Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cisco IOS
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Family of network operating systems by Cisco}} {{About|the Cisco Systems router/switch operating system|the submarine cable system|CIOS (cable system)|the mobile OS from Apple using the licensed trademark of Cisco Systems|iOS{{!}}Apple iOS|the Wii operating system|IOS (Wii Firmware)}} {{more footnotes|date=February 2015}} {{Infobox OS | name = Cisco IOS | logo = | screenshot = | caption = | developer = [[Cisco Systems]] | source_model = [[Closed source]] | kernel_type = | supported_platforms = Cisco [[router (computing)|router]]s and [[Cisco Catalyst|switches]] | ui = [[Command-line interface]] | family = | released = | latest_release_version = 15.9(3)M11<ref>{{Cite web |url= https://www.cisco.com/c/en/us/support/ios-nx-os-software/index.html |title= Networking Software (IOS & NX-OS) |access-date= November 1, 2022 |archive-date= October 26, 2022 |archive-url= https://web.archive.org/web/20221026020802/https://www.cisco.com/c/en/us/support/ios-nx-os-software/index.html |url-status= live }}</ref> | latest_release_date = {{Start date and age|2025|3|}} | programmed_in = | prog_language = | language = [[English language|English]] | updatemodel = | package_manager = | working_state = Current | license = | website = {{URL|cisco.com/c/en/us/products/ios-nx-os-software/ios-software-releases-listing.html| Cisco IOS}} | succeeded by = [[Cisco IOS XE]] }} The '''Internetworking Operating System'''<ref>{{cite web|title=Cisco Internetworking Operating Systems (IOS)|url=https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/13327-ios-early.html?dtid=osscdc000283|access-date=25 October 2022|publisher=Cisco|archive-date=25 October 2022|archive-url=https://web.archive.org/web/20221025104146/https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/13327-ios-early.html?dtid=osscdc000283|url-status=live}}</ref> ('''IOS''') is a family of proprietary [[network operating system]]s used on several [[Router (computing)|router]] and [[network switch]] models manufactured by [[Cisco|Cisco Systems]]. The system is a package of routing, switching, internetworking, and telecommunications functions integrated into a [[computer multitasking|multitasking]] operating system. Although the IOS code base includes a [[cooperative multitasking]] kernel, most IOS features have been ported to other kernels, such as [[Linux]] and [[QNX]], for use in Cisco products. Not all Cisco networking products run IOS. Exceptions include some [[Cisco Catalyst]] switches, which run [[Cisco IOS XE|IOS XE]], and [[Cisco ASR]] routers, which run either IOS XE or [[Cisco IOS XR|IOS XR]]; both are Linux-based operating systems. For data center environments, [[Cisco Nexus switches|Cisco Nexus]] switches ([[Ethernet]]) and [[Cisco MDS]] switches ([[Fibre Channel]]) both run [[Cisco NX-OS]], also a Linux-based operating system. == History == The IOS network operating system was created from code written by [[William Yeager]] at [[Stanford University]],<ref>{{Cite web |title=Inside the Engineering Quad {{!}} Stanford University School of Engineering |url=https://engineering.stanford.edu/about/visit/inside-engineering-quad |access-date=2022-05-17 |website=Stanford University |language=en |quote=In 1984, alumnus Leonard Bosack and his, wife Sandy Lerner, left computer operations staff jobs at Stanford to found an Internet router company called Cisco, which has become the dominant company in the industry. They adapted the multi-protocol router software developed some years earlier at Stanford by William Yeager. |archive-date=2022-05-14 |archive-url=https://web.archive.org/web/20220514212957/https://engineering.stanford.edu/about/visit/inside-engineering-quad |url-status=live }}</ref><ref>{{Cite web |last=Connor |first=Deni |date=2007-07-03 |title=The top network inventors of all time |url=https://www.computerworld.com/article/2542298/the-top-network-inventors-of-all-time.html |access-date=2022-05-17 |website=Computerworld |language=en |archive-date=2022-10-18 |archive-url=https://web.archive.org/web/20221018151830/https://www.computerworld.com/article/2542298/the-top-network-inventors-of-all-time.html |url-status=live }}</ref><ref>{{Cite web |last=Dix |first=John |date=2006-03-27 |title=Router man |url=https://www.networkworld.com/article/2309917/lan-wan-router-man.html |access-date=2022-05-17 |website=Network World |language=en |archive-date=2019-03-01 |archive-url=https://web.archive.org/web/20190301151738/https://www.networkworld.com/article/2309917/lan-wan-router-man.html |url-status=live }}</ref> which was developed in the 1980s for routers with 256 kB of memory and low [[CPU]] processing power. Through modular extensions, IOS has been adapted to increasing hardware capabilities and new networking protocols.<ref name="auto">{{cite book |title=IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Understanding and Implementing IP Routing Protocols |author1=Brad Edgeworth |author2=Aaron Foss |author3=Ramiro Garza Rios |year=2014 |publisher=Cisco Press |isbn= 9780133846768 |page=2 }}</ref> When IOS was developed, Cisco Systems' main product line were routers. The company acquired a number of young companies that focused on network switches, such as the inventor of the first Ethernet switch [[Kalpana (company)|Kalpana]], and as a result Cisco switches did not initially run IOS. Prior to IOS, the Cisco Catalyst series ran [[Cisco Catalyst|CatOS]].<ref>{{cite book |title=Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam |author= Gary A. Donahue|year=2011 |publisher=O'Reilly Media |isbn= 9781449309350 |page=10 }}</ref> ==Command-line interface== The IOS [[command-line interface]] (CLI) provides a fixed set of multiple-word [[command (computing)|commands]]. The set available is determined by the "mode" and the privilege level of the current user. "Global configuration mode" provides commands to change the system's configuration, and "interface configuration mode" provides commands to change the configuration of a specific interface. All commands are assigned a ''privilege level'', from 0 to 15, and can only be accessed by users with the necessary privilege. Through the CLI, the commands available to each privilege level can be defined. Most builds of IOS include a [[Tcl]] interpreter. Using the [[embedded event manager]] feature, the interpreter can be scripted to react to events within the networking environment, such as interface failure or periodic timers. Available command modes include:<ref>{{cite web |title=Configuration Fundamentals Configuration Guide, Cisco IOS Release 15M&T |url=https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book/cf-cli-basics.html#GUID-A8FDCE6B-9D7D-4213-B6F0-342E394F308E |access-date=14 May 2022 |publisher=Cisco |archive-date=15 May 2022 |archive-url=https://web.archive.org/web/20220515215303/https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book/cf-cli-basics.html#GUID-A8FDCE6B-9D7D-4213-B6F0-342E394F308E |url-status=live }}</ref> * User EXEC Mode * Privileged EXEC Mode * Global Configuration Mode * ROM Monitor Mode * Setup Mode And more than 100 configuration modes and submodes. == Architecture == Cisco IOS has a [[Monolithic kernel|monolithic]] architecture, owing to the limited hardware resources of routers and switches in the 1980s. This means that all processes have direct hardware access to conserve CPU processing time. There is no memory protection between processes and IOS has a [[Run to completion scheduling|run to completion scheduler]], which means that the kernel does not pre-empt a running [[Process (computing)|process]]. Instead the process must make a kernel call before other processes get a chance to run. IOS considers each process a single [[Thread (computing)|thread]] and assigns it a priority value, so that high priority processes are executed on the CPU before queued low priority processes, but high priority processes cannot interrupt running low priority processes.<ref name="auto"/> The Cisco IOS monolithic kernel does not implement [[memory protection]] for the data of different processes. The entire physical memory is mapped into one virtual address space. The Cisco IOS kernel does not perform any memory [[paging]] or swapping. Therefore the addressable memory is limited to the physical memory of the network device on which the operating system is installed. IOS does however support aliasing of duplicated virtual memory contents to the same physical memory. This architecture was implemented by Cisco in order to ensure system performance and minimize the operational overheads of the operating system.<ref name="auto"/> The disadvantage of the IOS architecture is that it increases the complexity of the operating system, data corruption is possible as one process can write over the data of another, and one process can destabilize the entire operating system or even cause a software-forced [[Crash (computing)|crash]]. In the event of an IOS crash, the operating system automatically reboots and reloads the saved configuration.<ref name="auto"/> == Routing == In all versions of Cisco IOS, [[Routing|packet routing]] and [[packet forwarding|forwarding]] ([[Packet switching|switching]]) are distinct functions. Routing and other protocols run as Cisco IOS processes and contribute to the Routing Information Base (RIB). This is processed to generate the final IP forwarding table (FIB, Forwarding Information Base), which is used by the forwarding function of the router. On router platforms with software-only forwarding (e.g., Cisco 7200), most traffic handling, including [[access control list]] filtering and forwarding, is done at interrupt level using [[Cisco Express Forwarding]] (CEF) or dCEF (Distributed CEF). This means IOS does not have to do a process [[context switch]] to forward a packet. Routing functions such as [[Open Shortest Path First|OSPF]] or [[Border Gateway Protocol|BGP]] run at the process level. In routers with hardware-based forwarding, such as the Cisco 12000 series, IOS computes the FIB in software and loads it into the forwarding hardware (such as an [[Application-specific integrated circuit|ASIC]] or network processor), which performs the actual packet forwarding function. == Interface descriptor block == An Interface Descriptor Block, or simply IDB, is a portion of memory or Cisco IOS internal data structure that contains information such as the IP address, interface state, and packet statistics for networking data. Cisco's IOS software maintains one IDB for each hardware interface in a particular Cisco switch or router and one IDB for each subinterface. The number of IDBs present in a system varies with the Cisco hardware platform type. Physical and logical interfaces on the switch will be referenced with either expanded or abbreviated port description names. This combined with slot, module, and interface numbering creates a unique reference to that interface. {| class="wikitable sortable" |+ Interface Identifiers |- ! Expanded !! Abbreviated |- | TwoHundredGigabitEthernet || TH |- | HundredGigabitEthernet || Hu |- | FortyGigabitEthernet || Fo |- | TwentyFiveGigE || Twe |- | TenGigabitEthernet || Te |- | FiveGigabitEthernet || Fi |- | TwoGigabitEthernet || Tw |- | GigabitEthernet || Gi |- | FastEthernet || Fa |- | Port-channel || Po |- | AppGigabitEthernet || Ap |} == Packages and feature sets == IOS is shipped as a unique file that has been compiled for specific Cisco network devices. Each IOS Image therefore include a feature set, which determine the command-line interface (CLI) commands and features that are available on different Cisco devices. Upgrading to another feature set therefore entails the installation of a new IOS image on the networking device and reloading the IOS operating system. Information about the IOS version and feature-set running on a Cisco device can be obtained with the ''show version'' command.<ref name="auto"/> Most Cisco products that run IOS also have one or more "feature sets" or "packages", typically eight packages for Cisco routers and five packages for Cisco network switches. For example, Cisco IOS releases meant for use on [[Catalyst switch]]es are available as "standard" versions (providing only basic IP routing), "enhanced" versions, which provide full [[IPv4]] routing support, and "advanced IP services" versions, which provide the enhanced features as well as [[IPv6]] support.<ref name="train" /> Beginning with the 1900, 2900 and 3900 series of ISR Routers, Cisco revised the licensing model of IOS.{{citation needed|date=March 2019}} To simplify the process of enlarging the feature-set and reduce the need for network operating system reloads, Cisco introduced universal IOS images, that include all features available for a device and customers may unlock certain features by purchasing an additional [[software license]].<ref>{{cite book |title=IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Understanding and Implementing IP Routing Protocols |author1=Brad Edgeworth |author2=Aaron Foss |author3=Ramiro Garza Rios |year=2014 |publisher=Cisco Press |isbn= 9780133846768 |page=3 }}</ref> The exact feature set required for a particular function can be determined using the [http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp Cisco Feature Navigator]. Routers come with IP Base installed, and additional feature pack licenses can be installed as bolt-on additions to expand the feature set of the device. The available feature packs are: * '''Data''' adds features like BFD, IP SLAs, IPX, L2TPv3, Mobile IP, MPLS, [[SCTP]]. * '''Security''' adds features like VPN, Firewall, IP SLAs, NAC. * '''Unified Comms''' adds features like CallManager Express, Gatekeeper, H.323, IP SLAs, MGCP, SIP, VoIP, CUBE(SBC). IOS images can not be updated with [[software bug]] fixes. To patch a vulnerability in IOS, a binary file with the entire operating system needs to be loaded.<ref>{{cite book |title=IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Understanding and Implementing IP Routing Protocols |author1=Brad Edgeworth |author2=Aaron Foss |author3=Ramiro Garza Rios |year=2014 |publisher=Cisco Press |isbn= 9780133846768 |page=4 }}</ref> == Versioning == Cisco IOS is versioned using three numbers and some letters, in the general form ''a.b(c.d)e'', where: * ''a'' is the major version number. * ''b'' is the minor version number. * ''c'' is the release number, which begins at one and increments as new releases in a same way ''a.b'' train are released.{{clarify|date=April 2019}} "Train" is Cisco-speak for "a vehicle for delivering Cisco software to a specific set of platforms and features." * ''d'' (omitted from general releases) is the interim build number. * ''e'' (zero, one or two letters) is the [[software release train]] identifier, such as none (which designates the mainline, see below), ''T'' (for Technology), ''E'' (for Enterprise), ''S'' (for Service provider), ''XA'' as a special functionality train, ''XB'' as a different special functionality train, etc. '''Rebuilds''' β Often a rebuild is compiled to fix a single specific problem or vulnerability for a given IOS version. For example, 12.1(8)E14 is a Rebuild, the 14 denoting the 14th rebuild of 12.1(8)E. Rebuilds are produced to either quickly repair a defect, or to satisfy customers who do not want to upgrade to a later major revision because they may be running critical infrastructure on their devices, and hence prefer to minimize change and risk. '''Interim releases''' β Are usually produced on a weekly basis, and form a roll-up of current development effort. The Cisco advisory web site may list more than one possible interim to fix an associated issue (the reason for this is unknown to the general public). '''Maintenance releases''' β Rigorously tested releases that are made available and include enhancements and bug fixes. Cisco recommend upgrading to Maintenance releases where possible, over Interim and Rebuild releases. === Trains === Cisco says, "A train is a vehicle for delivering Cisco software to a specific set of platforms and features."<ref name="train">{{Citation |title= Cisco IOS and NX-OS Software Reference Guide |work= Cisco White Paper |url= http://www.cisco.com/web/about/security/intelligence/ios-ref.html |access-date= June 18, 2013 |archive-date= June 6, 2013 |archive-url= https://web.archive.org/web/20130606060039/http://www.cisco.com/web/about/security/intelligence/ios-ref.html |url-status= live }}</ref> ==== Until 12.4 ==== Before Cisco IOS release 15, releases were split into several ''trains'', each containing a different set of features. Trains more or less map onto distinct markets or groups of customers that Cisco targeted.<ref name="train" /> * The '''mainline''' train is intended to be the most stable release the company can offer, and its feature set never expands during its lifetime. Updates are released only to address [[Software bug|bugs]] in the product. The previous technology train becomes the source for the current mainline train β for example, the 12.1T train becomes the basis for the 12.2 mainline. Therefore, to determine the features available in a particular mainline release, look at the previous T train release.<ref name="naming">{{Citation |last= Rullan |first= John |title= Understanding Cisco IOS Naming Conventions |work= Cisco Academy Conference Presentation |year= 2005 |url= https://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2005/BRK-101.pdf |access-date= October 10, 2016 |archive-date= February 8, 2016 |archive-url= https://web.archive.org/web/20160208150227/http://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2005/BRK-101.pdf |url-status= live }}</ref>{{rp|6}} * The '''T''' β [[Technology]] train, gets new features and bug fixes throughout its life, and is therefore potentially less stable than the mainline. (In releases prior to Cisco IOS Release 12.0, the '''P''' train served as the Technology train.) Cisco doesn't recommend usage of T train in production environments unless there is urgency to implement a certain T train's new IOS feature.<ref name="naming"/>{{rp|6}} * The '''S''' β [[Service Provider]] train, runs only on the company's core router products and is heavily customized for Service Provider customers.<ref name="naming"/>{{rp|6}} * The '''E''' β Enterprise train, is customized for implementation in enterprise environments.<ref name="naming"/>{{rp|6}} * The '''B''' β [[Broadband Internet access|broadband]] train, supports internet based broadband features.<ref name="naming"/>{{rp|6}} * The '''X*''' (XA, XB, etc.) β Special Release train, contains one-off releases designed to fix a certain bug or provide a new feature. These are eventually merged with one of the above trains.<ref name="naming"/>{{rp|15}} There were other trains from time to time, designed for specific needs β for example, the 12.0AA train contained new code required for Cisco's AS5800 product. === Since 15.0 === Starting with Cisco IOS release 15, there is just a single train, the '''M/T''' train. This train includes both extended maintenance releases and standard maintenance releases. The '''M''' releases are extended maintenance releases, and Cisco will provide bug fixes for 44 months. The '''T''' releases are standard maintenance releases, and Cisco will only provide bug fixes for 18 months. == Security and vulnerabilities == Because IOS needs to know the cleartext password for certain uses, (e.g., [[Challenge-handshake authentication protocol|CHAP]] authentication) passwords entered into the CLI by default are weakly encrypted as 'Type 7' ciphertext, such as "<code>Router(config)#username jdoe password 7 ''0832585B1910010713181F''</code>". This is designed to prevent "shoulder-surfing" attacks when viewing router configurations and is not secure β they are easily decrypted using software called "getpass" available since 1995, or "ios7crypt",<ref>{{Cite web|url=https://github.com/mcandre/ios7crypt|title=ios7crypt|website=[[GitHub]] |access-date=2012-09-19|archive-date=2017-03-25|archive-url=https://web.archive.org/web/20170325082046/https://github.com/mcandre/ios7crypt|url-status=live}}</ref> a modern variant, although the passwords can be decoded by the router using the "key chain" command and entering the type 7 password as the key, and then issuing a "show key" command; the above example decrypts to "stupidpass".<ref>{{Cite web|url=https://insecure.org/sploits/cisco.passwords.html|title=Cisco password decryption|website=insecure.org|access-date=2024-04-10|archive-date=2023-09-27|archive-url=https://web.archive.org/web/20230927043705/https://insecure.org/sploits/cisco.passwords.html|url-status=live}}</ref> However, the program will not decrypt 'Type 5' passwords or passwords set with the <code>enable secret</code> command, which uses [[Salt (cryptography)|salted]] [[Crypt (Unix)#MD5-based scheme|MD5 hashes]].<ref>{{cite web|title=Cisco IOS Password Encryption Facts|url=https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/107614-64.html|access-date=12 September 2017|archive-date=13 September 2017|archive-url=https://web.archive.org/web/20170913135006/https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/107614-64.html|url-status=live}}</ref> Cisco recommends that all Cisco IOS devices implement the authentication, authorization, and accounting (AAA) security model. AAA can use local, [[RADIUS]], and [[TACACS+]] databases. However, a local account is usually still required for emergency situations.<ref>{{cite web|title=Cisco 500-052 Test|url=https://www.mrcerts.com/500-052-test.html|access-date=21 February 2017|archive-date=22 February 2017|archive-url=https://web.archive.org/web/20170222053408/https://www.mrcerts.com/500-052-test.html|url-status=live}}</ref> At the [[Black Hat Briefings]] conference in July 2005, Michael Lynn, working for [[IBM Internet Security Systems|Internet Security Systems]] at the time, presented information about a vulnerability in IOS.<ref>{{Cite magazine |title= Router Flaw Is a Ticking Bomb |author= Kim Zetter |date= August 1, 2005 |magazine= Wired |url= http://archive.wired.com/politics/security/news/2005/08/68365 |access-date= August 9, 2014 |archive-date= September 4, 2014 |archive-url= https://web.archive.org/web/20140904195123/http://archive.wired.com/politics/security/news/2005/08/68365 |url-status= live }}</ref> Cisco had already issued a patch, but asked that the flaw not be disclosed.<ref>{{Cite magazine |title= Cisco Security Hole a Whopper |author= Kim Zetter |date= July 27, 2005 |magazine= Wired |url= http://archive.wired.com/politics/security/news/2005/07/68328 |access-date= August 9, 2014 |archive-date= September 5, 2014 |archive-url= https://web.archive.org/web/20140905005527/http://archive.wired.com/politics/security/news/2005/07/68328 |url-status= live }}</ref> Cisco filed a lawsuit, but settled after an injunction was issued to prevent further disclosures.<ref>{{Cite news |title= Statement on Federal District Court Injunction (Black Hat Presentation) |publisher= Cisco Systems |date= July 28, 2005 |work= Press release |url= http://newsroom.cisco.com/dlls/2005/corp_072805.html |access-date= June 18, 2013 |url-status= dead |archive-url= https://web.archive.org/web/20120205042354/http://newsroom.cisco.com/dlls/2005/corp_072805.html |archive-date= February 5, 2012 }}</ref> With IOS being phased out on devices, IOS-XE adopted many improvements including updated defaults. Some use cases can now store secrets as [https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9200/software/release/17-14/configuration%20guide/sec/b%201714%20sec%209200%20cg/controlling%20switch%20access%20with%20passwords%20and%20privilege%20levels.html one-way hashes]. == IOS XR train == For Cisco products that required very high availability, such as the [[Cisco CRS-1]], the limitations of a monolithic kernel were not acceptable. In addition, competitive router operating systems that emerged 10β20 years after IOS, such as [[Juniper Networks|Juniper]]'s [[Junos OS]], were designed to not have these limitations.<ref>{{Cite web|url=https://www.juniper.net/us/en/products/network-operating-system/junos-os.html|title=Junos OS | Juniper Networks US|website=Juniper Networks|access-date=2024-04-10|archive-date=2024-04-06|archive-url=https://web.archive.org/web/20240406091952/https://www.juniper.net/us/en/products/network-operating-system/junos-os.html|url-status=live}}</ref> Cisco's response was to develop a completely new operating system that offered modularity, memory protection between processes, lightweight threads, [[Preemption (computing)|pre-emptive scheduling]], ability to independently restart failed processes and massive scale for use in Service Provider networks. The IOS XR development train initially used the [[real-time operating system]] [[microkernel]] ([[QNX]]) and a large part of the IOS [[source code]] was re-written to take advantage of the features offered by the kernel. In 2005 Cisco introduced the Cisco IOS XR network operating system on the [[Cisco 12000|12000 series]] of network routers, extending the microkernel architecture from the CRS-1 routers to Cisco's widely deployed [[core router]]s. As of release 6.x of Cisco IOS XR, QNX was dropped in favor of Linux. Part of the initial work focused on modularity inspired modification of monolithic IOS into modular IOS, which extends the microkernel architecture into the IOS environment, while still providing the software upgrade capabilities. That idea was only tested on Catalyst 6500, got limited exposure and was quickly discontinued as requirements were too high and significantly impaired platform operation. == See also == * [[Cisco IOS XE]] * [[Cisco IOS XR]] * [[Cisco NX-OS]] * [[JUNOS|Junos OS]] * [[Supervisor Engine (Cisco)]] * [[Network operating system]] * [[Packet Tracer]] == References == {{Reflist}} == External links == * [https://content.cisco.com/welcome.html Cisco Content Hub] * [https://cfnng.cisco.com Cisco Feature Navigator] * [http://www.cisco.com/en/US/products/products_security_advisories_listing.html Cisco Security Advisories] {{Cisco Systems}} {{Routing software}} [[Category:Cisco software|IOS]] [[Category:Embedded operating systems]] [[Category:Internet Protocol based network software]] [[Category:Network operating systems]] [[Category:Routers (computing)]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:About
(
edit
)
Template:Cisco Systems
(
edit
)
Template:Citation
(
edit
)
Template:Citation needed
(
edit
)
Template:Cite book
(
edit
)
Template:Cite magazine
(
edit
)
Template:Cite news
(
edit
)
Template:Cite web
(
edit
)
Template:Clarify
(
edit
)
Template:Infobox OS
(
edit
)
Template:More footnotes
(
edit
)
Template:Reflist
(
edit
)
Template:Routing software
(
edit
)
Template:Rp
(
edit
)
Template:Short description
(
edit
)