About Cisco 1000 Series Integrated Services Routers
The Cisco 1000 Series Integrated Services Routers (also referred to as router in this document) are powerful fixed branch routers based on the Cisco IOS XE operating system. They are multi-core routers with separate core for data plane and control plane. There are two primary models with 8 LAN ports and 4 LAN ports. Features such as Smart Licensing, VDSL2 and ADSL2/2+, 802.11ac with Wave 2, 4G LTE-Advanced and 3G/4G LTE and LTEA Omnidirectional Dipole Antenna (LTE-ANTM-SMA-D) are supported on the router.
Smart Licensing Using Policy
Starting with Cisco IOS XE Amsterdam 17.3.2 release, with the introduction of Smart Licensing Using Policy, even if you configure a hostname for a product instance or device, only the Unique Device Identifier (UDI) is displayed. This change in the display can be observed in all licensing utilities and user interfaces where the hostname was displayed in earlier releases. It does not affect any licensing functionality. There is no workaround for this limitation.
The licensing utilities and user interfaces that are affected by this limitation include only the following:
-
Cisco Smart Software Manager (CSSM),
-
Cisco Smart License Utility (CSLU), and
-
Smart Software Manager On-Prem (SSM On-Prem).
Product Field Notice
Cisco publishes Field Notices to notify customers and partners about significant issues in Cisco products that typically require an upgrade, workaround or other user action. For more information, see https://www.cisco.com/c/en/us/support/web/field-notice-overview.html.
We recommend that you review the field notices to determine whether your software or hardware platforms are affected. You can access the field notices from https://www.cisco.com/c/en/us/support/web/tsd-products-field-notice-summary.html#%7Etab-product-categories.
New and Changed Hardware Features
New and Changed Software Features in Cisco IOS XE 26.1.1
|
Product impact |
Feature |
Description |
|---|---|---|
|
Ease of Setup |
Unified Threat Defense Support for Cisco Catalyst IR8100 Heavy Duty Series Router |
From this release, this feature supports selective activation of Unified Threat Defense (UTD) capabilities. Specifically, the IR8140 supports Intrusion Prevention System (IPS) and Intrusion Detection System (IDS). |
|
Software Reliability |
DNS Security and increase the support for Local domain bypass scale to 256 |
From this release, the scale for Fully Qualified Domain Name (FQDN) bypass entries has been increased to 256. This allows administrators to configure up to 256 FQDNs for local domain bypass, providing greater flexibility and control over domain-specific routing and access policies within Cisco Secure Access. |
|
Software Reliability |
This feature introduces support for NGFW Policy Groups, that includes import and export of firewall policies, display of rule hit counts, drag-and-drop rule reordering to update priority, visibility of policy and object usage references in the NGFW Dashboard, and retention of rule and policy names in the running CLI configuration. |
|
|
Ease of Use |
One minute granularity interface statistics using Cisco Catalyst SD-WAN Manager |
This feature enables the collection of granular interface statistics from devices every minute, providing real-time insights for effective troubleshooting and ensuring optimal performance. |
|
Upgrade |
From Cisco IOS XE 26.1.1 release, you can use Cisco Catalyst SD-WAN Manager to select a device that either has a Wi-Fi module or Cellular module and perform firmware upgrade only for the specific device. |
|
|
Ease of Use |
When a Border Gateway Protocol (BGP) process initializes during a router reload or when BGP routing sessions are reset by using the clear ip bgp* command, it could result in a temporary period of traffic loss. The BGP Advertisement Startup Delay feature addresses this issue by introducing a configurable delay before BGP begins advertising routes to its neighbors. This delay allows sufficient time for routes to be installed in the hardware, ensuring traffic forwarding is ready before new routes are announced. |
|
|
CUBE FEATURES |
||
|
Upgrade |
From Cisco IOS XE 26.1.1 onwards, weaker TLS versions (v1.0, v 1.1) and associated ciphers are not supported in default configurations. However, these insecure configurations are supported in "insecure operation-mode" for CUBE and SRST, and support for non-compliant ciphers has been discontinued in both platforms. |
|
|
Security |
Dual certificate support for SIP trunk client and server functionality |
From Cisco IOS XE 26.1.1 onwards, the feature allows provisioning and assigning separate certificates for client and server roles on each SIP trunk in CUBE. |
|
Resilient Infrastructure |
||
|
Software Reliability |
As part of the ongoing commitment to network security, this release introduces secure alternatives to legacy commands. These updates are designed to mitigate potential risks and assist in establishing a more robust and secure operational baseline. The identified insecure commands are categorized as:
For all detected insecure configurations during device boot or upgrade, error messages are displayed. In Cisco IOS XE 26.1.1 release, all insecure CLI commands are blocked by default to strengthen your network infrastructure. If your environment requires the use of a legacy command, you must enable the system mode insecure command in global configuration mode.
For more information, refer this document Routing-SD-WAN Resilient Infrastructure |
|
Cisco ISR1000 ROMmon Compatibility Matrix
The following table lists the ROMmon releases supported in Cisco IOS XE 16.x.x releases and Cisco IOS XE 17.x.x releases.
![]() Warning |
Device unrecoverable after upgrade failure If a device running certain older Cisco IOS XE releases (earlier than 17.5.x) has password recovery disabled and experiences an upgrade failure to Cisco IOS XE 17.11.x or later, the device may become unrecoverable. To mitigate this risk, upgrade the device to any Cisco IOS XE image between 17.5.x and 17.10.x before upgrading to the destination Cisco IOS XE release (17.11.x or later). Refer to the Release Notes for Cisco 1000 Series Integrated Services Routers, Cisco IOS XE 17.11.x for specific upgrade steps. Subsequent release notes include this guidance. For example, refer to the Release Notes for Cisco ISR 1000 Series, Cisco IOS XE Dublin 17.13.1. |
![]() Warning |
Recommendations before upgrade Before you upgrade, consider these actions:
(After upgrade) |
![]() Note |
Reset button behavior The Reset button behavior changes when specific ROMmon and Cisco IOS XE versions are in use:
|
![]() Note |
To identify the manufacturing date, use the show license udi command. For example:
The xxxx in the command output represents the manufacturing date.
|
![]() Note |
To upgrade to Cisco IOS XE Dublin 17.12.x, follow these steps:
|
|
Cisco IOS XE Release |
Minimum ROMmon Release for IOS XE |
Recommended ROMmon Release for IOS XE |
|---|---|---|
|
26.1.x |
17.5(1r) |
26.1(1r) |
Resolved and Open Bugs in Cisco IOS XE 26.1.x
Resolved Bugs in Cisco IOS XE 26.1.1
![]() Note |
Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com. |
|
Identifier |
Headline |
|---|---|
|
Microcode failure due to a stuck thread during Network Address Translation session database walk. |
|
|
Transport Locator extension unable to program due to module boot-up timing. |
|
|
Failure at cft_engine_handle_vrf_associate_if_needed on device with Internet Protocol version 6 traffic. |
|
|
Speed test session timeout notification is not clear enough for the user to retrieve details. |
|
|
Forwarding Manager failure after Flexible NetFlow configuration changes. |
|
|
Add CLI to change per MPLS label Cisco Express Forwarding statistics query interval on Forwarding Manager Forwarding Plane. |
|
|
Certificate verification fails and identity certificate is not installed after device reload for certificates with Elliptic Curve Key 521. |
|
|
Device issue where the Network Address Translation router is not responding to Address Resolution Protocol requests. |
|
|
IOSd failure with match authentication-status unauthenticated configured. |
|
|
SD-WAN device: Failures due to Central Processing Unit usage exceeding thresholds from memory pressure. |
|
|
Multicast traffic not forwarded over Point-to-Point Dynamic Multipoint Virtual Private Network phase 1 tunnel. |
|
|
Converting Layer 2 routed port channel to Layer 3 is broken on the device. |
|
|
SNMP: snmpwalk for cellular Global Positioning System coordinates is missing decimals. |
Open Bugs in Cisco IOS XE 26.1.1
This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.
|
Identifier |
Headline |
|---|---|
|
FIPS support for DC in 26.1.2 throttle. |
|
|
Quality of Service (QoS) counters fail to increment for both the FQDN matching class and the default class. |
|
|
The device process fails during extended operation and when clearing specific network events. |
|
|
Web UI bootstrapping failure due to invalid configuration causes persistent configuration merge errors, despite subsequent corrections. |
|
|
High QFP Caused by "all-host" Limit in - Carrier Grade NAT mode. |
|
|
RADIUS packets are being silently consumed by the UTD engine on the device. |
|
|
Update the "reason for state change: MAX" message in the BFD syslog. |
|
|
The preferred-color-group restriction is not being honored in the data policy. |
|
|
Clarification regarding the operation that enables communication from outside the NAT. |
|
|
Packets are dropped due to bad IP checksums when segment-routing is configured over encrypted tunnels on the device interface. |
|
|
The hardcoded autonomous system number needs to be removed and replaced with an automatic detection mechanism. |
|
|
A segmentation fault occurs in the control plane server process while printing trace data. |
|
|
The PCG configuration is not being removed from the forwarding plane. |
|
|
BFD SD-WAN PMTUD: The PMTU converges unexpectedly to 970 bytes after a debug event on the device. |
|
|
SD-WAN device: Over 100 SSHd/Netconf sessions are active concurrently on the same device. |
|
|
Device: A memory leak is occurring under the cfgmgr process. |
|
|
IPv6 IPsec packets are being dropped in SVTI AH in transport mode, causing ping failures for packets of a specific size. |
Related Information
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business results you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco DevNet.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.
Documentation Feedback
To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at https://www.cisco.com/en/US/support/index.html.
Go to Products by Category and choose your product from the list, or enter the name of your product. Look under Troubleshoot and Alerts to find information for the issue that you are experiencing.


Feedback