Полезная информация

cc/td/doc/product/software/ios120/relnote
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco  IOS Release  12.0(1)XB Feature Packs for  Cisco  800 Series Routers

Release Notes for Cisco  IOS Release  12.0(1)XB Feature Packs for  Cisco  800 Series Routers

February 8, 1999

These release notes describe the Cisco IOS Releases  12.0(1)XB and 12.0(1)XB1 feature packs for Cisco 800 series routers. In these release notes, all references to Cisco IOS Release  12.0(1)XB apply to both Cisco IOS Releases  12.0(1)XB and 12.0(1)XB1 unless otherwise stated.

Contents

These release notes contain the following topics:

Introduction

This section explains how to use this document, describes feature pack components, and has tables that define the aspects of a feature pack.

How to Use These Release Notes

The tables in these release notes contain details about the Cisco feature packs. Use these tables to perform the following tasks before loading a software image onto a router:

    1. Use Table 1, "Feature Pack Product Numbers Quick-Reference List" to identify the software image you want to load.

    2. Use Table 2, "Cisco 800 Series Feature Packs," to identify your feature pack and the memory required for your feature set, based on the image you load.

    3. Use Table 5, "Default Memory and Upgrade Options," to check the memory required for your feature set, and determine the factory-default memory on the router and the available memory upgrades.

    4. Use the "Feature Set Tables" to identify which features are supported in a feature set image.

What Is a Feature Pack?

This section describes:

Feature Pack Components

A feature pack is a small box that contains the following items:

The heart of a feature pack is the CD-ROM that contains software images and the Router Software Loader (RSL), which is a Windows 95 application that loads an image onto an access router or server. Each feature pack CD-ROM contains at least one Cisco  IOS feature set. The CD booklet, Getting Started with the Router Software Loader, explains how to use the RSL to install the router image. If you cannot use the RSL to load images, you can follow the instructions in the "Alternatives to the RSL" section.

Before running the RSL, read the "Installing Software Images Using the RSL" section. If you are loading software on a preconfigured router, you should save the router configuration file on your PC before beginning the image download process, as described in Getting Started with the Router Software Loader.

Product Numbers Quick-Reference List

Table 1 lists the Cisco product numbers of the feature packs supported in this release.


Table 1:
Product Number Feature Pack Description

CD08-C-12.0=

Cisco 800 IP Feature Pack

CD08-BP-12.0=

Cisco 800 IP/IPX Plus Feature Pack

CD08-CX-12.0=

Cisco 800 IP/X.25 Feature Pack

CD08-CI-12.0=

Cisco 800 IP Feature Pack for ISPs

Feature Pack Product Numbers Quick-Reference List

Feature Pack Overview Table

Table 2 identifies each feature pack as specified on the router software CD-ROM label, describes the feature sets in each feature pack, and lists the following: UNIX and DOS filenames of the images, memory requirements, and RSL installer description.


Table 2: Cisco 800 Series Feature Packs
Product Number CD-ROM Title Image Name (UNIX) Image Name (DOS) Flash Memory Required Main Memory Required RSL Installer Description

CD08-C-12.0=

Cisco 800 Series IP Feature Pack Release 12.0(1)XB1

Router Software Loader
Version 7.3

c800-g3-mw

aaa0079

8 MB

4 MB

Cisco 800 Series IOS IP Feature Set

CD08-BP-12.0=

Cisco 800 Series IP/IPX Plus Feature Pack
Release 12.0(1)XB1

Router Software Loader
Version 7.3

c800-g3n-mw

aaa0080

8 MB

4 MB

Cisco 800 Series IOS IP/IPX Plus Feature Set

CD08-CX-12.0=

Cisco 800 Series IP/X.25
Feature Pack
Release 12.0(1)XB1

Router Software Loader
Version 7.3

c800-g3x-mw

aaa0081

8 MB

4 MB

Cisco 800 Series IOS IP/X.25 Feature Set

CD08-CI-12.0=

Cisco 800 Series IP Feature Pack for ISPs
Release 12.0(1)XB1

Router Software Loader
Version 7.3

c800-g3s-mw

aaa0082

8 MB

4 MB

Cisco 800 Series IOS IP Feature Set for Internet Service Providers (ISPs)

Feature Set Tables

The Cisco  IOS software is packaged into feature sets (also called images). Many different feature sets are available, and each feature set contains a specific subset of Cisco  IOS features. The following conventions are used to identify feature sets:

The following list shows which feature sets are supported on the Cisco 800 series routers. These feature sets only apply to Cisco  IOS Release  12.0(1)XB:

To determine what features are available with each feature set (software image), see Table 3. The table summarizes the features you can use when running a specific feature set on the Cisco 800 series routers for Cisco IOS Release 12.0(1)XB, and uses these terms to identify features

Feature Set
Matrix Term
Description

Yes

This feature is offered in the feature set.

No

This feature is not offered in the feature set.


Note This feature set table contains only a selected list of features. This table is not a cumulative or complete list of all the features in each image.


Table 3: Cisco IOS Software Feature Sets for the Cisco 800 Routers
Feature Set
 Features IP IP/IPX Plus IP/X.25 IP for ISPs
IP Routing

Easy IP Phase 2-DHCP Server

Yes

Yes

Yes

Yes

IP Type of Service and Precedence for GRE Tunnels

No

Yes

Yes

Yes

ISDN MIB RFC 2127

Yes

Yes

Yes

Yes

OSPF Packet Pacing

No

No

No

No

OS IFSS Featurette

No

No

No

No

Protocol-Independent Multicast (PIM) Version 2

No

No

No

No

IBM Support

Bridging Code Rework

No

No

No

No

RIF Passthru in DLSw+

No

No

No

No

Security

AAA Support for MS-CHAP

Yes

Yes

Yes

Yes

Additional Vendor-Proprietary RADIUS Attributes

No

No

No

No

Authenticating ACL

No

No

No

No

Automated Double Authentication

No

No

No

No

Context-Based Access Control (CBAC)

No

No

No

No

Certificate Authority Interoperability

No

No

No

No

Internet Key Exchange Security Protocol

No

No

No

No

IPSec Network Security

No

No

No

No

Named Method Lists for AAA Authentication & Accounting

No

No

No

No

Management

VPDN MIB Feature

No

No

No

No

WAN Services

Always On/Dynamic ISDN

No

Yes

Yes

No

Dialer Watch

Yes

Yes

Yes

Yes

Interface Name Modularity

No

No

No

No

MPPC- MS PPP Compression

No

No

No

No

MS Callback

No

No

No

No

Mobile IP

No

No

No

No

Level 2 Tunnel Protocol (L2TP)

No

No

No

No

PPP Over Frame Relay

No

No

No

No

RIP Enhancements

Yes

Yes

Yes

Yes

Time-Based Access Lists

Yes

Yes

Yes

Yes

Switching

Multiple ISDN Switch Types

Yes

Yes

Yes

Yes

National ISDN Switch Type

Yes

Yes

Yes

Yes

Scalability

Airline Product Set (ALPS)

No

No

No

No

Cisco IOS File System

No

No

No

No

Conditionally Triggered Debugging

No

No

No

No

Entity MIB

No

No

No

No

Expression MIB

No

No

No

No

OSPF Point to Multipoint

No

No

No

No

Spanning Tree Protocol

Cisco IOS STP Enhancements

Yes

Yes

Yes

Yes

The Cisco 800 series routers also support the features listed in Table 4.


Table 4: Additional Features Supported by Cisco 800 Series Routers
Feature IP IP/IPX Plus IP/X.25 IP for ISPs

Routed Protocol

IP

IP/IPX

IP

IP

Routing Protocol

RIP

Snapshot

RIP/EIGRP/IPXWAN

Snapshot

RIP/EIGRP

Snapshot

RIP/EIGRP

Snapshot

Tunneling

GRE

GRE

GRE

X.25

X.25

X.25

SNTP (time)

SNTP

SNTP

SNTP

Multicast

IP Multicast Forwarding

IP Multicast Forwarding

IP Multicast Forwarding

Management

SNMP

SNMP/SYSLOG

SNMP/SYSLOG

SNMP/SYSLOG

System Requirements

This section describes the following:

Memory Requirements

Table 5 lists the memory delivered by default and the available memory upgrades.


Table 5:
Memory Type Cisco 801-804 Defaults Upgrade Options

Flash memory card

4 MB

8-MB upgrade: MEM800-8F=
12-MB upgrade: MEM1600-12FC=

DRAM

4 MB

4-MB upgrade: MEM800-4D=
8-MB upgrade: MEM800-8D=

Default Memory and Upgrade Options

Hardware Supported

Router Software Loader (RSL)Version 7.3 supports many Cisco routers. Specific to the Cisco 800 series routers, RSL 7.3 supports the Cisco 801, 802, 803, and 804 routers.

Software Compatibility

The feature packs described in these release notes contain Cisco IOS Release 12.0(1)XB software images and Router Software Loader (RSL) Version 7.3. Before running RSL, read the "Installing Software Images Using the RSL" section.

Determining Your Software Release

To view the version of Cisco IOS software that is running on your Cisco 800 series router, log in to the router, and enter the show version user EXEC command:

router> show version
 

An output begins similar to the following. The Cisco IOS version appears in the second line.

Cisco Internetwork Operating System Software 
IOS (tm) 800 Software (C800-BNR2SY-L), Version 12.0(1)XB, RELEASE SOFTWARE
 

The output includes more information including processor revision numbers, memory amounts, hardware IDs, and partition information.

Updating to a New Software Release

For information on upgrading to a new software release, refer to the Cisco IOS Software Release  12.0T Upgrade Paths and Packaging Simplification  product bulletin #819 located on CCO. On CCO, follow this path: Products and Ordering: More Information: Product Bulletins. Scroll to Software. Under Cisco IOS 12.0, click the Upgrade Paths bulletin.

The Cisco IOS Software Release  12.0T Upgrade Paths and Packaging Simplification  product bulletin #819 does not contain information specific to Cisco IOS Release 12.0(1)XB, but provides generic upgrade information that might apply to Cisco IOS Release 12.0(1)XB.

Installation Notes

This section provides solutions to problems you might encounter when using the RSL to load Cisco  IOS software on a router. It also describes special cases that might require you to use an alternative to the RSL.

Installing Software Images Using the RSL

This section describes some solutions to problems you might encounter when using the RSL. These solutions are additions to RSL online help.

Recovering From a Connection Error

This installation tip provides a possible recovery solution if you are unable to connect to your access server or router. You can skip this section unless you are experiencing a connection error.

In some cases, you might receive the following error message while connecting to the target access server:

"Failed to configure the router to enable the Cisco IOS software image and configuration file upload and download operations. You may want to check the router to make sure that the selected interface exists."
 

If you encounter this message, try increasing the Short Timeout value, which is set to 25 seconds, in the Options dialog box, especially if you are connecting to an access server that has a large configuration file.


Note Increasing the Short Timeout value might increase the time it takes for RSL to connect to the target access server.

Restoring the Startup Configuration

In some cases, the RSL is unable to restore the startup configuration. If this happens, take the following steps:

Step 1 Ensure that all cables are properly attached to both the router and the PC.

Step 2 Restart the RSL, and connect by using the Preconfigured router option.

Step 3 When asked if you want to overwrite the existing startup configuration file, choose no.

Step 4 When asked if you want to continue, choose yes.

Step 5 When the router is connected, select Download Router Configuration in the Router  Software  Loader dialog box.

Step 6 Select the appropriate file, and click the radio button beside Copy configuration to the router nonvolatile memory.

The router should now contain the startup configuration it had before the initial RSL connection. You can now exit the RSL.


Note In the previous situation, the router configuration register (config-register 0xnnnn) is not restored.

Note If you press Ctrl-Alt-Delete to terminate the RSL, the router configuration and configuration register are not restored. However, in this case the configuration file is not deleted from the PC, so you can restore it using the previous steps, beginning with
Step 2.

Helpful Hints

The following information about RSL operations can help you with the installation process:

Alternatives to the RSL

The RSL is designed to work with a PC running Microsoft Windows  95 and is the recommended method for downloading software to the router. The booklet included with the CD-ROM explains how to perform this simple install process. However, you can use a TFTP server application to install the router software. When using a TFTP server application to install the software, you have the option of using the Cisco 800 TinyROM for the installation, or using Cisco IOS software.

Installing the Router Software Using TinyROM

Use this TFTP server application method as an alternative to using the RSL to install the router software from the CD-ROM. You can perform this procedure using a PC (running Microsoft Windows 95 or Microsoft Windows 3.1), a Macintosh, or a UNIX system. You can use the copy tftp flash command to download the router software to the router.

Step 1 Obtain a TFTP application to set up your computer as a TFTP server. Use the TFTP server included on the feature pack CD-ROM to install the router software only if you are using a PC running Windows 95. For other operating systems, a number of TFTP applications are available from independent software vendors or available as shareware from public sources on the World Wide Web.

Step 2 Install any TFTP server application on the PC. (A PC application is included on the feature pack CD-ROM for Microsoft Windows 95 only.)

Step 3 Launch the TFTP server application on the PC, usually by double-clicking the application icon or its .exe filename.

Step 4 Set up the PC as a TFTP server by using the TFTP server application setup or configuration facility.

Most TFTP server applications include a setup facility that allows you to specify the PC as a server. For example, from the TFTP menu of one application, you can select Settings to display a panel that includes a check box beside the word Server. To configure the local PC as a server, select this check box.

The TFTP server also allows the selection of a "root" directory. You must select the directory in which the Cisco  IOS files reside, for example, d:\cpswinst\images.

Caution Make sure you set up your local PC as a TFTP server. If you overlook this step, you cannot perform the copy procedure. This reminder also applies if you are using rcp instead of TFTP.

Step 5 Establish a console session from your local PC (which is now configured as a TFTP server) to the Cisco router by connecting the PC com port to the router console port.

Caution Make sure your PC is set up to communicate with the 10BaseT Ethernet port on the router.

Step 6 Connect your PC Ethernet port to the corresponding router LAN port. Use the 10BaseT crossover cable to connect to an Ethernet port. Use straight-through cables if you are connecting via a 10BaseT hub or a 100BaseT hub.

Step 7 Enter the following commands to reload the router:

    Router# reload
    Proceed with reload? yes
     
    

Step 8 Access the TinyROM by pressing the Esc key.

Step 9 Configure the TinyROM for TFTP transfer, for example:

    Boot# set unit-ip = 10.1.0.34
    Boot# set serv-ip = 10.0.0.1
    Boot# set netmask = 255.0.0.0
    Boot# set gate-ip = 10.0.0.1
     
    

Step 10 At the Boot prompt, enter the following command to list the available images:

    Boot# list
     
    

Step 11 Delete the old version of the image and upload the new version of the image that you are replacing. For example:

    Boot# delete c800-g3n-mw
    Boot# upload tftp=images/c800-g3n-mw
    Boot# save c800-g3n-nw
     
    

Step 12 Configure the router to use the new image. For example:

    Boot# set boot-action=flash
    Boot# set file-name=c800-g3n-mw
    Boot# save c800-g3n-nw
     
    

Step 13 Enter the following command to boot the router:

    Boot# boot
    

Installing the Router Software Using Cisco IOS Software

Use this TFTP server application method as an alternative to using the RSL to install the router software from the CD-ROM. You can perform this procedure using a PC (running Microsoft Windows 95 or Microsoft Windows 3.1), a Macintosh, or a UNIX system. You can also use this procedure to install the router software across a WAN link.

Step 1 Connect to the router as described in the "Installing the Router Software Using TinyROM" section, Step 2 through Step 6.

Step 2 Enter enable mode:

    Router> enable
     
    

Step 3 Get a listing of all files stored in Flash memory:

    Router# dir flash:
     
    

Step 4 Upload the new image. The Cisco 800 series router requires that the destination filename be different than the running image name. For example:

    Router# copy tftp flash
    Address or name of remote host []? 10.0.0.1
    Source filename []? /tftpboot/images/c800-g3n-mw
    Destination filename [c800-g3n-mw]? c800-g3n-mw.new
     
    

Step 5 Configure the router to use the new image:

    Router# configure terminal
    Router(config)# boot system flash c800-g3n-mw.new
    Router(config)# exit
     
    

Step 6 Save the new system image name to Flash memory:

    Router# write
     
    

Step 7 Run the new image:

    Router# reload
    Proceed with reload? yes
     
    

Step 8 After booting, if the old image is no longer required, you can use the following commands to delete the file from Flash memory:

    Router# delete c800-g3n-mw
    Delete filename [c800-g3n-mw]? yes
    Delete flash:c800-g3n-mw? yes
     
    

Step 9 Enter the following commands to recover the Flash memory space that the old image occupied:

    Router# squeeze flash
    All deleted files will be removed. Continue? yes
    Squeeze operation may take a while. Continue? yes
    

Caveats

This section describes possibly unexpected behavior by Cisco IOS Releases 12.0(1)XB and 12.0(1)XB1. This section describes only severity 1 and 2 caveats.

You can work around this vulnerability by preventing any affected Cisco IOS device from receiving or processing UDP datagrams addressed to its port 514. This can be done either using packet filtering on surrounding devices, or by using input access list filtering on the affected IOS device itself.
If you use an input access list, that list should be applied to all interfaces to which attackers may be able to send datagrams. This includes not only physical LAN and WAN interfaces, but virtual subinterfaces of those physical interfaces, as well as virtual interfaces and/or interface templates corresponding to GRE, L2TP, L2F, and other tunnelling protocols.
The input access list must block traffic destined for any of the Cisco IOS device's own IP addresses, as well as for any broadcast or multicast addresses on which the Cisco IOS device may be listening. It's important to remember to block old-style "all-zeroes" broadcasts as well as new-style "all-ones" broadcasts.
There is no single input access list that will work in all configurations. It is very important that you understand the effect of your access list in your specific configuration before you activate
the list.
The following example shows a possible access list for a three-interface router, along with the configuration commands needed to apply that access list. The example assumes no need for input filtering other than as a workaround for this vulnerability.
      ! Deny all multicasts, and all unspecified-net broadcasts, to port 514
      access-list 101 deny udp any 224.0.0.0 31.255.255.255 eq 514
      ! Deny old-style unspecified-net broadcasts
      access-list 101 deny udp any host 0.0.0.0 eq 514
      ! Deny network-specific broadcasts. This example assumes that all of
      ! the local interfaces are on the class B network 172.16.0.0, subnetted
      ! everywhere with mask 255.255.255.0. This will differ from network
      ! to network. Note that we block both new-style and old-style broadcasts.
      access-list 101 deny udp any 172.16.0.255 0.0.255.0 eq 514
      access-list 101 deny udp any 172.16.0.0   0.0.255.0 eq 514
      ! Deny packets sent to the addresses of our own network interfaces.
      access-list 101 deny udp any host 172.16.1.1 eq 514
      access-list 101 deny udp any host 172.16.2.1 eq 514
      access-list 101 deny udp any host 172.16.3.3 eq 514
      ! Permit all other traffic (default would be to deny)
      access-list 101 permit ip any any
 
      ! Apply the access list to the input side of each interface
      interface ethernet 0
      ip address 172.16.1.1 255.255.255.0
      ip access-group 101 in
 
      interface ethernet 2
      ip address 172.16.2.1 255.255.255.0
      ip access-group 101 in
 
      interface ethernet 3
      ip address 172.16.3.3 255.255.255.0
      ip access-group 101 in
 
It can be complicated to list all possible addresses, and especially all possible broadcast addresses, to which attack packets might be sent. If you do not expect to receive any legitimate syslog traffic on an interface, you may wish to simply block all syslog traffic arriving on that interface. Remember that this will affect traffic routed through the Cisco IOS device as well as traffic destined to the device.
Input access lists have an impact on system performance, and should be installed with a degree of caution, especially on systems that are running very near their capacity limits. [CSCdk77426]

Related Documentation

This section describes the documentation related to the Cisco 800 series, typically including hardware installation guides, software installation guides, Cisco IOS configuration and command references, system error messages, and feature modules that are updates to the Cisco IOS documentation set. Documentation is available as printed manuals or electronic documents, except for the feature modules that are available online only.

The most up-to-date documentation can be found on the Web via Cisco Connection Online (CCO) and on the latest Documentation CD-ROM. These electronic documents might contain updates and modifications made after the paper documents were printed. For information on CCO, refer to the "Cisco Connection Online" section later in this document. For more information on to the CD-ROM, refer to the "Documentation CD-ROM" section later in this document.

This section contains the following subsections:

Release-Specific Documents

The following documents are specific to Release12.0 T. They are located on CCO and the Documentation CD-ROM:

To access the cross-platform Release Notes for Cisco IOS Release 12.0 T on CCO, follow this path:
Software and Support: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Release Notes: Cross-Platform Release Notes for Cisco IOS
Release 12.0 T

To access the cross-platform Release Notes for Cisco IOS Release 12.0 T on the Documentation CD-ROM, follow this path:
Cisco IOS Software Configuration: Cisco IOS Release 12.0: Release Notes: Cross-Platform Release Notes for Cisco IOS Release 12.0 T
To access these documents, refer to the Software Center at this path on CCO:
Software & Support: Software Center: Cisco IOS Software
As a supplement to the caveats listed in the "Caveats" section in these release notes, see the Caveats for Cisco IOS Release 12.0 T document, which contains caveats that are applicable to Release 12.0 XB.
To access the caveat document on CCO, follow this path:
Products and Ordering: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Caveats: Caveats for Cisco IOS Release 12.0 T
To access the caveat document on the Documentation CD-ROM, follow this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS 12.0: Caveats: Caveats for Cisco IOS Release 12.0 T

Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. Bug Navigator II can be found at http://www.cisco.com/support/bugtools, or from CCO, select Software & Support: Tools: Bug Toolkit II.

Platform-Specific Documentation

The following list contains the documents specific to the Cisco 800 series routers. These documents are available on CCO and the Documentation CD-ROM.

To access these documents on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco Product Documentation/Access Servers and Access Routers: Modular Access Routers: Cisco 800

To access these documents on the Documentation CD-ROM, follow this path:

Cisco Product Documentation: Cisco Product Documentation: Access Servers and Access Routers: Modular Access Routers: Cisco 800

Feature Modules

Feature modules describe new features introduced in 12.0 T releases, which might apply to Release  12.0 XB and are updates to the Cisco  IOS documentation set. As updates, the features modules are available online only. The feature  module information will be added to the Cisco IOS documentation set before the next printing. Feature modules have a brief overview of the feature, benefits, configuration tasks, and a command reference.

To access the 12.0 T feature modules on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Cisco IOS 12.0T New Features.

To access the feature modules on the documentation CD-ROM, follow this path:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Cisco IOS 12.0T New Features.

Cisco IOS Software Documents

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. These documents are shipped with your order in electronic form on the Documentation CD-ROM, unless you specifically ordered the printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Each configuration guide can be used in conjunction with its corresponding command reference.

To access these documents on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Cisco IOS Release 12.0 Configuration Guides and Command References

To access these documents on the Documentation CD-ROM, follow this path:

Cisco IOS Software Configuration: Cisco IOS Release 12.0: Cisco IOS Release 12.0 Configuration Guides and Command References

Release 12.0 Documentation Set

Table 6 details the contents of the Cisco IOS Release 12.0 software documentation set. The document set is available in electronic form, and also in printed form upon request.


Note The most current Cisco IOS documentation can be found on the latest Documentation CD-ROM and on the Web. These electronic documents might contain updates and modifications made after the paper documents were printed.

To access the Cisco IOS documentation set on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0

To access the Cisco IOS documentation set on the Documentation CD-ROM, follow this path:

Cisco IOS Software Configuration: Cisco IOS Release 12.0


Table 6: Cisco IOS Documentation Set for Release 12.0
Books Chapter Topics

  • Configuration Fundamentals Configuration Guide

  • Configuration Fundamentals Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
File Management
System Management

  • Bridging and IBM Networking Configuration Guide

  • Bridging and IBM Networking Command Reference

Transparent Bridging
Source-Route Bridging
Token Ring Inter-Switch Link
Remote Source-Route Bridging
DLSw+
STUN and BSTUN
LLC2 and SDLC
IBM Network Media Translation
DSPU and SNA Service Point
SNA Frame Relay Access Support
APPN
Cisco Database Connection
NCIA Client/Server Topologies
Cisco Mainframe Channel Connection
Airline Product Set

  • Dial Solutions Configuration Guide

  • Dial Solutions Command Reference

Dial-In Port Setup
Dial-In Terminal Services
Dial-on-Demand Routing (DDR)
Dial Backup
Dial-Out Modem Pooling
Large-Scale Dial Solutions
Cost-Control Solutions
ISDN
X.25 over ISDN
VPDN
Dial Business Solutions and Examples

  • Cisco IOS Interface Configuration Guide

  • Cisco IOS Interface Command Reference

Interface Configuration Overview

  • Network Protocols Configuration Guide, Part 1

  • Network Protocols Command Reference, Part 1

IP Addressing
IP Services
IP Routing Protocols

  • Network Protocols Configuration Guide, Part 2

  • Network Protocols Command Reference, Part 2

AppleTalk
Novell IPX

  • Network Protocols Configuration Guide, Part 3

  • Network Protocols Command Reference, Part 3

Apollo Domain
Banyan VINES
DECnet
ISO CLNS
XNS

  • Security Configuration Guide

  • Security Command Reference

AAA Security Services
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Passwords and Privileges
Neighbor Router Authentication
IP Security Options

  • Cisco IOS Switching Services Configuration Guide

  • Cisco IOS Switching Services Command Reference

Switching Paths for IP Networks
Virtual LAN (VLAN) Switching and Routing

  • Wide-Area Networking Configuration Guide

  • Wide-Area Networking Command Reference

ATM
Frame Relay
SMDS
X.25 and LAPB

  • Voice, Video, and Home Applications Configuration Guide

  • Voice, Video, and Home Applications Command Reference

Voice over IP
Voice over Frame Relay
Voice over ATM
Voice over HDLC
Video Support
Universal Broadband Features

  • Quality of Service Solutions Configuration Guide1

  • Quality of Service Solutions Command Reference1

Classification
Scheduling
Packet Drop
Traffic Shaping
ATM QoS
SNA QoS
Line Protocols

  • Cisco IOS Software Command Summary

  • Dial Solutions Quick Configuration Guide

  • System Error Messages

  • Debug Command Reference

1This book will not be available until January 1999.


Note The Cisco Management Information Base (MIB) User Quick Reference publication is no longer being published. For the latest list of MIBs supported by Cisco, see the Cisco Network Management Toolkit on Cisco Connection Online. On CCO, go to Software and Support, select Software Center, and click Network Management Products. Next, select Cisco Network Management Toolkit, and click Cisco MIBs.

Service and Support

For service and support for a product purchased from a reseller, contact the reseller. Resellers offer a wide variety of Cisco service and support programs, which are described in the section "Service and Support" in the information packet that shipped with your product.


Note If you purchased your product from a reseller, you can access CCO as a guest. CCO is Cisco Systems' primary real-time support channel. Your reseller offers programs that include direct access to CCO services.

For service and support for a product purchased directly from Cisco, use CCO.

Software Configuration Tips on the Cisco TAC Home Page

The following URL contains links to access helpful tips on configuring your Cisco products:

http://www.cisco.com/kobayashi/serv_tips.shtml

This URL is subject to change without notice. If it changes, point your web browser to http://www.cisco.com/, and follow this path: Software & Support, Technical Tips (button on left margin).

"Hot Tips" are popular tips and hints gathered from the Cisco Technical Assistance Center (TAC). Most of these documents are available from the TAC FAX-on-demand service. To access FAX-on-demand and receive documents at your FAX machine from the USA, call 888-50-CISCO (888-502-4726). From other areas, call 415-596-4408.

The following sections are provided from the Technical Tips page:

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800  553-2447, 408  526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800  553-6387, 408  526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp

Copyright 1989-1999©Cisco Systems Inc.