New Hardware and Software Features for Cisco 1100 Series ISRs Release 16.6.x
This section describes the new and modified features that are supported on the Cisco 1100 Series ISRs.
Overview of Cisco 1100 Series Integrated Services Routers
The Cisco 1100 Series Integrated Services Routers (ISR) are powerful fixed branch routers based on the Cisco IOS XE operating system. They are multi-core routers with separate core for data plane and control plane. There are two primary models with 8 LAN ports and 4 LAN ports. Features such as Smart Licensing, VDSL2 and ADSL2/2+, 802.11ac with Wave 2, 4G LTE-Advanced and 3G/4G LTE and LTEA Omnidirectional Dipole Antenna (LTE-ANTM-SMA-D) are supported on Cisco 1100 Series ISRs.
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
The following table lists the router models that belong to the Cisco 1100 Series ISRs.
Cisco 1100 Series ISRs |
|
---|---|
C1111-8P |
C1111-4P |
C1111-8PLTEEA |
C1111-4PLTEEA |
C1111-8PLTELA |
C1111-4PLTELA |
C1111-8PWE |
C1111-4PWE |
C1111-8PWB |
C1111-4PWB |
C1111-8PWA |
C1111-4PWA |
C1111-8PWZ |
C1111-4PWZ |
C1111-8PWQ |
C1111-4PWN |
C1111-8PWN |
C1111-4PWQ |
C1111-8PWH |
C1111-4PWH |
C1111-8PWR |
C1111-4PWR |
C1111-8PWF |
C1111-4PWF |
C1111-8PLTEEAWE |
C1111-4PWD |
C1111-8PLTEEAWB |
|
C1111-8PLTEEAWA |
|
C1111-8PLTEEAWR |
|
C1111-8PLTELAWZ |
|
C1111-8PLTELAWN |
|
C1111-8PLTELAWQ |
|
C1111-8PLTELAWH |
|
C1111-8PLTELAWF |
|
C1111-8PLTELAWD |
C1101-4P |
C1101-4PLTEP |
C1101-4PLTEPWX |
C1116-4P |
C1116-4PLTEEA |
C1116-4PWE |
C1116-4PLTEEAWE |
C1117-4P |
C1117-4PLTEEA |
C1117-4PLTELA |
C1117-4PWE |
C1117-4PWA |
C1117-4PWZ |
C1117-4PM |
C1117-4PMLTEEA |
C1117-4PMWE |
C1117-4PLTEEAWE |
C1117-4PLTEEAWA |
C1117-4PLTELAWZ |
C1117-4PMLTEEAWE |
System Requirements
The following are the minimum system requirements:
-
Memory: 4GB DDR4
-
Flash Storage: 4GB
Determining the Software Version
You can use the following commands to verify your software version:
-
For a consolidated package, use the show version command
-
For individual sub-packages, use the show version installed command
Upgrading the ROMMON Version on the Cisco 1100 Series ISR
For information about ROMMON and upgrading procedure, see the "ROMMON Overview and Basic Procedures” section in the Hardware Installation Guide for the Cisco 1100 Series Integrated Services Routers.
Feature Navigator
You can use Cisco Feature Navigator to find information about feature, platform, and software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on cisco.com is not required.
New Hardware Features in Cisco 1100 Series ISR Release 16.6.2
The following are the new hardware features in Cisco 1100 Series Integrated Service Routers in the 16.6.2 release:
-
Cisco 1100 Series Integrated Services Routers–The Cisco 1100 Series ISRs are fixed branched routers based on the Cisco IOS XE Everest 16.6.2 operating system, multi-core data plane. The two types of platforms of Cisco 1100 Series ISRs are High-End and Midrange service and enterprise platforms. The Cisco 1100 Series ISR Software Configuration Guide explains supported features such as Smart Licensing, VDSL2 and ADSL2/2+, WLAN, 4G LTE-Advanced, and so on.
Cisco® 1100 Series Integrated Services Routers (ISRs) with Cisco IOS® XE Software combine Internet access, comprehensive security, and wireless services (LTE Advanced 3.0 Wireless WAN and Wireless LAN), are single high-performance devices that are easy to deploy and manage. They are well suited for deployment as customer premises equipment (CPE) in enterprise branch offices, and in service provider managed-service environments.
New Software Features in Cisco 1000 Series ISR Release Cisco IOS XE Everest 16.6.1
-
AVC and NBAR2 Support
Cisco 1100 Series ISR devices support Cisco Application Visibility and Control (AVC) and Network-Based Application Recognition (NBAR2), beginning with Cisco IOS XE Everest 16.6.1. AVC and NBAR2 analyze network traffic and identify the applications associated with the traffic. This enables application-based network policies and application visibility.
For more information, see:
https://www.cisco.com/c/en/us/products/routers/avc-control.html
New Hardware Features in Cisco 1100 Series ISR Release 16.6.2
The following are the new hardware features in Cisco 1100 Series Integrated Service Routers in the 16.6.2 release:
-
Cisco 1100 Series Integrated Services Routers–The Cisco 1100 Series ISRs are fixed branched routers based on the Cisco IOS XE Everest 16.6.2 operating system, multi-core data plane. The two types of platforms of Cisco 1100 Series ISRs are High-End and Midrange service and enterprise platforms. The Cisco 1100 Series ISR Software Configuration Guide explains supported features such as Smart Licensing, VDSL2 and ADSL2/2+, WLAN, 4G LTE-Advanced, and so on.
Cisco® 1100 Series Integrated Services Routers (ISRs) with Cisco IOS® XE Software combine Internet access, comprehensive security, and wireless services (LTE Advanced 3.0 Wireless WAN and Wireless LAN), are single high-performance devices that are easy to deploy and manage. They are well suited for deployment as customer premises equipment (CPE) in enterprise branch offices, and in service provider managed-service environments.
New Software Features in Cisco 1100 Series ISR Release 16.6.2
The following features are supported by the Cisco 1100 Series Integrated Services Routers for Cisco IOS XE Everest 16.6.2:
-
Encrypted Traffic Analytics
For detailed information, see the following Cisco documents:
-
Smart Licensing - Smart Licensing Client feature is a standardized licensing platform that simplifies the Cisco software experience and helps you to understand how Cisco software is used across your network. Smart Licensing is the next generation licensing platform for all Cisco software products.
For a more detailed overview on Cisco Licensing, go to https://cisco.com/go/licensingguide.
-
VDSL2 and ADSL 2/2+ - VDSL2 and ADSL2/2+ Cisco® C1100 Series Integrated Services Router provide highly reliable WAN connections for remote sites. These interfaces offer cost-effective virtualized WAN connections in both point-to-point and point-to-multipoint designs.
-
Wireless Devices - Wireless devices (commonly configured as access points ) provide a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals.
-
Cisco 4G LTE Advanced - Cisco 4G LTE-Advanced support the following major features: Global Positioning System (GPS) and National Marine Electronics Association (NMEA) streaming, Short Message Service (SMS), 3G/4G Simple Network Management Protocol (SNMP) MIB, SIM lock and unlock capabilities, Dual SIM, Auto SIM, NeMo, Public Land Mobile Network (PLMN) selection, IPv6, Multiple PDN, and LTE Link Recovery.
-
Process Health Monitoring - Processes should provide monitoring and notification of their status/health to ensure correct operation. When a process fails, a syslog error message is displayed and either the process is restarted or the router is rebooted. A syslog error message is displayed when a monitor detects that a process is stuck or has crashed. If the process can be restarted, it is restarted; else, the router is restarted.
-
Environmental Monitoring - The router provides a robust environment-monitoring system with several sensors that monitor the system temperatures. The following are some of the key functions of the environmental monitoring system: Monitoring temperature of CPUs, Motherboard, and Wifi, Recording abnormal events and generating notifications, Monitoring Simple Network Management Protocol (SNMP) traps, Generating and collecting Onboard Failure Logging (OBFL) data, Sending call home event notifications, Logging system error messages, and Displaying present settings and status.
-
SFP Auto-Failover - When the media-type is not configured, the Auto-Detect feature is enabled by default. The Auto-Detect feature automatically detects the media that is connected and links up. If both the media are connected, whichever media comes up first is linked.
-
Cellular IPv6 Address - IPv6 addresses are represented as a series of 16-bit hexadecimal fields separated by colons (:) in the format: x:x:x:x:x:x:x:x. Following are two examples of IPv6 addresses: 2001:CDBA:0000:0000:0000:0000:3257:9652 and 2001:CDBA::3257:9652 (zeros can be omitted).
Entering the Configuration Commands Manually
To enter the Cisco IOS commands manually, complete the following steps:
Before you begin
If you do not want to use the factory default configuration because the router already has a configuration, or for any other reason, you can use the procedure in this section to add each required command to the configuration.
Procedure
Step 1 |
Log on to the router through the Console port or through an Ethernet port. |
Step 2 |
If you use the Console port, and no running configuration is present in the router, the Setup command Facility starts automatically, and displays the following text:
Enter no so that you can enter Cisco IOS CLI commands directly. If the Setup Command Facility does not start automatically, a running configuration is present, and you should go to the next step. |
Step 3 |
When the router displays the user EXEC mode prompt, enter the enable command, and the enable password, if one is configured, as shown in the following example:
|
Step 4 |
Enter config mode by entering the configure terminal command, as shown in the following example.
|
Step 5 |
Using the command syntax shown, create a user account with privilege level 15. |
Step 6 |
If no router interface is configured with an IP address, configure one so that you can access the router over the network. The following example shows the interface Fast Ethernet 0 configured.
|
Step 7 |
Configure the router as an http server for nonsecure communication, or as an https server for secure communication. To configure the router as an http server, enter the ip http server command shown in the example:
|
Step 8 |
Configure the router for local authentication, by entering the ip http authentication local command, as shown in the example:
|
Step 9 |
Configure the vty lines for privilege level 15. For nonsecure access, enter the transport input telnet command. For secure access, enter the transport input telnet ssh command. An example of these commands follows:
|
Open and Resolved Caveats in Cisco IOS XE Everest 16.6.x
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
This section contains the following topics:
Using the Cisco Bug Search Tool
For more information about how to use the Cisco Bug Search Tool , including how to set email alerts for bugs and to save bugs and searches, see Bug Search Tool Help & FAQ.
Before You Begin
Note |
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool . If you do not have one, you can register for an account. |
SUMMARY STEPS
- In your browser, navigate to the Cisco Bug Search Tool .
- If you are redirected to a Log In page, enter your registered Cisco.com username and password and then, click Log In.
- To search for a specific bug, enter the bug ID in the Search For field and press Enter.
- To search for bugs related to a specific software release, do the following:
- To see more content about a specific bug, you can do the following:
- To restrict the results of a search, choose from one or more of the following filters:
DETAILED STEPS
Step 1 |
In your browser, navigate to the Cisco Bug Search Tool . |
||||||||||||
Step 2 |
If you are redirected to a Log In page, enter your registered Cisco.com username and password and then, click Log In. |
||||||||||||
Step 3 |
To search for a specific bug, enter the bug ID in the Search For field and press Enter. |
||||||||||||
Step 4 |
To search for bugs related to a specific software release, do the following: |
||||||||||||
Step 5 |
To see more content about a specific bug, you can do the following:
|
||||||||||||
Step 6 |
To restrict the results of a search, choose from one or more of the following filters:
Your search results update when you choose a filter. |
Open Caveats in Cisco IOS XE Everest 16.6.9
All open bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
C1111 HSRP preempt worked even though HSRP's preempt is not configured |
Resolved Caveats in Cisco IOS XE Everest 16.6.9
All resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
Traffic passed with port unauthorized |
|
ISR G3 router crashes when rtp-nte DTMF packet arrives at MTP + BDI |
|
Duplicate entries seen in MAC filter table. |
Resolved Caveats in Cisco IOS XE Everest 16.6.8
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
path-id discovery failure with "CENT throttle check fails, throttle type:0" |
|
OBS: ping stop working on replacing MIP100 ->>> SIP40 >>>>>>MIP100 |
|
cpp_bqs_srt_yoda_csr_tree_seid_initialize:1744 is not in "placed" state |
|
C1111-4P does not restart authentication for "clear authen session" if "authen open" the port |
|
ESP reload due to cpp_cp_svr exception at cpp_bqs_exponent_cnt_validate |
|
Router crashes with ZBF HA sync. |
|
Passive FTP will fail when going over NAT and either client or server are off a SM-X-ES3 |
|
Unrecoverable Error with PVDM in 0/4 and Thule+dreamliner in 1/0 on ISR4300 |
|
Punt fragment crash when receive EoGRE packets which have many fragments |
|
"sh macsec statistics int <>" and "sh macsec status interface <>" does not show output |
|
Prince: Keepalive pkts dropped when serial link congested with data traffic |
|
CFT crashed frequently |
|
IOS-XE memory leak seen in 16.3.7 in IOSd due to update_sn_ao_state not deleting TDL bucket. |
|
EVPN RMAC stale routes seen |
|
Connect message is never forwarded to the calling side |
Open Caveats in Cisco IOS XE Everest 16.6.8
All resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
NIM interfaces go into shutdown after router bootup. |
Open Caveats in Cisco IOS XE Everest 16.6.7
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
Polaris 16.3.1 : Machine and bus error failures in ESP20 |
|
IOSd crashed when dialer disconnect the ISDN call |
|
NDSSO vrf ha table to be populated correctly |
|
[1661]- Switch number is missing in stack merged logs. |
|
ESP Crash with FP Switchover |
|
NIM-SSD: Inventory of disk0 and disk1 are interchanged on Polaris 16.x |
|
CTS PAC download fails with VRF config on non-managenent interface |
|
Byte counters for physical interface and subinterface don't match |
|
standby rp crash on removing member link from port-channel |
|
Memory leaks at __be_PKI_keypair_name_get |
|
netconf/yang or telemetry retrieval of /trustsec-state/cts-rolebased-policies breaks |
|
Ping failing due to missing address resolution entry on the XTR |
|
ISIS: system crashed when we configure ISIS on the interface. |
|
CME SIP: BE4000 Smart Licensing - Extension Assigner temp registration uses endpoint license |
|
ISR1100 router reloaded at posix_twheel_process_timers_inline |
|
Crash when running show crypto map |
|
Device-tracking tracking 0.0.0.0 mask ignored after Legacy IPDT to SISF conversion |
|
Error messages seen when configuring "logging persistent protected" on ASR1K routers |
|
Inband to OOB DTMF Fails to Be Passed On CUBE If Media Inactive Comes During Digit Processing |
|
Need to check qfp ucode crash with RTCP traffic - chunk memory corruption in RTCP path |
|
C1111-4P doesn't restart authentication for "clear authen session" if "authen open" the port |
|
ESP reload due to cpp_cp_svr exception at cpp_bqs_exponent_cnt_validate |
|
HSRPv2 crash whilst retrieving group from received packet |
|
TLS connections in WebEx between CUBE and iCP/CUSP breaks intermittently |
|
Crash due to watchdog after adding a prefix-list/ Route-map entry to existing route map. |
|
mGRE L3VPN broken after reload |
|
Router crashes with ZBF HA sync. |
|
FlexVPN with password encryption -- after MasterKey change password in profile is not working |
|
NHRP process crash on using same tunnel address on multiple spokes |
|
"DHCPD Receive" process crash |
|
LISP Map-cache not updated correctly after wired Host-mobility |
|
Router Crashes while Parsing and Printing Voice Packet IEs |
|
qfp ucode crash with media monitor |
|
Router may crash due to segmentation fault after running EEM script |
Resolved Caveats in Cisco IOS XE Everest 16.6.7
All resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
AAA always reports server down with non-management VRF also |
|
Amur failing over w/o 'fail next-method' or 'no-response next method' |
|
"show interface port-channel" falsely reports output drops when there are no actual output drops |
|
evc not work under vlan on TSN platform |
|
Crash on OPF_CSR32_OPF_LOGIC_ERR_LEAF_INT__INT_START_OF_BURST_MARKER_ERR |
|
FNF monitor download to DP failed after changing netflow record |
|
Change the punt cause of packets whose destination is virtual IP from SUBNET_BCAST to FOR_US |
|
BFD flaps everytime with dynamic tunnel creation in DMVPN |
|
Crash when IOS is adapting shaping with Adaptive QoS over DMVPN configured |
|
Memory leak VOIP *MallocLite* |
|
High CPU due to Alignment Corrections - SMEF & IWAN |
|
memory leak @ CCSIP_SPI_CONTR |
|
Partial Power Failure in Stack Causes Interfaces to Become "shutdown" |
|
Called-Station-Id attribute not included in Radius Access-Request |
|
Rekey Timer are same for both the Server and Client |
|
SSS Manager Traceback observer when test MLPPP |
|
Driver code improvement for debug-ability of XAUI link issues |
|
Crash after CPUHOG in ISDN L2D SRQ Process |
|
Addition/Edits to numbered OG ACL using "access-list <>" command does not re-expand the ACL. |
|
Software crash due to memory corruption after packet trace was enabled. |
|
ISR not re-calculating the hash value correctly after payload change |
|
Router crashes when the calls doesn't establish after making 2 calls when we set "max-conn 2" |
|
SR: CFLOW input intf index is 0xffffffff for Service-engine DSP module interface |
|
DHCP Server sends Renew ACKs to Clients with 00:00:00:00:00:00 MAC in L2 frame |
|
pending objects seen which fp reload with OGACL config |
|
Device crashing if we unconfigure the NTP on the device |
|
High Memory utilization due to Wireless Manager IOSD process |
|
IOS-XE routers cannot boot due to a bootflash problem |
|
Subscribers cannot re-login due to CoA time-out (lite-sessions in routed mode) |
|
PKI "revocation check crl none" does not fallback if CRL not reachable |
|
DataPlane (DP) crash observed in MMOH call flow |
|
Router crash while executing show commands using '|' (pipe) to filter the output. |
|
TCP 3WAY handshake fail for redirected packet using PBHK |
|
Memory overlay crash when using include-cui |
|
PnP Agent should detect image upgrade scenario and configure dialer to bring up cellular interface |
|
SCCP Application does not clear failed sockets leading to leak and socket pool exhaustion |
|
Packet drop occurs after acl permit configurations |
|
Call is not getting connected in Forking Re-INVITE scenario |
|
ASR1001-X crashed upon receiving Radius Access-Accept message |
|
Memory leak at hman process |
|
WSMA crash formatting show command output |
|
Stuck CPP Thread while processing H323 packet |
|
qfp ucode crashed with sRTP traffic - chunk memory corruption |
|
Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability |
|
After RSP switchover label imposition was not programmed in Software on APS standby router |
|
NetFlow issue 3850 switch not sending TCP flags |
|
CTS PACS not downloading to the devices |
|
FXS - no busy tone is generated on remote-onhook condition with call pickup scenario |
|
ASR1k crashes by handling DHCP packet |
|
IPSec-Session count in "show crypto eli" reaches max causing VPN failure |
|
Missing Calling-Station-ID in Accounting Ticket for Web-Tal locations |
|
When sending account-logon ISG do not reply with ACK nor NACK. |
|
[SDA] [PI changes] No audio during first few seconds of voice call between 2 Fabric Edge |
|
ASR1001-HX: Excessive pause frames (IEEE802.3x compliant) affect traffic on other interfaces |
|
IOS-XE ACL port information preserved after encapsulation |
|
Crash when polling IPForwarding MIB |
|
Wrong label programming leading to traffic drop |
|
SDP attribute list corruption causes voice gateway crash |
|
Traffic stops flowing on Xconnect tunnel when upgraded to 16.9.2 |
|
Add ERROR message over IOS console when HSPRDA TCAM region gets full |
|
Hierarchical QoS stops working on GRE tunnel if dest route flaps between 2nd tunnel and physical int |
|
Router crash after adding macsec reply-protection command on an interface |
|
SRTP ROC Stress: CPP crash with 6000+ concurrent calls - g729 |
|
When FQDN used for APN, IOS DNS resolves FQDN to IP, but GTP stays in DNS pending and IP 0.0.0.0 |
|
ISR4K: Router crash due to twice memory release |
|
Tail drops on IPSLA sender when using scaled udp-jitter probes |
|
Router Running IOS-XE 16 Crashes when Stopping EPC with ACL |
|
CHUNKBADROOTCHUNKPTR: Bad root chunk pointer in chunk header post SSO - ASR1K |
|
Crash at the moment of deleting a DVTI |
|
CUBE HA - Global bind is removed during interface flap |
|
MGCP GW doesn't reset SSRC/ROC on receiving MDCX with new IP/port/SDP parameter for SRTP call. |
|
On-Prem DMVPN fails to establish a dynamic tunnel between Spoke nodes. |
|
[SDA] 1st ARP getting dropped due to stale SISF IP-MAC binding |
|
Crashes with GRE tunnels configured with QOS over Multilink Frame-relay interfaces |
|
ISR44xx NO_PUNT_KEEPALIVE kernel crash due to CP drivers stuck punt and IPC rings |
|
QoS counter didn't generate at ASR1001-X |
|
ISR4K CME no way audio on calls across E1/PRI, reboot resolves for sometime |
|
CSR1000v loses ssh/telnet connectivity on AWS and is unable to ping Elastic IP |
|
ISR4K crashes after voice register reset command is applied |
|
Counters of interfaces are reporting inexistent peaks |
|
ASR1001-x crash while configuring policy-map |
|
Crash due to too many DSPs |
|
CPP Stuck thread when processing IPv6 traffic |
|
Corrupt free block of memory with high availability config for Session Initiation Protocol |
|
Router crashes after snmpget to OID related to NHRP |
|
isdn cause-location command support for switch-type primary-ntt |
|
crash at sisf_show_counters after entering show device-tracking counters command |
|
ip dns primary command does not get removed |
|
QoS fails to apply to tunnel2 when underlying tunnel1 reachability change |
|
ASR1k: Crypto Engine remains in stuck state post dataplane crash |
|
name-ip_address mapping is bypassed when the ip domain command is configured on Cisco C1111X Router |
|
Router ucode crash with NAT with interface flap |
|
no login on-success log CLI does not persist across device reloads |
|
Crash after Media monitor look up. |
|
ISR4k BRI ping failure with WIC-1B-S/T-V3 with ISDN 128 leased line |
|
CUBE not passing History-Info header in 181 Call is being forwarded |
|
Device crashed @ radius_io_stats_timer_handler due to dynamic-author |
|
ASR1002-X High Platform CPU for process mcpcc-lc-ms |
|
ASR1K-X WATCHDOG crashes while printing to console |
|
VRF aware reverse DNS lookup not working |
|
ASR1006-X: cpp_cp_svr: QFP0.0 CPP Driver LOCKDOWN encountered due to previous fatal error |
|
NAT SIP Contact Header changed to port 512 |
|
DPDK: Performing Shut/No-Shut with traffic running can cause packets to silently drop on TX |
|
NIM-2FXS/4FXOP crashing due to DSP failed to reply properly |
|
Egress shaping on port-channel sub-intf tail dropping traffic long before rate |
|
ASR 1k sub-interface counters wrong. |
|
BRI leased line can't come up automatically after remove/insert one side's cable |
|
Voice gateway crash due to segmentation fault in process CCSIP_DNS |
|
IOSXE: IOMD / TDL leak seen with tdl_response_xcode_stat_side_t |
|
AppNav: Optimization failed with Asymmetrical traffic, VRF, FNF and NBAR |
|
ARM - Marvell 7040 SoC Hardware Erratum - Kernel Driver Fix |
|
Router is on Bootloop after QoS configuration. |
|
ISR4k crash during packet inspection due to stuck thread |
|
asr1k BDI not working properly for packet fragmentation - very small fragments are getting dropped |
|
Supervisor reloaded due to cpp_cp_svr process crashing |
|
Class-attributes duplicated after EAP reauthen. in ISG radius proxy scenario |
|
Recording failures with XMF media forking and SIP preservation timer |
|
cable-detect command not reflecting proper status in Analog ports on IOS-XE platforms |
|
cpp_cp_svr crash in cpp_bqs_rm_yoda_select_sch_exponent |
|
Supervisor reload due to cpp_cp_svr crash. |
|
ASR1K BGP PIC Repair path broke after link flap |
|
Crash after exiting RADIUS server configuration mode. |
|
after reload dial-peers with ports that have the 'signal did' command show operational state none |
|
More connections are getting passthrough with reason SNG_OVERLOAD |
|
connectivity is broken on ingress-replication L2DP/VXLAN |
|
IWAN router crash after upgrading to 16.3.8 |
|
VG450: SCCP crashing router while shutdown the process |
|
ASR1000-RP3: Punt Keepalive Failure (Punt LINK DOWN) or RP FREEZE |
Open Caveats in Cisco IOS XE Everest 16.6.6
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
Modification to ZBFW access-lists do not reflect in TCAM |
|
ISR not re-calculating the hash value correctly after payload change |
|
Crash noticed when routes are getting imported twice(from vpnv4 to vrf to evpn) with route churn |
|
IOS-XE Router may crash when attempting to Fragment Corrupted IPv4 Packet |
|
IPSec-Session count in "show crypto eli" reaches max causing VPN failure |
|
IOS-XE ACL port information preserved after encapsulation |
|
After Configuring a New VRF Routes Are Not Imported From WAN Into l2vpn EVPN For Unrelated VRF |
|
TSN: Umbrella not working when umbrella in and out are configured on SVI |
Resolved Caveats in Cisco IOS XE Everest 16.6.6
All resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
BGP event crash@bgp_afpriv_imp_is_imported_path |
|
Virtual-access interface MTU wrongly set when using ipsec ipv4 |
|
NAT MIB not populated when using traditional NAT |
|
Router shows "Flash disk quota exceeded" during the reload, but it still has 60% of free memory left |
|
QoS stats process crash |
|
IKE Fragmentation payload incorrectly marked as critical |
|
ICMP unrechables are not sent to the client on C1117 platform |
|
Standby switch crashes when adding a host name to an object-group |
|
"clear crypto sa vrf MyVrf" triggers crash after updating pre-shared-keys |
|
ACL dropping packets after updating it - %CPPEXMEM-3-NOMEM |
|
[EIGRP] a summary route is updated by an external route |
|
MPLSoVPN: Change behavior of default route in NHRP. Must insert 0.0.0.0/0 instead of /32 |
|
IPSec background crash while sending SNMP trap |
|
Device running IOS-XE 16 Polaris Sees Crash When Performing NAT ALG on FTP Packet |
|
Cube crash with %SDP-3-SDP_PTR_ERROR |
|
NHRP process is crashing |
|
PBR doesn't work for dialer intf when it doesn't have fixed ip address |
|
CUBE doesn't forward INVITE with "midcal-signalling passthru media-change" during a video escalation |
|
Crash while processing ISIS updates when DiffServ-TE is enabled |
|
Modified EIGRP timers on Virtual-Template put all associated Vi interfaces into passive mode |
|
class-attributes support in ISG radius proxy scenario |
|
Router reloads on 'show track' command when there is track object for deleted serial sub-interface. |
|
Split DNS in case of UDP query to WAN interface IP via LAN interface |
|
zbfw with ip sla icmp echos builds tcp syn session |
|
Crash due to chunk corruption in ISIS code |
|
PKI incorrect fingerprint calulation during CA authentication |
|
DHCP discover packets were being dropped at firewall since UDP source port as 0. |
Open Caveats in Cisco IOS XE Everest 16.6.5
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
CSCvg03519 | 16.6.1A: TSN router crashed with pppoe session after changing encapsulation on peer |
TSN: GLC-GE-100FX V02, the link can not up when configure "media-type sfp". |
Caveat ID Number |
Description |
---|---|
CSCvm06270 | ICMP unrechables are not sent to the client on C1117 platform. |
Resolved Caveats in Cisco IOS XE Everest 16.6.5
All resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
C1100 router stops forwarding traffic when doing bulk configurations on device via telnet |
|
ISR1111-4P Ping issue between LAN inetrface and directly connected switch. |
|
Recommit of CSCvj74614 in throttle v166 ISR1111-4P Ping issue between LAN inetrface. |
Open and Resolved Caveats for Cisco IOS XE Everest 16.6.1
All open and resolved bugs for this release are available in the Cisco Bug Search Tool.
Caveat ID Number |
Description |
---|---|
CSCvg03519 | 16.6.1A: TSN router crashed with pppoe session after changing encapsulation on peer |
TSN: GLC-GE-100FX V02, the link can not up when configure "media-type sfp". |
Caveat ID Number |
Description |
---|---|
CSCve31171 | 16.6.1A: TSN router crashed with pppoe session after changing encapsulation on peer |
GETVPN suite-B does not work on TSN routers |
Related Documentation
Cisco IOS Software Documentation
The Cisco IOS XE Everest 16.x software documentation set consists of Cisco IOS XE Everest 16.x configuration guides and Cisco IOS command references. The configuration guides are consolidated platform-independent configuration guides organized and presented by technology. There is one set of configuration guides and command references for the Cisco IOS XE Everest 16.x release train. These Cisco IOS command references support all Cisco platforms that are running any Cisco IOS XE Everest 16.x software image.
See http://www.cisco.com/en/US/products/ps11174/tsd_products_support_series_home.html
Information in the configuration guides often includes related content that is shared across software releases and platforms.
Additionally, you can use Cisco Feature Navigator to find information about feature, platform, and software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on cisco.com is not required.
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.