Network Convergence System 540 Series Routers
Note |
This software release has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices. |
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
What's New in Cisco IOS XR Release 7.3.1
Feature | Description |
---|---|
Hardware |
|
Support for Cisco Network Convergence System 540 Small Density Routers |
The Cisco NCS 540 Small Density routers (Cisco N540X-8Z16G-SYS-A/D and Cisco N540X-6Z18G-SYS-A/D) are temperature-hardened, fixed port, one rack unit form-factor, and conformal coated routers. These routers support advanced timing (Class C), security, and QoS features in the sub-100G routing space. The Cisco NCS 540 Small Density routers are IOS XR based cell site routers that extend Cisco’s 5G Converged SDN Transport to the edge of the networks. The Cisco N540X-8Z16G-SYS-A/D router supports:
The Cisco N540X-6Z18G-SYS-A/D router supports:
|
Licensing | |
Specific License Reservation (SLR) allows customers in highly secure networks to utilize smart licenses without communicating the license information to the Cisco Smart Software manager (CSSM). | |
SIA license grants you access to the latest software upgrades which contain new features, bug fixes, and security enhancements for devices on your network. Also, it enables the consumption of Advantage and Essential Right-to-Use (RTU) licenses on your device, and allows portability of these RTU licenses from one device to another. |
Note |
Cisco N540X-8Z16G-SYS-A/D, and N540X-6Z18G-SYS-A/D variants, will have parity with Cisco IOS XR Release 7.2.1 with the rest of the NCS 540 variants. |
The following features are supported only on N540-24Z8Q2C-SYS, N540-ACC-SYS, N540X-ACC-SYS, N540X-16Z4G8Q2C-A/D, N540-28Z4C-SYS-A/D, N540X-12Z16G-SYS-A/D, and N540-12Z20G-SYS-A/D variants.
Feature | Description |
---|---|
Modular QoS |
|
Conditional Marking of MPLS Experimental Bits for EVPN-VPWS Single-Homing Services |
This feature enables you to differentiate traffic in the MPLS forwarding domain and manage traffic from ingress PE to egress PE based on the MPLS EXP bit of the MPLS header. This feature is supported only for EVPN-VPWS single-homing services, and not supported for EVPN-VPWS multi-homing services. |
This feature allows you to share a single instance of QoS policy across multiple subinterfaces, allowing for aggregate shaping of the subinterfaces to one rate. The ability to facilitate queue consumption in this manner offers the advantage of saving on QoS and hardware resources, while ensuring that the specified rate is not exceeded. |
|
BGP |
|
BGP PIC for MPLS for multipath backup |
Unlabeled BGP PIC EDGE for global prefixes is not supported. |
You can configure connected routes and static routes in per-prefix mode on the BVI. However, dynamic protocols such as BGP in per-prefix mode on the BVI is not supported. |
|
Routing |
|
The Bidirectional Forwarding detection (BFD) Hardware Offload feature enables the offload of a BFD session in an IPv6 network. With this feature, each bundle member link with IPv6 address runs its own BFD session This feature improves scale and reduces the overall network convergence time by sending rapid failure detection packets to the routing protocols for recalculating the routing table. |
|
Interface and Hardware |
|
This feature provides an on-the-router mechanism to check and verify the correct programming for the bundle interface. The system performs the check on ingress and egress traffic. From the running configuration, BCC fetches information from bundle, sub-bundle, and member information and saves that information in a database. Later, BCC collects data from all the running nodes and verifies the information with the information saved in the database. BCC then reports inconsistencies, programming errors, stale entries, and deletes any pending objects. |
|
Multicast |
|
This feature enables selecting a bundle member in the control plane to steer the L2 and L3 multicast traffic traversing over bundle at the egress NP. This feature helps optimize fabric bandwidth as the member selection is performed in the control plane. |
|
Multicast Counters |
When enabled, this feature provides information on the rate of packets received for a multicast route. Starting this release, the feature is extended on the Cisco NCS 540 series routers. |
System Security |
|
This feature allows you to generate and securely store crypto key pair for the Ed25519 public-key signature algorithm on Cisco IOS XR 64-bit platforms. This signature system provides fast signing, fast key generation, fool proof session keys, collision resilience, and small signatures. The feature also facilitates integration of Cisco IOS XR with Cisco Crosswork Trust Insights. Commands introduced for this feature are:
Commands modified for this feature are:
|
|
With this feature, when you key in a password or secret, it is not displayed on the screen. This enhances security. The feature is enabled by default. The following options are added to the username command:
|
|
This feature enables trust and security in the system’s steady state by encrypting data at the disk level. The encrypted data can be accessed only with a specific key stored in the TAm. |
|
This feature allows you to set a limit on the number of user authentication attempts allowed for SSH connection, using the three authentication methods that are supported by Cisco IOS XR. The limit that you set is an overall limit that covers all the authentication methods together. If the user fails to enter the correct login credentials within the configured number of attempts, the connection is denied and the session is terminated. This command is introduced for this feature: ssh server max-auth-limit. |
|
Support for this algorithm is added, when establishing SSH sessions, to Cisco IOS XR 64-bit platforms. It is a modern and secure public-key signature algorithm that provides several benefits, particularly resistance against several side-channel attacks. Prior to this release, DSA, ECDSA, and RSA public-key algorithms were supported. This command is modified for this feature: ssh server algorithms host-key |
|
Segment Routing |
|
This feature supports the advertisement of SID-mapping entries between IS-IS levels (for example, from L1 to L2-only and from L2 to L1). A mapping server is not required for each IS-IS area. |
|
Cumulative Metric Bounds (Delay-Bound use-case) |
With this feature, SRTE calculates a shortest path that satisfies multiple metric bounds. This feature provides flexibility for finding paths within metric bounds, for parameters such as latency, hop count, IGP and TE. |
IPv6 Unlabeled Traffic protection with TI-LFA |
TI-LFA provides protection for SR-labeled traffic (IPv4 and IPv6 prefixes associated with a prefix SID) and for other unlabeled IPv4 prefixes. This feature introduces support for protecting unlabeled IPv6 prefixes. |
With Performance Measurement, the source and destination IP addresses used in the OAM packet are determined by the IP address present on the interface where the delay-measurement operation is enabled. If an IPv4 or IPv6 address is not configured under the interface, this feature enables the use of the interface's IPv6 link-local address as the OAM packet source IP address. |
|
With this feature, you can use SR for optimally transporting IP VPN multicast traffic between (BGP/MPLS) IP VPN customer sites, across an SP network. To optimize the traffic flow, SR-PCE is used. It dynamically builds, instantiates, and updates a multicast distribution tree on the multicast routers, through an SR policy. |
|
SR OAM for SR Policy (Policy Name / Binding SID / Custom label stack) |
This feature extends SR OAM ping and traceroute function for an SR policy (or binding SID)-LSP end-point combination. This addresses the limitations of the Nil-FEC LSP Ping and Traceroute function which cannot perform a ping operation to a segment list that is not associated with an installed SR policy. Also, it cannot validate egress device-specific SR policies. |
With this feature, users can create specific performance measurement delay profiles for SR policies, based on the interface type or network area the performance management probes are enabled on. This enhances performance measurement capabilities. |
|
This feature is an extension of the SRv6 architecture. It leverages the existing SRv6 Network Programming architecture to encode up to 6 SRv6 Micro-SID (uSID) instructions within a single 128-bit IPv6 address, called the uSID Container. In addition, this feature leverages the existing the SRv6 data plane (SRH) and the SRv6 control plane with no changes. It also provides low MTU overhead. SRv6 uSID supports the following existing SRv6 functionality:
|
|
With this feature, the egress PE can signal an SRv6 Service SID with the BGP overlay service route. The ingress PE encapsulates the IPv4/IPv6 payload in an outer IPv6 header where the destination address is the SRv6 Service SID provided by the egress PE. BGP messages between PEs carry SRv6 Service SIDs as a means to interconnect PEs. |
|
With this feature, the egress PE can signal an SRv6 Service SID with the BGP overlay service route. The ingress PE encapsulates the IPv4/IPv6 payload in an outer IPv6 header where the destination address is the SRv6 Service SID provided by the egress PE. BGP messages between PEs carry SRv6 Service SIDs as a means to interconnect PEs and form VPNs. |
|
This feature extends Anycast SIDs with weighted nodes. Anycast routing enables the steering of traffic toward multiple advertising nodes, providing load-balancing and redundancy. With the default (unweighted) behavior, the traffic is load-balanced across each node in the group evenly. Weighted Anycast nodes advertise a cost (weight) along with the Anycast SID. Traffic is then distributed according to the weights. Weighted Anycast SIDs allow for highly available paths with node redundancy and path optimality that provide FRR for node failure of service provider edge (PE) routers and ABR/ASBRs nodes in multi-domain networks. |
|
L2VPN |
|
This feature enables you to send Layer 2 protocol data over IP or other L3 networks. Support of this feature is now extended to the Cisco NCS 540 series routers. This feature introduces the l2protocol command. |
|
This feature leverages the NTP clock synchronization mechanism to handle the transfer of DF role from one edge device to another. In this mechanism, the newly added or recovered PE advertises the Service Carving Timestamp along with the current time to peering PEs. This improves convergence by reducing the time for DF election from three seconds to a few tens of milliseconds. The show evpn ethernet-segment command is modified to display the Service-Carving wall clock Timestamp (SCT). |
|
This feature introduces EVPN Single-Flow-Active multihoming mode to connect PE devices in an access network that run Layer 2 access gateway protocols. In this mode, only the PE that first advertises the host MAC address in a VLAN forwards the traffic in a specific flow. When the primary link fails, the traffic quickly switches to the standby PE that learns the MAC address from the originated path, thereby providing fast convergence. A keyword, single-flow-active is added to the load-balancing-mode command. |
|
This feature enables a new DF election mechanism to allow the access network to control EVPN PE devices through the interface state. This mechanism allows the PE devices to define the backup path much before the event of failure. This feature reduces the convergence time. The following keywords are added to the service-carving command:
|
|
In the event of a link failure, this feature enables the router to switch traffic quickly to a precomputed loop-free alternative (LFA) path by allocating a label to the incoming traffic. Thus minimizes the traffic loss ensuring fast convergence. This feature is supported only when PE devices are in an EVPN single-flow-active mode This feature introduces the convergence reroute command. |
|
System Setup and Software Installation |
|
This feature allows devices in the network to establish a secure connection with the ZTP server and authenticate information using a three-step validation process involving validation of the network device, the ZTP server, and onboarding information. This eliminates security risks or malicious actions during remote provisioning. ztp secure-mode enable |
|
GISO can be created with a ZTP initialization (ztp.ini) file. ZTP uses this file when starting the install operation. If you start an install replace or install package replace operation with a GISO that has a ztp.ini file, the ZTP configuration is updated on both RPs when the operation is applied. If you replace the image using an ISO without a ztp.ini file, the ZTP configuration is removed from both the RPs. |
|
Network Synchronization |
|
Asymmetrical delays can significantly degrade synchronization in PTP networks and impact PTP accuracy. This feature allows you to set a delay asymmetry to offset the static delays on PTP paths. This facilitates better synchronization between real-time clocks of devices in a network. The delay-symmetry command is introduced for this feature. |
The following features are supported only on N540-24Z8Q2C-SYS, N540-ACC-SYS, and N540X-ACC-SYS variants.
Feature | Description |
---|---|
Hardware |
|
GPIO external alarm |
You can now enable external alarms, such as external doors, voltage, fire, thermal, water sensors, and so on, on the Cisco NCS 540 router variants.
For more information, see the Cisco NCS 540 Router Hardware Installation Guide. |
System Security |
|
MAcsec is now supported on Cisco NCS 540 routers. |
The following features are supported only on N540X-16Z4G8Q2C-A/D, N540-28Z4C-SYS-A/D, N540X-12Z16G-SYS-A/D, and N540-12Z20G-SYS-A/D variants.
Feature | Description |
---|---|
System Setup and Software Installation |
|
The source files to download and install RPMs from can be a repository name, repository URL or a local file path. You can extract the bugfix TAR file to obtain the RPMs, and install the RPMs. This feature extends support to install the RPMs directly from the TAR file. This installs all the packages present in the tarball. The TAR file is available in the Software Download page. The RPMs can be installed from the TAR file using CLI or Yang data model. CLI—
Yang Data Model —
|
Behavior Change Introduced in This Release
Note |
The crypto fips-mode isn’t supported on the following Cisco NCS 540 router variants:
|
Restrictions and Limitations on the Cisco NCS 540 Series Router
-
FMQ stats are not supported in N540X-8Z16G-SYS-A/D, and N540X-6Z18G-SYS-A/D variants.
-
Unlabeled BGP PIC EDGE for global prefixes is not supported.
-
The show inventory and the show diagnostic commands do not display the fan serial number.
-
The interface ports 0/0/0/24 to 0/0/0/31 do not support 1G Copper SFPs on N540-24Z8Q2C-SYS, N540-ACC-SYS, and N540X-ACC-SYS variants. Also, these ports do not support Auto-Negotiation with 1GE optical SFPs and they cannot act as 1GE Synchronous Ethernet sources.
-
The interface ports 0/0/0/20 to 0/0/0/27 do not support 1G Copper SFPs on N540X-16Z4G8Q2C-A and N540X-16Z4G8Q2C-D variants. Also, these ports do not support Auto-Negotiation with 1GE optical SFPs and they cannot act as 1GE Synchronous Ethernet sources.
-
Remove the speed settings on the 1G Copper optics when 10M/100M is configured and replaced with 1G SFP optics.
-
The hw-module profile mfib statistics command is not supported.
Caveats
This section describes open and resolved severity 1 and 2 caveats and select severity 3 caveats:
-
The “Open Caveats” sections list open caveats that apply to the current release and may apply to previous releases. A caveat that is open for a prior release and is still unresolved applies to all future releases until it is resolved.
-
The “Resolved Caveats” sections list caveats resolved in a specific release, but open in previous releases.
The bug IDs are sorted alphanumerically.
Note |
The Caveats section includes the bug ID and a short description of the bug. For details on the symptoms, conditions, and workaround for a specific caveat you must use the Bug Search Tool. |
Cisco IOS XR Caveats Release 7.3.1
Caveat ID Number |
Description |
---|---|
CFM UP MEP session not coming up on N540X-8Z16G-SYS-A |
Bug Search Tool
Use the Cisco Bug Search Tool to access open and resolved bugs for a release.
The tool allows you to search for a specific bug ID, or for all bugs specific to a product and a release.
IOS XR 7.3.1 Base Images and Optional Packages
For more information on system setup and software installation process, see System Setup and Software Installation Guide for Cisco NCS 540 Series Routers.
For general and ordering information see:
-
Cisco Network Convergence System 540 Medium Density Routers Data Sheet
-
Cisco Network Convergence System 540 Small Density Router Data Sheet
To install the Cisco NCS 540 Series Routers, see Cisco NCS 540 Router Hardware Installation Guide.
Release 7.3.1 Software
The following tables list the supported base images and optional packages and their corresponding file names.
-
The first table lists the supported software for N540-24Z8Q2C-SYS, N540-ACC-SYS, and N540X-ACC-SYS variants.
-
The second table lists the supported software for N540X-16Z4G8Q2C-A/D, N540-28Z4C-SYS-A/D, N540X-12Z16G-SYS-A/D, and N540-12Z20G-SYS-A/D variants.
-
The third table lists the supported software for N540X-8Z16G-SYS-A/D and N540X-6Z18G-SYS-A/D variants.
Base Image |
Filename |
Description |
IOS XR Base Image |
ncs540-mini-x-7.3.1.iso |
IOS XR mandatory base image. |
USB Boot Package |
Package required to perform USB Boot. Includes the same packages as the base image. |
|
Optional Packages not included in the base image |
||
Package |
Filename |
Description |
IOS XR Manageability |
ncs540-mgbl-1.0.0.0-r731.x86_64.rpm |
Supports Extensible Markup Language (XML) Parser, Telemetry, Netconf, gRPC and HTTP server |
IOS XR MPLS |
ncs540-mpls-1.0.0.0-r731.x86_64.rpm ncs540-mpls-te-rsvp-1.0.0.0-r731.x86_64.rpm |
Supports MPLS and MPLS Traffic Engineering (MPLS-TE) |
IOS XR Security |
ncs540-k9sec-1.0.0.0-r731.x86_64.rpm |
Supports MACsec and 802.1X |
IOS XR ISIS |
ncs540-isis-1.0.0.0-r731.x86_64.rpm |
Supports ISIS |
IOS XR OSPF |
ncs540-ospf-1.0.0.0-r731.x86_64.rpm |
Supports OSPF |
IOS XR Lawful Intercept |
ncs540-li-1.0.0.0-r731.x86_64.rpm |
Supports Lawful Intercept (LI) |
IOS XR Multicast |
ncs540-mcast-1.0.0.0-r731.x86_64.rpm |
Supports Multicast |
IOS XR EIGRP |
ncs540-eigrp-1.0.0.0-r731.x86_64.rpm |
Supports EIGRP |
Base Image |
Filename |
Description |
IOS XR Base Image |
IOS XR base image with mandatory packages. The base ISO image also includes the following optional packages:
These optional packages are also included in NCS540l-iosxr-7.3.1.tar. |
|
USB Boot Package |
Package required to perform USB Boot. Includes the same packages as the base image. |
|
Optional Packages not included in the base image |
||
Package |
Filename |
Description |
IOS XR Telnet (xr-telnet) |
Supports Telnet |
|
IOS XR EIGRP (xr-eigrp) |
Supports EIGRP |
|
IOS XR CDP (xr-cdp) |
Supports CDP |
|
IOS XR k9sec (xr-k9sec) |
Supports 802.1X |
Base Image |
Filename |
Description |
IOS XR Base Image |
IOS XR base image with mandatory packages. The ISO image also includes the following optional packages:
These optional packages are also included in NCS540l-aarch64-iosxr-optional-rpms-7.3.1.tar. |
|
USB Boot Package |
Package required to perform USB Boot. Includes the same packages as the base image. |
|
Optional Packages not included in the base image |
||
Package |
Filename |
Description |
IOS XR Telnet (xr-telnet) |
Supports Telnet |
|
IOS XR EIGRP (xr-eigrp) |
Supports EIGRP |
|
IOS XR CDP (xr-cdp) |
Supports CDP |
|
IOS XR k9sec (xr-k9sec) |
Supports 802.1X |
Determine Software Version
Log in to the router and enter the show version command on the N540-24Z8Q2C-SYS, N540-ACC-SYS, and N540X-ACC-SYS variants:
RP/0/RP0/CPU0:R1_PE1#show version
Cisco IOS XR Software, Version 7.3.1
Copyright (c) 2013-2021 by Cisco Systems, Inc.
Build Information:
Built By : ingunawa
Built On : Thu Feb 25 19:57:12 PST 2021
Built Host : iox-ucs-021
Workspace : /auto/srcarchive17/prod/7.3.1/ncs540/ws
Version : 7.3.1
Location : /opt/cisco/XR/packages/
Label : 7.3.1
cisco NCS-540 () processor
System uptime is 3 days 22 hours 5 minutes
Log in to the router and enter the show version command on the N540X-16Z4G8Q2C-A/D, N540-28Z4C-SYS-A/D, N540X-12Z16G-SYS-A/D, and N540-12Z20G-SYS-A/D variants:
RP/0/RP0/CPU0:R11_PE5_EG#show version
Cisco IOS XR Software, Version 7.3.1 LNT
Copyright (c) 2013-2021 by Cisco Systems, Inc.
Build Information:
Built By : ingunawa
Built On : Fri Feb 26 04:46:33 UTC 2021
Build Host : iox-ucs-022
Workspace : /auto/srcarchive17/prod/7.3.1/ncs540l/ws
Version : 7.3.1
Label : 7.3.1
cisco NCS540L (C3708 @ 1.70GHz)
cisco N540X-16Z4G8Q2C-A (C3708 @ 1.70GHz) processor with 8GB of memory
R11_PE5_EG uptime is 1 day, 16 hours, 37 minutes
Cisco NCS 540 System with 16x10G+4x1GCu+8x25G+2x100G AC Chassis
Log in to the router and enter the show version command on the N540X-8Z16G-SYS-A/D, and N540X-6Z18G-SYS-A/D variants:
RP/0/RP0/CPU0:R15_PE7_GP#show version
Cisco IOS XR Software, Version 7.3.1 LNT
Copyright (c) 2013-2021 by Cisco Systems, Inc.
Build Information:
Built By : ingunawa
Built On : Fri Feb 26 04:31:54 UTC 2021
Build Host : iox-lnx-072
Workspace : /auto/srcarchive17/prod/7.3.1/ncs540l-aarch64/ws
Version : 7.3.1
Label : 7.3.1
cisco NCS540L
cisco N540X-8Z16G-SYS-A processor with 8GB of memory
R15_PE7_GP uptime is 1 day, 20 hours, 20 minutes
Cisco NCS 540 Series Fixed Router 12x1G, 4xCu, 8x1/10G, AC
Determine Firmware Support
Use the show command in EXEC mode to view the hardware components with their current FPD version and status. The status of the hardware must be CURRENT; Running and Programed version must be the same.
Log in to the router and enter the show hw-module fpd command on the Cisco N540-24Z8Q2C-SYS, N540X-ACC-SYS, and N540-ACC-SYS variants:
RP/0/RP0/CPU0:R1_PE1#show hw fpd
Auto-upgrade:Disabled
FPD Versions
=================
Location Card type HWver FPD device ATR Status Running Programd
-----------------------------------------------------------------------------------
0/RP0 N540-24Z8Q2C-M 1.0 MB-MIFPGA CURRENT 0.05 0.05
0/RP0 N540-24Z8Q2C-M 1.0 Bootloader CURRENT 1.13 1.13
0/RP0 N540-24Z8Q2C-M 1.0 CPU-IOFPGA CURRENT 0.07 0.07
0/RP0 N540-24Z8Q2C-M 1.0 MB-IOFPGA CURRENT 0.23 0.23
Log in to the router and enter the show hw-module fpd command on the Cisco N540-28Z4C-SYS-A/D, N540-12Z20G-SYS-A/D, N540X-12Z16G-SYS-A/D and N540X-16Z4G8Q2C-A/D variants:
RP/0/RP0/CPU0:R11_PE5_EG#show hw fpd
Auto-upgrade:Disabled
Attribute codes: B golden, P protect, S secure
FPD Versions
=================
Location Card type HWver FPD device ATR Status Running Programd Reload Loc
-------------------------------------------------------------------------------------------------
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 ADMConfig CURRENT 1.04 1.04 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 IoFpga CURRENT 2.03 2.03 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 IoFpgaGolden B NEED UPGD 1.31 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 Primary-BIOS S CURRENT 1.19 1.19 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 StdbyFpga S CURRENT 0.40 0.40 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 StdbyFpgaGolden BS NEED UPGD 0.37 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 TamFw S CURRENT 4.11 4.11 0/RP0
0/RP0/CPU0 N540X-16Z4G8Q2C-A 1.0 TamFwGolden BS CURRENT 4.11 0/RP0
Log in to the router and enter the show hw-module fpd command on the Cisco N540X-6Z18G-SYS-A/D, and N540X-8Z16G-SYS-A/D variants:
RP/0/RP0/CPU0:R15_PE7_GP#show hw fpd
Auto-upgrade:Disabled
Attribute codes: B golden, P protect, S secure
FPD Versions
=================
Location Card type HWver FPD device ATR Status Running Programd Reload Loc
-------------------------------------------------------------------------------------------------
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 IoFpga CURRENT 0.15 0.15 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 IoFpgaGolden B NEED UPGD 0.00 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 Prim-BootLoader CURRENT 10.15 10.15 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 StdbyFpga S CURRENT 0.33 0.33 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 StdbyFpgaGolden BS NEED UPGD 0.00 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 TamFw S CURRENT 6.05 6.05 0/RP0
0/RP0/CPU0 N540X-8Z16G-SYS-A 0.2 TamFwGolden BS CURRENT 6.05 0/RP0
Other Important Information
Supported Transceiver Modules
For more information on the supported transceiver modules, see Transceiver Module Group (TMG) Compatibility Matrix. In the Begin your Search search box, enter the keyword NCS540 and click Enter.
Upgrading Cisco IOS XR Software
Cisco IOS XR Software is installed and activated from modular packages, allowing specific features or software patches to be installed, upgraded, or downgraded without affecting unrelated processes.
The upgrade document for N540-24Z8Q2C-SYS, N540X-ACC-SYS, and N540-ACC-SYS variants is available along with the software image in NCS540-docs-7.3.1.tar file.
The upgrade document for N540-28Z4C-SYS-A/D, N540-12Z20G-SYS-A/D, N540X-12Z16G-SYS-A/D, and N540X-16Z4G8Q2C-A/D variants is available along with the software image in NCS540l-docs-7.3.1.tar file.
Additional References
Supported MIBs
The Cisco NCS 5500 MIB support list is also applicable to the Cisco NCS 540 Series Routers. For the list of supported MIBs, see the Cisco NCS5500 MIB Support List.