Network Convergence System 5500 Series Routers
Note |
This product has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices. |
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
Software Features Introduced in Cisco IOS XR Software Release 6.2.3
There are no new software features released in this release.
Behavior Change Introduced in Cisco IOS XR Release 6.2.3
Locking a Running Configuration in NETCONF
For a NETCONF client to change a configuration in Cisco IOS XR, it is recommended for the client to acquire a lock to prevent simultaneous update from another NETCONF client or CLI session.
To acquire a configuration lock, the NETCONF client sends a RPC request to lock the running datastore. In Cisco IOS XR 6.1.x and previous releases, the RPC request candidate data-store was the target for acquiring the lock. But from release 6.2.x and later, the request running data-store must be sent to successfully lock the configuration.
Example: NETCONF request with running data-store as target to successfully lock a configuration:
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<lock>
<target>
<running/>
</target>
</lock>
</rpc>
Interface Name Modified
Prior to IOS XR Release 6.2.1, 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces were both named as TenGigE. Also, 40 Gigabit Ethernet and 100 Gigabit Ethernet interfaces were both named as HundredGigE. From Release 6.2.1 onwards, the names have been modified to:
Interface Type |
Interface Name |
---|---|
1 Gigabit Ethernet |
GigabitEthernet |
10 Gigabit Ethernet |
TenGigE |
40 Gigabit Ethernet |
FortyGigE |
100 Gigabit Ethernet |
HundredGigE |
Note |
After upgrading to Release 6.2.3, the old configurations applied to 1G and 40G interfaces will not be available. Therefore you must reconfigure the 1G and 40G interfaces using the new names. |
New Hardware Introduced in Cisco IOS XR Software Release 6.2.3
No new hardware introduced in this release.
Release 6.2.3 Packages
This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.
Composite Package |
||
Feature Set |
Filename |
Description |
Cisco IOS XR IP Unicast Routing Core Bundle |
ncs5500-mini-x.iso |
Contains base image contents that includes:
|
Individually-Installable Optional Packages |
||
Feature Set |
Filename |
Description |
Cisco IOS XR Manageability Package |
ncs5500-mgbl-1.0.0.0-r623.x86_64.rpm |
Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages. |
Cisco IOS XR MPLS Package |
ncs5500-mpls-1.0.0.0-r623.x86_64.rpm ncs5500-mpls-te-rsvp-1.0.0.0-r623.x86_64.rpm |
MPLS and MPLS Traffic Engineering (MPLS-TE) RPM. |
Cisco IOS XR Security Package |
ncs5500-k9sec-1.0.0.0-r623.x86_64.rpm |
Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI) |
Cisco IOS XR ISIS package |
ncs5500-isis-1.2.0.0-r623.x86_64.rpm |
Support ISIS |
Cisco IOS XR OSPF package |
ncs5500-ospf-2.0.0.0-r623.x86_64.rpm |
Support OSPF |
Lawful Intercept (LI) Package |
ncs5500-li-1.0.0.0-r623.x86_64.rpm |
Includes LI software images |
Multicast Package |
ncs5500-mcast-1.0.0.0-r623.rpm |
Support Multicast |
Supported Hardware
For a complete list of hardware and ordering information, see the Cisco NCS 5500 Series Data Sheet
Use the Cisco Optics-to-Device Compatibility Matrix tool to determine transceivers supported in Cisco hardware devices.
To install the Cisco NCS 5500 router, see Hardware Installation Guide for Cisco NCS 5500 Series Routers.
Determine Software Version
Log in to the router and enter the show version command:
RP/0/RP0/CPU0:router# show version
Cisco IOS XR Software, Version 6.2.3
Copyright (c) 2013-2017 by Cisco Systems, Inc.
Build Information:
Built By : <username>
Built On : Thu Dec 21 19:01:41 PST 2017
Build Host : iox-lnx-064
Workspace : /auto/srcarchive11/production/6.2.3/ncs5500/workspace
Version : 6.2.3
Location : /opt/cisco/XR/packages/
cisco NCS-5500 () processor
System uptime is 7 hours, 2 minutes
Caveats Specific to the Cisco NCS 5500 Router
There are no caveats in this release.
Cisco IOS XR Caveats
Caveat |
Description |
---|---|
SSH sessions doesn't show up correctly in "show users" CLI result. |
Determine Firmware Support
Use the show hw-module fpd command in EXEC mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.
PID |
FPD Device |
FPD Versions |
---|---|---|
NCS55-RP |
Bootloader |
9.25 |
IOFPGA |
0.09 |
|
NCS55-SC |
Bootloader |
1.74 |
IOFPGA |
0.10 |
|
NC55-5508-FC |
Bootloader |
1.74 |
IOFPGA |
0.16 |
|
NC55-36X100G |
Bootloader |
1.17 |
IOFPGA |
0.15 |
|
MIFPGA |
0.09 |
|
NC55-24X100G-SE |
Bootloader |
1.11 |
IOFPGA |
0.13 |
|
MIFPGA |
0.03 |
|
NC55-18H18F |
Bootloader |
1.11 |
IOFPGA |
0.22 |
|
MIFPGA |
0.03 |
|
NC55-36X100G-S |
Bootloader |
1.11 |
IOFPGA |
0.09 |
|
MIFPGA |
0.06 |
|
NC55-24H12F-SE |
Bootloader |
1.11 |
IOFPGA |
0.09 |
|
MIFPGA |
0.03 |
|
NCS-5501 |
Bootloader |
1.16 |
CPU-IOFPGA |
1.14 |
|
MB-IOFPGA |
1.05 |
|
MB-MIFPGA |
1.01 |
|
NCS-5501-SE |
Bootloader |
1.16 |
CPU-IOFPGA |
1.14 |
|
MB-IOFPGA |
1.10 |
|
MB-MIFPGA |
1.02 |
|
NCS-5502 |
Bootloader |
1.16 |
CPU-IOFPGA |
1.14 |
|
DC-IOFPGA |
1.05 |
|
DC-MIFPGA |
1.02 |
|
MB-IOFPGA |
1.05 |
|
MB-MIFPGA |
1.02 |
|
NCS-5502-SE |
Bootloader |
1.16 |
CPU-IOFPGA |
1.14 |
|
DC-IOFPGA |
1.05 |
|
DC-MIFPGA |
1.02 |
|
MB-IOFPGA |
1.05 |
|
MB-MIFPGA |
1.02 |
|
NC55-5516-FC |
Bootloader |
1.75 |
IOFPGA |
0.23 |
|
NCS-55A1-36H-B |
Bootloader |
1.07 |
CPU-IOFPGA |
1.14 |
|
MB-IOFPGA |
1.0 |
|
MB-MIFPGA |
1.0 |
|
NC55-6X200-DWDM-S |
Bootloader |
1.11 |
IOFPGA |
0.10 |
|
DENALI |
13.48 |
|
MORGOTH |
5.16 |
|
MSFPGA |
2.22 |
|
CFP2_PORT |
5.23 |
Other Important Information
-
The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518.
Here the number 1518 represents the multi-dimensional scale value.
-
The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.
Related Documentation
The most current Cisco Network Convergence System 5500 Series documentation is located at this URL:
http://www.cisco.com/c/en/us/support/routers/network-convergence-system-5500-series/tsd-products-support-series-home.htmlThe document containing Cisco IOS XR System Error Messages (SEM) is located at this URL:
https://www.cisco.com/c/en/us/td/docs/ios_xr_sw/error/message/ios-xr-sem-guide.htmlProduction Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.