What's New in Hardware for Cisco IOS XE Amsterdam 17.3.8a
There are no new hardware features in this release.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes the new hardware and software features supported on the Cisco NCS 520 Series Ethernet Devices in Cisco IOS XE Amsterdam 17.3.x.
There are no new hardware features in this release.
There are no new features in this release. This release provides a fix for CSCwh87343: Cisco IOS XE Software Web UI Privilege Escalation Vulnerability. For more information, see cisco-sa-iosxe-webui-privesc-j22SaA4z.
There are no new Hardware features introduced for this release.
There are no new Software features introduced for this release.
There are no new Software features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Software features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Software features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Software features introduced for this release.
There are no new Hardware features introduced for this release.
There are no new Software features introduced for this release.
There are no new Hardware features introduced for this release.
Feature | Description |
---|---|
IP Addressing |
|
The Dynamic Host Configuration Protocol (DHCP) Snooping is a DHCP security feature that provides network securityby filtering untrusted DHCP messages and by building and maintaining a DHCP Snooping binding database, DHCP snooping acts like a firewall between untrusted hosts and DHCP servers.DHCP Snooping is used to differentiate untrusted interfaces connected to the end user and trusted interfaces connected to the DHCP server or another router. This feature is supported on the Cisco NCS 520 Router. |
|
The dynamic Address Resolution Protocol (ARP) provides IP communication within a Layer 2 broadcast domain by mapping an IP address to a MAC address. Dynamic ARP inspection also determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a trusted database, such as the DHCP Snooping binding database. This feature is supported on the Cisco NCS 520 Router. |
There are no new Hardware features introduced for this release.