The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco 8400 Series Secure Routers, Release 17.15.x
Cisco 8400 Series Secure Routers, Release 17.15.x
Cisco IOS XE 17.15.3a is the first release for the Cisco 8400 Series Secure Routers in the Cisco IOS XE 17.15.x release series.
The Cisco 8400 Series Secure Routers are optimized for campus edge deployments. These routers are powered by a secure networking processor to accelerate encryption and threat protection throughput.
For information on the hardware features supported on the Cisco 8400 Series Secure Routers, refer to the Cisco 8400 Series Secure Routers datasheet.
This section provides a brief description of the new hardware features introduced in this release.
New hardware features for Cisco IOS XE 17.15.3a
Table 1. New hardware features for Cisco 8400 Series Secure Routers, Release 17.15.3a
| Product impact |
Description |
| Cisco 8400 Series Secure Routers |
From Cisco IOS XE17.15.3a, Cisco 8400 Series Secure Routers are available in these models: • C8475-G2 • C8455-G2
|
This section lists the resolved issues in this specific software release.
Note: This software release may contain resolved bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com
Resolved issues in Cisco IOS XE 17.15.3a
There are no customer impacting bugs that were fixed in this release.
Resolved issues in Cisco IOS XE 17.15.5
| Bug ID |
Description |
| Behaviour change for "ip dhcp use class" command on sdwan router |
|
| [IOS XE] Increased CPU Utilization Caused by BGP Scanner Process |
|
| IPv6 neighbour table entries are not timing out causing High TCAM utilisation (no default timers configured) |
This section lists the open issues in this specific software release.
Note: This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Search Tool. To search for a documented Cisco product issue, type in the browser: <bug_number> site:cisco.com.
Open issues in Cisco IOS XE 17.15.3a
There are no customer impacting bugs that were identified in this release.
Open issues in Cisco IOS XE 17.15.5
| Bug ID |
Headline |
| NGFW Policy Deployment Fails Due to Long Rule Name |
|
| LWM "memory free low-watermark processor" value its changing itself after upgrade to 17.12 |
|
| Unexpected Reload on cEdge with Static NAT When Polling NAT Translation Data |
|
| IOS-XE Devices: Router May Reload Unexpectedly During Startup Due To Segmentation Fault |
|
| Stuck locally originates BGP EVPN type-2 route |
|
| cedge ignore the keepalive command under the SIG tunnel interface pushed by the vmanage |
|
| [XE BGP] BGP routes are advertised with 0 in AS PATH attribute when replacing ASN |
|
| DMVPN hub routers could experience an unexpected reload after tunnel down in specific timing scenario. |
|
| DMVPN spoke crashed at Process = NHRP |
|
| Memory Leak in DNS Proxy/SKA Triggers Unexpected Reloads |
|
| ZBFW Invalid Zone drops after upgrade to 17.15 |
|
| BGP neighborship flap during configure replace |
|
| Device May Unexpectedly Reboot When Importing CA Chains |
|
| object-group service TCP port range |
|
| IR1101: polaris_vconfd_cfgpull_t denials during config push trigger |
|
| Device May Reload During IP SLA Updates With Periodic Hostname Resolution |
|
| Stuck EVPN BGP type-2 local route and L2RIB route |
|
| 20.15.3/17.12 ip community-list standard CLI template attach failure |
|
| Ping failure from VRRP backup to VRRP primary virtual address when enabling security policy |
|
| cEdge is sending lots of fib-updates alarms to vManage filling max alarms in vManage |
|
| IP aliases stuck in VRF even NAT statements removed |
|
| IPv6 ND HA Memory Leak from IPv6 NS on Mgmt port |
|
| RP Crash While Debugging IKEv2 |
● Smart Licensing Using Policy for Cisco Enterprise Routing Platforms
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.