Cisco 8200, 8600, 8700, and 8800 Series Routers
Note |
In Release 24.4.1, BGP and IGP take approximately 10% longer to initiate the traffic flow compared to Release 24.3.1. This delay occurs after any event that triggers new bulk route learning and downloads, such as a router or line card reload, or any other event that can create such a condition. For example, in the case of BGP IPv4 with a scale of 1 million routes, the route download could take an additional 10 to 15 seconds in Release 24.4.1 compared to Release 24.3.1. The BGP and IGP traffic delay is only during the initial route programming phase. Once all routes have been learned, there are no functional impacts. Delays in starting traffic flow cases occur only in situations involving router or line card reloads when using Fast Re-Route (FRR) and Equal-Cost Multi-Path (ECMP) as redundancy mechanisms for the data path. |
What's New in Cisco IOS XR Release 24.4.1
Cisco IOS XR Release 24.4.1 is a new feature release for Cisco 8000 Series routers.
For more details on the Cisco IOS XR release model and associated support, see Software Lifecycle Support Statement - IOS XR.
Software Features Enhanced and Introduced
To learn about features introduced in other Cisco IOS XR releases, select the release from the Documentation Landing Page.
Feature | Description |
---|---|
Cisco IOS XR Setup and Upgrade |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This feature ensures that the boot configuration of the router remains static and tamper-proof. Immutable bootstrap maintains the integrity and security of the router from the initial boot stage and throughout its entire operation, preventing unauthorized misconfigurations that could disrupt the router's functionality. As a result, it enhances the overall security and reliability of network devices, ensuring they always boot into a known good state. In earlier releases, the boot configuration of the router was not immutable |
|
Programmability |
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]). This feature replaces the existing bi-directional data streaming service, Acctz, with the new server-streaming service, AcctzStream and ensures effective network optimization and resource utilization. With this feature, you can configure the maximum memory allocated for cached accounting history records using the grpc aaa accounting history-memomy command. The feature introduces these changes: CLI: For the specification on the gNSI Accounting (AcctzStream) RPCs and messages, see the Github repository. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) With gNOI Healthz, you can monitor and troubleshoot device health by collecting logs and conducting root-cause analysis (RCA) on detected issues. This proactive approach allows for the early identification and resolution of system health problems, thereby reducing downtime and enhancing reliability. For the specification on gNOI.healthz, see the GitHub repository. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now enhance your network security by enabling TLS 1.3 support for gRPC services. This update provides stronger protection against vulnerabilities, improves performance with faster connection times and reduced latency, and removes outdated ciphers. Additionally, it complies with internal security mandates, offering a more robust and future-proof solution for your network management needs. Previously, gRPC server supported TLS version 1.2. The feature introduces these changes: CLI: |
|
Tracking and Synchronization of PBR PolicyMap Statistics Using Unique IDs and InsightDB |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now accurately track, store, and synchronize per-rule statistics for PBR policy maps using unique IDs. These unique IDs are registered with InsightDB through a mapping mechanism, which includes a global key (a combination of policy map and Rule in string format) and a local key (an allocated unique number of uint64 type). To know more about creating a Service Layer API for Interfaces, see Cisco IOS-XR Service Layer Interfaces. This feature modifies Cisco-IOS-XR-pbr-fwd-stats-oper (see GitHub, YANG Data Models Navigator) data model. |
Validation of Route Installation Using Service Layer API |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now validate route installation through hardware acknowledgements. This feature supports Label Switched Path (LSP) selection based on IP Class-Based Forwarding (CBF) for optimized traffic engineering. It also dynamically updates routing information using next-hop and Next Hop Group (NHG) tracking based on network events and supports forward references between objects for flexible programming. Previously, route installation confirmation, traffic engineering optimization, dynamic routing updates, and flexible programming required more manual configuration and monitoring. To know more about creating a Service Layer API for Interfaces, see Cisco IOS-XR Service Layer Interfaces. This feature introduces these changes: CLI: The show service-layer route command is modified to include client and brief keywords. |
Nexthop Resolution |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) Nexthop resolution minimizes traffic loss and improves network performance by ensuring BGP paths are valid and optimal. It works by using a gRPC callback API provided by XR to determine the reachability and metrics of nexthops. BGP++ can register nexthops, specify resolution conditions, and receive updates. The status response includes the IP address, resolution status, resolving route, and IGP metrics. Users can track and update a large number of nexthops in real-time, making it suitable for large-scale data centers. To know more about creating a Service Layer API for Interfaces, see Cisco IOS-XR Service Layer Interfaces. |
Support Active IP Route Callback and Safe to Receive IP/MPLS Traffic Callback |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This feature aims to enhance network reliability and traffic integrity by ensuring that routes and MPLS tunnels are ready to receive traffic before they are advertised or used. It consists of two components:
To know more about creating a Service Layer API for Interfaces, see Cisco IOS-XR Service Layer Interfaces. |
Interface Status of Service Layer API |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now receive low latency notifications for interface state and bandwidth changes via SL- API within 100ms. This feature ensures that when a physical or bundle interface changes its state or bandwidth, notifications are delivered promptly to the customer’s SDN agent. The system uses gRPC-based streaming APIs, allowing clients to subscribe to all or specific interfaces. This ensures timely and reliable delivery of interface events to the customer's SDN agent. To know more about creating a Service Layer API for Interfaces, see Cisco IOS-XR Service Layer Interfaces. |
Routing |
|
Enhanced BGP BFD Strict-Mode Capabilities for Improved Interoperability |
Introduced in this release on: Fixed Systems (8200 [ASIC: P100], 8700 [ASIC: P100]); Modular Systems (8800 [LC ASIC: P100]) You now have the capability of upgrading your network with Cisco "BGP BFD strict-mode negotiate" and "override" modes, which enhance stability and device cooperation between Cisco IOS XR and Cisco XE systems. These modes ensure BGP sessions initiate only if BFD sessions are active, with the override option enforcing this even if a peer device lacks strict-mode support. This feature resolves interoperability issues, secures route propagation, and adheres to IETF standards, leading to a more reliable network. This feature introduces these changes: CLI:
YANG Data Models:
(See GitHub, YANG Data Models Navigator) |
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200]) You can now gracefully shut down IS-IS on an interface or router without abruptly interrupting network operations. This feature simplifies operations by consolidating multiple steps into a single command, ensuring network stability during maintenance or configuration changes. This feature introduces these changes: CLI: YANG Data Model:
|
|
Segment Routing |
|
Delay and synthetic loss measurement for GRE tunnel interfaces |
Introduced in this release on: Fixed Systems (8200); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now measure the latency or delay experienced by data packets when they traverse a network, and also proactively monitor and address potential network issues before they impact users by measuring key parameters such as packet loss, and jitter for GRE tunnel interfaces. This feature enables you to report synthetic Two-Way Active Measurement Protocol (TWAMP) test packets that are deployed in delay-profile or delay measurement sessions, and enables delay measurement for GRE tunnel interfaces. The feature introduces these changes: CLI: The performance-measurement interface command is modified with a new tunnel-ip keyword. |
Introduced in this release on: Fixed Systems (8200); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now advertise fallback delay value, retaining delay information in performance metrics even when delay metrics for interfaces are temporarily unavailable due to hardware, synchronization, or network connectivity issues. The feature ensures optimal routing decisions, by maintaining network stability and continuous performance, even when real-time metrics are temporarily inaccessible. Previously, the performance metrics did not include delay metrics when they were temporarily inaccessible, resulting in visibility gaps in the network and less effective routing. The feature introduces these changes: CLI: The performance-measurement interface command is modified with a new advertise-delay fallback keyword. YANG Data Models:
See (GitHub, Yang Data Models Navigator) |
|
Introduced in this release on: Fixed Systems (8200); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) SR PM now enables network operators to compute both far-end (T4 – T3) and near-end (T2 – T1) delay metrics, providing a complete view of end-to-end delay across the entire data path. Measuring the far-end delay from the responder to the querier node improves visibility, and allows operators to accurately monitor and evaluate network performance. Previously, you could measure the near-end delay metrics for a given data path. |
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) The enhanced IGP flexible algorithm path computation optimizes paths by automatically adjusting to changes in link bandwidth, which is particularly advantageous for handling parallel L3 links and dynamic changes in link bandwidth, such as in L2 link bundles. This ensures optimal capacity paths by considering cumulative bandwidth in parallel links, preferring paths with the best available bandwidth and benefiting high-bandwidth traffic flows. In addition to traditional metrics like link delay or monetary cost, the algorithm also optimizes paths based on the maximum available bandwidth of links. The bandwidth metric can be locally configured or computed from advertised link bandwidth. The feature introduces these changes: CLI: YANG Data Models:
|
|
Introduced in this release on: Fixed Systems (8700) (select variants only*); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200]) You can now hardware offload the liveness monitoring in performance measurement to the router hardware, which is the Network Processing Unit (NPU). This feature helps you optimize and scale the measurement operation, helping you meet delay-bound Service Level Agreements (SLAs). Previously, this feature was software driven. The feature introduces a new keyword npu-offload under the performance-measurement liveness-profile name liveness profile command. *This feature is now supported on:
|
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) We have enhanced the SR-TE policy at headend with flexible algorithm that supports additional metric types, user-defined and bandwidth, ensuring consistent path computation across flexible algorithm metric types and constraints, on both intra-IGP and inter-IGP domains. The feature also supports headend computed inter-domain SR policies with Flex Algo constraints and IGP redistribution or leaking. The feature introduces these changes: CLI:
YANG Data Models:
|
|
Introduced in this release on: Fixed Systems (8200); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) The feature introduces support to SRv6 double recursion where network service such as BGP VPN (Layer 2/Layer 3) requires multiple layers of resolution, specifically where one routing layer resolves over another before reaching its final destination. You can achieve double recursion by collapsing the underlay, which typically involves protocols like IGP or BGP in the packet forwarding chain, allowing three-level load balancing and even distribution of traffic across multiple layers of the network stack. The feature is supported on the ingress Provider Edge (PE) router. Previously, SRv6 supported only two levels of load balancing, which works for traditional service provider setups. The feature introduces these changes: CLI:
YANG Data Models:
|
|
Segment routing Tree-SID interoperability and SR-P2MP enhancements |
Introduced in this release on: Fixed Systems (8200); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) The feature introduces enhancements to the SR Tree-SID functionality and SR-P2MP Policy, enabling full alignment with the Path Computation Element Protocol (PCEP) standard as per IETF specifications. These improvements enable interoperability between Path Computation Client (PCC) devices from different vendors connected to the PCE, while still supporting the previous Cisco-proprietary implementation. The feature introduces these changes: CLI:
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) VRF-to-VRF route leaking enables sharing of routes between VRFs while maintaining their isolation. This feature allows the source VRF to send leaked routes to remote PEs or Route Reflectors (RRs) across an SRv6 core network, similar to an MPLS core network, enabling communication between different service tenants or administrative domains without compromising VRF isolation. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200] (select variants only*); Centralized Systems (8600 [ASIC: Q200]) You can now configure Segment Routing over IPv6 (SRv6) services on an EVPN E-Line network. SRv6 services on EVPN E-Line offers a modern approach to simplify and enhance network operations. * This feature is supported on:
|
|
BGP |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now configure up to 256 ECMP next hops for BGP in both IPv4 and IPv6, optimizing network bandwidth by load-balancing traffic across parallel paths. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC:Q200, P100], 8700 [ASIC: P100, K100] ); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now ensure consistent per-VRF label allocation for VPN routes with the same Route Distinguisher (RD). This feature modifies the default label allocation behavior by allowing you to enforce per-VRF label allocation for VPN routes using the advertise vpn-imported label-mode per-vrf command. This feature introduces these changes: CLI: YANG Data Model:
|
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200]) You can now selectively download BGP prefixes to the Routing Information Base (RIB) and Forwarding Information Base (FIB). This feature prevents traffic black holes by ensuring that traffic follows default routes when specific destination routes are unavailable. |
|
Simultaneous Monitoring of Adj-RIB-In Pre and Post-Policy Views |
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now monitor BGP events and collect BGP route information before and after applying policy filters. This feature enables you to monitor both Adj-RIB-In pre-policy and post-policy views simultaneously for all BGP peers, enhancing your ability to debug routing policies and validate RTBH routes. This feature introduces these changes: CLI: This feature modifies the following commands:
|
Interface and Hardware Component |
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]). The enhanced SPAN-to-File feature provides continuous packet capture and debugging capability with always-on functionality that starts automatically upon destination configuration. It prevents data loss during node reloads by periodically writing packet buffer contents to disk, without stopping the capture. A default SPAN-to-File session for forwarding and buffer drops is always active and can be disabled if not needed. The feature also supports packet truncation and sampling in software for software-mirrored packets, independent of NPU capabilities. These enhancements ensure reliable, always-available packet capture for post-event analysis, eliminating the need for prior configuration or user interaction. The feature introduces these changes: CLI:
YANG data models:
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]). Routers can now display a snapshot of the traffic throughput and traffic rate on all bundle interfaces over the last few seconds, facilitating easy analysis. The show interfaces counters rates bundle command provides these statistics in a tabular format for quick reference. The feature introduces these changes: CLI: YANG Data Models:
(see GitHub, YANG Data Models Navigator) |
|
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) The number of supported CFM sessions is now increased to 500. This boost allows for improved network monitoring and troubleshooting capabilities, ensuring consistent performance and reliability. |
|
Introduced in this release on: Fixed Systems (8200, 8700)(select variants only*); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200, P100])(select variants only*) You can now leverage the VLAN range and list to effectively separate networks operating over shared links and devices. VLAN encapsulation is typically determined by the access network and customer edge (CE) device, limiting the network provider's control over the VLAN tag or Ethernet type of customer traffic. The VLAN range and list support various customer traffic types, enhancing network flexibility and management. *This feature is supported on:
This feature modifies these changes: CLI: |
|
Introduced in this release on: Fixed Systems(8200, 8700)(select variants only*); Modular Systems (8800 [LC ASIC: P100])(select variants only*). This feature allows to configure multiple SPAN ACL sessions for MPLS on Layer 3 interfaces configured on the Label-Switched Paths (LSPs) to monitor the MPLS traffic based on the labels and the EXP bit. This feature verifies the overall network performance simultaneously from various network locations and ensures a better network visibility, network resource efficiency, and flexibility. This MPLS SPAN ACL configuration is supported only in the ingress direction. *This feature is now supported on:
This feature introduces these changes: CLI: YANG Data Model: Cisco-IOS-XR-um-mpls-acl-cfg.yang (see Github, YANG Data Models Navigator). |
|
Unidirectional Link Detection Protocol support on physical Ethernet interfaces |
Introduced in this release on: Fixed Systems(8200, 8700)(select variants only*); Modular Systems (8800 [LC ASIC: P100]). The Unidirectional Link Detection Protocol (UDLD) is now supported on the Physical Ethernet interfaces on the Cisco Silicon One P100 ASIC-based Systems. This feature helps detect faults and miswiring conditions with unbundled fiber links and helps each device understand its own and neighbor connections. *This feature is supported on:
This feature introduces these changes: CLI: |
Double-Tagged 802.1ad Encapsulation Options for Layer 3 Physical and Bundle Subinterfaces |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This feature enables you to increase the number of VLAN tags in an interface and an subinterface. You can enable this feature either on a physical interface or a bundle interface. When you configure this feature with the dual tag, interfaces check for IP addresses along with MAC addresses. Verified Scalability Limits:
|
L2VPN |
|
Enhance network efficiency and scalability with GIL pruning for PWHE interfaces |
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100])(select variants only*) You can now manage hardware resources for a Pseudowire Headend (PWHE) interface more efficiently by limiting PWHE replication to the line card locations where the interfaces listed in the Generic Interface List (GIL) are physically present. This optimization ensures that resource usage is confined to only the necessary line cards. The router internally synchronizes the PWHE underlay with the GIL using a mechanism known as GIL pruning. The GIL consists of a subset of core-facing IGP/LDP-enabled interfaces expected to transmit pseudowire traffic for the PWHE interface. This feature is enabled by default and does not require any user configuration. *This feature is supported on:
|
Introduced in this release on: Fixed Systems (8200, 8700)(select variants only*); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: P100]) You can now improve traffic segmentation with a higher Ethernet Flow Point (EFP) that allows you to configure multiple VLANs with an increased scale limit of Layer 2 pseudowire per system for various services. VPWS PWs
VPLS PWs
Multi-Dest (internal label ECD)
|
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now use the VLAN Subinterface Encapsulation and Rewrite operations to:
The feature introduces these changes: CLI: New Commands Modified Command YANG Data Model:
|
|
EVPN |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200])(select variants only*) The port-active multi-homing mode enables single-active redundancy load balancing at the port-level or the interface-level. In this mode, one of the PEs remains active at the port-level. *The EVPN E-LAN port-active multi-homing mode is now extended to:
|
|
Introduced in this release on: Fixed Systems (8200, 8700) ; Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200])(select variants only*) In all-active multihoming mode, multiple PE devices connected to the same CE are simultaneously active. Traffic is distributed across all active links, optimizing bandwidth usage and ensuring high availability. *The EVPN E-line all-active multi-homing mode is now extended to:
|
|
Introduced in this release on: Fixed Systems (8200, 8700) ; Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200]) (select variants only*) The port-active multi-homing mode enables single-active redundancy load balancing at the port-level or the interface-level. In this mode, one of the PEs remains active at the port-level. This feature enables protocol simplification as only one of the physical ports is active at a given time. *The EVPN E-Line port-active multi-homing mode is now extended to:
|
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200]) (select variants only*) The single-active multi-homing mode offers redundant connectivity on a single link at a time with failover to the second link in case the active link fails. In this mode, only a single PE among a group of PEs attached to an Ethernet segment forwards traffic to and from that Ethernet Segment. * The EVPN E-Line single-active multi-homing mode is now extended to:
|
|
MPLS |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200, P100]) To handle high traffic volume, you can enhance the MPLS over UDP tunnel scale up to 15284 tunnels using the hw-module profile cef mplsoudp scale command. The feature introduces these changes: CLI: |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200, P100]). This feature allows to prevent the MPLS labelled traffic or IP traffic to destinations associated with a segment routing prefix SID from resolving over the MPLS-TE tunnel using the autoroute announce exclude-traffic segment-routing all command. This feature ensures optimal hardware resource utilization. This feature enhances the existing autoroute announce exclude-traffic segment-routing configuration which prevents only the MPLS labelled segment routing traffic from steering into the MPLS-TE tunnel. The feature introduces these changes: CLI: The all keyword is introduced in the autoroute announce exclude-traffic segment-routing command. |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can enable the router to compute
During the primary LSP path failure, the headend router computes a new dynamic restore primary path by reusing the links from the failed primary LSP path, and during the secondary LSP path or backup path or protecting path failure, the headend router computes a new dynamic restore path by reusing the links from the failed secondary LSP path. CLI: The protected-by keyword is enhanced to include two backup paths in the path-option command. |
|
Multicast |
|
LSM mLDP based MVPN bud/tail node enhancements on edge routers |
Introduced in this release on: Fixed Systems(8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q200, P100]). This feature extends the support for the rendezvous point (RP) placement on the LSM mLDP based mVPN BUD/TAIL node on edge routers. With this feature, the BUD node is now supported on these profiles: 0, 1, 2, 3, 4, 5, 6, 7, 9, 11, 12, 13, 14, 15, 17, 19, 23, 25, 27, 28, and 29. Previously, the BUD node was supported only on Profiles 21 and 22 which were introduced in Cisco IOS XR Release 24.1.1. |
Introduced in this release on: Fixed Systems(8200 , 8700);Modular Systems (8800 [LC ASIC: P100, K100]) With this release, the route stats counters are programmed on the ingress line card, making traffic measurement more efficient. Previously, the stats-ole implementation was used on P100 and K100 ASIC based systems, but it is no longer utilized. With this change, the stats-ole will show as invalid in the command output. As traffic enters the ingress Line card, the packets and bytes for the counter will increment. The same command can be used to clear the counters by specifying the ingress Line card location. |
|
NetFlow and sFlow |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100]) You can now achieve sFlow packet load balancing across all ECMP paths to the collector. This feature uses pre-routing to gather nexthop interface and IP details for each packet, ensuring uniform distribution. It overcomes the limitations of the previous method, which lacked path visibility, by actively utilizing all paths. This results in more effective load balancing and improved network performance without compromising path tracking. The feature introduces these changes: CLI:
|
|
System Security |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) To enhance network compatibility and simplify management for modern network environments, you can now configure IPv6 addresses and CA server URLs resolving to IPv6 addresses as enrollment URLs for the CA hosted on IPv6-based servers. This enhancement allows successful CA configuration using the crypto ca trustpoint command, overcoming previous limitations where using IPv6 addresses and CA server URLs resolving to IPv6 addresses as enrollment URLs resulted in configuration failure. |
|
Introduced in this release on: Centralized Systems (8600 [ASIC:Q200]) You can now configure MACsec policy on Layer 3 subinterfaces, which gives you the flexibility to apply MACsec policies to different L3 subinterfaces that belong to the same main physical interface. This capability is possible because we've enabled the router to keep the VLAN tags unencrypted, enabling the L3 subinterfaces to be the MACsec endpoints. When you apply MACsec policies on these subinterfaces, you can enhance the overall security of your network by adding an extra layer of security to the communication between different subnets. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q100]) (*select variants only) You can enhance network flexibility by enabling multiple hosts on a single port using MAC Authentication Bypass (MAB). The router now supports up to two clients per port by expanding its MAC learning capability from one to two. It authenticates each MAC address individually, allowing multi-domain authentication and enabling independent management of two endpoints. This feature simplifies network management and increases the connectivity options for devices per port. *This feature is supported on the 8201-SYS routers. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can now configure the hash rotation value for each Network Processing Unit (NPU) to improve traffic load balancing and minimize traffic polarization. Alternatively, the value can be automatically calculated, eliminating the need for manual configuration. |
|
Introduced in this release on: Fixed Systems (8700 [ASIC: P100]) (select variants only*) MACsec, the Layer 2 encryption protocol, secures data on physical media and provides data integrity and confidentiality. *We now support MACsec encryption on all ports of 8711-32FH-M. |
|
RADIUS with TLS protection |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) Remote Authentication Dial-In User Service (RADIUS) over Transport Layer Security (TLS) or RADSEC is now supported on Cisco 8000 routers. You can configure the RADIUS protocol on the Cisco router (RADIUS client) to redirect RADIUS packets to a remote RADIUS server connected over TLS for Authentication, Authorization, and Accounting (AAA) services. Without TLS, RADIUS packets may be subject to potential security vulnerabilities, including data exposure, replay attacks, weak authentication, and encryption vulnerabilities, especially when transmitted across untrusted networks. The feature introduces these changes: CLI:
YANG Data Models:
(see GitHub, YANG Data Models Navigator) |
TLS version 1.3 support |
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) We have enhanced the security and performance of the routers by upgrading to TLS version 1.3. This version minimizes vulnerabilities by eliminating outdated algorithms and ensuring forward secrecy. Additionally, TLS 1.3 improves router performance by providing faster connection times and reducing latency. The routers will now use TLS version 1.3 as the default for all TLS session establishment requests. If the peer device does not support TLS version 1.3, the router will automatically revert to TLS version 1.2. |
System Management |
|
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) MCEs can cause the router to reboot. You had to manually inspect the MCE log file to determine whether the router reboot was due to a MCE. Starting from this release, the Cisco IOS XR Software displays a syslog notification for any Machine Check Error (MCE) and simplifies the troubleshooting process. |
|
Introduced in this release on: Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) By default, Cisco IOS XR software generates a shutdown syslog message immediately after the LC, FC, or RP shuts down and repeats the shutdown syslog message every 60 minutes to keep you informed about the shutdown status. |
|
Introduced in this release on: Fixed Systems (8200 [ASIC: P100]) (select variants only*) * With this release, support for PTP telecom profiles 8262, 8264, 8273.2, and 8275.1 is extended to the Cisco 8212-48FH-M router. |
|
Introduced in this release on: Modular Systems (8800 [LC ASIC: P100])(select variants only*) Based on the IEEE 1588-2008 standard, Precision Time Protocol (PTP) is a protocol that defines a method to synchronize clocks in a network for networked measurement and control systems. *This feature is now supported on 88-LC1-12TH24FH-E and 88-LC1-52Y8H-EM line cards. With this release, 88-LC1-12TH24FH-E and 88-LC1-52Y8H-EM line cards support these PTP telecom profiles: G.8265.1 G.8275.2 |
|
PTP for 8212-48FH-M Router |
Introduced in this release on: Fixed Systems (8200) (select variants only*) Based on the IEEE 1588-2008 standard, Precision Time Protocol (PTP) is a protocol that defines a method to synchronize clocks in a network for networked measurement and control systems. *This feature is now extended to 8212-48FH-M. For 8212-48FH-M routers, support for PTP is extended to G8265.1, G.8263, and G8275.2 profiles. |
Global Navigation Satellite System (GNSS) Support on Cisco 8712-MOD-M Router |
Introduced in this release on: Fixed Systems(8700)(select variants only*). Global Navigation Satellite System (GNSS) is a satellite system used as a timing interface. GNSS receiver receives signals from GNSS satellites and decodes the information from multiple satellites to determine its distance from each satellite. Based on this data, the GNSS receiver identifies the location of each satellite. *This feature is supported on the Cisco 8712-MOD-M routers. |
System Monitoring |
|
Introduced in this release on: Fixed Systems (8200, 8700 ); Centralized Systems (8600 [ASIC:Q200]); Modular Systems (8800 [LC ASIC: P100]). The filter physical
keyword was introduced, along with new columns CLI:
|
|
Introduced in this release on: Fixed Systems (8700 [ASIC:K100]); Modular Systems (8800 [LC ASIC: P100]) You can now see the historical trend data for the packet-drop use-case, with detailed granularity on a per node and per NPU basis. This feature introduces these changes: CLI: The history keyword is introduced in the show healthcheck use-case packet-drop command. |
|
Support for logging functionality on third-party applications |
Introduced in this release on: Fixed Systems (8200, 8700); Centralized Systems (8600); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This feature enables third-party applications to forward syslog messages to a remote server for handling a high rate of system logging. |
Licensing |
|
Support for Smart Licensing using Policy on the 8712-MOD-M |
Introduced in this release on: Fixed Systems (8700) (select variants only*) Support for Smart Licensing using Policy is now extended to the hardware.
This Cisco 8000 router variant support FCM Model 2. FCM Model 2 offers Essentials, Advantage, and Premier license suites. Premier license suite offers additional licenses that are required on top of Advantage licenses for high scale services. |
YANG Data Models Introduced and Enhanced
This release introduces or enhances the following data models. For detailed information about the supported and unsupported sensor paths of all the data models, see the Github repository. To get a comprehensive list of the data models supported in a release, navigate to the Available-Content.md file for the release in the Github repository. The unsupported sensor paths are documented as deviations. For example, openconfig-acl.yang provides details about the supported sensor paths, whereas cisco-xr-openconfig-acl-deviations.yang provides the unsupported sensor paths for openconfig-acl.yang on Cisco IOS XR routers.
You can also view the data model definitions using the YANG Data Models Navigator tool. This GUI-based and easy-to-use tool helps you explore the nuances of the data model and view the dependencies between various containers in the model. You can view the list of models supported across Cisco IOS XR releases and platforms, locate a specific model, view the containers and their respective lists, leaves, and leaf lists presentedvisually in a tree structure.
Feature |
Description |
---|---|
Programmability |
|
Cisco-IOS-XR-pbr-fwd-stats-oper |
This data model enables collection of per-rule statistics for Policy Based Routing (PBR) policies configured through Service Layer API in Cisco IOS XR, contributing to more efficient and effective network operations. |
openconfig-platform-pipeline-counters |
This data model has counters under the platform model to expose the Control Plane Policing (CoPP) counters. The following aggregate leaves are newly supported under the ‘state’ container:
|
openconfig-aft-summary.yang |
The OpenConfig data model is revised from version 2.4.0 to 4.3.0. The new aft-summaries container provides the count of routes per origin protocol for both IPv4 and IPv6 protocols. The feature introduces the following change: CLI:
You can stream Model-driven telemetry (MDT) and Event-driven telemetry (EDT) data for this OpenConfig data model. |
openconfig-aft.yang Version 3.0.0 |
The OpenConfig data model is revised from version 2.2.0 to 3.0.0 to introduce the following enhancements:
These counters can be monitored for all next-hops that perform encapsulation (encap), decapsulation (decap), or both for IP-IP packets programmed via the gRPC Routing Information Base Interface (gRIBI). |
Openconfig-platform-transceiver Version 0.13.0 |
The OpenConfig data model provides various metrics and thresholds for transceiver monitoring on gNMI subscribe. It includes minimum, maximum, average, instant, interval, minimum-time, and maximum-time values for containers such as supply-voltage, laser-temperature, tec-current, and target-frequency-deviation. The model also defines upper thresholds for transceiver with leaves like laser-temperature-upper, output-power-upper, input-power-upper, laser-bias-current-upper, supply-voltage-upper, and module-temperature-upper, as well as lower thresholds leaves such as laser-temperature-lower, output-power-lower, input-power-lower, laser-bias-current-lower, supply-voltage-lower, and module-temperature-lower. Additionally, it supports transceiver leaves such as state, enabled and module-functional-type, and transceiver physical-channels leaves including associated-optical-channel, tx-laser, target-output-power, and laser-age. This OC model supports event-driven and model-driven telemetry. |
Openconfig-terminal-device.yang Version 1.9.0 |
The OpenConfig data model provides instant, minimum, maximum, and average values for parameters of a terminal device using the pre-fec-ber, post-fec-ber, carrier-frequency-offset, modulator-bias-x-phase, modulator-bias-y-phase, modulator-bias-yi, modulator-bias-yq, osnr, q-value, and sop-roc containers. These parameters include Bit Error Rate (BER), channel quality value in decibels, and electrical signal-to-noise ratio in Baud Rate. Additionally, the model offers information on signal distortion, target output power, operational mode of a channel, the frequency of the optical channel, and the input optical power of the port using leaves chromatic-dispersion and target-output-power. |
Cisco-IOS-XR-pbr-fwd-stats-oper |
This data model enables collection of per-rule statistics for Policy Based Routing (PBR) policies configured through Service Layer API in Cisco IOS XR Routers, contributing to more efficient and effective network operations. |
openconfig-platform-pipeline-counters |
This data model has counters under the platform model to expose the Control Plane Policing (CoPP) counters. The following aggregate leaves are newly supported under the ‘state’ container:
|
Cisco-IOS-XR-um-router-rib-cfg:router |
This Cisco unified YANG data model enables you to achieve SRv6 double recursion by collapsing the underlay, which typically involves protocols like IGP or BGP in the packet forwarding chain, allowing three level load balancing and even distribution of traffic across multiple layers of the network stack. |
Cisco-IOS-XR-um-performance-measurement-cfg |
This unified data model is enhanced with a new container fallback to advertise a fallback delay value, retaining delay information in performance metrics even when the delay metrics for interfaces is temporarily unavailable due to hardware, synchronization, or network connectivity issues. |
Cisco-IOS-XR-um-if-arp-cfg.yang |
This Cisco unified YANG data model is revised to introduce a new arp evpn-proxy container which drops the ARP request if the target entry is not available in the ARP tables on the EVPN control plane. |
Cisco-IOS-XR-um-ipv6-nd-cfg.yang |
This Cisco unified YANG data model is revised to introduce a new ipv6 nd evpn-proxy container which drops the ND request if the target entry is not available in the ND tables on the EVPN control plane. |
Cisco-IOS-XR-um-router-isis-cfg.yang |
The latest update to the Cisco-IOS-XR-um-router-isis-cfg.yang unified data model includes the following additions:
The newly added reference-bandwidth-number, granularity, and group-mode leaves enable you to configure the different parameters required for bandwidth metric auto-cost calculation. |
Cisco-IOS-XR-um-8000-hw-module-profile-cfg |
This unified data model for hw-module profiles is enhanced with a new option for encap-exactencapsulation type, which allows you to specify exact matching for single-tagged VLAN encapsulations. |
Cisco-IOS-XR-um-router-isis-cfg |
This Cisco unified YANG data model is enhanced to introduce a new container, protocol shutdown, which allows you to gracefully shut down IS-IS on an interface or router without abruptly interrupting network operations. |
Hardware Introduced
Hardware | Description |
---|---|
Cisco 8712-MOD-M Router |
The Cisco 8712-MOD-M is a K100-based, 2-RU router with the I/O diversity that provides 6.4 Tbps of network bandwidth. The Cisco 8712-MOD-M features 4 Modular Port Adapter (MPA) slots that support 8K-MPA-4D, 8K-MPA-16H and 8K-MPA-16Z2D MPAs. The 8K-MPA-4D is a pluggable card that provides 4 interface ports that can support QSFP-DD 400GbE, 200GbE, or 100GbE modules The 8K-MPA-16H is a pluggable card that provides 16 interface ports that supports QSFP-28 100GbE module. The 8K-MPA-16Z2D is a pluggable card that provides 20 interface ports that includes 4 ports of QSFP-DD and 16 ports of SFP modules. |
PSU2KW-HVPI Power Supply Unit for the Cisco 8201, 8202, 8201-32FH, and 8101-32FH Routers |
We are now supporting the high voltage power supply unit, PSU2KW-HVPI, which accepts AC, HVAC, or HVDC input power to operate the Cisco 8201, 8202, 8201-32FH, 8101-32FH routers in the port-side intake configuration. The PSU2KW-HVPI power supply unit offers a maximum power output of 1000W (AC low line) or 2000W (HVAC or HVDC). The advantages of the PSU2KW-HVPI PSU include:
|
Route Processor Card 8800-RP2-S |
This release introduces support for a new route processor card, 8800-RP2-S, on Cisco 8800 Series routers. It provides a capacity of 8-core x86 CPU at 2.7GHz with 64GB RAM and only supports Secure Zero-Touch Provisioning (sZTP). sZTP streamlines the network deployment process, making it faster, more reliable, and more secure. For more information, see the Cisco 8800 section in the Datasheet here. |
Optics |
Note: Optics support varies across devices (routers, line cards, RPs, and so on). To know if an optics is compatible with a specific Cisco device, refer to the Transceiver Module Group (TMG) Compatibility Matrix. This release introduces the following optics: Cisco 1000BASE T-X Transceiver Module |
For a complete list of supported hardware and ordering information, see the Cisco 8000 Series Data Sheet.
Release 24.4.1 Packages
The Cisco IOS XR software is composed of a base image (ISO) that provides the XR infrastructure. The ISO image is made up of a set of packages (also called RPMs). These packages are of three types:
-
A mandatory package that is included in the ISO
-
An optional package that is included in the ISO
-
An optional package that is not included in the ISO
Visit the Cisco Software Download page to download the Cisco IOS XR software images.
To determine the Cisco IOS XR Software packages installed on your router, log in to the router and enter the show install active command:
RP/0/RP0/CPU0#show install active
Active Packages: XR: 220 All: 1589
Label: 24.4.1
XR Software Hash: 52964bf171bc9e039fcb9bfe5c10bbbdcdaeb21280419cf2be6cca0df2bee1f4
Optional Packages Version
---------------------------------------------------- ---------------------------
xr-8000-l2mcast 24.4.1v1.0.0-1
xr-8000-li 24.4.1v1.0.0-1
xr-8000-mcast 24.4.1v1.0.0-1
xr-8000-netflow 24.4.1v1.0.0-1
xr-bgp 24.4.1v1.0.0-1
xr-cdp 24.4.1v1.0.0-1
xr-healthcheck 24.4.1v1.0.0-1
xr-ipsla 24.4.1v1.0.0-1
xr-is-is 24.4.1v1.0.0-1
xr-k9sec 24.4.1v1.0.0-1
xr-li 24.4.1v1.0.0-1
xr-lldp 24.4.1v1.0.0-1
xr-mcast 24.4.1v1.0.0-1
xr-mpls-oam 24.4.1v1.0.0-1
xr-netflow 24.4.1v1.0.0-1
xr-ospf 24.4.1v1.0.0-1
xr-perf-meas 24.4.1v1.0.0-1
xr-perfmgmt 24.4.1v1.0.0-1
xr-telnet 24.4.1v1.0.0-1
xr-track 24.4.1v1.0.0-1
To know about all the RPMs installed including XR, OS and other components use the show install active all command.
The software modularity approach provides a flexible model that allows you to install a subset of IOS XR packages on devices based on your individual requirements. All critical components are modularized as packages so that you can select the features that you want to run on your router.
Note |
The above show command output displays mandatory packages that are installed on the router. To view the optional and bug fix RPM packages, first install the package and use the show install active summary command. |
To view all supported Cisco IOS XR Software upgrades from the current version according to the support data installed on the running system, enter the show install upgrade-matrix running command:
Router# show install upgrade-matrix running
Matrix: XR version: 24.4.1, File version: 1.1, Version: N/A
The upgrade matrix indicates that the following system upgrades are supported from the current XR version:
From To Restrictions
---------- ---------- ----------------------------------------------------
24.4.1 24.1.1 -
24.4.1 24.1.2 -
24.4.1 24.2.11 -
24.4.1 24.2.2 -
24.4.1 24.3.1 -
24.4.1 24.3.2 -
24.4.1 7.10.1 -
24.4.1 7.10.2 -
24.4.1 7.11.1 -
24.4.1 7.11.2 -
24.4.1 7.11.21 -
24.4.1 7.3.4 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.3.5 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.3.6 Caveats; Replace performed via reimage
24.4.1 7.5.3 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.5.4 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.5.5 Caveats; Replace performed via reimage
24.4.1 7.7.2 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.8.2 Target fixes; Caveats; Replace performed via reimage
24.4.1 7.9.1 Caveats; Replace performed via reimage
24.4.1 7.9.2 Caveats; Replace performed via reimage
Caveats
Bug ID |
Headline |
---|---|
Multicast shaper not working for P100 and K100 ASIC based line cards and routers |
|
[8711-32FH-M] EVPN BUM traffic cannot be forwarded to any AC/PW/EVI in bridge domain |
|
CFM session is down because of interface down |
|
MACNH deletion failed for ARP/ND during MPA reload, causing traffic drop due to unresolved adjacency |
|
[8700] HW_PROG_ERROR and MACNH for ARP/NP adjacency deletion failed on MPA reload with FRR |
|
[8712-MOD-M] BLB session goes down for 1 to 3 min on Bundle member MPA reload |
Determine Software Version
Log in to the router and enter the show version command:
RP/0/RP0/CPU0# show version
Cisco IOS XR Software, Version 24.4.1 LNT
Copyright (c) 2013-2024 by Cisco Systems, Inc.
Build Information:
Built By : ponaidu
Built On : Mon Dec 16 12:29:39 UTC 2024
Build Host : iox-lnx-085
Workspace : /auto/srcarchive10/prod/24.4.1/8000/ws
Version : 24.4.1
Label : 24.4.1
cisco 8000 (Intel(R) Xeon(R) CPU D-1633N @ 2.50GHz)
cisco 8212-48FH-M (Intel(R) Xeon(R) CPU D-1633N @ 2.50GHz) processor with 64GB of memory
ios uptime is 32 minutes
Cisco 8212 2RU System w/ 48x 400G QSFP56-DD w/ MACsec
Determine Firmware Support
Log in to the router and enter show fpd package command:
Cisco 8200 Series Router
RP/0/RP0/CPU0# show fpd package
===============================================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
8201 Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
IoFpga YES 1.11 1.11 0.1
IoFpgaGolden YES 1.11 0.48 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.06 1.06 0.0
x86FpgaGolden YES 1.06 0.48 0.0
x86TamFw YES 5.13 5.13 0.0
x86TamFwGolden YES 5.13 5.05 0.0
--------------------------------------------------------------------------------
8201-ON Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
IoFpga YES 1.11 1.11 0.1
IoFpgaGolden YES 1.11 0.48 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.06 1.06 0.0
x86FpgaGolden YES 1.06 0.48 0.0
x86TamFw YES 5.13 5.13 0.0
x86TamFwGolden YES 5.13 5.05 0.0
--------------------------------------------------------------------------------
8201-SYS Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
IoFpga YES 1.11 1.11 0.1
IoFpgaGolden YES 1.11 0.48 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.06 1.06 0.0
x86FpgaGolden YES 1.06 0.48 0.0
x86TamFw YES 5.13 5.13 0.0
x86TamFwGolden YES 5.13 5.05 0.0
--------------------------------------------------------------------------------
8201-SYS-ON Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
IoFpga YES 1.11 1.11 0.1
IoFpgaGolden YES 1.11 0.48 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.06 1.06 0.0
x86FpgaGolden YES 1.06 0.48 0.0
x86TamFw YES 5.13 5.13 0.0
x86TamFwGolden YES 5.13 5.05 0.0
--------------------------------------------------------------------------------
PSU1.4KW-ACPE DT-PrimMCU NO 3.01 3.01 0.0
DT-SecMCU NO 2.02 2.02 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 2.00 2.00 0.0
--------------------------------------------------------------------------------
PSU1.4KW-ACPI DT-PrimMCU NO 3.01 3.01 0.0
DT-SecMCU NO 2.02 2.02 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 2.00 2.00 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPE PO-PrimMCU NO 1.03 1.03 0.0
PO-SecMCU NO 1.06 1.06 0.0
QC-PrimMCU NO 1.01 1.01 0.0
QC-SecMCU NO 1.04 1.04 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPI PO-PrimMCU NO 1.03 1.03 0.0
PO-SecMCU NO 1.08 1.08 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 4.00 4.00 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPE PO-PrimMCU NO 1.07 1.07 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPI PO-PrimMCU NO 1.07 1.07 0.0
QC-PrimMCU NO 2.00 2.00 0.0
QC-SecMCU NO 2.00 2.00 0.0
--------------------------------------------------------------------------------
PSU2KW-HVPI PO-PrimMCU NO 1.09 1.09 0.0
PO-SecMCU NO 1.10 1.10
Cisco 8600 Series Router
RP/0/RP0/CPU0# show fpd package
===============================================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
86-3.2KW-AC EM-LogicMCU NO 0.10 0.10 0.0
EM-PrimMCU NO 0.02 0.02 0.0
EM-SecMCU NO 0.02 0.02 0.0
--------------------------------------------------------------------------------
86-3.2KW-DC EM-LogicMCU NO 0.11 0.11 0.0
EM-PrimMCU NO 0.04 0.04 0.0
EM-SecMCU NO 0.04 0.04 0.0
--------------------------------------------------------------------------------
86-MPA-14H2FH-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
86-MPA-24Z-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
86-MPA-4FH-M IoFpga YES 1.06 1.06 0.1
IoFpgaGolden NO 1.06 1.00 0.1
--------------------------------------------------------------------------------
8608-FS[FB] IoFpga NO 1.11 1.11 0.2
IoFpgaGolden NO 1.11 1.00 0.2
--------------------------------------------------------------------------------
8608-RP Bios YES 1.20 1.20 0.0
BiosGolden YES 1.20 1.01 0.0
IoFpga YES 1.10 1.10 0.0
IoFpgaGolden NO 1.10 1.01 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.07 1.07 0.0
x86FpgaGolden YES 1.07 1.07 0.0
x86TamFw YES 7.12 7.12 0.0
x86TamFwGolden YES 7.12 7.12 0.0
--------------------------------------------------------------------------------
8608-SC0-128 IoFpga YES 1.01 1.01 0.0
IoFpgaGolden YES 1.01 1.01 0.0
--------------------------------------------------------------------------------
8608-SC0-128[FB] IoFpga NO 1.11 1.11 0.2
IoFpgaGolden NO 1.11 1.00 0.2
--------------------------------------------------------------------------------
PSU4.3KW-HVPI DT-LogicMCU NO 2.05 2.05 0.0
DT-PrimMCU NO 1.08 1.08 0.0
DT-SecMCU NO 1.08 1.08 0.0
Cisco 8700 Series Router
RP/0/RP0/CPU0# show fpd package
===============================================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
8711-32FH-M Bios YES 5.05 5.05 0.0
BiosGolden YES 5.05 5.05 0.0
IoFpga YES 1.11 1.11 0.0
IoFpgaGolden YES 1.11 1.09 0.0
x86Fpga YES 2.13 2.13 0.0
x86FpgaGolden YES 2.13 2.11 0.0
x86TamFw YES 9.07 9.07 0.0
x86TamFwGolden YES 9.07 9.07 0.0
--------------------------------------------------------------------------------
8711-32FH-M[FB] IoFpga NO 1.10 1.10 0.0
IoFpgaGolden NO 1.10 1.00 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPE PO-PrimMCU YES 1.03 1.03 0.0
PO-SecMCU YES 1.10 1.10 0.0
--------------------------------------------------------------------------------
PSU2KW-ACPI PO-PrimMCU YES 1.03 1.03 0.0
PO-SecMCU YES 1.13 1.13 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPE PO-PrimMCU YES 1.11 1.11 0.0
--------------------------------------------------------------------------------
PSU2KW-DCPI PO-PrimMCU NO 1.11 1.11 0.0
Cisco 8800 Series Router
RP/0/RP0/CPU0# show fpd package
===============================================================================
Field Programmable Device Package
================================================
Req SW Min Req Min Req
Card Type FPD Description Reload Ver SW Ver Board Ver
=================== ========================== ====== ======= ======== =========
--------------------------------------------------------------------------------
88-LC0-34H14FH Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.09 1.09 0.1
IoFpgaGolden YES 1.09 1.01 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 0.98 0.98 0.1
x86FpgaGolden YES 0.98 0.78 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.10 0.1
--------------------------------------------------------------------------------
88-LC0-34H14FH-O Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.09 1.09 0.1
IoFpgaGolden YES 1.09 1.01 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 0.98 0.98 0.1
x86FpgaGolden YES 0.98 0.78 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.10 0.1
--------------------------------------------------------------------------------
88-LC0-36FH Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-M Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-M-2 Bios YES 1.21 1.21 0.0
BiosGolden YES 1.21 0.13 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-MO Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC0-36FH-O Bios YES 0.241 0.241 0.0
BiosGolden YES 0.241 0.218 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.19 1.19 0.1
IoFpgaGolden YES 1.19 1.00 0.1
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.51 1.51 0.1
x86FpgaGolden YES 1.51 1.04 0.1
x86TamFw YES 6.19 6.19 0.1
x86TamFwGolden YES 6.19 6.05 0.1
--------------------------------------------------------------------------------
88-LC1-12TH24FH-E Bios YES 1.20 1.20 0.41
BiosGolden YES 1.20 1.01 0.41
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.05 1.05 0.0
IoFpgaGolden YES 1.05 1.00 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.06 1.06 0.31
x86FpgaGolden YES 1.06 1.00 0.31
x86TamFw YES 7.18 7.18 0.31
x86TamFwGolden YES 7.18 7.13 0.31
--------------------------------------------------------------------------------
88-LC1-36EH Bios YES 1.20 1.20 0.41
BiosGolden YES 1.20 1.01 0.41
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.05 1.05 0.0
IoFpgaGolden YES 1.05 1.00 0.0
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.06 1.06 0.31
x86FpgaGolden YES 1.06 1.00 0.31
x86TamFw YES 7.18 7.18 0.31
x86TamFwGolden YES 7.18 7.13 0.31
--------------------------------------------------------------------------------
88-LC1-52Y8H-EM Bios YES 1.20 1.20 0.0
BiosGolden YES 1.20 1.01 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.02 1.02 0.1
IoFpgaGolden YES 1.02 1.00 0.1
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
x86Fpga YES 1.01 1.01 0.1
x86FpgaGolden YES 1.01 1.00 0.1
x86TamFw YES 9.05 9.05 0.1
x86TamFwGolden YES 9.05 9.05 0.1
--------------------------------------------------------------------------------
8800-LC-36FH Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-36FH-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-48H Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-LC-48H-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.05 1.05 0.0
EthSwitchGolden YES 1.05 0.07 0.0
IoFpga YES 1.39 1.39 0.0
IoFpgaGolden YES 1.39 0.08 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
x86Fpga YES 1.56 1.56 0.0
x86FpgaGolden YES 1.56 0.33 0.0
x86TamFw YES 5.17 5.17 0.0
x86TamFwGolden YES 5.17 5.05 0.0
--------------------------------------------------------------------------------
8800-RP Bios YES 1.38 1.38 0.0
BiosGolden YES 1.38 1.15 0.0
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.02 1.02 0.0
TimingFpgaGolden YES 1.02 0.11 0.0
x86Fpga YES 1.39 1.39 0.0
x86FpgaGolden YES 1.39 0.24 0.0
x86TamFw YES 5.19 5.19 0.0
x86TamFwGolden YES 5.19 5.05 0.0
--------------------------------------------------------------------------------
8800-RP-O Bios YES 1.208 1.208 0.0
BiosGolden YES 1.208 1.207 0.0
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.02 1.02 0.0
TimingFpgaGolden YES 1.02 0.11 0.0
x86Fpga YES 1.39 1.39 0.0
x86FpgaGolden YES 1.39 0.24 0.0
x86TamFw YES 5.19 5.19 0.0
x86TamFwGolden YES 5.19 5.05 0.0
--------------------------------------------------------------------------------
8800-RP2 Bios YES 1.20 1.20 0.3
BiosGolden YES 1.20 1.07 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
PcieSwitch YES 120.14 120.14 0.7
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 1.14 1.14 0.6
x86FpgaGolden YES 1.14 1.02 0.6
x86TamFw YES 7.18 7.18 0.6
x86TamFwGolden YES 7.18 7.13 0.6
--------------------------------------------------------------------------------
8800-RP2-O Bios YES 1.00 1.00 0.3
BiosGolden YES 1.00 1.00 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
SsdIntelS3520 YES 1.21 1.21 0.0
SsdIntelS4510 YES 11.32 11.32 0.0
ssdIntelS4520 YES 1.11 1.11 0.0
SsdMicron5100 YES 7.01 7.01 0.0
SsdMicron5300 YES 0.01 0.01 0.0
SsdSRM28M2 YES 14.71 14.71 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 0.128 0.128 0.3
x86FpgaGolden YES 0.128 0.128 0.3
x86TamFw YES 7.12 7.12 0.3
x86TamFwGolden YES 7.12 7.12 0.3
--------------------------------------------------------------------------------
8800-RP2-S Bios YES 1.20 1.20 0.3
BiosGolden YES 1.20 1.07 0.3
EthSwitch YES 1.03 1.03 0.0
EthSwitchGolden YES 1.03 0.07 0.0
PcieSwitch YES 120.14 120.14 0.7
SsdMicron7300M2 YES 2.60 2.60 0.0
SsdMicron7450M2 YES 11.00 11.00 0.0
SsdSRMP8N2 YES 14.38 14.38 0.0
SsdSRMP8S1 YES 13.79 13.79 0.0
TimingFpga YES 1.01 1.01 0.0
TimingFpgaGolden YES 1.01 1.00 0.0
x86Fpga YES 1.14 1.14 0.6
x86FpgaGolden YES 1.14 1.02 0.6
x86TamFw YES 7.18 7.18 0.6
x86TamFwGolden YES 7.18 7.13 0.6
--------------------------------------------------------------------------------
8804-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8804-FC0 IoFpga YES 1.00 1.00 0.0
IoFpga YES 1.125 1.125 2.0
IoFpgaGolden YES 1.00 0.16 0.0
IoFpgaGolden YES 1.125 1.125 2.0
--------------------------------------------------------------------------------
8808-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8808-FAN-V2 FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8808-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
--------------------------------------------------------------------------------
8808-FC0 IoFpga YES 1.00 1.00 0.0
IoFpga YES 1.125 1.125 2.0
IoFpgaGolden YES 1.00 0.16 0.0
IoFpgaGolden YES 1.125 1.125 2.0
--------------------------------------------------------------------------------
8808-FC1 IoFpga YES 1.03 1.03 0.0
IoFpgaGolden YES 1.03 1.03 0.0
--------------------------------------------------------------------------------
8812-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8812-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
8818-FAN FtFpga NO 1.00 1.00 0.0
FtFpga NO 1.130 1.130 1.1
FtFpgaGolden NO 1.00 0.16 0.0
FtFpgaGolden NO 1.130 1.129 1.1
--------------------------------------------------------------------------------
8818-FC IoFpga YES 1.02 1.02 0.0
IoFpgaGolden YES 1.02 0.05 0.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
8818-FC0 IoFpga YES 1.00 1.00 0.0
IoFpga YES 1.125 1.125 2.0
IoFpgaGolden YES 1.00 0.16 0.0
IoFpgaGolden YES 1.125 1.125 2.0
Retimer YES 3.00 3.00 0.0
--------------------------------------------------------------------------------
PSU4.8KW-DC100 PO-PrimMCU NO 51.85 51.85 0.0
PO-SecMCU NO 51.85 51.85 0.0
--------------------------------------------------------------------------------
PSU6.3KW-20A-HV DT-LogicMCU NO 1.00 1.00 0.0
DT-PrimMCU NO 1.00 1.00 0.0
DT-SecMCU NO 1.00 1.00 0.0
--------------------------------------------------------------------------------
PSU6.3KW-HV AB-LogicMCU NO 3.08 3.08 0.0
AB-PrimMCU NO 3.08 3.08 0.0
AB-SecMCU NO 3.06 3.06 0.0
DT-LogicMCU NO 4.11 4.11 0.0
DT-PrimMCU NO 4.01 4.01 0.0
DT-SecMCU NO 4.00 4.00 0.0
--------------------------------------------------------------------------------
PWR-4.4KW-DC-V3 DT-LogicMCU NO 3.02 3.02 0.0
DT-Prim1MCU NO 3.01 3.01 0.0
DT-Prim2MCU NO 3.01 3.01 0.0
DT-Sec1MCU NO 3.01 3.01 0.0
DT-Sec2MCU NO 3.01 3.01
Compatibility Matrix for EPNM and Crosswork with Cisco IOS XR Software
The compatibility matrix lists the version of EPNM and Crosswork that are supported with Cisco IOS XR Release in this release.
Cisco IOS XR |
Crosswork |
EPNM |
---|---|---|
Release 24.4.1 |
Important Notes
-
The warning message that the smart licensing evaluation period has expired is displayed in the console every hour. There is, however, no functionality impact on the device. The issue is seen on routers that don’t have the Flexible Consumption licensing model enabled. To stop the repetitive messaging, register the device with the smart licensing server and enable the Flexible Consumption model. Later load a new registration token.
To register the device with the smart licensing server, see the Registering and Activating Your Router.
Licensing
Starting with Cisco IOS XR Release 24.1.1, Smart Licensing Using Policy (SLP) is the default Licensing model. When you upgrade to the Cisco IOS XR Release 24.1.1 release or later, the Smart Licensing Using Policy is enabled by default.
You can migrate your devices to Smart Licensing with Policy model, see Migrating from Smart Licensing to Smart Licensing Using Policy, Smart Licensing Using Policy on Cisco IOS XR Routers.
We recommend that you update to the latest version of SSM On-Prem or Cisco Smart Licensing Utility.
Note |
SSM On-Prem and CSSM both support SLP devices and SL devices. SLP devices and SL devices can coexist in a network. The Smart Licensing (SL) model is available in releases Cisco IOS XR Release 7.11.1 and earlier. |
Production Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Supported Transceiver Modules
To determine the transceivers that Cisco hardware device supports, refer to the Transceiver Module Group (TMG) Compatibility Matrix tool.
Cisco IOS XR Error messages
To view, search, compare, and download Cisco IOS XR Error Messages, refer to the Cisco IOS XR Error messages tool.
Cisco IOS XR MIBs
To determine the MIBs supported by platform and release, refer to the Cisco IOS XR MIBs tool.
Related Documentation
The most current Cisco 8000 router documentation is located at the following URL:
https://www.cisco.com/c/en/us/td/docs/iosxr/8000-series-routers.html