The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco IOS XRd, IOS XR Release 25.4.1
Cisco IOS XRd, IOS XR Release 25.4.1
Cisco IOS XR Release 25.4.1 is a new feature and hardware release for XRd. Key highlights include enhanced system monitoring and software reliability with the introduction of warning syslog messages.
Table 1. New software features for IOS XRd, Release 25.4.1
|
Product impact |
Feature |
Description |
| System Monitoring |
|||
| Software reliability |
Insecure features warning syslog messages |
Cisco IOS XR software warns you with a syslog message each time you use an insecure command and repeats the warning every 30 days until you remove the command. This helps you identify potential security risks and suggests safer alternatives to improve your network security. |
|
● Deprecation and phasing out features with insecure capabilities and its secure alternatives
From Release 25.4.1, Cisco IOS XR software displays warning messages when you configure features or protocols that lack sufficient security, such as those that transmit sensitive data without encryption or use outdated encryption mechanisms. The software also shows warnings when you do not follow security best practices, and it provides suggestions for secure alternatives.
This list may change, but Cisco plans to generate warnings for the following features and protocols from Release 25.4.1. Each Release Notes will describe the exact changes for that version.
These documents list all features planned for removal, including insecure commands, and provide recommended secure alternatives to help you maintain network security and compliance.
o Feature deprecation phasing out insecure capabilities
o Feature deprecation and removal details
o Feature removal and suggested alternatives
Table 2. Deprecation and phasing out features with insecure capabilities and its secure alternatives
| If you are using the following insecure features… |
Then follow these secure alternatives… |
| HTTP |
Use HTTPS. |
| FTP client |
Use SFTP. |
| IPV4 source route |
There is no alternative. Do not enable IPv4 source routing. |
| Telnet client |
There is no alternative. Do not use Telnet client. |
| Telnet server |
Use SSH. |
| TFTP client |
Use SFTP. |
| TFTP server |
Use SSH. |
| copy ftp |
Use SFTP or SCP. |
| install FTP |
Use SFTP. |
| TCP or UDP small_servers |
There is no alternative. Do not use TCP or UDP small_servers. |
| SSHv1 |
Use ssh server v2. |
| SSH host-key DSA algorithm |
Use ECDSA, ED25519, or RSA and so on. |
| Syslog TLS Version 1.1 (server1) |
Configure TLS Version 1.2 or higher. |
| TLS 1.0 |
Use TLS 1.2 or TLS 1.3. |
| utility mv ftp |
There is no alternative. Do not use utility mv ftp and utility mv tftp. |
| load ftp |
Use scp or sftp. |
| tacacs and radius server with type-7 shared secret |
Use type 6 secret. |
There are no open issues in this release.
There are no known issues in this release.
Supported deployments
This section details the supported XRd deployments in this release.
Table 3. Supported deployments for Cisco IOS XRd, Release 25.4.1
| Deployment |
Reference |
| Amazon Elastic Kubernetes Service (AWS EKS) |
|
| XRd lab deployments |
Table 4. Related resource
| Resource |
Description |
| Provides information about Smart Licensing Using Policy solutions and their deployment on IOS XR routers. |
|
| Provides CDC documentation for Cisco XRd. |
|
| Provides utilities to: - Apply bugfixes to XRd images - Verify the host is setup correctly to run XRd - Assist in launching XRd instances in a lab environment |
|
| Provides instructions for deploying XRd in lab settings, along with information on other deployment environments that are not yet officially supported. |
|
| Allows searching by release number, error strings, or comparing release numbers to view a detailed repository of error messages and descriptions. |
|
| Allows selecting the MIB of your choice from a drop-down to explore an extensive repository of MIB information. |
|
| Provides yang data models introduced and enhanced in every IOS XR release. |
|
| Provides a general guide in case of upgrading IOS XR routers or new deployments that involve IOS XR routers. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.