About Cisco 1000 Series Integrated Services Routers

The Cisco 1000 Series Integrated Services Routers (also referred to as router in this document) are powerful fixed branch routers based on the Cisco IOS XE operating system. They are multi-core routers with separate core for data plane and control plane. There are two primary models with 8 LAN ports and 4 LAN ports. Features such as Smart Licensing, VDSL2 and ADSL2/2+, 802.11ac with Wave 2, 4G LTE-Advanced and 3G/4G LTE and LTEA Omnidirectional Dipole Antenna (LTE-ANTM-SMA-D) are supported on the router.


Note


Cisco IOS XE 17.18.1a is the first release for Cisco 1000 Series Integrated Services Routers in the Cisco IOS XE 17.18.x release series.



Note


Starting with Cisco IOS XE Amsterdam 17.3.2 release, with the introduction of Smart Licensing Using Policy, even if you configure a hostname for a product instance or device, only the Unique Device Identifier (UDI) is displayed. This change in the display can be observed in all licensing utilities and user interfaces where the hostname was displayed in earlier releases. It does not affect any licensing functionality. There is no workaround for this limitation.

The licensing utilities and user interfaces that are affected by this limitation include only the following:

  • Cisco Smart Software Manager (CSSM),

  • Cisco Smart License Utility (CSLU), and

  • Smart Software Manager On-Prem (SSM On-Prem).


Product Field Notice

Cisco publishes Field Notices to notify customers and partners about significant issues in Cisco products that typically require an upgrade, workaround or other user action. For more information, see https://www.cisco.com/c/en/us/support/web/field-notice-overview.html.

We recommend that you review the field notices to determine whether your software or hardware platforms are affected. You can access the field notices from https://www.cisco.com/c/en/us/support/web/tsd-products-field-notice-summary.html#%7Etab-product-categories.

New and Changed Hardware Features

New and Changed Software Features in Cisco IOS XE 17.18.2

Table 1. New software features for Cisco 1000 Series Integrated Services Routers, Release 17.18.2

Product impact

Feature

Description

Ease of Setup

IPv6 Rule and Rule Set Support in Security Policies

From Cisco IOS XE 17.18.2, you can configure IPv6 data prefix lists, rule with rule sets, and object groups in security policy using Cisco SD-WAN Manager.

Upgrade

IPv6 GRE-TP tunnel as protected link support for SRv6 TI-LFA with IS-IS

From Cisco IOS XE 17.18.2, this feature extends IPv6 GRE-TP tunnel as protected link support for SRv6 TILFA with ISIS.

Upgrade

IPv4 GRE-TP tunnel as protected link support for SR-MPLS TI-LFA with IS-IS

From Cisco IOS XE 17.18.2 this feature extends IPv4 GRE-TP tunnel as protected link support for SR-MPLS TILFA with ISIS.

Upgrade

IPv4 GRE-TP tunnel as protected link support for SR-MPLS TI-LFA with OSPFv2

From Cisco IOS XE 17.18.2 this feature extends IPv4 GRE-TP tunnel as protected link support for SR-MPLS TILFA with OSPFv2.

CUBE FEATURES

Upgrade

Directional attribute compliance for SIPREC responses

From Cisco IOS XE 17.18.2 onwards, for a recorder response with INACTIVE SDP attributes, CUBE stops media packets transmission towards that recorder.

Security

Security warnings for usage of legacy TLS and associated weaker ciphers – CUBE and SRST

From Cisco IOS XE 17.18.2 onwards, CUBE and SRST display warning messages during handshake for configurations with legacy TLS (v1.0, v 1.1) and associated weaker ciphers.

Infrastructure Resiliency

Security

Infrastructure Resiliency

Starting with the Cisco IOS XE 17.18.2 release and in future releases, Cisco software will display warning messages when configuring features or protocols that do not provide sufficient security such as those transmitting sensitive data without encryption or using outdated encryption mechanisms. Warnings will also appear when security best practices are not followed, along with suggestions for secure alternatives.

This list is subject to change, but the following is a list of features and protocols that are planned to generate warnings in releases beyond the version Cisco IOS XE 17.18.1. Release notes for each release will describe exact changes for that release:

Plain-text and weak credential storage: Type 0 (plain text), 5 (MD5), or 7 (Vigenère cipher) in configuration files.
  • Recommendation: Use Type 6 (AES) for reversible credentials, and Type 8 (PBKDF2-SHA-256) or Type 9 (Scrypt) for non-reversible credentials.

  • SSHv1

  • Recommendation: Use SSHv2.

  • SNMPv1 and SNMPv2, or SNMPv3 without authentication and encryption

  • Recommendation: Use SNMPv3 with authentication and encryption (authPriv).

  • MD5 (authentication) and 3DES (encryption) in SNMPv3

  • Recommendation: Use SHA1 or, preferably, SHA2 for authentication, and AES for encryption.

  • IP source routing based on IP header options

  • Recommendation: Do not use this legacy feature.

  • TLS 1.0 and TLS 1.1

  • Recommendation: Use TLS 1.2 or later.

  • TLS ciphers using SHA1 for digital signatures

  • Recommendation: Use ciphers with SHA256 or stronger digital signatures.

  • HTTP

  • Recommendation: Use HTTPS.

  • Telnet

  • Recommendation: Use SSH for remote access.

  • FTP and TFTP

  • Recommendation: Use SFTP or HTTPS for file transfers.

  • On-Demand Routing (ODR)

  • Recommendation: Use a standard routing protocol in place of CDP-based routing information exchange.

BootP server Recommendation: Use DHCP or secure boot features such as Secure ZTP


Note


From Cisco IOS XE Release 17.18.2, guestshell is removed from the IOS XE software image. As a result, Zero Touch Provisioning (ZTP) python script is no longer supported on Cisco 1000 Series Integrated Services Routers. If you need to use guestshell, then download it from https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads. For more information, see Guestshell installation procedure.


New and Changed Software Features in Cisco IOS XE 17.18.1a

Table 2. New software features for Cisco 1000 Series Integrated Services Routers, Release 17.18.1a

Product impact

Feature

Description

Ease of Use

Support to upgrade Firmware From Cisco IOS XE 17.18.1a release, you can now upgrade the firmware image for cellular module, LTE module, or Wi-Fi module of supported devices using Cisco Catalyst SD-WAN Manager, without configuring and managing multiple commands for each device and its associated modules.

Ease of Use

Hosted Edge Services for SD-Routing Devices From Cisco IOS XE 17.18.1a release, Cisco Catalyst SD-WAN Manager supports deployment of IOx applications such as Cyber Vision, Thousand Eyes, UTD, and so on. The support to monitor these applications is introduced through Hosted Edge Services monitoring dashboard which offers a simplified user experience for overseeing IOx container applications across multiple devices. The Hosted Edge Services monitoring dashboard is introduced on Cisco Catalyst SD-WAN Manager version 20.18.x.

Ease of setup

Cisco Secure Routers SWIM and Onboarding Tool

Cisco IOS XE 17.18.1a introduces the Cisco Secure Routers Software Image Management (SWIM) and Onboarding tool that helps customers upgrade and onboard autonomous hardware devices to cloud-hosted or on-premises Catalyst Cisco SD-WAN Manager.

Security

Custom IPS signature sets From Cisco IOS XE 17.18.1a release, Custom IPS signature sets are supported in Cisco SD-WAN Manager, which allows you to create and deploy personalized Snort3 IPS signature sets.This feature allows direct modification of actions for existing IPS rules within profiles and supports building custom rules using rule groups or existing rules. With Custom IPS signature sets, organizations can gain greater control and precision in tailoring threat detection to their specific security needs.

Ease of Use

Certificate Management on SD-Routing Devices This feature introduces a new certificate authorization setting, Enterprise Certificate Settings, which unifies certificate configurations for SD-Routing devices. Cisco SD-WAN Manager automates certificate management by leveraging protocols like EST (Enrolment over Secure Transport) and SCEP (Simple Certificate Enrolment Protocol). The feature automates the enrolment, and renewal of certificates.

Ease of use

Configure cellular band select for cellular interfaces on SD-Routing devices You can select specific frequency bands to which the device can connect to, allowing optimized connection depending on location and network availability. This configuration can be done using Feature Parcels in Catalyst Cisco SD-WAN Manager.

Ease of use

Configure logging of crash dump events for cellular interfaces on SD-Routing devices You can configure the device to collect the crash dump logs by enabling the boot-and-hold mode on the device using the lte modem crash-action boot-and-hold command.

Ease of use

Reset cellular profile for cellular interfaces on SD-Routing devices You can reset the cellular network profile settings on a specific interface to a factory default state using the cellular<slot> lte profile reset command.

Ease of use

Enable diagnostic monitoring for SD-Routing devices You can enable diagnostic monitoring log capture for devices with cellular interfaces using Catalyst Cisco SD-WAN Manager.

Ease of Use

Show drops command

The show drops command is introduced in Cisco IOS XE 17.18.1a. This command consolidates multiple platform and protocol-specific debugging tools into a single, user-friendly interface, enabling network operators to efficiently identify the root causes of packet drops. By streamlining the troubleshooting process, this feature significantly improves operational efficiency and network performance.

Upgrade

MVPN Ingress Replication (IR) over SRv6 This feature enables the transport of IPv4 MVPN traffic across an SRv6 network. It simplifies multicast deployment by using the existing SRv6 unicast infrastructure as the underlay. With this feature, the ingress PE router receives multicast traffic and creates a separate unicast SRv6-encapsulated copy for each egress PE router in the multicast group.

Upgrade

SRv6 Path MTU Discovery This feature introduces a mechanism to determine the maximum transmission unit (MTU) for packets traversing an SRv6 underlay network. It ensures efficient packet forwarding by preventing fragmentation and packet drops, thereby allowing network devices to dynamically adjust packet sizes to avoid exceeding link MTU limits. The system relays ICMP Packet Too Big (PTB) messages from the SRv6 underlay to the IPv6/IPv4 overlay network, supporting both Transit-node and Headend-node PTB relay methods.

Upgrade

SRv6 Flex-Algo with TI-LFA and uLoop Avoidance From Cisco IOS XE 17.18.1a, Flexible Algorithm enhances SRv6 by including functions like Topology Independent Loop-Free Alternate (TI-LFA) and microloop (uLoop) avoidance. This feature improves network resilience and efficiency.

CUBE FEATURES

Ease of Use

Enhanced support for serviceability in SIP recording From Cisco IOS XE 17.18.1a onwards, serviceability is enhanced to display consolidated information on forked and associated anchor call legs.

Upgrade

Third-Party GUID capture for correlation between call transfers and SIP-based recording From Cisco IOS XE 17.18.1a onwards, the Third-Party GUID capture for correlation between calls and SIP-based recording is extended to support transmission of globally unique identifiers (GUIDs) to the recording server during call transfers.

Upgrade

IOS UC apps reports smart licensing flex subscription entitlement tag From Cisco IOS XE 17.18.1a onwards, CUBE and SRST smart licensing reports flex subscription entitlement tag on all the supported platforms.

Note


From Cisco IOS XE Release 17.18.1a, guestshell is removed from the IOS XE software image. As a result, Zero Touch Provisioning (ZTP) python script is no longer supported on Cisco 1000 Series Integrated Services Routers. If you need to use guestshell, then download it from https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads. For more information, see Guestshell installation procedure.


Cisco ISR1000 ROMmon Compatibility Matrix

The following table lists the ROMmon releases supported in Cisco IOS XE 16.x.x releases and Cisco IOS XE 17.x.x releases.


Warning


Device unrecoverable after upgrade failure

If a device running certain older Cisco IOS XE releases (earlier than 17.5.x) has password recovery disabled and experiences an upgrade failure to Cisco IOS XE 17.11.x or later, the device may become unrecoverable.

To mitigate this risk, upgrade the device to any Cisco IOS XE image between 17.5.x and 17.10.x before upgrading to the destination Cisco IOS XE release (17.11.x or later). Refer to the Release Notes for Cisco 1000 Series Integrated Services Routers, Cisco IOS XE 17.11.x for specific upgrade steps.

Subsequent release notes include this guidance. For example, refer to the Release Notes for Cisco ISR 1000 Series, Cisco IOS XE Dublin 17.13.1.



Warning


Recommendations before upgrade

Before you upgrade, consider these actions:

  • Configure the old working image as a backup image before performing the upgrade. For example:

Router(config)# no boot system
Router(config)# boot system bootflash:new.bin
Router(config)# boot system bootflash:old.bin
  • Enable password recovery before you upgrade. After the upgrade, reapply no service password-recovery for security. For example:

Router(config)# service password-recovery

(After upgrade)

Router(config)# no service password-recovery


Note


Reset button behavior

The Reset button behavior changes when specific ROMmon and Cisco IOS XE versions are in use:

  • If ROMmon is 16.12(2r) or later, and Cisco IOS XE is 17.2.1 or later:

    The Reset button does not take effect if no service password-recovery strict is configured.

  • If ROMmon is earlier than 16.12(2r):

    The factory reset does not take effect, regardless of whether the strict option is included.



Note


To identify the manufacturing date, use the show license udi command. For example:

Router#show license udi 
UDI: PID:C1131-8PLTEPWB,SN:FGLxxxxLCQ6

The xxxx in the command output represents the manufacturing date.

  • If the manufacturing date is greater than or equal to 0x2535, the manufactured ROMmon version is 17.6(1r) or higher.

  • If the manufacturing date is less than 0x2535, the ROMmon will be automatically upgraded to 17.5(1r) or above when the Cisco IOS XE 17.9.x release is installed.

  • The minimal or recommended ROMmon version for devices using Cisco IOS XE 17.5 or later is 17.5(1r) or later.



Note


To upgrade to Cisco IOS XE Dublin 17.12.x, follow these steps:

  1. If you are on a device that is running software version between Cisco IOS XE 16.x to Cisco IOS XE 17.4.x, upgrade to any IOS XE image between Cisco IOS XE 17.5.x to Cisco IOS XE 17.10.x.

  2. After performing step a, upgrade to Cisco IOS XE 17.12.x.

  3. For devices that are running on software version Cisco IOS XE 17.5.x or later, you can upgrade to Cisco IOS XE 17.12.x directly.


Table 3. Minimum and Recommended ROMmon Releases Supported on Cisco 1000 Series Integrated Services Routers

Cisco IOS XE Release

Minimum ROMmon Release for IOS XE

Recommended ROMmon Release for IOS XE

17.18.x

17.5(1r)

17.5(1r)

17.16.x

17.5(1r)

17.5(1r)

17.15.x

17.5(1r)

17.5(1r)

17.14.x

17.5(1r)

17.5(1r)

17.13.x

17.5(1r)

17.5(1r)

17.12.x

17.5(1r)

17.5(1r)

17.11.x

17.5(1r)

17.5(1r)

17.10.x

17.5(1r)

17.5(1r)

17.9.x

17.5(1r)

17.5(1r)

17.8.x

17.5(1r)

17.5(1r)

17.7.x

17.5(1r)

17.5(1r)

17.6.x

17.5(1r)

17.5(1r)

17.5.x

17.5(1r)

17.5(1r)

17.4.x

16.12(2r)

16.12(2r)

17.3.x

16.12(2r)

16.12(2r)

17.2.x

16.9(1r)

16.12(1r)

17.1.x

16.9(1r)

16.12(1r)

16.12.x

16.9(1r)

16.12(1r)

16.11.x

16.9(1r)

16.9(1r)

16.10.x

16.9(1r)

16.9(1r)

16.9.x

16.9(1r)

16.9(1r)

16.8.x

16.8(1r)

16.8(1r)

16.7.x

16.6(1r)

16.6(1r)

16.6.x

16.6(1r)

16.6(1r)

Resolved and Open Bugs in Cisco IOS XE 17.18.x

Resolved Bugs in Cisco IOS XE 17.18.2


Note


Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.


Table 4. Resolved issues for Cisco 1000 Series Integrated Services Routers, Release 17.18.2

Identifier

Headline

CSCwq53150

For the product platform, tunnel key and protection do not work together for VPLS multipoint connections.

CSCwr42950

SDWAN on-demand tunnels do not expire when UMTS is enabled.

CSCwq51935

NAT64 static entry is removed when a command to delete a non-existent entry is applied.

CSCwe19394

Device may boot up into previous packages configuration file (prev_packages.conf) due to power outage.

CSCwr77958

Network-Based Wireless Performance Indicator (NWPI) is not capturing self-generated syslog traffic.

CSCwq47442

Band selection changes from LTE all to LTE none after reboot.

CSCwj61730

The product experiences an issue when removing Security Group Tag (SGT) caching on an interface.

CSCwq77322

The product sends a 2-byte packet for Flow Sampler Random Interval instead of a 4-byte packet.

CSCwq60993

EM9293 module is not able to acquire GPS coordinates.

CSCwr24031

After upgrade, the SD-WAN service tracker in Virtual Routing and Forwarding (VRF) selects the source IP address from the GRT when MPLS Inter-Autonomous System VPN option B is configured.

CSCwr49794

The ISR exporters with Encrypted Traffic Analytics (ETA) enabled are generating invalid template data errors in Stealthwatch Network Agent.

CSCwq98206

Enhanced Policy-Based Routing (EPBR) set interface action get is missing after reboot.

CSCwr25077

The vDaemon process terminates unexpectedly when initializing DNS channels.

Open Bugs in Cisco IOS XE 17.18.2

This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.

Table 5. Open issues for Cisco 1000 Series Integrated Services Routers, Release 17.18.2

Identifier

Headline

CSCws30834

Ignore the keepalive command under the Secure Internet Gateway (SIG) tunnel interface that is pushed by vManage.

CSCws13857

Incorrect Network Address Translation (NAT) translation occurs from service Virtual Routing and Forwarding (VRF) to global for self-generated Internet Control Message Protocol (ICMP) Time Exceeded packets.

CSCwq77458

Forwarding Manager (FMAN) process terminates unexpectedly after Flexible NetFlow (FNF) configuration changes.

CSCwr87083

Not able to onboard Software-Defined Routing (SD-Routing) devices using a generic bootstrap file stored on USB.

CSCws12946

Port forwarding issue occurs with multiple Internet Service Providers.

CSCws18137

Out of sync when the CLI template is attached (missing element: authentication in /ios:native/ios:line/ios:vty[ios:first='0']/ios:login/ios:authentication)

CSCwr76580

Unexpected behavior with Cisco Umbrella Secure Internet Gateway (SIG) tunnels configured from vManage to Umbrella.

CSCwr30573

Transport Locator (TLOC) extension cannot be programmed due to module boot-up timing.

CSCws25557

Transport Layer Security (TLS) 1.2 cipher suites support for control connections.

CSCws31914

Intermittent Packet Data Network (PDN) backoff with no radio service.

CSCwr95551

Router stops responding when configuring Secure Sockets Layer Virtual Private Network (SSL VPN) with Policy-Based Routing (PBR) and Network Address Translation (NAT).

CSCwr08462

The Network Address Translation (NAT) router does not respond to Address Resolution Protocol (ARP) requests.

CSCwr44921

Central Processing Unit (CPU) usage due to memory pressure exceeds the threshold on the router.

CSCwr97784

Slow performance is observed on Network Configuration Protocol (Netconf) Remote Procedure Call (RPC) during stateless static Network Address Translation (NAT) translation.

CSCwr88206

Forwarding Information Base (FIB) table routes: Next Hop (NH) ID 0 is assigned to a value other than Blackhole.

CSCwr84985

The Device Management Interface Authentication Daemon (dmiauthd) process terminates unexpectedly, causing configuration sync issues between startup configuration and running configuration.

CSCwn38464

Unable to configure stream on the cellular interface.

CSCwq24119

Traceback seen when detaching Zone Based Firewall Policy.

CSCwm97460

Control connection to vManage is only attempted over the highest priority Transport Locator (TLOC).

CSCwr00088

Add the CLI to change the per Multi-Protocol Label Switching (MPLS) label Cisco Express Forwarding (CEF) statistics query interval on Forwarding Manager (FMAN) Fast Path (FP).

CSCws00104

Ports on the Ethernet Services (ES) module stop forwarding traffic in Spanning Tree Protocol (STP) Multiple Spanning Tree (MST) mode.

CSCwr55240

The product experiences a critical process fault related to Onboard Management and Policy Daemon (ompd) on route processor rp_0_0.

CSCwr72709

Unexpected behavior in TDM-TDM calls when debug Voice over Internet Protocol (VoIP) Feature Path Instrumentation (FPI) is enabled.

CSCwp97178

Flapping Network Address Translation (NAT) causes Bidirectional Forwarding Detection (BFD) session down with IPsec session shown.

CSCwr49475

Bidirectional Forwarding Detection (BFD) sessions flap and do not recover because Symmetrical Network Address Translation (SYMNAT) port does not update to the data plane.

CSCwo42664

Periodic service restarts may generate diagnostic files.

CSCws11840

SNMP: snmpwalk for cellular GPS coordinates is missing decimals.

CSCwr64257

Unexpected reload occurs on the SD-WAN device.

CSCws26373

Product experiences an unexpected reboot due to Network Address Translation (NAT) in the data plane after a policy push.

CSCwq98154

Multicast traffic is not forwarded over Point-to-Point (P2P) Dynamic Multipoint Virtual Private Network (DMVPN) phase 1 tunnel.

CSCwr76176

Path Maximum Transmission Unit Discovery (PMTUD) converges unexpectedly to 970 bytes after a dbg2:1 event in Bidirectional Forwarding Detection SD-WAN PMTUD.

CSCwr77083

Product experiences an unexpected fault in the cryptographic library.

CSCws19405

Request to Increase VRF Scale.

Resolved Bugs in Cisco IOS XE 17.18.1a


Note


Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.


Table 6. Resolved issues for Cisco 1000 Series Integrated Services Routers, Release 17.18.1a
Bug ID Description
CSCwp23487

SGW offline with SSH error Unable to open socket while establishing netconf session

CSCwn12594

17.16 SIG zscaler ipsec - vpn credentials for primary tunnel not created

CSCwn42496

Device crashed @bfd_send_and_detect_sleep_time during soak run

CSCwn69868

Unable to come up control connections with controllers after controllers added and down/up

CSCwo72675

All BFD sessions for dialer interfaces are down. SA ID is 0 for all of them

CSCwo84428

Memory leak under vdaemon process with DTLS on SNMP polling

CSCwp24639

Device reloads after VPN config changes on SDWAN

CSCwm27749

Speed test download / throughput issue on device seen with IPSEC ESP-NULL transform using Zscaler

CSCwm72336

CXP with Data Policy redirect-DNS via overlay causes blackhole

CSCwn26353

BFD sessions via TLOC-Ext do not come up when IPv6 is dynamically changed

CSCwo05703

SD-WAN: VFR is not dynamically disabled After ZBFW Removal

CSCwo75657

Maximum control connection is not equal to maximum omp sessions

CSCwp91064

FTMD zero pointer dereferences leading to crash

Open Bugs in Cisco IOS XE 17.18.1a

This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.

Table 7. Open issues for Cisco 1000 Series Integrated Services Routers, Release 17.18.1a
Bug ID Description
CSCwp12196 Device unexpectedly reloads due to memory corruption on a notification queue in FTMd
CSCwq27426 BFD session down due to unencrypted outbound BFD packets despite active IPsec SA
CSCwe19394 Device may boot up into prev_packages.conf due to power outage
CSCwo42664 Keyman core files on device
CSCwp01089 EPFR-High latency times are observed on the hub device
CSCwp81539 Memory leak under cfgmgr process on SNMP polling
CSCwq20326 Device does not install service-side static route to CEF after upgrade
CSCwq40026 Unexpected reboot occurs due to process FTMD
CSCwq68385 TLOC disabled after link down; no automatic tunnel recovery after link restores and TLOC state Is Up
CSCwq60993 EM9293 module not able to acquire GPS coordinates

Communications, Services, and Additional Information

  • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.

  • To get the business results you’re looking for with the technologies that matter, visit Cisco Services.

  • To submit a service request, visit Cisco Support.

  • To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco DevNet.

  • To obtain general networking, training, and certification titles, visit Cisco Press.

  • To find warranty information for a specific product or product family, access Cisco Warranty Finder.

Cisco Bug Search Tool

Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.

Documentation Feedback

To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.

Troubleshooting

For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at https://www.cisco.com/en/US/support/index.html.

Go to Products by Category and choose your product from the list, or enter the name of your product. Look under Troubleshoot and Alerts to find information for the issue that you are experiencing.