Network Convergence System 5500 Series Routers
Note |
This software release has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices. |
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
Note |
Cisco IOS XR Release 7.0.2 is an Extended Maintenance Release of Cisco IOS XR Release 7.0.1 for Cisco NCS 5500 Series routers. For more details on the Cisco IOS XR release model and associated support, see Guidelines for Cisco IOS XR Software. |
What's New in Cisco IOS XR Release 7.0.2
Cisco is continuously enhancing the product with every release and this section covers a brief description of key features and enhancements. It also includes links to detailed documentation, where available.
Software
With the enhancements made in this release, the features available on line cards NC57-24DD and NC57-18DD-SE are at parity with that available on Cisco IOS XR Release 6.5.1.
However, support for the following features on NC57-24DD and NC57-18DD-SE is expected in future IOS XR releases:
-
BVI
-
EVPN
-
ERSPAN
-
DHCP Relay
-
Layer 2
-
L2 OAM
-
Lawful Intercept
-
mLDP Edge
-
Timing
-
P2MP Edge
-
Smart License
-
QoS DSCP preservation bit is not supported when the qos-group is set using ingress policy-map
SRv6 Flexible Algorithm for IS-IS
Segment Routing over IPv6 (SRv6) Flexible Algorithm allows operators to customize IGP shortest path computation according to their own needs. An operator can assign custom SR prefix-SIDs to realize forwarding beyond link-cost-based SPF. As a result, Flexible Algorithm provides a traffic engineered path automatically computed by the IGP to any destination reachable by the IGP.
The SR architecture associates prefix-SIDs to an algorithm which defines how the path is computed. Flexible Algorithm allows for user-defined algorithms where the IGP computes paths based on a user-defined combination of metric type and constraint.
SRv6 Topology-Independent Loop-Free Alternate Node and Shared Risk Link Groups Protection
This feature introduces support for Topology-Independent Loop-Free Alternate (TI-LFA) node protection and Shared Risk Link Groups (SRLG) protection using Segment Routing over IPv6 (SRv6) for the IS-IS protocol.
-
TI-LFA node protection functionality provides protection from node failures. The neighbor node is excluded during the post convergence backup path calculation.
-
TI-LFA SRLG protection functionality attempts to find the post-convergence backup path, which excludes the SRLGs of the protected link. All local links that share any SRLG with the protecting link are excluded during the post convergence backup path calculation.
SRv6 Microloop Avoidance
The Segment Routing over IPv6 (SRv6) Microloop Avoidance feature enables link-state routing protocols, such as IS-IS, to prevent or avoid microloops during network convergence after a topology change.
Microloops are brief packet loops that occur in the network following a topology change (link down, link up, or metric change events). Microloops are caused by the non-simultaneous convergence of different nodes in the network. If nodes converge and send traffic to a neighbor node that has not converged yet, traffic may be looped between these two nodes, resulting in packet loss, jitter, and out-of-order packets. If a node computes that a microloop could occur on the new topology, the node creates a loop-free path to the destination using a list of segments. After the RIB update delay timer expires, the explicit path is replaced with regular forwarding paths.
SRv6 OAM — SID Verification
This feature provides enhanced Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6).
Existing OAM mechanisms to ping and trace a remote IPv6 prefix, along the shortest path, continue to work without any modification in an SRv6 network.
However, classic IPv6 OAM cannot be used to ping or trace a remote SRv6 SID function. This feature augments ping and traceroute operations to target remote SRv6 SIDs. An SRv6-enabled router now allocates a new SRv6 OAM SID known as END.OP (OAM Endpoint with Punt).
A target remote SID include the following:
-
END
-
END.DT4/END.DX4 (used by L3 Services over SRv6)
-
END.DX2 (used by L2 Services over SRv6)
SRv6 SID Information in BGP-LS Reporting
BGP-LS is used to report the topology of the domain using nodes, links, and prefixes. This feature adds the capability to report SRv6 Segment Identifier (SID) Network Layer Reachability Information (NLRI).
The following NLRI has been added to the BGP-LS protocol to support SRv6:
-
Node NLRI: SRv6 Capabilities, SRv6 MSD types
-
Link NLRI: End.X, LAN End.X, and SRv6 MSD types
-
Prefix NLRI: SRv6 Locator
-
SRv6 SID NLRI (for SIDs associated with the node): Endpoint Function, BGP-EPE Peer Node/Set and Opaque
SRv6 Services: L3VPN VPNv4 Active-Active Redundancy
This feature provides active-active connectivity to a CE device in a L3VPN deployment. The CE device can be Layer-2 or Layer-3 device connecting to the redundant PEs over a single LACP LAG port.
SRv6 Services: SRv6 Services TLV Type 5 Support
IOS XR 6.6.1 supports IETF draft draft-dawra-idr-srv6-vpn-04, in which SRv6 Service SID information is carried in the SRv6-VPN SID TLV (TLV Type 4). This SID TLV is inconsistent with the SRv6 SID Structure.
In IOS XR 7.0.2 and later releases, the implementation is now compliant with draft-ietf-bess-srv6-services-00, where a new SRv6 Services TLV (TLV Type 5/6) and SRv6 SID Structure Sub-Sub-TLV are defined to address this inconsistency.
Functionality is also provided to allow for backward compatibility between the two TLV types.
SRv6 Services: BGP Global IPv4
This feature extends support of SRv6-based BGP services to include Internet (IPv4) services by implementing End.DT4 SRv6 functions at the PE node (draft-ietf-bess-srv6-services).
IS-IS Maximum Metric on Start Up
This feature allows IS-IS to advertise the maximum metric during the start-up phase until either BGP converges or the specified start-up timer expires.
When a router is configured with maximum metric at start up, IS-IS advertises the maximum metric for IS-IS links as well as for prefixes that originated from the routers. This configuration will make neighboring routers use this router as a transit-node of last resort. The maximum metric is advertised only during the start-up phase when the routing table has not converged. Once the start-up timer expires or the BGP converge signal is received, the normal metric is advertised. You can set maximum metric for default routes, SRv6 locator, or redistributed prefixes.
For narrow metrics, the maximum metric value is 63; for wide metrics, the maximum metric value is 16777214.
SRv6 Services: EVPN VPWS — All-Active Multi-Homing
EVPN VPWS All-Active Multi-Homing over SRv6 provides an ELINE (P2P) service with all-active multihoming capability over an SRv6 network.
All-Active Multi-Homing enables an operator to connect a customer edge (CE) device to two or more provider edge (PE) devices to provide load balancing and redundant connectivity. With All-Active Multi-Homing, all the PEs can forward traffic to and from the multi-homed device.
SRv6 Services: EVPN VPWS — IPv6 Flow Label Computation Based on Ingress L2 Frames
This feature allows the ingress EVPN VPWS PE to compute the flow label field of the outer-most IPv6 header based on the L2 and L3 fields of the incoming Ethernet frames.
See SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking.
SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking
This feature allows the ingress EVPN VPWS PE to copy the CoS value from the top-most VLAN header to the traffic-class (TC) field of the outer-most IPv6 header. This functionality enables prioritization of traffic in the IPv6 network.
To enable this feature, use the hw-module profile segment-routing srv6 encapsulation traffic-class propagate command. This command requires you to reload the router for the configuration to take effect.
See SRv6 Services: EVPN VPWS — IPv6 QoS Traffic-Class Marking.
SPAN over Pseudo-Wire
Pseudo-wire traffic mirroring (known as PW-SPAN) is an extra functionality on the existing SPAN solutions. The existing SPAN solutions are monitored on a destination interface or through a GRE tunnel or RSPAN. In PW-SPAN, the traffic mirroring destination port is configured to be a pseudo-wire rather than a physical port. Here, the designated traffic on the source port is mirrored over the pseudo-wire to a central location. Mirroring the designated traffic on the source port over the pseudo-wire to a central location allows the centralization of expensive network traffic analysis tools.
MAC Mobility between the Bridge Ports using VRF Leaking
The MAC Mobility between the Bridge Ports using VRF Leaking feature supports EVPN MAC mobility across bridge ports with VRF leaking functionality. With both source and target VRFs located on the same router, when VM in the target VRF is migrated, this feature supports the host in source VRF to reach the migrated VM.
See MAC Mobility between the Bridge Ports using VRF Leaking.
Hardware
This release introduces the following hardware:
-
NC57-24DD—Cisco NCS 5500 Series 24-port 400 GE Base line card is supported on the Cisco NCS 5508 and Cisco NCS 5516 chassis with second generation fabric cards (NC55-5508-FC2 and NC55-5516-FC2) and fan trays (NC55-5508-FAN2 and NC55-5516-FAN2).
See Line Card Overview.
-
NC57-18DD-SE—Cisco NCS 5500 Series 18-port 400 GE Scale line card is supported on the Cisco NCS 5508 and Cisco NCS 5516 chassis with second generation fabric cards (NC55-5508-FC2 and NC55-5516-FC2) and fan trays (NC55-5508-FAN2 and NC55-5516-FAN2).
See Line Card Overview.
-
QDD-400G-CU1M , QDD-400G-CU2M, QDD-400G-FR4-S, QDD-400G-DR4-S, QDD-400G-LR8— These optical modules are supported on the NC57-24DD and NC57-18DD-SE line cards.
See the TMG compatibility matrix tool.
-
CFP2-WDM-DS100-HL, CFP2-WDM-DETS-1HL=, and CFP2-WDM-DS-1HL= — The Cisco NCS 5500 fixed port and modular port routers support the Cisco CFP2 DCO pluggable optics modules (CFP2-WDM-DS100-HL, CFP2-WDM-DETS-1HL=, and CFP2-WDM-DS-1HL).
See the TMG compatibility matrix tool.
Caveats
Caveats describe unexpected behavior in Cisco IOS XR Software releases. Severity-1 caveats are the most critical caveats; severity-2 caveats are less critical.
Caveats Specific to the NCS 5500 Series Routers
Caveats describe unexpected behavior in Cisco IOS XR Software releases. These caveats are speicifc to NCS 5500 Series Routers:
Bug ID |
Headline |
---|---|
CSCvt42370 |
IPv6 traffic drop with ingress IPv6 ACL on BVI, after router reload/upgrade |
TCAM key format change and reload request logs even after node reload |
|
4x10 breakout not working after upgrade/reload |
Supported Packages and System Requirements
For a complete list of supported optics, hardware and ordering information, see the Cisco NCS 5500 Series Data Sheet
To install the Cisco NCS 5500 router, see Hardware Installation Guide for Cisco NCS 5500 Series Routers.
Release 7.0.2 Packages
This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.
Composite Package |
||
Feature Set |
Filename |
Description |
Cisco IOS XR IP Unicast Routing Core Bundle |
ncs5500-mini-x.iso |
Contains base image contents that includes:
|
Individually-Installable Optional Packages |
||
Feature Set |
Filename |
Description |
Cisco IOS XR Manageability Package |
ncs5500-mgbl-3.0.0.0-r702.x86_64.rpm |
Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages. |
Cisco IOS XR MPLS Package |
ncs5500-mpls-2.1.0.0-r702.x86_64.rpm ncs5500-mpls-te-rsvp-2.2.0.0-r702.x86_64.rpm |
MPLS and MPLS Traffic Engineering (MPLS-TE) RPM. |
Cisco IOS XR Security Package |
ncs5500-k9sec-3.1.0.0-r702.x86_64.rpm |
Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI) |
Cisco IOS XR ISIS package |
ncs5500-isis-1.2.0.0-r702.x86_64.rpm |
Support ISIS |
Cisco IOS XR OSPF package |
ncs5500-ospf-2.0.0.0-r702.x86_64.rpm |
Support OSPF |
Lawful Intercept (LI) Package |
ncs5500-li-1.0.0.0-r702.x86_64.rpm |
Includes LI software images |
Multicast Package |
ncs5500-mcast-1.0.0.0-r702.rpm |
Support Multicast |
Determine Software Version
To verify the software version running on the router, use show version command in the EXEC mode.
RP/0/RP0/CPU0:router# show versionCisco IOS XR Software, Version 7.0.1
Cisco IOS XR Software, Version 7.0.2
Copyright (c) 2013-2020 by Cisco Systems, Inc.
Build Information:
Built By : <username>
Built On : Wed Mar 11 08:33:25 PDT 2020
Built Host : iox-ucs-027
Workspace : /auto/srcarchive17/prod/7.0.2/ncs5500/ws
Version : 7.0.2
Location : /opt/cisco/XR/packages/
Label : 7.0.2
cisco NCS-5500 () processor
System uptime is 1 day 15 minutes
Determine Firmware Support
Use the show hw-module fpd command in EXEC mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.
(RP/0/RP0/CPU0)#show hw-module fpd
FPD Versions
=================
Location Card type HWver FPD device ATR Status Running Programd
-----------------------------------------------------------------------------------
0/2 NC55-36X100G-S 0.4 MIFPGA CURRENT 0.07 0.07
0/2 NC55-36X100G-S 0.4 Bootloader CURRENT 1.14 1.14
0/2 NC55-36X100G-S 0.4 IOFPGA CURRENT 0.11 0.11
0/2 NC55-36X100G-S 0.4 SATA CURRENT 5.00 5.00
0/4/1 NC55-MPA-1TH2H-S 1.0 MPAFPGA CURRENT 0.53 0.53
0/4/2 NC55-MPA-2TH-HX-S 0.1 MPAFPGA CURRENT 0.53 0.53
0/4 NC55-MOD-A-S 1.0 MIFPGA CURRENT 0.13 0.13
0/4 NC55-MOD-A-S 1.0 Bootloader CURRENT 1.02 1.02
0/4 NC55-MOD-A-S 1.0 DBFPGA CURRENT 0.14 0.14
0/4 NC55-MOD-A-S 1.0 IOFPGA CURRENT 0.09 0.05
0/5 NC55-18H18F 1.0 MIFPGA CURRENT 0.03 0.03
0/5 NC55-18H18F 1.0 Bootloader CURRENT 1.14 1.14
0/5 NC55-18H18F 1.0 IOFPGA CURRENT 0.22 0.22
0/5 NC55-18H18F 1.0 SATA CURRENT 5.00 5.00
0/6/2 NC55-MPA-12T-S 0.1 MPAFPGA CURRENT 0.27 0.27
0/6 NC55-MOD-A-SE-S 0.201 MIFPGA CURRENT 0.13 0.13
0/6 NC55-MOD-A-SE-S 0.201 Bootloader CURRENT 1.02 1.02
0/6 NC55-MOD-A-SE-S 0.201 DBFPGA CURRENT 0.14 0.14
0/6 NC55-MOD-A-SE-S 0.201 IOFPGA CURRENT 0.09 0.05
0/7/1 NC55-MPA-12T-S 0.1 MPAFPGA CURRENT 0.27 0.27
0/7/2 NC55-MPA-12T-S 0.1 MPAFPGA CURRENT 0.27 0.27
0/7 NC55-MOD-A-S MIFPGA NOT READY
0/7 NC55-MOD-A-S 0.302 Bootloader CURRENT 1.02 1.02
0/7 NC55-MOD-A-S 0.302 DBFPGA CURRENT 0.14 0.14
0/7 NC55-MOD-A-S 0.302 IOFPGA CURRENT 0.09 0.05
0/7 NC55-MOD-A-S 0.302 SATA CURRENT 5.00 5.00
0/9 NC55-36X100G-A-SE 0.303 MIFPGA CURRENT 0.03 0.03
0/9 NC55-36X100G-A-SE 0.303 Bootloader CURRENT 0.14 0.14
0/9 NC55-36X100G-A-SE 0.303 DBFPGA CURRENT 0.14 0.14
0/9 NC55-36X100G-A-SE 0.303 IOFPGA CURRENT 0.26 0.21
0/9 NC55-36X100G-A-SE 0.303 SATA CURRENT 5.00 5.00
0/13 NC55-6X200-DWDM-S 2.3 CFP2_PORT_2 NEED UPGD 5.23 5.23
0/13 NC55-6X200-DWDM-S 0.0 DENALI0 CURRENT 13.48 13.48
0/13 NC55-6X200-DWDM-S 0.0 DENALI1 CURRENT 13.48 13.48
0/13 NC55-6X200-DWDM-S 0.0 DENALI2 CURRENT 13.48 13.48
0/13 NC55-6X200-DWDM-S 0.0 MORGOTH CURRENT 5.26 5.26
0/13 NC55-6X200-DWDM-S 0.0 MSFPGA0 CURRENT 2.22 2.22
0/13 NC55-6X200-DWDM-S 0.0 MSFPGA1 CURRENT 2.22 2.22
0/13 NC55-6X200-DWDM-S 0.0 MSFPGA2 CURRENT 2.22 2.22
0/13 NC55-6X200-DWDM-S 0.502 Bootloader CURRENT 1.14 1.14
0/13 NC55-6X200-DWDM-S 0.502 IOFPGA CURRENT 0.14 0.11
0/13 NC55-6X200-DWDM-S 0.502 SATA CURRENT 5.00 5.00
0/RP0 NC55-RP-E 1.0 Bootloader CURRENT 1.21 1.21
0/RP0 NC55-RP-E 1.0 IOFPGA CURRENT 0.23 0.23
0/RP0 NC55-RP-E 1.0 OMGFPGA CURRENT 0.48 0.48
0/RP1 NC55-RP-E 1.0 Bootloader CURRENT 1.21 1.21
0/RP1 NC55-RP-E 1.0 IOFPGA CURRENT 0.23 0.23
0/RP1 NC55-RP-E 1.0 OMGFPGA CURRENT 0.48 0.48
0/FC0 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC0 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.23
0/FC1 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC1 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.23
0/FC2 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC2 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.23
0/FC3 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC3 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.23
0/FC4 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC4 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.26
0/FC5 NC55-5516-FC 0.216 Bootloader CURRENT 1.75 1.75
0/FC5 NC55-5516-FC 0.216 IOFPGA CURRENT 0.26 0.23
0/PM3 NC55-PWR-3KW-2HV 0.2 DT-LogicMCU CURRENT 3.01 3.01
0/PM3 NC55-PWR-3KW-2HV 0.2 DT-PriMCU CURRENT 3.00 3.00
0/PM3 NC55-PWR-3KW-2HV 0.2 DT-SecMCU CURRENT 3.01 3.01
0/PM6 NC55-PWR-3KW-2HV 0.2 DT-LogicMCU CURRENT 3.01 3.01
0/PM6 NC55-PWR-3KW-2HV 0.2 DT-PriMCU CURRENT 3.00 3.00
0/PM6 NC55-PWR-3KW-2HV 0.2 DT-SecMCU CURRENT 3.01 3.01
0/SC0 NC55-SC 1.5 Bootloader CURRENT 1.74 1.74
0/SC0 NC55-SC 1.5 IOFPGA CURRENT 0.10 0.10
0/SC1 NC55-SC 1.5 Bootloader CURRENT 1.74 1.74
0/SC1 NC55-SC 1.5 IOFPGA CURRENT 0.10 0.10
Note |
The FPD versions on board shipped by manufacturer may have higher versions than the FPD package integrated in the IOS XR. |
Other Important Information
-
The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518.
Here the number 1518 represents the multi-dimensional scale value.
-
The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.
-
The warning message that the smart licensing evaluation period has expired is displayed in the console every hour. There is, however, no functionality impact on the device. The issue is seen on routers that do not have the Flexible Consumption licensing model enabled. To stop the repetitive messaging, register the device with the smart licensing server and enable the Flexible Consumption model. Later load a new registration token.
To register the device with the smart licensing server, follow the instructions provided in this link: Register and Activate Your Device.
-
NCS55A1-36H-SE-S – Under Secure Domain Router (SDR) configuration, when you change the size of the RP VM memory from 12 GB (default) to 14 GB and commit your changes, the system reloads. When the system is brought back up, it can crash with a core dump by LC XR VM.
0/RP0/ADMIN0:Oct 15 12:19:30.280 : dumper[3046]: %INFRA-CALVADOS_DUMPER-6-HOST_COPY_SUCCESS : Copied host file /misc/scratch/core/default-sdr--2.20201015-191552.core.0_RP0.lxcdump.tar.lz4 to 0/RP0:/misc/disk1 0/RP0/ADMIN0:Oct 15 12:19:30.389 : dumper[3046]: %INFRA-CALVADOS_DUMPER-6-HOST_REMV_SUCCESS : Deleted HostOS file /misc/scratch/core/default-sdr--2.20201015-191552.core.0_RP0.lxcdump.tar.lz4
This is a one-time reload. Other than the additional time required for the LC XR VM to reload, there is no impact to system functionality.
After the configuration is applied, we recommend that you reload the chassis when prompted to ensure all VMs and host OS are in sync.
-
LFA FRR feature is not supported.
Supported Transceiver Modules
To determine the transceivers that Cisco hardware device supports, refer to the Transceiver Module Group (TMG) Compatibility Matrix tool.
Supported Modular Port Adapters
For the compatibility details of Modular Port Adapters (MPAs) on the line cards, see the datasheet of that specific line card.
Upgrading Cisco IOS XR Software
Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).
The upgrade document (NCS5500_Upgrade_Downgrade_MOP_7.0.2.pdf) is available along with the software images.
Before starting the software upgrade, use the show install health command in the admin mode. This command validates if the statuses of all relevant parameters of the system are ready for the software upgrade without interrupting the system.
Note |
You can ignore these messages and proceed with the installation operation. |
Production Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Related Documentation
The most current Cisco NCS 5500 router documentation is located at the following URL: