Release Notes for Cisco Catalyst IE3x00 Rugged, IE 3400 Heavy Duty, and ESS3300 Series Switches, Cisco IOS XE Amsterdam 17.2.x

First Published: 2020-03-14

Last Modified: 2020-03-27

Introduction

Cisco Catalyst IE3x00 Rugged Series switches feature advanced, full Gigabit Ethernet speed for rich real-time data and a modular, optimized design. These Cisco rugged switches bring simplicity, flexibility, and security to the network edge, and are optimized for size, power, and performance.

From their end-to-end security architecture to delivering centralized automation and scale with Cisco intent-based networking, the Cisco Catalyst IE3x00 family is the perfect solution to your switching needs in almost any use case.

Cisco Embedded Services 3300 Series Switches (ESS3300) revolutionize Cisco’s embedded networking portfolio with 1G/10G capabilities. ESS3300 switches are optimized to meet specialized form-factor, ruggedization, port density, and power needs of many applications requiring customization and complement Cisco’s off-the-shelf Industrial Ethernet switching portfolio.

On the ESS3300, the compact PC 104 form factor, board configuration options, and optimized power consumption provide Cisco partners and integrators the flexibility to design custom solutions for defense, oil and gas, transportation, mining, and other verticals. The ESS3300 runs the trusted and feature-rich Cisco IOS XE Software, allowing Cisco partners and integrators to offer their customers the familiar Cisco IOS CLI and management experience on their ESS3300–based solutions.

New Features for Cisco Catalyst IE and ESS Switches in Cisco IOS XE 17.2.1

The following features apply to both the IE3x00 and ESS3300 switches unless specifically mentioned.

Feature Name License Level Description, and Documentation Link Information
Express setup and Day 0 co-existence Network Essentials and Advantage Express setup is a switch manageability feature used by IoT customers for configuring the factory default switch to make it ready to plug into connected factory architecture. Prerequisite for express setup is switch must not be running non-default configuration. Perform 'short press' from the push button as per the user instruction guide, switch is going to be configured in the background made ready for the installation. Day-0 is a feature used by enterprise switches to make factory default switch configuration ready for management and control. Prerequisite for day-0 is same as in express setup feature, with day-0 user can configure IP address, VLAN Id, NTP server and new user creation.
HSRP (IPv4 and IPv6) Network Advantage HSRP (Hot Standby Router Protocol) is a redundancy protocol to provide gateway redundancy without any additional configuration on the end devices in the subnet. With HSRP configured between a set of routers (treated as HSRP group or a standby group), they work in concert to present the appearance of a single virtual router to the hosts on the LAN. A single router elected from the group is responsible for forwarding the packets that hosts send to the virtual router. This router is known as the Active router. Another router is elected as the Standby router. In the event that the Active router fails, the Standby assumes the packet-forwarding duties of the Active router. Although an arbitrary number of routers may run HSRP, only the Active router forwards the packets sent to the virtual router. To minimize network traffic, only the Active and Standby routers send periodic HSRP messages once the protocol has completed the election process. If the Active router fails, the Standby router takes over as the Active router. If the Standby router fails or becomes the ACTIVE router, then another router is elected as the Standby router.
Boot from USB (Not supported on IE 3400H) Network Essentials and Advantage Supporting USB flash drive in bootloader will enable the switch to be able to boot software images from the USB flash drive. In bootloader, the functional behaviour of USB flash drive will be similar to that of SD cards.
VRRP (IPv4 and IPv6) Network Advantage The Virtual Router Redundancy Protocol (VRRP). VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on a LAN. The VRRP router controlling the IP address(es) associated with a virtual router is called the Master, and forwards packets sent to these IP addresses. The election process provides dynamic fail over in the forwarding responsibility should the Master become unavailable. This allows any of the virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host.
PBR (Policy Based Routing) Network Advantage PBR (Policy Based Routing) is a technique used to make routing decisions based on policies configured. When a Router/Switch receives a packet, forwarding decision is based on the destination IP Address of a packet, which is used to look up an entry in a routing table. However, in some cases, there may be a need to forward the packet based on other criteria. e.g., Source IP address, not the Destination IP Address. This permits routing of packets originating from different sources to different networks even when the destinations are the same and can be useful when interconnecting several private networks.
Routed Jumbo Frame Support Network Essentials and Advantage Jumbo frames are frames larger than the standard Ethernet frame size of 1518 bytes, which includes the Layer 2 header and Frame Check Sequence (FCS). In other words, jumbo frames refer to Ethernet packets of up to 9000 bytes in size. When the jumbo frame feature is enabled on a port, the port can switch large or jumbo frames. This feature optimizes server-to-server performance. The default Maximum Transmission Unit (MTU) frame size is 1548 bytes for all Ethernet ports. The jumbo frame MTU size is limited to 2000 for advanced SKUs(3400/3400H) and 8996 for other SKUs when jumbo frame feature is enabled on a port.
MSDP (Multicast Source Discovery Protocol) Network Advantage MSDP is often used between Anycast RP within a PIM domain to synchronize information about the active sources being served by each Anycast-RP peer (by virtue of IGP reachability). MSDP will be supported in inter domain deployments or in deployment where MSDP peering happens without BGP (MBGP). No claim for Intra domain deployments in this Phase as MBGP is not fully qualified for support.
Flow-based SPAN Network Essentials and Advantage FSPAN is used, in order to mirror the traffic based on filter cirteria. FSPAN supports three types of access control lists to the span session and filtering based on vlan.
IPv4/IPv6 Multicast routing BSR Network Advantage BSR (Bootstrap) is a protocol that we use to automatically find RP in multicast network. BSR supports PIMv2 and its not cisco proprietary. From platform perspective infra is in place to handle control packets and BSR msg exchanges. Elected RP node info/address is not maintained at the PD level explicitly. RP election is a PI functionality and once after the RP election according to the populated S,G or *,G routes will be updated to elected RP. No specific configuration or show commands are in place from platform perspective
Auto RP (IPv4) Network Advantage A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number of routers can be configured to work as RPs and they can be configured to cover different group ranges. For correct operation, every multicast router within a Protocol Independent Multicast (PIM) domain must be able to map a particular multicast group address to the same RP. Auto-RP is a mechanism to automate distribution of RP information in a multicast network. The Auto-RP mechanism operates using two basic components, the candidate RPs and the RP mapping agents.
IPv6 Multicast routing Embedded RP Network Advantage With this feature RP addresses are bound into Group addresses. No explicit configuration needs to be done to enable this feature. Initial Incoming Multicast data packets from source S to group G gets punted to CPU. When Flag field (4 bits) is set to 0111 (0x7) it indicates RP addresses is binded into Group address. Address with different Scope level (1,2,4,5,8,E) will be supported. No specific configuration or show commands are in place from platform perspective
IPv6 FHS RA Guard Network Essentials and Advantage Router advertisements can be used by hosts to automatically configure their own IPv6 address and set a default route using the information they see in the RA. Hosts automatically select a router advertisement and they don't care where it came from. This is how it was meant to be, but it does introduce a security risk since any device can send router advertisements and your hosts will happily accept it. An attacker can send rogue router advertisements to redirect the traffic, or you can send so many RAs that it causes a DOS since your hosts will be too busy configuring their IPv6 prefixes.
IPv6 FHS DHCPv6 Guard Network Essentials and Advantage IPv6 DHCPv6 Guard is one of the IPv6 FHS (First Hop Security) mechanisms and is very similar to IPv4 DHCP snooping. This feature inspects DHCPv6 messages between a DHCPv6 server and DHCPv6 client (or relay agent) and blocks DHCPv6 reply and advertisements from (rogue) DHCPv6 servers. DHCPv6 messages from clients or relay agents to a DHCPv6 server are not affected.
Web authentication (Flexible Authentication – 802.1x, dACL, customizable web auth) Network Essentials and Advantage With this feature, users can acquire network resource access by specifying their user credentials (viz. username, password, etc). When a host initiates an http session, web-based authentication intercepts ingress http packets from the host and sends an html login page to the user. The users enter their credentials, which the web-based authentication feature sends to the authentication, authorization, and accounting server for authentication. If authentication succeeds, web-based authentication sends a Login-Successful html page to the host and applies the access policies returned by the AAA server. If authentication fails, web-based authentication forwards a Login-Fail html page to the user, prompting the user to retry the login. If the user exceeds the maximum number of attempts, web-based authentication forwards a Login-Expired html page to the host.
IPv6 QoS Network Essentials and Advantage QoS features supported for IPv6 environments include packet classification, queuing, class-based packet marking, and policing of IPv6 packets. IPv6 packets are forwarded by paths that are different from those for IPv4. All QoS features available for IPv6 environments are managed from the modular QoS command-line interface (MQC). The MQC allows you to define traffic classes, create and configure traffic policies (policy maps), and then attach those traffic policies to interfaces.
IOx Container support - Native Docker Support (IE-3400/IE-3400H/ESS3300 only) Network Essentials Starting with 17.2.1, IOX images on IE3400 support native Docker. IOx executes the container image.
IOx - Support for FSPAN/ERSPAN of packets to the AppGig port (IE-3400/IE-3400H/ESS3300 only) Network Essentials Flow Based SPAN – allows for specific traffic flows to be redirected to AppGigabitEthernet 1/1 interface for input to IOx applications. SPAN Session can be configured for ERSPAN encapsulation preserving orginal ingress time, and ingress port.

Important Notes

Complete List of Supported Features

For the complete list of features supported on a platform, see the Cisco Feature Navigator at https://www.cisco.com/go/cfn.

Accessing Hidden Commands

Hidden commands have always been present in Cisco IOS XE, but were not equipped with CLI help. This means that entering enter a question mark (?) at the system prompt did not display the list of available commands. Such hidden commands are only meant to assist Cisco TAC in advanced troubleshooting and are therefore not documented. For more information about CLI help, see the Using the Command-Line InterfaceUnderstanding the Help System chapter of the Command Reference document.

This section provides information about hidden commands in Cisco IOS XE and the security measures in place, when they are accessed. Hidden commands are meant to assist Cisco TAC in advanced troubleshooting and are therefore not documented. For more information about CLI help, see the Using the Command-Line InterfaceUnderstanding the Help System chapter of the Command Reference document.

Hidden commands are available under:

Further, the following applies to hidden commands under Category 1 and 2:

Cisco IE3x00 Rugged and ESS3300 Supported Hardware

Cisco Catalyst IE3x00 Rugged, IE 3400 Heavy Duty and ESS3300 Series Switches—Model Numbers

The following table lists the supported hardware models and the default license levels they are delivered with. For information about the available license levels, see section License Levels.

Model Number Default License Level¹ Description
ESS-3300-NCP-E Network Essentials Main Board without a cooling plate. 2 ports of 10 GE fiber, 8 ports of GE copper. 4 of the 8 GE copper ports can also be combo ports. Terminal Power: 16W
ESS-3300-CON-E Network Essentials Main Board conduction cooled. 2 ports of 10 GE fiber, 8 ports of GE copper. 4 of the 8 GE copper ports can also be combo ports. Terminal Power: 16W
ESS-3300-24T-NCP-E Network Essentials Main Board with a 16p Expansion Board without a cooling plate. 2 ports of 10 GE fiber, 24 ports of GE copper. 4 of 8 GE ports can be combo ports on mainboard. 4 of 16 GE ports can be combo ports on expansion board. Terminal Power: 24W
ESS-3300-24T-CON-E Network Essentials Main Board with a 16p Expansion Board conduction cooled. 2 ports of 10 GE fiber, 24 ports of GE copper. 4 of 8 GE ports can be combo ports on mainboard. 4 of 16 GE ports can be combo ports on expansion board. Terminal Power: 24W
IE-3200-8T2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE
IE-3200-8P2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 240W
IE-3300-8T2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE
IE-3300-8P2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 360W (including expansion module)
IE-3300-8T2S-A Network Advantage 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE
IE-3300-8P2S-A Network Advantage 8 Gigabit Ethernet 10/100/1000 PoE/PoE+ ports, 2 fiber 100/1000 SFP-based ports; PoE power budget of 360W (including expansion module)
IE-3400-8T2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE
IE-3400-8T2S-A Network Advantage 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports, non-PoE
IE-3400-8P2S-E Network Essentials 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports with PoE
IE-3400-8P2S-A Network Advantage 8 Gigabit Ethernet 10/100/1000 RJ45 ports, 2 fiber 100/1000 SFP-based ports with PoE
IE-3400H-8T-E Network Essentials 8x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-8T-A Network Advantage 8x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-8FT-E Network Essentials 8 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .
IE-3400H-8FT-A Network Advantage 8 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .
IE-3400H-16T-E Network Essentials 16x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-16T-A Network Advantage 16x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-16FT-E Network Essentials 16 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .
IE-3400H-16FT-A Network Advantage 16 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .
IE-3400H-24T-E Network Essentials 24x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-24T-A Network Advantage 24x1-Gbps X-Coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, mini-change input for Single power source
IE-3400H-24FT-E Network Essentials 24 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .
IE-3400H-24FT-A Network Advantage 24 100-Mbps D-coded ports, 1 Alarm input and 1 Alarm output, 1 Console port, Mini-change input for Single Power Source .

Expansion Modules

The following table lists the optional expansion modules for the IE3300 and IE3400 base systems. Modules with IEM-3400-xx are only supported on IE3400 base systems. IEM expansion modules that support POE are only supported on Base systems that support POE.

Expansion Module Description
IEM-3300-8T 8 copper Gigabit Ethernet ports. Non PoE.
IEM-3300-8P 8 copper Gigabit Ethernet ports. With PoE
IEM-3300-8S 8 SFP Gigabit Ethernet ports. Non PoE.
IEM-3300-16T 16 copper Gigabit Ethernet ports. Non PoE.
IEM-3300-16P 16 copper Gigabit Ethernet ports. With PoE.
IEM-3300-6T2S 6 copper Gigabit Ethernet ports and 2 SFP Gigabit ports. Non PoE.
IEM-3300-14T2S 14 copper Gigabit Ethernet ports, and 2 SFP Gigabit ports. Non PoE.
IEM-3400-8T 8 copper Gigabit Ethernet ports with Advanced features. Non PoE.
IEM-3400-8S 8 SFP Gigabit Ethernet ports with Advanced features. Non PoE.
IEM-3400-8P 8 copper Gigabit Ethernet ports with Advanced features with PoE.

Optics Modules

Cisco Catalyst Series Switches support a wide range of optics and the list of supported optics is updated on a regular basis. Use the Transceiver Module Group (TMG) Compatibility Matrix tool, or consult the tables at this URL for the latest transceiver module compatibility information: https://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html

Web UI System Requirements

The Web UI is http/https browser based Switch management tool running on the switch. The following subsections list the hardware and software required to access the Web UI.

Minimum Hardware Requirements

Processor Speed DRAM Number of Colors Resolution Font Size
233 MHz minimum² 512 MB³ 256 1280 x 800 or higher Small

² We recommend 1 GHz

³ We recommend 1 GB DRAM

Upgrading the Switch Software

Software Requirements

Operating Systems

Browsers

Finding the Software Version

The package files for the Cisco IOS XE software can be found on the system board flash device flash: (flash:) or external SDFlash (sdflash:).

You can use the show version privileged EXEC command to see the software version that is running on your switch.

Note: Although the show version output always shows the software image running on the switch, the model name shown at the end of this display is the factory configuration and does not change if you upgrade the software license.

You can also use the dir filesystem: privileged EXEC command to see the directory names of other software images that you might have stored in flash memory.

Software Images 17.2x

Release Image Type File Name
Cisco IOS XE.17.2.1 Universal ie3x00-universalk9.17.02.01.SPA.bin
NPE ess3x00-universalk9.17.02.01.SPA.bin
NPE ie3x00-universalk9_npe.17.02.01.SPA.bin

Automatic Boot Loader Upgrade

When you upgrade from the existing release on your switch to a later or newer release for the first time, the boot loader may be automatically upgraded, based on the hardware version of the switch. If the boot loader is automatically upgraded, it will take effect on the next reload.

For subsequent Cisco IOS XE releases, if there is a new bootloader in that release, it may be automatically upgraded based on the hardware version of the switch when you boot up your switch with the new image for the first time.

Caution: Do not power cycle your switch during the upgrade.

Scenario Automatic Boot Loader Response
If you boot Cisco IOS XE the first time Boot loader may be upgraded to version "6.1.7" for IE3x00 and ESS-3300.
Checking Bootloader upgrade...
Bootloader upgrade successful

Bundle Mode Upgrade

To upgrade the Cisco IOS XE software when the switch is running in bundle mode, follow these steps:

Procedure

  1. Download the bundle file to local storage media.
  2. Configure the boot system global configuration command to point to the bundle file.
  3. Reload the switch.

Example

Upgrading Cisco IOS XE Software Bundle Mode

This example shows the steps to upgrade the Cisco IOS XE software on a switch that is running in bundle mode. It shows using the copy command to copy the bundle file to flash:, configuring the boot system variable to point to the bundle file, saving a copy of the running configuration, and finally, reloading the switch.

r1#copy scp: sdflash:
Address or name of remote host (11.1.1.22]? 11.1.1.22
Source username [*****]? [Username removed]
*****
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Source filename [11.1.1.22]? ie3x00-universalk9.17.02.01.SPA.bin
Destination filename (ie3x00-universalk9.17.02.01.SPA.bin]?
WARNING!!!
READ THIS BEFORE ATTEMPTING TO LOGON
This System is for the use of authorized users only. Individuals
using this computer without authority, or in excess of their
authority, are subject to having all of their activities on this
system monitored and recorded by system personnel. In the course
of monitoring individuals improperly using this system, or in the
course of system maintenance, the activities of authorized users
may also be monitored. Anyone using this system expressly
consents to such monitoring and is advised that if such
monitoring reveals possible criminal activity, system personnel
may provide the evidence of such monitoring to law enforcement
officials.
Cisco Acceptable Use Policy:
http://wwwin.cisco.com/infosec/policies/acceptableuse.shtml
Password:
Sending file modes: C0777 324770311 ie3x00-universalk9.17.02.01.SPA.bin
................................
................
324770311 bytes copied in 653.828 secs (496721 bytes/sec)
r1#
r1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
r1(config)#
r1(config)#no boot manual
r1(config)#
r1(config)#2no boot system
r1(config)#
r1(config)#boot system sdflash:ie3x00-universalk9.17.02.01.SPA.bin
r1(config)#
r1#
r1#
r1#wr
Building configuration...
*Jan 17 22:24:18.070: %SYS-5-CONFIG I: Configured from console by console [OK]
*Jan 17 22:24:36.293: %SYS-6-PRIVCFG ENCRYPT SUCCESS: Successfully encrypted private config
file
r1#
r1#
r1#
r1#reload
Proceed with reload? (confirm)

Software Installation Commands

Summary of Software Installation Commands

To install and activate the specified file, and to commit changes to be persistent across reloads—install add file filename [activate commit]

Command Description
add file filename Copies the install file package from a remote location to the device and performs a compatibility check for the platform and image versions.
activate [auto-abort-timer] Activates the file, and reloads the device. The auto-abort-timer keyword automatically rolls back image activation.
commit Makes changes persistent over reloads.
remove Deletes all unused and inactive software installation files.

Licensing

License Levels

This section provides information about the licensing packages for features available on Cisco Catalyst ie3x00 Rugged, and ESS3300 series switches.

The software features available on Cisco Catalyst ie3x00 Rugged and ESS3300 switches, fall under these base or add-on license levels.

Base Licenses

Add-On Licenses

Add-On Licenses require a Network Essentials or Network Advantage as a pre-requisite. The features available with add-on license levels provide Cisco innovations on the switch, as well as on the Cisco Digital Network Architecture Center (Cisco DNA Center).

To find information about platform support and to know which license levels a feature is available with, use Cisco Feature Navigator. To access Cisco Feature Navigator, go to https://www.cisco.com/go/cfn. An account on cisco.com is not required.

Feature Licenses

Feature Licenses are bound to aspecific feature or set of features. Feature licenses can be enabled regardless of Base License (Network Advantage or Network Essential). Feature licenses are smart licenses as well and require a smart account to be activated.

MRP requires a feature license. there are 2 MRP licenses available for IE3x00.

platform license feature [mrp-client | mrp-manager]

Use "platform license feature [mrp-client | mrp-manager]" to add the license, then follow the SL or SLR process to activate the feature license.

License Types

The following license types are available:

License Levels - Usage Guidelines

Note: Network Essentials license is the default license. It is permanent. A connection to the Smart Licensing server is not required if IE Switch will be deployed with network Essentials license

Smart Licensing

Cisco Smart Licensing is a unified license management system that manages all the software licenses across Cisco products.

Deploying Smart Licensing

It enables you to purchase, deploy, manage, track and renew Cisco Software. It provides information about license ownership and consumption through a single user interface.

The solution is composed of Smart Accounts and Cisco Smart Software Manager. The former is an online account of your Cisco software assets and is required to use the latter. Cisco Smart Software Manager is where you can perform all your licensing management related tasks, such as, registering, de-registering, moving, and transferring licenses. Users can be added and given access and permissions to the smart account and specific virtual accounts.

Important: Cisco Smart Licensing is the default and the only available method to manage licenses on IE3x00 products.

Deploying Smart Licensing

The following provides a process overview of a day 0 to day N deployment directly initiated from a device. Links to the configuration guide provide detailed information to help you complete each one of the smaller tasks.

Procedure

  1. Begin by establishing a connection from your network to Cisco Smart Software Manager on cisco.com.
  2. Create and activate your Smart Account, or login if you already have one.
    To create and activate Smart Account, go to Cisco Software Central → Create Smart Accounts. Only authorized users can activate the Smart Account.
  3. Complete the Cisco Smart Software Manager set up.
    a) Accept the Smart Software Licensing Agreement.
    b) Set up the required number of Virtual Accounts, users and access rights for the virtual account users.
    Virtual accounts help you organize licenses by business unit, product type, IT group, and so on.

With this,

What to do next

Using Smart Licensing on an Out-of-the-Box Device

If an out-of-the-box device has the software version factory-provisioned, all licenses on such a device remain in evaluation mode until registered in Cisco Smart Software Manager.

How Upgrading or Downgrading Software Affects Smart Licensing

Note how upgrading to a release that supports Smart Licensing or moving to a release that does not support Smart Licensing affects licenses on a device:

Caveats

Caveats describe unexpected behavior in Cisco IOS-XE releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.

Cisco Bug Search Tool

The Cisco BugSearch Tool (BST) allows partners and customersto search forsoftware bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The BST is designed to improve the effectivenessin network risk management and device troubleshooting. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.

To view the details of a caveat, click on the identifier.

Open Caveats in Cisco IOS XE 17.2.1

Identifier Description
CSCvs04837 Webauth : Login page is not coming when virtual-IP is configured in the switch.
CSCvs30801 dACL download is failing when number of ACEs are 30 with both webauth and dot1x session.
CSCvs40032 TCAM entries create/update/modify is not happening properly with both IPv4 and IPv6 dACL
CSCvt02699 DHCPV6 clients unable to recieve ip address with Petra as V6DHCP server
CSCvt03350 QinQ: mac-learning disabled on dot1q-tunnel port after port-sec and storm-control
CSCvt16054 WEBAUTH: on reaching 255aces/port, new incoming http connections are allowed without auth
CSCvt20731 [RSPAN]: Remote-Span issues with Port-Channel
CSCvt30079 External alarm relay does not truly clear a fault from the system
CSCvt06469 Undesirable Autosave of Running Config to eMMC flash

Troubleshooting

For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at this URL: https://www.cisco.com/en/US/support/index.html

Go to Product Support and select your product from the list or enter the name of your product. Look under Troubleshoot and Alerts, to find information for the problem that you are experiencing.

Related Documentation

Information about Cisco IOS XE at this URL: https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html

All support documentation for Cisco Catalyst IE3200 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3200-rugged-series/tsd-products-support-series-home.html

All support documentation for Cisco Catalyst IE3300 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3300-rugged-series/tsd-products-support-series-home.html

All support documentation for Cisco Catalyst IE3400 Rugged Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3400-rugged-series/tsd-products-support-series-home.html

All support documentation for Cisco Catalyst IE3400H Heavy Duty Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/catalyst-ie3400-heavy-duty-series/tsd-products-support-series-home.html

All support documentation for Cisco ESS-3000 Series Switches is at this URL: https://www.cisco.com/c/en/us/support/switches/embedded-service-3000-series-switches/tsd-products-support-series-home.html

All support documentation for Cisco 1100 Series Industrial Integrated Services Routers is at this URL: https://www.cisco.com/c/en/us/support/routers/1100-series-industrial-integrated-services-routers/tsd-products-support-series-home.html

Cisco Validated Designs documents at this URL: https://www.cisco.com/go/designzone

To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Communications, Services, and Additional Information

PDF preview unavailable. Download the PDF instead.

cisco-catalyst-ie3200-rugged-series-accelerate-your-digital-transformation DITA Open Toolkit XEP 4.9 build 20070312; modified using iText 2.1.7 by 1T3XT

Related Documents

Preview Cisco Catalyst Center Release 3.1.3 Release Notes
Detailed release notes for Cisco Catalyst Center, Release 3.1.3, covering new software features, changes in behavior, resolved and open issues, compatibility, scalability, supported hardware, and legal information.
Preview Cisco Catalyst 9300 Switches Software Configuration Guide: Cisco IOS XE Dublin 17.12.x
Learn how to configure Cisco Catalyst 9300 Switches with Cisco IOS XE Dublin 17.12.x. This guide covers initial setup, Web UI configuration, network settings, and best practices for enterprise network deployment.
Preview Cisco Catalyst IE Series Switches Security Configuration Guide
This document provides comprehensive guidance on configuring security features for Cisco Catalyst IE3x00, IE3100 Rugged, IE3400 Heavy Duty, and ESS3300 Series Switches. It details essential security protocols and configurations, including RADIUS, IPv6 First Hop Security, MACsec, and Layer 2 Network Address Translation (NAT), enabling network administrators to enhance the security posture of their industrial and rugged networking environments.
Preview Cisco IOS XE 17.17.x Command Reference for Catalyst 9500 Switches
Comprehensive command reference guide for Cisco IOS XE version 17.17.x, specifically for Cisco Catalyst 9500 Series Switches. This document details various commands for network configuration, management, and troubleshooting.
Preview Release Notes for Cisco Catalyst 9400 Series Switches, Cisco IOS XE Fuji 16.9.x
This document provides release notes for Cisco Catalyst 9400 Series Switches running Cisco IOS XE Fuji 16.9.x, detailing software and hardware features, enhancements, and important notes.
Preview Cisco TrustSec Integration Guide for SD-WAN
This guide details the integration of Cisco TrustSec with Cisco SD-WAN, focusing on Security Group Tag (SGT) propagation using inline tagging and SXP. It covers configuration, supported hardware, and best practices for network segmentation and security.
Preview Cisco TrustSec Configuration Guide for Catalyst 9200 Switches with Cisco IOS XE Dublin 17.12.x
A comprehensive guide to configuring Cisco TrustSec features on Catalyst 9200 Series Switches running Cisco IOS XE Dublin 17.12.x. Learn about security group-based access control, SGT exchange protocols, and more.
Preview Cisco Catalyst 9300 Series: Understanding and Configuring Licenses
A comprehensive guide to managing licenses for Cisco Catalyst 9300 Series Switches, including Network Essentials, Network Advantage, DNA Essentials, DNA Advantage, and the HSECK9 export control key. Learn about installation, configuration, and best practices.