Image Information and Supported Platforms
Note : You must have a Cisco.com account to download the software.
Cisco IOS-XE Release 17.3.2a includes the following Cisco image:
The latest software downloads for the ESR6300 can be found at:
Click on the ESR6300 link to take you to the specific software you are looking for.
The following features are not supported on the ESR6300 with software release 17.3.2a:
■No support for MacSec or DLEP in this release. (MQC: modular quality of service command line).
■Layer 2 COS to DSCP mapping does not work due to no ASIC chipset support for the feature.
■Copper FE SFPs are not supported on the ESR6300.
■Copper GE SFPs are only supported in config terminal > service internal > service unsupported-transceiver mode.
■Cisco does not claim IP Mobility for Ethernet support on the ESR6300.
■Auto-negotiation for 10Mbps, 100Mbps, 1000Mbps in full-duplex mode is supported. For half duplex, support is only on 10Mbps and 100Mbps.
■Refer to the Cisco Approved Vendor List (AVL]) for Cisco USBs. Kingston USB 3.0 works as well. Ensure the USB has a single partition and ext2, Fat16, or Fat32 format only.
■Cellular functionality is not supported.
■Radio Aware Routing is not supported.
■There is no WebUI support for Day 0 or Day 1 configuration
■For Security: No support for TLS, TrustSec, MacSec, CWS [Cloud Web Security], IDS/IPS.
This release has the following limitations or deviations for expected behavior:
■The WebUI Licensing Page is unsupported for release 17.3.2a. For all licensing configuration, please use CLI mode or CSSM.
■In the Web User Interface (WebUI), there are two known issues where erroneous information is displayed. In both of these cases, the information is present in the WebUI even though the functionality is NOT supported on the ESR6300.
–Under Configuration > Security > Threat Defense > snort there is a RAM and DISK size prerequisite check that fails.
–Under Configuration > Security > there is a category for Trustsec.
These are both cosmetic issues due to the features being unavailable in the 17.3.2a release.
■The IOS boot system setting allows users to specify any flash-based storage URL for IOS image booting.
The rommon on the ESR6300 does not expose the non-IOX msata partition, therefore auto-booting from mSATA will not work even if it is configured in IOS.
Example : Users must not configure a boot system setting as follows:
(config)#boot system flash msata:ios-image
■Receive a message 'unable to open bootflash:golden.bin (14)' during bootup.
Example: Pushing the reset button displays the unable to open message.
ESR-6300-CON-K9 platform with 4194304 Kbytes of main memory
MCU Version - Bootloader: 4, App: 10
MCU is in application mode.
Reset button push detected
unable to open bootflash:golden.bin (14)
This message is intended by design to inform the user they have not setup a golden.bin config file.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note : You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
None at this time.
Boot environmental variable corruption on hard reload.
Symptom : Router hard reload can cause boot env var to wipe out completely. NVRAM partition corruption. Startup-config is intact. Flash files are intact. Only boot env var are affected which causes router to drop in rommon mode.
ESR6300 rommon v2.6 corrupted. Updating to a new version 2.7.
■To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
■To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
■To submit a service request, visit Cisco Support.
■To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
■To obtain general networking, training, and certification titles, visit Cisco Press.
■To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
© 2020 Cisco Systems, Inc. All rights reserved.