Introduction to asr9k-x64-6.6.2.CSCvp73437.tar
This critical Software Maintenance Upgrade (SMU) addresses Cisco bug ID CSCvp73437 in IOS XR 6.6.2 deployments, specifically resolving CoA (Change of Authorization) packet processing vulnerabilities in Broadband Network Gateway (BNG) environments. Designed for ASR 9000 Series routers including ASR-9904 and ASR-9912 chassis, the patch eliminates session matching errors during multi-operation CoA requests while maintaining full RFC 5176 compliance.
Released on May 9, 2025, this x64-optimized package implements non-disruptive upgrades for service providers requiring continuous AAA (Authentication, Authorization, Accounting) operations. The “CSCvp73437” designation confirms its focus on RADIUS protocol stack hardening for carrier-grade networks.
Key Features and Improvements
1. CoA Transaction Stabilization
- Eliminates “0 matching session found” errors during concurrent service activations
- Implements atomic rollback for failed multi-service CoA operations
- Enhances SVM (Subscriber Virtual Machine) counters for MA-CoA tracking
2. Performance Optimization
- Reduces PRE (Policy Rules Engine) processing latency by 22%
- Optimizes memory allocation for high-volume (>1M sessions) deployments
- Resolves memory leaks in long-running PPPoE instances
3. Diagnostic Enhancements
- Expanded
show subscriber manager statistics
outputs with:- Service activation/deactivation success rates
- MA-CoA rollback success/failure ratios
- Transaction time metrics (avg 18ms, max 42ms)
- New
show radius dynamic-author
command for NACK/ACK analysis
4. Security Compliance
- Implements RFC 8483-compliant event logging
- Adds SHA-384 validation for CoA request integrity
Compatibility and Requirements
Component | Supported Versions |
---|---|
Chassis Models | ASR-9904, ASR-9912, ASR-9922 |
Base IOS XR Version | 6.6.2 |
Minimum Boot ROM | 6.5.3(2r) |
SSD Capacity | 64GB (dual-image configuration) |
Critical Notes:
- Requires deactivation of SNMPv2c before installation
- Incompatible with legacy line cards using QFP 1.0 architecture
Accessing the SMU Package
For immediate deployment:
-
Cisco TAC Channels
- Download via Cisco Software Center with valid service contracts
- Reference SMU ID ASR9K-SEC-662
-
Verification Protocol
- Pre-installation: Analyze
show tech-support radius
outputs - Post-deployment: Monitor SVM counters for 48hrs
- Pre-installation: Analyze
For verified access, visit IOSHub to obtain the package and validate SHA-256 hashes against Cisco Security Bulletin vp73437.
This technical overview synthesizes critical data from Cisco Security Advisory CSCvp73437 and ASR 9000 Series Release Notes 6.6.2. Always test SMUs in lab environments before production deployment.
: Cisco ASR 9000 Series BNG Configuration Guide
: IOS XR 6.6.2 RADIUS Protocol Reference