Network Convergence System 5500 Series Routers
What's New in Cisco IOS XR Release 7.9.1
Cisco IOS XR Release 7.9.1 is a new feature release for Cisco NCS 5500 Series routers. For more details on the Cisco IOS XR release model and associated support, see Guidelines for Cisco IOS XR Software.
For more details on the Cisco IOS XR release model and associated support, see Guidelines for Cisco IOS XR Software.
New in Documentation
This release introduces rich and intuitive ways for you to access YANG data models supported in the Cisco IOS XR software.
Product | Description |
---|---|
Search by release number, error strings, or compare release numbers to view a detailed repository of error messages and descriptions. |
|
Select the MIB of your choice from a drop-down to explore an extensive repository of MIB information. |
|
YANG Data Models Navigator |
We have launched the tool as an easy reference to view the Data Models (Native, Unified, OpenConfig) supported in IOS XR platforms and releases. You can explore the data model definitions, locate a specific model, and view the containers and their respective lists, leaves, leaf lists, Xpaths, and much more. As we continue to enhance the tool, we would love to hear your feedback. You are welcome to drop us a note here. |
Use Case-based Documentation at Learning Labs |
You can now quickly explore and experiment on use-cases without setting up any hardware resources with the new Interactive documentation for Cisco 8000 routers on DevNet Learning Labs. Powered by Jupyter, the automated code blocks within the documentation enable you to configure the desired functionality on the routers and retrieve real-time output swiftly. Check out the new interactive documentation here: |
Software Feature Introduced and Enhanced
Unless specified the following features are not supported on the Cisco 5700 series fixed port routers and the Cisco NCS 5500 series routers that have the Cisco NC57 line cards installed and operating in the native or compatibility mode.
To enable the native mode on Cisco NCS 5500 series routers having Cisco NC57 line cards, use the hw-module profile npu native-mode-enable command in the configuration mode. Ensure that you reload the router after configuring the native mode.
Feature | Description |
---|---|
BGP |
|
Border Gateway Protocol (BGP) policy accounting measures and classifies IP traffic that is received from different peers. You can identify and account for all traffic by customer and bill accordingly. Policy accounting is enabled on an individual input interface basis. Using BGP policy accounting, you can now account for traffic according to the route it traverses. This feature is now supported on routers that have the Cisco NC57 based line cards with external TCAM (eTCAM) and operate in native mode. This feature introduces these changes:
|
|
BGP peers process the incoming BGP update messages at different rates. A slow peer is a peer that is processing incoming BGP update messages very slowly over a long period of time compared to other peers in the update sub-group. Slow peer handling is important when routes are constantly changing over a long period of time. It is important to clean up stale information in the queue and send only latest state. It is helpful to know if there is a slow peer, which indicates there is a network issue, such as sustained network congestion or a receiver not processing updates on time, that the network administrator can address. |
|
Programmability |
|
Stream Telemetry Data for ACL Byte Counters |
You can stream model-driven telemetry (MDT) data to monitor the ACL statistics such as stopped, matched and denied IPv4 and IPv6 packets using Cisco-IOS-XR-ipv4-acl-oper.yang and Cisco-IOS-XR-ipv6-acl-oper.yang data models. This release lets you stream telemetry data to monitor the statistics using byte counters. Previously, the only option to monitor ACL statistics was to use packet counters. ACL with policer statistics is supported only on Cisco Network Convergence System 5700 Series Routers. |
Securely retrieve dynamic NACM with LDAP over TLS authentication |
You can now securely retrieve the NETCONF Access Control Model (NACM) policies or rules on-demand from a remote Lightweight Directory Access Protocol (LDAP) server to validate each NETCONF operation using Transport Layer Security (TLS) authentication. With TLS authentication, the router and the LDAP server communication is encrypted for security. Before this release, the policies or rules were not encrypted and posed security vulnerabilities. |
Although Transport Layer Security (TLS) provides secure communication between servers and clients, TLS version 1.0 may pose a security threat. You can now disable TLS version 1.0 using the tlsv1-disable command. |
|
Interface and Hardware Component |
|
You can now configure the lower port speed using simple CLI keyword: speed or quad and switch between the higher and lower speeds without changing the optical module. Earlier, by default, only the higher port speed was available. The feature introduces new XPaths for YANG Data Model: Cisco-IOS-XR-optics-speed-cfg.yang (see GitHub, YANG Data Models Navigator.) |
|
With this release, transmitting VLAN-tagged LLDP packets on the subinterfaces is supported. Earlier, if LLDP is enabled on a subinterface, the LLDP packets are sent without a VLAN tag. VLAN-tagged LLDP packets help to identify unauthorized devices on the network and discover VLANs configured on the network devices. You can monitor and enforce VLAN segregation, ensuring that devices are connected to the correct VLANs and preventing unauthorized access to sensitive network segments. You can enable VLAN tagging for LLDP packets globally or on each subinterface using these commands:
|
|
With this release, Integrated Routing and Bridging/Bridge-group Virtual Interface (IRB/BVI) supports Layer 2 ACL, QoS, and statistics on BVI-routed packets, using a two-pass forwarding model for packets over BVI. This feature introduces the following changes:
|
|
QDD-400G-ZRP-S optical module can now support the following oFEC traffic configurations:
This increases the interoperability of the QDD-400G-ZRP-S optical module across network components supporting these formats. |
|
IP Addresses and Services |
|
With this feature, you can secure your DHCP infrastructure for Bridge Domains. DHCP Snooping operates in the Layer 2 network and prevents unauthorized DHCP servers from accessing your network. This feature mitigates the security risks due to denial-of-service from rogue DHCP servers, which disrupt networks as they compete with legitimate DHCP servers that configure hosts on the network for communication. You can use the following data models to configure this feature:
|
|
We have enabled better visibility of traffic distribution, thus helping you in capacity planning, network optimization, and identifying potential bottlenecks in network planning by displaying ACL statistics in bytes in ingress and egress directions. Previously, the statistics were available only in packet counts. The ACL statistics in bytes addition to packet count, help identify the average package size in the network and detect if the packets are truncated or not. You can view the ACL statistics in bytes for ACL-Based Policing only in Cisco NCS 5700 Series Routers and Cisco NC 57 line cards installed and operate in native and compatibility mode. The following commands are modified in this feature: |
|
Limit Address Resolution Protocol (ARP) Cache Entries per Interface |
In this feature, you can configure the maximum limit for the number of entries of dynamic mapping between IP addresses and media addresses by ARP per interface. Limiting the number of entries provides overflow protections in ARP cache and protects the routers from DOS attacks by preventing memory overuse by cache entries. This feature introduces the arp cache-limit command. |
Rate Limiting the Multicast and Broadcast Punted Traffic at Subinterface level |
When an Ethernet Virtual Connection (EVC) on a port is stormed with multicast or broadcast punted traffic, it impacts the performance of all the other EVCs on that particular port due to the NPU resource sharing. You can avoid such situations using rate limiting at subinterface level for the multicast and broadcast punted traffic. This feature is supported on routers that have the NC57 SE (Services Edge Optimized) version line cards installed and operating in native mode. |
L2VPN and Ethernet Services |
|
Call Admission Control for L2VPN P2P Services over Circuit-Style SR-TE Policies |
This feature allows you to configure guaranteed bandwidth for Layer 2 P2P services steered over Circuit-Style SR-TE policies. This ensures that a Circuit-Style SR-TE policy has sufficient bandwidth to accommodate a Layer 2 P2P service, while also preventing a L2 P2P service from being steered over a Circuit-Style SR-TE policy when there is insufficient available bandwidth. |
The routers can now determine the validity of an Address Resolution Protocol (ARP) packet based on valid MAC address to IP address bindings stored in a trusted database built at runtime by DHCP snooping. With this feature, the router relays only the valid ARP requests and responses, thus preventing the ARP poisoning attacks. This feature introduces the following:
|
|
You can now achieve source IP address filtering on a Layer 2 port, to prevent a malicious host from manipulating a legitimate host by assuming the legitimate IP address of the host. This feature uses dynamic DHCP snooping and static IP source binding to match IP addresses to hosts. This filtering limits the ability of a host to attack the network by claiming the IP address of a neighbor host. This feature introduces the following:
|
|
You can now set the EVPN gateway IP address in the EVPN route type 5 network layer reachability information (NLRI) that advertises IPv4 and IPv6 addresses. By setting the EVPN gateway IP address, only one IP-MAC route is withdrawn ensuring fast traffic switchover and reduced convergence time in the event of failure. Furthermore, this feature facilitates optimal traffic load balancing across the Virtual Network Forwarders (VNFs) and minimizes control plane updates when the VNFs or virtual machines (VMs) move. Previously, the NLRI advertisement included the default EVPN gateway IP address of zero, which was represented as 0.0.0.0 for IPv4 and :: for IPv6. This resulted in the withdrawal of all prefixes one by one in the event of a failure, leading to traffic loss. This feature introduces the following new commands: |
|
L3VPN |
|
You can now preserve MPLS encapsulation ID resources for Inter-AS option B local labels on Cisco NCS 5700 Series routers with Embedded Ternary Content-Addressable Memory (eTCAM) cards without the need to allocate any additional resources for these IDs. This feature is enabled by default and you cannot disable it. Previously, these encapsulation IDs were allocated but left unused. |
|
Multicast |
|
We now support the Equal-Cost Multipath (ECMP) and Link Aggregation Groups (LAG) load-balancing techniques for transporting multicast traffic over unicast GRE tunnels. ECMP and LAG provide higher bandwidth and redundancy, better network performance, and fault tolerance by using all available links. |
|
This feature is supported on routers that have the Cisco NC57 line cards installed and operate in native and compatible modes. Routers use Multicast Listener Discovery (MLD) protocol to discover the devices in a network and create route entries or update the route status in an IPv6 multicast network. |
|
Modular QoS |
|
You can now prevent malicious users from staging denial of service (DoS) attacks for non-initial IP fragments on Cisco NCS 5700 Series Routers and on NCS 5500 Series Routers with line cards other than NC57 line cards. You can achieve this by configuring an ACL with fragment match and specifying QoS match actions to rate-limit noninitial fragments for IPv4 traffic. Previously, this functionality was available only on systems with NC57 line cards running in native mode. |
|
Routing |
|
You can now select or filter the prefix-matching algorithm number during route redistribution, so that only the Flex-Algorithms that you configured for specific addresses are redistributed. This feature introduces the set algorithm command. |
|
The nonself-generated link-state advertisements (LSAs) for a given Open Shortest Path First (OSPF) process is limited to 500000. This protection mechanism prevents routers from receiving many LSAs, preventing CPU failure and memory shortages, and is enabled by default from this release onwards. If you have over 500000 LSAs in your network, configure the max-lsa command with the expected LSA scale before upgrading to this release or later. This feature modifies the following commands:
|
|
Limiting the Maximum Redistributed Type-3 LSA Prefixes in OSPF |
By default, the maximum redistributed Type-3 LSA prefixes for a given OSPF process is now limited to 100000. This mechanism prevents OSPF from redistributing a large number of prefixes as Type-3 LSAs and therefore preventing high CPU utilization and memory shortages. Once the number of redistributed prefixes is reached or exceeds the threshold value, the system log message is generated, and no more prefixes are redistributed. |
Segment Routing |
|
This feature enhances the IS-IS Flexible Algorithm link admin group (affinity) constraint to include link colors on links in the reverse direction toward the calculating router. The ability to apply affinity constraints in the reverse direction provides additional control for IS-IS Flexible Algorithm path computation. |
|
This feature allows traffic to a BGP service route to be steered over an SR-TE policy using the AS principles, and without imposing the service route’s prefix label. This feature enables use-cases such as centralized BGP EPE for 6PE in an SR-MPLS network. This feature introduces the following command:
|
|
SR-TE Explicit Segment Lists with Mix of IPv4 and IPv6 Segments |
Explicit segment list can be configured to include IPv6 segments, for example IPv6 adjacency SIDs or IPv6 EPE SIDs. This feature enables use-cases such as Centralized BGP EPE for 6PE in an SR-MPLS Network. |
This feature enables an SRv6 headend node to receive and install remote SIDs with Wide (32-bit) functions (Remote W-LIB). There is no new CLI to enable this capability at the ingress PE. |
|
System Management |
|
Auto-Save with Secure File-Transfer and Additional Configurable Parameters |
Apart from automatically backing up the running configuration after every commit, you can also do the following with Auto-Save:
The feature introduces these changes: CLI: Modified the configuration commit auto-save command by adding the following keywords:
Yang Data Model:
|
You can now specify a Fully Qualified Domain Name (FQDN) as the hostname for NTP server configuration over non-default VRFs. FQDNs are easy to remember compared to numeric IP addresses. Service migration from one host to another can cause a change in IP address leading to outages. Prior releases allowed FQDN handling in only default VRFs. |
|
With this feature, the router can transfer data to a remote server on SFTP and SCP by using the underlying SSH protocol implementation. You can use the SFTP and SCP option to facilitate secure transfer of configuration files from the router to an achieve server. This feature modifies the copy command. |
|
GNSS MIBs Traps for Antenna Open-Circuit, Satellite Visibility and Module Lock Status |
Your router uses Global Navigation Satellite System (GNSS) as the satellite system for enhanced timing synchronization of the timing interface. GNSS receiver picks up signals from this satellite system to recalculate position, velocity and local time to high precision. From this release, you can track the GNSS module antenna OC alarm status, status of the GNSS satellite visibility, and specify the lock status of GNSS module. You can useMIB Navigator tool to know more about the following traps introduced in this release:
|
Enhanced SyncE and extended ESMC |
ITU-T G.8262.1 recommendation defines the requirements for timing devices used in synchronizing network equipment. For example, bandwidth, frequency accuracy, holdover, and noise generation. With Enhanced SyncE (eSyncE) and Extended Ethernet Synchronization Message Channel (eESMC) support, the routers are capable of handling the following SyncE clocks on the network:
This feature is supported on the following NCS5500 and NCS 5700 variants: |
New Cisco-NTP-MIB Traps to Monitor NTP server and Improve Timing Accuracy |
Cisco-NTP-MIB allows you to monitor NTP on the server and client using SNMP MIB. This release supports new traps, which will help monitor the NTP server and improve timing accuracy . These traps also display the NTP server's current status, the local clock's stratum, the maximum error in seconds, and the delay in round-trip in seconds.Use MIB Navigator to know more about the newly added traps:
|
System Security |
|
Accessing Certificate Enrollment URL Using HTTP Proxy via specified Source Interface |
With this feature, you can enable the router to use an HTTP proxy to access the certificate enrollment URL. The router uses the already available HTTP proxy configurations to fetch Certificate Revocation List (CRL) to access the certificate enrollment URL. In addition, you can specify a source interface through which the router places the enrollment requests. This feature reduces the enrollment URL access failures when the router fails to reach the enrollment URL directly or when the enrollment URL is only reachable via an HTTP proxy. |
IEEE 802.1X Port-Based Authentication Support for Multiple Authentication and Multiple Host Modes |
The IEEE 802.1X port-based authentication allows only authorized supplicants to access the network. The IEEE 802.1X port-based authentication now supports multiple authentication and multiple host modes to allow multiple hosts or MAC addresses on a single port. Applicable to the following Cisco NCS 5500 Series Routers:
Applicable to the following Cisco NCS 5700 Series Router:
|
The NCS 5500 Series Routers are now capable of handling the SKIP protocol. With this ability, it can communicate with external quantum devices. This helps in using Quantum Key Distribution (QKD) devices for exchanging MACsec encryption keys between routers to eliminate the key distribution problem in a post quantum world where the current cryptographic systems are no longer secure due to the advent of quantum computers. This feature introduces the following:
For more information on Quantum Key Distribution, see Post Quantum Security Brief. |
|
Securely retrieve NACM policies using LDAP over TLS connection |
You can now securely retrieve the NETCONF Access Control Model (NACM) policies or rules from a remote Lightweight DirectoryAccess Protocol (LDAP) server using Transport Layer Security (TLS) authentication. With TLS authentication, the communication between the router and the LDAP server is encrypted for security. Before this release, the communication between the LDAP server and the router was not secured. |
YANG Data Models Introduced and Enhanced
This release introduces or enhances the following data models. For detailed information about the supported and unsupported sensor paths of all the data models, see the Github repository. To get a comprehensive list of the data models supported in a release, navigate to the Available-Content.md file for the release in the Github repository. The unsupported sensor paths are documented as deviations. For example, openconfig-acl.yang provides details about the supported sensor paths, whereas cisco-xr-openconfig-acl-deviations.yang provides the unsupported sensor paths for openconfig-acl.yang on Cisco IOS XR routers.
You can also view the data model definitions using the YANG Data Models Navigator tool. This GUI-based and easy-to-use tool helps you explore the nuances of the data model and view the dependencies between various containers in the model. You can view the list of models supported across Cisco IOS XR releases and platforms, locate a specific model, view the containers and their respective lists, leaves, and leaf lists presentedvisually in a tree structure.
To get started with using data models, see the Programmability Configuration Guide for Cisco NCS 5500 Series Routers.
Feature | Description | ||
---|---|---|---|
Programmability |
|||
Cisco-IOS-XR-config-autosave-cfg |
This Cisco native YANG data model enables you to automatically backup the running configuration files after every commit is made. |
||
Cisco-IOS-XR-um-config-commit-cfg |
This unified data model enables you to automatically back up the running configuration of the routerafter every commit is made. |
||
openconfig-network-instance.yang Version 0.2.3 |
In this release, the installed counter in the OpenConfig data model is enhanced to view the number of routes that are installed in Routing Information Base (RIB) from a specific neighbor per Address Family Identifiers (AFI) or Subsequent Address Family Identifiers (SAFI). The model supports a single instance of BGP with default VRF, and IPv4/IPv6 address family. Cross AFI where an IPv4 route learnt from an IPv6 neighbor, and vice versa, is not supported. You can stream Event-driven telemetry (EDT) and Model-driven telemetry (MDT) data. |
||
Cisco-IOS-XR-um-mpls-static-cfg.yang |
This Unified data model enables you to configure Label Switched Paths (LSPs) with statically assigned ingress labels that are mapped to prefixes or VRFs and egress paths explicitly defined or mapped to next hops. With this release, you can use the data model to disable the default route to resolve issues with the next hop information. We recommend that you use the data model according to the CLI hierarchy. |
||
Cisco-IOS-XR-remote-attestation -agent-oper.yang |
This Cisco native data model defines the remote attestation of the routers' security posture to assess the trustworthiness of hardware and software on the router. With this release, you can use the data model to send gNMI requests to retrieve the system integrity information such as secure boot status,Attestation Identity Key (AIK) and Secure Unique Device Identifier (SUDI) certificates. gNMI support is introduced for the show platform security attest certificate command. |
||
openconfig-isis.yang Version 1.0.0 |
The OpenConfig data model is revised from version 0.6.0 to 1.0.0 to simplify the authentication keychain nodes. With this feature, you can configure the authentication type to limit the establishment of adjacencies and the exchange of LSPs. You can also retrieve the operational state of the authentication nodes. |
||
openconfig-network-instance.yang |
In this release, the installed counter in the OpenConfig data model is enhanced to view the number of routes that are installed in Routing Information Base (RIB) from a specific neighbor per Address Family Identifiers (AFI) or Subsequent Address Family Identifiers (SAFI). The model supports a single instance of BGP with default VRF, and IPv4/IPv6 address family.
You can stream Event-driven telemetry (EDT) and Model-driven telemetry (MDT) data. |
||
openconfig-bgp.yang Version 9.1.0 |
This OpenConfig data model, which is part of the openconfig-network-instance.yang data model is revised from version 6.0.0 to 9.1.0. This version introduces the following changes:
|
||
Cisco-IOS-XR-optics-speed-cfg.yang |
This Cisco native YANG data model is introduced to configure lower port speeds for dual-mode optical modules. |
Hardware Introduced
Hardware Feature | Description |
---|---|
Optics |
This release supports the following optics on selective hardware within the product portfolio. For details refer to the Transceiver Module Group (TMG) Compatibility Matrix.
|
Behavior Changes
-
Prior to Cisco IOS XR release 7.2.1, a segment of an explicit segment list can be configured as an IPv4 address (representing a Node or a Link) using the index indexaddress ipv4 address command.
Starting with Cisco IOS XR release 7.2.1, an IPv4-based segment (representing a Node or a Link) can also be configured with the new index index mpls adjacencyaddress command. The configuration is stored in NVRAM in the same CLI format used to create it. There is no conversion from the old CLI to the new CLI.
Starting with Cisco IOS XR release 7.9.1, the old CLI has been deprecated. Old configurations stored in NVRAM will be rejected at boot-up.
As a result, explicit segment lists with IPv4-based segments using the old CLI must be re-configured using the new CLI.
There are no CLI changes for segments configured as MPLS labels using the index index mpls label label command.
-
If you are on a release before Cisco IOS XR Release 7.4.1, you can configure SR-ODN with Flexible Algorithm constraints using the segment-routing traffic-eng on-demand color color dynamic sid-algorithm algorithm-number command.
Starting with Cisco IOS XR release 7.4.1, you can also configure SR-ODN with Flexible Algorithm constraints using the new segment-routing traffic-eng on-demand color color constraints segments sid-algorithm algorithm-number command.
From Cisco IOS XR Release 7.9.1, the segment-routing traffic-eng on-demand color color dynamic sid-algorithm algorithm-number command is deprecated. Previous configurations stored in NVRAM will be rejected at boot-up.
Hence, for Cisco IOS XR Release 7.9.1, you must reconfigure all SR-ODN configurations with Flexible Algorithm constraints that use the on-demand dynamic sid-algorithm with the on-demand constraints command.
Features Supported on Cisco NC57 Line Cards and NCS 5700 Fixed Routers
The following table lists the features supported on Cisco NC57 line cards in compatibility mode (NC57 line cards with previous generation NC55 line cards in the same modular chassis) and native mode (modular chassis with only NC57 line cards and NCS5700 fixed chassis)
Feature |
Compatible Mode |
Native Mode |
---|---|---|
Support for Layer 2 IPv6 Multicast Traffic |
✓ |
✓ |
SRv6 Services: Services with Remote SIDs from W-LIB |
✕ |
✓ |
Load Balancing in Unicast GRE Tunnels |
✓ |
✓ |
BGP Policy Accounting |
✕ |
✓ |
Configure Lower Port Speed of Dual-Mode Optical Modules |
✓ |
✓ |
Two-pass Forwarding over BVI |
✓ |
✓ |
Traffic Configuration for QDD-400G-ZRP-S |
✓ |
✓ |
Cisco-IOS-XR-um-mpls-static-cfg.yang |
✓ |
✓ |
uRPF in Strict Mode |
✕ |
✓ |
802.1X Port-Based Authentication |
✓ |
✓ |
Monitor ACL Statistics via Byte Counters Telemetry Data |
✓ |
✓ |
Additional Systems Supported for Configuring an ACL with Fragment Match |
✓ |
✓ |
Cisco-IOS-XR-attestation-agent-oper.yang |
✓ |
✓ |
Accessing Certificate Enrollment URL Using HTTP Proxy |
✓ |
✓ |
GRID Optimization for MPLS Inter-AS Option-B Local Labels |
✓ |
✓ |
Display ACL Statistics in Bytes |
✓ |
✓ |
For the complete list of features supported on Cisco NC57 line cards until Cisco IOS XR Release 7.9.1. see:
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.8.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.8.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.7.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.7.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.6.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.5.3
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.5.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.5.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.4.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.4.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.3.1
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.2.2
-
Release Notes for Cisco NCS 5500 Series Routers, IOS XR Release 7.2.1
Caveats
There are no caveats in this release.
Release Package
This table lists the Cisco IOS XR Software feature set matrix (packages) with associated filenames.
Visit the Cisco Software Download page to download the Cisco IOS XR software images.
Composite Package |
||
Feature Set |
Filename |
Description |
Cisco IOS XR IP Unicast Routing Core Bundle |
ncs5500-mini-x.iso |
Contains base image contents that includes:
|
Individually-Installable Optional Packages |
||
Feature Set |
Filename |
Description |
Cisco IOS XR Manageability Package |
ncs5500-mgbl-3.0.0.0-r791.x86_64.rpm |
Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server packages. |
Cisco IOS XR MPLS Package |
ncs5500-mpls-2.1.0.0-r791.x86_64.rpm ncs5500-mpls-te-rsvp-2.2.0.0-r791.x86_64.rpm |
MPLS and MPLS Traffic Engineering (MPLS-TE) RPM. |
Cisco IOS XR Security Package |
ncs5500-k9sec-3.1.0.0-r791.x86_64.rpm |
Support for Encryption, Decryption, Secure Shell (SSH), Secure Socket Layer (SSL), and Public-key infrastructure (PKI) |
Cisco IOS XR ISIS package |
ncs5500-isis-1.2.0.0-r791.x86_64.rpm |
Support ISIS |
Cisco IOS XR OSPF package |
ncs5500-ospf-2.0.0.0-r791.x86_64.rpm |
Support OSPF |
Lawful Intercept (LI) Package |
ncs5500-li-1.0.0.0-r791.x86_64.rpm |
Includes LI software images |
Multicast Package |
ncs5500-mcast-1.0.0.0-r791.rpm |
Support Multicast |
Feature Set |
Filename |
NCS 5500 IOS XR Software 3DES |
NCS5500-iosxr-k9-7.9.1.tar |
NCS 5500 IOS XR Software |
NCS5500-iosxr-7.9.1.tar |
NCS 5500 IOS XR Software |
NCS5500-docs-7.9.1.tar |
Feature Set |
Filename |
NCS 5700 IOS XR Software |
ncs5700-x64-7.9.1.iso |
NCS 5700 IOS XR Software (only k9 RPMs) |
ncs5700-k9sec-rpms.7.9.1.tar |
NCS 5700 IOS XR Software Optional Package |
NCS5700-optional-rpms.7.9.1.tar This TAR file contains the following RPMS:
|
Determine Software Version
To verify the software version running on the router, use show version command in the EXEC mode.
Router# show version
Cisco IOS XR Software, Version 7.9.1
Copyright (c) 2013-2023 by Cisco Systems, Inc.
Build Information:
Built By : ingunawa
Built On : Sun Apr 2 01:04:35 PDT 2023
Built Host : iox-ucs-047
Workspace : /auto/srcarchive15/prod/7.9.1/ncs5500/ws
Version : 7.9.1
Location : /opt/cisco/XR/packages/
Label : 7.9.1
cisco NCS-5500 () processor
System uptime is 19 hours 14 minutes
Determine Firmware Support
Use the show hw-module fpd command in EXEC and Admin mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.
Note |
You can also use the show fpd package command in Admin mode to check the fpd versions. |
This sample output is for show hw-module fpd command from the Admin mode:
sysadmin-vm:0_RP0# show hw-module fpd
FPD Versions
==============
Location Card type HWver FPD device ATR Status Run Programd
-----------------------------------------------------------------------------------
0/2 NC57-18DD-SE 1.1 Bootloader CURRENT 1.03 1.03
0/2 NC57-18DD-SE 1.1 DBFPGA CURRENT 0.14 0.14
0/2 NC57-18DD-SE 1.1 IOFPGA CURRENT 0.22 0.22
0/2 NC57-18DD-SE 1.1 SATA-INTEL_240G CURRENT 1132.00 1132.00
0/5 NC57-24DD 1.1 Bootloader CURRENT 1.03 1.03
0/5 NC57-24DD 1.1 DBFPGA CURRENT 0.14 0.14
0/5 NC57-24DD 1.1 IOFPGA CURRENT 0.23 0.23
0/5 NC57-24DD 1.1 SATA-INTEL_240G CURRENT 1132.00 1132.00
0/RP0 NC55-RP 1.1 Bootloader CURRENT 9.31 9.31
0/RP0 NC55-RP 1.1 IOFPGA CURRENT 0.09 0.09
0/RP0 NC55-RP 1.1 SATA-M600-MU CURRENT 6.00 6.00
0/RP1 NC55-RP 1.0 Bootloader CURRENT 9.31 9.31
0/RP1 NC55-RP 1.0 IOFPGA CURRENT 0.09 0.09
0/RP1 NC55-RP 1.0 SATA-M600-MU CURRENT 6.00 6.00
0/FC0 NC55-5508-FC2 1.0 Bootloader CURRENT 1.80 1.80
0/FC0 NC55-5508-FC2 1.0 IOFPGA CURRENT 0.19 0.19
0/FC0 NC55-5508-FC2 1.0 SATA-M5100 CURRENT 75.00 75.00
0/FC1 NC55-5508-FC2 1.0 Bootloader CURRENT 1.80 1.80
0/FC1 NC55-5508-FC2 1.0 IOFPGA CURRENT 0.19 0.19
0/FC1 NC55-5508-FC2 1.0 SATA-M5100 CURRENT 75.00 75.00
0/FC2 NC55-5508-FC2 1.0 Bootloader CURRENT 1.80 1.80
0/FC2 NC55-5508-FC2 1.0 IOFPGA CURRENT 0.19 0.19
0/FC2 NC55-5508-FC2 1.0 SATA-M5100 CURRENT 75.00 75.00
0/FC3 NC55-5508-FC2 1.0 Bootloader CURRENT 1.80 1.80
0/FC3 NC55-5508-FC2 1.0 IOFPGA CURRENT 0.19 0.19
0/FC3 NC55-5508-FC2 1.0 SATA-M5100 CURRENT 75.00 75.00
0/FC5 NC55-5508-FC2 1.0 Bootloader CURRENT 1.80 1.80
0/FC5 NC55-5508-FC2 1.0 IOFPGA CURRENT 0.19 0.19
0/FC5 NC55-5508-FC2 1.0 SATA-M5100 CURRENT 75.00 75.00
0/SC0 NC55-SC 1.5 Bootloader CURRENT 1.74 1.74
0/SC0 NC55-SC 1.5 IOFPGA CURRENT 0.10 0.10
0/SC1 NC55-SC 1.5 Bootloader CURRENT 1.74 1.74
0/SC1 NC55-SC 1.5 IOFPGA CURRENT 0.10 0.10
Important Notes
-
The total number of bridge-domains (2*BDs) and GRE tunnels put together should not exceed 1518. Here the number 1518 represents the multi-dimensional scale value.
-
The offline diagnostics functionality is not supported in NCS 5500 platform. Therefore, the hw-module service offline location command will not work. However, you can use the (sysadmin)# hw-module shutdown location command to bring down the LC.
-
BGP-Labeled Unicast (LU) Prefix-Independent Convergence (PIC) auto-protection feature may cause equal cost multipath (ECMP) FEC NPU resource exhaustion on BGP peering devices for IPv4/IPv6 addresses. From Cisco IOS XR Release 7.9.1 onwards, the auto-protection feature for BGP-LU multipath PIC is disabled by default. To enable this feature, use the hw-module fib bgp-mp-pic auto-protect enable command. After executing the command, you must reload the router.For more information, see BGP-LU Multipath PIC with Auto Protection section in BGP Prefix Independent Convergence chapter in BGP Configuration Guide for Cisco NCS 5500 Series Routers.
Supported Transceiver Modules
To determine the transceivers that Cisco hardware device supports, refer to the Transceiver Module Group (TMG) Compatibility Matrix tool.
Upgrading Cisco IOS XR Software
Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes. Software packages can be upgraded or downgraded on all supported card types, or on a single card (node).
Before starting the software upgrade, use the show install health command in the admin mode. This command validates if the statuses of all relevant parameters of the system are ready for the software upgrade without interrupting the system.
Note |
You can ignore these messages and proceed with the installation operation.
|
Production Software Maintenance Updates (SMUs)
A production SMU is a SMU that is formally requested, developed, tested, and released. Production SMUs are intended for use in a live network environment and are formally supported by the Cisco TAC and the relevant development teams. Software bugs identified through software recommendations or Bug Search Tools are not a basis for production SMU requests.
For information on production SMU types, refer the Production SMU Types section of the IOS XR Software Maintenance Updates (SMUs) guide.
Cisco IOS XR Error messages
To view, search, compare, and download Cisco IOS XR Error Messages, refer to the Cisco IOS XR Error messages tool.
Cisco IOS XR MIBs
To determine the MIBs supported by platform and release, refer to the Cisco IOS XR MIBs tool.
Related Documentation
The most current Cisco NCS 5500 router documentation is located at the following URL: