■ CSCvp74268 - IR809 and IR829
Bundle install should internally handle "firmware downgrade enable" check.
Symptoms : If you manually downgrade hypervisor and IOS only from releases (159-3.M+, 158-3.M3+, 156-3.M7+, 157-3.M5+) to the releases (158-3.M2a, 157-3.M4b, 156-3.M6b), the router will be stuck in aboot loop.
Workaround : If you use the recommended 'bundle install' to downgrade, the process will run correctly.
Note : Future releases 159-3.M+, 158-3.M3+, 156-3.M7+, 157-3.M5+ have this issue resolved. Manual and bundle install work, although bundle install continues to be the recommended option for full functionality.
■ CSCvo17731 - IR829 Platform
PnP: failed to upgrade image for IR829M router during onboarding on DNAC.
Symptoms : For an IoT device IR829 with Plug and Play on DNAC, if you upgrade the image during the Plug and Play process, the image upgrade fails.
Conditions : This problem occurs when creating a Plug and Play project with SWIM (image upgrade).
Workaround : Do not upgrade the image during the Plug and Play on DNAC. After the device is onboarded, use SWIM to perform an image upgrade.
The command show cel 0 firmware does not show the correct output
Router#show cel 0 firmware
Idx Carrier FwVersion PriVersion Status
1 ATT 02.32.07.00 002.066_000 Active
2 GENERIC 02.24.05.06 002.026_000 Inactive
3 ROGERS 02.20.03.00 000.011_000 Inactive
4 SPRINT 02.20.03.00 002.017_000 Inactive
5 VERIZON 02.30.01.01 002.052_000 Inactive
Firmware Activation mode : AUTO
Cisco IOS Software, ir800 Software (ir800-UNIVERSALK9-M), Version 15.8(3.0q)M1,ENGINEERING WEEKLY BUILD, synced to V155_3_M1
Workaround : The show cell 0 hardware command displays the correct output.
Remove SD-card password from CMOS Register
If SD-card password protection is enabled and the CMOS battery dies it will end up on loader mode.
To confirm this is the issue:
Boot with tftp or another SD-card and check the clock.
Anticipated fix in 158-3.M3 [August 2019]
1. Take another SD-card with similar CGOS/IOS boot up the system.
2. Set the SD-card password with the one it had before reload the box.
3. Confirm the SD-card password if enables.
4. Insert the old SD-card and reboot the system.
5. Once it boots up unset the SD-card password.
The following caveats are fixed with this release:
Disable ssh to local guest-os
Symptom : From Release 15.8(3)M2 onwards, SSH to the Guest-OS (IOx) shell is disabled by default. SSH to the user application will continue to be accessible.
Conditions : Disabled SSH access to IOx for all privilege users. Only privilege 15 user will be able to do reverse telnet to IOx.
The ssh access can be enabled using a hidden script for PRIV15 users by following command:
Router#iox host exec enablesshaccess IR800-GOS-1
To again disable ssh access to highest privilege user again, run following command:
Router#iox host exec disablesshaccess IR800-GOS-1
■ CSCvm46645 - IR8x9 Platform
[IOX-SS] Change monitrc to allow for infinite tries to restart secure storage
Symptoms : IOx came up in recovery mode because secure storage service didn’t come up.
Secure storage service log shows it failed to come up due to network connectivity to IOS. However, ping command went through fine when entered manually from Guest OS console.
Conditions : This is timing related, triggered by the missing IOS configurations needed for Guest OS networking connectivity at device power up. Secure storage service tried to connect to the server on IOS side and gave up after 5 retries.
Workaround : Restart guest OS VM after the IOS configuration change by "guest-os 1 restart". Or, save the configuration, and reload the router.
■ CSCvg41652 - IR829 Platform
show cellular x/y drop-stats added.
Note: From Release 15.8(3)M2 onwards, based on request, show cellular drop-stats cli has been added.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2019 Cisco Systems, Inc. All rights reserved.