Network Convergence System 5500 Series Routers
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
What's New in Cisco IOS XR Release 7.5.3
Software Features Introduced and Enhanced
To learn about features introduced in other Cisco IOS XR releases, select the release from the Documentation Landing Page.
Unless specified the following features are not supported on the Cisco 5700 series fixed port routers and the Cisco NCS 5500 series routers that have the Cisco NC57 line cards installed and operating in the native or compatibility mode.
To enable the native mode on Cisco NCS 5500 series routers having Cisco NC57 line cards, use the hw-module profile npu native-mode-enable command in the configuration mode. Ensure that you reload the router after configuring the native mode.
Feature | Description |
---|---|
BGP |
|
You can now prevent traffic loss due to premature advertising of BGP routes and subsequent packet loss in a network. You can achieve this by setting the delay time of the BGP start-up in the router until the Routing Information Base (RIB) is synchronized with the Forward Information Base (FIB) in the routing table. This delays the BGP update generation and prevents traffic loss in a network. You can configure a minimum delay of 1 second and a maximum delay of 600 seconds. This feature introduces the update wait-install delay startup command. |
|
Interface and Hardware Component |
|
Decapsulating Multiple Tunneled Packets Using Tunnel Source Direct |
With this new tunnel source direct option, a single tunnel interface can decapsulate multiple tunnel packets whose outer destination IP is any of the IPv4 or IPv6 address that is locally configured and operationally Up in the switch. Now, you can choose the IP ECMP links when there are multiple IP links between the two switches for decapsulation. |
In the Cisco IOS XR Release 7.5.3, the tunnels are grouped under the VRFs and you can segregate the traffic towards a specific VRF domain. Encapsulated Remote Switched Port Analyzer (ERSPAN) now transports mirrored traffic through GRE tunnels with multiple VRFs, helping you design your network with multiple Layer 3 partitions. In earlier releases, ERSPAN transported mirrored traffic through GRE tunnels that belonged to only default VRF. |
|
Outer-header hashing support for IPoGREoGUE and MPLSoGREoUDP flows. |
This feature specifies the IP hashing profile only on outer IP (L3 and L4) headers for IPoGREoGUE and MPLSoGREoUDP flows. |
IP Addresses and Services |
|
With this release, we’ve introduced the allow-client-id-change configuration under DHCP IPv4 mode. This option ensures that the client machines have only one binding with DHCP IPv4 server constantly. In scenarios where a client with active binding and valid lease time sends a discover message with a new client id, and the DHCP server approves such requests assuming it as a new client due to different client IDs. This results in multiple bindings for the same client, making the older binding redundant. This feature avoids wastage of DHCP resources due to such multiple bindings. |
|
MPLS |
|
You can now prevent traffic drops on a reoptimized label switch path (LSP) by timely confirmation that it's ready to handle the traffic. This confirmation is made possible by enabling the label edge router (LER) to send self-ping probes over the reoptimized LSP to the ingress LER. As soon the probe reaches the LER, there's confirmation that the RSVP programming is complete along the path. Post this confirmation, the LER switches traffic to the reoptimized LSP with no drop in traffic. This feature introduces the self-ping keyword in the named-tunnels tunnel-te command. |
|
System Management |
|
Advanced Secure Hash Algorithm (SHA) for SNMPv3 Authentication |
We’ve added the following SHA algorithms in this release that can be used to authenticate to the SNMPv3 server:
You can configure the above SHA algorithm for SNMPv3 authentication using the snmp-server user command. |
System Security |
|
Automatic renewal of Public Key Infrastructure (PKI) certificate |
You can now enable the router to renew the PKI certificate from the Certificate Authority (CA) by configuring the percentage of the certificate validity, after which the router requests a new certificate from the CA, and the CA authorizes it before certification expiration. This feature eliminates the previously needed manual efforts of certification renewal and avoids interruptions such as MACsec session flaps due to certificate expiry and so on. This feature introduces the following commands: |
You can now use OpenSSH certificates to authenticate to the remote routers from a client machine. This feature uses the ssh-keygen utility, a standard SSH component to generate and manage authentication keys, available in OpenSSH to create a CA (Certificate Authority) like infrastructure for logging into the router. In this feature, the certificates that are used to authenticate router and client are both signed by the same CA. This automatically establishes trust between router and client, and eliminates the need to establish trust, while using the client for remote logging to router for the first time. |
Programmability Data Models Introduced and Enhanced
This release introduces or enhances the following data models. For detailed information about the supported and unsupported
sensor paths of all the data models, see the Github repository. To get a comprehensive list of the data models supported in a release, navigate to the Available-Content.md file for the release in the Github repository. The unsupported sensor paths are documented as deviations. For example, openconfig-acl.yang
provides details about the supported sensor paths, whereas cisco-xr-openconfig-acl-deviations.yang
provides the unsupported sensor paths for openconfig-acl.yang on Cisco IOS XR routers.
Feature | Description |
---|---|
Programmability |
|
Unified Data Model to Configure Encapsulated Ambiguous VLANs |
Use the |
Use the |
|
Cisco-IOS-XR-um-if-encap-ambiguous-cfg.yang |
Use the unified data model to configure encapsulated ambiguous VLANs with IEEE802.1ad Provider Bridging (PB) encapsulation type on an access-interface. |
openconfig-network-instance.yang Version 0.15.0 |
The OpenConfig data model is revised from version 0.6.0 to 0.15.0 and supports the following sensor paths to configure and retrieve the Layer 3 forwarding constructs, Layer 2 instances, static routes, forwarding instances, Border Gateway Protocol (BGP) parameters and so on:
You can stream Event-driven and Model-driven telemetry data for the operational state of the network instance. |
openconfig-system.yang Version 0.7.0 |
The OpenConfig data model is revised from version 0.6.0 to 0.7.0. This version introduces support to view the statistics of CPU utilization of a component, create a customized banner that is displayed before the username and password login prompts and view the operational state of the system memory using the following sensor paths:
Event-driven telemetry is not supported for |
openconfig-system-terminal.yang Version 0.3.1 |
The OpenConfig data model is revised from version 0.3.0 to 0.3.1. This version introduces the following config sensor paths to configure the IPv4 or IPv6 telnet server and the number of telnet sessions that are active simultaneously, and state sensor paths to view that the configuration is enabled: IPv4:
IPv6:
With this release, an extended model You can stream Event-driven and Model-driven telemetry data for the operational state of the system. |
openconfig-routing-policy.yang Version 3.2.2 |
The OpenConfig data model is revised from version 3.1.0 to 3.2.2. You can configure the set-tag operation for local and interior gateway protocol (IGP) tagged routes in a routing policy. This data model is used along with related data models for routing protocols such as border gateway protocol (BGP), interior
gateway routing protocol (IGRP) and so on. With this release, the
You can stream Event-driven and Model-driven telemetry data for the operational state of the routing policy. |
openconfig-local-routing.yang Version 1.2.0 |
The OpenConfig data model, which is part of the
You can stream Event-driven and Model-driven telemetry data for the operational state of the static routes. |
openconfig-lacp.yang Version 1.2.0 |
The OpenConfig data model is revised from version 1.1.0 to 1.2.0 and introduces the following sensor paths to monitor the Link Aggregation Control Protocol ( LACP) aggregate interface timeouts and the time since the last timeout:
You can stream Event-driven telemetry data for the time since the last change of a timeout, and Model-driven telemetry data for the number of times the state has transitioned with a timeout. The state change is monitored since the time the device restarted or the interface was brought up, whichever is most recent. |
openconfig-interfaces.yang Version 2.5.0 |
The OpenConfig data model is revised from version 2.4.3 to 2.5.0. This version introduces support to configure the interface to connect the system to an out-of-band management network and enable the system CPU to handle traffic using the following sensor paths:
You can stream Event-driven and Model-driven telemetry data for the operational state of the interface. |
openconfig-if-ethernet.yang Version 2.12.1 |
The OpenConfig data model is revised from version 2.8.1 to 2.12.1 to support the following sensor paths to manage the Forward Error Correction (FEC) configuration and state of Ethernet interfaces: Configuration sensor path:
State sensor paths supported on half-duplex interfaces:
State sensor paths supported on half-duplex and full-duplex interfaces:
You can stream Model-driven telemetry data for the operational state of the Ethernet interfaces. |
openconfig-alarms.yang Version 0.3.2 |
The Using this sensor path, you can stream Event-driven and Model-driven telemetry data. |
openconfig-platform-cpu.yang Version 0.1.1 |
The OpenConfig data model is revised from version 0.1.0 to 0.1.1 and introduces the following sensor paths to view the CPU utilization statistics of the fan components:
The node-name indicates the location of the RP/CPU node. |
openconfig-bgp.yang Version 6.0.0 |
The OpenConfig data model is revised from version 3.0.1 to 6.0.0. This version introduces the following changes:
|
openconfig-rib-bgp.yang Version 0.7.0 |
The OpenConfig data model is revised from version 0.2.0 to 0.7.0. This version introduces the following changes:
|
oc-if-aggregate.yang Version 2.4.3 |
The OpenConfig data model is revised from version 1.0.2 to 2.4.3. This version does not add or modify leaves. Use this data model to manage the link bundles where one or more ports are aggregated together and treated as a single interface to provide increased bandwidth. |
openconfig-bfd.yang Version 0.2.3 |
The OpenConfig data model is revised from version 0.2.2 to 0.2.3, the current latest version from the OC community. Event-driven telemetry and Model-driven telemetry is not supported for the sensor paths. |
openconfig-telemetry.yang Version 0.5.1 |
The OpenConfig data model is revised from version 0.2.0 to 0.5.1, the latest published version from the OC community. Use this data model to configure telemetry sessions on the router. |
openconfig-messages.yang Version 0.0.1 |
The data model introduces the following sensor path to retrieve the operational state of syslog messages:
The severity of syslog messages varies from the highest severity level 0 (for emergencies) to the lowest severity level 7 (for debugging). Depending upon a specified severity level, the router streams data to the telemetry server, starting from the chosen severity level and higher. This enables you to limit the streamed syslog to the most significant ones. Before you subscribe to the sensor path, you must configure the severity level either through the CLI or YANG:
This release does not support the debug-entries container. |
openconfig-lldp.yang Version 0.2.1 |
You can now override the system default values of some of the mandatory LLDP Type-Length-Values (TLVs) that are advertised by routers to their directly connected neighboring devices. While advertising their identity and capabilities, routers can assign user-defined meaningful names instead of autogenerated values. Using the NETCONF RPC or CLI you can specify these user-defined values. The following leaves support user-defined values for the LLDP TLVs:
The data model also supports the following sensor paths to retrieve the operational state of LLDP packets that are sent and received by a specified interface:
|
openconfig-isis Version 0.6.0 |
With the revised version of this model, you can now monitor the system performance by checking the packet counter statistics and bandwidth, time, length, and values (TLVs) of IS-IS database. The revised model updates the leaf nodes in the following paths:
|
openconfig-macsec.yang Version 0.2.0 |
The OpenConfig data model for MACsec now includes viewing error counter for Protocol Data unit (PDU) and Secure Association
Key (SAK) in the MKA (MACSecKey Agreement) protocol in the Using this sensor path, you can stream Event-driven and Model-driven telemetry data. |
Hardware Introduced
No new hardware introduced in this release.
Features Supported on Cisco NC57 Line Cards and NCS 5700 Fixed Routers
The following table lists the parity features supported on Cisco NC57 line cards in compatibility mode (NC57 line cards with previous generation NC55 line cards in the same modular chassis) and native mode (modular chassis with only NC57 line cards and NCS5700 fixed chassis ).
There are no parity features for Cisco NC57 Line Cards and NCS 5700 Fixed Routers in this release.
For the complete list of parity features supported on Cisco NC57 line cards until Cisco IOS XR Release 7.5.3,, see:
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.5.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.4.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.3.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.2.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.2.1
Caveats
These caveats are applicable for Cisco IOS XR Software:
Bug ID |
Headline |
---|---|
tty_ltrace_initt FAILED floods on the console |
|
show yang operational CLIs may fail by multiple clients simultaneously quering in parallel |
Release Package
This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.
Visit the Cisco Software Download page to download the Cisco IOS XR software images.
Composite Package |
||
Feature Set |
Filename |
Description |
Cisco IOS XR IP Unicast Routing Core Bundle |
ncs5500-mini-x.iso |
Contains base image contents that includes:
|
Individually-Installable Optional Packages |
||
Feature Set |
Filename |
Description |
Cisco IOS XR Manageability Package |
ncs5500-mgbl-3.0.0.0-r753.x86_64.rpm |
Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages. |
Cisco IOS XR MPLS Package |
ncs5500-mpls-2.1.0.0-r753.x86_64.rpm ncs5500-mpls-te-rsvp-2.2.0.0-r753.x86_64.rpm |
MPLS and MPLS Traffic Engineering (MPLS-TE) RPM. |
Cisco IOS XR Security Package |
ncs5500-k9sec-3.1.0.0-r753.x86_64.rpm |
Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI) |
Cisco IOS XR ISIS package |
ncs5500-isis-1.2.0.0-r753.x86_64.rpm |
Support ISIS |
Cisco IOS XR OSPF package |
ncs5500-ospf-2.0.0.0-r753.x86_64.rpm |
Support OSPF |
Lawful Intercept (LI) Package |
ncs5500-li-1.0.0.0-r753.x86_64.rpm |
Includes LI software images |
Multicast Package |
ncs5500-mcast-1.0.0.0-r753.rpm |
Support Multicast |
Feature Set |
Filename |
NCS 5500 IOS XR Software 3DES |
NCS5500-iosxr-k9-7.5.3.tar |
NCS 5500 IOS XR Software |
NCS5500-iosxr-7.5.3.tar |
NCS 5500 IOS XR Software |
NCS5500-docs-7.5.3.tar |
Determine Software Version
To verify the software version running on the router, use show version command in the EXEC mode.
RP/0/RP0/CPU0:router# show version
Cisco IOS XR Software, Version 7.5.3
Copyright (c) 2013-2022 by Cisco Systems, Inc.
Build Information:
Built By : ingunawa
Built On : Tue Sep 27 03:05:21 PDT 2022
Built Host : iox-ucs-101
Workspace : /auto/srcarchive16/prod/7.5.3/ncs5500/ws
Version : 7.5.3
Location : /opt/cisco/XR/packages/
Label : 7.5.3
cisco NCS-5500 () processor
System uptime is 16 hours 53 minutes
Determine Firmware Support
Use the show hw-module fpd command in EXEC and Admin mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.
Note |
You can also use the show fpd package command in Admin mode to check the fpd versions. |
This sample output is for show hw-module fpd command from the Admin mode:
sysadmin-vm:0_RP0# show hw-module fpd
FPD Versions
=======================
Location Card type HWver FPD device ATR Status Run Programd
-----------------------------------------------------------------------------------
0/0 NC55-36X100G 1.1 Bootloader CURRENT 1.22 1.22
0/0 NC55-36X100G 1.1 IOFPGA CURRENT 0.15 0.15
0/0 NC55-36X100G 1.1 SATA-M600-MCT CURRENT 5.00 5.00
0/1 NC55-36X100G-S 1.1 Bootloader CURRENT 1.20 1.20
0/1 NC55-36X100G-S 1.1 IOFPGA CURRENT 0.11 0.11
0/1 NC55-36X100G-S 1.1 SATA-M600-MCT CURRENT 5.00 5.00
0/2 NC55-36X100G-S 1.1 Bootloader CURRENT 1.20 1.20
0/2 NC55-36X100G-S 1.1 IOFPGA CURRENT 0.11 0.11
0/2 NC55-36X100G-S 1.1 SATA-M600-MCT CURRENT 5.00 5.00
0/3 NC55-36X100G-S 1.2 Bootloader CURRENT 1.20 1.20
0/3 NC55-36X100G-S 1.2 IOFPGA CURRENT 0.11 0.11
0/3 NC55-36X100G-S 1.2 SATA-M600-MCT CURRENT 5.00 5.00
0/4 NC55-36X100G-S 1.2 Bootloader CURRENT 1.20 1.20
0/4 NC55-36X100G-S 1.2 IOFPGA CURRENT 0.11 0.11
0/4 NC55-36X100G-S 1.2 SATA-M600-MCT CURRENT 5.00 5.00
0/6 NC55-24H12F-SE 1.0 Bootloader CURRENT 1.20 1.20
0/6 NC55-24H12F-SE 1.0 IOFPGA CURRENT 0.09 0.09
0/6 NC55-24H12F-SE 1.0 SATA-M600-MCT CURRENT 5.00 5.00
0/7 NC55-36X100G-S 1.2 Bootloader CURRENT 1.20 1.20
0/7 NC55-36X100G-S 1.2 IOFPGA CURRENT 0.11 0.11
0/7 NC55-36X100G-S 1.2 SATA-M600-MCT CURRENT 5.00 5.00
0/RP0 NC55-RP 1.1 Bootloader CURRENT 9.31 9.31
0/RP0 NC55-RP 1.1 IOFPGA CURRENT 0.09 0.09
0/RP1 NC55-RP 1.1 Bootloader CURRENT 9.31 9.31
0/RP1 NC55-RP 1.1 IOFPGA CURRENT 0.09 0.09
0/RP1 NC55-RP 1.1 SATA-M600-MU CURRENT 6.00 6.00
0/FC0 NC55-5508-FC 1.0 Bootloader CURRENT 1.74 1.74
0/FC0 NC55-5508-FC 1.0 IOFPGA CURRENT 0.16 0.16
0/FC1 NC55-5508-FC 0.304 Bootloader CURRENT 1.74 1.74
0/FC1 NC55-5508-FC 0.304 IOFPGA CURRENT 0.16 0.16
0/FC3 NC55-5508-FC 1.0 Bootloader CURRENT 1.74 1.74
0/FC3 NC55-5508-FC 1.0 IOFPGA CURRENT 0.16 0.16
0/FC4 NC55-5508-FC 1.0 Bootloader CURRENT 1.74 1.74
0/FC4 NC55-5508-FC 1.0 IOFPGA CURRENT 0.16 0.16
0/FC5 NC55-5508-FC 1.0 Bootloader CURRENT 1.74 1.74
0/FC5 NC55-5508-FC 1.0 IOFPGA CURRENT 0.16 0.16
0/SC0 NC55-SC 1.4 Bootloader CURRENT 1.74 1.74
0/SC0 NC55-SC 1.4 IOFPGA CURRENT 0.10 0.10
0/SC1 NC55-SC 1.4 Bootloader CURRENT 1.74 1.74
0/SC1 NC55-SC 1.4 IOFPGA CURRENT 0.10 0.10
Important Notes
-
The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518. Here the number 1518 represents the multi-dimensional scale value.
-
The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.
Supported Transceiver Modules
To determine the transceivers that Cisco hardware device supports, refer to the Transceiver Module Group (TMG) Compatibility Matrix tool.
Supported Modular Port Adapters
For the compatibility details of Modular Port Adapters (MPAs) on the line cards, see the datasheet of that specific line card.
Upgrading Cisco IOS XR Software
Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).
Before starting the software upgrade, use the show install health command in the admin mode. This command validates if the statuses of all relevant parameters of the system are ready for the software upgrade without interrupting the system.
Note |
You can ignore these messages and proceed with the installation operation. |
Production Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Use user-class Option 'xr-config' Instead Of 'exr-config' To Provision ZTP
In Cisco IOS XR Release 7.3.1 and earlier, the system accepts the device sending user-class = "exr-config"; however starting Cisco IOS XR Release 7.3.2 and later, you must use only user-class = "xr-config".
In Cisco IOS XR Release 7.3.2 and later, use:
host cisco-rp0 {
hardware ethernet e4:c7:22:be:10:ba;
fixed-address 172.30.12.54;
if exists user-class and option user-class = "iPXE" {
filename = "http://172.30.0.22/boot.ipxe";
} elsif exists user-class and option user-class = "xr-config" {
filename = "http://172.30.0.22/scripts/cisco-rp0_ztp.sh";
}
}
Related Documentation
The most current Cisco NCS 5500 router documentation is located at the following URL: