Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -Cisco ME 3400E Series Carrier Switch-01-Jun-2015 17:15 GMT

 

 

 

 

 

 

 


Known Bugs - ME 3400E Series Ethernet Access Switches

Bug Id:
CSCur21533
Title:
ME3400 processes pppoe packets on stp blocking port & for disabled vlan
Description:

Symptom:
ME-3400, acting as PPPoE Intermediate Agent, is wrongly processing PPPoE packets on:
- port that is in STP blocking state,
- vlan that is not allowed on a trunk.

This can trigger a loop and high CPU usage.

Conditions:
'pppoe intermediate-agent' configured.

Workaround:
None

Further Problem Description:
The following debug messages are seen when the issue occurs, using 'debug pppoe intermediate-agent packet'.

Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.050 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6)
Oct 7 14:40:37.050 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5)
Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.059 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6)
Oct 7 14:40:37.059 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5)
Oct 7 14:40:37.059 IST: %SW_MATM-4-MACFLAP_NOTIF: Host 0001.0700.0000 in vlan 10 is flapping between port Fa0/6 and port Fa0/5
Oct 7 14:40:37.059 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.059 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.067 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6)
Oct 7 14:40:37.067 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5)
Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input inE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6,
vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(60)EZ
Known Fixed Releases:
12.2(60)EZ6

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论