Product |
Description |
---|---|
Cisco 7200VXR Series Routers |
|
NPE-300 |
Cisco 7200VXR Network Processing Engine 300 |
Cisco 7200 Series Routers with an NPE-300 installed will not boot-up when Cisco IOS 12.0(5)XE3 is installed.
CSCdp45379 tracks this problem.
The Cisco IOS 12.0XE release is independent from other 12.0XE maintenance releases, such as 12.0(1)XE or 12.0(2)XE. These rebuilds (XE1, XE2) offer software repairs and implement new features. We recommend Cisco IOS 12.0(5)XEy only for customers seeking the new features that were introduced in all rebuilds of the 12.0(5)XEy releases, including 12.0(5)XE, 12.0(5)XE1, 12.0(5)XE2, and 12.0(5)XE3. These features are:
Quality of service for Virtual Private Networks (VPN)
Network-based application recognition (NBAR)
E1 support for two-port T1/E1 high-capacity digital voice port adapter for Cisco 7200 series routers PA-VXC-2TE1
Two-port T1/E1 high-capacity digital voice port adapter for Cisco 7200 series routers PA-VXC-2TE1
Inverse multiplexing over ATM (IMA) port adapter PA-A3-8E1IMA and PA-A3-8T1IMA.
Distributed traffic shaping (DTS)
Cisco 12.0XE maintenance releases and rebuilds will not be maintained as a regular Cisco IOS maintenance release. To receive support for the new features and software repairs affecting 12.0(5)XEy releases, follow the 12.0(5)XE rebuild release to the next recommended release, once it is available. The Cisco IOS 12.0(5)XEy upgrade path is 12.0(5)XE4.
For more background information see:
Cisco IOS Software Release 12.0XE
A Cisco 7200 Series router with an NPE-300 installed will not boot with Cisco IOS 12.0(5)XE3 images.
There is no workaround.
Cisco recommends not using Cisco IOS 12.0(5)XE3 7200 images. Instead, use the 12.0(5)XE4 images described below.
Cisco IOS 12.0(5)XE3 7200 images were deferred to 12.0(5)XE4 on December 3, 1999. Any new orders with 12.0(5)XE3 were converted to 12.0(5)XE2. Orders will be converted to 12.0(5)XE4 as soon as it is available.
Presently Cisco 12.0(5)XE2 images are deferred. Cisco 12.0(5)XE2 7200 images are deferred indefinitely.
12.0(5)XE3 includes the Quality of service for Virtual Private Networks (VPN) feature. Also, the following software defects are resolved in 12.0(5)XE3 (and not in 12.0(5)XE2):
CSCdk60571 CSCdm54800 CSCdm70634 CSCdm78342 CSCdm78862 CSCdm81025 CSCdm81279 CSCdm81282 CSCdm35269 CSCdm41973 CSCdm42099 CSCdm54163 CSCdm82248 CSCdm84642 CSCdm85603 CSCdm87020 CSCdm87180 |
CSCdm66123 CSCdm66734 CSCdm67921 CSCdm68641 CSCdm74241 CSCdm74803 CSCdm75851 CSCdm77494 CSCdm87196 CSCdm87419 CSCdm87821 CSCdm88008 CSCdm88079 CSCdm88934 CSCdm89292 CSCdm89539 CSCdm90331 |
CSCdm91560 CSCdm91568 CSCdm91627 CSCdm92694 CSCdm92769 CSCdm93434 CSCdm94140 CSCdm94637 CSCdm94939 CSCdp00693 CSCdp01867 CSCdp01886 CSCdp02004 CSCdp02460 CSCdp02472 CSCdp03612 CSCdp03710 |
CSCdp03809 CSCdp05119 CSCdp08082 CSCdp08887 CSCdp09315 CSCdp09443 CSCdp10943 CSCdp11864 CSCdp12095 CSCdp14080 CSCdp14765 CSCdp15467 CSCdp15855 CSCdp16179 CSCdp16460 CSCdp16549 CSCdp16982 |
CSCdp18336 CSCdp18662 CSCdp18754 CSCdp19299 CSCdp20169 CSCdp20627 CSCdp21979 CSCdp22431 CSCdp22799 CSCdp23155 CSCdp25129 CSCdp28550 CSCdp31195 CSCdp32791 CSCdp34066 |
Cisco IOS 12.0(5)XE4 is a rebuild of 12.0(5)XE3 that fixes CSCdp45379.
Cisco IOS 12.0(5)XE4 forecast is:
Available on CCO - December 7, 1999
Available through Manufacturing - December 13, 1999
This defect has Cisco bug ID CSCdp45379. If you are a and you have logged in, you can view the bug details. .
DDTS |
Description |
Severity |
---|---|---|
CSCdp45379 |
View CSCdp45379 12.0(5)XE3 enterprise images wont boot on NPE300 |
1 |
The affected images will be removed from CCO and will not be shipped.
IOS Trains Affected |
IOS Maintenances Affected |
IOS Images Affected |
---|---|---|
12.0(5)XE3 |
12.0(5)XE3 |
all c7200 images ( c7200-*-mz) |
There are no interims built for 12.0X trains.
To obtain the next maintenance release, follow the instructions below:
Software Downloading from CCO via World Wide Web
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.