The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco NCS 540 Series Routers, Release 26.1.1
Cisco NCS 540 Series Routers, Release 26.1.1
Cisco IOS XR Release 26.1.1 is a new feature release for Cisco NCS 540 Series routers.
For more details on the Cisco IOS XR release model and associated support, see Software Lifecycle Support Statement - IOS XR.
This section provides a brief description of the new software features introduced in this release.
Table 1. New software features for Cisco NCS 540 Series Routers, Release 26.1.1
| Product impact |
Feature |
Description |
| Programmability |
||
| Software Reliability
|
Maintain reliable gRPC server operation on the router |
You can achieve reliable server operations, a consistent system state, and secure communication between gRPC clients and the router by ensuring that client access is delayed until the router is fully configured. This approach prevents inconsistent responses, errors, and incomplete enforcement of security policies. With this feature, the gRPC server on the router accepts client requests only after the startup configuration is fully applied. The External Management Service Daemon (EMSD) manages gRPC services, listens for connection requests on designated network ports, and ensures that the server initiates only after the router completes its configuration. This seamless coordination guarantees robust communication and operational consistency. |
| Segment Routing |
||
| Software reliability
|
BGP SID locator tracking for SRv6 services |
You can now improve network convergence and ensure consistent path selection in SRv6 environments by enabling BGP to monitor the reachability and metric of SRv6 SID locators, not just the next hop. This feature extends traditional BGP next-hop tracking to include locators stored in the Routing Information Base (RIB) for both Layer 2 and Layer 3 services. By detecting unreachable locators—even when the next hop is reachable—BGP can proactively update path selection, maintaining alignment between control-plane and data-plane operations and enhancing overall network reliability. |
| Ease of Use |
SRv6-TE explicit BSID and remote steering |
You can manually configure a deterministic and persistent Binding SID or an Explicit BSID for an SRv6-TE policy. You can also enable remote BSID steering so that the router recognizes traffic whose destination address matches a local policy BSID and steers that traffic directly into the associated SRv6 TE policy. Previously, the router allocated SRv6-TE policy binding SIDs dynamically. The router could change the BSID during reloads or policy reinstallation, which limited deterministic policy stitching and integration with external controllers. |
| Setup and Upgrade |
||
| Upgrade |
Signature verification for owner RPMs using owner public keys |
This feature ensures integrity of owner RPMs and validates the authenticity of these RPMs by enabling the router to securely verify the owner RPM signatures using owner public keys onboarded on to the router. With this feature, you can now control whether or not to enable signature verification for owner RPMs based on defined security levels. When the signature verification for owner RPMs is enabled, all owner RPMs must be verified prior to IOS XR package installation. |
| Software Reliability |
This feature supports different security profiles to ensure integrity and protection of the IOS XR system when transitioning between security profiles. The supported security profiles are Strict, Default, Relaxed, and Custom. |
|
| Software Reliability |
This feature allows you to enable the customer consent token workflow so that the key name is linked to the key package. |
|
| Software Reliability |
This feature introduces you to the version 3 key package. With the version 3 key package, you can create, validate, sign a key package before the key package is provisioned on the router. Unlike the reserved customer consent token name, CUS-CT, used in version 1 and version 2 key packages, you can now use any name for the customer consent token that you include in the key package. However, to enable the customer consent token workflow, execute the consent-token customer command after the key package installation. |
|
| System Security |
||
| Software Reliability
|
Strengthened SSH Host Key Generation with RSA 3072 |
This update enhances device security by automatically generating RSA 3072-bit SSH host keys during system boot, replacing the previous default of RSA 2048-bit keys. The stronger key size aligns with industry best practices and provides improved cryptographic protection, ensuring secure SSH access and compliance with future security requirements. |
| Software Reliability |
Syslog warnings for RSA keys and DSA keys |
This enhancement ensures Cisco IOS XR devices comply with evolving security standards by sending syslog warnings if weak SSH host keys are found during system reboot where an Rivest, Shamir, and Adelman (RSA) key less than 3072 bits or any Digital Signature Algorithm (DSA) keys are detected. The default RSA key size has been increased from 2048 to 3072 bits to strengthen security. Additionally, DSA keys are no longer auto-generated at boot, and if found, a syslog warning prompts their removal to align with current best practices. |
This section provides a brief description of the new hardware features introduced in this release.
Table 2. New hardware for Cisco NCS 540 Series Routers, Release 26.1.1
| Hardware |
Description |
| Optics |
This release introduces these new optics that are available on supported hardware in the product portfolio. For details refer to the Transceiver Module Group (TMG) Compatibility Matrix. Supported hardware ● N540-24Q2C2DD-SYS-A ● N540-24Q2C2DD-SYS-D ● N540X-6Z18G-SYS-A ● N540X-6Z18G-SYS-D ● N540X-12Z16G-SYS-A ● N540X-12Z16G-SYS-D ● N540X-8Z16G-SYS-A ● N540X-8Z16G-SYS-D Cisco Small Form-Factor Pluggable (SFP) Modules |
| N540X-8Z12G-SYS-D passive cooled small density router |
The N540X-8Z12G-SYS-D passive cooled small density router supports: ● 8 X 1G/10G SFP+ ports: ◦ SFP+: The Small Form-factor Pluggable (SFP+) is an enhanced version of the SFP interface, supporting 1Gbps and 10Gbps data rates. ◦ Data rates: These ports can operate at 1Gbps and 10Gbps, providing versatility for different network tasks. ● 4 X CSFP ports: ◦ CSFP: The compact small form-factor Pluggable (CSFP) is an enhanced version of the SFP interface, supporting 1Gbps data rate. ◦ Data rates: These ports can operate at 1Gbps, providing versatility for different network tasks. ● 4 X 1G SFP ports ◦ SFP: The small form-factor Pluggable (SFP) supporting 1Gbps data rate. ◦ Data rates: These ports can operate at 1Gbps, providing versatility for different network tasks. ● 4 X 1G Copper GE ports ◦ Copper GE ports: The copper GE ports supporting 1Gbps data rate. ◦ Data rates: These ports can operate at 1Gbps, providing versatility for different network tasks. |
| N540X-6Z6G-SYS small density router |
The N540X-6Z6G-SYS small density router supports: ● 6 x 1G SFP ports ◦ SFP: The small form-factor Pluggable (SFP) supporting 1Gbps data rate. ◦ Data rates: These ports can operate at 1Gbps, providing versatility for different network tasks. ● 6 x 1G/10G SFP+ ports ◦ SFP+: The Small Form-factor Pluggable plus (SFP+) is an enhanced version of the SFP interface, supporting 1Gbps and 10Gbps data rates. ◦ Data rates: These ports can operate at 1Gbps and 10Gbps, providing versatility for different network tasks. |
| Cisco 10G Routed XGS-PON ONT |
The Cisco 10G Routed PON Optical Network Unit (ONT) is fully compliant with the XGS-PON ITU-T G.9807.1 standard, supporting symmetrical 10-Gbps downstream and upstream optical connectivity. Supported Cisco 10G Routed XGS-PON ONT The Cisco 10G Routed PON ONT provides embedded Ethernet-to-PON Media Access Control (MAC) bridge and optics or built-in XGS-PON optics and media. ● ENC-10G-ONT-10 XGS-PON ONT supports: ◦ 1 x 10/100/1000/2500 MbE Ethernet RJ-45 port ◦ 1 x 1G/10G SFP/SFP+ port ● ENC-10G-ONT-14A XGS-PON ONT supports: ◦ 1x1/2.5/5/10 GbE Ethernet RJ-45 port ◦ 4x10/100/1000 MbE Ethernet RJ-45 port ◦ 1xRJ-11 with FXS capability port ● ENC-10G-ONT-01PR XGS-PON ONT supports: ◦ 1 x 10/100/1000/2500 MbE RJ-45 port |
This section provides a brief description of the behavior changes introduced in this release.
● Delay during router reload with hw-module quad 10G mode configuration
When the command hw-module quad 0 location 0/RP0/CPU0 instance 0 mode 10ghw-module quad 0 location 0/RP0/CPU0 instance 0 mode 10g is executed, and the router reloads, a delay may occur. This delay is due to the optics driver attempting to initialize SFP modules on ports 20 through 27, despite the absence of physical optics modules in those ports. To address this, a flag is used to verify the presence of a module in each port before initiating the optics initialization process. This verification prevents unnecessary initialization attempts, thereby reducing the reload delay.
● Starting with Cisco IOS XR Software Release 25.4.1, a one-time syslog warning will be generated if TLS 1.0 or TLS 1.1 is used, and a continuous warning will occur if the syslog minimum TLS version is configured as TLS 1.0 or 1.1. The default minimum syslog TLS version is now TLS 1.2 to enhance security.
● Starting with the Cisco IOS XR Software Release 26.1.1, if the route-policy applied to the eBGP neighbor includes the set next-hop unchangedset next-hop unchanged command, the system preserves and advertises both the received remote SRv6 SID and the remote next-hop when advertising the leaked route from GRT to the VRF table. The local SRv6 SID is no longer always sent.
Table 3. Open issues for Cisco NCS 540 Series Routers, Release 26.1.1
| Description |
|
| A reduction in free memory of approximately 1000 MB may lead to a severe memory state if sustained interface flaps occur. |
● During the software upgrade to 26.1.1, the system may not complete the Auto-FPD upgrade as expected. After the software upgrade, the FPD status shows 'RLOAD REQ', indicating that you must perform an additional reload to activate the updated FPD.
Compatibility Matrix for EPNM and Crosswork with Cisco IOS XR Software
The compatibility matrix lists the version of EPNM and Crosswork that are supported with Cisco IOS XR Release in this release.
Table 4. Compatibility Matrix for Cisco NCS 540 Series Routers, Release 26.1.1
| Crosswork |
EPNM |
|
| Release 26.1.1 |
System requirements
Use the show hw-module fpd command in EXEC and Admin mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programmed version must be the same. You can also use the show fpd package command in Admin mode to check the fpd versions.
Software Version
To verify the software version running on the router, use show version command in the EXEC mode.
Router# show version
Fri Feb 27 00:39:06.648 PST
Cisco IOS XR Software, Version 26.1.1
Copyright (c) 2013-2026 by Cisco Systems, Inc.
Build Information:
Built By : swtools
Built On : Wed Feb 25 21:45:38 PST 2026
Built Host : iox-lnx-045
Workspace : /auto/srcarchive12/prod/26.1.1/ncs540/ws
Version : 26.1.1
Location : /opt/cisco/XR/packages/
Label : 26.1.1
cisco NCS-540 () processor
System uptime is 9 minutes
The following tables list the supported base images and optional packages and their corresponding file names.
Visit the Cisco Software Download page to download the Cisco IOS XR software images.
Table 5. Release 26.1.1 software for N540-24Z8Q2C-SYS, N540-ACC-SYS, and N540X-ACC-SYS
| Package |
Filename |
Description |
| Base image |
||
| IOS XR Base Image |
ncs540-mini-x-26.1.1.iso |
IOS XR mandatory base image. |
| USB Boot Package |
ncs540-usb_boot-26.1.1.zip |
Package required to perform USB Boot. Includes the same packages as the base image. |
| Optional packages not included in the base image |
||
| IOS XR Manageability |
ncs540-mgbl-1.0.0.0-r2611.x86_64.rpm |
Supports Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server |
| IOS XR MPLS |
ncs540-mpls-1.0.0.0-r2611.x86_64.rpm ncs540-mpls-te-rsvp-1.0.0.0-r2611.x86_64.rpm |
Supports MPLS and MPLS Traffic Engineering (MPLS-TE) |
| IOS XR Security |
ncs540-k9sec-1.0.0.0-r2611.x86_64.rpm |
Supports MACsec and 802.1X |
| IOS XR ISIS |
ncs540-isis-1.0.0.0-r2611.x86_64.rpm |
Supports ISIS |
| IOS XR OSPF |
ncs540-ospf-1.0.0.0-r2611.x86_64.rpm |
Supports OSPF |
| IOS XR Lawful Intercept |
ncs540-li-1.0.0.0-r2611.x86_64.rpm |
Supports Lawful Intercept (LI) |
| IOS XR Multicast |
ncs540-mcast-1.0.0.0-r2611.x86_64.rpm |
Supports Multicast |
| IOS XR EIGRP |
ncs540-eigrp-1.0.0.0-r2611.x86_64.rpm |
Supports EIGRP |
| IOS XR LI-CTRL |
ncs540-lictrl-1.0.0.0-r2611.x86_64.rpm |
Supports LI-CTRL |
Table 6. Release 26.1.1 Software for N540-24Q8L2DD-SYS, N540-24Q2C2DD-SYS, N540X-16Z4G8Q2C-A/D, N540-28Z4C-SYS-A/D, N540X-12Z16G-SYS-A/D, N540-12Z20G-SYS-A/D, N540-FH-CSR-SYS, N540X-16Z8Q2C-D, and N540-FH-AGG-SYS
| Package |
Filename |
Description |
| Base Image |
||
| IOS XR Base Image |
ncs540l-x64-26.1.1.iso |
IOS XR base image with mandatory packages. The base ISO image also includes the following optional packages: xr-bgp xr-cdp xr-eigrp xr-ipsla xr-is-is xr-k9sec xr-lictrl xr-lldp xr-mcast xr-mpls-oam xr-netflow xr-ospf xr-perf-meas xr-perfmgmt xr-rip xr-telnet xr-track These optional packages are also included in NCS540l-iosxr-26.1.1.tar. |
| USB Boot Package |
ncs540l-usb_boot-26.1.1.zip |
Package required to perform USB Boot. Includes the same packages as the base image. |
| Optional packages not included in the base image |
||
| IOS XR Telnet (xr-telnet) |
NCS540l-iosxr-26.1.1.tar |
Supports Telnet |
| IOS XR EIGRP (xr-eigrp) |
NCS540l-iosxr-26.1.1.tar |
Supports EIGRP |
| IOS XR CDP (xr-cdp) |
NCS540l-iosxr-26.1.1.tar |
Supports CDP |
| IOS XR k9sec (xr-k9sec) |
NCS540l-k9sec-rpms.26.1.1.tar |
Supports 802.1X |
| IOS XR RIP (xr-rip) |
NCS540l-iosxr-26.1.1.tar |
Supports RIP |
Table 7. Release 26.1.1 Software for N540X-4Z14G2Q-A/D, N540X-8Z16G-SYS-A/D, N540-6Z14S-SYS-D, N540-6Z18G-SYS-A/D, N540X-6Z18G-SYS-A/D, and N540X-6Z6G-SYS
| Package |
Filename |
Description |
| Base image |
||
| IOS XR Base Image |
ncs540l-aarch64-26.1.1.iso |
IOS XR base image with mandatory packages. The ISO image also includes the following optional packages: xr-bgp xr-cdp xr-eigrp xr-ipsla xr-is-is xr-k9sec xr-lictrl xr-lldp xr-mcast xr-mpls-oam xr-ncs540l-mcast xr-ncs540l-netflow xr-netflow xr-ospf xr-perf-meas xr-perfmgmt xr-rip xr-telnet xr-track These optional packages are also included in NCS540l aarch64 iosxr optional rpms-26.1.1.tar. |
| USB Boot Package |
ncs540l-aarch64-usb_boot-26.1.1.zip |
Package required to perform USB Boot. Includes the same packages as the base image. |
| Optional packages not included in the base image |
||
| Package |
Filename |
Description |
| IOS XR Telnet (xr-telnet) |
NCS540l-aarch64-iosxr-optional-rpms-26.1.1.tar |
Supports Telnet |
| IOS XR EIGRP (xr-eigrp) |
NCS540l-aarch64-iosxr-optional-rpms-26.1.1.tar |
Supports EIGRP |
| IOS XR CDP (xr-cdp) |
NCS540l-aarch64-iosxr-optional-rpms-26.1.1.tar |
Supports CDP |
| IOS XR k9sec (xr-k9sec) |
NCS540l-aarch64-k9sec-rpms.26.1.1.tar |
Supports 802.1X |
| IOS XR RIP (xr-rip) |
NCS540l-aarch64-iosxr-optional-rpms-26.1.1.tar |
Supports RIP |
Table 8. Related resources
| Document |
Description |
| An interactive tool that assists in locating features introduced across Cisco IOS XR releases and platforms. |
|
| Search by release number, error strings, or compare release numbers to view a detailed repository of error messages and descriptions. |
|
| Select the MIB of your choice from a drop-down to explore an extensive repository of MIB information. |
|
| CCO Documentation for Cisco NCS 540 Series Routers |
|
| Outlines the features currently supported by each operating system. |
|
| Provides a list of insecure features and protocols that are scheduled for systematic deprecation and eventual removal from specified Cisco products. |
|
| Details the reasons why certain features or protocols are deemed insecure and offers secure alternatives when available. |
|
| Information about Smart Licensing Using Policy solutions and their deployment on IOS XR Routers. |
|
| Search by product family, product ID, data rate, reach, cable type, or form factor to determine the transceivers that Cisco hardware device supports. |
|
| A user-friendly reference designed to easily explore and understand the various data models supported in Cisco IOS XR platforms and releases. |
|
| Repository containing the folders with yang data models introduced and enhanced in every IOS XR release. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2026 Cisco Systems, Inc. All rights reserved.