Network Convergence System 5500 Series Routers


Note

This product has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices.



Note

Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


Software Features Introduced in Cisco IOS XR Software Release 6.2.3

There are no new software features released in this release.

Behavior Change Introduced in Cisco IOS XR Release 6.2.3

Locking a Running Configuration in NETCONF

For a NETCONF client to change a configuration in Cisco IOS XR, it is recommended for the client to acquire a lock to prevent simultaneous update from another NETCONF client or CLI session.

To acquire a configuration lock, the NETCONF client sends a RPC request to lock the running datastore. In Cisco IOS XR 6.1.x and previous releases, the RPC request candidate data-store was the target for acquiring the lock. But from release 6.2.x and later, the request running data-store must be sent to successfully lock the configuration.

Example: NETCONF request with running data-store as target to successfully lock a configuration:


<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <lock>
         <target>
           <running/>                                                                                   
         </target>
       </lock>
</rpc> 

Interface Name Modified

Prior to IOS XR Release 6.2.1, 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces were both named as TenGigE. Also, 40 Gigabit Ethernet and 100 Gigabit Ethernet interfaces were both named as HundredGigE. From Release 6.2.1 onwards, the names have been modified to:

Interface Type

Interface Name

1 Gigabit Ethernet

GigabitEthernet

10 Gigabit Ethernet

TenGigE

40 Gigabit Ethernet

FortyGigE

100 Gigabit Ethernet

HundredGigE


Note

After upgrading to Release 6.2.3, the old configurations applied to 1G and 40G interfaces will not be available. Therefore you must reconfigure the 1G and 40G interfaces using the new names.


New Hardware Introduced in Cisco IOS XR Software Release 6.2.3

No new hardware introduced in this release.

Release 6.2.3 Packages

This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.

Table 1. Release 6.2.3 Packages for Cisco NCS 5500 Series Router

Composite Package

Feature Set

Filename

Description

Cisco IOS XR IP Unicast Routing Core Bundle

ncs5500-mini-x.iso

Contains base image contents that includes:

  • Host operating system

  • System Admin boot image

  • IOS XR boot image

  • BGP packages

Individually-Installable Optional Packages

Feature Set

Filename

Description

Cisco IOS XR Manageability Package

ncs5500-mgbl-1.0.0.0-r623.x86_64.rpm

Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages.

Cisco IOS XR MPLS Package

ncs5500-mpls-1.0.0.0-r623.x86_64.rpm

ncs5500-mpls-te-rsvp-1.0.0.0-r623.x86_64.rpm

MPLS and MPLS Traffic Engineering (MPLS-TE) RPM.

Cisco IOS XR Security Package

ncs5500-k9sec-1.0.0.0-r623.x86_64.rpm

Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI)

Cisco IOS XR ISIS package

ncs5500-isis-1.2.0.0-r623.x86_64.rpm

Support ISIS

Cisco IOS XR OSPF package

ncs5500-ospf-2.0.0.0-r623.x86_64.rpm

Support OSPF

Lawful Intercept (LI) Package

ncs5500-li-1.0.0.0-r623.x86_64.rpm

Includes LI software images

Multicast Package

ncs5500-mcast-1.0.0.0-r623.rpm

Support Multicast

Determine Software Version

Log in to the router and enter the show version command:

RP/0/RP0/CPU0:router# show version

Cisco IOS XR Software, Version 6.2.3
Copyright (c) 2013-2017 by Cisco Systems, Inc.

Build Information:
 Built By     : <username>
 Built On     : Thu Dec 21 19:01:41 PST 2017
 Build Host   : iox-lnx-064
 Workspace    : /auto/srcarchive11/production/6.2.3/ncs5500/workspace
 Version      : 6.2.3
 Location     : /opt/cisco/XR/packages/

cisco NCS-5500 () processor 
System uptime is 7 hours, 2 minutes

Caveats Specific to the Cisco NCS 5500 Router

There are no caveats in this release.

Cisco IOS XR Caveats

Caveat

Description

CSCvh06161

SSH sessions doesn't show up correctly in "show users" CLI result.

Determine Firmware Support

Use the show hw-module fpd command in EXEC mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.

Table 2. PID and FPD Versions for Release 6.2.3

PID

FPD Device

FPD Versions

NCS55-RP

Bootloader

9.25

IOFPGA

0.09

NCS55-SC

Bootloader

1.74

IOFPGA

0.10

NC55-5508-FC

Bootloader

1.74

IOFPGA

0.16

NC55-36X100G

Bootloader

1.17

IOFPGA

0.15

MIFPGA

0.09

NC55-24X100G-SE

Bootloader

1.11

IOFPGA

0.13

MIFPGA

0.03

NC55-18H18F

Bootloader

1.11

IOFPGA

0.22

MIFPGA

0.03

NC55-36X100G-S

Bootloader

1.11

IOFPGA

0.09

MIFPGA

0.06

NC55-24H12F-SE

Bootloader

1.11

IOFPGA

0.09

MIFPGA

0.03

NCS-5501

Bootloader

1.16

CPU-IOFPGA

1.14

MB-IOFPGA

1.05

MB-MIFPGA

1.01

NCS-5501-SE

Bootloader

1.16

CPU-IOFPGA

1.14

MB-IOFPGA

1.10

MB-MIFPGA

1.02

NCS-5502

Bootloader

1.16

CPU-IOFPGA

1.14

DC-IOFPGA

1.05

DC-MIFPGA

1.02

MB-IOFPGA

1.05

MB-MIFPGA

1.02

NCS-5502-SE

Bootloader

1.16

CPU-IOFPGA

1.14

DC-IOFPGA

1.05

DC-MIFPGA

1.02

MB-IOFPGA

1.05

MB-MIFPGA

1.02

NC55-5516-FC

Bootloader

1.75

IOFPGA

0.23

NCS-55A1-36H-B

Bootloader

1.07

CPU-IOFPGA

1.14

MB-IOFPGA

1.0

MB-MIFPGA

1.0

NC55-6X200-DWDM-S

Bootloader

1.11

IOFPGA

0.10

DENALI

13.48

MORGOTH

5.16

MSFPGA

2.22

CFP2_PORT

5.23

Other Important Information

  • The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518.

    Here the number 1518 represents the multi-dimensional scale value.

  • The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.

Related Documentation

The most current Cisco Network Convergence System 5500 Series documentation is located at this URL:

http://www.cisco.com/c/en/us/support/routers/network-convergence-system-5500-series/tsd-products-support-series-home.html

The document containing Cisco IOS XR System Error Messages (SEM) is located at this URL:

https://www.cisco.com/c/en/us/td/docs/ios_xr_sw/error/message/ios-xr-sem-guide.html

Production Software Maintenance Updates (SMUs)

A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.

For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.

Communications, Services, and Additional Information

  • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.

  • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.

  • To submit a service request, visit Cisco Support.

  • To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.

  • To obtain general networking, training, and certification titles, visit Cisco Press.

  • To find warranty information for a specific product or product family, access Cisco Warranty Finder.

Cisco Bug Search Tool

Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.