The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco XRv 9000 Routers, IOS XR Release 25.4.1
Cisco XRv 9000 Routers, IOS XR Release 25.4.1
Cisco IOS XR Release 25.4.1 for XRv 9000 routers introduces support for the UCS C220 M7 appliance with 5th Gen Intel Xeon CPUs, and enhances security by adding syslog warnings for insecure configurations, helping improve hardware reliability and network protection.
Table 1. New software features for IOS XRv 9000 Router, Release 25.4.1
|
Product impact |
Feature |
Description |
| Appliance |
|||
| Hardware Reliability
|
The Cisco UCS C220 M7 Rack Server appliance now supports 5th Gen Intel Xeon Scalable CPU with 2.2GHz clock speed, 28 cores and 128GB of RAM with a 4800MT/s transfer rate. |
||
| Routing |
|||
| Ease of use |
The IS-IS auto-cost reference bandwidth feature automates IS-IS metric provisioning based on physical link bandwidth, optimizing path selection and reducing operational overhead. This feature allows you to configure a reference bandwidth, which IS-IS then uses to automatically calculate interface metrics. It also dynamically adjusts metrics for bundle interfaces when member links change, ensuring accurate and efficient routing without manual intervention. |
||
| System Monitoring |
|||
| Software reliability
|
Insecure features warning syslog messages |
Cisco IOS XR software warns you with a syslog message each time you use an insecure command and repeats the warning every 30 days until you remove the command. This helps you identify potential security risks and suggests safer alternatives to improve your network security. |
|
● The Cisco IOS XRv 9000 Appliance supports the 5th Gen Intel(R) Xeon(R) Gold 5520+ Scalable processor. For more information on specifications, see Table 3 Specification of the Cisco XRv 9000 Appliance.
● Deprecation and phasing out features with insecure capabilities and its secure alternatives
From Release 25.4.1, Cisco IOS XR software displays warning messages when you configure features or protocols that lack sufficient security, such as those that transmit sensitive data without encryption or use outdated encryption mechanisms. The software also shows warnings when you do not follow security best practices, and it provides suggestions for secure alternatives.
This list may change, but Cisco plans to generate warnings for the following features and protocols from Release 25.4.1. Each Release Notes will describe the exact changes for that version.
These documents list all features planned for removal, including insecure commands, and provide recommended secure alternatives to help you maintain network security and compliance.
o Feature deprecation phasing out insecure capabilities
o Feature deprecation and removal details
o Feature removal and suggested alternatives
Table 2. Deprecation and phasing out features with insecure capabilities and its secure alternatives
| If you are using the following insecure features… |
Then follow these secure alternatives… |
| HTTP |
Use HTTPS. |
| FTP client |
Use SFTP. |
| IPV4 source route |
There is no alternative. Do not enable IPv4 source routing. |
| Telnet client |
There is no alternative. Do not use Telnet client. |
| Telnet server |
Use SSH. |
| TFTP client |
Use SFTP. |
| TFTP server |
Use SSH. |
| copy ftp |
Use SFTP or SCP. |
| install FTP |
Use SFTP. |
| TCP or UDP small_servers |
There is no alternative. Do not use TCP or UDP small_servers. |
| SSHv1 |
Use ssh server v2. |
| SSH host-key DSA algorithm |
Use ECDSA, ED25519, or RSA and so on. |
| Syslog TLS Version 1.1 (server1) |
Configure TLS Version 1.2 or higher. |
| TLS 1.0 |
Use TLS 1.2 or TLS 1.3. |
| utility mv ftp |
There is no alternative. Do not use utility mv ftp and utility mv tftp. |
| load ftp |
Use scp or sftp. |
| tacacs and radius server with type-7 shared secret |
Use type 6 secret. |
There are no open issues in this release.
There are no known issues in this release.
Appliance model
Cisco IOS XRv 9000 Appliance is the pre-installed Cisco IOS XRv 9000 Router software that is sent from the factory on a bare metal UCS server hardware. It supports hyper scalability as it can scale to 70 million route prefixes when run as a Virtual Route Reflector. Therefore, the extra layer of software (hypervisor) is not required.
The Appliance also supports Zero Touch Provisioning (ZTP) which allows easier insertion into existing networks.
Table 3. Specification of the Cisco XRv 9000 Appliance
| Parameters |
Supported |
| Form Factor |
1 RU |
| Processor |
5th Gen Intel Xeon Scalable processor Intel(R) Xeon(R) Gold 5520+ 2.2GHz/205W 28C/52.5MB DDR5 4800MT/s |
| 4th Gen Intel Xeon Scalable processor Intel I5420+ 2GHz/205W 28C/52.5MB DDR5 4400MT/s |
|
| Memory size |
128GB (8x16GB DDR5-4800 RDIMM 1Rx8) |
| Internal storage |
480GB M.2 Boot SATA Intel SSD |
| Software version |
Cisco IOS-XR version 24.4.2 and later |
| Firmware version |
BIOS version: C220M7.6.0.1a.0_XRV9K CIMC/BMC version: 6.0(1.250129) |
| Physical NICs |
25G Model: Cisco-Intel E810XXVDA4L 4x25/10 GbE SFP28 PCIe 100G Model: Cisco-MLNX MCX623106AS-CDAT 2x100GbE QSFP56 PCIe Cisco-MLNX MCX623106AS-CDAT 2x100GbE QSFP56 PCIe |
Hypervisors
A hypervisor enables multiple operating systems to share a single hardware host machine. While each operating system appears to have the dedicated use of the host's processor, memory, and other resources; the hypervisor controls and allocates only needed resources to each operating system and ensures that the operating systems (VMs) do not disrupt each other.
Installation of the Cisco IOS XRv 9000 Router is supported on selected Type 1 (native, bare metal) hypervisors. Installation is not supported on Type 2 (hosted) hypervisors, such as VMware Fusion, VMware Player, or Virtual Box. The following table lists release specific supported hypervisor versions.
Table 4. Support Matrix for Hypervisor Versions
| Cisco IOS XR Version |
VMWare ESXi |
Kernel Based Virtual Machine (KVM) |
| Release 25.4.1 |
Version 8.0 |
Linux KVM based on Red Hat Enterprise Linux 9.4 |
Virtual machines
Cisco IOS XRv 9000 Router virtual machines must meet the following requirements:
Table 5. VM Requirement for VMware Environment
| Parameters |
Supported |
| VMware ESXi |
Version 8.0 |
| Virtual CPU cores |
1 socket with a minimum of 4 cores Note: For multicast heavy deployments we recommend configuring 8 cores (with 4 assigned for control plane and 4 assigned for data plane). Note: For production environment minimum of 4 cores is recommended. |
| Virtual Machine memory size |
24GB minimum for VRR, recommended to increase as per VM and scale requirements |
| Virtual Machine hard disk size |
64GB minimum for vPE and vRR image variants |
| Virtual Interfaces |
● E1000
● VMXNET3 for traffic interfaces only
|
| Physical NICs |
For pass-through:
● Intel X710, XXV710
● Mellanox ConnectX 6
SR-IOV supported for:
● Intel E810 XXV, E810 C
● Intel X710, XXV710
|
| Number of interfaces |
Maximum of 11 NICs where:
● 1 for management
● 2 are reserved
● 8 for traffic
|
| Default video, SCSI controller set |
Required SCSI controller not required for IDE disk. |
| Virtual CD/DVD drive installed |
Virtual CD/DVD is required when installing the Cisco IOS XRv 9000 Router on the VM using ISO template. |
| IDE hard disk |
Single IDE hard disk Note: Multiple hard disk drives on a VM are not supported. |
Firmware update available for UCS M7 appliance (xrv9k-ucs-c220m7-huu-container-6.0.1.250127.tar.gz)
A firmware update package, xrv9k-ucs-c220m7-huu-container-6.0.1.250127.tar.gz, is now available for the UCS M7 appliance. This package includes firmware for both the CIMC and BIOS.
The SHA256 checksum for the package is: 5bb660e0586c42f4f01ed25d5aef25be60ccd22d026df3fefd593aa887b365fd
The SHA256 checksum for the CIMC and BIOS binaries are:
● bios.pkg 5567aea1a085dd1e8300be692639fbad01f792d6aed39a5a7bad1e162673a031
● cimc.bin b5bace7d6126de3196057b08aa54391c2a178d3e7532ce62ef1c6803dfd75aec
For detailed instructions on extracting and installing the firmware, please refer to the documentation at Firmware Files.
Optics support
Table 6. Optics support for the XRv 9000 Routers
| Product |
Product Code |
Product Recommendation |
| Cisco 100GBASE LR4 QSFP Transceiver, LC, 10km over SMF |
Cisco QSFP-100G-LR4-S |
XRv9000 Appliance with UCS-C220 M7 server, 2X100G |
| Cisco 100GBASE SR4 QSFP Transceiver, MPO, 100m over OM4 MMF |
Cisco QSFP-100G-SR4-S |
|
| Cisco 10GBASE SFP+, Short Range |
Cisco SFP-10G-SR |
XRv9000 Appliance with UCS-C220 M7 server - 4X10/25G |
| Cisco 10GBASE SFP+, Long Range |
Cisco SFP-10G-LR |
Table 7. Related resources
| Resource |
Description |
| Provides information about Smart Licensing Using Policy solutions and their deployment on IOS XR routers. |
|
| Provides CDC documentation for Cisco XRv 9000 routers. |
|
| Allows searching by product family, product ID, data rate, reach, cable type, or form factor to determine the transceivers that Cisco hardware device supports. |
|
| Allows searching by release number, error strings, or comparing release numbers to view a detailed repository of error messages and descriptions. |
|
| Allows selecting the MIB of your choice from a drop-down to explore an extensive repository of MIB information. |
|
| Provides yang data models introduced and enhanced in every IOS XR release. |
|
| Provides a general guide in case of upgrading IOS XR routers or new deployments that involve IOS XR routers. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.