Release Notes for Cisco Catalyst IR1101, IR1800, IR8140, and IR8340 Routers, Release 17.18.1a

Available Languages

Download Options

  • PDF
    (584.8 KB)
    View with Adobe Reader on a variety of devices
Updated:September 1, 2025

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (584.8 KB)
    View with Adobe Reader on a variety of devices
Updated:September 1, 2025
 

Cisco Catalyst Rugged Series Routers, IOS XE Release 17.18.1a. 3

New software features. 3

New hardware features. 4

Change in behavior 4

Resolved issues. 6

Open issues. 7

Known issues. 7

Compatibility. 8

Supported software packages. 10

Related resources. 11

Legal information. 13

 


 

Cisco Catalyst Rugged Series Routers, IOS XE Release 17.18.1a

Cisco IOS XE Release 17.18.1a introduces new features and hardware for the Cisco Catalyst Rugged Series Routers. Key features include networking and interface capabilities using IRM-1100-4S8I Expansion Module for IR1101 routers, support for jumbo frames on the IRM-1100-4S8I Expansion Module, IP Device Tracking on routers, and VRF for the P-LTE-450 module.

New software features

This section provides a brief description of the new software features introduced in this release.

Table 1.             New software features for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Product Impact

Feature          

Description

Ease of Use

IRM-1100-4S8I Expansion Module

You can now enhance your IR1101 router's networking capabilities by enabling additional connectivity and I/O options with the newly introduced the IRM-1100-4S8I Expansion Module. This module adds four SFP ports and eight Digital I/O connections, providing greater flexibility for your network deployments.

Supported device: IR1101

 Ease of Use

Support for jumbo frames

You can now improve your network efficiency and optimize bandwidth usage by enabling support for jumbo frames on the IRM-1100-4S8I Expansion Module. This feature allows MTU sizes of up to 9216 bytes, facilitating larger data transfers and reducing overhead.

Supported device: IR1101

Software Reliability

IP Device Tracking on routers

You can now enhance your network security and monitoring capabilities by enabling IP Device Tracking with SISF support on LAN ports. This allows for comprehensive IPv4 device monitoring and improved security posture through integrated device tracking.

Supported devices: IR1101 and IR1800

Ease of Use

VRF for the P-LTE-450 module

You can now enable VRF to provision LTE450 parameters through the LTE450 management interface. You can also enable VRF on 450 PIM management interface to enable HTTP request from router to the webserver of P-LTE-450 and get response from the webserver of P-LTE-450.

Supported devices: IR1101 and IR1800 (For IR1800, P-LTE-450 is supported only on slot 0/4.)

Ease of Use

Product Analytics

Cisco IOS XE Product Analytics collects device Systems Information for the purposes of understanding product usage, enabling product improvements and product development, and assisting in product adoption and sales support. Only summarized data of feature usage and statistical counters of configuration are collected. No personal identifiable information, such as MAC/IP addresses, usernames, custom configuration names, or user provided strings, are collected as part of Cisco IOS XE Product Analytics. Cisco processes this data following the General Terms, the Cisco Privacy Statement, and any other applicable agreement with Cisco.

See Cisco Enterprise Networking Product Analytics Frequently Asked Questions.

Ease of Use

Inline Tagging on switch interfaces

You can now implement CTS Inline Tagging to enable end-to-end Cisco TrustSec architecture without the complexity and scalability challenges of SXP peering, ensuring that the CMD header in Ethernet frames is carried through to the network security enforcement point.

Supported devices: IR1101 and IR1800

Ease of Use

Ignition Power management

From Cisco IOS XE 17.18.1a release, Ignition Power Management is supported for Catalyst IR1800 Rugged Series Routers, which delivers intelligent power management to SD-Routing devices in vehicle deployments. 

This feature keeps the router powered and connected when the vehicle’s engine is running and automatically shuts it down to prevent battery drain when the ignition is off. You can easily set how long the router stays powered after the engine stops, thereby ensuring continuous connectivity when needed and efficient battery use when the vehicle is parked.

Supported devices: IR1800

Ease of Use

Raw Socket transport

Raw Socket transport is a method to stream characters from one serial interface to another over an IP network using TCP or UDP as the encapsulation method. Raw sockets allow applications to bypass the standard TCP/IP stack and interact directly with the network layer (Layer 3) and the data link layer (Layer 2), therefore helping network traffic to be analyzed at a granular level.

In Cisco IOS XE Release 17.18.1a, you can configure Raw Socket transport using Feature Parcels in Cisco SD-WAN Manager without configuring and managing multiple commands

Supported devices: IR1100, IR1800, IR8300

Ease of Use

Configure cellular band select for cellular interfaces on SD-Routing devices

You can select specific frequency bands to which the device can connect to, allowing optimized connection depending on location and network availability. This configuration can be done using Feature Parcels in Cisco Catalyst SD-WAN Manager.

Supported devices: IR1100, IR1800, IR8140, IR8300

Ease of Use

Configure logging of crash dump events for cellular interfaces on SD-Routing devices

You can configure the device to collect the crash dump logs by enabling the boot-and-hold mode on the device using the LTE modem crash-action boot-and-hold command.

Supported devices: IR1100, IR1800, IR8140, IR8300

Ease of Use

Enable diagnostic monitoring for SD-Routing devices

You can enable diagnostic monitoring log capture for devices with cellular interfaces using Catalyst Cisco SD-WAN Manager. 

Supported devices: IR1100, IR1800, IR8140, IR8300

New hardware features

This section provides a brief description of the new hardware features introduced in this release.

Table 2.             New hardware features for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Product Impact

Feature          

Description

 Ease of Use

IRM-1100-4S8I Expansion Module

Cisco IOS XE Release 17.18.1a introduces the IRM-1100-4S8I Expansion Module for IR1101 routers, adding four SFP ports and eight Digital IO connections for enhanced networking capabilities.

Supported device: IR1101

Change in behavior

There are no behavior changes in this release.

Notice of upcoming changes in the Cisco IOS XE 17.18.2 release and beyond

Cisco is committed to safeguarding our products and customer networks against increasingly sophisticated threat actors. As computing power and the threat landscape have evolved, some features and protocols currently in use have become vulnerable to attack. While more secure alternatives are now available, legacy protocols may still be in use in some environments.

To improve network security, reduce the attack surface, and protect sensitive data, Cisco will begin phasing out legacy and insecure features and protocols, encouraging customers to transition to more secure alternatives. This process will be gradual and designed to minimize operational impact. The first phase begins with the Cisco IOS XE 17.18 release train. This is part of a broader initiative to make Cisco products more secure by default and secure by design.

Starting with the Cisco IOS XE 17.18.2 release and in future releases, Cisco software displays warning messages when configuring features or protocols that do not provide sufficient security such as those transmitting sensitive data without encryption or using outdated encryption mechanisms. Warnings also appear when security best practices are not followed, along with suggestions for secure alternatives.

This list is subject to change, but the following is a list of features and protocols that generates warnings in releases beyond the version Cisco IOS XE 17.18.1a. Release notes for each release describes the exact changes for that release.

●     Plain-text and weak credential storage: Type 0 (plain text), 5 (MD5), or 7 (Vigenère cipher) in configuration files. Recommendation: Use Type 6 (AES) for reversible credentials, and Type 8 (PBKDF2-SHA-256) or Type 9 (Scrypt) for non-reversible credentials.

●     SSHv1
Recommendation: Use SSHv2.

●     SNMPv1 and SNMPv2, or SNMPv3 without authentication and encryption
Recommendation: Use SNMPv3 with authentication and encryption (authPriv).

●     MD5 (authentication) and 3DES (encryption) in SNMPv3
Recommendation: Use SHA1 or, preferably, SHA2 for authentication, and AES for encryption.

●     IP source routing based on IP header options
Recommendation: Do not use this legacy feature.

●     TLS 1.0 and TLS 1.1
Recommendation: Use TLS 1.2 or later.

●     TLS ciphers using SHA1 for digital signatures
Recommendation: Use ciphers with SHA256 or stronger digital signatures.

●     HTTP
Recommendation: Use HTTPS.
Note: HTTP SCEP config will still be supported.

●     Telnet
Recommendation: Use SSH for remote access.

●     FTP and TFTP
Recommendation: Use SFTP or HTTPS for file transfers.

●     On-Demand Routing (ODR)
Recommendation: Use a standard routing protocol in place of CDP-based routing information exchange.

●     BootP server
Recommendation: Use DHCP or secure boot features such as Secure ZTP.

●     TCP and UDP small servers (echo, chargen, discard, daytime)
Recommendation: Do not use these services on network devices.

●     IP finger
Recommendation: Do not use this protocol on network devices.

●     NTP control messages
Recommendation: Do not use this feature.

●     TACACS+ using pre-shared keys and MD5
Recommendation: Use TACACS+ over TLS 1.3, introduced in release Cisco IOS XE 17.18.1.

Cisco is committed to supporting customers through this transition. Subsequent releases in the Cisco IOS XE 17.18 train continues to support these features but displays warnings if they are used. Future release trains may impose additional restrictions on these features which will be communicated through release notes.

Resolved issues

You can also access the resolved caveats for this release through the Cisco Bug Search Tool.

This table lists the resolved issues in this specific software release.

Note:

●     This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool.

●     To search for a documented Cisco product issue, type in the browser: <bug number> in Cisco.com

Table 3.        Resolved issues for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Bug ID

Description

CSCwn60186

IR8340 / XE 17.9 / onboard G0/0/0 RJ45 WAN port flaps when removing "media-type rj45" config

 CSCwn80507

Traceback followed by CPUHOG observed when IRM-GNSS-ADR VID: V20 is inserted into IR1833 router

 CSCwn98622

Hardware removal & insertion SNMP traps received after soft reload-Misleading router actual activity

CSCwo91346

IR1101 WANMON failing to reach level 2 recovery

 CSCwo31561

"Error in showing license Information" when "show license rum id all" is executed

CSCwm92704

8340 & 9320 redbox forwarding multiple primary announce messages to SAN

 CSCwp00808

IRM-NIM-RS232 module Serial interface stops transmitting TCP raw socket traffic

 CSCwp13058

Unintended BBU fw upgrade when miscommunication occurs between IOS and BBU fw

 CSCwo73978

Disappearance of band selection configuration from cellular controller after a router reload

Open issues

You can also access the open caveats for this release through the Cisco Bug Search Tool.

This table lists the open issues in this specific software release.

Note:

●     This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool.

●     To search for a documented Cisco product issue, type in the browser: <bug number> in Cisco.com

Table 4.             Open issues for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Product Impact

Description

 CSCwp90680

IR1101 not completing ARP for Emerson FB-3000

Known issues

This table lists the limitations for this release. Click the bug ID to access the Cisco Bug Search Tool and see additional information

Table 5.             Known issues for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Product Impact

Feature          

Description

Smart Licensing Using Policy

IRM-1100-4S8I Expansion Module

Starting with Cisco IOS XE 17.6.1, Smart Licensing Using Policy has changed how device information is displayed. When you configure a hostname for a product instance or device, only the Unique Device Identifier (UDI) is shown. The hostname is no longer displayed in licensing utilities and user interfaces as it was in previous releases. This change does not affect any licensing functionality, and there is no workaround for this limitation.

The licensing utilities and user interfaces affected by this change are:

●  Cisco Smart Software Manager (CSSM)
●  Cisco Smart License Utility (CSLU)
●  Smart Software Manager On-Prem (SSM On-Prem)

Example of revised content:
If you previously saw the device hostname in CSSM, you will now only see the UDI after upgrading to Cisco IOS XE 17.6.1 or later.

Note: This is a display change only and does not impact license operations or activation.

 VLAN-Aware Interoperability Limitations on IR1101

Support for jumbo frames

VLAN-aware interoperability with devices from other vendors is not supported on the Cisco IR1101 platform.

Standalone MAC Authentication Bypass Limitation

IP Device Tracking on routers

Standalone MAC Authentication Bypass (MAB) is an authentication method that grants network access to specific MAC addresses, regardless of 802.1X capability or credentials. On the IR1100 platform, the device may crash when both IPsec and MACsec traffic occur concurrently between the device and the client.

SSH Algorithms for Common Criteria Certification Limitation

Key Exchange and MAC algorithms

Starting from Cisco IOS XE Release 17.10, the following Key Exchange and MAC algorithms are removed from the default list:

●  Key Exchange algorithm:

    diffie-hellman-group14-sha1

●  MAC algorithms:

    hmac-sha1

    hmac-sha2-256

    hmac-sha2-512

Note: You can use the ip ssh server algorithm kex command to configure the Key Exchange algorithm and the ip ssh server algorithm mac command to configure the MAC algorithms.

 

Table 6.             Additional details on MAB Catalyst

Details

Affected release          

Resolved release

MAB/Dot1x may not work if the global type-6 encryption setting is enabled.

If users still want to use MAB/Dot1x, they should disable the type-6 encryption and enable type-7 encryption.

 

17.4.x

17.5.x

17.6.1

17.6.2

17.7.1

17.3.5

Fixed in these future releases:

17.6.3

17.7.2

17.8.1 and later.

Due to a hardware limitation, the dACL and device-tracking features are not supported on Cisco Catalyst IR1101 Rugged Series Routers. However, dACL is supported on Cisco Catalyst IR1800 Rugged Series Routers.
Therefore, features such as MAB and 802.1X should not be used with optional dACL or device-tracking enabled on the IR1101 platform.

Occurs in all releases

Hardware limitation, no software fix available.in these future releases:

 

Compatibility

This section lists compatibility information on Cellular Module Modem Firmware, OEM/PRI and it lists the latest modem firmware available for each of the modems used by the Cisco IoT routers. See the Cisco Firmware Upgrade Guide for 4G LTE and 5G Cellular Modems for upgrade instructions.

Cisco IOS XE updates do not automatically update modem firmware. You should manually check and update all modems to the latest firmware version, including any related PRI and/or OEMPRI components. Refer to the following table for the most up-to-date information.

Table 7.             Cellular Module Modem Firmware

Cellular Module

Modem
and
Firmware version

Software download link

P-5GS6-GL

FN980

38.03.0202

https://software.cisco.com/download/home/286329300/type/

P-LTEAP18-GL IRMH-LTEAP18-GL

LM960

32.00.1x9

Generic:

https://software.cisco.com/download/home/286324996/type

North America:

https://software.cisco.com/download/home/286324947/type 

P-LTEA-EA IRMH-LTEA-EA

EM7455

02.39.00.00

Generic:

https://software.cisco.com/download/home/286308426/type

Europe:

https://software.cisco.com/download/home/286308426/type

Canada:

https://software.cisco.com/download/home/286319713/type

North America ATT:

https://software.cisco.com/download/home/286311442/type

North American Sprint:

https://software.cisco.com/download/home/286311455/type

North America Verizon:

https://software.cisco.com/download/home/286311429/type

P-LTEA-LA IRMH-LTEA-LA

EM7430

02.38.00.00

Generic:

https://software.cisco.com/download/home/286308413/type

Australia Telstra:

https://software.cisco.com/download/home/286311403/type

Japan:

https://software.cisco.com/download/home/286311416/type

P-LTE-VZW

WP7601

02.37.0x.00

https://software.cisco.com/download/home/286322139/type

P-LTE-US

WP7603

02.37.0x.00

https://software.cisco.com/download/home/286322143/type

P-LTE-JN

WP7605

02.28.03

https://software.cisco.com/download/home/286322156/type

P-LTE-GB

WP7607

02.37.03.05

https://software.cisco.com/download/home/286322147/type

P-LTE-IN

WP7608

02.28.03

https://software.cisco.com/download/home/286322152/type

P-LTE-AU

WP7609

02.28.03

https://software.cisco.com/download/home/286323720/type

P-LTE-MNA

WP7610

02.37.0x.0x

https://software.cisco.com/download/home/286324942/type

P-LTEA7-NA

EM7411

01.14.22.00

https://software.cisco.com/download/home/286333933/type

P-LTEA7-EAL

EM7421

01.14.22.00

https://software.cisco.com/download/home/286333937/type

P-LTEA7-JP

EM7431

01.14.22.00

https://software.cisco.com/download/home/286333939/type

P-5GS6-R16SA-GL

EM9293

02.17.08.00

https://software.cisco.com/download/home/286334597/type

P-LTE-450

Not applicable

v1.3.0

Contact Intelliport for the software download link (info@intelliport.hu)

Supported software packages

This section provides information about the release packages associated with Cisco Catalyst Rugged Series Routers.

For latest software downloads, see the Software Download page.

Table 8.             Software packages for Cisco Catalyst Rugged Series Routers, Release 17.18.1a

Router

Image type

Filename

IR1101

Universal

ir1101-universalk9.17.18.01a.SPA.bin

NPE

ir1101-universalk9_npe.17.18.01a.SPA.bin

IR1800

Universal

ir1800-universalk9.17.18.01a.SPA.bin

NPE

ir1800-universalk9_npe.17.18.01a.SPA.bin

IR8100

Universal

Ir8100-universalk9.17.18.01a.SPA.bin

NPE

Ir8100-universalk9_npe.17.18.01a.SPA.bin

IR8340

 

Universal

Ir8340-universalk9.17.18.01a.SPA.bin

NPE

Ir8340-universalk9_npe.17.18.01a.SPA.bin

UTD Engine for Cisco IR8340

secapp-utd.17.18.01a.1.0.4_SV3.3.5.0_XE17.18.x86_64.tar

Related resources

Table 9.             Related resources

Document

Description

Cisco IOS XE

Provides products supported by Cisco IOS XE.

Cisco Catalyst IR1101 Rugged Series Router

Cisco Catalyst IR1800 Rugged Series Router

Cisco Catalyst IR8140 Heavy Duty Series Router

Cisco Catalyst IR8340 Rugged Series Router

Provides data sheet for the specified routers.

Cisco Industrial Routers and Industrial Wireless Access Points Antenna Guide

Provides descriptions and installation instructions for wireless antennas supported on the Cisco Industrial Series Routers and Industrial Wireless Access Points.

Cisco IOS XE 17.x

Provides information about Cisco IOS XE 17.x releases and ordering details.

Cisco SD-WAN

Provides information about SD-WAN releases and resources.

Cisco IoT Field Network Director

Provides information about Cisco IoT Field Network Director releases and resources.

Cisco Industrial Network Director

Provides information about Cisco Industrial Network Director releases and resources.

Cisco IoT Operations Dashboard

Provides information about Cisco IoT Operations Dashboard releases and resources.

Smart Licensing Using Policy on the Cisco Catalyst IR1101, IR1800, IR8140, and IR8340 Routers 

or the 

Cisco Industrial IoT Licensing

Provides information about Smart Licensing Using Policy solutions and their deployment on IOS XE routers.

Cisco Support

You can submit a service request here.

 Cisco TAC

Provides most up-to-date detailed troubleshooting information.

Cisco Feature Navigator

Use CFN to browse Cisco products and find relevant features and licenses. allows you to compare platforms, determine common features between products, and identify unique product features. The CFN also has a tab that provides a MIB Locator

 


 

Legal information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2025 Cisco Systems, Inc. All rights reserved.

 

Learn more