CISCO Release Notes for the StarOS Software User Guide

June 8, 2024
Cisco

CISCO Release Notes for the StarOS Software

Release Notes for the StarOS™ Software Version 2024.02.l0

  • First Published: April 30, 2024
  • Last Updated: May 03, 2024

Introduction

This Release Notes identifies changes and issues related to the Legacy Gateway (ASR 5500) software release.

Release Lifecycle Milestones

Release Lifecycle Milestone Milestone Date
First Customer Ship FCS 30-April-2024
End of Life EoL 29-Oct-2024
End of Software Maintenance EoSM 29-Oct-2025
End of Vulnerability and Security Support EoVSS 29-Oct-2025
Last Date of Support LDoS 31-Oct-2026

Release Package Version Information

Software Packages Version Build Number
StarOS Package 2024.02.l0 21.28.m23.93622

Descriptions for the various packages provided with this release are available in the Release Package Descriptions section.

What’s New in this Release
This version of Release Notes includes a new section titled What’s New in this Release comprising all new features, enhancements, and behavior changes applicable for the release.
There are no new features or enhancements for this Release.

Features and Enhancements

This section covers a brief description of the features and enhancements introduced in this release.

Feature ID Feature Name
FEAT-22933 Verizon 5G CALEA N+K GR design changes – support up to 16 servers
FEAT-24393 M2M ACL configuration into the SRP Checkpointing

Related Documentation

For a complete list of documentation available for this release, go to:
http://www.cisco.com/c/en/us/support/wireless/asr-5000-series/products- installation-and-configuration-guides-list.html

Installation and Upgrade Notes
This Release Note does not contain general installation and upgrade instructions. Refer to the existing installation documentation for specific installation and upgrade considerations.

Firmware Updates
There are no firmware upgrades required for this release.

Software Integrity Verification
To verify the integrity of the software image you have from Cisco, you can validate the SHA512 checksum information against the checksum identified by Cisco for the software.
Image checksum information is available through Cisco.com Software Download Details. To find the checksum, hover the mouse pointer over the software image you have downloaded.

At the bottom you find the SHA512 checksum, if you do not see the whole checksum you can expand it by pressing the “…” at the end.

To validate the information, calculate a SHA512 checksum using the information in Table 1 and verify that it matches either the one provided on the software download page.
To calculate a SHA512 checksum on your local desktop see Table 1

Table 1 – Checksum Calculations per Operating System

Operating System SHA512 checksum calculation command examples
Microsoft Windows Open a command line window and type the following command

certutil.exe -hashfile < filename>. _< extension> _SHA512

Apple MAC| Open a terminal window and type the following command

$ shasum -a 512 < filename>. < extension>

Linux| Open a terminal window and type the following command

$ sha512sum < filename>. < extension>

Or

$ shasum -a 512 < filename>. < extension>

NOTES:

_< filename> _is the name of the file.

_< extension> _is the file extension (e.g. .zip or .tgz).

If the SHA512 checksum matches, you can be sure that no one has tampered with the software image or the image has not been corrupted during download.
If the SHA512 checksum does not match, we advise you to not attempt upgrading any systems with the corrupted software image. Download the software again and verify the SHA512 checksum again. If there is a constant mismatch, please open a case with the Cisco Technical Assistance Center.

Certificate Validation

  • In 2024.01 and later releases, software images for StarOS, VPC-DI, and VPC-SI, and the companion software packages for StarOS and VPC are signed via x509 certificates.
  • USP ISO images are signed with a GPG key.
  • For more information and instructions on how to validate the certificates, refer to the README file available with the respective software packages.

Open Bugs for this Release

The following table lists the open bugs in this specific software release.
NOTE: This software release may contain open bugs first identified in other releases. Additional information for all open bugs for this release are available in the Cisco Bug Search Tool.

Table 2 – Open Bugs in this Release

Bug ID Headline Product Found
CSCwj33154
sessmgr reload at uplane_sfw_create_nat_realm_info() cups-up
CSCwi52632

egtpu_process_update_req_evt()egtpu_handle_user_sap_event()sess- mgr_uplane_gtpu_tx_update()| cups-up
CSCwj24130| Inconsistency in counters in gtpu bulkstats for UP| cups-up
CSCwj36352| Assertion failure at sess/mme/mme-app/app/mme_tau_proc.c:1701| mme
CSCwj72131| Improper output for PDN GW Name in ‘show mme-service db record ‘

is a display issue.

| mme
CSCwj66981| Sessmgr crash-egtpc_send_ind_evt()| pdn-gw
CSCwj52492| While triggerring the interim CDR, there is no aaa_sess_handle and sessmgr restart| pdn-gw
CSCwj25382| UDP flows are not getting blocked when 0 quota is received from OCS| pdn-gw
CSCwj78838| Assertion failure at “sit_api_rct_task_death_req” on 21.28.m23.93362| pdn-gw
CSCwj70487| Assertion failure at sess/snx/drivers/sgw/sgw_drv.c:374| sgw
CSCwj68378| ASR5500 SPGW Assertion failure at sgwdrv_send_tx_setup_to_egtpu| sgw
Bug ID| Headline| Product Found
---|---|---
CSCwj68218| Assert observed at sgwdrv_collect_pdn_info| sgw
CSCwj17471| Planned srp switchover is succeeded though bgp monitor in stby upf is down| staros
CSCwi59036| Port redundancy Failed in 4-port deployment VPC SI| staros
CSCwd99519| Error logs seen on UPF PDR not found with PDR ID 0x149 and Remove PDR PDR with ID 0x2ce| upf

Resolved Bugs for this Release

The following table lists the resolved bugs in this specific software release.
NOTE: This software release may contain bug fixes first introduced in other releases. Additional information for all resolved bugs for this release are available in the Cisco Bug Search Tool.

Table 3 – Resolved Bugs in this Release

Bug ID Headline Product Found
CSCwj51924 VPCDI

// 21.28.m15 (91862) //h Assertion failure at sess/snx/drivers/saegw/saegw_recovery.c:35| cups-cp
CSCwj00472| sessmgr 12341 error when HO between SGWs| cups-cp
CSCwj50864| Assertion failure at sess/smgr/sessmgr_pgw.c:9924| cups-cp
CSCwi71670| X3 Lawful Intercept is marked as wrong EBI when using ipv6 session over dedicated bearer| cups-cp
CSCwi94768| Documentation to update the max entries supported in Gx local-policy- service| cups-cp
CSCwi28946| [BP- CUPS] Lot of error logs – [SXAB] Failed to remove Traffic Endpoint with Traffic Endpoint ID| cups-cp
CSCwj38556| In roaming scenraio – MCC-only feature rejects the bearer after 4G3G mobility d| cups-cp
CSCwi53552| sessmgr Fatal Signal 11: 11 uplane_free_nat_binding_info()uplane_free_app_data_flow()| cups-up
CSCwc99110| Assertion failure at sess/smgr/sessmgr_gtpu.c sessmgr_egtpu_signalling_routine()| cups-up
CSCwi35960| huge amount of “ICMP packet parse failure” logs in 21.28.m15 with NAT| cups-up
CSCwi69056| VPP buffer leak caused a VPP restart| cups-up
CSCwj85083| CUPS UP : npumgr crashes after upgrade to 21.28.m22| cups-up
Bug ID| Headline| Product Found
---|---|---
CSCwj44782| MME wrongly selecting s2b PGW record (x-3gpp-pgw:x-s2b-gtp+nc- smf) for 5G capable UE’s| mme
CSCwi85182| Sessmgr restart due to Assertion failure at function sn_gt_release_mm_teid()| mme
CSCwi55030| Observed multiple sessmgr went to warn/over state in 21.28.m18.92419 during regression| mme
CSCwd25108| DNS Failure – TCP READ, Kernel Closed – req_read_len = 0| mme
CSCwi48857| Sessmgr Assertion failure at egtpc_send_req_msg()| mme
CSCwc83863| Assertion failure at sess/mme/mme-app/app/mme_app_util.c:18558| mme
CSCwj29750| Sessmgr restart after SW upgrade to 21.28.m19, mme_auth_awt_hss_hss_resp()| mme
CSCwj30320| vplmn- address option is not showing under call-control-profile| mme
CSCwj33658| sessmgr crash due to Fatal Signal 11: 11 PC: [06bbc47f/X] smgr_process_iri_hi2()| pdn-gw
CSCwj24901| Empty APN list in “show s8hr config” after node reload| pdn-gw
CSCwi54796| VPC-SI – bfd sometimes sending ipv6 packets with udp checksum 0x0 – which is invalid| pdn-gw
CSCwj24886| ipsecmgr restart seen after the rekeying process| pdn-gw
CSCwj15020| ASR5500 – [SPGW] – sessctrl failure| pdn-gw
CSCwj72598| user- plane traffic stops when sgw-u (Sxa) and pgw-u (Sxb) functions are hosted on the same UP| pdn-gw
CSCwi67492| For gtpu-schema , few bulkstat counters not incremented| pdn-gw
CSCwj24899| Few sessmgrs having TCP connect issues on Checkpointmgr| rcm
CSCwi68538| RCM- Checkpointmgr crash due to fatal error concurrent map read and map write| rcm
CSCwi79878| IP Pool flush enhancements for planned RCM UPF SWO| rcm
CSCwj36377| Help ? for rcm-config-ep write-timeout shows inconsistency not similar with other| rcm
CSCwi69314| Planned swo gives incorrect message in ops-centre| rcm
CSCwi87259| StandbySessmgrDisconnected trap is not generated when upf reload due to planned switchover fails| rcm
CSCwi65948| format of dateandtime used by RCM does not comply to snmpv2| rcm
CSCwi73027| Stale data in RCM post switchover| rcm
Bug ID| Headline| Product Found
---|---|---
CSCwi74961| TCP hardening – Timeout observed during socket write during switchover| rcm
CSCwi23288| session manager restart at sn_dp_utran_process_purge_req_evt fucntion| sgsn
CSCwi70115| SNS- Add messages were not sent after adding new NSVL instance| sgsn
CSCwj26308| Assertion failure at sess/sgsn/sgsn-app/gtp_c/gtapp_tun_fsm.c:6936| sgsn
CSCwi63250| Despite “monitor system card-fail” config, switchover does not occur| staros
CSCwi59951| TCP length issue in DNS query causing time out| staros
CSCwi67402| Sessmgr restart at saegwdrv_ue_fsm_st_active_evt_snx_abortcall(),| staros
CSCwi65052| [BP- CUPS] [connectedapps 203750 error CONNECTEDAPPS ERROR:Unable to open the btmp file /var/log/btmp| staros

Operator Notes

StarOS Version Numbering System
The output of the show version command displays detailed information about the version of StarOS currently running on the ASR 5500 or Cisco Virtualized Packet Core platform.
NOTE: Starting 2024.01.0 release (January 2024), Cisco is transitioning to a new release versioning scheme. The release version is based on the current year and product. Refer to Figure 1 for more details.
During the transition phase, some file names will reflect the new versioning whereas others will refer to the 21.28.x-based naming convention. With the next release, StarOS-related packages will be completely migrated to the new versioning scheme.
Version Numbering for FCS, Emergency, and Maintenance Releases

Figure 1 – Version Numbering


Release Package Descriptions
Table 4 provides descriptions for the packages that are available with this release. For more information about the release packages up to 21.28.x releases, refer to the corresponding releases of the release note.

Table 4 – Release Package Information

Software Package Description

ASR 5500


asr5500-.zip

| Contains the signed ASR 5500 software image, the signature file, a verification script, the x509 certificate, and a README file containing information on how to use the script to validate the certificate.


asr5500_T-.zip

| Contains the signed, trusted ASR 5500 software image, the signature file, a verification script, the x509 certificate, and a README file containing information on how to use the script to validate the certificate.
StarOS Companion Package


companion-.zip

| Contains numerous files pertaining to this version of the StarOS including SNMP MIBs, RADIUS dictionaries, ORBEM clients. These files pertain to both trusted and non-trusted build variants.
VPC-DI
qvpc-di-.bin.zip| Contains the VPC-DI binary software image that is used to replace a previously deployed image on the flash disk in existing installations.
qvpc-di_T-.bin.zip| Contains the trusted VPC-DI binary software image that is used to replace a previously deployed image on the flash disk in existing installations.s
qvpc-di-.iso.zip| Contains the VPC-DI ISO used for new deployments, a new virtual machine is manually created and configured to boot from a CD image.
qvpc-di_T-.iso.zip| Contains the trusted VPC-DI ISO used for new deployments, a new virtual machine is manually created and configured to boot from a CD image.
---|---
qvpc-di-template-vmware-

.zip

| Contains the VPC-DI binary software image that is used to on-board the software directly into VMware.
qvpc-di-template-vmware_T-

.zip

| Contains the trusted VPC-DI binary software image that is used to on- board the software directly into VMware.
qvpc-di-template-libvirt-kvm-

.zip

| Contains the same VPC-DI ISO identified above and additional installation files for using it on KVM.
qvpc-di-template-libvirt-kvm_T-

.zip

| Contains the same trusted VPC-DI ISO identified above and additional installation files for using it on KVM.
qvpc-di-.qcow2.zip| Contains the VPC-DI binary software image in a format that can be loaded directly with KVM using an XML definition file, or with OpenStack.
qvpc-di_T-.qcow2.zip| Contains the trusted VPC-DI binary software image in a format that can be loaded directly with KVM using an XML definition file, or with OpenStack.
VPC-SI
qvpc-si-.bin.zip| Contains the VPC-SI binary software image that is used to replace a previously deployed image on the flash disk in existing installations.
qvpc-si_T-.bin.zip| Contains the trusted VPC-SI binary software image that is used to replace a previously deployed image on the flash disk in existing installations.
qvpc-si-.iso.zip| Contains the VPC-SI ISO used for new deployments, a new virtual machine is manually created and configured to boot from a CD image.
qvpc-si_T-.iso.zip| Contains the trusted VPC-SI ISO used for new deployments a new virtual machine is manually created and configured to boot from a CD image.
qvpc-si-template-vmware-.zip| Contains the VPC-SI binary software image that is used to on-board the software directly into VMware.
qvpc-si-template-vmware_T-

.zip

| Contains the trusted VPC-SI binary software image that is used to on-board the software directly into VMware.
qvpc-si-template-libvirt-kvm-

.zip

| Contains the same VPC-SI ISO identified above and additional installation files for using it on KVM.
qvpc-si-template-libvirt-kvm_T-

.zip

| Contains the same trusted VPC-SI ISO identified above and additional installation files for using it on KVM.
qvpc-si-.qcow2.zip| Contains the VPC-SI binary software image in a format that can be loaded directly with KVM using an XML definition file, or with OpenStack.
qvpc-si_T-.qcow2.zip| Contains the trusted VPC-SI binary software image in a format that can be loaded directly with KVM using an XML definition file, or with OpenStack.
VPC Companion Package


companion-vpc-.zip

| Contains numerous files pertaining to this version of the VPC including SNMP MIBs, RADIUS dictionaries, ORBEM clients. These files pertain to both VPC-DI and VPC-SI, and for trusted and non-trusted build variants.
---|---
 | Ultra Services Platform


usp-.iso

| The USP software package containing component RPMs (bundles).

Refer to the Table 5 for descriptions of the specific bundles.


usp_T-.iso

| The USP software package containing component RPMs (bundles). This bundle contains trusted images.

Refer to the Table 5 for descriptions of the specific bundles.

usp_rpm_verify_utils-.tar| Contains information and utilities for verifying USP RPM integrity.

Table 5 – USP ISO Bundles

USP Bundle Name Description
usp-em-bundle--1.x86_64.rpm* The Element Manager (EM) Bundle RPM

containing images and metadata for the Ultra Element Manager (UEM) module.
usp-ugp-bundle--1.x86_64.rpm| The Ultra Gateway Platform (UGP) Bundle RPM containing images for Ultra Packet core (VPC-DI). There are trusted and non-trusted image variants of this bundle.
usp-yang-bundle--1.x86_64.rpm| The Yang Bundle RPM containing YANG data models including the VNFD and VNFR.
usp-uas-bundle--1.x86_64.rpm| The Ultra Automation Services Bundle RPM containing AutoVNF, Ultra Web Services (UWS), and other automation packages.
usp-auto-it-bundle--1.x86_64.rpm| The bundle containing the AutoIT packages required to deploy the UAS.
usp-vnfm-bundle--1.x86_64.rpm| The VNFM Bundle RPM containing an image and a boot-up script for ESC (Elastic Service Controller).
ultram-manager--1.x86_64.rpm
| This package contains the script and relevant files needed to deploy the Ultra M Manager Service.

  • These bundles are also distributed separately from the ISO.

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, refer to https://www.cisco.com/c/en/us/support/index.html.

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

  • THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSEOR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

  • The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright ©1981, Regents of the University of California.
    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE- NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

  • IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

  • Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

  • All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

  • Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

  • Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)

© 2024 Cisco Systems, Inc. All rights reserved.

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals