cc/td/doc/product/software/ios121/121relnt
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco uBR905 Cable Access Router for Cisco IOS Release 12.1(3a) XL1

Release Notes for Cisco uBR905 Cable Access Router for Cisco IOS Release 12.1(3a) XL1

October 2, 2000
Part Number: OL-0633-01 Rev. B0



Note   You can find the most current Cisco IOS documentation on Cisco  Connection Online (CCO).  These electronic documents may contain updates and modifications made after this document was published.

These release notes for the Cisco uBR905 Cable Access Router describe the enhancements provided in Cisco IOS Release 12.1(3a) XL1. These release notes are updated as needed to describe new features, memory requirements, hardware support, software platform deferrals, and changes to the microcode or modem code and related documents.

For a list of software caveats that apply to Release 12.1(3a) XL1, see the "Caveats" section and Caveats for Cisco IOS Release 12.1 T.  The caveats document is updated for every maintenance release and is located on Cisco Connection Online (CCO) and the Documentation CD-ROM.

Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.1  located on CCO and the Documentation CD-ROM. For complete documentation on the Cisco uBR905 Cable Access Router, see the documentation listed in the "Related Documentation" section.

Contents

These release notes describe the following topics:

Introduction

The DOCSIS-based Cisco uBR905 Cable Access Router gives small office/home office (SOHO) and branch office subscribers high-speed Internet or Intranet access. The Cisco uBR905 Cable Access Router supports data traffic via a shared two-way cable system and Internet Protocol (IP) backbone network. The Cisco uBR905 Cable Access Router connects computers and other customer premises devices at a subscriber site to the service provider's cable, hybrid/fiber coax (HFC), and IP backbone network.

The Cisco uBR905 Cable Access Router is based on Data-Over-Cable Service Interface Specifications (DOCSIS) and interoperate with any bidirectional, DOCSIS-qualified Cable Modem Termination System (CMTS). The Cisco uBR905 Cable Access Router ships from the Cisco factory with a Cisco IOS software image stored in nonvolatile Flash memory that supports DOCSIS-compliant bridging data operations. The Cisco uBR905 Cable Access Router functions as a cable modem at the subscriber site to convey data communications on the cable television system.


Note   For information on new features and Cisco IOS commands supported by Release 12.1 T, see "New and Changed Information" section and "Related Documentation" section.

Based on the feature licenses your company purchased, other Cisco IOS images can be downloaded from Cisco Connection Online (CCO). Special operating modes, based on your service offering and the practices in place for your network, can be supported for the Cisco uBR905 router, based on the available images in Cisco IOS Release 12.1(3a) XL1. The Cisco uBR905 Cable Access Router can also function as an advanced router, providing wide area network (WAN) data connectivity in a variety of configurations.


Note   All Cisco uBR905 Cable Access Router images support DOCSIS Baseline Privacy Interface (BPI) encryption. BPI is subject to export restrictions.

Cisco uBR905 Cable Access Router

The Cisco uBR905 Cable Access Router features a single F-connector interface to the cable system, four RJ-45 (10BaseT Ethernet) hub ports, and one RJ-45 console port to connect to a laptop computer/console terminal for local Cisco IOS configuration. The Cisco uBR905 Cable Access Router also provides an onboard IPsec hardware accelerator, which provides high-performance encryption that is significantly faster than software-based encryption.

The Cisco uBR905 Cable Access Router supports a number of Cisco IOS software images. The feature sets available in Release 12.1(3a) XL1 include Easy IP, Cisco IOS Firewall (Phases I and Phase II), and IPsec encryption.

Early Deployment Releases

These release notes describe the Cisco uBR905 Cable Access Router for Cisco IOS Release 12.1 XL, which is an early deployment (ED) release based on Cisco IOS Release 12.1 T. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features.

Table 1 shows that Release 12.1(3a) XL1 is the initial early deployment release of the Cisco uBR905 Cable Access Router:


Table 1: Early Deployment Releases for the Cisco uBR905 Cable Access Router
ED Release Additional Software Features Availability

12.1(3a) XL1

  • Cable Monitor Web Diagnostics Tool

  • DOCSIS 1.0+ Extensions—Dynamic Multi-SID1 Assignment and Concatenation

  • DOCSIS Baseline Privacy (BPI)

  • Dynamic Host Configuration Protocol (DHCP) Proxy Support

  • Enhanced bridging functionality

  • Firewall (Phases I and II)—Cisco IOS Firewall Software

  • Full and DOCSIS-compliant bridging

  • HSRP2 Support for ICMP Redirect

  • IPsec—56-bit encryption/decryption at network layer (Phase I)

  • IPsec 3DES—Triple DES3 (Phase I): 168-bit encryption/decryption at network layer (Phase I)

  • IPsec Hardware Accelerator—onboard encryption hardware accelerator is automatically used by default for all IPsec encryption

  • L2TP—Layer 2 tunneling protocol (Phase I)

  • NetRanger Support—Cisco IOS Intrusion Detection

  • Network address translation and port address translation (NAT/PAT)

  • Radio frequency interface

  • RFC 2233  support for link up/down traps and for the IF-MIB  MIB4

  • Routing (RIP V2)

  • Secure Shell (SSH) Version 1 Client and Server Support

  • Support for the ip address dhcp command

  • VPN5 Enhancements—Dynamic Crypto Map

Now

1SID = Service ID
2HSRP = Hot-Standby Routing Protocol
3DES = Data Encryption Standard
4MIB = Management Information Base
5VPN = Virtual Private Network

System Requirements

This section describes the system requirements for Cisco IOS Release 12.1(3a) XL1:

Memory Recommendations

Table 2 lists the memory recommendations for each of the feature sets available for the Cisco uBR905 Cable Access Router in Cisco IOS Release 12.1(3a) XL1. The image subset legend for Table 2 is as follows:


Table 2: Memory Recommendations for the Cisco uBR905 Cable Access Router,
Release 12.1(3a) XL1 Feature Sets
Feature Set Matrix Term1 Image Name Minimum
Flash
Memory
Minimum
DRAM
Memory
Runs
From

Value Telecommuter—Easy IP and IPsec 56

ubr925-k1sv4y556i-mz

8 MB Flash

24 MB DRAM

RAM

Performance Telecommuter— Easy IP and IPsec 3DES

ubr925-k1k2sv4y5-mz

8 MB Flash

24 MB DRAM

RAM

Value Small Office—Easy IP, FW2, and IPsec 56

ubr925-k1o3sv4y556i-mz

8 MB Flash

24 MB DRAM

RAM

Performance Small Office— Easy IP, FW2, and IPsec 3DES

ubr925-k1k2o3sv4y5-mz

8 MB Flash

24 MB DRAM

RAM

1The voice feature set is not supported on the Cisco uBR905 Cable Access Router.
2FW—Cisco IOS Firewall

Headend Interoperability

DOCSIS Concatenation

If using DOCSIS concatenation with a 16 QAM symbol rate, the CMTS must be configured for Unique Word 16 in the preamble for both short and long data burst profiles. On the Cisco uBR7200 series universal broadband routers, use the cable modulation-profile global configuration command and specify uw16 for both the long and short modulation profiles. See caveats CSCdp76415 and CSCdp92139 for more detail.

DOCSIS 1.0+ Extensions

Cisco IOS Release 12.1 T images support the Cisco DOCSIS 1.0+ Extensions, which include dynamic multi-SID assignment and concatenation. To use the dynamic multi-SID and concatenation features, both the Cisco uBR905 router and the CMTS router must have support them. If you are using the Cisco uBR7200 series headend equipment as the CMTS router, Cisco IOS Release 12.1(1) T or greater is required on the CMTS router to ensure these features are activated.

To configure the Cisco uBR905 Cable Access Router to support multiple classes of service, use either the Cisco Subscriber Registration Center (CSRC) tool or the configuration file editor of your choice. DOCSIS configuration files can contain multiple classes of service (CoS) to support voice and other real-time traffic. The first CoS is used for data (and voice if no other CoS is defined), and up to three additional classes of service can be defined to give higher priority for voice and other real-time traffic.

IPsec Encryption Support

To use IPsec encryption, both the Cisco uBR905 Cable Access Router and the destination endpoint must both support IPsec encryption and be configured for the same encryption policy. The endpoint is typically an IPsec gateway such as a peer router, Cisco PIX firewall, or other device that can be configured for IPsec. (The CMTS does not need to support IPsec encryption unless it is desired that the CMTS act as an IPsec gateway.)


Note   The IPsec feature set encrypts traffic sent between endpoints, such as between two Cisco uBR905 Cable Access Routers, to protect traffic sent across the Internet and other unprotected networks. The DOCSIS BPI feature encrypts traffic on the cable interface, between the Cisco uBR905 Cable Access Router and the CMTS. To use BPI encryption, both the Cisco uBR905 Cable Access Router and the CMTS must support and enable BPI encryption.

Hardware Supported

The Cisco uBR905 Cable Access Router contains:

Determining the Software Version

To determine the version of Cisco IOS software running on your Cisco uBR905 Cable Access Router, log into the Cisco uBR905 Cable Access Router and enter the show version EXEC command:

For the Cisco uBR905 Cable Access Router:

router# show version

Cisco Internetwork Operating System Software
IOS (tm) 920 Software (ubr925-k1v4y5-mz), Version 12.1(3a) XL1, RELEASE SOFTWARE

Upgrading to a New Software Release

For technical information about upgrading to a new software release, see Cisco IOS Upgrade Ordering Instructions on CCO located at:

http://www.cisco.com/warp/public/620/6.html

For other information about upgrading to Cisco IOS Release 12.1, see the product bulletin Cisco IOS Software Release 12.1 Upgrade Paths and Packaging Simplification on CCO at:

Service & Support: Software Center: Cisco IOS Software: Product Bulletins: Software

Under Cisco IOS 12.1, click Cisco IOS Software Release 12.1 Ordering Procedures and Platform Support

Feature Set Tables

Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features.


Caution Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States may require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.

Table 3 lists the voice and data software images by feature sets for the Cisco uBR905 Cable Access Router. This table uses the following conventions:


Note   These feature set tables might contain a selected list of features. These tables might not be cumulative—nor do they list all the features in each image.


Table 3: Feature List by Feature Set for the Cisco uBR905 Cable Access Router—Data
Software Images by Feature Set Matrix Term
Features Value Telecommuter Performance Telecommuter Value Small Office Performance Small Office

Baseline Privacy Interface (BPI) Encryption

Yes

Yes

Yes

Yes

Baseline Privacy Interface (BPI) MIB

Yes

Yes

Yes

Yes

Cable Device MIB (RFC 2669)

Yes

Yes

Yes

Yes

Cable Monitor

Yes

Yes

Yes

Yes

Cisco IOS Firewall Software

No

No

Yes

Yes

Cisco Standard MIBs

Yes

Yes

Yes

Yes

DHCP Proxy Support

Yes

Yes

Yes

Yes

DOCSIS 1.0+ Extensions (Dynamic multi-SID assignment and concatenation)

Yes

Yes

Yes

Yes

DOCSIS-Compliant Bridging

Yes

Yes

Yes

Yes

Easy IP

Yes

Yes

Yes

Yes

HSRP Support for ICMP Redirect

Yes

Yes

Yes

Yes

IPsec Encryption with 56-bit DES

Yes

Yes

Yes

Yes

IPsec Encryption with Triple DES (3DES)

No

Yes

No

Yes

Layer 2 Tunneling Protocol (L2TP)

No

No

No

No

RFC 2233 Support

Yes

Yes

Yes

Yes

Radio Frequency Interface MIB (RFC 2670)

Yes

Yes

Yes

Yes

Routing (RIP V2)

Yes

Yes

Yes

Yes

Secure Shell (SSH)—56-bit encryption

Yes

Yes

Yes

Yes

Secure Shell (SSH)—3DES encryption

No

Yes

No

Yes

New and Changed Information

The following sections list the new hardware and software features supported by the Cisco uBR905 Cable Access Router.

New Hardware Features in Release 12.1(3a) XL1

Cisco IOS Release 12.1(3a) XL1 supports the Cisco uBR905 Cable Access Router.

New Software Features in Release 12.1(3a) XL1

The following new software features are supported by the Cisco uBR905 Cable Access Router for Release 12.1(3a) XL1.

Cable Monitor Web Diagnostics Tool

The Cable Monitor is a web-based diagnostic tool to display the current status and configuration of the Cisco uBR905 router. The Cable Monitor can also be used when the cable network is down, providing an easy way for subscribers to provide necessary information to service technicians and troubleshooters.

The Cable Monitor is introduced in Cisco IOS Release 12.1(1) T.

Cisco IOS Firewall (Phase I and II)

The Cisco IOS Firewall feature set includes the following set of features:

For general information, see the description of the Cisco IOS Firewall Feature Set  in the Cisco Product Catalog . For detailed information, see the Cisco IOS Firewall Feature Set  documentation set, as well as the section Traffic Filtering and Firewalls  in the Security Configuration Guide  and the Security Command Reference  (available on the Documentation CD-ROM and CCO).

DOCSIS 1.0+ Extensions

In addition to the other QoS features, DOCSIS 1.1 supports a number of features that are required for the delivery of high quality voice traffic. To use these features before the DOCSIS 1.1 specification is finalized, Cisco has created the DOCSIS 1.0+ extensions that contain the most important of these features:

  To avoid potentially wasting bandwidth in this manner, the DOCSIS 1.0+ extensions support the dynamic creation of multiple SIDs. New MAC messages dynamically add, delete, and modify SIDs when needed. When a phone connected to the router is taken off-hook, the Cisco uBR905 router creates a SID that has the QoS parameters needed for that particular voice call. When the call terminates, the router deletes the SID, releasing its bandwidth for use elsewhere.

The DOCSIS 1.0+ features are introduced in Cisco IOS Software Release 12.0(7) XR and 12.1(1) T.


Note   Both the Cisco uBR905 Cable Access Router and the CMTS must support the dynamic multi-SID and concatenation features for them to be used on the cable network. If you are using the Cisco uBR7200 series universal broadband router as the CMTS, Cisco IOS Release 12.1(1) T (or later) is required on the Cisco uBR7200 series routers to use these features.

DOCSIS Baseline Privacy Interface (BPI)

The DOCSIS Baseline Privacy Interface (BPI) feature is based on the DOCSIS BPI Specification (SP-BPI-I02-990319 or later revision). It provides data privacy across the Hybrid Fiber-Coaxial (HFC) network by encrypting traffic flows between the Cisco uBR905 Cable Access Router and the cable operator's CMTS.

The BPI+ (BPI Plus) feature is an enhancement to the BPI feature and is based on the DOCSIS BPI+ Specification (SP-BPI+-I04-000407 or later revision), which is still in development. In addition to the regular BPI features, BPI+ provides more secure authentication of cable modems through the use of digital certificates. Also, a cable modem can use a digital signature to verify that the software image it has downloaded has not been altered or corrupted in transit.


Note   Cisco IOS Release 12.1(3a) XL1 supports BPI encryption but not BPI+ encryption. The CMTS and Cisco uBR905 Cable Access Router must both support and enable BPI to use its features.

DOCSIS Baseline Privacy Management Information Base

The Baseline Privacy Management Information Base (MIB), as currently defined, is available in Cisco IOS Release 12.1(3a) XL1 code. BPI allows a Simple Network Management Protocol (SNMP) manager to monitor and manage the Cisco uBR905 Cable Access Router's BPI configuration, including whether BPI is enabled, status of current authorization keys, current timeout values, real-time status counters, and additional information about authorization errors.


Note   The SNMP manager must load the DOCSIS-BPI-MIB.my MIB to access the BPI attributes. See the section "Cable-Specific MIBs" on page 19 for details.

Dynamic Host Configuration Protocol Proxy Support

The DHCP Proxy Support feature helps to automate the configuration of the Cisco uBR905 Cable Access Router in two situations:

When configured for DHCP Proxy Support, during startup the Cisco uBR905 Cable Access Router sends a proxy DHCP request to the DHCP server using the Ethernet interface's MAC address. The DHCP server replies with a second IP address that the router assigns to either the Ethernet interface or to the NAT pool, depending on which option was specified.

Easy IP—DHCP Server and NAT/PAT

The Easy IP feature set includes the following features to automate the assignment and use of IP addresses:


Note   NAT and PAT are defined in Requests for Comments (RFC) 1631 .

Enhanced Bridging

The Cisco uBR905 Cable Access Router contains four RJ-45 (10BaseT Ethernet) hub ports, which can be connected to four computers directly or one of the four ports to an Ethernet hub. The Ethernet hub connects additional computers or devices at the site. A maximum of 254 devices can be bridged in DOCSIS bridging mode; no limit exists in routing mode.

Full and DOCSIS-Compliant Bridging

DOCSIS-compliant bridging allows the Cisco uBR905 Cable Access Router to operate as a DOCSIS 1.0 cable modem, so that it can interoperate with any DOCSIS-qualified CMTS. This is the default mode of operation for the Cisco uBR905 Cable Access Router.

HSRP Support for ICMP Redirects (CSCdp37610)

The HSRP Support for ICMP Redirects feature enables Internet Control Message Protocol (ICMP) redirection on interfaces configured with the Hot Standby Router Protocol.

When running HSRP, it is important to prevent hosts from discovering the interface (or real) MAC addresses of routers in the HSRP group. If a host is redirected by ICMP to the real MAC address of a router, and that router later fails, then packets from the host will be lost. Previously, ICMP redirect messages were automatically disabled on interfaces configured with HSRP.

This feature now enables ICMP redirects on interfaces configured with HSRP. This functionality works by filtering outgoing ICMP redirect messages through HSRP, where the next-hop IP address may be changed to an HSRP virtual IP address.

IP Address Negotiation

Cisco IOS Release 12.1(3a) T1 for Cisco uBR900 series Cable Access Routers adds support for the ip address dhcp command on the cable interface. Previous releases used the ip address negotiated command for this purpose, but this command is now reserved for serial interfaces. This change is cosmetic only and does not change how the router obtains its IP address. See the section "IP Address Negotiation" on page 11for additional information.

IPsec Encryption (56-bit and 3DES)

IPSec Network Security (IPSec) is an IP security feature that provides robust authentications and encryption of IP packets. IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF). IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices ("peers") such as the Cisco uBR905 Cable Access Router.

IPSec provides the following network security services:

Layer 2 Tunneling Protocol

Layer 2 Tunneling Protocol (L2TP) is an emerging Internet Engineering Task Force (IETF) standard that combines Cisco's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP). L2TP is an extension of the Point-to-Point Protocol (PPP), which is an important component for Access Virtual Private Networks (VPNs).

Traditional dial-up networking services only supported registered IP addresses, which limited the types of applications that could be implemented over VPNs. L2TP supports multiple protocols and unregistered and privately administered IP addresses over the Internet. This allows the existing access infrastructure, such as the Internet, modems, access servers, and ISDN terminal adapters (TAs), to be used.

L2TP can be initiated wherever PPTP or L2F is currently deployed and can be operated as a client initiated tunnel, such as PPTP, or a network access server (NAS) initiated tunnel, such as L2F.

Refer to the Limitations and Restrictions section for information regarding the functionality of the Cisco uBR905 Cable Access Router in L2TP applications.

Management Information Base (MIB) Features

NetRanger Support—Cisco IOS Intrusion Detection

Cisco IOS Release 12.1(3a) XL1 supports Cisco NetRanger, which is an Intrusion Detection System (IDS) composed of three parts:

RFC 2233 Support

Cisco IOS Release 12.1(2) T updates the IF-MIB  MIB with support for RFC 2233,  which obsoletes the previous RFC 1573.  This change adds the "ifCounterDiscontinuityTime" attribute and changes the "ifTableLastChange attribute."

In addition, this feature adds support for RFC 2233-compliant link up and link down traps. By default, link up and link down traps are implemented as given in the CISCO-IF-CAPABILITY.my MIB. To generate link up and link down traps as defined by RFC 2233, use the snmp-server trap link ietf global configuration command.

This feature was tracked as caveats CSCdp41317 and CSCdp55546, and it is introduced in Cisco IOS Release 12.1(2) T.

Routing (RIP V2)

When configured for routing mode, the Cisco uBR905 Cable Access Router supports the Routing Information Protocol Version 2 (RIPv2). In routing mode the Cisco uBR905 Cable Access Router automatically configures itself to use the headend's IP address as its IP default gateway. This allows the Cisco uBR905 Cable Access Router to send packets not intended for the private LAN to the headend for delivery to the Internet and other networks.


Note   The Cisco uBR905 Cable Access Router supports only static routes and the RIP routing protocol.

Secure Shell Version 1 Client Support

Cisco IOS Release 12.1(3a) XL1 enhances support for the Secure Shell (SSH) protocol, which was introduced in Cisco IOS Release 12.1(1) T. SSH provides for authentication and encryption at the application layer, providing a secure connection even when BPI or IPsec authentication and encryption are not used at the network layer.

By default, the SSH feature uses 56-bit DES encryption. Higher security 168-bit 3DES encryption is available when using Cisco IOS images that support 3DES IPsec encryption. (The SSH client must also support the same level of encryption.)

In Cisco IOS Release 12.1(3a) XL1, SSH support now includes the following features:


Note   For configuration and other information, see the Secure Shell Version 1 Client feature module, available on CCO and the Documentation CD-ROM.

SNMP Enhancements

Cisco IOS Release 12.1(1) T adds support for RFC 2669 and RFC 2670 to the DOCS-CABLE-DEVICE-MIB and DOCS-IF-MIB MIBs, respectively.

VPN Enhancement—Dynamic Crypto Map

Dynamic crypto map is one of the Cisco PIX IPSec network security commands. IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet.

The dynamic crypto map command is used to create policy templates that are used when processing negotiation requests for new security associations from a remote IPSec peer, even if you do not know all of the crypto map parameters required to communicate with the remote peer (such as the peer's IP address). The dynamic crypto map allows you to accept requests for new security associations from previously unknown peers. These requests, however, are not processed until the Internet Security Association and Key Management Protocol (ISAKMP) Internet Key Exchange (IKE) authentication has completed successfully.

When the firewall receives a negotiation request via IKE from another IPSec peer, the request is examined to see if it matches a crypto map entry. If the negotiation does not match any explicit crypto map entry, it will be rejected unless the crypto map set includes a reference to a dynamic crypto map.

If the firewall accepts the peer's request, at the point that it installs the new IPSec security associations, it also installs a temporary crypto map entry. This entry is filled in with the results of the negotiation. At this point, the firewall performs normal processing, using this temporary crypto map entry as a normal entry, even requesting new security associations if the current ones are expiring (based on the policy specified in the temporary crypto map entry). After all of the corresponding security associations expire, the temporary crypto map entry is removed.

Dynamic crypto map sets are not used for initiating IPSec security associations. However, they are used for determining whether or not traffic should be protected.


Note   The only parameter required in a dynamic crypto map is the set transform-set. All other parameters are optional.

Limitations and Restrictions

This section describes warnings and cautions about using Cisco IOS Release 12.1(3a) XL1 software.

Bridging Support

The Cisco uBR905 Cable Access Router interoperates with DOCSIS cable networks. Cisco IOS Release 12.1(3a) XL1 does not support bridging traffic across a non-DOCSIS cable network.

DOCSIS CLI Commands are Removed

To comply with DOCSIS requirements that restrict access to commands that change DOCSIS parameters, Cisco IOS Release 12.1(3a) XL1 has removed a number of commands from the CLI. The following commands are now reserved exclusively for DOCSIS use:

GRE IP Tunnels are Not Supported

Generic routing encapsulation (GRE) IP tunnels cannot be built between two Cisco uBR905 Cable Access Routers because GRE IP tunnels are not supported in any Cisco IOS image for the Cisco uBR905 Cable Access Routers. IPsec tunnels, however, are supported when using Cisco IOS images that support IPsec encryption.

IP Address Negotiation

The DOCSIS specifications require that a cable modem obtain its IP address at power-on or reset from a DHCP server that is available through the cable interface. For this reason, the Cisco uBR905 Cable Access Router defaults to a configuration that uses the ip address dhcp command for the cable interface. It is not possible to override this setting by specifying a specific static IP address; to assign a static IP address to the Cisco uBR905 router, configure the DHCP server so that it assigns the desired IP address on the basis of the unit's MAC address.


Note   The ip address negotiated command cannot be used on the cable interface because this command is reserved exclusively for the serial interface. However, in Cisco IOS Release 12.1(3a) XL1 when the ip address dhcp command is used for cable interfaces, the configuration files still show the ip address negotiated command, which can generate an "invalid input" error during boot. This is only a cosmetic issue and does not affect the unit's functionality. See the description of caveat CSCdr61697, for more information.

Upgrading Software Images Using BPI

To enable BPI encryption, the Cisco uBR905 Cable Access Router must use a Cisco IOS image that supports BPI encryption. If the router's current software image does not support BPI encryption (or if the current software image is corrupted), you must disable BPI encryption in the DOCSIS configuration file and reset the router before you will be able to download a new software image.

Using Access Lists 100 and 101

Access lists 100 and 101 are reserved for DOCSIS use and should never be configured manually on the Cisco uBR905 Cable Access Router. Use any access lists 102 through 199 instead.

Using Multiple PCs with the Cisco uBR905 Cable Access Router

The MAX CPE parameter in a Cisco uBR905 Cable Access Router's DOCSIS configuration file determines how many PCs (or other CPE devices) are supported by the Cisco uBR905 Cable Access Router. The default value for the MAX CPE parameter is 1, which means only one PC can be connected to the Cisco uBR905 Cable Access Router.

The DOCSIS 1.0 specification states that a CMTS cannot age-out MAC addresses for CPE devices, so the first PC that is connected to the Cisco uBR905 Cable Access Router is normally the only one that the CMTS recognizes as valid. If a subscriber replaces an existing PC or changes its network interface card (NIC) to one that has a different MAC address, the CMTS will refuse to let the PC come online because this would exceed the maximum number of CPE devices specified by the MAX CPE parameter. A similar thing would happen if a user decides to move a PC from one Cisco uBR905 router to another.

To allow a subscriber to replace an existing PC or NIC, the following workarounds are possible:

Using the Reset Switch

The reset switch on the back panel of the Cisco uBR905 Cable Access Router is recessed to prevent accidental resets of the router. To depress the switch, use a blunt object, such as a pen or pencil point; do not use a sharp object, such as a knife or awl, because this could damage the switch and the router's circuitry.

Important Notes

This section contains important information about using Cisco IOS Release 12.1(3a) XL1 software.

CPE Device Filtering

In Cisco IOS Release 12.1(3a) XL1 and above, the "docsDevCpeIpMax" attribute defaults to -1 instead of the default of 1 which was used in previous releases. This attribute controls the maximum number of CPE devices that can pass traffic through the router from its Ethernet interface as follows:

CPE IP address filtering is done as part of the following process:

    1. MAC address filtering—Packets are filtered on the basis of the CPE device's MAC address. This is controlled by the value of the MAX CPE parameter, which is set in the DOCSIS configuration file.

    2. Link Level Control (LLC) filtering—Packets are filtered on the basis of the packet's protocol. This is controlled by the "docsDevFilterLLCTable" table.

    3. CPE IP address filtering—Packets are filtered on the basis of the CPE device's IP address, as controlled by the "docsDevCpeIpMax" attribute and "docsDevFilterCpeTable" table.

    4. Access list filtering—Packets are filtered on the basis of access lists. IP filtering is controlled by the "docsDevFilterIpTable" table, and SNMP access filters are controlled by the "docsDevNmAccessTable" table.

See the DOCS-CABLE-DEVICE-MIB.my MIB for more information on the attributes and tables listed above.

Disabling the Finger Server

By default, the Cisco uBR900 series Cable Access Router enables its onboard TCP/IP "finger" server to allow remote users to query the number and identities of any users who are logged in to the router. Unless your network operations center (NOC) requires this service, it should be disabled to prevent denial of service attacks that access the finger server's well-known port (TCP port 79). To disable the finger server, include the no service finger command in the Cisco IOS configuration file that the router downloads at initial power-on.

Supported MIBs

The Cisco uBR905 Cable Access Router supports the following categories of MIBs:

Cable Device MIBs

The Cisco uBR905 Cable Access Router supports the Cable Device MIB, which is defined by RFC 2669 and describes DOCSIS-compliant cable modems and CMTS. The Cable Device MIB records statistics related to the configuration and status of the cable modem. Statistics include an events log and device status. The following list details the components of the Cable Device MIB:

The Cable Device MIB is very similar to the RFI MIB in that both allow access to statistics; they are different in that the Cable Device MIB reports statistics on the cable modem, and the RFI MIB reports statistics on the radio frequency transmissions over the cable television line.

Cisco Standard MIBs

The Cisco uBR905 Cable Access Router supports the Cisco Standard MIBs, which consist of the following components:


Note   The Cisco Management Information Base (MIB) User Quick Reference publication is no longer published. For the latest list of MIBs supported by Cisco, see the Cisco Network Management Toolkit on Cisco Connection Online (CCO). From the CCO home page, click on this path: Service & Support: Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB

Radio Frequency Interface MIBs

The Cisco uBR905 Cable Access Router supports the Radio Frequency Interface (RFI) MIB. The RFI MIB module is defined in RFC 2670  and describes DOCSIS-compliant radio frequency interfaces in cable modems and CMTS. On the cable modem, RFI MIB entries provide:

The RFI MIB includes tables describing both the CMTS and the cable modem side of the cable interface. All cable modem tables are implemented.

With IPsec, data can be transmitted across a public network without fear of observation, modification, or spoofing. This enables applications such as VPNs, extranets, and remote user access.

IPsec services are similar to those provided by Cisco Encryption Technology, a proprietary Cisco security solution. However, IPsec provides a more robust security solution, and is standards based.

Cable-Specific MIBs

Table 4 shows the cable-specific MIBs that are supported on the Cisco uBR905 Cable Access Router. This table also provides a brief description of each MIB's contents and the Cisco IOS software release in which the MIB was initially functional—earlier releases might have had unsupported prototype versions of the MIB; later releases might have added new attributes and functionality.


Note   The names given in Table 4 are the filenames for the MIBs as they exist on Cisco's FTP site (ftp://ftp.cisco.com/pub/mibs/ or http://www.cisco.com/public/mibs /index.htm). Most MIBs are available in both SNMPv1 and SNMPv2 versions; the SNMPv1 versions have V1SMI as part of their filenames. Also see the Cisco MIBs  home page at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.


Table 4: Supported MIBs for the Cisco uBR905 Cable Access Router
MIB Filename Description Release

SNMPv2-SMI.my

SNMPv2-SMI-V1SMI.my

This module specifies the Structure of Management Information (SMI) for SNMPv2, as defined in RFC 1902.

12.1(3) XL

SNMPv2-TC.my

SNMPv2-TC-V1SMI.my

This module defines the textual conventions as specified in pages 4, 10-11 of RFC 854.

12.1(3) XL

CISCO-SMI.my

CISCO-SMI-V1SMI.my

This module specifies the Structure of Management Information (SMI) for Cisco's enterprise MIBs.

12.1(3) XL

CISCO-TC.my

CISCO-TC-V1SMI.my

This module defines the textual conventions used in Cisco's enterprise MIBs.

12.1(3) XL

IF-MIB.my

IF-MIB-V1SMI.my

This module describes generic objects for the Layer 3 network interface sublayers. This MIB is an updated version of MIB-II's if table, and incorporates the extensions defined in RFC 2233.

12.1(3) XL

CISCO-CABLE-SPECTRUM-MIB.my

CISCO-CABLE-SPECTRUM-MIB-V1SMI.my

This module describes the spectrum management flap list attributes.

12.1(3) XL

DOCS-IF-MIB.my

DOCS-IF-MIB-V1SMI.my

This module describes the DOCSIS-compliant Radio Frequency (RF) interfaces in cable modems and cable modem termination systems, as described in RFC 2670.

12.1(3) XL

DOCS-BPI-MIB.my

DOCS-BPI-MIB-V1SMI.my

This module describes the attributes for the DOCSIS-specified Baseline Privacy Interface (BPI) on cable modems and the CMTS.

12.1(3) XL

CISCO-DOCS-EXT-MIB.my

CISCO-DOCS-EXT-MIB-V1SMI.my

This module extends the DOCSIS standard RFI MIB (DOCS-IF-MIB) with Cisco-specific extensions, such as QoS attributes and connection status and other information regarding the cable modems and CPE devices supported by the CMTS.

12.1(3) XL

DOCS-CABLE-DEVICE-MIB.my

DOCS-CABLE-DEVICE-MIB-V1SMI.my

This module was previously known as the CABLE-DEVICE-MIB and contains cable-related objects for DOCSIS-compliant cable modems, as specified in RFC 2669 .

12.1(3) XL


Note   Because of interdependencies, the MIBs must be loaded in the order given in the table.

Deprecated MIBs

A number of Cisco-provided MIBs have been replaced with more scalable, standardized MIBs; these MIBs have filenames that start with "OLD" and first appeared in Cisco IOS Release 10.2. The functionality of these MIBs has already been incorporated into replacement MIBs, but the old MIBs are still present to support existing Cisco IOS products or NMS applications. However, because the deprecated MIBs will be removed from support in the future, you should update your network management applications and scripts to refer to the table names and attributes that are found in the replacement MIBs.

Table 5 shows the deprecated MIBs and their replacements. In most cases, SNMPv1 and SNMPv2 replacements are available, but some MIBs are available only in one version. A few of the deprecated MIBs do not have replacement MIBs; support for these MIBs will be discontinued in a future release of Cisco IOS software.


Table 5: Replacements for Deprecated MIBs
Deprecated MIB Replacement MIBs
SNMPv1 MIB SNMPv2 MIB

OLD-CISCO-APPLETALK-MIB

RFC1243-MIB

OLD-CISCO-CHASSIS-MIB

ENTITY-MIB-V1SMI

ENTITY-MIB

OLD-CISCO-CPU-MIB

CISCO-PROCESS-MIB

OLD-CISCO-DECNET-MIB

OLD-CISCO-ENV-MIB

CISCO-ENVMON-MIB-V1SMI

CISCO-ENVMON-MIB

OLD-CISCO-FLASH-MIB

CISCO-FLASH-MIB-V1SMI

CISCO-FLASH-MIB

OLD-CISCO-INTERFACES-MIB

IF-MIB-V1SMI
CISCO-QUEUE-MIB-V1SMI

IF-MIB
CISCO-QUEUE-MIB

OLD-CISCO-IP-MIB

OLD-CISCO-MEMORY-MIB

CISCO-MEMORY-POOL-MIB-V1SMI

CISCO-MEMORY-POOL-MIB

OLD-CISCO-NOVELL-MIB

NOVELL-IPX-MIB

OLD-CISCO-SYS-MIB

(Compilation of other OLD* MIBS)

OLD-CISCO-SYSTEM-MIB

CISCO-CONFIG-COPY-MIB-V1SMI

CISCO-CONFIG-COPY-MIB

OLD-CISCO-TCP-MIB

CISCO-TCP-MIB-V1SMI

CISCO-TCP-MIB

OLD-CISCO-TS-MIB

OLD-CISCO-VINES-MIB

CISCO-VINES-MIB-V1SMI

CISCO-VINES-MIB

OLD-CISCO-XNS-MIB


Note   Some of the MIBs listed in Table 5 represent feature sets that are not supported on the Cisco uBR905 Cable Access Router.

Caveats

Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

This section contains open and resolved caveats for Cisco IOS Release 12.1(3a) XL1. All caveats in Release 12.1 T are also in Release 12.1(3a) XL1.

For information on caveats in Cisco IOS Release 12.1 T, see Caveats for Cisco IOS Release 12.1 T , which lists severity 1 and 2 caveats, and is located on CCO and the Documentation CD-ROM.


Note   If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco Bugtool Navigator II. Another option is to go to http://www.cisco.com/support/bugtools  (you must have an account on CCO to access this site).

Open Caveats—Release 12.1(3a) XL1

All the caveats listed in this section are open in Release 12.1(3a) XL1:

  The Cisco uBR905 router, when running the NAT and firewall features, crashes if establishing roughly 150 Telnet sessions (using the solaris_telnet client). The workaround is to avoid creating that many Telnet sessions.
  The Cisco uBR905 Cable Access Router can stop responding to CMTS requests when upstreams are configured with different minislot sizes. The workaround is to configure the upstreams on the CMTS with the same minislot size.
  Packets can be unexpectedly dropped on the upstream channel when the Cisco uBR905 is configured to use DOCSIS concatenation and the upstream is using 16 QAM symbol rate. The workaround is to configure the CMTS for a preamble with Unique Word 16 for both the short and long data burst profile. On the Cisco uBR7200 series universal broadband routers, this can be done with the cable modulation-profile global configuration command, specifying uw16 for both the long and short modulation profiles.
  The show interface command can show an impossible number of CRC errors on the cable interface when transmitting VoIP traffic. When this error occurs, the number of CRC errors typically exceeds a billion errors and is greater than the total number of packets transmitted on the interface. The workaround is to use the show interface cable 0 counters command to display the correct number of errors.
  The Cisco uBR905 Cable Access Router can crash when using an access list numbered 100 or 101 while running Cisco IOS Release 12.1 XL images that support any form of IPsec encryption. Other access lists, however, can be used without problem. The workaround is to not configure access list numbers 100 and 101 for any purpose. Instead use access lists 102 through 199 instead.
  The Cisco uBR905 Cable Access Router defaults to using the ip address dhcp command to set the IP address for the cable interface during power-on provisioning. However, the start-up and running configurations show that the cable interface uses the ip address negotiated command instead. Because only the serial interface can use the ip address negotiated command, this generates an "invalid input" error during start-up. This is only a cosmetic error, however, and does not affect any functionality. There is no workaround.
  Using the ip pim interface command on the cable interface can force the Cisco uBR905 to go off-line. The workaround is to avoid enabling IP multicast on the cable interface using the ip pim interface command.
  Upstream performance for data traffic on a DOCSIS 1.0 cable modem is limited to approximately 1.7 mbits per second, due to the limits of using one SID for data traffic, as required by the DOCSIS 1.0 specification. This caveat cannot be resolved until the implementation of the DOCSIS 1.1 specification, which provides for multiple SIDs for data traffic. There is no workaround.
  The Cisco uBR905 router can eventually crash with "out of memory" errors after making several thousand phone calls if the configuration includes the req-qos controlled-load dial-peer configuration command. The workaround is to remove the req-qos controlled-load dial-peer configuration command.
  An SRAM memory leak might occur with a multi-ISAKMP policy configuration that includes an RSA-encryption authentication mode.
  Workaround: Avoid RSA encryption in policy configurations.
  In a multi-ISAKMP policy configuration that includes RSA-encryption and/or RSA-signatures authentication modes, the CM might reload when the clear crypto sa command is issued.
  Workaround: Avoid multi-ISAKMP policy configurations that include either RSA-encryption or RSA-signatures authentication modes.
  Routing Information Protocol version 2 (RIP v2) updates stop after the cable modem attempts renewal of the DHCP lease. This renewal attempt will happen at the half-life of the DHCP lease.
  Workaround: Remove and restart the router RIP process on the cable modem. This will cause the cable interface to go down. After the cable interface is back up again, the RIP V2 update-capability will be restored, until the DHCP lease half-life timer expires again.

Closed or Resolved Caveats—Release 12.1(3a) XL1

  Because Cisco IOS Release 12.1(3a) XL1 is the initial base release, there are no resolved caveats. For a list of the resolved caveats, see the next set of release notes for this release version.

Related Documentation

The following sections describe the documentation available for the Cisco uBR905 Cable Access Router. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.

Most documentation is available as printed manuals or electronic documents, except for feature modules and select manuals, which are available online on CCO and the Documentation CD-ROM.

Use these release notes with these documents:

Release-Specific Documents

The following documents are specific to Release 12.1 and are located on CCO and the Documentation CD-ROM:

  On CCO at:
  Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1
  On the Documentation CD-ROM at:
  Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
  Technical Documents
  As a supplement to the caveats listed in these release notes, see Caveats for Cisco IOS
Release 12.1 T, which contains caveats applicable to all platforms for all maintenance releases of Release 12.1 T.
  On CCO at:
  Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Caveats
  On the Documentation CD-ROM at:
  Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS 12.1: Release Notes: Caveats

Note   If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco Bugtool Navigator II. Another option is to go to http://www.cisco.com/support/bugtools (you must have an account on CCO to access this site).

Platform-Specific Documents

These documents are available for the Cisco uBR905 Cable Access Router on CCO and the Documentation DC-ROM:


Note   The Cisco uBR905 Cable Access Router Installation and Configuration Guide is still available on CCO but has been obsoleted by the hardware and software guides listed above.

On CCO at:

Technical Documents: Documentation Home Page: Cisco Product Documentation: Broadband/Cable Solutions: Cisco uBR900 Series Cable Access Routers

On the Documentation CD-ROM at:

Cisco Product Documentation: Broadband/Cable Solutions: Cisco uBR900 Series Cable Access Routers

Feature Modules

Feature modules describe new features supported by Release 12.1, and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation

Cisco IOS Software Documentation Set

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are available in electronic form on the Documentation CD-ROM and CCO, as well as separately orderable in printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.

On CCO and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

Release 12.1 Documentation Set

Table 6 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in electronic form and in printed form upon request.


Note   You can find the most current Cisco IOS documentation on CCO  and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1


Table 6: Cisco IOS Software Release 12.1 Documentation Set
Books Major Topics

  • Cisco IOS Configuration Fundamentals Configuration Guide

  • Cisco IOS Configuration Fundamentals Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
Cisco IOS File Management
Cisco IOS System Management
Cisco IOS User Interfaces Commands
Cisco IOS File Management Commands
Cisco IOS System Management Commands

  • Cisco IOS Bridging and IBM Networking Configuration Guide

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume I

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume II

Transparent Bridging
Source-Route Bridging
Token Ring Inter-Switch Link
Remote Source-Route Bridging
DLSw+
Serial Tunnel and Block Serial Tunnel Commands
LLC2 and SDLC Commands
IBM Network Media Translation Commands
SNA Frame Relay Access Support Commands
NCIA Client/Server Commands
Airline Product Set Commands

  • Cisco IOS Dial Services Configuration Guide: Terminal Services

  • Cisco IOS Dial Services Configuration Guide: Network Services

  • Cisco IOS Dial Services Command Reference

Preparing for Dial Access
Modem Configuration and Management
ISDN and Signalling Configuration
PPP Configuration
Dial-on-Demand Routing Configuration
Dial-Backup Configuration
Terminal Service Configuration
Large-Scale Dial Solutions
Cost-Control Solutions
Virtual Private Networks
X.25 on ISDN Solutions
Telco Solutions
Dial-Related Addressing Services
Dial Access Scenarios

  • Cisco IOS Interface Configuration Guide

  • Cisco IOS Interface Command Reference

Interface Configuration Overview
Configuring LAN Interfaces
Configuring Serial Interfaces
Configuring Logical Interfaces

  • Cisco IOS IP and IP Routing Configuration Guide

  • Cisco IOS IP and IP Routing Command Reference

IP Overview
IP Addressing and Services
IP Routing Protocols
IP Multicast

  • Cisco IOS AppleTalk and Novell IPX Configuration Guide

  • Cisco IOS AppleTalk and Novell IPX Command Reference

AppleTalk and Novell IPX Overview
Configuring AppleTalk
Configuring Novell IPX

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Configuration Guide

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Command Reference

Overview
Configuring Apollo Domain
Configuring Banyan VINES
Configuring DECnet
Configuring ISO CLNS
Configuring XNS

  • Cisco IOS Multiservice Applications Configuration Guide

  • Cisco IOS Multiservice Applications Command Reference

Multiservice Applications Overview
Voice
Video
Broadband

  • Cisco IOS Quality of Service Solutions Configuration Guide

  • Cisco IOS Quality of Service Solutions Command Reference

Quality of Service Overview
Classification
Congestion Management
Congestion Avoidance
Policing and Shaping
Signalling
Link Efficiency Mechanisms
Quality of Service Solutions

  • Cisco IOS Security Configuration Guide

  • Cisco IOS Security Command Reference

Security Overview
Authentication, Authorization, and Accounting (AAA)
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Configuring Passwords and Privileges
Neighbor Router Authentication
Configuring IP Security Options

  • Cisco IOS Switching Services Configuration Guide

  • Cisco IOS Switching Services Command Reference

Cisco IOS Switching Services Overview
Cisco IOS Switching Paths
Cisco Express Forwarding
NetFlow Switching
Multiprotocol Label Switching
Multilayer Switching
Multicast Distributed Switching
Virtual LANs
LAN Emulation

  • Cisco IOS Wide-Area Networking Configuration Guide

  • Cisco IOS Wide-Area Networking Command Reference

Introduction: Wide-Area Networking Overview
Configuring ATM
Configuring Frame Relay
Configuring Frame Relay-ATM Interworking
Configuring SMDS
Configuring X.25 and LAPB

  • Cisco IOS Configuration Master Index

  • Cisco IOS Command Reference Master Index

  • Cisco IOS Debug Command Reference

  • Cisco IOS Dial Services Quick Configuration Guide

  • Cisco IOS Software System Error Messages

  • Cisco IOS Configuration Guide Master Index

  • New Features in 12.1-Based Limited Lifetime Releases

  • New Features in Release 12.1 T

  • Release Notes (Release note and caveat documentation for 12.1-based releases and various platforms)

 


Note   Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with CCO, you can find latest list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, press Login at CCO and go to Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB.

Obtaining Documentation

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com. Translated documentation can be accessed at http://www.cisco.com/public/countries_languages.shtml.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.

Ordering Documentation

Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.

Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).

Obtaining Technical Assistance

Cisco provides Cisco Connection Online (CCO)  as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the Web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.

Cisco Connection Online

Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.

CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.

You can access CCO  in the following ways:

You can e-mail questions about using CCO to cco-team@cisco.com.

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.

To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.

To contact TAC by e-mail, use one of the following:

Language
E-mail Address

English

tac@cisco.com

Hanzi (Chinese)

chinese-tac@cisco.com

Kanji (Japanese)

japan-tac@cisco.com

Hangul (Korean)

korea-tac@cisco.com

Spanish

tac@cisco.com

Thai

thai-tac@cisco.com

In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.

Software Configuration Tips on the Cisco Technical Assistance Center Home Page

If you have a CCO login account, you can access the following URL, which contains links and tips on configuring your Cisco products:

http://www.cisco.com/kobayashi/technotes/serv_tips.shtml

This URL is subject to change without notice. If it changes, point your Web browser to CCO,  press Login, and click on this path: Technical Assistance Center: Technical Tips.

The following sections are provided from the Technical Tips page:

Documentation Feedback

If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.

You can e-mail your comments to bug-doc@cisco.com.

To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:

Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate and value your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Sep 29 14:09:11 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.