Network Convergence System 1002


Note

This software release has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices.



Note

Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


The Cisco Network Convergence System (NCS) 1002 is a 2-RU system that delivers fully programmable, high-bandwidth capacity (up to 250 Gbps) wavelengths over distances exceeding 3000 km using existing fiber. Powered by the industry-leading Cisco IOS XR operating system, Cisco NCS 1002 offers robust functions such as third party application hosting, machine-to-machine interface, and telemetry.

NCS 1002 delivers the following benefits:

  • Supports up to 2 Tbps capacity.

  • Transports 100, 200, or 250Gbps per wavelength on the same platform through software provisioning.

  • Transports 10 GE, 40 GE, and 100 GE on the same platform through software provisioning.

  • Supports grid-less tuning for flex-grid dense wavelength-division multiplexing (DWDM).

  • Supports different modulation formats (PM-QPSK or PM-16QAM).

  • Supports 7% or 20% Soft Decision (SD) FEC for maximum optical performance.

  • Allows for automated installation, configuration, and monitoring.

  • Supports Machine-to-machine (M2M) APIs based on YANG models for ease of configuration.

  • Supports a telemetry agent for a pub-sub model of device monitoring.

This latest release of Cisco IOS XR operating system opens up the architecture of Cisco IOS XR using a 64-bit Linux-based operating system to deliver greater agility, automation, and simplicity, while reducing the cost of operating the networks.

The innovations in this release enable incremental builds, agile workflows, and modular delivery of software, while also offering the capability to host third-party applications on Cisco routers. These innovations deliver these benefits by enabling traditional and web service providers to converge their data centers and wide area network (WAN) architectures, by making networks more programmable, and by facilitating tighter integration with popular IT configuration and management tools.

For all the versions of the Release Notes for Cisco NCS 1002, see the Release Notes URL.

Software Features Introduced in Release 6.1.2

These are the software features for the release 6.1.2.

LLDP Snoop and Drop

In Cisco NCS 1002, by default the LLDP packets that are received on the client controller are snooped and forwarded to trunk. However, if you want to drop the incoming LLDP packets at the ingress side of the client controller then you can enable the LLDP Snoop and Drop feature.

The slices must be provisioned with client and trunk rate and the status of the slice must be Provisioned for LLDP snoop and drop feature. The LLDP Drop feature with MACSEC encryption is not supported.

To configure the slices and LLDP drop on a slice or on all the slices, see the LLDP Snoop and Drop section in the Configuration Guide for Cisco NCS 1000 Series.

Alarms

The alarms that are supported in the release 6.1.2 are:
  • K9SEC_PKG_REQ
  • MKA_SESSION_START_FAIL_ON_NO_ACTIVE_PSK
  • MKA_SESSION_UNSECURED_ON_NO_ACTIVE_PSK
  • MKA_SESSION_SECURED_LOCALLY
  • NOT ABLE TO COMMUNICATE WITH PATCH-PANEL
  • PATCH-PANEL POWER REDUNDANCY LOST

To clear these alarms and to know the cause and effect, see the Alarm Troubleshooting chapter in the Troubleshooting Guide for Cisco NCS 1000 Series.

100G MACsec Performance

Frame Size Line Rate (%)
64 72.41
128 82
256 89.6
iMIX 90.57
512 94.32
1024 97.02
1518 97.95
9000 99.64

Hardware Introduced in Release 6.1.2

Breakout Patch Panel

The client ports can operate at 10G mode using an external breakout patch panel.

The benefits of using the breakout patch panel are as follows:
  • Labels are assigned to each 10G client port and MPO port. 10G client ports are labeled 0-1 0-2 0-3 0-4, 1-1, 1-2, 1-3, 1-4, and so on. MPO ports are labeled 0, 1, 2, 3, and so on.
  • Link status LED indication is provided to each 10G client port and MPO port.
The breakout patch panel can be connected to NCS 1002 using the following methods:
  • The RJ45 Ethernet port, ETH2, available in the rear side of NCS 1002, is used to connect the breakout patch panel back-to-back with NCS 1002. This port is visible as MgmtEth0/RP0/CPU0/2 in IOS XR. The user must configure the ETH2 interface to bring up the back-to-back IP network.
  • Management LAN, ETH0, can be used to connect breakout patch panel with NCS 1002. The user needs to manually bring up the patch panel using the serial port on the patch panel.

To configure breakout patch panel, see the Configuring Breakout Patch Panel chapter in the Configuration Guide for Cisco NCS 1000 Series.

Release 6.1.2 Packages for Cisco NCS 1002

Feature Set

Filename

Description

Composite Package

Cisco IOS XR Core Bundle + Manageability Package

ncs1k-mini-x.iso

Contains required core packages, including OS, Admin, Base, Forwarding, SNMP Agent, FPD, and Alarm Correlation and Netconf-yang, Telemetry, Extensible Markup Language (XML) Parser, HTTP server packages.

Individually-Installable Optional Packages

Cisco IOS XR Security Package

ncs1k-k9sec-1.0.0.0-r612.x86_64.rpm

Support for Encryption, Decryption, IP Security (IPSec), Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI).

Determine Software Version

Log in to NCS 1002 and enter the show version command:


RP/0/RP0/CPU0:ios# show version

Determine Firmware Support

Log in to NCS 1002 and enter the show hw-module fpd command:

RP/0/RP0/CPU0:ios#show hw-module fpd
Mon Nov 14 12:26:55.511 IST
FPD Versions
=================
Location Card type   HWver FPD device    ATR Status Running Programd
-----------------------------------------------------------------
0/0      NCS1002-K9   1.2  CDSP_PORT_05     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_06     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_12     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_13     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_19     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_20     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_26     CURRENT 3.65    3.65
0/0      NCS1002-K9   1.2  CDSP_PORT_27     CURRENT 3.65    3.65
0/0      NCS1002-K9        CFP2_PORT_05     NOT READY
0/0      NCS1002-K9   2.1  CFP2_PORT_06     CURRENT 5.21    5.21
0/0      NCS1002-K9        CFP2_PORT_12     NOT READY
0/0      NCS1002-K9   2.1  CFP2_PORT_13     CURRENT 5.21    5.21
0/0      NCS1002-K9        CFP2_PORT_19     NOT READY
0/0      NCS1002-K9   2.0  CFP2_PORT_20     CURRENT 5.21    5.21
0/0      NCS1002-K9        CFP2_PORT_26     NOT READY
0/0      NCS1002-K9   0.0  CFP2_PORT_27     CURRENT 5.21    5.21
0/0      NCS1002-K9   0.1  CTRL_BKP_LOW B   CURRENT 2.23
0/0      NCS1002-K9   0.1  CTRL_BKP_UP B    CURRENT 2.23
0/0      NCS1002-K9   0.1  CTRL_FPGA_LOW    CURRENT 2.23    2.23
0/0      NCS1002-K9   0.1  CTRL_FPGA_UP     CURRENT 2.23    2.23
0/RP0    NCS1K-CNTLR  0.1 BIOS_Backup BS    CURRENT 13.10
0/RP0    NCS1K-CNTLR  0.1 BIOS_Primary S    CURRENT 13.40   13.40
0/RP0    NCS1K-CNTLR  0.1 Daisy_Duke_BKP BS CURRENT 0.15
0/RP0    NCS1K-CNTLR  0.1 Daisy_Duke_FPGA S CURRENT 0.15    0.15
0/PM0    NCS1K-2KW-AC 0.0 PO-PriMCU         CURRENT 4.00    4.00
0/PM1    NCS1K-2KW-AC 0.0 PO-PriMCU         CURRENT 4.00    4.00
 

The above show output lists the hardware components that are supported in current release with their status. The status of the hardware must be CURRENT; Running and Programd version must be similar.

Open Caveats for NCS 1002

Caveat ID Number

Description

CSCvb69410

NCS1002: Etna ID 3 gets removed from PCI tree when box was up after 11 hours.

CSCvb86373

NCS1002: SNT - Sync loss alarm is seen: Signal is not present in QSFP.

CSCvb87983

NCS1002: Stress:100G(Client-Fec: Enabled)P2P Loss of Sync Flapping after slice was successfully configured.

CSCvb91293

Patch panel optics LED flaps after eth2 interface is up.

CSCvb93629

NCS1002: SNT: FCS and Jabber Errors: CDR shows BIP errors in one virtual lane.

CSCvb96465

On re-provisioning slice, Tx power drops to -40db to ASR9K on one lane.

CSCvb96573

SIT-R612: Pluggable OIR of LR4 Finisar, Innolight in a daisy chain topology leads to FCS errors.

CSCvc00870

Inventory list of patch-panel device is not supported.

CSCvc00907

Delay in LED synchronization.

CSCvb88020

Few packets sneaks in while injecting continuous FCS error packets after nomacsec/macsec.

CSCvb86037

Macsec_ea process restart is resulting in traffic drop with R612- 10i image.

CSCvb89517

pkt dropped is observed in RFC 2544 throughput test with encrypt slice (low occurance).

CSCuz10355

After performing remove and reinstall of K9sec, hw-module CLI does not respond.

CSCuz29936

MACsec controllers are missing after deactivating k9sec pkg(impacts traffic) .

CSCva16280

mxp_dpfpga messages are logged in syslog which needs to be removed.

CSCva75887

Traffic drops after continuous injection of 2^32 FCS errored packets.

CSCvb03295

Bucketized MACSec PM counters are supported.

CSCvb03160

SNMP mibs are supported.

CSCvb88020

4 AN is not supported.

CSCuz99340

Trunk loopbacks are not supported with MACsec.

CSCva21503

Macsec_mka / mxp_driver process restart on both the peers simultaneously might result in traffic drop.

CSCvb03317

Upgrade to Control Plane FPGA leads to traffic impact.

CSCvc00441

SIT-R612: FCS errors are observed post power cycle upon Source Photonics daisy chain setup.

CSCvc04164

Upgrade ROSCO box from R6.1.2 11I to R 6.1.2 with ETNA changes.

CSCvb90988

LF alarm propagation upon PSM Switch over.

CSCvb87218

CPU OIR leads to CNTRL-FPGA removal from PCI tree and traffic hit. Slice stuck at provision fails even after PCI RESCAN.

CSCva18345

Install verify CLI shows some anomaly errors.

CSCuz68223

TTI Alarms are reported as service affecting.

CSCvc08364

Shut of coherentDSP is not clearing neighbor information.

CSCvc24753

NCS1002: Stress: MXP driver crashes while performing "No hw-module slice" command, P2P, Squelch enabled.

CSCvd87560

Device is stuck on RP0 reload after BIOS_Primary upgrade in R6.1.2 SMU testing.