cc/td/doc/product/software/ios121/121relnt
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco 7000 Family for Cisco IOS Release 12.1 E

Release Notes for Cisco 7000 Family for Cisco IOS Release 12.1 E

September 18, 2000


Note   You can find the most current Cisco IOS documentation on Cisco Connection Online (CCO). These electronic documents may contain updates and modifications made after the hardcopy documents were printed.

These release notes for the Cisco 7000 family describe the enhancements provided in Cisco IOS Release 12.1(3a)E. These release notes are updated as needed.


Note   Cisco IOS Release 12.1(3)E syncs to the latest release point on the parent branch which is Release 12.1(3a). Therefore, to provide consistency, Cisco IOS Release 12.1(3)E is renamed to Cisco IOS Release 12.1(3a)E.

For a list of the software caveats that apply to Cisco IOS Release 12.1(3)E, see the "Caveats" section, the Caveats for Cisco IOS Release  12.1  document, and the Release Notes for Cisco IOS Releases 12.0(5)XE Through 12.0(7)XE1 . All caveats in Cisco IOS Release 12.1(2) and Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1(3a)E.

Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.1  and the Release Notes for Cisco 7000 Family for Cisco IOS Release 12.0(5)XE Through 12.0(7)XE1  located on CCO and the Documentation CD-ROM.


Note   Cisco IOS Release 12.1(2)E1 contains caveat-fixes only. There are no new features released in Cisco IOS Release 12.1(2)E1. For more information refer to the "Caveats" section.

Contents

These release notes describe the following topics:

Early Deployment Releases

These release notes describe the Cisco 7000 family for Cisco IOS Release 12.1(3a)E, which is an early deployment (ED) release based on Cisco IOS Release 12.0(7)XE. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features. Table 1 shows recent early deployment releases of the Cisco 7000 family.


Table 1: Early Deployment Releases for the Cisco 7000 Family
ED Release Maintenance Release Additional Software Features Additional Hardware Features Availability

Release 12.1 E

(2)E11

No additional software features

No additional hardware features

Release 12.1 E

(2)

Class-Based Quality of Service Management Information Base

Local Area Network Emulation Quality of Service

Low Latency Queuing for the VIP Enhancement

Cisco Quality of Service Device Manager 1.1 Support

NBAR Enhancements

Now

Release 12.1 E

(E2)

Cisco 7500 series support added

Now

Release 12.1 E

(1)

IOS Server Load Balancing Enhancements

Interface Range Configuration Mode

Network-Based Application Recognition Enhancements

Cisco Quality of Service Device Manager 1.0 Support

Turbo Access Control Lists

NSE-1 support

Integrated Service Adapter

Now

Release 12.0 XE1

(7)

dWFQ for RSVP

Cisco IOS Firewall Feature Set for Cisco 7500 series routers

Fast EtherChannel Enhancements for Cisco 7200 series routers

Inverse multiplexing over ATM Enhancements

Low-Latency Queueing for the Versatile Interface Processor Enhancement

PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement

MPLS Class Of Service Classification Using MPLS Experimental Bits

OC-12c Dynamic Packet Transport Interface Processor (DPTIP) for Cisco 7200 and 7500 series routers

Inverse multiplexing over ATM on Cisco 7100 series routers

PA-MC-2T3+ port adapter

Two-Port Multichannel DS1/PRI and Multichannel E1/PRI port adapters

Gigabit Ethernet (PA-GE support)

Now

Release 12.0 XE5

(5)

None

Integrated Service Module

Now

Release 12.0 XE3

(5)

Quality of service for Virtual Private Networks

None

Now

Release 12.0 XE2

(5)

Network-Based Application Recognition (NBAR)

E1 support for Two-port T1/E1 High-capacity Digital Voice Port Adapter for Cisco 7200 series routers

Now

Release 12.0 XE

(5)

Distributed Traffic Shaping

Two-Port T1/E1 High-capacity Digital Voice Port Adapter for Cisco 7200 series routers

Inverse multiplexing over ATM port adapter

Now

1Cisco IOS Release 12.1(2)E1 includes caveat fixes only. For more information, see the "Caveats" section.

System Requirements

This section describes the system requirements for Cisco IOS Release 12.1(3a)E and includes the following sections:

Image Support and Memory Requirements

Table 2 describes the memory recommendations and the images supported by Cisco IOS Release 12.1 E for the Cisco 7000 family of routers.

Table 3 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(2)E1.


Note   Cisco IOS Release 12.1(2)E1 supports only Cisco 7100 security images and Cisco 7500 nonsecurity images.

Table 4 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E3.


Note   Cisco IOS Release 12.1(1)E3 supports only Cisco 7100 security images and Cisco 7200 and Cisco 7500 nonsecurity images

Table 5 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E2.


Note   Cisco IOS Release 12.1(1)E2 supports all Cisco 7100 and Cisco 7200 images but only nonsecurity Cisco 7500 images.

Table 6 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E.


Note   Cisco IOS Release 12.1(1)E supports only Cisco 7100 and Cisco 7200 images.


Table 2: Images and Memory Recommendations for Cisco IOS Release 12.1(3a)E
Platforms Feature Sets Image Name Software Image Flash
Memory
Recommended
DRAM
Memory
Recommended
Runs
From
Cisco 7100 Series

IP Standard Feature Set

IP

c7100-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7100-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7100-ik2s-mz

16 MB

64 MB

RAM

IP/Firewall Standard Feature Set

IP/FW/IDS

c7100-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec56

c7100-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec3DES

c7100-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7100-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7100-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7100-jk2s-mz

16 MB

64 MB

RAM

Enterprise/FW Standard Feature Set

Enterprise/FW/IDS

c7100-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7100-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7100-jk2o3s-mz

16 MB

64 MB

RAM

Cisco 7200 Series

IP Standard Feature Set

IP

c7200-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7200-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7200-ik2s-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

c7200-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

c7200-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7200-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7200-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7200-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7200-jk2s-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

c7200-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7200-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7200-jk2o3s-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

c7200-ds-mz

16 MB

64 MB

RAM

Desktop/IBM IPSec 56

c7200-ds56i-mz

16 MB

64 MB

RAM

Desktop/IBM Firewall Standard Feature Set

Desktop/IBM/FW/IDS

c7200-do3s-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 56

c7200-do3s56i-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 3DES

c7200-dk2o3s-mz

16 MB

64 MB

RAM

Cisco 7500 Series

IP Standard Feature Set

IP

rsp-isv-mz

16 MB

64 MB

RAM

IP IPSEC 56

rsp-isv56i-mz

16 MB

64 MB

RAM

IP IPSEC 3DES

rsp-ik2sv-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

rsp-io3sv-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSEC 56

rsp-io3sv56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSEC 3DES

rsp-ik2o3sv-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

rsp-jsv-mz

16 MB

64 MB

RAM

Enterprise IPSEC 56

rsp-jsv56i-mz

16 MB

64 MB

RAM

Enterprise IPSEC 3DES

rsp-jk2sv-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

rsp-jo3sv-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSEC 56

rsp-jo3sv56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSEC 3DES

rsp-jk2o3sv-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

rsp-dsv-mz

16 MB

64 MB

RAM

Desktop/IBM IPSEC 56

rsp-dsv56i-mz

16 MB

64 MB

RAM


Table 3: Images and Memory Recommendations for Cisco IOS Release 12.1(2)E1
Platforms Feature Sets Image Name Software Image Flash
Memory
Recommended
DRAM
Memory
Recommended
Runs
From
Cisco 7100 Series

IP Standard Feature Set

IP IPSec 56

c7100-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7100-ik2s-mz

16 MB

64 MB

RAM

IP/Firewall Standard Feature Set

IP/FW/IDS IPSec 56

c7100-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7100-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise IPSec 56

c7100-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7100-jk2s-mz

16 MB

64 MB

RAM

Enterprise/FW Standard Feature Set

Enterprise/FW/IDS IPSec 56

c7100-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7100-jk2o3s-mz

16 MB

64 MB

RAM

Cisco 7500 Series

IP Standard Feature Set

IP

rsp-isv-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

rsp-io3sv-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

rsp-jsv-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

rsp-jo3sv-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

rsp-dsv-mz

16 MB

64 MB

RAM


Table 4: Images and Memory Recommendations for Cisco IOS Release 12.1(1)E3
Platforms Feature Sets Image Name Software Image Flash
Memory
Recommended
DRAM
Memory
Recommended
Runs
From
Cisco 7100 Series

IP Standard Feature Set

IP IPSec 56

c7100-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7100-ik2s-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS IPSec 56

c7100-io3s6i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7100-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise/IPSec 56

c7100-js56i-mz

16 MB

64 MB

RAM

Enterprise/IPSec 3DES

c7100-jk2s-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS IPSec 56

c7100-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7100-jk2o3s-mz

16 MB

64 MB

RAM

Cisco 7200 Series

IP Standard Feature Set

IP

c7200-is-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

c7200-io3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7200-js-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

c7200-jo3s-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

c7200-ds-mz

16 MB

64 MB

RAM

Desktop/IBM Firewall Standard Feature Set

Desktop/IBM/FW/IDS

c7200-do3s-mz

16 MB

64 MB

RAM

Cisco 7500 Series

IP Standard Feature Set

IP

rsp-isv-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

rsp-io3sv-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

rsp-jsv-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

rsp-jo3sv-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

rsp-dsv-mz

16 MB

64 MB

RAM


Table 5: Images and Memory Recommendations for Cisco IOS Release 12.1(1)E2
Platforms Feature Sets Image Name Software Image Flash
Memory
Recommended
DRAM
Memory
Recommended
Runs
From
Cisco 7100 Series

IP Standard Feature Set

IP

c7100-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7100-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7100-ik2s-mz

16 MB

64 MB

RAM

IP/Firewall Standard Feature Set

IP/FW/IDS

c7100-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

c7100-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7100-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7100-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7100-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSEC 3DES

c7100-jk2s-mz

16 MB

64 MB

RAM

Enterprise/FW Standard Feature Set

Enterprise/FW/IDS

c7100-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7100-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7100-jk2o3s-mz

16 MB

64 MB

RAM

Cisco 7200 Series

IP Standard Feature Set

IP

c7200-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7200-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7200-ik2s-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

c7200-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

c7200-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7200-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7200-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7200-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7200-jk2s-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

c7200-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7200-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7200-jk2o3s-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

c7200-ds-mz

16 MB

64 MB

RAM

Desktop/IBM IPSec 56

c7200-ds56i-mz

16 MB

64 MB

RAM

Desktop/IBM Firewall Standard Feature Set

Desktop/IBM/FW/IDS

c7200-do3s-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 56

c7200-do3s56i-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 3DES

c7200-dk2o3s-mz

16 MB

64 MB

RAM

Cisco 7500 Series

IP Standard Feature Set

IP

rsp-isv-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

rsp-io3sv-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

rsp-jsv-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

rsp-jo3sv-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

rsp-dsv-mz

16 MB

64 MB

RAM


Table 6: Images and Memory Recommendations for Cisco IOS Release 12.1(1)E
Platforms Feature Sets Image Name Software Image Flash
Memory
Recommended
DRAM
Memory
Recommended
Runs
From
Cisco 7100 Series

IP Standard Feature Set

IP

c7100-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7100-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7100-ik2s-mz

16 MB

64 MB

RAM

IP/Firewall Standard Feature Set

IP/FW/IDS

c7100-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

c7100-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7100-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7100-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7100-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7100-jk2s-mz

16 MB

64 MB

RAM

Enterprise/FW Standard Feature Set

Enterprise/FW/IDS

c7100-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7100-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7100-jk2o3s-mz

16 MB

64 MB

RAM

Cisco 7200 Series

IP Standard Feature Set

IP

c7200-is-mz

16 MB

64 MB

RAM

IP IPSec 56

c7200-is56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

c7200-ik2s-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

c7200-io3s-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

c7200-io3s56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

c7200-ik2o3s-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

c7200-js-mz

16 MB

64 MB

RAM

Enterprise IPSec 56

c7200-js56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

c7200-jk2s-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

c7200-jo3s-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

c7200-jo3s56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

c7200-jk2o3s-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

c7200-ds-mz

16 MB

64 MB

RAM

Desktop/IBM IPSec 56

c7200-ds56i-mz

16 MB

64 MB

RAM

Desktop/IBM Firewall Standard Feature Set

Desktop/IBM/FW/IDS

c7200-do3s-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 56

c7200-do3s56i-mz

16 MB

64 MB

RAM

Desktop/IBM/FW/IDS IPSec 3DES

c7200-dk2o3s-mz

16 MB

64 MB

RAM

Cisco 7500 Series

IP Standard Feature Set

IP

rsp-isv-mz

16 MB

64 MB

RAM

IP IPSec 56

rsp-isv56i-mz

16 MB

64 MB

RAM

IP IPSec 3DES

rsp-ik2sv-mz

16 MB

64 MB

RAM

IP Firewall Standard Feature Set

IP/FW/IDS

rsp-io3sv-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 56

rsp-io3sv56i-mz

16 MB

64 MB

RAM

IP/FW/IDS IPSec 3DES

rsp-ik2o3sv-mz

16 MB

64 MB

RAM

Enterprise Standard Feature Set

Enterprise

rsp-jsv-mz

16 MB

64 MB

RAM

Enterprise IPSec56

rsp-jsv56i-mz

16 MB

64 MB

RAM

Enterprise IPSec 3DES

rsp-jk2sv-mz

16 MB

64 MB

RAM

Enterprise Firewall Standard Feature Set

Enterprise/FW/IDS

rsp-jo3sv-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 56

rsp-jo3sv56i-mz

16 MB

64 MB

RAM

Enterprise/FW/IDS IPSec 3DES

rsp-jk2o3sv-mz

16 MB

64 MB

RAM

Desktop/IBM Standard Feature Set

Desktop/IBM

rsp-dsv-mz

16 MB

64 MB

RAM

Desktop/IBM IPSec 56

rsp-dsv56i-mz

16 MB

64 MB

RAM

Hardware Supported

Cisco IOS Release 12.1(3a)E supports the following Cisco 7000 family platforms:

Cisco IOS Release 12.1(2)E1supports the following Cisco 7000 family platforms:

Cisco IOS Release 12.1(2)E supports the following Cisco 7000 family platforms:

Cisco IOS Release 12.1(1)E supports the following Cisco 7000 family platforms:


Note   Cisco IOS Release 12.1(1)E does not support Cisco 7500 series routers.

A hardware-software compatibility matrix is available on CCO for users with CCO login accounts. Using this matrix, you can search for supported hardware components by entering a Cisco platform and an IOS release number. The hardware-software compatibility matrix tool is available at the following URL:

http://www.cisco.com/cgi-bin/front.x/Support/HWSWmatrix/hwswmatrix.cgi  

Determining the Software Version

To determine the version of Cisco IOS software running on your Cisco 7000 family router, log in to the Cisco 7000 family router and enter the show version EXEC command. The following sample show version command output is from a router running a Cisco 7100 series software image with Cisco IOS Release 12.1(3a)E:

router> show version
Cisco Internetwork Operating System Software
IOS (tm) 7100 Software (C7100-JS56I-MZ), Version 12.1(3a)E, RELEASE SOFTWARE
 

Upgrading to a New Software Release

For general information about upgrading to a new software release, see UCisco  IOS Upgrade Ordering Instructions located at:

http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/957_pp.htm  

Feature Set Tables

The Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features.

Cisco IOS Release 12.1(3a)E supports the same feature sets as Cisco IOS Release 12.1(3a)T, but Cisco IOS Release 12.1(3a)E can include new features supported by the Cisco 7000 family.


Caution Cisco IOS images with strong encryption (including, but not limited to 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, purchaser/user or the user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.


Note   Cisco IOS Release 12.1(1)E supports only Cisco 7100 series and Cisco 7200 series images.

Table 7 through Table 9 list the feature sets for Cisco 7100 series routers. Table 10 through Table 13 list the feature sets for Cisco 7200 series routers. Table 14 through Table 16 list the feature sets for Cisco 7500 series routers.

The tables use the following conventions:


Note   These tables might not be cumulative or list all the features in each image. You can find the most current Cisco IOS documentation on CCO. These electronic documents may contain updates and modifications made after the hardcopy documents were printed.


Table 7: Feature List by Feature Set for the Cisco 7100 Series, Part 1 
Features In Software Images by Feature Sets
IP IP IPSec 56 IP IPSec 3DES IP/FW/IDS
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

Quality of Service

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 8: Feature List by Feature Set for the Cisco 7100 Series, Part 2
Features In Software Images by Feature Sets
IP/FW/IDS IPSec 56 IP/FW/IDS IPSec 3DES Enterprise Enterprise IPSec 56
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

Quality of Service

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 9: Feature List by Feature Set for the Cisco 7100 Series, Part 3 
Features In Software Images by Feature Sets
Enterprise IPSec 3DES Enterprise/ FW/IDS Enterprise/ FW/IDS IPSec 56 Enterprise/ FW/IDS IPSec 3DES
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

Quality of Service

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 10: Feature List by Feature Set for the Cisco 7200 Series, Part 1
Features In Software Images by Feature Sets
IP IP IPSec 56 IP IPSec 3DES IP/FW/IDS
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

SLB Enhancements

(2)

Yes

Yes

Yes

Yes

SLB Enhancements

(3a)

Yes

Yes

Yes

Yes

Management

Turbo Access Control Lists

(1)

Yes

Yes

Yes

Yes

Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 11: Feature List by Feature Set for the Cisco 7200 Series, Part 2
Features In Software Images by Feature Sets
IP/FW/IDS
IPSec 56
IP/FW/IDS IPSec 3DES Enterprise Enterprise IPSec 56
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

SLB Enhancements

(2)

Yes

Yes

Yes

Yes

SLB Enhancements

(3a)

Yes

Yes

Yes

Yes

Management

Turbo Access Control Lists

(1)

Yes

Yes

Yes

Yes

Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 12: Feature List by Feature Set for the Cisco 7200 Series, Part 3
Features In Software Images by Feature Sets
Enterprise IPSec 3DES Enterprise/FW/ IDS Enterprise/ FW/IDS IPSec 56 Enterprise/FW/IDS IPSec 3DES
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

SLB Enhancements

(2)

Yes

Yes

Yes

Yes

SLB Enhancements

(3a)

Yes

Yes

Yes

Yes

Management

Turbo Access Control Lists

(1)

Yes

Yes

Yes

Yes

Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes


Table 13: Feature List by Feature Set for the Cisco 7200 Series, Part 4 
Features In Software Images by Feature Sets
Desktop/IBM Desktop/IBM IPSec 56 Desktop/ IBM/FW/IDS Desktop/IBM/FW/IDS IPSec 56 Desktop/IBM/FW/IDS IPSec 3DES
IP Routing

IOS SLB Enhancements

(1)

Yes

Yes

Yes

Yes

Yes

SLB Enhancements

(2)

Yes

Yes

Yes

Yes

Yes

SLB Enhancements

(3a)

Yes

Yes

Yes

Yes

Yes

Management

Turbo Access Control Lists

(1)

Yes

Yes

Yes

Yes

Yes

Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

Yes

NBAR Enhancements

(1)

Yes

Yes

Yes

Yes

Yes

NBAR Enhancements

(2)

Yes

Yes

Yes

Yes

Yes

QDM 1.0 Support

(1)

Yes

Yes

Yes

Yes

Yes

QDM 1.1 Support

(2)

Yes

Yes

Yes

Yes

Yes

QDM 1.2 Support

(3a)

Yes

Yes

Yes

Yes

Yes


Table 14: Feature List by Feature Set for the Cisco 7500 Series Part 1 
Features In Software Images by Feature Sets
IP IP IPSec 56 IP IPSec 3DES IP/FW/IDS IP/FW/IDS IPSec 56
Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

Yes

Low Latency Queuing for the VIP Enhancement

(2)

Yes

Yes

Yes

Yes

Yes

QDM 1.0 Support for Cisco 7500 Series

(E2)

Yes

No

No

Yes

No

QDM 1.1 Support

(2)

Yes

No

No

Yes

No

QDM 1.2 Support

(3a)

Yes

No

No

Yes

No

VIP-Based FRF .11/12

(2)

Yes

Yes

Yes

Yes

Yes


Table 15: Feature List by Feature Set for the Cisco 7500 Series, Part 2
Features In Software Images by Feature Sets
IP/FW/IDS IPSec 3DES Enterprise Enterprise IPSec 56 Enterprise IPSec 3DES Enterprise/ FW/IDS
Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

Yes

Low Latency Queuing for the VIP Enhancement

(2)

Yes

Yes

Yes

Yes

Yes

QDM 1.0 Support for Cisco 7500 Series

(E2)

No

Yes

No

No

Yes

QDM 1.1 Support

(2)

No

Yes

No

No

Yes

QDM 1.2 Support

(3a)

No

Yes

No

No

Yes

VIP-Based FRF .11/12

(2)

Yes

Yes

Yes

Yes

Yes


Table 16: Feature List by Feature Set for the Cisco 7500 Series, Part 3 
Features In Software Images by Feature Sets
Enterprise/FW/ IDS IPSec 56 Enterprise/FW/ IDS IPSec 3DES Desktop/ IBM Desktop/IBM IPSec 56
Quality of Service

LANE QoS

(2)

Yes

Yes

Yes

Yes

Low Latency Queuing for the VIP Enhancement

(2)

Yes

Yes

Yes

Yes

QDM 1.0 Support for Cisco 7500 Series

(E2)

No

No

Yes

No

QDM 1.1 Support

(2)

No

No

Yes

No

QDM 1.2 Support

(3a)

No

No

Yes

No

VIP-Based FRF .11/12

(2)

Yes

Yes

Yes

Yes

New and Changed Information

The following sections list the new hardware and software features supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(3a)E.

All features in Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1 E.

For a list of features for Cisco IOS Release 12.0(7)XE1, see the Release Notes for Cisco 7000 Family for Cisco IOS Releases 12.0(5)XE Through 12.0(7)XE1

All features in Release 12.1(1) are also in Release 12.1(2)E. For a list of features for Release 12.1(1), see the Cross-Platform Release Notes for Cisco IOS Release 12.1

New Software Features in Cisco IOS Release 12.1(3a)E

The following new software feature is supported by Cisco IOS Release 12.1(3a)E:

Cisco Quality of Service Device Manager (QDM) 1.2

Platforms: Cisco 7100 series, Cisco 7200 series, and VIP-enabled 7500 series routers

QDM is a web-based Java application through which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.

QDM 1.2 is available as a separate product download and is free of charge.

For more information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.2 on CCO and the Documentation CD-ROM.

Server Load Balancing Enhancements

Platforms: Cisco 7200 series routers

Ping Probes

Server Load Balancing  now supports ping probes, in addition to HTTP probes. Probes are a simple way to verify connectivity for devices being server load-balanced, for firewalls being firewall load-balanced, and even devices on the other side of a firewall.

Firewall Load Balancing

Firewall load balancing enables IOS SLB to balance flows to firewalls regardless of whether or not any server load balancing is used. Firewall load balancing uses a load balancing device on each side of a group of firewalls (called a firewall farm) to ensure that the traffic for each related flow goes to the same firewall ensuring that the security policy is not compromised.

New Hardware Features in Cisco IOS Release 12.1(3a)E

The following new hardware features are supported by Cisco IOS Release 12.1(3a)E:

Cisco 7200-I/O-GE+E and Cisco 7200-I/O-2FE/E Input/Output Controllers

Platform: Cisco 7200 series routers

The Cisco  7200-I/O-GE+E  is an Input/Output controller that provides one Gigabit Ethernet and one Ethernet port. It is equipped with a GBIC receptacle for 1000 megabits per second (Mbps) operation and an RJ-45 receptacle for 10 Mbps operation.

The Cisco  7200-I/O-2FE/E  is an Input/Output controller that provides two autosensing Ethernet or Fast Ethernet ports and two RJ-45 receptacles for 10/100 Mbps operation.

I/O controllers support the following features:

Enhanced Gigabit Ethernet Interface Processor

Platform: Cisco 7500 series routers

The Enhanced Gigabit Ethernet Interface Processor (GEIP+) dual wide port adapter provides enhanced data throughput compared to the GEIP for high density environments.

Gigabit Ethernet (GE) continues to be the choice media for both Enterprise backbone and ISP intra-POP interconnects. The GEIP+ supplies the high-throughput solution for integrating Cisco 7500 series routers into GE infrastructures. The GEIP+ supports the following features:

NPE-400

Platform: Cisco 7200 series routers

NPE-400 is a new version of network processing engine for Cisco 7200 series routers with the following enhancements:

The NPE-400 leverages technology from the NPE-225 and NSE-1 to provide a higher performance NPE card.

PA-A3-OC12

Platforms: Cisco 7200 series and Cisco 7500 series routers

The PA-A3-OC12 port adaptor is a standards-based SONET/SDH OC12c/STM-4 622.08 Mbps ATM Port Adapter for the VIP4 in Cisco 7500 series routers or the NPE-300 in Cisco 7200 VXR series routers. The PA-A3-OC12 port adapter is a high-speed ATM uplink for connectivity from the Cisco 7500 series and Cisco 7200 series routers to any ATM switch including the Cisco LightStream 1010, Cisco 8500 and StrataCom BPX.

The ATM PA-A3-OC12 is designed with a high-performance, dual segmentation and reassembly (SAR) architecture with local buffer memory. The ATM PA-A3 supports the latest ATM hardware features such as per-virtual connection (VC) traffic shaping and Virtual Path (VP) traffic shaping, support for ATM service classes such as non-real-time variable bit rate (nrt-VBR) and unspecified bit rate (UBR), and support of 4096 ATM VCs.

The primary applications of the PA-A3-OC12 are:

The PA-A3-OC12 supports the following features:

VIP4

Platforms: Cisco 7500 series routers

The VIP4 is the fourth generation of Versatile Interface Processors for use with Cisco 7000 series routers using the Cisco 7000 Series Route Switch Processor (RSP7000) and 7000 Series Chassis Interface (RSP7000CI) and with Cisco 7500 series routers (which also include the Cisco 7507-MX and Cisco 7513-MX routers). The VIP4 installs in the interface processor slots in your Cisco 7000 series or Cisco 7500 series router.

For more information see the data sheet located on CCO at: http://www.cisco.com/warp/public/cc/pd/ifaa/ifsw/vrifpz/prodlit/vip4_ds.htm

For VIP4 installation and configuration information see the VIP4 Installation and Configuration guide located on CCO at:
http://www.cisco.com/univercd/cc/td/doc/product/core/cis7505/vip1/vip4/

New Features in Cisco IOS Release 12.1(2)E1

Cisco IOS Release 12.1(2)E1 does not include support for any new software or hardware features. Cisco IOS Release 12.1(2)E1 incorporates fixes for the following caveats:

For more information, see the "Caveats" section.

New Software Features in Cisco IOS Release 12.1(2)E

The following new software features are supported by Cisco IOS Release 12.1(2)E:

Class-Based Quality of Service Management Information Base

The Class-Based Quality of Service Management Information Base (Class-Based QoS MIB) provides read access to QoS configurations. This MIB also provides QoS statistics information based on the Modular QoS CLI, including information regarding class map and policy map parameters.

This Class-Based QoS MIB is actually two MIBs: CISCO-CLASS-BASED-QOS-MIB and CISCO-CLASS-BASED-QOS-CAPABILITY-MIB.

Use the Cisco Network Management Toolkit for MIBs  tool on CCO to locate MIBs.

Local Area Network Emulation Quality of Service

Platforms: Cisco 7200 series and Cisco 7500 series routers

The Local-Area Network Emulation (LANE) Quality of Service (QoS) feature provides the capability to differentiate multiple classes of traffic by creating virtual channel connections (VCCs) with the desired QoS parameters. When prioritized traffic is received, the LANE Client (LEC) forwards this traffic on a VCC with matching QoS parameters.

Currently, LANE QoS supports the creation of Unspecified Bit Rate+ (UBR+) VCCs. A UBR+ VCC is a UBR VCC for which the minimum cell rate (MCR) is guaranteed by the switch. If the switch cannot guarantee the rate you have specified for the UBR+ VCC, the LEC will revert to UBR with no MCR guarantee.

You can enable or disable the LANE QoS feature on a per LEC basis by entering the qos option in the lane client command. The same emulated LAN (ELAN) can contain both QoS-capable and non-QoS-capable LECs.

Low Latency Queuing for the VIP Enhancement

Platform: Cisco 7500 series routers

The optional bytes argument has been added to the priority command.

For more information on Low Latency Queuing for the VIP, including information on the bytes argument in the priority command, see the Low Latency Queuing for the Versatile Interface Processor   document on CCO and the Documentation CD-ROM.

NBAR Enhancements

Platforms: Cisco 7100 series and Cisco 7200 series routers

Network-Based Application Recognition (NBAR)  has added the following enhancements for Cisco IOS Release 12.1(2)E:

Cisco Quality of Service Device Manager 1.1 Support

Platforms: Cisco 7100 series, Cisco 7200 series, and VIP-enabled 7500 series routers

Cisco IOS Release 12.1(2)E supports Cisco Quality of Service Device Manager (QDM) 1.1. QDM is a web-based Java application with which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.

QDM 1.1 is available as a separate product download and is free of charge.

For information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

SLB Enhancements

Platform: Cisco 7200 series routers

The Cisco IOS Server Load Balancing (SLB) feature  contains the following enhancements in Cisco IOS Release 12.1(2)E:

Client NAT

If multiple load balancing devices are used, replacing the client IP address with an IP address associated with the load balancer will result in proper routing of outbound traffic to the correct load balancer. Client NAT also requires that the ephemeral client port be modified since many clients can use the same ephemeral port. This is important so that server NAT can be performed on the packet and important protocol events (such as TCP SYN, FIN, or RST) are seen by the load balancer connection finite state machine. Even in cases where multiple load balancers are not used, client NAT can be useful to insure that packets from load-balanced connections are not routed around the load balancer.


Note   The same connection supports server NAT and client NAT.

HTTP Probe

HTTP probe provides a simple way to monitor the applications being load balanced. With frequent probes, operation of the application is verified, not just connectivity to the application. The basic function of HTTP probe is to determine the real server status by issuing an HTTP GET or HTTP POST against each real server in a server farm.

Since multiple virtual servers could use a single server farm, all virtual servers tied to that server farm are probed, and if a real server failed for one virtual server, it must be failed for all virtual servers using that real server. If multiple probes detect the failure of a real server, all virtual servers must agree that the real server is recovered before that real server is restored to inservice.

Currently only one probe per server farm is allowed.

Stateful Backup

An IOS SLB could represent a point of failure and the servers could lose their connections to the backbone if power fails, or if a link from a switch to the distribution-layer switch is disconnected. IOS SLB supports two redundancy options you can use to reduce that risk: Hot Standby Router Protocol (HSRP) and stateful backup. Stateful backup enables SLB to incrementally backup its load balancing decisions, or "keep state," between primary and backup Layer 3 switches.

MIB Support of SLB

The CISCO-SLB-MIB now supports the SLB feature.

VIP-Based FRF.11/12 (dFRF.11/12)

Platform: Cisco 7500 series routers

The Voice over Frame Relay (VoFR) capabilities that were introduced on the Cisco MC3810 multiservice access concentrator beginning with Cisco IOS Release 11.3 were eventually extended to the Cisco 2600 series, 3600 series, and 7200 series router platforms. These capabilities are now available for Cisco 7500 series routers (with a VIP).

When VoFR is configured on a Cisco router, the router is able to carry voice traffic such as telephone calls and faxes over a Frame Relay network.

The Cisco implementation of Voice over Frame Relay provides the following benefits to existing Frame Relay networks:

For more information see the Versatile Interface Processor-Based FRF.11 and FRF.12  feature module. 

New Features in Release Cisco IOS Release 12.1(1)E3

Cisco IOS Release 12.1(1)E3 does not include support for any new software or hardware features. Cisco IOS Release 12.1(1)E3 incorporates fixes for the following caveats:

For more information, see the "Caveats" section.

New Software Features in Release Cisco IOS Release 12.1(1)E2

The following new software feature is supported by Cisco IOS Release 12.1(1)E2:

Cisco Quality of Service Device Manager 1.0 Support for Cisco 7500 Series Routers

Platform: Cisco 7500 series routers

Cisco IOS Release 12.1(1)E2 supports Cisco Quality of Service Device Manager  (QDM) 1.0 on Cisco 7500 series routers. QDM is a web-based Java application through which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.

QDM 1.0 is available as a separate product download and is free of charge.

For more information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

New Hardware Features in Cisco IOS Release 12.1(1)E

The following new hardware features are supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(1)E:

Network Services Engine Support

Platform: Cisco 7200 VXR series routers

Cisco IOS Release 12.1(1)E supports the network services engine (NSE-1) hardware.

The NSE-1  maintains and executes the system management functions for Cisco 7200 VXR series routers. The NSE-1 also shares system memory and environmental monitoring functions with the I/O controller. Its performance is greater than that of the network processing engines because of the secondary Parallel eXpress Forwarding (PXF) processor. The PXF processor enables parallel IP multipacket processing functions, working with the primary processor to provide accelerated packet switching as well as accelerated IP Layer 3 feature processing.

Integrated Service Adapter

Platform: Cisco 7100 series and Cisco 7200 series routers

The Integrated Service Adapter (ISA) is a single-width service adapter that provides high-performance, hardware-assisted tunneling and encryption services suitable for Virtual Private Network (VPN) remote access, site-to-site intranet, and extranet applications, as well as platform scalability and security while working with all services necessary for successful VPN deployments—security, quality of service (QoS), firewall and intrusion detection, and service-level validation and management.

The ISA off-loads IPSec and Microsoft Point-to-Point Encryption (MPPE) processing from the main processor of Cisco 7200 series routers, thus freeing resources on the processing engine (that is, the network processing engine [NPE] on the Cisco 7200 series routers) for other tasks.

The ISA provides hardware-accelerated support for multiple encryption functions:

For additional information on the Integrated Service Adapter, see the ISA and ISM Installation and Configuration  guide on CCO and the Documentation CD-ROM.

New Software Features in Cisco IOS Release 12.1(1)E

The following new software features are supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(1) E:

IOS Server Load Balancing Enhancements

Platform: Cisco 7200 series routers

Server Network Address Translation

IOS Server Load Balancing (SLB) is now capable of performing Network Address Translation (NAT) of the server IP address for SLB connections. For packets sourced by a client, SLB can translate the virtual server IP address to the real server IP address. For packets sourced by a server, SLB can translate the real server IP address to the virtual IP address, provided a matching SLB connection exists in the SLB connection database.

To enable server NAT, enter the nat server command.

Server Load Balancing Stateless Redundancy

To promote high availability, a backup SLB device can take over the SLB function in the event of a failure on the primary SLB device. SLB performs this function by monitoring Hot Standby Routing Protocol (HSRP) state changes and linking the service state of an SLB server to the HSRP state.

To enable SLB Stateless Redundancy, use the inservice standby command.

For additional information on the IOS Server Load Balancing feature, including information on Server Network Address Translation and Server Load Balancing Stateless Redundancy, see the IOS Server Load Balancing  feature module on CCO and the Documentation CD-ROM.

Interface Range Configuration Mode

Platforms: Cisco 7100 series, Cisco 7200 series, and Cisco 7500 series routers

The interface range configuration mode allows you to configure multiple interfaces with the same configuration parameters. Once you enter the interface range configuration mode, all command parameters you enter are attributed to all interfaces within that range until you exit out of the interface range configuration mode.

The interface range command mode has the following syntax:

interface range {vlan vlan_ID - vlan_ID} | {{ethernet | fastethernet | gigabitethernet | macro macro_name} slot/interface - interface} [, {{ethernet | fastethernet | gigabitethernet | macro macro_name} slot/interface - interface}]

Network-Based Application Recognition Enhancements

Platforms: Cisco 7100 series and Cisco 7200 series routers

Network-Based Application Recognition (NBAR) can now perform subport classification of HTTP traffic by HOST name. You can classify HTTP traffic by web server names. To perform a match on the hostname portion of the URL, use the new HOST matching criteria.

For additional information on the NBAR enhancements, see the Network -Based Application Recognition Enhancements feature module.

For additional information on NBAR, see the Network - Based Application Recognition  feature module.

Cisco Quality of Service Device Manager 1.0 Support

Platforms: Cisco 7100 series and Cisco 7200 series routers

Cisco IOS Release 12.1(1)E supports Cisco Quality of Service Device Manager (QDM) 1.0. QDM is a web-based Java application with which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.

QDM 1.0 is available as a separate product download and is free of charge.

For information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

Turbo Access Control Lists

Platform: Cisco 7200 series routers

Access control lists (ACLs)  are normally searched sequentially to find a matching rule, and ACLs are ordered specifically to take this factor into account. Because of the increasing needs and requirements for security filtering and packet classification, ACLs can expand to the point that searching the ACL adds a significant amount of time and memory when packets are being forwarded. Moreover, the time taken by the router to search the list is not always consistent, adding a variable latency to the packet forwarding. A high CPU load is necessary for searching an ACL with several entries.

The Turbo ACL feature compiles the ACLs into a set of lookup tables, while maintaining the first match requirements. Packet headers are used to access these tables in a small, fixed number of lookups, independently of the existing number of ACL entries. The following are benefits of this feature:

MIBs

Current MIBs

If you have an account with CCO, you can find the current list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, Log in to CCO and click Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIBs.

Deprecated and Replacement MIBs

Old Cisco Management Information Bases (MIBs) will be replaced in a future release. Currently, OLD-CISCO-* MIBs are being converted into more scalable MIBs—without affecting existing Cisco IOS products or NMS applications. You can update from deprecated MIBs to the replacement MIBs as shown in Table 17.


Table 17: Deprecated and Replacement MIBs
Deprecated MIB Replacement

OLD-CISCO-APPLETALK-MIB

RFC1243-MIB

OLD-CISCO-CHASSIS-MIB

ENTITY-MIB

OLD-CISCO-CPUK-MIB

To be decided

OLD-CISCO-DECNET-MIB

To be decided

OLD-CISCO-ENV-MIB

CISCO-ENVMON-MIB

OLD-CISCO-FLASH-MIB

CISCO-FLASH-MIB

OLD-CISCO-INTERFACES-MIB

IF-MIB CISCO-QUEUE-MIB

OLD-CISCO-IP-MIB

To be decided

OLD-CISCO-MEMORY-MIB

CISCO-MEMORY-POOL-MIB

OLD-CISCO-NOVELL-MIB

NOVELL-IPX-MIB

OLD-CISCO-SYS-MIB

(Compilation of other OLD* MIBs)

OLD-CISCO-SYSTEM-MIB

CISCO-CONFIG-COPY-MIB

OLD-CISCO-TCP-MIB

CISCO-TCP-MIB

OLD-CISCO-TS-MIB

To be decided

OLD-CISCO-VINES-MIB

CISCO-VINES-MIB

OLD-CISCO-XNS-MIB

To be decided

Important Notes

Image Deferral, Cisco 7100 Images and Cisco 7500 Images

Cisco IOS Release 12.1(2)E crypto images for Cisco 7100 series routers have been deferred to Cisco IOS Release 12.1(2)E1 due to the following caveats:

Cisco IOS Release 12.1(2)E non-crypto images for Cisco 7500 series routers have been deferred to Cisco IOS Release 12.1(2)E1 due to the following caveat:


Note   Disclaimer: If you wish to avoid risk of having your system affected by the above-identified defects, you may replace it with the replacement image described above. If you do so, the same licenses, terms and conditions that governed your rights and obligations, and those of Cisco, with respect to the deferred image shall govern them with respect to the replacement image. If, on the other hand, you decide not to replace the deferred image, you proceed at your own risk. Manufacturing is discontinuing shipment of IOS affected and, instead, will ship Software Solution.

Cisco 7500 Series Images Released in 12.1(1)E2

Cisco IOS Software Release 12.1(1)E did not release Cisco 7500 series images (rsp-*-mz). Cisco IOS Software Release 12.1(1)E2 is the first 12.1 E release that supports the Cisco 7500 series images.

Cisco IOS Software Release 12.1(1)E2 also has integrated other software repairs. Other defect repairs integrated into 12.1(1)E2 are listed in the "Caveats" section.

Cisco IOS Software Release 12.1(1)E2 is built from 12.1(1)E plus integrated defects solutions integrated.


Note   Cisco IOS Software Release 12.1(1)E1 was not released.

For more information on Cisco IOS Release 12.1(2)E2, refer to the Field Notice located at the following URL:

http://www.cisco.com/warp/public/770/fn12256.shtml

or, for registered Cisco customers:

http://www.cisco.com/warp/customer/770/fn12256.shtml

Image Deferral, Cisco 7200 Boot Image

Cisco IOS Release 12.1(1)E boot images for Cisco 7200 series routers have been deferred due to the following caveat:

CSCdm85656—Reduce size of boot helper image c7200-boot-mz

Cisco IOS Release 12.1(1)E for the 7200 boot images (c7200-boot-mz-*) have outgrown the Flash SIMM used to store the boot image on the input/output controllers used in the Cisco 7200 series routers. The c7200-boot-mz image in 12.1(1)E will be replaced with the 12.0(10)S c7200-boot-mz image which is available on CCO.

For more information about this deferral, refer to the Field Notice located at the following URL:

http://www.cisco.com/warp/customer/770/fn7771.shtml

or on CCO at:

Service & Support: Technical Assistance Center: Documents: Field Notices

Cisco 7500 Series Not Supported on Cisco IOS Release 12.1(1)E

Cisco IOS Release 12.1(1)E did not support Cisco 7500 series routers. Cisco IOS Release 12.1(1)E2 supports Cisco 7500 series routers. Cisco IOS Release 12.1(1)E2 is the first 12.1 E release to support the Cisco 7500 series routers.

Caveats

Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

This section only contains open and resolved caveats for the current Cisco IOS maintenance release.

All caveats in Cisco IOS Release 12.1(3a) and Cisco IOS Release 12.1(3a)T are also in Cisco IOS Release 12.1(3a)E. All caveats in Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1 E.

For information on caveats in Cisco IOS Release 12.1(3a), see the C aveats  for Cisco  IOS Release 12.1  document.

For information on Caveats in Cisco IOS Release 12.1(3a) T, see the Caveats for Cisco   IOS Release  12.1   T  document, which lists severity 1 and 2 caveats and is located on CCO and the Documentation CD-ROM.

For information on caveats in Cisco IOS Release 12.0(7)XE1, see the Release Notes for Cisco 7000 Family for Cisco  I OS Releases 12.0(5)XE Through 12.0(7)XE .


Note   If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco IOS Bug Navigator II. Another option is to go to http://www.cisco.com/support/bugtools.


Table 18: Caveats Reference for Cisco IOS Release 12.1 E
DDS Number Software Release
12.1(1)E, 12.1(1)E2, 12.1(1)E3, 12.1(2)E, 12.1(2)E1, 12.1(3a)E
Caveat Corrected Caveat

CSCdk89999

X

CSCdp55077

X

CSCdp63587

X

CSCdp69004

X

CSCdp72853

X

CSCdp87670

X

CSCdp88204

X

CSCdp93974

X

CSCdr00694

X

CSCdr00992

X

CSCdr01079

X

CSCdr03335

X

CSCdr03956

X

CSCdr05739

X

CSCdr05753

X

CSCdr05792

X

CSCdr16037

X

CSCdr16140

X

CSCdr17845

X

CSCdr18877

X

CSCdr21722

X

CSCdr21741

X

CSCdr22445

X

CSCdr23048

X

CSCdr24768

X

CSCdr26790

X

CSCdr27548

X

CSCdr30005

X

CSCdr31689

X

CSCdr35921

X

CSCdr39347

X

CSCdr41538

X

CSCdr46040

X

CSCdr47272

X

CSCdr47479

X

CSCdr48014

X

CSCdr48086

X

CSCdr53584

X

CSCdr57666

X

CSCdr57765

X

CSCdr59095

X

CSCdr59145

X

CSCdr60100

X

CSCdr60615

X

CSCdr61042

X

CSCdr61978

X

CSCdr62563

X

CSCdr63170

X

CSCdr63849

X

CSCdr64674

X

CSCdr65385

X

CSCdr66660

X

CSCdr66732

X

CSCdr68057

X

CSCdr72554

X

CSCdr75209

X

CSCdr80412

X

CSCdr98687

X

CSCdr98695

X

CSCds05010

X

CSCds06201

X

CSCds06831

X

CSCds08137

X

CSCds10977

X

CSCds11591

X

CSCds12643

X

CSCds13296

X

CSCds13774

X

CSCds13854

X

CSCds15182

X

CSCds16120

X

CSCds19846

X

Open Caveats—Cisco IOS Release 12.1(3a)E

This section describes unexpected behavior by Cisco IOS Release 12.1(3a)E and describes only severity 1 and 2 caveats.

Basic System Services

  On a Cisco 7500 system which uses the High System Availability feature (two RSP8s), the slave RSP may come up in the halted state when the router boots.
  Workaround: Issue a microcode reload with the microcode reload command or a slave reload with the slave reload command.
  On a VIP, when having PA-4T+ and SA-COMP/1 (or 4) port adapter, if Cisco Express Forwarding (CEF) or distributed CEF (dCEF) is configured, after a shutdown command, followed by a no shutdown command, switching mode is changed to FAST. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may reload at scheduler when passing sweeping pings across a Packet-over-SONET (POS) interface. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may reload at abort during boot up or when passing traffic. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may pause indefinitely when passing sweeping pings. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may reload at process_get_info when the show logg command is issued. There is no workaround.
  The memory cache-policy processor write-through configuration statement can cause an RSP8 to have a watchdog timeout.
  There is no workaround.

Interfaces and Bridging

  A Cisco 7200 series router running a c7200-js-mz image in Cisco IOS Release 12.1 E or Cisco IOS Release 11.3(8)AA may reload with a traceback corresponding to the c7100_dma_pak_coalesce function for a fast ethernet driver. There is no workaround.
  In Cisco IOS Release 12.1(1)E, with default QoS queue depth and when FRF.12 fragment size is set to small values, large size ping packets may get dropped due to timeout. There is no workaround.

Miscellaneous

  A Cisco 7200 series router running Cisco IOS Release 12.1(1)E configured in fast or flow switching mode may experience IPSec traffic failure when sending packets of a size that require encapsulation. IF MTU size is 1500, this problem is only seen with packets between 1447 and 1500 bytes. Packets of this size encapsulate to over 1500 bytes (and therefore need to be fragmented), but do not need to be fragmented before encapsulation.
  Workaround: Enable CEF switching.
  Under heavy load conditions, a Cisco 7100 series router with the Integrated Service Module (ISM) might reload when the clear crypto sa counter command is entered. There is no known workaround.
  Problems may be seen with the Cisco 7200 series routers with an E1 IMA group.
  On a Cisco 7200 series router with an E1 IMA group, if more than one E1 link in a four link IMA group with the minimum active links set to two goes out of service, (either by physical removal or via router configuration) the E1 IMA group does not recover. If only a single E1 link fails, the E1 IMA group recovers. There is no workaround.
  Cisco Encryption Technology (CET) configured on a Cisco 7206 router running Cisco IOS Release 12.1(1)E2 fails.
  Workaround: Downgrade to Cisco IOS Release 12.0(5) to restore CET functionality.
  A VIP4 is not recognized by a Cisco 7500 series router if it contains an IMA port adapter. There is no workaround.
  On a Cisco 7500 series router, traffic may not be able to traverse between a PA-2FEISL and a PA-MC-8E port adapter if they both reside on the same VIP (Versatile Interface Processor). This problem will be recognizable as a %LINK-4-TOOBIG error message displayed on the router console and placed in the console log.
  Workaround: Install the PA-2FEISL and the PA-MC-8E port adapter on separate VIPs.
  A Cisco 7200 series router running Cisco IOS Release 12.1 E with ip pxf and fair-queue configured on a high bandwidth interface, may experience reduced output link utilization than with no fair-queue and no ip pxf configured. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may experience a MALLOCFAIL caused by a memory leak while passing traffic via a Packet-over-SONET (POS) or ethernet interface. There is no workaround.
  A Cisco 7200 series router running Cisco IOS Release 12.1(2)E, access-lists may not show correct matches with Class-Based Weighted Fair Queuing (CBWFQ). The access-list counters may not be correct and the show policy-map interface command may not display correct class-match statistics. This does not appear to affect the operation of CBWFQ. This occurs with standard access-lists under all switching methods and with extended access-lists with non-CEF switching methods.
  Workaround: Enable CEF-switching and use extended numbered access-lists.
  This caveat occurs in a network configuration where a packet is being switched on a Gigabit Ethernet interface using Cisco parallel eXpress forwarding (PXF) and where fair queueing is enabled on some PXF-switched interfaces. If PXF is disabled using the no ip pxf command, then re-enabled by using the ip pxf command, the Gigabit Ethernet interface might stop receiving packets.
  This caveats is more likely to occur when large access control lists exist in the network configuration.
  There are no known workaround.
  This caveat occurs on a Cisco 7140 router with the following attributes:
  After a path to a peer router is broken and then re-established on the Cisco 7140, packets stop passing through the tunnel. The following error message is displayed:
    6d13h: CRYPTO_ENGINE: could not allocate pak
     
    
  There are no known workarounds.
  A Cisco 7120 router running Cisco IOS Release 12.1 E in a LAN-to-LAN-type VPN configuration with hardware encryption using an Integrated Services Module (ISM) card may display an error stating that the packet is not an IPSec packet. There is no workaround.
  An Integrated Services Adapter (SA-ISA) in a Cisco 7200 series router can cause bus error crashes without generating crashinfo or core dump. There is no workaround.
  If you configure ip packet express forwarding (pxf), or ip pxf is enabled by default, with either fair-queue or random-detect configured on an interface, there is the potential for output to that interface to become blocked. All traffic to the interface is tail-dropped by PXF.
  This can only happen if the protocol goes down/up on the output interface while that interface is congested.The recovery is to disable then re-enable the QoS feature on the interface.
  Workaround: Configure no ip cef on the interface.
  On a Cisco 7206VXR router with an NPE 300 running a c7200-jk2s-mz image on Cisco IOS Release 12.1(1)E the esp-des and esp-3des options are unavailable for the crypto ipsec transform-set name command. There is no workaround.
  When you issue a clear ip slb connections command with a lot of connections, server load-balancing (SLB) may cause a reload of the router. There is no workaround.
  A Cisco 7100 series router with an Integrated Services Module (ISM) networked to a Cisco 2600 series router successfully establishes an IPSec tunnel but fails to pass traffic.
  Workaround: Remove or disable the ISM.
  A Cisco 7200 VXR series router with a Network Services Engine (NSE-1) may pause then reload while configuring weighted fair queueing (WFQ) under stress with Parallel Express Forwarding (PXF) enabled.
  Workaround: Disable PXF.
  a Cisco 7100 series router reloads under load when a clear cry isakmp sa command is issued. There is no workaround.
  On a Cisco 7200 series router with ip pxf enabled, if the no fair-queue command is performed on an interface while traffic is flowing, and subsequently the fair-queue command is issued on the same interface, a packet express forwarding (PXF) exception may be declared and the PXF Timeslot Management Channel (TMC) will spontaneously restart.
  A Cisco 7100 series router running Cisco IOS Release 12.1 E with an Integrated Services Adapter (ISA) card may experience wedged interfaces with 75/76 buffers in the input queue when the first packet in the buffer is a crypto packet. The ISA displays the following error message upon recovery:
    ISAcard: an error coming back 1510 
     
    
  There is no workaround.

Wide-Area Networking

  On a Cisco 7100 series router running Cisco IOS Release 12.1 E, Layer 2 Forwarding (L2F) on a Virtual Private Dialup Networking (VPDN) breaks if the compress mppc command is used. Workaround: Do no use the compress mppc command.

Resolved Caveats—Cisco IOS Release 12.1(2)E1

All caveats listed in this section are resolved in Cisco IOS Release 12.1(3a)E.

Basic System Services

  An Online Insertion and Removal (OIR) removal of a VIP on a Cisco 7500 series router may cause the slave RSP to reload. There is no workaround.
  While passing sweeping pings, a Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may reload with the following error:
    %ALIGN-1-FATAL: Corrupted program counter
       pc=0x61B2D514, ra=0x61B2D50C, sp=0x61A64A18
     
    
  There is no workaround.

IP Routing Protocols

  A Cisco 7140-2T3 may reload via bus error when Border Gateway Protocol (BGP) is configured. There is no workaround.

Miscellaneous

  Inter-Switch Link (ISL)-encapsulated packets arriving on a Cisco Express Forwarding (CEF)-enabled interface are not switched. There is no known workaround.
  The ERROR LED of an ISA may turn on when a Cisco 7204 VXR router running Cisco IOS Release 12.1(1)E is under heavy IPSec traffic. The following error message may be displayed:
    ISAcard:an error coming back 1CFF
     
    
  There is no workaround.
  The ModeConfig feature for a dynamic crypto map does not work on a Cisco 7100 series router running Cisco IOS Release 12.1 E. IPSec works fine without mode-config.
  Workaround: Enable IPSec but do not enable ModeConfig.
  The Internet Key Exchange (IKE) keepalive feature is not very scalable.
  Workaround: When using IPSec, to provide redundancy with Hot Standby Router Protocol (HSRP), use generic routing encapsulation (GRE) tunneling to provide more scalability and control over the network.
  Workaround: Downgrade to Cisco IOS Release 12.0(5) to restore CET functionality.
  A Cisco 7200 series router running Cisco IOS Release 12.0(7)XE1 with multicast and tunneling configured on a PA-A3-8T1 IMA port adapter may reload due to a software forced reload caused by a memory corruption problem. There is no workaround.
  When running Open Shortest Path First (OSPF) protocol on a Cisco 7500 series router which is doing MPLS to MPLS switching, received OSPF updates may be corrupted. This results in IP routes temporarily being deleted from the IP routing table and loss of connectivity.
  Workaround: Replace PA2-FEISL with a one-port fastethernet port adapter.
  On a Cisco 7200 series router running Cisco IOS Release 12.1 E with Packet Express Forwarding (PXF) disabled, fair-queue configured, and heavy traffic in progress, if pxf is then enabled, it may fail to forward packets. There is no workaround.
  A Cisco 7100 series router running Cisco IOS Release 12.1 E may experience a bus error caused by a crypto reload. There is no workaround.
  For Cisco routers running Cisco IOS Release 12.1(1)E1, the encrypted peer may receive the following error:
    %CRYPTO-4-RECVD_PKT_INV_IDENTITY: identity doesn't match negotiated identity
     
    
  and drop packets. There is no workaround.
  The number of flows reported by the show ip cache verbose flow command is incorrect if a large number of flows age out. Not all of the flows are reported in the flow export packets. There is no workaround.
  On a Cisco 7200 series router running Cisco IOS Release 12.1 E with ip pxf enabled and random-detect (but not fair-queue) configured on a congested output interface, tail drops occur too soon. This may prevent any random drops from the higher precedence flows. There is no workaround.
  If you issue the show ip pxf accounting summary command on a Cisco 7200 series router after one of the output interfaces has gone down, the router may declare a bus error exception and spontaneously reload.
  Workaround: Avoid using the command unless counters have been cleared since the last time an interface went down.

QDM 1.0 Support


Note   For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(2)E, see the "Caveats"  section of the Release and Installation Notes for Cisco   Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

Wide-Area Networking

A Cisco 7206VXR router running Cisco IOS Release 12.1(1)E may reboot with a bus error.There is no workaround.

Resolved Caveats—Cisco IOS Release 12.1(2)E

All caveats listed in this section are resolved in Cisco IOS Release 12.1(2)E1.

IP Routing Protocols

  If the bgp deterministic med command is issued on a Cisco 7200 series router running Cisco IOS Release 12.1 E the router experiences alignment errors and may reload.
  Workaround: Issue the no bgp deterministic med command to disable deterministic Multiple Exit Discriminator (MED).

Miscellaneous

  If two POS interfaces are configured on an NSE-1, Parallel Express Forwarding (PXF) is enabled, fair-queuing is in use, and heavy fragmented traffic is presented immediately upon start-up, an unexpected restart may occur as a result of shortage of I/O memory. There is no workaround.
  A Cisco 7500 series router with an RSP8 running Cisco IOS Release 12.1 E may reload at ipc_cbus_process when passing sweeping pings via ethernet interface with the following error:
    %ALIGN-1-FATAL: Illegal access to a low address
    addr=0x8, pc=0x602D6D40, ra=0x602D6D5C, sp=0x61940C38 
     
    
  There is no workaround.
  On a Cisco 7200 series router running Cisco IOS Release 12.1 E with Packet Express Forwarding (PXF) disabled, fair-queue configured, and heavy traffic in progress, if pxf is then enabled it may declare an exception and spontaneously reload. There is no workaround.
  12.1(2)E Crypto Images have a performance degradation that is being tracked by this DDTS. New images will be posted once this issue is resolved. For more information, see the "Important Notes" section.
  Fragmented Encapsulating Security Payload (ESP) packets arriving on a Cisco 7100 series router do not seem to be passed to the crypto engine because decryption counters are not increasing. No encrypted packets pass through the router. There is no workaround. For more information, see the "Important Notes" section.
  When FR fragmentation is configured after attaching a traffic-shaping service-policy to a large number of PVCs, the service-policy may not function properly. Since FR fragmentation appears after service-policy in the configuration order, there is a chance that the problem occurs after system reload.
  The specific policy that fails is:
    policy-map fr-pvc
      class class-default
       shape average <cir>
       service-policy llq-policy
    
  
  Workaround: Configure service-policy after FR fragmentation, or add "queue-limit" to the traffic-shaping policy.
    policy-map fr-pvc
    class class-default
    shape average <cir>
      
    queue-limit <n>
    service-policy llq-policy
    

QDM 1.0 Support


Note   For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(2)E1, see the "Caveats"  section of the Release and Installation Notes for Cisco   Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

Resolved Caveats—Cisco IOS Release 12.1(1)E3

All caveats listed in this section are resolved in Cisco IOS Release 12.1(2)E.

Miscellaneous

  The VIP in the highest slot may not boot properly after a router reload. There is no workaround.
  During the startup, default bandwidth was not being properly setup for ATM Dlx card. The default visible_bandwidth was set to BANDWIDTH_SCALE by the common interface initialization routine which is 10000000. Now, the code has been changed to setup the default interface bandwidth and delay during startup config setup for ATM Dlx.
  In some configurations if a policy-map is configured to use class-maps based on access-lists, then after bootup the classification does not occur properly (for example, packets that should match the class are not considered to match).
  Workaround: Remove and redefine the class after bootup.
  CEF may not process an interface up event, resulting in a show interface command displaying the interface as up while the show cef interface command displays the same interface as down. This may result in missing prefixes in the CEF table.
  Workaround: Repeat the no shutdown command on the interface. It is not necessary to first issue a shutdown command on the interface.
  A Gigabit Ethernet Interface Processor (GEIP) that is configured for Cisco Encryption Technology (CET) decrypts packets correctly but fails to encrypt packets that match the crypto policy and should be encrypted. In this situation, the GEIP forwards the packets unencrypted.
  Workaround: When network topology permits, use the VIP2-40 or VIP2-50 Versatile Interface Processor with one or two PA-FE port adapters.

QDM 1.0 Support


Note   For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(1)E3, see the "Caveats"  section of the Release and Installation Notes for Cisco   Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

Resolved Caveats— Cisco IOS Release 12.1(1)E2

All the caveats listed in this section are resolved in Cisco IOS Release 12.1(1)E3:

IP Routing

  Ipsec traffic fails a basic back-to-back ping. Dynamic crypto maps with ACLs do not work. Packets get dropped at the decryption end of the tunnel. There is no workaround.
  If a crypto map is configured to initiate private addresses via configuration mode on a Cisco router interoperating with Cisco Secure VPN Client version 1.1, the Internet Key Exchange (IKE) peer does not acknowledge the packet, and does not continue.
  Workaround: Use Cisco Secure VPN Client version 1.0a.
  If the tx-ring-limit command is entered on a Cisco 7500 series Route Switch Processor (RSP) that is running Cisco IOS Release 12.0 S, the router might experience a NULL pointer access, and the Versatile Interface Processor (VIP) might reload. This situation occurs during line flapping and when the router is being configured. There is no workaround.

Miscellaneous

  A Cisco 7500 series router running Cisco IOS Release 12.1 E may reload when performing actions that result in the router recarving MEMD, such as a microcode reload, EOIR, or changing an interface MTU. There is no workaround.
  If Output Policing is the only feature configured on a traffic class (configured with the class-map command), then the traffic class has a queue-limit of 0. As a result, no traffic makes it out of this class.
  Workaround: Explicitly set a queue-limit that is a nonzero value. The value chosen should correspond to the amount of traffic expected to be offered to this service policy.
  Configuring a large number of Virtual Private Networks (VPNs) on a Cisco 7500 series Route Switch Processor (RSP) with a large number of channelized interfaces might result in a FIBDISABLE message. This message indicates that the RSP has not received a FIB keepalive from the line card within the expected length of time. When this situation occurs, the RSP functions as if the interprocess communication (IPC) mechanism has failed and disables Cisco Express Forwarding (CEF) on that line card.
  Workaround: Disable distributed switching.
  A Cisco router that is running Cisco IOS Release 12.0(9)S or later releases might experience problems if you attempt to format, delete, or squeeze slot0: immediately after the show version command is entered or immediately after the router reloads. This is a flash timing-related issue, and subsequent commands that you enter will not be effected. There is no workaround.
  Fifty percent of pings may fail to receive replies when ip cef is enabled. This implies that in some cases, packets are being dropped frequently. There is no workaround.
  On Cisco IOS Release 12.1, dynamic crypto maps may not work correctly if two different remote routers attempt to establish encrypted connections to the same interface on behalf of the same end hosts. There is no workaround.
  Dynamic crypto maps may not work correctly if two different remote routers attempt to establish encrypted connections to the same interface on behalf of the same end hosts. The problem occurs in IPSec on an interface that uses ip address negotiation and crypto map parser commands. If the interface is recycled (active then inactive) more then once within the IPSec SA lifetime and a new IP address is assigned to the interface, IPSec retains the previous IP address.
  Workaround 1: Delete the IPSec SA on the router that uses the ip address negotiation command and clear the IPSec use of SA by issuing the clear crypto sa command.
   Workaround 2: Use a static IP address instead of a dynamic IP address. Use the crypto map tag local-address interface command to identify a static IP address to IPSec.

NSE-1

  During Parallel eXpress Forwarding flow switching on NSE-1, the output from the show ip cache flow command is displayed incorrectly. This incorrect display should have no effect on the export data. There is no workaround.
  This caveat occurs in the following configuration:
  Under certain circumstances, HTTP packets are not redirected properly.
  Workaround: Disable Parallel eXpress Forwarding (PXF) by entering the no ip pxf command in global configuration mode.

QDM 1.0 Support


Note   For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(1)E2, see the "Caveats"  section of the Release and Installation Notes for Cisco   Quality of Service Device Manager 1.0  on CCO and the Documentation CD-ROM.

Related Documentation

The following sections describe the documentation available for the Cisco 7000 family of routers. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.

Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on CCO  and the Documentation CD-ROM.

Use these release notes with these documents:

Release-Specific Documents

The following documents are specific to Release 12.1 and are located on CCO  and the Documentation CD-ROM:

  On CCO at:
  Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
  On the Documentation CD-ROM at:
  Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
  Technical Documents
  As a supplement to the caveats listed in "Caveats" in these release notes, see the Caveats for Cisco IOS Release 12.1  document.
  On CCO  at:
  Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Caveats
  On the Documentation CD-ROM at:
  Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Caveats
  On CCO  at:
  Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Release Notes: Cisco 7000 Family Routers: Cisco 7000 Family—Release Notes for Release 12.0 XE: Release Notes for Cisco 7000 Family for Cisco Releases 12.0(5)XE through 12.0(7)XE1
  On the Documentation CD-ROM at:
  Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Release Notes: Cisco 7000 Family Routers: Cisco 7000 Family—Release Notes for Release 12.0 XE: Release Notes for Cisco 7000 Family for Cisco IOS Releases 12.0(5)XE through 12.0(7)XE1

Platform-Specific Documents

These documents are available for the Cisco 7000 family of routers on CCO  and the Documentation CD-ROM:

On CCO at:

Technical Documents: Documentation Home Page: Core/High-End Routers

On the Documentation CD-ROM at:

Cisco Product Documentation: Core/High-End Routers

Feature Modules

Feature modules describe new features supported by Release 12.1 E and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.

On CCO  at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation: New Features in 12.1-Based Limited Lifetime Releases: Cisco IOS Release 12.1 E

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation: New Features in 12.1-Based Limited Lifetime Releases: Cisco IOS Release 12.1 E

Cisco IOS Software Documentation Set

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are shipped with your order in electronic form on the Documentation CD-ROM—unless you specifically ordered the printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.

On CCO  and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.

On CCO  at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

Cisco IOS Release 12.1 Documentation Set

Table 19 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in electronic form and in printed form if ordered.


Note   You can find the most current Cisco IOS documentation on CCO  and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.

On CCO  at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1


Table 19: Cisco IOS Software Release 12.1 Documentation Set
Books Major Topics

  • Cisco IOS Configuration Fundamentals Configuration Guide

  • Cisco IOS Configuration Fundamentals Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
Cisco IOS File Management
Cisco IOS System Management
Cisco IOS User Interfaces Commands
Cisco IOS File Management Commands
Cisco IOS System Management Commands

  • Cisco IOS Bridging and IBM Networking Configuration Guide

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume I

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume II

Using Cisco IOS Software
Overview of SNA Internetworking
Bridging
IBM Networking

  • Cisco IOS Dial Services Configuration Guide: Terminal Services

  • Cisco IOS Dial Services Configuration Guide: Network Services

  • Cisco IOS Dial Services Command Reference

Preparing for Dial Access
Modem Configuration and Management
ISDN and Signalling Configuration
PPP Configuration
Dial-on-Demand Routing Configuration
Dial-Backup Configuration
Terminal Service Configuration
Large-Scale Dial Solutions
Cost-Control Solutions
Virtual Private Networks
X.25 on ISDN Solutions
Telco Solutions
Dial-Related Addressing Services
Interworking Dial Access Scenarios

  • Cisco IOS Interface Configuration Guide

  • Cisco IOS Interface Command Reference

Interface Configuration Overview
Configuring LAN Interfaces
Configuring Serial Interfaces
Configuring Logical Interfaces

  • Cisco IOS IP and IP Routing Configuration Guide

  • Cisco IOS IP and IP Routing Command Reference

IP Addressing and Services
IP Routing Protocols
IP Multicast

  • Cisco IOS AppleTalk and Novell IPX Configuration Guide

  • Cisco IOS AppleTalk and Novell IPX Command Reference

AppleTalk and Novell IPX Overview
Configuring AppleTalk
Configuring Novell IPX

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Configuration Guide

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Command Reference

Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Overview
Configuring Apollo Domain
Configuring Banyan VINES
Configuring DECnet
Configuring ISO CLNS
Configuring XNS

  • Cisco IOS Multiservice Applications Configuration Guide

  • Cisco IOS Multiservice Applications Command Reference

Multiservice Applications Overview
Voice
Video
Broadband

  • Cisco IOS Quality of Service Solutions Configuration Guide

  • Cisco IOS Quality of Service Solutions Command Reference

Quality of Service Overview
Classification
Congestion Management
Congestion Avoidance
Policing and Shaping
Signalling
Link Efficiency Mechanisms
Quality of Service Solutions

  • Cisco IOS Security Configuration Guide

  • Cisco IOS Security Command Reference

Security Overview
Authentication, Authorization, and Accounting (AAA)
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Other Security Features

  • Cisco IOS Switching Services Configuration Guide

  • Cisco IOS Switching Services Command Reference

Cisco IOS Switching Services Overview
Cisco IOS Switching Paths
Cisco Express Forwarding
NetFlow Switching
Multiprotocol Label Switching
Multilayer Switching
Multicast Distributed Switching
Virtual LANs
LAN Emulation

  • Cisco IOS Wide-Area Networking Configuration Guide

  • Cisco IOS Wide-Area Networking Command Reference

Wide-Area Networking Overview
Configuring ATM
Configuring Frame Relay
Configuring Frame Relay-ATM Interworking
Configuring SMDS
Configuring X.25 and LAPB

  • Cisco IOS Configuration Guide Master Index

  • Cisco IOS Command Reference Master Index

  • Cisco IOS Debug Command Reference

  • Cisco IOS Dial Services Quick Configuration Guide

  • Cisco IOS Software System Error Messages

  • New Features in 12.1-Based Limited Lifetime Releases

  • New Features in Release 12.1 T

  • Release Notes (Release note and caveat documentation for 12.1-based releases and various platforms)

 

Obtaining Documentation

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.

Ordering Documentation

Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.

Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).

Obtaining Technical Assistance

Cisco provides Cisco Connection Online (CCO)  as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.

Cisco Connection Online

Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.

CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.

You can access CCO  in the following ways:

You can e-mail questions about using CCO to cco-team@cisco.com.

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.

To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.

To contact by e-mail, use one of the following:

Language
E-mail Address

English

tac@cisco.com

Hanzi (Chinese)

chinese-tac@cisco.com

Kanji (Japanese)

japan-tac@cisco.com

Hangul (Korean)

korea-tac@cisco.com

Spanish

tac@cisco.com

Thai

thai-tac@cisco.com

In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.

Software Configuration Tips on the Cisco TAC Home Page

If you have a CCO login account, you can access the following URL, which contains links and tips on configuring your Cisco products:

http://www.cisco.com/kobayashi/technotes/serv_tips.shtml

This URL is subject to change without notice. If it changes, point your Web browser to CCO  and click on this path: Service & Support: Technical Assistance Center: Technical Tips. You must have a CCO account to access this link.

The following sections are provided from the Technical Tips page:

Documentation Feedback

If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.

You can e-mail your comments to bug-doc@cisco.com.

To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:

Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate and value your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Sep 15 17:45:34 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.