|
Note You can find the most current Cisco IOS documentation on Cisco.com. These electronic documents may contain updates and modifications made after the hardcopy documents were printed. |
These release notes for the Cisco 800 series routers describe the enhancements provided in Cisco IOS Release 12.1 T. These release notes are updated as needed.
For a list of the software caveats that apply to Cisco IOS Release 12.1 T, see Caveats for Cisco IOS Release 12.1 T that accompanies these release notes. The caveats document is updated for every maintenance release and is located on Cisco.com and the Documentation CD-ROM.
Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.1 on Cisco.com and the Documentation CD-ROM.
These release notes describe the following topics:
These release notes describe the Cisco 800 series routers for Cisco IOS Release 12.1 T, which is an early deployment (ED) release based on Cisco IOS Release 12.1. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features.
The following list shows the recent early deployment releases of the Cisco 801-804 routers:
The following list shows the recent early deployment releases of the Cisco 805 router:
The following list shows the recent early deployment releases of the Cisco 811 and Cisco 813 routers:
For more information, see the "Platform-Specific Documents" section about accessing related release note documents.
This section describes the system requirements for Cisco IOS Release 12.1 T:
Platforms | Image Name | Software Image | Recommended Flash Memory | Recommended DRAM Memory | Runs From |
---|---|---|---|---|---|
12 MB1 |
|||||
18 MB in Cisco IOS Releases 12.1(1)T and 12.1(2)T.
2These platforms were introduced in Cisco IOS Release 12.1(2)XF. |
Cisco IOS Release 12.1 T supports the Cisco 800 series routers:
For detailed descriptions of the new hardware features, see the "New and Changed Information" section.
The Cisco 801-804 routers provide the following key hardware features:
Note To add additional Flash memory to the Cisco 801-804, you must remove the existing Flash memory card and install the new one. |
The Cisco 805 router connects small professional offices over serial lines to corporate networks and to the Internet, and provides the following key features:
The Cisco 811 and 813 routers provide the following key hardware features:
To determine the version of Cisco IOS software running on your Cisco 800 series router, log in to the router and enter the show version EXEC command:
For general information about upgrading to a new software release, see Cisco IOS Upgrade Ordering Instructions located at:
http://www.cisco.com /warp/public/cc/cisco /mkt/ios/prodlit /957_pp.htm
The Cisco IOS software is packaged in feature sets consisting of software imagesdepending on the platform. Each feature set contains a specific set of Cisco IOS features.
Cisco IOS Release 12.1 T supports the same feature sets as Cisco IOS Release 12.1, but Release 12.1 T can include new features supported by the Cisco 800 series routers.
Caution Cisco IOS images with strong encryption (including, but not limited to 168-bit (3DES) data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com. |
Cisco 801-804 router features and feature sets are shown in Table 3 and Table 4.
Cisco 805 features and feature sets are shown in Table 5.
Cisco 811 and Cisco 813 features and feature sets are shown in Table 6.
The tables use the following conventions:
Note These feature set tables contain only a selected list of features. They are not cumulative or complete in listing all the features in each image. Check the online version of this document on Cisco.com for updates to these tables: http://www.cisco.com/univercd /cc/td/doc/product/software/ios 121/121relnt/800/rn800 t.h tm |
1Advanced Telephone Features are available on the Cisco 803 and 804 routers only. These features require supplementary services from a telephone company.
2The X.25 configuration feature requires the use of the Cisco command line interface (CLI). |
Feature | IP | IP Plus | IP/IPX Plus | IP/FW | IP/FW Plus | IP/FW/Plus/ IPSec |
IP/FW/Plus/ IPSec Plus |
---|---|---|---|---|---|---|---|
1The X.25 configuration feature requires the use of the Cisco command line interface (CLI). |
The following sections list the new hardware and software features supported by the Cisco 800 series routers for Release 12.1 T.
The following new hardware feature is supported by the Cisco 800 series routers for Release 12.1(5)T:
Cisco 811 and 813 routers provide network connectivity for small offices and corporate telecommuters. The Cisco 811 and 813 routers additionally supply value-added services, such as virtual private networks (VPNs), managed network services, point of sale (POS) applications, and secure Internet access. Both routers were first introduced in the special Release 12.1(2)XF.
The following new software features are supported by the Cisco 800 series routers for Release 12.1(5)T:
The AutoInstall Using DHCP for LAN Interfaces feature replaces the use of the Bootstrap Protocol (BOOTP) with the use of the Dynamic Host Configuration Protocol (DHCP) for Cisco IOS AutoInstall over LAN interfaces. AutoInstall is a Cisco IOS software feature which provides for the configuration of a new routing device automatically when the device is initialized. DHCP (defined in RFC 2131) is based on the Bootstrap Protocol, which provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds the capability of automatic allocation of reusable network addresses and additional configuration options. In Cisco IOS Release 12.1(5)T, the IP address procurement phase of the AutoInstall process is now accomplished using DHCP for Ethernet, Token Ring, and FDDI interfaces. Prior to this release, IP addresses for LAN interfaces were obtained using BOOTP during the AutoInstall process. The AutoInstall Using DHCP for LAN Interfaces feature also allows the routing device to recognize IP address allocation messages coming from regular BOOTP servers, providing a seamless transition for those devices already using BOOTP servers for AutoInstall. Additionally, this feature allows for the uploading of configuration files using unicast TFTP. For further details, please see the following document:
http://www.cisco.com/ univercd/cc/td/doc/product /software/ios121 /121newft/121t/ 121t5/dt_dhcpa.htm
A closed user group (CUG) selection facility is a specific encoding element that allows a destination data terminal equipment (DTE) to identify the CUG to which the source and destination DTEs belong. The Closed User Group Selection Facility Suppress Option feature enables a user to configure an X.25 data communications equipment (DCE) interface or X.25 profile with a DCE station type to remove the CUG selection facility from incoming call packets destined for the preferential CUG only or for all CUGs. You can also remove the selection facility from a CUG with outgoing access (CUG/OA).
This feature extends the functionality of WRED (Weighted Random Early Detection) to enable support for Differentiated Services (DiffServ) and Assured Forwarding (AF) Per Hop Behavior (PHB). This feature enables WRED to be compliant with the DiffServ standard and the AF PHB standard being developed by the Internet Engineering Task Force (IETF). This feature enables customers to implement AF PHB by coloring packets according to DSCP values and then assigning preferential drop probabilities to those packets.This feature adds two new commands, random-detect dscp and dscp. It also adds two new arguments, dscp-based and prec-based, to two existing WRED-related commandsthe random-detect (interface) command and the random-detect-group command.
The Enhanced Voice Services Cisco IOS features consist of the following voice capabilities for the Cisco 800 series routers:
Allows Cisco 800 series routers to reject an incoming voice call, based on local directory number (LDN) Caller IDs. Using the command-line interface (CLI), you can configure blocking for up to ten Caller ID numbers for each LDN.
Notifies you with a call-waiting tone of an incoming call while you are already connected to a telephone call. You can put the first call on hold by pressing the on-and-off-hook button (flash), connect to the second call, and then return to the first call after finishing with the second.
The feature uses both B channels of the ISDN line, enabling local call-waiting support on the router. Unlike standard ISDN call waiting, local call waiting does not require a subscription to call waiting from a service provider.
The Enhanced Voice Services Cisco IOS features consist of the following voice capabilities for the Cisco 813 series routers only:
Provides analog Caller ID support for Japanese-language display, Caller ID- equipped, analog telephones. The Cisco 800 series router receives the Caller ID information from the INS-NET-64 switch. The router software prepares the Caller ID with a tone, transmits the Caller ID to plain old telephone service (POTS) port 1 or 2 on the router, and displays the Caller ID on the telephone.
Conceals the caller ID of the outgoing call from the receiving device. To activate the feature, dial 184 before dialing the number of the receiving device, as specified in the Nippon Telegraph and Telephone (NTT) Communications Corporation user manual. This feature is specific to NTT Communications Corporation switches and is offered free of charge. The router handles this feature as a regular outgoing call and requires no special operation.
On the INS-NET-64 switch, this feature forwards all incoming calls for a terminal device to another device. Voice-warp registration, activation, and deactivation requests are sent to the switch for each LDN. The routers support the registration, activation, and deactivation requests for devices attached to (POTS) port 1 or 2. The forwarding function itself is performed by the INS-NET-64 switch. This feature can be deactivated after its registration and activation phases.
During the registration phase of the device, you can:
This feature is a superset of the Voice Warp feature. You create a list of incoming caller IDs for the Voice Select Warp feature. This list of caller IDs could be used in two different ways. First, an incoming call which bears the caller ID in this list will be redirected. Second, an incoming call which does not bear the caller ID in this list will be redirected. You can also choose to ignore this list all together. If so, this is effectively the same as the Voice Warp feature for all incoming calls. All other characteristics and limitations remain the same as the Voice Warp feature.
For all the operations described above, users can use the keypad dialing sequence as specified in the NTT user manual.
The Nariwake feature requires the user to be subscribed to the NTT service.
This feature allows the user to register multiple Caller ID numbers with the ISDN (NTT INS-NET-64) switch based on router's local directory numbers. When calls are presented to the NTT switch with a Caller ID identified on the list of registered numbers, the NTT switch will notify the router that it should provide a distinctive ring to its telephone port to which the local directory number just called will be routed.
Three different ring cadences are available so the user may choose two of them for each of the following two cases: when calls from registered callers are received and when calls from unregistered callers are received. The default ring cadence setting for unregistered callers is ring 0 where for registered callers is ring 1. The on/off period of ring 0 (normal ringing signals) and ring 1 (ringing signals for Nariwake service) are defined in the NTT user's manual.
The number of Caller IDs which can be registered at a time is up to a limit defined by the NTT switch. The list of Caller ID numbers shall be entered/removed through the keypad.
This feature requires the user to be subscribed to the NTT service, troublesome call refusing as described in in the NTT user's manual. This feature is also described as nuisance telephone call refusal service by INS Net.
Trouble call blocking causes all incoming calls to a particular number of User A from the troublesome caller's (User B) number to be rejected by the network. This is done without User A having to specify User B's actual phone number. After User A has activated the feature, future calls to User A made by User B will result in the caller hearing an announcement. User A will not be notified of User B's attempts of incoming calls.
Multiple numbers can be blocked at a time up to a limit as defined when the service is provisioned. If the user requests an additional number to be blocked beyond the limit, the oldest number is discarded (unblocked) first, and the new telephone number will be registered.
This feature, I Number, allows several terminal devices to be used with one subscriber line. In addition to the subscriber's number, numbers for each port of the router are given by the service provider. When any of the assigned number is dialed, the call will come through the same subscriber's line, and only the corresponding terminal device(s) attached to that port will ring.
Microsoft NetMeeting is a Windows-based application that enables multi-user interaction and collaboration from a user's PC over the Internet or an intranet. Support for the NetMeeting Directory (ILS) allows connections by name from the directory built into the NetMeeting application. Destination IP addresses do not need to be known in order for a connection to be made.
The Parser Cache feature optimizes the parsing (translation) of Cisco IOS software configuration command lines by remembering how to parse recently encountered command lines. This feature was developed to improve the the scalability of the Cisco IOS software command-line interface (CLI) parser when processing large configuration files. This improvement is especially useful for those cases in which thousands of virtual circuits must be configured for interfaces, or hundreds of access lists (ACLs) are required. The parser chain cache can rapidly recognize and translate configuation lines which differ slightly from previously used configuration lines (for example, pvc 0/100, pvc 0/101, and so on). Testing indicates an improvement to load time of between 30% and 36% for large configuration files when using the parser cache.
The parser cache is enabled by default on all platforms using Cisco IOS 12.1(5)T or later. A new command, [no] parser cache, allows the disabling or re-enabling of this feature.
There are no new software features supported by the Cisco 800 series routers for Release 12.1(3)T.
The following new software features are supported by the Cisco 800 series routers for Release 12.1(2)T:
The CAPI is an application programming interface standard used to access ISDN equipment connected to Basic Rate Interfaces (BRIs) and Primary Rate Interfaces (PRIs). RCAPI is the CAPI feature configured remotely from a PC client.
The framing protocols supported by CAPI include High-Level Data Link Control (HDLC), HDLC inverted, bit transparent (speech), and V.110 synchronous/asynchronous.
CAPI integrates the following data link and network layer protocols:
CAPI supports the following features:
There are no new software features supported by the Cisco 800 series in Cisco IOS Release 12.1(1)T.
Old Cisco Management Information Bases (MIBs) will be replaced in a future release. Currently, OLD-CISCO-* MIBs are being converted into more scalable MIBswithout affecting existing Cisco IOS products or NMS applications. You can update from deprecated MIBs to the replacement MIBs as shown in Table 7.
Note Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with Cisco.com, you can find the current list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, go to Cisco.com, press Login, and click Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB. |
The following sections contain important notes about Cisco IOS Release 12.1 T that can apply to the Cisco 800 series routers.
The last maintenance release of the 12.1 T release train is 12.1(5)T. The migration path for customers who need bug fixes for the 12.1 T features is the 12.2 mainline release. The 12.2 mainline release has the complete feature content of 12.1 T and will eventually reach general deployment (GD).
The last maintenance release was renamed from 12.1(4)T to 12.1(5)T to synchronize with its parent software base, the 12.1(5) mainline release, and to reflect that 12.1(5)T has all the bug fixes of the 12.1(5) mainline release. The 12.1 T release train is a superset of the 12.1 mainline release; hence any defect fixed in the 12.1 mainline is also fixed in 12.1 T. The set of features for 12.1(4)T is the same as that for 12.1(5)T. There was no change in the feature content of the release. The release was renamed so that the releases would be consistent with the Cisco release process.
A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled, browsing to http://router-ip/anytext?/ is attempted, and the enable password is supplied when requested. This defect can be exploited to produce a denial of service (DoS) attack.
The vulnerability, identified as Cisco bug ID CSCdr91706, affects virtually all mainstream Cisco routers and switches running Cisco IOS software releases 12.0 through 12.1, inclusive. This is not the same defect as CSCdr36952.
The vulnerability has been corrected and Cisco is making fixed releases available for free to replace all affected IOS releases. Customers are urged to upgrade to releases that are not vulnerable to this defect as shown in detail below.
This vulnerability can only be exploited if the enable password is known or not set.
You are strongly encouraged to read the complete advisory, which is available at http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml .
When using the caller-id command, which appears under "dial-peer" in the configuration commands, the default setting is "off" for Japan and "on" for the U.S. This command was introduced in Cisco IOS Release 12.1(2)XF.
Perform the following steps to configure the router for DHCP client support:
Specifying the value client-id ethernet0 causes that the MAC address of the Ethernet interface to be used as the client ID when the DHCP request is sent. Otherwise, the MAC address of the BVI interface is used as the client ID.
Step 2 Configure NAT:
a. Configure the BVI interface by entering the nat outside command.
b. Configure the Ethernet interface by entering the nat inside command.
c. Create an access list under NAT by entering the access-list 1 permit ip address command to match all Ethernet IP addresses.
d. Configure the source list under NAT by entering the command ip nat inside source list 1 interface BVI 1 overload.
Delete files in the router Flash memory before attempting to download new images.
Caution Use the delete command, not erase, to free up space. Entering erase removes all files, including the configuration. |
Cisco 800 series routers use 4 MB of Flash memory for storing internal information such as the ROM monitor. Only the remainder of the Flash memory is available for storing Cisco IOS images and is displayed by using the command show flash. For example, if the router reports 8 MB of Flash, the actual amount of onboard Flash memory is 12 MB, even though only 8 MB are displayed and available for Cisco IOS image storage.
Multilink PPP fragments large data packets to allow small voice packets to be interleaved between them. However, apart from first-in-first-out (FIFO) queuing, no other kind of output queuing mechanisms are currently supported with PPP over ATM. Consequently, when multilink PPP is configured on the Cisco 800 series routers, large packets are fragmented, but small voice packets are not interleaved between them.
NAT does not support alerting H.225 messages; therefore, NAT communication cannot be established between router end points. NAT support for H.323 signaling is limited to the application Netmeeting.
PPP over AAL5SNAP encapsulation is currently not supported, although the context-sensitive help mentions that it can be configured.
Cisco IOS Release 12.1(1)T did not release Cisco 800 series images (c800-*-mw, c805-*-mw). Release 12.1(2)T is the first 12.1 T release that supports the Cisco 800 series images.
To run IPSec successfully, the Cisco 800 series router clock needs to be set accurately. Cisco 800 series router clocks are set and maintained using Simple Network Time Protocol (SNTP). For best results, set up a Network Time Protocol (NTP) server to periodically send time information messages to Cisco 800 series routers. See the SNTP configuration and command reference documentation for configuration instructions. If you do not have an NTP server, you must reset the Cisco 800 series router clock using the clock set command each time you restart the router.
The SNTP configuration documentation is available in the chapter "Monitoring the Router and Network" in the "System Management" volume of the Configuration Fundamentals Configuration Guide in the Cisco IOS documentation set.
The SNTP command reference documentation is available in the chapter "Router and Network Monitoring Commands" in the "System Management Commands" volume of the Configuration Fundamentals Command Reference manual in the Cisco IOS documentation set.
The isdn answer1 and isdn answer2 commands determine which called telephone number (for example, 555-1111 and 555-2222) a Cisco 800 series router can answer. Using these commands limits a router to using the two dial peers that contain the telephone numbers 555-1111 and 555-2222. (When not using these commands, a router can use up to six dial peers.)
A sample scenario in which the isdn answer1 and isdn answer2 commands are used is when a Cisco 801 or Cisco 803 router is connected with other ISDN devices to an ISDN S-bus.
The following protocols send updates that can cause an ISDN line to be activated excessively thereby increasing your monthly ISDN line cost:
For information on preventing this situation, refer to the Cisco 800 Series Routers Software Configuration Guide. This guide contains information on setting up extended access lists to prevent IP, UDP, IPX, and SNTP updates from activating the ISDN line. For CDP, make certain that you enter the no cdp enable command to disable CDP.
If an illegal console configuration is issued to the router, the console will then fail the POST test during boot and cause the router to hang. There is no way to recover a unit in this state except for pulling the soldered boot flash and re-burning the boot ROM.
This problem has been resolved in TinyROM version 1.0(3), a downloadable ROM upgrade available from Cisco.com. Please contact Cisco to upgrade to this version or later, and prevent this problem from occurring.
A Phone Mate answering machine model 9200 failed to recognize the ringing signal sent by AMD R79 ringing SLIC. This was confirmed by testing against Phone Mate model 3750 and newer model 9300.
When a call comes in, a B channel is activated. If the amount of traffic on the B channel exceeds a threshold, the other B channel is activated. If the amount of traffic falls below the threshold, one of the B channels is deactivated. The B channel that is initially activated when the call comes in is not necessarily B1 nor is the B channel that is deactivated when the traffic level lessens necessarily B2.
Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious. Severity 3 caveats are moderate caveats, and only select severity 3 caveats are included in the caveats document.
For information on caveats in Cisco IOS Release 12.1 T, see Caveats for Cisco IOS Release 12.1 T.
All caveats in Cisco IOS Release 12.1 are also in Cisco IOS Release 12.1 T.
For information on caveats in Cisco IOS Release 12.1, see Caveats for Cisco IOS Release 12.1, which lists severity 1 and 2 caveats and is located on Cisco.com and the Documentation CD-ROM.
This section describes possibly unexpected behavior by Release 12.1(2)T, specific to the Cisco 800 series routers. Only severity 1 and 2 caveats are included.
If a Cisco 804 router is running the Cisco IOS Release 12.0(4)T1 IP image and using an electrical phone plugged into a plain old telephone service (POTS) port with the ISDN line provisioned with US Caller ID, the router might have intermittent ringing problems.
This caveat has been resolved in Cisco IOS Release 12.1(3)T.
A defect in Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack.
The vulnerability, identified as Cisco bug ID CSCdr36952, affects virtually all mainstream Cisco routers and switches running Cisco IOS Releases 11.1 through 12.1, inclusive. The vulnerability has been corrected, and Cisco is making fixed releases available to replace all affected IOS releases. Customers are urged to upgrade to releases that are not vulnerable to this defect as shown in detail below.
The vulnerability can be mitigated by disabling the IOS HTTP server, using an access-list on an interface in the path to the router to prevent unauthorized network connections to the HTTP server, or applying an access-class option directly to the HTTP server itself. The IOS HTTP server is enabled by default only on Cisco 1003, 1004, and 1005 routers that are not configured. In all other cases, the IOS http server must be explicitly enabled in order to exploit this defect.
The complete advisory, including software fixes and workarounds, is available at:
http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml
The following sections describe the documentation available for the Cisco 800 series routers. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and the Documentation CD-ROM.
Use these release notes with these documents:
The following documents are specific to Cisco IOS Release 12.1 and are located on Cisco.com and the Documentation CD-ROM:
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
See Caveats for Cisco IOS Release 12.1 and Caveats for Cisco IOS Release 12.1 T, which contain caveats applicable to all platforms for all maintenance releases of Cisco IOS Release 12.1 and Release 12.1 T.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Caveats
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Caveats
These individual and groups of documents are available for the Cisco 801-804 routers on Cisco.com and the Documentation CD-ROM:
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 801-804 Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 801-804 Routers
These individual and groups of documents are available for the Cisco 805 routers on Cisco.com and the Documentation CD-ROM:
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 805 Router
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 805 Router
These documents are available for the Cisco 811 and 813 Routers on Cisco.com and the Documentation CD-ROM:
Technical Documents: Documentation Home Page: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 811 and Cisco 813 Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Configuration Access Routers: Cisco 811 and Cisco 813 Routers
Feature modules describe new features supported by Cisco IOS Release 12.1 T and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are shipped with your order in electronic form on the Documentation CD-ROMunless you specifically ordered the printed versions.
Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
On Cisco.com and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References
Table 8 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in electronic form and in printed form ordered.
Note You can find the most current Cisco IOS documentation on Cisco.com and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed. |
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1
Note Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with Cisco.com, you can find the current list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, go to Cisco.com, press Login, and click to Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB. |
You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Registered Cisco.com users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.
Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Cisco provides Cisco.com as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.
Cisco continues to revolutionize how business is done on the Internet. Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through Cisco.com, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
You can access Cisco.com in the following ways:
You can e-mail questions about using Cisco.com to cco-team@cisco.com.
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
To contact by e-mail, use one of the following:
Language | E-mail Address |
---|---|
In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
If you have a Cisco.com log-in account, you can access the following URL, which contains links and tips on configuring your Cisco products:
http://www.cisco.com /public/technotes/ tech_sw.html
This URL is subject to change without notice. If it changes, point your Web browser to Cisco.com, press Login, and click on this path: Technical Assistance Center: Technical Tips.
The following sections are provided from the Technical Tips page:
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate and value your comments.
Posted: Thu Jan 16 13:05:07 PST 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.