This section lists the new hardware and software features supported by Cisco IOS Release 15.2M&T and contains the following subsections:
Note
A cumulative list of all new and existing features supported in this release, including platform and software image support, can be found in Cisco Feature Navigator at http://www.cisco.com/go/cfn.
There are no new hardware features supported in Cisco IOS Release 15.2(4)M7.
There are no new software features supported in Cisco IOS Release 15.2(4)M7.
There are no new hardware features supported in Cisco IOS Release 15.2(4)M6.
There are no new software features supported in Cisco IOS Release 15.2(4)M6.
There are no new hardware features supported in Cisco IOS Release 15.2(4)M5.
There are no new software features supported in Cisco IOS Release 15.2(4)M5.
There are no new hardware features supported in Cisco IOS Release 15.2(4)M4.
There are no new software features supported in Cisco IOS Release 15.2(4)M4.
This section describes new and changed features in Cisco IOS Release 15.2(4)M3. Some features may be new to Cisco IOS Release 15.2(4)M3 but were released in earlier Cisco IOS software releases. Some features may have been released in earlier Cisco IOS software releases and have been changed in Cisco IOS Release 15.2(4)M3. To determine if a feature is new or changed, see the feature information table at the end of the feature module for that feature. Links to feature modules are included. If a feature does not have a link to a feature module, that feature is documented only in the release notes, and information about whether the feature is new or changed will be available in the feature description provided.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/products/ps11746/prod_release_notes_list.html
This section describes new and changed features in Cisco IOS Release 15.2(4)M2. Some features may be new to Cisco IOS Release 15.2(4)M2 but were released in earlier Cisco IOS software releases. Some features may have been released in earlier Cisco IOS software releases and have been changed in Cisco IOS Release 15.2(4)M2. To determine if a feature is new or changed, see the feature information table at the end of the feature module for that feature. Links to feature modules are included. If a feature does not have a link to a feature module, that feature is documented only in the release notes, and information about whether the feature is new or changed will be available in the feature description provided.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/routers/access/vg350/hardware/installation/guide/vg350hig
This section describes new and changed features in Cisco IOS Release 15.2(4)M2. Some features may be new to Cisco IOS Release 15.2(4)M2 but were released in earlier Cisco IOS software releases. Some features may have been released in earlier Cisco IOS software releases and have been changed in Cisco IOS Release 15.2(4)M2. To determine if a feature is new or changed, see the feature information table at the end of the feature module for that feature. Links to feature modules are included. If a feature does not have a link to a feature module, that feature is documented only in the release notes, and information about whether the feature is new or changed will be available in the feature description provided.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/routers/access/vg350/software/configuration/guide/vg350scg
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/fnetflow/configuration/15-2mt/fnf-fnf-mqc.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/media_monitoring/configuration/15-2mt/mm-pasv-mon.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/avc/configuration/15-mt/avc-15-mt-book.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/configuration/15-2mt/nbar2-custom-protocl.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/configuration/15-2mt/NBAR_Protocol_Pack.html
This section describes new and changed features in Cisco IOS Release 15.2(4)M. Some features may be new to Cisco IOS Release 15.2(4)M but were released in earlier Cisco IOS software releases. Some features may have been released in earlier Cisco IOS software releases and have been changed in Cisco IOS Release 15.2(4)M. To determine if a feature is new or changed, see the feature information table at the end of the feature module for that feature. Links to feature modules are included. If a feature does not have a link to a feature module, that feature is documented only in the release notes, and information about whether the feature is new or changed will be available in the feature description provided.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/routers/access/vg350/hardware/installation/guide/vg350hig
For detailed information about this feature, see the following documents:
Cisco 819 Hardware Installation Guide:
http://www.cisco.com/en/US/docs/routers/access/800/819/hardware/install/guide/819hwinst.html
Cisco 819 Software Configuration Guide:
http://www.cisco.com/en/US/docs/routers/access/800/819/software/configuration/Guide/819_SCG.html
Cisco 819 4G LTE Integrated Services Routers Release Notes:
http://www.cisco.com/en/US/docs/routers/access/800/819/release/notes/RN_819.html
4G LTE EHWIC Hardware Installation Guide:
http://www.cisco.com/en/US/docs/routers/access/interfaces/ic/hardware/installation/guide/EHWIC-4G-LTEHW.html
4G LTE EHWIC Software Configuration Guide:
http://www.cisco.com/en/US/docs/routers/access/interfaces/software/feature/guide/EHWIC-4G-LTESW.html
http://www.cisco.com/en/US/docs/routers/access/interfaces/Release/Notes/RN_MM4G3GWAN.pdf
For detailed information about this feature, see the following documents:
http://www.cisco.com/en/US/docs/routers/access/800/819/hardware/install/guide/819hwinst.html
http://www.cisco.com/en/US/docs/routers/access/800/819/software/configuration/Guide/819_SCG.html
This section describes new and changed features in Cisco IOS Release 15.2(4)M. Some features may be new to Cisco IOS Release 15.2(4)M but were released in earlier Cisco IOS software releases. Some features may have been released in earlier Cisco IOS software releases and have been changed in Cisco IOS Release 15.2(4)M. To determine if a feature is new or changed, see the feature information table at the end of the feature module for that feature. Links to feature modules are included. If a feature does not have a link to a feature module, that feature is documented only in the release notes, and information about whether the feature is new or changed will be available in the feature description provided.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_eigrp/configuration/15-2mt/ire-bfd-ipv6.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/configuration/15-2mt/irg-grace-shut.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mob_ntwks/configuration/15-2mt/imo-ip-multiplex.html
For detailed information about this feature, see the following documents:
http://www.cisco.com/en/US/docs/voice_ip_comm/cusrst/admin/sccp_sip_srst/configuration/guide/SCCP_and_SIP_SRST_Admin_Guide.html
http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/admin/configuration/guide/cmeadm.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_eigrp/configuration/15-2mt/ire-en-rou-tags.html
The GET VPN Support with Suite B feature adds support of the Suite B set of ciphers to Cisco Group Encrypted Transport (GET) VPN.
Suite B is a set of cryptographic algorithms that includes AES as well as algorithms for hashing, digital signatures, and key exchange. Suite B for IPsec VPNs is a standard and has been defined in RFC 4869. Suite B provides a comprehensive security enhancement for Cisco IPsec VPNs, and it enables additional security for large-scale deployments. Suite B is the recommended solution for organizations requiring advanced encryption security for the wide-area network (WAN) between remote sites.
The GET VPN Support with Suite B feature introduces or modifies the following commands: client rekey hash, group size, identifier, rekey sig-hash algorithm, and show crypto gdoi.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-cfg-clb-supp.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipsla/configuration/15-2mt/sla_mcast_suppt.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_isis/configuration/15-2mt/ip6-route-isis-adm-tag.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_isis/configuration/15-2mt/ip6-route-isis-adv-pass-onl.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mdata/configuration/15-2mt/mdata-nbar-intgrtn.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/voice/dialpeer/configuration/15-2mt/vd-dp-overview.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/bbdsl/command/bba-m1.html#GUID-CC326925-AD9D-4EE9-8A2A-2C4688B96DCF
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/bsm/configuration/15-2mt/bsm-ntp4-mib.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_ospf/configuration/15-2mt/iro-ospfv3-mib.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_ospf/command/iro-cr-book.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mob_pmipv6/configuration/15-2mt/imo-pmipv6-mag-support.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/products/ps10977/products_installation_and_configuration_guides_list.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/routers/access/ISRG2/software/feature/guide/RoutedPW.pdf
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_rsvp/configuration/15-2mt/config_rsvp.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/15-2mt/scansafe-web-sec.html
Note
The ISR Web Security with Cisco ScanSafe feature in this IOS release is under controlled availability. If you intend to use this feature please contact your Cisco representative. He or she will provide you the necessary guidance in implementing this feature into your network. For additional information please contact us at ss-isr-connector-sales@cisco.com.
The IPSec algorithms required by Suite B are now supported by the hardware crypto engine on the Cisco Integrated Services Routers Generation 2: 800 Series, 1900 Series, 2901, 2911, 2921, 2935R, 3925E, and 3945E, each of which has embedded hardware-accelerated VPN encryption.
Suite B requirements comprise four user-interface suites of cryptographic algorithms for use with IKE and IPsec, which are described in RFC 6379 and RFC 6380. Each suite consists of an encryption algorithm, a digital signature algorithm, a key agreement algorithm, and a hash or message digest algorithm.
Suite B provides a comprehensive security enhancement for Cisco IPsec VPNs, and it allows additional security for large-scale deployments. Suite B is the recommended solution for organizations requiring advanced encryption security for the wide-area network (WAN) between remote sites.
For detailed information about Cisco IOS IPsec features in 15.2(4)M that support Suite B, see the following documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_pki/configuration/15-2mt/sec-cert-enroll-pki.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-2mt/sec-cfg-vpn-ipsec.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ikevpn/configuration/15-2mt/sec-key-exch-ipsec.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-cfg-ikev2-flex.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_getvpn/configuration/15-2mt/sec-get-vpn-suiteb.html
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp/configuration/15-2mt/iap-tcp.html
The Cisco UCS E-Series Server Modules (E-Series Servers) are the next generation of Cisco UCS Express servers. E-Series Servers are a family of size, weight, and power efficient blade servers that are housed within the Generation 2 Cisco Integrated Services Routers (ISR G2). E-Series Servers provide the following:
The VPN ISM IPv6 Support feature enables IPv6 capability on Reventon so that IPsec IPv6 traffic is offloaded along with IPsec IPv4 traffic to the Integrated Services Module (ISM). Reventon is an ISM that delivers a peak rate of 600 Mbps IPsec encryption and decryption on Integrated Services Routers Generation 2 (ISR G2) devices.
The IPsec packet pool size is currently 256 bytes. However, with a jumbo packet of 9000 bytes and low Maximum Transmission Unit (MTU) on the router, Reventon runs out of packet buffer in IPsec packet pool and crashes.
Note
Note: The VPN ISM IPv6 Support feature does not support high availability (HA) and IPv6 dynamic crypto maps.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp_fhrp/configuration/15-2mt/fhp-vrrp.html
Compact flash cards can help you configure new or replacement routers, and to recover the configuration of a failed router. For example, if the Connected Grid Swap Drive feature is enabled, you can transfer the same system configuration information from one router to another by using a compact flash memory card (or compact flash card) while the routers are operating. This is done by inserting an optional compact flash card in slot CF1 and copying all contents of CF0. After the copy operation is completed, you can remove and insert this compact flash card unit in slot CF0 of either a new router or a replacement router for a failed unit. When the new or replacement router is rebooted, it uses the configuration from the compact flash card as the running and startup configuration. This functionality enables you to quickly configure new or replacement routers with a standard configuration with little or no manual configuration required.
For detailed information about this feature, see the following document:
http://www.cisco.com/en/US/docs/routers/connectedgrid/modules/switch/gsg/intro.html#wp1154774
The following information applies to all releases of Cisco IOS Release 15.2(4)M.
This section describes important issues that you should be aware of for Cisco IOS Release 15.2(4)M and later releases.
In Cisco IOS Release 15.2(4)M, images for all platforms have been deferred because of a severe defect. This defect has been assigned Cisco caveat ID CSCub34396; Headline: traffic flow in dmvpn is flowing unencrypted.
The software solution for these deferred images is Cisco IOS Release 15.2(4)M1.
Note
Failure to upgrade the affected Cisco IOS images may result in network downtime.
The terms and conditions that governed your rights and obligations and those of Cisco with respect to the deferred images will apply to the replacement images.
The ISR Web Security with Cisco ScanSafe feature is under controlled availability in Cisco IOS Release 15.2(4)M and later releases. If you intend to use this feature please contact your Cisco representative. He or she will provide you the necessary guidance in implementing this feature into your network. For additional information please contact us at ss-isr-connector-sales@cisco.com.
Behavior changes describe the minor modifications to the way a device works that are sometimes introduced in a new software release. These changes typically occur during the course of resolving a software defect and are therefore not significant enough to warrant the creation of a stand-alone document. When behavior changes are introduced, existing documentation is updated with the changes described in this section.
The following behavior changes are introduced in Cisco IOS Release 15.2(4)M4:
Old Behavior: The RADIUS server does not have Point-to-Point Tunneling Protocol (PPTP) tunnel-specific information because the tunnel-client endpoint and tunnel-server endpoint attributes are missing in the access-request packets sent to the RADIUS server.
New Behavior: The following commands are introduced to identify the hostname or address of the network access server (NAS) at the initiator and server end of the Point-to-Point Tunneling Protocol (PPTP) tunnel by sending the Tunnel-Client-Endpoint attribute and the Tunnel-Server-Endpoint attribute in access-request packets to the RADIUS server.
–
radius-server attribute 66 include-in-access-req
–
radius-server attribute 67 include-in-access-req
http://www.cisco.com/en/US/docs/ios-xml/ios/security/m1/sec-cr-r1.html#GUID-3020A932-7C95-4231-8B6C-396289F361CC
http://www.cisco.com/en/US/docs/ios-xml/ios/security/m1/sec-cr-r1.html#GUID-4E9E50BE-B625-4B4A-B7CA-DAC0B9DF57A6
Old Behavior: Installing simultaneous QoS policies on both ATM subinterface and ATM PVC, or on different Frame Relay subinterface and Frame Relay DLCI is allowed.
New Behavior: Installing simultaneous QoS policies on both ATM subinterface and ATM PVC, or on different Frame Relay subinterface and Frame Relay DLCI is not allowed.
http://www.cisco.com/en/US/docs/interfaces_modules/shared_port_adapters/configuration/7600series/76cfgsip.html#wp1233460
The following behavior changes are introduced in Cisco IOS Release 15.2(4)M3:
Old Behavior: The RADIUS attribute 8 (Framed-IP-Address) is not included in the accounting start packets in the following two scenarios:
–
The user is a dual-stack (IPv4 or IPv6) subscriber.
–
The IP address is from a local pool and not from the RADIUS server.
New Behavior: The “aaa accounting delay-start extended-time” command is introduced to delay the accounting start records for the configured time (in seconds) after the IPCPv6 address is sent to the RADIUS server. During this configured delay time, the IPCPv4 address is sent and the Framed-IPv4-Address is added to the accounting start record. If the IPCPv4 address is not sent in the configured delay time, the accounting start record is sent without the Framed-IPv4-Address.
http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-a1-cr-book.html
Old Behavior: The NHRP syslog error message does not include the IP address of the node where the error originates, the source NBMA, and the destination address
New Behavior: The NHRP syslog error message includes the IP address of the node where the error originates, the source NBMA, and the destination address.
http://cisco.com/en/US/docs/ios-xml/ios/sec_conn_dmvpn/configuration/15-s/sec-conn-dmvpn-tun-mon.html
Old Behavior: Initial INVITE with 0.0.0.0 is not supported unless ACK contains valid IP address.
New Behavior: This call flow is supported.
http://www.cisco.com/en/US/docs/ios-xml/ios/voice/sip/configuration/15-mt/voi-sip-rfc.html#GUID-B6E5879A-D5DC-4E2C-BC97-AC927985E10E
Old Behavior: IOS devices does not conform to RFC 4303.
New Behavior: IOS devices conforms to RFC 4303 to enable transmitting dummy packets.
http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-a1-cr-book.html
http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-s1-cr-book.html
Old Behavior: IPv6 support is not available for CoPP, resulting in a failure of policing and rate limiting.
New Behavior: IPv6 support is added for legacy CoPP on Cisco Express forwarding interfaces that support aggregate-scope policing and rate limiting.
Old Behavior: The show waas status command displays the status of Wide Area Application Services (WAAS) Express.
New Behavior: The extended keyword is added to the show waas status command. The extended keyword provides complete information for WAAS Express.
http://www.cisco.com/en/US/docs/ios/wan/command/reference/wan_s2.html#wp1101997
The following behavior changes are introduced in Cisco IOS Release 15.2(4)M2:
Old Behavior: Outstanding access transactions are left unprocessed on RADIUS server.
New Behavior: The show aaa servers command output displays the number of access, authorization, and accounting requests and estimated outstanding/throttled access/accounting transactions that are being processed. The clear aaa counters servers all command clears all counters except estimated outstanding/throttled access/accounting transactions. These values will automatically reduce.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-s2.html#GUID-971F25CD-9424-4B5C-8B64-C344CBA0977D
http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-c1.html#GUID-68BC9DC6-282E-4192-A4D1-B9DE80AD26A7
Old Behavior: Only two classless static routes were supported using option 121 on the dhcp client.
New behavior: Up to ten classless static routes are supported using option 121 on dhcp client.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_dhcp/configuration/15-2mt/config-dhcp-client.html
Old Behavior: A default protocol pack was is provided as the base protocol pack version with a Cisco image.
New Behavior: Default protocol packs are no longer supported. The advanced protocol pack is provided as the base protocol pack with a licensed Cisco image on a device. The advanced protocol pack has the complete set of Protocol Description Language files (PDLs) available for a release. The standard protocol pack is provided as the base protocol pack with an unlicensed Cisco image.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/configuration/15-2mt/NBAR_Protocol_Pack.html
Old Behavior: No restriction on the NAME field for loading an Advanced or Standard Protocol Pack.
New Behavior: On an Advanced Protocol Pack, only a Packet Description Language Module (PDLM) with “Advanced Protocol Pack” in the NAME field can be loaded. On a Standard Protocol Pack, only a PDLM with “Standard Protocol Pack” in the NAME field can be loaded.
Additional information: http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/configuration/15-2mt/NBAR_Protocol_Pack.html
Old Behavior: When the neighbor remove-private-as command is configured and a route-map without a continue clause is configured, the processing order is:
1. neighbor remove-private-as processing.
2. set as-path prepend or set as-path prepend last-as.
However, if the route-map contains a continue clause, the processing order is reversed.
New Behavior: When the neighbor remove-private-as command is configured and a route-map is configured (whether it has a continue clause or not), the processing order is always:
1. neighbor remove-private-as processing.
2. set as-path prepend or set as-path prepend last-as.
Old Behavior: Metadata service functionality is not available.
New Behavior: The Cisco SAF Forwarder can send service metadata to its neighbor SAF nodes. Metadata is XML information, and service data is information that a server communicates to a client about itself. The service metadata does not propagate in mixed 15.1(3)S) and 15.2(1)S environments until such time that the version of EIGRP and SAF is upgraded.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/saf/configuration/15-2s/saf-15-2s-book.html
Old Behavior: Earlier, the 7600 platform, on GRE tunnels protected with IPsec and static VTI tunnels, required the configuration of lesser “ip mtu” explicitly on the tunnel interface to prevent fragmentation post encryption.
New Behavior: By default, all overheads including GRE and IPsec are accounted beforehand and the resultant value (i.e. Transport MTU - overhead [GRE+IPsec]) is programmed as ip mtu on these tunnels.
Additional Information: http://www.cisco.com/en/US/docs/interfaces_modules/shared_port_adapters/configuration/7600series/76cfvpn1.html#wp2518134
Old Behavior: The default mode for all transform sets, including the default transform set, is tunnel.
New Behavior: The default mode for the default transform set is transport; the default mode for all other transform sets is tunnel.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2s/sec-cfg-ikev2-flex.html#GUID-F936D366-EEE2-4016-A8CA-DE4EF6C1B205
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-cfg-ikev2-flex.html#GUID-F936D366-EEE2-4016-A8CA-DE4EF6C1B205
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-sy/sec-cfg-ikev2-flex.html#GUID-F936D366-EEE2-4016-A8CA-DE4EF6C1B205
Old Behavior: Cable detection existed on analog FXOLS voice port only.
New Behavior: Cable detection is extended to analog FXSLS, FXSGS, and FXOGS voice ports, and a new CLI cable-detect-poll-timer is introduced to configure the cable polling timer value for background polling processes.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/voice/vcr1/vcr-c1.html
http://www.cisco.com/en/US/docs/ios-xml/ios/voice/vcr4/vcr-s9.html#GUID-DDA37612-EDAE-42A4-B84E-1D1D345183B5
Old Behavior: IKEv2 default max in-neg CAC counter was 1000.
New Behavior: IKEv2 default max in-neg CAC counter has been modified to 40 and is true for all platforms.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-s3.html
Old Behavior: The threshold is missing for logout calls in the queue display. The CLI is hunt-group logout [ DND | HLog ].
New Behavior: The notify keyword and threshold-number argument are added in the hunt-group logout command to enable the indication of the calls in queue for logout agents using the Hlog Programmable Line Key:
hunt-group logout [ DND | HLog | notify | threshold-number ]
Old Behavior: Users cannot configure the commonProfile xml content.
New Behavior: Introduced the following new CLI to set parameters under commonProfile section in IP phone SEP*.cnf.xml configuration files:
service profile [ phonePassword password | callLogBlfEnabled | backgroundImageAccess false ]
Old Behavior: Configuring monitor pcm-trace profile to perform ds0 dumps for analog and BRI voice ports was not possible.
New Behavior: Monitor pcm-trace profile CLI extended to allow dsO dumps to be configured for analog and BRI voice ports.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/monitor_event-trace_through_Q.html
Old Behavior: The webex-data, webex-streaming, webex-video, and webex-voice keywords are available in the match application command.
New Behavior: The webex-data, webex-streaming, webex-video, and webex-voice keywords are not available in the match application command.
Additional Information: http://www.cisco.com/en/US/docs/ios-xml/ios/qos/command/match_access-group_through_mls_ip_pbr.html#GUID-05DC6228-60F5-428A-AEE0-2C4FE9FC848E
Old Behavior: When push button is pressed, configuration and image recovery will take place at WLAN AP running on 2nd core of next generation c8xx platforms.
New Behavior: When push button is pressed, ONLY configuration recovery will take place at WLAN AP running on 2nd core of next generation c8xx platforms.