About Cisco 1000 Series Integrated Services Routers
The Cisco 1000 Series Integrated Services Routers (also referred to as router in this document) are powerful fixed branch routers based on the Cisco IOS XE operating system. They are multi-core routers with separate core for data plane and control plane. There are two primary models with 8 LAN ports and 4 LAN ports. Features such as Smart Licensing, VDSL2 and ADSL2/2+, 802.11ac with Wave 2, 4G LTE-Advanced and 3G/4G LTE and LTEA Omnidirectional Dipole Antenna (LTE-ANTM-SMA-D) are supported on the router.
![]() Note |
Cisco IOS XE 17.18.1a is the first release for Cisco 1000 Series Integrated Services Routers in the Cisco IOS XE 17.18.x release series. |
![]() Note |
Starting with Cisco IOS XE Amsterdam 17.3.2 release, with the introduction of Smart Licensing Using Policy, even if you configure a hostname for a product instance or device, only the Unique Device Identifier (UDI) is displayed. This change in the display can be observed in all licensing utilities and user interfaces where the hostname was displayed in earlier releases. It does not affect any licensing functionality. There is no workaround for this limitation. The licensing utilities and user interfaces that are affected by this limitation include only the following:
|
Product Field Notice
Cisco publishes Field Notices to notify customers and partners about significant issues in Cisco products that typically require an upgrade, workaround or other user action. For more information, see https://www.cisco.com/c/en/us/support/web/field-notice-overview.html.
We recommend that you review the field notices to determine whether your software or hardware platforms are affected. You can access the field notices from https://www.cisco.com/c/en/us/support/web/tsd-products-field-notice-summary.html#%7Etab-product-categories.
New and Changed Hardware Features
New and Changed Software Features in Cisco IOS XE 17.18.2
|
Product impact |
Feature |
Description |
|---|---|---|
|
Ease of Setup |
IPv6 Rule and Rule Set Support in Security Policies |
From Cisco IOS XE 17.18.2, you can configure IPv6 data prefix lists, rule with rule sets, and object groups in security policy using Cisco SD-WAN Manager. |
|
Upgrade |
IPv6 GRE-TP tunnel as protected link support for SRv6 TI-LFA with IS-IS |
From Cisco IOS XE 17.18.2, this feature extends IPv6 GRE-TP tunnel as protected link support for SRv6 TILFA with ISIS. |
|
Upgrade |
IPv4 GRE-TP tunnel as protected link support for SR-MPLS TI-LFA with IS-IS |
From Cisco IOS XE 17.18.2 this feature extends IPv4 GRE-TP tunnel as protected link support for SR-MPLS TILFA with ISIS. |
|
Upgrade |
IPv4 GRE-TP tunnel as protected link support for SR-MPLS TI-LFA with OSPFv2 |
From Cisco IOS XE 17.18.2 this feature extends IPv4 GRE-TP tunnel as protected link support for SR-MPLS TILFA with OSPFv2. |
|
CUBE FEATURES |
||
|
Upgrade |
From Cisco IOS XE 17.18.2 onwards, for a recorder response with INACTIVE SDP attributes, CUBE stops media packets transmission towards that recorder. |
|
|
Security |
Security warnings for usage of legacy TLS and associated weaker ciphers – CUBE and SRST |
From Cisco IOS XE 17.18.2 onwards, CUBE and SRST display warning messages during handshake for configurations with legacy TLS (v1.0, v 1.1) and associated weaker ciphers. |
|
Infrastructure Resiliency |
||
|
Security |
Infrastructure Resiliency |
Starting with the Cisco IOS XE 17.18.2 release and in future releases, Cisco software will display warning messages when configuring features or protocols that do not provide sufficient security such as those transmitting sensitive data without encryption or using outdated encryption mechanisms. Warnings will also appear when security best practices are not followed, along with suggestions for secure alternatives. This list is subject to change, but the following is a list of features and protocols that are planned to generate warnings in releases beyond the version Cisco IOS XE 17.18.1. Release notes for each release will describe exact changes for that release: Plain-text and weak credential storage: Type 0 (plain text), 5 (MD5), or 7 (Vigenère cipher) in configuration files.
BootP server Recommendation: Use DHCP or secure boot features such as Secure ZTP |
![]() Note |
From Cisco IOS XE Release 17.18.2, guestshell is removed from the IOS XE software image. As a result, Zero Touch Provisioning (ZTP) python script is no longer supported on Cisco 1000 Series Integrated Services Routers. If you need to use guestshell, then download it from https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads. For more information, see Guestshell installation procedure. |
New and Changed Software Features in Cisco IOS XE 17.18.1a
|
Product impact |
Feature |
Description |
|---|---|---|
|
Ease of Use |
Support to upgrade Firmware | From Cisco IOS XE 17.18.1a release, you can now upgrade the firmware image for cellular module, LTE module, or Wi-Fi module of supported devices using Cisco Catalyst SD-WAN Manager, without configuring and managing multiple commands for each device and its associated modules. |
|
Ease of Use |
Hosted Edge Services for SD-Routing Devices | From Cisco IOS XE 17.18.1a release, Cisco Catalyst SD-WAN Manager supports deployment of IOx applications such as Cyber Vision, Thousand Eyes, UTD, and so on. The support to monitor these applications is introduced through Hosted Edge Services monitoring dashboard which offers a simplified user experience for overseeing IOx container applications across multiple devices. The Hosted Edge Services monitoring dashboard is introduced on Cisco Catalyst SD-WAN Manager version 20.18.x. |
|
Ease of setup |
Cisco IOS XE 17.18.1a introduces the Cisco Secure Routers Software Image Management (SWIM) and Onboarding tool that helps customers upgrade and onboard autonomous hardware devices to cloud-hosted or on-premises Catalyst Cisco SD-WAN Manager. | |
|
Security |
Custom IPS signature sets | From Cisco IOS XE 17.18.1a release, Custom IPS signature sets are supported in Cisco SD-WAN Manager, which allows you to create and deploy personalized Snort3 IPS signature sets.This feature allows direct modification of actions for existing IPS rules within profiles and supports building custom rules using rule groups or existing rules. With Custom IPS signature sets, organizations can gain greater control and precision in tailoring threat detection to their specific security needs. |
|
Ease of Use |
Certificate Management on SD-Routing Devices | This feature introduces a new certificate authorization setting, Enterprise Certificate Settings, which unifies certificate configurations for SD-Routing devices. Cisco SD-WAN Manager automates certificate management by leveraging protocols like EST (Enrolment over Secure Transport) and SCEP (Simple Certificate Enrolment Protocol). The feature automates the enrolment, and renewal of certificates. |
|
Ease of use |
Configure cellular band select for cellular interfaces on SD-Routing devices | You can select specific frequency bands to which the device can connect to, allowing optimized connection depending on location and network availability. This configuration can be done using Feature Parcels in Catalyst Cisco SD-WAN Manager. |
|
Ease of use |
Configure logging of crash dump events for cellular interfaces on SD-Routing devices | You can configure the device to collect the crash dump logs by enabling the boot-and-hold mode on the device using the lte modem crash-action boot-and-hold command. |
|
Ease of use |
Reset cellular profile for cellular interfaces on SD-Routing devices | You can reset the cellular network profile settings on a specific interface to a factory default state using the cellular<slot> lte profile reset command. |
|
Ease of use |
Enable diagnostic monitoring for SD-Routing devices | You can enable diagnostic monitoring log capture for devices with cellular interfaces using Catalyst Cisco SD-WAN Manager. |
|
Ease of Use |
Show drops command |
The show drops command is introduced in Cisco IOS XE 17.18.1a. This command consolidates multiple platform and protocol-specific debugging tools into a single, user-friendly interface, enabling network operators to efficiently identify the root causes of packet drops. By streamlining the troubleshooting process, this feature significantly improves operational efficiency and network performance. |
|
Upgrade |
MVPN Ingress Replication (IR) over SRv6 | This feature enables the transport of IPv4 MVPN traffic across an SRv6 network. It simplifies multicast deployment by using the existing SRv6 unicast infrastructure as the underlay. With this feature, the ingress PE router receives multicast traffic and creates a separate unicast SRv6-encapsulated copy for each egress PE router in the multicast group. |
|
Upgrade |
SRv6 Path MTU Discovery | This feature introduces a mechanism to determine the maximum transmission unit (MTU) for packets traversing an SRv6 underlay network. It ensures efficient packet forwarding by preventing fragmentation and packet drops, thereby allowing network devices to dynamically adjust packet sizes to avoid exceeding link MTU limits. The system relays ICMP Packet Too Big (PTB) messages from the SRv6 underlay to the IPv6/IPv4 overlay network, supporting both Transit-node and Headend-node PTB relay methods. |
|
Upgrade |
SRv6 Flex-Algo with TI-LFA and uLoop Avoidance | From Cisco IOS XE 17.18.1a, Flexible Algorithm enhances SRv6 by including functions like Topology Independent Loop-Free Alternate (TI-LFA) and microloop (uLoop) avoidance. This feature improves network resilience and efficiency. |
|
CUBE FEATURES |
||
|
Ease of Use |
Enhanced support for serviceability in SIP recording | From Cisco IOS XE 17.18.1a onwards, serviceability is enhanced to display consolidated information on forked and associated anchor call legs. |
|
Upgrade |
Third-Party GUID capture for correlation between call transfers and SIP-based recording | From Cisco IOS XE 17.18.1a onwards, the Third-Party GUID capture for correlation between calls and SIP-based recording is extended to support transmission of globally unique identifiers (GUIDs) to the recording server during call transfers. |
|
Upgrade |
IOS UC apps reports smart licensing flex subscription entitlement tag | From Cisco IOS XE 17.18.1a onwards, CUBE and SRST smart licensing reports flex subscription entitlement tag on all the supported platforms. |
![]() Note |
From Cisco IOS XE Release 17.18.1a, guestshell is removed from the IOS XE software image. As a result, Zero Touch Provisioning (ZTP) python script is no longer supported on Cisco 1000 Series Integrated Services Routers. If you need to use guestshell, then download it from https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads. For more information, see Guestshell installation procedure. |
Cisco ISR1000 ROMmon Compatibility Matrix
The following table lists the ROMmon releases supported in Cisco IOS XE 16.x.x releases and Cisco IOS XE 17.x.x releases.
![]() Warning |
Device unrecoverable after upgrade failure If a device running certain older Cisco IOS XE releases (earlier than 17.5.x) has password recovery disabled and experiences an upgrade failure to Cisco IOS XE 17.11.x or later, the device may become unrecoverable. To mitigate this risk, upgrade the device to any Cisco IOS XE image between 17.5.x and 17.10.x before upgrading to the destination Cisco IOS XE release (17.11.x or later). Refer to the Release Notes for Cisco 1000 Series Integrated Services Routers, Cisco IOS XE 17.11.x for specific upgrade steps. Subsequent release notes include this guidance. For example, refer to the Release Notes for Cisco ISR 1000 Series, Cisco IOS XE Dublin 17.13.1. |
![]() Warning |
Recommendations before upgrade Before you upgrade, consider these actions:
(After upgrade) |
![]() Note |
Reset button behavior The Reset button behavior changes when specific ROMmon and Cisco IOS XE versions are in use:
|
![]() Note |
To identify the manufacturing date, use the show license udi command. For example:
The xxxx in the command output represents the manufacturing date.
|
![]() Note |
To upgrade to Cisco IOS XE Dublin 17.12.x, follow these steps:
|
|
Cisco IOS XE Release |
Minimum ROMmon Release for IOS XE |
Recommended ROMmon Release for IOS XE |
|---|---|---|
|
17.18.x |
17.5(1r) |
17.5(1r) |
|
17.16.x |
17.5(1r) |
17.5(1r) |
|
17.15.x |
17.5(1r) |
17.5(1r) |
|
17.14.x |
17.5(1r) |
17.5(1r) |
|
17.13.x |
17.5(1r) |
17.5(1r) |
|
17.12.x |
17.5(1r) |
17.5(1r) |
|
17.11.x |
17.5(1r) |
17.5(1r) |
|
17.10.x |
17.5(1r) |
17.5(1r) |
|
17.9.x |
17.5(1r) |
17.5(1r) |
|
17.8.x |
17.5(1r) |
17.5(1r) |
|
17.7.x |
17.5(1r) |
17.5(1r) |
|
17.6.x |
17.5(1r) |
17.5(1r) |
|
17.5.x |
17.5(1r) |
17.5(1r) |
|
17.4.x |
16.12(2r) |
16.12(2r) |
|
17.3.x |
16.12(2r) |
16.12(2r) |
|
17.2.x |
16.9(1r) |
16.12(1r) |
|
17.1.x |
16.9(1r) |
16.12(1r) |
|
16.12.x |
16.9(1r) |
16.12(1r) |
|
16.11.x |
16.9(1r) |
16.9(1r) |
|
16.10.x |
16.9(1r) |
16.9(1r) |
|
16.9.x |
16.9(1r) |
16.9(1r) |
|
16.8.x |
16.8(1r) |
16.8(1r) |
|
16.7.x |
16.6(1r) |
16.6(1r) |
|
16.6.x |
16.6(1r) |
16.6(1r) |
Resolved and Open Bugs in Cisco IOS XE 17.18.x
Resolved Bugs in Cisco IOS XE 17.18.2
![]() Note |
Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com. |
|
Identifier |
Headline |
|---|---|
|
For the product platform, tunnel key and protection do not work together for VPLS multipoint connections. |
|
|
SDWAN on-demand tunnels do not expire when UMTS is enabled. |
|
|
NAT64 static entry is removed when a command to delete a non-existent entry is applied. |
|
|
Device may boot up into previous packages configuration file (prev_packages.conf) due to power outage. |
|
|
Network-Based Wireless Performance Indicator (NWPI) is not capturing self-generated syslog traffic. |
|
|
Band selection changes from LTE all to LTE none after reboot. |
|
|
The product experiences an issue when removing Security Group Tag (SGT) caching on an interface. |
|
|
The product sends a 2-byte packet for Flow Sampler Random Interval instead of a 4-byte packet. |
|
|
EM9293 module is not able to acquire GPS coordinates. |
|
|
After upgrade, the SD-WAN service tracker in Virtual Routing and Forwarding (VRF) selects the source IP address from the GRT when MPLS Inter-Autonomous System VPN option B is configured. |
|
|
The ISR exporters with Encrypted Traffic Analytics (ETA) enabled are generating invalid template data errors in Stealthwatch Network Agent. |
|
|
Enhanced Policy-Based Routing (EPBR) set interface action get is missing after reboot. |
|
|
The vDaemon process terminates unexpectedly when initializing DNS channels. |
Open Bugs in Cisco IOS XE 17.18.2
This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.
|
Identifier |
Headline |
|---|---|
|
Ignore the keepalive command under the Secure Internet Gateway (SIG) tunnel interface that is pushed by vManage. |
|
|
Incorrect Network Address Translation (NAT) translation occurs from service Virtual Routing and Forwarding (VRF) to global for self-generated Internet Control Message Protocol (ICMP) Time Exceeded packets. |
|
|
Forwarding Manager (FMAN) process terminates unexpectedly after Flexible NetFlow (FNF) configuration changes. |
|
|
Not able to onboard Software-Defined Routing (SD-Routing) devices using a generic bootstrap file stored on USB. |
|
|
Port forwarding issue occurs with multiple Internet Service Providers. |
|
|
Out of sync when the CLI template is attached (missing element: authentication in /ios:native/ios:line/ios:vty[ios:first='0']/ios:login/ios:authentication) |
|
|
Unexpected behavior with Cisco Umbrella Secure Internet Gateway (SIG) tunnels configured from vManage to Umbrella. |
|
|
Transport Locator (TLOC) extension cannot be programmed due to module boot-up timing. |
|
|
Transport Layer Security (TLS) 1.2 cipher suites support for control connections. |
|
|
Intermittent Packet Data Network (PDN) backoff with no radio service. |
|
|
Router stops responding when configuring Secure Sockets Layer Virtual Private Network (SSL VPN) with Policy-Based Routing (PBR) and Network Address Translation (NAT). |
|
|
The Network Address Translation (NAT) router does not respond to Address Resolution Protocol (ARP) requests. |
|
|
Central Processing Unit (CPU) usage due to memory pressure exceeds the threshold on the router. |
|
|
Slow performance is observed on Network Configuration Protocol (Netconf) Remote Procedure Call (RPC) during stateless static Network Address Translation (NAT) translation. |
|
|
Forwarding Information Base (FIB) table routes: Next Hop (NH) ID 0 is assigned to a value other than Blackhole. |
|
|
The Device Management Interface Authentication Daemon (dmiauthd) process terminates unexpectedly, causing configuration sync issues between startup configuration and running configuration. |
|
|
Unable to configure stream on the cellular interface. |
|
|
Traceback seen when detaching Zone Based Firewall Policy. |
|
|
Control connection to vManage is only attempted over the highest priority Transport Locator (TLOC). |
|
|
Add the CLI to change the per Multi-Protocol Label Switching (MPLS) label Cisco Express Forwarding (CEF) statistics query interval on Forwarding Manager (FMAN) Fast Path (FP). |
|
|
Ports on the Ethernet Services (ES) module stop forwarding traffic in Spanning Tree Protocol (STP) Multiple Spanning Tree (MST) mode. |
|
|
The product experiences a critical process fault related to Onboard Management and Policy Daemon (ompd) on route processor rp_0_0. |
|
|
Unexpected behavior in TDM-TDM calls when debug Voice over Internet Protocol (VoIP) Feature Path Instrumentation (FPI) is enabled. |
|
|
Flapping Network Address Translation (NAT) causes Bidirectional Forwarding Detection (BFD) session down with IPsec session shown. |
|
|
Bidirectional Forwarding Detection (BFD) sessions flap and do not recover because Symmetrical Network Address Translation (SYMNAT) port does not update to the data plane. |
|
|
Periodic service restarts may generate diagnostic files. |
|
|
SNMP: snmpwalk for cellular GPS coordinates is missing decimals. |
|
|
Unexpected reload occurs on the SD-WAN device. |
|
|
Product experiences an unexpected reboot due to Network Address Translation (NAT) in the data plane after a policy push. |
|
|
Multicast traffic is not forwarded over Point-to-Point (P2P) Dynamic Multipoint Virtual Private Network (DMVPN) phase 1 tunnel. |
|
|
Path Maximum Transmission Unit Discovery (PMTUD) converges unexpectedly to 970 bytes after a dbg2:1 event in Bidirectional Forwarding Detection SD-WAN PMTUD. |
|
|
Product experiences an unexpected fault in the cryptographic library. |
|
|
Request to Increase VRF Scale. |
Resolved Bugs in Cisco IOS XE 17.18.1a
![]() Note |
Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com. |
| Bug ID | Description |
|---|---|
| CSCwp23487 |
SGW offline with SSH error Unable to open socket while establishing netconf session |
| CSCwn12594 |
17.16 SIG zscaler ipsec - vpn credentials for primary tunnel not created |
| CSCwn42496 |
Device crashed @bfd_send_and_detect_sleep_time during soak run |
| CSCwn69868 |
Unable to come up control connections with controllers after controllers added and down/up |
| CSCwo72675 |
All BFD sessions for dialer interfaces are down. SA ID is 0 for all of them |
| CSCwo84428 |
Memory leak under vdaemon process with DTLS on SNMP polling |
| CSCwp24639 |
Device reloads after VPN config changes on SDWAN |
| CSCwm27749 |
Speed test download / throughput issue on device seen with IPSEC ESP-NULL transform using Zscaler |
| CSCwm72336 |
CXP with Data Policy redirect-DNS via overlay causes blackhole |
| CSCwn26353 |
BFD sessions via TLOC-Ext do not come up when IPv6 is dynamically changed |
| CSCwo05703 |
SD-WAN: VFR is not dynamically disabled After ZBFW Removal |
| CSCwo75657 |
Maximum control connection is not equal to maximum omp sessions |
| CSCwp91064 |
FTMD zero pointer dereferences leading to crash |
Open Bugs in Cisco IOS XE 17.18.1a
This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.
| Bug ID | Description |
|---|---|
| CSCwp12196 | Device unexpectedly reloads due to memory corruption on a notification queue in FTMd |
| CSCwq27426 | BFD session down due to unencrypted outbound BFD packets despite active IPsec SA |
| CSCwe19394 | Device may boot up into prev_packages.conf due to power outage |
| CSCwo42664 | Keyman core files on device |
| CSCwp01089 | EPFR-High latency times are observed on the hub device |
| CSCwp81539 | Memory leak under cfgmgr process on SNMP polling |
| CSCwq20326 | Device does not install service-side static route to CEF after upgrade |
| CSCwq40026 | Unexpected reboot occurs due to process FTMD |
| CSCwq68385 | TLOC disabled after link down; no automatic tunnel recovery after link restores and TLOC state Is Up |
| CSCwq60993 | EM9293 module not able to acquire GPS coordinates |
Related Information
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business results you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco DevNet.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.
Documentation Feedback
To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at https://www.cisco.com/en/US/support/index.html.
Go to Products by Category and choose your product from the list, or enter the name of your product. Look under Troubleshoot and Alerts to find information for the issue that you are experiencing.


Feedback