|
|
These release notes describe new features and significant software components for the Cisco 800 Series Routers that support Cisco IOS Release Release 12.1(3)XG. These release notes are updated as needed to describe new memory requirements, new features, new hardware support, software platform deferrals, microcode or modem code changes, related document changes, and any other important changes. Use these release notes with the C ross-Platform Release Notes for Cisco IOS Release 12.1 located on CCO and the Documentation CD-ROM.
For a list of the software caveats that apply to Release 12.1(3)XG, refer to the section "Caveats" and to the online Caveats for Cisco IOS Release 12.1 T document. The caveats document is updated for every 12.1 T maintenance release and is located on Cisco Connection Online (CCO) and the Documentation CD-ROM.
These release notes discuss the following topics:
This section describes the system requirements for Release 12.1(3)XG and includes the following sections:
This section describes the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.1(3)XG on the Cisco 800 Series Routers.
| Platforms | Image Name | Image | Required Flash Memory | Required DRAM Memory | Runs From |
|---|---|---|---|---|---|
Cisco 801-804 routers
| Cisco 800 Series IOS IP | c800-y6-mw | 8 MB | 4 MB | RAM |
Cisco 800 Series IOS IP Plus | c800-sy6-mw | 8 MB | 8 MB | RAM | |
Cisco 800 Series IOS IP/FW | c800-oy6-mw | 8 MB | 4 MB | RAM | |
Cisco 800 Series IOS IP/FW Plus IPSec 56 | c800-osy656i-mw | 8 MB | 12 MB | RAM | |
| Cisco 800 Series IOS IP/IPX Plus | c800-nsy6-mw | 8 MB | 8 MB | RAM |
| Cisco 800 Series IOS IP/IPX/FW Plus IPSec 56 | c800-nosy656i-mw | 8 MB | 12 MB | RAM |
| Cisco 800 Series IOS IP/FW Plus IPSec 3DES | c800-k2osy6-mw | 8 MB | 12 MB | RAM |
| Cisco 800 Series IOS IP/IPX/FW Plus IPSec 3DES | c800-k2nosy6-mw | 8 MB | 12 MB | RAM |
Cisco 805 routers
| Cisco 805 Series IOS IP | c805-y6-mw | 4 MB | 8 MB | RAM |
Cisco 805 Series IOS IP Plus | c805-sy6-mw | 4 MB | 8 MB | RAM | |
Cisco 805 Series IOS IP/FW | c805-oy6-mw | 4 MB | 8 MB | RAM | |
Cisco 805 Series IOS IP/FW Plus IPSec 56 | c805-osy656i-mw | 8 MB | 12 MB | RAM | |
| Cisco 805 Series IOS IP/IPX Plus | c805-nsy6-mw | 8 MB | 8 MB | RAM |
| Cisco 805 Series IOS IP/IPX/FW Plus IPSec 56 | c805-nosy656i-mw | 8 MB | 12 MB | RAM |
Cisco 805 routers (continued) | Cisco 805 Series IOS IP/FW Plus IPSec 3DES | c805-k2osy6-mw | 8 MB | 12 MB | RAM |
Cisco 805 Series IOS IP/IPX/FW Plus IPSec 3DES | c805-k2nosy6-mw | 8 MB | 12 MB | RAM | |
Cisco 827 and | Cisco 820 Series IOS IP | c820-y6-mz | 8 MB | 16 MB | RAM |
Cisco 820 Series IOS IP/Voice | c820-v6y6-mz | 8 MB | 24 MB | RAM | |
Cisco 820 Series IOS IP/FW Plus IPSec 56 | c820-osy656i-mz | 8 MB | 16 MB | RAM | |
| Cisco 820 Series IOS IP/FW/Voice Plus IPSec 56 | c820-osv6y656i-mz | 8 MB | 24 MB | RAM |
| Cisco 820 Series IOS IP/IPX/Voice Plus | c820-nsv6y6-mz | 8 MB | 24 MB | RAM |
| Cisco 820 Series IOS IP/FW Plus IPSec 3DES | c820-k2osy6-mz | 8 MB | 24 MB | RAM |
| Cisco 820 Series IOS IP/IPX/FW Plus IPSec 3DES | c820-k2nosy6-mz | 8 MB | 24 MB | RAM |
| Cisco 820 Series IOS IP/FW/Voice Plus IPSec 3DES | c820-k2nosv6y6-mz | 8 MB | 24 MB | RAM |
Cisco IOS Release 12.1(3)XG supports the following Cisco 800 series routers:
For detailed descriptions of new hardware features, see New and Changed Information.
The Cisco 801-804 routers provide the following key hardware features:
![]() |
Note To add additional Flash memory to the Cisco 801-804, you will remove the existing Flash card and install a the new one. |
The Cisco 805 router connects small professional offices over serial lines to corporate networks and to the Internet. Table 2 summarizes Cisco 805 router ports.
| Port Type | Description |
|---|---|
Ethernet Port | One 10BaseT (RJ-45) |
Serial Port | One WAN interface (RS-232, RS-449, RS-530 and RS-530A, V.35, and X.21) |
Console Port | RJ-45 |
The Cisco 805 router provides the following key features:
The Cisco 827 and Cisco 827-4V Series Routers provide the following key hardware features:
| Router | Ethernet Ports | ADSL Ports | Telephone Ports | Console Ports |
|---|---|---|---|---|
Cisco 827 | One 10BaseT (RJ-45) | RJ-45 | - | RJ-45 |
Cisco 827-4V | One 10BaseT (RJ-45) | RJ-45 | Four (RJ-11) | RJ-45 |
To determine the version of Cisco IOS software currently running on your Cisco 800 series router, log in to the router and enter the show version EXEC command. The following sample output from the show version command indicates the version number on the second output line:
router> show version Cisco Internetwork Operating System Software IOS (tm) 800 Software (c800-y6-mw), Version 12.1(2)XF, RELEASE SOFTWARE
Additional command output lines include more information, such as processor revision numbers, memory amounts, hardware IDs, and partition information.
For information about upgrading to a new software release, refer to the Cisco IOS Upgrade Ordering Instructions product bulletin located at the following URL: http://www.cisco.com/warp/public/cc/cisco/mkt/ios/prodlit/957_pp.htm.
Alternatively, the Cisco IOS Software page on CCO has a variety of information, including upgrade information, organized by release. If you have a CCO account and log in, you can go directly to: http://www.cisco.com/kobayashi/sw-center/sw-ios.shtml.
If you have a CCO account and log in, you can reach the new software release upgrade page by going to www.cisco.com and following this path: Service & Support: Software Center: Cisco IOS Software: Product Bulletins: Software: General System Software Bulletins: Cisco IOS Upgrade Ordering Instructions, No. 957
You can also reach the Cisco IOS Upgrade Planner, which allows you more flexibility to browse for your preferred software, by going to www.cisco.com and following this path: Service & Support: Software Center: IOS Upgrade Planner.
The Cisco IOS software is packaged in feature sets consisting of software imagesdepending on the platform. Each feature set contains a specific set of Cisco IOS features. Release 12.1(3)XG supports the same feature sets as Releases 12.1 and 12.1 T, but Release 12.1(3)XG can include new features supported by the Cisco 800 Series Routers. Table 4 lists the feature sets supported by the Cisco 800 Series Routers.
| Image Name | Feature Set Matrix Terms | Software Image | Platform |
|---|---|---|---|
Cisco 800 Series IOS IP | IP | c800-y6-mw | Cisco 801-804 routers
|
Cisco 800 Series IOS IP Plus | IP, Plus | c800-sy6-mw | |
Cisco 800 Series IOS IP/FW | IP, FW | c800-oy6-mw | |
Cisco 800 Series IOS IP/FW Plus IPSec 56 | IP, FW, Plus, IPSec 56 | c800-osy656i-mw |
|
Cisco 800 Series IOS IP/IPX Plus | IP, IPX, Plus | c800-nsy6-mw |
|
Cisco 800 Series IOS IP/IPX/FW Plus IPSec 56 | IP, IPX, FW, Plus, IPSec 56 | c800-nosy656i-mw |
|
Cisco 800 Series IOS IP/FW Plus IPSec 3DES | IP, FW, Plus, IPSec, 3DES | c800-k2osy6-mw |
|
Cisco 800 Series IOS IP/IPX/FW Plus IPSec 3DES | IP, IPX, FW, Plus, IPSec, 3DES | c800-k2nosy6-mw |
|
Cisco 805 Series IOS IP | IP | c805-y6-mw | Cisco 805 routers
|
Cisco 805 Series IOS IP Plus | IP, Plus | c805-sy6-mw | |
Cisco 805 Series IOS IP/FW | IP, FW | c805-oy6-mw | |
Cisco 805 Series IOS IP/FW Plus IPSec 56 | IP, FW, Plus, IPSec 56 | c805-osy656i-mw |
|
Cisco 805 Series IOS IP/IPX Plus | IP, IPX, Plus | c805-nsy6-mw |
|
Cisco 805 Series IOS IP/IPX/FW Plus IPSec 56 | IP, IPX, FW, Plus, IPSec 56 | c805-nosy656i-mw |
|
Cisco 805 Series IOS IP/FW Plus IPSec 3DES | IP, FW, Plus, IPSec, 3DES | c805-k2osy6-mw |
|
Cisco 805 Series IOS IP/IPX/FW Plus IPSec 3DES | IP, IPX, FW, Plus, IPSec, 3DES | c805-k2nosy6-mw |
|
Cisco 820 Series IOS IP | IP | c820-y6-mz | Cisco 827 and |
Cisco 820 Series IOS IP/Voice | IP, Voice | c820-v6y6-mz | |
Cisco 820 Series IOS IP/FW Plus IPSec 56 | IP, FW, Plus, IPSec 56 | c820-osy656i-mz | |
Cisco 820 Series IOS IP/FW/Voice Plus IPSec 56 | IP, FW, Voice, Plus, IPSec 56 | c820-osv6y656i-mz |
|
Cisco 820 Series IOS IP/IPX/Voice Plus | IP, IPX, Voice, Plus | c820-nsv6y6-mz |
|
Cisco 820 Series IOS IP/FW Plus IPSec 3DES | IP, FW, Plus, IPSec, 3DES | c820-k2osy6-mz |
|
Cisco 820 Series IOS IP/IPX/FW Plus IPSec 3DES | IP, IPX, FW, Plus, IPSec, 3DES | c820-k2nosy6-mz |
|
Cisco 820 Series IOS IP/FW/Voice Plus IPSec 3DES | IP, FW, Voice, Plus, IPSec, 3DES | c820-k2nosv6y6-mz |
|
Table 5 and Table 6 list the features and feature sets supported by the Cisco 801-804 routers in Cisco IOS Release 12.1(3)XG. Table 7 lists the features and feature sets supported by the Cisco 805 routers in Cisco IOS Release 12.1(3)XG. Table 8 lists the features and feature sets supported by the Cisco 827 and Cisco 827-4V routers in Cisco IOS Release 12.1(3)XG.
Each table uses the following conventions:
![]() |
Note These feature set tables only contain a selected list of features. These tables are not cumulativenor do they list all the features in each image. |
| In | Feature Set | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Features | IP | IP/Plus | IP/FW | IP/FW/Plus/ IPSec 56 | IP/IPX/Plus | IP/IPX/ FW/Plus/ IPSec 56 | IP/FW/ Plus/ IPSec/ 3DES | IP/IPX/FW/ Plus/IPSec/ 3DES | |
| Address Conservation |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
| Advanced Telephone Features1 |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | No | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
|
| No | No | No | No | Yes | No | Yes | Yes |
| (3)XG | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| (3)XG | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | No | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | No | Yes | Yes | Yes |
| (3)XG | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Basic Services |
|
|
|
|
|
|
|
|
|
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Dial |
|
|
|
|
|
|
|
|
|
| (2) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Ease of Use and Deployment |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
| IP Routing Protocols |
|
|
|
|
|
|
|
|
|
| (2) | No | No | No | No | No | No | No | No |
| LAN |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | Yes | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Management |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| (3)XG | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | No | Yes | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Routing |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | Yes | Yes | No | Yes |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
| Security |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | No | Yes | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
|
|
|
|
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | No | No |
|
| No | No | No | No | No | No | Yes | Yes |
|
| Yes | Yes | Yes | Yes | No | Yes | No | No |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| WAN |
|
|
|
|
|
|
|
|
|
| (3)XG | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
| WAN Optimization |
|
|
|
|
|
|
|
|
|
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | Yes | Yes | No | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Feature | IP | IP/Plus | IP/FW | IP/FW/ Plus/ IPSec 56 | IP/IPX/Plus | IP/IPX/FW/ Plus/ IPSec 56 | IP/FW/Plus/IPSec/ 3DES | IP/IPX/FW/ Plus/IPSec/3DES |
|---|---|---|---|---|---|---|---|---|
Routed Protocol | IP | IP | IP | IP | IP/IPX | IP | IP | IP/IPX |
Routing Protocol | RIP Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot | RIP/IP- Snapshot
|
Tunneling |
| GRE |
| GRE | GRE | GRE | GRE | GRE |
XXX PAD | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
X.25 over B and D | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
SNTP (Simple Network Time Protocol) | SNTP | SNTP | SNTP | SNTP | SNTP | SNTP | SNTP | SNTP |
Multicast |
| IP Multicast Forwarding |
| IP Multicast Forwarding | IP Multicast Forwarding | IP Multicast Forwarding | IP Multicast Forwarding | IP Multicast Forwarding |
Management | SNMP | SNMP/ | SNMP | SNMP/ | SNMP/ | SNMP/ | SNMP/ | SNMP/ |
Manual ISDN Calls (see reference for commands) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| In | Feature Set | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Features | IP | IP Plus | IP/FW | IP/FW Plus IPSec 56 | IP/IPX Plus | IP/IPX/ FW Plus IPSec 56 | IP/FW Plus IPSec 3DES | IP/IPX/ FW Plus IPSec 3DES | |
| Address Conservation |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | No | Yes | No | No | No |
|
| Yes | Yes | Yes | No | Yes | No | No | No |
|
| No | No | No | No | No | No | No | No |
| Basic Services |
|
|
|
|
|
|
|
|
|
|
| No | Yes | No | No | Yes | No | No | No |
|
| Yes | Yes | Yes | No | Yes | No | No | No |
|
| Yes | Yes | Yes | No | Yes | No | No | No |
| Ease of Use and Deployment |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | No | Yes1 | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| LAN |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | Yes | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Management |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Routing |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | Yes | Yes | No | Yes |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| (3)XG | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Security |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| No | Yes | No | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
|
|
|
|
|
|
|
|
|
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | No | No |
|
| No | No | No | No | No | No | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | Yes | No | Yes | Yes | Yes |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| WAN |
|
|
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | No | Yes | No | No | No |
|
| No | No | No | No | No | No | No | No |
| WAN Optimization |
|
|
|
|
|
|
|
|
|
|
| No | No | No | No | No | No | No | No |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| No | No | No | No | Yes | Yes | No | Yes |
|
| No | No | No | No | No | No | No | No |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| 1The X.25 configuration feature requires the use of the Cisco command line interface (CLI). |
| Feature Sets | ||||||||
|---|---|---|---|---|---|---|---|---|
| Features | IP | IP/ Voice | IP/FW Plus IPSec 56 | IP/FW/ Voice Plus IPSec 56 | IP/IPX/ Voice Plus | IP/FW Plus IPSec 3DES | IP/IPX/ FW Plus IPSec 3DES | IP/FW/ Voice Plus IPSec 3DES |
| Address Conservation |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Bandwidth Optimization |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Business-Class Quality of Service |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Business-Class Security |
|
|
|
|
|
|
|
|
| No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Ease of Use and Deployment |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Enhanced Security |
|
|
|
|
|
|
|
|
| No | No | Yes | Yes | No | Yes | Yes | Yes |
| No | No | Yes | Yes | No | Yes | Yes | Yes |
| No | No | Yes | Yes | No | Yes | Yes | Yes |
| No | No | No | No | No | Yes | Yes | Yes |
| No | No | Yes | Yes | No | Yes | Yes | Yes |
| No | No | Yes | Yes | No | Yes | Yes | Yes |
| LAN |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| No | No | No | No | Yes | No | Yes | No |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Management |
|
|
|
|
|
|
|
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Routing |
|
|
|
|
|
|
|
|
| No | No | Yes | Yes | No | Yes | Yes | No |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| No | No | No | No | Yes | No | Yes | No |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Voice Features (Cisco 827-4V only) |
|
|
|
|
|
|
|
|
| No | Yes | No | Yes | Yes | No | No | Yes |
| No | Yes | No | Yes | Yes | No | No | Yes |
| No | Yes | No | Yes | Yes | No | No | Yes |
| No | Yes | No | Yes | Yes | No | No | Yes |
The following sections list the new hardware and software features supported by the Cisco 800 series for Release 12.1 T:
The following sections list the new software features supported by the Cisco Cisco 800 Series Routers for Release 12.1(3)XG.
Cisco 803 and Cisco 804 routers now support prefix dialing. You can add a telephone prefix and create a prefix filter to the dialed number for analog telephone calls. When a telephone number is dialed through the telephone port, the router checks for prefix filters. If the router finds a match, no prefix is added to the dialed number. If no filter match is found, the router adds the user-defined prefix to the called number.
To set a prefix to be added to a telephone number called, use the Cisco IOS pots prefix number command in global configuration mode:
pots prefix number number
no pots prefix number
where number is a prefix number from one to five digits in length. Only one prefix can be configured at a time, and configuring a new number overwrites the existing one.
The following example sets the prefix number to 12345:
router# configure terminal router(config)# pots prefix number 12345
You can configure a prefix filter that is compared to the digits that you dial. If a match occurs, the prefix number is not added to the called number. To create a prefix filter, use the pots prefix filter command in global configuration mode:
pots prefix filter number
no pots prefix filter number
where number is a prefix filter from one to eight digits in length. You can define up to ten filters for your router. If you have reached the maximum number of filters defined, no new filter configurations are accepted until you remove at least one existing filter number using the no pots prefix filter number command.
The following are examples of how to set prefix filters:
router# configure terminal router(config)# pots prefix filter 192 router(config)# pots prefix filter 1 router(config)# pots prefix filter 9 router(config)# pots prefix filter 0800 router(config)# pots prefix filter 08456
The Cisco 800 series routers now support the following plain old telephone service (POTS) features for the European Telecommunications Standards Institute (ETSI) Euro-ISDN switch type:
![]() |
Note The Euro-ISDN switch was previously called the Net3 switch. |
You must subscribe to the following Euro-ISDN switch services for these supplementary telephone services to work:
For information about configuring caller ID calls, see the Cisco IOS documentation set.
To enable caller ID on the Euro-ISDN switch for the Nordic countries (Denmark, Sweden, and Finland), configure the country type by using the Cisco IOS pots country command in global configuration mode:
pots country {denmark | finland | sweden}
To verify if caller ID is enabled, use the show pots status command. The following is an example of the output for the command:
router# show pots status POTS Global Configuration: Country:Denmark Dialing Method:Overlap, Tone Source:Local, CallerId Support:YES ---------------------- Out Going Hunt:Disabled
![]() |
Note Caller ID for Denmark, Sweden, and Finland is always enabled, provided the POTS country type is correctly defined as one of them. Caller ID cannot be disabled using the Cisco IOS command-line interface (CLI). |
The following types of call forwarding services (for voice calls only) are supported on the Euro-ISDN switch:
You can select one or more call forwarding services at a time. However, CFU has higher precedence over CFB and CFNR. If all the three are enabled, CFU overrides CFB and CFNR. The default setting is that no forwarding type is selected.
![]() |
Note If you had configured call forwarding for a POTS port and the router finds that a dial peer is also configured for that port, call forwarding works only for the number defined in the destination-pattern dial peer command and ignores all other numbers for that telephone. If the router does not find a dial peer or if the destination-pattern is not defined, call forwarding works for all numbers allocated to that telephone. |
To enable and configure this feature, follow these steps:
Step 2 Configure your call forwarding service, depending on which method you selected:
You can select the method by which the call forwarding feature is controlled as follows:
To enable the call forwarding method, use the Cisco IOS pots forwarding-method command in global configuration mode:
pots forwarding-method {functional | keypad}
[no] pots forwarding-method
![]() |
Note Use the pots forwarding-method command only if the switch is a Euro-ISDN switch type. This command does not work for other switch types. This feature is disabled in the default setting. |
The following example configures the call forwarding feature to give control to the router:
router# configure terminal router(config)# pots forwarding-method functional
Table 9 shows the DTMF keypad command sequence that you enter to configure the call forwarding service.
| Task | DTMF Keypad Command |
|---|---|
Activate CFU | **21*number# where number is the telephone number to which your calls are forwarded |
Deactivate CFU | #21# |
Activate CFNR | **61*number# where number is the telephone number to which your calls are forwarded |
Deactivate CFNR | #61# |
Activate CFB | **67*number# where number is the telephone number to which your calls are forwarded |
Deactivate CFB | #67# |
When you enable or disable the call-forwarding service, it is enabled or disabled for four basic services (speech, audio at 3.1 kilohertz, telephony at 3.1 kilohertz, and telephony at 7 kilohertz). You should hear a dial tone after you enter the DTMF command if the call-forwarding service is successfully enabled or disabled for at least one of the four basic services. If you hear a busy tone, the command is invalid or the switch does not support any of the four basic services.
Use the show pots status command to display details of the call forwarding type. This status is not stored across reboots. The following is an example of the screen output:
router# show pots status POTS Global Configuration: Country:Denmark Dialing Method:Overlap, Tone Source:Local, CallerId Support:YES Out Going Hunt:Disabled Forwarding Method:functional method ------------------------------------- Call Forwarding status: The Forwarding Method Enabled is CFU The forwarded to Address is :33236877 The served user Number(s) are :33795742 The Forwarding Method Enabled is CFB The forwarded to Address is :33236877 The served user Number(s) are :ALL -> Will work for all numbers allocated to the terminal.
Configure CLIR by following these steps:
Step 2 Remove handset and press **31# on the keypad.
Step 3 Listen for the dial tone and then make your call.
Step 4 Repeat Steps 2 and 3 for each outgoing call for which you wish to restrict your calling identification.
![]() |
Note The command **31# DTMF only has an effect if the switch is a Euro-ISDN switch type. This DTMF command does not have any effect on other switch types. |
Cisco IOS Release 12.1(3)XG running on Cisco 827 and Cisco 827-4V routers supports a PPP over Ethernet (PPPoE) client on an ATM permanent virtual circuit (PVC). Only one PPPoE client on a single ATM PVC is supported. The following figure depicts a typical deployment scenario for PPPoE support:
A PPPoE session is initiated on the client side by the network described above. If the session has a timeout or is disconnected, the PPPoE client immediately attempts to reestablish the session.
Follow these steps to configure the router for PPPoE client support:
a. Enter the vpdn enable command in global configuration mode.
b. Configure the vpdn group by entering the vpdn group tag command.
c. Specify the dialing direction by entering the request-dialin command in the vpdn group.
d. Specify the type of protocol in the vpdn group by entering the protocol pppoe command.
Step 2 Configure the ATM interface with PPPoE support.
a. Configure the ATM interface by entering the interface atm 0 command.
b. Specify the ATM PVC by entering the pvc number command.
c. Configure the PPPoE client and specify the dialer interface to use for cloning by entering the pppoe-client dial-pool-number number command.
Step 3 Configure the dialer interface by entering the int dialer number command.
a. Configure the IP address as negotiated by entering the ip address negotiated command.
b. Optional: Configure authentication for your network by entering the ppp authentication protocol command.
c. Configure the dialer pool number by entering the dialer pool number command.
d. Configure the dialer-group number by entering the dialer-group number command.
Step 4 Configure a dialer list corresponding to the dialer-group by entering the dialer-list 1 protocol ip permit command.
![]() |
Note There can be multiple PPPoE clients, each running on different PVCs, in which case each client has to use a separate dialer interface and a separate dialer pool, and the PPP parameters need to be applied on the dialer interface. |
If you enter the clear vpdn tunnel pppoe command with a PPPoE client session already established, the PPPoE client session terminates and the PPPoE client immediately tries to reestablish the session.
The following example shows the configuration of a PPPoE client.
vpdn enable vpdn-group 1 request-dialin protocol pppoe int atm0 pvc 1/100 pppoe-client dial-pool-number 1 int dialer 1 ip address negotiated ppp authentication chap dialer pool 1 dialer-group 1
The Cisco 820 series routers now support firewall, IPSec, and 3DES features.
The Cisco IOS Firewall feature set is now available on the Cisco 820 series routers. This feature set provides the following capabilities:
The Cisco IOS Firewall Feature Set feature module provides several sample firewall configurations, including the following examples for small-office environments:
The Internet Protocol Security (IPSec) feature is now available on the Cisco 820 series routers. IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides security for transmission of sensitive information over unprotected networks such as the Internet. It acts at the network level and implements the following standards:
Internet Protocol Security (IPSec) services are similar to those provided by Cisco Encryption Technology (CET), a proprietary security solution introduced in Cisco IOS Software Release 11.2. (The IPSec standard was not yet available at Release 11.2.) It provides network data encryption at the IP packet level and implements the following standards:
IPSec provides a more robust security solution and is standards-based. IPSec also provides data authentication and anti-replay services in addition to data confidentiality services, while CET provides only data-confidentiality services.
The following component technologies implemented for IPSec:
The Triple Data Encryption Standard (3DES) Cisco IOS feature is now available on Cisco 820 series routers. This feature encrypts packet data. Cisco IOS implements the mandatory 56-bit DES-Cipher Block Chaining (CBC) with an Explicit initialization vector (IV).
For information regarding the features supported in Cisco IOS Release 12.1, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on CCO:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/index.htm
This URL is subject to change without notice. If it changes, point your web browser to CCO, and click on the following path:
Service & Support: Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Cisco IOS Release 12.1
Table 10 lists the MIBs supported by the Cisco 800 series routers. Each group of MIBs corresponds to a specific group of images.
| Image Names | MIBs |
|---|---|
c800-sy6-mw c800-osy6-mw c800-osy656i-mw c800-nsy6-mw c800-nosy656i-mw c800-osy6-mw | CISCO-IPMROUTE-MIB CISCO-SYSLOG-MIB ENTITY-MIB (added) IPMROUTE-MIB RFC1382-MIB (X25MIB) |
c800-nsy6-mw c800-nosy656i-mw | NOVELL-IPX-MIB NOVELL-RIPSAP-MIB OLD-CISCO-NOVELL-MIB |
c800-osy656i-mw c800-nosy656i-m | CISCO-IP-ENCRYPTION-MIB |
c800-y6-mw c800-oy6-mw c800-sy6-mw c800-osy6-mw c800-osy656i-mw c800-nsy6-mw c800-nosy656i-mw | CISCO-BULK-FILE-MIB |
CISCO-CALL-HISTORY-MIB | |
CISCO-CAR-MIB | |
CISCO-IMAGE-MIB (added) | |
CISCO-IP-STAT-MIB | |
CISCO-ISDN-MIB | |
CISCO-ISDNU-IF-MIB | |
CISCO-MEMORY-POOL-MIB | |
| CISCO-PING-MIB |
| CISCO-SNAPSHOT-MIB |
| CISCO-TCP-MIB |
| OLD-CISCO-CHASSIS-MIB |
| OLD-CISCO-CPU-MIB |
(continued)
| OLD-CISCO-FLASH-MIB (added) |
OLD-CISCO-INTERFACES-MIB | |
OLD-CISCO-IP-MIB | |
OLD-CISCO-MEMORY-MIB | |
OLD-CISCO-SYSTEM-MIB | |
OLD-CISCO-TCP-MIB | |
IF-MIB | |
ISDN-MIB | |
SNMPv2-MIB | |
TCP-MIB | |
UDP-MIB | |
RFC1213-MIB (MIBII) | |
RFC1381-MIB (LAPBMIB) | |
| RFC1398-MIB (ETHERMIB) |
The following MIBs are supported by the Cisco 820 series routers, including the Cisco 827 and Cisco 827-4V routers:
The following sections contain important notes about Cisco IOS Release 12.1(3)XG that can apply to the Cisco 800 Series Routers. (Also, see the "Caveats" section.)
When a call comes in, a B channel is activated. If the amount of traffic on the B channel exceeds a threshold, the other B channel is activated. If the amount of traffic falls below the threshold, one of the B channels is deactivated. The B channel that is initially activated when the call comes in is not necessarily B1 nor is the B channel that is deactivated when the traffic level lessens necessarily B2.
To run IPSec successfully, the Cisco 800 series router clock needs to be set accurately. Cisco 800 series router clocks are set and maintained using Simple Network Time Protocol (SNTP). For best results, set up a Network Time Protocol (NTP) server to periodically send time information messages to Cisco 800 series routers. See the SNTP configuration and command reference documentation for configuration instructions. If you do not have an NTP server, you must reset the Cisco 800 series router clock using the clock set command each time you restart the router.
The SNTP configuration documentation is available in the chapter "Monitoring the Router and Network" volume of the Configuration Fundamentals Configuration Guide in the Cisco IOS documentation set. The SNTP command reference documentation is available in the chapter "Router and Network Monitoring Commands" in the "System Management Commands" volume of the Configuration Fundamentals Command Reference manual of the Cisco IOS documentation set.
Cisco 800 series routers support the following features. For more information about these features, see the Cisco IOS documentation set.
The CiscoView application supports the Cisco 800 series routers. The CiscoView application provides dynamic status, statistics, and comprehensive configuration information for Cisco switches, routers, concentrators, and adapters. It displays a graphical view of Cisco devices. This network management tool also provides configuring and monitoring functions and offers basic troubleshooting tips.
The isdn answer1 and isdn answer2 commands determine which called telephone numbers, for example, 555-1111 and 555-2222, a Cisco 800 series router can answer. Using these commands limits a router to using the two dial peers that contain the telephone numbers 555-1111 and 555-2222. (When not using these commands, a router can use up to six dial peers.) A sample scenario in which the isdn answer1 and isdn answer2 commands are used is when a Cisco 801 or Cisco 803 router is connected with other ISDN devices to an ISDN S-bus.
Before attempting to download new images, you must first delete files in the router Flash memory. Be sure to use the delete command, not command erase, to free up space. Entering erase removes all files, including the configuration.
The following protocols send updates that can cause an ISDN line to be activated excessively, thereby increasing your monthly ISDN line cost:
See the Cisco 800 Series Routers Software Configuration Guide to set up extended access lists to prevent IP, UDP, IPX, and SNTP updates from activating the ISDN line. For CDP, make certain that you enter the no cdp enable command to disable CDP.
If an illegal console configuration is issued to the router, the console fails the POST tests during boot and causes the router to halt. The only way to recover from this state is to pull apart the soldered boot Flash and re-burn the Boot ROM. This problem has been resolved in TinyROM version 1.0(3), a downloadable ROM upgrade available from CCO. Contact Cisco to upgrade to this version or later, and to prevent this problem from occurring.
If you have any problems with your ISDN NI1 provisioning, visit the Cisco ISDN Web site at http://www.cisco.com/isdn.
Multilink PPP fragments large data packets so that small voice packets can be interleaved within them. However, apart from first-in-first-out (FIFO) queuing, no other kind of output queuing mechanisms are currently supported with PPP over ATM. Consequently, when multilink PPP is configured on the Cisco 827 routers, the big packets are fragmented, but interleaving of small voice packets within them does not occur.
Currently, NAT does not support alerting H.225 messages. Therefore, NAT communication cannot be established between the router end points. NAT support for H.323 signaling is limited to the Netmeeting application.
A Phone Mate answering machine model 9200 fails to recognize the ringing signal sent by AMD R79 ringing SLIC. This was confirmed by testing against Phone Mate model 3750 and newer model 9300.
Cisco 800 series routers do not support PPP protocol over Frame Relay.
Cisco 800 series routers support the Terminal Access Controller Access Control System Plus (TACACS+) protocol through Telnet. TACACS+ is a Cisco proprietary authentication protocol that provides remote access authentication and related network security services, such as event logging. User passwords are administered in a central database, rather than in individual routers. TACACS+ also supports separate modular authentication, authorization, and accounting (AAA) facilities that are configured at individual routers.
For information on how to configure TACACS+, refer to the "Configuring TACACS+" chapter in the Security Configuration Guide . For information on TACACS+ commands, refer to the "TACACS, Extended TACACS, and TACACS+ Commands" chapter in the Security Command Reference .
Cisco 800 series routers do not support the following protocols:
This release supports the setting of 1 only, for the ROM monitor set stop-bits parameter.
Caveats describe unexpected behavior or defects in Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.
All caveats in Release 12.1(2)T are also in Release 12.1(3)XG. For information on caveats in Cisco IOS Release 12.1(2)T, refer to the Caveats for Cisco IOS Release 12.1 T document. For information on caveats in Cisco IOS Release 12.1, refer to the Caveats for Cisco IOS Release 12.1 document. These publications list severity 1 and 2 caveats, and are located on CCO and the Documentation CD-ROM.
![]() |
Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. You can reach Bug Navigator II on CCO at Software Center: Cisco IOS Software: BUG TOOLKIT: Cisco Bug Navigator II, or at http://www.cisco.com/support/bugtools/bugtool.shtml. |
This section describes possibly unexpected behavior by Release 12.1(3)XG.
SYS-2-MALLOCFAIL : memory allocation of 1684 bytes failed from 0x800AE838: pool I/O, alignment: 4.
The following sections describe the documentation available for the Cisco 800 Series Routers. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on CCO and the Documentation CD-ROM.
Use these release notes with the documents listed in the following sections:
The following documents are specific to Release 12.1. They are located on CCO and the Documentation CD-ROM:
![]() |
Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. You can reach Bug Navigator II on CCO at Software Center: Cisco IOS Software: BUG TOOLKIT: Cisco Bug Navigator II, or at http://www.cisco.com/support/bugtools/bugtool.shtml. |
These documents are available for the Cisco 800 Series Routers on CCO and the Documentation CD-ROM:
These documents are available for the Cisco 800 series on CCO and the Documentation CD-ROM:
On CCO at:
Technical Documents: Documentation Home Page: Access Servers and Access Routers: Fixed Access Routers: Cisco 801-804 Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 801-804 Routers
These documents are available for the Cisco 805 router on CCO and the Documentation CD-ROM.
On CCO at:
On the Documentation CD-ROM at:
These documents are available for the Cisco 820 series routers on CCO and the Documentation CD-ROM:
On CCO at:
Technical Documents: Documentation Home Page: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 827 Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 827 Routers
Feature modules describe new features supported by Release 12.1 and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
To reach the Release 12.1 feature modules:
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are shipped with your order in electronic form on the Documentation CD-ROMunless you specifically ordered printed versions.
Each module in the Cisco IOS documentation set consists of two types of books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference. The Cisco IOS software documentation set is available on CCO and on the Documentation CD-ROM.
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
Table 11 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in both electronic and printed form.
![]() |
Note You can find the most current Cisco IOS documentation on CCO and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed. |
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1
| Books | Chapter Topics |
|---|---|
Configuration Fundamentals Overview Using the Command-Line Interface (CLI) Using Configuration Tools Configuring Operating Characteristics Managing Connections, Menus, and System Banners Using the Cisco Web Browser Using the Cisco IOS File System Modifying, Downloading, & Maintaining Configuration Files Loading and Maintaining System Images Maintaining Router Memory Rebooting a Router Configuring Additional File Transfer Functions Monitoring the Router and Network Troubleshooting a Router Performing Basic System Management System Management Using System Controllers Web Scaling Using WCCP Managing Dial Shelves | |
| Overview of Apollo Domain, Banyan VINES, DECNET, ISO Configuring Apollo Domain Configuring Banyan VINES Configuring DECnet Configuring IOS CLNS Configuring XNS |
| AppleTalk and Novel IPX Overview Configuring AppleTalk Configuring Novell IPX |
| Overview of SNA Internetworking Overview of Bridging Configuring Transparent Bridging Configuring Source-Route Bridging Configuring Token Ring Inter-Switch Link Configuring Token Ring Route Switch Module Overview of IBM Networking |
(Continued)
| Configuring Remote Source-Route Bridging Configuring Data-Link Switching Plus+ Configuring Serial Tunnel and Block Serial Tunnel Configuring LLC2 and SDLC Parameters Configuring IBM Network Media Translation Configuring Frame Relay Access Support Configuring NCIA Server Configuring the Airline Product Set Configuring DSPU and SNA Service Point Support Configuring SNA Switching Services Configuring Cisco Transaction Connection Configuring Cisco Mainframe Channel Connection Adapters Configuring CLAW and TCP/IP Offload Support Configuring CMPC and CSNA Configuring CMPC+ Configuring the TN3270 Server |
| Large-Scale Dial Solutions Cost-Control Solutions Virtual Private Networks X.25 on ISDN Solutions Telco Solutions Dial-Related Addressing Services Internetworking Dial Access Scenarios Preparing for Dial Access Modem Configuration and Management ISDN and Signalling Configuration PPP Configuration Dial-on-Demand Routing Configuration Dial-Backup Configuration Terminal Service Configuration |
| Interface Configuration Overview Configuring LAN Interfaces Configuring Serial Interfaces Configuring Logical Interfaces |
| IP Overview Configuring IP Addressing Configuring DHCP Configuring IP Services Configuring Mobile IP Configuring On-Demand Routing Configuring RIP Configuring IGRP Configuring OSPF Configuring IP Enhanced IGRP Configuring Integrated IS-ISConfiguring BGP Configuring Multicast BGP (MBGP) Configuring IP Routing Protocol-Independent Features |
(Continued)
| Configuring IP Multicast Routing Configuring Multicast Source Discovery Protocol Configuring PGM Router Assist Configuring Unidirectional Link Routing Using IP Multicast Tools |
| Multiservice Applications Overview Configuring Voice over IP Configuring Gatekeepers (Multimedia Conference Manager) Configuring Voice over Frame Relay Configuring Voice over ATM Configuring Voice over HDLC Configuring Voice-Related Support Features Configuring PBX Signaling Configuring Store and Forward Fax Configuring Video Support Configuring Head-End Broadband Access Router Features Configuring Subscriber-End Broadband Access Router Configuring Synchronized Clocking |
| Quality of Service Overview Classification Overview Configuring Policy-Based Routing Configuring QoS Policy Propagation via Border Gateway Configuring Committed Access Rate Congestion Management Overview Configured Weighted Fair Queueing Configuring Custom Queueing Configuring Priority Queueing Congestion Avoidance Overview Configuring Weighted Random Early Detection Policing and Shaping Overview Configuring Generic Traffic Shaping Configuring Frame Relay and Frame Relay Traffic Shaping Signalling Overview Configuring RSVP Configuring Subnetwork Bandwidth Manager Configuring RSVP-ATM Quality of Service Internetworking Link Efficiency Mechanisms Overview Configuring Link Fragmentation and Interleaving for Multilink Configuring Compressed Real-Time Protocol IP to ATM CoS Overview Configuring IP to ATM CoS QoS Features for Voice Introduction |
| TACACS+ Commands Access Control Lists: Overview and Guidelines Cisco Secure Integrated Software Firewall Overview Configuring Lock-and-Key Security (Dynamic Access Lists) Configuring IP Session Filtering (Reflexive Access Lists) Configuring TCP Intercept (Prevent Denial-of-Service Attacks) Configuring Context-Based Access Control Configuring Cisco Secure Integrated Software Intrusion Configuring Authentication Proxy Configuring Port to Application Mapping IP Security and Encryption Overview Configuring IPSec Network Security Configuring Certification Authority Interoperability Configuring Internet Key Exchange Security Protocol Configuring Passwords and Privileges Neighbor Router Authentication: Overview and Guidelines Configuring IP Security Options |
| Configuring MPLS Configuring IP Multilayer Switching Configuring IP Multicast Multilayer Switching Configuring IPX Multilayer Switching Configuring Multicast Distributed Switching Routing Between VLANs Overview Configuring Routing Between VLANs with ISL Encapsulation Configuring Routing Between VLANs with IEEE 802.10 Configuring Routing Between VLANs with IEEE 802.1Q Encapsulation LAN Emulation Overview Configuring LAN Emulation Configuring Token Ring LANE MPOA Overview Configuring the MPOA Client Configuring the MPOA Server Configuring Token Ring LANE for MPOA |
| Wide-Area Networking Overview Configuring ATM Frame Relay Frame Relay-ATM Internetworking Configuring SMDS Configuring X.25 and LAPB |
|
|
![]() |
Note Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with CCO, you can find latest list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, press Login at CCO and go to Software Center: Network Mgmt Products: Cisco Network Management Toolkit. |
You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.
Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed docs, or by sending mail to Cisco.
Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
The CCO broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
You can access CCO in the following ways:
You can e-mail questions about using CCO to cco-team@cisco.com.
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
To contact by e-mail, use one of the following:
Language | E-mail Address |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
If you have a CCO login account, you can access the following URL, which contains links and software tips on configuring your Cisco products:
http://www.cisco.com/kobayashi/technotes/serv_tips.shtml
This URL is subject to change without notice. If it changes, point your Web browser to CCO, log in, and click on this path: Technical Assistance Center:Technical Tips.
The following sections are provided from the Technical Tips page:
We appreciate and value your comments:

![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Aug 28 17:46:37 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.