- New and Changed Information
- New Hardware Features in Cisco IOS XE Release 3.5.2S
- New Software Features in Cisco IOS XE Release 3.5.2S
- Features Supported on the Cisco ASR 903 Series Routers
- Features Supported on the Cisco ASR 1000 Series Routers
- New Hardware Features in Cisco IOS XE Release 3.5.1S
- New Software Features in Cisco IOS XE Release 3.5.1S
- Features Supported on the Cisco ASR 903 Series Routers
- New Hardware Features in Cisco IOS XE Release 3.5.0S
- New Software Features in Cisco IOS XE Release 3.5.0S
- Features Supported on the Cisco ASR 903 Series Router
- 1588-2008 Boundary Clock
- ACL—Access Control List Source and Destination Address Matching
- ACL—DSCP Matching
- ACL—ICMP Code
- ACL—IP Protocol
- Any Transport over MPLS (AToM)—ATM Cell Relay over MPLS: Packed Cell Relay
- Any Transport over MPLS (AToM)—Ethernet over MPLS (EoMPLS)
- BFD—Static Route Support
- BGP Support for BFD
- Bidirectional MPLS-TP LSP
- CFM Extension for 1+1 Hot-Standby Support
- Circuit Emulation over Packet Switched Network
- Cisco ASR 903 MIB Support
- Cisco-BGP-MIBv2
- Class-Based Policing
- Class-Based Weighted Fair Queuing (CBWFQ)
- CSL (Cisco Secure Licensing Support) on the Cisco ASR 903
- Ethernet Connectivity Fault Management (E-CFM)
- Ethernet Operations, Administration, and Maintenance (OAM)
- EVC 2.0—Advanced VLAN Translations and Service Mapping Based on 802.1ah (4500) (Infrastructure)
- Field Programmable Device Upgrade Tool
- Hot Standby Router Protocol (HSRP)
- Inverse Multiplexing over ATM (IMA)
- IP 16-Way Equal-Cost Multipath
- IPv4 Unicast Routing Support
- IPv6 Routing—IS-IS Support for IPv6
- IPv6 Routing—OSPF for IPv6 (OSPFv3)
- IPv6 Routing—Static Routing
- IPv6 Switching—CEF/dCEF Support
- IS-IS Support for BFD over IPv4
- L2VPN—PW Status for Static PWs
- L2VPN Static to Dynamic PW Interconnection and PW Preferred Path for MPLS-TP Tunnels
- Modular QoS CLI (MQC)
- MPLS (Multiprotocol Label Switching)
- MPLS Forwarding Infrastructure Scalability
- MPLS TP—IP-Less Configuration of MPLS TP Tunnels
- MPLS-TP OAM—Continuity Check via BFD
- MPLS-TP OAM—Fault Management
- MPLS-TP OAM—GACH
- MPLS-TP OAM—Ping/Trace
- MPLS-TP Path Protection
- MPLS-TP—PW Redundancy for Static PWs
- MPLS Virtual Private Networks (VPN)
- Multicast Source Discovery Protocol (MSDP)
- Multiprotocol BGP (MP-BGP)—MPLS VPN
- OSPF Support for BFD over IPv4
- PIM Version 2
- Pluggable Optics Support on the Cisco ASR 903
- Punt Policing and Monitoring on the Cisco ASR 903
- QoS EXP Matching
- QoS Packet Marking
- REP—(Resilient Ethernet Protocol)
- SFP-GE-T Support
- Source Specific Multicast (SSM)
- Source Specific Multicast (SSM) Mapping
- SSO—BFD
- Support for IEEE 1588-2008 Precision Clock Synchronization Protocol
- Synchronous Ethernet Support
- T1/E1 Support on ASR900
- Trunk EFP Support
- Virtual Private LAN Services (VPLS)
- VPLS MAC Address Withdrawal
- VPLS over MPLS-TP
- Y.1731 Performance Monitoring
- Features Supported on the Cisco ASR 1000 Series Routers
- 1 Second Accuracy—IPv6 Session Counters and ISGv6 Services
- Alarm-Related Enhancements
- ALG—SCCP v17 Support
- Any Transport over MPLS (AToM)—ATM Cell Relay over MPLS: Packed Cell Relay
- ASR1K FRF.12 Support on MFR Interfaces
- ATM Port Mode Packed Cell Relay over MPLS
- BFD on BDI Interfaces
- BGP—Origin AS Validation
- CAC-Related Enhancements
- Category and Attribute Optional Template Export via FNF
- Cisco-BGP-MIBv2
- DHCPv6—Relay Chaining (for Prefix Delegation) and Route Insertion in FIB
- DT QoS Accounting HA
- E3 Support for SPA-2CHT3-CE-ATM on ASR1K
- Embedded Event Manager (EEM) 4.0
- Enhancement of Out of Order Packet Handing in ZBFW
- ERSPAN Support on WAN Interface
- Extensible Messaging Client Protocol (XMCP) 2.0
- Flexible NetFlow—Ingress VRF Support
- FTP64 NAT ALG Intrabox HA Support
- IGMP Snooping
- IKEv2 Headend Support for Remote Access Clients—Anyconnect, Win7 IPv6, Flexvpn Hardware Client. Multi SA Support for VTI
- Inter-Chassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- IPv6 Client Support on Proxy Mobile IPv6 Mobile Access Gateway
- IPv6 over v4 GRE Tunnel Protection
- ISG Policy HA and Rabapol HA
- ISG—Flow Control: SSO/ISSU
- ISG—IPv6 Support Phase II
- L2TP Attributes Physical Channel ID and Initial Received LCP
- Layer 4 Redirect Logging Enhancement
- Line-Side Support for Cisco Unified Communications Manager
- LISP Virtualization
- LNS Cluster/Dead Cache Optimization
- MediaTrace 1.0
- MPLS Diff-Serv-Aware Traffic Engineering (DS-TE)
- MPLS TE—Autoroute Destinations
- MPLS TE—Autotunnel/Automesh SSO Coexistence
- MPLS TE—DS-TE (RFC-3270)
- MPLS TE—Enhanced Path Protection
- MPLS TE—RSVP Graceful Restart 12.0S-12.2S Interop
- MPLS Traffic Engineering (TE)—Interarea Tunnels
- MPLS Traffic Engineering—Inter-AS TE
- MPLS Traffic Engineering—Shared Risk Link Groups (SRLG)
- MsRPC AIC Support for FW and NAT
- NBAR Classification Enhancements for IOS XE 3.5
- Nested Class-Map Support for ZBFW
- NTPv4 Orphan Mode Support, Range for Trusted Key
- OTV—Overlay Transport Virtualization
- Performance Monitor (Phase 1)
- Performance Monitor (Phase 2)
- PfR SNMP MIB v1.0 (Read-Only)
- PfR Target Discovery v1.0
- PPP—IPv4 Address Conservation in Dual Stack Environments
- PPP over Ethernet Client
- QoS—Tunnel Marking for GRE Tunnels
- RaBaPol Web Traffic L4 Redirect Logging Enhancement
- RADIUS-BASED Lawful Intercept High Availability
- Stateful NAT64—Intra-Chassis Redundancy
- Support match-in-vrf Keyword for ASR1k NAT
- Trustsec SG Firewall Enforcement IPv4
- Virtual Private LAN Services (VPLS)
- VPLS MAC Address Withdrawal
- Deferrals
- Field Notices and Bulletins
- Important Notes About IPSec Support on the Cisco ASR 1000 Series Router
- NAT and Firewall ALG Support on the Cisco ASR 1000 Series Routers
- Important Notes About Cisco IOS XE Release 3.5.0S
- Important Notes About Cisco IOS XE Release 3.4.1S
- BGP Scan Time Range
- Important Notes About Cisco IOS XE Release 3.3.1S
- Important Notes About Cisco IOS XE Release 3.3.0S
- High Availability on SBC
- IPsec Failover
- Important Notes About Cisco IOS XE Release 3.2.1S
- EzVPN Support on Cisco ASR 1000 Series Routers
- Maximum IP MTU for Loopback Interfaces
- Important Notes About Cisco IOS XE Release 3.2.0S
- Cisco ASR 1001-4XT3
- SIP Trunk Over TCP
- TCP Failover in Hardware High-Availability Mode
- Extended ACL as a WCCP Redirect ACL
- Important Notes About Cisco IOS XE Release 3.1.1S
- SIP-40G:SPA-4XT-SERIAL
- Important Notes About Cisco IOS XE Release 3.1.0S
- Important Notes About Cisco IOS XE Release 2.6.0
- Important Notes About Cisco IOS XE Release 2.5.0
- Important Notes About Cisco IOS XE Release 2.3.0
- Important Notes About Cisco IOS XE Release 2.2.2
- Important Notes About Cisco IOS XE Release 2.2.1
- Important Notes About Cisco IOS XE Release 2.1.1
- Important Notes About Cisco IOS XE Release 2.1.0
New Features in and Important Notes About Cisco IOS XE 3.5S Releases
This chapter provides information about the new features introduced in the Cisco IOS XE 3.5S releases. In addition, important notes about these releases are included in this chapter.
Cisco IOS XE 3S releases inherit all Cisco IOS XE Release 2 features that were released prior to the introduction of the Cisco IOS XE 3S releases with few exceptions. For information about inherited features that were introduced in Cisco IOS XE 2 releases, for a list of new and changed features, and for important notes that apply to Cisco IOS XE Release 2, see the "New and Changed Information" section in Cisco IOS XE Release 2 Release Notes.
This chapter contains the following sections:
New and Changed Information
The following sections list the new hardware and software features that are supported by the Cisco ASR 1000 Series Routers for Cisco IOS XE Release 3.5S:
•
New Hardware Features in Cisco IOS XE Release 3.5.2S
•
New Software Features in Cisco IOS XE Release 3.5.2S
–
Features Supported on the Cisco ASR 903 Series Routers
–
Features Supported on the Cisco ASR 1000 Series Routers
•
New Hardware Features in Cisco IOS XE Release 3.5.1S
•
New Software Features in Cisco IOS XE Release 3.5.1S
–
Features Supported on the Cisco ASR 903 Series Routers
•
New Hardware Features in Cisco IOS XE Release 3.5.0S
•
New Software Features in Cisco IOS XE Release 3.5.0S
–
Features Supported on the Cisco ASR 903 Series Router
–
Features Supported on the Cisco ASR 1000 Series Routers
New Hardware Features in Cisco IOS XE Release 3.5.2S
There are no new hardware features introduced in Cisco IOS XE Release 3.5.2S.
New Software Features in Cisco IOS XE Release 3.5.2S
The following are the new software features introduced in Cisco IOS XE Release 3.5.2S.
Features Supported on the Cisco ASR 903 Series Routers
Egress QoS Marking
Platform: Cisco ASR 903
This feature introduces support for QoS marking on egress interfaces. For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Features Supported on the Cisco ASR 1000 Series Routers
IPv6 ACL Extensions for Hop by Hop Filtering
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-acl-ext-hbh-xe.html
New Hardware Features in Cisco IOS XE Release 3.5.1S
There are no new hardware features introduced in Cisco IOS XE Release 3.5.1S.
New Software Features in Cisco IOS XE Release 3.5.1S
The following are the new software features introduced in Cisco IOS XE Release 3.5.1S.
Features Supported on the Cisco ASR 903 Series Routers
MPLS OAM Support for Multisegment Pseudowires (PW)
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/multisegmentpseudowires.html
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_transport_profile.html
MPLS-TP—MS-PW with Static and Dynamic PW Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/multisegmentpseudowires.html
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_transport_profile.html
QoS ACLs for ASR900
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
http://www.cisco.com/en/US/docs/ios-xml/ios/qos/config_library/xe-3s/qos-xe-3s-library.html
REP—Configurable Timers (REP Fast Hellos)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/configuration/xe-3s/lsw-cfg-rep.html
REP-no-edge-neighbor-enhancement
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/configuration/xe-3s/lsw-cfg-rep.html
SSO Support for REP Fast Hello
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/configuration/xe-3s/lsw-cfg-rep.html
New Hardware Features in Cisco IOS XE Release 3.5.0S
There are no new hardware features introduced in Cisco IOS XE Release 3.5.0S.
New Software Features in Cisco IOS XE Release 3.5.0S
The following are the new software features introduced in Cisco IOS XE Release 3.5.0S.
Features Supported on the Cisco ASR 903 Series Router
1588-2008 Boundary Clock
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
ACL—Access Control List Source and Destination Address Matching
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-create-ip-al-filter.html
ACL—DSCP Matching
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-create-ip-apply.html
ACL—ICMP Code
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-create-ip-apply.html
ACL—IP Protocol
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-access-list-ov.html
Any Transport over MPLS (AToM)—ATM Cell Relay over MPLS: Packed Cell Relay
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-any-transport-xe.html
Any Transport over MPLS (AToM)—Ethernet over MPLS (EoMPLS)
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-any-transport-xe.html
http://www.cisco.com/en/US/products/ps11174/products_installation_and_configuration_guides_list.html
BFD—Static Route Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bfd/configuration/xe-3s/irb-bi-fwd-det-xe.html
BGP Support for BFD
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-adv-features.html
Bidirectional MPLS-TP LSP
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
CFM Extension for 1+1 Hot-Standby Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/feature/guides/HSBY.html
http://www.cisco.com/en/US/products/ps11610/products_feature_guides_list.html
Circuit Emulation over Packet Switched Network
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Cisco ASR 903 MIB Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/mib/guide/asr903mib.html
Cisco-BGP-MIBv2
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/routers/asr1000/mib/guide/asr1mib3.html#wp1994054
http://www.cisco.com/en/US/docs/wireless/asr_900/mib/guide/asr903mib.html
Class-Based Policing
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_plcshp/configuration/xe-3s/qos-plcshp-class-plc.html
Class-Based Weighted Fair Queuing (CBWFQ)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_mqc/configuration/xe-3s/qos-apply.html
CSL (Cisco Secure Licensing Support) on the Cisco ASR 903
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/csa/configuration/xe-3s/csa-xe-3s-book.html
http://www.cisco.com/en/US/docs/ios-xml/ios/csa/command/csa-cr-book.html
For a list of supported licenses, see the following document:
http://www.cisco.com/en/US/prod/collateral/routers/ps10912/ps11610/data_sheet_c78-685686.html
Ethernet Connectivity Fault Management (E-CFM)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/cether/configuration/xe-3s/ce-cfm.html
Ethernet Operations, Administration, and Maintenance (OAM)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/cether/configuration/xe-3s/ce-oam.html
EVC 2.0—Advanced VLAN Translations and Service Mapping Based on 802.1ah (4500) (Infrastructure)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/products/ps11610/products_feature_guides_list.html
Field Programmable Device Upgrade Tool
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Hot Standby Router Protocol (HSRP)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/fhp-hsrp.html
Inverse Multiplexing over ATM (IMA)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
IP 16-Way Equal-Cost Multipath
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_pi/command/iri-cr-a1.html
IPv4 Unicast Routing Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_pi/configuration/xe-3s/iri-xe-3s-book.html
IPv6 Routing—IS-IS Support for IPv6
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-is-is.html
IPv6 Routing—OSPF for IPv6 (OSPFv3)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-ospf.html
IPv6 Routing—Static Routing
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-stat-routes.html
IPv6 Switching—CEF/dCEF Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-addrg-bsc-con.html
IS-IS Support for BFD over IPv4
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bfd/configuration/xe-3s/irb-bi-fwd-det-xe.html
L2VPN—PW Status for Static PWs
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-basic-xe-3s-book.html
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
L2VPN Static to Dynamic PW Interconnection and PW Preferred Path for MPLS-TP Tunnels
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
Modular QoS CLI (MQC)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_mqc/configuration/xe-3s/qos-apply.html
MPLS (Multiprotocol Label Switching)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios/ios_xe/mpls/configuration/guide/mp_mpls_cisco_rtrs_xe.html
MPLS Forwarding Infrastructure Scalability
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_lsc_removed.html
MPLS TP—IP-Less Configuration of MPLS TP Tunnels
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP OAM—Continuity Check via BFD
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP OAM—Fault Management
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP OAM—GACH
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP OAM—Ping/Trace
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP Path Protection
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS-TP—PW Redundancy for Static PWs
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_basic/configuration/xe-3s/mp-mpls-tp.html
MPLS Virtual Private Networks (VPN)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l3_vpns/configuration/xe-3s/mp-cfg-layer3-vpn.html
Multicast Source Discovery Protocol (MSDP)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
Multiprotocol BGP (MP-BGP)—MPLS VPN
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l3_vpns/configuration/xe-3s/mp-cfg-layer3-vpn.html
OSPF Support for BFD over IPv4
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bfd/configuration/xe-3s/irb-bi-fwd-det-xe.html
PIM Version 2
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
Pluggable Optics Support on the Cisco ASR 903
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Punt Policing and Monitoring on the Cisco ASR 903
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
QoS EXP Matching
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/partner/docs/wireless/asr_900/software/guide/chassis/QoS.html
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_classn/configuration/xe-3s/qos-classn-mrkg-ntwk-trfc.html http://www.cisco.com/en/US/docs/ios-xml/ios/qos_classn/configuration/xe-3s/qos-classn-ntwk-trfc.html
QoS Packet Marking
Platform: Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/partner/docs/wireless/asr_900/software/guide/chassis/QoS.html
REP—(Resilient Ethernet Protocol)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/partner/docs/ios-xml/ios/lanswitch/configuration/xe-3s/lsw-cfg-rep.html
SFP-GE-T Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Source Specific Multicast (SSM)
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
Source Specific Multicast (SSM) Mapping
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipmulti_igmp/configuration/xe-3s/imc_ssm_map.html
SSO—BFD
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bfd/configuration/xe-3s/irb-bi-fwd-det-xe.html
Support for IEEE 1588-2008 Precision Clock Synchronization Protocol
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Synchronous Ethernet Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
T1/E1 Support on ASR900
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/wireless/asr_900/software/guide/chassis/ASR903-Chassis-SW.html
Trunk EFP Support
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/cether/configuration/xe-3s/ce-trunk-efp.html
Virtual Private LAN Services (VPLS)
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-vpls.html
http://www.cisco.com/en/US/docs/routers/7600/install_config/12.2SR_OSM_config/mpls.html
VPLS MAC Address Withdrawal
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-hvpls-npe-red.html
VPLS over MPLS-TP
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/products/ps11610/products_feature_guides_list.html
Y.1731 Performance Monitoring
Platform: Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/cether/configuration/xe-3s/ce-y1731-perfmon.html
Features Supported on the Cisco ASR 1000 Series Routers
1 Second Accuracy—IPv6 Session Counters and ISGv6 Services
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-accounting.html
Alarm-Related Enhancements
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/sbcu/sbc_ap3.html
ALG—SCCP v17 Support
Platform: Cisco ASR 1000
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/iadnat-applvlgw.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-data-sccp.html
Any Transport over MPLS (AToM)—ATM Cell Relay over MPLS: Packed Cell Relay
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-any-transport-xe.html
ASR1K FRF.12 Support on MFR Interfaces
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/wan_frly/configuration/xe-3s/wan_ml_fr_frf161_xe.html
ATM Port Mode Packed Cell Relay over MPLS
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-any-transport-xe.html
BFD on BDI Interfaces
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bfd/configuration/xe-3s/irb-bfd-bdi.html
BGP—Origin AS Validation
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-origin-as.html
CAC-Related Enhancements
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/sbcu/sbc_pol.html
Category and Attribute Optional Template Export via FNF
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
Cisco-BGP-MIBv2
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/routers/asr1000/mib/guide/asr1mib3.html#wp1994054
http://www.cisco.com/en/US/docs/wireless/asr_900/mib/guide/asr903mib.html
DHCPv6—Relay Chaining (for Prefix Delegation) and Route Insertion in FIB
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-3s-book.html
DT QoS Accounting HA
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_plcshp/configuration/xe-3s/qos-plcshp-pol-actg.html
E3 Support for SPA-2CHT3-CE-ATM on ASR1K
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
Embedded Event Manager (EEM) 4.0
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/eem/configuration/xe-3s/eem-overview.html
Enhancement of Out of Order Packet Handing in ZBFW
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-zone-pol-fw.html
ERSPAN Support on WAN Interface
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/configuration/xe-3s/lnsw-conf-erspan.html
Extensible Messaging Client Protocol (XMCP) 2.0
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/saf/configuration/xe-3s/saf-xe-3s-book.html
Flexible NetFlow—Ingress VRF Support
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/fnetflow/configuration/xe-3s/cust-fnflow-rec-mon-xe.html
FTP64 NAT ALG Intrabox HA Support
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
IGMP Snooping
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipmulti_igmp/configuration/xe-3s/imc_igmp_snoop.html
IKEv2 Headend Support for Remote Access Clients—Anyconnect, Win7 IPv6, Flexvpn Hardware Client. Multi SA Support for VTI
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
Inter-Chassis Asymmetric Routing Support for Zone-Based Firewall and NAT
Platform: Cisco ASR 1000
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/sec-data-asym-route.html
IPv6 Client Support on Proxy Mobile IPv6 Mobile Access Gateway
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
IPv6 over v4 GRE Tunnel Protection
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/xe-3s/ip6-tunnel.html
ISG Policy HA and Rabapol HA
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-radius-pol.html
ISG—Flow Control: SSO/ISSU
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-sso-issu.html
ISG—IPv6 Support Phase II
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-ipv6.html
L2TP Attributes Physical Channel ID and Initial Received LCP
Platform: Cisco ASR 1000
The L2TP Attributes Physical Channel ID and Initial Received feature introduces two new keywords —Physical Channel ID and Initial Received—to the vpdn l2tp attribute command. These keywords enable the sending of attribute-value pairs in session creation packets from the L2TP (Layer 2 Tunneling Protocol) Access Concentrator (LAC) to the L2TP Network Server (LNS). For more information, please refer to the vdpn l2tp attribute command page.
Layer 4 Redirect Logging Enhancement
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-l4r-logging.html
Line-Side Support for Cisco Unified Communications Manager
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/sbcu/sbc_cucm.html
LISP Virtualization
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book.html
LNS Cluster/Dead Cache Optimization
Platform: Cisco ASR 1000
The LNS Cluster/dead cache optimization feature introduces two new states—TESTABLE and TESTING—in the output of the show vpdn dead-cache command. These states indicate when the L2TP (Layer 2 Tunneling Protocol) Network Server (LNS) starts and exits the testing state. For more information, please refer to the show vpdn dead-cache command page.
MediaTrace 1.0
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/media_monitoring/configuration/xe-3s/mm-mediatrace.html
MPLS Diff-Serv-Aware Traffic Engineering (DS-TE)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS TE—Autoroute Destinations
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS TE—Autotunnel/Automesh SSO Coexistence
Platform: Cisco ASR 1000
For detailed information, see the following Cisco documents:
MPLS TE—DS-TE (RFC-3270)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS TE—Enhanced Path Protection
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS TE—RSVP Graceful Restart 12.0S-12.2S Interop
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-te-rsvp-grace-xe.html
MPLS Traffic Engineering (TE)—Interarea Tunnels
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS Traffic Engineering—Inter-AS TE
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MPLS Traffic Engineering—Shared Risk Link Groups (SRLG)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
MsRPC AIC Support for FW and NAT
Platform: Cisco ASR 1000
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/fw-msrpc-supp.html
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/fw-msrpc-supp.html
NBAR Classification Enhancements for IOS XE 3.5
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/configuration/xe-3s/qos-nbar-xe-3s-book.html
Nested Class-Map Support for ZBFW
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-data-nest-cmap.html
NTPv4 Orphan Mode Support, Range for Trusted Key
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/bsm/configuration/15-2s/bsm-time-calendar-set.html
OTV—Overlay Transport Virtualization
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/wan_otv/configuration/xe-3s/wan-otv-xe-3s-book.html
Performance Monitor (Phase 1)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/media_monitoring/configuration/xe-3s/
mm-pasv-mon.html
Performance Monitor (Phase 2)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/media_monitoring/configuration/xe-3s/
mm-pasv-mon.html
PfR SNMP MIB v1.0 (Read-Only)
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/pfr/configuration/xe-3s/pfr-snmp-mibro.html
PfR Target Discovery v1.0
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/pfr/configuration/xe-3s/pfr-target-disc.html
PPP—IPv4 Address Conservation in Dual Stack Environments
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-ipv4-addr-cnsv-xe.html
PPP over Ethernet Client
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-pppoe-client.html
QoS—Tunnel Marking for GRE Tunnels
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
RaBaPol Web Traffic L4 Redirect Logging Enhancement
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/isg/configuration/xe-3s/isg-l4r-logging.html
RADIUS-BASED Lawful Intercept High Availability
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
Stateful NAT64—Intra-Chassis Redundancy
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
Support match-in-vrf Keyword for ASR1k NAT
Platform: Cisco ASR 1000
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/iadnat-match-vrf.html
Trustsec SG Firewall Enforcement IPv4
Platform: Cisco ASR 1000
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_cts/configuration/xe-3s/cts-sxp-ipv4.html
Virtual Private LAN Services (VPLS)
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco documents:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-vpls.html
http://www.cisco.com/en/US/docs/routers/7600/install_config/12.2SR_OSM_config/mpls.html
VPLS MAC Address Withdrawal
Platform: Cisco ASR 1000 and Cisco ASR 903
For detailed information, see the following Cisco document:
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/mp-hvpls-npe-red.html
Important Notes
The following sections contain important notes about Cisco IOS XE 3S Releases running on Cisco ASR 1000 Series Routers.
Deferrals
Cisco IOS software images are subject to deferral. We recommend that you view the deferral notices at the following location to determine whether your software release is affected:
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
Field Notices and Bulletins
•
Field Notices—We recommend that you view the field notices for this release to determine whether your software or hardware platforms are affected. You can find field notices at http://www.cisco.com/en/US/support/tsd_products_field_notice_summary.html.
•
Bulletins—You can find bulletins at http://www.cisco.com/en/US/products/sw/iosswrel/ps5012/prod_literature.html.
Important Notes About IPSec Support on the Cisco ASR 1000 Series Router
This section contains important notes about IPSec support on the Cisco ASR 1000 Series Router:
IPSec CLI Support Notes
This section contains important notes about IPSec CLI support on the Cisco ASR 1000 Series Router.
For information about Cisco IOS IPSec commands, see Cisco IOS Security Command Reference at the following location:
http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_book.html
•
The show crypto engine command, which displays information about the crypto engine, is not currently supported on the Cisco ASR 1000 Series Router. The unsupported show crypto engine subcommands include the following:
–
accelerator (Shows crypto accelerator information.)
–
brief (Shows all crypto engines in the system.)
–
configuration (Shows crypto engine configuration.)
–
connections (Shows connection information.)
–
qos (Shows QoS information.)
•
The Cisco ASR 1000 Series Router does not currently support the display of send and recv error statistics using the show crypto ipsec sa identity command.
•
The Cisco ASR 1000 Series Router does not support the clear and show crypto commands on the standby Route Processor (RP) by design.
•
Counters in the show platform software ipsec fp active flow identifier n command are flagged for reset on read. You can use the show crypto ipsec sa command to obtain integral counters.
•
The show access-list command output does not show a packet count matching the ACL.
•
The Cisco ASR 1000 Series Router displays debugging information about the consumption of IPsec datapath memory; use the show platform hardware qfp act feature ipsec datapath memory command in privileged EXEC or diagnostic mode.
•
The Cisco ASR 1000 Series Router displays debugging information about the crypto engine processor registers; use the show platform software ipsec f0 encryption-processor registers command in privileged EXEC or diagnostic mode.
Crypto Map Support
This section contains important notes about IPSec crypto map support on the Cisco ASR 1000 Series Router:
•
The Cisco ASR 1000 Series Router does not currently support IPSec tunnel configuration for crypto maps with same IP address on both the tunnel interface and the physical interface. Configurations with different IP addresses are supported.
•
A possible Embedded Services Processor (ESP) reload may occur if a large number (such as 2000) of crypto maps are removed simultaneously. When removing a large number of crypto maps, it is recommended you unconfigure 500 crypto maps at a time and wait 25 seconds between operations.
•
The Cisco ASR 1000 Series Router does not support the show access-lists id command under crypto maps.
•
The Cisco ASR 1000 Series Router does not currently support the interface range command when configuring crypto maps.
IPSec Packet Processing
This section contains important notes about IPSec packet processing on the Cisco ASR 1000 Series Router:
•
Reloading an Embedded Services Processor (ESP) on the Cisco ASR 1000 Series Router may cause a few IPSec packets to drop before the initialization completes, but the traffic will resume after a brief interval.
•
The Cisco ASR 1000 Series Router will not discard an incoming IP datagram containing a Payload Length other than 4 in the authentication header (AH). For example, a 96 bit authentication value plus the 3 32-bit word fixed portion for any non-null authentication algorithm will not be discarded.
•
The Cisco ASR 1000 Series Router does not forward incoming authenticated packets with the IP option field set.
GET VPN Support
This section contains important notes about Group Encrypted Transport VPN (GET VPN) support on the Cisco ASR 1000 Series Router:
•
To ensure normal traffic flow for a GET VPN configuration on a Cisco ASR 1000 Series Router, a Time Based Anti Replay (TBAR) window-size of greater than 42 seconds is recommended.
•
The Cisco ASR 1000 Series Router does not currently support the TBAR statistics display in the show crypto gdoi gm replay command.
•
The Cisco ASR 1000 Series Router does not currently support Easy VPN (EzVPN) and GET VPN on the same interface.
•
When a Cisco ASR 1000 Series Router is to apply the same Group Domain of Interpretation (GDOI) crypto maps to two interfaces, you should use local addresses for the crypto maps. Non-local address configuration is not supported.
•
The Cisco ASR 1000 Series Router does not currently support transport mode for TBAR.
•
The Cisco ASR 1000 Series Router only supports the reassembly of post-fragmented GET VPN packets that are destined for the local Cisco ASR 1000 Series Router in the GET VPN network
•
An enhancement is added to enable reassembly of IPsec transit traffic. This enhancement applies only to post-encryption fragmented IPsec packets. When this enhancement is enabled, IPsec will detect transit IPsec traffic and reassemble it before decryption. GET VPN transit IPsec traffic will be reassembled, decrypted, and forwarded to the destination. Non GET VPN transit IPsec traffic will be reassembled but not decrypted (because the Cisco ASR 1000 router is not the IPsec tunnel end point) and then forwarded to the destination.
To enable IPsec reassembly of transit traffic, use the platform ipsec reassembly transit command in global configuration mode. To disable IPsec reassembly of transit traffic, use the no form of this command.
platform ipsec reassembly transit
[no] platform ipsec reassembly transit
IPSec SSO and ISSU Support Notes
•
The Cisco ASR 1000 Series Router supports stateful IPSec sessions on ESP switchover. During ESP switchover, all IPSec sessions will stay up and no user intervention is needed to maintain IPSec sessions.
•
For an ESP reload (no standby ESP), the SA sequence number restarts from 0. The peer router drops packets that do not have the expected sequence number. User may need to explicitly reestablish IPSec sessions to work around this issue for systems that have a single ESP after an ESP reload. User may experience traffic disruption over the IPSec sessions in such cases for the duration of the reload.
•
The Cisco ASR 1000 Series Router currently does not support Stateful Switchover (SSO) IPSec sessions on Route Processors (RPs). The IPSec sessions will go down on initiation of the switchover, but will come back up when the new RP becomes active. No user intervention is needed. User will experience traffic disruption over the IPSec sessions for the duration of the switchover, until the sessions are back up.
•
The Cisco ASR 1000 Series Router currently does not support stateful ISSU for IPSec sessions. Before performing an ISSU, users must explicitly terminate all existing IPSec sessions or tunnels prior to the operation and reestablish them post ISSU. Specifically, users must ensure that there are no half-open or established IPSec tunnels present before performing ISSU. To do this, we recommend user do a interface shutdown in the case of interfaces that may initiate a tunnel setup, such as a routing protocol initiating a tunnel setup, or interfaces that have keepalive enabled or where there is an auto trigger for an IPSec session. Traffic disruption over the IPSec sessions during ISSU is obvious in this case.
Summarizing Caveats
•
ESP—Switchover (with standby ESP):Stateful:IPSec sessions should be up. No user intervention needed.
•
ESP—Reload (no standby ESP):Stateless:IPSec sessions will go down and come back. Usually, no user intervention is needed. However, users may have to explicitly re-establish an IPsec session if antireplay is configured (sequence number checking).
•
RP—Switchover (with standby RP):Stateless:IPSec sessions will go down on RP switchover and the session should re-establish automatically when the new RP gains an active role. No user intervention is needed.
•
ISSU (irrespective of chassis type):Stateless:Users must explicitly terminate all the IPSec sessions by shutting the interfaces, perform ISSU, and then re-establish tunnels by enabling the interfaces. No other intervention is needed.
Miscellaneous IPSec Support Notes
This section contains miscellaneous important notes about IPSec support on the Cisco ASR 1000 Series Router:
•
In the context of an IPSec DVTI connection, the Cisco ASR 1000 Router does not support dynamic download ACL rule (per-user attribute) from the AAA server.
For example, the following configurations are not supported:
cisco-avpair += "ip:inacl#1=permit ip any 2.2.2.0 0.0.0.255"
cisco-avpair += "ip:outacl#1=permit ip 2.2.2.0 0.0.0.255 any"
•
The Cisco ASR 1000 Router does not support the command of "if-state nhrp" in configuring the tunnel.
•
The Cisco ASR 1000 Router Dead Peer Detection behavior is different than the pre-defined behavior (i.e. when there is no traffic to be sent, no DPD is sent, while if any traffic to be sent, DPD is sent). A Cisco ASR 1000 Router DPD is sent out regardless there is outbound traffic needs to be sent out.
•
The Cisco ASR 1000 Router does not support SA Path MTU on data path.
•
The Cisco ASR 1000 Router does not support double ACL in dynamic crypto map.
•
VRF without crypto map configured on a physical interface causes dual esp reload on a Cisco ASR 1000 Router.
•
The command: show crypto ipsec sa identity does not log send and receive error counts.
•
The commands: clear crypto and show crypto on Standby RP are inconsistent with Active RP. At present most of other features disable 'clear commands' from Standby RP, but IPSec still allows to clear sa, session etc. from the standby.
•
The Cisco ASR 1000 Router does not support Cisco AAA av-pair "cisco-avpair += ip:sub-policy-In=policy1".
•
CLI allows both ikev1 and ikev2 profile configured under the same crypto map, even though it is not supported internally on the ASR 1000 Router.
•
For a Cisco ASR 1000 Router, the tunnel protection should be removed first before changing any configuration for tunnel protection.
•
The security association (SA) maximum transmission unit (MTU) calculation is based on the interface MTU instead of the IP MTU.
•
The Cisco ASR 1000 Series Router currently supports a maximum anti-replay window value of 512. If you attempt to configure a value larger than 512, the Cisco ASR 1000 Series Router defaults back to 512 internally (although the display still shows your user-configured value).
•
The Cisco ASR 1000 Series Router does not currently support nested SA transformation such as:
crypto ipsec transform-set transform-1 ah-sha-hmac esp-3des esp-md5-hmac
crypto ipsec transform-set transform-1 ah-md5-hmac esp-3des esp-md5-hmac
•
The Cisco ASR 1000 Series Router does not currently support Cisco IOS Certificate Authority (CA) server features.
•
The Cisco ASR 1000 Series Router does not currently support COMP-LZS configuration.
•
On Cisco ASR 1000 Series Routers, when configuring GRE over IPSec, it is recommended that you use only the tunnel protection mode on the tunnel interface. Using crypto maps on both the tunnel interface and the physical interface to achieve GRE over IPSec is not the supported method of configuration.
•
When using dynamic VTI-based IPSec on a Cisco ASR 1000 Router, if there are multiple remote IPSec endpoints behind the same NAT device, only one of the endpoints has connectivity. In other words, multiple endpoints cannot have connectivity at the same time.
NAT and Firewall ALG Support on the Cisco ASR 1000 Series Routers
NAT and Firewall ALG Support on Cisco ASR 1000 Series Routers matrix summarizes Network Address Translation (NAT) and Firewall Application Layer Gateway (ALG) feature support on Cisco ASR 1000 Series Routers in Cisco IOS XE Release 2.1.0 and later releases. The matrix lists feature support by release. NAT and Firewall ALG support is cumulative; features introduced in earlier releases continue to be supported in later releases. You can find the matrix at the following location:
http://www.cisco.com/en/US/docs/routers/asr1000/technical_references/asr1000alg_support.pdf
Important Notes About Cisco IOS XE Release 3.5.0S
This section describes important notes about Cisco IOS XE Release 3.5.0S and later releases.
Cisco ASR 903 Images
Cisco engineering has removed the following images from Cisco.com:
•
asr903rsp1-universalk9_npe.03.05.00.S.152.S.bin
•
asr903rsp1-universal.03.05.00.S.152-1.S.bin
Please use the following new images from Cisco.com:
•
asr903rsp1-universalk9_npe.03.05.00.S.152.S0a.bin
•
asr903rsp1-universal.03.05.00.S.152-1.S0a.bin
Propagating Traffic Priorities to Higher Levels
Priority propagation ensures that the appropriate priority is maintained for particular traffic classes throughout all levels of the queueing and scheduling hierarchy. When propagating oversubscribed priority traffic to higher levels in the hierarchy, the rate ratios for these traffic classes are relative to the shaping rates for the immediate parent classes of the priority queues(s). This is demonstrated in the example below.
> policy-map Parent
> class class-default
> shape average 100000000
> service-policy Child
>
> policy-map Child
> class class1
> shape average 50000000
> service-policy Grand-child1
> class class2
> shape average 40000000
> service-policy Grand-child2
> class class3
> shape average 30000000
> service-policy Grand-child3
>
> policy-map Grand-child1
> class classA
> priority
> policy-map Grand-child2
> class classB
> priority
> policy-map Grand-child3
> class classC
> priority
In the above example, the "Parent" policy-map is oversubscribed, but when traffic is congested, the rates for the priority traffic in class1, class2, and class3 are only allowed as shown below due to priority propagation.
> class1: 41.7Mbps (=100Mbps/120Mbps * 50Mbps)
> class2: 33.3Mbps (=100Mbps/120Mbps * 40Mbps)
> class3: 25.0Mbps (=100Mbps/120Mbps * 30Mbps)
Important Notes About Cisco IOS XE Release 3.4.1S
This section provides important notes about Cisco IOS XE Release 3.4.1S.
BGP Scan Time Range
The bgp scan-time command has a scanner-interval range of 5-60 seconds. The bgp scan-time command can be configured, even if BGP Next Hop Tracking (NHT) is configured (by the bgp nexthop command).
Important Notes About Cisco IOS XE Release 3.3.1S
This section provides important notes about Cisco IOS XE Release 3.3.1S.
Broadband Encapsulation Autosense Support Notes
This section contains important notes about the support for broadband encapsulation autosense with RBE configuration in Cisco IOS XE Release 3.3.1S:
•
The broadband encapsulation autosense enhancement enables broadband autosense support for PPPoEoA, PPPoA, and RBE.
•
In the Cisco IOS XE releases prior to Release 3.3.1S, aal5autoppp encapsulation was not supported when an RBE was configured. As a result, the combination of aal5autoppp encapsulation with RBE was not supported in the Cisco IOS XE releases prior to Release 3.3.1S.
The broadband encapsulation enhancment in Cisco IOS XE Release 3.3.1S supports the combination
of aal5autoppp encapsulation with RBE-related configurations.
Important Notes About Cisco IOS XE Release 3.3.0S
This section provides important notes about Cisco IOS XE Release 3.3.0S and later releases.
High Availability on SBC
The following is the expected behavior of a session border controller (SBC) on which the High Availability feature is configured:
If switchover occurs while an H.323-H.323 T.38 fax transmission is in progress, the call does not fall back to the voice mode after the completion of the fax transmission. This is because the signaling state is not preserved in the event of a switchover.
IPsec Failover
IPSec failover is a feature that increases the total uptime (or availability) of your IPSec network. Traditionally, this is accomplished by employing a redundant (standby) router in addition to the original (active) router. If the active router becomes unavailable for any reason, the standby router takes over the processing of IKE and IPSec.
IPSec failover falls into two categories: stateless failover and stateful failover. The IPsec on the Cisco ASR 1000 Series Router supports only stateless failover. Stateless failover uses protocols such as the Hot Standby Router Protocol (HSRP) to provide primary to secondary cutover and also allows the active and standby VPN gateways to share a common virtual IP address.
Important Notes About Cisco IOS XE Release 3.2.1S
This section describes important notes about Cisco IOS XE Release 3.2.1S and later releases.
EzVPN Support on Cisco ASR 1000 Series Routers
On a ASR Cisco 1000 Router, when an EzVPN session is ended, the EzVPN server sends out a Stop Accounting message. This message does not contain the Acct-Input-Octets, Acct-Output-Octets, Acct-Input-Packets, and Acct-Output-Packets fields. It might cause a disruption of accounting performed on traffic.
Maximum IP MTU for Loopback Interfaces
For loopback interfaces, the maximum IP MTU is now 4000. This is to match the serial interface limits.
Important Notes About Cisco IOS XE Release 3.2.0S
This section describes important notes about Cisco IOS XE Release 3.2.0S and later releases.
Cisco ASR 1001-4XT3
Cisco ASR1001-4XT3 chassis functionality is similar to the SPA-4XT3/E3 with the exception of E3 circuitry in Cisco IOS XE 3.2.0S Release.
SIP Trunk Over TCP
SIP TCP trunk calls may not activate if more than one complete SIP messages were contained in one TCP segment in Cisco IOS XE 3.2.0S Release.
This symptom occurs upon SIP trunk over TCP scenario. SIP ALG currently processes only one complete SIP message in one TCP segment (one complete or one complete plus one incomplete), refer to CSCti56370.
TCP Failover in Hardware High-Availability Mode
TCP failover is not supported in Hardware High-Availability mode. If the active node fails in Hardware High Availability mode and if the network is restored, it may take 5 to 10 minutes for the standby node to become the active node. This is because of the reboot and the peer negotiation delay. If the network is not restored, only the switched over active peer is available. Failover is not possible in this state.
Extended ACL as a WCCP Redirect ACL
The Cisco ASR 1000 Series Router supports the use of an extended ACL as a WCCP redirect ACL. However, the option to specify a port range is not supported.
Important Notes About Cisco IOS XE Release 3.1.1S
This section describes important notes about Cisco IOS XE Release 3.1.1S and later releases.
SIP-40G:SPA-4XT-SERIAL
Cisco SPA-4XT-SERIAL was not supported in 3.1.0S when plugged into an ASR1000 with SIP-40. This SPA is supported in Release 3.1.1S on SIP-40 linecard.
For more information, see the following documents:
Cisco ASR 1000 Series Aggregation Services Routers SIP and SPA Hardware Installation, see section for SPA-4XT-Serial SPA in Table 1-4 (SIP and SPA Compatibility for Serial SPAs).
Cisco ASR1000 Series Aggregation Services Routers SIP and SPA Software Configuration Guide
Important Notes About Cisco IOS XE Release 3.1.0S
This section describes important notes about Cisco IOS XE Release 3.1.0S and later releases.
Bidirectional Forwarding Detection (BFD)
In Cisco IOS XE Release 3.1.0S, Bidirectional Forwarding Detection (BFD) is no longer supported in IP Base software packages. For BFD support, use the Advanced IP Services or Advanced Enterprise Services packages.
DMVPN Spoke Support
In Cisco IOS XE Release 3.1.0S Cisco ASR 1000 Series Routers do not support the ip nhrp server-only command if they act as DMVPN spokes.
Important Notes About Cisco IOS XE Release 2.6.0
This section describes important notes about Cisco IOS XE Release 2.6.0 and later releases.
Per-User Attribute on PPP Virtual Access
In Cisco IOS XE Release 2.6.0 multiple instances of the per-user attribute `Cisco-Avpair=lcp:interface-config=<cmd>' is not supported.
For example:
Cisco-AVPair = lcp:interface-config=ip vrf forwarding vpngreen
Cisco-AVPair= lcp:interface-config=ip unnumbered loopback2
Should be configured like this in Cisco IOS XE Release 2.6.0:
Cisco-AVPair = lcp:interface-config=ip vrf forwarding vpngreen \nip unnumbered loopback2
"Multiple instances will be supported in Cisco IOS XE Release 2.6.1"
Legacy QoS Command Deprecation: Hidden Commands
To streamline Cisco IOS QoS (quality of service), certain commands are being hidden. Although these commands are available in Cisco IOS XE Release 2.6, the CLI interactive help does not display them. If
you attempt to view a command by entering a question mark at the command line, the command does not appear. However, if you know the command syntax, you can enter it. The system will accept the command and return a message explaining that it will soon be removed. These commands will be completely removed in a future release, which means that you will need to use the appropriate replacement commands.
For more information, see the following document:
VRF-Aware NAT
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.5.0
This section describes important notes about Cisco IOS XE Release 2.5.0 and later releases.
Embedded Packet Capture
The Embedded Packet Capture (EPC) feature is not functional and not supported for the Cisco ASR 1000 Series Routers.
QoS: Policing Support for GRE Tunnels
When queuing feature on the GRE tunnel interface is not supported with crypto configured on the physical interface.
QoS: Support for GRE/sVTI Tunnel
With IOS XE 2.5.0, the Cisco ASR 1000 Router Series supports Quality-of Service (QoS) applied to
•
A GRE or sVTI tunnel with policing and marking only for INGRESS traffic
•
A GRE or sVTI tunnel with 2-level hierarchy allowing queuing on the second level for EGRESS traffic
When there are multiple egress physical interfaces for a tunnel, and the tunnel target physical interface changes as a result of tunnel target destination route change, either manually by user configuration or by routing protocol, IOS will not prevent the tunnel traffic from moving to an alternate egress physical interface. However, in IOS XE 2.5.0, QoS tunnel move feature is not supported. When tunnel traffic moved to an alternate egress physical interface, tunnel QoS policy may enter a suspended state. At this point, the tunnel QoS policy will have to be removed and reapplied to the tunnel interface for it to take effect. In addition, queuing features on the GRE tunnel interface are not supported when IPSec is configured on the physical interface.
VRF-Aware NAT
Integrating NAT with MPLS VPNs
This section provides information about integrating NAT with MPLS VPNs.
Prerequisites for Integrating NAT with MPLS VPNs
Before performing the tasks in this module, you should be familiar with the concepts related to configuring NAT for IP address conservation. All access lists required for use with the tasks in this module should be configured prior to beginning the configuration task. For information about how to configure an access list, see IP Access List Sequence Numbering at the following location:
http://www.cisco.com/en/US/docs/ios/12_2s/feature/guide/fsaclseq.html
Note
If you specify an access list to use with a NAT command, NAT does not support the commonly used permit ip any command in the access list.
Restrictions for Integrating NAT with MPLS VPNs
•
The following functionality is not supported for VRF-Aware NAT:
–
VPN to VPN translations. In other words, VRF cannot be applied on the NAT outside interface.
–
Translation of multicast packets
–
Translations with inside destinations
–
Reversible route maps
–
MIBs
–
MPLS traffic engineering
•
Configuring inside dynamic translations defined with outside interface mappings is not supported.
•
Configuring inside static translations with interface mappings is not supported. The following commands, which do not include VRF, are not supported:
–
ip nat inside source static esp local-ip interface type number
–
ip nat inside source static local-ip global-ip route-map name
–
ip nat inside source static local-ip interface type number
–
ip nat inside source static tcp local-ip local-port interface type number global-port
–
ip nat inside source static udp local-ip local-port interface type number global-port
Dependency of NAT on VFR
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.3.0
This section describes important notes about Cisco IOS XE Release 2.3.0 and later releases.
Any Transport Over MPLS (AToM) Support
The configuration of Any Transport Over MPLS (AToM) on the Cisco ASR 1000 Series Routers in Cisco IOS XE Release 2.3.0 is only supported on a subinterface; AToM cannot be configured on the main interface. In addition, you cannot have any IP configuration on the main interface when you have an AToM configuration on the subinterface. These configuration guidelines are applicable to VC mode, VP mode, and L2VPN PW redundancy.
MPLS TE Support
Cisco ASR 1000 Series Router users considering the implementation of MPLS TE are recommended to consult with their local Cisco technical support representative for Cisco IOS XE implementation details.
VRF-Aware NAT
Dependency of NAT on VFR
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.2.2
This section describes important notes about Cisco IOS XE Release 2.2.2 and later releases.
SSO for L2TP Tunnel Switching Not Supported
If dual route processors (RPs) are used on the Cisco ASR 1000 Series Router in Cisco IOS XE Release 2.2.2 and L2TP Tunnel Switching is configured, then no l2tp sso enable must be configured.
VRF-Aware NAT
Dependency of NAT on VFR
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces and environments in Cisco IOS XE Release 2.2.2. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.2.1
This section describes important notes about Cisco IOS XE Release 2.2.1 and later releases.
100M FX SFP Not Supported on Cisco 2-Port Gigabit Ethernet Shared Port Adapter
The 100M FX SFP is not supported on the Cisco 2-Port Gigabit Ethernet Shared Port Adapter (2x1GE SPA) on the Cisco ASR 1000 Series Routers in Cisco IOS XE Release 2.2.1.
Intelligent Service Gateway (ISG) Features Not Supported
The following Intelligent Service Gateway (ISG) features are not supported on the Cisco ASR 1000 Series Routers in Cisco IOS XE Release 2.2.1:
•
ISG IP subscriber functionality on the following types of access interfaces: Gigabit EtherChannel (GEC) (Port Channel), generic routing encapsulation (GRE), PPP (virtual-template), and Layer 2 Tunneling Protocol (L2TP)
•
ISG prepaid billing
•
ISG IP interface sessions
•
Interface statistics for ISG multiservice interfaces
•
Access lists cannot be configured as match criteria in ISG Layer 4 redirect configuration. As an alternative, Layer 4 redirect should be configured in ISG traffic class services.
•
Stateful Switchover (SSO and in-service software upgrade (ISSU) for ISG IP subscriber sessions or traffic class sessions. Upon switchover, an IP session must be recreated or restarted (for Dynamic Host Configuration Protocol (DHCP) sessions) when the session becomes active again.
•
SSO and ISSU for any features on IP subscriber sessions or traffic class sessions
•
SSO and ISSU for the following features on ISG PPP sessions:
–
Port-Bundle Host Key
–
Layer 4 Redirect
–
Traffic Class
Per-Session Multicast Support
Enhancements to the IP multicast feature provide support for per-session multicast in broadband environments in Cisco IOS XE Release 2.2.1.
VRF-Aware NAT
Dependency of NAT on VFR
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces and environments in Cisco IOS XE Release 2.2.1. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.1.1
This section describes important notes about Cisco IOS XE Release 2.1.1 and later releases.
Startup Configuration File Backup
As a matter of routine maintenance on any Cisco router, users should backup the startup configuration file by copying the startup configuration file from NVRAM onto one of the router's other file systems and, additionally, onto a network server. Backing up the startup configuration file provides an easy method of recovering the startup configuration file in the event the startup configuration file in NVRAM becomes unusable for any reason.
For users using any Cisco ASR 1000 Series Router with a single RP, including any Cisco ASR 1002 or Cisco ASR 1004 Router, backing up the startup configuration file onto another router file system is especially important due to CSCsq70140, which is documented in the Caveats section of these release notes. The workaround for users who run into this caveat is to replace the startup configuration file in NVRAM with a backup copy of the startup configuration file on the router; therefore, customers who have backed up their startup configuration files onto the router will be ready to resolve these caveats if they occur on their Cisco ASR 1000 Series Routers using a single RP.
Example 1: Copying Startup Configuration File to Bootflash
Router# dir bootflash:
Directory of bootflash:/
11 drwx 16384 Dec 4 2007 04:32:46 -08:00 lost+found
86401 drwx 4096 Dec 4 2007 06:06:24 -08:00 .ssh
14401 drwx 4096 Dec 4 2007 06:06:36 -08:00 .rollback_timer
28801 drwx 4096 May 29 2008 16:31:41 -07:00 .prst_sync
43201 drwx 4096 Dec 4 2007 04:34:45 -08:00 .installer
12 -rw- 208904396 May 28 2008 16:17:34 -07:00 asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin
Router# copy nvram:startup-config bootflash:
Destination filename [startup-config]?
3517 bytes copied in 0.647 secs (5436 bytes/sec)
Router# dir bootflash:
Directory of bootflash:/
11 drwx 16384 Dec 4 2007 04:32:46 -08:00 lost+found
86401 drwx 4096 Dec 4 2007 06:06:24 -08:00 .ssh
14401 drwx 4096 Dec 4 2007 06:06:36 -08:00 .rollback_timer
28801 drwx 4096 May 29 2008 16:31:41 -07:00 .prst_sync
43201 drwx 4096 Dec 4 2007 04:34:45 -08:00 .installer
12 -rw- 208904396 May 28 2008 16:17:34 -07:00 asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin
13 -rw- 7516 Jul 2 2008 15:01:39 -07:00 startup-config
Example 2: Copying Startup Configuration File to USB Flash Disk
Router# dir usb0:
Directory of usb0:/
43261 -rwx 208904396 May 27 2008 14:10:20 -07:00 asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin
255497216 bytes total (40190464 bytes free)
Router# copy nvram:startup-config usb0:
Destination filename [startup-config]?
3172 bytes copied in 0.214 secs (14822 bytes/sec)
Router# dir usb0:
Directory of usb0:/
43261 -rwx 208904396 May 27 2008 14:10:20 -07:00 asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin
43262 -rwx 3172 Jul 2 2008 15:40:45 -07:00 startup-config
255497216 bytes total (40186880 bytes free)
Example 3: Copying Startup Configuration File to a TFTP Server
Router# copy bootflash:startup-config tftp:
Address or name of remote host []? 172.17.16.81
Destination filename [pe24_asr-1002-confg]? /auto/tftp-users/user/startup-config
!!
3517 bytes copied in 0.122 secs (28828 bytes/sec)
VRF-Aware NAT
Dependency of NAT on VFR
ASRNAT will not handle fragmented packets unless VFR is configured on all NAT interfaces. VFR will automatically be configured when NAT is configured, but users must "not" manually unconfigure VFR on NAT interfaces as NAT cannot process the fragmented packets and out-of-order fragments correctly.
Important Notes About Cisco IOS XE Release 2.1.0
This section describes important notes about Cisco IOS XE Release 2.1.0 and later releases.
High-Level Feature Sets Not Supported for the Cisco ASR 1000 Series Routers
Table 1 describes some of the high level feature sets that are not supported for the Cisco ASR 1000 Series Routers in Cisco IOS XE Release 2.1.0 and later releases. Use Cisco Feature Navigator to confirm support for a specific feature. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Feature support is subject to change from release to release. Some high-level feature sets that were not supported in the initial Cisco IOS XE Release 2.1.0 are now supported. Table 1 has been updated to indicate when support has been introduced in later releases. For the latest feature information, see the New and Changed Information sections of these release notes and Cisco Feature Navigator.
Feedback