What's New in Hardware for Cisco IOS XE Dublin 17.11.1a
There are no new features in this release.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes the new hardware and software features supported in Cisco IOS XE Dublin 17.11.x.
For information on features supported for each release, see Feature Compatibility Matrix .
There are no new features in this release.
Feature | Description | ||
---|---|---|---|
CEM |
|||
Support for 3-in-24 BERT patterns |
Support for 3-in-24 BERT patterns on the following interface modules and modes: |
||
You can configure BERT patterns at the DS0 level on the following interface modules for both the system and line directions.
You can configure speed with bandwidth of 56 kbps or 64 kbps along with the BERT pattern. With DS0 level BERT configuration, you can verify the end-to-end connectivity. |
|||
Frame Relay (FR) port mode provides transport between two Provider Edge (PE) devices, where the complete FR frame is transported
using the same encapsulation configured for the HDLC or FR pseudowire. On the PE device, the multiple FR Virtual Circuits
(VCs) are carried over a single interface and the traffic is passed into a single transparent HDLC or FR pseudowire in an
MPLS network. Thus with port mode, there are many-to-one mappings between multiple FR VCs and a pseudowire in a secure manner.
You can configure HDLC or FR port mode on the following interface modules:
|
|||
You can configure layer 3 termination on the Frame Relay (FR) and Mulitlink Frame Relay (MFR) sub interface for the following interface modules:
You can assign IP address on the FR sub interface and terminate the Layer 3 traffic where ever required in the network. |
|||
IP Routing: BFD |
|||
A Micro Bidirectional Forwarding Detection (Micro-BFD) session can detect failures in member links of a port channel. You can now enable Micro-BFD sessions for a port channel on which Ethernet flow Point (EFP) or service instance is configured. This feature ensures that traffic is forwarded to a member link only when the micro-BFD session for that member link is in the UP state. As part of this feature, the source-service-instance number keyword has been added to the port-channel bfd command. The specified service instance provides the source IP address for the micro-BFD session. |
|||
Timing and Synchronization |
|||
Network Time Protocol (NTP) synchronizes device clocks across networks to maintain system accuracy. In this release, NTP supports IPv6 multicast networks. The NTP server sends clock updates as multicast messages to the clients across IPv6 networks. As NTP packets are sent only to the intended clients, it reduces timing traffic in the network. |
|||
Programmability |
|||
gNMI Dial-Out Using gRPC Tunnel Service |
This feature allows you to configure a network device (tunnel client) to register certain targets (preapproved services) with a gRPC tunnel server through the CLI. These targets are defined as ports on the network device. You can use the gRPC tunnel server to forward connections from external clients, such as gRPC Network Management Interface (gNMI)/gRPC Network Operations Interface (gNOI), to connect to the network device without establishing a direct connection. The following commands are introduced for the tunnel and target configurations respectively:
|
||
Software Activation |
|||
No License Snapshot Support |
License snapshot won’t be generated starting from this release and the software relies only on the existing snapshot for any PAK license information. |
||
Strong Crypto Algorithms |
|||
Strong Crypto Algorithms |
We strongly recommend stronger cryptographic algorithms instead of weak cryptographic algorithms, such as RSA keys of less than 2048 bits, MD5 for authentication, DES, and 3DES for encryption. Soon, such weak algorithms will no longer be allowed by default. An explicit configuration is required to continue using such weak algorithms. For SNMP v3 users with weak cryptographic properties, the SNMP operations to the device will fail, resulting in loss of management access to device through SNMP. Similarly, if the RSA key pair is not updated to be at least 2048 bits for SSH, the SSH server will be disabled, resulting in loss of remote access to the device through SSH. For more information on how to migrate to stronger cryptographic algorithms for SNMP, see the Field Notice Number: FN72509. For more information on how to migrate to stronger cryptographic algorithms for SSH, see Field Notice Number: FN72511. |
||
YANG |
|||
YANG Support for show l2vpn atom vc detail Command |
The Cisco-IOS-XE-l2vpn-oper native model is a collection of YANG definitions for L2VPN services operational data. Additional leaves and lists are now supported in the following sensor path: Cisco-IOS-XE-l2vpn-oper\l2vpn-oper-data\l2vpn-services\l2vpn-atom-vc-info With this model, you can get detailed information, such as the L2VPN service name, service type, interface name, peer address, status, encapsulation type, virtual circuit ID, and packet information by using a NETCONF RPC. In earlier releases, you could perform this action by using the following CLI: show l2vpn atom vc detail
YANG Data Models—For the list of Cisco IOS XE YANG models available with this release, navigate to https://github.com/YangModels/yang/tree/main/vendor/cisco/xe. Revision statements embedded in the YANG files indicate if there has been a model revision. The README.md file in the same GitHub location highlights changes that have been made in the release. |