What's New in Hardware for IOS XE 17.15.2
There are no new hardware features introduced for this release.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
There are no new hardware features introduced for this release.
Feature | Description |
---|---|
Chassis |
|
When an interface module (IM) is inserted into an unsupported slot, an IM_NOT_SUPPORTED syslog message is generated. Additionally, new unsupported alarms such as IM_NOT_SUPPORTED, INVALID_COMBINATION, INVALID_MODE, andSPA_MISMATCH are asserted when an IM is inserted into a router slot that is not supported. You can view the alarm status and unsupported slot information using the show facility-alarm status CLI command.This enhancement ensures administrators are promptly alerted to any compatibility issues, enabling them to take corrective action and maintain network stability. |
|
Extraneous alarms along with SNMP traps, can be generated on TDM or Ethernet interfaces even when these interfaces are in an administratively down state. These unnecessary alarms can lead to redundant monitoring and troubleshooting efforts. These alarms are suppressed by default. To mitigate this issue, you can disable this feature or unsuppress these alarms using the following command the router: platform enable-transceiver-sensor-alarm-on-admin-downThis ensures that only relevant alarms are captured and displayed. This helps streamline network management and improves operational efficiency. |
|
The router adheres to and complies with the IP specification guidelines as outlined by the National Centre for Communication Security (NCCS) certification, which is based on the 3rd Generation Partnership Project (3GPP) standards. This compliance ensures that the router meets rigorous security and performance benchmarks, providing users with a reliable and secure networking solution that aligns with industry best practices and regulatory requirements. |
|
Performance Routing |
|
Hardware Resource and Scale Monitoring |
A new command has been introduced for hardware resource and scale monitoring. You can now view the current utilizations and the maximum capacities available in the hardware for various resources. Command: show platform hardware pp active resource-usage monitor |
There are no new hardware features introduced for this release.
Feature | Description |
---|---|
Alarms |
|
New APS Alarms and Conditions |
New APS alarms and conditions have been introduced to enhance network monitoring and management. These alarms are raised or cleared during APS manual, forced, and lockout switch actions, providing real-time alerts on network changes. This advanced alerting mechanism ensures that network operators are immediately informed of any alterations, enabling them to swiftly respond to and manage network conditions, thereby maintaining optimal performance and reliability. |
SONET Alarms for APS |
In APS scenarios, the existing SONET alarms follow the GR-253 standard for alarm soaking. This standardization helps filter out transient conditions by defining specific assertion and clearing times for alarms. |
SD-BER and SF -BER Alarms for T1/E1 and T3/E3 services |
Signal Failure-Bit Error Rate (SF-BER) and Signal Degrade-BER (SD-BER) alarms are declared when there is a signal failure or signal degradation that happens in the traffic. These alarms may be raised when the error rate of a given entity exceeds the user configured BER threshold value. This helps administrator to take corrective actions. |
CEM |
|
DDS DS0 Remote Latching Loopback |
DS0 loopback is used for testing and troubleshooting the T1 or E1, T3 or E3, and OCx channel over PSN. You can configure DS0 loopback on these controllers for remote devices. |
Protected TAP on FRR Protected Core |
You can now monitor CEM traffic through protected TAP and split TAP sessions on the protected Fast Reroute (FRR) core interface. During events such as link failure or connectivity issues, the automatic switching happens from active to standby path. Thus, you can monitor and debug the issue without affecting the traffic on these FRR protected core interfaces. |
Protection Switching Count for Protected SONET Interface |
In SONET networks with redundancy, Automatic Protection Switching (APS) seamlessly transitions traffic between working and
standby protection links, typically due to circuit failures or other disruptions.
Each switching event is tracked using the Protection Switching Count (PSC) parameter. This parameter allows network operators to monitor and analyze the frequency of these switches in real-time. By examining the PSC count, users can diagnose the network to identify the root causes of frequent switching events and implement necessary corrective actions. This advanced capability significantly enhances network reliability and performance, offering users a robust and efficient solution for maintaining optimal service quality. |
Clear Counters command |
|
GR-820-CORE specific Performance Monitoring |
The show controller tabular enables you to view the performance monitoring details in tabular form as per GR-820-Core standards. |
Chassis |
|
Alarms to Monitor Standby RSP Upgrade During IOS Version Mismatch |
During an upgrade, for a high availability setup, if the IOS version of the active Route Switch Processor (RSP) does not match the IOS version of the standby RSP, a Syslog message, IPC: IOS versions do not match is printed on the console. The upgrade process is aborted and there are no alarms to notify the IOS version mismatch or the progress of the standby upgrade. From Cisco IOS XE 17.15.1, show commands have been enhanced to display Syslog messages for any active and standby RSP version mismatch, and the IOS XE image from the active RSP is copied to the standby RSP. You can execute the following show commands on the active RSP to monitor the progress of the upgrade:
The NCS 4206/16-RSP3 module supports this feature. See the High Availability Configuration Guide for the upgrade process. |
Alarm for Incompatible SFP |
When an incompatible SFP is used in Ethernet interface modules on the RSP3 node, a Transceiver NOT_COMPATIBLE alarm is raised. |
High Availability |
|
Monitoring alarms for standby RSP management interface |
In addition to Active RSP, alarms are now generated for the management interface of the Stand-by RSP. You can monitor these alarms in Cisco's Evolved Programmable Network Manager (EPNM) and take the appropriate action to fix the problem. |
In-Service Software Upgrade (ISSU) Enhancements |
During the ISSU upgrade, the system verifies if the new software image is already available in the active and standby boot flash before the binary image expansion. This helps to reduce the ISSU upgrade time on multiple devices. Syslog messages are generated during this ISSU upgrade for each stage. If alarms are generated, they are captured at each stage and sent to SNMP. You can monitor the ISSU process using the show facility-alarm status CLI command. These enhancements are supported only on RSP3 modules. |
QoS |
|
Displaying ASIC QoS Policer Values for Egress Traffic |
In addition to Ingress traffic, you can now view the programmed hardware (ASIC) values of the QoS features configured for Egress traffic. Use the following command to enable ASIC values: platform qos-egress-hw-param enableThe programmed hardware (ASIC) value may differ from the configured software value due to hardware limitations. Now, you can compare the actual QoS policer value programmed in the hardware with the value you configured in the software for egress traffic. |
Timing and Synchronization |
|
Improved Network Synchronization Redundancy with an External BITS Clock |
The T4 PLL in the route processor can now send a SyncE signal through the BITS port to an external clocking device. If equipped with a high-quality oscillator, the external clocking device can clean up the timing signal to reduce the jitter. When returned to the T0 PLL through the same BITS port, the cleaned-up signal can be sent to other nodes to propagate network synchronization. This functionality is useful when an external BITS clock cannot receive timing inputs from a Primary Reference Source (PRS). The system can fall back on using the SyncE signal received from a peer router to provide redundancy to the network synchronization operation. Command introduced: network-clock timing-source bits Compliance: BITS implementation and SyncE recommendations from GR-436 and G.8264 standards Supported Interface Module: RSP3 |
Hardware | Description |
---|---|
Cisco 10GBASE SFP+ modules Optics |
This release launches the following new optics on selective hardware within the product portfolio. For details refer to the Transceiver Module Group (TMG) Compatibility Matrix. SFP-10G-BXD-I, SFP-10G-BXU-I, SFP-10G-BX40D-I and SFP-10G-BX40U-I support is extended to the following interface module:
|
Feature | Description |
---|---|
Alarms |
|
|
|
Signal Failure-Bit Error Rate (SF-BER) and Signal Degrade-BER (SD-BER) alarms are declared when there is a signal failure or signal degradation that happens in the traffic. These alarms may be raised when the error rate of a given entity exceeds the user-configured BER threshold value. This helps the administrator to take corrective actions. |
|
CEM |
|
DS0 loopback is used for testing and troubleshooting the T1 or E1, T3 or E3, and OCx channel over PSN. You can configure DS0 loopback on these controllers for remote devices. |
|
In SONET with redundancy, an Automatic protection switching (APS) occurs between working and standby protection links due to reasons like a circuit failure. Whenever the switching happens, the switching count is tracked using a Protection Switching Count (PSC) parameter. Depending on the PSC count, you can debug the network to identify the reason for extensive switching and work on the corrective actions. |
|
TCAM and NFT Commands |
|
TCAM and NFT Commands |
New commands have been introduced for the Ternary Content-Addressable Memory (TCAM) and NFT. TCAM You can now view the Ternary Content-Addressable Memory (TCAM) utilization for each control plane TCAM entry. Command: show platform hardware pp active tcam utilization control-plane-sessions NFT
|