Release Notes for Cisco ESR6300 Routers, Release 17.18.x

Available Languages

Download Options

  • PDF
    (353.0 KB)
    View with Adobe Reader on a variety of devices
Updated:December 18, 2025

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (353.0 KB)
    View with Adobe Reader on a variety of devices
Updated:December 18, 2025
 

Cisco ESR6300 Embedded Series Router, IOS-XE Release 17.18.x. 3

New software features. 3

IOS-XE 17.18.2. 3

IOS-XE 17.18.1a. 4

New hardware features. 4

IOS-XE 17.18.2. 4

IOS-XE 17.18.1a. 4

Change in behavior 5

Resolved issues. 5

Open issues. 5

Known issues. 5

Compatibility. 6

Supported software packages. 7

Related resources. 7

Legal information. 9

 


 

Cisco ESR6300 Embedded Series Router, IOS-XE Release 17.18.x

This release notes document provides information about the new features, resolved and open issues, supported software packages and information on how to obtain support and documentation.

New software features

IOS-XE 17.18.2

Table 1.             New software features for Cisco ESR6300 Embedded Series Router, Release IOS-XE 17.18.2

Product Impact

Feature          

Description

Security

Resilient Infrastructure

Starting with the Cisco IOS-XE 17.18.2 release and in future releases, Cisco software will display warning messages when configuring features or protocols that do not provide sufficient security such as those transmitting sensitive data without encryption or using outdated encryption mechanisms. Warnings will also appear when security best practices are not followed, along with suggestions for secure alternatives. This list is subject to change, but the following is a list of features and protocols that are planned to generate warnings in releases beyond the version Cisco IOS-XE 17.18.1. Release notes for each release will describe exact changes for that release:

Plain-text and weak credential storage: Type 0 (plain text), 5 (MD5), or 7 (Vigenère cipher) in configuration files.

Recommendation: Use Type 6 (AES) for reversible credentials, and Type 8 (PBKDF2-SHA-256) or Type 9 (Scrypt) for non-reversible credentials.

SSHv1

 Recommendation: Use SSHv2.

SNMPv1 and SNMPv2, or SNMPv3 without authentication and encryption

Recommendation: Use SNMPv3 with authentication and encryption (authPriv).

MD5 (authentication) and 3DES (encryption) in SNMPv3

Recommendation: Use SHA1 or, preferably, SHA2 for authentication, and AES for encryption.

IP source routing based on IP header options

Recommendation: Do not use this legacy feature.

TLS 1.0 and TLS 1.1

Recommendation: Use TLS 1.2 or later.

TLS ciphers using SHA1 for digital signatures

Recommendation: Use ciphers with SHA256 or stronger digital signatures.

● HTTP

Recommendation: Use HTTPS.

 ● Telnet

Recommendation: Use SSH for remote access.

FTP and TFTP

Recommendation: Use SFTP or HTTPS for file transfers.

On-Demand Routing (ODR)

Recommendation: Use a standard routing protocol in place of CDP-based routing information exchange.

BootP server

Recommendation: Use DHCP or secure boot features such as Secure ZTP.

 ● TCP and UDP small servers (echo, chargen, discard, daytime)

Recommendation: Do not use these services on network devices.

 ● IP finger

Recommendation: Do not use this protocol on network devices.

NTP control messages

Recommendation: Do not use this feature.

TACACS+ using pre-shared keys and MD5

Recommendation: Use TACACS+ over TLS 1.3, introduced in release Cisco IOS-XE 17.18.1

Ease of Use

Common HSEC

You can now manage HSEC licenses for your IR platforms using the same common DNA HSEC entitlement as Enterprise Network (EN) platforms with the Common HSEC License feature. Previously, Cisco Industrial Routers used device-specific HSEC licenses, which prevented direct installation and management through Cisco SD-WAN (vManage). This enhancement streamlines license management for your IR devices within an SD-WAN environment.

 

IOS-XE 17.18.1a

There are no new features introduced in 17.18.1a release.

New hardware features

IOS-XE 17.18.2

Table 2.             New hardware feature for Cisco ESR6300 Embedded Series Router, Release 17.18.2

Product Impact

Feature          

Description

Higher performance

P-5GS6-R16SA-GL support

The P-5GS6-R16SA-GL Pluggable Module is supported on ESR6300 routers.

 

IOS-XE 17.18.1a

There are no new features introduced in 17.18.1a release.

Change in behavior

There are no behavior changes in this release.

Resolved issues

You can also access the resolved caveats for this release through the Cisco Bug Search Tool.

Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool.

This table lists the resolved issues in this specific software release.

Table 3.        Resolved issues for Cisco ESR6300 Router, Release 17.18.2

Bug ID

Description

CSCwr59377

Xchange6300: USB0 port not detected

 

Table 4.        Resolved issues for Cisco ESR6300 Router, Release 17.18.1a

Bug ID

Description

CSCwo24897

ESR6300 with SLR does not install 2G or uncapped license after reload.

CSCwn52402

In the platform, ESR-6300-NCP-K9, we may lose the configuration after removing the SLA trustpoint.

Open issues

There are no open issues in this release.

Known issues

This table lists the limitations for this release.

Table 5.             Known issues for Cisco ESR6300 Router, Release 17.18.1a

Product Impact

Description

Smart Licensing Using Policy

Starting with Cisco IOS-XE 17.6.1, Smart Licensing Using Policy has changed how device information is displayed. When you configure a hostname for a product instance or device, only the Unique Device Identifier (UDI) is shown. The hostname is no longer displayed in licensing utilities and user interfaces as it was in previous releases. This change does not affect any licensing functionality, and there is no workaround for this limitation.

The licensing utilities and user interfaces affected by this change are:

●  Cisco Smart Software Manager (CSSM)
●  Cisco Smart License Utility (CSLU)
●  Smart Software Manager On-Prem (SSM On-Prem)

Example of revised content:
If you previously saw the device hostname in CSSM, you will now only see the UDI after upgrading to Cisco IOS-XE 17.6.1 or later.

Note: This is a display change only and does not impact license operations or activation.

Compatibility

This section lists compatibility information on Cellular Module Modem Firmware, OEM/PRI and it lists the latest modem firmware available for each of the modems used by the Cisco IoT routers. See the Cisco Firmware Upgrade Guide for 4G LTE and 5G Cellular Modems for upgrade instructions.

Cisco IOS-XE updates do not automatically update modem firmware. You should manually check and update all modems to the latest firmware version, including any related PRI and/or OEMPRI components. Refer to the following table for the most up-to-date information.

Table 6.             Cellular Module Modem Firmware for Cisco ESR 6300 Router, Release 17.18.1a

Cellular Module

Modem
and
Firmware version

Software download link

P-LTE-MNA

WP7610

02.37.03.05

 https://software.cisco.com/download/home/286324942/type

P-LTE-LA

EM7430

2.38.00.00

Generic:

https://software.cisco.com/download/home/286308413/type

Australia Telstra:

https://software.cisco.com/download/home/286311403/type

Japan:

https://software.cisco.com/download/home/286311416/type

P-LTEA-EA

EM7455

02.37.0x.00

Generic:

https://software.cisco.com/download/home/286308426/type

Europe:

https://software.cisco.com/download/home/286308426/type

Canada:

https://software.cisco.com/download/home/286319713/type

North America ATT:

https://software.cisco.com/download/home/286311442/type

North American Sprint:

https://software.cisco.com/download/home/286311455/type

North America Verizon:

https://software.cisco.com/download/home/286311429/type

P-LTEAP18-GL

LM960

32.00.1x9

Generic:

https://software.cisco.com/download/home/286324996/type

North America:

https://software.cisco.com/download/home/286324947/type

P-5GS6-GL

FN980

38.03.0202

https://software.cisco.com/download/home/286329300/type/

 

Supported software packages

This section provides information about the release packages associated with Cisco ESR6300 Router.

For latest software downloads, see the Software Download page.

Table 7.             Software packages for Cisco ESR6300 Router, Release 17.18.1a

Image type

Filename

Universal

c6300-universalk9.17.18.01.SPA.bin

Related resources

Table 8.             Related resources

Document

Description

Cisco IOS-XE

Provides products supported by Cisco IOS-XE.

Cisco ESR6300 Embedded Series Router

Cisco Industrial Routers and Industrial Wireless Access Points Antenna Guide

Cisco IOS-XE 17.x

Cisco SD-WAN

Cisco IoT Field Network Director

Cisco Industrial Network Director

Cisco IoT Operations Dashboard

Provides documentation for the specified routers.

Cisco Industrial IoT Licensing page

Provides information about Smart Licensing Using Policy solutions and their deployment on Cisco IOS-XE routers.

Cisco Support

You can submit a service request here

Cisco TAC

Provides most up-to-date detailed troubleshooting information.

Cisco Feature Navigator

Use CFN to browse Cisco products and find relevant features and licenses. allows you to compare platforms, determine common features between products, and identify unique product features. The CFN also has a tab that provides a MIB Locator.


 

Legal information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2025 Cisco Systems, Inc. All rights reserved.

 

Learn more