Release Notes for Cisco Catalyst IE3x00 Rugged, IE 3400 Heavy Duty, and ESS3300 Series Switches, Cisco IOS XE Amsterdam 17.2.x
First Published: 2020-03-14
Last Modified: 2020-03-27
Introduction
Cisco Catalyst IE3x00 Rugged Series switches feature advanced, full Gigabit Ethernet speed for rich real-time data and a modular, optimized design. These Cisco rugged switches bring simplicity, flexibility, and security to the network edge, and are optimized for size, power, and performance.
From their end-to-end security architecture to delivering centralized automation and scale with Cisco intent-based networking, the Cisco Catalyst IE3x00 family is the perfect solution to your switching needs in almost any use case.
Cisco Embedded Services 3300 Series Switches (ESS3300) revolutionize Cisco’s embedded networking portfolio with 1G/10G capabilities. ESS3300 switches are optimized to meet specialized form-factor, ruggedization, port density, and power needs of many applications requiring customization and complement Cisco’s off-the-shelf Industrial Ethernet switching portfolio.
On the ESS3300, the compact PC 104 form factor, board configuration options, and optimized power consumption provide Cisco partners and integrators the flexibility to design custom solutions for defense, oil and gas, transportation, mining, and other verticals. The ESS3300 runs the trusted and feature-rich Cisco IOS XE Software, allowing Cisco partners and integrators to offer their customers the familiar Cisco IOS CLI and management experience on their ESS3300–based solutions.
New Features for Cisco Catalyst IE and ESS Switches in Cisco IOS XE 17.2.1
The following features apply to both the IE3x00 and ESS3300 switches unless specifically mentioned.
Feature Name | License Level | Description, and Documentation Link Information |
---|---|---|
Express setup and Day 0 co-existence | Network Essentials and Advantage | Express setup is a switch manageability feature used by IoT customers for configuring the factory default switch to make it ready to plug into connected factory architecture. Prerequisite for express setup is switch must not be running non-default configuration. Perform 'short press' from the push button as per the user instruction guide, switch is going to be configured in the background made ready for the installation. Day-0 is a feature used by enterprise switches to make factory default switch configuration ready for management and control. Prerequisite for day-0 is same as in express setup feature, with day-0 user can configure IP address, VLAN Id, NTP server and new user creation. |
HSRP (IPv4 and IPv6) | Network Advantage | HSRP (Hot Standby Router Protocol) is a redundancy protocol to provide gateway redundancy without any additional configuration on the end devices in the subnet. With HSRP configured between a set of routers (treated as HSRP group or a standby group), they work in concert to present the appearance of a single virtual router to the hosts on the LAN. A single router elected from the group is responsible for forwarding the packets that hosts send to the virtual router. This router is known as the Active router. Another router is elected as the Standby router. In the event that the Active router fails, the Standby assumes the packet-forwarding duties of the Active router. Although an arbitrary number of routers may run HSRP, only the Active router forwards the packets sent to the virtual router. To minimize network traffic, only the Active and Standby routers send periodic HSRP messages once the protocol has completed the election process. If the Active router fails, the Standby router takes over as the Active router. If the Standby router fails or becomes the ACTIVE router, then another router is elected as the Standby router. |
Boot from USB (Not supported on IE 3400H) | Network Essentials and Advantage | Supporting USB flash drive in bootloader will enable the switch to be able to boot software images from the USB flash drive. In bootloader, the functional behaviour of USB flash drive will be similar to that of SD cards. |
VRRP (IPv4 and IPv6) | Network Advantage | The Virtual Router Redundancy Protocol (VRRP). VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on a LAN. The VRRP router controlling the IP address(es) associated with a virtual router is called the Master, and forwards packets sent to these IP addresses. The election process provides dynamic fail over in the forwarding responsibility should the Master become unavailable. This allows any of the virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host. |
PBR (Policy Based Routing) | Network Advantage | PBR (Policy Based Routing) is a technique used to make routing decisions based on policies configured. When a Router/Switch receives a packet, forwarding decision is based on the destination IP Address of a packet, which is used to look up an entry in a routing table. However, in some cases, there may be a need to forward the packet based on other criteria. e.g., Source IP address, not the Destination IP Address. This permits routing of packets originating from different sources to different networks even when the destinations are the same and can be useful when interconnecting several private networks. |
Routed Jumbo Frame Support | Network Essentials and Advantage | Jumbo frames are frames larger than the standard Ethernet frame size of 1518 bytes, which includes the Layer 2 header and Frame Check Sequence (FCS). In other words, jumbo frames refer to Ethernet packets of up to 9000 bytes in size. When the jumbo frame feature is enabled on a port, the port can switch large or jumbo frames. This feature optimizes server-to-server performance. The default Maximum Transmission Unit (MTU) frame size is 1548 bytes for all Ethernet ports. The jumbo frame MTU size is limited to 2000 for advanced SKUs(3400/3400H) and 8996 for other SKUs when jumbo frame feature is enabled on a port. |
MSDP (Multicast Source Discovery Protocol) | Network Advantage | MSDP is often used between Anycast RP within a PIM domain to synchronize information about the active sources being served by each Anycast-RP peer (by virtue of IGP reachability). MSDP will be supported in inter domain deployments or in deployment where MSDP peering happens without BGP (MBGP). No claim for Intra domain deployments in this Phase as MBGP is not fully qualified for support. |
Flow-based SPAN | Network Essentials and Advantage | FSPAN is used, in order to mirror the traffic based on filter cirteria. FSPAN supports three types of access control lists to the span session and filtering based on vlan. |
IPv4/IPv6 Multicast routing BSR | Network Advantage | BSR (Bootstrap) is a protocol that we use to automatically find RP in multicast network. BSR supports PIMv2 and its not cisco proprietary. From platform perspective infra is in place to handle control packets and BSR msg exchanges. Elected RP node info/address is not maintained at the PD level explicitly. RP election is a PI functionality and once after the RP election according to the populated S,G or *,G routes will be updated to elected RP. No specific configuration or show commands are in place from platform perspective |
Auto RP (IPv4) | Network Advantage | A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number of routers can be configured to work as RPs and they can be configured to cover different group ranges. For correct operation, every multicast router within a Protocol Independent Multicast (PIM) domain must be able to map a particular multicast group address to the same RP. Auto-RP is a mechanism to automate distribution of RP information in a multicast network. The Auto-RP mechanism operates using two basic components, the candidate RPs and the RP mapping agents. |
IPv6 Multicast routing Embedded RP | Network Advantage | With this feature RP addresses are bound into Group addresses. No explicit configuration needs to be done to enable this feature. Initial Incoming Multicast data packets from source S to group G gets punted to CPU. When Flag field (4 bits) is set to 0111 (0x7) it indicates RP addresses is binded into Group address. Address with different Scope level (1,2,4,5,8,E) will be supported. No specific configuration or show commands are in place from platform perspective |
IPv6 FHS RA Guard | Network Essentials and Advantage | Router advertisements can be used by hosts to automatically configure their own IPv6 address and set a default route using the information they see in the RA. Hosts automatically select a router advertisement and they don't care where it came from. This is how it was meant to be, but it does introduce a security risk since any device can send router advertisements and your hosts will happily accept it. An attacker can send rogue router advertisements to redirect the traffic, or you can send so many RAs that it causes a DOS since your hosts will be too busy configuring their IPv6 prefixes. |
IPv6 FHS DHCPv6 Guard | Network Essentials and Advantage | IPv6 DHCPv6 Guard is one of the IPv6 FHS (First Hop Security) mechanisms and is very similar to IPv4 DHCP snooping. This feature inspects DHCPv6 messages between a DHCPv6 server and DHCPv6 client (or relay agent) and blocks DHCPv6 reply and advertisements from (rogue) DHCPv6 servers. DHCPv6 messages from clients or relay agents to a DHCPv6 server are not affected. |
Web authentication (Flexible Authentication – 802.1x, dACL, customizable web auth) | Network Essentials and Advantage | With this feature, users can acquire network resource access by specifying their user credentials (viz. username, password, etc). When a host initiates an http session, web-based authentication intercepts ingress http packets from the host and sends an html login page to the user. The users enter their credentials, which the web-based authentication feature sends to the authentication, authorization, and accounting server for authentication. If authentication succeeds, web-based authentication sends a Login-Successful html page to the host and applies the access policies returned by the AAA server. If authentication fails, web-based authentication forwards a Login-Fail html page to the user, prompting the user to retry the login. If the user exceeds the maximum number of attempts, web-based authentication forwards a Login-Expired html page to the host. |
IPv6 QoS | Network Essentials and Advantage | QoS features supported for IPv6 environments include packet classification, queuing, class-based packet marking, and policing of IPv6 packets. IPv6 packets are forwarded by paths that are different from those for IPv4. All QoS features available for IPv6 environments are managed from the modular QoS command-line interface (MQC). The MQC allows you to define traffic classes, create and configure traffic policies (policy maps), and then attach those traffic policies to interfaces. |
IOx Container support - Native Docker Support (IE-3400/IE-3400H/ESS3300 only) | Network Essentials | Starting with 17.2.1, IOX images on IE3400 support native Docker. IOx executes the container image. |
IOx - Support for FSPAN/ERSPAN of packets to the AppGig port (IE-3400/IE-3400H/ESS3300 only) | Network Essentials | Flow Based SPAN – allows for specific traffic flows to be redirected to AppGigabitEthernet 1/1 interface for input to IOx applications. SPAN Session can be configured for ERSPAN encapsulation preserving orginal ingress time, and ingress port. |
Important Notes
Complete List of Supported Features
For the complete list of features supported on a platform, see the Cisco Feature Navigator at https://www.cisco.com/go/cfn.
Accessing Hidden Commands
Hidden commands have always been present in Cisco IOS XE, but were not equipped with CLI help. This means that entering enter a question mark (?) at the system prompt did not display the list of available commands. Such hidden commands are only meant to assist Cisco TAC in advanced troubleshooting and are therefore not documented. For more information about CLI help, see the Using the Command-Line Interface → Understanding the Help System chapter of the Command Reference document.
This section provides information about hidden commands in Cisco IOS XE and the security measures in place, when they are accessed. Hidden commands are meant to assist Cisco TAC in advanced troubleshooting and are therefore not documented. For more information about CLI help, see the Using the Command-Line Interface → Understanding the Help System chapter of the Command Reference document.
Hidden commands are available under:
- Category 1—Hidden commands in privileged or User EXEC mode. Begin by entering the
service internal
command to access these commands. - Category 2—Hidden commands in one of the configuration modes (global, interface and so on). These commands do not require the
service internal
command.
Further, the following applies to hidden commands under Category 1 and 2:
- The commands have CLI help. Entering enter a question mark (?) at the system prompt displays the list of available commands.
Cisco IE3x00 Rugged and ESS3300 Supported Hardware
Cisco Catalyst IE3x00 Rugged, IE 3400 Heavy Duty and ESS3300 Series Switches—Model Numbers
The following table lists the supported hardware models and the default license levels they are delivered with. For information about the available license levels, see section License Levels.
Model Number | Default License Level¹ | Description |
---|---|---|
ESS-3300-NCP-E | Network Essentials | Main Board without a cooling plate. 2 ports of 10 GE fiber, 8 ports of GE copper. 4 of the 8 GE copper ports can also be combo ports. Terminal Power: 16W |
ESS-3300-CON-E | Network Essentials | Main Board conduction cooled. 2 ports of 10 GE fiber, 8 ports of GE copper. 4 of the 8 GE copper ports can also be combo ports. Terminal Power: 16W |
ESS-3300-24T-NCP-E | Network Essentials | Main Board with a 16p Expansion Board without a cooling plate. 2 ports of 10 GE fiber, 24 ports of GE copper. 4 of 8 GE ports can be combo ports on mainboard. 4 of 16 GE ports can be combo ports on expansion board. Terminal Power: 24W |
ESS-3300-24T-CON-E | Network Essentials | Main Board with a 16p Expansion Board conduction cooled. 2 ports of 10 GE fiber, 24 ports of GE copper. 4 of 8 GE ports can be combo ports on mainboard. 4 of 16 GE ports can be combo ports on expansion board. Terminal Power: 24W |
IE-3200-8T2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE |
IE-3200-8P2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 240W |
IE-3300-8T2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE |
IE-3300-8P2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 360W (including expansion module) |
IE-3300-8T2S-A | Network Advantage | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE |
IE-3300-8P2S-A | Network Advantage | 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 360W (including expansion module) |
IE-3400-8T2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE |
IE-3400-8T2S-A | Network Advantage | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE |
IE-3400-8P2S-E | Network Essentials | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports with PoE |
IE-3400-8P2S-A | Network Advantage | 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports with PoE |
IE-3400H-8T-E | Network Essentials | 8x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-8T-A | Network Advantage | 8x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-8FT-E | Network Essentials | 8 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
IE-3400H-8FT-A | Network Advantage | 8 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
IE-3400H-16T-E | Network Essentials | 16x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-16T-A | Network Advantage | 16x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-16FT-E | Network Essentials | 16 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
IE-3400H-16FT-A | Network Advantage | 16 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
IE-3400H-24T-E | Network Essentials | 24x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-24T-A | Network Advantage | 24x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source |
IE-3400H-24FT-E | Network Essentials | 24 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
IE-3400H-24FT-A | Network Advantage | 24 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source . |
Expansion Modules
The following table lists the optional expansion modules for the IE3300 and IE3400 base systems. Modules with IEM-3400-xx are only supported on IE3400 base systems. IEM expansion modules that support POE are only supported on Base systems that support POE.
Expansion Module | Description |
---|---|
IEM-3300-8T | 8 copper Gigabit Ethernet ports. Non PoE. |
IEM-3300-8P | 8 copper Gigabit Ethernet ports. With PoE |
IEM-3300-8S | 8 SFP Gigabit Ethernet ports. Non PoE. |
IEM-3300-16T | 16 copper Gigabit Ethernet ports. Non PoE. |
IEM-3300-16P | 16 copper Gigabit Ethernet ports. With PoE. |
IEM-3300-6T2S | 6 copper Gigabit Ethernet ports and 2 SFP Gigabit ports. Non PoE. |
IEM-3300-14T2S | 14 copper Gigabit Ethernet ports, and 2 SFP Gigabit ports. Non PoE. |
IEM-3400-8T | 8 copper Gigabit Ethernet ports with Advanced features. Non PoE. |
IEM-3400-8S | 8 SFP Gigabit Ethernet ports with Advanced features. Non PoE. |
IEM-3400-8P | 8 copper Gigabit Ethernet ports with Advanced features with PoE. |
Optics Modules
Cisco Catalyst Series Switches support a wide range of optics and the list of supported optics is updated on a regular basis. Use the Transceiver Module Group (TMG) Compatibility Matrix tool, or consult the tables at this URL for the latest transceiver module compatibility information: https://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Web UI System Requirements
The Web UI is http/https browser based Switch management tool running on the switch. The following subsections list the hardware and software required to access the Web UI.
Minimum Hardware Requirements
Processor Speed | DRAM | Number of Colors | Resolution | Font Size |
---|---|---|---|---|
233 MHz minimum² | 512 MB³ | 256 | 1280 x 800 or higher | Small |
² We recommend 1 GHz
³ We recommend 1 GB DRAM
Upgrading the Switch Software
Software Requirements
Operating Systems
- Windows 10 or later
- Mac OS X 10.9.5 or later
Browsers
- Google Chrome—Version 59 or later (On Windows and Mac)
- Microsoft Edge
- Mozilla Firefox—Version 54 or later (On Windows and Mac)
- Safari—Version 10 or later (On Mac)
Finding the Software Version
The package files for the Cisco IOS XE software can be found on the system board flash device flash: (flash:) or external SDFlash (sdflash:).
You can use the show version
privileged EXEC command to see the software version that is running on your switch.
Note: Although the show version
output always shows the software image running on the switch, the model name shown at the end of this display is the factory configuration and does not change if you upgrade the software license.
You can also use the dir filesystem:
privileged EXEC command to see the directory names of other software images that you might have stored in flash memory.
Software Images 17.2x
Release | Image Type | File Name |
---|---|---|
Cisco IOS XE.17.2.1 | Universal | ie3x00-universalk9.17.02.01.SPA.bin |
NPE | ess3x00-universalk9.17.02.01.SPA.bin | |
NPE | ie3x00-universalk9_npe.17.02.01.SPA.bin |
Automatic Boot Loader Upgrade
When you upgrade from the existing release on your switch to a later or newer release for the first time, the boot loader may be automatically upgraded, based on the hardware version of the switch. If the boot loader is automatically upgraded, it will take effect on the next reload.
For subsequent Cisco IOS XE releases, if there is a new bootloader in that release, it may be automatically upgraded based on the hardware version of the switch when you boot up your switch with the new image for the first time.
Caution: Do not power cycle your switch during the upgrade.
Scenario | Automatic Boot Loader Response |
---|---|
If you boot Cisco IOS XE the first time | Boot loader may be upgraded to version "6.1.7" for IE3x00 and ESS-3300. Checking Bootloader upgrade... Bootloader upgrade successful |
Bundle Mode Upgrade
To upgrade the Cisco IOS XE software when the switch is running in bundle mode, follow these steps:
Procedure
- Download the bundle file to local storage media.
- Configure the
boot system
global configuration command to point to the bundle file. - Reload the switch.
Example
Upgrading Cisco IOS XE Software Bundle Mode
This example shows the steps to upgrade the Cisco IOS XE software on a switch that is running in bundle mode. It shows using the copy
command to copy the bundle file to flash:, configuring the boot system variable to point to the bundle file, saving a copy of the running configuration, and finally, reloading the switch.
r1#copy scp: sdflash: Address or name of remote host (11.1.1.22]? 11.1.1.22 Source username [*****]? [Username removed] ***** <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< Source filename [11.1.1.22]? ie3x00-universalk9.17.02.01.SPA.bin Destination filename (ie3x00-universalk9.17.02.01.SPA.bin]? WARNING!!! READ THIS BEFORE ATTEMPTING TO LOGON This System is for the use of authorized users only. Individuals using this computer without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel. In the course of monitoring individuals improperly using this system, or in the course of system maintenance, the activities of authorized users may also be monitored. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials. Cisco Acceptable Use Policy: http://wwwin.cisco.com/infosec/policies/acceptableuse.shtml Password: Sending file modes: C0777 324770311 ie3x00-universalk9.17.02.01.SPA.bin ................................ ................ 324770311 bytes copied in 653.828 secs (496721 bytes/sec) r1# r1#conf t Enter configuration commands, one per line. End with CNTL/Z. r1(config)# r1(config)#no boot manual r1(config)# r1(config)#2no boot system r1(config)# r1(config)#boot system sdflash:ie3x00-universalk9.17.02.01.SPA.bin r1(config)# r1# r1# r1#wr Building configuration... *Jan 17 22:24:18.070: %SYS-5-CONFIG I: Configured from console by console [OK] *Jan 17 22:24:36.293: %SYS-6-PRIVCFG ENCRYPT SUCCESS: Successfully encrypted private config file r1# r1# r1# r1#reload Proceed with reload? (confirm)
Software Installation Commands
Summary of Software Installation Commands
To install and activate the specified file, and to commit changes to be persistent across reloads—install add file filename [activate commit]
Command | Description |
---|---|
add file filename |
Copies the install file package from a remote location to the device and performs a compatibility check for the platform and image versions. |
activate [auto-abort-timer] |
Activates the file, and reloads the device. The auto-abort-timer keyword automatically rolls back image activation. |
commit |
Makes changes persistent over reloads. |
remove |
Deletes all unused and inactive software installation files. |
Licensing
License Levels
This section provides information about the licensing packages for features available on Cisco Catalyst ie3x00 Rugged, and ESS3300 series switches.
The software features available on Cisco Catalyst ie3x00 Rugged and ESS3300 switches, fall under these base or add-on license levels.
Base Licenses
- Network Essentials
- Network Advantage—Includes features available with the Network Essentials license and more.
Add-On Licenses
Add-On Licenses require a Network Essentials or Network Advantage as a pre-requisite. The features available with add-on license levels provide Cisco innovations on the switch, as well as on the Cisco Digital Network Architecture Center (Cisco DNA Center).
- DNA Essentials
- DNA Advantage— Includes features available with the DNA Essentials license and more.
To find information about platform support and to know which license levels a feature is available with, use Cisco Feature Navigator. To access Cisco Feature Navigator, go to https://www.cisco.com/go/cfn. An account on cisco.com is not required.
Feature Licenses
Feature Licenses are bound to aspecific feature or set of features. Feature licenses can be enabled regardless of Base License (Network Advantage or Network Essential). Feature licenses are smart licenses as well and require a smart account to be activated.
MRP requires a feature license. there are 2 MRP licenses available for IE3x00.
- LIC-MRP-MGR-XE= MRP Ring Manager license.
- LIC-MRP-CLIENT-XE= MRP Ring Client License.
platform license feature [mrp-client | mrp-manager]
Use "platform license feature [mrp-client | mrp-manager]" to add the license, then follow the SL or SLR process to activate the feature license.
License Types
The following license types are available:
- Permanent—for a license level, and without an expiration date.
- Evaluation—a license that is not registered.
License Levels - Usage Guidelines
- Base licenses (Network-Advantage) are ordered and fulfilled only with a permanent license type.
- Add-on licenses (DNA Advantage) are ordered and fulfilled only with a term license type.
- An add-on license level is included when you choose a network license level. If you use DNA features, renew the license before term expiry, to continue using it, or deactivate the add-on license and then reload the switch to continue operating with the base license capabilities.
- Evaluation licenses cannot be ordered. They are not tracked via Cisco Smart Software Manager and expire after a 90-day period. Evaluation licenses can be used only once on the switch and cannot be regenerated. Warning system messages about an evaluation license expiry are generated only 275 days after expiration and every week thereafter. An expired evaluation license cannot be reactivated after reload.
Note: Network Essentials license is the default license. It is permanent. A connection to the Smart Licensing server is not required if IE Switch will be deployed with network Essentials license
Smart Licensing
Cisco Smart Licensing is a unified license management system that manages all the software licenses across Cisco products.
Deploying Smart Licensing
It enables you to purchase, deploy, manage, track and renew Cisco Software. It provides information about license ownership and consumption through a single user interface.
The solution is composed of Smart Accounts and Cisco Smart Software Manager. The former is an online account of your Cisco software assets and is required to use the latter. Cisco Smart Software Manager is where you can perform all your licensing management related tasks, such as, registering, de-registering, moving, and transferring licenses. Users can be added and given access and permissions to the smart account and specific virtual accounts.
Important: Cisco Smart Licensing is the default and the only available method to manage licenses on IE3x00 products.
Deploying Smart Licensing
The following provides a process overview of a day 0 to day N deployment directly initiated from a device. Links to the configuration guide provide detailed information to help you complete each one of the smaller tasks.
Procedure
- Begin by establishing a connection from your network to Cisco Smart Software Manager on cisco.com.
- Create and activate your Smart Account, or login if you already have one.
To create and activate Smart Account, go to Cisco Software Central → Create Smart Accounts. Only authorized users can activate the Smart Account. - Complete the Cisco Smart Software Manager set up.
a) Accept the Smart Software Licensing Agreement.
b) Set up the required number of Virtual Accounts, users and access rights for the virtual account users.
Virtual accounts help you organize licenses by business unit, product type, IT group, and so on.
With this,
- The device is now in an authorized state and ready to use.
- The licenses that you have purchased are displayed in your Smart Account.
What to do next
- Register and convert traditional licenses to Smart Licenses
Using Smart Licensing on an Out-of-the-Box Device
If an out-of-the-box device has the software version factory-provisioned, all licenses on such a device remain in evaluation mode until registered in Cisco Smart Software Manager.
How Upgrading or Downgrading Software Affects Smart Licensing
Note how upgrading to a release that supports Smart Licensing or moving to a release that does not support Smart Licensing affects licenses on a device:
- When you upgrade from an earlier release to one that supports Smart Licensing—all existing licenses remain in evaluation mode until registered in CiscoSmartSoftware Manager. After registration, they are made available in your Smart Account.
- When you downgrade to a release where Smart Licensing is not supported—all smart licenses on the device are converted to traditional licenses and all smart licensing information on the device is removed.
Caveats
Caveats describe unexpected behavior in Cisco IOS-XE releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Cisco Bug Search Tool
The Cisco BugSearch Tool (BST) allows partners and customersto search forsoftware bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The BST is designed to improve the effectivenessin network risk management and device troubleshooting. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat, click on the identifier.
Open Caveats in Cisco IOS XE 17.2.1
Identifier | Description |
---|---|
CSCvs04837 | Webauth : Login page is not coming when virtual-IP is configured in the switch. |
CSCvs30801 | dACL download is failing when number of ACEs are 30 with both webauth and dot1x session. |
CSCvs40032 | TCAM entries create/update/modify is not happening properly with both IPv4 and IPv6 dACL |
CSCvt02699 | DHCPV6 clients unable to recieve ip address with Petra as V6DHCP server |
CSCvt03350 | QinQ: mac-learning disabled on dot1q-tunnel port after port-sec and storm-control |
CSCvt16054 | WEBAUTH: on reaching 255aces/port, new incoming http connections are allowed without auth |
CSCvt20731 | [RSPAN]: Remote-Span issues with Port-Channel |
CSCvt30079 | External alarm relay does not truly clear a fault from the system |
CSCvt06469 | Undesirable Autosave of Running Config to eMMC flash |
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at this URL: https://www.cisco.com/en/US/support/index.html
Go to Product Support and select your product from the list or enter the name of your product. Look under Troubleshoot and Alerts, to find information for the problem that you are experiencing.
Related Documentation
Information about Cisco IOS XE at this URL: https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html
All support documentation for Cisco Catalyst IE3200 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3200-rugged-series/tsd-products-support-series-home.html
All support documentation for Cisco Catalyst IE3300 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3300-rugged-series/tsd-products-support-series-home.html
All support documentation for Cisco Catalyst IE3400 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3400-rugged-series/tsd-products-support-series-home.html
All support documentation for Cisco Catalyst IE3400H Heavy Duty Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3400-heavy-duty-series/tsd-products-support-series-home.html
All support documentation for Cisco ESS-3000 Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/embedded-service-3000-series-switches/tsd-products-support-series-home.html
All support documentation for Cisco 1100 Series Industrial Integrated Services Routers is at this URL: https://www.cisco.com/c/en/us/support/routers/1100-series-industrial-integrated-services-routers/tsd-products-support-series-home.html
Cisco Validated Designs documents at this URL: https://www.cisco.com/go/designzone
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs
Communications, Services, and Additional Information
- To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
- To get the business impact you're looking for with the technologies that matter, visit Cisco Services.
- To submit a service request, visit Cisco Support.
- To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
- To obtain general networking, training, and certification titles, visit Cisco Press.
- To find warranty information for a specific product or product family, access Cisco Warranty Finder.