Network Convergence System 5000 Series Routers


Note

This software release has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices.



Note

Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.

  • Use faceted search to locate content that is most relevant to you.

  • Create customized PDFs for ready reference.

  • Benefit from context-based recommendations.

Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience.

Do provide feedback about your experience with the Content Hub.


Software Features Introduced in Cisco IOS XR Software Release 6.2.1

Virtual Private LAN Services

Virtual Private LAN Services (VPLS) is a multipoint Layer 2 VPN technology that connects two or more customer devices using bridging techniques. In this release Virtual Private LAN Services (VPLS) is based on manual configuration of PWs between VFIs provision on the MPLS PE routers. VPLS enables geographically separate LAN segments to be interconnected as a single bridged domain over a packet switched network such as IP, MPLS, or a hybrid of both. Cisco NCS 5000 Series Router builds a point-to-point connection to interconnect two peering customer sites.

A bridge domain, which is the building block for multipoint bridging, is present on each of the PE routers. The access connections to the bridge domain on a PE router are called attachment circuits. The attachment circuits can be a set of physical ports, or both that are connected to the bridge at each PE device in the network.

Disabling Atomic ACL Operations

Cisco NCS 5000 Series Routers supports the Atomic ACL Disable feature for modifications of ACLs. Up until now, the new or modified ACEs were added to the ACL table prior to the removal of the outdated ACEs. Hence, the outdated ACEs consumed hardware resources that were needed for the new ACEs. Therefore, by using a new global configuration option,atomic-disable, the outdated ACEs are removed before adding any new ACEs in the ACL table. The user also has the option of configuring to permit or deny all traffic during the ACL modification.

For more information, see the IP Addresses and Services Configuration Guide for Cisco NCS 5000 Series Routers and the IP Addresses and Services Command Reference for Cisco NCS 5000 Series Routers.

ZTP IPv6 Support on Data Port

Zero touch provisioning (ZTP) allows to provision the routers in your network automatically. However, ZTP on data port was supported only through IPv4 in the previous releases. From this release onwards, ZTP on data port through IPv6 is also supported. For more information on ZTP, see System Setup and Software Installation Guide for Cisco NCS 5000 Series Routers.

RSVP based MPLS-TE with FRR

MPLS Traffic Engineering (MPLS-TE) provides an efficient way to avoid traffic congestion by steering traffic away from congestion points. To forward traffic, MPLS-TE creates unidirectional tunnels from sources to destinations as label switched paths (LSPs).To set up LSPs, Resource Reservation Protocol (RSVP) is used in MPLS-TE to reserve the required resources. Traffic can be steered over MPLS-TE transport using static routes and auto-route announce in interior gateway protocols (IGPs). L2/L3 VPN support over MPLS-TE transport is not available in this release.

MPLS-TE Fast Re-Routing (FRR) handles link or node failures by re-directing traffic to a pre-configured backup path when the primary path fails. MPLS-TE FRR is supported on head end and mid point nodes.

For more information about configuring RSVP for MPLS-TE and FRR, see MPLS Configuration Guide for Cisco NCS5000 Series Routers.

BPDU Guard

The Bridge Protocol Data Units (BPDU) Guard is a Cisco feature that protects against misconfiguration of edge ports. When MSTP port fast is configured on an interface, MSTP considers that interface to be an edge port and removes it from consideration when calculating the spanning tree. When BPDU Guard is configured, MSTP additionally shuts down the interface using error-disable if an MSTP BPDU is received.

Note

MSTP functionality is not supported. BPDU guard feature error-disables the port on receiving BPDU packets, and the system does not process the BPDU packet further because the feature does not provide any further BPDU packet processing.

For more information, see the L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers.

MC-LAG

Multichassis LAG (MC-LAG) enables the user to dual-home a device to two different peer devices, that is, points of attachments, using standard Ethernet Link Aggregation. This provides the user the benefits of active/standby node redundancy, while maintaining single peering. MC-LAG supports two modes; VLAN based active-active and active-standby.

For more information on MC-LAG (active/standby), see the . Interfaces and Hardware Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.2.x

For more information on MC-LAG (active/active) pseudo MC-LAG, see the L2VPN Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.2.x

Internet Protocol Flow Information Export (IPFIX) 315

Internet Protocol Flow Information Export (IPFIX) is an IETF standard export protocol for sending IP flow information. Cisco NCS 5000 Router supports IPFIX 315 format to export flow information. IPFIX 315 format facilitates sending ethernet frame information of the traffic flow over the network. The process includes sampling, and exporting the traffic flow information. Along with the ethernet frame information, IPFIX 315 format exports information of incoming and outgoing interface of the sampled packet.

Refer the RFC 7270 section 4.18 for information on IPFIX 315 https://tools.ietf.org/html/rfc7270#section-4.18

For more information see System Monitoring Configuration Guide for Cisco NCS 5000 Series Routers.

Using Cisco Yang Models with Puppet

Cisco IOS XR supports the use of Cisco yang models with Puppet. You can install the Puppet Agent within a third-party LXC on IOS XR and enable it to interact with the gRPC and Netconf servers installed natively within the XR LXC. The Puppet Agent uses gRPC Ruby libraries to send and receive Yang data in JSON format. The Puppet Agent interacts with the Netconf server to send and receive Yang data in XML format.

For more information, see the Application Hosting Configuration Guide for Cisco NCS 5000 Series Routers.

Pseudowire Redundancy

Pseudowire Redundancy feature allows you to configure a backup pseudowire in case the primary pseudowire fails. When the primary pseudowire fails, the PE router can switch to the backup pseudowire. You can elect to have the primary pseudowire resume operation after it becomes functional.

For more information on this feature, see the Configure Point-to-Point Layer 2 Services chapter in the L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.2.x.

Software Feature Enhancements in Cisco IOS XR Software Release 6.2.1

Enhancements to Data models - Faster Programmatic and Standards-based Configuration

Data models are a programmatic and standards-based way of configuring and collecting operational data of a network device, replacing the process of manual configuration.

The enhancements to Data Models includes support for:

To get started with using data models, see the Obtain Data Models section in Programmability Configuration Guide for Cisco NCS 5000 Series Routers.

Security Enhancements

This release addresses following Cisco Product Security Incident Response Team (PSIRT) caveats:

SyncE

Frequency or timing synchronization is the ability to distribute precision frequency around a network. In this context, timing refers to precision frequency, not an accurate time of day. Precision frequency is required in next generation networks for applications such as circuit emulation. To achieve compliance to ITU specifications for TDM, differential method circuit emulation must be used, which requires a known, common precision frequency reference at each end of the emulated circuit.

The incumbent example of frequency synchronization is provided by SDH and SONET equipment. This is used in conjunction with an external timing technology (such as Cesium oscillators or GPS) to provide synchronization of precision timing across the network. As, increasingly, SDH and SONET equipment is replaced by Ethernet equipment this frequency synchronization ability is required over Ethernet ports. Synchronous Ethernet (SyncE) provides the Ethernet physical layer network level frequency distribution of known common precision frequency references.

SyncE support is available for NCS 5001 and NCS 5002. SyncE support is not available on NCS 5011.

For more information, see System Management Configuration Guide for NCS 5000 Series Routers chapter Configuring Frequency Synchronization.

sysadmin-vm Commands

This section lists the manageability commands that are made available in Cisco IOS XR Software Release 6.2.1, which were in previous releases available in the hidden mode. These commands are executed in the sysadmin-vm mode on the router.

  • show controller switch mgmt-agent connections —This command allows you to check the Ethernet switch driver management agent(ESDMA) of all the clients in a specified IP address or location. ESDMA is the server that is used to publish the services related to ESD, MLAP, and so on. This is a sample output for the show controller switch mgmt-agent connections command.
    
    sysadmin-vm:1_RP0# show controller switch mgmt-agent connections
    Fri Mar  10 17:09:30.569 UTC
    Active ESD Management Agent IP Address: 192.3.0.1
    
    ESDMA-SDR Clients:
    IP Address       Port Number  
    ------------------------------
    192.2.0.1        59213        
    
    Total table entries: 1
    
    ETHSW-MGMT Clients:
                                                Switch  SDR   
    IP Address       Port Number  Location      Info    Info  
    ----------------------------------------------------------
    192.1.0.1        57798        F0/SC0/F_SW0  Yes     Yes   
    192.2.4.1        37848        1/RP1/RP_SW   Yes     Yes   
    192.0.4.1        41317        0/RP1/RP_SW   Yes     Yes   
    192.0.84.1       53088        0/LC5/LC_SW   Yes     Yes   
    192.0.0.1        54311        0/RP0/RP_SW   Yes     Yes   
    192.2.0.1        56904        1/RP0/RP_SW   Yes     Yes   
    192.3.0.1        43991        F1/SC0/F_SW0  Yes     Yes   
    192.3.0.1        43969        F1/SC0/SC_SW  Yes     Yes   
    192.1.0.1        56452        F0/SC0/SC_SW  Yes     Yes   
    192.3.4.1        57622        F1/SC1/SC_SW  Yes     Yes   
            
    Total table entries: 10
    
    MLAP-MGMT Clients:
                                                Switch  
    IP Address       Port Number  Location      Info    
    ----------------------------------------------------
    192.2.4.1        47209        1/RP1/RP_SW   Yes     
    192.0.4.1        44686        0/RP1/RP_SW   Yes     
    192.0.0.1        42446        0/RP0/RP_SW   Yes     
    192.2.0.1        41762        1/RP0/RP_SW   Yes     
    192.3.0.1        36595        F1/SC0/F_SW0  Yes     
    192.3.0.1        36591        -             No      
    192.3.0.1        36584        F1/SC0/SC_SW  Yes     
    192.1.0.1        34021        F0/SC0/SC_SW  Yes     
    192.1.0.1        34017        -             No      
    192.1.0.1        34015        F0/SC0/F_SW0  Yes     
    192.3.4.1        37677        -             No      
    192.3.4.1        37670        F1/SC1/SC_SW  Yes     
    192.3.4.1        37666        -             No      
    
    Total table entries: 13
  • show controller switch debug counters location —This command allows you to check the health of Ethernet Switch Driver(ESD) process threads, and also displays the health of Direct Memory Access(DMA) and its status. This command helps you to troubleshoot the controllers in the specified location. This is a sample output for the show controller switch debug counters location command.
    
    sysadmin-vm:1_RP0# show controller switch debug counters location 
    Fri Mar  10 17:10:00.695 UTC
    controller switch debug counters location 0/RP0/RP-SW
     PHY polling enabled                       true
     Tx thread watchdog count                  203543
     Rx thread watchdog count                  514201
     Task lock longest wait time (ms)          187
     Task lock longest wait event ID           155
     Task lock longest held time (ms)          196
     Task lock longest held event ID           4096
     Task unlock longest wait time (ms)        0
     Task unlock longest wait event ID         0
     DMA Rx Max packets dequeued per interrupt 34
     DMA Rx packets dequeued                   1283662
     DMA Rx packet dequeue errors              0
     DMA Tx packets queued                     1517020
     DMA Tx packets completed                  1517020
     DMA Tx packet no message errors           0
     DMA Tx packet message too big errors      0
     DMA Tx packet no buffer errors            0
     DMA Tx packet queue errors                0
     DMA Tx packet completion errors           0
     DMA Tx Max packets freed per interrupt    21
     DMA Tx buffer allocation count            1517020
     DMA Tx buffer free count                  1517020
                                            Longest   Longest   Longest   
    Switch  MSI     AER    HP     Watchdog  Lock      Lock      Unlock    
    Core    Count   Count  Count  Count     Wait(ms)  Held(ms)  Wait(ms)  
    ----------------------------------------------------------------------
    0       754582  0      1      754583    7         7         0         
    1       11396   0      1      18979     8         5         0         
    2       9085    0      1      17774     8         3         0         
    3       7752    0      1      17259     8         1         0         
    
    controller switch debug counters location 0/RP1/RP-SW
     PHY polling enabled                       true
     Tx thread watchdog count                  181055
     Rx thread watchdog count                  650315
     Task lock longest wait time (ms)          4
     Task lock longest wait event ID           172
     Task lock longest held time (ms)          8
     Task lock longest held event ID           91
     Task unlock longest wait time (ms)        0
     Task unlock longest wait event ID         0
     DMA Rx Max packets dequeued per interrupt 43
     DMA Rx packets dequeued                   1421547
     DMA Rx packet dequeue errors              0
     DMA Tx packets queued                     1383125
     DMA Tx packets completed                  1383125
     DMA Tx packet no message errors           0
     DMA Tx packet message too big errors      0
     DMA Tx packet no buffer errors            0
     DMA Tx packet queue errors                0
     DMA Tx packet completion errors           0
     DMA Tx Max packets freed per interrupt    9
     DMA Tx buffer allocation count            1383125
     DMA Tx buffer free count                  1383125
                                            Longest   Longest   Longest   
    Switch  MSI     AER    HP     Watchdog  Lock      Lock      Unlock    
    Core    Count   Count  Count  Count     Wait(ms)  Held(ms)  Wait(ms)  
    ----------------------------------------------------------------------
    0       855619  0      1      855620    10        2         0         
    1       8150    0      1      16399     6         0         0         
    2       4028    0      1      14002     7         1         0         
    3       6153    0      1      15817     8         1         0     
    
  • controller switch port-state location rack/card/switch test —This command allows you to set the specified port to test-mode which disables the Minimum Loop Avoid Protocol(MLAP) functionality. This sample output shows how to set the switch port to test-mode.
    
    sysadmin-vm:1_RP0# controller switch port-state location 0/RP0/RP-SW 56 test 
    Fri Mar  10 17:11:09.911 UTC
    result Switch port admin state changed successfully.
    
    sysadmin-vm:1_RP0# show controller switch summary location 0/RP0/RP-SW | inc 56
    Fri Mar  10 17:11:40.699 UTC
    56    Down   Test   10-Gbps   -         -           I/F Shelf Eth0 
  • show controller switch mlap debug counters —This command allows you to view and check the status of Minimum Loop Avoid Protocol(MLAP process) and the event queue status. This command is primarily used for debug and troubleshooting purposes. MLAP helps to avoid the Control Ethernet loop. This is a sample output for the show controller switch mlap debug counters command .
    
    sysadmin-vm:1_RP0# show controller switch mlap debug counters  
    Fri Mar  10 17:12:14.627 UTC
    controller switch mlap debug counters location 0/RP0/RP-SW
     Eval all links called           11
     Timer events queued             160706
     Rx packet events queued         1285297
     Eval all links events queued    11
     Link status' queued             156
     Admin status' queued            156
     Forwarding state status' queued 156
     Current event FIFO depth        0
     Maximum event FIFO depth        174
     Vlan color changes              12
     Current MLAP timeout (ms)       400
     Debug aging disabled            false
     MLAP debug verbosity level      Off
    
  • show services —This command displays a comprehensive list of services and their scope. It also specifies the IP address and port where the services can be reached, their role, clients, and the Product ID of clients. This is a sample output for the show services command.
    
    sysadmin-vm:1_RP0# show services
    Thu Dec  8  02:00:25.525 UTC
                                             ISSU                                             
    NAME  SCOPE   IP         PORT   ROLE     ROLE     NODE               CLIENT        PID    
    ------------------------------------------------------------------------------------------
    cm    Node    192.1.0.1  49394  None     Primary  Local              confd_helper  12590  
                                                                         fpd-serv      4613   
                                                                         sdr_invmgr    3563   
                                                                         processmgr    3461   
                                                                         fsdb_server   6389   
                                                                         inst_agent    3187   
                                                                         shelf_mgr     3212   
                                                                         sdr_mgr       3209   
                                                                         esd           3185   
                                                                         rvm_mgr       3208   
                                                                         pm            2981   
                                                                         dumper        3183   
    
  • controller ccc action register —This command allows you to write to the specified memory locations or hardware registers of CCC Field Programmable Gate Array(FPGA) of a given node or line card.

  • virtual-macaddr-range —This command allows you to configure virtual MAC address settings from the prompt, which was supported in Classic Cisco IOS XR Software. This command does not auto-run, and hence it does not impact the system functionality. If the virtual-macaddr-range is overwritten in the shelf manager component, the new mac addresses will be allocated, and the Cisco IOS XR side link bundles and interfaces are reconfigured. This example shows how to configure the virtual MAC address range in the sysadmin-vm mode.
    
    sysadmin-vm:0_RP0(config)# virtual-macaddr-range       
        Possible completions:
          base    Base mac address of range for virtual interfaces
          count   Count of contiguous mac addresses
    
    
  • config sdr <sdr-name> lead_down_delta —This command allows you to configure your own lead_down_delta value. The sdr_mgr component uses the lead_down_delta value to determine whether it is a lead_down event. If the Cisco IOS XR VMs on the two RPs go down one by one with in the lead_down_delta seconds, then it is considered as a lead_down event and the sdr_mgr notifies the clients about this event. If the lead_down_delta value is not configured, then sdr_mgr uses the default value.

  • show wdmon —This command allows you to view the watchdog monitors and use them to debug the trace information in the output. This is a sample output for the command.
    
    sysadmin-vm:0_RP0# show wdmon  ?
    Possible completions:
      trace   Debug trace information
    sysadmin-vm:0_RP0# show wdmon
    -------------------------------^
    syntax error: incomplete path
    sysadmin-vm:0_RP0# show wdmon ?
    Possible completions:
      trace   Debug trace information
    sysadmin-vm:0_RP0# show wdmon trace
    Possible completions:
      ConfdStream                all
      calvados_ds_capi_conn      calvados_ds_capi_error
      calvados_ds_capi_info      calvados_ds_capi_msc
      ccc_driver_capi_conn       ccc_driver_capi_info
      ccc_driver_capi_msc        cipc_conn
      hushd_watchdog_capi_conn   hushd_watchdog_capi_error
      hushd_watchdog_capi_info   hushd_watchdog_capi_msc
      libsyslog                  platform_local_capi_conn
      platform_local_capi_error  platform_local_capi_info
      platform_local_capi_msc    pm_lib
      pm_lib_capi_conn           pm_lib_capi_msc
      syslog_capi_conn           syslog_capi_error
      syslog_capi_info           syslog_capi_msc
      wdmon                      wdmon-0_1
      wdmon-0_RP0                wdmon_capi_server_conn
      wdmon_capi_server_info     wdmon_capi_server_msc
      wdmon_error
    sysadmin-vm:0_RP0# show wdmon trace ?
    Description: Debug trace information
    Possible completions:
      ConfdStream                all
      calvados_ds_capi_conn      calvados_ds_capi_error
     calvados_ds_capi_info      calvados_ds_capi_msc
      ccc_driver_capi_conn       ccc_driver_capi_info
      ccc_driver_capi_msc        cipc_conn
      hushd_watchdog_capi_conn   hushd_watchdog_capi_error
      hushd_watchdog_capi_info   hushd_watchdog_capi_msc
      libsyslog                  platform_local_capi_conn
      platform_local_capi_error  platform_local_capi_info
      platform_local_capi_msc    pm_lib
      pm_lib_capi_conn           pm_lib_capi_msc
      syslog_capi_conn           syslog_capi_error
      syslog_capi_info           syslog_capi_msc
      wdmon                      wdmon-0_1
      wdmon-0_RP0                wdmon_capi_server_conn
      wdmon_capi_server_info     wdmon_capi_server_msc
      wdmon_error
    sysadmin-vm:0_RP0# show wdmon trace all location ?
    Possible completions:
      0/1  0/RP0
    
    

Behavior Change Introduced

Prior to IOS XR Release 6.2.1, 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces were both named as TenGigE. Also, 40 Gigabit Ethernet and 100 Gigabit Ethernet interfaces were both named as HundredGigE. From Release 6.2.1 onwards, the names have been modified to:

Interface Type

Interface Name

1 Gigabit Ethernet

GigabitEthernet

10 Gigabit Ethernet

TenGigE

40 Gigabit Ethernet

FortyGigE

100 Gigabit Ethernet

HundredGigE


Note

After upgrading to Release 6.2.1, the old configurations applied to 1G and 40G interfaces will not be available. Therefore you must reconfigure the 1G and 40G interfaces using the new names.


Release 6.2.1 Packages

This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.

Table 1. Release 6.2.1 Packages for Cisco NCS 5000 Series Router

Composite Package

Feature Set

Filename

Description

Cisco IOS XR IP Unicast Routing Core Bundle

ncs5k-mini-x.iso

Contains base image contents that includes:

  • Host operating system

  • System Admin boot image

  • IOS XR boot image

  • Alarm co-relation

Individually-Installable Optional Packages

Feature Set

Filename

Description

Cisco IOS XR Manageability Package

ncs5k-mgbl-3.0.0.0-r621.x86_64.rpm

XML, Parser, HTTP Server, Telemetry, and gRPC.

Cisco IOS XR MPLS Package

ncs5k-mpls-2.2.0.0-r621.x86_64.rpm

Label Distribution Protocol (LDP), MPLS forwarding , MPLS operations , Administration and maintenance (OAM), Layer3-vpn , layer-2 vpn.

Cisco IOS XR MPLS RSVP TE package

ncs5k-mpls-te-rsvp-2.2.0.0-r621.x86_64.rpm

Supports MPLS RSVP-TE (Resource Reservation Protocol with Traffic Engineering extensions)

Cisco IOS XR Security Package

ncs5k-k9sec-3.1.0.0-r621.x86_64.rpm

Support for Encryption, Decryption, and Secure Shell (SSH),

Cisco IOS XR Multicast Package

ncs5k-mcast-2.0.0.0-r621.x86_64.rpm

Multicast routing protocols (PIM, IGMP, Auo-rp, BSR) and infrastructure (Multicast routing information Base) , Multicast forwarding (mfwd)

Cisco IOS XR ISIS package

ncs5k-isis-1.1.0.0-r621.x86_64.rpm

Supports ISIS

Cisco IOS XR OSPF package

ncs5k-ospf-1.0.0.0-r621.x86_64.rpm

Supports OSPF

Caveats

Caveats describe unexpected behavior in Cisco IOS XR Software releases.

The following open caveats apply to Cisco IOS XR Software Release and are not platform specific:

Table 2. Cisco IOS XR Caveats

Identifier

Description

CSCvc89910

Tunnel stuck in RSVP Signaling Proceeding

CSCvb63427

Sysadmin config loss on staggered double RP failover

CSCvf07863

Yang query for interfaces with openconfig-lacp fetches data for all interfaces

The following open caveats apply to Cisco NCS 5000 Series Routers:

Table 3. NCS 5000 Caveats

Identifier

Description

CSCvd37083

Streaming telemetry is counted under licenses utilization after receiver disconnect

Related Documentation

The most current Cisco Network Convergence System 5000 Series documentation is located at this URL:

http://www.cisco.com/c/en/us/support/routers/network-convergence-system-5000-series/tsd-products-support-series-home.html

The document containing Cisco IOS XR System Error Messages (SEM) is located at this URL:

https://www.cisco.com/c/en/us/td/docs/ios_xr_sw/error/message/ios-xr-sem-guide.html

Production Software Maintenance Updates (SMUs)

A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.

For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.

Communications, Services, and Additional Information

  • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.

  • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.

  • To submit a service request, visit Cisco Support.

  • To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.

  • To obtain general networking, training, and certification titles, visit Cisco Press.

  • To find warranty information for a specific product or product family, access Cisco Warranty Finder.

Cisco Bug Search Tool

Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.