Note


Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


Software and Hardware Requirements

Before the user begins to install the software, check whether the system meets the following minimum software and hardware requirements:

  • Hardware—Intel Core i5, i7, or faster processor. A minimum of 4 GB RAM, 100 GB hard disk with 250 MB of available hard drive space

  • Operating System—Windows 10; macOS Mojave (10.14) and later

  • Java Runtime Environment—JRE 1.8 and later

  • Java version—8.0

  • Browsers—Mozilla Firefox 71 and later; Google Chrome 78.0 and later

What's New in NCS 2000 Series, Release 12.1

This section highlights the new features in Release 12.1.

Software Features

Node Functional View

The NFV (Node Functional View) provides you with a display of the components and the association links between them in a Graphical view. The graphical representation allows you to understand the connections and also guides you to troubleshoot.

There are three views in the NFV representation:

  • Physical view: Displays a physical representation of the node with the rack and all the cards inside.

  • Map view: Displays a map representation of the node in terms of components (sides, line cards, optical modules, circuits, ports, or patch cords). The components are connected to each other using patch cords, according to the physical connections.

  • Detail view: Displays all the relevant information about the node, side, card, circuit, port, or patch cord depending on the context in the map view.

See Node Functional View.

Support for RADIUS or TACACS-based Authentication

NCS 2000 Release 12.1 Nodal Craft supports RADIUS or TACACS mode of external authentication. You should have SVO instances with RADIUS and TACACS IP addresses in the Cisco Secure ACS server. Ensure that you enable and use either RADIUS or TACACS authentication method at a time. You can add a maximum of up to ten servers for each of RADIUS or TACACS on SVO.

See Manage External Authentication.

Single Sign On for Evolved Programmable Network Manager

NCS 2000 Release 12.1 Nodal Craft allows you to configure Single Sign On (SSO) capability from EPNM. This allows you to redirect from EPNM to SVO without additional sign-on request. For example, if you have a specific alarm present in EPNM and when you click that alarm from EPNM, you can directly navigate to that specific alarm page or global alarm page of SVO. Ensure that the EPNM is configured for SVO navigation pages and SSO is enabled on SVO.

See Log into the SVO Web Interface Using EPNM.

Cisco SVO Admin Plane

Cisco SVO admin plane is responsible for turning up the shelf virtualization orchestration services for the network elements (NE). It is a web user interface that facilitates the installation of the SVO software and configures the NE instances and orchestrates high availability (HA) services.

The admin plane is supported both on the external server and the SVO card. The admin plane allows you to create, update, manage, and delete SVO NE instances.

See Cisco SVO Admin Plane.

IPv6 Support

External server solution supports IPv6 along with IPv4. You can configure IPv6 or IPv4 independently for the three networks (Management, HA, and Devices) during external server installation.

See Cisco SVO Admin Plane Overview.

Alarm Suppression on ECU MSM Ports

NCS 2000 Release 12.1 Nodal Craft allows you to suppress the alarms on the MSM ports of ECU. It allows you to verify the alarm suppression settings on the ECU.

See Suppress ECU Multishelf Ports Alarm.

External Switch as a Device

NCS 2000 Release 12.1 Nodal Craft allows you to add an external switch as a device to a ROADM instance. The external switch can be configured with the respective IP settings. A maximum of two switches can be added for each SVO ROADM instance.

See Configure External Switch.

Alarms

The following alarms are added.

  • ENC-CERT-EXP

  • PEER-CSF

  • TRUNK-PAYLOAD-MISM

See Alarms.

Hardware Features

100GE-FR QSFP28 Pluggable Support on 400G-XP-LC Card

QSFP-100G-FR-S pluggable is supported on the 400G-XP-LC card. This pluggable supports only the 100GE interface.

See PPM Compatibility by Card.

NCS1K-MD-64-C

A new passive optical multiplexer and de-multiplexer module, NCS1K-MD-64-C, is introduced. The new optical module is based on Athermal Wave Guide (AWG) providing 64 channels at 75-GHz space covering the extended C-band of optical spectrum. The passive module allows you to transmit 400G ZR and 400G ZR+ wavelengths.

See Installing the NCS1K-MD-64-C Module.

Caveats

Open Caveats

The following table lists the open caveats:

Caveat ID Number

Description

CSCvv98154

Missing SVO Address or SW Version value in exported file.

CSCvw09748

Task \"tCORBA\" - INIT - slot TNC-1 - cold start - S/W VER 12.10-020J-13.16-S-SPA.

CSCvw39006

SVO Active-Standby files synchronization broken in case of JVM Out of Memory.

CSCvw46166

Error on SMR20 and SMR9 aggregate Power EXP-TX value.

CSCvw58833

NFV circuit associated to wrong Omnidir.

CSCvw61416

Card border not reflecting the correct status in rack/chassis views.

CSCvw61489

USBSYNC clear alarm not detected at netconf-console listening ncs-alarms events.

CSCvw61508

WebUI failed to notify ncs2k sw-download status and alarms after ncs2k sw-activate.

CSCvw62578

ROLE-SWITCH-ACTIVE alarm does not contain some fields.

CSCvw63200

Issue while changing IPv4 and IPv6 at same time.

CSCvw63282

SVO running at UCS show MEM-LOW alarm with PID = NCS2K-SVO-K9.

CSCvw64629

Popup is enabled automatically after adding card, delete card.

CSCvw65095

Popup is not disabled for properties while provisioning passive device and admin state for changing

CSCvw67776

HA setup with external switch need to follow strictly the bring-up procedure else does not work.

CSCvw70929

TNCS-O SVG showing TNC SVG for real card

Bug Search Tool

Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.

Other Important Information and References

Supported Upgrade Paths

The following software releases can be upgraded to R12.1

  • R10.7.0.2

  • R10.9.0.1

  • R11.1.1.2