Release Notes for Cisco Catalyst 3650 Series Switches, Cisco IOS XE Fuji 16.9.x
Introduction
Cisco Catalyst 3650 Series Switches are the next generation of enterprise class stackable access layer switches, with the new and improved 160-Gbps StackWise-160. Security and application visibility and control are natively built into the switch.
Cisco Catalyst 3650 Series Switches also support full IEEE 802.3 at Power over Ethernet Plus (PoE+), modular and field replaceable network modules, redundant fans, and power supplies. Cisco Catalyst 3650 Series Switches enhance productivity by enabling applications such as IP telephony and video for a true borderless network experience.
Cisco IOS XE represents the continuing evolution of the preeminent Cisco IOS operating system. The Cisco IOS XE architecture and well-defined set of APIs extend the Cisco IOS software to improve portability across platforms and extensibility outside the Cisco IOS environment. The Cisco IOS XE software retains the same look and feel of the Cisco IOS software, while providing enhanced future-proofing and improved functionality.
Note |
Explore the Content Hub, the all new portal that offers an enhanced product documentation experience.
Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. |
Whats New in Cisco IOS XE Fuji 16.9.8
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.7
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.6
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.5
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.4
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.3a
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.3
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.2
There are no new hardware or software features in this release. For the list of open and resolved caveats in this release, see Caveats.
Whats New in Cisco IOS XE Fuji 16.9.1
Software Features in Cisco IOS XE Fuji 16.9.1
Feature Name |
Description and License Level Information |
||||
---|---|---|---|---|---|
AVC Switching: Export input and output interface information |
See System Management → Configuring Application Visibility and Control in a Wired Network .
(IP Base and IP Services) |
||||
Media Access Control Security (MACsec) port channel support |
Provides support for MACsec over port channels for Layer 2 and Layer 3 EtherChannels.
See Security → MACsec Encryption .
128-bit—(IP Base and IP Services) 256-bit—(IP Services) |
||||
MACsec Key Agreement (MKA) cipher announcement exchange |
Support for cipher announcement is enabled. Cipher Announcement allows the supplicant and the authenticator to announce their respective MACsec Cipher Suite capabilities through EAPoL announcements. Two types of EAPoL announcements are supported – Secured announcements and unsecured announcements.
See Security → MACsec Encryption .
128-bit—(IP Base and IP Services) 256-bit—(IP Services) |
||||
Programmability |
The following programmability features are introduced in this release:
|
||||
Sampled NetFlow |
The feature is now available at the LAN Base license level.
(LAN Base, IP Base, and IP Services) |
||||
Smart Licensing and Device Led Conversion |
A cloud-based, software license management solution that allows you to manage and track the status of your license, hardware, and software usage trends.
You can use the device-led conversion feature to convert all existing, traditional licenses, to smart licenses. As part of the conversion process, migration data is sent to Cisco Smart Software Manager. Cisco Smart Software Manager creates license entitlements and deposits them in your user account.
See the Cisco Smart Licensing section in this release note document and System Management → Configuring Smart Licensing in the configuration guide.
A license level is not applicable. |
||||
Transport Layer Security (TLS) Client |
Provides secure and reliable signaling and data transfer between two systems or devices, by using secure ports and certificate exchange.
(IP Base and IP Services) |
||||
New on the Web UI |
|||||
These features are introduced on the Web UI in this release |
|
Important Notes
Unsupported Features
-
802.1x Configurable username and password for MAC Authentication Bypass (MAB)
-
Cisco Group Management Protocol (CGMP)
-
Cisco Plug-In for OpenFlow (OpenFlow 1.0 and 1.3) is available in Cisco IOS XE Release 3.7.3E, but is not supported in Cisco IOS XE Fuji 16.8.x.
-
Cisco TrustSec 802.1x
-
Cisco TrustSec critical authentication
-
Cisco Networking Services (CNS) configuration agent
-
Converged Access (CA) is not supported beyond Cisco IOS XE Denali 16.3.x.
On the Cisco Catalyst 3650 Series Switches, CA is supported in the Cisco IOS XE Denali 16.3.x software release, which has extended support for 40 months.
-
Command Switch Redundancy
-
Device classifier for Auto Smartports (ASP)
-
Dynamic Host Configuration Protocol (DHCP) snooping ASCII circuit ID
-
DHCP version 6 (DHCPv6) relay source configuration
-
Distance Vector Multicast Routing Protocol (DVMRP) tunneling
-
Dynamic access ports
-
EX SFP Support (GLC-EX-SMD)
-
Fallback bridging for non-IP traffic
-
IEEE 802.1X-2010 with 802.1AE support
-
Improvements in QoS policing rates
-
Ingress Strict Priority Queuing (Expedite)
-
IPsec
-
IP-in-IP (IPIP) Tunneling
-
IPsec VPN
-
IP SLA Media Operation
-
IPv6 support for Internet Key Exchange (IKE) version 2 / IP Security (IPSec) version 3
-
IPv6 ready logo phase II - host
-
IPv6 static route support on LAN Base images
-
IPv6 strict host mode
-
Layer 2 tunneling protocol enhancements
-
Link-state tracking
-
Mesh, FlexConnect, and OfficeExtend access point deployment
-
Medianet
-
MSE 8.x is not supported with Cisco IOS XE Denali 16.x.x.
-
Passive monitoring
-
Per VLAN policer
-
Performance Monitor (Phase 1)
-
Port security on EtherChannels
-
Pragmatic General Multicast (PGM)
-
RFC 4292 IP-FORWARD-MIB (IPv6 only)
-
RFC 4293 IP-MIB (IPv6 only)
-
RFC4292/RFC4293 MIBs (IPv6 only)
-
RFC5460 DHCPv6 Bulk leasequery
-
Stack ports buffer is not shared as part of the shared pool. The dedicated buffer for stack ports can only be used by stack ports.
-
Trust boundary configuration
-
UniDirectional Link Routing (UDLR)
-
VLAN access control lists (VACL) logging of access denied
-
Virtual Routing and Forwarding (VRF)-Aware web authentication
-
Web-Based Authentication without SVI
-
Weighted Random Early Detection (WRED)
Complete List of Supported Features
For the complete list of features supported on a platform, see the Cisco Feature Navigator at https://www.cisco.com/go/cfn.
Supported Hardware
Cisco Catalyst 3650 Series Switches—Model Numbers
Switch Model |
Cisco IOS Image |
Description |
---|---|---|
WS-C3650-24TS-L |
LAN Base |
Stackable 24 10/100/1000 Ethernet downlink ports and four 1-Gigabit SFP (small form-factor pluggable) uplink ports, 250-W power supply |
WS-C3650-48TS-L |
LAN Base |
Stackable 48 10/100/1000 Ethernet downlink ports and four 1-Gigabit SFP uplink ports, 250-W power supply |
WS-C3650-24PS-L |
LAN Base |
Stackable 24 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply. PoE+ = Power over Ethernet plus (provides up to 30 W per port). |
WS-C3650-48PS-L |
LAN Base |
Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply |
WS-C3650-48FS-L |
LAN Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply |
WS-C3650-24TD-L |
LAN Base |
Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-48TD-L |
LAN Base |
Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-24PD-L |
LAN Base |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48PD-L |
LAN Base |
Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-24PDM-L |
LAN Base |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP uplink ports and two 10-Gigabit SFP+ uplink ports, Fixed 640-W power supply |
WS-C3650-48FD-L |
LAN Base |
Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQ-L |
LAN Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQM-L |
LAN Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports., Fixed 975-W power supply |
WS-C3650-48PQ-L |
LAN Base |
Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48TQ-L |
LAN Base |
Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-8X24UQ-L |
LAN Base |
Stackable 8 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 16 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SPF+ ports, 1100-W power supply |
WS-C3650-12X48UZ-L |
LAN Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, two 40-Gigabit uplink QSFP+ ports, 1100-W power supply |
WS-C3650-12X48UR-L |
LAN Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, eight 10-Gigabit uplink SFP+ ports, 1100-W power supply |
WS-C3650-12X48UQ-L |
LAN Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SFP+ ports, 1100-W power supply |
WS-C3650-12X48FD-L |
LAN Base |
Stackable 12 100M/1G/2.5G/5G/10G Full PoE downlink ports, 36 10/100/1000 Full PoE downlink ports, 2 10-Gigabit SFP+ uplink ports, 1100-W power supply |
WS-C3650-24TS-S |
IP Base |
Stackable 24 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply |
WS-C3650-48TS-S |
IP Base |
Stackable 48 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply |
WS-C3650-24PS-S |
IP Base |
Stackable 24 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply |
WS-C3650-48PS-S |
IP Base |
Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply |
WS-C3650-48FS-S |
IP Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply |
WS-C3650-24TD-S |
IP Base |
Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-48TD-S |
IP Base |
Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-24PD-S |
IP Base |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48PD-S |
IP Base |
Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-24PDM-S |
IP Base |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP uplink ports, two 10-Gigabit SFP+ uplink ports, Fixed 640-W power supply |
WS-C3650-48FD-S |
IP Base |
Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQ-S |
IP Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQM-S |
IP Base |
Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, Fixed 975-W power supply |
WS-C3650-48PQ-S |
IP Base |
Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48TQ-S |
IP Base |
Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-8X24UQ-S |
IP Base |
Stackable 8 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 16 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SPF+ ports, 1100-W power supply |
WS-C3650-12X48UZ-S |
IP Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, two 40-Gigabit uplink QSFP+ ports, 1100-W power supply |
WS-C3650-12X48UR-S |
IP Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, eight 10-Gigabit uplink SFP+ ports, 1100-W power supply |
WS-C3650-12X48UQ-S |
IP Base |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SFP+ ports, 1100-W power supply |
WS-C3650-24TS-E |
IP Services |
Stackable 24 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply |
WS-C3650-48TS-E |
IP Services |
Stackable 48 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply |
WS-C3650-24PS-E |
IP Services |
Stackable 24 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply |
WS-C3650-48PS-E |
IP Services |
Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply |
WS-C3650-48FS-E |
IP Services |
Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply |
WS-C3650-24TD-E |
IP Services |
Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-48TD-E |
IP Services |
Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-24PD-E |
IP Services |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48PD-E |
IP Services |
Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-24PDM-E |
IP Services |
Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP uplink ports, two 10-Gigabit SFP+ uplink ports, Fixed 640-W power supply |
WS-C3650-48FD-E |
IP Services |
Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQ-E |
IP Services |
Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply |
WS-C3650-48FQM-E |
IP Services |
Stackable 48 10/100/1000 Full PoE downlink ports, four10-Gigabit SFP+ uplink ports, Fixed 975-W power supply |
WS-C3650-48PQ-E |
IP Services |
Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply |
WS-C3650-48TQ-E |
IP Services |
Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply |
WS-C3650-8X24UQ-E |
IP Services |
Stackable 8 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 16 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SPF+ ports, 1100-W power supply |
WS-C3650-12X48UZ-E |
IP Services |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, two 40-Gigabit uplink QSFP+ ports, 1100-W power supply |
WS-C3650-12X48UR-E |
IP Services |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, eight 10-Gigabit uplink SFP+ ports, 1100-W power supply |
WS-C3650-12X48UQ-E |
IP Services |
Stackable 12 100M/1G/2.5G/5G/10G Cisco UPOE™ downlink ports, 36 10/100/1000 Cisco UPOE™ downlink ports, four 10-Gigabit uplink SFP+ ports, 1100-W power supply |
Optics Modules
Cisco Catalyst Series Switches support a wide range of optics and the list of supported optics is updated on a regular basis. Use the Transceiver Module Group (TMG) Compatibility Matrix tool, or consult the tables at this URL for the latest transceiver module compatibility information: https://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Compatibility Matrix
The following table provides software compatibility information.
Catalyst 3650 |
Cisco 5700 WLC |
Cisco 5508 or WiSM2 |
MSE/CMX |
ISE |
ACS |
Cisco PI |
---|---|---|---|---|---|---|
Fuji 16.9.8 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.9 + PI 3.9 latest maintenance release + PI 3.9 latest device pack See Cisco Prime Infrastructure 3.9 → Downloads. |
Fuji 16.9.7 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.9 + PI 3.9 latest maintenance release + PI 3.9 latest device pack See Cisco Prime Infrastructure 3.9 → Downloads. |
Fuji 16.9.6 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest maintenance release + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.9.5 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest maintenance release + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.9.4 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest maintenance release + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.9.3 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest maintenance release + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.9.2 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest maintenance release + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.9.1 |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 Patch 1 |
5.4 5.5 |
PI 3.4 + PI 3.4 latest device pack See Cisco Prime Infrastructure 3.4→ Downloads. |
Fuji 16.8.1a |
Not applicable |
Not applicable |
Not applicable |
2.3 Patch 1 2.4 |
5.4 5.5 |
PI 3.3 + PI 3.3 latest maintenance release + PI 3.3 latest device pack See Cisco Prime Infrastructure 3.3→ Downloads. |
Everest 16.6.4 |
Not applicable |
Not applicable |
Not applicable |
2.2 2.3 |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack See Cisco Prime Infrastructure 3.1→ Downloads. |
Everest 16.6.3 |
Not applicable |
Not applicable |
Not applicable |
2.2 2.3 |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack See Cisco Prime Infrastructure 3.1→ Downloads. |
Everest 16.6.2 |
Not applicable |
Not applicable |
Not applicable |
2.2 2.3 |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack See Cisco Prime Infrastructure 3.1→ Downloads. |
Everest 16.6.1 |
Not applicable |
Not applicable |
Not applicable |
2.2 |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack See Cisco Prime Infrastructure 3.1→ Downloads. |
Everest 16.5.1a |
Not applicable |
Not applicable |
Not applicable |
2.1 Patch 3 |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.6 |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.2 Patch 2(wired and wireless) |
5.4 5.5 |
PI update PI 3.1 + PI 3.1 latest maintenance release 3.1.7 + PI 3.1 latest device pack 16 (Wired). PI update PI 3.1 + PI 3.1 latest maintenance release 3.1.7 + PI 3.1 latest device pack 14 (Wireless). See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.5b |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.2 Patch 2(wired and wireless) |
5.4 5.5 |
PI update PI 3.1 + PI 3.1.5 + PI 3.1.5 update 1 + PI 3.1 latest device pack (Wired) PI 3.1 + PI 3.1 maintenance release 7+ PI 3.1 latest device pack (Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.5 |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.2 Patch 2(wired and wireless) |
5.4 5.5 |
PI update PI 3.1 + PI 3.1.5 + PI 3.1.5 update 1 + PI 3.1 latest device pack (Wired) PI 3.1 + PI 3.1 maintenance release 7+ PI 3.1 latest device pack (Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.3 |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.1 Patch 1 (Wired and Wireless) |
5.4 5.5 |
PI update PI 3.1 + PI 3.1.5 + PI 3.1.5 update 1 + PI 3.1 latest device pack (Wired) PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack (Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.2 |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.1 Patch 1 (Wired and Wireless) |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack (Wired and Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.3.1 |
03.07.04E 03.06.05E |
8.2.0, 8.3.0 |
CMX 10.2.2 |
2.0 Patch 3 1.4 Patch 7 1.3 Patch 6 (Wired and Wireless) |
5.4 5.5 |
PI 3.1 + PI 3.1 latest maintenance release + PI 3.1 latest device pack (Wired and Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.2.2 |
03.07.02E 03.06.03E 4 |
8.1.0, 8.2.0 |
CMX 10.2.2 |
1.3 Patch 5 (Wired and Wireless) |
5.3 5.4 |
3.1.0 + Device Pack 1 (Wired and Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.2.1 |
03.07.03E 03.06.03E 4 |
8.1.0 8.2.0 |
CMX 10.2.2 |
1.3 Patch 5 (Wired and Wireless) |
5.3 5.4 |
3.1.0 (Wired) 3.1.0, 3.0.2 5 + Device Pack 4 + PI 3.0 Technology Pack (Wireless) See Cisco Prime Infrastructure 3.1→ Downloads. |
Denali 16.1.3 |
03.07.02E 03.06.03E 4 |
8.1.0 |
CMX 10.2.0 |
1.3 Patch 3 (Wired) 1.4 (Wireless) |
5.3 5.4 |
3.0.2 + Device Pack 5+ PI 3.0 Technology Pack See Cisco Prime Infrastructure 3.0 → Downloads. |
Denali 16.1.2 |
03.07.02E 03.06.03E 4 |
8.1.0 |
CMX 10.2.0 |
1.3 Patch 3 (Wired) 1.4 (Wireless) |
5.3 5.4 |
3.0.2 + Device Pack 4 + PI 3.0 Technology Pack See Cisco Prime Infrastructure 3.0 → Downloads. |
Denali 16.1.1 |
03.07.02E 03.06.03E 4 |
8.1.0 |
CMX 10.2.0 |
1.3 Patch 3 (Wired) 1.4 (Wireless) |
5.3 5.4 |
3.0.2 + PI 3.0 Device Pack 2 + PI 3.0 Technology Pack See Cisco Prime Infrastructure 3.0 → Downloads. |
03.07.03E 03.07.02E 03.07.01E 03.07.00E |
03.07.03E 03.07.02E 03.07.01E 03.07.00E |
8.0 8.0 8.0 7.6 |
8.0 3 |
1.3 |
5.2 5.3 |
2.2 See Cisco Prime Infrastructure 2.2 → Downloads. |
03.06.04E 03.06.03E 03.06.02aE 03.06.01E 03.06.00E |
03.06.04E 03.06.02aE 03.06.01E 03.06.00E |
8.0 7.6 |
8.0 |
1.3 1.2 |
5.2 5.3 |
2.2 2.2, 2.1.2, or 2.1.1 if MSE is also deployed 2 2.1.0 if MSE is not deployed See Cisco Prime Infrastructure 2.2 → Downloads and Cisco Prime Infrastructure 2.1 → Downloads |
03.03.03SE 03.03.02SE 03.03.01SE 03.03.00SE |
03.03.03SE 03.03.02SE 03.03.01SE 03.03.00SE |
7.5 1 |
7.5 |
1.2 |
5.2, 5.3 |
2.0 See Cisco Prime Infrastructure 2.0 → Downloads |
Note |
|
Web UI System Requirements
The following subsections list the hardware and software required to access the Web UI:
Minimum Hardware Requirements
Processor Speed |
DRAM |
Number of Colors |
Resolution |
Font Size |
---|---|---|---|---|
233 MHz minimum1 |
512 MB2 |
256 |
1280 x 800 or higher |
Small |
Software Requirements
Operating Systems
-
Windows 10 or later
-
Mac OS X 10.9.5 or later
Browsers
-
Google Chrome—Version 59 or later (On Windows and Mac)
-
Microsoft Edge
-
Mozilla Firefox—Version 54 or later (On Windows and Mac)
-
Safari—Version 10 or later (On Mac)
Upgrading the Switch Software
This section covers the various aspects of upgrading or downgrading the device software.
Note |
You cannot use the Web UI to install, upgrade, or downgrade device software. |
Finding the Software Version
The package files for the Cisco IOS XE software are stored on the system board flash device (flash:).
You can use the show version privileged EXEC command to see the software version that is running on your switch.
Note |
Although the show version output always shows the software image running on the switch, the model name shown at the end of this display is the factory configuration and does not change if you upgrade the software license. |
You can also use the dir filesystem: privileged EXEC command to see the directory names of other software images that you might have stored in flash memory.
Software Images
Release |
Image Type |
File Name |
---|---|---|
Cisco IOS XE Fuji 16.9.8 |
Universal |
cat3k_caa-universalk9.16.09.08.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.08.SPA.bin |
|
Cisco IOS XE Fuji 16.9.7 |
Universal |
cat3k_caa-universalk9.16.09.07.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.07.SPA.bin |
|
Cisco IOS XE Fuji 16.9.6 |
Universal |
cat3k_caa-universalk9.16.09.06.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.06.SPA.bin |
|
Cisco IOS XE Fuji 16.9.5 |
Universal |
cat3k_caa-universalk9.16.09.05.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.05.SPA.bin |
|
Cisco IOS XE Fuji 16.9.4 |
Universal |
cat3k_caa-universalk9.16.09.04.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.04.SPA.bin |
|
Cisco IOS XE Fuji 16.9.3 |
Universal |
cat3k_caa-universalk9.16.09.03.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.03.SPA.bin |
|
Cisco IOS XE Fuji 16.9.2 |
Universal |
cat3k_caa-universalk9.16.09.02.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.02.SPA.bin |
|
Cisco IOS XE Fuji 16.9.1 |
Universal |
cat3k_caa-universalk9.16.09.01.SPA.bin |
Universal without Datagram Transport Layer Service (DTLS) |
cat3k_caa-universalk9ldpe.16.09.01.SPA.bin |
Automatic Boot Loader Upgrade
When you upgrade from any prior Cisco IOS XE 3.x.xE release to a Cisco IOS XE Denali 16.x.x, or Cisco IOS XE Everest 16.x.x, or Cisco IOS XE Fuji 16.x.x release for the first time, the boot loader may be automatically upgraded, based on the hardware version of the switch. If the boot loader is automatically upgraded, it will take effect on the next reload. If you go back to a Cisco IOS XE Release 3.x.xE, your boot loader will not be downgraded. The updated boot loader supports all previous releases.
For subsequent Cisco IOS XE Denali 16.x.x, or Cisco IOS XE Everest 16.x.x, or Cisco IOS XE Fuji 16.x.x releases, if there is a new bootloader in the release, it may be automatically upgraded based on the hardware version of the switch when you boot up your switch with the new image for the first time.
Caution |
Do not power cycle your switch during the upgrade. |
Scenario |
Automatic Boot Loader Response |
---|---|
If you boot Cisco IOS XE Fuji 16.9.1 or Cisco IOS XE Fuji 16.9.2 or Cisco IOS XE Fuji 16.9.3 or Cisco IOS XE Fuji 16.9.4 or Cisco IOS XE Fuji 16.9.5 or Cisco IOS XE Fuji 16.9.6 or Cisco IOS XE Fuji 16.9.7 or Cisco IOS XE Fuji 16.9.8 for the first time. |
The boot loader may be upgraded to version 4.66. For example:
If the automatic boot loader upgrade occurs, while booting Cisco IOS XE Fuji 16.9.1or Cisco IOS XE Fuji 16.9.2 or Cisco IOS XE Fuji 16.9.3 or Cisco IOS XE Fuji 16.9.4 or Cisco IOS XE Fuji 16.9.5 or Cisco IOS XE Fuji 16.9.6, you will see the following on the console:
|
Automatic Microcode Upgrade
During a Cisco IOS image upgrade or downgrade on a PoE or UPoE switch, the microcode is updated to reflect applicable feature enhancements and bug fixes. Do not restart the switch during the upgrade or downgrade process.
Starting with Cisco IOS XE Denali 16.1.1 and all later releases:It takes approximately an additional 4 minutes to complete the microcode upgrade in addition to the normal reload time; however, data traffic continues to be forwarded during the upgrade. The microcode update occurs only during an image upgrade or downgrade on PoE or UPoE switches. It does not occur during switch reloads or on non-PoE switches.
MM [1] MCU version 111 sw ver 105
MM [2] MCU version 111 sw ver 105
Front-end Microcode IMG MGR: found 4 microcode images for 1 device.
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_0 update needed: no
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_1 update needed: yes
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_2 update needed: yes
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_3 update needed: no
Front-end Microcode IMG MGR: Preparing to program device microcode...
Front-end Microcode IMG MGR: Preparing to program device[0], index=0 ...594412 bytes.... Skipped[0].
Front-end Microcode IMG MGR: Preparing to program device[0], index=1 ...395790 bytes.
Front-end Microcode IMG MGR: Programming device 0...rwRrrrrrrw..
0%.........................................................................
10%..........................................................................
20%........................................................................
30%..........................................................................
40%..........................................................................
50%.......................................................................
60%..........................................................................
70%..........................................................................
80%.........................................................................
90%..........................................................................
100%
Front-end Microcode IMG MGR: Preparing to program device[0], index=2 ...25186 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%....10%....20%......30%...40%......50%....60%......70%...80%......90%....100%wRr!
Front-end Microcode IMG MGR: Microcode programming complete for device 0.
Front-end Microcode IMG MGR: Preparing to program device[0], index=3 ...86370 bytes.... Skipped[3].
Front-end Microcode IMG MGR: Microcode programming complete in 242 seconds
Software Installation Commands
This table of commands is supported in the Cisco IOS XE Release 3.x.xE release train. |
|
---|---|
|
|
auto-upgrade |
Initiates auto upgrade for switches running incompatible software |
clean |
Cleans unused package files from local media |
commit |
Commits the provisioned software and cancels the automatic rollback timer |
expand |
Expands a software bundle to local storage, default location is where the bundle currently resides |
install |
Installs software |
rollback |
Rolls back the committed software |
This table of commands is supported starting from Cisco IOS XE Denali 16.x.x |
|
---|---|
|
|
clean |
Cleans unnecessary package files from media |
copy |
Copies package to media |
describe |
Describes package content |
expand |
Expands all-in-one package to media |
install |
Installs the package |
uninstall |
Uninstalls the package |
verify |
Verifies In Service Software Upgrade (ISSU) software package compatibility |
Upgrading from Cisco IOS XE Release 3.x.xE in Install Mode
Follow these instructions to upgrade from Cisco IOS XE Release 3.x.xE in install mode:
Before you begin
Note that you can use this procedure for the following upgrade scenarios:
When upgrading from ... |
To... |
---|---|
Cisco IOS XE Release 3.x.xE |
Cisco IOS XE Fuji 16.x.x or Cisco IOS XE Everest 16.x.x or Cisco IOS XE Denali 16.x.x |
The sample output shows upgrade from Cisco IOS XE Release 3.7.3E to Cisco IOS XE Fuji 16.9.1.
Procedure
Step 1 |
Copy new image to stack When you expand the image, if you point to the source image on your TFTP server, you can skip this section and go to Step 2: Software install image to flash |
Step 2 |
Software install image to flash |
Step 3 |
Reload If you said ‘Yes’ to the prompt in software install and your switches are configured with auto boot, the stack will automatically boot up with the new image. If not, you can manually boot flash:packages.conf |
Upgrading from Cisco IOS XE Release 3.x.xE in Bundle Mode
Follow these instructions to upgrade from Cisco IOS XE Release 3.x.xE in bundle mode:
Before you begin
Note that you can use this procedure for the following upgrade scenarios:
When upgrading from ... |
To... |
---|---|
Cisco IOS XE Release 3.x.xE |
Cisco IOS XE Fuji 16.x.x or Cisco IOS XE Everest 16.x.x or Cisco IOS XE Denali 16.x.x |
The sample output shows upgrade from Cisco IOS XE Release 3.7.3E to Cisco IOS XE Fuji 16.9.1
Procedure
Step 1 |
Copy new image to stack
|
||
Step 2 |
Edit the boot variable |
||
Step 3 |
Reload |
||
Step 4 |
Move from bundle mode to install mode Ensure you have enough space in flash to expand a new image by cleaning up old installation files. This command will erase your Cisco IOS XE Fuji 16.9.1 bin image file, so ensure that you copy it to your Active again. |
||
Step 5 |
Edit the boot variable |
||
Step 6 |
Reload |
Upgrading from Cisco IOS XE Denali 16.x.x in Install Mode
Follow these instructions to upgrade from a Cisco IOS XE Denali 16.x.x release to a later release in install mode. .
Before you begin
Note that you can use this procedure for the following upgrade scenarios
When upgrading from ... |
To... |
---|---|
Cisco IOS XE Denali 16.x.x |
Cisco IOS XE Fuji 16.x.x or Cisco IOS XE Everest 16.x.x or Cisco IOS XE Denali 16.x.x |
The sample output shows upgrade from Cisco IOS XE Denali 16.3.5 to Cisco IOS XE Fuji 16.9.1 in install mode.
Procedure
Step 1 |
Clean Up |
Step 2 |
Copy new image to stack Copy the new image to flash: (If you point to the source image on a TFTP server you can skip this section and go to: Software install image to flash). |
Step 3 |
Set boot variable |
Step 4 |
Software install image to flash |
Step 5 |
Reload |
Upgrading or Downgrading from Cisco IOS XE Fuji 16.9.1 in Install Mode
Follow these instructions to upgrade or downgrade from Cisco IOS XE Fuji 16.9.1, in install mode.
Before you begin
Note that you can use this procedure for the following upgrade and downgrade scenarios:
When upgrading from ... |
To... |
---|---|
Cisco IOS XE Fuji 16.9.1 |
A future Cisco IOS XE 16.x.x release. |
When downgrading from ... |
To... |
Cisco IOS XE Fuji 16.9.1 |
An earlier Cisco IOS XE 16.x.x release. |
The sample output covers an upgrade scenario; the same steps apply when you downgrade as well.
Procedure
Step 1 |
Clean Up |
Step 2 |
Copy new image to stack Copy the new image to flash: (If you point to the source image on a TFTP server you can skip this section and go to: Software install image to flash). |
Step 3 |
Set boot variable |
Step 4 |
Software install image to flash |
Step 5 |
Reload |
Downgrading to Cisco IOS XE 3.x.xE in Install Mode
Follow these instructions to downgrade to older Cisco IOS XE Release 3.x.xE releases in install mode.
Before you begin
Note that you can use this procedure for the following downgrade scenarios:
When downgrading from ... |
To... |
---|---|
Cisco IOS XE Fuji 16.x.x or Cisco IOS XE Everest 16.x.x or Cisco IOS XE Denali 16.x.x |
Cisco IOS XE Release 3.x.xE |
The sample output shows downgrade from Cisco IOS XE Fuji 16.9.1 to Cisco IOS XE Release 3.7.2E.
Procedure
Step 1 |
Clean Up |
Step 2 |
Copy new image to stack Copy the target Cisco IOS XE 3.x.xE image to flash: (you can skip this step if you want to use the image from your TFTP server). |
Step 3 |
Downgrade Software Image |
Step 4 |
Reload |
Downgrading to Cisco IOS XE 3.x.xE in Bundle Mode
Follow these instructions to downgrade to older Cisco IOS XE Release 3.x.xE releases in bundle mode.
Before you begin
Note that you can use this procedure for the following downgrade scenarios:
When downgrading from ... |
To... |
---|---|
Cisco IOS XE Fuji 16.x.x or Cisco IOS XE Everest 16.x.x or Cisco IOS XE Denali 16.x.x |
Cisco IOS XE Release 3.x.xE |
The sample output shows downgrade from Cisco IOS XE Fuji 16.9.1 to Cisco IOS XE Release 3.7.2E.
Procedure
Step 1 |
Copy new image to stack |
Step 2 |
Edit the boot variable |
Step 3 |
Reload |
Step 4 |
Move from Cisco IOS XE 3.xE Bundle Mode to Install Mode |
Step 5 |
Edit the boot variable |
Step 6 |
Reload |
Licensing
This section provides information about the licensing packages for features available on Cisco Catalyst 3650 Series Switches.
License Levels
The software features available on Cisco Catalyst 3650 Series Switches fall under these base or add-on license levels.
Base Licenses
-
LAN Base—Provides basic Layer 2+ features, including access control lists (ACLs) and quality of service (QoS), up to 255 VLANs, support for routing protocols (Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Policy-Based Routing (PBR), Protocol Independent Multicast Stub Routing (PIM Stub Routing) with IPv4 and IPv6, and routed access with IPv4 and IPv6 (OSPF — up to 1000 routes, Multicast — up to 1000 routes).
-
IP Base—Provides Layer 2+ and basic Layer 3 features (enterprise-class intelligent services). These features include access control lists (ACLs), quality of service (QoS), static routing, Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing, IP multicast routing, RIP, basic IPv6 management, the OSPF Protocol (for routed access only). The license supports up to 4094 VLANs.
-
IP Services—Provides a richer set of enterprise-class intelligent services and full IPv6 support. It includes all IP Base features plus full Layer 3 routing (IP unicast routing and IP multicast routing). The IP Services feature set includes protocols such as the EIGRP, OSPF Protocol. The license supports up to 4094 VLANs.
Add-On Licenses
The features available with add-on license levels provide Cisco innovations on the switch, as well as on the Cisco Digital Network Architecture Center (Cisco DNA Center).
-
DNA Advantage
To find information about platform support and to know which license levels a feature is available with, use Cisco Feature Navigator. To access Cisco Feature Navigator, go to https://cfnng.cisco.com. An account on cisco.com is not required.
License Types
The following license types are available:
-
Permanent—for a license level, and without an expiration date.
-
Evaluation—a license that is not registered.
License Levels - Usage Guidelines
-
A permanent license can be moved from one device to another.
-
A switch stack cannot contain mixed license levels. Also, the switches must be of the same platform.
-
Evaluation licenses cannot be ordered. They are not tracked via Cisco Smart Software Manager and expire after a 90-day period. Evaluation licenses can be used only once on the switch and cannot be regenerated. Warning system messages about an evaluation license expiry are generated only 275 days after expiration and every week thereafter. An expired evaluation license cannot be reactivated after reload.
Cisco Smart Licensing
Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it’s secure – you control what users can access. With Smart Licensing you get:
-
Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more PAKs (Product Activation Keys).
-
Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using.
-
License Flexibility: Your software is not node-locked to your hardware, so you can easily use and transfer licenses as needed.
To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (http://software.cisco.com).
Important |
Cisco Smart Licensing is the default and the only available method to manage licenses. |
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide.
Deploying Smart Licensing
Procedure
Step 1 |
Begin by establishing a connection from your network to Cisco Smart Software Manager on cisco.com. |
Step 2 |
Create and activate your Smart Account, or login if you already have one. To create and activate Smart Account, go to Cisco Software Central → Create Smart Accounts. Only authorized users can activate the Smart Account. |
Step 3 |
Complete the Cisco Smart Software Manager set up. |
What to do next
Converting Traditional Licenses to Smart Licenses
For Cisco Catalyst 3650 Series Switches, after you have upgraded the software image and deployed Smart Licensing, all traditional licenses on the device must be migrated, to Cisco Smart Software Manager. This is a one-time migration process that you must complete on each device.
Procedure
Step 1 |
Register the device Generate the registration token in the Cisco Smart Software Manager portal and register your device with the token. In the software configuration guide of the required release, see System Management → Configuring Smart Licensing → Registering a Device in CSSM. |
Step 2 |
Migrate base licenses The system converts traditional licenses to smart licenses and sends migration data to Cisco Smart Software Manager, which
in turn Cisco Smart Software Manager creates license entitlements and deposits them in your user account. In the software configuration guide of the required release, see System Management → Configuring Smart Licensing → Migrating a License with License Conversion..
|
With this
-
The device is now in an authorized state and ready to use.
-
The licenses that you have purchased are displayed in your Smart Account.
How Upgrading or Downgrading Software Affects Smart Licensing
Starting from Cisco IOS XE Fuji 16.9.1, Smart Licensing is the default and only license management solution; all licenses are managed as Smart Licenses.
Important |
Starting from Cisco IOS XE Fuji 16.9.1, the Right-To-Use (RTU) licensing mode is deprecated, and the associated license right-to-use command is no longer available on the CLI. |
Note how upgrading to a release that supports Smart Licensing or moving to a release that does not support Smart Licensing affects licenses on a device:
-
When you upgrade from an earlier release to one that supports Smart Licensing—all existing licenses remain in evaluation mode until registered in Cisco Smart Software Manager and then converted. After conversion, they are made available in your Smart Account.
In the software configuration guide of the required release, see System Management → Configuring Smart Licensing → Registering a Device in CSSM.
-
When you downgrade to a release where Smart Licensing is not supported—all smart licenses on the device are converted to traditional licenses and all smart licensing information on the device is removed.
Using Smart Licensing on an Out-of-the-Box Device
Limitations and Restrictions
-
Cisco TrustSec restrictions:
-
Cisco TrustSec can be configured only on physical interfaces, not on logical interfaces.
-
Cisco TrustSec cannot be configured on a pure bridging domain with the IPSG feature enabled. You must either enable IP routing or disable the IPSG feature in the bridging domain.
-
-
Control Plane Policing (CoPP)—The show run command does not display information about classes configured under system-cpp policy, when they are left at default values. Use the show policy-map system-cpp-policy or the show policy-map control-plane commands in privileged EXEC mode instead.
-
DHCP Client—Starting with Cisco IOS XE Denali 16.1.x, a DHCP client that includes option 61 (used by DHCP clients to specify their unique client identifier) in their DHCP discover/offer packet must accept the response message with option 61 from the DHCP server/relay. A client that fails to accept the response message with option 61, is not in compliance with RFC 6842 and requires a firmware upgrade.
-
Centralized Management Mode (CMM)—Starting with Cisco IOS XE Denali 16.3.1, CMM is not supported.
-
Flexible NetFlow—You cannot configure NetFlow export using the Ethernet Management port (GigabitEthernet0/0).
-
Flex Links are not supported. We recommend that you use spanning tree protocol (STP) as the alternative.
-
QoS restrictions:
-
When configuring QoS queuing policy, the sum of the queuing buffer should not exceed 100%.
-
For QoS policies, only switched virtual interfaces (SVI) are supported for logical interfaces.
-
QoS policies are not supported for port-channel interfaces, tunnel interfaces, and other logical interfaces.
-
-
Secure Shell (SSH)
-
Use SSH Version 2. SSH Version 1 is not supported.
-
When the device is running SCP and SSH cryptographic operations, expect high CPU until the SCP read process is completed. SCP supports file transfers between hosts on a network and uses SSH for the transfer.
Since SCP and SSH operations are currently not supported on the hardware crypto engine, running encryption and decryption process in software causes high CPU. The SCP and SSH processes can show as much as 40 or 50 percent CPU usage, but they do not cause the device to shutdown.
-
-
Mixed stacking—A switch stack containing a mix of Cisco Catalyst 3650 Series Switches and Cisco Catalyst 3850 Series Switches is not supported.
-
VLAN Restriction—It is advisable to have well-defined segregation while defining data and voice domain during switch configuration and to maintain a data VLAN different from voice VLAN across the switch stack. If the same VLAN is configured for data and voice domains on an interface, the resulting high CPU utilization might affect the device.
-
YANG data modeling limitation—A maximum of 20 simultaneous NETCONF sessions are supported.
Scaling Guidelines
System Feature |
Maximum Limit |
---|---|
Number of HTTP session redirections system-wide |
Up to 100 clients per second |
Number of HTTPS session redirections system-wide |
Up to 20 clients per second |
Caveats
Caveats describe unexpected behavior in Cisco IOS-XE releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Cisco Bug Search Tool
The Cisco Bug Search Tool (BST) allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The BST is designed to improve the effectiveness in network risk management and device troubleshooting. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat, click on the identifier.
Open Caveats in Cisco IOS XE Fuji 16.9.x
Identifier |
Description |
---|---|
FED crash when 'show tech nbar' is run |
|
MACSEC link does not recover upon link flap |
|
DHCP server sends out a NAK packet during DHCP renewal process. |
Resolved Caveats in Cisco IOS XE Fuji 16.9.8
Caveat ID Number |
Description |
---|---|
Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability |
|
Keep auto-neg enabled even with hard code speed and duplex causing auto-neg mismatch |
|
Romvar: Bootloop if SWITCH_DISABLE_PASSWORD_RECOVERY and SWITCH_IGNORE_STARTUP_CFG are both set to 1 |
|
Crash in SNMP Engine process while polling chassis id in lldp |
|
IOS and IOS XE Software UDLD Denial of Service Vulnerability |
|
CTS credential password will be added to local keystore even if the password is longer than 24 char |
|
Netfilter: Linux Kernel triggers crash by race condition through delete operation |
|
High CPU usage caused by "TCP Timer" process |
|
Switch stack crash with FIPS mode enabled |
|
Cisco IOS and IOS XE Software TrustSec CLI Parser Denial of Service Vulnerability |
|
A crash due to issue with internal QOS policy specfic to EPC |
Resolved Caveats in Cisco IOS XE Fuji 16.9.7
Caveat ID Number |
Description |
---|---|
Cat3k crash from corruption in AVL tree |
|
Switch reloads due to fed crash after sending multicast data packets in pvlan |
Resolved Caveats in Cisco IOS XE Fuji 16.9.6
Caveat ID Number |
Description |
---|---|
FED_QOS_ERRMSG-3-POLICER_HW_ERROR on Catalysts switches running 16.6 releases |
|
Cat3k/9k: Device might reboot after applying "mac address-static xxxx.xxxx.xxxx vlan x drop" command |
|
FED crash when premature free of SG element |
|
Switch reloads due to dhcp snooping |
|
Traffic forwarding stops when Session Idle time out is configured 10 sec with active traffic running |
|
Uplink Port-channel Trunk member link Port LED truns to amber blinking after link down/up |
|
QoS ACL matching incorrectly when udp range is used |
|
Crash when invalid input interrupts a role-based access-list policy installation |
|
SPAN filter cannot work well when configure FSPAN after 5th session. |
|
Intermittent Link Flaps on mGig Cat3850/3650 switches to mGig capable endpoints |
|
Crash in FED Process on Catalyst 3650/3850 Switch with a 88E1680M PHY |
Resolved Caveats in Cisco IOS XE Fuji 16.9.5
Identifier |
Description |
---|---|
Cat3k/9k SPAN monitor session works in stack only on adding 2 dest ports in stack |
|
16.6.4 CPP Police rate wrong in "class system-cpp-police-control-low-priority" |
|
Standby Switch Stuck in HA Sync config after Stack-Merge |
|
FMAN-RP crash observed on Guest Anchor |
|
3650 interface hung after reboot the device |
|
ERSPAN destination does not work or forward traffic |
|
Cat3k/9k EGR_INVALID_REWRITE counter increasing in mVPN setup |
|
IOS-XE drops ARP reply when IPDT gleans from ARP |
|
Enable CDP - removed on shut/ no shut dot1Q-tunnel interface |
|
Cat3k/9k Ospf down upon switchover with aggressive timers "hello-interval 1" and "dead-interval 4" |
|
ip verify source mac-check prevents device tracking from getting arp probe reply |
|
%BIT-4-OUTOFRANGE: bit 4095 is not in the expected range of 1 to 4093 |
|
igmp query with src ip 0.0.0.0 is not ignored |
|
Cat3k/9k does not forward packet when active route down |
|
Private-vlan mapping XXX configuration under SVI is lost from run config after switch reload |
|
Cat3k/Cat9k can't forwarding traffic follow the rule of EIGRP unequal cost load-balancing |
|
intermediate hop with SVI in PIM domain is not forwarding multicast traffic |
|
Cat3k: cef per-destination load sharing algorithm doesn't balance the flow according to the hash |
|
The COPP configuration back to the default After rebooting the device |
|
PSU shown as Disabled when there is not input power cables |
|
Memory Leak on FED due to IPv6 Source Guard |
|
Multicast stream flickers on igmp join/leave |
|
Cat3k/9k BOOTREPLY dropped when DHCP snooping is enabled |
|
Switches are adding Device SGT to proxy generated IGMP leave messages while keeping End host src IP |
|
Switch may experience a kernel panic due to invalid skb |
|
Cat3k/9k stack breaks and subsequent merge fails |
|
Imax error on adjacent interfaces in port-group |
|
ports remain down/down object-manager (fed-ots-mo thread is stuck) |
|
High memory utilization under fman_fp_image |
|
Cat3k/9k Flow-based SPAN(FSPAN) can only work in one direction when mutilple session configured |
|
After valid ip conflict, SVI admin down responds to GARP |
|
16.9.2 ES standby crashed |
|
Fed memory leak in 16.9.X related to netflow |
Resolved Caveats in Cisco IOS XE Fuji 16.9.4
Caveat ID Number |
Description |
---|---|
Linux IOSD crash with sh vtp counters cmd |
|
port LED may turn to amber |
|
Enhancement to change pethMainPowerUsageOnNotification default threshold from 0 |
|
Called-Station-Id attribute not included in Radius Access-Request |
|
IOSd memory leak within DSMIB Server within xqos_malloc_wrapper |
|
standby reloads and crashed @fnf_ios_config_dist_validate_sel_process_add |
|
MACsec SAP 128 Bits doesn't work with network-essentials license |
|
Catalyst 3k/9k: Slow memory leak in linux_iosd-imag |
|
High Memory utilization due to Wireless Manager IOSD process |
|
MACSEC Portchannel member interface stays permanently down after link flap |
|
ND packets received in remote vtep SISF table - EVPN part |
|
Default ACL being enforced even dACL is applied after Reload |
|
IPv6 traffic is stopped on interface when more than 3 invalid ARPs are detected |
|
hw-switch logging onboard message may be disappeared after reload |
|
Changes for sending vlan attrs in access request |
|
Memory leak at hman process |
|
Memory leak in MACSec seen during SAP scale longevity |
|
3850 stack SFP cannot be recognized on some port and the port link also do not up |
|
SDA-Cat9k-External border creating incorrect CEF/map-cache entry due to multicast |
|
Packet loops are noticed when WCCP redirect out is enabled on VLAN interface of 3850 switch |
|
SISF not honoring 1 IPv4-to-MAC rule when DHCP ACK comes from a different VLAN (via Relay) |
|
NetFlow issue 3850 switch not sending TCP flags |
|
errdisable detect cause bpduguard shutdown vlan continues to forward BPDUs |
|
spanning-tree uplinkfast max-update-rate's value is abnormal |
|
QinQ tunnels causing L2 loop in specific topology of Cat3850 |
|
Enabling SPAN source of VLAN 1 affects LACP operations |
|
Cat3k / Cat9k Gateway routes DHCP offer incorrectly after DHCP snooping |
|
Identity policy won't update after config changes. |
|
[SDA] [PI changes] No audio during first few seconds of voice call between 2 Fabric Edge |
|
High Temperature returned for Catalyst switches when the inlet temperature is negative |
|
Cat9300 | First packet not forwarded when (S,G) needs to be built |
|
Counters in the "show interface" command are not increasing |
|
Cat3650 Uplinkfast take time when recovery from link failure |
|
Directly connected IPv4/IPv6 hosts not programmed in HW - %FMFP-3-OBJ_DWNLD_TO_DP_FAILED |
|
[SDA] [PD changes] No audio during first few seconds of voice call between 2 Fabric Edge |
|
ENH Hex dump constantly logging when registering access point using DNAC |
|
When sourcing Radius from loopback in VRF, auth right out of boot up might fail |
|
Standby switch crash due to memory leak due to Switch Integrated Security feature |
|
Cat9400 incoming packet from PVLAN access port is not forwarded out on etherchannel interface |
|
Cat9k control plane impacted when > 1Gbps multicast passes through and no entry in IGMP snooping |
|
memory leak when there are constant changes in REP ring |
|
Cat9300: Lisp site entry count mismatch in external dual border on reload |
|
Cat3650 Mgmt port "speed 1000" and "negotiation auto" in show run |
|
DHCP SNOOPING DATABASE IS NOT REFRESHED AFTER RELOAD |
|
[SDA] 1st ARP Reply is dropped at remote Fabric Edge |
|
3650 Power supply status is displayed incorrectly |
|
crash at sisf_show_counters after entering show device-tracking counters command |
|
Modules shows faulty status when specific MAC ACL is applied on interfaces |
|
%FED_QOS_ERRMSG-3-TABLEMAP_INGRESS_HW_ERROR was generated after setting policy-map with table-map |
|
STP TCN is generated on etherchannel port during a switchover in a 3850 stack |
|
Connectivity over AC tunnel broken due to tunnel deletion from FMAN FP but remains FMAN FP |
|
Cat3k crash while accessing OBFL |
|
VPN label is wrongly derived as explicit-null in Cat9k for L3 VPN traffic |
|
Catalyst switches is sending ADV and REP DHCPv6 packets to SISF when source udp port is not 547 |
|
%SNMP-3-RESPONSE_DELAYED: and timeout when polling entSensorValueEntry on 16.9.3 |
|
DACL not properly enforced when pre auth acl present for some phone |
|
PD's not getting PoE on multiple interfaces in 3850 stack |
|
Crash at ip_source_binding_config command |
|
[SDA] 1st ARP fix for CSCvp00026 is eventually failing after longevity |
|
SYS-2-BADSHARE: Bad refcount in datagram_done - messages seen during system churn |
|
Mac address not being learnt when "auth port-control auto" command is present |
Resolved Caveats in Cisco IOS XE Fuji 16.9.3a
Identifier |
Description |
---|---|
Catalyst 3k/9k: Slow memory leak in linux_iosd-imag |
|
Show Stack-power budget missing some switches when change to standalone mode |
|
CAT3K: Unable to retrive SUDI certificates in 16.9.3 |
Resolved Caveats in Cisco IOS XE Fuji 16.9.3
Identifier |
Description |
---|---|
SNMP with Extended ACL |
|
Uneven available power distribution when using power sharing |
|
SNMP timeout when querying entSensorValueEntry |
|
sgt-map gets cleared for some of the end points for unknown reason |
|
Crash with smd fault on rp_0_0 |
|
3650 "show macsec interface" hang and intermittent traffic loss. |
|
Router may crash when a SSH session is closed after configure TACACS |
|
IOSd: large amount of bursty IPC traffic sometime can cause high CPU utilization in fastpath |
|
C3650 link down with speed 100/full duplex after device reboot up |
|
Device reloads when applying #client <IP> vrf Mgmt-vrf server-key 062B0C09586D590B5656390E15 |
|
HOLE is not created when acl default passthrough configured |
|
Missing/incorrect FED entries for IGMP Snooping on Cat9300/Cat3850/Cat3650 |
|
WCCP redirection to proxy server breaks in certain scenarios. |
|
CTS policies download fails with Missing/Incomplete ACEs error |
|
C3650 LINEPROTO DOWN/UP one time when shut/no shut the no relationship port |
|
PSU shown as Disabled when there is not input power cables. |
|
show inventory does not list the Stack Ports / Stack cables after reload |
|
Ac Tunnel in "pending-issue-update" state in FMAN FP |
|
Device is getting crashed on the "cts role-based enforcement" |
|
Stack adapter authentication failed |
|
Radius attr 32 NAS-IDENTIFIIER not sending the FQDN |
|
Cat9k not updating checksum after DSCP change |
|
3650/3850 40G fixed uplink 16.9.x // Certain ports not sending control-plane traffic |
|
High CPU Due To Looped Packet and/or Unicast DHCP ACK Dropped |
|
Mcast traffic loss seen looks due to missing fed entries during IGMP/MLD snooping. |
Resolved Caveats in Cisco IOS XE Fuji 16.9.2
Identifier |
Description |
---|---|
Converting a layer 2 port-channel to L3 causes some Protocols to break |
|
Addressing memory leaks in IPC error handling cases in LED, RPS, VMARGIN, USB, THERMAL |
|
REP Node reload causes unicast traffic drops on a neighbor switch |
|
DHCP offer received from SVI sent back to the same SVI when DHCP Snooping is enabled |
|
System returning incorrect portchannel MIB value (IEEE8023-LAG-MIB) |
|
MOSFET fault 3850/3650 suddenly stops providing PoE on certain ports |
|
WS-C3650-48FQM and WS-C3650-24PD Getting Noisy after few weeks of up time |
|
DHCP client traffic dropped with DHCP snooping and port-channel or cross stack uplinks. |
|
Stack member crash during LACP port aggregation |
|
Packets with Fragment Offset not forwarded with DHCP Snooping Enabled |
|
FED crash at expired "FED MAC AGING TIMER" or "unknown" timer without a stack trace. |
Resolved Caveats in Cisco IOS XE Fuji 16.9.1
Identifier |
Description |
---|---|
%SNMP-3-RESPONSE_DELAYED: processing GetNext of cafSessionEntry.2 seen on catalyst switch |
|
Deprecate the option of member flash# in upgrade/downgrade CLI for software install |
|
Port went to err-disable due to link-flap detected after shutdown no shut |
|
optical signal present on shut interface with "cts manual" |
|
Stack member loses connection to active on single cable auth failure |
|
3850/3650 :: incorrect OID values for IEEE8023-LAG-MIB |
|
IOS CLI "show platform software fed switch active punt cause summary" may display negative counts |
|
TRACEBACK: OID cefcModuleEntry crashes the box |
|
stack logging onboard(OBFL) config disappear after switchover |
|
set different words for username and password, but username shown the same as password |
|
Silent Reload on Cat3850/3650 running Everest 16.6.2 |
|
Memory leak in lman process due to "ld_license_ext.dat" build-up. |
|
Rapid TDL memory leak in SMD process leads to crash of active switch in stack for ipv6 clients |
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at this URL:
https://www.cisco.com/en/US/support/index.html
Go to Product Support and select your product from the list or enter the name of your product. Look under Troubleshoot and Alerts, to find information for the problem that you are experiencing.
Related Documentation
Information about Cisco IOS XE at this URL: https://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html
All support documentation for Cisco Catalyst 3650 Series Switches is at this URL: https://www.cisco.com/go/cat3650_docs
Cisco Validated Designs documents at this URL: https://www.cisco.com/go/designzone
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.