Network Convergence System 5500 Series Routers


Note

Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


What's New in Cisco IOS XR Release 7.0.2

Cisco is continuously enhancing the product with every release and this section covers a brief description of key features and enhancements. It also includes links to detailed documentation, where available.

Software

With the enhancements made in this release, the features available on line cards NC57-24DD and NC57-18DD-SE are at parity with that available on Cisco IOS XR Release 6.5.1.

However, support for the following features on NC57-24DD and NC57-18DD-SE is expected in future IOS XR releases:

  • BVI

  • EVPN

  • ERSPAN

  • DHCP Relay

  • Layer 2

  • L2 OAM

  • Lawful Intercept

  • mLDP Edge

  • Timing

  • P2MP Edge

  • Smart License

  • QoS DSCP preservation bit is not supported when the qos-group is set using ingress policy-map

SRv6 Flexible Algorithm for IS-IS

Segment Routing over IPv6 (SRv6) Flexible Algorithm allows operators to customize IGP shortest path computation according to their own needs. An operator can assign custom SR prefix-SIDs to realize forwarding beyond link-cost-based SPF. As a result, Flexible Algorithm provides a traffic engineered path automatically computed by the IGP to any destination reachable by the IGP.

The SR architecture associates prefix-SIDs to an algorithm which defines how the path is computed. Flexible Algorithm allows for user-defined algorithms where the IGP computes paths based on a user-defined combination of metric type and constraint.

See Configuring SRv6 IS-IS Flexible Algorithm.

SRv6 Topology-Independent Loop-Free Alternate Node and Shared Risk Link Groups Protection

This feature introduces support for Topology-Independent Loop-Free Alternate (TI-LFA) node protection and Shared Risk Link Groups (SRLG) protection using Segment Routing over IPv6 (SRv6) for the IS-IS protocol.

  • TI-LFA node protection functionality provides protection from node failures. The neighbor node is excluded during the post convergence backup path calculation.

  • TI-LFA SRLG protection functionality attempts to find the post-convergence backup path, which excludes the SRLGs of the protected link. All local links that share any SRLG with the protecting link are excluded during the post convergence backup path calculation.

See Configuring SRv6 IS-IS TI-LFA.

SRv6 Microloop Avoidance

The Segment Routing over IPv6 (SRv6) Microloop Avoidance feature enables link-state routing protocols, such as IS-IS, to prevent or avoid microloops during network convergence after a topology change.

Microloops are brief packet loops that occur in the network following a topology change (link down, link up, or metric change events). Microloops are caused by the non-simultaneous convergence of different nodes in the network. If nodes converge and send traffic to a neighbor node that has not converged yet, traffic may be looped between these two nodes, resulting in packet loss, jitter, and out-of-order packets. If a node computes that a microloop could occur on the new topology, the node creates a loop-free path to the destination using a list of segments. After the RIB update delay timer expires, the explicit path is replaced with regular forwarding paths.

See Configuring SRv6 IS-IS Microloop Avoidance.

SRv6 OAM — SID Verification

This feature provides enhanced Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6).

Existing OAM mechanisms to ping and trace a remote IPv6 prefix, along the shortest path, continue to work without any modification in an SRv6 network.

However, classic IPv6 OAM cannot be used to ping or trace a remote SRv6 SID function. This feature augments ping and traceroute operations to target remote SRv6 SIDs. An SRv6-enabled router now allocates a new SRv6 OAM SID known as END.OP (OAM Endpoint with Punt).

A target remote SID include the following:

  • END

  • END.DT4/END.DX4 (used by L3 Services over SRv6)

  • END.DX2 (used by L2 Services over SRv6)

See SRv6 OAM — SID Verification.

SRv6 SID Information in BGP-LS Reporting

BGP-LS is used to report the topology of the domain using nodes, links, and prefixes. This feature adds the capability to report SRv6 Segment Identifier (SID) Network Layer Reachability Information (NLRI).

The following NLRI has been added to the BGP-LS protocol to support SRv6:

  • Node NLRI: SRv6 Capabilities, SRv6 MSD types

  • Link NLRI: End.X, LAN End.X, and SRv6 MSD types

  • Prefix NLRI: SRv6 Locator

  • SRv6 SID NLRI (for SIDs associated with the node): Endpoint Function, BGP-EPE Peer Node/Set and Opaque

See SRv6 SID Information in BGP-LS Reporting.

SRv6 Services: L3VPN VPNv4 Active-Active Redundancy

This feature provides active-active connectivity to a CE device in a L3VPN deployment. The CE device can be Layer-2 or Layer-3 device connecting to the redundant PEs over a single LACP LAG port.

See SRv6 Services: L3VPN VPNv4 Active-Active Redundancy.

SRv6 Services: SRv6 Services TLV Type 5 Support

IOS XR 6.6.1 supports IETF draft draft-dawra-idr-srv6-vpn-04, in which SRv6 Service SID information is carried in the SRv6-VPN SID TLV (TLV Type 4). This SID TLV is inconsistent with the SRv6 SID Structure.

In IOS XR 7.0.2 and later releases, the implementation is now compliant with draft-ietf-bess-srv6-services-00, where a new SRv6 Services TLV (TLV Type 5/6) and SRv6 SID Structure Sub-Sub-TLV are defined to address this inconsistency.

Functionality is also provided to allow for backward compatibility between the two TLV types.

See SRv6 Services: SRv6 Services TLV Type 5 Support.

IS-IS Maximum Metric on Start Up

This feature allows IS-IS to advertise the maximum metric during the start-up phase until either BGP converges or the specified start-up timer expires.

When a router is configured with maximum metric at start up, IS-IS advertises the maximum metric for IS-IS links as well as for prefixes that originated from the routers. This configuration will make neighboring routers use this router as a transit-node of last resort. The maximum metric is advertised only during the start-up phase when the routing table has not converged. Once the start-up timer expires or the BGP converge signal is received, the normal metric is advertised. You can set maximum metric for default routes, SRv6 locator, or redistributed prefixes.

For narrow metrics, the maximum metric value is 63; for wide metrics, the maximum metric value is 16777214.

See IS-IS Maximum Metric on Start Up.

SRv6 Services: EVPN VPWS — All-Active Multi-Homing

EVPN VPWS All-Active Multi-Homing over SRv6 provides an ELINE (P2P) service with all-active multihoming capability over an SRv6 network.

All-Active Multi-Homing enables an operator to connect a customer edge (CE) device to two or more provider edge (PE) devices to provide load balancing and redundant connectivity. With All-Active Multi-Homing, all the PEs can forward traffic to and from the multi-homed device.

See SRv6 Services: EVPN VPWS — All-Active Multi-Homing.

SRv6 Services: EVPN VPWS — IPv6 Flow Label Computation Based on Ingress L2 Frames

This feature allows the ingress EVPN VPWS PE to compute the flow label field of the outer-most IPv6 header based on the L2 and L3 fields of the incoming Ethernet frames.

See SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking.

SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking

This feature allows the ingress EVPN VPWS PE to copy the CoS value from the top-most VLAN header to the traffic-class (TC) field of the outer-most IPv6 header. This functionality enables prioritization of traffic in the IPv6 network.

To enable this feature, use the hw-module profile segment-routing srv6 encapsulation traffic-class propagate command. This command requires you to reload the router for the configuration to take effect.

See SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking.

SPAN over Pseudo-Wire

Pseudo-wire traffic mirroring (known as PW-SPAN) is an extra functionality on the existing SPAN solutions. The existing SPAN solutions are monitored on a destination interface or through a GRE tunnel or RSPAN. In PW-SPAN, the traffic mirroring destination port is configured to be a pseudo-wire rather than a physical port. Here, the designated traffic on the source port is mirrored over the pseudo-wire to a central location. Mirroring the designated traffic on the source port over the pseudo-wire to a central location allows the centralization of expensive network traffic analysis tools.

See SPAN over Pseudo-Wire.

MAC Mobility between the Bridge Ports using VRF Leaking

The MAC Mobility between the Bridge Ports using VRF Leaking feature supports EVPN MAC mobility across bridge ports with VRF leaking functionality. With both source and target VRFs located on the same router, when VM in the target VRF is migrated, this feature supports the host in source VRF to reach the migrated VM.

See MAC Mobility between the Bridge Ports using VRF Leaking.

Hardware

This release introduces the following hardware:

  • NC57-24DD—Cisco NCS 5500 Series 24-port 400 GE Base line card is supported on the Cisco NCS 5508 and Cisco NCS 5516 chassis with second generation fabric cards (NC55-5508-FC2 and NC55-5516-FC2) and fan trays (NC55-5508-FAN2 and NC55-5516-FAN2).

    See Line Card Overview.

    See 400GE Line Cards Data Sheet .

  • NC57-18DD-SE—Cisco NCS 5500 Series 18-port 400 GE Scale line card is supported on the Cisco NCS 5508 and Cisco NCS 5516 chassis with second generation fabric cards (NC55-5508-FC2 and NC55-5516-FC2) and fan trays (NC55-5508-FAN2 and NC55-5516-FAN2).

    See Line Card Overview.

    See 400GE Line Cards Data Sheet .

  • QDD-400G-CU1M , QDD-400G-CU2M, QDD-400G-FR4-S, QDD-400G-DR4-S, QDD-400G-LR8— These optical modules are supported on the NC57-24DD and NC57-18DD-SE line cards.

    See the TMG compatibility matrix tool.

  • CFP2-WDM-DS100-HL, CFP2-WDM-DETS-1HL=, and CFP2-WDM-DS-1HL= — The Cisco NCS 5500 fixed port and modular port routers support the Cisco CFP2 DCO pluggable optics modules (CFP2-WDM-DS100-HL, CFP2-WDM-DETS-1HL=, and CFP2-WDM-DS-1HL).

    See the TMG compatibility matrix tool.

Caveats

Caveats describe unexpected behavior in Cisco IOS XR Software releases. Severity-1 caveats are the most critical caveats; severity-2 caveats are less critical.

Caveats Specific to the NCS 5500 Series Routers

Caveats describe unexpected behavior in Cisco IOS XR Software releases. These caveats are speicifc to NCS 5500 Series Routers:

Bug ID

Headline

CSCvt42370

IPv6 traffic drop with ingress IPv6 ACL on BVI, after router reload/upgrade

CSCvt38319

TCAM key format change and reload request logs even after node reload

CSCvt24508

4x10 breakout not working after upgrade/reload

Supported Packages and System Requirements

For a complete list of supported optics, hardware and ordering information, see the Cisco NCS 5500 Series Data Sheet

To install the Cisco NCS 5500 router, see Hardware Installation Guide for Cisco NCS 5500 Series Routers.

Release 7.0.2 Packages

This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.

Table 1. Release 7.0.2 Packages for Cisco NCS 5500 Series Router

Composite Package

Feature Set

Filename

Description

Cisco IOS XR IP Unicast Routing Core Bundle

ncs5500-mini-x.iso

Contains base image contents that includes:

  • Host operating system

  • System Admin boot image

  • IOS XR boot image

  • BGP packages

Individually-Installable Optional Packages

Feature Set

Filename

Description

Cisco IOS XR Manageability Package

ncs5500-mgbl-3.0.0.0-r702.x86_64.rpm

Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages.

Cisco IOS XR MPLS Package

ncs5500-mpls-2.1.0.0-r702.x86_64.rpm

ncs5500-mpls-te-rsvp-2.2.0.0-r702.x86_64.rpm

MPLS and MPLS Traffic Engineering (MPLS-TE) RPM.

Cisco IOS XR Security Package

ncs5500-k9sec-3.1.0.0-r702.x86_64.rpm

Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI)

Cisco IOS XR ISIS package

ncs5500-isis-1.2.0.0-r702.x86_64.rpm

Support ISIS

Cisco IOS XR OSPF package

ncs5500-ospf-2.0.0.0-r702.x86_64.rpm

Support OSPF

Lawful Intercept (LI) Package

ncs5500-li-1.0.0.0-r702.x86_64.rpm

Includes LI software images

Multicast Package

ncs5500-mcast-1.0.0.0-r702.rpm

Support Multicast

Determine Software Version

To verify the software version running on the router, use show version command in the EXEC mode.

RP/0/RP0/CPU0:router# show versionCisco IOS XR Software, Version 7.0.1
Cisco IOS XR Software, Version 7.0.2
Copyright (c) 2013-2020 by Cisco Systems, Inc.

Build Information:
Built By     : <username>
Built On     : Wed Mar 11 08:33:25 PDT 2020
Built Host   : iox-ucs-027
Workspace    : /auto/srcarchive17/prod/7.0.2/ncs5500/ws
Version      : 7.0.2
Location     : /opt/cisco/XR/packages/
Label        : 7.0.2

cisco NCS-5500 () processor
System uptime is 1 day 15 minutes

Determine Firmware Support

Use the show hw-module fpd command in EXEC mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.

(RP/0/RP0/CPU0)#show hw-module fpd
                                                               FPD Versions
                                                               =================
Location   Card type             HWver FPD device       ATR Status   Running Programd
-----------------------------------------------------------------------------------
0/2        NC55-36X100G-S        0.4   MIFPGA               CURRENT    0.07    0.07  
0/2        NC55-36X100G-S        0.4   Bootloader           CURRENT    1.14    1.14  
0/2        NC55-36X100G-S        0.4   IOFPGA               CURRENT    0.11    0.11  
0/2        NC55-36X100G-S        0.4   SATA                 CURRENT    5.00    5.00  
0/4/1      NC55-MPA-1TH2H-S      1.0   MPAFPGA              CURRENT    0.53    0.53  
0/4/2      NC55-MPA-2TH-HX-S     0.1   MPAFPGA              CURRENT    0.53    0.53  
0/4        NC55-MOD-A-S          1.0   MIFPGA               CURRENT    0.13    0.13  
0/4        NC55-MOD-A-S          1.0   Bootloader           CURRENT    1.02    1.02  
0/4        NC55-MOD-A-S          1.0   DBFPGA               CURRENT    0.14    0.14  
0/4        NC55-MOD-A-S          1.0   IOFPGA               CURRENT    0.09    0.05  
0/5        NC55-18H18F           1.0   MIFPGA               CURRENT    0.03    0.03  
0/5        NC55-18H18F           1.0   Bootloader           CURRENT    1.14    1.14  
0/5        NC55-18H18F           1.0   IOFPGA               CURRENT    0.22    0.22  
0/5        NC55-18H18F           1.0   SATA                 CURRENT    5.00    5.00  
0/6/2      NC55-MPA-12T-S        0.1   MPAFPGA              CURRENT    0.27    0.27  
0/6        NC55-MOD-A-SE-S       0.201 MIFPGA               CURRENT    0.13    0.13  
0/6        NC55-MOD-A-SE-S       0.201 Bootloader           CURRENT    1.02    1.02  
0/6        NC55-MOD-A-SE-S       0.201 DBFPGA               CURRENT    0.14    0.14  
0/6        NC55-MOD-A-SE-S       0.201 IOFPGA               CURRENT    0.09    0.05  
0/7/1      NC55-MPA-12T-S        0.1   MPAFPGA              CURRENT    0.27    0.27  
0/7/2      NC55-MPA-12T-S        0.1   MPAFPGA              CURRENT    0.27    0.27  
0/7        NC55-MOD-A-S                MIFPGA               NOT READY                
0/7        NC55-MOD-A-S          0.302 Bootloader           CURRENT    1.02    1.02  
0/7        NC55-MOD-A-S          0.302 DBFPGA               CURRENT    0.14    0.14  
0/7        NC55-MOD-A-S          0.302 IOFPGA               CURRENT    0.09    0.05  
0/7        NC55-MOD-A-S          0.302 SATA                 CURRENT    5.00    5.00  
0/9        NC55-36X100G-A-SE     0.303 MIFPGA               CURRENT    0.03    0.03  
0/9        NC55-36X100G-A-SE     0.303 Bootloader           CURRENT    0.14    0.14  
0/9        NC55-36X100G-A-SE     0.303 DBFPGA               CURRENT    0.14    0.14  
0/9        NC55-36X100G-A-SE     0.303 IOFPGA               CURRENT    0.26    0.21  
0/9        NC55-36X100G-A-SE     0.303 SATA                 CURRENT    5.00    5.00  
0/13       NC55-6X200-DWDM-S     2.3   CFP2_PORT_2          NEED UPGD  5.23    5.23  
0/13       NC55-6X200-DWDM-S     0.0   DENALI0              CURRENT   13.48   13.48  
0/13       NC55-6X200-DWDM-S     0.0   DENALI1              CURRENT   13.48   13.48  
0/13       NC55-6X200-DWDM-S     0.0   DENALI2              CURRENT   13.48   13.48  
0/13       NC55-6X200-DWDM-S     0.0   MORGOTH              CURRENT    5.26    5.26  
0/13       NC55-6X200-DWDM-S     0.0   MSFPGA0              CURRENT    2.22    2.22  
0/13       NC55-6X200-DWDM-S     0.0   MSFPGA1              CURRENT    2.22    2.22  
0/13       NC55-6X200-DWDM-S     0.0   MSFPGA2              CURRENT    2.22    2.22  
0/13       NC55-6X200-DWDM-S     0.502 Bootloader           CURRENT    1.14    1.14  
0/13       NC55-6X200-DWDM-S     0.502 IOFPGA               CURRENT    0.14    0.11  
0/13       NC55-6X200-DWDM-S     0.502 SATA                 CURRENT    5.00    5.00  
0/RP0      NC55-RP-E             1.0   Bootloader           CURRENT    1.21    1.21  
0/RP0      NC55-RP-E             1.0   IOFPGA               CURRENT    0.23    0.23  
0/RP0      NC55-RP-E             1.0   OMGFPGA              CURRENT    0.48    0.48  
0/RP1      NC55-RP-E             1.0   Bootloader           CURRENT    1.21    1.21  
0/RP1      NC55-RP-E             1.0   IOFPGA               CURRENT    0.23    0.23  
0/RP1      NC55-RP-E             1.0   OMGFPGA              CURRENT    0.48    0.48  
0/FC0      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC0      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.23  
0/FC1      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC1      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.23  
0/FC2      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC2      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.23  
0/FC3      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC3      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.23  
0/FC4      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC4      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.26  
0/FC5      NC55-5516-FC          0.216 Bootloader           CURRENT    1.75    1.75  
0/FC5      NC55-5516-FC          0.216 IOFPGA               CURRENT    0.26    0.23  
0/PM3      NC55-PWR-3KW-2HV      0.2   DT-LogicMCU          CURRENT    3.01    3.01  
0/PM3      NC55-PWR-3KW-2HV      0.2   DT-PriMCU            CURRENT    3.00    3.00  
0/PM3      NC55-PWR-3KW-2HV      0.2   DT-SecMCU            CURRENT    3.01    3.01  
0/PM6      NC55-PWR-3KW-2HV      0.2   DT-LogicMCU          CURRENT    3.01    3.01  
0/PM6      NC55-PWR-3KW-2HV      0.2   DT-PriMCU            CURRENT    3.00    3.00  
0/PM6      NC55-PWR-3KW-2HV      0.2   DT-SecMCU            CURRENT    3.01    3.01  
0/SC0      NC55-SC               1.5   Bootloader           CURRENT    1.74    1.74  
0/SC0      NC55-SC               1.5   IOFPGA               CURRENT    0.10    0.10  
0/SC1      NC55-SC               1.5   Bootloader           CURRENT    1.74    1.74  
0/SC1      NC55-SC               1.5   IOFPGA               CURRENT    0.10    0.10 



Note

The FPD versions on board shipped by manufacturer may have higher versions than the FPD package integrated in the IOS XR.


Other Important Information

  • The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518.

    Here the number 1518 represents the multi-dimensional scale value.

  • The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.

  • The warning message that the smart licensing evaluation period has expired is displayed in the console every hour. There is, however, no functionality impact on the device. The issue is seen on routers that do not have the Flexible Consumption licensing model enabled. To stop the repetitive messaging, register the device with the smart licensing server and enable the Flexible Consumption model. Later load a new registration token.

    To register the device with the smart licensing server, follow the instructions provided in this link: Register and Activate Your Device.

  • NCS55A1-36H-SE-S – Under Secure Domain Router (SDR) configuration, when you change the size of the RP VM memory from 12 GB (default) to 14 GB and commit your changes, the system reloads. When the system is brought back up, it can crash with a core dump by LC XR VM.

    
    0/RP0/ADMIN0:Oct 15 12:19:30.280 : dumper[3046]: %INFRA-CALVADOS_DUMPER-6-HOST_COPY_SUCCESS : Copied host file /misc/scratch/core/default-sdr--2.20201015-191552.core.0_RP0.lxcdump.tar.lz4 to 0/RP0:/misc/disk1
    0/RP0/ADMIN0:Oct 15 12:19:30.389 : dumper[3046]: %INFRA-CALVADOS_DUMPER-6-HOST_REMV_SUCCESS : Deleted HostOS file /misc/scratch/core/default-sdr--2.20201015-191552.core.0_RP0.lxcdump.tar.lz4
    

    This is a one-time reload. Other than the additional time required for the LC XR VM to reload, there is no impact to system functionality.

    After the configuration is applied, we recommend that you reload the chassis when prompted to ensure all VMs and host OS are in sync.

  • LFA FRR feature is not supported.

Supported Modular Port Adapters

For the compatibility details of Modular Port Adapters (MPAs) on the line cards, see the datasheet of that specific line card.

Upgrading Cisco IOS XR Software

Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).

The upgrade document (NCS5500_Upgrade_Downgrade_MOP_7.0.2.pdf) is available along with the software images.

Before starting the software upgrade, use the show install health command in the admin mode. This command validates if the statuses of all relevant parameters of the system are ready for the software upgrade without interrupting the system.


Note

If you use a TAR package to upgrade from a Cisco IOS XR release prior to 7.x, the output of the show install health command in admin mode displays the following error messages:

sysadmin-vm:0_RSP0# show install health
. . .
ERROR /install_repo/gl/xr -rw-r--r--. 1 8413 floppy 3230320 Mar 14 05:45 <platform>-isis-2.2.0.0-r702.x86_64
ERROR /install_repo/gl/xr -rwxr-x---. 1 8413 165 1485781 Mar 14 06:02 <platform>-k9sec-3.1.0.0-r702.x86_64
ERROR /install_repo/gl/xr -rw-r--r--. 1 8413 floppy 345144 Mar 14 05:45 <platform>-li-1.0.0.0-r702.x86_64

You can ignore these messages and proceed with the installation operation.


Production Software Maintenance Updates (SMUs)

A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.

For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.