IOS XR Data Sheet
IOS XR Data Sheet
Cisco public
As more devices are connected and more content is consumed, Internet traffic has seen a compounded annual
growth rate of 30 percent over the last five years. It’s anticipated that by 2022:
In anticipation of this growth, Cisco designed the IOS® XR NOS to ease network operations. As a modern
operating system, IOS XR is designed to help engineers by:
● Providing a single, easy-to-maintain NOS paradigm across the network: edge, aggregation, and core.
● Reducing Operating Expenses (OpEx) with simplified delivery and deployment based on the features you
need.
● Using Linux-style workflows and support for standard Linux libraries to simplify provisioning and
management of the device.
● Improving operational efficiencies with management API integration to provide near-real-time,
actionable telemetry data.
● Allowing for automation to drive smoother implementations and remote configuration updates.
● Validating trust within the network so service providers can work to operate a secure environment.
1
Cisco Visual Networking Index, 2017-2022
It is important to recognize the transition toward automated operational workflows in SP networks that are
driving vendor network operating systems across the industry to implement open, extensible software
architectures. This transition improves operational scalability with model-driven APIs at every layer of the
network stack. Development of IOS XR was deliberately focused on complementing this transition and resulted
in a number of significant changes:
● In Release 6.x, IOS XR moved from a 32-bit QNX operating system to a 64-bit Linux operating system.
● Embedded support for YANG models with programmatic provisioning and high-scale, real-time
telemetry data.
● Highly performance service-layer APIs at lower layers of the stack for custom protocols and controllers,
greatly elevated the capabilities of IOS XR to integrate with desired workflows and tools.
● Introduction of Zero-Touch Provisioning (ZTP) capabilities in IOS XR to address Day 0 deployment
requirements.
● IOS XR opened up its underlying Linux environment for direct access to end users, allowing for
integration of scripting languages (bash, Python, Golang, C++), configuration management tools
(Ansible, Puppet, Chef, etc.), and support for containers (LXC and Docker).
With the announcement of the Cisco®8000 series platforms enabling highly scalable, 400G-optimized routers,
IOS XR continues to expand its portfolio of supported platforms to include VNF solutions using XRd and
XRv9000 virtual routers, NCS 540/560, NCS 5000/5500/5700, ASR 9000, and qualified third-party hardware.
IOS XR offers the most comprehensive portfolio of platforms and solutions in the industry which enables
consistent operations and feature capability across all segments of the service provider network.
Simple
Easier to provision, automate, and integrate with a wide variety of workflows.
1. Simpler and leaner architecture: For newer hardware platforms on IOS XR, there is no admin plane
and no system containers, making it easier than ever before to manage the system through off-the-
shelf tools and scripting solutions.
2. Simpler operations: With Linux-style workflows and integrations, enabling the use of scalable
configuration-management tools (Ansible, Puppet, Chef), and support for standard Linux
applications on box as binaries or containers (LXC, Docker).
3. Simpler, secure Day 0 rollouts: With powerful and secure zero-touch capabilities based on RFC
8572 to help enable secure device onboarding through template-driven ZTP scripts based on
YANG-modeled transactions between IOS XR routers and bootstrap servers.
4. Simpler software delivery and deployment: Through artifacts called Golden ISOs (GISOs) to
combine custom scripts, applications, packages, and files into a deployable ISO artifact. Individual
IOS XR components and patches are delivered through RPMs.
5. Powerful new design of IOS XR Install: Built on top of DNF (Dandified YUM) and extended to
support modular chassis systems and YANG-modeled APIs, IOS XR install allows operators to
manage the lifecycle of IOS XR RPMs, native Linux RPMs, and Golden ISO (GISO) installations while
supporting real-time telemetry notifications of the install process.
3. Service Layer (SL) and Open Forwarding Abstraction (OFA) APIs: Service-layer APIs are highly
performant APIs at the common network infrastructure layer of IOS XR (RIB, Label Switch Database,
BFD, L2, etc.) to enable controllers and custom protocols to manipulate routes in IOS XR RIB, create
label-switched paths on the fly, etc. The OFA API is a model-driven API on top of the ASIC SDK of
the hardware platform to enable high-performance access to the lowest layer of the network stack
either directly or through modeled abstractions such as P4 runtime.
4. Segment routing and EVPN: Segment routing and EVPN have been the mainstays of IOS XR-based
transport deployments with a focus on simplicity, scale, and programmatic extensibility. IOS XR
continues focus on these technologies with further support for SR Flex-Algo, SRV6, and more.
EVPN drives the next level of simplicity by offering a unified control plane protocol (BGP) for all
service types, including Layer2 VPN and Layer3 VPN services.
5. Zero-touch APIs: Exhaustive APIs for zero-touch provisioning to enable Day 0 automation. This
includes CLI automation APIs through bash and Python libraries on box. With IOS XR, operators will
also be able to use the on-box netconf client in the ZTP Python library to bring up the system
through YANG-modeled XML inputs, further enabling network teams to transition their systems from
CLI to YANG models when ready.
Trustworthy
Secure, trusted workflows are only possible with a trustworthy NOS running on a trustworthy network device.
With IOS XR, this is achieved by ensuring:
1. Trust begins in the hardware: A secure, nontamperable Trust Anchor Module (TAm) houses known
good values of the hardware components, along with keys and certificates rooted to Cisco. These
are utilized to verify components of the hardware during BIOS boot.
2. Secure boot: Trust is reinforced by validating parts of the network OS (IOS XR) through a secure
boot process. This is enabled by validating the signatures of the bootloader and kernel modules
against the keys in TAm, before starting the OS.
4. Signed RPMs: Trust is enforced for all IOS XR RPMs and third-party application RPMs by validating
signatures on these RPMs before installation, based on the keys in TAm.
As we elaborate on these concepts further, it should become apparent that IOS XR continues to evolve to meet
the needs of service providers as they look to address the challenges of the future.
These workflows have percolated into Day 0 rollouts as well. These Linux automations help convert a potentially
weeks-long manual process of device onboarding into a process that could be completed in a matter of hours
based on the level of automation used at Day 0. These workflows fall under the category of ZTP (Zero-Touch
Provisioning), which is discussed at great length in a subsequent section.
The tools utilized by SPs have seen drastic changes: moving away from Telnet, expect-style, cli-based scripts
to more deterministic, model-driven, SSH-based configuration management tools. These tools provide
improved scalability and reliability and are often multivendor compatible.
IOS XR has consistently evolved to remain effective and offers application-hosting and Packet/IO capabilities,
which enable Linux applications and tools to run on box as native binaries or containers (LXC/Docker) and allow
these applications to send and receive traffic while running on fixed or modular chassis platforms. Additionally,
capabilities such as ZTP, gRPC-based APIs (service-layer, YANG-modeled APIs), and telemetry were enabled
because of the functioning Linux environment.
With IOS XR there will be several new capabilities that will be introduced to the Golden ISO build process. The
evolution of the GISO process is shown below:
With IOS XR, the GISO build process will enable the following artifacts to be added to the base ISO:
1. IOS XR functionality RPMs: RPMs of different optional components in IOS XR, like BGP, OSPF, ISIS,
Telnet, etc.
2. Base configuration: A valid IOS XR configuration file can be added to the Golden ISO.
3. ztp.ini file: With IOS XR, a new type of file will be introduced for IOS XR ZTP workflows. The ztp.ini
file is meant to allow certain default settings to be set for the ZTP process, enabling a user to
influence the ZTP state machine through supported knobs.
5. Secure ZTP artifacts: We describe the secure ZTP artifacts in greater detail in a subsequent
section. The basic requirement for secure ZTP to function is to have an owner (customer/network
operator) certificate on the box when it boots. A TLS client certificate (optional) can also be
packaged based on the workflow desired with secure ZTP. The secure ZTP enforcement flags are
settings that the user may specify to modify the state machine of the ZTP process to either enforce
secure ZTP or enable backward-compatible classic ZTP workflows.
The build tool for Golden ISOs for IOS XR is open source and can be found here:
https://github.com/IOSXR/gisobuild.
In most access deployments, network operators receive their purchased routers and usually ferry them to
prestaging facilities as part of the first “truck” rollout. At the prestaging facility, the devices are typically
configured manually with the help of SMEs to place bootstrap configurations on them. These preconfigured
boxes are then shipped out to the installation site, often using third-party installers to simply set up and power
on the devices that were preconfigured. This constitutes the second “truck” rollout. This may not be the exact
workflow for all network operators but is fairly representative of the workflows in use across a majority of them.
The use of competent SMEs at prestaging facilities, the multiple truck rollouts, the post installation rollouts, and
corrections in case of errors in the bootstrap configurations contribute to the consistently rising OpEx that most
large-scale service providers have to incur. As the number of devices in these deployments continues to grow
to meet consumer demands and newer 5G architectures, it is imperative to find techniques to reduce the OpEx
as much as possible.
1) Tree-based buildouts: To be topology agnostic, tree-based buildouts are necessary. There are no out-
of-band management networks to work with, so every device in the network does not have L2
connectivity to a DHCP server. This implies that an already-provisioned device must act as a DHCP
relay for the next device in the tree.
2) Security is critical: Since access devices typically go into insecure locations, it is necessary to establish
trust during the onboarding process. At a higher level, this translates into the following requirements:
3) L2 reachability through VLAN discovery: Often, the initial reachability services such as DHCP servers
and web servers may only be reachable across a Layer 2 metro Ethernet cloud. Data (production) ports
need to be utilized for ZTP in these networks due to absence of out-of-band management networks.
For these reasons, VLAN discovery techniques will be implemented by IOS XR ZTP to discover the
VLAN in use across the Layer 2 cloud and properly tag the DHCP request with the correct VLAN, post
discovery, to proceed with ZTP.
Considering the goals described above, IOS XR implements concepts from RFC-8572 to enable secure ZTP
capabilities in IOS XR. This support is threefold:
1) Support for the secure ZTP YANG model to implement interactions between the router and a
RESTCONF-based ZTP server to download artifacts (config, scripts) to automatically provision the
router.
2) Support for a secure Golden ISO that can package an owner certificate (associated with the network
operator) to verify signatures on downloaded artifacts and validate the network domain that the device
is trying to join based on responses from the ZTP server. The secure GISO also supports adding an
optional TLS client certificate to help establish a TLS connection to the ZTP server to secure and
encrypt subsequent interactions.
IOS XR has consistently focused on building programmatic and model-driven interaction points within its stack
to provide automatable interfaces that enable easier deployment and management of network devices. This
design allows the capabilities of IOS XR to be easily extended through powerful integrations with external tools,
applications, and controllers.
But it is hard to pigeon-hole these capabilities into a conversation about APIs alone. As technologies such as
segment routing and EVPN have evolved, network operators have leveraged them to transition their legacy
transport networks from protocol-heavy deployments (MPLS, RSVP-TE, Layer 2 and Layer 3 VPN deployments)
to simpler, leaner solutions built on these technologies, often in tandem with external controllers and planning
tools.
It is therefore important to understand these capabilities in the context of evolving network operations.
Typically, we can classify network operations into three categories:
● Day 0: The initial rollout of devices, automated deployments through ZTP, registration with Day 1
management, and monitoring solutions. Zero-touch provisioning APIs and infrastructure play a key role
here.
● Day 1: Role-based device configuration in the network, bring-up of centralized management solutions
and controllers, mass deployment of applications and policies using scalable configuration management
tools and automation. Model-driven, YANG-based APIs for device provisioning, model-driven telemetry
capabilities for device monitoring, segment routing, and EVPN solutions to rollout services and policies in
the network are the key elements utilized in Day 1 operations.
● Day N: Manipulate state in the network using real-time network and application information, remediate
network degradation issues, raise alarms and schedule maintenance windows, analyze network
telemetry data and patterns to evolve the network design, and meet future challenges. Custom
controllers and applications that respond to network and application events, leveraging high-
performance, lower-layer APIs such as service layer and Open Forwarding Abstraction (OFA) APIs,
feedback loops implemented through telemetry, and device-provisioning APIs built on YANG are the
typical components that drive innovation in Day N solutions.
Having understood how these APIs and technologies align with different operational paradigms described
above, let’s break down the IOS XR network stack to understand where these capabilities lie.
Shown below are the different layers of the IOS XR stack with corresponding capabilities identified:
● Manageability layer: This layer exposes the Command Line Interface (CLI) and YANG-modeled APIs for
features and protocols in the network application layer. These YANG models are used for device
provisioning and streaming telemetry. ZTP APIs are built on top of CLI and YANG APIs in this layer. This
layer leverages an internal “database” within IOS XR called SysDB.
● Network application/protocol layer: This layer contains protocols (BGP, ISIS, OSPF, etc.) and features
such as L2VPN, L3VPN, etc. This layer interacts with SYSDB to store the operational and configuration
state of the protocols and features. The higher-layer components of segment routing and EVPN fall into
this layer.
● Network infrastructure/service adaptation layer: Typically consists of components such as the RIB,
Label Switch database, BFD, network interface handler, and APIs for controllers/agents. The API
provided on top of this layer for end users is called the service-layer API. The infrastructure components
of all XR control plane protocols (BGP, ISIS, OSPF, etc.), segment routing, and EVPN get mapped to this
layer.
● Hardware abstraction layer (OFA): This layer interacts with the ASIC SDK (provided by the ASIC
vendor) and handles programming of the data plane based on RIB state, or LSD (label switch database)
state, etc. The Open-Forwarding Abstraction (OFA) API abstracts the capabilities of this layer for
external applications.
● Platform integration layer: Typically consists of kernel and/or user-side drivers for devices such as
fans, LEDs, sensors, etc. The integration of these device-specific drivers with the higher layers of the
software stack happens at this layer. It this layer that allows a software stack to extract information
(e.g., temperature) from sensors and influence the component state (e.g., fan speed).
In IOS XR, a running theme around any discussion of device or NOS security is the idea of trust. The goal of IOS
XR and its compatible hardware is to build a “Trustworthy Platform” where device and OS integrity are as
important as the idea of security. In fact, it is important to note that no device can ever be considered secure:
this is an ideal state, but not necessarily achievable. A level of trust can be measured, verified, and audited.
It is important to articulate the primary concerns associated with network device security:
● How does an operator ensure that the router is running only the software that was intended?
● How does one know that a router hasn’t been physically altered since Cisco built it?
It is possible to address these concerns by immediately building security controls such as enabling only signed
software to install and run or having known good values for the hardware components to match and verify
during boot. Taking it a step further and ensuring that security controls are backed by tamper-proof hardware
that stores certificates and keys and the known good values to use for validation helps provide complete
validation. Attestation capabilities allow the verification results to be visualized and reported, which can prove
the ability to trust the component and network.
To address these concerns and understand the trust paradigm within IOS XR and its associated platforms, we
need to understand the chain of trust for a typical network device.
There are well-known attacks and vulnerabilities that compromise the runtime OS, kernel, and bootloader
(GRUB). Secure boot as a concept is laid out in the UEFI specification 2.3.1 and expects trust to begin at the
BIOS stage, subsequently checking the bootloader, kernel, and then the OS. But we’ve seen UEFI rootkits in the
wild that can compromise the BIOS, thereby jeopardizing the secure boot process. Further, the scope of
security issues for Intel ME and AMT, both BIOS extensions on Intel hardware, is significantly increasing.
Research has already been presented about problems in the UEFI firmware ecosystem and how easy it is to
deliver and install implant/rootkit.
This implies that to properly secure the boot process, validation checks have to begin much earlier in the boot
cycle, even before the BIOS boots. With IOS XR platforms, we do exactly that. Cisco hardware platforms
execute what we call a hardware-anchored secure boot.
The SUDI is permanently programmed into the TAm and logged by Cisco during Cisco’s closed, secured, and
audited manufacturing processes. This programming provides strong supply chain security, which is particularly
important for embedded systems like routers and switches.
In contrast, the industry standard TPM has similar functions to those of the TAm, but it is not permanently
programmed during manufacture with a unique device identifier. Building an SUDI in this instance is left to the
end user and requires user intervention and development, which does provide flexibility, but increases the risk
of not identifying unauthorized supply chain modifications.
Reference links to information about key environmental sustainability topics (mentioned in the “Environment
Sustainability” section of the CSR Report) are provided in the following table:
Information on electronic waste laws and regulations, including products, batteries, and WEEE compliance
packaging
Cisco makes the packaging data available for informational purposes only. It may not reflect the most current
legal developments, and Cisco does not represent, warrant, or guarantee that it is complete, accurate, or up to
date. This information is subject to change without notice.
Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business
transformation and help you stay competitive. We can help you reduce the total cost of ownership, conserve
capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you
acquire hardware, software, services and complementary third-party equipment in easy, predictable
payments. Learn more.