Cisco 8200, 8600, 8700, and 8800 Series Routers
What's New in Cisco IOS XR Release 25.1.1
Cisco IOS XR Release 25.1.1 is a new feature release for Cisco 8000 Series routers.
For more details on the Cisco IOS XR release model and associated support, see Software Lifecycle Support Statement - IOS XR.
Software Features Enhanced and Introduced
To learn about features introduced in other Cisco IOS XR releases, select the release from the Documentation Landing Page.
Feature | Description |
---|---|
BGP |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can enable efficient routing by supporting configuration of up to 256 ECMP next hops for BGP in both IPv4 and IPv6, enhancing bandwidth through multipath load balancing. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100], 8010 [ASIC: A100]); Centralized Systems (8600 [ASIC: Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now enable BGP to process incoming DMZ transitive-bandwidth extended community, allowing bandwidth-aware routing decisions using Unequal Cost Multi-Path (UCMP). The feature allows RPL to manually set the DMZ transitive-bandwidth extended community for BGP neighbors. This extended propagation supports multivendor interoperability, optimizes traffic distribution, prevents link over utilization, and balances load across available paths. Previously, BGP supported only the non-transitive extended community. The feature introduces these changes: CLI: The transitive-bandwidth type is introduced as an extended community in RPL. YANG Data Models:
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now prevent BGP prefixes from defaulting to native IP paths, which could lead to traffic drops due to the lack of BGP routing information on downstream core routers, by enforcing BGP nexthop resolution over MPLS LSPs with RSVP-TE tunnels. The feature gives you precise control over traffic steering by defining how BGP resolves nexthops and enabling route policies that consistently forward prefixes over RSVP-TE tunnels. Previously, in core networks, downstream routers without BGP routes caused traffic to default to native IP paths instead of RSVP-TE LSPs, leading to potential drops. The feature introduces these changes: CLI: The next-hop-type keyword is introduced as a filter type in route-policy . YANG Data Models:
|
|
ECMP out of resource avoidance using ASN-based prefix download delay |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC: Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now ensure minimum packet loss and service disruption during network reconfigurations or migrations by preventing ECMP OOR conditions. The feature allows BGP to delay the download of BGP prefixes into the RIB and FIB until the router learns all paths from a specific ASN. This ASN-based delay dynamically optimizes resource utilization, and actively manages ECMP paths in real-time during network changes. Previously, you could apply a fixed delay to all BGP prefixes using the prefix-ecmp-delay command. The feature introduces these changes: CLI:
YANG Data Models:
(see GitHub, YANG Data Models Navigator) |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You ensure continuous connectivity by enabling non-Long Lived Graceful Restart (LLGR) eBGP neighbors to use LLGR stale routes, allowing LLGR capability to be advertised without configuring a timeout value, and enhancing route management flexibility by advertising stale routes to non-LLGR peers using the NO_EXPORT community. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Modifies the default label allocation from per-prefix to per-VRF, enabling you to enforce per-VRF label allocation for imported VPN routes with the advertise vpn-imported label-mode per-vrf command. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now selectively download BGP prefixes to the Routing Information Base (RIB) and Forwarding Information Base (FIB), preventing traffic drops by ensuring traffic follows default routes when specific destination routes are unavailable. *This feature is supported on Cisco 8712-MOD-M router. |
|
Programmability |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now replace the bi-directional Acctz service with the unidirectional AcctzStream service, where the router continuously sends accounting records to the collector, while the collector initially sends only a timestamp. You configure maximum memory allocation for cached accounting history records, ensuring effective network optimization and resource utilization. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now configure LLDP (Link Layer Discovery Protocol) global parameters without automatically enabling LLDP on all interfaces by default. This feature provides a granular operational control of the LLDP interface-level configurations. By aligning with OpenConfig models, this feature introduces a more efficient operational control where LLDP is enabled on an interface only when both global and interface-level LLDP configurations are enabled. Previously, LLDP was enabled if either configuration was present, potentially leading to inconsistent behavior. The feature introduces these changes: CLI: YANG Data Model:
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now enhance networking device security using the new gNSI service, EnrollZ and AttestZ, which verifies device identity and integrity during boot-up and provides owner-specific certificates. This open-source solution bypasses router vendor certificate authorities, ensuring a user-friendly and secure system where sensitive credentials are accessible only to devices completing the EnrollZ and AttestZ processes. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) The Containerz - gNOI service enables the onboarding and management of third-party applications via gNOI RPCs. Applications can be deployed using Docker images, ensuring easy integration and management. The service offers operations such as starting, stopping, updating containers, and managing docker volumes. This feature simplifies application deployment and management, enhancing operational efficiency. For the specification on gNOI.healthz, see the GitHub repository. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) With gNOI Healthz, you monitor and troubleshoot device health by collecting logs and performing root-cause analysis on detected issues, enabling early identification and resolution of system health problems to reduce downtime and enhance reliability. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now log and monitor AAA accounting of gRPC operations and CLI accounting data using gNSI Acctz, effectively managing the network for improved performance and resource utilization. Additionally, you configure the number of gNSI accounting records that can be streamed. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now enhance network security by enabling TLS 1.3 support for gRPC services, providing stronger protection against vulnerabilities, eliminating outdated ciphers, and ensuring forward secrecy through unique session keys for each network session *This feature is supported on Cisco 8712-MOD-M router. |
|
Interface and Hardware Component |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200]; Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q200]) We've introduced support for Time-to-Live (TTL) uniform mode, which allows copying TTL values from inner to outer headers during encapsulation and from outer to inner headers during decapsulation. This functionality allows the receiving device to accurately interpret the remaining lifespan of a packet. TTL uniform mode is enabled only for the pbr vrf-redirect mode in IP-in-IP tunnels. |
|
Introduced in this release on: Fixed Systems ( 8700 [ASIC: K100]) (select variants only*) You can now mirror multiple traffic flows on Encapsulated Remote SPAN (ERSPAN) by matching Differentiated Service Code Point (DSCP) values of the IP header, using the DSCP value and bitmask configured in Access Control List (ACL) rules. Previously, monitoring was limited to single traffic flows using RFC 4594 defined DSCP values in the GRE tunnel header. This feature expands monitoring capabilities across multiple traffic flows on supported hardware. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems ( 8700 [ASIC: K100]) (select variants only*) You can now set or modify the Differentiated Service Code Point (DSCP) value on the ERSPAN GRE tunnel header, allowing you to control the QoS for ERSPAN GRE tunnel traffic and simplify bandwidth management across next-hop routers for your customers. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Routers now display a snapshot of traffic throughput and rate on all bundle interfaces over the last few seconds, presenting these statistics in a tabular format for easy analysis and quick reference. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) With this release, the router enables mirroring of IPv4 or IPv6 traffic using ERSPAN over GRE IPv6 sessions, allowing traffic monitoring on remote analyzers, expanding capabilities beyond the previous support limited to IPv4 networks. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature helps you monitor traffic flow through any IP network including third-party switches and routers by providing rate limiting of the mirroring traffic. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems ( 8700 [ASIC: K100]) (select variants only*) Encapsulated Remote Switched Port Analyzer (ERSPAN) now supports transporting mirrored traffic through GRE tunnels across multiple VRFs, facilitating network designs with multiple Layer 3 partitions. Previously, ERSPAN was restricted to GRE tunnels within the default VRF only. *This feature is supported on Cisco 8712-MOD-M router. |
|
Extended Support for QDD-400G-ZR-S and QDD-400G-ZRP-S Optical Module |
This release introduces support for the QDD-400G-ZR-S and QDD-400G-ZRP-S optical module on the following line cards -
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100]); Centralized Systems (8600 [ASIC: Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now securely reset your router to its original factory settings for troubleshooting or re-purposing. We have enhanced the existing factory reset functionality to remove data from the entire hard disk of the router, except the disaster recovery partition on the active RP. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now configure the number of fault recovery attempts by a line card, fabric card or a route processor before it permanently shuts down, thus preventing a faulty card from entering into a cycle of automatic recovery *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The number of supported Connectivity Fault Management (CFM) sessions has been increased to 500, enhancing fault detection, network visibility, scalability, and troubleshooting capabilities essential for managing high-performance networks. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now identify and resolve MCE-related issues quickly and easily because Cisco IOS XR Software displays a syslog notification for MCE errors, eliminating the need to manually check for them in the MCE log file. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]). For statistics aggregation, you can now configure a distinct width for the first bin to adjust for large propagation delay. By using this feature, you can avoid wasting several bins that would be empty in some unavoidable situations such as delay due to speed of light limitations. The feature introduces these changes: CLI:
YANG Data Models: New XPaths for
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature now enables you to use SPAN and security ACL together to monitor multiple ERSPAN sessions under the same source interface thus distributing the mirrored traffic over different destination interfaces and allowing selective incoming traffic. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Remote Link State Propagation enables link status communication to remote devices, ensuring network-wide awareness of link state changes. Link Loss Forwarding (LLF) utilizes this feature to propagate link failures to remote endpoints. By enabling remote state propagation and LLF on an interface, you ensure rapid communication of link state changes, facilitating quick failover and traffic rerouting. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The routers can now provide reliable, always-available packet capture for post-event analysis, eliminating the need for prior configuration or user interaction. The enhanced SPAN-to-File feature provides continuous packet capture and debugging capability with always-on functionality that starts automatically upon destination configuration. It prevents data loss during node reloads by periodically writing packet buffer contents to disk, without stopping the capture. A default SPAN-to-File session for forwarding and buffer drops is always active and can be disabled if not needed. The feature also supports packet truncation and sampling in software for software-mirrored packets, independent of NPU capabilities. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now efficiently and securely manage the data and configuration settings on your routers by ensuring complete removal of sensitive data from the routers that are to be decommissioned, or for security purposes. This feature securely erases the solid state drive (SSD) data on a particular card such as a line card or a route processor, or on the entire router and shuts it down. The feature introduces these changes: CLI: YANG Data Model:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature introduces Maintenance End Points (MEP) entities that you can configure in a domain. *This feature is supported on Cisco 8712-MOD-M router. |
|
Integrated Routing and Bridging (IRB) |
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*) Integrated Routing and Bridging (IRB) provides the ability to exchange traffic between bridging services on a router and a routed interface using a Bridge-Group Virtual Interface (BVI). IRB over BVI enables seamless communication between Layer 2 bridging and Layer 3 routing by using BVI as a logical interface. *This feature is supported on:
|
IP Addresses and Services |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now select an IPv6 address from the configured relay source-interface to be used as the source address for forwarding packets to a server. By selecting a fixed source address, the need to frequently update firewall rules when new, lower-value IPv6 addresses are added is minimized. Previously, the router automatically used the lowest numbered IPv6 address configured on that interface as the source address. The feature introduces these changes: CLI:
YANG Data Model: Cisco-IOS-XR-ipv6-new-dhcpv6d-cfg.yang (see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200], Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q200]) This features ensures that source prefixes of the egress hybrid ACLs are now stored in a separate TCAM interface, enabling accurate resource monitoring and tracking. Use the show controllers npu resource egressacltcam location command to view the TCAM usage. In earlier releases, while the destination prefixes of the hybrid ACLs were stored in the ACL TCAM interface, the source prefixes were unreported, making it challenging to monitor their accurate TCAM resource usage. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This release introduces support for more efficient handling of extended network object-groups by expanding source and destination compression results. This is achieved by enabling support for 24 bit bincode sizes for both source and destination prefixes in the ingress object-group ACLs, which accommodates larger and more detailed prefix lists for supporting more complex network object-groups and configurations. Prior to release 25.1.1, this capability was limited to 20 bit compression for both source and destination prefixes, restricting the length and variability of network prefixes that could be managed within ACLs. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: P100], 8700 [ASIC: P100]); Modular Systems (8800 [LC ASIC: P100]) Compression levels for object-group ACLs, also known as hybrid ACLs, can now be applied to egress traffic. This ACL compression optimizes the usage of TCAM space, allowing the router to support additional ACLs or features and ensuring efficient utilization of the limited TCAM resources available. |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*) By utilizing DHCP Relay Agent Option 82 functionality, you can now enhance the network security by ensuring that DHCP allocates network addresses only to trusted sources. This reduces the risk of unauthorized devices gaining network access. You can achieve this by assigning Option 82 circuit ID and Remote ID per Ethernet Flow Points (EFP) or per ingress Layer 2 interface in the DHCP packet. *This feature is supported on:
|
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*) This release introduces the Dynamic Host Configuration Protocol (DHCP) client functionality. DHCP client is crucial for efficiently managing IP address allocation in a network. It enables router interfaces to dynamically obtain server information for DHCPv4 or DHCPv6, and ensures that the configuration responses are sent to the appropriate Layer 2 addresses. This process ensures that each device on the network receives the correct configuration data. *This feature is supported on:
|
|
Extending DHCP Relay agent support |
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*) This release introduces support for DHCP Relay Agent and DHCPv6 Relay Over BVI for IANA Address Allocation to Cisco Silicon One P100 ASIC-based systems. The feature, enabled by default, efficiently allocates IP addresses from a centralized DHCP server to clients across multiple subnets. It ensures that devices can receive IP addresses even when they are not on the same local network as the DHCP server. *The feature is supported on:
|
Enabling HSRP and VRRP over BVI |
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*) You can now enable Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) over BVI on Cisco Silicon One P100 ASIC-based systems. This feature, enabled by default, ensures continuous network availability by automatically switching to a standby router if the active router fails. This minimizes downtime and maintains network reliability. *The feature is supported on:
|
L2VPN |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100])(select variants only*) EVPN Integrated Routing and Bridging (IRB) facilitates efficient Layer 3 communication across subnets, leveraging PE routers for connectivity over MPLS or IP networks. It supports single and multi-homing, processes packets using VRF table lookups, and enables seamless EVPN to IP VPN communication without route stitching or re-origination. A distributed anycast gateway enhances routing by sharing IP/MAC addresses for load balancing and redundancy, ensuring optimal performance and reduced latency. * This feature is supported on:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now use the VLAN Subinterface Encapsulation and Rewrite operations to:
*This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems 8700 [ASIC: K100]), 8010 [ASIC: A100]) Introduced support for the following VLAN tags on line cards and routers with the A100 and K100 based Silicon One ASICs:
Introduced support for BUM traffic in VPLS service load balancing. |
|
MPLS |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) To handle high traffic volume, you can enhance the MPLS over UDP tunnel scale up to 15284 tunnels using the hw-module profile cef mplsoudp scale command. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature allows to prevent the MPLS labelled traffic or IP traffic to destinations associated with a segment routing prefix SID from resolving over the MPLS-TE tunnel thus ensuring optimal hardware resource utilization. This feature enhances the existing configuration that prevents only the MPLS labelled segment routing traffic from steering into the MPLS-TE tunnel. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can enable the router to compute
During the primary LSP path failure, the headend router computes a new dynamic restore primary path by reusing the links from the failed primary LSP path, and during the secondary LSP path or backup path or protecting path failure, the headend router computes a new dynamic restore path by reusing the links from the failed secondary LSP path. CLI: The protected-by keyword is enhanced to include two backup paths in the path-option command. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100])(select variants only*); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100])(select variants only*) You can now enable a centralized Path Computation Element (PCE) server to perform LSP path computations for primary, secondary, and restore paths. The PCE efficiently tracks and manages network resources, handling multiple LSP requests and complex network environments. It optimizes LSP routing by dynamically adapting to network changes, reducing crank-back, and enhancing traffic engineering. *This feature is now supported on:
|
|
Increased link bandwidth capacity for RSVP-TE |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100], 8010 [ASIC: A100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) We have upgraded RSVP-TE to support link bandwidths up to 10 Pbps, essential for integrating high-capacity interfaces. This is made possible by enabling support for 64-bit in addition to the existing 32-bit bandwidths. Previously, RSVP-TE was limited to supporting link bandwidths up to 4.3 Tbps. The feature introduces these changes: CLI: Increase in bandwidth range values for keywords in the bandwidth mam and bandwidth rdm commands:
|
Multicast |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*). This feature is enhanced to support:
*This feature is supported on:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Internet Group Management Protocol (IGMP) is a network protocol that allows devices to join multicast groups in IPv4 networks. IGMP helps routers manage multicast group memberships, ensuring that it sends data only to networks where there are active members, further optimizing network efficiency. *This feature is supported on Cisco 8712-MOD-M router. |
|
LSM mLDP based MVPN bud or tail node enhancements on edge routers |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) With this feature, the BUD node is now supported on these profiles: 0, 1, 3, 4, 6, 7, 8, 11, 14, 21, and 22. *This feature is supported on Cisco 8712-MOD-M router. |
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*). This feature is enhanced to support:
*This feature is supported on:
|
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) (select variants only*). Multicast Integrated Routing and Bridging (IRB) enables the routing of multicast packets into and out of a bridge domain through a Bridge-Group Virtual Interface (BVI). This feature supports:
*This feature is supported on:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Starting with this release, the route statistics counters are programmed on the ingress line card, making traffic measurement more efficient. The stats-ole counter-based implementation is activated when at least one of the Cisco Silicon One Q100 or Q200 ASIC-based systems, along with the Cisco Silicon One P100 ASIC-based systems, is operational on a router. When stats-ole counter-based implementation is active, the show mrib route detail command output shows stats-ole location; otherwise, it shows INVALID. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature allows you to forward the IPv6 multicast packets only to the interested MLD-snooped Access Controllers (AC), whereas in the default case, the bridge floods the IPv6 multicast packets to all AC. Routers use Multicast Listener Discovery (MLD) protocol to discover the devices in a network and create route entries in an IPv6 multicast network. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Protocol Independent Multicast (PIM) is a routing protocol used to route IP multicast traffic efficiently. Using PIM, you can route IP multicast traffic over various underlying unicast routing protocols, such as OSPF, BGP, or RIP. As a result, PIM Is a robust solution for managing multicast traffic in varied and evolving network environments. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) When this feature is enabled, mLDP relies on the Loop-Free Alternative algorithm to calculate the primary and backup, which is also referred as fast re-route path. During the event of a link failure, the router uses this precomputed backup path to send the multicast traffic. The fast switchover helps to reduce multicast traffic loss and the switchover time is less than 50 milliseconds. *This feature is supported on Cisco 8712-MOD-M router. |
|
NetFlow and sFlow |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) sFlow now supports buffer drop and forward-drop streaming, enhancing its capability to capture packets dropped by the Traffic Management (TM) buffer when full. This feature allows streaming of mirrored copies of these packets using SPAN, ensuring effective traffic monitoring even during process restarts or network failovers. Additionally, it mirrors forward-drop packets to capture and analyze packets dropped at router ingress, aiding in understanding blocked traffic types, identifying potential security threats, and optimizing network performance. The feature introduces these changes: CLI:
|
|
IPv4 or IPv6 flows in BGP can now handle next-hop Information Element (IE) across different address families, such as IPv4 and IPv6. This is particularly useful in scenarios where IPv4 and IPv6 networks need to interoperate. These IEs are added to the existing NetFlow or IPFIX template for
These IEs are added to the existing NetFlow or IPFIX template for
These IEs provide a detailed and structured data that is essential for various network operations and analyses. The feature uses the exiting CLI commands. For more information see, IPFIX Enablement for SRv6 and Services over SRv6 Core. |
|
Modular QoS |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100])) Egress class-level traffic shaping for subinterfaces is now supported on the fixed systems using K100 Silicon One ASICs. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now ensure that high-priority traffic is consistently prioritized across multiple sub-interfaces on the same network port, enhancing the performance of critical applications. This is achieved by enabling support for egress queuing policy maps that allow high-priority P1 traffic (on class TC7) to take precedence over non-P1 traffic across sub-interfaces. This feature ensures that critical traffic, such as voice or real-time video, is always given the highest priority, regardless of the sub-interface it is associated with, thereby maintaining optimal network performance and reducing latency for essential services. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Routing |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature which allows rapid pseudowire failure detection minimizes downtime, ensuring service reliability by continuously monitoring end-to-end, maintaining Layer 2 VPN and Ethernet service integrity. *This feature is supported on Cisco 8712-MOD-M router. |
|
BGP 256-way UCMP for enhanced bandwidth and load distribution |
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now configure up to 256 unequal cost multipath (UCMP) next hops for BGP in both IPv4 and IPv6, significantly enhancing the previous limit of 64. This increase allows for improved network bandwidth and more effective load balancing across parallel paths. |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now monitor VXLAN tunnel health and rapidly detect failures, facilitating faster traffic rerouting and enhancing network availability. This feature ensures high availability by providing continuous oversight of VXLAN tunnel integrity, allowing network operators to swiftly address and mitigate potential disruptions, thereby maintaining seamless connectivity and service reliability. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now gracefully shut down IS-IS on an interface or router without abruptly interrupting network operations. This feature simplifies operations by consolidating multiple steps into a single command, ensuring network stability during maintenance or configuration changes. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now accelerate the rate at which Link State Packets (LSPs) are distributed across an IS-IS network. Faster LSP distribution means faster network convergence. This faster convergence ensures that the most accurate topology information is quickly available across all routers on the network, reducing the chances of routing loops or misrouting. *This feature is supported on Cisco 8712-MOD-M router. |
|
Segment Routing |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) SRv6 with BGP supports the coexistence of IP routes with or without SRv6 SID over an SRv6-enabled core network. This support enables integrating SRv6 capabilities into existing network infrastructures without replacing IP routing completely. This feature enables flexibility and scalability, transition to new technologies, and enhanced network efficiency, making it easier to migrate from MPLS to SRV6. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature introduces support for Dual-stack (VPNv4/VPNv6) VRFs. VPNv4/VPNv6 Dual-stack supports both IPv4 (uDT4) and IPv6 (uDT6) based SRv6 L3VPN service on the same interface, sub-interface, or VRF. Dual stacking allows operators to access both IPv4 and IPv6 simultaneously and independent of each other. It avoids the need to translate between two protocol stacks. This results in high processing efficiency and zero information loss. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) Segment Routing Performance Monitoring (SR PM) allows operators to compute near-end and far-end delay metrics, enhancing end-to-end delay visibility and enabling precise monitoring and assessment of network performance. Previously, only near-end delay metrics were measurable, limiting the ability to fully evaluate delays across the entire data path. *This feature is supported on Cisco 8712-MOD-M router. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The enhanced IGP flexible algorithm path computation optimizes routing paths by automatically adjusting to changes in link bandwidth, which is especially beneficial for handling parallel L3 links and dynamic bandwidth variations, such as in L2 link bundles. The algorithm ensures optimal capacity paths by considering the cumulative bandwidth of parallel links and prefers paths with the highest available bandwidth, improving performance for high-bandwidth traffic flows. In addition to traditional metrics like link delay or monetary cost, the algorithm can also optimize paths based on the maximum available bandwidth of links, which can be locally configured or computed from advertised link bandwidth. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature enables migration of existing SRv6 SID format1 to SRv6 Micro-SIDs (f3216) formats. Earlier, only one format was supported at a time, and you had to choose either format1 or Micro-SID format for the deployment of services. Migration from Full-length SIDs to SRv6 Micro-SIDs was not possible. *This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The H.Encap.Red is a headend behavior that encapsulates the original packet into a new IPv6 packet with a Segment Routing Header (SRH). By encapsulating with the SRH, you can control and manage the path the data packets take through a network. *This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature allows you to assign a specific SRv6 locator for a given prefix or a set of prefixes (IPv4/IPv6 GRT, IPv4/IPv6 VPN). The egress PE advertises the prefix with the specified locator. This allows for per-prefix steering into desired transport behaviors, such as Flex Algo. *This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: P100], 8700 [ASIC: P100])(select variants only*); Modular Systems (8800 [LC ASIC: P100]) The process of liveness monitoring in performance measurement can now be offloaded to the router's dedicated hardware, which is the Network Processing Unit (NPU). This feature helps optimize and scale the measurement operation, enabling the operators to meet delay-bound Service Level Agreements (SLAs). * This feature is supported on:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) We have enhanced the SR-TE policy at headend with flexible algorithm that supports additional metric types, user-defined and bandwidth, ensuring consistent path computation across flexible algorithm metric types and constraints, on both intra-IGP and inter-IGP domains. The feature also supports headend computed inter-domain SR policies with Flex Algo constraints and IGP redistribution or leaking. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature extends SRv6 architecture by encoding up to six SRv6 Micro-SID (uSID) instructions in a 128-bit SID address, called a uSID Carrier. It uses existing SRv6 data and control planes without changes, offering low MTU overhead with 18 source-routing waypoints in just 40 bytes of SRH overhead.* This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature provides VPN de-multiplexing-only behaviors (End.DT4/DT6/DT46) at an SRv6 PE node. This allows for a lightweight-PE implementation (no VPN encapsulation) that steers SRv6-encapsulated traffic across an SR-MPLS backbone after performing a VPN lookup. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) With this feature, the egress PE can signal an SRv6 Service SID with the BGP global route. The ingress PE encapsulates the IPv4/IPv6 payload in an outer IPv6 header where the destination address is the SRv6 Service SID provided by the egress PE. BGP messages between PEs carry SRv6 Service SIDs to interconnect PEs. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) With this feature, the egress PE can signal an SRv6 Service SID with the BGP overlay service route. The ingress PE encapsulates the IPv4/IPv6 payload in an outer IPv6 header where the destination address is the SRv6 Service SID provided by the egress PE. BGP messages between PEs carry SRv6 Service SIDs to interconnect PEs and form VPNs. * This feature is supported on Cisco 8712-MOD-M routers. |
|
SRv6 Services: L2 and L3 Services with Remote SIDs from Wide Local ID Block |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature enables an SRv6 headend node to receive and install remote SIDs with Wide (32-bit) functions (Remote W-LIB). The Remote W-LIB is supported for Layer 3 (VPN/BGP global) and Layer 2 EVPN services (ELINE/ELAN). * This feature is supported on Cisco 8712-MOD-M routers. |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now enable the router to record the number of packets and bytes transmitted on a specific egress interface for IPv6 traffic using the SRv6 locator counter. You can use this data to create deterministic data tools to anticipate and plan for future capacity planning solutions. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature supports SRv6 VPN Route-leaking between Global Routing Table (GRT) and Virtual Routing and Forwarding (VRF). This enables Enterprise IPv4 internet connectivity. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The feature introduces support for SRv6 double recursion, where network services such as BGP VPNs (Layer 2 and Layer 3) require multiple resolution layers. Specifically, one routing layer resolves over another before reaching the final destination. Double recursion is achieved by collapsing the underlay, typically involving protocols like IGP or BGP in the packet forwarding chain. This enables three-level load balancing and an even distribution of traffic across multiple layers of the network stack. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) SRv6 services on EVPN E-Line offers a modern approach to simplify and enhance network operations. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature extends Segment Routing support with IPv6 data plane. In a Segment Routing over IPv6 (SRv6) network, an IPv6 address serves as the Segment Identifier (SID). The source router encodes the path to destination as an ordered list of segments (list of IPv6 addresses) in the IPv6 packet using a new header for SRv6 called a Segment Routing Header (SRH). In an SRv6 enabled network, the active segment is indicated by the destination address of the packet, and the next segment is indicated by a pointer in the SRH. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature enables an SRv6 headend node to allocate and advertise local SIDs with Wide (32-bit) functions (Local W-LIB). The headend router utilizes the local W-LIB functionality to define and implement SR policies using SRv6 SIDs. The Local W-LIB is supported for Layer 3 (VPNv4/VPNv6/BGPv4/BGPv6 global) services. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Segment routing Tree-SID interoperability and SR-P2MP enhancements |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The feature introduces enhancements to the SR Tree-SID functionality and SR-P2MP Policy, enabling full alignment with the Path Computation Element Protocol (PCEP) standard as per IETF specifications. These improvements enable interoperability between Path Computation Client (PCC) devices from different vendors connected to the PCE. * This feature is supported on Cisco 8712-MOD-M routers. |
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature adds support for the “Endpoint with decapsulation and specific IP table lookup” SRv6 end-point behavior (End.DT46). The End.DT46 behavior is used for dual-stack L3VPNs. This behavior is equivalent to the single per-VRF VPN label (for IPv4 and IPv6) in MPLS. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature adds support for the “Endpoint with decapsulation and specific IP table lookup” SRv6 end-point behavior (uDT46). The End.DT46 behavior is used for dual-stack L3VPNs. This behavior is equivalent to the single per-VRF VPN label (for IPv4 and IPv6) in MPLS. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) VRF-to-VRF route leaking enables sharing of routes between VRFs while maintaining their isolation. This feature allows the source VRF to send leaked routes to remote PEs or Route Reflectors (RRs) across an SRv6 core network, similar to an MPLS core network, enabling communication between different service tenants or administrative domains without compromising VRF isolation. * This feature is supported on Cisco 8712-MOD-M routers. |
|
System Management |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The router performs the commit and rebase operations simultaneously, ensuring that the commit operation remains unblocked during the rebase operation. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems ( 8700 [ASIC: K100] (select variants only*) * With this release, support for PTP telecom profiles G.8275.1, G.8273.2, G.8265.1, and G.8275.2 is extended to the 8K-MPA-18Z1D Modular Port Adapter on the Cisco 8712-MOD-M router. |
|
System Monitoring |
|
Introduced in this release on: Modular Systems (8800) Routers and linecards with the P100, K100, and A100 based Silicon One ASIC support data plane health check utility. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) The filter physical keyword was introduced, along with new columns InDrops and OutDrops in the output, to provide enhanced monitoring capabilities for physical interfaces. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) Packet Tracer is a framework that enables you to trace custom flows through the router for service validation or troubleshooting. This feature utilizes the existing XR packet tracing infrastructure to facilitate debugging of packet flows at the ASIC and hardware levels. CLI: This feature introduces the following commands. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) This feature enables third-party applications to forward syslog messages to a remote server for handling a high rate of system logging. * This feature is supported on Cisco 8712-MOD-M routers. |
|
System Security |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: P100], 8700 [ASIC: P100]); Modular Systems (8800 [LC ASIC: P100]) You can now secure network access by requiring client network devices to authenticate with encrypted digital certificates before gaining access. The 802.1X port-based authentication ensures that a port remains closed to all traffic until the connected client successfully completes authentication using the Extensible Authentication Protocol with TLS (EAP-TLS) encryption. This prevents unauthorized access and enforces secure, certificate-based communication, enhancing network security and integrity. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This release introduces support for Enrollment over Secure Transport (EST), a digital certificate provisioning protocol, which enhances certificate management by offering secure transport using TLS and designated certificate requestors. It enables automated certificate renewal. EST is an enhancement of the existing Simple Certificate Enrollment Protocol (SCEP), providing improved security and flexibility for certificate management operations over both IPv4 and IPv6 networks. The feature introduces these changes: CLI:
YANG Data Model:
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can enhance network compatibility and simplify management in modern network environments using IPv6 addresses and CA server URLs that resolve to IPv6 addresses as enrollment URLs for the CA hosted on IPv6-based servers. This improvement addresses previous limitations that caused configuration issues and failures when using IPv6 CA enrollment URL. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can enhance network flexibility by enabling multiple hosts on a single port using MAC Authentication Bypass (MAB). The router now supports up to two clients per port by expanding its MAC learning capability from one to two. It authenticates each MAC address individually, allowing multi-domain authentication and enabling independent management of two endpoints. This feature simplifies network management and increases the connectivity options for devices per port. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100]) (select variants only*) You can now configure the hash rotation value for each Network Processing Unit (NPU) to improve traffic load balancing and minimize traffic polarization. Alternatively, the value can be automatically calculated, eliminating the need for manual configuration. * This feature is supported on Cisco 8712-MOD-M routers. |
|
Introduced in this release on: Centralized Systems (8600 [ASIC: Q200]) We have introduced the integration of Known Answer Tests (KAT) with MACsec on Cisco 8606 Series Routers, supporting secure communication, operational reliability, and stringent security standards for government and enterprise networks. This integration ensures cryptographic integrity and enhances security through algorithms like SHA and DES, supporting FIPS compliance. To achieve this, you can enable the hw-module macsec-fips-post command. You can achieve this by enabling the hw-module macsec-fips-post command. |
|
Introduced in this release on: Centralized Systems (8600 [ASIC:Q200]) Enabling MACsec mode ensures allocation of the required power for all MACsec ports and thereby prevents interface flap when MACsec feature is enabled on a port. Starting this release, the functionality to enable MACsec mode using the hw-module macsec-mode command is extended to the physical layer transceiver (PHY) of Cisco 8608 routers. |
YANG Data Models Introduced and Enhanced
This release introduces or enhances the following data models. For detailed information about the supported and unsupported sensor paths of all the data models, see the Github repository. To get a comprehensive list of the data models supported in a release, navigate to the Available-Content.md file for the release in the Github repository. The unsupported sensor paths are documented as deviations. For example, openconfig-acl.yang provides details about the supported sensor paths, whereas cisco-xr-openconfig-acl-deviations.yang provides the unsupported sensor paths for openconfig-acl.yang on Cisco IOS XR routers.
You can also view the data model definitions using the YANG Data Models Navigator tool. This GUI-based and easy-to-use tool helps you explore the nuances of the data model and view the dependencies between various containers in the model. You can view the list of models supported across Cisco IOS XR releases and platforms, locate a specific model, view the containers and their respective lists, leaves, and leaf lists presented visually in a tree structure.
Feature |
Description |
---|---|
Programmability |
|
open config-system-controlplane version 0.2.0 |
The open config-system-control plane model version 0.2.0 allows you to configure acl name and type of IPv4 or IPv6 using these leaves: 1. set-name 2. type The ingress interface name is set to lpts0 and not configurable by you. This data model supports cadence-driven telemetry. |
openconfig.yang version 3.4.0 |
The OpenConfig data model is revised from version 3.2.2 to 3.4.0 to introduce the following enhancements to the routing-policy yang: Added support for extended community set, BGP, and ISIS features, allowing for more robust management and telemetry capabilities. The following leaves support is introduced:
Restrictions and Limitations
|
openconfig-isis.yang version 1.7.0 |
The openconfig-isis.yang data model has been updated to version 1.7.0. The model now supports additional IS-IS configuration paths, that includes:
|
openconfig-platform-pipeline-counters.yang version 0.5.1 |
The openconfig-platform-pipeline-counters.yang is upgraded to version 0.5.1. The model now supports vendor-specific drop counters under vendor/cisco/q200 or vendor/cisco/p100 for each ASIC that contains the complete list of SDK drop counters and forwarding drop counter leaves, categorized as: Adverse Containers: These are drop counters for unexpected events that require immediate attention and resolution. Packet-Processing Containers: These counters represent expected drops based on configuration settings. Congestion Containers: These are diagnostic monitoring counters and dropped/trapped counters used for managing Virtual Output Queues (VOQs), specifically addressing drop, metering, and scheduling aspects. The model also supports aggregate counter leaves under pipeline-counters/drop/state that includes:
|
openconfig-qos.yang version 0.8.0 |
The OpenConfig model retrieves egress queuing statistics, such as transmitted and dropped packets for individual member interfaces that are part of a bundle. These metrics can be queried using the YANG leaves:
|
Cisco-IOS-XR-qos-ma-oper |
This data model retrieves egress queuing statistics, such as transmitted and dropped packets for individual member interfaces that are part of a bundle. It supports querying these metrics using the path qos/interface-table/interface/member-interfaces/member-interface/output. |
openconfig-bfd.yang 0.3.0 |
The OpenConfig data model supports version 0.3.0. The micro-BFD sessions container provides these operational state parameters:
|
openconfig-aft version 4.3.0 |
The backup-active leaf is added to the openconfig-aft model in the next-hop-group state container. The backup-active leaf state helps network management by providing information on whether backup paths are utilized or not. The backup-active leaf state is determined based on these conditions:
You can stream Model-driven telemetry (MDT) and Event-driven telemetry (EDT) data for this OpenConfig data model. |
Cisco-IOS-XR-secure-erase-act |
This data model allows you to securely erase the solid state drive (SSD) data on a particular card such as a line card or a route processor, or on the entire router. |
Cisco-IOS-XR-infra-sla-cfg.yang |
This native yang data model is enhanced to support BinsMinDelay and MinDelayMicroseconds options under the existing YANG leaf: /cfg/gl/sla/protocols/protocol/profiles/profile/statistics/statistic/aggregation |
Cisco-IOS-XR-um-ethernet-sla-cfg.yang |
This unified data model is enhanced to support BinsMinDelay and MinDelayMicroseconds options under the existing YANG leaf: /cfg/gl/sla/protocols/protocol/profiles/profile/statistics/statistic/aggregation |
Cisco-IOS-XR-infra-sla-oper.yang |
The existing bin width leaf in the Cisco native data model reflects the configured minimum delay value. |
Cisco-IOS-XR-um-route-policy-cfg |
This unified data model enables you to minimize packet loss, service disruptions, and prevents ECMP OOR conditions by allowing BGP to delay prefix download into the RIB and FIB until it learns all paths from a specific ASN. |
Cisco-IOS-XR-um-route-policy-cfg |
This unified data model is enhanced with a new container, extended-community-transitive-bandwidth-sets, and new leaves such as rpl-extended-community-transitive-bandwidth-set and set-name. These additions support the BGP DMZ transitive-bandwidth extended community in RPL. |
Cisco-IOS-XR-policy-repository-cfg |
This native data model is enhanced with a new container, extended-community-transitive-bandwidth-sets, and new leaves such as rpl-extended-community-transitive-bandwidth-set and set-name. These additions support the BGP DMZ bandwidth extended community in transitive mode, allowing bandwidth attributes to be propagated beyond a local AS. |
Cisco-IOS-XR-secure-erase-act |
This data model allows you to securely erase the solid state drive (SSD) data on a particular card such as a line card or a route processor, or on the entire router. |
Hardware Introduced
Hardware | Description |
---|---|
8K-MPA-18Z1D on Cisco 8712-MOD-M Router |
This release introduces the 8K-MPA-18Z1D is a Modular Port Adapter (MPA) with these highlights:
The 8K-MPA-18Z1D is supported on Cisco 8712-MOD-M fixed port chassis. For more information on this line card, see the Cisco 8000 Series Routers Data Sheet. |
8804-FC1 Fabric Card based on F100 Silicon Chip |
The Cisco 8804 Series Routers supports the Cisco 8804 fabric card (8804-FC1). The 8804-FC1 fabric card is based on a Silicon One F100 ASIC. It provides 20.4 Tbps of switching capacity with Q200 or P100 Silicon One line cards and can reach up to 21.2 Tbps throughput. Because of the higher switching capacity, this fabric card offer benefits, such as faster communication, lower latency, and ability to manage higher data flows. The fabric card supports 8FC modes. |
Optics |
Note: Optics support varies across devices (routers, line cards, RPs, and so on). To know if an optics is compatible with a specific Cisco device, refer to the Transceiver Module Group (TMG) Compatibility Matrix. This release introduces the following optics: |
For a complete list of supported hardware and ordering information, see the Cisco 8000 Series Data Sheet.
Release 25.1.1 Packages
The Cisco IOS XR software is composed of a base image (ISO) that provides the XR infrastructure. The ISO image is made up of a set of packages (also called RPMs). These packages are of three types:
-
A mandatory package that is included in the ISO
-
An optional package that is included in the ISO
-
An optional package that is not included in the ISO
Visit the Cisco Software Download page to download the Cisco IOS XR software images.
To determine the Cisco IOS XR Software packages installed on your router, log in to the router and enter the show install active command:
RP/0/RP0/CPU0#show install active
XR Software Hash: f0738879ab8da19112e81613c1bc3deb253944090891645bfb3c98609e21c3ba
Xr Package Version
---------------------------------------------------- ---------------------------
xr-8000-af-ea 25.1.1v1.0.0-1
xr-8000-aib 25.1.1v1.0.0-1
xr-8000-bfd 25.1.1v1.0.0-1
xr-8000-buffhdr-ea 25.1.1v1.0.0-1
xr-8000-bundles 25.1.1v1.0.0-1
xr-8000-card-support 25.1.1v1.0.0-1
xr-8000-cdp-ea 25.1.1v1.0.0-1
xr-8000-cem-driver 25.1.1v1.0.0-1
xr-8000-cfm 25.1.1v1.0.0-1
xr-8000-common-otn 25.1.1v1.0.0-1
xr-8000-core 25.1.1v1.0.0-1
xr-8000-cpa 25.1.1v1.0.0-1
xr-8000-cpa-devobj-gnss 25.1.1v1.0.0-1
xr-8000-cpa-devobj-misc 25.1.1v1.0.0-1
xr-8000-cpa-driver-fpgalib-kmod-oe 25.1.1v1.0.0-1
xr-8000-cpa-npu 25.1.1v1.0.0-1
xr-8000-cpa-sb-data 25.1.1v1.0.0-1
xr-8000-dot1x 25.1.1v1.0.0-1
xr-8000-dsm 25.1.1v1.0.0-1
xr-8000-dyinggasp-pd 25.1.1v1.0.0-1
xr-8000-edpl 25.1.1v1.0.0-1
xr-8000-encap-id 25.1.1v1.0.0-1
xr-8000-ether-ea 25.1.1v1.0.0-1
xr-8000-fabric 25.1.1v1.0.0-1
xr-8000-feat-mgr 25.1.1v1.0.0-1
xr-8000-fib-ea 25.1.1v1.0.0-1
xr-8000-forwarder 25.1.1v1.0.0-1
xr-8000-fpd 25.1.1v1.0.0-1
xr-8000-fwd-tools 25.1.1v1.0.0-1
xr-8000-fwdlib 25.1.1v1.0.0-1
xr-8000-gil-ea 25.1.1v1.0.0-1
xr-8000-host-core 25.1.1v1.0.0-1
xr-8000-hw-resmon 25.1.1v1.0.0-1
xr-8000-l2fib 25.1.1v1.0.0-1
xr-8000-l2mcast 25.1.1v1.0.0-1
xr-8000-leabaofa 25.1.1v1.0.0-1
xr-8000-li 25.1.1v1.0.0-1
xr-8000-libofaasync 25.1.1v1.0.0-1
xr-8000-lpts-ea 25.1.1v1.0.0-1
xr-8000-mcast 25.1.1v1.0.0-1
xr-8000-netflow 25.1.1v1.0.0-1
xr-8000-npu 25.1.1v1.0.0-1
xr-8000-oam 25.1.1v1.0.0-1
xr-8000-optics 25.1.1v1.0.0-1
xr-8000-os-oe 25.1.1v1.0.0-1
xr-8000-os-oe-extra 25.1.1v1.0.0-1
xr-8000-pbr 25.1.1v1.0.0-1
xr-8000-pd-port-mode 25.1.1v1.0.0-1
xr-8000-pfilter 25.1.1v1.0.0-1
xr-8000-pidb 25.1.1v1.0.0-1
xr-8000-pktio 25.1.1v1.0.0-1
xr-8000-ple-sdk 25.1.1v1.0.0-1
xr-8000-pm 25.1.1v1.0.0-1
xr-8000-port-mapper 25.1.1v1.0.0-1
xr-8000-ppinfo 25.1.1v1.0.0-1
xr-8000-pwhe-ea 25.1.1v1.0.0-1
xr-8000-qos-ea 25.1.1v1.0.0-1
xr-8000-ras 25.1.1v1.0.0-1
xr-8000-sat 25.1.1v1.0.0-1
xr-8000-span 25.1.1v1.0.0-1
xr-8000-spio 25.1.1v1.0.0-1
xr-8000-spp-ea 25.1.1v1.0.0-1
xr-8000-timing 25.1.1v1.0.0-1
xr-8000-tunnel-ip 25.1.1v1.0.0-1
xr-8000-utapp-blaze 25.1.1v1.0.0-1
xr-8000-vether 25.1.1v1.0.0-1
xr-8000-ztp-ea 25.1.1v1.0.0-1
xr-aaa 25.1.1v1.0.0-1
xr-acl 25.1.1v1.0.0-1
xr-apphosting 25.1.1v1.0.0-1
xr-appmgr 25.1.1v1.0.0-1
xr-bcdl 25.1.1v1.0.0-1
xr-bfd 25.1.1v1.0.0-1
xr-bgp 25.1.1v1.0.0-1
xr-bgputil 25.1.1v1.0.0-1
xr-bng-stubs 25.1.1v1.0.0-1
xr-bundles 25.1.1v1.0.0-1
xr-cal-pi 25.1.1v1.0.0-1
xr-cdp 25.1.1v1.0.0-1
xr-cds 25.1.1v1.0.0-1
xr-cfgmgr 25.1.1v1.0.0-1
xr-cfm 25.1.1v1.0.0-1
xr-cofo 25.1.1v1.0.0-1
xr-core 25.1.1v1.0.0-1
xr-core-calv 25.1.1v1.0.0-1
xr-cpa-common 25.1.1v1.0.0-1
xr-cpa-common-optics 25.1.1v1.0.0-1
xr-cpa-common-psu 25.1.1v1.0.0-1
xr-cpa-driver-devobj-misc 25.1.1v1.0.0-1
xr-cpa-driver-devobj-npu 25.1.1v1.0.0-1
xr-cpa-driver-devobj-phy 25.1.1v1.0.0-1
xr-cpa-driver-devobj-sensors 25.1.1v1.0.0-1
xr-cpa-driver-devobj-storage 25.1.1v1.0.0-1
xr-cpa-driver-devobj-test 25.1.1v1.0.0-1
xr-cpa-driver-devobj-timing 25.1.1v1.0.0-1
xr-cpa-driver-fpgalib-access 25.1.1v1.0.0-1
xr-cpa-driver-fpgalib-common 25.1.1v1.0.0-1
xr-cpa-driver-fpgalib-infra 25.1.1v1.0.0-1
xr-cpa-driver-fpgalib-misc 25.1.1v1.0.0-1
xr-cpa-driver-fpgalib-optics 25.1.1v1.0.0-1
xr-cpa-driver-optics 25.1.1v1.0.0-1
xr-cpa-ethsw 25.1.1v1.0.0-1
xr-cpa-idprom 25.1.1v1.0.0-1
xr-cpa-tamlib 25.1.1v1.0.0-1
xr-ctc 25.1.1v1.0.0-1
xr-debug 25.1.1v1.0.0-1
xr-dhcp 25.1.1v1.0.0-1
xr-diags 25.1.1v1.0.0-1
xr-diskboot 25.1.1v1.0.0-1
xr-drivers 25.1.1v1.0.0-1
xr-edpl 25.1.1v1.0.0-1
xr-eem 25.1.1v1.0.0-1
xr-eigrp 25.1.1v1.0.0-1
xr-elmi-stubs 25.1.1v1.0.0-1
xr-ema 25.1.1v1.0.0-1
xr-enhancedmanageability 25.1.1v1.0.0-1
xr-erp 25.1.1v1.0.0-1
xr-featurecapability 25.1.1v1.0.0-1
xr-fib 25.1.1v1.0.0-1
xr-filesysinv 25.1.1v1.0.0-1
xr-foundation-8000 25.1.1v1.0.0-1
xr-fpd 25.1.1v1.0.0-1
xr-gil 25.1.1v1.0.0-1
xr-ha-infra 25.1.1v1.0.0-1
xr-healthcheck 25.1.1v1.0.0-1
xr-host-core 25.1.1v1.0.0-1
xr-httpclient 25.1.1v1.0.0-1
xr-icpe-eth 25.1.1v1.0.0-1
xr-icpe-opt 25.1.1v1.0.0-1
xr-identifier 25.1.1v1.0.0-1
xr-infra-sla 25.1.1v1.0.0-1
xr-install 25.1.1v1.0.0-1
xr-ip-apps 25.1.1v1.0.0-1
xr-ip-core 25.1.1v1.0.0-1
xr-ip-infra-vrf 25.1.1v1.0.0-1
xr-ip-mibs 25.1.1v1.0.0-1
xr-ip-static 25.1.1v1.0.0-1
xr-ipc 25.1.1v1.0.0-1
xr-ipsla 25.1.1v1.0.0-1
xr-is-is 25.1.1v1.0.0-1
xr-k9sec 25.1.1v1.0.0-1
xr-l2snooptransport 25.1.1v1.0.0-1
xr-l2vpn 25.1.1v1.0.0-1
xr-ldp 25.1.1v1.0.0-1
xr-li 25.1.1v1.0.0-1
xr-licensing 25.1.1v1.0.0-1
xr-lictrl 25.1.1v1.0.0-1
xr-link-oam 25.1.1v1.0.0-1
xr-linuxnetworking 25.1.1v1.0.0-1
xr-linuxsecurity 25.1.1v1.0.0-1
xr-lldp 25.1.1v1.0.0-1
xr-lpts 25.1.1v1.0.0-1
xr-manageabilityxml 25.1.1v1.0.0-1
xr-mandatory 25.1.1v1.0.0-1
xr-mcast 25.1.1v1.0.0-1
xr-mcastl2snoop 25.1.1v1.0.0-1
xr-mda 25.1.1v1.0.0-1
xr-minimalboot 25.1.1v1.0.0-1
xr-mpls 25.1.1v1.0.0-1
xr-mpls-oam 25.1.1v1.0.0-1
xr-mpls-oam-client 25.1.1v1.0.0-1
xr-mpls-static 25.1.1v1.0.0-1
xr-netflow 25.1.1v1.0.0-1
xr-netflow-minimal 25.1.1v1.0.0-1
xr-nosi 25.1.1v1.0.0-1
xr-ntp 25.1.1v1.0.0-1
xr-ofa 25.1.1v1.0.0-1
xr-ops-script-repo 25.1.1v1.0.0-1
xr-optics 25.1.1v1.0.0-1
xr-orrspf 25.1.1v1.0.0-1
xr-os-oe-apps 25.1.1v1.0.0-1
xr-os-oe-core 25.1.1v1.0.0-1
xr-os-oe-docker 25.1.1v1.0.0-1
xr-os-oe-hardware 25.1.1v1.0.0-1
xr-ospf 25.1.1v1.0.0-1
xr-p4rt 25.1.1v1.0.0-1
xr-perf-meas 25.1.1v1.0.0-1
xr-perf-meas-client 25.1.1v1.0.0-1
xr-perfmgmt 25.1.1v1.0.0-1
xr-pfi 25.1.1v1.0.0-1
xr-pird-stubs 25.1.1v1.0.0-1
xr-pkt-trace 25.1.1v1.0.0-1
xr-pm-alarm 25.1.1v1.0.0-1
xr-portmode 25.1.1v1.0.0-1
xr-procmgr 25.1.1v1.0.0-1
xr-python 25.1.1v1.0.0-1
xr-qos 25.1.1v1.0.0-1
xr-rid-mgr 25.1.1v1.0.0-1
xr-rip 25.1.1v1.0.0-1
xr-routing 25.1.1v1.0.0-1
xr-rpl 25.1.1v1.0.0-1
xr-rsvp-te 25.1.1v1.0.0-1
xr-sandbox 25.1.1v1.0.0-1
xr-sanitizer-tools 25.1.1v1.0.0-1
xr-security 25.1.1v1.0.0-1
xr-security-tams 25.1.1v1.0.0-1
xr-secy-driver 25.1.1v1.0.0-1
xr-servicelayer 25.1.1v1.0.0-1
xr-snmp 25.1.1v1.0.0-1
xr-snmp-hw 25.1.1v1.0.0-1
xr-span 25.1.1v1.0.0-1
xr-spi-core 25.1.1v1.0.0-1
xr-spi-hw 25.1.1v1.0.0-1
xr-spp 25.1.1v1.0.0-1
xr-sr 25.1.1v1.0.0-1
xr-stats 25.1.1v1.0.0-1
xr-stp 25.1.1v1.0.0-1
xr-stubs 25.1.1v1.0.0-1
xr-sysdb 25.1.1v1.0.0-1
xr-syslog 25.1.1v1.0.0-1
xr-telemetry 25.1.1v1.0.0-1
xr-telnet 25.1.1v1.0.0-1
xr-tftp 25.1.1v1.0.0-1
xr-timing 25.1.1v1.0.0-1
xr-tmpdir-cleanup 25.1.1v1.0.0-1
xr-track 25.1.1v1.0.0-1
xr-transports 25.1.1v1.0.0-1
xr-tty 25.1.1v1.0.0-1
xr-tunnel-ip 25.1.1v1.0.0-1
xr-tunnel-nve 25.1.1v1.0.0-1
xr-upgradematrix 25.1.1v1.0.0-1
xr-utils 25.1.1v1.0.0-1
xr-vether 25.1.1v1.0.0-1
xr-vpnmib 25.1.1v1.0.0-1
xr-xmlinfra 25.1.1v1.0.0-1
xr-xrlibcurl 25.1.1v1.0.0-1
xr-ztp 25.1.1v1.0.0-1
To know about all the RPMs installed including XR, OS and other components use the show install active all command.
The software modularity approach provides a flexible model that allows you to install a subset of IOS XR packages on devices based on your individual requirements. All critical components are modularized as packages so that you can select the features that you want to run on your router.
![]() Note |
The above show command output displays mandatory packages that are installed on the router. To view the optional and bug fix RPM packages, first install the package and use the show install active summary command. |
To view all supported Cisco IOS XR Software upgrades from the current version according to the support data installed on the running system, enter the show install upgrade-matrix running command:
Router# show install upgrade-matrix running
Matrix: XR version: 25.1.1, File version: 1.1, Version: N/A
The upgrade matrix indicates that the following system upgrades are supported from the current XR version:
From To Restrictions
---------- ---------- ----------------------------------------------------
25.1.1 24.1.1 -
25.1.1 24.1.2 -
25.1.1 24.2.11 -
25.1.1 24.2.2 -
25.1.1 24.2.20 -
25.1.1 24.3.1 -
25.1.1 24.3.2 -
25.1.1 24.3.20 -
25.1.1 24.4.1 -
25.1.1 24.4.2 -
25.1.1 7.10.2 -
25.1.1 7.11.2 -
25.1.1 7.11.21 -
25.1.1 7.5.52 Caveats; Replace performed via reimage
25.1.1 7.8.2 Target fixes; Caveats; Replace performed via reimage
25.1.1 7.9.2 Caveats; Replace performed via reimage
Add the from and to versions to the end of the CLI command, for data on versions with additional restrictions
For example, to display restrictions for the 25.1.1->24.1.1 upgrade, use
'show install upgrade-matrix running 25.1.1 24.1.1'
Caveats
Bug ID |
Headline |
---|---|
IPv6 Traffic is redirected to the Next-hop even when it does not match the PBR rule configured. |
|
Injection of Single Count Hard Reset Error in P100 based Fixed Chassis Causes System Reload |
|
Multicast shaper not working for P100 and K100 ASIC based line cards and routers |
|
[8712-MOD-M] BLB session goes down for 1 to 3 min on Bundle member MPA reload |
|
[8711-32FH-M] EVPN BUM traffic cannot be forwarded to any AC/PW/EVI in bridge domain |
Behavior Changes
-
The gNOI/certz service will be removed in the gNOI API v1 release and replaced by gNSI Certz. Users should transition to gNSI Certz to maintain compatibility with future releases.
-
The
debug-utils
command is introduced under show controllers npu , which displays debug utility information for NPU controllers. -
A new command, mpls traffic-eng pce reoptimize disable, has been introduced to disable the re-optimization timer for the PCE computed LSPs within MPLS-TE.
-
With the deprecation of Type 7 password encryption in Cisco IOS XR Release 24.4.1, any configuration that used Type 7 passwords will be automatically converted and saved as Type 10 secrets during the upgrade to version 24.4.1. In 25.1.1, If you have usernames that include both a password and a secret, then: For the first 3000 users, the router will retain the original secret and discard the password. For users beyond the first 3000, the router will convert the password as Type 10 secrets by overwriting the original secret. In 24.4.1, the above changes were limited only to the first 100 users.
For more information, see Deprecation of Type 7 password and Type 5 secret.
-
Starting this release, you can configure the ssh server packet-flow-netio ingress command in the XR Config mode to filter out the ingress SSH and Netconf traffic while still having the ingress ACL configured on the management interface. Note that this configuration might impact the SCP and SFTP traffic performance.
Prior to this release, you had to configure the ingress ACL under the ssh server configuration mode instead of configuring under the management interface, to filter out such traffic.
-
The
openconfig-terminal-device.yang
data model has been updated to include support for the following leaves:Telemetry leaves:
-
/ingress/state/interface
-
/ingress/state/transceiver
Configuration leaves:
-
/ingress/config/interface
-
/config/transceiver
-
Determine Software Version
Log in to the router and enter the show version command:
RP/0/RP0/CPU0#show version
Cisco IOS XR Software, Version 25.1.1 LNT
Copyright (c) 2013-2025 by Cisco Systems, Inc.
Build Information:
Built By : sajshah
Built On : Wed Mar 26 16:23:42 UTC 2025
Build Host : iox-ucs-001
Workspace : /auto/srcarchive12/prod/25.1.1/8000/ws
Version : 25.1.1
Label : 25.1.1-renum
cisco 8000 (Intel(R) Xeon(R) CPU D-1530 @ 2.40GHz)
cisco 8202-32FH-M (Intel(R) Xeon(R) CPU D-1530 @ 2.40GHz) processor with 64GB of memory
R4 uptime is 1 day, 10 hours, 34 minutes
Cisco 8200 2RU 32x400G QSFP56-DD w/IOS XR HBM MACsec
Determine Firmware Support
Log in to the router and enter show fpd package command:
Cisco 8200 Series Router
RP/0/RP0/CPU0# show fpd package
=============================== ================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
8202-32FH-M Bios YES 1.20 1.20 0.0
BiosGolden YES 1.20 1.01 0.0
DbIoFpga1 YES 1.07 1.07 0.0
DbIoFpga2 YES 1.06 1.06 0.0
DbIoFpgaGolden1 YES 1.07 1.03 0.0
DbIoFpgaGolden2 YES 1.06 1.03 0.0
IoFpga1 YES 1.07 1.07 0.0
IoFpga2 YES 1.06 1.06 0.0
IoFpgaGolden1 YES 1.07 1.03 0.0
IoFpgaGolden2 YES 1.06 1.03 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.10 1.10 0.0
x86FpgaGolden YES 1.10 1.00 0.0
x86TamFw YES 7.18 7.18 0.0
x86TamFwGolden YES 7.18 7.10 0.0
--------------------------------------------------------------------------------
8202-32FH-M[FB] IoFpga NO 1.10 1.10 0.0
IoFpgaGolden NO 1.10 1.00 0.0
--------------------------------------------------------------------------------
8202-32FH-MO DbIoFpga1 YES 1.07 1.07 0.0
DbIoFpga2 YES 1.06 1.06 0.0
DbIoFpgaGolden1 YES 1.07 1.03 0.0
DbIoFpgaGolden2 YES 1.06 1.03 0.0
IoFpga1 YES 1.07 1.07 0.0
IoFpga2 YES 1.06 1.06 0.0
IoFpgaGolden1 YES 1.07 1.03 0.0
IoFpgaGolden2 YES 1.06 1.03 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.03 1.03 0.0
x86FpgaGolden YES 1.03 1.00 0.0
x86TamFw YES 7.10 7.10 0.0
x86TamFwGolden YES 7.10 7.10 0.0
--------------------------------------------------------------------------------
PSU-3KW-DCPE QC-LogicMCU NO 2.03 2.03 0.0
QC-Prim1MCU NO 2.02 2.02 0.0
QC-Prim2MCU NO 2.02 2.02 0.0
QC-Sec1MCU NO 2.02 2.02 0.0
QC-Sec2MCU NO 2.02 2.02 0.0
--------------------------------------------------------------------------------
PSU-3KW-DCPI QC-LogicMCU NO 2.03 2.03 0.0
QC-Prim1MCU NO 2.02 2.02 0.0
QC-Prim2MCU NO 2.02 2.02 0.0
QC-Sec1MCU NO 2.02 2.02 0.0
QC-Sec2MCU NO 2.02 2.02 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPE PO-PrimMCU NO 1.03 1.03 0.0
PO-SecMCU NO 1.06 1.06 0.0
QC-PrimMCU NO 1.01 1.01 0.0
QC-SecMCU NO 1.04 1.04 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPI PO-PrimMCU NO 1.03 1.03 0.0
PO-SecMCU NO 1.08 1.08 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 4.00 4.00 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPE PO-PrimMCU NO 1.07 1.07 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPI PO-PrimMCU NO 1.07 1.07 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 2.00 2.00 0.0
--------------------------------------------------------------------------------
PSU2KW-HVPI PO-PrimMCU NO 1.09 1.09 0.0
PO-SecMCU NO 1.10 1.10 0.0
--------------------------------------------------------------------------------
PSU3KW-HVPI DT-PrimMCU NO 3.01 3.00 0.0
DT-SecMCU NO 3.01 3.00 0.0
Cisco 8600 Series Router
RP/0/RP0/CPU0# show fpd package
=============================== ================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
86-MPA-14H2FH-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
86-MPA-24Z-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
86-MPA-4FH-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
8608-FS[FB] IoFpga NO 1.11 1.11 0.2
IoFpgaGolden NO 1.11 1.00 0.2
--------------------------------------------------------------------------------
8608-RP Bios YES 1.20 1.20 0.0
BiosGolden YES 1.20 1.01 0.0
IoFpga YES 1.10 1.10 0.0
IoFpgaGolden NO 1.10 1.01 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.07 1.07 0.0
x86FpgaGolden YES 1.07 1.07 0.0
x86TamFw YES 7.12 7.12 0.0
x86TamFwGolden YES 7.12 7.12 0.0
--------------------------------------------------------------------------------
8608-SC0-128 IoFpga YES 1.01 1.01 0.0
IoFpgaGolden YES 1.01 1.01 0.0
--------------------------------------------------------------------------------
8608-SC0-128[FB] IoFpga NO 1.11 1.11 0.2
IoFpgaGolden NO 1.11 1.00 0.2
--------------------------------------------------------------------------------
PSU3.2KW-ACPI EM-LogicMCU NO 0.10 0.10 0.0
EM-PrimMCU NO 0.02 0.02 0.0
EM-SecMCU NO 0.02 0.02 0.0
--------------------------------------------------------------------------------
PSU3.2KW-DCPI EM-LogicMCU NO 0.11 0.11 0.0
EM-PrimMCU NO 0.04 0.04 0.0
EM-SecMCU NO 0.04 0.04 0.0
--------------------------------------------------------------------------------
PSU4.3KW-HVPI DT-LogicMCU NO 2.05 2.05 0.0
DT-PrimMCU NO 1.08 1.08 0.0
DT-SecMCU NO 1.08 1.08 0.0
Cisco 8700 Series Router
RP/0/RP0/CPU0# show fpd package
=============================== ================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
8712-MOD-M Bios YES 4.15 4.15 0.1
BiosGolden YES 4.15 4.12 0.1
DbIoFpga YES 1.60 1.60 0.1
DbIoFpgaGolden YES 1.60 1.53 0.1
IoFpga YES 1.69 1.69 0.1
IoFpgaGolden YES 1.69 1.69 0.1
SsdMicron5300 YES 0.01 0.01 0.0
SsdMicron7450M2 YES 20.00 11.00 10.0
x86Fpga YES 2.11 2.11 0.1
x86FpgaGolden YES 2.11 2.09 0.1
x86TamFw YES 9.07 9.07 0.1
x86TamFwGolden YES 9.07 9.03 0.1
--------------------------------------------------------------------------------
8K-MPA-16H IoFpga YES 1.18 1.18 0.1
IoFpgaGolden YES 1.18 1.15 0.1
--------------------------------------------------------------------------------
8K-MPA-16Z2D IoFpga YES 1.18 1.18 0.1
IoFpgaGolden YES 1.18 1.15 0.1
--------------------------------------------------------------------------------
8K-MPA-18Z1D IoFpga YES 1.29 1.29 0.1
IoFpgaGolden YES 1.29 1.29 0.1
--------------------------------------------------------------------------------
8K-MPA-4D IoFpga YES 1.18 1.18 0.1
IoFpgaGolden YES 1.18 1.15 0.1
--------------------------------------------------------------------------------
PSU2KW-ACPE PO-PrimMCU YES 1.03 1.03 0.0
PO-SecMCU YES 1.10 1.10 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPI PO-PrimMCU YES 1.03 1.03 0.0
PO-SecMCU YES 1.13 1.13 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 4.00 4.00 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPE PO-PrimMCU YES 1.11 1.11 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPI PO-PrimMCU NO 1.11 1.11 0.0
Cisco 8800 Series Router
RP/0/RP0/CPU0# show fpd package
=============================== ================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
88-LC0-34H14FH Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.09 1.09 0.1
IoFpgaGolden YES 1.09 1.01 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 0.98 0.98 0.1
x86FpgaGolden YES 0.98 0.78 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.10 0.1
--------------------------------------------------------------------------------
88-LC0-34H14FH-O Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.09 1.09 0.1
IoFpgaGolden YES 1.09 1.01 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 0.98 0.98 0.1
x86FpgaGolden YES 0.98 0.78 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.10 0.1
--------------------------------------------------------------------------------
88-LC0-36FH Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-M Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-MO Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-O Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC1-12TH24FH-E Bios YES 1.20 1.20 0.41
BiosGolden YES 1.20 1.01 0.41
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.05 1.05 0.0
IoFpgaGolden YES 1.05 1.00 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.06 1.06 0.31
x86FpgaGolden YES 1.06 1.00 0.31
x86TamFw YES 7.18 7.18 0.31
x86TamFwGolden YES 7.18 7.13 0.31
--------------------------------------------------------------------------------
88-LC1-36EH Bios YES 1.20 1.20 0.41
BiosGolden YES 1.20 1.01 0.41
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.05 1.05 0.0
IoFpgaGolden YES 1.05 1.00 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.06 1.06 0.31
x86FpgaGolden YES 1.06 1.00 0.31
x86TamFw YES 7.18 7.18 0.31
x86TamFwGolden YES 7.18 7.13 0.31
--------------------------------------------------------------------------------
88-LC1-52Y8H-EM Bios YES 1.20 1.20 0.0
BiosGolden YES 1.20 1.01 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.02 1.02 0.1
IoFpgaGolden YES 1.02 1.00 0.1
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.01 1.01 0.1
x86FpgaGolden YES 1.01 1.00 0.1
x86TamFw YES 9.05 9.05 0.1
x86TamFwGolden YES 9.05 9.05 0.1
--------------------------------------------------------------------------------
8800-LC-36FH Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-36FH-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-48H Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-48H-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-RP Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.02 1.02 0.0
TimingFpgaGolden YES 1.02 0.11 0.0
x86Fpga YES 1.39 1.39 0.0
x86FpgaGolden YES 1.39 0.24 0.0
x86TamFw YES 5.19 5.19 0.0
x86TamFwGolden YES 5.19 5.05 0.0
--------------------------------------------------------------------------------
8800-RP-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.02 1.02 0.0
TimingFpgaGolden YES 1.02 0.11 0.0
x86Fpga YES 1.39 1.39 0.0
x86FpgaGolden YES 1.39 0.24 0.0
x86TamFw YES 5.19 5.19 0.0
x86TamFwGolden YES 5.19 5.05 0.0
--------------------------------------------------------------------------------
8800-RP2 Bios YES 1.20 1.20 0.3
BiosGolden YES 1.20 1.07 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
PcieSwitch YES 120.14 120.14 0.7
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 1.14 1.14 0.6
x86FpgaGolden YES 1.14 1.02 0.6
x86TamFw YES 7.18 7.18 0.6
x86TamFwGolden YES 7.18 7.13 0.6
--------------------------------------------------------------------------------
8800-RP2-O Bios YES 1.00 1.00 0.3
BiosGolden YES 1.00 1.00 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 0.128 0.128 0.3
x86FpgaGolden YES 0.128 0.128 0.3
x86TamFw YES 7.12 7.12 0.3
x86TamFwGolden YES 7.12 7.12 0.3
--------------------------------------------------------------------------------
8800-RP2-S Bios YES 1.20 1.20 0.3
BiosGolden YES 1.20 1.07 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
PcieSwitch YES 120.14 120.14 0.7
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 1.14 1.14 0.6
x86FpgaGolden YES 1.14 1.02 0.6
x86TamFw YES 7.18 7.18 0.6
x86TamFwGolden YES 7.18 7.13 0.6
--------------------------------------------------------------------------------
8804-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8804-FC0 IoFpga YES 1.06 1.06 0.0
IoFpgaGolden YES 1.06 0.16 0.0
--------------------------------------------------------------------------------
8804-FC1 IoFpga YES 1.03 1.03 0.0
IoFpgaGolden YES 1.03 1.03 0.0
--------------------------------------------------------------------------------
8808-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8808-FAN-V2 FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8808-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
--------------------------------------------------------------------------------
8808-FC0 IoFpga YES 1.06 1.06 0.0
IoFpgaGolden YES 1.06 0.16 0.0
--------------------------------------------------------------------------------
8808-FC1 IoFpga YES 1.03 1.03 0.0
IoFpgaGolden YES 1.03 1.03 0.0
--------------------------------------------------------------------------------
8812-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8812-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
8818-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8818-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
8818-FC0 IoFpga YES 1.06 1.06 0.0
IoFpgaGolden YES 1.06 0.16 0.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
PSU4.8KW-DC100 PO-PrimMCU NO 51.85 51.85 0.0
PO-SecMCU NO 51.85 51.85 0.0
--------------------------------------------------------------------------------
PSU6.3KW-20A-HV DT-LogicMCU NO 1.00 1.00 0.0
DT-PrimMCU NO 1.00 1.00 0.0
DT-SecMCU NO 1.00 1.00 0.0
--------------------------------------------------------------------------------
PSU6.3KW-HV AB-LogicMCU NO 3.08 3.08 0.0
AB-PrimMCU NO 3.08 3.08 0.0
AB-SecMCU NO 3.06 3.06 0.0
DT-LogicMCU NO 4.11 4.11 0.0
DT-PrimMCU NO 4.01 4.01 0.0
DT-SecMCU NO 4.00 4.00 0.0
--------------------------------------------------------------------------------
PWR-4.4KW-DC-V3 DT-LogicMCU NO 3.02 3.02 0.0
DT-Prim1MCU NO 3.01 3.01 0.0
DT-Prim2MCU NO 3.01 3.01 0.0
DT-Sec1MCU NO 3.01 3.01 0.0
DT-Sec2MCU NO 3.01 3.01 0.0
Compatibility Matrix for EPNM and Crosswork with Cisco IOS XR Software
The compatibility matrix lists the version of EPNM and Crosswork that are supported with Cisco IOS XR Release in this release.
Cisco IOS XR |
Crosswork |
EPNM |
---|---|---|
Release 25.1.1 |
Important Notes
-
The warning message that the smart licensing evaluation period has expired is displayed in the console every hour. There is, however, no functionality impact on the device. The issue is seen on routers that don’t have the Flexible Consumption licensing model enabled. To stop the repetitive messaging, register the device with the smart licensing server and enable the Flexible Consumption model. Later load a new registration token.
To register the device with the smart licensing server, see the Registering and Activating Your Router.
Licensing
Starting with Cisco IOS XR Release 24.1.1, Smart Licensing Using Policy (SLP) is the default Licensing model. When you upgrade to the Cisco IOS XR Release 24.1.1 release or later, the Smart Licensing Using Policy is enabled by default.
You can migrate your devices to Smart Licensing with Policy model, see Migrating from Smart Licensing to Smart Licensing Using Policy, Smart Licensing Using Policy on Cisco IOS XR Routers.
We recommend that you update to the latest version of SSM On-Prem or Cisco Smart Licensing Utility.
![]() Note |
SSM On-Prem and CSSM both support SLP devices and SL devices. SLP devices and SL devices can coexist in a network. The Smart Licensing (SL) model is available in releases Cisco IOS XR Release 7.11.1 and earlier. |
Production Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Supported Transceiver Modules
To determine the transceivers that Cisco hardware device supports, refer to the Transceiver Module Group (TMG) Compatibility Matrix tool.
Cisco IOS XR Error messages
To view, search, compare, and download Cisco IOS XR Error Messages, refer to the Cisco IOS XR Error messages tool.
Cisco IOS XR MIBs
To determine the MIBs supported by platform and release, refer to the Cisco IOS XR MIBs tool.
Related Documentation
The most current Cisco 8000 router documentation is located at the following URL:
https://www.cisco.com/c/en/us/td/docs/iosxr/8000-series-routers.html