Release Notes for Cisco Catalyst 9400 Series Switches, Cisco IOS XE Gibraltar 16.10.x
Introduction
Whats New in Cisco IOS XE Gibraltar 16.10.1
Hardware Features in Cisco IOS XE Gibraltar 16.10.1
Feature Name |
Description and Documentation Link |
---|
Software Features in Cisco IOS XE Gibraltar 16.10.1
Feature Name |
Description, Documentation Link and License Level Information |
---|---|
Boot Integrity Visibility (C9200) |
Allows Cisco's platform identity and software integrity information to be visible and actionable. Platform identity provides a platform’s manufacturing installed identity, and software integrity exposes boot integrity measurements that can be used to assess whether the platform has booted a trusted code.
(Network Essentials and Network Advantage) |
Cisco TrustSec (C9200) |
Provides security improvements to Cisco network devices based on the capability to strongly identify users, hosts, and network devices within a network. TrustSec provides topology-independent and scalable access controls by uniquely classifying data traffic for a particular role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers and encrypting links with those peers.
See → Cisco TrustSec.
(Network Advantage) |
Programmability
|
These programmability features were introduced in the release:
See → Programmability Configuration Guide, Cisco IOS XE Gibraltar 16.10.x. |
Secure Storage of Encryption Keys and Passwords |
Secures critical configuration, keys, and passwords by encrypting them. An instance-unique encryption key is stored in the hardware trust anchor to prevent it from being compromised. This feature is enabled on platforms that come with a hardware trust anchor, by default and is not supported on platforms that do not have a hardware trust anchor.
(Network Essentials and Network Advantage) |
Simplified Factory Reset |
Removes all customer specific data that has been added to the device since the time of its shipping. Data erased includes configurations, log files, boot variables, core files, and credentials.
(Network Essentials and Network Advantage) |
Software Maintenance Upgrade (SMU) |
The SMU package now supports patching of the public key infrastructure (PKI) component.
(DNA Advantage) |
Serviceability |
|
debug commands |
|
show ip ospf traffic neighbour and show ipv6 ospf traffic neighbour commands |
The show ip ospf traffic neighbour and show ipv6 ospf traffic neighbour commands were introduced. They display Open Shortest Path First (OSPF) traffic statistics on a per-neighbor basis. |
show logging commands |
|
show platform commands |
|
show processes commands |
The show processes platform , show processes cpu platform , and show processes cpu platform history commands outputs were modified. The |
show processes memory platform commands |
|
show tech ospf command |
Command output was augmented to display address-family specific information. The command also provides options to display information about a specific VRF including OSPF information, routing information, and relevant running configuration. |
show tech-support commands |
|
New on the Web UI |
|
Web UI |
|
Important Notes
Unsupported Features
-
IPsec VPN
-
Virtual Routing and Forwarding (VRF)-Aware web authentication
Complete List of Supported Features
For the complete list of features supported on a platform, see the Cisco Feature Navigator at https://www.cisco.com/go/cfn.
Supported Hardware
Cisco Catalyst 9400 Series Switches—Model Numbers
The following table lists the supported switch models. For information about the available license levels, see section License Levels.
Switch Model (append with “=” for spares) |
Description |
---|---|
C9407R |
Cisco Catalyst 9400 Series 7 slot chassis
|
C9410R |
Cisco Catalyst 9400 Series 10 slot chassis
|
Supported Hardware on Cisco Catalyst 9400 Series Switches
Product ID (append with “=” for spares) |
Description |
---|---|
Supervisor Modules |
|
C9400-SUP-1 |
Cisco Catalyst 9400 Series Supervisor 1 Module This supervisor module is supported on the C9404R, C9407R, and C9410R chassis. |
C9400-SUP-1XL |
Cisco Catalyst 9400 Series Supervisor 1XL Module This supervisor module is supported on the C9404R, C9407R, and C9410R chassis. |
Gigabit Ethernet Switching Modules |
|
C9400-LC-24S |
Cisco Catalyst 9400 Series 24 Port, 1 Gigabit Ethernet SFP module that supports 100/1000 BASET-T with Cu-SFP |
C9400-LC-48P |
Cisco Catalyst 9400 Series 48 Port, 1 Gigabit Ethernet POE/POE+ module supporting up to 30W per port. |
C9400-LC-48S |
Cisco Catalyst 9400 Series 48 Port, 1 Gigabit Ethernet SFP module that supports 100/1000 BASET-T with Cu-SFP. |
C9400-LC-48T |
Cisco Catalyst 9400 Series 48-Port 10/100/1000 (RJ-45) |
C9400-LC-48U |
Cisco Catalyst 9400 Series 48-Port UPOE 10/100/1000 (RJ-45) module supporting up to 60W per port. |
Ten Gigabit Ethernet Switching Modules |
|
C9400-LC-24XS |
Cisco Catalyst 9400 Series 24-Port SFP/SFP+ Module |
Multigigabit Ethernet Switching Modules |
|
C9400-LC-48UX |
Cisco Catalyst 9400 Series 48-port, UPOE Multigigabit Ethernet Module with:
|
M.2 SATA SSD Modules1 (for the Supervisor) |
|
C9400-SSD-240GB |
Cisco Catalyst 9400 Series 240GB M2 SATA memory |
C9400-SSD-480GB |
Cisco Catalyst 9400 Series 480GB M2 SATA memory |
C9400-SSD-960GB |
Cisco Catalyst 9400 Series 960GB M2 SATA memory |
AC Power Supply Modules |
|
C9400-PWR-3200AC |
Cisco Catalyst 9400 Series 3200W AC Power Supply |
Optics Modules
Cisco Catalyst Series Switches support a wide range of optics and the list of supported optics is updated on a regular basis. Use the Transceiver Module Group (TMG) Compatibility Matrix tool, or consult the tables at this URL for the latest transceiver module compatibility information: https://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Compatibility Matrix
The following table provides software compatibility information.
Web UI System Requirements
The following subsections list the hardware and software required to access the Web UI:
Minimum Hardware Requirements
Processor Speed |
DRAM |
Number of Colors |
Resolution |
Font Size |
---|---|---|---|---|
233 MHz minimum2 |
512 MB3 |
256 |
1280 x 800 or higher |
Small |
Software Requirements
Operating Systems
-
Windows 10 or later
-
Mac OS X 10.9.5 or later
Browsers
-
Google Chrome—Version 59 or later (On Windows and Mac)
-
Microsoft Edge
-
Mozilla Firefox—Version 54 or later (On Windows and Mac)
-
Safari—Version 10 or later (On Mac)
Upgrading the Switch Software
This section covers the various aspects of upgrading or downgrading the device software.
![]() Note |
You cannot use the Web UI to install, upgrade, or downgrade device software. |
Finding the Software Version
The package files for the Cisco IOS XE software are stored on the system board flash device (flash:).
You can use the show version privileged EXEC command to see the software version that is running on your switch.
![]() Note |
Although the show version output always shows the software image running on the switch, the model name shown at the end of this display is the factory configuration and does not change if you upgrade the software license. |
You can also use the dir filesystem: privileged EXEC command to see the directory names of other software images that you might have stored in flash memory.
Software Images
Automatic Boot Loader Upgrade
![]() Note |
If Cisco Catalyst 9400 Series Supervisor 1 Module power is disconnected and reconnected within a 5-second window, the boot SPI may get corrupted. |
![]() Caution |
|
Scenario |
Automatic Boot Loader Response |
---|---|
If you boot Cisco IOS XE Gibraltar 16.10.1 for the first time |
The boot loader version may be upgraded to 16.6.2r [FC1]. For example:
If the automatic boot loader upgrade occurs, while booting, you will see the following on the console:
|
Complex Programmable Logic Device (CPLD) Upgrade
This refers to hardware-programmable firmware. The CPLD upgrade process is part of the automatic boot loader upgrade. The sequence of events is as follows:
![]() Note |
There are no FPGA or CPLD upgrades in Cisco IOS XE Gibraltar 16.10.1. |
-
The system copies
mcnewfpgaclose.hdr
andmcnewfpgaclose.img
to the bootflash. -
The supervisor module then automatically reloads to enable the new boot loader.
-
When the new boot loader boots up, the CPLD upgrade process starts automatically. The CPLD upgrade process takes approximately from 7 to 10 minutes. The supervisor will power cycle itself during the CPLD upgrade.
Initializing Hardware...
Initializing Hardware...
Initializing Hardware...
System Bootstrap, Version 16.6.2r, RELEASE SOFTWARE (P)
Compiled Thu 10/26/2017 8:30:34.63 by rel
Current image running:
Primary Rommon Image
Last reset cause: SoftwareResetTrig
C9400-SUP-1 platform with 16777216 Kbytes of main memory
Starting System FPGA Upgrade .....
Programming SPI Primary image is completed.
Authenticating SPI Primary image .....
IO FPGA image is authenticated successfully.
Programming Header .....
FPGA HDR file size: 12
Image page count: 1
Verifying programmed header .....
Verifying programmed header .....
Programmed header is verified successfully.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Power Cycle is needed to complete System firmware upgrade.
It takes ~7 mins to upgrade firmware after power cycle starts.
DO NOT DISRUPT AFTER POWER CYCLE UNTIL ROMMON PROMPT APPEARS.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Power Cycling the Supervisor card now !
Initializing Hardware...
Initializing Hardware...
System Bootstrap, Version 16.6.2r, RELEASE SOFTWARE (P)
Compiled Thu 10/26/2017 8:30:34.63 by rel
Current image running:
Primary Rommon Image
Last reset cause: PowerOn
C9400-SUP-1 platform with 16777216 Kbytes of main memory
rommon 1 >version -v
System Bootstrap, Version 16.6.2r, RELEASE SOFTWARE (P)
Compiled Thu 10/26/2017 8:30:34.63 by rel
Current image running:
Primary Rommon Image
Last reset cause: PowerOn
C9400-SUP-1 platform with 16777216 Kbytes of main memory
Fpga Version: 0x17101705
System Integrity Status: C334ABCE 6A40 6A48
Software Installation Commands
Upgrading in Install Mode
Follow these instructions to upgrade from one release to another, in install mode.
Before you begin
Note that you can use this procedure for the following upgrade scenarios.
When upgrading from ... |
Permitted Supervisor Setup (Applies to the release you are upgrading from) |
First upgrade to... |
To upgrade to ... |
||
---|---|---|---|---|---|
Cisco IOS XE Everest 16.6.14
|
Upgrade a single supervisor, and complete the boot loader and CPLD upgrade. After completing the first supervisor upgrade, remove and swap in the second supervisor. After both supervisors are upgraded, they can be inserted and booted in a high availability setup.
|
Cisco IOS XE Everest 16.6.3 Follow the upgrade steps as in the Release Notes for Cisco Catalyst 9400 Series Switches, Cisco IOS XE Everest 16.6.x → Upgrading the Switch Software → Upgrading in Install Mode |
Cisco IOS XE Gibraltar 16.10.1 |
||
Cisco IOS XE Everest 16.6.2 and later releases |
This procedure automatically copies the images to both active and standby supervisor modules. Both supervisor modules are simultaneously upgraded. |
Not applicable |
When upgrading from Cisco IOS XE Everest 16.6.1 to a later release, the upgrade may take a long time, and the system will reset three times due to rommon and complex programmable logic device (CPLD) upgrade. Stateful switchover is supported from Cisco IOS XE Everest 16.6.2
![]() Caution |
|
The sample output in this section displays upgrade from Cisco IOS XE Everest 16.6.3 to Cisco IOS XE Gibraltar 16.10.1 using install commands.
Procedure
Step 1 |
Clean Up |
Step 2 |
Copy new image to flash |
Step 3 |
Set boot variable |
Step 4 |
Software install image to flash |
Step 5 |
Reload |
Downgrading in Install Mode
Follow these instructions to downgrade from one release to another, in install mode. To perform a software image downgrade, you must be booted into IOS via boot flash:packages.conf .
Before you begin
Note that you can use this procedure for the following downgrade scenarios:
When downgrading from ... |
Permitted Supervisor Setup (Applies to the release you are downgrading from) |
To ... |
||
---|---|---|---|---|
Cisco IOS XE Gibraltar 16.10.1 |
This procedure automatically copies the images to both active and standby supervisor modules. Both supervisor modules are simultaneously downgraded.
|
Cisco IOS XE Fuji 16.9.x or earlier releases. |
The sample output in this section shows downgrade from Cisco IOS XE Gibraltar 16.10.1 to Cisco IOS XE Everest 16.6.2, using install commands.
![]() Important |
New hardware modules (supervisors or line card modules) that are introduced in a release cannot be downgraded. The release in which a module is introduced is the minimum software version for that model. We recommend upgrading all existing hardware to the same release as the latest hardware.
|
Procedure
Step 1 |
Clean Up |
||
Step 2 |
Copy new image to flash |
||
Step 3 |
Downgrade software image
The following example displays the installation of the
cat9k_iosxe.16.06.02.SPA.bin software image to flash, to downgrade the switch by using the install add file activate commit command. You can point to the source image on your tftp server or in flash if you have it copied to flash.
The following example displays sample output when downgrading the switch by using the install rollback to committed command.
|
||
Step 4 |
Reload |
Licensing
This section provides information about the licensing packages for features available on
License Levels
The software features available on fall under these base or add-on license levels.
Base Licenses
Add-On Licenses
The features available with add-on license levels provide Cisco innovations on the switch, as well as on the Cisco Digital Network Architecture Center (Cisco DNA Center).
-
DNA Advantage
To find information about platform support and to know which license levels a feature is available with, use Cisco Feature Navigator. To access Cisco Feature Navigator, go to https://cfnng.cisco.com. An account on cisco.com is not required.
License Types
The following license types are available:
-
Permanent—for a license level, and without an expiration date.
-
Evaluation—a license that is not registered.
License Levels - Usage Guidelines
Cisco Smart Licensing
Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it’s secure – you control what users can access. With Smart Licensing you get:
-
Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more PAKs (Product Activation Keys).
-
Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using.
-
License Flexibility: Your software is not node-locked to your hardware, so you can easily use and transfer licenses as needed.
To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (http://software.cisco.com).
![]() Important |
Cisco Smart Licensing is the default and the only available method to manage licenses. |
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide.
Deploying Smart Licensing
The following provides a process overview of a day 0 to day N deployment directly initiated from a device that is running or later releases. Links to the configuration guide provide detailed information to help you complete each one of the smaller tasks.
Procedure
Step 1 |
Begin by establishing a connection from your network to Cisco Smart Software Manager on cisco.com. See: |
Step 2 |
Create and activate your Smart Account, or login if you already have one. To create and activate Smart Account, go to Cisco Software Central → Create Smart Accounts. Only authorized users can activate the Smart Account. |
Step 3 |
Complete Cisco Smart Software Manager set up. |
How Upgrading or Downgrading Software Affects Smart Licensing
Smart Licensing is the default and only license management solution; all licenses are managed as Smart Licenses.
Note how upgrading to a release that supports Smart Licensing or moving to a release that does not support Smart Licensing affects licenses on a device:
-
When you downgrade to a release where Smart Licensing is not supported—all smart licenses on the device are converted to traditional licenses and all smart licensing information on the device is removed.
Using Smart Licensing on an Out-of-the-Box Device
Starting from , if an out-of-the-box device has the software version factory-provisioned, all licenses on such a device remain in evaluation mode until registered in Cisco Smart Software Manager.
See:
Scaling Guidelines
Limitations and Restrictions
-
Control Plane Policing (CoPP)—The show run command does not display information about classes configured under
system-cpp policy
, when they are left at default values. Use the show policy-map system-cpp-policy or the show policy-map control-plane commands in privileged EXEC mode instead. -
QoS restrictions
-
When configuring QoS queuing policy, the sum of the queuing buffer should not exceed 100%.
-
For QoS policies, only switched virtual interfaces (SVI) are supported for logical interfaces.
-
QoS policies are not supported for port-channel interfaces, tunnel interfaces, and other logical interfaces.
-
-
Secure Shell (SSH)
-
Use SSH Version 2. SSH Version 1 is not supported.
-
When the device is running SCP and SSH cryptographic operations, expect high CPU until the SCP read process is completed. SCP supports file transfers between hosts on a network and uses SSH for the transfer.
Since SCP and SSH operations are currently not supported on the hardware crypto engine, running encryption and decryption process in software causes high CPU. The SCP and SSH processes can show as much as 40 or 50 percent CPU usage, but they do not cause the device to shutdown.
-
-
VLAN Restriction—It is advisable to have well-defined segregation while defining data and voice domain during switch configuration and to maintain a data VLAN different from voice VLAN across the switch stack. If the same VLAN is configured for data and voice domains on an interface, the resulting high CPU utilization might affect the device.
-
YANG data modeling limitation—A maximum of 20 simultaneous NETCONF sessions are supported.
-
The File System Check (fsck) utility is not supported in install mode.
Caveats
Caveats describe unexpected behavior in Cisco IOS-XE releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Cisco Bug Search Tool
The Cisco Bug Search Tool (BST) allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The BST is designed to improve the effectiveness in network risk management and device troubleshooting. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat, click on the identifier.
Open Caveats in Cisco IOS XE Gibraltar 16.10.x
Caveat ID Number |
Description |
---|---|
Smart licensing(SL)Actions done soon after system bootup can cause SL to get stuck, requiring reload |
Resolved Caveats in Cisco IOS XE Gibraltar 16.10.1
Caveat ID Number |
Description |
---|
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at this URL:
https://www.cisco.com/en/US/support/index.html
Go to Product Support and select your product from the list or enter the name of your product. Look under Troubleshoot and Alerts, to find information for the problem that you are experiencing.
Related Documentation
Information about Cisco IOS XE at this URL: https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html
Cisco Validated Designs documents at this URL: https://www.cisco.com/go/designzone
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.