Ultra Cloud Core User Plane Function

Introduction

This Release Notes identifies changes and issues related to this software release.

Release Lifecycle Milestones

Release Lifecycle Milestone

Milestone

Date

First Customer Ship

FCS

31-Jan-2024

End of Life

EoL

31-Jan-2024

End of Software Maintenance

EoSM

31-Jul-2025

End of Vulnerability and Security Support

EoVSS

31-Jul-2025

Last Date of Support

LDoS

31-Jul-2026

These milestones and the intervals between them are defined in the Cisco Ultra Cloud Core (UCC) Software Release Lifecycle Product Bulletin available on cisco.com.

Release Package Version Information

Software Packages

Version

companion-vpc-21.28.m19.tgz.SPA.tar.gz

21.28.m19

qvpc-si-21.28.m19.bin.SPA.tar.gz

21.28.m19

qvpc-si-21.28.m19.qcow2.tgz.SPA.tar.gz

21.28.m19

NED package

ncs-6.1.5-cisco-staros-5.52

NSO

6.1.5

Descriptions for the various packages provided with this release are available in the Release Package Descriptions section.

Verified Compatibility

Products

Version

ADC Plugin

2.73.8.1991

RCM

2024.01.0

Ultra Cloud Core SMI

2024.01.1

Ultra Cloud Core SMF

2024.01.0

What's New in this Release

New in Documentation

This version of Release Notes includes a new section titled What’s New in this Release comprising all new features, enhancements, and behavior changes applicable for the release.

This section will be available in all the 5G release notes and will supersede content in the Release Change Reference (RCR) document. Effective release 2024.01, the RCR document will be deprecated.

Features and Enhancements

This section covers a brief description of the features and enhancements introduced in this release. It also includes links to detailed documentation, where available.

Feature Description

Dual Stack Support on S1-U and N3 Interfaces

UPF supports dual stack to handle IPv4 and IPv6 connections on N3 and S1-U interfaces.

Default Setting: Enabled – Always-on

Redirect URL Encryption

UPF supports encryption of dynamic fields in the redirected URL using the Blowfish and AES encryption methods.

Default Setting: Disabled – Configuration required to enable

Behavior Changes

This section covers a brief description of behavior changes introduced in this release.

Behavior Change Description

Behavior of Sx Peers in SxDemux

Previous Behavior: When the Sx peer moved from Associated state to New state, the Sx peers to be checkpointed for SxDemux recovery were deleted from SxDemux.

New Behavior: When the Sx peer moves to Released state, the Sx peers to be checkpointed for SxDemux recovery will be deleted from SxDemux.

Extended Intercept ID Display in CLI Output

Previous Behavior: The output of the show lawful-intercept all CLI command displayed only the Intercept ID with the "Intercept-ID" variable.

New Behavior: The "Intercept-ID" variable in the output show lawful-intercept all CLI command will also display the Extended Intercept ID (XID) if received through SMF.

Handling Sx Services after Unplanned Switchover

Previous Behavior: On Sx-service deletion, SxDemux sends DeRegistration information to VPNMgr to release IP pools related to peers under that service.

New Behavior: On Sx-service deletion, SxDemux will first check other Sx services. If another Sx service exists with the same PFCP peer, then SxDemux will not send DeRegistration request to the VPNMgr.

HTTP Request Methods during Redirection

Previous Behavior: HTTP redirection was applied only on HTTP GET and not applied on other request methods such as HTTP POST.

New Behavior: HTTP redirection will now be applied on all HTTP Request methods.

Increase in QER Limit per PDR

The QER limit per PDR is increased for the PTT (Push to Talk) feature.

Previous Behavior: UPF supported a maximum number of two QERs per PDR association.

New Behavior: The maximum number of QERs per PDR limit is increased to three in this release.

Length Validation of OHC Description Field

Previous Behavior: When the OHC (Outer Header Creation) description field was set to 768, length validation was not done.

New Behavior: When the OHC IE receives the Outer Header Creation description field with both GTP-U/UDP/IPv4 and GTP-U/UDP/IPv6, the length of the OHC IE as 26 bytes is validated. If the length is not 26 bytes, then Sx message responds with the PFCP_CAUSE_MANDATORY_IE_INCORRECT cause code with Offending IE OUTER_HDR_CREATION.

Maximum PDR Limit

Previous Behavior: UPF did not enforce a maximum limit for installed PDRs per subscriber.

New Behavior: UPF now enforces a maximum limit of 356 installed PDRs per subscriber.

If the number of installed PDRs exceeds the maximum limit due to new Create PDRs in Modify Request, then Sx/N4 Modify Request is rejected.

Message Handling during Inter-PLMN Handover

Previous Behavior: When inter-PLMN handover was detected, UPF did not validate Create PDR for rulebase in Sx Modify Request.

New Behavior: When inter-PLMN handover is detected, validation is enforced on UPF to reject Sx Modify Request without any Create PDR for the rulebase.

OHC IE Validation on N4 Interface

Previous Behavior: For N4 calls, the OHC (Outer Header Creation) IE in an uplink FAR led to validation failure and rejection of Sx Establishment/Modification Request.

New Behavior: If an OHC IE is present in an uplink FAR for N4 calls, UPF establishes Sx Establishment/Modification Request without failure.

Customer Impact: This behavior might impact the OHR and OHC functionality.

Port Number Behavior in EDR Module Configuration

After Cisco SSH or SSL upgrade, the port number behavior has changed for the EDR-module configuration.

Previous Behavior: In the EDR-module configuration, the default SFTP port number "0" was selected automatically and connected to port 0 when colon was specified.

For example:

cdr transfer-mode push primary url sftp://root:starent@192.0.2.1:/root/EDR/ via local-context

New Behavior: The EDR-module configuration is updated to allow the new default SFTP port number "22" or disallow the port number without specifying a colon.

For example:

cdr transfer-mode push primary url sftp://root:starent@192.0.2.1:22/root/EDR/ via local-context (with default SFTP port number)

cdr transfer-mode push primary url sftp://root:starent@192.0.2.1/root/EDR/ via local-context (without colon)

User Plane Advertisement through Created PDR IE or Traffic Endpoint IE

Previous Behavior: The Local F-TEID in Create PDR or Create Traffic Endpoint IE was populated with the local GTP-U endpoint. This endpoint is allocated based on the configuration irrespective of Outer Header Removal received in the Create PDR IE. For example, if the GTP-U service configuration supported both IPv4 and IPv6 addresses, then both addresses are allocated and advertised in the Create PDR and Create Traffic Endpoint IEs.

New Behavior: The Local F-TEID allocation process works as earlier. With this release, the User Plane advertises the allocated F-TEID to the Control Plane through Create PDR or Create Traffic Endpoint IE in the following scenarios:

  • Outer Header Removal that is received in the Create PDR IE is also considered while populating Create PDR or Create Traffic Endpoint IE.

  • If Outer Header Removal is received as GTP-U, UDP, or IP, then the local GTP-U endpoint is advertised as allocated. This implies that if both IPv4 and IPv6 addresses are configured in the GTP-U service, then both addresses are allocated and advertised. If either IPv4 or IPv6 address is configured, then only the required address is allocated and advertised through Create PDR or Create Traffic Endpoint IE.

  • If Outer Header Removal is received as GTP-U, UDP, or IPv4, then only the IPv4 address is advertised even if both addresses are configured.

  • If Outer Header Removal is received as GTP-U, UDP, or IPv6, then only the IPv6 address is advertised even if both addresses are configured.

Customer Impact: The behaviour of Local F-TEID in Create PDR or Create Traffic Endpoint IE is changed.

Installation and Upgrade Notes

This Release Note does not contain general installation and upgrade instructions. Refer to the existing installation documentation for specific installation and upgrade considerations.

Software Integrity Verification

To verify the integrity of the software image you have from Cisco, you can validate the SHA512 checksum information against the checksum identified by Cisco for the software.

Image checksum information is available through Cisco.com Software Download Details. To find the checksum, hover the mouse pointer over the software image you have downloaded.

The following screenshot is an example of a UPF release posted in the Software Download page.

At the bottom you find the SHA512 checksum, if you do not see the whole checksum you can expand it by pressing the "..." at the end.

To validate the information, calculate a SHA512 checksum using the information in Table 1 and verify that it matches either the one provided on the software download page.

To calculate a SHA512 checksum on your local desktop, refer to the following table.

Table 1. Checksum Calculations per Operating System

Operating System

SHA512 checksum calculation command examples

Microsoft Windows

Open a command line window and type the following command:

> certutil.exe -hashfile filename.extension SHA512 

Apple MAC

Open a terminal window and type the following command:

$ shasum -a 512 filename.extension 

Linux

Open a terminal window and type the following command:

$ sha512sum filename.extension 

OR

$ shasum -a 512 filename.extension 

NOTES:

filename is the name of the file.

extension is the file extension (for example, .zip or .tgz).

If the SHA512 checksum matches, you can be sure that no one has tampered with the software image or the image has not been corrupted during download.

If the SHA512 checksum does not match, we advise you to not attempt upgrading any systems with the corrupted software image. Download the software again and verify the SHA512 checksum again. If there is a constant mismatch, please open a case with the Cisco Technical Assistance Center.

Certificate Validation

UPF software images are signed via x509 certificates. Please view the .README file packaged with the software for information and instructions on how to validate the certificates.

Open Bugs for this Release

The following table lists the open bugs in this specific software release.


Note


This software release may contain open bugs first identified in other releases. Additional information for all open bugs for this release are available in the Cisco Bug Search Tool.


Bug ID

Headline

CSCwf08057

Observed Update FAR not found with FAR ID

CSCwh02919

4g converged and non converged calls getting drop with echo req/res on MPLS over N9

CSCwh25088

[UPF] VUPF doesn't update proper counts in show user-plane-service statistics for RA packet

CSCwh55448

restart seen for the func /pC :libc.so.6/__strlen_sse2_bsf

CSCwh93681

Sessmgr restart at function sessmgr_uplane_process_sx_sess_modify_request()

CSCwi10931

UPF GTPU statictis displays incorrect Downlink Packets / Bytes counters

CSCwi47535

[UPF]:First-Packet-Time is wrongly set for RB URR whn recal measmnt IE is receivd & data sent again

CSCwi59700

[UPF]SN-Charge volume parameter in EDR is wrongly pegged in case of flow redirect and delay charging

CSCwi68993

OHR not displayed post sessctrl/sessmgr recovery for Sxa Access PDR created midsession

CSCwi75020

[UPF] : Data drop is seen on UPF, when Pure p call (using cnPGW) attached with Dual stack cli.

CSCwi80353

sessmgr is in over state post sessmgr task kill

Resolved Bugs for this Release

The following table lists the resolved bugs in this specific software release.


Note


This software release may contain bug fixes first introduced in other releases. Additional information for all resolved bugs for this release are available in the Cisco Bug Search Tool.


Bug ID

Headline

Behavior Change

CSCwb70785

CUPS-UP: hatsystem crash due to VPP timeout, Assertion failure at hat/hatsystem_fail.c:2115

No

CSCwc25704

[CUPS-UP] Some UP does not activate VPP correctly after upgrade or reload

No

CSCwc87274

CUPS,VPP restart in vlan_ip4_qos_mark_node_fn_avx2

No

CSCwd46457

SSD collection may cause BFD timeout with 16 vpp workers due to show memory main-heap

No

CSCwe23786

CLI controlled rcm vpnmgr message to clear the contextpoolinfo in rcm controller

Yes

CSCwh07562

[UPF LI TLS] Intercept ID is not populated on lawfull intercept all cli

Yes

CSCwh36428

CP fails to push ECS config after Sx interface restarts

No

CSCwh37600

Charging ID inside correlation number is showing 00 00 when using SGW-Service

No

CSCwh50950

Unable to send IMS-Signaling data from UP to LMISF server when pfd push is disabled on CUPS

No

CSCwh51860

[UPF] Sx peers are in associated state when configured CPGROUP is not associated with user-plane-ser

Yes

CSCwh62914

UPF show gtpu statistics peer-address should display bytes and pks for gtpu peer (umbrella Stats)

No

CSCwh79335

Need to disable OHC validation for N4 interface on uplink FAR

Yes

CSCwh82744

[UPF] SFW stats incorrectly getting reconciled from VPP to sessmgr

No

CSCwh84396

[UPF] Discrepancies in stat counters and disconnect reasons during gtpu path failure

No

CSCwh85618

hd raid CF2 disk is not used or available when CF1 is down

No

CSCwh94672

Sessmgr crashed with function ld-linux.so.2/_dl_sysinfo_int80()

No

CSCwh97931

x

Need a fix on SxDemux for the IP chunk issue reported in BEMS01626426

Yes

CSCwi06981

[UPF]HTTP Redirect not working for HTTP method as POST.

Yes

CSCwi15603

UPF displays Port bits for OHC for 5G Attach with GNB having IPv4v6 transport

Yes

CSCwi16517

VPP issues with 21.28.m14

No

CSCwi19432

[UPF] - Handle exception when SMF does not remove the PDR for 5g-4g HO collision with IM exit

Yes

CSCwi25572

VPP Buffers reach 100% utilization with Mellanox NICs and NSH-Traffic-Steering

No

CSCwi26650

sessmgr restart at egtpu_process_update_req_evt() with inter/intra plmn HO calls

Yes

CSCwi43742

When redirect url length exceeds 512 then appended attributes sent incomplete in 302

Yes

CSCwi56450

Incorrect handling when gnodeB is dual-stack and SMF is not configured to be dual stack

Yes

CSCwi59651

VPP restart as /usr/sbin64/vpp(sn_assert_signal_handler

No

CSCwi61820

[UPF]Post switchover pfcp flow with port 8805 is getting deleted, leading to call failures.

No

CSCwi66621

[UPF]QER limit needs to be increased to 3 per PDR, for PTT feature.

Yes

CSCwi70108

VPP restart observed in CUPS-UP

No

CSCvr87595

[CUPS-UP] vpp restarted - vlib_worker_thread_barrier_sync_int()

No

CSCvu89270

[BP-CUPS]: sesmgr restart at sessmgr_med_data_process_memif_pri()

No

CSCvz70927

Multiple vpp crashes with 21.25.0.82232

No

Operator Notes

StarOS Version Numbering System

The output of the show version command displays detailed information about the version of StarOS currently running on the ASR 5x00 or Cisco Virtualized Packet Core platform.

The Version Build Number for releases 21.1 and later include a major and emergency release number, for example, "21.1.1".

The appropriate version number field increments after a version has been released. The new version numbering format is a contiguous sequential number that represents incremental changes between releases. This format facilitates identifying the changes between releases when using Bug Search Tool to research software releases.


Note


The 5G UPF software is based on StarOS and implements the version numbering system described in this section. However, as a 5G network function (NF), it is posted to Cisco.com under the Cloud Native Product Numbering System as described in Cloud Native Product Version Numbering System.


Cloud Native Product Version Numbering System

The show helm list command displays detailed information about the version of the cloud native product currently deployed.

The appropriate version number field increments after a version has been released. The new version numbering format is a contiguous sequential number that represents incremental changes between releases. This format facilitates identifying the changes between releases when using Bug Search Tool to research software releases.

Release Package Descriptions

The following table provides descriptions for the packages that are available with this release.

Software Packages

Description

companion-vpc-<staros_version>.zip.SPA.tar.gz

Contains files pertaining to VPC, including SNMP MIBs, RADIUS dictionaries, ORBEM clients, etc. These files pertain to both trusted and non-trusted build variants. The VPC companion package also includes the release signature file, a verification script, the x.509 certificate, and a README file containing information on how to use the script to validate the certificate.

qvpc-si-<staros_version>.bin.SPA.tar.gz

The UPF release signature package. This package contains the VPC-SI deployment software for the UPF as well as the release signature, certificate, and verification information.

Files within this package are nested under a top-level folder pertaining to the corresponding StarOS build.

qvpc-si-<staros_version>.qcow2.zip.SPA.tar.gz

The UPF release signature package. This package contains the VPC-SI deployment software for the UPF as well as the release signature, certificate, and verification information.

Files within this package are nested under a top-level folder pertaining to the corresponding StarOS build.

ncs-<nso_version>-cisco-staros-<version>.signed.bin

The NETCONF NED package. This package includes all the files that are used for NF configuration.

Note that NSO is used for NED file creation.

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, refer to https://www.cisco.com/c/en/us/support/index.html.