Today, IOS selection can be a complicated and confusing experience. There are thousands of IOS Images or Feature Sets available to choose from. Additionally, the naming convention used and feature support is not consistent across BUs and platforms. Thus, customers supporting several products may need to order and support many different IOS Images.
Beginning with the 12.3M release of IOS, new re-packaged IOS Feature Sets will be available. The 8 new Images or Feature Sets will provide a naming convention that will be consistent across BUs and products. Each feature set will contain the same features across platforms also. For example, IP Voice will be supported in the same feature sets for every platform. This solves the mystery of having to verify which platform supports a feature in which Feature Set.
Notes: * SSH is included in 5 packages: Adv Security, SP Services, Adv IP Services, Enterprise Services, and Adv Enterprise Services. SSH + VPN/IPSec in included in 3 of those 5 images: Adv Security, Adv IP Services and Adv Enterprise Services. Although 3DES is used in SSH connections, it does not automatically apply to overall traffic - i.e. IPsec/VPN is still required for the inclusion of 3DES for overall traffic encryption, which comes with "Advanced" packages. Logical Upsell theory Logical naming Unbundles security and voice features for entry level without other feature burdens Intentional price increases to support legacy protocols (Enterprise Base) upward feature inheritance among feature sets Relevance - Create relevant feature set categories for today’s businesses and deployment / applications - NOT based purely on Cisco Router applications or historic LAN protocol feature set bias
Notes: * SSH is included in 5 packages: Adv Security, SP Services, Adv IP Services, Enterprise Services, and Adv Enterprise Services. SSH + VPN/IPSec in included in 3 of those 5 images: Adv Security, Adv IP Services and Adv Enterprise Services. Although 3DES is used in SSH connections, it does not automatically apply to overall traffic - i.e. IPsec/VPN is still required for the inclusion of 3DES for overall traffic encryption, which comes with "Advanced" packages. Logical Upsell theory Logical naming Unbundles security and voice features for entry level without other feature burdens Intentional price increases to support legacy protocols (Enterprise Base) upward feature inheritance among feature sets Relevance - Create relevant feature set categories for today’s businesses and deployment / applications - NOT based purely on Cisco Router applications or historic LAN protocol feature set bias
Notes: * SSH is included in 5 packages: Adv Security, SP Services, Adv IP Services, Enterprise Services, and Adv Enterprise Services. SSH + VPN/IPSec in included in 3 of those 5 images: Adv Security, Adv IP Services and Adv Enterprise Services. Although 3DES is used in SSH connections, it does not automatically apply to overall traffic - i.e. IPsec/VPN is still required for the inclusion of 3DES for overall traffic encryption, which comes with "Advanced" packages. Logical Upsell theory Logical naming Unbundles security and voice features for entry level without other feature burdens Intentional price increases to support legacy protocols (Enterprise Base) upward feature inheritance among feature sets Relevance - Create relevant feature set categories for today’s businesses and deployment / applications - NOT based purely on Cisco Router applications or historic LAN protocol feature set bias
Notes: * SSH is included in 5 packages: Adv Security, SP Services, Adv IP Services, Enterprise Services, and Adv Enterprise Services. SSH + VPN/IPSec in included in 3 of those 5 images: Adv Security, Adv IP Services and Adv Enterprise Services. Although 3DES is used in SSH connections, it does not automatically apply to overall traffic - i.e. IPsec/VPN is still required for the inclusion of 3DES for overall traffic encryption, which comes with "Advanced" packages. Logical Upsell theory Logical naming Unbundles security and voice features for entry level without other feature burdens Intentional price increases to support legacy protocols (Enterprise Base) upward feature inheritance among feature sets Relevance - Create relevant feature set categories for today’s businesses and deployment / applications - NOT based purely on Cisco Router applications or historic LAN protocol feature set bias