|
|
September 18, 2000
![]() |
Note You can find the most current Cisco IOS documentation on Cisco Connection Online (CCO). These electronic documents may contain updates and modifications made after the hardcopy documents were printed. |
These release notes for the Cisco 7000 family describe the enhancements provided in Cisco IOS Release 12.1(3a)E. These release notes are updated as needed.
![]() |
Note Cisco IOS Release 12.1(3)E syncs to the latest release point on the parent branch which is Release 12.1(3a). Therefore, to provide consistency, Cisco IOS Release 12.1(3)E is renamed to Cisco IOS Release 12.1(3a)E. |
For a list of the software caveats that apply to Cisco IOS Release 12.1(3)E, see the "Caveats" section, the Caveats for Cisco IOS Release 12.1 document, and the Release Notes for Cisco IOS Releases 12.0(5)XE Through 12.0(7)XE1 . All caveats in Cisco IOS Release 12.1(2) and Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1(3a)E.
Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.1 and the Release Notes for Cisco 7000 Family for Cisco IOS Release 12.0(5)XE Through 12.0(7)XE1 located on CCO and the Documentation CD-ROM.
![]() |
Note Cisco IOS Release 12.1(2)E1 contains caveat-fixes only. There are no new features released in Cisco IOS Release 12.1(2)E1. For more information refer to the "Caveats" section. |
These release notes describe the following topics:
These release notes describe the Cisco 7000 family for Cisco IOS Release 12.1(3a)E, which is an early deployment (ED) release based on Cisco IOS Release 12.0(7)XE. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features. Table 1 shows recent early deployment releases of the Cisco 7000 family.
| ED Release | Maintenance Release | Additional Software Features | Additional Hardware Features | Availability |
|---|---|---|---|---|
Release 12.1 E | (2)E11 | No additional software features | No additional hardware features |
|
Release 12.1 E | (2) | Class-Based Quality of Service Management Information Base Local Area Network Emulation Quality of Service Low Latency Queuing for the VIP Enhancement Cisco Quality of Service Device Manager 1.1 Support NBAR Enhancements |
| Now |
Release 12.1 E | (E2) | Cisco 7500 series support added |
| Now |
Release 12.1 E | (1) | IOS Server Load Balancing Enhancements Interface Range Configuration Mode Network-Based Application Recognition Enhancements Cisco Quality of Service Device Manager 1.0 Support Turbo Access Control Lists | NSE-1 support Integrated Service Adapter | Now |
Release 12.0 XE1 | (7) | dWFQ for RSVP Cisco IOS Firewall Feature Set for Cisco 7500 series routers Fast EtherChannel Enhancements for Cisco 7200 series routers Inverse multiplexing over ATM Enhancements Low-Latency Queueing for the Versatile Interface Processor Enhancement PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement MPLS Class Of Service Classification Using MPLS Experimental Bits | OC-12c Dynamic Packet Transport Interface Processor (DPTIP) for Cisco 7200 and 7500 series routers Inverse multiplexing over ATM on Cisco 7100 series routers PA-MC-2T3+ port adapter Two-Port Multichannel DS1/PRI and Multichannel E1/PRI port adapters Gigabit Ethernet (PA-GE support) | Now |
Release 12.0 XE5 | (5) | None | Integrated Service Module | Now |
Release 12.0 XE3 | (5) | Quality of service for Virtual Private Networks | None | Now |
Release 12.0 XE2 | (5) | Network-Based Application Recognition (NBAR) | E1 support for Two-port T1/E1 High-capacity Digital Voice Port Adapter for Cisco 7200 series routers | Now |
Release 12.0 XE | (5) | Distributed Traffic Shaping | Two-Port T1/E1 High-capacity Digital Voice Port Adapter for Cisco 7200 series routers Inverse multiplexing over ATM port adapter | Now |
| 1Cisco IOS Release 12.1(2)E1 includes caveat fixes only. For more information, see the "Caveats" section. |
This section describes the system requirements for Cisco IOS Release 12.1(3a)E and includes the following sections:
Table 2 describes the memory recommendations and the images supported by Cisco IOS Release 12.1 E for the Cisco 7000 family of routers.
Table 3 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(2)E1.
![]() |
Note Cisco IOS Release 12.1(2)E1 supports only Cisco 7100 security images and Cisco 7500 nonsecurity images. |
Table 4 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E3.
![]() |
Note Cisco IOS Release 12.1(1)E3 supports only Cisco 7100 security images and Cisco 7200 and Cisco 7500 nonsecurity images |
Table 5 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E2.
![]() |
Note Cisco IOS Release 12.1(1)E2 supports all Cisco 7100 and Cisco 7200 images but only nonsecurity Cisco 7500 images. |
Table 6 describes the memory recommendations and the images supported by Cisco IOS Release 12.1(1)E.
![]() |
Note Cisco IOS Release 12.1(1)E supports only Cisco 7100 and Cisco 7200 images. |
| Platforms | Feature Sets | Image Name | Software Image | Flash Memory Recommended | DRAM Memory Recommended | Runs From |
|---|---|---|---|---|---|---|
| Cisco 7100 Series | IP Standard Feature Set | IP | c7100-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7100-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7100-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP/Firewall Standard Feature Set | IP/FW/IDS | c7100-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec56 | c7100-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec3DES | c7100-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7100-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7100-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | c7100-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW Standard Feature Set | Enterprise/FW/IDS | c7100-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7100-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7100-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7200 Series | IP Standard Feature Set | IP | c7200-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7200-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7200-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS | c7200-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | c7200-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | c7200-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7200-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7200-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | c7200-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | c7200-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7200-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7200-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Standard Feature Set | Desktop/IBM | c7200-ds-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM IPSec 56 | c7200-ds56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Firewall Standard Feature Set | Desktop/IBM/FW/IDS | c7200-do3s-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM/FW/IDS IPSec 56 | c7200-do3s56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM/FW/IDS IPSec 3DES | c7200-dk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7500 Series | IP Standard Feature Set | IP | rsp-isv-mz | 16 MB | 64 MB | RAM |
IP IPSEC 56 | rsp-isv56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSEC 3DES | rsp-ik2sv-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS | rsp-io3sv-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSEC 56 | rsp-io3sv56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSEC 3DES | rsp-ik2o3sv-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | rsp-jsv-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSEC 56 | rsp-jsv56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSEC 3DES | rsp-jk2sv-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | rsp-jo3sv-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSEC 56 | rsp-jo3sv56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSEC 3DES | rsp-jk2o3sv-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Standard Feature Set | Desktop/IBM | rsp-dsv-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM IPSEC 56 | rsp-dsv56i-mz | 16 MB | 64 MB | RAM |
| Platforms | Feature Sets | Image Name | Software Image | Flash Memory Recommended | DRAM Memory Recommended | Runs From |
|---|---|---|---|---|---|---|
| Cisco 7100 Series
| IP Standard Feature Set | IP IPSec 56 | c7100-is56i-mz | 16 MB | 64 MB | RAM |
IP IPSec 3DES | c7100-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP/Firewall Standard Feature Set | IP/FW/IDS IPSec 56 | c7100-io3s56i-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 3DES | c7100-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise IPSec 56 | c7100-js56i-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 3DES | c7100-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW Standard Feature Set | Enterprise/FW/IDS IPSec 56 | c7100-jo3s56i-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 3DES | c7100-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7500 Series | IP Standard Feature Set | IP | rsp-isv-mz | 16 MB | 64 MB | RAM |
IP Firewall Standard Feature Set | IP/FW/IDS | rsp-io3sv-mz | 16 MB | 64 MB | RAM | |
Enterprise Standard Feature Set | Enterprise | rsp-jsv-mz | 16 MB | 64 MB | RAM | |
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | rsp-jo3sv-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM Standard Feature Set | Desktop/IBM | rsp-dsv-mz | 16 MB | 64 MB | RAM |
| Platforms | Feature Sets | Image Name | Software Image | Flash Memory Recommended | DRAM Memory Recommended | Runs From |
|---|---|---|---|---|---|---|
| Cisco 7100 Series | IP Standard Feature Set | IP IPSec 56 | c7100-is56i-mz | 16 MB | 64 MB | RAM |
IP IPSec 3DES | c7100-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS IPSec 56 | c7100-io3s6i-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 3DES | c7100-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise/IPSec 56 | c7100-js56i-mz | 16 MB | 64 MB | RAM | |
Enterprise/IPSec 3DES | c7100-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS IPSec 56 | c7100-jo3s56i-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 3DES | c7100-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7200 Series | IP Standard Feature Set | IP | c7200-is-mz | 16 MB | 64 MB | RAM |
IP Firewall Standard Feature Set | IP/FW/IDS | c7200-io3s-mz | 16 MB | 64 MB | RAM | |
Enterprise Standard Feature Set | Enterprise | c7200-js-mz | 16 MB | 64 MB | RAM | |
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | c7200-jo3s-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM Standard Feature Set | Desktop/IBM | c7200-ds-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM Firewall Standard Feature Set | Desktop/IBM/FW/IDS | c7200-do3s-mz | 16 MB | 64 MB | RAM | |
| Cisco 7500 Series | IP Standard Feature Set | IP | rsp-isv-mz | 16 MB | 64 MB | RAM |
IP Firewall Standard Feature Set | IP/FW/IDS | rsp-io3sv-mz | 16 MB | 64 MB | RAM | |
Enterprise Standard Feature Set | Enterprise | rsp-jsv-mz | 16 MB | 64 MB | RAM | |
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | rsp-jo3sv-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM Standard Feature Set | Desktop/IBM | rsp-dsv-mz | 16 MB | 64 MB | RAM |
| Platforms | Feature Sets | Image Name | Software Image | Flash Memory Recommended | DRAM Memory Recommended | Runs From |
|---|---|---|---|---|---|---|
| Cisco 7100 Series | IP Standard Feature Set | IP | c7100-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7100-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7100-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP/Firewall Standard Feature Set | IP/FW/IDS | c7100-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | c7100-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | c7100-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7100-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7100-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSEC 3DES | c7100-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW Standard Feature Set | Enterprise/FW/IDS | c7100-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7100-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7100-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7200 Series | IP Standard Feature Set | IP | c7200-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7200-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7200-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS | c7200-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | c7200-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | c7200-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7200-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7200-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | c7200-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | c7200-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7200-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7200-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Standard Feature Set | Desktop/IBM | c7200-ds-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM IPSec 56 | c7200-ds56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Firewall Standard Feature Set | Desktop/IBM/FW/IDS | c7200-do3s-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM/FW/IDS IPSec 56 | c7200-do3s56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM/FW/IDS IPSec 3DES | c7200-dk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7500 Series | IP Standard Feature Set | IP | rsp-isv-mz | 16 MB | 64 MB | RAM |
IP Firewall Standard Feature Set | IP/FW/IDS | rsp-io3sv-mz | 16 MB | 64 MB | RAM | |
Enterprise Standard Feature Set | Enterprise | rsp-jsv-mz | 16 MB | 64 MB | RAM | |
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | rsp-jo3sv-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM Standard Feature Set | Desktop/IBM | rsp-dsv-mz | 16 MB | 64 MB | RAM |
| Platforms | Feature Sets | Image Name | Software Image | Flash Memory Recommended | DRAM Memory Recommended | Runs From |
|---|---|---|---|---|---|---|
| Cisco 7100 Series | IP Standard Feature Set | IP | c7100-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7100-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7100-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP/Firewall Standard Feature Set | IP/FW/IDS | c7100-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | c7100-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | c7100-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7100-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7100-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | c7100-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW Standard Feature Set | Enterprise/FW/IDS | c7100-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7100-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7100-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7200 Series | IP Standard Feature Set | IP | c7200-is-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | c7200-is56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | c7200-ik2s-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS | c7200-io3s-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | c7200-io3s56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | c7200-ik2o3s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | c7200-js-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec 56 | c7200-js56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | c7200-jk2s-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | c7200-jo3s-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | c7200-jo3s56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | c7200-jk2o3s-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Standard Feature Set | Desktop/IBM | c7200-ds-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM IPSec 56 | c7200-ds56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Firewall Standard Feature Set | Desktop/IBM/FW/IDS | c7200-do3s-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM/FW/IDS IPSec 56 | c7200-do3s56i-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM/FW/IDS IPSec 3DES | c7200-dk2o3s-mz | 16 MB | 64 MB | RAM | ||
| Cisco 7500 Series | IP Standard Feature Set | IP | rsp-isv-mz | 16 MB | 64 MB | RAM |
IP IPSec 56 | rsp-isv56i-mz | 16 MB | 64 MB | RAM | ||
IP IPSec 3DES | rsp-ik2sv-mz | 16 MB | 64 MB | RAM | ||
IP Firewall Standard Feature Set | IP/FW/IDS | rsp-io3sv-mz | 16 MB | 64 MB | RAM | |
IP/FW/IDS IPSec 56 | rsp-io3sv56i-mz | 16 MB | 64 MB | RAM | ||
IP/FW/IDS IPSec 3DES | rsp-ik2o3sv-mz | 16 MB | 64 MB | RAM | ||
Enterprise Standard Feature Set | Enterprise | rsp-jsv-mz | 16 MB | 64 MB | RAM | |
Enterprise IPSec56 | rsp-jsv56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise IPSec 3DES | rsp-jk2sv-mz | 16 MB | 64 MB | RAM | ||
Enterprise Firewall Standard Feature Set | Enterprise/FW/IDS | rsp-jo3sv-mz | 16 MB | 64 MB | RAM | |
Enterprise/FW/IDS IPSec 56 | rsp-jo3sv56i-mz | 16 MB | 64 MB | RAM | ||
Enterprise/FW/IDS IPSec 3DES | rsp-jk2o3sv-mz | 16 MB | 64 MB | RAM | ||
Desktop/IBM Standard Feature Set | Desktop/IBM | rsp-dsv-mz | 16 MB | 64 MB | RAM | |
Desktop/IBM IPSec 56 | rsp-dsv56i-mz | 16 MB | 64 MB | RAM |
Cisco IOS Release 12.1(3a)E supports the following Cisco 7000 family platforms:
Cisco IOS Release 12.1(2)E1supports the following Cisco 7000 family platforms:
Cisco IOS Release 12.1(2)E supports the following Cisco 7000 family platforms:
Cisco IOS Release 12.1(1)E supports the following Cisco 7000 family platforms:
![]() |
Note Cisco IOS Release 12.1(1)E does not support Cisco 7500 series routers. |
A hardware-software compatibility matrix is available on CCO for users with CCO login accounts. Using this matrix, you can search for supported hardware components by entering a Cisco platform and an IOS release number. The hardware-software compatibility matrix tool is available at the following URL:
http://www.cisco.com/cgi-bin/front.x/Support/HWSWmatrix/hwswmatrix.cgi
To determine the version of Cisco IOS software running on your Cisco 7000 family router, log in to the Cisco 7000 family router and enter the show version EXEC command. The following sample show version command output is from a router running a Cisco 7100 series software image with Cisco IOS Release 12.1(3a)E:
router> show version Cisco Internetwork Operating System Software IOS (tm) 7100 Software (C7100-JS56I-MZ), Version 12.1(3a)E, RELEASE SOFTWARE
For general information about upgrading to a new software release, see UCisco IOS Upgrade Ordering Instructions located at:
http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/957_pp.htm
The Cisco IOS software is packaged in feature sets consisting of software imagesdepending on the platform. Each feature set contains a specific set of Cisco IOS features.
Cisco IOS Release 12.1(3a)E supports the same feature sets as Cisco IOS Release 12.1(3a)T, but Cisco IOS Release 12.1(3a)E can include new features supported by the Cisco 7000 family.
![]() |
Caution Cisco IOS images with strong encryption (including, but not limited to 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, purchaser/user or the user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com. |
![]() |
Note Cisco IOS Release 12.1(1)E supports only Cisco 7100 series and Cisco 7200 series images. |
Table 7 through Table 9 list the feature sets for Cisco 7100 series routers. Table 10 through Table 13 list the feature sets for Cisco 7200 series routers. Table 14 through Table 16 list the feature sets for Cisco 7500 series routers.
The tables use the following conventions:
![]() |
Note These tables might not be cumulative or list all the features in each image. You can find the most current Cisco IOS documentation on CCO. These electronic documents may contain updates and modifications made after the hardcopy documents were printed. |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| IP | IP IPSec 56 | IP IPSec 3DES | IP/FW/IDS | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| IP/FW/IDS IPSec 56 | IP/FW/IDS IPSec 3DES | Enterprise | Enterprise IPSec 56 | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| Enterprise IPSec 3DES | Enterprise/ FW/IDS | Enterprise/ FW/IDS IPSec 56 | Enterprise/ FW/IDS IPSec 3DES | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| IP | IP IPSec 56 | IP IPSec 3DES | IP/FW/IDS | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
SLB Enhancements | (2) | Yes | Yes | Yes | Yes |
SLB Enhancements | (3a) | Yes | Yes | Yes | Yes |
| Management | |||||
Turbo Access Control Lists | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
LANE QoS | (2) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| IP/FW/IDS IPSec 56 | IP/FW/IDS IPSec 3DES | Enterprise | Enterprise IPSec 56 | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
SLB Enhancements | (2) | Yes | Yes | Yes | Yes |
SLB Enhancements | (3a) | Yes | Yes | Yes | Yes |
| Management | |||||
Turbo Access Control Lists | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
LANE QoS | (2) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| Enterprise IPSec 3DES | Enterprise/FW/ IDS | Enterprise/ FW/IDS IPSec 56 | Enterprise/FW/IDS IPSec 3DES | ||
| IP Routing | |||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes |
SLB Enhancements | (2) | Yes | Yes | Yes | Yes |
SLB Enhancements | (3a) | Yes | Yes | Yes | Yes |
| Management | |||||
Turbo Access Control Lists | (1) | Yes | Yes | Yes | Yes |
| Quality of Service | |||||
LANE QoS | (2) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | ||||
|---|---|---|---|---|---|---|
| Desktop/IBM | Desktop/IBM IPSec 56 | Desktop/ IBM/FW/IDS | Desktop/IBM/FW/IDS IPSec 56 | Desktop/IBM/FW/IDS IPSec 3DES | ||
| IP Routing | ||||||
IOS SLB Enhancements | (1) | Yes | Yes | Yes | Yes | Yes |
SLB Enhancements | (2) | Yes | Yes | Yes | Yes | Yes |
SLB Enhancements | (3a) | Yes | Yes | Yes | Yes | Yes |
| Management | ||||||
Turbo Access Control Lists | (1) | Yes | Yes | Yes | Yes | Yes |
| Quality of Service | ||||||
LANE QoS | (2) | Yes | Yes | Yes | Yes | Yes |
NBAR Enhancements | (1) | Yes | Yes | Yes | Yes | Yes |
NBAR Enhancements | (2) | Yes | Yes | Yes | Yes | Yes |
QDM 1.0 Support | (1) | Yes | Yes | Yes | Yes | Yes |
QDM 1.1 Support | (2) | Yes | Yes | Yes | Yes | Yes |
QDM 1.2 Support | (3a) | Yes | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | ||||
|---|---|---|---|---|---|---|
| IP | IP IPSec 56 | IP IPSec 3DES | IP/FW/IDS | IP/FW/IDS IPSec 56 | ||
| Quality of Service | ||||||
LANE QoS | (2) | Yes | Yes | Yes | Yes | Yes |
Low Latency Queuing for the VIP Enhancement | (2) | Yes | Yes | Yes | Yes | Yes |
QDM 1.0 Support for Cisco 7500 Series | (E2) | Yes | No | No | Yes | No |
QDM 1.1 Support | (2) | Yes | No | No | Yes | No |
QDM 1.2 Support | (3a) | Yes | No | No | Yes | No |
VIP-Based FRF .11/12 | (2) | Yes | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | ||||
|---|---|---|---|---|---|---|
| IP/FW/IDS IPSec 3DES | Enterprise | Enterprise IPSec 56 | Enterprise IPSec 3DES | Enterprise/ FW/IDS | ||
| Quality of Service | ||||||
LANE QoS | (2) | Yes | Yes | Yes | Yes | Yes |
Low Latency Queuing for the VIP Enhancement | (2) | Yes | Yes | Yes | Yes | Yes |
QDM 1.0 Support for Cisco 7500 Series | (E2) | No | Yes | No | No | Yes |
QDM 1.1 Support | (2) | No | Yes | No | No | Yes |
QDM 1.2 Support | (3a) | No | Yes | No | No | Yes |
VIP-Based FRF .11/12 | (2) | Yes | Yes | Yes | Yes | Yes |
| Features | In | Software Images by Feature Sets | |||
|---|---|---|---|---|---|
| Enterprise/FW/ IDS IPSec 56 | Enterprise/FW/ IDS IPSec 3DES | Desktop/ IBM | Desktop/IBM IPSec 56 | ||
| Quality of Service | |||||
LANE QoS | (2) | Yes | Yes | Yes | Yes |
Low Latency Queuing for the VIP Enhancement | (2) | Yes | Yes | Yes | Yes |
QDM 1.0 Support for Cisco 7500 Series | (E2) | No | No | Yes | No |
QDM 1.1 Support | (2) | No | No | Yes | No |
QDM 1.2 Support | (3a) | No | No | Yes | No |
VIP-Based FRF .11/12 | (2) | Yes | Yes | Yes | Yes |
The following sections list the new hardware and software features supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(3a)E.
All features in Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1 E.
For a list of features for Cisco IOS Release 12.0(7)XE1, see the Release Notes for Cisco 7000 Family for Cisco IOS Releases 12.0(5)XE Through 12.0(7)XE1 .
All features in Release 12.1(1) are also in Release 12.1(2)E. For a list of features for Release 12.1(1), see the Cross-Platform Release Notes for Cisco IOS Release 12.1 .
The following new software feature is supported by Cisco IOS Release 12.1(3a)E:
Platforms: Cisco 7100 series, Cisco 7200 series, and VIP-enabled 7500 series routers
QDM is a web-based Java application through which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.
QDM 1.2 is available as a separate product download and is free of charge.
For more information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.2 on CCO and the Documentation CD-ROM.
Platforms: Cisco 7200 series routers
Server Load Balancing now supports ping probes, in addition to HTTP probes. Probes are a simple way to verify connectivity for devices being server load-balanced, for firewalls being firewall load-balanced, and even devices on the other side of a firewall.
Firewall load balancing enables IOS SLB to balance flows to firewalls regardless of whether or not any server load balancing is used. Firewall load balancing uses a load balancing device on each side of a group of firewalls (called a firewall farm) to ensure that the traffic for each related flow goes to the same firewall ensuring that the security policy is not compromised.
The following new hardware features are supported by Cisco IOS Release 12.1(3a)E:
Platform: Cisco 7200 series routers
The Cisco 7200-I/O-GE+E is an Input/Output controller that provides one Gigabit Ethernet and one Ethernet port. It is equipped with a GBIC receptacle for 1000 megabits per second (Mbps) operation and an RJ-45 receptacle for 10 Mbps operation.
The Cisco 7200-I/O-2FE/E is an Input/Output controller that provides two autosensing Ethernet or Fast Ethernet ports and two RJ-45 receptacles for 10/100 Mbps operation.
I/O controllers support the following features:
Platform: Cisco 7500 series routers
The Enhanced Gigabit Ethernet Interface Processor (GEIP+) dual wide port adapter provides enhanced data throughput compared to the GEIP for high density environments.
Gigabit Ethernet (GE) continues to be the choice media for both Enterprise backbone and ISP intra-POP interconnects. The GEIP+ supplies the high-throughput solution for integrating Cisco 7500 series routers into GE infrastructures. The GEIP+ supports the following features:
Platform: Cisco 7200 series routers
NPE-400 is a new version of network processing engine for Cisco 7200 series routers with the following enhancements:
The NPE-400 leverages technology from the NPE-225 and NSE-1 to provide a higher performance NPE card.
Platforms: Cisco 7200 series and Cisco 7500 series routers
The PA-A3-OC12 port adaptor is a standards-based SONET/SDH OC12c/STM-4 622.08 Mbps ATM Port Adapter for the VIP4 in Cisco 7500 series routers or the NPE-300 in Cisco 7200 VXR series routers. The PA-A3-OC12 port adapter is a high-speed ATM uplink for connectivity from the Cisco 7500 series and Cisco 7200 series routers to any ATM switch including the Cisco LightStream 1010, Cisco 8500 and StrataCom BPX.
The ATM PA-A3-OC12 is designed with a high-performance, dual segmentation and reassembly (SAR) architecture with local buffer memory. The ATM PA-A3 supports the latest ATM hardware features such as per-virtual connection (VC) traffic shaping and Virtual Path (VP) traffic shaping, support for ATM service classes such as non-real-time variable bit rate (nrt-VBR) and unspecified bit rate (UBR), and support of 4096 ATM VCs.
The primary applications of the PA-A3-OC12 are:
The PA-A3-OC12 supports the following features:
Platforms: Cisco 7500 series routers
The VIP4 is the fourth generation of Versatile Interface Processors for use with Cisco 7000 series routers using the Cisco 7000 Series Route Switch Processor (RSP7000) and 7000 Series Chassis Interface (RSP7000CI) and with Cisco 7500 series routers (which also include the Cisco 7507-MX and Cisco 7513-MX routers). The VIP4 installs in the interface processor slots in your Cisco 7000 series or Cisco 7500 series router.
For more information see the data sheet located on CCO at: http://www.cisco.com/warp/public/cc/pd/ifaa/ifsw/vrifpz/prodlit/vip4_ds.htm
For VIP4 installation and configuration information see the VIP4 Installation and Configuration guide located on CCO at:
http://www.cisco.com/univercd/cc/td/doc/product/core/cis7505/vip1/vip4/
Cisco IOS Release 12.1(2)E1 does not include support for any new software or hardware features. Cisco IOS Release 12.1(2)E1 incorporates fixes for the following caveats:
For more information, see the "Caveats" section.
The following new software features are supported by Cisco IOS Release 12.1(2)E:
The Class-Based Quality of Service Management Information Base (Class-Based QoS MIB) provides read access to QoS configurations. This MIB also provides QoS statistics information based on the Modular QoS CLI, including information regarding class map and policy map parameters.
This Class-Based QoS MIB is actually two MIBs: CISCO-CLASS-BASED-QOS-MIB and CISCO-CLASS-BASED-QOS-CAPABILITY-MIB.
Use the Cisco Network Management Toolkit for MIBs tool on CCO to locate MIBs.
Platforms: Cisco 7200 series and Cisco 7500 series routers
Currently, LANE QoS supports the creation of Unspecified Bit Rate+ (UBR+) VCCs. A UBR+ VCC is a UBR VCC for which the minimum cell rate (MCR) is guaranteed by the switch. If the switch cannot guarantee the rate you have specified for the UBR+ VCC, the LEC will revert to UBR with no MCR guarantee.
You can enable or disable the LANE QoS feature on a per LEC basis by entering the qos option in the lane client command. The same emulated LAN (ELAN) can contain both QoS-capable and non-QoS-capable LECs.
Platform: Cisco 7500 series routers
The optional bytes argument has been added to the priority command.
For more information on Low Latency Queuing for the VIP, including information on the bytes argument in the priority command, see the Low Latency Queuing for the Versatile Interface Processor document on CCO and the Documentation CD-ROM.
Platforms: Cisco 7100 series and Cisco 7200 series routers
Network-Based Application Recognition (NBAR) has added the following enhancements for Cisco IOS Release 12.1(2)E:
Platforms: Cisco 7100 series, Cisco 7200 series, and VIP-enabled 7500 series routers
Cisco IOS Release 12.1(2)E supports Cisco Quality of Service Device Manager (QDM) 1.1. QDM is a web-based Java application with which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.
QDM 1.1 is available as a separate product download and is free of charge.
For information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM.
Platform: Cisco 7200 series routers
The Cisco IOS Server Load Balancing (SLB) feature contains the following enhancements in Cisco IOS Release 12.1(2)E:
Client NAT
If multiple load balancing devices are used, replacing the client IP address with an IP address associated with the load balancer will result in proper routing of outbound traffic to the correct load balancer. Client NAT also requires that the ephemeral client port be modified since many clients can use the same ephemeral port. This is important so that server NAT can be performed on the packet and important protocol events (such as TCP SYN, FIN, or RST) are seen by the load balancer connection finite state machine. Even in cases where multiple load balancers are not used, client NAT can be useful to insure that packets from load-balanced connections are not routed around the load balancer.
![]() |
Note The same connection supports server NAT and client NAT. |
HTTP Probe
HTTP probe provides a simple way to monitor the applications being load balanced. With frequent probes, operation of the application is verified, not just connectivity to the application. The basic function of HTTP probe is to determine the real server status by issuing an HTTP GET or HTTP POST against each real server in a server farm.
Since multiple virtual servers could use a single server farm, all virtual servers tied to that server farm are probed, and if a real server failed for one virtual server, it must be failed for all virtual servers using that real server. If multiple probes detect the failure of a real server, all virtual servers must agree that the real server is recovered before that real server is restored to inservice.
Currently only one probe per server farm is allowed.
Stateful Backup
An IOS SLB could represent a point of failure and the servers could lose their connections to the backbone if power fails, or if a link from a switch to the distribution-layer switch is disconnected. IOS SLB supports two redundancy options you can use to reduce that risk: Hot Standby Router Protocol (HSRP) and stateful backup. Stateful backup enables SLB to incrementally backup its load balancing decisions, or "keep state," between primary and backup Layer 3 switches.
MIB Support of SLB
The CISCO-SLB-MIB now supports the SLB feature.
Platform: Cisco 7500 series routers
The Voice over Frame Relay (VoFR) capabilities that were introduced on the Cisco MC3810 multiservice access concentrator beginning with Cisco IOS Release 11.3 were eventually extended to the Cisco 2600 series, 3600 series, and 7200 series router platforms. These capabilities are now available for Cisco 7500 series routers (with a VIP).
When VoFR is configured on a Cisco router, the router is able to carry voice traffic such as telephone calls and faxes over a Frame Relay network.
The Cisco implementation of Voice over Frame Relay provides the following benefits to existing Frame Relay networks:
For more information see the Versatile Interface Processor-Based FRF.11 and FRF.12 feature module.
Cisco IOS Release 12.1(1)E3 does not include support for any new software or hardware features. Cisco IOS Release 12.1(1)E3 incorporates fixes for the following caveats:
For more information, see the "Caveats" section.
The following new software feature is supported by Cisco IOS Release 12.1(1)E2:
Platform: Cisco 7500 series routers
Cisco IOS Release 12.1(1)E2 supports Cisco Quality of Service Device Manager (QDM) 1.0 on Cisco 7500 series routers. QDM is a web-based Java application through which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.
QDM 1.0 is available as a separate product download and is free of charge.
For more information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM.
The following new hardware features are supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(1)E:
Platform: Cisco 7200 VXR series routers
Cisco IOS Release 12.1(1)E supports the network services engine (NSE-1) hardware.
The NSE-1 maintains and executes the system management functions for Cisco 7200 VXR series routers. The NSE-1 also shares system memory and environmental monitoring functions with the I/O controller. Its performance is greater than that of the network processing engines because of the secondary Parallel eXpress Forwarding (PXF) processor. The PXF processor enables parallel IP multipacket processing functions, working with the primary processor to provide accelerated packet switching as well as accelerated IP Layer 3 feature processing.
Platform: Cisco 7100 series and Cisco 7200 series routers
The Integrated Service Adapter (ISA) is a single-width service adapter that provides high-performance, hardware-assisted tunneling and encryption services suitable for Virtual Private Network (VPN) remote access, site-to-site intranet, and extranet applications, as well as platform scalability and security while working with all services necessary for successful VPN deploymentssecurity, quality of service (QoS), firewall and intrusion detection, and service-level validation and management.
The ISA off-loads IPSec and Microsoft Point-to-Point Encryption (MPPE) processing from the main processor of Cisco 7200 series routers, thus freeing resources on the processing engine (that is, the network processing engine [NPE] on the Cisco 7200 series routers) for other tasks.
The ISA provides hardware-accelerated support for multiple encryption functions:
For additional information on the Integrated Service Adapter, see the ISA and ISM Installation and Configuration guide on CCO and the Documentation CD-ROM.
The following new software features are supported by the Cisco 7000 family of routers for Cisco IOS Release 12.1(1) E:
Platform: Cisco 7200 series routers
IOS Server Load Balancing (SLB) is now capable of performing Network Address Translation (NAT) of the server IP address for SLB connections. For packets sourced by a client, SLB can translate the virtual server IP address to the real server IP address. For packets sourced by a server, SLB can translate the real server IP address to the virtual IP address, provided a matching SLB connection exists in the SLB connection database.
To enable server NAT, enter the nat server command.
To promote high availability, a backup SLB device can take over the SLB function in the event of a failure on the primary SLB device. SLB performs this function by monitoring Hot Standby Routing Protocol (HSRP) state changes and linking the service state of an SLB server to the HSRP state.
To enable SLB Stateless Redundancy, use the inservice standby command.
For additional information on the IOS Server Load Balancing feature, including information on Server Network Address Translation and Server Load Balancing Stateless Redundancy, see the IOS Server Load Balancing feature module on CCO and the Documentation CD-ROM.
Platforms: Cisco 7100 series, Cisco 7200 series, and Cisco 7500 series routers
The interface range configuration mode allows you to configure multiple interfaces with the same configuration parameters. Once you enter the interface range configuration mode, all command parameters you enter are attributed to all interfaces within that range until you exit out of the interface range configuration mode.
The interface range command mode has the following syntax:
interface range {vlan vlan_ID - vlan_ID} | {{ethernet | fastethernet | gigabitethernet | macro macro_name} slot/interface - interface} [, {{ethernet | fastethernet | gigabitethernet | macro macro_name} slot/interface - interface}]
Platforms: Cisco 7100 series and Cisco 7200 series routers
Network-Based Application Recognition (NBAR) can now perform subport classification of HTTP traffic by HOST name. You can classify HTTP traffic by web server names. To perform a match on the hostname portion of the URL, use the new HOST matching criteria.
For additional information on the NBAR enhancements, see the Network -Based Application Recognition Enhancements feature module.
For additional information on NBAR, see the Network - Based Application Recognition feature module.
Platforms: Cisco 7100 series and Cisco 7200 series routers
Cisco IOS Release 12.1(1)E supports Cisco Quality of Service Device Manager (QDM) 1.0. QDM is a web-based Java application with which you can configure and monitor advanced IP-based quality of service (QoS) functionality within Cisco routers.
QDM 1.0 is available as a separate product download and is free of charge.
For information on QDM, see the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM.
Platform: Cisco 7200 series routers
Access control lists (ACLs) are normally searched sequentially to find a matching rule, and ACLs are ordered specifically to take this factor into account. Because of the increasing needs and requirements for security filtering and packet classification, ACLs can expand to the point that searching the ACL adds a significant amount of time and memory when packets are being forwarded. Moreover, the time taken by the router to search the list is not always consistent, adding a variable latency to the packet forwarding. A high CPU load is necessary for searching an ACL with several entries.
If you have an account with CCO, you can find the current list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, Log in to CCO and click Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIBs.
Old Cisco Management Information Bases (MIBs) will be replaced in a future release. Currently, OLD-CISCO-* MIBs are being converted into more scalable MIBswithout affecting existing Cisco IOS products or NMS applications. You can update from deprecated MIBs to the replacement MIBs as shown in Table 17.
| Deprecated MIB | Replacement |
|---|---|
OLD-CISCO-APPLETALK-MIB | RFC1243-MIB |
OLD-CISCO-CHASSIS-MIB | ENTITY-MIB |
OLD-CISCO-CPUK-MIB | To be decided |
OLD-CISCO-DECNET-MIB | To be decided |
OLD-CISCO-ENV-MIB | CISCO-ENVMON-MIB |
OLD-CISCO-FLASH-MIB | CISCO-FLASH-MIB |
OLD-CISCO-INTERFACES-MIB | IF-MIB CISCO-QUEUE-MIB |
OLD-CISCO-IP-MIB | To be decided |
OLD-CISCO-MEMORY-MIB | CISCO-MEMORY-POOL-MIB |
OLD-CISCO-NOVELL-MIB | NOVELL-IPX-MIB |
OLD-CISCO-SYS-MIB | (Compilation of other OLD* MIBs) |
OLD-CISCO-SYSTEM-MIB | CISCO-CONFIG-COPY-MIB |
OLD-CISCO-TCP-MIB | CISCO-TCP-MIB |
OLD-CISCO-TS-MIB | To be decided |
OLD-CISCO-VINES-MIB | CISCO-VINES-MIB |
OLD-CISCO-XNS-MIB | To be decided |
Cisco IOS Release 12.1(2)E crypto images for Cisco 7100 series routers have been deferred to Cisco IOS Release 12.1(2)E1 due to the following caveats:
Cisco IOS Release 12.1(2)E non-crypto images for Cisco 7500 series routers have been deferred to Cisco IOS Release 12.1(2)E1 due to the following caveat:
![]() |
Note Disclaimer: If you wish to avoid risk of having your system affected by the above-identified defects, you may replace it with the replacement image described above. If you do so, the same licenses, terms and conditions that governed your rights and obligations, and those of Cisco, with respect to the deferred image shall govern them with respect to the replacement image. If, on the other hand, you decide not to replace the deferred image, you proceed at your own risk. Manufacturing is discontinuing shipment of IOS affected and, instead, will ship Software Solution. |
Cisco IOS Software Release 12.1(1)E did not release Cisco 7500 series images (rsp-*-mz). Cisco IOS Software Release 12.1(1)E2 is the first 12.1 E release that supports the Cisco 7500 series images.
Cisco IOS Software Release 12.1(1)E2 also has integrated other software repairs. Other defect repairs integrated into 12.1(1)E2 are listed in the "Caveats" section.
Cisco IOS Software Release 12.1(1)E2 is built from 12.1(1)E plus integrated defects solutions integrated.
![]() |
Note Cisco IOS Software Release 12.1(1)E1 was not released. |
For more information on Cisco IOS Release 12.1(2)E2, refer to the Field Notice located at the following URL:
http://www.cisco.com/warp/public/770/fn12256.shtml
or, for registered Cisco customers:
http://www.cisco.com/warp/customer/770/fn12256.shtml
Cisco IOS Release 12.1(1)E boot images for Cisco 7200 series routers have been deferred due to the following caveat:
CSCdm85656Reduce size of boot helper image c7200-boot-mz
Cisco IOS Release 12.1(1)E for the 7200 boot images (c7200-boot-mz-*) have outgrown the Flash SIMM used to store the boot image on the input/output controllers used in the Cisco 7200 series routers. The c7200-boot-mz image in 12.1(1)E will be replaced with the 12.0(10)S c7200-boot-mz image which is available on CCO.
For more information about this deferral, refer to the Field Notice located at the following URL:
http://www.cisco.com/warp/customer/770/fn7771.shtml
or on CCO at:
Service & Support: Technical Assistance Center: Documents: Field Notices
Cisco IOS Release 12.1(1)E did not support Cisco 7500 series routers. Cisco IOS Release 12.1(1)E2 supports Cisco 7500 series routers. Cisco IOS Release 12.1(1)E2 is the first 12.1 E release to support the Cisco 7500 series routers.
Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.
This section only contains open and resolved caveats for the current Cisco IOS maintenance release.
All caveats in Cisco IOS Release 12.1(3a) and Cisco IOS Release 12.1(3a)T are also in Cisco IOS Release 12.1(3a)E. All caveats in Cisco IOS Release 12.0(7)XE1 are also in Cisco IOS Release 12.1 E.
For information on caveats in Cisco IOS Release 12.1(3a), see the C aveats for Cisco IOS Release 12.1 document.
For information on Caveats in Cisco IOS Release 12.1(3a) T, see the Caveats for Cisco IOS Release 12.1 T document, which lists severity 1 and 2 caveats and is located on CCO and the Documentation CD-ROM.
For information on caveats in Cisco IOS Release 12.0(7)XE1, see the Release Notes for Cisco 7000 Family for Cisco I OS Releases 12.0(5)XE Through 12.0(7)XE .
![]() |
Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco IOS Bug Navigator II. Another option is to go to http://www.cisco.com/support/bugtools. |
| DDS Number | Software Release | |
|---|---|---|
| 12.1(1)E, 12.1(1)E2, 12.1(1)E3, 12.1(2)E, 12.1(2)E1, 12.1(3a)E | ||
| Caveat Corrected | Caveat | |
CSCdk89999 |
| X |
CSCdp55077 | X |
|
CSCdp63587 | X |
|
CSCdp69004 | X |
|
CSCdp72853 | X |
|
CSCdp87670 | X |
|
CSCdp88204 | X |
|
CSCdp93974 | X |
|
CSCdr00694 | X |
|
CSCdr00992 | X |
|
CSCdr01079 | X |
|
CSCdr03335 | X |
|
CSCdr03956 | X |
|
CSCdr05739 | X |
|
CSCdr05753 | X |
|
CSCdr05792 | X |
|
CSCdr16037 |
| X |
CSCdr16140 | X |
|
CSCdr17845 | X |
|
CSCdr18877 | X |
|
CSCdr21722 | X |
|
CSCdr21741 |
| X |
CSCdr22445 | X |
|
CSCdr23048 |
| X |
CSCdr24768 | X |
|
CSCdr26790 | X |
|
CSCdr27548 | X |
|
CSCdr30005 |
| X |
CSCdr31689 | X |
|
CSCdr35921 |
| X |
CSCdr39347 |
| X |
CSCdr41538 | X |
|
CSCdr46040 |
| X |
CSCdr47272 |
| X |
CSCdr47479 |
| X |
CSCdr48014 | X |
|
CSCdr48086 |
| X |
CSCdr53584 | X |
|
CSCdr57666 |
| X |
CSCdr57765 | X |
|
CSCdr59095 | X |
|
CSCdr59145 | X |
|
CSCdr60100 |
| X |
CSCdr60615 | X |
|
CSCdr61042 | X |
|
CSCdr61978 |
| X |
CSCdr62563 |
| X |
CSCdr63170 |
| X |
CSCdr63849 | X |
|
CSCdr64674 | X |
|
CSCdr65385 | X |
|
CSCdr66660 |
| X |
CSCdr66732 | X |
|
CSCdr68057 |
| X |
CSCdr72554 | X |
|
CSCdr75209 | X |
|
CSCdr80412 |
| X |
CSCdr98687 | X |
|
CSCdr98695 |
| X |
CSCds05010 |
| X |
CSCds06201 |
| X |
CSCds06831 | X |
|
CSCds08137 |
| X |
CSCds10977 |
| X |
CSCds11591 |
| X |
CSCds12643 |
| X |
CSCds13296 |
| X |
CSCds13774 |
| X |
CSCds13854 |
| X |
CSCds15182 |
| X |
CSCds16120 | X |
|
CSCds19846 |
| X |
This section describes unexpected behavior by Cisco IOS Release 12.1(3a)E and describes only severity 1 and 2 caveats.
6d13h: CRYPTO_ENGINE: could not allocate pak
ISAcard: an error coming back 1510
All caveats listed in this section are resolved in Cisco IOS Release 12.1(3a)E.
%ALIGN-1-FATAL: Corrupted program counter pc=0x61B2D514, ra=0x61B2D50C, sp=0x61A64A18
ISAcard:an error coming back 1CFF
%CRYPTO-4-RECVD_PKT_INV_IDENTITY: identity doesn't match negotiated identity
![]() |
Note For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(2)E, see the "Caveats" section of the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM. |
A Cisco 7206VXR router running Cisco IOS Release 12.1(1)E may reboot with a bus error.There is no workaround.
All caveats listed in this section are resolved in Cisco IOS Release 12.1(2)E1.
%ALIGN-1-FATAL: Illegal access to a low address addr=0x8, pc=0x602D6D40, ra=0x602D6D5C, sp=0x61940C38
policy-map fr-pvc class class-default shape average <cir> service-policy llq-policy
policy-map fr-pvc class class-default shape average <cir> queue-limit <n> service-policy llq-policy
![]() |
Note For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(2)E1, see the "Caveats" section of the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM. |
All caveats listed in this section are resolved in Cisco IOS Release 12.1(2)E.
![]() |
Note For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(1)E3, see the "Caveats" section of the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM. |
All the caveats listed in this section are resolved in Cisco IOS Release 12.1(1)E3:
![]() |
Note For a list of open and resolved caveats for QDM 1.0 Support for Cisco IOS Release 12.1(1)E2, see the "Caveats" section of the Release and Installation Notes for Cisco Quality of Service Device Manager 1.0 on CCO and the Documentation CD-ROM. |
The following sections describe the documentation available for the Cisco 7000 family of routers. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on CCO and the Documentation CD-ROM.
Use these release notes with these documents:
The following documents are specific to Release 12.1 and are located on CCO and the Documentation CD-ROM:
![]() |
Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, Log in to CCO and click Software Center: Cisco IOS Software: Cisco IOS Bug Navigator II. Another option is to go to http://www.cisco.com/support/bugtools. |
These documents are available for the Cisco 7000 family of routers on CCO and the Documentation CD-ROM:
On CCO at:
Technical Documents: Documentation Home Page: Core/High-End Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Core/High-End Routers
Feature modules describe new features supported by Release 12.1 E and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation: New Features in 12.1-Based Limited Lifetime Releases: Cisco IOS Release 12.1 E
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation: New Features in 12.1-Based Limited Lifetime Releases: Cisco IOS Release 12.1 E
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are shipped with your order in electronic form on the Documentation CD-ROMunless you specifically ordered the printed versions.
Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
On CCO and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
Table 19 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in electronic form and in printed form if ordered.
![]() |
Note You can find the most current Cisco IOS documentation on CCO and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed. |
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1
| Books | Major Topics |
|---|---|
| Configuration Fundamentals Overview |
| Using Cisco IOS Software |
| Preparing for Dial Access |
| Interface Configuration Overview |
| IP Addressing and Services |
| AppleTalk and Novell IPX Overview |
| Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Overview |
| Multiservice Applications Overview |
| Quality of Service Overview |
| Security Overview |
| Cisco IOS Switching Services Overview |
| Wide-Area Networking Overview |
|
|
You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.
Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.
Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
You can access CCO in the following ways:
You can e-mail questions about using CCO to cco-team@cisco.com.
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
To contact by e-mail, use one of the following:
Language | E-mail Address |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
If you have a CCO login account, you can access the following URL, which contains links and tips on configuring your Cisco products:
http://www.cisco.com/kobayashi/technotes/serv_tips.shtml
This URL is subject to change without notice. If it changes, point your Web browser to CCO and click on this path: Service & Support: Technical Assistance Center: Technical Tips. You must have a CCO account to access this link.
The following sections are provided from the Technical Tips page:
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate and value your comments.

![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Sep 15 17:45:34 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.