Release Notes for Cisco IOS Release 15.2(5)E2
New Features in Cisco IOS Release 15.2(5)E2
Finding the Software Version and Feature Set
Upgrading a Switch by Using the CLI
Upgrading IOS and FPGA on the Ethernet Switch Module (ESM)
Enabling Logging Alarms for Syslog Messages
Resilient Ethernet Protocol (REP)
Obtain Documentation and Submit a Service Request
Last Updated: February 27, 2018
First Published: April 28 , 2017
Cisco IOS Release 15.2(5)E2 runs on these platforms:
■Cisco 2500 Series Connected Grid Switches (CGS 2520)
■Cisco Connected Grid Ethernet Switch Module (CGR 2010 ESM)
■Cisco Embedded Service 2020 Series Switches (ESS 2020)
■Cisco Industrial Ethernet 2000 Series Switches (IE 2000)
■Cisco Industrial Ethernet 2000U Series Switches (IE 2000U)
■Cisco Industrial Ethernet 3000 Series Switches (IE 3000)
■Cisco Industrial Ethernet 3010 Series Switches (IE 3010)
■Cisco Industrial Ethernet 4000 Series Switches (IE 4000)
■Cisco Industrial Ethernet 4010 Series Switches (IE 4010)
■Cisco Industrial Ethernet 5000 Series Switches (IE 5000)
These release notes include important information about Cisco IOS Release 15.2(5)E2 and any limitations, restrictions, and caveats that apply to the release. Verify that these release notes are correct for your switch:
■If you are installing a new switch, see the Cisco IOS release label on the rear panel of your switch.
■If your switch is on, use the show version command. See Finding the Software Version and Feature Set.
■If you are upgrading to a new release, see the software upgrade filename for the software version. See Deciding Which Files to Use.
For a complete list of documentation for the platforms associated with this release, see Related Documentation.
You can download the switch software from this site (registered Cisco.com users with a login password):
http://software.cisco.com/download/navigator.html
This document uses the following conventions.
Note: Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Caution: Means reader be careful. In this situation, you might perform an action that could result in equipment damage or loss of data.
Warning: IMPORTANT SAFETY INSTRUCTIONS
Means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device.
SAVE THESE INSTRUCTIONS
Regulatory: Provided for additional information and to comply with regulatory and customer requirements.
New Feature Summary for Cisco IOS Release 15.2(5)E2 lists new features added in Cisco IOS Release 15.2(5)E2.
Supports delay-sensitive applications and time-sensitive networks. |
|||
GSDML for STEP7/TIA Portal supports Fiber port Pluggable transceiver (SFP) configuration in PROFINET application |
You can now manage the following SFPs for IE 2000 and IE 5000 switches: |
Pluggable Transceiver (SFP) Configuration Guide for SIMATIC STEP7/TIA Portal |
|
Ensures synchronization requirements are met for time-sensitive applications across bridged and virtual bridged location area networks (LANs). IEEE 802.1AS specifies the use of Precision Time Protocol (IEEE 1588). |
Precision Time Protocol Software Configuration Guide for IE 4000, IE 4010 and IE 5000 |
||
When a switch (node) configured with Media Redundancy Protocol is configured to start with MRA, it will select a Media Redundancy Manager (MRM) using a voting protocol and configured priority value. Note: Feature support is provided via Cisco IOS CLI only. STEP7/TIA management is not supported in this release. |
Media Redundancy Protocol Configuration Guide for IE 2000, IE 4000, IE 4010, and IE 5000 |
||
Layer 3 PIM support is provided through the IP Lite license. |
Cisco Industrial Ethernet 4000, 4010 and 5000 Switch Software Configuration Guide |
||
Feature Mode allows for efficient allocation of platform resources based on the features (such as time-sensitive industrial protocols) running on the switch. |
|||
Securing Networks with Private VLANs and VLAN Access Control Lists |
|||
Security Enhancement: Ability to disable weak SSL / TLS versions for enhanced HTTP security |
IE 2000, IE 2000U, IE 3000, IE 3010, IE 4000, IE 4010, IE 5000 |
To enable this capability on the switch, enter the following config command: Note: We recommend using only supported browsers developed in 2014 or later. |
|
TrustSec Security Group Tagging (SGT) and Security Group ACL (SGACL) |
Allows tracking and ensures protected communication between peers. |
||
NetFlow Lite supports flexible sampling of traffic and exports flow data for analysis on a wide range of Cisco and third-party collectors. |
|||
If you download the IP services image and plan to use Layer 3 functionality, you must use the Switch Database Management (SDM) routing template. |
|||
Allows switch to receive and adjust timing data. Generates synchronized clocks between interfaces. |
Cisco IE 5000 Hardened Aggregator Hardware Installation Guide |
||
Online help for the Device Manager is available in the following languages: ■Chinese (Traditional) (code: 2052) ■Chinese (Simplified) (code: 1028) |
This section describes the following system requirements for Cisco IOS Release 15.2(5)E:
This section summarizes the hardware and software requirements for the Windows platform.
For a listing of Express Setup documentation, see Methods for Assigning IP Information.
■1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
■1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
■16 GB available hard disk space (32-bit) or 20 GB (64-bit)
■PC with Windows 7, or Mac OS 10.6.x
■Web browser (Internet Explorer 9.0, 10.0, and 11.0, or Firefox 32) with JavaScript enabled
■Straight-through or crossover Category 5 or 6 cable
Express Setup verifies the browser version when starting a session, and it does not require a plug-in.
These are the procedures for downloading software. Before downloading software, read these sections for important information:
■Finding the Software Version and Feature Set
■Upgrading a Switch by Using the CLI
The Cisco IOS image is stored as a bin file in a directory that is named with the Cisco IOS release. A subdirectory contains the files needed for web management. The image is stored on the compact flash memory card.
You can use the show version privileged EXEC command to see the software version that is running on your switch. The second line of the display shows the version.
You can also use the dir filesystem : privileged EXEC command to see the directory names of other software images stored in flash memory. For example, use the dir flash: command to display the images in the flash memory.
The upgrade procedures in these release notes describe how to perform the upgrade by using a combined tar file. This file contains the Cisco IOS image file and the files needed for the embedded device manager. You must use the combined tar file to upgrade the switch through Express Setup. To upgrade the switch through the command-line interface (CLI), use the tar file and the archive download-sw privileged EXEC command.
Cisco IOS Software Image Files lists the filenames for this software release.
Note: If you download the IP services image and plan to use Layer 3 functionality, you must use the Switch Database Management (SDM) routing template. To determine the currently active template, enter the show sdm prefer privileged EXEC command. If necessary, enter the sdm prefer global configuration command to change the SDM template to a specific template. For example, if the switch uses Layer 3 routing, change the SDM template from the default to the routing template. You must reload the switch for the new template to take effect.
Note: Beginning with Cisco IOS Release 15.2(5)E, we no longer release the IE 3000 IP services image. The latest release for the IP services image on the IE 3000 is 15.2(4)EA1.
Before upgrading your switch software, make sure that you archive copies of both your current Cisco IOS release and the Cisco IOS release to which you are upgrading. Keep these archived images until you have upgraded all devices in the network to the new Cisco IOS image and verified that the new Cisco IOS image works properly in your network.
Cisco routinely removes old Cisco IOS versions from Cisco.com. See Product Bulletin 2863 for information:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps8802/ps6969/ps1835/prod_bulletin0900aecd80281c0e.html
You can copy the bin software image file on the flash memory to the appropriate TFTP directory on a host by using the copy flash: tftp: privileged EXEC command.
Note: Although you can copy any file on the flash memory to the TFTP server, it is time consuming to copy all of the HTML files in the tar file. We recommend that you download the tar file from Cisco.com and archive it on an internal host in your network.
You can also configure the switch as a TFTP server to copy files from one switch to another without using an external TFTP server by using the tftp-server global configuration command.
This procedure is for copying the combined tar file to the switch. You copy the file to the switch from a TFTP server and extract the files. You can download an image file and replace or keep the current image.
Note: Make sure that the compact flash card is in the switch before downloading the software.
To download software, follow these steps:
1. Use Cisco IOS Software Image Files to identify the file that you want to download.
2. Download the software image file. If you have a SMARTnet support contract, go to this URL, and log in to download the appropriate files:
http://software.cisco.com/download/navigator.html
For example, to download the image for an IE 2000 switch, select Products > Switches > Industrial Ethernet Switches > Cisco Industrial Ethernet 2000 Series Switches, then select your switch model. Select IOS Software for Software Type, then select the image you want to download.
3. Copy the image to the appropriate TFTP directory on the workstation, and make sure that the TFTP server is properly configured.
For more information, see the “Assigning the Switch IP Address and Default Gateway” chapter in the applicable document for your switch as listed in Methods for Assigning IP Information.
4. Log into the switch through the console port or a Telnet session.
5. (Optional) Ensure that you have IP connectivity to the TFTP server by entering this privileged EXEC command:
For more information about assigning an IP address and default gateway to the switch, see Methods for Assigning IP Information.
6. Download the image file from the TFTP server to the switch.
If you are installing the same version of software that currently exists on the switch, overwrite the current image by entering this privileged EXEC command:
The command above untars/unzips the file.The system prompts you when it completes successfully.
–The /overwrite option overwrites the software image in flash memory with the downloaded one.
If you specify the command without the /overwrite option, the download algorithm verifies that the new image is not the same as the one on the switch Flash device. If the images are the same, the download does not occur. If the images are different, the old image is deleted, and the new one is downloaded. If there is not enough space to install the new image and keep the current running image, the download process stops, and an error message displays.
–The /reload option reloads the system after downloading the image unless the configuration has been changed and not saved.
–For // location, specify the IP address of the TFTP server. or hostname.
–For / directory / image-name .tar, specify the directory and the image to download. Directory and image names are case sensitive. The directory is for file organization and it is generally a tftpboot/user-ID path.
This example shows how to download an image from a TFTP server at 198.30.20.19 and to overwrite the image on the switch:
You can also download the image file from the TFTP server to the switch and keep the current image by replacing the /overwrite option with the /leave-old-sw option. If there is not enough space to install the new image and keep the current running image, the download process stops, and an error message displays.
This procedure is for copying the combined tar file to the switch. You copy the file to the switch from a TFTP server and extract the files. You can download an image file and replace or keep the current image.
To download software, follow these steps:
1. Refer to Deciding Which Files to Use to identify the file that you want to download.
2. Download the software image file. If you have a SMARTnet support contract, go to the URL below and log in to download the appropriate files.
http://software.cisco.com/download/navigator.html
For example, to download the image for a Connected Grid 10-Port Ethernet Switch Module Interface Card, select Products > Cisco Interfaces and Modules > Connected Grid Modules > Connected Grid 10-Port Ethernet Switch Module Interface Card. Select IOS Software for Software Type, then select the image you want to download.
Copy the image to the appropriate TFTP directory on the workstation, and make sure that the TFTP server is properly configured. For more information, see the “Assigning the Switch IP Address and Default Gateway” chapter in the applicable document listed in Methods for Assigning IP Information.
3. Copy the image to the appropriate TFTP directory on the workstation, and make sure that the TFTP server is properly configured.
4. Log in to the switch through the console port or a Telnet session.
5. (Optional) Ensure that you IP connectivity to the TFTP server by entering this privileged EXEC command:
6. Download the image file from the TFTP server to the switch.
If you are installing the same version of software that currently exists on the switch, overwrite the current image by entering this privileged EXEC command:
The command above untars/unzips the file.The system prompts you when it completes successfully.
–The /overwrite option overwrites the software image in flash memory with the downloaded one.
If you specify the command without the /overwrite option, the download algorithm verifies that the new image is not the same as the one on the switch Flash device. If the images are the same, the download does not occur. If the images are different, the old image is deleted, and the new one is downloaded. If there is not enough space to install the new image and keep the current running image, the download process stops, and an error message displays.
–The /reload option reloads the system after downloading the image unless the configuration has been changed and not saved.
–For // location, specify the IP address of the TFTP server. or hostname.
–For / directory / image-name .tar, specify the directory and the image to download. Directory and image names are case sensitive. The directory is for file organization and it is generally a tftpboot/user-ID path.
This example shows how to download an image from a TFTP server at 198.30.20.19 and to overwrite the image on the switch:
You can also download the image file from the TFTP server to the switch and keep the current image by replacing the /overwrite option with the /leave-old-sw option. If there is not enough space to install the new image and keep the current running image, the download process stops, and an error message displays.
7. After the download and the untar are complete, power cycle the CGR2010.
You can assign IP information to your switch using the methods shown in Methods for Assigning IP Information
The Bug Search Tool (BST), which is the online successor to Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:
1. Access the BST (use your Cisco user ID and password) at https://tools.cisco.com/bugsearch/.
You can use the Bug Search Tool to find information about caveats for this release, including a description of the problems and available workarounds. The Bug Search Tool lists both open and resolved caveats.
To access Bug Search Tool, you need the following items:
■Cisco.com user ID and password
To access the Bug Search Tool, enter the following URL:
https://tools.cisco.com/bugsearch/search
To access the Bug Search Tool to search on a specific caveat, enter the following URL:
This section includes the following latest updates to documentation for IE switches:
■Enabling Logging Alarms for Syslog Messages
■Resilient Ethernet Protocol (REP)
The following information is relevant to all IE Switches software releases from Release 12.2(58)SE onward (CSCvg26502).
On IE switches, there is an option to configure temperature alarm levels as noted in the “ Configuring the Switch Alarms: Associating the Temperature Alarms to a Relay ” section within IE Switch Software Configuration Guides.
However, configured alarms do not generate any syslogs until you set Major alarm logging alarm 2 and Minor alarm l ogging alarm 3 for temperature threshold alarms.
IMPORTANT: The logging alarm must be enabled to generate syslog messages.
See the revised configuration recommendations for the lsl-age-timer timer-value command (CSCux92117) in the “Configuring REP Configurable Timers” section in the REP chapter of the LAN Switching Configuration Guide, Cisco IOS XE Release 3S.
Please note the following variances in NetFlow Lite support on the IE 4000, IE 4010 or IE 5000 switches and NetFlow Lite user documentation:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(5)E (Catalyst 2960-X Switches)
■New configuration options for the feature supported on the platforms:
■Missing cache command options in user Netflow Lite documentation:
■New options, sort and aggregate, for show flow monitor cache format command (as shown below):
show flow monitor cache format has only three options as shown below:
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation.
To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the What’s New in Cisco Product Documentation RSS feed. The RSS feeds are a free service.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies are considered un-Controlled copies and the original on-line version should be referred to for latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
No combinations are authorized or intended under this document.