12k-fwding-4.0.3
    Built on Fri Apr 29 04:32:13 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mpls, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mpls-4.0.3
    Built on Fri Apr 29 04:25:07 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mgbl, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mgbl-4.0.3
    Built on Fri Apr 29 04:25:31 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
iosxr-mcast, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mcast-4.0.3
    Built on Fri Apr 29 04:25:15 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-routing, V 4.0.3[00], Cisco Systems, at disk0:iosxr-routing-4.0.3
    Built on Fri Apr 29 04:28:35 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-infra, V 4.0.3[00], Cisco Systems, at disk0:iosxr-infra-4.0.3
    Built on Fri Apr 29 04:25:50 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-fwding, V 4.0.3[00], Cisco Systems, at disk0:iosxr-fwding-4.0.3
    Built on Fri Apr 29 04:27:18 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-diags, V 4.0.3[00], Cisco Systems, at disk0:iosxr-diags-4.0.3
    Built on Fri Apr 29 04:28:46 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-fpd-supp, V 4.0.3[00], Cisco Systems, at disk0:c12k-fpd-supp-4.0.3
    Built on Fri Apr 29 05:03:43 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-diags, V 4.0.3[00], Cisco Systems, at disk0:c12k-diags-4.0.3
 Built on Fri Apr 29 04:47:58 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-mgbl-supp, V 4.0.3[00], Cisco Systems, at disk0:c12k-mgbl-supp-4.0.3
    Built on Fri Apr 29 04:25:36 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-mcast-supp, V 4.0.3[00], Cisco Systems, at disk0:c12k-mcast-supp-4.0.3
    Built on Fri Apr 29 04:25:26 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-base, V 4.0.3[00], Cisco Systems, at disk0:c12k-base-4.0.3
    Built on Fri Apr 29 04:32:01 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-os-mbi, V 4.0.3[00], Cisco Systems, at disk0:c12k-os-mbi-4.0.3
    Built on Fri Apr 29 04:31:53 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
Boot device on node 0/1/CPU0 is mem:
Package active on node 0/1/CPU0:
c12k-fwding, V 4.0.3[00], Cisco Systems, at disk0:c12k-fwding-4.0.3
    Built on Fri Apr 29 04:32:13 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mpls, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mpls-4.0.3
    Built on Fri Apr 29 04:25:07 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mcast, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mcast-4.0.3
    Built on Fri Apr 29 04:25:15 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-routing, V 4.0.3[00], Cisco Systems, at disk0:iosxr-routing-4.0.3
iosxr-routing, V 4.0.3[00], Cisco Systems, at disk0:iosxr-routing-4.0.3
    Built on Fri Apr 29 04:28:35 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-infra, V 4.0.3[00], Cisco Systems, at disk0:iosxr-infra-4.0.3
    Built on Fri Apr 29 04:25:50 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-fwding, V 4.0.3[00], Cisco Systems, at disk0:iosxr-fwding-4.0.3
    Built on Fri Apr 29 04:27:18 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-diags, V 4.0.3[00], Cisco Systems, at disk0:iosxr-diags-4.0.3
    Built on Fri Apr 29 04:28:46 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-fpd-supp, V 4.0.3[00], Cisco Systems, at disk0:c12k-fpd-supp-4.0.3
    Built on Fri Apr 29 05:03:43 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-diags, V 4.0.3[00], Cisco Systems, at disk0:c12k-diags-4.0.3
    Built on Fri Apr 29 04:47:58 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
c12k-mcast-supp, V 4.0.3[00], Cisco Systems, at disk0:c12k-mcast-supp-4.0.3
    Built on Fri Apr 29 04:25:26 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-base, V 4.0.3[00], Cisco Systems, at disk0:c12k-base-4.0.3
    Built on Fri Apr 29 04:32:01 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
c12k-os-mbi, V 4.0.3[00], Cisco Systems, at disk0:c12k-os-mbi-4.0.3
    Built on Fri Apr 29 04:31:53 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
Boot device on node 0/2/CPU0 is mem:
Package active on node 0/2/CPU0:
c12k-fwding, V 4.0.3[00], Cisco Systems, at disk0:c12k-fwding-4.0.3
    Built on Fri Apr 29 04:32:13 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mpls, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mpls-4.0.3
    Built on Fri Apr 29 04:25:07 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-mcast, V 4.0.3[00], Cisco Systems, at disk0:iosxr-mcast-4.0.3
    Built on Fri Apr 29 04:25:15 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   
iosxr-routing, V 4.0.3[00], Cisco Systems, at disk0:iosxr-routing-4.0.3
    Built on Fri Apr 29 04:28:35 PST 2011
    By sjc-lds-834 in /auto/srcarchive5/production/4.0.3/c12k/workspace for pie
 
   

New Features in Cisco IOS XR Software Release 4.0.3

The following sections contain information on new features and enhancements in Cisco IOS XR Software Release 4.0.3:

New Software Feature on the Cisco XR 12000 Series Router

New Hardware Features on the Cisco XR 12000 Series Router


Note Cisco Session Border Controller (SBC) is not supported on any platform in Cisco IOS XR Software Release 4.0.3. Cisco IOS XR Software Release 3.7 is the last release that supports SBC.


New Software Feature on the Cisco XR 12000 Series Router

Cisco IOS XR Software Release 4.0.3 adds support for Traffic Engineering over ATM on the Cisco XR 12000 Series Router platform. This feature is supported on the ATM subinterfaces of the following line cards and SPAs:

Engine 5 Line Cards

1-Port Clear Channel OC-3 ATM SPA

3-Port Clear Channel OC-3 ATM SPA

1-Port Clear Channel OC-12 ATM SPA

2-Port Channelized T3/E3 ATM CEoP SPA

24-Port Channelized T1/E1 ATM CEoP SPA


Note T3/E3 and T1/E1 alarms are not supported for FRR on channelized SPAs. Switchover to backup tunnels cannot be achieved within 50 ms.

BFD is not supported for this feature.

For more information about MPLS-TE, refer to the Implementing MPLS Traffic Engineering section of the Cisco IOS XR MPLS Configuration Guide for the Cisco XR 12000 Series Router, Release 4.0.

New Hardware Features on the Cisco XR 12000 Series Router

No new hardware was introduced on the Cisco XR 12000 Series Router in Cisco IOS XR Software Release 4.0.3.

For detailed information on the shared port adapters (SPAs) and SPA interface processors (SIPs), see the following documents:

Cisco XR 12000 Series Router SIP and SPA Hardware Installation Guide

Cisco Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series Router, Release 4.0


Note Contact gsr-pm@cisco.com for hardware availability.


Important Notes

Default timestamp setting—The timestamp prompt that precedes console output is enabled by default in Cisco IOS XR Release 3.8. To disable the timestamp prompt, use the no service timestamp command. For more information, refer to the Cisco IOS XR System Management Command Reference for the Cisco XR 12000 Series Router.

From Cisco IOS XR Software Release 3.6.0, WRED statements are collapsed in that if different random-detect statements using the same match types (EXP, DSCP, Prec, and so forth) are entered with identical minimum and maximum threshold values, a single configuration line is shown in the output of show running config. This reduces the length of the configuration but creates a problem with backward compatibility with previous releases. In such a situation, on rollback, the QoS policy is rejected and must be manually entered again.

Configuration prior to Cisco IOS XR Software Release 3.6.0:

Policy-map wred_example
   Class class-default
       random-detect exp 0 384 packets 484 packets
       random-detect exp 1 384 packets 484 packets
       random-detect exp 2 384 packets 484 packets
       random-detect exp 3 484 packets 584 packets
       random-detect exp 4 484 packets 584 packets
       random-detect discard-class 0 384 packets 484 packets
      random-detect discard-class 1 384 packets 484 packets
      random-detect discard-class 2 484 packets 584 packets
      bandwidth remaining percent 20
 
   

Cisco IOS XR Software Release 3.6.0 and later releases:

policy-map wred_example
 class class-default
  random-detect exp 0,1,2 384 packets 484 packets
  random-detect exp 3,4 484 packets 584 packets
  random-detect discard-class 0,1 384 packets 484 packets
  random-detect discard-class 2 484 packets 584 packets
  bandwidth remaining percent 20
 !
 end-policy-map
!
end 
 
   

In Cisco IOS XR Software Release 3.6.0 and later releases, the implicitly assigned QoS class class-default must have at least 1 percent bandwidth made available to it. This can be done either by assigning at least 1 percent explicitly (bandwidth remaining percent 1) or by ensuring that the total bandwidth assigned to all other classes in the policy is a maximum of 99 percent, leaving 1 percent available for the class-default. A QoS policy that does not have any bandwidth for class-default is rejected when upgrading to Cisco IOS XR Software Release 3.6.0 or later releases.

Country-specific laws, regulations, and licences—In certain countries, use of these products may be prohibited and subject to laws, regulations, or licenses, including requirements applicable to the use of the products under telecommunications and other laws and regulations; customers must comply with all such applicable laws in the countries in which they intend to use the products.

Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router—When migrating a Cisco XR 12000 Series Router from Cisco IOS to Cisco IOS XR software, follow the instructions provided in Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router.

Card, fan controller, and RP removal—For all card removal and replacement (including fabric cards, line cards, fan controller, and RP) follow the instructions provided by Cisco to avoid impact to traffic. See the Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router for procedures.

Exceeding Cisco testing—If you intend to test beyond the combined maximum configuration tested and published by Cisco, contact your Cisco Technical Support representative to discuss how to engineer a large-scale configuration maximum for your purpose.

More power required for Cisco SIP line cards (SIP-401/501/600/601) on the Cisco XR 12000 Series Router—These line cards draw more power than previous generation line cards. Depending on the exact configuration of power entry modules (PEMs) and other cards in the chassis, there may not be enough power available when inserting a new card or removing a PEM. Before you insert a new card or remove a PEM, run the following command in admin mode:

RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router# show environment power-supply table
48V       Current
R/S/I     Module      (V)           (A)
0/24/*    PEM1         54             4
          PEM2         53             4
0/25/*    PEM1         54             4
          PEM2         53             4
 
   
Total Power Supplies:                  3200W
    Redundant Power Supplies:              1600W
    Worst Case Power Used:                  621W
    Current Power Used:                     428W
    Current Redundant Power Available:     1172W
    Current Total Power Available:         2772W
    Worst Case Redundant Power Available:   979W
    Worst Case Total Power Available:      2579W
 
   
PID                  Description                                        Watts
---                  -----------                                        -----
GRP-B                Route Processor                                       38
PRP-1                Cisco 12000 Series Performance Route Processor        60
LC-4OC-3-POS-SM      4 Port Packet Over SONET OC-3c/STM-1                  80
4OC3X/POS-MM-MJ-B    4 port ISE OC3                                        90
 
   
 
   

If you plan to insert a new card, locate the entry for the card to be inserted and note the power consumed by it. If this power is less than the figure given in Worst Case Redundant Power Available (the figure is displayed in the show environment power-supply table command output), the card can be safely inserted. As long as the Worst Case Redundant Power Available is not zero, a PEM can be powered down for replacement without impact.


Note No alerts are issued if more cards are inserted than the PEMs can support. It is your responsibility to determine your power budget for the chassis before making any changes to it. Exceeding the power budget may result in the PEM being overloaded and cards powering down due to insufficient power being provided.


Per-interface Internet Control Message Protocol (ICMP) disable feature is not supported on the Cisco XR 12000 Series Router.

Online Diagnostics is not supported on the Cisco XR 12000 Series Router—If you execute the diagnostic command, an error appears stating that there is no online diagnostics process running on the router.

The rp mgmtethernet forwarding command is not supported on the Cisco XR 12000 Series Router.

Enabling the Lawful Interface feature triggers the L2-PRECAM-2-HW_RESOURCE_FAILURE message on Engine-3 linecards. This error reflects that your configuration has used up all available look-up registers (LUREGs).

There is no direct workaround for this issue as its a hardware limitation. Only way to recover from this issue is to reduce feature scale. You need to identify the features which use LUREG at PreCAM1 and remove one or more of the features depending on LUREG requirements of the feature being added.

mpls traffic engineering igp-intact command—This command must be used only when policy based tunnel selection is configured for all tunnels originating on the device.

Disable/Enable RSVP Message Checksum Starting with Cisco IOS XR Software Release 4.0.2, RSVP will, by default, compute and set the checksum field in all outgoing RSVP messages. Also, RSVP will verify the checksum field on all RSVP messages received to insure RSVP message integrity.

A CLI is provided to override this Cisco IOS XR Software Release 4.0.2 default behavior and go back to pre Cisco IOS XR Software Release 4.0.2 behavior such that RSVP neither computes/sets the RSVP checksum on outgoing RSVP messages, nor verifies the checksum on received RSVP messages. The command to execute to revert to the pre-Cisco IOS XR Software Release 4.0.2 behavior is:

Router(config)#rsvp signalling checksum disable
 
   

Note When the rsvp signalling checksum disable command is configured, RSVP sets a zero checksum in all outgoing RSVP messages, and ignores the checksum field on all received RSVP incoming messages.


For Cisco IOS XR software Release 4.0.0 and above the hw-module location <LOC> reload warm command has been disabled. This means that the warm reload feature has been disabled.

Minimum Flash Disk Requirements When Upgrading to Release 4.0.3

Cisco IOS XR Software Release 4.0.3 requires a 2-GB Flash Disk as a minimum. If your Cisco XR 12000 Series Router currently uses a 1-GB Flash Disk, you must upgrade it to 2-GB before upgrading to Cisco IOS XR Software Release 4.0.3. The PCMCIA 1-GB Flash Disk was the default size for the Cisco XR 12000 Series Router running Cisco IOS XR Software Release 3.6 and earlier.

In Cisco IOS XR Software Release 3.6 and later releases, disk partitioning is supported. Partitioning of a 2-GB disk is possible but not required. Partitioning of a 4-GB disk is required.

A 4-GB Flash Disk can be installed instead of the 2-GB for greater disk storage.

To upgrade from a 1-GB flash disk to a 2-GB or greater flash disk, refer to the Flash Disk Upgrade Tasks link on the following Cisco XR 12000 Series Router Installation and Upgrade URL:

http://www.cisco.com/en/US/products/ps6342/prod_installation_guides_list.html

Caveats

Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity-1 caveats are the most serious caveats; severity-2 caveats are less serious.

This section contains caveats that are generic to the Cisco IOS XR Release 4.0.3 software and those specific to the Cisco XR 12000 Series Router.

Cisco IOS XR Caveats

The following open caveats apply to Cisco IOS XR Software Release 4.0.2 and are not platform specific:

CSCtg40080

Basic Description:

Show mrib route does not show proper "Flag" output for ExtranetV6

Symptom:

Flag field is incorrect in "show mrib route".

Conditions:

When you have IPv6 MVPN enabled.

Workaround:

There is no work around. It is a show command issue.

Further Problem Description:

None.

CSCti48713

Basic Description:

SONET_SDH XML does not bind to correct path for history stats

Symptom:

'PM get path data failed : Invalid argument ' message will be displayed on the console

Conditions:

This symptom is observed when querying the SONET_SDH XML schema.

Workaround:

None.

Recovery:

None.

CSCtj04006

Basic Description:

Bundle Member MAC address should not be changed.

Symptom:

Connectivity Fault Management (CFM) symptoms: CFM peers detect a new peer maintenance endpoint (MEP) with a different MAC address when a member interface is added/removed to a bundle. The old peer using the previous MAC address remains in the database for a period of time before timing out (100 minutes by default).

Cisco Discovery Protocol (CDP) symptoms: If CDP is running on a physical interface that is added or removed from a Bundle-Ether interface, then a peer device reports two CDP neighbors on the same interface for a short period of time until the old entry times out (normally around three minutes).

Conditions:

This issue occurs when running CDP or CFM on a physical interface that is added to or removed from a Bundle-Ether interface.

Workaround:

No workaround is required for CDP. No workaround is available for CFM.

Recovery:

The stale CDP neighbor entry automatically timeouts after less than five minutes and is removed from the CDP neighbor database. This is accompanied by a syslog message like the following example:

cdp[120]: %L2-CDP-6-DELETED_NEIGHBOR : CDP Neighbour foobar on interface 
GigabitEthernet0/1/0/1 has been deleted, remote interface GigabitEthernet0/1/0/2
 
   

The stale CFM entry normally timeouts after about 100 minutes. The CLI command clear ethernet cfm peer meps can also be used to clear the CFM MEP table.


Note This command causes all MEPs (and associated statistics) to be removed until they are re-learned.


Further Problem Description:

This problem is caused because CDP and CFM are using the interface MAC address to identify the peer. When a physical interface is added to a bundle, the MAC address of the physical interface is changed to that of the bundle interface. When a physical interface is removed from a bundle, then the MAC address is reverted back to the BIA MAC address associated with the physical interface.

CSCtj45064

Basic Description:

Slow CLI response during multiple VTY connections.

Symptom:

In Cisco IOS XR software if the telnet or ssh access frequency is very high, the CLI response performance may decrease significantly. The CPU load increases to more than 90% with the top consumer processes of sysdb_svr_local, sysdb_shared_nc, and sysdb_mc. Eventually telnet and ssh access is not possible any more.

Conditions:

This issue occurs with fast consecutive and lasting telnet or ssh login attempts and multiple logins per minute over a long period of time.

Workaround:

Do not use more than three telnet or ssh login attempts per minute continuously over a lasting period of time.

Recovery:

Reduce the frequency of telnet or ssh logins.

CSCtj54889

Basic Description:

"snmpd[1101]: t11 Failed process trap" flooding the console.

Symptom:

"snmpd[1101]: t11 Failed process trap" messages.

snmpd is consuming high memory and CPU with a sustained high rate of traps. See "show snmp" and "show snmp traps" to find the trap rate and per-trap type counts.

Conditions:

This was seen with "logging trap debug" and "snmp-server traps syslog" configured while a high rate debugs are enabled. This is likely with the above configuration when enabling of "debug snmp trap" as it creates a feedback loop resulting in exponential growth in the rate of syslog traps.

Workaround:

Change any "logging trap debug" configuration to have syslogs of higher severity generated as traps, for example 'logging trap informational' or 'logging trap warning'. It is not recommended to use the configuration 'logging trap debug' as that causes EVERY syslog, including debugs, to be generated as SNMP traps via the CISCO-SYSLOG-MIB. This causes a trap storm.

Recovery:

Disable any debugs that are causing high rate of traps.

Restart the snmpd process by issuing process restart snmpd.'

Change the SNMP trap send throttle, snmp-server trap throttle-time <>, configuration to the minimum of 10 ms: snmp-server trap throttle-time 10

Disable any high rate traps by issuing no snmp-server traps <>.

Remove all snmp-server host configuration until the condition clears.

CSCtk53821

Basic Description:

BGP IAS functionality now requires explicit next-hop-self config.

Symptom:

BGP IAS functionality has changed since Cisco IOS XR Release 3.9.x.

Conditions:

End-to-end connectivity for IAS failed due to the removal of implicit next-hop-self configuration.

Workaround:

Explicitly configure next-hop-self.

CSCtk58144

Basic Description:

IPv6 BGP session flapping due to RX path issue.

Symptom:

Few IPv6 BGP sessions configured with <= (15/45) timer might flap during RP FO when configured with NSR.

Conditions:

This issue might occur if the following conditions are met:

1. NSR configured for BGP

2. IPv6 BGP session configured with aggressive timer

3. RP FO

Workaround:

No workaround required. Those sessions come up.

Recovery:

Recovery occurs automatically.

CSCtk60283

Basic Description:

cefcModuleOperStatus showing wrong value for SPA-5X1GE in Cisco XR 12000 Series Router XR Release 4.0.0.

Symptom:

On a Cisco router running IOS-XR the value of mib cefcModuleOperStatus changes to 5 during line card reload. A value of 5 is wrong. It should be 2. If a LC with a modular PLIM (SIP) is reloaded, the cefcModuleOperStatus MIB value for the SPAs remains 2. This complies to status "OK" and the card down alarm/ link down service alarms are not generated for the SPAs on the management station.

Conditions:

The problem is only seen during reload of line card.

Workaround:

No workaround is available.

Recovery:

It is a transient issue and recovers automatically when the line card reload is completed.

CSCtl86733

Basic Description:

ARP is not resolved due to ARP not process FIB API return correctly.

Symptom:

ARP entries are not always getting resolved on the second link of parallel links when using proxy ARP, potentially leading to traffic loss.

Conditions:

This issue occurs in Cisco IOS XR releases between 4.0.1 and 4.0.3 using static directed routes and proxy ARP to resolve ARP entries on the second link of parallel links.

Workaround:

None.

Recovery:

None.

CSCtn55374

Basic Description:

Not able to unconfigure LPTS configs.

Symptom:

In Cisco IOS-XR release, de-configuring a location-specific lpts pifib hardware policer fails. Committing the "no" form of the user mode config command, lpts pifib hardware police location <loc> flow <flow type> rate, fails.

The user may observe the following on the failure.

RP/0/RP0/CPU0:my-router(config)#no lpts pifib hardware police location 0/1/CPU0
RP/0/RP0/CPU0:my-router(config)#commit
% Failed to commit one or more configuration items during a pseudo-atomic 
operation. All changes made have been reverted. Please issue 'show 
configuration failed' from this session to view the errors
RP/0/RP0/CPU0:my-router(config)#show config failed errors
!! SEMANTIC ERRORS: This configuration was rejected by 
!! the system due to semantic errors. The individual 
!! errors with each failed configuration command can be 
!! found below.
lpts pifib hardware police location 0/1/CPU0
 no flow bgp default rate 30000
!!% 'sysdb' detected the 'warning' condition 'An invalid argument was passed 
to a SysDB function (maybe a NULL pointer?)'
!
end
 
   

Conditions:

1. De-configure the location specific "lpts pifib hardware police:"

no lpts pifib hardware police location <loc> flow <flow type> rate

2. Issue the "commit replace" command after configuring location specific "lpts pifib hardware police flow rate".

   (config)#lpts pifib hardware police location <loc> flow <flow type> rate <value>
   (config)#commit
   (config)#commit replace
 
   

De-configuring a global "lpts pifib hardware police flow" does not lead to a failure.

The problem is not present in Cisco IOS-XR releases prior to Cisco IOS XR Release 4.0.2.

Workaround:

Not available.

Recovery:

Manually configure the location specific "lpts pifib hardware police flow rate" to its default. The default policer rate can be obtained with the following CLI command:

show lpts pifib hardware police location R/S/CPU0

CSCtn77057

Basic Description:

Dumper not honoring "exception choice" config during process crash.

Symptom:

In Cisco IOS XR the core file of a process crash is not stored in the directory specified in the "exception choice" configuration.

Conditions:

A user configured "exception choice" like the following example to store core files in the non-default directory on harddisk in IOS-XR:

exception choice 1 compress on filepath harddisk:/foobar
 
   

The core file of a process crash might be written to harddisk:/dumper instead to harddisk:/foobar. The problem is not present in IOS-XR releases prior to Cisco IOS XR Release 4.0.2.

Workaround:

Use the default configuration for writing core files.

Recovery:

The core file is not getting lost after a process crash. It is written to the default directory "dumper" on harddisk.

CSCtn82051

Basic Description:

Fabric plane mcast down after rack reload on Cisco CRS Multishelf.

Symptom:

On a Cisco CRS Multishelf system, the "Oper State" of a fabric plane might be "MCAST_DOWN" after a Line Card Chassis (LCC) reload.

Conditions:

An LCC is reloaded on a CRS Multishelf system. The problem is not consistently reproducible.

Workaround:

None available.

Recovery:

Shut/no shut down the affected fabric plane in admin config mode.

See the following example:

(admin-config)#controllers fabric plane 2 shutdown
(admin-config)#commit
(admin-config)#no controllers fabric plane 2 shutdown
(admin-config)#commit 
 
   

CSCtn94341

Basic Description:

Harddisk Disk Mirroring failed after rack OIR.

Symptom:

On a Cisco CRS-1 or Cisco CRS-3, harddisk mirroring may fail sync with resource busy error after RP reload.

Conditions:

1. Harddisk mirroring is enabled in admin config mode with the command: mirror boot-harddisk

2. No local disk mirroring is configured in the user config mode.

3. A node that has harddisk mirroring enabled is reloaded.

The problem also applies to Cisco IOS XR Release 4.0.1.

Workaround:

None available.

Recovery:

Disable harddisk mirroring in admin config mode.

CSCtn79219

Basic Description:

System running into low memory conditions.

Symptom:

Install activate/deactivate fails with wdsysmon messages on memory shortage.

Conditions:

This issue occurs when the system has many active pies/SMUs, and the system overall is slow on free memory.

Workaround:

Free up system memory by disabling or removing the feature or configuration such as BGP, etc.

Recovery:

Install should fail before PONR, and no manual recovery is needed.

CSCto21373

Basic Description:

S16: mibd_interfaces crash while polling cIpMRouteNextHopTabl.e

Symptom:

In Cisco IOS-XR a crash of process mibd_interface might be observed when the mroute mib is polled.

Conditions:

Multicast is configured. The OID cIpMRouteNextHopTable of mroute mib is polled.

Workaround:

Not available.

Recovery:

The process is restarted automatically.

CSCto23734

Basic Description:

GSP crashed when demote/promote message is in a node out-of-order queue.

Symptom:

GSP process crashes. The crash is accompanied by the following syslog message:

LC/0/1/CPU0:Mar 24 10:26:25.012 PST: gsp[186]: %OS-DISTRIB_LIB-3-GSP_TRACE_BACK : 
gs_mem_release_internal : first attempt to free non pool memory 0x501ffa20 : 
pkg/bin/gsp : (PID=151620) : -Traceback= 4c87a8e8 40014f58 4002ce38 4003b2a8 4003b9e0 
4c2b23c4 
 
   

Conditions:

GSP control messages arrived at one node out of order. This could happen because of the GSP control traffic burst originating from multiple nodes in the system. This condition might occur during router boot up or simultaneous process restart.

Workaround:

Not available.

Recovery:

The GSP process is restarted automatically.

CSCto33286

Basic Description:

Stale entries seen in show pim ipv4 rpf output even after commit replace.

Symptom:

In Cisco IOS-XR, stale entries are seen in the output of the CLI command, show pim ipv4 rpf'.

Conditions:

This issue occurs under the following conditions:

One or more RP addresses are learned through Auto-RP.

The VRF's multicast configuration is removed.

Workaround:

Not applicable.

Recovery:

Restart the PIM process.

CSCto34421

Basic Description:

EDM request Timeouts from online_diag_lc for Cisco CRS-3 LCs in steady state.

Symptom:

In Cisco IOS-XR, SYSDB-SYSDB-6-TIMEOUT_EDM syslog messages might be displayed steadily.

Conditions:

A syslog message like the following example might be displayed steadily:

RP/0/RP0/CPU0:Mar 29 10:20:05.152 : sysdb_svr_admin[346]: %SYSDB-SYSDB-6-TIMEOUT_EDM : 
EDM request for 'admin/oper/fabric/rack/2/lport/s1tx/' from 'online_diag_lc' (jid 227, 
node 2/3/CPU0). No response from 'fsdb_server' (jid 211, node 2/RP1/CPU0) within the 
timeout period (100 seconds).

It indicates that certain EDM requests are rejected by the sysdb. The reason is that the sysdb is not able to allocate memory for replies because of memory fragmentation. The probability of hitting this problem is low.

Workaround:

Not available.

Recovery:

Restart the sysdb_svr_admin process: process restart sysdb_svr_admin

CSCti50227

Basic Description:

Not able to modify RPL and delete prefix-set in a single commit.

Symptom:

When a policy that is attached directly or indirectly to an attach point needs to be modified, a single commit operation cannot be performed when:

Removing a set or policy referred by another policy that is attached to any attach point directly or indirectly.

Modifying the policy to remove the reference to the same set or policy that is getting removed.

Workaround:

The commit must be performed in two steps:

1. Modify the policy to remove the reference to the policy or set and then commit.

2. Remove the policy or set and commit.

Caveats Specific to the Cisco XR 12000 Series Router

The following open caveats are specific to the Cisco XR 12000 Series Router:

CSCtl85691

Basic Description:

E3 ATM: atm interface stays down after config restore

Symptom:

On Cisco XR12K an Engine3 ATM interface remains down after config has been restored

Conditions:

The ATM interfaces of an Engine 3 ATM LC are shut down and the config is restored, few ATM interfaces might remain down.

Workaround:

no shut the ATM interfaces before the config is restored.

Recovery:

Perform shut/no shut on the affected ATM main interface.

CSCtf48225

Basic Description:

XR fdiags TFIA To FFIA Fabric Pkt Test fails on 12404E chassis

Symptom:

XR fdiags TFIA To FFIA Fabric Pkt Test fails on 12404E chassis

Conditions:

No service impact.

Workaround:

None.

CSCth63918

Basic Description:

SPA crashing when both OAM and normal traffic sent over cell packing.

Symptom:

When cell packing is enabled on the ceop ATM subinterface and both normal as well as OAM traffic is sent, the SPA crashes with following errors:

RP/0/1/CPU0:TB2PE2#LC/0/6/CPU0:Dec 18 06:07:00.373 : g_spa_0[162]: 
%L2-SPA_PLIM_SB-3-SPA_FW_ERR : SPA-2CHT3-CE-ATM[0] (CEMA_INT-2-FATAL_INTERRUPT: Fatal 
Winpath Packet Bus Error interrupt: Bus Error: 8-byte read from 0x00000000 generated 
by WMM TRS: 3 pc:0x011e data: r108 address: r57) 
LC/0/6/CPU0:Dec 18 06:07:00.415 : g_spa_0[162]: %L2-SPA_PLIM_SB-3-SW_ERROR : 
SPA-2CHT3-CE-ATM[0]: Resetting the SPA due to a SPA fatal error   : pkg/bin/g_spa_0 : 
(PID=163939) :  -Traceback= 79c7d3ec 79b80f98 79ad52f4 7824b074 7824bdf4 78249e78 
79ad2a88 782cf31c
LC/0/6/CPU0:Dec 18 06:07:02.722 : g_spa_0[162]: %L2-CEMA-4-GEN_ERR : CEMA Internal 
Error: spa_cema_atm_get_ima_info: invalid atm_port info in CEMA Intfc for ifh: 
0x7005100  : pkg/bin/g_spa_0 : (PID=163939) :  -Traceback= 79cb8920 79cc1e8c 78039c24 
7804c93c 7805d37c 7806d25c 780721f8 7824dbd4 7824e6a4 78249e9c 78054078 782cf31c
LC/0/6/CPU0:Dec 18 06:07:02.724 : g_spa_0[162]: %L2-GATM-2-ERR : 
gatm_mainif_get_stg_state - 523: Could not find aggregation status forifhandle 

Conditions:

1. OAM Termination config is missing.

2. Cell packing is enabled.

3. Both normal traffic and OAM traffic are sent.

Workaround:

Use OAM config based on OAM traffic it can process.

CSCti23140

Basic Description:

VPLS multicasting is not happening if IPHC configured on core-facing LC.

Symptom:

VPLS multicast does not function appropriately.

Conditions:

This is observed on a Cisco XR 12000 Series Router with IPHC configured on the same line card slot on which a VPLS core facing interface is present.

Workaround:

None. Do not configure IPHC on the same slot with a core facing SPA.

CSCtj47132

Basic Description:

set/match mpls exp not working on L2qos on CEOP with PBTS.

Symptom:

If PBTS is enabled on the core facing interface and there is an input service policy on the edge-facing interface to set the mpls exp value, then the exp does not get set.

Conditions:

The conditions under which this issue occurs are as follows:

1. PBTS has to be enabled in the core

2. There should be an input service policy on the edge-facing interface to set the mpls exp value.

Workaround:

None.

CSCtk31849

Basic Description:

Enabling LFI on Multilink IPV6 traffic stops flowing and ping fails.

Symptom:

IPV6 traffic drops and ping stops working.

Conditions:

This condition was observed on CHOC12 SPA while enabling and disabling Interleave on Multilink interface with a T1 member interface.

Workaround:

Shut and no shut the interface.

Recovery:

Reload the SPA.

Upgrading Cisco IOS XR Software

Cisco IOS XR software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).

Software packages are installed from package installation envelope (PIE) files that contain one or more software components.

The following URL contains links to information about how to upgrade Cisco IOS XR software:

http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html

Troubleshooting

For information on troubleshooting Cisco IOS XR software, refer to the Cisco IOS XR Troubleshooting Guide for the Cisco XR 12000 Series Router and the Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router.

Related Documentation

The most current Cisco XR 12000 Series Router hardware documentation is located at the following URL:

http://www.cisco.com/en/US/products/ps6342/prod_installation_guides_list.html

The Cisco IOS XR software documentation set includes the Cisco IOS XR software configuration guides and command references, as well as a getting started guide.

The most current Cisco XR 12000 Series Router software documentation is located at the following URL:

http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.

Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.

This document is to be used in conjunction with the documents listed in the "Related Documentation" section.