Table Of Contents
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Release 12.2(1)XE1
Cisco 828 and Cisco 78 Routers
New Hardware Features in Release 12.2(1)XE
New Software Features in Release 12.2(1)XE1
Digital Subscriber Line Features on the Cisco 828 Router
New Software Features in Release 12.2 T
boot system flash imagename Command Not Supported
boot system tftp Command Not Supported
IPSec Unavailable When Fast-Switching Enabled
Configuring PPPoE on a Cisco 806 Router
Cisco 806 Router Supported MIBs
Cisco 828 Router Supported MIBs
Resolved Caveats - Release 12.2(1)XE2
Point-to-Point Protocol Remote System Authentication
Challenge Handshake Authentication Protocol Configuration
Configuring One-Way Authentication Using CHAP
Cisco IOS Software Documentation Set
Release 12.2 Documentation Set
Obtaining Technical Assistance
Contacting TAC by Using the Cisco TAC Website
Release Notes for the SOHO 70 Series Routers and the Cisco 800 Series Routers for Cisco IOS Release 12.2(1)XE
February 13, 2002
These release notes for the Cisco 800 Series Routers and the SOHO 70 Series Routers describe the enhancements provided in Cisco IOS Release 12.2(1)XE2. These release notes are updated as needed. Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.2 located on Cisco.com and the Documentation CD-ROM.
For a list of the software caveats that apply to Cisco IOS Release 12.2(1)XE2, see the "Caveats" section and Caveats for Cisco IOS Release 12.2 T. The caveats document is updated for every maintenance release and is located on Cisco.com and the Documentation CD-ROM.
Contents
These release notes discuss the following topics:
•Obtaining Technical Assistance
System Requirements
This section describes the system requirements for Release 12.2(1)XE2 and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Requirements
Table 1 and Table 2 provide the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.2(1)XE2 on the SOHO 70 Series Routers and the Cisco 800 Series Routers.
Hardware Supported
Cisco IOS Release 12.2(1)XE2 supports the following Cisco routers:
•SOHO 78
•Cisco 806
•Cisco 828
For detailed descriptions of new hardware features, see New Hardware Features in Release 12.2(1)XE.
Cisco 806 Router
The Cisco 806 router provides the following key hardware features:
•Provides connection to 10BaseT (10-Mbps) Ethernet networks and is compatible with 10/100-Mbps devices.
•Flash memory: The Cisco IOS uses the current default of 8 MB for loading Cisco IOS images.
•Webflash: 2 MB of Flash memory reserved for use by the Cisco Router Web Setup software.
•Cisco 806 Router Dynamic RAM: Default is 16 MB of DRAM and is expandable to 32 MB, using 4-MB, 8-MB, and 16-MB DIMM cards.
•The central processing unit is a 50 MHz MPC 855T RISC processor.
•Supports Cisco IOS software.
•Color-coded ports and cable reduce the chance of cabling errors.
•Routers can be stacked or mounted on a wall.
•Cable lock for physically securing the router.
•The routers provide locking power connectors and a Kensington-compatible locking slot.
Table 3 summarizes Cisco 806 router ports.
SOHO 78 and Cisco 828 Routers
The SOHO 78 and Cisco 828 routers provide the following key hardware features:
•Provide connection to 10BaseT (10-Mbps) Ethernet networks and is compatible with 10/100-Mbps devices.
•Provide connection to G.991.2 (digital-encoding standard) symmetrical high-speed digital subscriber line (G.SHDSL) networks.
•Flash memory: The Cisco IOS uses the current default of 8 MB for loading Cisco IOS images, upgradable by an additional 8 MB.
•Webflash: 2 MB of Flash memory reserved for use by the Cisco Router Web Setup software.
•Dynamic RAM: Default is 16 MB of DRAM and is expandable to 32 MB, using 4-MB, 8-MB, and 16-MB DIMM cards.
•The central processing unit is a 50 MHz MPC 855T RISC processor.
•Support Cisco IOS software.
•Color-coded ports and cables, which reduce the chance of cabling errors.
•Support router stacking or mounting on a wall.
•Accept a cable lock for physically securing the routers.
•Provide locking power connectors.
Table 3 summarizes SOHO 78 and Cisco 828 router ports.
Determining the Software Version
To determine the version of Cisco IOS software running on your SOHO 78, Cisco 806 or Cisco 828 router, log in to the router and enter the show version EXEC command. The following sample displays command output from a Cisco 806 router running Release 12.2(1)XE2:
Router> show versionCisco Internetwork Operating System SoftwareIOS (tm) 12.2 Software (c806-y6-mz), Version 12.2(1)XE2, RELEASE SOFTWAREUpgrading to a New Software Release
For general information about upgrading to a new software release, see Upgrading the Cisco IOS Software Release in Cisco Routers and Modems located at: http://www.cisco.com/warp/public/620/6.html
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features. Release 12.2(1)XE2 supports the same feature sets as Releases 12.2 T, but Release 12.2(1)XE2 can include new features supported by the SOHO 70 Series Routers and the Cisco 800 Series Routers. Table 5 and Table 6 list the feature sets supported by the SOHO 70 Series Routers and the Cisco 800 Series Routers.
Table 5 Feature Set Supported by the SOHO 78 Routers
Image Name Feature Set Software Image PlatformSOHO 78 Series IOS IP
IP
soho78-y1-mz
SOHO 78 routers
Table 7 lists the features and feature sets supported by the SOHO routers in Cisco IOS Release 12.2(1)XE2. Table 8 lists the features and feature sets supported by the Cisco 806 routers in Cisco IOS Release 12.2(1)XE2 and Table 9 lists the features and feature sets supported by the Cisco 828 routers in Cisco IOS Release 12.2(1)XE2. The tables use the following conventions:
•Yes—The feature is supported in the software image.
•No—The feature is not supported in the software image.
Note These feature set tables only contain a selected list of features. These tables are not cumulative—nor do they list all the features in each image.
New and Changed Information
The following sections list the new hardware and software features supported by the Cisco 800 series for Release 12.2(1)XE2 and above:
New Hardware Features in Release 12.2(1)XE1
The following sections list the new hardware features supported by the Cisco 800 Series Routers for Release 12.2(1)XE1.
Cisco 828 and Cisco 78 Routers
The Cisco 828 and Cisco 78 routers connect corporate telecommuters and small offices to corporate LANs and the Internet through Internet Service Providers (ISPs), using symmetrical high-data-rate digital subscriber lines (SHDSLs). The routers provides bridging and multiprotocol routing between LAN and WAN ports.
New Hardware Features in Release 12.2(1)XE
The following sections list the new hardware features supported by the Cisco 800 Series Routers for Release 12.2(1)XE.
Cisco 806 Router
The Cisco 806 router connects corporate telecommuters and small offices to corporate LANs and the Internet through Internet Service Providers (ISPs), using a broadband or Ethernet connection. The router provides bridging and multiprotocol routing between LAN and WAN ports.
New Software Features in Release 12.2(1)XE1
The following sections list the new software features supported by the Cisco 800 Series Routers for Release 12.2(1)XE1.
Digital Subscriber Line Features on the Cisco 828 Router
The Cisco 828 business-class G.shdsl router provides business-class functionality for small offices and telecommuters by supporting business-class security, differentiated classes of service, and managed network services. G.shdsl is the latest version of digital subscriber line (DSL) technology and provides businesses a symmetrical service for bandwidth intensive applications.
G.shdsl supports upstream and downstream speeds up to 2.3 MB per second, and reaches customers up to 28,000 feet from a Telco or Post, Telephone, and Telegraph (PTT) Office. G.shdsl is a standards-based technology and the Cisco 828 router supports the ITU G.991.2 standard.
The DSL features on the Cisco 828 router introduce new command line interface (CLI) commands. These ATM interface commands set the DSL line rate speed and specify whether the Cisco 828 router is customer premises equipment (CPE) or central office (CO) equipment. In addition, two associated new debug commands are available for troubleshooting.
New Software Features in Release 12.2 T
For information regarding the features supported in Cisco IOS Release 12.2 T, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/index.htm
This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click on the following path:
Service & Support: Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Cisco IOS Release 12.2
Limitations and Restrictions
Cisco 806 Router Limitations
boot system flash imagename Command Not Supported
Although the boot system flash command is supported in Release 12.2(1)XE2, the configuration command boot system flash imagename is not supported.
boot system tftp Command Not Supported
The configuration command boot system tftp is not supported in Release 12.2(1)XE2.
IPSec Unavailable When Fast-Switching Enabled
For some interfaces, if fast-switching is enabled, IPSec does not function. For example, the dialer interface, used for PPPoE configuration, does not support fast-switching and IPSec simultaneously.
Important Notes
The following sections contain important notes about Cisco IOS Release 12.2(1)XE2. (Also, see the "Caveats" section.)
Configuring PPPoE on a Cisco 806 Router
When specifying the method of authentication while configuring PPPoE and connecting to a Service Provider, the optional argument might be required to successfully authenticate the connection. For example:
interface Dialer0ppp authentication pap optionalor
interface Dialer0ppp authentication chap optionalCisco 806 Router Supported MIBs
The following MIBs are supported on the Cisco 806 router:
•ENTITY-MIB
•IF-MIB
•SNMPv2-MIB
•TCP-MIB
•UDP-MIB
•CISCO-IMAGE-MIB
•CISCO-SYSLOG-MIB
•CISCO-MEMORY-POOL-MIB
Cisco 828 Router Supported MIBs
Standard MIBs
•ATM-MIB.my
•ENTITY-MIB.my
•IF-MIB.my
•IGMP-MIB.my
•INT-SERV-GUARANTEED-MIB.my
•INT-SERV-MIB.my
•IPMROUTE-MIB.my
•PIM-MIB.my
•RFC1213-MIB.my
•RFC1381-MIB
•RFC1398-MIB.my (ETHERMIB)
•RSVP-MIB.my
•SNMPv2-MIB.my
•TCP-MIB.my
•UDP-MIB.my
Cisco MIBs
•CISCO-AAL5-MIB.my
•CISCO-ATM-EXT-MIB.my
•CISCO-BULK-FILE-MIB.my
•CISCO-CAR-MIB.my
•CISCO-FLASH-MIB.my
•CISCO-IETF-ATM2-PVCTRAP-MIB.my
•CISCO-IMAGE-MIB.my
•CISCO-IP-STAT-MIB.my
•CISCO-IPMROUTE-MIB.my
•CISCO-MEMORY-POOL-MIB.my
•CISCO-PING-MIB.my
•CISCO-QUEUE-MIB.my
•CISCO-SNAPSHOT-MIB.my
•CISCO-SYSLOG-MIB.my
•CISCO-TCP-MIB.my
•OLD-CISCO-CHASSIS-MIB.my
•OLD-CISCO-CPU-MIB.my
•OLD-CISCO-INTERFACES-MIB.my
•OLD-CISCO-IP-MIB.my
•OLD-CISCO-MEMORY-MIB.my
•OLD-CISCO-SYSTEM-MIB.my
•OLD-CISCO-TCP-MIB.my
New MIBs:
Cisco 828 routers support the SDSL-LINE-MIB with the G.shdsl extension.
Caveats
Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.
Caveats in Cisco IOS Releases 12.2 and 12.2 T are also in Cisco IOS Release 12.2(1)XE2. For information on caveats in Cisco IOS Release 12.2, see Caveats for Cisco IOS Release 12.2. For information on caveats in Cisco IOS Release 12.2 T, see Caveats for Cisco IOS Release 12.2 T. These two documents list severity 1 and 2 caveats and are located on CCO and the Documentation CD-ROM.
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Resolved Caveats - Release 12.2(1)XE2
This section describes unexpected behavior that is fixed in Release 12.2(1)XE2.
Management
CSCdw65903
An error can occur with management protocol processing. Please use the following URL for further information:
http://www.cisco.com/cgi-bin/bugtool/onebug.pl?bugid=CSCdw65903
Caveats for Release 12.2(1)XE
This section describes possibly unexpected behavior by software Release 12.2(1)XE.
Miscellaneous
•CSCdr36952
A defect in Cisco IOS software causes a Cisco router or switch to halt and reload if Cisco IOS HTTP service is enabled and a user attempts to browse to "http: //<router-ip>/%%". This defect can be exploited to produce a denial of service (DoS) attack.
The vulnerability, affects virtually all mainstream Cisco routers and switches running Cisco IOS Releases 11.1 through 12.1, as well as Release 12.2(1)XE. The vulnerability has been corrected, and Cisco is making fixed releases available to replace all affected Cisco IOS releases. Customers are urged to upgrade to releases that are not vulnerable to this defect as shown in detail below.
To mitigate the vulnerability, disable the Cisco IOS HTTP server using an access list on an interface in the path to the router to prevent unauthorized network connections to the HTTP server or apply an access-class option directly to the HTTP server itself. The IOS HTTP server is enabled by default only on Cisco 1003, 1004, and 1005 routers that are not configured. In all other cases, the Cisco IOS HTTP server must be explicitly enabled in order to exploit this defect.
The complete advisory, including software fixes and workarounds, is available at: http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml.
•CSCdt74776
When the IP address of a DHCP client BVI interface is configured manually (using the command ip address x.x.x.x s.s.s.s), the DHCPRELEASE command does not clear the current DHCP binding between the DHCP client and DHCP server. This is evident when you enable the command debug dhcp detail. To work around this problem, release the current IP address by using the command no ip address before assigning a static IP address to a DHCP client BVI interface with the command ip address x.x.x.x s.s.s.s.
•CSCdt97537
If you modify filtering configurations in IPSec with access lists, the sequence order of access list configuration commands you enter or remove might cause an unintended outcome due to the access lists not working properly. Consequently, ISAKMP negotiation and IPSec negotiation fail for traffic intended to be encrypted. Use the configuration scenarios described below to work around this problem.
To change the parameters of the current access list referenced in the encryption map, leave the access list in the encryption map and modify the access-list definition in global configuration mode as follows:
Router> no access-list 100Router> access-list 100 permit ip host 2.0.1.26 host 4.0.1.25To assign a different access list to the encryption map, follow the steps below:
Step 1 Remove the old access list assigned to the existing encryption map:
Router> crypto map map1 10 ipsec-isaRouter> no match address 100Step 2 Before defining the new access list, assign the new access list to the encryption map:
Router> crypto map map1 10 ipsec-isaRouter> match address 110Step 3 If the newly-configured access list in the encryption map is already defined, remove the access list from the encryption map prior to defining the new access list.
Router> no access-list 110exStep 4 Define the new access list and ensure it is referenced in the encryption map.
Router> access-list 110 permit ip host 2.0.1.26 host 4.0.1.25Step 5 After modifying access list parameters, clear any existing IPSec and ISAKMP SAs:
Router> clear crypto isakmpRouter> clear crypto sa
•CSCdu00267
When checking the firewall audit for TFTP, the number of bytes transferred is not shown correctly in the TFTP data session responder log.
•CSCdu22758
Enabling fast switching has no effect when using PPPoE. The router continues to process-switch all traffic. To work around this problem, specify dialer-group 1 under the dialer interface to allow packets to be fast switched correctly for PPPoE. For example:
interface Dialer0ip address 2.2.2.1 255.255.255.0encapsulation pppmtu 1492dialer pool 1dialer-group 1Documentation Updates
This section contains updates to the Cisco 806 Router Software Configuration Guide.
Omissions
Point-to-Point Protocol Remote System Authentication
The Cisco 806 Router Software Configuration Guide documents the configuration of Point-to-Point Protocol over Ethernet (PPPoE) support in the section "Configuring PPPoE Support," that begins on page 3-16. There are two types of authentication used with PPPoE. Challenge Handshake Authentication Protocol (CHAP), and Password Authentication Protocol (PAP). Either protocol is usable, but the Cisco 806 router and the remote system must both use the same authentication protocol.
Both CHAP and PAP authenticate a remote system by comparing the username and password offered by the remote system with the username and password in the local configuration file. The administrators for both ends of a connection must provide each other with the usernames and passwords for their respective systems before administrators can place the usernames and passwords for remote systems in local configuration files.
To enter the username and password for a remote system to use during authentication, enter the following command on the Cisco 806 router, in global configuration mode:
Router(config)#username username password passwordwhere username and password are the username and password of a remote system requiring authentication.
Challenge Handshake Authentication Protocol Configuration
The Cisco 806 Router Software Configuration Guide documents the configuration of the Challenge Handshake Authentication Protocol (CHAP) for the Point-To-Point Protocol (PPP) in the section "Configuring PPPoE Support," that begins on page 3-16. Step 19 on page 3-17 shows you one method of specifying the CHAP authentication protocol, as follows:
Step 19 Set the PPP authentication method.
Router(config-if)#ppp authentication chap
However, when CHAP is configured in this way, the Cisco 806 router uses its own local hostname and enable password to authenticate itself with the service provider network or corporate network. To use a different hostname and password when the router is authenticated, add them to the CHAP configuration.
To provide an alternate hostname and password to use during CHAP authentication, perform the following steps after step 19:
Step 20 Enter the hostname that you want to use during CHAP authentication.
Router(config-if)#ppp chap hostname hostnameStep 21 Enter the password that you want to use during CHAP authentication.
Router(config-if)#ppp chap password passwordStep 22 Exit router configuration mode.
Router(config-if)#end
Configuring One-Way Authentication Using CHAP
When two devices use CHAP authentication, each side sends out a challenge and the opposite sides respond by sending out their username and password. Each side authenticates the other independently. To operate with non-Cisco routers that do not support authentication by the calling router, use the command ppp authentication chap callin. When using the callin keyword, the Cisco 806 router only challenges the remote system when the remote system initiates the call.
Use the following procedure to configure one-way authentication. It begins at step 19 on page 3-17 of the Cisco 806 Router Software Configuration Guide.
Step 19 Set the PPP authentication method to CHAP callin.
Router(config-if)#ppp authentication chap callin
Note The callin keyword is added to the ppp authentication chap command for this example.
Step 20 Enter the hostname to use during CHAP authentication.
Router(config-if)#ppp chap hostname hostnameStep 21 Enter the password to use during CHAP authentication.
Router(config-if)#ppp chap password passwordStep 22 Exit router configuration mode.
Router(config-if)#end
Example Configuration
The following configuration example shows a PPPoE configuration. It contains an entry for a remote system that the Cisco 806 router would authenticate after receiving a call initiated by the remote system. This example also shows the use of one-way CHAP authentication with an alternate hostname and password to answer a challenge from a remote system. It includes the Ethernet 0 and Ethernet 1 configurations as well as the Dialer configuration.
username remote1 password 0 70703204E42081B!vpdn enablevpdn-group 1request-dialinprotocol pppoe!interface Ethernet0ip address 192.168.1.1 255.255.255.0ip tcp adjust-mss 1452!interface Ethernet1no ip addressip tcp adjust-mss 1452pppoe enablepppoe-client dial-pool-number 1!!interface Dialer0ip address negotiatedencapsulation pppdialer pool 1dialer group 1ppp authentication chap callinppp chap hostname sanjose5ppp chap password 43655E9782!Related Documentation
The following sections describe the documentation available for the Cisco 800 Series Routers. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and the Documentation CD-ROM.
Use these release notes with the documents listed in the following sections:
•Cisco IOS Software Documentation Set
Release-Specific Documents
The following documents are specific to Release 12.2 and apply to Release 12.2(1)XE2. They are located on Cisco.com and the Documentation CD-ROM:
•Release Notes for Cisco IOS Release 12.2
–To reach the Cross-Platform Release Notes for Cisco IOS Release 12.2 from Cisco.com, click on this path (under the heading Service & Support):
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes
–To reach the Cross-Platform Release Notes for Cisco IOS Release 12.2 on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes
•Product bulletins, field notices, and other release-specific documents
To reach these documents from Cisco.com, click on this path (under the heading Service & Support):
Technical Documents: Product Bulletins
•Caveats for Cisco IOS Release 12.2 and 12.2 T
The Caveats for Cisco IOS Release 12.2 and Caveats for Cisco IOS Release 12.2 T documents contain caveats applicable to all platforms for all maintenance releases of Release 12.2.
–To reach the caveats document from Cisco.com, click on this path (under the heading Service & Support):
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Caveats
–To reach the caveats document on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Caveats
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Platform-Specific Documents
The following documents are available for the Cisco 800 Series Routers on Cisco.com and the Documentation CD-ROM:
Cisco 806 Router
The following documents are available for the Cisco 806 router:
•Cisco 806 Router Cabling and Setup Quick Start Guide
•Cisco 806 Router Hardware Installation Guide
•Cisco 806 Router Software Configuration Guide
•Regulatory Compliance and Safety Information for the Cisco 806 Router
On Cisco.com at:
Technical Documents: Documentation Home Page: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 806 Router
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 806 Router
Cisco 828 and SOHO 78 Routers
These documents are available for the Cisco 828 and SOHO 78 routers on Cisco.com and the Documentation CD-ROM:
•Quick Start Guide - Setting up the Cisco 828 Router
•Cisco 828 Router and SOHO 78 Router Hardware Installation Guide
•Cisco 828 Router and SOHO 78 Router Software Configuration Guide
•Configuration Note for Cisco SOHO Series Routers
•Regulatory Compliance and Safety Information for the Cisco 828 Router and SOHO 78 Router
•Release Notes for Cisco 828 and SOHO 78 Routers
On Cisco.com at:
Technical Documents: Documentation Home Page: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 828 and SOHO 78 Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 828 and SOHO 78 Routers
Software Configuration
This document is available for the Cisco 800 Series and SOHO 70 Series routers on Cisco.com and the Documentation CD-ROM: Cisco Router Web Setup User Guide.
On Cisco.com at:
Technical Documents: Router Configuration Tools: Cisco Router Web Setup
On the Documentation CD-ROM at:
Cisco Product Documentation: Router Configuration Tools: Cisco Router Web Setup
Feature Modules
Feature modules describe new features supported by Release 12.2 and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
To reach the Release 12.2 feature modules:
•From Cisco.com, click on this path (under the heading Service & Support):
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: New Feature Documentation: New Features in 12.2-Based Limited Lifetime Releases: New Features in 12.2X Releases
•From the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: New Feature Documentation: New Features in 12.2-Based Limited Lifetime Releases: New Features in 12.2X Releases
Feature Navigator
Feature Navigator is a web-based tool that enables you to quickly determine which Cisco IOS software images support a particular set of features and which features are supported in a particular Cisco IOS image. Feature Navigator is available 24 hours a day, 7 days a week.
To access Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, e-mail the Contact Database Administration group at cdbadmin@cisco.com. If you do not have an account on Cisco.com, go to http://www.cisco.com/register and follow the directions to set up an account.
To use Feature Navigator, you must have a JavaScript-enabled web browser such as Netscape 3.0 or later, or Internet Explorer 4.0 or later. Internet Explorer 4.0 always has JavaScript enabled. To enable JavaScript for Netscape 3.x or Netscape 4.x, follow the instructions provided with the web browser. For JavaScript support and enabling instructions for other browsers, check with the browser vendor.
Feature Navigator is updated when major Cisco IOS software releases and technology releases occur. You can access Feature Navigator at the following URL:
http://www.cisco.com/go/fn
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. The Cisco IOS software documentation set is shipped with your order in electronic form on the Documentation CD-ROM—unless you specifically ordered the printed versions.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference. The Cisco IOS software documentation set is available on Cisco.com and on the Documentation CD-ROM.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Configuration Guides and Command References
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Configuration Guides and Command References
Release 12.2 Documentation Set
Table 10 lists the contents of the Cisco IOS Release 12.2 software documentation set, which is available in both electronic and printed form.
Note You can find the most current Cisco IOS documentation on Cisco.com and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2
Obtaining Documentation
The following sections provide sources for obtaining documentation from Cisco Systems.
World Wide Web
The most current Cisco documentation is available on the World Wide Web at http://www.cisco.com. Translated documentation can be accessed at http://www.cisco.com/public/countries_languages.shtml.
Documentation CD-ROM
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Ordering Documentation
Cisco documentation is available in the following ways:
•Registered Cisco Direct Customers can order Cisco product documentation from the Networking Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
•Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:
http://www.cisco.com/go/subscription
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS(6387).
Documentation Feedback
If you are reading Cisco products documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
For your convenience, many documents contain a response card behind the front cover for submitting your comments by mail. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
Obtaining Technical Assistance
The following sections provide sources for obtaining technical assistance from Cisco Systems.
Cisco.com
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
Contacting TAC by Using the Cisco TAC Website
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website:
http://www.cisco.com/tac
P3 and P4 level problems are defined as follows:
•P3—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
•P4—You need information or assistance on Cisco product capabilities, product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to your questions.
To register for Cisco.com, go to the following website:
http://www.cisco.com/register/
Cisco.com registered users who cannot resolve a technical issue by using the TAC online resource can open a case online by using the TAC Case Open tool at the following website:
http://www.cisco.com/tac/caseopen
Contacting TAC by Telephone
If you have a priority level 1(P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to the following website:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
P1 and P2 level problems are defined as follows:
•P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.
•P2—Your production network is severely degraded, affecting significant aspects of your business operations. No workaround is available.