Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -Nexus 7000 Series Switch-01-Jun-2015 17:10 GMT

 

 

 

 

 

 

 


Field Notice for Nexus 7000 Series Switches

Title:
Field Notice: FN - 63975 - Nexus 7000 Supervisor 2 and 2E Embedded Flash Write Error
Description:

Cisco has identified an issue which might prevent write operations to the onboard embedded flash devices on Nexus 7000 Supervisor 2 (N7K-SUP2) and Supervisor 2E (N7K-SUP2E) modules that run NX-OS releases from Release 6.1(1) to 6.2(12).

Date:
29-MAY-2015

Find additional information in Field Notices

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Utilities
Release Version:
10.0(2)
Alert Type:
New File
File Name:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz
File Description:

Nexus 7000 Supervisor 2 Flash Recovery Tool. See Flash_Recovery_Tool_ReadMe file in the tarfile for more details.

File Release Date:
01-MAY-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Utilities
Release Version:
10.0(2)
Alert Type:
New File
File Name:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz
File Description:

Nexus 7000 Supervisor 2 Flash Recovery Tool. See Flash_Recovery_Tool_ReadMe file in the tarfile for more details.

File Release Date:
01-MAY-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Utilities
Release Version:
10.0(2)
Alert Type:
New File
File Name:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz
File Description:

Nexus 7000 Supervisor 2 Flash Recovery Tool. See Flash_Recovery_Tool_ReadMe file in the tarfile for more details.

File Release Date:
01-MAY-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS EPLD Updates
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS EPLD Updates
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Utilities
Release Version:
10.0(2)
Alert Type:
New File
File Name:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz
File Description:

Nexus 7000 Supervisor 2 Flash Recovery Tool. See Flash_Recovery_Tool_ReadMe file in the tarfile for more details.

File Release Date:
01-MAY-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Bug Id:
CSCul53679
Title:
DEV_CLP_FWD: L2LU IG_SA result merge fifo full Port Internal Err-Dis
Description:

Symptom:
Port set goes into error disabled state with the following error seen in the default VDC:

%MODULE-2-MOD_SOMEPORTS_FAILED: Module x (Serial number: xxxxxxxx) reported failure on ports Ethernet x/y-z (Ethernet) due to error in device DEV_CLP_FWD (device error 0xca802600)

The port group VDC reports the following:

2013 Dec 3 09:20:21.611 7K-VDC2 %ETHPORT-3-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/11 is down (Error disabled. Reason:Internal Error)
2013 Dec 3 09:20:21.623 7K-VDC2 %ETHPORT-3-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/10 is down (Error disabled. Reason:Internal Error)
2013 Dec 3 09:20:21.630 7K-VDC2 %ETHPORT-3-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/12 is down (Error disabled. Reason:Internal Error)
2013 Dec 3 09:20:21.643 7K-VDC2 %ETHPORT-3-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/9 is down (Error disabled. Reason:Internal Error)

Conditions:
Default VDC accounting log reports a 'L2LU IG_SA result merge fifo full' interrupt

Workaround:
Flap the Interface

Further Problem Description:
This is considered a non-fatal interrupt. The interrupt manifests when a MAC table look up result FIFO is deemed to be full and might cause packet drops.

The interrupt is informational only. Behavior is changed in 6.2(6) and later to report these as a log message rather than disabling the port.

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-MAY-2015
Known Affected Releases:
6.2(5.55)S3
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.65)S8, 6.2(5.66)S0, 6.2(6)
Bug Id:
CSCuq41441
Title:
FCoE: HDS: Performance issue in 7K/6K topology at the customer site
Description:

Symptom:
In the AT&T storage network the performance of SCSI over FCoE is extremely low compared to equivalent EMC array which was later found to be an issue with HDS storage and not N7K FCoE stack.

Conditions:
Please refer to AT&T topology for kings mountain data centre

Workaround:
None

Further Problem Description:
The problem was identified to be an issue with the HDS storage box and fixed by the Hitachi Team in the AT&T network. The problem has nothing to do with the N7K FCoE implementation.

Status:
Terminated
Severity:
1 Catastrophic
Last Modified:
02-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
Bug Id:
CSCut06852
Title:
N7K - BGP using set metric-type internal under RM not triggering update
Description:

Symptom:
The 'set metric-type internal' route-map configuration command causes BGP to advertise a MED that corresponds to the IGP metric associated with the next hop of the route

This command doesn't work properly in 6.1(4a), 6.2(12)

Whenever that command is applied to an BGP peer and there is change in the IGP cost of multiple ECMP in sequence, we don't always send an update to the peer with the new cost, so the eBGP neighbor is left with the old incorrect MED.

Conditions:
eBGP peering using an outbound route-map with 'set metric-type internal' and IGP cost change on multiple interfaces (ECMP) in sequence, ie

configure terminal
interface Eth1/1 ; ip ospf cost 1000
...
interface Eth1/8 ; ip ospf cost 1000
end

--
N7K# show ip bgp 10.39.176.0/21
10.38.0.5 (metric 1000) from 10.38.0.5 (10.38.0.5) << metric 1000 from above change IGP
Origin IGP, MED not set, localpref 100, weight 0
--
eBGP-peer# show ip bgp
Network Next Hop Metric LocPrf Weight Path
*>e10.39.176.0/21 100.65.97.64 2001 0 64801 i <<< metric 2001 is not refreshed
--

Workaround:
Use interface range:

configure terminal
interface Eth1/1 - 8
ip ospf cost 1000
end

Further Problem Description:
Note a soft bgp reset will trigger an update with correct MED

N7K# clear ip bgp 100.65.97.65 soft out

eBGP-peer# sh ip bgp
Network Next Hop Metric LocPrf Weight Path
*>e10.39.176.0/21 100.65.97.64 1000 0 64801 i <<< metric 1000 correct

This bug is fixed from 6.2(14) onwards in 6.2 release.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.1(4a), 6.1(4a)E1, 6.2(12), 7.2(0)D1(0.406)
Known Fixed Releases:
6.2(14)FB(0.25), 7.0(3)I1(1.211), 7.0(3)I1(2)
Bug Id:
CSCut61977
Title:
Crash after show forwarding route adjacency <interface> <ip address>
Description:

Symptom:
A ipfib process crash is seen. This may lead a HAP-Reset which could reload a module:

Nexus# sh core vdc-all
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 4 1 ipfib 18455 2015-03-26 11:06:19
1 4 1 ipfib 2173 2015-03-26 11:06:23
1 3 1 ipfib 12089 2015-03-26 11:06:29
1 3 1 ipfib 2173 2015-03-26 11:06:3

Conditions:
This occurs after the show forwarding route command is entered with the adjacency options.

Workaround:
Avoid using the show forwarding route adjacency command

Further Problem Description:
This is similar to the CSCur91392 bug but additional changes are needed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(14)FB(0.41)
Bug Id:
CSCtc83165
Title:
SNMP crash due to mutex lock assert fail in 4.2(2a)
Description:


Problem/Description:

Both Nexus 7000 and Nexus 5000 boxes will crash on snmpd pid.

Workaround:

Software upgrade

Further Actions:

gather show tech details and engage Cisco TAC.

Other:

`show cores`
Module-num Instance-num Process-name PID Core-create-time
---------- ------------ ------------ --- ----------------
1 1 snmpd 3870 Oct 2 10:30

Look for this in the output of

show logging nvram:

%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 3870) hasn't caught signal 11
(core will be saved).


Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
04-MAY-2015
Known Affected Releases:
4.2(2a)
Known Fixed Releases:
4.2(1)N2(1), 4.2(3), 4.2(3.19), 4.2(4), 7.2(0)ZN(0.111)
Bug Id:
CSCuu07787
Title:
iscm cores after LC reloads with 2 node ITD cofigs .
Description:

Symptom:
iscm cores after LC reloads with 2 node ITD cofigs .

Conditions:
iscm cores after LC reloads with 2 node ITD cofigs .

Workaround:
iscm cores after LC reloads with 2 node ITD cofigs .

Further Problem Description:
iscm cores after LC reloads with 2 node ITD cofigs .

Status:
Terminated
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases:
Bug Id:
CSCuh68097
Title:
aclqos hap-reset at aclqos_ses_dst_link_find
Description:

Symptom:ACLQOS crashed while collecting show tech

Conditions:show tech run while there was an outstanding session.

Workaround:avoid collecting show tech output

Status:
Other
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.2(1.136)
Known Fixed Releases:
Bug Id:
CSCtu30632
Title:
L2FM crash @ cmd_rx_handle_validate
Description:

Symptom:
SUP crash due to l2fm crash

Conditions:
5.2.x & 5.1.3

Workaround:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
5.2(0)
Known Fixed Releases:
5.2(3)S9, 5.2(3.8)S0, 6.0(2)S12, 6.1(0.151)S0
Bug Id:
CSCuu08389
Title:
R2D2:Speed patch failed & link not coming up(on etherchannel interfaces)
Description:

Symptom:
- 2 interfaces eth7/1 and eth8/1 stopped working. Module 7 and 8 are of ?N7K-M148GT-11L?
- Shut/No Shut will not resolve the issue, but reload of modules resolved the problem
- Similar bugs CSCtq34950 & CSCtf84832 (R2D2:Speed patch failed and Interface not comming up), which matches the issue closely, but they seem to be fixed in the version (6.2.2a) in which the customer is running.
- Trigger is unknown at this point.

Conditions:

Workaround:
Reload of module

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
Bug Id:
CSCuj67507
Title:
ipqosmgr process crash after applying a policy-map to vlan configuration
Description:

Symptom:
Multiple ipqosmgr process crashes occur leading to a sup reload. The reset-reason is due to a hap reset:

----- reset reason for Supervisor-module 2 (from Supervisor in slot 2) ---
1) At 526111 usecs after Thu Oct 3 16:46:43 2013
Reason: Reset triggered due to HA policy of Reset
Service: ipqosmgr hap reset
Version: 6.1(2)

Conditions:
This issue first occurred while applying a policy-map to vlan configuration 254. The last known configuration that was crashing looked like this:

policy-map type qos Crashes
class crash
police cir 56 kbps bc 200 ms conform transmit violate drop

Workaround:
None known

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
Bug Id:
CSCus76640
Title:
VXLAN:NVE crash on IPLUS 444 image with different triggers
Description:

Symptom:
NVE HAP Reset

Conditions:
NVE interface flap or during reloads on VPC pairs

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
7.1(0)ZN(91.444)
Known Fixed Releases:
7.1(1)N1(0.466), 7.1(1)N1(1), 7.1(1)ZD(0.11), 7.1(1)ZN(0.18)
Bug Id:
CSCut26394
Title:
M148 vPC secondly drop packet
Description:

Symptom:
when the vPC secondly configure as L2 ports , specific destination IP forwarding fail on M148 module.

Conditions:
when add the vlan information to vPC secondry :see the setting change logs

Workaround:
change the the dest dest IP ;VIP to SVI actual IP

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
Bug Id:
CSCuq77904
Title:
After ISSU to 6.2.10, Ethernet Interface suspended -in FCOE scenarios
Description:

Symptom:
ISSU is done to 6.2.10 S67 image after doing write erase on the switch.Once ISSU is done then replaying the ascii config which has config for the ethernet interfae,the ethernet interfaces are not coming up.

Conditions:
The conditions are
1> Copy the running config to a file
2> Do write erase
3> Then do ISSU to 6.2.10 S67 image
4> Replay the config

Workaround:
The work around is to do ISSU to 6.2.10 S67 with the running config intact. Or if not doing ISSU then do a fresh reload with the new image and then acii config replay.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
6.2(10)S67
Known Fixed Releases:
Bug Id:
CSCur21785
Title:
N7K - M1/M2 Egress Queuing behavior post 6.2(x) for control plane packet
Description:

Symptom:
Control plane packet ( marked with DSCP value for Example PIM etc ) received on ACCESS port, and then get bridged into same VLAN do not queued in priority Queue on Egress port. The issue is not seen after doing "no ip igmp snooping"

Conditions:
- Nexus 7000 running 6.2(x) image; Earlier images like 5.2(x) do not see the same condition.
- Packet is coming in ACCESS port and getting bridged into same VLAN via ACCESS or Trunk port.
- M series Line cards

Workaround:
Not available yet

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCup89222
Title:
F3: PBR causes misprogramming of route
Description:

Symptom:
FIB programming on the module does not match with the RIB. This causes traffic to be blackholed.

Conditions:
N7k running 6.2.8a.
PBR is applied on the ingress SVIs.
F3 module in use and was reloaded.

Workaround:
remove PBR and reapply it causes the programming to be corrected.

Further Problem Description:
N7k# sh ip route 129.186.254.131
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

129.186.254.131/32, ubest/mbest: 1/0, attached
*via 129.186.254.131, Vlan254, [250/0], 16:19:07, am

Module 5 is F3. There are 6 instances on the module.

N7k# sh sys intern for ipv4 route 129.186.254.131 module 5 det

RPF Flags legend:
S - Directly attached route (S_Star)
V - RPF valid
M - SMAC IP check enabled
G - SGT valid
E - RPF External table valid
129.186.254.131/32 , Vlan254
Dev: 0 , Idx: 0x109d6 , Prio: 0x62db , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x7 )
AdjIdx: 0x5c , LIFB: 0 , LIF: Vlan254 (0x7 ), DI: 0x0
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 1 , Idx: 0xd587 , Prio: 0x5b11 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x22 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 2 , Idx: 0x171fb , Prio: 0x48e3 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x23 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 4 , Idx: 0x1278f , Prio: 0x4b73 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x22 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan254
Dev: 5 , Idx: 0xe187 , Prio: 0x5ebe , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x7 )
AdjIdx: 0x73 , LIFB: 0 , LIF: Vlan254 (0x7 ), DI: 0x0
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3

Some of the instances have incorrect programming

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
6.2(10)S21, 6.2(6)S21, 6.2(7.28)S0, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S52, 6.2(10.16)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.271), 7.1(0)OTT(0.36), 7.1(0)PDB(0.209)
Bug Id:
CSCtq93304
Title:
Observing ARP service crash @arp_adj_timer_callback
Description:

Symptoms:

Nexus7000 report crash in the ARP service.

Conditions:

This issue is observed in Nexus7000 running 5.x releases.

Workaround(s):

None.

This issue should be fixed in 5.2(1) release onwards.




Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
5.0(2), 5.0(3)N2(2), 5.2(1)
Known Fixed Releases:
5.2(1)S43, 5.2(1.48)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCut53389
Title:
IPv6 access-list permit ipv6 any any does not match object correctly
Description:

Symptom:
We are experiencing an issue with IPv6 access-list. I am redistributing direct networks (connected subnets) into OSPFv3 using the following the route-map & ipv6 access-list. But it does not match & redistribute the loopback 781. Main purpose is to generate OSPFv3 external type-2 LSA for loopback 781. Looks like permit ipv6 any any rule apparently is not matching any-source or any-destination.

This issue is only experienced with ipv6 access-list & not with ipv4. Similar route-map & ipv4 access-list works just fine & OSPF advertised type-2 external LSA for the connected loopback.

Conditions:
We are experiencing an issue with IPv6 access-list. I am redistributing direct networks (connected subnets) into OSPFv3 using the following the route-map & ipv6 access-list. But it does not match & redistribute the loopback 781. Main purpose is to generate OSPFv3 external type-2 LSA for loopback 781. Looks like permit ipv6 any any rule apparently is not matching any-source or any-destination.

This issue is only experienced with ipv6 access-list & not with ipv4. Similar route-map & ipv4 access-list works just fine & OSPF advertised type-2 external LSA for the connected loopback.

interface loopback781
vrf member EDN
ipv6 address 2001:123:1:2:1::1/128

ipv6 access-list IPV6-DIRECT-NETS
10 permit ipv6 2001:123:1:2:1::1/128 any
20 permit ipv6 any any

route-map IPV6-DIRECT-NETS permit 10
match ipv6 address IPV6-DIRECT-NETS

AQ3-PT-7010-04# show runn ospfv3

!Command: show running-config ospfv3
!Time: Fri Mar 20 15:12:17 2015

version 6.2(10)
feature ospfv3

router ospfv3 EDN
bfd
router-id 44.44.44.44
log-adjacency-changes
address-family ipv6 unicast
redistribute direct route-map IPV6-DIRECT-NETS

interface loopback100
ipv6 router ospfv3 EDN area 0.0.0.1

interface port-channel1000.10
ospfv3 network point-to-point
no ospfv3 passive-interface
ipv6 router ospfv3 EDN area 0.0.0.1
ospfv3 bfd

interface port-channel1001.10
ospfv3 network point-to-point
no ospfv3 passive-interface
ipv6 router ospfv3 EDN area 0.0.0.1
ospfv3 bfd

interface port-channel1002.10
ospfv3 network point-to-point
no ospfv3 passive-interface
ipv6 router ospfv3 EDN area 0.0.0.1
ospfv3 bfd


AQ3-PT-7010-04#


AQ3-PT-7010-04# show ipv6 ospf route vrf EDN <--- IPv6 OSPF routing table is missing the Loopback 781 subnet locally & on other routers.
OSPFv3 Process ID EDN VRF EDN, Routing Table
(D) denotes route is directly attached (R) denotes route is in IPv6 RIB
(NHR) denotes next-hop is in IPv6 RIB
2001:11:11:11::11/128 (inter)(R) area 0.0.0.1
via fe80::66a0:e7ff:fe44:cfc1/Po1002.10 , cost 2 distance 110 (NHR)
2001:22:22:22::22/128 (inter)(R) area 0.0.0.1
via fe80::da67:d9ff:fe08:c441/Po1001.10 , cost 2 distance 110 (NHR)
2001:33:33:33::33/128 (intra)(R) area 0.0.0.1
via fe80::4255:39ff:fe0c:8dc1/Po1000.10 , cost 2 distance 110 (NHR)
2001:44:44:44::44/128 (intra)(D) area 0.0.0.1
via fe80::da67:d9ff:fe0d:c2/Lo100* , cost 0 distance 110 (NHR)
2001:1131:193::/64 (inter)(R) area 0.0.0.1
via fe80::66a0:e7ff:fe44:cfc1/Po1002.10 , cost 4 distance 110 (NHR)
via fe80::da67:d9ff:fe08:c441/Po1001.10 , cost 4 distance 110 (NHR)
2001:1131:193:1::/64 (intra)(R) area 0.0.0.1
via fe80::4255:39ff:fe0c:8dc1/Po1000.10 , cost 4 distance 110 (NHR)
via fe80::66a0:e7ff:fe44:cfc1/Po1002.10 , cost 4 distance 110 (NHR)
2001:1131:193:2::/64 (intra)(D) area 0.0.0.1
via fe80::da67:d9ff:fe06:641/Po1001.10* ,

Status:
Open
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCus42535
Title:
Anycast-HSRP bundle Active/Active - after pulling out Active SUP N7k
Description:

Symptom:
After pulling out the Active supervisor from the N7k, Some of the Anycast-HSRP bundles are in Active/Active state.
This is causing the Anycast-HSRP state to be in Active/Active and their standby state to be unknown on both sides.

Conditions:
Physically pull out the Active supervisor from the N7k

Workaround:
Reinsert the pulled supervisor.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCur77280
Title:
N6k m2rib missing interfaces from OIFL
Description:

Symptom:
Multicast/broadcast packet drops on certain vlans.

Conditions:
After flapping several links or recreating fabricpath vlans in specific order.

Workaround:
Remove and add back vlan, trying to start from the spines and then going to the leafs.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases:
7.0(1)ZN(0.736), 7.0(6)N1(0.236), 7.0(6)N1(0.4), 7.0(6)N1(1)
Bug Id:
CSCus77610
Title:
N7710G: ports down due to UDLD empty echo after neighbor LC reloaded
Description:

Symptom:
Link may go to errdisable state with "UDLD empty echo" very rarely when line card reload

Conditions:
On 10G board, configure
1. UDLD protocol enabled
2. Option "system default link-fail laser-on" enabled
3. interface debounce time is set to 0

then reload the line card.

Workaround:
1. shut/no shut the port that in "errdisable" state, or
2. configure the link debounce time to 10ms or larger, or
3. disable the UDLD protocol, or
4. configure "no system default link-down laser-on" option

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)PDB(0.373), 7.2(0)VOF(0.2)
Bug Id:
CSCtq57444
Title:
N7K: MPPM Parity Error in Naxos ASIC
Description:

Symptom:

STP shows vlan in PVID_Inc state on trunk port between two N7K-C7010 w/N7K-M132XP-12 module

Conditions:

N7K-C7010 (E1/9, E2/9) === (E1/9,E2/9) N7K-C7010

PVID-Inc state seen after one port in Etherchannel(E1/9) was bounced to recover from UDLD err-disabled state.

Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
4.2(8)S28, 4.2(8)S30, 4.2(8)S32, 4.2(8)S33, 4.2(8.102)S0, 4.2(8.103)S0, 4.2(8.104)S0, 5.1(10.37)S0, 5.1(10.38)S0, 5.1(5)S1
Bug Id:
CSCus09312
Title:
PVLAN:VPC PO member (M1 LC) flaps.
Description:

Symptom:
Port-channels which have
1) PVLAN trunk secondary config
and
2)LACP or other control protocols running,
could flap continuously, due to BPDU's not flowing. They don't flow because the native vlan is in CBL disabled state, instead of being in CBL Blocking state.

Conditions:
The issue is specific to M1 module since the programming model is different on F2/F3 LC's.
There is no issue on F2 and F3 modules.

Even if the customer uses M1 module there is NO issue, if customer is allowing native VLAN on VPC Leg.

Below are the 3 conditions that need to be satisfied to hit this bug:
1) PVLAN port mode should be TRUNK Secondary
2) Native VLAN is NOT allowed on VPC Leg
3) LC Module should be M1 module

Workaround:
Workaround is to have customer have the native vlan in allowed list for the port, by configuration.

For a private-vlan port, the command to add trunk allowed vlan 1 would be:
switchport private-vlan trunk allowed vlan 1

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
6.2(10)S102, 6.2(12)FT(0.7)
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)PDB(0.382)
Bug Id:
CSCut36425
Title:
F3 in FP transit mode - All traffic drop due to ports in CE mode
Description:

Symptom:
All traffic is dropped on whole LC for various reasons - CBL drop, MIM on edge port etc - depending on interface configuration.

Conditions:
Issue can only on VDC/device in FabricPath in transit mode "fabricpath mode transit"
Trigger for issue is ISSU or restart of IFTMC process on line card (for example after crash of process)

Workaround:
Reload affected module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)PDB(0.382)
Bug Id:
CSCut35336
Title:
after reload itd needs restart , means the user has to typein sh nosh
Description:

Symptom:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Conditions:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Workaround:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Further Problem Description:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
7.2(0)D1(0.430)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.444), 7.2(0)RTG(0.129), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6), 7.2(0)ZD(0.127)
Bug Id:
CSCut78387
Title:
l2fm crash @l2fm_rvtep_free_entry after shut/no shut nve interface.
Description:

Symptom:
l2fm crash

Conditions:
shut/no shut nve interface

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.482), 7.2(0)ZD(0.162)
Bug Id:
CSCur28450
Title:
[6210-S100] Rollback to a checkpoint fails verification at FEX SAT PO
Description:

Symptom:
Rollback fails the verification phase, saying "flowcontrol send on" is present in the running-config on the port-channel.

switch# rollback running-config checkpoint checkpoint_name



Verification patch contains the following commands:
---------------------------------------------------
!!
interface port-channel###
no flowcontrol send on
exit

Conditions:
When trying to rollback to a checkpoint where a current HifPC (a port-channel with FEX host interfaces as its members) becomes a simple port-channel (no FEX host interfaces as its members), rollback will fail the verification phase.

Workaround:
Rollback running checkpoint checkpoint_name best-effort
So that it wont do verification and won't revert back to original running config.
And then do "no flowcontrol send on" on the affected interfaces

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.439), 7.2(0)PDB(0.360), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCtg34081
Title:
ISSU failed due to VPC config lock
Description:

Symptom:

ISSU fails at the very end.

Conditions:

A switch that contains 2 x VDC's running as a VPC pair.

Workaround:

Don't use VPC across 2 x VDC in the same switch.
This configuration is an unsupported topology.

Status:
Terminated
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
4.2(4), 5.1(0.126)
Known Fixed Releases:
Bug Id:
CSCuu20517
Title:
itd scaling up, we see rate-limiter getting hit
Description:

Symptom:
itd scaling up, we will see rate-limiter getting hit. For F3 the rate-limiter was about 30,000 pps

refer to attached mail for more details.

Conditions:
itd scaling up, we will see rate-limiter getting hit. For F3 the rate-limiter was about 30,000 pps

refer to attached mail for more details.

Workaround:
itd scaling up, we will see rate-limiter getting hit. For F3 the rate-limiter was about 30,000 pps

refer to attached mail for more details.

Further Problem Description:
itd scaling up, we will see rate-limiter getting hit. For F3 the rate-limiter was about 30,000 pps

refer to attached mail for more details.

Status:
Open
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
7.2(0)D1(0.459)
Known Fixed Releases:
Bug Id:
CSCtr79909
Title:
N7K-M132XP-12 linecard reload, eobc errors reported on supervisor
Description:

Symptoms:

N7K-M132XP-12 linecard might reload with the following messages:
%MODULE-4-MOD_WARNING: Module 1 (serial: XXXXXXXXXX ) reported warning due to
EOBC heartbeat failure in device 10 (device error 0xc000604f)
%MODULE-4-MOD_WARNING: Module 1 (serial: XXXXXXXXXX ) reported warning due to
EOBC heartbeat failure in device 10 (device error 0xc000604d)
%MODULE-2-MOD_NOT_ALIVE: Module 1 not responding... resetting (serial: XXXXXXXXXX)

Conditions:

This issue is seen with N7K-M132XP-12 on Nexus7000 running 5.x release.

Workaround:

None.

Linecard comes back up and resumes operation after reload.

Further Problem Description:

If the above issue is seen, please contact Cisco TAC.

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
5.1(3)
Known Fixed Releases:
5.2(6), 6.1(2)
Bug Id:
CSCup35883
Title:
Multicast Vinci A/B: SG stuck when RP on border router
Description:

Symptom:
Multicast Vinci A/B: SG stuck when RP on border router after traffic stop

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.0(2)N3(1), 7.1(0)D1(0.162), 7.1(0)D1(0.163), 7.1(0)D1(0.179)
Known Fixed Releases:
7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.238), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.14), 7.1(0)PDB(0.141)
Bug Id:
CSCup11149
Title:
isis_build_p2p_iih: Error ckt type when passive configured on interface
Description:

Symptom:
adj is not up

Conditions:
with passive interface configured

Workaround:
restart isis

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
7.1(0.1)
Known Fixed Releases:
7.0(0)HSK(0.317), 7.1(0)D1(0.207), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.258), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)PDB(0.155), 7.1(0)RTG(0.12)
Bug Id:
CSCun54357
Title:
SSTE: URIB crashed at urib_chlist_elem_delink_free
Description:

Symptom:
The process urib might crash due to urib_chlist_elem_delink_free.

Conditions:
The symptoms is observed with RFC5549/MEv6/BGP-PIC with scale setup and during churns.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(7.12)S0, 6.2(7.19)S0, 6.2(7.21)S0, 6.2(8)IAS(0.15)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.30)S0, 6.2(8), 6.2(8)E1, 6.2(8)IAS(0.17), 6.2(9)FM(0.37), 7.0(0)BNZ(0.23), 7.1(0)D1(0.113), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCur57579
Title:
N7K: MTS queue (pers_q) buffer is getting full and LACP stops working
Description:

Symptom:
%LACP-5-LACP_SUSPEND_INDIVIDUAL: LACP port Ethernet7/18(0x1a311000) of port-channel Ethernet7/18(0x1a311000) not receiving any LACP BPDUs suspending (individual) port

show inter eth152/1/10
Ethernet152/1/10 is down (Internal-Fail errDisable, port-channel: required service is not responding)

MTS messages destined to LACP (SAP 347) are stuck in the persistent

N7K#show system internal mts buffers summary
node sapno recv_q pers_q npers_q log_q

sup 347 0 128281 0 0


SAP 347 is LACP.
"sup" refers to default VDC, "sup-1" to 2nd VDC and so on.
This issue can happen in any VDC.

Conditions:
Currently the known condition is when the command "show lacp interface " is executed, and that interface using LACP.

this issue is seen when the Nexus is using either fast-rate or normal rate LACP PDU's.


Workaround:
Do not issue the "sh lacp int " command CLI, SNMP or through any automated scripts.



More Info:




Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.0(2)A5(1), 6.0(2)U5(1), 6.1(2)I3(2.16), 6.1(2)I3(2.21), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8)
Bug Id:
CSCun76034
Title:
FCoE-FEX:Ser SAP Plcmgr Err 0x40480003 (no such pss key) in if_bind seq
Description:

Symptom:
In XBOW running 7.1(0)D1(0.64)S1 observing that the allocation of interfaces to eth vdc failed due to GIM returned 40480003 [no such pss key] after reload.

Conditions:
In XBOW running 7.1(0)D1(0.64)S1 observing that the allocation of interfaces to eth vdc failed due to GIM returned 40480003 [no such pss key] after reload.

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
7.1(0)D1(0.64)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.1(0)BF(0.102), 7.1(0)D1(0.99), 7.1(0)FC(0.2), 7.1(0)I1(0.17), 7.1(0)I1(1), 7.1(0)NF(0.28), 7.1(0)PDB(0.60), 7.1(0)ZD(0.144)
Bug Id:
CSCuu22098
Title:
IFTMC miss-programmed on promiscuous port when secondary PVLAN deleted
Description:

Symptom:
All ingress traffic on promiscuous is dropped.

Conditions:
When secondary PVLAN is deleted that is being mapped on a promiscuous port.

This has also been triggered when creating a VLAN that is already being mapped on promsicious port.

Workaround:
Shut/no shut the promiscuous port.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCul76436
Title:
6.2.5.70.S0: xbow: show commands not working - "Cannot allocate memory"
Description:

Symptom:
cli interface is not working due to memory issue

Conditions:
none

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(5.67)S0, 6.2(5.70)S0, 7.1(0)D1(0.22), 7.1(0)D1(0.43), 7.1(0)D1(0.58), 7.1(0)D1(0.64), 7.1(0)VG(0.2)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(6), 6.2(6)S1, 6.2(6.1)S0, 6.2(6.13)S0, 7.0(0)FVX(0.87), 7.1(0)D1(0.117)
Bug Id:
CSCus57051
Title:
Hsrp_Engine crash during ISSU from 6.2(8a) to 6.2.10
Description:

Symptom:
Failure recovery action::

"Standby will be rebooted to force netboot and image download".

Install has failed. Return code 0x4093005E (system switchover failed).
Please identify the cause of the failure, and try 'install all' again.

Conditions:
ISSU from 6.2(8a) to 6.2.10

Workaround:
Upgrade without ISSU

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(12)S27, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.398), 7.2(0)N1(0.87), 7.2(0)N1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCuq55749
Title:
HSRP MGO: Slave may enter Init due to 'No Master for Slave'
Description:

Symptom:
When using HSRP MGO an attempt to configure a new HSRP follow group may result in this group being stuck in the Initial state with HSRP reporting a reason of "No Master for Slave".

Conditions:
HSRP MGO is configured and some HSRP follow groups are deleted from running config after which a supervisor switchover is performed.

Workaround:
Delete all affected stuck follow groups. Delete and reconfigure master group. Reconfigure follow groups.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(8)S11
Known Fixed Releases:
6.2(10), 6.2(10)S92, 6.2(10.16)S0, 6.2(8)E10, 7.1(0)AV(0.38), 7.1(0)D1(0.289), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.363), 7.1(0)N1(1)
Bug Id:
CSCuo77566
Title:
OTV Overlay Interface stuck at "Cleanup in Progress"
Description:

Symptom:
Under certain sequence of events, OTV Overlay Interface goes into a stuck state showing "Cleanup in Progress".
Once in this stuck state, delete/re-configuration of Overlay interface does not recover this, below error message is seen:
"Overlay in delete holddown, reject command"

Conditions:
Issue seen on N7k / Sup2 / 6.2(2)
Issue seen to carry over through ISSU to 6.2(6a).

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S3, 6.2(10.5), 7.0(0)HSK(0.317), 7.1(0)D1(0.178), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.220), 7.1(0)N1(1), 7.1(0)NF(0.28)
Bug Id:
CSCut39102
Title:
stp disputes are seen during vdc reload in vPC + setup
Description:

Symptom:In a VPC+ setup running MST and with a large scale logical port count , on reloading the primary peer, stp disputes may sometimes be seen on the secondary switch.
Conditions:*VPC+ scenario.
*Primary Peer reload


Workaround:More Info:If disputes occur, they will clear as soon as the secondary switches to Operational primary.



Status:
Open
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
7.2(0)D1(0.441), 7.2(0)D1(0.451)
Known Fixed Releases:
7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.451), 7.2(0)D1(0.455), 7.2(0)D1(0.470), 7.2(0)RTG(0.143), 7.2(0)RTG(0.150), 7.2(0)VOF(0.2), 7.2(0)ZD(0.136)
Bug Id:
CSCus57881
Title:
VPC PO continuously flapping when untagged frame statement exist
Description:

Symptom:
When a profile containing a "untagged frame VNI" configuration is mapped to a vPC port channel the port channel will be unstable and continuously flap.

Conditions:
The issue will be seen with link level protocols like LACP etc. Due to the 'untagged VNI frame' configuration applied to the port, the following behavior is seen: the LACP untagged packet coming in hits the port profile and gets the VNI encapsulation. Then the VSI if index is determined when the packet reaches the SUP. The packet is then forwarded to the client (LACP in this case )with the physical if index value replaced by the VSI ifindex. The client expects the packet to contain the physical if index and not the VSI if index, this causes the port lookup to fail and the packet gets dropped at the client.

Workaround:
NONE

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-MAY-2015
Known Affected Releases:
7.2(0)D1(0.386)
Known Fixed Releases:
Bug Id:
CSCty86291
Title:
MTS buffer exhaustion with sequential add of large vlans.
Description:

Symptom:
Memory leak .

Conditions:
The condition can trigger if huge number of Vlans along with name are created without range command. Basically using script or copying some thing from note pad to Nexus7000 in config mode.
For Example.
conf t
vlan 2000
name D-Lan-n7000
vlan 2001
name D-Lan-n7001
vlan 2002
name D-Lan-n7002
vlan 2003

----Snip-----

vlan 2297
name D-Lan-n72297
vlan 2298
name D-Lan-n72298
vlan 2299
name D-Lan-n72299
vlan 2300
name D-Lan--n72300
end

Workaround:
To avoid this problem first creat just Vlans using range command as follows.

Config t
vlan 2000-2300

Make sure L2 Vlans are created.

After that one can cut and paste Vlan name config from txt file.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-MAY-2015
Known Affected Releases:
5.2(3a), 5.2(4.68), 6.0(4)
Known Fixed Releases:
5.2(1)N1(6.93), 5.2(1)N1(7), 5.2(4.70)S0, 6.0(2)N2(4.60), 6.0(2)N2(5), 6.1(0.268)S0, 7.0(1)ZN(0.550), 7.0(4)N1(0.157), 7.0(4)N1(1), 7.1(0)N1(0.301)
Bug Id:
CSCuc24368
Title:
Netstack - TCPUDP hang on to opcode 86017 for an extended amount of time
Description:

Symptom:
The interface might be down due to Error disabled. Reason: fu unknown error.
Conditions:
The symptom is observed after reload with a scale setup wtih MIB polling and when MTS buffers is filled.
Workaround:
Once the MTS buffers is recovered, shut/no shut interface that is down will bring up the interface.

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-MAY-2015
Known Affected Releases:
6.1(2), 6.1(2)S1, 6.1(2)S27, 6.1(2)S3, 6.1(2)S8, 6.2(0.233)S7, 6.2(0.265)S4, 6.2(0.287)S4, 6.2(1X)
Known Fixed Releases:
Bug Id:
CSCun93402
Title:
PIM process leaking memory
Description:

Symptom:
A Cisco Nexus switch may see a memory leak in the PIM process. The following command can be used to examine the memory being used by the PIM process:
show ip pim internal mem-stats detail

A sign of this leak is to see the PIM_MEM_RPF_SOURCE_IPC allocations growing without bound.

Conditions:
The current conditions to trigger the leak are unknown at this current time.

Workaround:
There is no workaround at this time. If the process in question consumes all of the allowed memory pim functions and commands may cease to work. If the process does not crash TAC can kill the process manually which will allow the process to restart and become operational.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)N3(0.111), 6.0(2)N3(1), 6.2(0)HS(0.10), 6.2(8), 6.2(8)S10, 6.2(8.5), 7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)ZD(0.267), 7.0(1)ZN(0.581)
Bug Id:
CSCtz53329
Title:
Standby sup stuck in powered-up: syslogd failed to store its snapshot
Description:

Symptom:
This bug affects both Nexus 7000 and MDS platforms.

Standby supervisor reloads continuously. show logging nvram
contains the following messages:

%SYSMGR-2-GSYNC_SNAPSHOT_SRVFAILED: Service "syslogd" on active supervisor
failed to store its snapshot (error-id 0x80480018).
%SYSMGR-2-STANDBY_BOOT_FAILED: Standby supervisor failed to boot up.

Conditions:
This issue only occurs if the standby supervisor reloads many times.

Workaround:
None. Contact Cisco TAC to recover from this issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-MAY-2015
Known Affected Releases:
5.2(2d), 5.2(4)
Known Fixed Releases:
5.2(4.80)S0, 7.0(1)ZD(0.3)
Bug Id:
CSCtk36830
Title:
Snmpd doesn't respond after KERNEL-2-SYS-MSG started appearing.
Description:

Symptoms:

In Nexus7000, SNMP process stop responding after reporting KERNEL-2-SYS-MSG messages.

Conditions:

This issue is seen in Nexus7000 running 5.x releases.

Workaround:

None.

This issue should be fixed in 5.2(1) or later releases.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
11-MAY-2015
Known Affected Releases:
5.2(0.137), 5.2(0.154), 5.2(0.154)S11, 5.2(0.41), 5.2(0.84)
Known Fixed Releases:
5.2(0.176)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCtn64672
Title:
l2fm crash if too many MAC address move over vpc peer link
Description:

Symptom:
If there are too many mac address moves over vpc peer link.
Somtimes, only the process l2fm crash. Sometimes the chassis may
reload. Show system reset-reason shows that the reload reason is
caused by l2fm hap reset.

Conditions:
The exact condition is unknown. Issue has been seen in 5.1(x), 5.2(3a), 6.0(2) and below.

Workaround:
None. Upgrading to 5.2(4), 6.0(3), or later will resolve issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
5.1(2), 5.2(3.38), 5.2(3a)
Known Fixed Releases:
5.2(4)S1, 5.2(4.1)S0, 6.0(2)E1, 6.0(3)S1, 6.1(1)
Bug Id:
CSCuo24939
Title:
Memory leak when modifying ACLs
Description:

Symptom:
A memory leak in the aclmgr process is seen. After checking the memory we see the following is leaking:

Lib ID: 0x1
Mem stats for UUID : Non mtrack users(0) Max types: 177
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX

2 [r-xp]/isan/plugin/0/isan/bin/aclmgr 5285752 5285756 363171903 363181841

The leak will eventually lead to a process crash and could result in a system reload due to a HAP Reset.

Conditions:
This issue is seen while a script dynamically modifies ACLs. We are still looking into the exact conditions of this issue.

This leak happens when user is using "configure session" to configure ACLs.
It is also seen if user configures time-ranges.

Workaround:
Do not use configure session to configure ACLs dynamically.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.2(10)S73, 6.2(2a)
Known Fixed Releases:
6.1(2)I3(2.10), 6.1(2)I3(3), 6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.19), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(3)I1(0.138)
Bug Id:
CSCus14797
Title:
Unexpected VDC reset and aclmgr core created
Description:

Symptom:
A Nexus 7000 running 6.2(8a) has faced an unexpected reset of one of its VDCs. After the reset, that VDC was not booting up properly and its interfaces were listed in state 'unknown'. A few minutes later, an aclmgr core file was written:

`show cores`
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
3 5 1 aclmgr 22993 2014-12-08 15:27:29

Conditions:
ACL changes were made prior to the issue.From the crash decode, it seems like crash has happened while issuing "show startup config"

Workaround:
Unknown

Further Problem Description:
We tried really hard to repro from dev side but could not able to repro it.

Status:
Terminated
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCui04729
Title:
Memory leak on eureka_usd while polling cshcMacUsageEntry
Description:

Symptom:
M1/M2 module might be reloaded due to memory leak after SNMP walk against cshcMacUsageTable in CISCO-SWITCH-HARDWARE-CAPACITY-MIB.
A core file with eureka_usd_log in the name will be generated.
A syslog similar to Service "eureka_usd" (PID 1234) hasn't caught signal 6 (core will be saved) will be generated.

Conditions:
Problem only exists on M1 or M2 modules while SNMP walk against cshcMacUsageTable in CISCO-SWITCH-HARDWARE-CAPACITY-MIB.

Workaround:
Restrict access to the following:
cshcMacUsageEntry in CISCO-SWITCH-HARDWARE-CAPACITY-MIB (1.3.6.1.4.1.9.9.663.1.1.1.1.1)

Further Problem Description:
Problem exists only in 6.1(4).
Fixes had been integrated into 6.1(4a), 6.2(2) and later releases.

Memory usage can be monitored with the following command:
switch# slot slot show processes memory | grep eureka_usd
2182 3051520 0 CurrentMemoryUsage 7fe3aa80/7fe3a460 eureka_usd

Example configuration for blocking only cshcMacUsageEntry in CISCO-SWITCH-HARDWARE-CAPACITY-MIB:
snmp-server community communityString group name
role name name
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.663.1.1.1.1.1

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
6.1(4.97)S0, 6.1(4a), 6.1(4a)S2, 6.1(5.32)S0, 6.2(2), 6.2(2)S6, 6.2(5.2)S0, 7.0(0)ZD(0.84)
Bug Id:
CSCuc37616
Title:
SNMPd crashed on ACSII replay of config file
Description:

Symptom:
Nexus 7000 may experience a crash at the snmpd process.

Conditions:
MTS buffers may leak and after a few minutes, triggers snmpd to crash.

KERN-2-SYSTEM_MSG [ 7920.428773] mts_is_q_space_available_new(): NO SPACE


Workaround(s):
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
5.2(8)S1, 6.1(0.198)S3, 6.1(0.237)S7, 6.1(2), 6.1(3)S4, 6.2(0.283)S0, 6.2(0.284)S19, 6.2(0.284)S5, 6.2(0.285)S1, 6.2(0.294)S2
Known Fixed Releases:
6.1(3.25)S0, 6.1(3.32)S0, 6.1(4.1)S0, 6.1(5), 6.2(0.282)S0, 6.2(0.286)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCui33374
Title:
622.S19:: vsh core see in fex_xbow_f2e
Description:

Symptom:
VSH Crashed when show accounting log is triggered.

Conditions:
When we execute show accounting log / show tech support which will trigger show accounting log

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.2(2)S19
Known Fixed Releases:
6.0(2)U3(0.646), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1), 6.1(2)I3(2.26), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(2), 6.2(2)S24
Bug Id:
CSCua39287
Title:
System reloads due to TACACS+ process crash
Description:

Symptom:
NX-OS system running 5.2.5 may reload due to TACACS+ process crash.

Conditions:
This issue may occur when TACACS+ is configured for remote accounting. It is caused by a high rate of invalid accounting packets (2 to 3 every second) which create "invalid_ip@" records in the accounting log. This may be confirmed with the following command:

show accounting log | i invalid_ip@

Workaround:
Disable the remote accounting for tacacs.

This can done by removing the aaa accounting config statement for tacacs.

ex:
switch(config)# no aaa accounting default xxxx

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
5.2(5)S8
Known Fixed Releases:
5.2(1)N1(5), 5.2(6)S14, 5.2(6.16)S0, 5.2(7), 6.1(1)S39, 6.1(1.41)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCul35819
Title:
BPDUGuard not Activated on Disallowed Edge Trunk VLANs
Description:

Symptom:
BPDUs from a remote device do not activate BPDUGuard on an edge trunk port.

Conditions:
- Remote device misconfigured as an access port
- VLAN on access port is not in the allowed VLAN list of the edge trunk

Workaround:
Configure both sides of the link correctly as either trunks or access interfaces.

Further Problem Description:
A loop can occur on redundant connections when the untagged access side traffic loops into the native VLAN on the trunk side of the link. The loop can be prevented by not allowing the native VLAN on the link.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
6.0(2)A4(0.810), 6.0(2)A4(1), 6.0(2)U4(0.810), 6.0(2)U4(1), 6.1(2)I3(1.26), 6.1(2)I3(2), 6.2(10), 6.2(10)EC(0.10), 6.2(10)FM(0.18), 6.2(10)NO(0.19)
Bug Id:
CSCtw84257
Title:
nexus 7010 crash on CoPP during manual switchover after ISSU
Description:

Symptom:
nexus 7010 crash on CoPP and All LED of LC turned RED expect supervisor engine
network outage happened at this moment
cores has generated

`show cores`
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 5 1 copp 7013 2011-11-30 18:00:44
1 5 1 copp 4511 2011-11-30 18:00:48

Conditions:
upgraded from 5.1.3 to 5.1.4 using ISSU and then manual swichover

Workaround:
reload chassis

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
5.1(3), 5.1(4)
Known Fixed Releases:
5.2(4)S7, 5.2(4.8)S0
Bug Id:
CSCuq96869
Title:
CNH programmed to 0/0, Null0
Description:

Symptom:
Some routes may either be missing or mis-programmed.

Conditions:
At VDC reload some early new route updates might be processed and dropped before processing the vdc-create. this causes ipfib to ignore the messages since they will be treated as invalid. Issue is seen during line card reload and during issu as well.This is a corner case timing issue and very rare

Workaround:
re download the routing table using 'clear ip route *' and 'clear ip arp' . In some cases flapping the layer 3 interface/interface vlan which is used to reach the next-hop can also clear the problem. Finally if the above workaround does not work reload of the module will be required.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.2(10)S73, 6.2(8b)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)OTT(0.45), 7.1(0)PDB(0.241)
Bug Id:
CSCug81339
Title:
Service "Security Daemon" crashes with heartbeat failure
Description:

Symptom:
Security Daemon crashes with heardbeat failure with the following output in logs

%SYSMGR-3-HEARTBEAT_FAILURE: Service "Security Daemon" sent SIGABRT for not setting heartbeat for last 6 periods. Last heartbeat 3
88.97 secs ago.
%SYSMGR-2-SERVICE_CRASHED: Service "Security Daemon" (PID 6144) hasn't caught signal 6 (core will be saved).?

Note, this bug applies to Nexus 1000V switch also for 5.2(1)SM1, and 4.2(1)SV2

Conditions:
No specific conditions, can occurr randomly

Workaround:
Unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.2(3), 6.2(8)
Bug Id:
CSCua21616
Title:
tacacs process crashed while running codenomicon authentication suite
Description:

Symptom:
tacacs servcie crash on sup on Nexus 7k
Conditions:
When running authentication suite attack from Codenomicon test tool the "tacacs" service is crashing.
Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.1(0.293)S0
Known Fixed Releases:
6.0(2)A1(1b), 6.0(2)U1(2), 6.1(1)S14, 6.1(1.13)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCtn97658
Title:
statsclient mts buffer leak
Description:


Clear mts buffer anytime this happens, using the following hidden debug command:

debug mts drop node [node] sap [sap] from [Queue] opcode [opcode] age [seconds]

The values for the command, can be found out from the output of "show sys
internal mts buffers detail"

Example:

show sys internal mts buffers detail:

Node/Sap/queue Age(ms) SrcNode SrcSAP DstNode DstSAP OPC MsgId MsgSize
sup/2582/recv 2400964154 0xE02 980 0x901 2582 26 100560 840


debug mts drop node sup sap 2582 from recv opcode 26 age 2400964154

Symptom:
Processes can not communicate with statsclient process on that module
(affecting statistics collection on a module). slow switch response when
entering commands , portchannel malfunction or the KERN-2-SYSTEM_MSG logging
messages.


KERN-2-SYSTEM_MSG mts_print_longest_queue_state: opcode counts for first and
last 50 messages in recv_q of sap 2582: - kernel
KERN-2-SYSTEM_MSG mts_print_msg_opcode_in_queue: opcode 26 - 100 messages -
kernel
KERN-2-SYSTEM_MSG mts_do_msg_input() failing since no space available in 2582
(src_sap = 2582, opc = 26) - kernel

Conditions:
When the linecard CPU is busy. (cpu being busy is the cause of the mts buffers
leak. Not viceversa).
Under rare conditions when processor is busy, there can be mts buffer leak when
the statsclient process is unable to respond to requests within specified time
limit. If this rare condition persists for months, then processes cant
communicate with statsclient process on that module (affecting statistics
collection on a module).

Workaround:
Clear mts buffer anytime this happens, using the following hidden debug command:

debug mts drop node [node] sap [sap] from [Queue] opcode [opcode] age [seconds]

The values for the command, can be found out from the output of "show sys
internal mts buffers detail"

Example:

show sys internal mts buffers detail:

Node/Sap/queue Age(ms) SrcNode SrcSAP DstNode DstSAP OPC MsgId MsgSize
sup/2582/recv 2400964154 0xE02 980 0x901 2582 26 100560 840


debug mts drop node sup sap 2582 from recv opcode 26 age X

X (Age value) has to be be a small value in the range that the command accepts, like 10.


Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
5.0(5), 5.3(0.112), 6.0(0.1)
Known Fixed Releases:
5.2(1)S40, 5.2(1.46)S0, 5.3(0.185)S0, 6.0(0.2)S0
Bug Id:
CSCud76710
Title:
SNMPD crashes when writing invalid OID
Description:

Symptom:
snmpd crashes when performing set operation for OID 1.3.6.1.4.1.9.9.367.1.3.1.1.8

Conditions:
When a set operation is performed for OID 1.3.6.1.4.1.9.9.367.1.3.1.1.8 (cAAAServerProtoDirectedReq).
the valid writable OID for cAAAServerProtoDirectedReq are 1.3.6.1.4.1.9.9.367.1.3.1.1.8.1 and 1.3.6.1.4.1.9.9.367.1.3.1.1.8.2

Workaround:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.2(0.287)S8
Known Fixed Releases:
6.2(1)S6, 6.2(1.11)S0, 6.2(2), 7.0(0.5)
Bug Id:
CSCuj75984
Title:
Polling of cbqos-mib will cause the device to crash, frequently
Description:

Symptom:
Sup experiences crashes causing service interruption.

Conditions:
Frequent polling of the cbqos-mib.
This problem is also observed when issuing show policy-map interface command.

Workaround:
If disabling SNMP is an option, please consider disabling it.

Further Problem Description:
Will be provided soon

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.1(3), 6.2(5)BF(0.51), 6.2(5.45)S2, 6.2(5.62)S0
Known Fixed Releases:
6.1(2)I3(1), 6.1(4.94)S0, 6.1(5), 6.2(0)HS(0.10), 6.2(5)BF(0.52), 6.2(5.71)S0, 6.2(6)
Bug Id:
CSCup16103
Title:
N7k: Copp fails to rate limit Pause frames from Hosts on 2248TP type FEX
Description:

Symptom:
Pause frames from Host reach the 7K CPU

Conditions:
Issue seen when host is connected to FEX N2248TP and host is sending a PAUSE storm
Affects both 6.2(6a)/6.2(8)

Workaround:
Offending host generating pause frames can be taken offline.

Further Problem Description:
Issue reported:
=========
Pause frames from FEX front panel (HIF) ports, end up at the SUP on N7K.

Observation:
=========
* On FEX type N2248TP, Pause frames are not handled correctly. Even with Rx flow-control enabled on the interface, pause frames are being forwarded upstream to the N7K instead of being consumed on the FEX.

* For all other FEX types including the latest N2248PQ, Pause frames are consumed at the FEX if Rx flow-control is enabled.


Potential Impact:
===========
* If volume of pause frames generated from the servers connecting to the FEX is EXTREMLY HIGH, then control path to the SUP can get congested
** Other control plane traffic destined to SUP can be dropped

Common case:
=========
* Pause frames volume is typically not so high in a real network to really congest SUP
* If there are malicious servers which are generating such high volume of traffic, those servers need to turned off.


Desired (Can be tracked as a separate enhancement requests):
============================================
1. Presently, Rx flow-control is not enabled by default for FEX HIFs. Behavior is documented.
*** Desired that Rx flow-control be enabled by default

2. Even if flow-control is not enabled, quench the pause frames at the MAC layer.
*** Must be tracked with FEX hardware/platform team (SAVTG)

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.2(6a), 6.2(8)
Known Fixed Releases:
7.2(0)N1(0.172), 7.2(0)N1(1), 7.2(0)ZN(0.174)
Bug Id:
CSCuq22841
Title:
M1 Module: Invalid COS (0x41040021) after ISSU from 5.2(x) to 6.2(x)
Description:

Symptom:
Ports are not allocated to a secondary VDC with the following logs:

2014 Jul 24 16:14:26.864 N7K %IM-3-IM_RESP_ERROR: Component MTS_SAP_VMM opcode:MTS_OPC_IM_IF_VDC_BIND in vdc:2 returned error:Invalid COS value.
2014 Jul 24 16:14:35.568 N7K last message repeated 1 time
2014 Jul 24 16:14:35.568 N7K %VDC_MGR-3-VDC_ERROR: vdc_mgr: Error for port Ethernet . Port is currently in vdc N7K-VDC2 [2]. GIM returned 41040021 [Invalid COS value.]. Please run the command "allocate interface Ethernet force" to try again

In 'show vdc membership status' we see the following as the reason for the ports not being allocated: 'ERROR:Invalid COS value. (0x41040021)'.

Conditions:
- ISSU from 5.2(x) to 6.2(x)
- M1 Module

Workaround:
Reload affected module.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.2(8a), 6.2(8a)S3
Known Fixed Releases:
Bug Id:
CSCuh42629
Title:
CSCuh42629SNMPd crashed in idle state
Description:

Symptom:
snmpd crashes on Nexus switch resulting in supervisor crash

Conditions:
Errors:
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID ) hasn't caught signal 11
(core will be saved).

Workaround:
Seen when polling OSPF MIBs on Nexus switches. Crash is random and not related to the amount of time spent polling the device, or a specific OSPF MIB under OID 1.3.6.1.2.1.14.4.1.8

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.2(1.125)S6
Known Fixed Releases:
5.2(1)N1(7.99), 5.2(1)N1(8), 6.0(2)N3(0.73), 6.0(2)N3(1), 6.0(2)U3(0.650), 6.0(2)U3(1), 6.2(1.136)S6, 6.2(1.141)S0, 6.2(2), 7.0(0)N1(0.385)
Bug Id:
CSCuo93631
Title:
N7K MAC address in hardware but missing from software after ISSU
Description:

Symptom:
Nexus 7000 does not learn new MAC addresses in software after ISSU.

"show hardware mac address-table " contains MAC entry in hardware (x = ingress module in question)

"show mac address-table" does not contain MAC entry in software

Conditions:
a) ISSU performed on N7K
b) In combination with ISSU, a new learn mac address caused by a new mac, or a flush of the mac table and re-learn of existing macs while system is undergoing ISSU.

Workaround:
Run the following command: "test l2fm pending-ack slot for all modules which have the "sup_ack_pend" bit set to 1. To check what the bit is set to run the following command:

- slot show system internal mtm info global | eg -i ack_pend
nl_mv_rd num_ack_pending 1 sup_ack_pending 1
age num_ack_pending 0 sup_ack_pending xxx
- any module with "ack_pending" status = "non-zero" is the module(s) to be reloaded

A reload of the module also resolves this issue.

Also, "clear mac address-table dynamic" resolves this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
7.1(0)D1(0.143), 7.1(0)D1(0.146), 7.1(0)D1(0.153)
Known Fixed Releases:
6.2(10), 6.2(10)S22, 7.1(0)D1(0.196), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCut43413
Title:
DCi: HSRP Virtual MAC Flapping through FHRP Isolation PACL
Description:

Symptom:
FHRP hello causing vMAC to flap between local interface and Layer 2 vPC DCi.

Conditions:
- FHRP isolation PACL on Layer 2 vPC DCi interface
- Device acting as L2 vPC DCi is not FHRP gateway

Workaround:
Two options dependent on the design of the network:

- If the DCi device is only connected to the FHRP gateway, a VACL with an ARP inspection filter is recommended to isolate the data centers.
- If the DCi device has connections to other devices in the local data center using the PACL with a static MAC entry is the only option. This will not stop the duplicate gateway gratuitous ARPs between the two sites.

Further Problem Description:
This is a hardware limitation. The MAC learning process takes place before the PACL drops the HSRP hello.

Status:
Open
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuu01306
Title:
L3vpn::Post HA, CE2 vrf has incorrect routing info
Description:

SYMPTOM

After a switchover, routes in the unicast RIB are incorrect. Routes which
were in one VRF before the switchover are in a different VRF afterwards.

CONDITION


WORKAROUND

None

Status:
Open
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCut67131
Title:
ACL_Deny misprogrammed on F1 when creating a new VDC
Description:

Symptom:
When creating a new VDC,
Broadcast packets may loop from one VPC member, across the peer link, and out the other VPC member.

Conditions:
Only seen on a Nexus 7000 switch using F1 Linecards running 6.2

Workaround:
To recover from this state after shut/no shut the VPC member on the F1 modules which is looping the broadcast.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
Bug Id:
CSCur67753
Title:
Module reload due to (null) reason
Description:

Symptom:
Linecard reload during the switchover

Conditions:
not known

Workaround:
not known

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
5.2(9)
Known Fixed Releases:
Bug Id:
CSCuq25337
Title:
Broadcast & multicast fail after multiple ISSU, no port select for LTL
Description:

Symptom:Broadcast / multicast traffic may not egress out port channel members and/or physical ports.
pixm pss has duplicate entries for BD LTLs after multiple ISSU

slot 4 show hardware intern ltl start-index 0x802b end-index 0x802b egress-port 6
----------------------------------------------------------------
|fp ports|inst| ltl | rbh| vqi |mi(v5)|mi(v4)|drop|eg ports|
|--------------------------------------------------------------|
| 5- 8 | 1| 802b| 0| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 1| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 2| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 3| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 4| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 5| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 6| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 7| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 8| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 9| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 10| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 11| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 12| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 13| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 14| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 15| | c9| ca| 0|no port selects
Conditions:Multiple ISSUs causing incorrect setting of the port bitmaps due to pss key corruption.
For example, lets take a 2 ISSUs case from 6.2.8 to 6.2.8a to 6.2.10

- Switch loaded with 6.2.8 image.
- On a BD ltl operation if any, upon updation of the pss entry in the pss file, there is a mismatch between the pixmc internal data structure and the pss entry.
- After ISSU from 6.2.8 to 6.2.8a, the restoration of BD LTL is done based on the mismatched state. This results in inconsistency between pixmc internal sw state and its pss file only without affected the hardware programming.
- Now, any BD ltl operation on the above affected BD LTL will result in creation of a duplicate key in the pss file.
- Another ISSU from 6.2.8a to 6.2.10 will result in restoration of an invalid PSS entry (because of duplicate pss key) which has stale port bitmaps set for that BD LTL.
Workaround:Bounce the port channel members which do not have the port selects set properly to cause reprogramming of the affected BD LTL due to the port-channel membership change.
OR
Flap the affected vlan to cause reprogramming of the BD LTL with the right port selects.
OR
Resetting the affected module(s)
More Info:Double ISSU is a commonly seen condition. This issue can also be seen after an ISSU followed by M1-to-M2 replacement (which involves port-channels flap)

The fix for this is in 6.2(10). This means that:
a) ISSU from any prior release to 6.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
6.1(2), 6.2(10)S38, 6.2(2a), 6.2(6a), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S45, 7.1(0)AV(0.38), 7.1(0)D1(0.267), 7.1(0)OTT(0.36), 7.1(0)PDB(0.206)
Bug Id:
CSCtw72949
Title:
Slow drain of udp sock mts buffers for some bulk requests in bridge-mib
Description:

Symptom:
On nexus 7000 series switch, polling at a sustained rate certain objects from
bridge-mib may cause a relatively high cpu for snmpd for some time after polling and new requests to time out.

On pre 5.2 NX-OS versions, this polling may cause internal messages for inter
process communications to be queued and affect other services.

This problem is also observed on Nexus 5xxx switch running 5.2 release. The fix
for this issue is in 5.2(1)N1(4) release of the 5k and 6.0(2)N1(2a) and later releases.

Conditions:
A large amount of SNMP access to the device against BRIDGE-MIB

Workaround:
Reduce the amount of SNMP traffic to a acceptable level.

If using Orion or Solarwinds Network Management Server uncheck option
Topology: L2.

Further Problem Description:
Problem exists in 5.2(1-3), 6.0(x) and earlier releases on Nexus 7000 switch.
Fixes had been integrated in 5.2(4), 6.1(1), 6.2(2) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
5.1(4), 5.2(1), 6.2(0.1)
Known Fixed Releases:
5.2(1)N1(4), 5.2(4)S3, 5.2(4.10)S0, 5.2(4.4)S0, 6.0(2)N1(2a), 6.0(2)N2(1), 6.0(2)U3(0.599), 6.0(2)U3(1), 6.1(0.205)S0, 6.1(0.209)S0
Bug Id:
CSCuh56328
Title:
netstack panic when closing the socket with sbuff lock acquired
Description:

Symptom:
The Netstack process will panic and crash with syslogs similar to the following:

NETSTACK-2-PANIC netstack [pid] sbflush: locked: PANIC: (null)
%$ VDC-1 %$ SYSMGR-2-SERVICE_CRASHED Service "netstack" (PID pid) hasn't caught signal 6 (core will be saved).

Conditions:
This issue is seen when Netstack attempts to close a TCP or UDP socket and is unable to due to an internal data structure being in an unexpected state

Workaround:
None

More Info:
N/A

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
14-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(1)N1(7.120), 5.2(1)N1(8), 5.2(9.189)S0, 6.0(2)N2(5.90), 6.0(2)N2(6), 6.0(2)U3(0.642), 6.0(2)U3(1), 6.1(4.97)S0, 6.1(5), 6.1(5.32)S0
Bug Id:
CSCun86405
Title:
Orphan Ports on FEX have the MAC learnt on ES ID instead of local SWID
Description:

Symptom:
Orphan ports connected over FEX HIF may observe traffic getting black holed due to incorrect learning of MAC address in a VPC+ domain.
The MAC is learned from Emulated SWID (ESID) instead of Local SWID as observed on other switches in FabricPath Domain.

On the problem switch:
Software MAC learning would pick on the right physical port, though hardware MAC tables would shows MAC learned from ESID instead of Local SWID.

Conditions:
Problem may trigger if ports which were part of VPC+ complex (VPC port-channel) and were then moved to FEX-Fabric mode using channel-group force option.
This does not clear the register setting properly and MAC learning still picks on ESID as is treated to be coming across a VPC+ Port-channel.

This is the only known and analyzed trigger though may not be the only one.

Workaround:
- Shutdown the affected Ports.

- Move them out of FEX Fabric PO.

- Make them regular Access or Trunk ports (not VPC)

- Unshut them. >>>>>>>>> If FET's (Fabric Extender Transceiver) are used then once these ports are taken out from FEX Fabric mode FET SFP's would fail validation hence software state machine would not be complete to unset the corresponding registers. "service unsupported-transceiver" will help bypass validation checks.

- Move ports back to FEX-Fabric mode. This should clear the problem.

Further Problem Description:
N7k-switch# sh mac address-table address 0000.0000.0001
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False
VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 106 0000.0000.0001 dynamic 0 F F Eth150/1/2 >>>>> Here it looks correct

Module-X# show hardware mac address-table address 0000.0000.0001
FE | Valid| PI| BD | MAC | Index| Stat| SW | Modi| Age| Tmr| GM| Sec| TR| NT| RM| RMA| Cap| Fld|Always| PV | RD| NN| UC|PI_E8| VIF | SWID| SSWID| LID
1 1 1 32 0000.0000.0001 0x012d1 0 0x089 1 35 1 0 0 0 0 0 0 0 0 0 0x00 0 0 1 0 0x004 0x2de 0x001 0x012d1

SWID is picked as ESID and not as local SWID. Hardware MAC table will reflect the problem.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.17), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)PDB(0.92), 7.1(1)SP(0.4)
Bug Id:
CSCtw77593
Title:
ERROR: Entry not found in copp database while apllying custom copp polic
Description:

Symptom:
Modifying the CoPP profile or CoPP policy throws error "ERROR: Entry not found in copp database"

Conditions:
The issue happens when a reload based upgrade is performed.

Workaround(s):

Please follow the below steps:

1) Reload the switch with NX-OS version where the CoPP profile was last changed/applied
2) Removing the current CoPP profile
3) Upgrade the switch to the newer version and apply the new CoPP profile or CoPP policy

Description:

CoPP uses shadow database to delete the current CoPP profile if the current software version and CoPP profile version are different. Shadow database is created only when the install all based upgrade is performed. It is not created for reload based upgrade.

The issue is fixed by creating shadow database when the running-config is stored as startup-config. So that the shadow database can also be used to delete the CoPP profile when the reload based upgrade is performed. In case if the shadow database is not present, CoPP will delete the current CoPP profile by using the running CoPP database.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
5.2(3), 5.2(3)S24
Known Fixed Releases:
5.2(3.44)S0, 6.1(1)
Bug Id:
CSCun74286
Title:
MCQ of VEQ block returns dummy data when the queue is not empty
Description:

Symptom:
The tests sends a lot of enqueue to reach a condition of full queue, however before the queue is completely full the rtl uncorrectly returns dummy data in response to dequeue even though the queue is not empty.

on 03/13/2014 the run at
==========
/auto/nvbu-asic20/users/icozzani/voq/2014_02_21/ip_waverider/sim/linked_list/veq/runs
test_basic_random_Nenq_Ndeq_full_930432259_p0_FAIL_RTL_DUMMY

there is a dummy returned on port 0 queue5 when there are 121 entries in that queue.

@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=0] = 84
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=1] = 102
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=2] = 111
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=3] = 105
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=4] = 117
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=5] = 121
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=6] = 102
@ 3154.243 ns: [MSG] num_entries[port_sel=0][pri=7] = 112
@ 3154.243 ns: [MSG] Generating DEQ = 146 - DEQ pid(0) qid(6) ipg(0x1)
@ 3154.243 ns: [MSG] [mcq_ref_t::process_deq_cmd] Received DEQ pid(0) qid(3)
@ 3154.243 ns: [MSG] [mcq_ref_t::process_deq_cmd] Popped list entry DEQ RSP portid(0) qid(3) pkt_ptr(0x5a) pkt_len(5595) err_drop(1) is_mr(0)
@ 3154.243 ns: [ERROR] [mcq_ref_t::check] Data mismatch RTL: (DEQ RSP portid(0) qid(5) DUMMY) REF EXP: (DEQ RSP portid(0) qid(5) pkt_ptr(0x3c) pkt_len(9398) err_drop(1) is_mr(0))


On 03/13/2014 From PD:
=================
I think I know what is causing this.
Can you please rerun the test by skipping the dummy descriptor and proceeding without halting the test?
Thanks
-PD


[icozzani] On 03/14/2014
==========
I have removed the test ending when the checker compares a dummy from rtl with a correct data from ref.
The run is at
/auto/nvbu-asic20/users/icozzani/voq/2014_02_21/ip_waverider/sim/linked_list/veq/runs/
test_basic_random_Nenq_Ndeq_full_930432259_p0_disable_dummy_check_fail

There is first DUMMY at time 3154 from p0 q5
@ 3154.243 ns: [MSG] [mcq_deq_mon_t::run] Received DEQ RSP portid(0) qid(5) DUMMY

the test does not stop, just prints a warning and continues:
@ 3154.243 ns: [WARN] [mcq_ref_t::check] WARN RTL DUMMY Data mismatch (DEQ RSP portid(0) qid(5) DUMMY) EXP (DEQ RSP portid(0) qid(5) pkt_ptr(0x3c) pkt_len(9398) err_drop(1) is_mr(0))

===> There are no more data coming from port0 queue5 after that: why the correct data does not come back?

Then there is a second DUMMY at time 3164 from port0 queue 6
@ 3162.247 ns: [MSG] [mcq_ref_t::process_deq_cmd] Received DEQ pid(0) qid(6)
@ 3162.247 ns: [MSG] [mcq_ref_t::process_deq_cmd] Popped list entry DEQ RSP portid(0) qid(6) pkt_ptr(0x4a) pkt_len(14706) err_drop(1) is_mr(0)


@ 3164.915 ns: [MSG] [mcq_deq_mon_t::run] Received DEQ RSP portid(0) qid(6) DUMMY

with the following warn printed
@ 3164.915 ns: [WARN] [mcq_ref_t::check] WARN RTL DUMMY Data mismatch
(DEQ RSP portid(0) qid(6) DUMMY)
EXP (DEQ RSP portid(0) qid(6) pkt_ptr(0x4a) pkt_len(14706) err_drop(1)

Status:
Terminated
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
1
Known Fixed Releases:
Bug Id:
CSCuu13792
Title:
VPC doesn't come up after HMM is enabled
Description:

Symptom:
VPC peer-link comes up

Conditions:
two sides of port-channel mismatch

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCuj81916
Title:
pim core when rp-candidate configured with tunnel
Description:

Symptom:
PIM crashes when an RP-candidate is configured with a group-list and some \
previous RP candidate configuration already exists

Conditions:
Multicast Bootstrap Router is configured

Workaround:
Remove all previous RP-candidate configurations prior to applying any new Randezvous Point candidates.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.2(5.20)S1
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5)BF(0.38), 6.2(5.52)S0, 6.2(6), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(0.127), 7.0(0)ZN(0.25), 7.0(1)N1(0.47), 7.0(1)N1(1)
Bug Id:
CSCup90140
Title:
eth_port_sec cores and hap reset on violation after ISSU to 6.2.8a
Description:

Symptom:
service-eth_port_sec crashes

Conditions:
N7k|SUP1|F1|6.2(8a) with ports enabled with port security

Workaround:
none

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCug44109
Title:
FT:aclmgr core at aclmgr_intf_run_iter
Description:

Symptom:
aclmgr crashes while executing the command:

install all kickstart bootflash:n7000-s2-kickstart.6.2.2.bin system bootflash:n7000-s2-dk9.6.2.2.bin

or

show install all impact kickstart bootflash:n7000-s1-kickstart.6.2.6.bin system bootflash:n7000-s1-dk9.6.2.6.bin

Ignore the versions used.
This is applicable to any version in 6.2 train and for both Sup 1 and Sup 2.

Conditions:
If user configuration has a mac packet-classify configuration under any interface, while doing an ISSU aclmgr will crash.

Workaround:
To perform an ISSU upgrade or check ISSU impact to Release 6.2(2)

1. Enter the show running-config aclmgr inactive-if-config command for all VDCs.
2. Enter the clear inactive-config acl command for all VDCs.
3. If configuration has any "mac packet-classify" configuration, remove this configuration from all interfaces using the no command.
4. Start the ISSU procedure.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.1(2), 6.2(1.121)S1, 6.2(1.121)S2
Known Fixed Releases:
Bug Id:
CSCuj64557
Title:
N77-F3 : Module failed - not responding due to eUSB access failure
Description:

Symptom:
The eUSB (Embedded USB) module installed internally on the N77 F3 linecard may fail to respond to accesses from the local processor. Any of the following symptoms may be experienced when this occurs. (For Log examples please see the More-Info section).

(1) Line card gets kernel panic during runtime and is reloaded. "show logging onboard stack-trace" can be used to confirm this.

(2) Line card is not reloaded but experiences eUSB failure during runtime.
The following command can be used to check for eUSB failure : "show system internal kernel messages".

(3) Line card had PLOG failure and ISSU is performed on the failed module. ISSU will fail and line card will be reloaded with Upgrade Failure.

Conditions:
The access failure to the eUSB module on F3 linecard is related to a USB component marginality. It may occur with low probability of occurrence, on a limited set of hardware which uses the marginal component.

The list of serial numbers potentially susceptible to this failure mode is as below , a total of 113 units.
However it may be noted that only a subset of this list will actually experience any symptoms during operation.

N77-F312CK-26 [34 units]
JAE18050366 JAE18050365 JAE1805035Y JAE1805035U JAE1805035Z JAE18050360 JAE18050361 JAE18050367 JAE18050362 JAE18050363 JAE18050364 JAE1805035X JAE1805035W JAE1805035T JAE1805035S JAE18050368 JAE1805035J JAE1805035H JAE1805035L JAE1805035R JAE1805035Q JAE1805035P JAE1805035N JAE18050359 JAE18050358 JAE18050356 JAE18050357 JAE1805035D JAE1805035C JAE1805035A JAE1805035B JAE1805035E JAE1805034W JAE1805034X


N77-F324FQ-25 [30 units]
JAE17500CM3 JAE17500CME JAE17500CM6 JAE17500CM5 JAE17500CSB JAE17500CM1 JAE17500CLW JAE17500CLX JAE17500CSC JAE17500CLV JAE17500CLB JAE17500CM4 JAE17500CLZ JAE17500CLC JAE17500CLD JAE17500CLE JAE17500CLF JAE17500CLG JAE17500CLH JAE17500CLJ JAE17500CLM JAE17500CLN JAE17500CLP JAE17500CLQ JAE17500CLS JAE17500CLU JAE17500CLY JAE17500CM0 JAE17500CSD JAE17500CSE


N77-F348XP-23 [49 units]
JAE18040172 JAE18040173 JAE18040174 JAE18040175 JAE18040176 JAE18040177 JAE18040178 JAE18040179 JAE1804017A JAE1804017B JAE1804017C JAE1804017D JAE1804017F JAE1804017G JAE1804017H JAE1804017J JAE1804017K JAE1804017L JAE1804017M JAE1804017N JAE1804017R JAE1804017S JAE1804017T JAE1804017U JAE1804017V JAE1804017W JAE1804017X JAE1804017Y JAE18040180 JAE18040181 JAE18040182 JAE18040183 JAE18040184 JAE18040185 JAE18040186 JAE18040187 JAE18040188 JAE1804018A JAE1804018B JAE1804018C JAE1804018D JAE1804018E JAE1804018F JAE1804018G JAE1804018H JAE1804018J JAE1804018K JAE1804018L JAE180708R4


Other F3 PIDs and Serial Numbers which do not belong to this list are NOT affected.


Workaround:
None . If a unit in the susceptible serial number list experiences a listed symptom , please replace the unit by RMA.

Further Problem Description:
Log Examples
-------------------
==================================================================
(Case 1) Kernel panic and linecard reload : "show logging onboard stack-trace".
==================================================================
#0 0xc04ed4a8 in mark_buffer_dirty (bh=0xef63aab8) at
/auto/andfreetown14/LUP/tree/third-party/src/linux/kernel/wrl3/linux-2.6.27
_wrl30/fs/buffer.c:1191
#1 0xc0527dd8 in ext3_commit_super (sb=0xeef97400, es=0xeffcb400, sync=1) at
/auto/andfreetown14/LUP/tree/third-party/src/linux/kernel/wrl3/linux-2.6.27
_wrl30/fs/ext3/super.c:2266
#2 0xc05296e0 in ext3_handle_error (sb=0xeef97400) at
/auto/andfreetown14/LUP/tree/third-party/src/linux/kernel/wrl3/linux-2.6.27
_wrl30/fs/ext3/super.c:175
#3 0xc05297a0 in __ext3_std_error (sb=0xeef97400, function=0xc06b6338 "ext3_ordered_writep

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.2(10)FM(0.35), 6.2(10)S67, 6.2(12)S29, 6.2(5.20)S1, 6.2(5.52)S0, 6.2(6)S23, 6.2(6a)S13, 7.1(0)D1(0.136), 7.1(0)D1(0.196)
Known Fixed Releases:
Bug Id:
CSCub50434
Title:
VTP packets looping on vpc
Description:

Symptom:

After an issu upgrade or a supervisor switchover, a nexus 7000 series switch may send back a vtp packet on the same vpc it ingressed from. In DCI topology this can cause a storm of VTP packets between the nexus 7000 switches.

Conditions:

- Nexus 7000 switches are configured in vtp transparent mode

Workaround:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
5.2(5)
Known Fixed Releases:
5.2(1)N1(6), 5.2(6.28)S0, 5.2(7), 6.0(2)N2(1), 6.1(2.27), 7.2(0)D1(0.506)
Bug Id:
CSCtf36357
Title:
n7k: Need ability to configure ingress netflow sampling with dhcp relay
Description:

A Nexus 7000 switch does not currently support having ingress netflow sampling and DHCP relay configured on the same interface. We need this restriction removed.

Symptom:
When trying to configure the two features together you might see error message similar to:

%$ VDC-1 %$ %NFM-2-VERIFY_FAIL: Verify failed - Client 0x87000146, Reason: feature combination is not supported in tcam, Interface: Vlan601
Verify failed - Client 0x83000146, Reason: feature combination is not supported in tcam, Interface: Vlan601

Conditions:
none

Workaround:
When you remove the ip monitor netflow input, you need to bounce the l3 interface to take a effect.

Fix is available in 6.2(2)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
4.2(2a), 4.2(3), 5.2(0.266)
Known Fixed Releases:
6.2(0.279)S0, 6.2(0.287)S0, 6.2(2), 7.0(1)ZD(0.3)
Bug Id:
CSCue36257
Title:
AAA crash and leading to possible hap reset
Description:

AAA Crash observed.

Symptom:
AAA Process Crash.

Conditions:
When we execute show accounting log command.

Workaround:
No Work Around and It is very corner case.

Further Problem Description:
When the accounting log file in logflash becomes more than 250,000 bytes , it is moved to archive file. But when the current accounting logfile size also becomes more than 250,000 and 'show accounting log' command was executed at this time(No accounting message before show accounting log) , then due to buffer overflow , crash happens.But if instead of 'show accounting log ' command , if any other command is executed , then an accounting update message will be sent to aaa which will move the current accounting log to archive and old archive file will be removed. Due to this , the total size of the accounting log will be less than 500 k and hence the bug was not seen everytime .

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.2(0.304)S15, 6.2(1.111)
Known Fixed Releases:
6.0(2)U3(0.641), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1), 6.1(4.97)S0, 6.1(5), 6.1(5.32)S0, 6.2(1.146)S0, 6.2(2), 7.0(0)ZD(0.84)
Bug Id:
CSCuh20873
Title:
IPV6 default route URIB and UFIB inconsistency cause traffic drop
Description:

Symptom:
In the customer testing setup, there are eBGP ECMP for IPv6 default route, which works fine at stable mode, but upon any path fail, the URIB and UFIB shows inconsistent, and UFIB point to th epath which is already down which cause traffic blackholed.

Conditions:
NONE

Workaround:
"clear ipv6 route 0::0/0" will cause default route reprogrammed, and can clear the issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
5.0(3)U5(1f)
Known Fixed Releases:
5.0(3)U5(1f), 5.2(1)N1(6), 6.0(2)N2(1), 6.0(2)U1(1a), 6.0(2)U1(2), 6.2(1.137)S0, 6.2(2), 7.2(0)ZN(0.111)
Bug Id:
CSCun60587
Title:
l3vm core while running config in vinci sanity
Description:

Symptom:
l3vm core while running config in vinci sanity

Conditions:
A race condition when l3vm is terminated and restarted.

Workaround:
No.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
7.1(0)D1(0.58)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.110), 7.0(0)KM(0.64), 7.1(0)D1(0.117), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.65), 7.1(0)SDN(0.6)
Bug Id:
CSCus15529
Title:
OTV trunk intf err-disabled due to "IFTMC PD commit db search failed"
Description:

Symptom:
Interface getting error disabled on changing native vlan

Conditions:
It happens in a OTV enabled VDC with a trunk port carrying OTV extended vlans.

Workaround:
shut/no shut of interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12)S6
Known Fixed Releases:
7.1(0)AV(0.38), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCuj56624
Title:
OIL not programmed in MFDM
Description:

Symptom:
Routed multicast traffic gets black-holed on a Nexus 7000. The Multicast Routing Table (MRIB) has the correct interfaces in the S,G outgoing interface list (OIL), but they are missing from Multicast Forwarding Distribution Manager (MFDM).

MRIB:
Nexus7000# sho ip mroute 10.1.1.100 239.192.100.100
IP Multicast Routing Table for VRF "default"

(10.1.1.100/32, 239.192.100.100/32), uptime: 1w1d, pim mrib ip
Incoming interface: port-channel383, RPF nbr: 10.113.255.53
Outgoing interface list: (count: 4)
Vlan100, uptime: 1d11h, mrib
Vlan101, uptime: 1d11h, mrib
Vlan102, uptime: 1d11h, mrib
Vlan400, uptime: 1d11h, mrib, pim

MFDM:
Nexus7000# sho forwarding distribution ip multicast route source 10.1.1.100 | b 239.192.100.100
(10.1.1.100/32, 239.192.100.100/32), RPF Interface: port-channel383, flags:
Received Packets: 23430091 Bytes: 22011464043
Number of Outgoing Interfaces: 1
Outgoing Interface List Index: 63
Vlan400

Conditions:
This may be seen in a multicast environment after a multicast source feed is stopped then restarted, such as during a server reload.

Workaround:
clear ip mroute for the misprogrammed group

Further Problem Description:
MFDM programs the mroute OIFs on the line card forwarding engine. Since the OIFs are missing in MFDM, they are not programmed on the ingress forwarding engine Multicast Forwaridng Information Base (MFIB) on the line cards.

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
6.2(2a)S11, 6.2(2a)S19, 6.2(5.49)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5)BF(0.41), 6.2(5.45)S5, 6.2(5.50)S0, 6.2(5.52)S0, 6.2(6), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(0.131), 7.0(0)ZN(0.29)
Bug Id:
CSCun74507
Title:
bridge-domain is in down state after deleting tenant-vni & reconfig
Description:

Symptom:
When the issue happens, bridge domain is missing VSI and in down state.

Conditions:
Repetitively config and delete VNI.

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
7.0(0)FVX(0.84), 7.1(0)D1(0.64)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.1(0)D1(0.114), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.65), 7.1(0)SDN(0.6), 7.1(0)ZD(0.166)
Bug Id:
CSCuq27709
Title:
NX-OS:Peer router reload causes netstack core @ pc_fib_ip_loadshare_hash
Description:

Symptom:
When a router connected to N7k is reloaded, N7k prints the message %SYSMGR-2-SERVICE_CRASHED: Service "netstack" and netstack crashes causing service disruption.

Conditions:
Directly connected router which is sending routing updates to Nx7K MUST be reloaded and a netstack crash is seen soon after the reload of peer router.

Workaround:
None

The fix for this bug has been committed to 6.2.10 and 6.2.8E9

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
16-MAY-2015
Known Affected Releases:
6.2(8)E9
Known Fixed Releases:
6.2(10), 6.2(10)S49, 6.2(8)E9, 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179)
Bug Id:
CSCub21497
Title:
fails programing accesslist mts_msg Req_id 1956261 failed:aclqos failure
Description:

Symptom:
%WCCP-1-SBADDFAIL: Unable to add WCCP subblock on
interface Vlan200: Error string: Verify failed in LC

with programming faulire on the port-channel

Conditions:
while redirect-list attached to wccp groups ,
when policy attached to port-channel interface
or
vlan having wccp policy attached to port-channel interface

Workaround(s):
feature restart by "no feature wccp" and "feature wccp"

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
5.2(9)S35, 6.1(1), 6.1(2), 6.2(1.150)S0, 6.2(2)S20, 6.2(5.38), 6.2(7.23)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.1(0)D1(0.131), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.55)
Bug Id:
CSCug43851
Title:
F2/F2E: Capture-filter not filtering any pkts
Description:

Symptom:

Conditions:

Workaround:
Since there is an additional 12 bytes of recirc-header added to Ethernet header, the capture-filter is failing for packets coming from F1,F2 and F2E cards. The common workaround will be using display-filters. The display-filter syntax can be obtained from wireshark's website.

For capture-filter :
If the filter string "ether proto " is used, then "ether[24:2] = " is the workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.1(1), 6.1(2), 6.1(5)S2, 6.2(1.74)S4
Known Fixed Releases:
6.2(5.7)S0, 6.2(6), 7.0(0)FM(0.11), 7.0(0)FM(0.7), 7.0(0)FM(0.8), 7.0(0.51)S0, 7.1(0)D1(0.14), 7.1(0)D1(0.15)
Bug Id:
CSCuq81826
Title:
F3 Module: High Latency through Fabric
Description:

Symptom:
High latency on traffic going through and F3 module.

Conditions:
- F3/F2 Module in f-series only chassis
- ISSU
- Incorrect COS-to-Queue Mapping

Workaround:
Reload module that shows incorrect queuing structure.

Further Problem Description:
Example of broken QoS Mapping:

'show system internal qos queuing config'

Egress Queuing for Ethernet3/2 [System]
-------------------------------------------
Template: 8Q8E
-----------------------------------------------------------------------------------
Queue Group Bandwidth% PrioLevel Shape% CoSMap BW(G/R/RR)
------------------------------------------------------------------------------------
8e-4q8q-out-q4 3 14 - - 5 (0/14/14)
8e-4q8q-out-q5 4 14 - - 0 (0/14/14)
8e-4q8q-out-q6 5 14 - - 7 (0/14/14)
8e-4q8q-out-q7 6 14 - - 6 (0/14/14)
8e-4q8q-out-q1 0 - 1 - 4 (-/-/-)
8e-4q8q-out-q2 1 14 - - 3 (0/14/14)
8e-4q8q-out-q3 2 14 - - 2 (0/14/14)
8e-4q8q-out-q-default 7 14 - - 1 (0/14/14)


Ingress Queuing for Ethernet3/2 [System]
-------------------------------------------
Trust: Trusted
Num Shared Descriptors: 3585
DSCP to Ingress Queue : Disabled
------------------------------------------------------------------------
Queue Group Qlimit% IVL CoSMap #Pgs #descr
------------------------------------------------------------------------
8e-4q8q-in-q-default 1 88 0 0-4,6-7 3516 128
8e-4q8q-in-q1 0 10 5 5 399 102
8e-4q8q-in-q4 3 1 - - 39 10
8e-4q8q-in-q3 2 1 - - 39 10

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.2(10), 6.2(10)S85, 6.2(10)S86, 6.2(10)S87, 6.2(10)S93, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10)S90, 6.2(10)S95, 6.2(10)S96, 6.2(10.16)S0, 7.1(0)D1(0.318), 7.1(0)EV(0.116), 7.1(0)OTT(0.47), 7.1(0)PDB(0.256)
Bug Id:
CSCur99677
Title:
EMC-ENTRANCE:Statsclient crash on ISSU from 629a to 6211 S6
Description:

Symptom:
Symptoms: When you do ISSU from older version like 629a to 6211S6 memory is leaking and stats client process will crash.

Conditions:
Issue happened in basic config setup during ISSU from 629a to 6211 S6 on MDS setup.
Its not easily reproducible.
Its a corner scenario where the counter which keeps track of how many memory blocks are assigned is getting corrupted.

Workaround:
Workaround fix is added to the ddts to reset the counter value to 0 after clearing the memory.
Actual fix will be added as a part of 6213.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.2(11)S6
Known Fixed Releases:
6.2(13)FM(0.43), 6.2(13)GS(0.13), 6.2(13.1)S0, 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCud01394
Title:
N7K - F1 / F2 line card: Mac addresses out of sync across FEs
Description:

Symptom:
Following a MAC Flap, the hardware MAC address table on a F1 or F2 modules will not have the same consistent entry across all the forwarding engines (FEs) when the vlan mode is CE and learning mode is non-conversational.

Conditions:
Issue is seen on F1 modules on 5.2(5).

Rapid mac move that happen between two FEs and there is a Flood to bd / flood to fabric miss in hardware

Workaround:
Clear the specific mac address
Fix is present from 5.2(9) onwards for F series cards.


Will this issue impact Nexus7009 running 6.1.3?
Yes. As Integrated-release says its fixed from 6.1.5 onwards for 6.1.x train and all future releases.

Is this issue F1 module specific??
No

Will N7K-F248XP-25E be impacted??
Yes. Fix is present from 6.1.5 onwards.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
5.2(4), 5.2(5)
Known Fixed Releases:
5.2(9), 5.2(9)S64, 5.2(9.113)S0, 5.2(9.114)S0, 6.1(4.3)S0, 6.1(5), 6.2(1.93), 6.2(2), 7.1(0)D1(0.14), 7.1(0)D1(0.15)
Bug Id:
CSCtz59944
Title:
Port Error disabled - ELTMc port structure doesn't exist on swover/upgr
Description:

Symptom:
Unable to add ports to port-channel. Upon adding them, member links went error disabled.

Router(config-if)# sh int Eth x/y
Ethernetx/y is down (Error disabled, eltmc: Port structure doesn't exist.)

Router %ETHPORT-5-IF_SEQ_ERROR: Error ("Port structure doesn't exist.") communicating with MTS_SAP_ELTM for opcode MTS_OPC_ETHPM_PORT_PRE_CFG (RID_PORT: Ethernetx/y)

Conditions:
The scenario can happen when the port-channel/member gets deleted and the cleanup does not happen properly in ELTM. In this condition, after ISSU if there are new updates and/or port-channel configuration modified manually, then this issue happens.

Workaround:
Delet the port-channel, reload the modules that had member ports belonging to this port channel and re configure the port-channel

Further Problem Description:
This issue is resolved in 5.2(7) or later releases, in 5.2 train.
And, this issue can be carried over from earlier releases in ISSU.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
5.2(4.72)
Known Fixed Releases:
5.2(4.85)S0, 5.2(7)
Bug Id:
CSCuj16682
Title:
acl applied on mgmt interface only works when remove/apply after reload.
Description:

Symptom:
acl applied on mgmt interfaces fail to act, after realod

Conditions:
Once the n7k is reloaded, acl applied on mgmt interface wont work,
checked for acl that blocks telnet to mgmt ip,
telnet seens to be sucessfull after realod, though acl was there to block tcp connections

Workaround:
remove and apply the acl on the mgmt interface after relaod.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.2(3), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S56, 6.2(10.16)S0, 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.228), 7.1(0)EB(99.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179)
Bug Id:
CSCuc41076
Title:
vPC: MST with Peer-Switch Blocking on non-vPC Link between Peers
Description:

Symptom:
The MST instance going across the non-vPC link is being blocked

Conditions:
- MST
- Peer-Switch
- vPC Peer-Link and non-vPC link between Nexus 7000s

Workaround:
None.

Further Problem Description:
This is a design limitation with respect to how MST works with peer-switch.

With the vPC peer-switch feature, all the STP instances on the both peers uses the vPC MAC address as the bridge MAC address. Any MST instance irrespective of the type of VLANs it carries has this behavior. If we have any link (other than the Peer link), STP will put it in BLK state, even it carries non vPC VLANs.

There are three options to avoid hitting this issue:
- Disable peer-switch
- Use RPVST+ instead of MST
- Remove the non-vPC link and use the vPC peer-link for all VLANs

Status:
Terminated
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.0(4), 6.1(3)
Known Fixed Releases:
Bug Id:
CSCuo81673
Title:
F3: fln_em Process Causing High CPU on Module
Description:

Symptom:
High CPU on F3 module due to fln_em process:

module-1# show processes cpu sort | ex 0.0

CPU utilization for five seconds: 72%/0%; one minute: 72%; five minutes: 72%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
----- ----------- -------- ----- ------ ------ ------ --- -----------
1171 1384294340 528081 2621 49.86% 49.98% 49.99% - fln_em
...

Conditions:
- Mix of 1G and 10G/40G/100G ports
- 6.2(8), 6.2(8a), or 6.2(8b)

Workaround:
None. Issue causes no functional impact.

Further Problem Description:
The reason for the high CPU usage is due to parallel link polling routines (run every 20 ms) checking the port link status for 1G and other port speeds.

In 6.2(10) and later only one polling routine will be run at a time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.2(8), 6.2(8)S35
Known Fixed Releases:
6.2(10), 6.2(10)S2, 6.2(10.5), 6.2(8)E5
Bug Id:
CSCut87473
Title:
bfd crash @bfd_sys_get_remote_ip_info on BDI/peer link i/f shut/unshut
Description:

Symptom:
bfd crash

Conditions:
On BDI/VPC peer link interface shut/no shut few times with scaled configuration

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.490)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.2(0)D1(0.504), 7.2(0)ZD(0.184)
Bug Id:
CSCut86302
Title:
LIF entry incorrect (inconsistent) on F2 module
Description:

Symptom:LIF entry incorrect (inconsistent) on F2 module.

Conditions:multi ISSU to 6.2(10)

Workaround:Clear the route or
Reload the module

More Info:


Status:
Open
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCut25162
Title:
VPLS VC's don't come after delete/add VFI's in EFP scale setup
Description:

Symptom:
Few VPLS PW's remain down

Conditions:
With L2VPN VFI's scaled, delete all VFIs and Re-add all VFI's.

Workaround:
clear l2vpn service vfi all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.430)
Known Fixed Releases:
15.5(1)S0.17, 15.5(1)S1.1, 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(122), 7.1(0)LR(0.4), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.463)
Bug Id:
CSCut83358
Title:
nve memory leak@ libnve_pd in n7k-platform
Description:

Symptom:
nve memory leak

Conditions:
nve peer down and up

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.475), 7.2(0)D1(0.476), 7.2(0)N1(0.168), 7.2(0)N1(1), 7.2(0)PDB(0.408), 7.2(0)ZD(0.155), 7.2(0)ZN(0.171), 7.2(1)N1(0.1)
Bug Id:
CSCut94069
Title:
libbmp memory leak because libnve_pd calls libbmp incorretly
Description:

Symptom:
libbmp memory leak

Conditions:
nve peers flapping

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.475), 7.2(0)D1(0.485), 7.2(0)N1(0.179), 7.2(0)N1(1), 7.2(0)ZD(0.166), 7.2(0)ZN(0.182), 7.2(1)N1(0.1), 7.2(1)N1(1)
Bug Id:
CSCut23557
Title:
N7K platform: netstack crash while saving tech-support in bootflash
Description:

Symptom:
The netstack process on a Nexus 7000 switch running 6.2(8a) may unexpectedly crash while collecting a 'show tech' and redirecting it to bootflash

Conditions:
saving tech-support in bootflash

Workaround:
please do not save "show-tech" to bootflash.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8a)S2
Known Fixed Releases:
6.2(14)FB(0.28), 7.0(0)HSK(0.433), 7.2(0)D1(0.479), 7.2(0)ZD(0.159)
Bug Id:
CSCuu15436
Title:
Service "ipqosmgr" in vdc x hap reset
Description:

Symptom:
Multiple ipqosmgr process crashes occur leading to a sup reload. The reset-reason shows:

Reason: Reset triggered due to HA policy of Reset
Service: Service "ipqosmgr" in vdc X hap reset
Version: 6.2(10)

Conditions:
The crashes occurred after making changes to the QoS config.

Workaround:
Not known

Further Problem Description:
The following symptoms may be observed as well:

- VDC in failed state
- Standby SUP in powered-up state
- Redundancy status shows "HA synchronization in progress".

In order to bring up the VDC and the standby SUP - reboot the switch or delete the VDC and re-configure it.

Status:
Open
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuh24768
Title:
PVLAN-vPC: Xlation entries messed up for a TS vPC; has entry Vi ->Vp egr
Description:

Symptom:
The VLAN translation table entries might not be correct for VPC leg port-channels with PVLAN mode configured
This might cause incorrect VLAN translation in egress direction for PVLAN VPC legs.

Conditions:
This will be seen if VPC leg is in some PVLAN mode and PVLAN port mapping is configured. Now if mode is changed say from Trunk promiscuous to Trunk secondary, and TS port mappings are added on the VPC leg PC, VLAN translation tables may contain both translations, for the previous TP mode too and for the current TS mode too.

The correct behavior would have been for the VPC leg to have only the Translation table programming specific to the current port-mode.

Workaround:
Deleting the VPC leg port-channel and recreating it using "channel-group X" command for member ports will cleanup the stale translation table entries, and restore translation table entries according to the current port mode of the VPC leg port-channel

1. Delete port-channel
switch-two(config)# no interface port-channel 10
switch-two(config)#

2. Recreate port-channel using the member port-config:

switch-two(config)# int e7/1-2
switch-two(config-if-range)# channel-group 10
switch-two(config-if-range)#

3. The translation table entries will be correct after this

4. Make the port-channel 10 a vpc again:
switch-two(config-if-range)# int po10
switch-two(config-if)# vpc 1

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.2(1.121), 6.2(8)S17
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.20), 6.2(10)S21, 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCuu35748
Title:
Post ISSU L2VPN pseudowires don't come UP after reload Peer
Description:

Symptom:
MPLS / L2VPN / L3VPN service updates not processed in F3 card after ISSU. Updates after ISSU might also cause loss of existing MPLS / L2VPN / L3VPN connections. This happens when F3 is a part of a VDC that already has MPLS configured in it.

Conditions:
ISSU from 6.2.x to 7.2 with MPLS / L2VPN / L3VPN enabled on M2-F3 vdc.

Workaround:
Reload the F3 module after ISSU before any further updates on MPLS / L2VPN / L3VPN

Further Problem Description:
n/a

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
7.2(0)D1(0.508)
Known Fixed Releases:
Bug Id:
CSCuc32563
Title:
Linecard reload may trigger multicast packet loss
Description:

Symptom:
Following a linecard reload, silent multicast loss (no syslog) might occur. The impacted multicast traffic will experience complete or near complete packet loss. The issue is related to the multicast distribution (MD) destination index (DI) not programmed correctly for the affected groups.

Conditions:
Issue is seen following linecard(s) reload(s).

Workaround:
Clear ip mroute *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.1(2)S5, 6.2(1.23), 6.2(1.23)S3, 6.2(2)S40, 6.2(5.38), 6.2(5.52)S3, 6.2(6)S11, 6.2(6)S3, 6.2(8)S0
Known Fixed Releases:
6.2(10), 6.2(10)S5, 6.2(10.5)
Bug Id:
CSCuo22348
Title:
port-state request triggers burst of bpdu's from VPC primary switch.
Description:

Symptom:
Nexus 7000 switch may exhibit excessive TX inband traffic rates affecting control-plane services after attempting to collect show interface trunk command output.

Bug is not specific to show int trunk command. It can happen anytime port state info request event is processed.
Request may come via SNMP request or another show command.

Check output of "sh hardware internal cpu-mac inband stats" for TX packet rate. With this bug, TX rate shoots up very high.

N7K1# sh hardware internal cpu-mac inband stats | in rate
Packet rate limit ........... 64000 pps
Rx packet rate (current/max) 1 / 16 pps
Tx packet rate (current/max) 15215 / 18753 pps <<====

AND

Check for below logs in the output of "show spanning-tree internal interactions".

+++++++++++++++++++++
1080) Event:(null), length:87, at 988005 usecs after Wed Oct 29 10:26:46 2014
stp_send_bpdu_now(4995): Start: reason During handling of port state info request

1081) Event:(null), length:85, at 980152 usecs after Wed Oct 29 10:26:46 2014
stp_send_bpdu_now(5017): End: reason During handling of port state info request
++++++++++++++++++++++

Conditions:
Nexus 7000 running 6.2(2) or later release with a high VLAN count. Whenever a port-state request is sent to STP, there are additional BPDUs sent out for each STP logical port in the system.

Workaround:
Do not use the command.
If using AAA with command authorization, the commands may be blocked in the ACS profile.

Further Problem Description:
To monitor CPU-Mac inband stats during an event use show hardware internal cp-mac statistics. The Tx rate increases drastically.

Rx packet rate (current/max) 632 / 3372 pps
Tx packet rate (current/max) 3174 / 31054 pps <<<<<

To verify when the MAX rate was triggered use "sh hardware internal cpu-mac inband events"

Note: The command will only record the MAX rate event if it surpasses the previously recorded max rate event.

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.2(6), 6.2(6a), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.22), 6.2(10)FM(0.26), 6.2(10)NO(0.20), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73)
Bug Id:
CSCuq82625
Title:
Eigrp classic/wide metric count incorrect leading to incorrect updates
Description:

Symptom:
EIGRP Router configured with wide metric updates ("metric version 64bit")
is sending classic updates, which will be ignored by peer. Peer will
no longer add routes from that peer.

Conditions:
- Have configured "metric version 64bit" for the EIGRP process.
- Have invalid values for "classic / wide metric" peers in "show eigrp interface"
to where the # of classic peers is > then the number of total peers.

n7k1-1# sh ip eigrp interfaces
IP-EIGRP interfaces for process 100 VRF default

Xmit Queue Mean Pacing Time Multicast Pending
Interface Peers Un/Reliable SRTT Un/Reliable Flow Timer Routes
Eth1/25 2 0/0 1 0/0 50 0
Hello interval is 5 sec
Holdtime interval is 15 sec
Next xmit serial
Un/reliable mcasts: 0/7 Un/reliable ucasts: 36/44
Mcast exceptions: 6 CR packets: 5 ACKs suppressed: 4
Retransmissions sent: 15 Out-of-sequence rcvd: 11
Authentication mode is not set
Use multicast
Classic/wide metric peers: 3/-1 <<<<<<<<<<<< We cannot have 3 classic peers if we only have a total of 2 peers.

Workaround:
- Unconfig and reconfig the eigrp instance
- no ip router eigrp and then reconfig ip router eigrp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.326), 7.1(0)EV(0.116), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283)
Bug Id:
CSCuq48411
Title:
iplus-291:vinci-FE:IPv6 host move failure- new leaf does not learn neigh
Description:

Symptom:
IPv6 VM host move across leafs in TF mode may lead to traffic black-hole

Conditions:
During V6 host moves, RARP packet is generated by the hypervisor of the moved host towards the old leaf. On processing the RARP packet, old leaf must generate a L2 unicast but L3 multicast NS for the moved host towards the fabric destined for the moved host. This packet was not being sent out of the fabric facing port because of this bug. As a result, the new host may not be detected at the new leaf.

Workaround:
After VM moves, the new host IPV6 neighbor entry may have to be manually cleared so that upon next NS from the moved host, the moved host gets detected at the new leaf.

Further Problem Description:
In Vinci TF mode, when host is moved across leafs, then it may lead to IPv6 traffic black-hole for some time till the moved host is learnt in the IPv6 Neighbor table of the new leaf.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1(0.291)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZD(0.256), 7.0(1)ZN(0.536), 7.0(4)N1(0.151), 7.0(4)N1(1), 7.1(0)D1(0.257), 7.1(0)OTT(0.34), 7.1(0)PDB(0.205), 7.1(0)ZD(0.305)
Bug Id:
CSCur03040
Title:
N7K - OTV crashes at isis_otv-default
Description:

Symptom:
Nexus 7000 may experience a process crash with OTV configuration.

Reason: Reset triggered due to HA policy of Reset
System version: 6.2(8a)
Service: Service "__inst_001__isis_otv" in vdc 2 hap reset

Conditions:
OTV must be configured. This issue was first seen on 6.2(8).

Workaround:
Unknown.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a), 7.1(0)SIB(99.39)
Known Fixed Releases:
6.0(2)A6(0.59), 6.0(2)A6(1), 6.0(2)U6(0.59), 6.0(2)U6(1), 6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.10), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357)
Bug Id:
CSCur29527
Title:
IPv6 Packets with Link-local as Source Address are forwarded
Description:

Symptom:
N7K forwards IPv6 packets with link-local as source IPv6 address.

Conditions:
N7K learns the default route from its BGP peer over MPLS link. The packet with link-local as source-address is seen to be forwarding.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.21), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCuf47376
Title:
Trunk/FEX FPC port config removed by "system def switchport fabricpath"
Description:

Symptom:
adding/removing 'system default switchport fabricpath' cli seems to affect the configuration of trunks/access/fex fabric ports.

On a system with this command, a disruptive upgrade/reload might also cause config issues

Conditions:
adding/removing 'system default switchport fabricpath' cli / reload/disruptive upgrade with this command

Workaround:
If reload/disruptive upgrade has to be done, take a config backup first to restore

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(14)FB(0.37), 7.1(0)AV(0.38), 7.1(0)PDB(0.324), 7.2(0)D1(0.392), 7.2(0)OTT(0.5)
Bug Id:
CSCuq81249
Title:
CoPP segmentation fault upon init
Description:

Symptom:
The Control Plane Policing (CoPP) process on a Nexus 7000 switch could unexpectedly crash and restart during initialization.

Conditions:
When PPF sends two responses for a single statistics request sent by the CoPP manager

Workaround:
No known workarounds.

Further Problem Description:
CoPP has timer to collect statistics from Line card every 5 minutes. CoPP expects only one consolidated statistics response for a single statistics request. But PPF library sent two responses for the same statistics request. This unexpected behavior caused CoPP to crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2)S42
Known Fixed Releases:
6.0(2)A5(1), 6.0(2)U5(1), 6.1(2)I3(2.10), 6.1(2)I3(3), 6.2(10), 6.2(10)S78, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.138)
Bug Id:
CSCup95948
Title:
LISP crash in lisp_build_eid_notify due to two EIS Notify GWs configured
Description:

Symptom:
The N7K unexpectedly wrote out a LISP core file.

Conditions:
The N7K is configured with LISP Multihop, the node is acting as First Hop and two eid_notify gateways are configured.

Workaround:
Configured just one eid_notify gateway (if the Network design allows)

Further Problem Description:
The core file will only happen for certain numbers of dynamic prefixes. The length of the generated UDP packet must be a multiple of 256, which makes it hard to predict when this defect is triggered.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S28, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.228), 7.1(0)D1(0.271), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179)
Bug Id:
CSCur75014
Title:
("sequence timeout") communicating with MTS_SAP_PVLAN for opcode
Description:

Symptom:
When large number of PVLAN ports are brought down simultaneously either through cli or OIR of line module, or change of mode, sequence timeout errors occur and when the ports are brought back up traffic is not forwarded out of them.

%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RID_PORT: Ethernet4/27)
%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RID_PORT: Ethernet4/26)

Conditions:
Having more than 5 PVLAN ports (L2 trunk or PC) with any PVLAN mode other than "host"

Workaround:
There is no workaround.

Recovery step to clean database is to reload switch

Further Problem Description:
There is no way to avoid hitting issue if you match pre-conditions and triggers.
NXOS 6.1.2 until 6.2(10) is affected.
Fix is upcoming in 6.2(12)

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(2), 6.1(4a), 6.2(10), 6.2(6b)S2, 6.2(8), 6.2(8a)
Known Fixed Releases:
6.1(2)I3(3.65), 6.1(2)I3(4), 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320)
Bug Id:
CSCuq36827
Title:
N5k/N6k - Routing unknown u/c and link local b/c packets
Description:

Symptom:
Symptom:Nexus 5000 & 6000 series switches may route packets with an unicast IP destination address and a broadcast destination mac address. The same is also observed for Unknown Unicast flooded packets hitting the CPU and getting routed, i.e. source MAC being rewritten to the Router MAC of the switch which is routing the packet.

Conditions:
Switches running in L2 mode or without L3 license. SVI exists for the VLAN in which such an issue is observed.

Workaround:
For unicast flooding one of the ways to minimize is to synchronize MAC aging with ARP refresh, such that MAC aging on switches is higher than ARP refresh on devices performing routing in the network.

More Info:

Conditions:
Switches running in L2 mode or without L3 license. SVI exists for the VLAN in which such an issue is observed.

Workaround:
Workaround:For unicast flooding one of the ways to minimize is to synchronize MAC aging with ARP refresh, such that MAC aging on switches is higher than ARP refresh on devices performing routing in the network.

shutdown or remove the svi in the vlan in question.

I.e. move management ip address from inband vlan to out of band management interface mgmt0.

B>More Info:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZN(0.4)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZD(0.252), 7.0(1)ZN(0.517), 7.0(4)N1(0.143), 7.0(4)N1(1), 7.1(0)D1(0.257), 7.1(0)OTT(0.34), 7.1(0)PDB(0.205), 7.1(0)ZD(0.305)
Bug Id:
CSCur34065
Title:
u6rib cored @u6rib_process_clt_stale while deleting vdc
Description:

Symptom:
the crash seems to occur because of a client clean up issue

Conditions:
Crash is seen when vdc is reloaded

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.303), 7.1(0)D1(0.308), 7.1(0)ZD(0.348), 7.1(0)ZD(0.355), 7.2(0)ZD(0.5)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.315), 7.1(0)OTT(0.45), 7.1(0)PDB(0.269), 7.1(0)SIB(99.52), 7.2(0)N1(0.3), 7.2(0)N1(0.7), 7.2(0)N1(1)
Bug Id:
CSCur19960
Title:
IPv6 mcast transient traffic drop during ISSU on non-default vdc
Description:

Symptom:
IPv6 mcast transient traffic drop during ISSU

Conditions:
During ISSU [ LC upgrade time frame] PIM6 may age out S,G entries, since packet stats wont be available during that time. This would result transient loss.

Workaround:
workaround is not available. [ Transient loss will get recovered ]

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S94
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.299), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.372), 7.1(0)N1(1), 7.1(0)OTT(0.41)
Bug Id:
CSCuq54742
Title:
PVAN-vPC+:Allowed vlan in vpc+ does not work if re-configured after ISSU
Description:

Symptom:
Port with switchport trunk allowed vlan xx configuration and in mode other than trunk we will see vlan not in allowed list going down on those ports.

Conditions:
interface port-channel3
switchport
switchport mode private-vlan trunk promiscuous
switchport trunk allowed vlan 1-7,9-4094 <<<<----- This is the issue, this will remove vlan 8 from the notification
switchport private-vlan trunk allowed vlan 8
switchport private-vlan association trunk 10 50
switchport private-vlan mapping trunk 10 30,40,50
vpc 3

Workaround:
interface port-channel3
switchport
switchport mode private-vlan trunk promiscuous
switchport trunk allowed vlan 1-7,9-4094 <<<<----- Remove this config or add vlan 8 to it as well.
switchport private-vlan trunk allowed vlan 8
switchport private-vlan association trunk 10 50
switchport private-vlan mapping trunk 10 30,40,50
vpc 3

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S58
Known Fixed Releases:
6.2(10), 6.2(10)S62, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.263), 7.1(0)OTT(0.36), 7.1(0)PDB(0.200)
Bug Id:
CSCuo15015
Title:
urib process crash on N7k
Description:

Symptom:
A N7k running 6.2(2a) crashed on the urib process

Conditions:
This is a corner case. With frequent binding and unbinding of dynamic saps during lots of parallel CLI command processing, q handle management may cause the system subject to this bug.

Workaround:
None. But reducing the number of parallel CLI commands being processed by an application may reduce the chance of this bug.

Further Problem Description:
Impact: Process can crash and will be re-started by HA.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2a), 7.1(0)D1(0.179)
Known Fixed Releases:
6.0(2)A6(0.78), 6.0(2)A6(1), 6.0(2)U6(0.78), 6.0(2)U6(1), 6.1(2)I3(2.19), 6.1(2)I3(3), 6.2(10), 6.2(10)CM(0.10), 6.2(10)CM(0.9), 6.2(8)KR(0.8)
Bug Id:
CSCur24427
Title:
6210 : VLAN_MGR Event Seq. Timed Out on deleting vlans
Description:

Symptom:
VLAN MGR sequence timed out syslog seen on doing a delete for a range of PVLANS. This is seen only when the number of PVLANS is around 40 in the system

Conditions:
happens when there are 40 or more PVLANS configured and range delete operation on VLANS is attempted

Workaround:
Customer is advised to not delete VLAN in the range of >30 PVLANs at a time.

Even though the event seq for PVLAN times out, VLAN delete operation is successful and the vlans do get deleted from the system.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)PDB(0.303), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCur28449
Title:
vPC crashed on switch on Soft switchover
Description:

Symptom:
Core generated by vpc component

Conditions:
This core can be generated under scenarios when the vpc ports are coming up and failure happens in other parts of the system such as a linecard reload.

It is triggered by a failure to respond in time by the sdb component

Workaround:
No functional impact. The vpc process will restart and continue the processing it was doing.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.5), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.301), 7.2(0)D1(0.387)
Bug Id:
CSCup94137
Title:
API bd_mgr_is_sw_bd_in_vlan_range() is failing in rtm_get_vni_l2_tpg().
Description:

Symptom:
the api returns error if there is no system bridge-domain configured in the switch. Need to return success and set bd_di that it is a vlan.

Conditions:
Do not configure system bridge-domain and call the api.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.201)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.227), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.157)
Bug Id:
CSCup94791
Title:
vlan crashed @ mts_vlan_bridge_domain_tech_check
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)PDB(0.154), 7.1(0)ZD(0.260)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.201), 7.1(0)D1(0.207), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)VX(0.3)
Bug Id:
CSCur03059
Title:
VPC+ peer link not part of a topology
Description:

Symptom:
While configuring VPC+ with 8 topologies, we observe that the peer link is not included as part of one of the topologies.

Conditions:
Configure topologies while the switch is in transient busy state.

Workaround:
Repeat the same topology config

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S68
Known Fixed Releases:
6.2(10), 6.2(10)S91, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.332), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68)
Bug Id:
CSCuq68379
Title:
6210:S64:: res_mgr crash @return res_mgr_data_pss
Description:

Symptom:
A N7K running NX-OS 6.2.x prior to 6.2.10 may crash and produce core files in the Resource Manager Daemon.

show system reset-reason may show

----- reset reason for module 10 (from Supervisor in slot 10) ---
1) At 193686 usecs after Wed Aug 13 15:05:21 2014
Reason: Reset triggered due to HA policy of Reset
Service: res_mgr hap reset
Version: 6.2(2a)

Conditions:
With a relatively low likelihood, a crash/core file may occur when res_mgr handling duplicated HA msg

Workaround:
n/a

Further Problem Description:
n/a

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2), 6.2(2a), 6.2(6), 6.2(6a), 6.2(6b), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S66, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.263), 7.1(0)OTT(0.36), 7.1(0)PDB(0.205)
Bug Id:
CSCuq27662
Title:
Clear install log-history all do not clear the install logs
Description:

Symptom:
Clear install log-history all do not clear the install logs

Conditions:
On Nexus5000 platform, prior install id's are not cleared when issuing the command clear install log-history all

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.280), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.350), 7.1(0)N1(1), 7.1(0)OTT(0.39), 7.1(0)PDB(0.228)
Bug Id:
CSCur25124
Title:
SSTE: L2VPN traffic loss is observed after ISSU followed by LC reload
Description:

Symptom:
Route updates from L2VPN are not processed and there might be traffic loss. No further updates will be processed.

Conditions:
This problem might occur on an ISSU to a 6.2.10 version or earlier.

Workaround:
A SUP switchover will correct the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100, 6.2(12)FT(0.26), 7.2(0)D1(0.386)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)PDB(0.301), 7.2(0)D1(0.387)
Bug Id:
CSCur20430
Title:
Memory leaks are detected from process core dump after testing ACL
Description:

Symptom:
when we issue no sequence number under acl configuration, we observed 152 bytes leak in aclmgr side.

Conditions:
delete sequence number of ACE

Workaround:
workaround is not available.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S86
Known Fixed Releases:
6.2(12), 6.2(12)S21, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.125), 7.1(0)PDB(0.317), 7.1(0)RTG(0.53), 7.2(0)D1(0.355)
Bug Id:
CSCuq06354
Title:
connection issue between WS-C3750X-48T-S and N7K-F248XT-25E
Description:

Symptom:
when connect WS-C3750X-48T-S and N7K-F248XT-25E, and when disconnect F2 module,
the ports of both catlyst and nexus side remain down .

Conditions:
connect WS-C3750X-48T-S and N7K-F248XT-25E and then disconnect / reconnect F2 port /

Workaround:
shut/ no shut the port or
hard code speed or
duplex on port

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S62, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.258), 7.1(0)OTT(0.34), 7.1(0)PDB(0.198)
Bug Id:
CSCuq03603
Title:
N7K:6210:potential aclmgr mem leak
Description:

Symptom:
when we issue show command in the standby supervisor, aclmgr has a leak in command library.
the size of leak is 196 bytes per show command
(show system internal aclmgr log)

Conditions:
we issue show command in the standby supervisor

Workaround:
avoid issuing show command in the standby supervisor

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10), 7.1(0)D1(0.308)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.233), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)RTG(0.22), 7.1(0)ZD(0.288)
Bug Id:
CSCur10877
Title:
VinciPE:ipv6 default route does not have the segid
Description:

Symptom:
In VinciPE setup , the ipv6 default route does not have the segid.
Conditions:
When the default route is generated using "default-information originate" command.
Workaround:
Generate default route using "redistribute" or "network" commands.
More Info:












Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1(0.349)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.290), 7.1(0)N1(0.363), 7.1(0)N1(1), 7.1(0)OTT(0.40), 7.1(0)PDB(0.235), 7.1(0)SIB(99.52), 7.1(0)ZD(0.336)
Bug Id:
CSCur03111
Title:
MACSEC N7K: Link drop with High Traffic on F2E
Description:

Symptom:
Without MACSEC traffic passes fine and the customer can push roughly 8.6 gig of traffic on the link. However, When MACSEC is configured initially the connection is established as long as there is roughly 5 gigs of traffic or less the link stays established.

At about 6.5 gigs of traffic, CRC errors may start being seen on the peer port. After that SAP rekey may fail and the macsec link go down. Link will stay down in SAP AUTHEN INCOMPLETE state.

shut/no shut of the interface or remove/reapply of cts config may not resolve the issue. The port would operate in non-cts mode but not in cts encryption mode. Module needs to be reloaded to recover to cts encryption operation.

Conditions:
1. MACSEC is enabled.
2. egress traffic rate exceeds the effective line rate for encrypted traffic.

Workaround:
Limit the traffic egressing out of Macsec ports to less than effective 10G linerate (including Macsec header overhead). This may be roughly 6.5G for 64B packets.

Further Problem Description:
Macsec encryption has an overhead of 32-40B which goes on to the the wire as part of the packet. This causes the effective packet size on the wire to increase. For 64B packets, this is an overhead of ~33%, resulting in support for only 65% line rate. This percentage is a function of packet size and varies between 0.1%-33%. The device was configured to error out the extra packets causing drop in traffic and Bad CRCs. This resulted in link going down since EAPOL packets were also getting dropped.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S91, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)EV(0.116), 7.1(0)OTT(0.45), 7.1(0)PDB(0.245)
Bug Id:
CSCur07911
Title:
OTV - ISIS does not advertise mac address to any peers
Description:

Symptom:
OTV fails to send mac updates to peers in unicast mode from local site to remote, causing connectivity issues

Conditions:
No trigger known at present

Workaround:
Workaround is to flap the affected overlay interface by shut/no shut.

Further Problem Description:
Problem may only be present in 6.2-based code.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.9), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.330), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68)
Bug Id:
CSCur23435
Title:
with multiple simultaneous terminals private VLAN gets locked
Description:

Symptom:
VLAN configuration could get locked and not able to process any vlan configuration changes anymore.

Conditions:
While configuring private vlan associations from one terminal, if the user simultaneously deletes primary vlans from another terminal PVLAN (Private-Vlan) get locked and cause lock of complete vlan database.

Issue can happen only when configuration are done over multiple terminal session where one session configure private vlan association and second deleting private vlans before first session exit vlan configuration.

Workaround:
Do not simultaneously delete private-vlans from another terminal while configuring the same private-vlans from one terminal. However If you run into this issue, then reload vdc or switch would be required to recover from this problem.

Further Problem Description:
Example of problem configuration. 2 Sessions are open:
Session 1 and Session 2 - numbers represent order in what CLI are added on device on above sessions:


Numbers are order how to execute cli in those 2 sessions.

Session1:
1. vlan 231
2. enter

Session2:
3. no vlan 231 + enter

Session 1
4. private-vlan association 1300,1302-1303 + enter
5. end + enter

At this point vlan database will get lock

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.9), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387)
Bug Id:
CSCuq55039
Title:
SSTE: Nexus7k ORIB core while polling OTV mib & restart otv-isis default
Description:

Symptom:
Crash seen in orib_show_internal_snmp_route if otv-isis process is killed and restarted by command line interface while the OTV mib (1.3.6.1.4.1.9.9.810) is being polled.

Conditions:
Seen if the otv-isis process is killed and restarted by the command line interface while the OTV mib (1.3.6.1.4.1.9.9.810) is being polled.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S58
Known Fixed Releases:
6.2(10), 6.2(10)S66, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.271), 7.1(0)OTT(0.36), 7.1(0)PDB(0.219), 7.1(0)RTG(0.33)
Bug Id:
CSCur31394
Title:
aclmgr crash seen when adding/removing ACL to many SVIs at the same time
Description:

Symptom:
aclmgr crash is seen when applying/removing large ACL config to SVI, for example:

interface vlan 1-800
no ip access-list X

will see something like:

SYSMGR-2-SERVICE_CRASHED: Service "aclmgr" (PID 6058) hasn't caught signal 6 (core will be saved)

Conditions:
This is not traffic impacting.

Workaround:
apply ACL config in smaller chunks, for example:

interface vlan 1-100
no ip access-list X

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100, 6.2(10)S102, 6.2(12)FT(0.26), 6.2(12)S21, 6.2(12)S25, 6.2(8a)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.1(2)I3(3.44), 6.1(2)I3(4), 6.2(10.21)S0, 6.2(12)
Bug Id:
CSCup80317
Title:
GBR-Bundle->GBR-Bugfix sync:switch got stuck during bridge domain config
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.179), 7.1(0)D1(0.231), 7.1(0)PDB(0.138)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.196), 7.1(0)D1(0.201), 7.1(0)D1(0.204), 7.1(0)D1(0.215), 7.1(0)D1(0.221), 7.1(0)D1(0.232), 7.1(0)FC(0.2)
Bug Id:
CSCup77035
Title:
[GBR performance] ospf process command execution takes huge time
Description:

Symptom:
With GBR release 179, 193 and within vdc scale

Conditions:
scaled vdc

Workaround:
Unknown still

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.179), 7.1(0)D1(0.188), 7.1(0)D1(0.196)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.232), 7.1(0)N1(0.287), 7.1(0)N1(0.288), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)RTG(0.22)
Bug Id:
CSCuq67047
Title:
N7K: PIM6-3-M6RIB_ADD_ROUTE failure on LC reload with 200 PIM neighbors
Description:

Symptom:
When a module is the only one with PIM6 enabled on it interfaces and it connects to a large number of PIM6 neighbors with a large number of groups per neighbor, then reloading the module can cause subsequent PIM6 interactions with M6RIB to fail permanently, causing traffic loss.

Conditions:
The problem was only seen with 200 PIM6 neighbors on the module and 40 groups per neighbor. It was not seen with 30 groups per neighbor.

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.246)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.288), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.361), 7.1(0)N1(1), 7.1(0)OTT(0.39)
Bug Id:
CSCuq31720
Title:
ES common LID is 0x0 after switchover or ISSU
Description:

Symptom:
Prior to switchover or upgrade using ISSU
rt55cn01an# sh sys internal pktmgr internal vdc inband | i 11a
In VDC 6 0x11a1 6 24
In VDC 2 0x11a2 2 0
In VDC 3 0x11a3 3 0

You might also see an error message in syslog
%VPC-2-VPC_ES_FAILED_LID_ALLOC: Failed to negotiate common LID between vPC peers.

After Switchover or upgrade using ISSU
show system internal vpc info glob | i ES
ES common LID:0x0 Bitset of Reserved resources: 2
ES lid in SDB: 0x11a3
show system int pktmgr internal vdc inb | i 0x11a
In VDC 6 0x11a1 6 548
In VDC 2 0x11a2 2 0
<<<< VDC 3 not present

The packets ingressing vpc+ port-channels going to CPU for the affected VDC will be dropped

Conditions:
M1/F1vpc+. in multiple VDCs
This happens only to vpc secondary

Workaround:
To avoid getting into this state, while configuring vpc+ in multiple VDCs, give atleast 5 mins for each vpc+ peer-link to come up.

If a VDC is problematic state after the upgrade/sup failover, bounce the peer-link of only the affected VDC. If multiple VDCs are affected, give atleast 5 mins between bouncing peer-link from each VDC

Further Problem Description:
Known Triggers:
Chassis Reload
Bringing up vpc+ peer-link up in multiple VDCs at the same time
Multiple VDC reloads at the same time
Module with all peer-links from multiple VDCs is reloaded or replaced





Note: The impact of this bug will only be seen after supervisor failover including ISSU

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6b), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S53, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.255), 7.1(0)OTT(0.34), 7.1(0)PDB(0.194)
Bug Id:
CSCuq90761
Title:
N7K: 30 - 60 sec traffic loss when restart pim process on ingress PE
Description:

Symptom:
30 - 60 sec traffic loss when pim is restarted/after switchover for groups which falls under SSM config range.

Conditions:
When SSM config command is replayed, PIM request MRIB to clear all routes for that range.But this should be done during command config time not during restart/switchover.( That is the issue here)

Workaround:
No workaround is available. [ Traffic will resume after routes are learnt ]

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.254)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.281), 7.1(0)N1(0.353), 7.1(0)N1(1), 7.1(0)OTT(0.39), 7.1(0)PDB(0.228), 7.1(0)SIB(99.52)
Bug Id:
CSCuq55557
Title:
VxLAN: vPC fails to send triggered PIM hello
Description:

Symptom:
Temporary Traffic loss

Conditions:
A newly come up L3 interface A. has DR-delay timer configured, B. Provides better route to a multicast source or Rendezvous Point (in case of shared tree forwarding). The multicast tree gets changed and thus if a stream is already flowing, gets affected temporarily.

Workaround:
Remove DR-delay timer for this interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.221)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.261), 7.1(0)D1(0.262), 7.1(0)N1(0.326), 7.1(0)N1(1), 7.1(0)OTT(0.34), 7.1(0)PDB(0.208), 7.1(0)RTG(0.40)
Bug Id:
CSCur83912
Title:
Multiple private vlan crashes after reload
Description:

Symptom:
After switch reload PVLAN was crashing. This crash will only be seen in gdb images, and will not affect final images. This happens when PVLAN is already in an errored state and no PVLAN config is going through due PVLAN being in locked state.

Conditions:
The setup was already in an errored state where some of the port-channels in PVLAN db were in an errored state, whereas the member ports of the same port-channels were in a good state with the pvlan mapping saved in PSS. When box reload was done, the PC and member port config did not match, hence when HW programming request for PC was sent after reload, it did not find any PVLAN mappings on PC from PSS and asserted.

Workaround:
This issue has been resolved.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(12)FT(0.14)
Known Fixed Releases:
6.2(12), 6.2(12)S1, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCuq39832
Title:
Crash in Resource Manager Daemon
Description:

Symptom:
A N7K running NX-OS 6.2.x prior to 6.2.10 may crash and produce core files in the Resource Manager Daemon.

show system reset-reason may show

----- reset reason for module 10 (from Supervisor in slot 10) ---
1) At 193686 usecs after Wed Aug 13 15:05:21 2014
Reason: Reset triggered due to HA policy of Reset
Service: res_mgr hap reset
Version: 6.2(2a)

Conditions:
With a relatively low likelihood, a buffer overflow might be triggered when issuing one of the following commands:

show resource
show resource vlan (or another resource name from show resource ?)
show vdc resource detail
show vdc resource vlan (or another resource name) detail
show vdc vdc-name resource
show vdc vdc-name resource vlan (or another resource name)


When the user has frequently created/deleted vlans across multiple VDCs, the user is more susceptible to this issue.

Workaround:
If possible, do not run those listed commands and use alternatives such as "show vdc resource" and "show vdc resource vlan (or another resource name)".

If the user really needs to perform those commands, they can lower the risk of hitting this issue by first doing one of the following (or combining them): (a). reload switch during maintenance window (b). use "limit-resource xxx minimum xxx maximum xxx" to raise the minimum value as much as possible. In particularly, the user might want to raise the minimum value for vlan: limit-resource vlan minimum xxx maximum xxxx.

Further Problem Description:
n/a

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2), 6.2(2a), 6.2(6), 6.2(6a), 6.2(6b), 6.2(8), 6.2(8a), 7.1(0)D1(0.235)
Known Fixed Releases:
6.2(10), 6.2(10)S52, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.244), 7.1(0)NF(0.32), 7.1(0)OTT(0.31), 7.1(0)PDB(0.180)
Bug Id:
CSCuq31626
Title:
SPM: spm crash after LISP ISSU from 6.2.10.S45->7.1(0)D1(0.229)
Description:

Symptom:
After performing an ISSU from 6.2.10->7.1(0), the SPM service crashes once and then recovers.

Conditions:
LISP policies are installed.

Workaround:
None required. SPM will recover after the crash.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.229)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.245), 7.1(0)OTT(0.31), 7.1(0)PDB(0.194), 7.1(0)RTG(0.20), 7.1(0)ZD(0.294)
Bug Id:
CSCup95423
Title:
BFD Initial P packet ignored if the session is still in INIT state
Description:

Symptom:
N7ks running 6.2(6a) running BFD with Arista . BFD flaps for several minutes initially before finally remaining up The issue seems to be with the way BFD is negotiating the timers.

Conditions:
During BFD initialization when both end points send their respective P packets at the same time. NXOS

Workaround:
Increase the bfd timers or slow-timers to trigger a P packet retransmission.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
6.1(2)I3(2.39), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.10), 6.2(12)FT(0.5), 6.2(6b)E1, 7.0(0)BZ(0.46)
Bug Id:
CSCuq79746
Title:
N7K: reload line card - mrib crash with 1k PIM neighbors with 255 groups
Description:

Symptom:
MRIB process crashes

Conditions:
While reloading the linecard, PIM process started shutting down as the last PIM interface is getting deleted.
At this time, MRIB is cleaning up the routes and cleaning up resources allocated for the PIM client and at this time, it crashes while trying to destroy the lock. since another thread has obtained the lock.

Workaround:
No Workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.246)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.320), 7.1(0)OTT(0.47), 7.1(0)PDB(0.269), 7.1(0)SIB(99.68), 7.2(0)N1(0.11), 7.2(0)N1(0.3)
Bug Id:
CSCup83732
Title:
N7K: PIM crash on shutdown loopback interface on egress PE in MVPN ASM
Description:

Symptom:
PIM process crashed

Conditions:
loopback interface which used by BGP and multicast, is shutdown.

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.188)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.214), 7.1(0)FC(0.2), 7.1(0)N1(0.267), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)PDB(0.163)
Bug Id:
CSCup76505
Title:
6.2.10.S16::N7k F3 Sys Sanity::Seeing ipqosmgr core after reload of UUT
Description:

Symptom:
Apply qos & queuing configs then reload the switch with copy running to start-up. Once switch comes up ipqosmgr core is seen.

Conditions:
Its seen with qos/queuing configs.

Workaround:
No Workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S16
Known Fixed Releases:
6.2(10), 6.2(10)S23, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.224), 7.1(0)FC(0.2), 7.1(0)N1(0.275), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.20)
Bug Id:
CSCur12912
Title:
rpm cores following module failure
Description:

Symptom:
Following module bringup after failure, vmm timeout seen causing ports not getting allocated to vdc. RPM cored post that and VDC came up

Conditions:
none

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S90
Known Fixed Releases:
6.2(10), 6.2(10)S93, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.2(0)D1(0.358), 7.2(0)ZD(0.47), 7.2(0)ZN(0.54)
Bug Id:
CSCuq55539
Title:
FIB route inconsistencies after ISSU 628-> 6210S58
Description:

Symptom:
Route inconsistencies from a release to any release prior to 6.2.10

Conditions:
ISSU with a huge route scale (> 500K)

Workaround:
clear ip route * for the inconsistent routes will fix the issues.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S58
Known Fixed Releases:
6.2(10), 6.2(10)S66, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.297), 7.1(0)OTT(0.41), 7.1(0)PDB(0.234)
Bug Id:
CSCur52940
Title:
N7K - snmpd cores cause Supervisor HAP reset - transceivers
Description:

Symptom:
The "snmpd" process may crash continuously leading to a supervisor HAP reset.

Conditions:
Polling "ciscoEntitySensorMIB", that result in reading DOM information from 10G or 40G or 100G transceiver, during (re)initialization of the transceiver.

(Re)Initialization of transceiver happens only when -
- The transceiver is being reseated
- The linecard in which the transceiver is seated is reseated or reloaded
- The switch itself is being reloaded

Workaround:
Block ciscoEntitySensorMIB from being polled. This can be done by creating a new role, as follows:

(config)# role name skipEntSensor <--------------------- name can be anything.
(config-role)# rule 1 permit read
(config-role)# rule 2 deny read oid 1.3.6.1.4.1.9.9.91
(config-role)# end

(config)# snmp-server community safeWalk group skipEntSensor <-------------- safeWalk in this example is the community name. Change it to whatever is used in production.

After this when a snmpwalk (getnext) is done ciscoEntitySensorMIB is skipped.

All community strings configured on the switch will need the
role group skipEntSensor applied to include public, private, etc. community strings

Further Problem Description:
The snmpd crash is caused by invalid data returned by port-client due to an internal timeout when reading the DOM of a transceiver that is still initializing.

This problem is seen only on 6.2.10 software version.

DOM is not accessible through CLI when the port/transceiver is still initializing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10)E6, 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.14), 6.2(12)FT(0.20), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.137)
Bug Id:
CSCur22743
Title:
CB40-brk: FP-reg: Duplicate mcast traffic seen after vdc suspend
Description:

Symptom:
Duplicate traffic for VDC suspend trigger on routers in a LAN. This issue can be hit if a one of the switch has L3 multicast route oifs/oils with multiple owners and when the oif/oil is going away on non-DR.

Ex:

(1.0.99.11/32, 235.0.0.3/32), uptime: 01:01:23, pim mrib ip igmp
Incoming interface: Null, RPF nbr: 0.0.0.0
Outgoing interface list: (count: 1)
Vlan101, uptime: 00:03:13, pim, mrib

Conditions:
This can happen on a stand alone IHR or LAN LHR switches which have PIM and IGMP ownership for the same route oif/oil and there is a delete happening for the oif.

Workaround:
clear ip mroute

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.1(0)RTG(0.55), 7.2(0)D1(0.355)
Bug Id:
CSCur11131
Title:
In large vlan scale setup SPM is timing out causing issues
Description:

Symptom:
Interfaces are not recognized on switch privilege mode or config terminal prompt or in show interface status.
Sometimes VDC creation can take time too.

Conditions:
Any port bring up activity on a scale testbed of total 400+ vlans and 500 L2 ports or port-channels, allowing most vlans.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S89, 6.2(8)S3, 7.1(0)RTG(0.43)
Known Fixed Releases:
6.2(10), 6.2(10)S91, 6.2(10)S98, 6.2(10.16)S0, 6.2(10.17)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.301), 7.1(0)EV(0.116)
Bug Id:
CSCur01307
Title:
No triggered PIM register sent on DR during RP change
Description:

Symptom:
After an RP has changed, the first hop router should trigger a NULL register to the new RP to create the S,G state on the new RP. If a new receiver joins after the RP change, it may not receive traffic till the next register is sent to RP. (max 60 seconds)

Conditions:
Occurs when there was a very recent RP change, and the new RP did not have an (S,G) state for the corresponding group.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.1(0)RTG(0.54), 7.2(0)D1(0.355)
Bug Id:
CSCuq92491
Title:
SSTE: BGP sessions are down once i do reload after upgrading 6210 to 710
Description:

Symptom:
When upgrading Cisco NXOS 6.2.10 software to 7.1, after system reloads with new software, all BGP session are down.

Conditions:
When n7000 router is running 6.2.10 software, perform ISSU to upgrade to 7.1 software, and then reload system. After system comes up with 7.1 software, all BGP sessions are down.

Workaround:
There is no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.253)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.281), 7.1(0)N1(0.353), 7.1(0)N1(1), 7.1(0)OTT(0.39), 7.1(0)PDB(0.228), 7.1(0)SIB(99.52), 7.1(0)ZD(0.330)
Bug Id:
CSCur80369
Title:
Iplus Build 405 : Ospf hap reset on clear ip route *
Description:

Symptom:
clear ip route *

Conditions:
System reset due to OSPF hap

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1(0.405)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.0(2)FIP(0.6), 7.1(0)AV(0.38), 7.1(0)N1(0.416), 7.1(0)N1(1), 7.1(0)ZD(0.373), 7.1(0)ZN(0.491), 7.1(1)N1(0.34)
Bug Id:
CSCur12476
Title:
F1 port went into err-disabled state with PIXM error
Description:

Symptom:
port goes into err-disabled state. STP and PIXM sys logs also seen on console

Conditions:
happened when a mode or type change affected for a vlan

Workaround:
reload vdc or switch. delete the vlan and create the vlan again with the required mode or type

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S90, 6.2(10)S93
Known Fixed Releases:
6.2(10), 6.2(10)S94, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.312), 7.1(0)EV(0.116), 7.1(0)OTT(0.45), 7.1(0)PDB(0.246)
Bug Id:
CSCuq39227
Title:
snmpd service crashes when we issue "sh run | i community"
Description:

Symptom:
snmpd service crashes when we issue "sh run | i community" CLI on the device after a new community is created using snmpset. Also, all the snmp configs are cleared in run-config due to this issue.

Conditions:
Create a new community using snmpset & issue CLI "sh run | i community" on the device with "logging console" configured to see crash/cores generated. "show run snmp" shows snmp configs are cleared due to this issue.

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZD(0.272)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.257), 7.1(0)OTT(0.34), 7.1(0)PDB(0.205), 7.1(0)ZD(0.305), 7.1(0)ZN(0.405)
Bug Id:
CSCur13611
Title:
"Service not responding" mess log on console while verifying pbr stats
Description:

Symptom:
"Service not responding" mess log on console while verifying pbr stats

Conditions:
This error is seen if PBRv4 policy is having 1K ACE's.

Workaround:
Reduce the scale.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1(0.360)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.304), 7.1(0)N1(0.378), 7.1(0)N1(1), 7.1(0)OTT(0.41), 7.1(0)PDB(0.249), 7.1(0)RTG(0.62), 7.1(0)SIB(99.52)
Bug Id:
CSCuq68578
Title:
netstack crashed using devtest program
Description:

Symptom:
Netstack process crash.

Conditions:
On configuring more than 255 global address per interface

Workaround:
Don't configure more than 255 address per interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.321), 7.1(0)ZD(0.288)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.303), 7.1(0)OTT(0.41), 7.1(0)PDB(0.249), 7.1(0)ZD(0.348), 7.1(0)ZN(0.451)
Bug Id:
CSCuq20222
Title:
SMU 7.1: adjust timeout for all services to handshake across all VDCs
Description:

Symptom:
Service isis_l2mp failed to start with binary from a SMU. Then the symlink is reverted back to restart service (using old binary)

Conditions:
when activate a SMU

Workaround:
no Work around

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.196)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.233), 7.1(0)N1(0.290), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)RTG(0.22), 7.1(0)ZD(0.285)
Bug Id:
CSCuq33437
Title:
IPv6 TCAM failed to install
Description:

Symptom:
IPv6 TCAM failed to install

Conditions:
Everything looks good after ISSU upgrade. Started first convergence test by reloading a LC and noticed IPv6 TCAM failed to install after the LC reload.

Workaround:
Reload admin vdc

Further Problem Description:
Everything looks good after ISSU upgrade. Started first convergence test by reloading a LC and noticed IPv6 TCAM failed to install after the LC reload.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S41
Known Fixed Releases:
6.2(10), 6.2(10)S52, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.263), 7.1(0)OTT(0.36), 7.1(0)PDB(0.201)
Bug Id:
CSCuq81871
Title:
MVPN/NXOS: MDT Encapsulation information not populated
Description:

Symptom:
Multicast traffic inside VRF is not forwarded over MDT group to remote PE. Control plane exist however traffic is not reaching remote PE.

Conditions:
This could happen only for MVPN traffic in situation where S,G pin Join is send to VPC secondary and there is no local receivers and multicast traffic is received over orphan L3 interface

Workaround:
- Have always local receiver in VPC VLAN
- Change unicast routing to send S,G join always to VPC primary

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S77, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.301), 7.1(0)OTT(0.41), 7.1(0)PDB(0.249)
Bug Id:
CSCuq12236
Title:
N7K: mrib crash mrib_delete_route_internal on clear ip mroute in scale
Description:

Symptom:
mrib process is crashed and restarted on clear ip mroute *

Conditions:
when there is 15K more mroute state present

Workaround:
wait for mroute to expire by itself

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.196)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.227), 7.1(0)D1(0.235), 7.1(0)D1(0.240), 7.1(0)N1(0.279), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCur49910
Title:
show tech failed because no enough space
Description:

Symptom:
Some system configurations might see "No space left on device" message during "tac-pac" collection

Conditions:
18 slot Nexus chassis with all 18 F3 modules and all ports are broken out to be 10G causing max number of ports and max amount of logs to be collected might cause this issue.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.137), 7.1(0)PDB(0.317), 7.1(0)SIB(99.82), 7.2(0)D1(0.363)
Bug Id:
CSCur32203
Title:
Pvlan Timeout with Ethpm During ISSU
Description:

Symptom:
In a VPC setup with large number of ports/PCs, ETHPM may time out on PVLAN when peer link is flapped:

2014 Oct 17 14:34:13 F3-xbow1-vpcA %ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PRE_LOGICAL_UP, (RID_PORT: port-channel4096)

Further VPC legs may timeout on PVLAN during MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP

Conditions:
This may happen when there is a large number of ports or port-channels in the setup

Workaround:
Turn off feature private-vlan in the setup

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S102, 6.2(8a)S2
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.9), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387)
Bug Id:
CSCuq49866
Title:
snmpbulkwalk TIMEOUT Observed for CISCO-VTP-MIB
Description:

Symptom:
SNMP v3 BULK walk on CISCO-VTP-MIB might time out.

Conditions:
Device must be in VTP server or client mode.
Only observed while access with SNMP v3.

Workaround:
1) Increase timeout or 2) use SNMP v2c or v1.

Further Problem Description:
Problem exists in NXOS software releases 6.2(6) and 6.2(8).
Fix had been integrated into 6.2(10) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S53
Known Fixed Releases:
6.2(10), 6.2(10)S57, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.258), 7.1(0)OTT(0.34), 7.1(0)PDB(0.195)
Bug Id:
CSCup90903
Title:
vlan_mgr core seen on GBR-196S2
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.196)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.196), 7.1(0)D1(0.201), 7.1(0)D1(0.210), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12)
Bug Id:
CSCur05565
Title:
Traffic loss for intermittent source as rcvr PE does not rejoin data MDT
Description:

Symptom:
Traffic blackhole for intermittent source

Conditions:
1. Data MDT configured
2. Intermittent Source (source starts/ stops for few minutes/ starts again)

Workaround:
Stop traffic and joins and wait for routes to time out before restarting again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S77
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.293), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.367), 7.1(0)N1(1), 7.1(0)OTT(0.40)
Bug Id:
CSCuq22831
Title:
Crash in snmpd process due to heartbeat failure after netstack hogs CPU
Description:

Symptom:
The snmpd process crashed multiple times triggering a HAP-Reset:

----- reset reason for Supervisor-module 5 (from Supervisor in slot 5) ---
1) At 885418 usecs after Fri Jul 25 08:21:03 2014
Reason: Reset triggered due to HA policy of Reset
Service: Service "snmpd" in vdc 2 hap reset
Version: 6.1(3)

Conditions:
This occurs while polling interface counter statistics via SNMP.

Workaround:
Slowing down the interval of SNMP polling should help reduce the odds of hitting the issue. Disabling SNMP altogether should prevent the issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.1(2)I3(2.39), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.1(5)E1, 6.2(10), 6.2(10)S48, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.248)
Bug Id:
CSCur26119
Title:
EIGRP prefixes missing after interface flap
Description:

Symptom:
EIGRP interface/adjacency flap may cause some EIGRP prefixes not to be sent. You should typically be able to see such an occurrence via syslog. One example is below.

%EIGRP-5-NBRCHANGE_DUAL: eigrp-1 [pid x] (default-base) IP-EIGRP(0) 9: Neighbor x.x.x.x (Vlan x) is down: holding time expired.

Once this occurs, EIGRP route's may be missing from the EIGRP table.

Conditions:
- This has been seen with when using route tagging with distribute list, however this is not an absolute cause and effect.
- Occurrence of the issue is unpredictable given it also requires rare internal EIGRP condition when forming route-update packets.

Workaround:
- Clear the EIGRP process on the sending Nexus or clear eigrp neighbors "clear ip eigrp neighbor "

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.1(2)I3(3.44), 6.1(2)I3(4), 6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.7), 6.2(12)FT(0.5)
Bug Id:
CSCup13175
Title:
SSTE: LDP core while doing SSO and LC reload
Description:

Symptom:
LDP process crashes during cleanup. This mostly happens during the clean-up stage, when user unconfigures LDP or interfaces used by LDP go down.

Conditions:
During cleanup, if two threads access/modify the same resource, LDP may crash.

Workaround:
There is no workaround for this fix.

Further Problem Description:
LDP uses cross-OS radix tree API which is not thread safe. Issue happens when one thread modifies the tree, while another is reading it, resulting in memory corruption and crash of LDP process.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S82, 7.1(0)D1(0.151), 7.1(0)D1(0.188), 7.1(0)D1(0.196), 7.1(0)D1(0.228), 7.1(0)D1(0.240)
Known Fixed Releases:
6.2(10)E5, 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.251), 7.1(0)D1(0.262), 7.1(0)N1(0.313), 7.1(0)N1(1), 7.1(0)OTT(0.27), 7.1(0)PDB(0.199)
Bug Id:
CSCuc24792
Title:
no response to cli commands after configuring STP on titanium image
Description:

Symptom:
no response to many cli commands after configuring STP on titanium image

Conditions:

After configuring STP

Workaround:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(0.233)
Known Fixed Releases:
6.2(0.233)S2, 6.2(0.236)S0, 6.2(2), 7.2(0)VZN(0.30)
Bug Id:
CSCuo19840
Title:
Anycast HSRP in initial state after supervisor failover
Description:

Symptom:
Anycast HSRP in initial state after supervisor failover

Conditions:
Supervisor switchover

Workaround:

Further Problem Description:
Switch# sh hsrp anycast
Anycast bundle - 1 (IPv4)
Admin Status: Up Oper Status: Down
Reason: Invalid switch-id Cfged, :
Anycast Switch ID XXX

%HSRP_ENGINE-3-BUNDLE_ASID_REG_FAIL: Switch-id:XXX DRAP registration failed for bundle:1.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)S15
Known Fixed Releases:
6.2(10), 6.2(10)S3, 6.2(10.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.178), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.220), 7.1(0)N1(1)
Bug Id:
CSCuo41201
Title:
Netstack buffer leaking with IPv6 feature running
Description:

Symptom:
Netstack may run of buffers with certain IPv6 features configured, like OSPFv3, DHCPv6 and HSRPv6.

Conditions:
Following messages are observed when Netstack runs out of buffer:
NETSTACK-3-MBUF_FAILED netstack [xxxx] m_copyin() failed in ipv6_data_main() (80 bytes)
NETSTACK-2-MPULLUP netstack [xxxx] p_ip_output: m_pullup failed for IP, error Operation not permitted

Workaround:
None so far. Reload recovers the leaked memory. Even a forceful crash of Netstack process may help, however requires debug plugin.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.0(2)N2(3)
Known Fixed Releases:
5.2(1)N1(7.126), 5.2(1)N1(8), 6.0(2)N2(4.63), 6.0(2)N2(4.64), 6.0(2)N2(5), 6.1(2)I3(1), 6.2(10), 6.2(10)S74, 6.2(10.16)S0, 6.2(8)E10
Bug Id:
CSCur24950
Title:
Assert Metric and Metric Pref Value not updated in PIM route structure
Description:

Symptom:
Metric value and metric preferences are update while sending the assert packets but are not updated in the route details after obtaining the metrics from unicast.

Conditions:
The show command - 'show ip pim route' may not have the correct metric values from unicast.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.317), 7.1(0)OTT(0.45), 7.1(0)PDB(0.269), 7.1(0)SIB(99.52), 7.2(0)N1(0.3), 7.2(0)N1(0.9)
Bug Id:
CSCtt19402
Title:
NXOS/VPC: VPC chnnels not init for all ports when one link flaps
Description:

Symptom:

All channels are in the suspended state after reload and when VPC delay restore expire

Conditions:

This happen only when there is fast continuous flapping of some interfaces and only after reload of the VPC or when VPC is configured for the first time.

Workaround:

Shut down interfaces that are flapping to restore all VPC channels.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(1)N1(1), 5.2(3.29)S0, 6.1(0.168)S0, 7.2(0)VZN(0.30)
Bug Id:
CSCup43085
Title:
BD is down after copy r s reload with all configs intact
Description:

Symptom:
Na

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.169), 7.1(0)D1(0.172), 7.1(0)D1(0.174)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.179), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.14)
Bug Id:
CSCuo38700
Title:
PPM : show config-profile does not show include-instance under applied:
Description:

Symptom:
When parameterize profile is applied with include-instance option it is not working fine.

Conditions:
Happens when Profile A includes Profile B, and Profile B has all parameters defined.

Workaround:
Do not use include-instance option. without that general command of apply profile profile_name param-instance instance-name works fine.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.91), 7.1(0)D1(0.99)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.117), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.195), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCuo44890
Title:
OTV FC: Inter-op between ASR1K and N7K failed
Description:

Symptom:
OTV routes are not exchanged between a Nexus 7000 switch running 6.2(x) image and an ASR1K device. The overlay adjacency comes up fine, however no OTV routes are exchanged.

Conditions:
Nexus 7000 switch running 6.2(x) image

Workaround:
None so far. The fix would be integrated into the 6.2(12) release. 6.1(x) image work fine with the latest IOS code.
Another option for the customer is to use older IOS code - XE 3.12 with 6.2(x), as the interop issue exists
between XE 3.13 and 6.2(x).

Further Problem Description:
The fix that has been integrated into the 6.2(12) code needs to be implemented as follows.

N77-1(config)# inter overlay 1
N77-1(config-if-overlay)# shut (<<<N77-1(config-if-overlay)# otv-isis default
N77-1(config-router)# interop-enable
N77-1(config-router)# end
N77-1(config)# inter overlay 1
N77-1(config-if-overlay)# no shut
N77-1(config-if-overlay)# end

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a), 7.1(0)OTV(0.5)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.330), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283)
Bug Id:
CSCuo99830
Title:
ISSU: port_client core on F2/F3 handling unsupported port command
Description:

Symptom:
port-client core, ISSU failure, Ports suspended.

Conditions:
ISSU from 6.1(3) to 6.2(8).

Workaround:
Reload

Further Problem Description:
During the ISSU, once the SUP switchover is done, line card is upgraded. At this point, EthPm sends port commands to F2 Line card. Just before this, if there are any process crash (for ex: vpc crash, ungraceful VDC reload), when the port commands from EthPm are processed by port_client, the process crashes. We found that this possibly due to invalid pay load size being sent to port client.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(3), 6.1(4), 6.2(10)S26, 6.2(8)S9, 7.1(0)D1(0.148), 7.1(0)D1(0.161)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.214), 7.1(0)FC(0.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)PDB(0.163), 7.1(0)RTG(0.12)
Bug Id:
CSCuo71245
Title:
BD is up if switch reloaded with vni shutdown
Description:

Symptom:
BD remains up if we do a copy r s reload with vni in shut state

Conditions:
vni has to be down,

Workaround:
do a shut / no shut on bd again to bring back the bd.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.130)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.189), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.14), 7.1(0)PDB(0.141), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCuo83041
Title:
N7K : getnext cbeDot1dTpVlanAgingTime for partial value system crashes
Description:

Symptom:
Performing getnext operation on cbeDot1dTpVlanAgingTime with the index value more than 4094 will system crash.

Conditions:
Performing getnext operation on cbeDot1dTpVlanAgingTime with the index value more than 4094

Workaround:
Avoid using invalid index value more than 4094 for performing getnext operation on cbeDot1dTpVlanAgingTime.

Further Problem Description:
The problem exists in 6.2.x release.
Fixes has been integrated into 6.2(10) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.139)
Known Fixed Releases:
6.2(10), 6.2(10)S14, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.177), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.11), 7.1(0)PDB(0.100), 7.1(0)VX(0.3)
Bug Id:
CSCun42840
Title:
F3+brkout: ospf cores observed during cfd verification
Description:

Symptom:
OSPF crashes when trying to add a route that changes its type from either discard-internal or discard-external to a different route type (other than NONE). ONLY OSPFv2 in 6.2.6a is affected by this bug.

Conditions:
This issue is related to the presence of discard routes that OSPF adds into the RIB. When the discard route changes its type from discard internal(also discard-external) to some other type (other than NONE), which may be the case if the area range or summary address overlap with one of the component routes, OSPF can crash.

Both internal and external discard routes are affected by this bug. ONLY OSPFv2 in 6.2.6a is affected.

Workaround:
The following steps may be taken to minimize the exposure to this bug.

1. Configuring an area range/summary address that is less specific than all component routes.
2. Suppressing discard route may help in avoiding this crash;

Recovery: OSPF automatically recovers from this crash by doing a stateful recovery.

Further Problem Description:
Some additional questions answered.

1) Summary address is typically less specific than the component routes. Is the issue seen only when the summary address is the same as a component route?

The problem would be seen if the route-type changed from (a) discard-internal to some other type (e.g., inter or intra), or (b) from some other type (e.g., inter or intra) to discard-internal . Now, let us take the example of route-type changing from discard-internal to intra. This would be the case if there is a component in that area range that has the same prefix/masklen. If you have a area range that is strictly less specific than each one of the component routes, then, the route-type can only change from discard-internal to NONE, or NONE to discard-internal, and this will NOT cause the crash.

We can draw similar conclusions for discard-external routes also.

2) Would there be a crash if route changes *to* discard-*?
Yes. This would also result in a next-hop being deleted for the summarized route (e.g., intra) and another one added (discard-*) subsequently.

3) Can the router run into constant crashes? In which theoretical scenario?
In the stable network, we would only see this once. Once the route-type changes from (or changes to) a discard-*, then, we will not see further crashes. On the flip side though, each time the route-type changes from (or changes to) a discard-* , we will see the crash.


Example:
Let us say that the router is an ABR that summarizes everything under 123.123.123.0/24 coming in area 1.

router ospf 1
area 1 range 123.123.123.0/24

This will cause the following route to be installed in the RIB.
123.123.123.0/24, ubest/mbest: 1/0
*via Null0, [220/0], 00:00:02, ospf-1, discard

Due to this bug, OSPF will crash when trying to install an intra-area route that overlaps with the configured area range, such as the one below:

123.123.123.0/24, ubest/mbest: 1/0
*via 192.168.10.3, Eth2/7, [110/80], 00:00:02, ospf-1, intra

A similar problem will be seen with summary-address/external routes also. See the Unit test attachment for some more examples.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(7.10)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.30)S0, 6.2(8), 6.2(9)FM(0.37), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.72), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.120)
Bug Id:
CSCup89391
Title:
SNMP process crash
Description:

Symptom:
SNMP crash causing device reload

Conditions:
N/A

Workaround:
- use SNMPv2 instead SNMPv3

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
Bug Id:
CSCup13170
Title:
The leaf0 is getting hang after configured "no vrf context vpn1"
Description:

Symptom:
"no vrf context vpn1"
Upon giving this CLI, leaf0 hangs

Conditions:
Should configure the vrf context cli

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)BF(0.116), 7.1(0)BF(0.117), 7.1(0)BF(0.119), 7.1(0)D1(0.172), 7.1(0)D1(0.174), 7.1(0)ZD(0.227)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.179), 7.1(0)D1(0.188), 7.1(0)D1(0.191), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)OTT(0.14), 7.1(0)PDB(0.141)
Bug Id:
CSCty14876
Title:
5.2.4.S16 UDLD aggressive mode, port: error upon del of port-channel
Description:

Symptom:
UDLD aggressive mode, port: error upon del of port-channel

Conditions:
Just remove port-channel (peer link) on the switch

Workaround:
CoPP in 5.1.5

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(4)S16
Known Fixed Releases:
5.2(4)S28, 5.2(4.27)S0, 6.1(0.228)S0, 7.2(0)VZN(0.30)
Bug Id:
CSCup06023
Title:
u6route-mem allocation failure even though there is plenty of headroom
Description:

running into u6route mem allocation failure even though there's plenty of memory left.

e.g. A-VDC1# sh vdc resource u6route-mem detai

u6route-mem 6 used 134 unused 202 free 68 avail 208 total
-------------
Vdc Min Max Used Unused Avail
--- --- --- ---- ------ -----
AB-VDC1 24 24 1 23 23
A-1-B-VDC1 100 100 1 99 99
Test-VDC3 4 4 1 3 3
Test-VDC4 4 4 1 3 3
Test-VDC5 4 4 1 3 3
Test-VDC6 4 4 1 3 3

Symptom:
A-1-B-VDC1# sh log last 10

get warning messages with failure to allocate shared memory:

Failed to allocate shared memory for route trie node

2014 May 27 17:59:33 A-1-B-VDC1 %U6RIB-2-NOSMEM: u6rib [9610] (default-base)
Failed to allocate shared memory for recursive nexthop trie node
2014 May 27 17:59:43 A-1-B-VDC1 %U6RIB-4-SYSLOG_SL_MSG_WARNING: U6RIB-2-NOSME
M: message repeated 30671 times in last 121 sec
2014 May 27 18:00:23 A-1-B-VDC1 %BGP-5-ADJCHANGE: bgp-64896 [9979] (default)
neighbor cafe:1890:e000:1::10 Down - holdtimer expired error
2014 May 27 18:00:26 A-1-B-VDC1 %U6RIB-2-NOSMEM: u6rib [9610] (default-base)
Failed to allocate shared memory for route trie node
2014 May 27 18:00:36 A-1-B-VDC1 %U6RIB-4-SYSLOG_SL_MSG_WARNING: U6RIB-2-NOSME
M: message repeated 14688 times in st 52 sec
A-1-B-VDC1#

Conditions:
Verified with scale with 30k ipv6 and 655K ipv4 routes.
and with a hard swithover

Workaround:
N/A

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)E1, 6.2(10)S70, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.271), 7.1(0)OTT(0.36), 7.1(0)PDB(0.219)
Bug Id:
CSCun65741
Title:
HMM Entry for locally connected host is not available
Description:

Symptom:
HMM local host DB is not updated. Issue was caused because of the CSCun57894 fix in AM.

Conditions:
When Vinci forwarding mode is configured under an SVI. Local hosts are not discovered by HMM as AM is not notifying HMM about the local adjacencies.

Workaround:
Remove the Vinci forwarding mode and reapply. But new adjacencies will not be discovered. To discover new adjacencies one must remove and reapply the forwarding mode again for every new adjacency.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(1)ZN(0.204)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)N1(0.152), 7.0(1)N1(1), 7.0(1)ZD(0.149), 7.0(1)ZN(0.209), 7.1(0)D1(0.181), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.230)
Bug Id:
CSCun69580
Title:
MPLS TE Tunnel takes too long to go down around 30 - 40 secs
Description:

Symptom:
MPLS Tunnel takes too long to go down. Here is the setup.

N7k1-PE --e1/21--------e1/21--n7k2-p1---e1/25-------------e1/25--n7k1-pe2

Customer is using LSP verbatim and he has a tunnel from pe to pe2, when he shutdown the link e1/25 on n7k2-p1 switch the tunnel remains up for more than 30 secs. Customer wants conversion to be less than 3 secs. This is just with one tunnel.

Conditions:
Tunnel remains up

Workaround:
none

Further Problem Description:
MPLS Tunnel takes too long to go down. Here is the setup.

N7k1-PE --e1/21--------e1/21--n7k2-p1---e1/25-------------e1/25--n7k1-pe2

Customer is using LSP verbatim and he has a tunnel from pe to pe2, when he shutdown the link e1/25 on n7k2-p1 switch the tunnel remains up for more than 30 secs. Customer wants conversion to be less than 3 secs. This is just with one tunnel.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.17), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.75)
Bug Id:
CSCuo86388
Title:
NXOS-VPC-VPLS Scale-after Core LC OIR,subset of PW Remain in Down state
Description:

Symptom:
In a setup with scaled VFI's & PW's, some PW's may not come up.

Conditions:
Line Card OIR

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZD(0.181)
Known Fixed Releases:
15.4(3)M2.1, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.8, 15.5(1)S, 15.5(1)SN, 15.5(1)T1.1, 15.5(1.11)S
Bug Id:
CSCur35650
Title:
Platform Manager crashes during SNMP walk
Description:

Symptom:
Shortly after installing an N7K-F312FQ-25 line card, a Nexus 7009 running 6.2(8a) reboots.

Conditions:
Exact conditions not yet known

Workaround:
None yet

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(12), 6.2(12)S14, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.307), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCup19027
Title:
N7K Dual SUP lost configurations after power up
Description:

Symptom:
The N7K SUP1 had the configuration saved and was powered down. When the N7K was then powered up it came up with no configuration. The startup-configuration had been corrupted due to an abnormal termination when it had been previously saved.

Conditions:
When the "copyrunning-config startup-config" was entered it was terminated abnormally either the user entering CNTRL-C or the connection to the N7K, for example via SSH, being terminated before the "copy" was complete.

Workaround:
The configuration must be restored manually.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases:
6.2(10), 6.2(10)S64, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.195), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)N1(0.245)
Bug Id:
CSCuo43694
Title:
snmpd crash upon getnext on vtpInternalVlanTable with negative index
Description:

Symptom:
snmpd might crash when accessing vtpInternalVlanTable with a negative index.
SNMP walk vtpInternalVlanTable does not have issue.

Conditions:
Problem occurred only if accessing vtpInternalVlanTable with a negative index.

Workaround:
Use zero or positive index.

Further Problem Description:
The issue exists in NXOS software releases 5.2(1-9), 6.1(1-5), 6.2(1-8).
The fixes have been integrated into NXOS software release 6.2(9), 6.2(10) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.113)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.5), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(8.13)S0, 6.2(9)FM(0.68), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162)
Bug Id:
CSCuo47544
Title:
Netstack crash at ipv6_add_static_route in ipv6 static route add w/o VRF
Description:

Symptom:
Netstack process crashes

Conditions:
This issue is observed only when adding static route vlan for extranet case with forward reference (where vrf is not created)

Workaround:
Configure the VRF first for extranet case and then add the static route vlan to avoid the crash

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)S33
Known Fixed Releases:
6.1(2)I3(1), 6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.17), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317)
Bug Id:
CSCup46560
Title:
N7k: AAA daemon core
Description:

Symptom:
AAA daemon process crash

Conditions:
Nexus 7000 switches

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
6.1(2)I3(2.15), 6.1(2)I3(3), 6.2(10), 6.2(10)S15, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(3)I1(0.145), 7.0(3)I1(1), 7.0(3)I1(1.8), 7.0(3)I1(2)
Bug Id:
CSCtz15300
Title:
6.0.3 Introduce Flow Control for PIM
Description:

Symptom:
On a scaled setup with 20k multicast route entries, tracebacks and malloc failed messages seen on doing clear ip mroute * continuously

2012 Sep 10 16:06:21 l3sys2-agg1-A3 %PIM-3-SLAB_LIB_SLAB_ERR: Slab error [double free attempted] in pim_routetype
2012 Sep 10 16:06:21 l3sys2-agg1-A3 %PIM-3-SLAB_ERR: -Traceback: librsw.so+0x9ee8f librsw.so+0x9f173 0x81822ac 0x81c0d5d 0x812f533 librsw.so+0xb76ee librsw.so+0x9bfef librsw.so+0xa6bdf libpthread.so.0+0x6140 libc.so.6+0xca8ce
2012 Sep 10 16:06:21 l3sys2-agg1-A3 %PIM-2-SLAB_LIB_SLAB_ELEM_ERR: Slab element Alloc PC: 0x819cbef, Element index: 1097

Conditions:
Scaled set-up, seen when clear is applied in quick successions.

Workaround:
clear it once, and wait for the convergence before clearing again. flow control feature for PIM which will be introduced through this DDST will fix it.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(7), 5.2(9)S63, 6.0(3)S3, 6.1(1)S50, 6.1(2)S2, 6.1(3)S11, 6.1(3)S13, 6.1(3)S35, 6.2(2)S2, 6.2(5.7)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.266), 7.1(0)D1(0.299), 7.1(0)D1(0.310), 7.1(0)D1(0.320), 7.1(0)D1(0.328), 7.1(0)OTT(0.45)
Bug Id:
CSCun26418
Title:
OTV encapsulation fails for multicast/broadcast traffic
Description:

Symptom:
The replication ASIC responsible for SPAN, OTV encapsulation, and multicast replication stops replicating all traffic. As a result, each of the above features will also fail. This is particular to the SPAN/multicast replication pipeline so customer in an OTV environment will see that multicast traffic (including link-local multicast 224.0.0.0/24), along with broadcast traffic are not forwarded across the overlay.

Conditions:
This has been observed in OTV environment with a high rate of traffic egressing the OTV join-interface with ERSPAN configured to span the join-interface, which is very rare.

Workaround:
Once the issue has been encountered, a reload of the module is required to clear the problem. Removing the ERSPAN session will prevent the issue from reoccurring.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(10)S47, 6.2(10)S48, 6.2(10)S57, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.300), 7.1(0)EV(0.116), 7.1(0)OTT(0.41)
Bug Id:
CSCuh27257
Title:
Port config fails as interface config locked and ethpm queue stuck
Description:

Symptom:
Nexus7000(config-if)# switchport
Please check if command was successful using appropriate show commands

Port config fails as interface config locked and ethpm queue stuck

Conditions:
configuration changes are performed on a port that is locked

Workaround:
No Workaround but to reload the device

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(3a)S1
Known Fixed Releases:
5.2(9.180)S0, 6.1(4.97)S0, 6.1(5), 6.1(5.32)S0, 6.2(1.148)S0, 6.2(2), 7.1(0)D1(0.14), 7.2(0)VZN(0.30)
Bug Id:
CSCun32658
Title:
BD information not present in vpc during LC reload
Description:

Symptom:
After LC reload, Port-Channels wont have the Data-Structure populated properly

Conditions:
LC Reload

Workaround:
Remove and re-apply the PC config

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.0(1)FVL(0.84)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.69), 7.0(0)GI(0.7), 7.0(0)KM(0.37), 7.0(1)FVL(0.93), 7.0(1)FVL(0.95), 7.0(2)NF(0.17), 7.1(0)D1(0.117), 7.1(0)D1(0.60), 7.1(0)D1(0.64)
Bug Id:
CSCuo86477
Title:
LISP crash due to mts buffers leak
Description:

Symptom:
LISP service crash due to mts buffer leaks in SAP associated with LISP UFDM MTS queue

Conditions:
Feature LISP is configured on the switch and MTS buffers leak causing the crash

Workaround:
Disable feature lisp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.22), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCub55711
Title:
vPC+: MAC flapping when interface goes in indivudial Individual mode
Description:

Symptom:

In case of port-channel (vPC+) configured with "no lacp suspend-individual". If po is down on both vPC+ peers and one interface up as individual on one peer, mac address may flap between the po and the vpc peer-link

Conditions:

Po configured with "no lacp suspend-individual"
vPC+ (fabric path configured on the peer-link)
Po down on both peers
One interface up as individual

Workaround:

Do not use LACP so that interface goes in the po as soon as up

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(5)
Known Fixed Releases:
5.2(7.36)S0, 5.2(9), 6.0(2)N1(1), 6.1(1)E1, 6.1(2)E10, 6.1(2)E10.4, 6.1(2)S12, 6.1(2.19)S0, 6.1(4.1)S0, 6.2(0.285)
Bug Id:
CSCun68731
Title:
n7k F3 vpcp: isis_fabricpath core found @isis_ha_lsp_db_pss_recover
Description:

Symptom:
The bug is hit on performing a switchover of the active SUP with fabricpath isis configured along with multiple topologies. When the bug is hit, fabricpath isis process crashes while recovering the LSP database from its PSS for stateful recovery

Conditions:
Configuration - Multiple topologies and then perform a switchover
Problem frequency - rare
Network conditions - fabricpath isis process is respawned and performs a graceful restart after crashing

Workaround:
The bug is not seen if multiple topologies aren't configured. When the bug happens farbicpath isis respawns on its own and fixes the issue.

Further Problem Description:
This bug is not seen every time we configure multiple topologies and perform a switchover but only sometimes. QA performed multiple iterations and mentioned that this situation was rarely hit.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)FM(0.24), 6.2(7.23)S0
Known Fixed Releases:
6.2(10), 6.2(10)S13, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.329), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)N1(0.14)
Bug Id:
CSCuo71613
Title:
IPLUS 152: ISSU ND upg -> bin - FEX module preload failed
Description:

Symptom:
ISSU ND from upg to bin FEX image preload is failing

Conditions:
ISSU upgrade

Workaround:
bin to upg worked fine

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)N1, 7.1(0)N1(0.273), 7.1(0)N1(0.347), 7.1(0)N1(0.348), 7.1(0)N1(0.349), 7.1(0)N1(0.372)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.312), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.1), 7.1(0)N1(0.384), 7.1(0)N1(1), 7.1(0)OTT(0.45)
Bug Id:
CSCup58752
Title:
ACL entries of FEX ports not deleted after removing member from zoneset
Description:

Symptom:
After the zone member removal, the ACL entries programmed for the removed member will not get removed.
If the zone member is logged in through FEX or the zone member is part of zone where the devices logged in from the FEX are presents.

Conditions:
This issue will occur only with the device logged in through FEX interfaces.

Workaround:
The following is the workaround to delete the entries in the ACL when the zone member is getting removed.

1. Remove the zone member
2. Deactivate the zone set
3. Activate the zone set.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.188), 7.1(0)GF(0.24), 7.1(0)GI(0.2)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.234), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)RTG(0.22), 7.1(0)ZD(0.286)
Bug Id:
CSCub48588
Title:
L2FM High CPU with SPAN
Description:

Symptom:
CPU spike due to L2fm process
Conditions:
On configuring SPAN on VDC with F1 card.

The way this is triggered is- move a port to VDC and make it SPAN destination while it is admin down
After SPAN commands are applied, bring the port up

Workaround:
1. Keep the span destination up
2. Run the following commands on the span destination
Int eth9/30
No switchport monitor
Switchport mode fabricpath
No switchport mode fabricpath
Switchport monitor
3. Now bring up the monitor session;
conf t
monitor session 1
no shut

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(5)
Known Fixed Releases:
5.2(6.26)S0, 5.2(7), 6.1(1.58)S0, 6.1(1.69), 6.1(2), 6.2(0.285), 6.2(2), 7.2(0)VZN(0.30)
Bug Id:
CSCup09291
Title:
BFD PC per-link member session stuck down after interface flapping
Description:

Symptom:
N7710 / F348 / 6.2(8), bfd port-channel per-link session is configured, after flapping several times of those member links, several member session might stuck at down status.

Conditions:
bfd port-channel per-link session is configured.

interface flapping.

Workaround:
none

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S13, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.137), 7.1(0)PDB(0.317), 7.2(0)D1(0.358), 7.2(0)ZD(0.47), 7.2(0)ZN(0.54)
Bug Id:
CSCuo63409
Title:
FP Flood LTL entry misprogramed after reload spine VDC with transit mode
Description:

When fabricpath spine node is configure in "transit" mode, this issue could cause misprogramming of flood LTL that cause traffic outage.

Symptom:
This is issue is specific to "fabricpath mode transit" configuration. Traffic outage would be observed as a result with drop occuring at the transit spine.

Conditions:
The is issue is more likely to occur in a scaled testbed, with more number of vlans, SVIs or L2 mcast group entries. Reload or vdc restart can also trigger the same on a scale bed.

Workaround:
As a workaround, when transit mode is configured on the spine remove the rest of the vlan's from the node and then reload.
[In this case 1-3900 vlans are configured, remove them all].It resolves the issue.
The above workaround is suggested because is not neccesary to have the FP vlans configured on the spine when in transit mode. But the transit node needs to be connected to more than 1 leaf, simply because FP topology needs to have more than 1 node with vlans configured for the FP mcast trees to come up.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.19), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)GF(0.14), 7.1(0)NF(0.28)
Bug Id:
CSCuo28456
Title:
N7K: ospf select wrong next-hop when redistribute route in NSSA area
Description:

Symptom:
External routes in OSPF are installed over a NSSA area (instead of backbone area).

Conditions:
In case, there is reachability of OSPF external prefixes in both NSSA area and the backbone area, OSPF will install routes over those prefixes over the NSSA area.

Example topology:

area 0
N7K-1-----------N7k-2--lo1
(ABR) (ABR/ASBR)
| |
| area 1 |
| nssa |
| |
4948-1----------4948-2

The problem only occurs if one of the links between the ABRs is in the backbone
area and another is in a NSSA area. Only releases 6.2.x/7.0.x are affected by this, and prior releases are unaffected.

Workaround:
There are the following workarounds for this bug:

(1) Configure a lower-cost, normal non-backbone area adjacency between the 2 ABRs.

(2) Configure the link between the 2 ABRs as P2P, and add a multi-area link.

For example, in the topology below, the link between the 2 N7K ABRs is P2P and both in area0, and multi-area 10 at the same time.

Multi-area 10
--------------------
| area 0 |
N7K-1-----------N7k-2--lo1
(ABR) (ABR/ASBR)
| |
| area 1 |
| nssa |
| |
4948-1----------4948-2

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
6.1(2)I3(1.22), 6.1(2)I3(2), 6.2(10), 6.2(10)CM(0.28), 6.2(8)TS(0.28), 6.2(9.3)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.191), 7.1(0)FC(0.2)
Bug Id:
CSCuo12464
Title:
Titanium: igmp packets looping within a DFA fabric
Description:

Symptom:
igmp packets looping within a DFA fabric

Conditions:
CPU 100% busy

Workaround:
no

Further Problem Description:
bgp lose connection due to cpu busy.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.43)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(1)ZD(0.184), 7.0(1)ZN(0.304), 7.0(3)N1(0.42), 7.0(3)N1(1), 7.1(0)BF(0.85), 7.1(0)D1(0.171), 7.1(0)FC(0.2)
Bug Id:
CSCun46513
Title:
SSTE: BGP set nh incorrectly with inbound RPM set ip nh peer-address
Description:

Symptom:
BGP set the nexthop incorrectly when the inbound route-map with set ip nexthop peer-address is configured.

Conditions:
The symptoms are observed when the prefixes are learned from rfc5549 v6 RRC neighbors and advertised to rfc5549 v4 RRC neighbor when v4 RRC has the set ip next-hop peer-address configured.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(7.12)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.23)S0, 6.2(8), 6.2(9)FM(0.37), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.272), 7.0(3)I1(1), 7.1(0)BF(0.81), 7.1(0)D1(0.171)
Bug Id:
CSCup57569
Title:
oim crash seen with 6.2.10 image during lisp multiple hop regression
Description:

Symptom:
oim crash during configure LISP ESM Multiple feature configure

Conditions:
configure/un-configure LISP ESM Multiple feature

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S10, 6.2(10)S7, 6.2(10)S8
Known Fixed Releases:
6.2(10), 6.2(10)S15, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.228), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)ZD(0.281)
Bug Id:
CSCtt41698
Title:
NXOS subinf MTU inconsistency
Description:

Symptom:

When changing MTU on main interface, subinterface inherits this MTU as per the
"show interface ethernet x/y.z" command. Although, internally, MTU for subinterface
is still set to default.

Conditions:
Subinterface configuration.

Workaround:
Explicitly configure the non-default MTU on both main and subinterface.

Status:
Open
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
6.1(0.184)S10, 6.1(0.197)S0, 6.2(0.228)S0, 7.2(0)VZN(0.30)
Bug Id:
CSCue14426
Title:
High CPU on L2FM and MAC Move Logs
Description:

Symptom:
Nexus 7000 runs high CPU on L2FM (the process manages MAC address in Nexus 7000). If 'logging level l2fm 5' is configured, the following message will be logged:
%L2FM-4-L2FM_MAC_MOVE: Mac in vlan has moved from to

Conditions:
The trigger of the problem is that a physical member of a port channel goes from individual mode to bundled mode. It requires "no lacp suspend individual" configured. This causes a hardware mis-configured on the switch.

Workaround:
shut and no shut the related physical port of the port channel

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S40, 5.2(9.80)S0, 6.1(2)E1, 6.1(4.1)S0, 6.1(4a), 6.1(4a)S2, 6.2(1.10)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCud51292
Title:
ifmgr and ethpm crash on Standby Sup during ISSU to Freetown
Description:

Symptom:
ifmgr crash on Standby Sup during ISSU to Freetown

Conditions:
ifmgr crash on Standby Sup during ISSU to Freetown

Workaround:
No workaround

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(0.284)S12
Known Fixed Releases:
6.2(0.302)S6, 6.2(1.5)S0, 6.2(2), 7.0(0.5), 7.2(0)VZN(0.30)
Bug Id:
CSCuj70143
Title:
PPF out of sync between SUP and LCs
Description:

Symptom:
The following error can be seen when applying ACL changes:

"Failed to complete Verification: Link exists" or
"Database Internal error"

Conditions:
Applying a large amount of config change.

Workaround:
Reload the module, or change the name of the ACL/object-group

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(9)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.96), 7.1(0)BNB(0.1), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.153)
Bug Id:
CSCul79456
Title:
DHCPv6 relay using source-int not working:UDP6 stats showing "NO PORT"
Description:

Symptom:
DHCPv6 relay using source-int not working:UDP6 stats showing "NO PORT" for F3

Conditions:
Need to have global cli "ipv6 dhcp relay source-interface loopback20" configured and client-side SVI should not have ipv6 address

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S23, 6.2(5.69)S0
Known Fixed Releases:
6.1(2)I3(2.42), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10), 6.2(10)S81, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.237)
Bug Id:
CSCup65916
Title:
F3 LC reload after system switchover due to xbar_manager timeout
Description:

Symptom:
An F3 LC may reload after a system switchover

Conditions:
Unknown

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S12, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S14, 6.2(10)S15, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.249), 7.1(0)OTT(0.32), 7.1(0)PDB(0.184)
Bug Id:
CSCuo76751
Title:
Port asic in shared mode does not set Don't_fwd and Don't_learn bit
Description:

Symptom:
Symptom 1: Port-channel member interfaces go into an LACP suspended state b/c because they stop sending LACP PDUs.
Symptom 2: Ports may stop learning mac addresses and stop passing traffic
Symptom 3: Ports may stop learning mac addresses but still flood traffic

Conditions:
Symptom 1 & 2 can be seen when a span destination is configured on a port M132 port in shared mode. Other ports in the port-group will set the DL (Don't Learn) and DF (Don't Forward) bit set to ON.
N7K# slot 1 sho hard int mac port 26 state | egrep -i "dont"
dont_forward: ***On***, dont_learn: ***On***

Symptom 3 is seen when the peer-link is on a shared-mode M132 port. MAC learning is disabled on the peer-link by default. Configuring a peer-link member interface on a shared-mode M132 port will disable MAC learning on the other three ports in the port-group.
N7K# slot 1 sho hard int mac port 26 state | egrep -i "dont"
dont_forward: Off, dont_learn: ***On***

These conditions may be triggered by reloading a VDC or flapping an interface (the VDC reload results in a link flap, the link flap triggers the error condition), though it has been seen when no link flap could be confirmed. When the VDC reload is complete the links in the port channel remain in the suspended state since LACP PDUs are not forwarded.

Workaround:
Symptom 1 & 2:
To restore service:
Remove the SPAN and then shut/no shut ports in the port-group

To configure a SPAN destination on a port in shared-mode, enable ingress learning:
switchport monitor ingress learning

Symptom 3:
Do not put the Peer-link member interfaces on an M132 port in shared mode. This is against best-practice and is documented here:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/interfaces/configuration/guide/if_cli/if_vPC.html#pgfId-1803465

Further Problem Description:
Don't_fwd and Don't_learn bits are set only for SPAN configuration and VPC peer-links to disable mac learning.This is a day one issue in all codes prior to 6210. Only M132 and M132-XL line cards are affected by this bug.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8), 6.2(8)S25
Known Fixed Releases:
6.2(10), 6.2(10)S35, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.169)
Bug Id:
CSCuo77146
Title:
port-profile crashed while reloading leaf vdc
Description:

Symptom:
ppm crashes while vdc is reloaded

Conditions:
reload vdc

Workaround:
no

Further Problem Description:
ppm crashes while vdc is reloaded.
Customer may not see it, as it depends on timing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.136)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.136), 7.1(0)D1(0.143), 7.1(0)D1(0.147), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.94), 7.1(0)ZD(0.194)
Bug Id:
CSCuo15363
Title:
L3VPN/6VPE : Post BGP restart, BGP NOT Adv VPNv4 & VPNv6 routes to Peer
Description:

Symptom:
After a BGP process restart, VPNv4 and VPNv6 routes are not advertised to a peer.

Conditions:
This occurs after the BGP process is reset in some form. To verify the state of the routes, the following outputs can be checked -

show bgp vpnv4 unicast
show bgp vpnv4 unicast neighbors advertised-routes
show bgp vpnv4 unicast

The prefix should show that it's not advertised to any address-family (AF).

Workaround:
Restarting the BGP process should be tried, although this may not work every time -

restart bgp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S1, 6.2(10)S3, 7.1(0)D1(0.85)
Known Fixed Releases:
6.2(10), 6.2(10)S14, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.84), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.138), 7.1(0)N1(1), 7.1(0)NF(0.28)
Bug Id:
CSCuo12118
Title:
NXOS-L2VPN-VPLS-PWs are down after remove then add VFI/PW
Description:

Symptom:
PW to remote PE in VFI not present.

Conditions:
Following are the conditions in which the issue would be encountered:
- VFI is configured with BGP AD (AND)
- BGP session with Address family L2VPN is configured and BGP session is established (AND)
- PWs in the VFI are established
- L2VPN Process Restarts
- Reconfigure VFI (Un-configure/Configure VFI)

Workaround:
clear ip bgp *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)BF(0.48)
Known Fixed Releases:
15.4(2.11)T, 15.4(2.12.1)PIH25, 15.4(2.16)S, 15.4(3)S, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.106), 7.1(0)BF(0.127), 7.1(0)D1(0.162), 7.1(0)FC(0.2)
Bug Id:
CSCuo50598
Title:
VDC reload may cause F3 line card to flap links and corrupt PDUs
Description:

Symptom:
Nexus 7000 with F3 module may experience link flaps on port-channels upon VDC reload.
We also see STP BPDU, LACP, UDLD issues as these packets could be potentially corrupted.

Conditions:
Port-channel config on F3 module with active traffic

Workaround:
Reload LC

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6a), 6.2(8), 7.1(0)D1(0.138), 7.1(0)D1(0.161)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.6), 6.2(10)S2, 6.2(10)S9, 6.2(10.5), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.0(0)BZ(0.46)
Bug Id:
CSCup60247
Title:
Memory leak detected in 'isis_l2mp' compon in FP setup - 194898 (Bytes)
Description:

Symptom:
Leak detected when we get EthPM triggers for interface down

Conditions:
We would leak memory for a message

Workaround:
restarting of ISIS would get rid of the leak as long as port is not flapped again

Further Problem Description:
Fixed in 6.2.10

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S19, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.329), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)N1(0.14)
Bug Id:
CSCuj17443
Title:
Inherit command on Nexus is not working with TACACS authorization
Description:

Symptom:
Unable to add inherit command

N7K(config)# interface port-channel1006
N7K(config-if)# inherit port-profile Blade-Servers
ERROR: Failed to write VSH commands
N7K(config-if)# exit

Conditions:
H/W: cisco Nexus7000 C7009 (9 Slot) Chassis ("Supervisor Module-1X")
S/W: 6.0(4) to 6.2(1)
ACS: 5.3 patch 6

Inherit command on Nexus is not working with TACACS authorization enabled.

Workaround:
Remove TACACS authorization commands

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(1)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(8)NO(0.6), 6.2(8)S9, 6.2(8.5), 6.2(9)FM(0.37), 7.0(0)BZ(0.46)
Bug Id:
CSCuo20496
Title:
EIGRP crash with debugs
Description:

Symptom:
eigrp service crash on nexus switch

Conditions:
enabled eigrp debugs

Workaround:
disable eigrp debug

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2a)S20
Known Fixed Releases:
6.0(2)A4(0.761), 6.0(2)A4(1), 6.0(2)U4(0.761), 6.0(2)U4(1), 6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.17), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0
Bug Id:
CSCup05138
Title:
CPU generated traffic being sent to DEST INDEX:0 and dropped after ISSU
Description:

Symptom:
CPU generated traffic such as HSRP and ARP getting dropped and not making to the forwarding egress line card.

When capturing the HSRP or ARP packets via ethanalyzer, we can see it is has set the NXOS DEST INDEX: 0 as follows.

METMXC2(config)# ethanalyzer local interface inband decode-internal capture-fi "host 10.47.25.4 and host 224.0.0.102" det Capturing on inband NXOS Protocol
NXOS VLAN: 247
NXOS SOURCE INDEX: 1054
NXOS DEST INDEX: 0

Conditions:
HSRP state is Unknown and ARP is incomplete .

Workaround:
In order to resolve the issue, we needed to remove the vlan from the configuration and re-configure it only for the affected vlans.

no vlan X

vlan x

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10), 6.2(6a)
Known Fixed Releases:
6.2(10)S18, 6.2(10)S94, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.173)
Bug Id:
CSCun60481
Title:
snmpbulkwalk : Error: OID not increasing: IP-FORWARD-MIB for IPV6
Description:

Symptom:
SNMP bulkwalk fails with an error indicating that OID is not increasing in IP-FORWARD table.

Conditions:
This occurs in particular v6 topology that are complete and contains L3VPN configuration.

Workaround:
There is no workaround this issue. However, should have no impact on traffic or any other functionality.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(5)S4
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.245), 7.1(0)OTT(0.31), 7.1(0)PDB(0.194), 7.1(0)RTG(0.17), 7.1(0)ZD(0.294)
Bug Id:
CSCup17536
Title:
GBR-BUGFIX->GBR-top sync::fabric-control config is absent under run-cfg
Description:

Symptom:
Just a show issue.

Conditions:
A fag is not set when configuring fabric-control.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.160), 7.1(0)D1(0.162)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162), 7.1(0)D1(0.164), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)VXE(0.2), 7.1(0)ZD(0.217)
Bug Id:
CSCue14293
Title:
F2CR: Copp policy based cos stats mismatch with cpu stats
Description:

Symptom:
For Copp policy based cos stats , we will use l3 length only for F2e linecards.

Conditions:
This is seen only on F2e linecards.

Workaround(s):
No workaround is available.
This is a hardware limitation on F2e linecards.

Status:
Terminated
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(3)S39
Known Fixed Releases:
Bug Id:
CSCun78718
Title:
N7k 6.2(2) Port-Profile modification removing the entire VDC config-tion
Description:

Symptom:
An incorrect rollback of failed Port-Profile modification might be seen in some very specific cases on N7k devices. As a result of this incorrect PPM rollback, significant part of running configuration might be negated on the device. Reloading the device recovers it from the issue as the device gets re-initialized from its startup configuration.

Conditions:
This is a scalability-related issue. The problem might be seen on heavily over-configured N7k devices with lots of attached FEXes (~1,5K interfaces on the system, ~10K lines in "show run all", ~200 interfaces managed by a single Port-Profile). Under these specific conditions some port-profile operations can take several minutes to be completed, or even just to be rejected.

The problem could be triggered if two different port-profiles are being modified simultaneously from two different management sessions to the N7k device (VDC), and both of the two PPM modifications are failed. In this very specific case two PPM rollback operations could be initiated simultaneously thus breaking the normal PPM rollback operation and resulting in incorrect completion of the PPM rollback operation.

Workaround:
1. Ensure that only one person is modifying configuration on such system, avoid initiating a new Port-Profile modification before the previous Port-Profile modification is completed;
2. Consider any ways to reduce the amount of interfaces handled by a single Port-Profile;
3. Follow Cisco-verified Scalability Guide for the setup.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S37, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.263), 7.1(0)OTT(0.34), 7.1(0)PDB(0.208), 7.1(0)SIB(99.16), 7.1(0)ZD(0.312), 7.1(0)ZN(0.411)
Bug Id:
CSCun32066
Title:
On "no bridge-domain 100" vnsegment_mgr is sending a BD_PORT_DELETE
Description:

Symptom:
bd port delete is sent out if there are any vsis under the bd

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.0(1)FVL(0.84), 7.1(0)D1(0.58)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.69), 7.0(0)GI(0.7), 7.0(0)KM(0.37), 7.0(1)FVL(0.91), 7.0(2)NF(0.17), 7.1(0)D1(0.117), 7.1(0)D1(0.60), 7.1(0)D1(0.64), 7.1(0)FC(0.2)
Bug Id:
CSCts64738
Title:
FP: MAC learning on broadcast
Description:

Symptom:

Unicast macs are learnt in FP core switches during broadcast arp on setup having F2.

Condition:

On F2, unicast macs are learnt from broadcast arp resulting in macs being being learnt sub optimally in the mac table. Further uicast re-arp should take care of macs being removed on Fabricpath core switches.

Workaround:
None

This affects only switches having F2 lcs.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.0(0.47)S5
Known Fixed Releases:
6.1(0.239)S0, 6.1(0.248)S0, 6.1(0.293)S6, 6.1(0.298)S0, 6.1(1)S31, 6.1(1)S39, 6.1(1.33)S0, 6.1(1.41)S0, 6.1(1.42)S0, 6.1(2)E10
Bug Id:
CSCue67277
Title:
Interface does not recover from err-disable state during ISSU from 5.2.7
Description:

Symptom:
During ISSU, if any ports flap they get error disabled and stay error disabled even after ISSU is completed.
Conditions:
Issue occurs only if ports flap while ISSU is in progress.

Workaround(s):
shut/no shut will bring up the error disabled ports.
Workaround:
Workaround for recovering error disabled ports :

- Wait till the ISSU is over. Once the system is ready, issue a "shut / no shut" on the ports to recover them to normal state.
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(5)S2, 6.1(3)S47, 6.2(1.111)S4, 6.2(1.118)S1, 6.2(1.125)S5, 6.2(1.91)S7, 6.2(5.7), 7.0(0)FV(0.88), 7.0(0.1)
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.20)S0, 6.2(1.121)S0, 6.2(1.127)S0, 6.2(2), 7.1(0)D1(0.14), 7.2(0)VZN(0.30)
Bug Id:
CSCul84608
Title:
N7K-L2VPN VPLS Scale-No switchover after 4 times l2vpn Process crash
Description:

Symptom:
According to the HA policy, the router should perform an RP failover when the
L2VPN process crashes and tries restarting 3 times, but instead it doesn't perform
the failover and remains at the failure state.

Conditions:
L2VPN crashes 4 or more times.

Workaround:
No workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(8)BF(0.2), 7.1(0)ZD(0.181)
Known Fixed Releases:
15.4(2)S2, 15.4(2.17)S0.8, 15.4(3)M2.1, 15.4(3)S, 15.4(3)SN1a, 15.5(0.16)T, 15.5(0.16.1)CG, 15.5(0.20)PI27a, 15.5(0.8)S, 15.5(1.2.1a)GB
Bug Id:
CSCun05808
Title:
SSTE: RSVP Core at rsvp_ha_disable after SSO test in 6.2.6a.S11
Description:

Seeing RSVP Core after SSO test

Symptom:
RSVP Core seen after SSO test following an LC reload when TE/RSVP were on

Conditions:
During RP SSO, when following these steps:
LC Reload
RP SWO

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6a)S11, 6.2(8)S24, 7.1(0)D1(0.64)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.10), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.192)
Bug Id:
CSCuo71517
Title:
mti tunnel info missing in PIM after vrf shut/no shut
Description:

Symptom:
mvpn nbr not forming

Conditions:
When PIM is restarted for some reason when the mdt-source interface is down, it is possible that PIM does not process the OIM update message and is expecting a create-message instead. This causes the MVPN to be in pending state.

Workaround:
shut and unshut the mdt-source interface should fix the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)MPL(0.11)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.107), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.178), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCup65294
Title:
Memory leak detected in 'vlan' component - 870268 (Bytes)
Description:

Symptom:
After perturbing FabricPath VLANs in the FP network, the VLAN leaks memory.

Conditions:
The VLAN perturbance involves VLAN addition/deletion, VLAN shut/no shut, VLAN mode change. Perturb the FabricPath VLANs, the memory starts to leak.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S12, 6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S79, 6.2(10.16)S0, 6.2(12)BFP(0.9), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.232), 7.1(0)D1(0.280), 7.1(0)EV(0.116)
Bug Id:
CSCut07477
Title:
IPLUS_469_VXLAN:NVE PD crash while sending traffic
Description:

Symptom:
NVE crash on vpc secondary.

Conditions:
while reloading vpc primary.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZN(91.469)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.1(1)N1(0.483), 7.1(1)N1(1), 7.1(1)ZD(0.19), 7.1(1)ZN(0.34)
Bug Id:
CSCuo55926
Title:
crash on mrib on VDC reload
Description:

Symptom:
mrib crashes when VDC is reloaded

Conditions:
This issue may hit during MRIB bring up time (system boot up/vdc bring up) in rare cases.

Workaround:
On VDC reload, there is no workaround is required. ( VDC reload will happen) again. On cold boot case, system will reload due to this crash

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(6), 6.2(6)S17, 6.2(8b)S4
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.9), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.104)
Bug Id:
CSCul36627
Title:
hmm crash by mts_opc_version_get ()
Description:

Symptom:
scaled

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.77), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.130), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCua16339
Title:
FEX : FEX interface goes to err disabled state after disabling dot1x
Description:

Symptom:With DOT1X authentication failure, a reinit of port can actually err-disable it.

Conditions:

Workaround: shut and then "no shut" will recover the port

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.2(5)S12
Known Fixed Releases:
5.2(9), 5.2(9)S55, 5.2(9.103)S0, 6.1(1)S19, 6.1(1.19)S0, 6.2(0.217), 6.2(2), 7.2(0)VZN(0.30)
Bug Id:
CSCul51350
Title:
Traffic blackhole w/ dataMDT cfg & src starts few mins after IGMP join
Description:

Symptom:
Traffic blackhole on ingress PE with data MDT configuration

Conditions:
1. Topology (RP and source behind the same PE):
Src------CE1 (FHR and RP) --------PE1-----Core------PE2------Rcvr

2. Data MDT configured

3. Src starts traffic few minutes after IGMP join received from Rcvr

Workaround:
Multiple workarounds:
1) retart pim
2)
Stop traffic and joins and wait for routes to time out
Start traffic and joins at around the same time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(5)BF(0.61)
Known Fixed Releases:
6.2(10), 6.2(10)S34, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.214), 7.1(0)FC(0.2), 7.1(0)N1(0.267), 7.1(0)N1(1), 7.1(0)NF(0.32)
Bug Id:
CSCum81252
Title:
Merge XOS/LPSS with NXOS pss2: XOS/LPSS part
Description:

Symptom:
Need to merge xos/lpss@dev1 to NXOS. There are some small issues fixed in this merger

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.162), 7.1(0)ZN(0.22)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(3)I1(0.64), 7.0(3)I1(1), 7.1(0)BF(0.107), 7.1(0)BF(0.108), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16)
Bug Id:
CSCuo02670
Title:
Fabricpath BFD per-link session stuck in down state after save & reload
Description:

Symptom:
With 6 Fabricpath BFD and 11 L3 BFD sessions up on all supported interface types, We do a save and reload. After reload BFD per-link session on a port channel interface is stuck in Down state.

Conditions:
BFD per-link session stuck in Down state after reload

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZD(0.132)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.89), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115), 7.1(0)VXE(0.2), 7.1(0)ZD(0.225)
Bug Id:
CSCuo90941
Title:
Unable to add vlan to trunk on port-profile post upgarde from 6.0 to 6.2
Description:

Symptom:
The following error is returned when executing a "switchport trunk allowed vlan add" command in following two scenarios:
- under a port-profile
- under an interface inheriting a port-profile

N7KA(config-port-prof)# switchport trunk allowed vlan add 6
ERROR: This form of the command has no effect on the current system
N7KA(config-port-prof)#

Conditions:
- This occurs after an upgrade of NX-OS via ISSU or disruptive upgrade
- The Port-profile being modified or inherited must have been created prior to the upgrade

Workaround:
- The user can re-apply the original trunk allowed list under the port-profile that existed before the ISSU. Then the new vlans can be added or old vlans removed without seeing any issues.
- Delete and recreate port-profile from scratch after the ISSU.
- Reboot is not effective workaround. Condition remains after reloading switch.

Further Problem Description:
- you may see duplication of lines in the running configuration under virtual port-channel

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(4)S26, 6.2(10)E3, 6.2(2a), 6.2(8a)S3
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.2(0)BA(0.12), 7.2(0)D1(0.401), 7.2(0)OTT(0.5), 7.2(0)PDB(0.345), 7.2(0)RTG(0.91), 7.2(0)ZD(0.88)
Bug Id:
CSCuo27488
Title:
ipv6 forward command does not enable ipv6 on the i/f
Description:

Symptom:
v6 forwarding will not work on the core

Conditions:

Workaround:
Enable ipv6 address on fabric control segment

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)ZN(0.120)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.80), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.130), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCuj29140
Title:
frequent aclmgr crash when applying L4 protocol filtering racl
Description:

Symptom:
While applying acl with L4 protocol filtering, aclmgr crashes frequently causing switch overr and vdc reload
it will happend when we have "stale" entries in the state-cache.
by issuing show command - "show system internal aclmgr state-cache" , we will see state-cache entries in the aclmgr.

Conditions:
applying L4 Protocol ACL to interface with stale entry

Workaround:
ascii reload would resolve the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.5), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.117), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCuo82093
Title:
Duplicate multicast packets are detected in a mVPN N7k design
Description:

Symptom:
- The Customer Edge (CE) Multicast Receiver would receive duplicate multicast packets for a time of 1 - 10 seconds
- These receivers are physically located behind one or more Provider Edge routers running IOS based code
- The CE Multicast Sources are physically located behind a pair of Nexus 7000 in a VPC domain

Conditions:
- These symptoms occurs in a mVPN design where the N7k are positioned as Provider Edge and the Multicast Sources are part of a VPC domain. The pair of N7ks are also configured for Rendezvous Points for the Customer Edge vrf.
- Order of operations:

1. Remote CE joins a multicast group, Last-Hop-Router (FHR) at the Customer Edge sent a *,G to the RP.
2. A *,G tree is created in the MPLS core from the IOS PE to the remote NX-OS PE-1 (PE-1 = primary RP)
3. When the Last-Hop-Router (LHR) receives the first multicast packet via the *,G tree it will try to join the S,G tree
4. The local PE for LHR will send a S,G towards the Source PE, but the preferred path is now via NX-OS PE-2 (PE-2 - secondary RP)
5. The NX-OS PE-2 will now add the MDT tunnel to the OIL and the multicast traffic will via the S,G tree
6. The Receiver now receives duplicate multicast packets, one via *,G and one via S,G
7. The duration of duplicate packets can range from 1 - 60 seconds

Workaround:
- Ensure the Nexus 7000 Rendezvous Points is local to the source, this will result in the remote *,G and S,G to arrive at only one N7k PE.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.1(2)E10, 6.2(10)S83
Known Fixed Releases:
6.1(2)E10, 6.2(10), 6.2(10)CM(0.28), 6.2(8)TS(0.28), 6.2(9.3)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.113), 7.1(0)D1(0.171)
Bug Id:
CSCuq07308
Title:
SYSMGR-2-SERVICE_CRASHED: Service "bgp"
Description:

Symptom:
Error messages such as below could exhibit when BGP is restarted, using command "restart bgp".

Service "bgp" (PID 9158) hasn't caught signal 6 (core will be saved).

Conditions:
When BGP is configured with over 1900 neighbors / peers.

Workaround:
Shutdown the peer sessions before issuing "restart bgp".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.2(10)S31
Known Fixed Releases:
6.2(10), 6.2(10)S70, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(1.160), 7.0(3)I1(2), 7.1(0)AV(0.38), 7.1(0)D1(0.301), 7.1(0)EV(0.116)
Bug Id:
CSCuu05012
Title:
Post ISSU : EXP based classification is not working
Description:

Symptom:
Before fixing the issue ISSU from 6.2.x to 7.2, qos was not working properly.

Conditions:
The hardware initialization is modified in 7.2 and if did ISSU from 6.2.x to 7.2 with flanker card, hardware is with still old 6.2.x programming and in some qos cases may not work properly in 7.2, since ISSU do not touch the hardware.

To fix this qos tables are reprogrammed at the time of ISSU when moved to 7.2.

Workaround:
Reload LC.

Further Problem Description:
There may be some packet drops while doing ISSU from 6.2.x to 7.2 till qos tables get reprogrammed in the hardware.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.2(0)D1(0.496), 7.2(0)ZD(0.178)
Bug Id:
CSCum41587
Title:
Cost community value incorrect with communityid higher than 127
Description:

Symptom:
when you try to configure Pre-bestpath cost using route-map for community ID 127 or higher, then switch will change the cost value to "4294967295" , irrespective of what costs user tries to enter.

Conditions:
Community ID should be higher that 127 and cost should be tried to change using route-map

Workaround:
none known so far.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.0(0)N1(0.400)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.112), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.188), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCup67732
Title:
N7K: some mroutes leftover on some vrfs on ingress PE under MVPN scale
Description:

Symptom:
Some mroute state left over on some vrf contexts after multicast traffic and joins were stopped

Conditions:
When 200 vrfs are configuration and over 200 groups per vrfs are injected to FHR PE router

Workaround:
No workaround

Further Problem Description:
We are unable to allocate memory for 50k routes and that is the cause of stale routes between different modules.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
7.1(0)D1(0.179)
Known Fixed Releases:
6.2(10), 6.2(10)S70, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.243), 7.1(0)N1(0.303), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.31)
Bug Id:
CSCus76724
Title:
NVT-DC1:PVLAN traffic block-hole upon Primary VLAN remove/add
Description:

Symptom:
On M1XL linecards, when some vlan config causes a private-vlan association to be non-operational , private-vlan trunk secondary port sees traffic loss. Similarly, when the trunk association is unconfigured and re-configured on private-vlan trunk-secondary port, the issue might be observed.

Conditions:
This issue is seen on M1XL linecards. Will not be seen with M1 and F-series line cards

Example config and trigger:
Config:
switch(config-if)# show running-config interface e3/3

!Command: show running-config interface Ethernet3/3
!Time: Wed Feb 4 00:38:51 2015

version 6.2(12)

interface Ethernet3/3
switchport
switchport mode private-vlan trunk secondary
switchport private-vlan association trunk 2 3
no shutdown


The issue will be seen after any of the following triggers

1. Delete and recreate of primary vlan
switch(config-if)# no vlan 2
switch(config)# vlan 2
switch(config-vlan)# private-vlan primary
switch(config-vlan)# private-vlan association 3
switch(config-vlan)# ex

2. Delete and recreate secondary vlan
switch(config-if)# no vlan 3
switch(config)# vlan 3
switch(config-vlan)# private-vlan isolated
switch(config-vlan)# ex

3. Delete and re-add trunk association on the port
switch(config)# int e3/3
switch(config-if)# no switchport private-vlan association trunk 2 3
switch(config-if)# switchport private-vlan association trunk 2 3

Workaround:
Workaround is to do a shut no-shut on the port or PC or VPC leg where the issue is observed

switch(config)# int e3/3
switch(config-if)# shutdown
switch(config-if)# no shutdown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(12)S32
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)PDB(0.364), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCur57243
Title:
F3: OTV not Encapsulating Unicast Traffic with ARP ND Cache Disabled
Description:

Symptom:
Unicast traffic over OTV is black-holed

Conditions:
- F3 OTV
- 'no otv suppress-arp-nd' configured

Workaround:
Enable the 'otv suppress-arp-nd' feature

Further Problem Description:
Issue is seen after one of the following:

- Switch reload
- VDC reload
- System switchover
- Adding an extended vlan
- Issuing 'clear ip route' in the OTV VDC
- shut/not shut on overlay interface in OTV VDC

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.14), 7.1(0)AV(0.38), 7.1(0)D1(0.343), 7.1(0)OTT(0.47), 7.1(0)PDB(0.282)
Bug Id:
CSCup59693
Title:
N7k:RBH programming missing for flood LTL
Description:

Symptom:
Broadcast traffic may not egress out port channel members(conditions a and b.) and/or physical ports( condition a.)

Conditions:
There are 2 conditions exposing the issue.

a. Multiple ISSUs causing incorrect setting of the port bitmaps due to pss key corruption.
For example, lets take a 2 ISSUs case from 6.2.8 to 6.2.8a to 6.2.10

- Switch loaded with 6.2.8 image.
- On a BD ltl operation if any, upon updation of the pss entry in the pss file, there is a mismatch between the pixmc internal data structure and the pss entry.
- After ISSU from 6.2.8 to 6.2.8a, the restoration of BD ltl is done based on the mismatched state. This results in
inconsistency between pixmc internal sw state and its pss file only without affected the hardware programming.
- Now, any BD ltl operation on the above affected BD ltl will result in creation of a duplicate key in the pss file.
- Another ISSU from 6.2.8a to 6.2.10 will result in restoration of an invalid PSS entry ( because of duplicate pss key )
which has stale port bitmaps set for that BD ltl.

b. Batched request to program the affected bd ltls upon a pc membership update causing overwrite
of the port bitmaps and incorrect port bitmap programming in the hardware on F2/F3 modules.
Example: Updation of the affected BD ltl because of membership change in either 1 or both port-channels Po1,Po2 as below as part of a single request.
Po1 -> Eth1/1,Eth2/1
Po2 -> Eth1/2, Eth2/2

Workaround:
Condition a. mentioned above could happen for pc and phy ports associated with the affected BD ltls.
Condition b. above happens only in case of port channels.

Workarounds:
Bounce the port channel members which do not have the port selects set properly to cause reprogramming of the affected bd ltl due to the port-channel membership change.
Flap the affected vlan to cause reprogramming of the bd ltl with the right port selects.

Further Problem Description:
The fix for condition a. above will go in 6.2.10, which will be released shortly.
The fix for condition b. above has already gone in 6.2.8 and later releases.

Status:
Other
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.1(2), 6.2(2a), 6.2(6a), 6.2(8)
Known Fixed Releases:
Bug Id:
CSCus98750
Title:
PVLAN: Vlan-mgr crash at "in gsdb_op_callback "
Description:

Symptom:
Vlan lock is released if taken by some other event sequence when update sdb timeout has occured.

Conditions:
Lock must be taken by some other sequence.

Workaround:
No workarounds

Further Problem Description:
Thread 1 (process 7286):
#0 0x082a9726 in gsdb_op_callback (ctxt=14425967, err=0, list=0x0, count=0)
at ../infra/vlan_mgr/server/vlan_mgr_bd_sdb.c:769
#1 0xf6549886 in process_gsdb_response (msg=,
call_user_callback=1, errcnt=0x0) at ../infra/pss/shared/sdb_intf.c:3637
#2 0xf655b194 in sdb_dispatch (msg=0xffbc4167)
at ../infra/pss/shared/sdb_intf.c:3703
#3 0xf6526023 in fsrv_sdb_process_msg (mts_q=11, mts_msg=0xffbc4167)
at ../utils/fsmutils/fsrv_client.c:1467
#4 0x081022b6 in vlan_mgr_process_mts_event (q=11, msg_ref=0xffbc4167)
at ../infra/vlan_mgr/server/vlan_mgr_mts.c:4378
#5 0x080a0a3c in vlan_mgr_process_event (q_entry=0xa010d3c)
at ../infra/vlan_mgr/server/vlan_mgr_fu.c:189
#6 0x080a23a7 in vlan_mgr_dispatcher ()
at ../infra/vlan_mgr/server/vlan_mgr_fu.c:316
#7 0x0809c24b in main (argc=, argv=)
at ../infra/vlan_mgr/server/vlan_mgr_main.c:547

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0.7)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)PDB(0.361), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus18893
Title:
Crash due to a Kernel Panic at mts_sys_my_node_addr_get
Description:

Symptom:
A Nexus device crashed due to a kernel panic. This can be determined by the outputs 'show system reset-reason' command:

----- reset reason for Supervisor-module 5 (from Supervisor in slot 5) ---
1) At 505949 usecs after Fri Dec 12 06:00:59 2014
Reason: Kernel Panic
Service:
Version: 6.2(2a)

The output of the `show logging onboard module 5 stack-trace` command displays functions from several CPUs. Usually the top CPU in the output is the one that had the issue. The following functions saw the issue in this case:

Logging time: Fri Dec 12 06:00:10 2014
1418382010:126475629 process sysinfo (7268), jiffies 0x13c4b55df
Oops

REGISTERS:
CPU: 8 Process: sysinfo (pid 7268) Tainted: P W
RIP: 0010:[] mts_sys_my_node_addr_get+0x36/0xa0 [klm_mts]
RSP: 0000:ffff88042c12dbd8 EFLAGS: 00010286
RAX: 0000000000000501 RBX: ffff880431030000 RCX: 0000000000000001
RDX: 00000000335edb01 RSI: 000000000000431c RDI: ffffffffa2cf93c0
RBP: ffff88042c12dbe8 R08: ffff88042c069b28 R09: 0000000000000002
R10: 000000022c12dc28 R11: 0000000000000000 R12: 00000000e7410020
R13: 0000000080044d1e R14: ffff880431030000 R15: 00000000e7410020
CALL TRACE:
CPU 8 Process: sysinfo (7268)
[] mts_sys_my_node_addr_get+0x36/0xa0 [klm_mts]
[] mts_syscall+0x419/0x8b0 [klm_mts] (64)
[] mts_compat_ioctl+0x7b/0x2890 [klm_mts] (736)
[] compat_sys_ioctl+0xfb/0x28e (112)
[] ia32_syscall_done+0x0/0x5 (131927355826352)

Conditions:
There is no particular events leading to this crash. This is an extremely rare case.

Workaround:
None Known. Will reload on single sup, switchover on dual sup.

Further Problem Description:
The Linux kernel detected the address in R12 (0x00000000e7410020) to be invalid. Instead of handling it gracefully, it caused an crash. Because it was a stack address, the chance of this address being invalid is almost zero.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(2a), 6.2(8a)
Known Fixed Releases:
6.1(2)I3(3.81), 6.1(2)I3(4), 6.2(10)E5, 6.2(12), 6.2(12)S14, 6.2(12.4)S0, 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(3)I1(0.209)
Bug Id:
CSCus34642
Title:
RIB sets LOCAL flag while importing a LISP /32 route in VRF
Description:

Symptom:
When LISP added /32 route is imported in other VRF that time RIB is setting LOCAL flag incorrectly while downloading routes to FIB. It makes FIB to punt all packets to
SUP for this prefix.

Conditions:
Importing LISP /32 route in another VRF

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.1(1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.2(0)D1(0.396), 7.2(0)OTT(0.5), 7.2(0)PDB(0.345), 7.2(0)RTG(0.55), 7.2(0)ZD(0.82), 7.2(0)ZN(0.103)
Bug Id:
CSCus56648
Title:
EIGRP crash in ipigrp2_get_tmap_distance
Description:

Symptom:
EIGRP crash in ipigrp2_get_tmap_distance

Conditions:
Crash is seen with table map if redistributed route is learnt when the corresponding dndb is active

Workaround:
Unconfigure table-map

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.408), 7.2(0)PDB(0.353), 7.2(0)VZD(0.6), 7.2(0)ZD(0.94), 7.2(0)ZN(0.114)
Bug Id:
CSCus08720
Title:
DHCP_SNOOP service crash after apply DHCP relay agent cnofig on SVI
Description:

Symptom:
dhcp_snoop service crash

Conditions:
This has been seen on N7K running 6.2(10) code.
This happens when smart relay is enabled and a DHCP operation fails after a DHCP Discover packet is received and no Offer is received for the same.
The probability of occurrence of this crash is low.

Workaround:
Disable Smart relay.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(1), 6.1(2)I3(3.71), 6.1(2)I3(4), 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38)
Bug Id:
CSCus24030
Title:
F3/100G: CRC errors when pkts sent from dot1q/FP to untagged/access intf
Description:

Symptom:
CRC errors and packet drop on traffic received from 100G F3 interface.

Conditions:
The issue happens when a packet is received on a trunk enabled interface (trunk port or Fabricpath port or layer 3 sub-interface) and has to exit on an interface with no tag. Even if it arrives on the native vlan or main interface on the input interface without a tag it will still cause CRCs on the next hop device.

Workaround:
Configure the egress port as trunk with dot1q tagging

This issue is resolved in 6.2(12) or later releases.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8b)
Known Fixed Releases:
6.2(12), 6.2(12)S17, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.314), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCus29686
Title:
Mcast Bidir - LHR lost DF after flapping ssm config
Description:

Symptom:
By correcting an SSM misconfig, it breaks bidir functionality

Conditions:
By correcting an SSM misconfig, it breaks bidir functionality

Workaround:
restart pim

Further Problem Description:
By correcting an SSM misconfig, it breaks bidir functionality, and as a results no bidir states are form and traffic are all dropped

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)D1(0.360)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.1(0)SIB(99.82), 7.2(0)D1(0.378), 7.2(0)N1(0.56), 7.2(0)N1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCus66218
Title:
Deleted vlans are still showing in show fabricpath output
Description:

Symptom:
Delete the vlan from the global database, but still it be present in the Fb database.

Conditions:
if the vlan is part of the Port-channel

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(1)ZN(0.744), 7.0(6)N1(0.244), 7.0(6)N1(0.4), 7.0(6)N1(0.5), 7.0(6)N1(1), 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.1(1)N1(0.454)
Bug Id:
CSCus21952
Title:
PVLAN:Forward table is not programmed with correct DI
Description:

Symptom:
L3 traffic does not egress out of Trunk secondary port/PC/VPC

Conditions:
Routed traffic gets dropped and does not egress out of Private vlan Trunk Secondary port.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(12)S10
Known Fixed Releases:
6.2(12), 6.2(12)S20, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCus69869
Title:
NVT:traffic blackhole for receiver on sec. Vlan when one vpc-leg is down
Description:

Symptom:
Traffic black-hole for receivers in secondary vlan on non-forwarder peer when source is in core.

Conditions:
On forwarder peer VPC leg is down and there are no other port on secondary Vlan on this box

Workaround:
Bring the vpc leg up on forwarding peer. OR make sure source has better metric to non-forwarding peer.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.404), 7.2(0)PDB(0.353)
Bug Id:
CSCti11629
Title:
Cisco NX-OS VDC SSH Privilege Escalation Vulnerability
Description:

Symptom:
Advisory ID: cisco-sa-20140521-nxos

Revision 1.0

For Public Release 2014 May 21 16:00 UTC (GMT)

Summary
=======

Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Cisco NX-OS Virtual Device Context SSH Privilege Escalation Vulnerability
* Cisco NX-OS Virtual Device Context SSH Key Privilege Escalation Vulnerability
* Cisco NX-OS-Based Products Smart Call Home Buffer Overflow Vulnerability
* Cisco NX-OS Message Transfer Service Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Conditions:
A device running an affected version of software.

Workaround:
None

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/6.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C

CVE ID CVE-2014-2200 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html



Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.0(2a)
Known Fixed Releases:
5.0(3)N1(1), 5.0(5.1)S0
Bug Id:
CSCte62771
Title:
Command Injection in admin CLI
Description:

Symptoms:
A vulnerability exists in affected versions of NX-OS which could allow an authenticated local attacker to inject shell commands. A successful exploit
would allow an attacker to gain elevated privileges on the underlying operating system.

Conditions:
Devices running affected versions of NX-OS are vulnerable.

Workaround:
None

Further Problem Description:
This issue was discovered in internal security testing and has been resolved in all current versions of affected software.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2011-4235 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
4.0(4)SV1(2), 4.2(1), 4.2(3)
Known Fixed Releases:
4.2(1)N2(1), 4.2(4), 4.2(4.14), 4.2(5), 5.0(1), 5.0(1.24)
Bug Id:
CSCth76379
Title:
OSPF MTS buffer leak
Description:

Problem:

Under certain conditions, OSPF internal message queue could fillup,
and could eventually prevent further messaging into OSPF until the condition
is cleared by a reload or supervisor switchover.

Symptom:

When the internal messaging queue is full, and there is a large amount of
update coming into OSPF, it is possible that OSPF neighborship will not be
formed with this router.

Workaround:

Remove any SNMP context configuration mappings to vRFs

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
4.2(7.38)S0, 4.2(7.39)S0, 5.0(3)S34, 5.0(3)S36, 5.0(3.43)S0, 5.1(0.193)S0, 5.1(0.194)S0, 5.1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCuo79856
Title:
N7K Incomplete CTS policies after port-channel coming up
Description:

Symptom:
On a nexus 7000 series switch in a cts enforcement scenario, not all policies for the configured security group tag may be appearing on the device after a port-channel is coming up.
For example, for this interface configuration :

interface Ethernet1/1
cts manual
policy static sgt 0x64 trusted
switchport mode fabricpath
no snmp trap link-status
logging event port link-status
channel-group 11 mode active

If this port-channel flaps, more specifically if we have two member ports of the port-channel coming shortly one after another, not all policies configured on ISE or ACS server with destination group tag 0x64 may be seen in show cts role-based policy

Conditions:

Workaround:
Perform a "cts refresh role-based-policy"

Further Problem Description:
CSCuo65802 addresses this defect for nexus 5000 series switches

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.3), 6.2(8)E3, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75)
Bug Id:
CSCti23447
Title:
Malformed IP packet causes Netstack crash
Description:

Cisco NX-OS Software is affected by a denial of service (DoS) vulnerability
that could cause Cisco Nexus 1000v, 5000, and 7000 Series Switches that are
running affected versions of Cisco NX-OS Software to reload when the IP stack
processes a malformed IP packet.

Cisco has released free software updates that address this vulnerability.
This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.0(2a)
Known Fixed Releases:
4.2(1)SV1(4), 5.0(2)N1(1), 5.0(5)S3, 5.0(5.1)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCup44514
Title:
MACSEC: N7K Port flap on N7K-M148GS-11(opackets dropped for few seconds)
Description:

Symptom:
MACSEC N7K port of module N7K-M148GS-11 with 4500 port
shows port flapping or packet loss (for instance EIGRP flapping).
It happens intermittently (once per day, few times per day, once in few weeks)
Port comes up immediately.

Conditions:
4500 1G interop with Module N7K-M148GS-11 and used with MACSEC configuration

Workaround:
- disable MACSEC
- use different module than N7K-M148GS-11

Further Problem Description:
We have not seen any issues in last 7 years, but this is the first interop issue we got.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.19), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.302), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCut37620
Title:
VXLAN VPC pair reboot con if peer cnt slightly more thank 1k
Description:

Symptom:
NVE crash

Conditions:
NVE peer count slightly more thank 1k.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)ZN(99.131)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.446), 7.2(0)N1(0.143)
Bug Id:
CSCsx23179
Title:
BGP session resets because AS4_PATH has AS_CONFED_SEQUENCE
Description:








Symptom:

NX-OS clears the BGP session upon receiving a prefix that has the AS4_PATH attribute
with AS_CONFED_SEQUENCE in it.







Conditions:

A prefix with AS4_PATH attribute with AS_CONFED_SEQUENCE in it is received.





Workaround:

Filter the prefix out further upstream.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
4.1(2)
Known Fixed Releases:
4.1(4), 4.2(0.147), 4.2(0.156), 4.2(1), 7.2(0)ZN(0.111)
Bug Id:
CSCtf23559
Title:
VSH parsing of pipe allows linux cli access
Description:



Symptom:

An authenticated, local attacker could leverage an input handling flaw to execute arbitrary commands on the underlying operating system with elevated
privileges.



Conditions:

Cisco devices running an affected version of NXOS software.

This issue affects:
Nexus 7000
Nexus 5000




Workaround:

Restrict local console access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of the Cisco UCS and relate devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.
The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-4076 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4076

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
5.0(2), 5.0(2.35), 5.0(2.37), 5.1(0.70), 5.1(0.76), 5.1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCut17447
Title:
SPAN dest port load balancing doesn't work with M2 as span src
Description:

Symptom:
If SPAN source is on M2 module in the RX direction, then load balancing on SPAN destination port-channel does not work.

Hostname(config-monitor)# sh port-channel traffic interface po X
NOTE: Clear the port-channel member counters to get accurate statistics

ChanId Port Rx-Ucst Tx-Ucst Rx-Mcst Tx-Mcst Rx-Bcst Tx-Bcst
------ --------- ------- ------- ------- ------- ------- -------
19 Eth8/18 100.00% 65.15% 40.00% 100.00% 0.0% 0.0%
19 Eth8/19 0.0% 34.84% 59.99% 0.0% 0.0% 0.0%
Hostname(config-monitor)#

Conditions:
SPAN source is on M2 module and SPAN direction in RX only
This problem is seen on 6.2 code when ISSU was performed from 6.1 code.

Workaround:
This problem is not seen when N7K was upgraded to code 6.2 code traditionally or N7K is reloaded after ISSU to 6.2

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuu38313
Title:
ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout")
Description:

Symptom:
ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") seen on syslog

Conditions:
On Scale Setup - with 384 fabric path bfd sessions & 1616 FP bfd sessions on L3 SVI. While adding/removing the FP members from Vlan

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases:
Bug Id:
CSCup18687
Title:
CSCup18687SGT mappings not downloaded to HW after module comes online
Description:

Symptom:
On a nexus 7000 series switches, IP to DGT mappings, may not be honoured following a supervisor switchover and a module reload.

Conditions:

Workaround:
The following can be performed to re-install the SGT mappings in the hardware :
- If statically configured, reapply the static SGT mapping configuration
- If learnt via SXP, reapply the SXP configuration.
- clear ip route A.B.C.D will also cause the mapping to be reprogrammed.
This will fix the issue until the next module reload happens as the initial trigger is the supervisor switchover. A reload will permanently clean the issue until a switchover followed by a module reload happens.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.1(3), 6.2(2), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S5, 6.2(10.5)
Bug Id:
CSCtq32783
Title:
snmpd asserts on length validation check when receiving malformed reques
Description:

Symptoms:.
snmpd process in a system running NX-OS software may crash due to corrupted SNMPv2c set request.
Conditions:
The SNMP process handles a malformed set request.
Workaround:
none
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2011-2051 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(0.907)S4
Known Fixed Releases:
5.2(1)S26, 5.2(1.31)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCtw78172
Title:
Dont_learn not set on peer link
Description:

Symptom:
Macs learnt on peer_link of M1 linecards.

Conditions:
When the switch has multiple vdc's and on one vdc VPC is configured and another vdc VPC
(emulated vpc) is configured, then DONOT learn on peer_link is not set in port asic for M1
Linecards. This causes packets coming in from peer link to be learnt by hardware.

Workaround(s):
Removing emulated switch config from the switch will restore the correct behavior.
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(3)S24, 5.2(3.25)S0, 6.0(2)S21, 6.1(0.165)S0
Bug Id:
CSCut21667
Title:
MIM header for F2 F2E F3 vdc type needs to be stripped
Description:

Symptom:
Arp is incomplete for hosts on F3 LC
Control plane pkts going from fex connected hosts to CPU maybe dropped and not reaching SUP.

Conditions:
VDC is F2, F2E and F3 vdc type , but there is no F2 line card in vdc or chassis at all.
Have more number of links as part of port-channel towards Fex (FPC) than per port-channel towards host (HIFPC).

Workaround:
Flap Fabric port-channel and configure less or equal number of links in FPC as compared to the HIFPC.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(14)FB(0.17), 7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)PDB(0.375), 7.2(0)VOF(0.2)
Bug Id:
CSCtx54822
Title:
Specific SNMP GET request causes 'snmpd' service to crash on Nexus 7K
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
9.0/7.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1180 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.11)S0, 7.1(0)BF(0.74), 7.1(0)ZD(0.158), 7.1(0)ZD(0.225)
Bug Id:
CSCup82982
Title:
N7K: M1 linecard reload observed due to leak in ipfib
Description:

Symptom:
A N7K M1 linecard may reset because of a generic sysmgr reset. No core file/service crash has been written as the result of this incident. The exception log shows:

System Errorcode : 0x401e008c sysmgr on linecard had an internal error
Error Description : send_redun_heartbeat: Unable to start send redundancy timer.

It is suspected this was triggered by a leak with ipfib service. To see how much memory is held by ipfib, attach to the module and collect "show forwarding internal mem-stats detail" and "show system internal processes memory"

Conditions:
OTV is enabled

Workaround:
Due to OTV code restructuring in 6.2.x releases, this leak should not been see there.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
Bug Id:
CSCuu09287
Title:
SSTE: pixm critical message on 'no feature-set fabric'
Description:

Symptom:
error message seen when no feature-set fabric is issued.

Conditions:
configure several feature sets and multiple VDCs.

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases:
Bug Id:
CSCub85673
Title:
F2 module is present in Admin VDC
Description:

Symptom:
Nexus 7000 allows interfaces to be allocated to the admin VDC

Conditions:
This occurs occurs when the chassis has only F2 modules.

Steps to reproduce:
Boot the Nexus 7000 with only F2 modules
Set the default VDC as the Admin VDC.
Save the config and reload

After reload the admin VDC is set as an F2 VDC and interfaces can be allocated.

Issue does not occur in a mixed chassis.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.1(1.69), 6.1(2)S1
Known Fixed Releases:
6.1(1.73)S0, 6.1(2), 6.2(0.285), 6.2(2)
Bug Id:
CSCts56669
Title:
Read-only user can create and overwrite files
Description:



Symptom:

Cisco Nexus devices contain an input validation vulnerability. This issue could allow a local, authenticated attacker to create or overwrite arbitrary files
on the device. This issue affects all user account types including Read-Only users.

This issue affects Nexus 7000 series and Nexus 5000 series devices.



Conditions:

Devices running an affected version of NX-OS Software.



Workaround:

Restrict access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of Cisco Nexus devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.6/3.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:C/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2012-4122 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4122

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.1(3)
Known Fixed Releases:
6.2(0.41)S0, 6.2(2), 7.0(1)ZD(0.3)
Bug Id:
CSCuu45561
Title:
BFD sending DELETE on F2 module w/o sending an ADD operation
Description:

Symptom:
Acl qos core seen

Conditions:
Have L2 BFd sessions, kill bfdc/aclqos

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases:
Bug Id:
CSCur99327
Title:
N7K10G: Rollback is failing on the scale setup
Description:

Symptom:
Rollback to a previously created checkpoint might fail at "no license grace-period" command.

Conditions:
This only happened when performing rollback after "write erase" and on scale setup.
This issue is not always reproducible.

Workaround:
Issue another rollback with "best-effort" option first. And do "no license grace-period" manually if necessary.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(12)FT(0.26)
Known Fixed Releases:
Bug Id:
CSCtq30759
Title:
snmpd might crash due to malformed SNMP packets
Description:

Symptoms:.
snmpd process in a system running NX-OS software may crash due to corrupted SNMPv2c set request.
Conditions:
The SNMP process handles a malformed set request.
Workaround:
none
Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2011-2047 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(0.907)S4
Known Fixed Releases:
5.2(1)S23, 5.2(1.27)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCtu39708
Title:
Non-dflt VDC grants access to unauthorized user via SSH
Description:

Symptoms:
A Cisco Nexus switch may allow unauthorized users SSH access under specific
circumstances. However, the user is logged in as a VDC-operator. No escalation is
possible from VDC-operator to VDC-admin.
Conditions:
Device configured with SSHv2 and logging in to a non-default VDC.
Workaround:
Please execute the following command :
"no tacacs-server directed-request"
This would ensure that the unauthorized user would not be able to login.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The
Base and Temporal CVSS scores as of the time of evaluation are
4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C
CVE ID CVE-2011-4495 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at
the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html



Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.1(6)S2, 5.2(3)S9, 5.2(3.8)S0, 6.0(2)S12, 6.1(0.151)S0
Bug Id:
CSCtx54830
Title:
Specific SNMP GET request causes 'snmpd' and 'licmgr' services to crash
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

Conditions:
See published Cisco Security Advisory

Workarounds:
See published Cisco Security Advsiory

Further Problem Description:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
9.0/7.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1179 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.11)S0, 7.1(0)BF(0.74), 7.1(0)ZD(0.158), 7.1(0)ZD(0.225)
Bug Id:
CSCti69207
Title:
Security Issue in OpenSSL
Description:

Symptom:
The device may be affected by an OpenSSL vulnerability described in CVE-2010-2939.


Conditions:
Device configured with any feature that uses SSL.

Workaround:
Not available

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C


CVE ID CVE-2010-2939 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
4.0(1a)N2(1)
Known Fixed Releases:
Bug Id:
CSCup56162
Title:
Anycast HSRP custom VMAC not programmed after hsrp restart
Description:

Symptom:
Anycast HSRP with custom VMAC is not programmed at L2FM as gateway after HSRP process stateful restart.

Conditions:
Anycast HSRP is configured with non-default VMAC and HSRP engine process is restarted.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
7.3(0)IB(0.6)
Bug Id:
CSCtk34535
Title:
Nexus reset due to HA policy on multiple CDP process crash
Description:

Symptoms:
A Cisco Nexus 7000 may reset due to a HA policy if the CDP process crashes multiple times

Conditions:
This has been seen when processing a malformed CDP packet

Workaround:
Disable the CDP process

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-2469 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
4.2(6)
Known Fixed Releases:
5.0(5)E1, 5.1(4)E3, 5.1(5)S1, 5.2(0.149)S0
Bug Id:
CSCuu45553
Title:
bfd crash seen with bfd_mts_flush_all_bfdc_msgs decodes
Description:

Symptom:
BFD core seen

Conditions:
During copy config to run config

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases:
Bug Id:
CSCtq62339
Title:
NX-OS 5.1 Kernel Memory Leak
Description:

Symptom:

Nexus7000 may report platform memory alert due to high memory utilization:

%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: MINOR. Usage 85% of Available Memory
%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: SEVERE. Usage 90% of Available Memory


N7K# sh system internal memory-status
MemStatus: Severe Alert

N7K# sh system internal memory-alerts-log | inc "ALERT INFO|MemTotal|MemFree|LowTotal|LowFree"
MINOR ALERT INFO
MemTotal: 8254672 kB
MemFree: 4295324 kB
LowTotal: 727120 kB
LowFree: 109332 kB
SEVERE ALERT INFO
MemTotal: 8254672 kB
MemFree: 4255408 kB
LowTotal: 727120 kB
LowFree: 72392 kB


Conditions:

CSCtq62339 is only being encountered if the following conditions are true:

Switch is running a release between 5.1(1) to 5.1(3).


>>>>=====
On these releases, the bug will be exposed
irrespective any feature enabled/disabled.
There is no precondition for this.
<<<<<====

Memory alert log shows only a snapshot of kernel memory *when* the alert threshold (85,90,95%) is crossed. Historical information can be misleading and needs to be understood clearly.

To calculate the CURRENT kernel memory, use the following procedure:
N7K# show system internal kernel memory usage | in Low

Low memory condition is logged when the following formula is at/above the logging threshold:
(LowTotal - LowFree) ?? LowTotal x 100

Ex: (727120 - 72392 ) ?? 727120 x 100 = 90% (threshold reached due to utilization in low region)


Low memory condition has been seen after approximately 3 months of supervisor uptime.

Workaround(s):


Reload of the active supervisor will clear the issue in a setup with two supervisor cards.
Reload of the switch will clear the issue in a setup with a single supervisor.

Software upgrade to fixed release, 5.1(4) or 5.2(1) or later.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
5.1(1), 5.1(2), 5.2(1)
Known Fixed Releases:
5.1(10.4)S0, 5.1(4)S3, 5.2(1)S36, 5.2(1.43)S0
Bug Id:
CSCtj42789
Title:
SNMP set of SysName does not result in matching configuration change
Description:

SYMPTOM:

Changing system name via SNMP does not result in
a configuration change.

CONDITIONS:

This issue happens when the system name is configured
via SNMP.

WORKAROUND:

Change the system name via non-SNMP method.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.2(0.1)
Known Fixed Releases:
5.1(1.37)S0
Bug Id:
CSCtn11475
Title:
IPv6 Traffic Causing System Instability
Description:

Symptom:

Cisco Nexus 7000 experiences performance degradation when processing IPv6 packets.
During different tests, when a device/client sends ICMPv6 Neighbor Solicitation messages, not all packets
were rate-limited successfully, thus causing performance degradation.

Note: ICMPv6 Neighbor Advertisement and Neighbor Solicitation are used to facilitate host-router
discovery functions as part of the IPv6 Neighbor Discovery (ND) protocol. IPv4 is not impacted by this issue.

Conditions:
Cisco Nexus 7000 configured for IPv6.

Workaround:
Not available.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C

CVE ID CVE-2011-0368 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.1(2)
Known Fixed Releases:
5.1(10.1)S0, 5.1(3)S17, 5.1(3)S22, 7.2(0)ZN(0.111)
Bug Id:
CSCuc19553
Title:
RADIUS insufficient attribute length check
Description:

Symptoms:
Cisco NXOS contains a vulnerability in the RADIUS authentication code.
Conditions:
Malformed packets are returned from a RADIUS authentication server.
Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-6377 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.0(3)
Known Fixed Releases:
6.1(2.45)S0, 6.2(0.273)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCui22543
Title:
Corrupted packet causes CFS to crash
Description:

<B>Symptom:</B>
If a Nexus 7000 receives a corrupted GRE packet with protocol type 0x8843 the packet will be
punted to the CPU and cause CFS to crash.

If dual supervidors are present successive corrupted packets will cause a supervisor failover and
possibly a reload of the VDC that received the corrupted packets.

If the switch has only a single supervisor the switch may reload.

<B>Conditions:</B>
The issue occurs when a corrupted packet with protocol type 0x8843 is received

<B>Workaround:</B>
none

<B>More Info:</B>

Status:
Other
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
5.2(7), 6.0(4), 6.1(3)
Known Fixed Releases:
Bug Id:
CSCuo64219
Title:
bfd core @ bfd_disc_bmp_set_bit on applying config
Description:

Symptom:
Crash due to asset failure when bfd session discriminator reaches(xxxxFFFF) before wrapping around.

Conditions:
Have 65535+ sessions per VDC so that discriminator reaches boundary condition which causes asset failure.

Workaround:
Have fewer than 65535 sessions

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
7.1(0)D1(0.113), 7.1(0)D1(0.161)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.108), 7.1(0)D1(0.169), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCur32142
Title:
mcast traffic blackhole for upto 4min as assert cancel not sent by winne
Description:

Symptom:
Multicast traffic blackhole for up to 4 minutes

Conditions:
If more than one router forwards traffic onto a LAN - in initial bootup phase or when 'ip multicast multipath' command is configured - PIM assert election happens and one router becomes the winner. This could be the non-PIM-DR having a PIM receiver. There may also be local IGMP receivers on this LAN.
Now, if the winner receives a PIM Prune message and no other PIM receivers exist on that LAN, the winner should send an assert cancel message, to conclude the election and let the PIM-DR on the LAN forward for local receivers.

Under certain circumstances, the winner does not always send out the assert cancel thereby causing traffic blackhole until the loser router ages out the winner's assert message. This could take up to 4 minutes.

Workaround:
clear ip mroute

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(10), 6.2(10)S102, 7.1(0)D1(0.324)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)D1(0.325), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)N1(0.12), 7.2(0)N1(0.3)
Bug Id:
CSCuo34849
Title:
N7K:Incorrect CBL programming of vlans on members of portchannel
Description:

Symptom:
This is post-ISSU scenario. Due to specific sequence of PVLAN events and ISSU combination, PIXM can undergo memory corruption and this can lead to of the following issues
- PC and its members are error disabled
- Incorrect CBL programming
- PIXM may crash

Conditions:
Pre-conditon to hit defect:- You should have a port-channel carrying private vlan. Regular layer two trunk carrying plan will not be affected from this defect.

1. Primary VLAN should be associated to Secondary VLAN
2. PC should be trunk PC carrying both primary and secondary VLANs
3. STP operating on either primary or secondary on trunk PC.
4. Any PC modify operation (ADD/REMOVE) on the PC will result in above symptoms.

Workaround:
1: First disassociate Secondary VLAN from Primary
2. Delete the Primary and Secondary VLAN
3. Recreate the same Primary and Secondary VLANs and apply the config
4. Wait for some time for protocols to converge on both the VLANs
5. Finally associate Secondary to Primary VLAN

Further Problem Description:
The issue can happen only on 6.2.6 and 6.2.6a image.
This issue is fixed in 6.2.8 and is ONLY green start compliant, which means , if you already ran into this bug in 626 and you simply did ISSU to 628 , issue will still be present in 628. Please try to follow above workaround in 628 before doing ISSU to 628. Or simply upgrade to 628 using traditional reload method.

Status:
Other
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(6a), 6.2(8)S17
Known Fixed Releases:
6.2(8)
Bug Id:
CSCuq34116
Title:
N7K-F248XT-25E interfaces fail PortLoopback test and fail to initialize
Description:

Symptom:
Interfaces on an N7K-F248-XT-25E fail to initialize.

- Gaurdian is in stuck state.
- Shut / no shut of the interface does not help.
- Not easily reproducible.
- Once we reload the LC, issue goes away.
- So this is very rare and intermittent case.

Conditions:
N7K-F248-XT-25E running 6.2(x)

Workaround:
Reload the impacted line card

Further Problem Description:
The interface in question will fail the port loopback diagnostic test. However, if you were to check the exception log for the module you will see the following exception being raised for the interface:

n7k# sh module internal exceptionlog module 5
********* Exception info for module 5 ********

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 143
Device Name : Port-Client
Device Errorcode : 0xc8f0c269
Device ID : 143 (0x8f)
Device Instance : 12 (0x0c)
Dev Type (HW/SW) : 02 (0x02)
ErrNum (devInfo) : 105 (0x69)
System Errorcode : 0x42370069 GD link down
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/13
Error Description : send_exp_info: Operational param config failed in port client linkup handler port: 12 error 0x42370069
DSAP : 0 (0x0)
UUID : 323 (0x143)
Time : Wed Jul 9 09:43:16 2014
(Ticks: 53BD5504 jiffies)

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(2), 6.2(6), 6.2(6a), 6.2(6b), 6.2(8a)
Known Fixed Releases:
6.2(12)E6, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)PDB(0.394)
Bug Id:
CSCul72684
Title:
N7k: Default credentials vulnerability on CMP
Description:

Symptoms:
A vulnerability in authentication module of CMP component of Cisco Nexus 7000 could allow an authenticated, remote attacker to log in to CMP using
credentials that were previously deleted from the Supervisor.

The vulnerability is due to the way CMP caches credentials from a Supervisor, if the user ever uses these credentials to log in to the CMP. Once deleted
from a Supervisor, those credentials will still be cached on the CMP. An attacker could exploit this vulnerability by loging into the CMP, using deleted
credentials from a Supervisor.

Conditions:

If the local user exists on the Supervisor, and is used to log into the CMP, CMP will cache those credentials.
All credentials are authenticated by the Supervisor, if the Supervisor is running.

When the local user is deleted from the Supervisor, the CMP still caches those credentials and they may be used to log in directly to CMP.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
2.1/1.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
5.0(0.66)
Known Fixed Releases:
5.2(9.280)S0, 6.1(5), 6.1(5)S8, 6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.7), 6.2(9)FM(0.37), 7.1(0)ZD(0.200)
Bug Id:
CSCto47349
Title:
N7K: allowed trunk vlans are gone after switchover
Description:

Symptom:
Allowed trunk vlans are removed from configuration after a switchover

Conditions:
trunk vlan is removed by "remove" syntax before executing switchover.

Nexus7000(config-if)# switchport trunk allowed vlan remove

The issue is observed on NX-OS 5.1(3)

Workaround:
When modifying trunk vlans, NOT to use "remove" option can be
a workaround.

For instance, you would like to remove vlan 1,51 from trunk,
you can overwrite the trunk vlan other than vlan 1,51.

Nexus7000-B(config-if)# switchport trunk allowed vlan 2-50,52-100
This will cause VLANS to be overwritten. Continue anyway? [yes]

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
5.1(3)
Known Fixed Releases:
5.1(10.1)S0, 5.1(3)E5, 5.1(4)S0
Bug Id:
CSCup10049
Title:
ACLQOS crash and %IPQOSMGR-3-QOSMGR_PPF_ERROR: PPF library error:
Description:

Symptom:
A Nexus C7009 running NX-OS version 6.2(2a) may have a crash in aclqos with accompanied core file(s).

%SYSMGR-SLOT3-2-SERVICE_CRASHED: Service "aclqos" (PID ) hasn't caught signal 6 (core
will be saved).

Post crash, the below messages may also be seen:

%IPQOSMGR-3-QOSMGR_PPF_ERROR: PPF library error: MTS
Error 0x801c0010 (Device or resourc e busy) after 1706 retries .

Conditions:
there were too many queries from ipqosmgr and COPP to aclqos

Workaround:
Not known at this time.

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(2a), 6.2(6)
Known Fixed Releases:
6.1(2)I3(1.19), 6.1(2)I3(2), 6.2(10), 6.2(10)S92, 6.2(10)S93, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.326)
Bug Id:
CSCue02901
Title:
Logging server shows unreachable, syslog not delivered
Description:

Symptom:
show logging server output shows the following text for a logging server:

'This server is temporarily unreachable'

While ping to the same server IP / hostname is successful.

Conditions:

Workaround:
Run following commands:

DC1-4(config)# no logging server 172.28.92.10 7 use-vrf management facility local6
DC1-4(config)# logging server 172.28.92.10 7 facility local6
DC1-4(config)# logging source-interface loopback 0
Configuring logging source-interface will open UDP/syslog socket(514).
DC1-4(config)# logging server 172.28.92.10 7 use-vrf management facility local6
DC1-4(config)# no logging source-interface loopback 0
UDP/syslog socket(514) is being closed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
5.2(7), 6.1(2)
Known Fixed Releases:
6.0(2)U2(2.29), 6.0(2)U2(3), 6.0(2)U3(0.617), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1), 6.2(5)BF(0.24), 6.2(5.42)S0, 6.2(6)
Bug Id:
CSCut13349
Title:
EIGRP hap reset seen on primary vpc+ switch with Janjuc build 111
Description:

Symptom:
This issue is seen on L3 over Fabricpath testbed. N64P switches are vpc+ peers. P2 is primary and P1 is secondary.

Fwm reset happened on P1 (vpc secondary) and switch went for a reload. All the L3 protocols between P1 and P2 went down. Around 3 minutes later primary vpc switch (P2) went down due to eigrp hap reset.

No triggers executed this time. Switch was left idle with traffic on for around 12 hours. Then the fwm crash was seen on secondary switch and few minutes later eigrp hap reset was seen on primary vpc+ switch.

Conditions:
Eigrp hap reset seen

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
7.2(0)D1(0.409), 7.2(0)N1(0.111)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)N1(0.213), 7.2(0)N1(1), 7.2(0)ZD(0.194), 7.2(0)ZN(0.213)
Bug Id:
CSCuj13702
Title:
Make 'to' option of lig only available to admin-level users
Description:


Symptom:
Cisco IOS and Cisco NX-OS contain a vulnerability that could allow an authenticated, local attacker to poison the LISP routing cache on the router
configured as a ITR.
Conditions:
An attacker needs to have a privilege 0 local access to the ITR router and execute ''lig'' commands.
Workaround:
1. configure ''privilege exec level 15 lig'', to prevent privilege level 1 users from executing the lig command.
2. use separate VRFs for the EID and RLOC spaces, assuming the attacker does not have access to the RLOC case.
3. using GETVPN or other crypto in the RLOC space may mitigate against this, but not in the common deployment scenario, where crypto maps are
applied to the LISP0 interface.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.5/1.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:W/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(5)BF(0.23), 6.2(5.42)S0, 6.2(6)
Bug Id:
CSCut57953
Title:
N7K "ipfib" process crash
Description:

Symptom:
N7K line card crash with "ipfib" core file generated.

Conditions:
crash observed on N7K running ospfv3 on 6.2.12 code

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(14)FB(0.58)
Bug Id:
CSCun25245
Title:
NLB mutlicast mac unicast IP duplicated by the CPU
Description:

Symptom:
Packets with Unicast IP and Multicast MAC are being duplicated on the destination interface. which can cause performance issues to the application.

Conditions:
on using MS NLB Option 2: Static ARP + MAC-based L2 Multicast Lookups + Static Joins + IP Multicast MAC

Workaround:
use unicast mode.

Further Problem Description:
Packets that are copied to the CPU must meet:
- Packet needs to be intervlan Routed
- Multicast L2 lookup is MAC based
- We have either an IGMP Static entry for the "group" or received a "join" entry.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(2a), 6.2(6)
Known Fixed Releases:
7.1(0)D1(0.198), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)PDB(0.155), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6), 7.1(0)VX(0.3), 7.1(0)ZD(0.254)
Bug Id:
CSCut96140
Title:
6.2.12: L2 port channels not programmed correctly in LACP INDI
Description:

Symptom:
Port configured as LACP individual mode.

ELTM does not have the PC member in the database after port becoming part of port-channel.

"show system internal eltm info interface port-channel xyx" does not contain all the PC members.

Conditions:
L2 port-channel with LACP Individual mode

Workaround:
Flap port-channel members which is not added to the PC member

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E5, 6.2(14)FB(0.36), 7.1(0)AV(0.74), 7.2(0)D1(0.485), 7.2(0)ZD(0.167)
Bug Id:
CSCut93469
Title:
SUP2,F2E ,arp response failing with SI set as GPC LTL
Description:

Symptom:
ARP responses for the HSRP VIP are dropped.

Conditions:
An ARP response from the active HSRP Anycast is dropped on the HSRP Anycast standby when enabling Dynamic ARP Inspection.

This problem only occurs when having the vdc configured for 'limit-resource module-type F2 F2E' and only hosting F2E linecards on the chassis.

Workaround:
Reconfigure the vdc for F2E only support and rebind the interfaces.

vdc xxx id 1
limit-resource module-type f2e

This ensures that the F2E linecard is using the physical source interface instead of using the HSRP anycast GPC as the source interface for incoming ARP responses.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
6.2(10)E8
Known Fixed Releases:
6.2(10)E3, 7.2(0)D1(1)
Bug Id:
CSCus73066
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:
A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:
Unknown

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
6.1(4), 6.2(10), 6.2(12), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10)E5, 6.2(10)E8, 6.2(12)E2, 6.2(14)FB(0.14), 6.2(8)E10, 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)PDB(0.395), 7.2(0)PDB(0.396)
Bug Id:
CSCus58902
Title:
Potential of opening al back door
Description:

Symptom:
If the admin user is able to reach the underlying OS shell, it migh be possible to create a fully functional operating system account that could have unlimited access to the underlying operating system.

Conditions:
Requires full administrative access to the device and the existence of a separate bug that would allow the administrator to access the underlying operating system

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
Bug Id:
CSCus68892
Title:
N7K: assess GHOST vulnerability in glibc (CVE-2015-0235)
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Workaround:
Not available.

Further Problem Description:
A heap-based buffer overflow in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname* glibc function calls.

All previously released versionsand NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

NX-OS 7.0 release - is scheduled to be available in May 2015
NX-OS 6.2 release - first fixed release is 6.2(12) which is available on CCO

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
4.2(8), 5.2(9), 6.1(5), 6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S32, 6.2(12.3)S0, 6.2(12.4)S0, 6.2(13.1)S0, 7.2(0)D1(0.410), 7.2(0)PDB(0.347)
Bug Id:
CSCuu01321
Title:
ipfib crash @ fln_ecmp_alloc_block_inst_bmap
Description:

Symptom:
When there is an ECMP comprised of two traffic engineering tunnels, and one of them is the backup (in this case the backup is also announced for routing which is not supposed to be done), if the process ipfib is restarted, it might crash.

Conditions:
ipfib process can be restarted when there is a crash due to some bug or when ISSU is performed.

Workaround:
Don't use backup tunnel for routing. This way there will be no ECMP and the crash can be avoided. In general avoid having an ECPM with tunnels when performing ISSU.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCus71454
Title:
PVLAN VPC: peer-link flap causes primary legs in PVLAN host mode to flap
Description:

Symptom:
In a Private-Vlan VPC setup in private-vlan host mode, when peer link flaps, VPC leg in private-vlan host mode also flaps and comes back up in some time. There will be traffic loss from the VPC leg until the leg bringup happens again.

Conditions:
The VPC legs have to be private-vlan host mode as follows: "switchport mode private-vlan host"

Example configuration:
interface port-channel10
switchport
switchport mode private-vlan host
switchport private-vlan host-association 2 3
vpc 1

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
Bug Id:
CSCup22563
Title:
Vulnerabilities in OpenSSL: LDAP over SSL
Description:

Symptom:
The following Cisco products

Cisco Nexus 7000 series switches
Cisco MDS 9000 series switches

running software versions:
7.1(0), 6.2(8), 6.2(7), 5.2(8d)

are affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-0076 - Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
CVE-2014-0195 - DTLS invalid fragment vulnerability
CVE-2014-0221 - DTLS recursion flaw
CVE-2014-0224 - SSL/TLS MITM vulnerability
CVE-2014-3470 - Anonymous ECDH denial of service

This bug has been opened to address the potential impact on this product. The above list of versions are not exhaustive.

Conditions:
Devices using LDAP in SSL mode, say, the ones with the following command may be vulnerable:

ldap-server host {ipv4-address | ipv6-address | host-name} [enable-ssl]

All versions prior to the first fixed version of a train are affected by one or more of the above CVE's.

Workaround:
Not available. Either a patch has to be applied or the entire package has to be upgraded.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 10/9.5:

https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
5.2(8d), 6.2(7), 6.2(8)
Known Fixed Releases:
5.2(8e), 5.2(8e)S4, 6.2(10), 6.2(10)S79, 6.2(10)S80, 6.2(10.16)S0, 6.2(12)BFP(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97)
Bug Id:
CSCur04856
Title:
Cisco Nexus 7000 Series evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
Symptoms:
The Cisco Nexus 7000 Series switches includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.

Conditions:
Devices with default configuration.

Workaround:
Not Available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
7.0(2)
Known Fixed Releases:
Bug Id:
CSCum18198
Title:
restrictions for wccp redirect access-list and such other limitations
Description:

Symptom:
restrictions for wccp redirect access-list and such other limitations

Conditions:
restrictions for wccp redirect access-list and such other limitations

Workaround:
restrictions for wccp redirect access-list and such other limitations

Further Problem Description:
restrictions for wccp redirect access-list and such other limitations

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(6)S9
Known Fixed Releases:
Bug Id:
CSCub16539
Title:
SNMP MTS Buffer Leak on VLAN MIBs - dot1d bridge, vlan membership, smon
Description:

Symptom:
A Nexus 7k or 5k switch may experience crashes in the SNMPd process. Errors leading up to the crash hint at an MTS issue with the SAP used by SNMP. Eg:

KERN-2-SYSTEM_MSG mts_is_q_space_available_old(): NO SPACE - node=4, sap=27, uuid=26, pid=28679, sap_opt = 0x1, hdr_opt = 0x0, rq=1122(322640), lq=0(0), pq=0(0), nq=0(0), sq=0(0), fast: rq=0, lq=0, pq=0, nq=0, sq=0 - kernel
KERN-2-SYSTEM_MSG mts_print_longest_queue_state: opcode counts for first and last 50 messages in recv_q of sap 27: - kernel
KERN-2-SYSTEM_MSG mts_print_msg_opcode_in_queue: opcode 7679 - 100 messages - kernel
KERN-2-SYSTEM_MSG mts_do_msg_input() failing since no space available in 27 (src_sap = 27, opc = 8923) - kernel

Conditions:
The leak occurs when polling a VLAN MIB and performing a walk down the MIB's subtree -- specifically the dot1d bridge MIB, vlan membership MIB, and smon MIB.

Workaround(s):
None known.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.2(5), 6.1(1)
Known Fixed Releases:
5.2(1)N1(5), 5.2(6.23)S0, 5.2(7), 6.0(2)A1(1), 6.0(2)N1(1), 6.0(2)U1(1), 6.1(1)S50, 6.1(1.48)S0, 6.1(1.69)
Bug Id:
CSCut50838
Title:
M2 VLAN Translation Not Translating Non-Native VLAN BPDUs
Description:

Symptom:
Ingress non local VLAN BPDUs are dropped as "igr ifc: total pkts dropped due to cbl? and egress BPDUs are not tagged with translated VLAN causing both devices to see them self as spanning-tree root for translated VLAN

Conditions:
When VLAN translation is configured on N7K-M224XP-23L

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a)
Known Fixed Releases:
Bug Id:
CSCtk56774
Title:
Some of the telnet sessions do not get cleared with recursive telnet
Description:

Symptom:
Telnet sessions do not get cleared on the Nexus switch.
Checking 'sh proc cpu', a lot of 'dcos-telnet' processes are still running even though these sessions do not exist anymore.

Conditions:
Customer is using a script to telnet into the Nexus, and then telnet to other devices from there.

Workaround(s):
to issue "clear user admin" command

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.1(1.77)
Known Fixed Releases:
5.2(1)N1(1), 5.2(3.1), 6.0(0.13)S0
Bug Id:
CSCul33530
Title:
Apex10: FCOE license is getting installed after reload
Description:

Symptom:
Nexus 7000 shows F2 FCOE license installed even if it was not installed

Example

7710-1# sh lic usa
Feature Ins Lic Status Expiry Date Comments
Count
--------------------------------------------------------------------------------
MPLS_PKG No - Unused -
STORAGE-ENT No - Unused -
VDC_LICENSES Yes 4 In use Never -
FCOE-N7K-F248XP Yes 4 Unused Never 4 license(s) missing
ENHANCED_LAYER2_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused Never -
LAN_ENTERPRISE_SERVICES_PKG Yes - Unused Never -
--------------------------------------------------------------------------------
**** WARNING: License file(s) missing. ****
7710-1#

If you do "show file [license file name]" command you will see FCOE license was not installed.
It has been also seen that even if F2 line card in not installed in the system this error is seen.

Conditions:
TRANSPORT_SERVICES_PKG license installed in the system

Workaround:
"clear license sprom" command will clear the problem but it will re-appear after reload

Further Problem Description:
This happens because of an error in the license specfile. Because of overlapping bit positions FCOE is falsely turned on. The license spec file has been fixed. With these specfile after doing "clear license sprom" the problem should not happen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(5.45)S3
Known Fixed Releases:
6.2(10), 6.2(10)S77, 6.2(10.16)S0, 6.2(10.502)S0, 6.2(11)FM(0.26), 7.1(0)D1(0.278)
Bug Id:
CSCuq05409
Title:
NXOS/SPM/PPF: MTS buffer full after infinite loop in PPF show
Description:

Symptom:
High number of messages cause low memory in MTS for internal SPM process (SAP 487) and consequent crash of SPM and switchover.

Conditions:
This is rare corner case where issue can happen during execute show cli inside sh tech spm (or as part of tac-pac).

Workaround:
Use an EM script to vlock the following CLI:

sh tech spm
show system internal spm ppf info all

show tech-support netflow
sh tech aclmgr
show system internal aclmgr ppf control

sh tech copp
show system internal copp ppf-database policy all


sh tech ipqos
show system internal ipqos ppf-lib

sh tech pbr
sh tech rpm
show system internal rpm ppf


sh tech aclqos
show system internal aclqos database policy control
show system internal aclqos event-history ppf

sh tech cts
show cts internal ppf

sh tech dhcp
show system internal dhcp database policy all

sh tech npacl
show system internal npacl ppf


sh tech-support ip
show ip internal acl ppf

show ip internal ppf

show tech-support netflow

show system internal flow nf ppf

show flow internal ppf db


Not in sh tech but trigger ppf show:
show system internal ipqos ppf control
show tunnel internal database policy all
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S34, 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.224), 7.1(0)FC(0.2), 7.1(0)N1(0.275), 7.1(0)N1(1), 7.1(0)NF(0.32)
Bug Id:
CSCup55118
Title:
ORIB buffer exhaustion on IGMP join/leave
Description:

Symptom:
ORIB buffer exhaustion when we receive continuous IGMP join/leave

show ip igmp snooping internal ribs
IGMP Snooping internal RIB information
RIB name: M2RIB (type 0), ready: Yes No , xid 0x1f6cd
Max. outstanding buffers: 4
Current outstanding buffers: 0
Max. OMF entries per buffer: 400
Max. OMF route entries per buffer: 50
Max. route entries per buffer: 400
Fabricpath redist instance: 1
Used buffer queue count: 0
Free buffer queue count: 10
Buffer: 0x0x98650ac, type: none, xid: 0x0, count: 0
Buffer: 0x0x9869f04, type: none, xid: 0x0, count: 0
Buffer: 0x0x986ed5c, type: none, xid: 0x0, count: 0
Buffer: 0x0x9873bb4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985174c, type: none, xid: 0x0, count: 0
Buffer: 0x0x984c8f4, type: none, xid: 0x0, count: 0
Buffer: 0x0x9847a9c, type: none, xid: 0x0, count: 0
Buffer: 0x0x98565a4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985b3fc, type: none, xid: 0x0, count: 0
Buffer: 0x0x9860254, type: none, xid: 0x0, count: 0
TXLIST member version: 0
RIB name: ORIB (type 1), ready: Yes No , xid 0x10009
Used buffer queue count: 10
Buffer: 0x0x97ff7ac, type: route, xid: 0x10000, count: 1
Buffer: 0x0x9804604, type: route, xid: 0x10001, count: 1
Buffer: 0x0x980945c, type: route, xid: 0x10002, count: 1
Buffer: 0x0x980e2b4, type: route, xid: 0x10003, count: 1
Buffer: 0x0x981310c, type: route, xid: 0x10004, count: 1
Buffer: 0x0x97e6ff4, type: route, xid: 0x10005, count: 1
Buffer: 0x0x97ebe4c, type: route, xid: 0x10006, count: 1
Buffer: 0x0x97f0ca4, type: route, xid: 0x10007, count: 1
Buffer: 0x0x97f5afc, type: route, xid: 0x10008, count: 1
Buffer: 0x0x97fa954, type: route, xid: 0x10009, count: 1
Free buffer queue count: 0
TXLIST member version: 69545

Conditions:
this issue is seen in OTV environment

Workaround:
restart igmp process

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.2(1), 6.1(4)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.189), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.240), 7.1(0)N1(1)
Bug Id:
CSCuq31499
Title:
N7K FEX satctrl hap reset
Description:

Symptom:
FEX attaching to N7K may crash:

1) At 659678 usecs after Thu Jul 31 09:03:30 2014
Reset Reason: Reset triggered due to HA policy of Reset (16)
Service (Additional Info): satctrl hap reset
Image Version: 6.2(8)

Conditions:
there is no trigger can be found for now.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(8)S9
Known Fixed Releases:
6.1(2)I3(3.71), 6.1(2)I3(4), 6.2(0)FH(0.167), 6.2(10.19)S0, 6.2(12), 6.2(12)FT(0.27), 7.0(2)FG(0.38), 7.0(3)I1(1.99), 7.0(3)I1(2), 7.0(3)I2(0.140)
Bug Id:
CSCtt38629
Title:
Emerson 6KW AC supply fails when power restored on input 1
Description:

Symptom:

Using N7K 6KW AC power supplies that have serial number starting with AZS (manufactured by Emerson) may inadvertently shutdown momentarily when power is restored to input 1 after a power failure of two or more supplies. This is seen when simulating a grid failure. See logs for example:

2011 Oct 13 19:18:00 N7K-7010-2 %PLATFORM-2-PS_CAPACITY_CHANGE: Power supply PS1 changed its capacity. possibly due to power cable removal/insertion (Serial number DTM1423007S)
2011 Oct 13 19:18:00 N7K-7010-2 %PLATFORM-2-PS_CAPACITY_CHANGE: Power supply PS2 changed its capacity. possibly due to power cable removal/insertion (Serial number AZS1526101E)
2011 Oct 13 19:18:03 N7K-7010-2 %PLATFORM-2-PS_CAPACITY_CHANGE: Power supply PS1 changed its capacity. possibly due to power cable removal/insertion (Serial number DTM1423007S)
2011 Oct 13 19:18:05 N7K-7010-2 %PLATFORM-5-PS_STATUS: PowerSupply 2 current-status is PS_FAIL
2011 Oct 13 19:18:05 N7K-7010-2 %PLATFORM-2-PS_FAIL: Power supply 2 failed or shut down (Serial number AZS1526101E)
2011 Oct 13 19:18:05 N7K-7010-2 %PLATFORM-2-PS_CAPACITY_CHANGE: Power supply PS2 changed its capacity. possibly due to power cable removal/insertion (Serial number AZS1526101E)
2011 Oct 13 19:18:05 N7K-7010-2 %PLATFORM-2-PS_RED_MODE_RESTORED: Power redundancy operational mode changed to configured mode
2011 Oct 13 19:18:07 N7K-7010-2 %PLATFORM-5-PS_FOUND: Power supply 2 found (Serial number AZS1526101E)
2011 Oct 13 19:18:07 N7K-7010-2 %PLATFORM-2-PS_OK: Power supply 2 ok (Serial number AZS1526101E)
2011 Oct 13 19:18:07 N7K-7010-2 %PLATFORM-5-PS_STATUS: PowerSupply 2 current-status is PS_OK
2011 Oct 13 19:18:07 N7K-7010-2 %PLATFORM-2-PS_FANOK: Fan in Power supply 2 ok

Conditions:

Only occurs on restoring power to input 1. Input 2 does not exhibit this problem.
Only 6.0KW AC power supplies starting with serial number AZS are affected with this issue.
Power supples starting with serial number DTM are NOT affected with this issue.

Workaround:

There is no workaround

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.1(5), 5.2(1), 6.0(1)S3
Known Fixed Releases:
Bug Id:
CSCun99687
Title:
VTY ACL not programmed after code upgrade to 6.2.6 and switchover
Description:

Symptoms:
This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.

Conditions:
Device configured with default configuration.

Workaround:
Not applicable or available.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.23), 6.2(10)FM(0.17), 6.2(10)NO(0.12), 6.2(8)E10, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)BZ(0.46)
Bug Id:
CSCtu10608
Title:
CDP with long protocol crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(3.30)S0, 5.2(3.39)S0, 6.1(0.137)S0, 6.1(0.145)S0, 6.1(0.173)S0
Bug Id:
CSCuu11331
Title:
N7K - SNMP snmpd core os_syscall_ioctl, tcp_api.c, libmts.c running UTE
Description:

Symptom:snmpd crashed. In the background 8 out of 10 times its aclqos mib causing the problem.
Conditions:This happens when CPU utilization is high from the normal.
Workaround:snmpd restart is stateful so it boots up with all the configs intact.

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.2(10), 6.2(10)S102, 7.2(0)D1(0.475), 7.2(0)D1(0.484)
Known Fixed Releases:
Bug Id:
CSCtr44645
Title:
Command Injection vulnerability with the | section command
Description:

Symptom:
Cisco Nexus OS contains a vulnerability that could allow an authenticated,
local attacker to execute arbitrary commands on a targeted device. The
vulnerability is due to improper sanitization of user-supplied values to
command line interface commands.

An authenticated, local attacker could exploit the vulnerability by issuing
commands that contain malicious options on the device command line interface.
If successful, the attacker could gain elevated privileges on the targeted device.

Conditions:

Injection can be done via either the less or the section sub command. Full
details below:

----------------------------------------------------------------------
NX-OS - "less" sub-command - Command injection / sanitization issues.
----------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+-----------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+----------------|
| Cisco Nexus 7000 Series Switches | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 5000 Series Switches | CSCtf40008 | 4.2(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 2000 Series Switches | CSCtf40008 | 4.1(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 1000V Series Switches | CSCtf40008 | 4.2(1)SV1(5.1) |
|-----------------------------------+------------+----------------|
| Cisco MDS 9000 Software | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Unified Computing System | CSCtg18363 | 1.3(1c) |
| | | 1.4(1i) |
+-----------------------------------------------------------------+

The following are not affecfed by the "less" sub-command - command injection
vulnerability.

* Cisco Nexus 3000 Series Switches
* Cisco Nexus 4000 Series Switches

-------------------------------------------------------------------------
NX-OS - "section" sub-command - Command injection / sanitization issues.
-------------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+--------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+-------------|
| Cisco Nexus 7000 Series Switches | CSCtr44645 | 5.2(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 5000 Series Switches | CSCtr44645 | 5.1(3)N1(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 3000 Se

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)N1(1)
Known Fixed Releases:
4.2(8.133)S0, 5.0(7.5)S0, 5.1(10.73)S0, 5.1(6)S2, 5.2(1)S72, 5.2(1)S73, 5.2(1.61)S0, 7.0(1)ZD(0.3)
Bug Id:
CSCtb02431
Title:
tacacs crash on receiving malformed packets from tacacs server
Description:

Symptom:

Switch crashes when receiving malformed TACACS packets.

Conditions:

This has been observed on versions PRIOR to 4.2(1).

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(1)
Known Fixed Releases:
4.2(1), 4.2(1.44), 4.2(2)
Bug Id:
CSCuq98748
Title:
Nexus 7000 evaluation for CVE-2014-6271 and CVE-2014-7169
Description:



Symptom:

The Nexus 7000 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-6277
CVE-2014-7169
CVE-2014-6278
CVE-2014-7186
CVE-2014-7187

This bug has been opened to address the potential impact on this product.

All current versions of NX-OS on this platform are affected unless otherwise stated
.
Exposure is not configuration dependent.
Authentication is required to exploit this vulnerability.

This bug is fixed in NX-OS versions specified below:

5.2(9a)
6.1(5a)
6.2(8b)
6.2(10) and above




Conditions:

A user must first successfully log in and authenticate via SSH to trigger this vulnerability.



Workaround:

Not available.



Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(8), 5.2(9), 5.2(9a)S3, 6.1(5), 6.2(12)FF(0.4), 6.2(6), 6.2(8a), 7.0(2), 7.1(0)ZN(91.98), 7.1(0)ZN(91.99)
Known Fixed Releases:
5.2(4)FD(0.46), 5.2(4)FD(0.47), 5.2(9a), 5.2(9a)S1, 5.2(9a)S2, 5.2(9a)S3, 5.2(9a)S4, 5.2(9a)S6, 6.1(4)E2, 6.1(5a)
Bug Id:
CSCuu40239
Title:
ARP traffic sent out on incorrect VLAN
Description:

Symptom:
ARP traffic sent out on incorrect VLAN

Conditions:
++ Mixed chassis with F1 & M1 cards

Workaround:
1. Shut and no shut the SVI that is having problems, or
2. Disable glean fast-path via the config command ? no ip arp fast-path, or
3. Disable and reenable glean fast-path
4. Reload the switch.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCun73067
Title:
WCCP redirect policy config fails/ Vlan addition fails
Description:

Symptom:
Attempted deletion of WCCP policy fails. Further additions of policy may hit the error "Invalid operation".
Another possible symptom for this bug is the inability to create new vlans.

Conditions:
An aborted WCCP configuration must have occurred in the past.
or
ISSU to 6.2(2) and EPLD upgrade.

Workaround:
Reloading the switch will resolve this.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(7.19)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(8), 6.2(8)S8, 6.2(8.5)
Bug Id:
CSCup52842
Title:
bgp flapping with fd read error
Description:

Symptom:
014 Jun 20 18:32:24.386535 bgp: 64896 [9115] (default) EVT: 172.23.96.107 peer connection retry timer expired
2014 Jun 20 18:32:24.386607 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Triggered active open for peer
2014 Jun 20 18:32:24.387329 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Active (Active setup)
2014 Jun 20 18:32:24.388533 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Schedule wait for connect
2014 Jun 20 18:32:24.388563 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.850982 bgp: 64896 [9115] (default) EVT: 172.23.96.107 connect to peer is successful
2014 Jun 20 18:32:24.851013 bgp: 64896 [9115] (default) EVT: 172.23.96.107 sending OPEN message to peer
2014 Jun 20 18:32:24.851060 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Active to OpenSent (Active setup)
2014 Jun 20 18:32:24.851101 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.851498 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Process OPEN message from peer
2014 Jun 20 18:32:24.851573 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenSent to OpenConfirm (Active setup)
2014 Jun 20 18:32:24.851617 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.852853 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenConfirm to Established (Active setup)
2014 Jun 20 18:32:24.852898 bgp: 64896 [9115] (default) EVT: 172.23.96.107 cleaning up active peer setup, thread id 0x0
2014 Jun 20 18:32:24.852991 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Established
2014 Jun 20 18:32:24.853018 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Scheduling peer 172.23.96.107 for soft refresh out
2014 Jun 20 18:32:25.867395 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 [peer index 245]
2014 Jun 20 18:32:25.879017 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Adding peer 172.23.96.107 for update gen
2014 Jun 20 18:32:25.879032 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Insert marker dest 0xe1525d64 into xmitlist for 172.23.96.107 with 0 routes on new list and 10475 routes on Tx list
2014 Jun 20 18:32:26.652 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Mark AF update completion for peer 172.23.96.107 (sent prefixes: 4670)
2014 Jun 20 18:32:27.054140 bgp: 64896 [9115] (default) EVT: Read error from peer 172.23.96.107: Broken pipe
2014 Jun 20 18:32:27.054221 bgp: 64896 [9115] (default) EVT: Reset by us (fd read error) in session to 172.23.96.107, value 187, state was Established
2014 Jun 20 18:32:27.054242 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Stopping keepalive, hold timers, peer state Established
2014 Jun 20 18:32:27.054261 bgp: 64896 [9115] (default) EVT: peer:172.23.96.107, state: Established, peer GR STATE: none, AF GR state: none, saved flags: 0
2014 Jun 20 18:32:27.054275 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 Close AF session, gr state none saved flags 0
2014 Jun 20 18:32:27.054290 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requesting cleanup thread to delete/stale routes for peer 172.23.96.107, with index 245
2014 Jun 20 18:32:27.054303 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requ

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(8)S33, 6.2(9), 7.1(0)D1(0.169)
Known Fixed Releases:
6.1(2)I3(2.42), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10), 6.2(10)S18, 6.2(8)E9, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.248)
Bug Id:
CSCug47098
Title:
N7k Internal Loop on M1 Module
Description:

SYMPTOM:

Nexus 7000 with M1 modules only or in mixed chassis may experience
internal loop conditions across VDCs that saturate all interswitch links
and affects all services on the switch causing a network outage.

Symptom:

Conditions:
Nexus 7000 series switch with M1 series linecards.

Workaround:
Prune VLAN 1 from all trunks. This will prevent the internal loop
conditions.

FURTHER INFORMATION:

This issue is caused when the switch receives a non-standard Ethernet
frame. In this case, the non-standard Ethernet frame is replicated over
interswitch links, which then causes the looping condition.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:W/RC:C

CVE ID CVE-2013-1226 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:

http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226

Information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Further Problem Description:
The workaround mentioned was for customer where issue was first reported. There is no guaranteed workaround.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(1), 6.1(3)
Known Fixed Releases:
5.2(9.145)S0, 5.2(9.197)S0, 6.1(4.97)S0, 6.1(4a), 6.1(4a)S1, 6.1(4a)S3, 6.1(5.32)S0, 6.2(1.100)S0, 6.2(2), 7.0(0)ZD(0.53)
Bug Id:
CSCud69928
Title:
N7K: Received Duplicate DBD packets cause 7K to increase sequence number
Description:

Symptom:
N7K may incorrectly increment its DBD sequence number by 2 instead of 1 when it receives
duplicate DBD packets. This will cause the neighboring device to detect a bad sequence number
and reset the neighbor relationship to extart state.

Conditions:
N7K is Master in the Neighbor relationship. N7K sends a DBD with relative sequence number of 1:

Neighbor <--------seq 1------- N7K

Neighbor echos DBD with sequence number of 1 as per RFC but it sends one or more duplicates:

Neighbor ----------seq 1-------> N7K
Neighbor ----------seq 1-------> N7K

N7K should discard the duplicate packets but in some instances it may incorrectly increment the
relative sequence number buy 2 instead of 1:

Neighbor <-------seq 3--------- N7K

This will cause the neighbor to detect a bad sequence number and send a DBD with the I bit set
which will move the state machine from exchange to exstart:

Neighbor ----------seq 2(I bit set)----- N7K

Workaround:
Eliminate the duplicate DBD packets.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.9/2.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.1(5)
Known Fixed Releases:
5.2(9), 5.2(9)S26, 5.2(9.50)S0, 6.0(2)A1(1), 6.0(2)N2(1), 6.0(2)U1(1), 6.1(3), 6.1(3)S30, 6.1(3.44)S0, 6.2(1.93)
Bug Id:
CSCts72967
Title:
Port-Security on M1 card mis-programs F1 card
Description:

Symptoms:
On a Nexus 7000 series switch running 5.1(4) if port-security is configured on an
M1 series module then this will cause a hardware misprogramming on any F1 series
modules on the same port number. Example would be configuring port-security on
Eth12/1 would affect Eth1/1.
Conditions:
When this misprogramming occurs the port will cease to pass any traffic in the
input direction causing a total loss of connectivity to any device connected to
that port.
Workaround:
To recover this perform a shut/no shut on any port on the M1 module which
corresponds to the port number on the F1 module. For example if Eth1/1 is having
the problem, shut/no shut on any port 1 on an M1 module would fix the issue.
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.1(4)
Known Fixed Releases:
5.1(10.53)S0, 5.1(10.55)S0, 6.1(1)
Bug Id:
CSCtz65462
Title:
broadcast get dropped on F2, learning source broadcast frame
Description:

Symptoms:
ARP requests and other Layer 2 traffic with a broadcast destination address is NOT flooded to all ports on the same VLAN.
In addition to that, the following message may be seen on the device logs:

%MTM-SLOT3-2-MULTICAST_SOURCE_MAC_LEARNT: Inserted dynamically learnt multicast source mac ff:ff:ff:ff:ff:ff!

Conditions:
Upon receiving a Layer 2 frame with a broadcast source address (FFFF.FFFF.FFFF), the F2 line card will learn and add this address to its hardware
table. Having this entry on the hardware table, Layer 2 traffic with a broadcast destination address (such as ARP requests) will be dropped on the
Nexus 7000 device because the ingress controller fails to flood it to the broadcast domain.

Workaround:
Clear the entry from the dynamic MAC address table by executing the following command from a privileged EXEC prompt:

clear mac address dynamic vlan x address ffff.ffff.ffff

Replace ''x'' with the appropriate VLAN number.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-3048 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
6.1(0.307)S0, 6.1(1)S23, 6.1(1.22)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCtf19827
Title:
VSH parsing of backquotes allows linux cli access
Description:



Symptom:

An authenticated, local attacker could leverage an input handling flaw to execute arbitrary commands on the underlying operating system with elevated
privileges.



Conditions:

Cisco devices running an affected version of NXOS software.

This issue affects:
Nexus 7000
Nexus 5000




Workaround:

Restrict local console access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of the Cisco UCS and relate devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.
The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-4075 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4075

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCtl77076
Title:
Applying large egress acl triggers control-plane instability
Description:

Symptom:
Ospf and Lacp flaps when Applying Large Acl's on Egress direction.

Conditions:
Apply Large Acl's in the egress direction.

Workaround:
None

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(5), 5.0(5)E1, 5.1(3), 5.1(3.17)
Known Fixed Releases:
5.0(5)E1, 5.1(10.1)S0, 5.1(3)S11, 7.1(0)ZD(0.16), 7.1(0)ZD(0.23), 7.2(0)ZN(0.111)
Bug Id:
CSCtz01813
Title:
N7K-F248XP-25 fex port may hang when in vntag mode
Description:

Symptom:

Any port that connects any Fabric Extender (FEX) device terminated on a N7K-F248XP-25 module of
a Nexus 7000 chassis may go err-disable and possibly take the FEX offline.

Conditions:

Only seen on N7K-F248XP-25 ports in fex mode

Workaround:

Reload the module to recover from the condition.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
6.0(3)S2, 6.0(3)S5, 6.1(0.252)S0
Bug Id:
CSCtj73415
Title:
RIP crash at rip_ipv4_pkt_debug_message during UDP port reconnaisance
Description:



Symptom:

Cisco NXOS based devices contain a denial of service vulnerability within the Routing Information Protocol (RIP) service engine. An unauthenticated,
remote attacker with the ability to submit a malformed RIPv4 or RIPv6 message to port UDP/520 could cause the RIP service engine to restart. This
may result in a temporary inability for the device to pass traffic to a destination populated in the route table by RIP.



Conditions:

Cisco devices running an affected version of NXOS software and configured to utilize RIP.

This issue affects:
Nexus 7000




Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 5/3.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4091 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4091

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(0.1)
Known Fixed Releases:
5.0(0)MP1(0.420), 5.1(1.49)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCsv08579
Title:
TCP connections get stuck in FINWAIT1 state indefinitely
Description:


Symptom:


Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control
Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain
in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a
system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot
may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a
TCP three-way handshake with a vulnerable system.

In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash.
This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.


This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
Conditions:
See PSIRT Security Advisory.

Workaround
See PSIRT Security Advisory.

Further Problem Description:
See PSIRT Security Advisory.

PSIRT Evaluation:
Cisco has released free software updates that address this vulnerability.
Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.0(3)
Known Fixed Releases:
4.0(4), 4.1(1.51), 4.1(1.53), 4.1(3), 4.2(0.140), 4.2(1), 7.2(0)ZN(0.111)
Bug Id:
CSCtj90512
Title:
ospfv2/v3 memory leak when receiving specific malformed packets
Description:

Symptoms:
OSPFv2/v3 process leaks memory when receiving specially-crafted packet

Conditions:
This issue may occur when the switch processes a malformed packet.

Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2011-2539 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(6), 5.1(3), 5.2(0.1)
Known Fixed Releases:
4.2(8)S25, 4.2(8.93)S0, 5.0(0)MP1(0.440), 5.1(4)S5
Bug Id:
CSCum68908
Title:
snmpbulkwalk fails with tooBig error
Description:

Symptom:
When snmpbulkwalk using v3 is performed

Conditions:
snmpbulkwalk using v3 having number of repeaters as high as 32/64

Workaround:
If this is seen, reduce the number of repeaters untill the walk succeeds

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(6a)S3, 7.1(0)D1(0.148), 7.9(0)ZD(0.3)
Known Fixed Releases:
6.1(2)I3(1.19), 6.1(2)I3(2), 6.2(10), 6.2(10)S13, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.215), 7.1(0)FC(0.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.18)
Bug Id:
CSCtj42748
Title:
SNMP crashes when receiving malformed snmp set serial number packet
Description:


Symptom:
The SNMP service may crash.


Conditions:
This issue happens when the switch processes
a malformed SNMP request


Workaround
None.

Further Problem Description:

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C

No CVE ID has been assigned to this issue.









Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(0.1)
Known Fixed Releases:
4.2(7.96)S0, 5.1(1.49)S0, 5.2(0.121)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCut49295
Title:
7.2.0.D1.0.444.S3::UIN-1::Seeing BFD/EIGRP flap after doing 2nd SSO
Description:

Symptom:
EIGRP session flap after SSO

Conditions:
Seen after multiple consecutive SSOs

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
Bug Id:
CSCtx54818
Title:
Specific SNMP GET request causes 'ipqosmgr' to crash on Nexus 7K
Description:

Symptoms:
Cisco Nexus 7000 devices contain a denial of service vulnerability within the SNMP subsystem. This vulnerability could allow an authenticated,
remote attacker to crash the device by submitting a malformed SNMP request to a specific MIB.

Conditions:
Cisco Nexus 7000 devices running an affected version of Cisco NX-OS Software.

Workaround:
None.

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/6.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-4126 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.9)S0
Bug Id:
CSCtn13055
Title:
BGP does not filter updates with incorrect AS-PATH values
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path values. This could allow an upstream BGP neighbor to pass
an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in a rest of and
resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4098 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases:
5.2(0.218)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCuh09675
Title:
6.1.4 or 6.2.1 || BGP Service Crash cause Multiple processes to crash
Description:

Symptom:
BGP service crashes with following log messages:

2013 Jun 12 09:26:10.467 TAA-RZ-2 %SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 148.45 secs ago.
2013 Jun 12 09:28:42.938 TAA-RZ-2 %SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 150.07 secs ago.

++ This is followed by several other process to crash.
++ The VDC becomes unresponsive with the following log messages:

++ Due to multiple crash of the service, the supervisor switchover takes place.
++ In a single supervisor, the device may reload.

Reason: Reset triggered due to HA policy of Reset
Service: Service "bgp" in vdc 2 hap reset
Version: 6.1(4)

Conditions:
++ Customer device is running 6.1(4) or 6.2(1).
++ Customer tries to execute the command which tears down the BGP session.

Workaround:
None

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(1.111)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.31)S0, 6.2(1.135)S0, 6.2(2)
Bug Id:
CSCsy31458
Title:
can use 'perl' from CLI to bypass security mechanisms
Description:


Symptoms:
The Perl interpreter can be used as an escape to the underlying operating system bash shell.

Conditions:
Cisco NX-OS prior to 4.1(4)

Workaround:
None.

Further Problem Description:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2011-0361 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
4.0(4)SV1(2), 4.1(3)
Known Fixed Releases:
4.1(4)
Bug Id:
CSCti69214
Title:
Security Issue in OpenSSL
Description:

Symptom:
The device may be affected by an OpenSSL vulnerability described in CVE-2010-2939.


Conditions:
Device configured with any feature that uses SSL.

Workaround:
Not available

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C


CVE ID CVE-2010-2939 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
5.0(2)N2(1), 5.1(1.10)S0
Bug Id:
CSCtf40008
Title:
LESS allows bash access
Description:

Symptom:
Cisco Nexus OS contains a vulnerability that could allow an authenticated,
local attacker to execute arbitrary commands on a targeted device. The
vulnerability is due to improper sanitization of user-supplied values to
command line interface commands.

An authenticated, local attacker could exploit the vulnerability by issuing
commands that contain malicious options on the device command line interface.
If successful, the attacker could gain elevated privileges on the targeted device.

Conditions:

Injection can be done via either the less or the section sub command. Full
details below:

----------------------------------------------------------------------
NX-OS - "less" sub-command - Command injection / sanitization issues.
----------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+-----------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+----------------|
| Cisco Nexus 7000 Series Switches | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 5000 Series Switches | CSCtf40008 | 4.2(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 2000 Series Switches | CSCtf40008 | 4.1(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 1000V Series Switches | CSCtf40008 | 4.2(1)SV1(5.1) |
|-----------------------------------+------------+----------------|
| Cisco MDS 9000 Software | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Unified Computing System | CSCtg18363 | 1.3(1c) |
| | | 1.4(1i) |
+-----------------------------------------------------------------+

The following are not affecfed by the "less" sub-command - command injection
vulnerability.

* Cisco Nexus 3000 Series Switches
* Cisco Nexus 4000 Series Switches

-------------------------------------------------------------------------
NX-OS - "section" sub-command - Command injection / sanitization issues.
-------------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+--------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+-------------|
| Cisco Nexus 7000 Series Switches | CSCtr44645 | 5.2(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 5000 Series Switches | CSCtr44645 | 5.1(3)N1(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 3000 Se

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4), 4.2(6), 5.1(1a), 5.1(2)
Known Fixed Releases:
4.2(1)N2(1), 4.2(5.10), 5.1(0.76), 5.1(1), 7.0(1)ZD(0.3)
Bug Id:
CSCtx54797
Title:
Specific SNMP GET request causes 'vlan_mgr' to crash on Nexus switches
Description:

Symptoms:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices contain a denial of service vulnerability within the SNMP subsystem. An
authenticated, remote attacker could submit a request to an affected device designed to trigger a null pointer dereference error that results in a crash
and reload of the affected device.

Conditions:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices running an affected version of Cisco NX-OS Software.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/6.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-4125 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.47)S0
Bug Id:
CSCtn13065
Title:
BGP does not filter BGP update with incorrect AS-PATH Segment Length
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path Segment Lengths. This could allow an upstream BGP
neighbor to pass an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in
a rest of and resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4099 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases:
5.2(0.218)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCuo73774
Title:
F3: ACL logic may break for all ACLs while programming an IPv6 ACL
Description:

Symptom:
During testing, it was found that the atomicity of TCAM operations was not guaranteed, during programming ACL
entries for IPv6 on F3-type linecards. Consequently during a very small window of time where the results are
not fully in line with the configuration, and could lead to unexpected results.

Conditions:
While configuring IPv6 access lists, on an F3-type linecard

Workaround:
None

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10)FM(0.27), 6.2(6), 6.2(6a), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.30), 6.2(6b), 6.2(6b)S1, 6.2(8)E1, 6.2(8)E5, 6.2(8a), 6.2(8a)S1
Bug Id:
CSCur38749
Title:
Connection to a non-existent host is consumed/precessed by xTR itself
Description:

Symptom:
A vulnerability in Cisco Locator/ID Separation Protocol (LISP) feature of Cisco NX-OS could allow an authenticated, remote attacker to use SSH connection to a non-existent host covered by lisp mobile prefix
from outside of the DC and get presented with the xTR login prompt.
An attacker still needs to have login credentials for NX-OS device in order to be able to log in.

Conditions:
LISP mobility and lisp enabled interface need to be configured.

Workaround:
VTY ACL preventing login prompt to be displayed to the user connecting from the outside can
prevent unauthorized logins

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/2.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.112), 7.1(0)PDB(0.317), 7.2(0)D1(0.368)
Bug Id:
CSCub81080
Title:
MTM cores found during l2fm
Description:

Symptoms:
Line card may crash when processing a number of packets with broadcast source MAC address.
Conditions:
receiving multiple packets with source MAC address set to broadcast on a F2 Line Card.
Workaround:
None
Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
3.3/2.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(7), 6.1(1.62)S0, 6.1(2)
Known Fixed Releases:
5.2(7.23)S0, 5.2(9), 6.1(2.27), 6.1(2.6)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCsy98980
Title:
Nexus N7k does not support required password complexity
Description:

Symptom:

Nexus 7000 does not allow the '$' dollar sign character to be used in a password per the documentation:

http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli/sec_rbac.html#wp1258879

Conditions:
Affects all versions.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.1(4)
Known Fixed Releases:
4.2(1.17), 4.2(2)
Bug Id:
CSCtw98915
Title:
Cisco NX-OS Message Transfer Service DoS Vulnerability
Description:

Symptom:
Advisory ID: cisco-sa-20140521-nxos

Revision 1.0

For Public Release 2014 May 21 16:00 UTC (GMT)

Summary
=======

Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Cisco NX-OS Virtual Device Context SSH Privilege Escalation Vulnerability
* Cisco NX-OS Virtual Device Context SSH Key Privilege Escalation Vulnerability
* Cisco NX-OS-Based Products Smart Call Home Buffer Overflow Vulnerability
* Cisco NX-OS Message Transfer Service Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Conditions:
A device running an affected version of software.

Workaround:
None

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2014-2201 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(1), 6.0(2)
Known Fixed Releases:
6.0(2)S30, 6.0(2)S31, 6.1(0.174)S0, 7.0(1)ZD(0.3), 7.2(0)ZN(0.111)
Bug Id:
CSCti03724
Title:
GDB in NX-OS images
Description:

Symptoms:
Cisco NX-OS Software images contain the GDB debugger.

Conditions:
Cisco NX-OS Release 4.2(3) and prior

Workaround:
None

Further Problem Description:
GDB will be removed from NX-OS images that integrate the resolution to this bug.
GDB is the GNU Program Debugger, the show version command will indicate that GDB is included in
the image.

switch# show version

Cisco Nexus Operating System (NX-OS) Software

TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2008, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license. Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or the GNU
Lesser General Public License (LGPL) Version 2.1. A copy of each
such license is available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://www.opensource.org/licenses/lgpl-2.1.php

Software

BIOS: version 3.17.0
loader: version N/A
kickstart: version 4.0(1a) [gdb]
system: version 4.0(1a) [gdb]


PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.0(4)SV1(2), 4.2(3)
Known Fixed Releases:
4.2(7.124)S0, 4.2(7.56)S0, 5.1(10.1)S0, 5.2(0.262)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCsw63039
Title:
User with vdc-admin role can escalate privileges
Description:

Symptom:

An already logged on user can escalate privileges


Conditions:

Cisco NX OS 4.1(2) and prior


Workaround:

None

Further Problem Description:

Fixed in NX OS starting with 4.1(3) and 4.2(1)

Additional Information:
This vulnerability was reported to Cisco by George Hedfors.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVE ID has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.1(1.64)
Known Fixed Releases:
4.1(3), 4.2(0.120), 4.2(1)
Bug Id:
CSCuc48695
Title:
Mac address not learnt on a port security port
Description:

Symptom:
MAC addresses are not learned from a port security enable port.

If a MAC address is learned as dynamically from a non port security port first, then N7K does
not learn the MAC address properly if it receives a frame from a port security port. This
applies to the condition where the N7K put the MAC address as static or drop.

Conditions:
This bug only applies to M1 and M2 modules only. This bug applies to NX OS up to 6.2(6).

<B>

Workaround:
</B>
You can configure the unsecure port as Port-sec/secure port to avoid this issue.

<B>

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:W/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.1(2)S8, 6.1(3)S30, 6.2(0.269)S8, 6.2(1.52)S1
Known Fixed Releases:
6.2(1)AG(0.3), 6.2(1.53)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.14), 7.1(0)D1(0.15), 7.1(0)D1(0.343), 7.1(0)OTT(0.47), 7.1(0)PDB(0.264)
Bug Id:
CSCtn13043
Title:
BGP does not filter updates with invalid AS Path Segment type
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path Segment Types. This could allow an upstream BGP
neighbor to pass an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in
a rest of and resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4097 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases:
5.2(0.218)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCtr63091
Title:
OSPF Process hogging CPU after receiving certain crafted packets
Description:

Symptoms:
Certain crafted OSPF packets may cause high CPU and OSPF processing to be degraded.

Conditions:
Cisco Nexus 7K configured for OSPF routing.
The attacker must be layer 2 adjacent to the device.

Workaround:
Not available.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/3.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(1)S67
Known Fixed Releases:
5.2(3.28)S0, 6.0(0.21)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCum42151
Title:
Enable secret hashes improperly calculated
Description:

Symptoms:
The salt of 'enable secrets' is not randomized properly.
Conditions:
'feature privilege' is configured.
Workaround:
None
Further Problem Description:
None
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
6.0(2)A4(0.764), 6.0(2)A4(1), 6.0(2)U4(0.764), 6.0(2)U4(1), 6.2(10), 6.2(8)KR(0.8), 6.2(8.13)S0, 6.2(9)FM(0.67)
Bug Id:
CSCur70861
Title:
F3 - Ports should not be err-disabled for TCAM single bit ECC errors
Description:

Symptom:
If F3 module experiences repeated single bit ECC errors it will error-disable the associated ports with that forwarding instance.

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 197
Device Name : Flanker L3 Driver
Device Errorcode : 0xcc503600
Device ID : 197 (0xc5)
Device Instance : 03 (0x03)
Dev Type (HW/SW) : 06 (0x06)
ErrNum (devInfo) : 00 (0x00)
System Errorcode : 0x429b0026 failure recovery threshold
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/25-32
Error Description : FLN_FW_INT_STATUS_TCAM_MATCH0_ECC_0
DSAP : 0 (0x0)
UUID : 0 (0x0)
Time : Tue Nov 11 16:37:55 2014
(Ticks: 546281B3 jiffies)

Conditions:
When repeated single-bit ECC errors are detected.

Workaround:
No known workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.16), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)OTT(0.5)
Bug Id:
CSCuo73479
Title:
F348XP:1Gig interface remain up with copper SFP and cable pulled out
Description:

Symptom:
Interface is remaining in "up/up" state when there is an SFP inserted into an F348XP line card running 6.2(8), even when the opposite end is admin down or the cable is removed from the SFP.
This was duplicated using an Avago??, GLC-T, and GE-T SFP.
Support for gig transceiver was introduced in 6.2.8

Conditions:
Issue seen for 1gig SFP on N77-F348XP-23 module.
Seen on 6.2.8
Issue seen when speed on interface is hardcoded to 1gig.

Workaround:
Admin down local interface.

configure speed auto on the interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.13), 6.2(8)E5, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75)
Bug Id:
CSCup96876
Title:
N7K FIB Entry Miss-programmed into wrong SPL Bank
Description:

Symptom:
Traffic to a subset of hosts is punted to the CPU and either forwarded in software or dropped.

Conditions:
ISSU from 6.2(8) to 6.2(8a)
ISSU from older releases to 6.2(8) or 6.2(8a)
Problem specific to M1-XL or M2 (Does not apply to F2/F3)

Workaround:
Reload the affected linecard

Further Problem Description:
This occurs when the FIB entry is programmed in the wrong SPL bank. As a result, the longest prefix match is not hit and traffic is punted for an ARP glean.

For example, a host exists in a /24 subnet. Checking 'show ip route' to the host will show a /32 installed in the RIB. However, checking the longest prefix match in hardware will show the /24 route.

N7K-1# show system internal forwarding ipv4 route 172.22.31.173 module 7

Routes for table default/base
----+---------------------+----------+----------+------+-----------
Dev | Prefix | PfxIndex | AdjIndex | LIFB | LIF
----+---------------------+----------+----------+------+-----------
1 172.22.31.0/24 0x423e 0xa2cb 0 0x1ff8b <------hardware only finds the /24 entry

Note, the /32 entry is present in hardware but since it is programmed in the wrong bank it will always hit the /24 entry.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S55, 6.2(10)S56, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.258), 7.1(0)OTT(0.34), 7.1(0)PDB(0.196)
Bug Id:
CSCtg79818
Title:
aclmgr does not allow hw prgrmming of acls on l3 port-channel sub-ifs
Description:

<B>Symptom:</B>

Under a very strict set of circumstances, acls may not be programmed in hardware on
layer 3 sub-interfaces.

<B>Conditions:</B>

A very strict set of circumstances must be present before this issue is seen:
1. Must have a parent layer 3 interface or port-channel without any acls applied
2. Must have a number of layer 3 sub-interfaces where there is at least one sub-interface with
an acl configured.
3. A switchover must have occurred prior to any configuration change.
4. Now if you try to configure an acl on a previos sub-interface that did not have any
acls configured or any new sub-interfaces created where an acl is configured will fail
to program in hardware. This can be seen with the command:

show access-list <name or number> summary

<B>Workaround:</B>

The workaround is to shut/no shut the main interface or port-channel. An alternate workaround
for port-channel is to remove/re-add a member port from the channel, then remove/reapply the
acls on all the affected sub-interfaces.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
4.2(6)S12, 4.2(6.52)S0, 5.0(3)S46, 7.0(1)ZD(0.3)
Bug Id:
CSCtf81850
Title:
OpenSSL Record of Death Issue
Description:

Symptom:
The device may be affected by an OpenSSL vulnerability.

This vulnerability is tracked as CVE-2010-0740

In TLS connections, certain incorrectly formatted records can cause an OpenSSL
client or server to crash due to a read attempt at NULL.

Conditions:
Device configured with any feature that uses SSL.

Workaround:
Not available

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCud44300
Title:
EntitySensor MIB handler should validate if_idx before query port client
Description:

Symptom:

On a Nexus 7000 switch, if an interface index is queried that is higher than the number of
ports on the specific linecard, there is a chance that mts memory may be held indefinitely by
snmpd and eventually will exhaust mts resources. In a dual supervisor environment , snmpd will
core and a HAP reset will be observed. In a single sup, a core should be saved and the system
will crash/reboot.

Conditions:

This problem would typically happen if a higher-density linecard is replaced in the same slot
with a lower-densitiy card, and the management station continues to try and poll the
non-existant higher ports.

Workaround:

Workaround is to rediscover the devices to eliminate the out of bounds polling of the
non-existant interfaces or if the device is statically-configured with the mib, disable polling
for that non-existant object.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-6396 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(7), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S26, 5.2(9.50)S0, 6.0(2)A1(1c), 6.0(2)U1(3), 6.0(2)U2(1), 6.1(3), 6.1(3)S19, 6.1(3.29)S0, 6.2(1.93)
Bug Id:
CSCte90369
Title:
File System Access
Description:

Symptoms:
A vulnerability exists in NX-OS which allows an authenticated, local attacker to read or write arbitrary files in volatile storage. A successful exploit could
allow the attacker to gain unauthorized access to sensitive files on the device, or to overwrite arbitrary files in volatile storage.

Conditions:
Devices running affected versions of NX-OS are vulnerable.

Workaround:
None

Further Problem Description:
This issue was discovered in internal security testing and has been resolved in all current versions of affected software.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.2/4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:P/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2011-4490 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(1)
Known Fixed Releases:
4.2(3)
Bug Id:
CSCut12851
Title:
CPU HOG with STEC M2+ CF 9.0.2
Description:

Symptom:
CPU HOG could occur with certain "STEC M2+ CF 9.0.2" model log flash in a N7K SUP1 systems.

Conditions:
presence of "STEC M2+ CF 9.0.2" log flash in SUP1 N7K system.

Workaround:
replace log flash

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.1(4a)E2, 6.2(10)
Known Fixed Releases:
Bug Id:
CSCtu10595
Title:
CDP with long address crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(3.30)S0, 5.2(3.39)S0, 6.1(0.137)S0, 6.1(0.173)S0
Bug Id:
CSCtf25457
Title:
VSH parsing of SED parameters allows linux cli access
Description:



Symptom:

An authenticated, local attacker could leverage an input handling flaw to execute arbitrary commands on the underlying operating system with elevated
privileges.



Conditions:

Cisco devices running an affected version of NXOS software.

This issue affects:
Nexus 7000
Nexus 5000




Workaround:

Restrict local console access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of the Cisco UCS and relate devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.
The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-4077 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4077

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
4.2(5.13), 4.2(5.14), 7.0(1)ZD(0.3)
Bug Id:
CSCtf08873
Title:
CDP with long hostname crashes the CDP process on N7k
Description:

Symptom:
A port is connected to other switch with CDP enabled. Once CDP is exchanged, the CDP process crashes.

Conditions:
It happens when the remote switches or routers with CDP enabled has the extraordinary LONG hostname (> 255B)

Workaround:
Disable CDP under the interface of the remote device where the N7k port is connected.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/2.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2011-0361 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
4.2(3)
Known Fixed Releases:
4.2(5), 5.0(2)
Bug Id:
CSCtu10556
Title:
CDP with long sysobj crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(3.39)S0, 6.1(0.145)S0, 6.1(0.153)S0
Bug Id:
CSCuu29773
Title:
Crash in the pim process after exceeding 32K multicast routes
Description:

Symptom:
Multiple pim process crashes seen resulting in a hap-reset that restarts the system

Conditions:
This issue occurs after exceeding the limit of 32K multicast routes and PIM assert message for a new S,G arrives.

show ip mroute detail vrf all`
IP Multicast Routing Table for VRF "default"

Total number of routes: 44037
Total number of (*,G) routes: 141
Total number of (S,G) routes: 43895
Total number of (*,G-prefix) routes: 1

Also saw many SLAB memory errors which could potentially be the result of a memory leak:

2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-CREATE_ROUTE: pim [15748] Couldn't create PIM route for (141.214.83.211/32, 239.255
.255.253/32) in join notification
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: PIM-3-SLAB_ALLOC: message repeated 1349 times in last 7710408
sec
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:29 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: SYSLOG-4-SL_MSG_WARNING: message repeated 1 times in last 7710
418 sec
2015 May 6 18:11:30 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro

Workaround:
Reduce the total mulitciast routes to less than 32K

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.58), 7.2(0)D1(1), 7.2(0)N1(0.215), 7.2(0)N1(1), 7.2(0)ZD(0.196), 7.2(0)ZN(0.215), 7.2(1)PIB(0.3)
Bug Id:
CSCtz71765
Title:
NF configuration is retained when the config is not supported in HW
Description:

Symptom:
Nexus 7000 switches have several restrictions in terms of hardware support for ACL based features being configured on the same L3 interface. For example Netflow and DHCP relay are not supported on the same interface at the same time.

The N7K may accept netflow configuration on the CLI and save it to the start-up configuration even though this configuration is not supported on the interface in question due to a conflict with some other ACL based feature. Upon reloading the N7K the start-up process discovers this problem and will suspend the VLAN interfaces in question. You may see errors like this:


2013 Sep 25 22:04:13 2JUA_SDS-7K-DATA ETHPORT-3-IF_ERROR_VLANS_SUSPENDED VLANs
2-999 on Interface port-channel610 are being suspended. (Reason: Tcam Allocatio
n Failure)

Conditions:
N7K with Netflow and other ACL based feature configured on the same interface. For example DHCP relay and ingress Netflow. Save config and reload the box. the bug has two parts:

1. It should reject the command
2. It should give you an error every time you configure it

r12.7k-VDC2(config-if)# no ip flow monitor standard-monitor input sampler nf-sampler r12.7k-VDC2(config-if)# ip access-group test1 in r12.7k-VDC2(config-if)# ip flow monitor standard-monitor input sampler nf-sampler Verify failed - Client 0x83000146, Reason: Tcam Allocation Failure, : RACL, Netflow Sampler (SVI), Interface: Vlan145 r12.7k-VDC2(config-if)# 2013 Sep 26 16:51:48 r12.7k-VDC2 %$ VDC-2 %$ %NFM-2-VERIFY_FAIL: Verify failed - Client 0x83000146, Reason: Tcam Allocation Failure, : RACL, Netflow Sampler (SVI), Interface: Vlan145

r12.7k-VDC2(config-if)# show run int vlan 145

!Command: show running-config interface Vlan145
!Time: Thu Sep 26 16:51:59 2013

version 6.1(4)

interface Vlan145
ip access-group test1 in
ip flow monitor standard-monitor input sampler nf-sampler
ip address 10.13.169.2/24
no shutdown

r12.7k-VDC2(config-if)# ip flow monitor standard-monitor input sampler nf-sampler r12.7k-VDC2(config-if)#

Workaround:
Remove the conflicting configuration before you save your config and reload the box.

Or you can try to upgrade to 6.2.2 and issue this command:

hardware access-list resource feature bank-mapping

The above command adds more flexibility in how various ACL based features are mapped to the 4 different TCAM banks. It doesn't make every feature combination work but it greatly reduces the amount of combinations that are not supported.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.2(7), 5.2(9)S50, 6.1(0.277), 6.1(2), 6.1(4.9), 6.2(10)S12, 6.2(10)S38, 6.2(2)S42, 6.2(2)S6, 6.2(5.38)
Known Fixed Releases:
Bug Id:
CSCuq18021
Title:
SNMPset to community strings with special characters cause hap reset
Description:

Symptom:
NX-OS SNMPd process crashes with HAP reset.

Conditions:
Community string has leading ''%'' and ends with a number.
(however some other combination of special characters may cause this problem, we haven't seen them yet but can't exclude)

Workaround:
don't use leading % as a character. Better to avoid using special characters in RW communities or at least not as a leading characters

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.1(0)ZD(0.278)
Known Fixed Releases:
5.2(1)N1(8.156), 5.2(1)N1(9), 6.0(2)N2(5.107), 6.0(2)N2(6), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZN(0.772), 7.0(6)N1(0.264), 7.0(6)N1(1), 7.1(0)D1(0.241)
Bug Id:
CSCuf95718
Title:
High CPU for pktmgr seen consistently on VPLS EFP/BD Scale testbed
Description:

Symptom:
High CPU utilization observed on active supervisor.

Conditions:
When VPLS or EFP Ethernet virtual circuits are configured, pktmgr process on active supervisor will register high cpu utilization as it will be busy dropping STP BPDUs entering the virtual circuit from customer edge-side.

Workaround:
Prevent STP BPDUs originating from customer-edge device from entering the provider-edge device where Ethernet virtual circuits/VPLS is configured.

More Info:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(1.56)S5, 6.2(1.69)S5
Known Fixed Releases:
Bug Id:
CSCuu29219
Title:
SSTE: global parameter exchange not happening for some BD/VNI
Description:

Symptom:
-More--2015 May 10 10:52:31 Leaf-Leaf179 %$ VDC-2 %$ %VNSEGMENT_MGR-2-VNSEG_PENDING_RESPONSE_TIMEOUT: Waiting for Pending response for req MTS_OPC_VLAN_MGR_BD_PORT_ADD (msg id:3754673)

Conditions:
POAP

Workaround:
NA

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
Bug Id:
CSCur14589
Title:
vulnerability related to cmd injection via DHCP offer options
Description:


Symptom:

Command injection via DHCP offer options used with PowerOn Auto Provisioning (POAP)


Conditions:

NX-OS Switch would have to be in a state where POAP is initiated, and if
an attacker can either:
A) Inject their own DHCP server and respond to the POAP DHCP request with
crafted DHCP options.
B) Compromise an existing DHCP server, and craft the specific DHCP
options.

Then during the POAP process, when the crafted DHCP options are processed
arbitrary commands on the system could be executed in the context of root
user.

Note this issue only occurs during the POAP DHCP boot process.

First Fixed Releases:
6.2(10)
7.1(0)N1(1)
7.1(2)N1(1)
7.2(0)N1(1)




Workaround:

None.


More Info:


The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dis
patch=1&version=2&vector=AV:A/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

CVE ID CVE-2015-0658 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.1(0)D1(0.226)
Known Fixed Releases:
6.2(10), 6.2(10)S98, 6.2(10.17)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.291), 7.1(0)D1(0.292), 7.1(0)D1(0.293), 7.1(0)EV(0.116)
Bug Id:
CSCuu26390
Title:
SSTE: multiple ethpm cores noticed on POAP + autoconfig
Description:

Symptom:
ethpm cores

Conditions:
POAP + autconfig

Workaround:
NA

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.2(0)D1(0.490)
Known Fixed Releases:
Bug Id:
CSCuu27341
Title:
Post ISSU to 7.2, shared ports i/f bind fails in FCoE VDC on mod reload
Description:

Symptom:
On N7K/ N7700 all ports of a module will fail to bind to FCoE VDC. show vdc membership status shows "module has become offline" though the module status is ok

Conditions:
ISSU from 6.2 to 7.2 with shared interfaces from F2e or F3 module to FCoE VDC. After ISSU do Module Reload/Poweroff-powerOn. When the module comes up again notice that no port from that module is available in FCoE VDC.

Workaround:
To recover from the problem:
Reload module one more time and the issue gets resolved. Alternatively, a switch reload will resolve the affected module as well as prevent any other modules that may be susceptible.

To prevent the problem choose any of the following:
(1) Cold boot upgrade to 7.2 (instead of ISSU)
(2) Unconfigure the port sharing in 6.2 prior to ISSU and reconfigure it in 7.2
(3) Perform a switch reload after ISSU (and prior to any of the line cards being individually powered off/on)

Further Problem Description:
Issue is observed only on the first module reload/ poweroff-poweron. Issue gets resolved on a consecutive reload and does not reoccur

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCum52399
Title:
Fixing EIGRP to take Interface MTU as default Max-Packet Size
Description:

Symptom:
Symptom:
In 6.2.2, the default EIGRP mtu is 16384 regardless of the interface MTU. If system receives large update packets then they will get fragmented. The CoPP on the nexus can drop these fragments as they get classified under default-class of CoPP. These fragments are not considered as EIGRP packets being fragmented packets.

Conditions:
EIGRP MTU is 16384.

Workaround:
Modify COPP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)A4(0.814), 6.0(2)A4(1), 6.0(2)U4(0.814), 6.0(2)U4(1), 6.2(10), 6.2(10)EC(0.12), 6.2(10)FM(0.10), 6.2(10)NO(0.6), 6.2(8)KR(0.8), 6.2(8)TS(0.28)
Bug Id:
CSCut93487
Title:
OTV: AED stays inactive for all VLANs
Description:

Symptom:
One AED stays inactive for all VLANs

Conditions:
Using OTV with 2 AEDs

Workaround:
Remove the vlans that won't come up and add them back to the OTV vdc.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCup02927
Title:
ELTM crash upon LC reload
Description:

Symptom:
Nexus 7000 may have crash in "eltm" process

Conditions:
Pre-condition (must-have):- There should be more than total of 8 port-channels in whole system containing regular or pvlan mapping.

Condition#1 Linecard reload
Condition#2 Configuration should have vlan translations, on port-channels, for e.g.:-

>switchport private-vlan mapping trunk 93 94

Condition#3 There is an internal memory allocation done when LC is brought up and depending on that allocation we may or may NOT hit this issue even if condition#1 and 2 matches.

Condition#4 issue may be seen in scale setup.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.21), 6.2(6b), 6.2(6b)S1, 6.2(8)E5, 6.2(8)TS(0.28), 6.2(8.12)S4, 6.2(8a), 6.2(8a)S2, 6.2(9.1)S0
Bug Id:
CSCut58899
Title:
ISIS cored when add 200 vrfs
Description:

Symptom:
isis crashes on a scale setup.

Conditions:
On a scale setup with 1000 sub-interfaces spreading across 201 vrfs

Workaround:
no workaround, isis restarts itself after crash.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
Bug Id:
CSCuj82684
Title:
"fips mode" enable before the All LC s are online leads to LC failure
Description:

Symptom:
"fips mode" enable before the All LC s are online leads to LC failure

Conditions:
"fips mode" enable before the All LC s are online leads to LC failure

Workaround:
enable fips mode only after all the LC s are up .

Further Problem Description:
for more details refer to test plan ,

NEXUS_FIPS_140-2_Detailed_Test_Plan
http://wwwin-eng.cisco.com/Workgroup/Eng/DC_OS/QA/NEXUS_FIPS_140-2_Detailed_Test_Plan.doc
Status: AP EDCS Rev: 5 Date: 27-AUG-2010 Size: 2 M
Doc No: EDCS-664107 Format: WORD PDF

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
Bug Id:
CSCut85350
Title:
SSTE: m2rib CPU hog after auto config
Description:

Symptom:
m2rib CPU hog

Conditions:
auto config

Workaround:
NA

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
Bug Id:
CSCug39011
Title:
N7K: F2 may reset in case of receiving excessive error frames
Description:

Symptom:
A faulty F2 module may cause resetting other multiple F2 modules
within the chassis.

Conditions:
very rare condition. the faulty F2 module may send out excessive error
frames to other F2 modules.

Workaround:
Module reload to recover. Isolate the faulty module and remove from the chassis.=

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.2(10)E7, 6.2(10)E8, 6.2(14)FB(0.34), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.482), 7.2(0)VZD(0.26), 7.2(0)ZD(0.162)
Bug Id:
CSCut29918
Title:
UIN-1::Seeing IPV6 eigrp auth failure during system switchover
Description:

Symptom:
IPV6 eigrp auth failure during system switchover

Conditions:
Authentication is enabled for IPv4 EIGRP on the same interface

Workaround:
Unconfigure/Reconfigure ipv6 eigrp on the interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.437)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.444), 7.2(0)D1(0.456), 7.2(0)D1(0.457), 7.2(0)N1(0.152), 7.2(0)N1(1)
Bug Id:
CSCuq93334
Title:
[Performance impact] M2 reload stuck in power cycle for 17-18 minutes
Description:

Symptom:
Module power cycle takes 17-18 mins to complete.

Conditions:
we observed this issue with the reload module scenario with more than about 100+ BFD session in the system.
as module goes off, PPF session can't reach the destination which cause ppf server do a retry internally and it takes approximately 10 sec for each session. we got over 100 session (1000 sec =16 mins) that's the reason why power-cycle took 17~18 mins

Workaround:
before reloading the module, I recommend doing a no feature bfd, and then do a module reload, finally add bfd feature back to the system.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10)E1, 7.2(0)ZD(0.106)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.476), 7.2(0)PDB(0.408), 7.2(0)VZD(0.26), 7.2(0)ZD(0.156)
Bug Id:
CSCud91672
Title:
Nexus7000: DEV_LOCAL_SAC_ASIC (device error 0xc910026d) [Sup2+M2]
Description:

Symptom:
Nexus7000 module reports:
%MODULE-4-MOD_WARNING: Module (Serial number: ) reported warning on ports
due to SAC sync lost in device DEV_LOCAL_SAC_ASIC (device error 0xc910026d)

Conditions:
Issue is seen only with M2 modules in Nexus7000 with SUP1 or SUP2 engines running 6.x releases

Workaround:
None

Issue is fixed in 6.1(4) and 6.2(2) or later releases.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.1(3)S32
Known Fixed Releases:
5.2(9.95)S0, 6.1(4), 6.1(4)S3, 6.1(4.25)S0, 6.2(1.41)S0, 6.2(1.93), 6.2(2), 7.0(0.6)
Bug Id:
CSCut47891
Title:
NVT: Missing (S,G) between MSDP peers, when there are 4 spine with MSDP
Description:

Symptom:
(S,G) entries are not in between MSDP peers

Conditions:
Four Spine devices configured as MSDP peers

Workaround:
no workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
Bug Id:
CSCus42713
Title:
2014 and 2015 OpenSSL Vulnerabilities
Description:

Symptom:Cisco NX-OS (Covering Nexus 5K, N6K and N7K and Cisco MDS) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE)
IDs:

CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275,
CVE-2015-0204, CVE-2015-0205, CVE-2015-0206

This bug has been opened to address the potential impact on this product.

Conditions:This device has a vulnerable version of OpenSSL, this bug is being used to update the OpenSSL package used on the product.


Product doesn't support DTLS so is not affected by either:
CVE-2014-3571
CVE-2015-0206

The LDAP SSL authentication feature may be configured to use OpenSSL. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP SSL Authentication feature is enabled.

Workaround:1. Nexus 5000 (N5K) : The following features can use SSL and would need to
be disabled.

a) Avoid any "fabric database" configuration with keyword "enable-ssl".

For example:
fabric database type network
server protocol ldap ip 172.29.21.2 enable-ssl
b) Make sure the 'secure LDAP' option is unchecked when defining POAP
template on DCNM.
c) Do not use Cisco's One Platform Kit (OnePK) with the transport type tls
..." open.
d) Remove the VM Tracker Configuration.

2. Nexus 7000 (N7K) : The LDAP feature uses Open SSL. To disable the LDAP
SSL Authentication feature. LDAP can be disabled or used without SSL
Authentication.

More Info:PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.6

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from
multiple sources. This includes the CVSS score assigned by the third-party
vendor when available. The CVSS score assigned may not reflect the actual
impact on the Cisco Product.

Additional information on Ciscos security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
5.2(8f), 6.2(10), 6.2(11), 6.2(7), 6.2(8)S3, 6.2(8a), 7.2(0)VX(0.9), 7.2(0.1)PR(0.1), 7.3(0.9), 9.9(0)XS(0.1)
Known Fixed Releases:
6.2(14)FB(0.52), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184)
Bug Id:
CSCus26870
Title:
December 2014 ntpd CVEs for Nexus 5k/6k/7k/MDS
Description:

Symptom:
The following Cisco products:

NEXUS 7000
NEXUS 6000
NEXUS 5000
MDS

include a version of NTPd that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-9293
CVE-2014-9294
CVE-2014-9295
CVE-2014-9296

This bug has been opened to address the potential impact on this product.

Conditions:
This issue is configuration dependant and applies only when the following command is configured:

feature ntp

All prior versions of NX-OS are affected.

Workaround:
1. If the upstream mgmt0 device supports uRPF then ensure it is configured.

2a. Filter incoming NTP queries and restrict them to trusted NTP server addresses only by using the ntp access-group configuration command.

2b. For affected platforms that do not support the ntp access-group command, configure an inbound ACL for trusted NTP server addresses to the NTP port (UDP port 123) on mgmt0.

Further Problem Description:
All previously released versions of SAN-OS and NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

Nexus 50xx:
NX-OS 5.2 release - a to be determined release
Nexus 55xx, 56xx
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 60xx:
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 7xxx:
NX-OS 6.2 release - first fixed release is 6.2(12), released on 03 Feb 2015

MDS:
NX-OS 5.2 release - first fixed release is 5.2(8f), released on 20 Feb 2015
NX-OS 6.2 releases:
- 6.2(9b), released on 01 Apr 2015
- 6.2(11b), released on 02 Mar 2015
- 6.2(13), to be released in June 2015

There are no fixed MDS NX-OS releases that are FICON certified yet. There will not be any fixed releases for software trains that are past the end of software maintenance support.

A Cisco Security Advisory has been published to document this vulnerability at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.0(3), 6.2(13)FM(0.8), 6.2(9)S32, 6.2(9a)S5, 7.2(0)ZD(0.1), 7.2(0)ZN(0.4), 7.9(0)ZD(0.4), 8.0(0.1), 9.9(9)
Known Fixed Releases:
5.2(1)N1(8.155), 5.2(1)N1(8.158), 5.2(1)N1(9), 5.2(8f), 5.2(8f)S9, 6.0(2)N2(6.132), 6.0(2)N2(6.133), 6.0(2)N2(7), 6.2(11b), 6.2(11b)S4
Bug Id:
CSCut28707
Title:
stale/no MAC on Hw of F1 as FE not programmed on MTM due to DFTM
Description:

Symptom:
Unicast flooding or traffic blackhole if the MAC is not programmed or programmed with wrong index respectively.

Conditions:
F1 module.

Workaround:
remove the affected ports from PC and add it back.

or

reload module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(14)FB(0.19), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.493), 7.2(0)VZD(0.26), 7.2(0)ZD(0.175)
Bug Id:
CSCts64383
Title:
N7K: FEX goes offline when more than 4 fabric ports went down
Description:

Symptom:
Nexus2000 series (FEX) goes when more than 4 fabric ports went down at once even if there are some fabric ports available.

Conditions:
This issue happens when both of the following was meet.
+ more than 4 fabric ports went down by something like module reload
+ those disabled/flapped fabric ports include a fabric port for control traffic

example)
think about FEX with 4 fabric ports for module 1, 4 fabric ports for module2.
a fabric ports for control traffic is located on module 1.
the issue happens when module 1 reloaded.

Workaround:
reduce the number of fabric ports.
If the FEX has 3 fports for one module and other 3 ports for another module, then the issue won't happen with module reload.

Further Problem Description:
You can check which fabric port is for control traffic.

n7004# sh fex 101 | grep control
Fabric port for control traffic: Eth3/1

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
5.2(1), 5.2(3.35)S0, 6.0(0.36)S13
Known Fixed Releases:
5.2(3.52)S0, 6.0(0.60)S0
Bug Id:
CSCuu02941
Title:
linecard crashing due to clp_fwd hap reset
Description:

Symptom:
N7K-SM-NAM-K9 and LCs with less than 12 instances of Clipper will have their clp_fwd process crash when the system has Fex with L2 mcast is active. I.e. when the Fex ports are flapped or when the LC itself is reloaded, then clp_fwd will crash.

Conditions:
The issue happens when we boot the module on 6.2(10)

Workaround:
None

Further Problem Description:
l2mcast assumes that in every line card 12 Forwarding instances are available. With this assumptions, when it sends a message to clp_fwd driver, the clp_fwd driver does not handle this error correctly. Hence, crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.43), 6.2(14)FB(0.47), 7.1(0)AV(0.81), 7.2(0)D1(0.494), 7.2(0)VZD(0.26), 7.2(0)ZD(0.176)
Bug Id:
CSCus96272
Title:
pvlan Channel-group members add/remove fails .
Description:

Symptom:
pvlan Channel-group members add/remove fails .

Conditions:
pvlan Channel-group members add/remove fails .

Workaround:
pvlan Channel-group members add/remove fails .

Further Problem Description:
pvlan Channel-group members add/remove fails .

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)PDB(0.390), 7.2(0)VZD(0.26)
Bug Id:
CSCut18721
Title:
gbr_422: urib core at urib_chlist_segv_handler
Description:

Symptom:
urib crashes and since it is not restartable, the crash will result in reload of the switch in single SUP scenario or will result in SSO when dual SUP is present.

Conditions:
Inter VRF case where routes in one VRF are pointing to next hops in different VRF.

Workaround:
no workaround

Further Problem Description:
This issue mainly happens when routes are being flapped in large scale by BGP due to multiple restart or some other reasons or repeated execution of "clear ip route *".

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.444)
Known Fixed Releases:
6.2(10)E8, 6.2(12)E1, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)D1(0.451), 7.2(0)D1(0.463), 7.2(0)D1(0.479), 7.2(0)N1(0.157)
Bug Id:
CSCtr74930
Title:
lldp process crashes on executing "show lldp entry <system-name>"
Description:

Symptom:
lldp crash

Conditions:
LLDP crashes when user issues "show lldp entry" and system-name tlv was de-selected.

Workaround:
Enable system-name tlv

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
5.2(1)S84
Known Fixed Releases:
6.0(0.14)S0
Bug Id:
CSCut17793
Title:
SSTE:Traffic loss observed after flapp mpls interf with 7.2(0)D1(0.422)
Description:

Symptom:
Few VPLS PWs are down

Conditions:
Flap MPLS interface used by PWs

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.484)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.503), 7.2(0)N1(0.196), 7.2(0)N1(1), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.183), 7.2(0)ZN(0.199)
Bug Id:
CSCut38574
Title:
Wrong EIGRP delay calculation
Description:

Symptom:
Two port-channels with different bandwidth are being populated in the routing table as equal-path. And two port-channels with same bandwidth are not both populated as equal-path in the routing table.

Conditions:
Using EIGRP with 40G links/port-channels.

Workaround:
We figure out the issue. The delay value is getting cached and we are no updating it on b/w change.
I will fix this issue.

The main thing is we need to update delay on bandwidth change. Or we need to flush it. So it will get updated with correct value
corresponding to updated bandwidth.

Work around:
That can be done with,
#SVS-N7K-C1-61# conf t
#SVS-N7K-C1-61(config)# interface port-channel 12
#SVS-N7K-C1-61(config-if)# ip delay eigrp 100 200000 << some random value
#SVS-N7K-C1-61(config-if)#no ip delay eigrp 100 200000

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.23), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)VZD(0.26)
Bug Id:
CSCus98916
Title:
BGP Vinci: For 0.0.0.0/0, BGP installs non-best/multi paths in URIB
Description:

Symptom:
In a vinci setup, customer is not able to chose one out of two Border Leaf because URIB is doing ECMP for both paths learnt via BGP.

Conditions:
1. Two paths in BGP vrf table for 0.0.0.0/0 from two Border Leaf.
2. First path is marked as best-path.
3. Second path is not marked as multi-path or best-path
4. BGP installs both paths in URIB vrf table.
5. URIB sees both paths having exact same metrics and interprets ECMP.

Workaround:
Config can be reworked in a way that the Leaf only receives one path via BGP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(1)N1(0.481), 7.1(1)N1(1), 7.1(1)ZD(0.18), 7.1(1)ZN(0.33), 7.2(0)D1(0.487), 7.2(0)N1(0.134), 7.2(0)N1(0.183), 7.2(0)N1(1)
Bug Id:
CSCuu12299
Title:
eg lif 0x0, when reload AC module after change AC port from VPWS to VPLS
Description:

Symptom:
With the trigger stated in the bug headline, packet forwarding does not happen in for that VFI.

Conditions:
When a port that was a part of a VPWS connection is removed from it and then configured to be in a VLAN that is extended via VPLS, then the egress LIF for that port becomes 0x0 and disrupts packet forwarding.

Workaround:
None

Further Problem Description:
None

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.490)
Known Fixed Releases:
Bug Id:
CSCur17440
Title:
snmpwalk on cpmCPUTotalTable(1.3.6.1.4.1.9.9.109.1.1.1) failing
Description:

Symptom:
On nexus 5500/6000 series switches, snmpwalk on 1.3.6.1.4.1.9.9.109.1.1.1( cpmCPUTotalTable) does not return the expected objects.

Conditions:
This is seen with 7.1 train, the issue does not exist with previous trains such as 7.0

Workaround:
An snmpget to the object will work, for instance to 1.3.6.1.4.1.9.9.109.1.1.1.1.8.1 for cpmCPUTotal5minRev

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.1(0)N1(1), 7.1(1)N1(0.8)
Known Fixed Releases:
Bug Id:
CSCtx90551
Title:
6.2.0.78:S0::ISSU::Return code 0x4093001e(Standby failed to come online)
Description:

Symptom:
6.2.0.78:S0::core at syslogd
Conditions:
Seen this issue while doing ISSU
Workaround:
Do not configure "debug logfile " on active before doing ISSU.
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(0.147)S0, 6.2(0.78)S0
Known Fixed Releases:
6.2(0.217)S3, 6.2(0.218)S0, 6.2(2), 7.0(1)ZD(0.3)
Bug Id:
CSCuu08730
Title:
DAI: ARP Response dropped when the local vPC leg is down
Description:

Symptom:
A nexus 7000 series switch in a vpc/vpc+ environment configured for dynamic arp inspection may drop arp replies targetted to itself under certain conditions

Conditions:
- The local vpc leg is down causing the arp reply to be sent to the peer and tunneled to the switch that sent the arp request.
- The vpc is trusted for dynamic arp inspection

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10), 7.2(0)N1(0.217)
Known Fixed Releases:
6.2(10)E3, 7.2(0)D1(1), 7.2(0)ZD(0.199), 7.2(0)ZN(0.218)
Bug Id:
CSCut06258
Title:
F1 card MTM misprogramming on "VLAN UP/Down" event
Description:

Symptom:
MAC are not learned in HW on F1 card. From SUP , show mac address-table shows correct info, but show hardware mac address-table X for module X - is incorrect.
Affects on per VLAN/per port-pair basis (e.g. port-pairs are : 1,2 ; 3,4; ... 31,32. and some of them may stop learning MACs on some of the VLANs)
This lead to Unknown Unicast Flood scenario

Conditions:
shut/no shut of VLAN on a busy system (especially on many VLANs simultaneously). Removing and adding many VLANs at once.

Workaround:
Reload affected module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.21), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.493), 7.2(0)VZD(0.26), 7.2(0)ZD(0.175)
Bug Id:
CSCut09489
Title:
Distribute-list out not working for set tag with route-type match
Description:

Symptom:
Distribute-list out not working for set tag

Conditions:
when route-type is used for match

Workaround:
use a different criteria for match

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)VZD(0.26)
Bug Id:
CSCut77411
Title:
Assess April 2015 NTPd vulnerabilities for N5k/N6k/N7k
Description:

Symptom:
This has been opened to document the potential impact on the following products:

Cisco Nexus 5/6k switch family
Cisco Nexus 7k switch family

of the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798
CVE-2015-1799

Conditions:
Exposure is configuration dependent. The configuration that can expose the vulnerability are

ntp authenticate
ntp authentication-key 1234 md5 104D000A0618 7
ntp trusted-key 1234
ntp peer 1.2.3.4 key 1

Workaround:
Remove the applicable configuration.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.3(0)ZN(0.3), 7.3(0.9)
Known Fixed Releases:
5.2(1)N1(8.167), 5.2(1)N1(9), 6.0(2)N2(6.141), 6.0(2)N2(7), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.479), 7.2(0)N1(0.173), 7.2(0)N1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCut47663
Title:
SSTE: OSPF Adj are struct in TWO-WAY state after ospf process restart
Description:

Symptom:
OSPF Adj are struct in TWO-WAY state

Conditions:
restart opsf 100. If there is no BDR.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.468), 7.2(0)PDB(0.401), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.147), 7.2(0)ZN(0.164), 7.2(1)N1(0.1), 7.2(1)N1(1)
Bug Id:
CSCuf61304
Title:
NX-OS : RPF on mroute incorrectly pointing to the RP for (S,G)
Description:

Symptom:
On the Turn around router running NX-OS, RPF on mroute incorrectly pointing to the RP for (S,G)


Conditions:
RP on a stick set-up. mostly seen in cases that have slow sources. on the turn around router running NX-OS, the incoming interface on the (S,G) points towards the RP instead of towards the Source, packet flow stops in this state. Clearing the mroute fixes
the issue. But the Mroute randomly goes back to this state.


Workaround:
None


Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
5.0(3)N2(2a), 5.2(1)N1(3), 6.0(2)N1(2)
Known Fixed Releases:
5.0(3)U5(1f), 5.2(1)N1(5), 6.0(2)N1(2a), 6.0(2)N2(1), 6.0(2)U1(1), 6.2(1.83)S0, 6.2(2), 7.0(1)N1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCuu53392
Title:
Multicast IP packet with Unicast dmac is punted to the control plane
Description:

Symptom:
High RX rate on the inband interface due to IP multicast packets.

Conditions:
IP multicast packet (224.0.0.0/4) with a unicast destination mac address of which the Nexus 7000 ingress L3 interface owns.

Workaround:
None.

Further Problem Description:
This traffic should be dropped in hardware by the parser as it violates packet format standards. This traffic should not be sent to the control plane for processing.

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu29945
Title:
SSTE: m2rib core on POAP + autoconfig
Description:

Symptom:
m2rib core

Conditions:
POAP + autoconfig

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.506), 7.2(0)D1(0.510), 7.2(0)ZD(0.190)
Bug Id:
CSCuu27816
Title:
IPv6 prefixes of OSPFv3 interfaces not present in intra-area-prefix LSA
Description:

Symptom:
IPv6 prefixes of interfaces part of OSPFv3 not present in intra-area-prefix LSA.

Conditions:
Interfaces without adjacency can run into this problem after interface flap or VDC reload

Workaround:
Use "redistribute direct" instead of configuring the interfaces in OSPFv3 if possible.

Further Problem Description:
Recovery is via clear ospfv3 neighbors.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.511), 7.2(0)N1(0.209), 7.2(0)N1(1), 7.2(0)ZD(0.191), 7.2(0)ZN(0.209)
Bug Id:
CSCuu10618
Title:
Traffic loss on some vlans after line card reload
Description:

Symptom:
after reload there is 100% packet drop on a few vlans

Conditions:
LC reload on scaled setup

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.475)
Known Fixed Releases:
15.5(2.20)T, 15.5(2.21)S0.5, 15.6(0.2)S, 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.184), 7.2(0)ZN(0.200)
Bug Id:
CSCup19405
Title:
targeted ldp session fails when frr is in use
Description:

Symptom:
Targeted ldp session is up when the primary tunnel is up, but goes down when frr goes active.

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.1(0)D1(0.151), 7.2(0)D1(0.456)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.475), 7.2(0)D1(0.507), 7.2(0)D1(0.510), 7.2(0)ZD(0.186), 7.2(0)ZD(0.190)
Bug Id:
CSCut20914
Title:
EIGRP IPv6 neighbour sessions flaps after LC reload
Description:

Symptom:
EIGRP ipv6 neighbor sessions flap

Conditions:
After LC reload

Workaround:
None

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)VZD(0.26)
Bug Id:
CSCue92562
Title:
Memory Leak in "clp_fwd" Process
Description:

Symptom:
N7K-F248XP-24 module running NX-OS 6.0.1 crashes due to clp_fwd

Conditions:
Start type: SRV_OPTION_RESTART_STATELESS (23)
Death reason: SYSMGR_DEATH_REASON_FAILURE_SIGNAL (2)

Workaround(s):
None

Status:
Other
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
Bug Id:
CSCur07245
Title:
Nexus switch may see repeated crashes of ntpd process
Description:

Symptom:
NTP process may crash repeatedly on a Nexus switch.

Nexus7010# sh core
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 5 1 ntpd 19361 2015-01-31 05:18:22
1 5 1 ntpd 19348 2015-01-31 05:18:22
1 5 1 ntpd 19096 2015-01-31 05:18:22
1 5 1 ntpd 21817 2015-01-31 05:30:25
1 5 1 ntpd 21201 2015-01-31 05:31:20
1 5 1 ntpd 21196 2015-01-31 05:31:20
1 5 1 ntpd 21188 2015-01-31 05:31:20
1 5 1 ntpd 21208 2015-01-31 05:31:21

In some cases the cores may not be properly bundled and will pile up in the /var/sysmgr/tmp_logs directory. This may result in messages similar to the following:

2015 Mar 28 00:34:06.644 Switch %SYSMGR-3-VAR_SYSMGR_FULL: System Manager file storage usage is unexpectedly high at 100%. This may impact system functions.
2015 Mar 28 00:40:29.912 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30892 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.057 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30914 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.463 Switch %SYSMGR-3-CORE_OP_FAILED: Core operation failed: core_client_run_system_cmd: Command: /isan/bin/sysmgr_logmgr /var/sysmgr/tmp_logs 0 1>> /var/sysmgr/core_handling.log failed wi

Conditions:
This has been observed on Nexus 5000, 6000, and 7000 series switches.

It is more likely to occur if the device is being polled via IPv6 NTP requests. However, this also affects IPv4-only configurations.

It may also be more likely to occur if an unreachable NTP peer is configured.

Workaround:
If either of the above two conditions are present in the configuration (IPv6 NTP polling, or an unreachable NTP peer) then removing these may make the crash less likely to occur.

However, the only guaranteed workaround would be to disable the NTP feature completely (remove all NTP configuration from the affected switch).

Further Problem Description:
This problem occurs due to memory corruption in a receive buffer in memory which is used by NTP. NTP will crash repeatedly after the corruption occurs.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.25), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(1)N1(0.495), 7.1(1)N1(1), 7.1(1)ZN(0.48), 7.2(0)AB(9), 7.2(0)D1(0.408)
Bug Id:
CSCut75457
Title:
HSRP VACL Filter Broken
Description:

Symptom:
HSRP hello is passing through device with VACL in place to drop these packets.

Conditions:
6.2(10) or 6.2(12)

Workaround:
None.

Further Problem Description:
This behavior is seen in 6.2(10) and 6.2(12). It is not seen in 6.2(8b).


A similar issue relating to PACL filtering HSRP packets fixed in 6.2(12): CSCur69114

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
Bug Id:
CSCuo85450
Title:
Nexus 5000 crashed with arp hap reset
Description:

Symptom:
switch reload with following log:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 141764 usecs after Wed May 14 03:21:41 2014
Reason: Reset triggered due to HA policy of Reset
Service: arp hap reset
Version: 7.0(1)N1(1)

Conditions:
Gratuitious ARP storms are suspected as the trigger for this issue.

Workaround:
currently unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(2)
Known Fixed Releases:
6.0(2)A5(0.943), 6.0(2)A5(1), 6.0(2)U5(0.943), 6.0(2)U5(1), 6.2(10), 6.2(10)S40, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(1)ZD(0.248)
Bug Id:
CSCue11653
Title:
LC Reset due to LM_INT_CL1_TCAM_B_PARITY_ERR or LM_INT_L3_TCAM_PARITY
Description:

Symptom

All the below three symptoms should be seen.

1. SYSMGR-SLOT8-2-SERVICE_CRASHED: Service "lamira_usd" (PID 1944) hasn't caught signal 6 (core will be saved).

2. In "show logging onboard mod 2 exception-log"

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <----- this should be 1
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description : LM_INT_CL1_TCAM_B_PARITY_ERR <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)


or

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <---------- this should be '1'
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description :LM_INT_L3_TCAM_PARITY <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)

3. Attach to linecard, and check this.

show logging onboard internal lamira

You will see something like this below.


ACLQOS: STAT Register Scan - No Correctable Error Found

or

IPFIB: STAT Register Scan - No Correctable Error Found


If all the above are seen the issue is that software reset the linecard due to an error in handling parity interrupt.

Symptom:

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
5.1(5), 6.0(4), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S59, 5.2(9)S60, 5.2(9)S66, 5.2(9.107)S0, 5.2(9.115)S0, 5.2(91.1)S0, 6.1(4), 6.1(4)S3, 6.1(4)S5
Bug Id:
CSCuf20035
Title:
FEX : MTU changes not taking effect on fex queues
Description:

Symptom:

When the user changes the interface MTU on a fabric port, the configured MTU on the FEX ports are not configured to the same value.

Conditions:

This will occur anytime the user changes the interface MTU on a fabric-port.

Workaround(s):

The configured MTU for the FEX ports is controlled by the network-qos policy. The user should modify the network-qos policy to change as well to change the MTU configured on the FEX ports when they change the fabric-port MTU.

Status:
Terminated
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(1.42)
Known Fixed Releases:
Bug Id:
CSCuu09362
Title:
OTV VLAN not extended after VLAN is removed from the overlay and SSO
Description:

Symptom:
VLAN can not be extending over overlay after the VLAN is removed prior to SSO.

Conditions:
When a VLAN is removed from the overlay, copy run start vdc-all is entered and a supervisor switchover is performed, the VLAN that was removed can not be added back to the overlay.

Workaround:
Reload OTV VDC

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuc23279
Title:
SYSTEST:FCoE:core detected due to hwclock crash on standby sup
Description:

Symptom:
Core detected due to hwclock crash on standby sup.

Conditions:
None

Workaround(s):

No impact reported.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.1(2), 6.1(2)S11, 6.1(2)S41, 6.1(4a)S14, 6.2(1.42), 6.2(1.59)S2, 6.2(1.59)S5, 6.2(1.69), 6.2(1.69)S5, 6.2(1.83)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5.9)S0, 6.2(0.304), 6.2(1.72)S0, 6.2(1.84)S0, 6.2(2), 7.0(0.7), 7.1(0)D1(0.14)
Bug Id:
CSCut63393
Title:
Vinci FE - Border Leaf needs to advertise hash-len for BSR
Description:

Symptom:
Border Leaf doesn't advertise the correct hash-len as advertised by PIM running @ the Border-Leafs for BSR in Vinci Asti Multicast.

Conditions:
BSRs listen and accumulate candidate RP announcements. For every group range known, the BSR builds a set of candidate RPs, including all routers that advertised their willingness to service this range. This is called group range to RP set mapping. The resulting array of group range to RP set mappings is distributed by the BSR. Ultimately, the bootstrap messages containing Group to RP-set mappings are received by every multicast router in the domain and used to populate their RP caches. It's up to the routers to select the best matching RP from the sets advertised by the BSR router. It is important that all routers select the same RP for the same group, otherwise the multicast sources might miss receivers. Based on a consistent hash-len information sent from the BL's the routers will ensure they pick the same RP for the same group.
In the present Janjuc image, although PIM advertises a hash-len to be chosen for BSR, this communication doesn't get sent to NGMVPN @ Border-leaf node which results in PIM @ all leaf nodes using a default hash-len of 0 to calculate the RP for the group. This causes mismatch in hash-len information between PIM @ Border-Leaf vs PIM @ Leaf node.

Workaround:
Work-around is not to configure the candidate-RP's in the RP-set for BSR case with the same priority.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases:
Bug Id:
CSCus62502
Title:
OTV Tunnel Depolarization causes traffic loss when some tunnels are down
Description:

Symptom:
if OTV Tunnel Depolarization is implemented, traffic will be dropped when several OTV tunnels down

Conditions:
none

Workaround:
none

Further Problem Description:
none

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCti95293
Title:
Due to EOBC Congestion, PortLoopback test failed to threoshold times
Description:

Symptoms:

Consecutive PortLoopback failure message reported. As a result, linecards may
be reported as faulty.

Conditions:

Nexus7000 running 5.0 or 5.1 releases.

Workaround(s):

None.

Further Problem Description:

As this issue is due to EOBC congestion, following symptoms may also be seen:

- Unable to login to module(s)
%IPQOSMGR-4-QOSMGR_LC_SESSION_ERROR_MSG: Linecard returned the
following error for statistics session: Operation timed out.

- Configuration change is not updated, or saving configuration fails
E.g., After "shutdown" command issued for an interface, it stays up.

- Interface status is not updated
E.g., After removing SFP, interface status still shown as UP.

- Unsuccessful Sup engine failover.

- Changes in software state are not propagated to hardware on some modules (STP state, LTL, CBL, RBH, etc...)
AIPC timeouts due to EOBC congestion can cause PIXM to remove the module from the active linecard mask. This can be verified via "show system internal pixm info global | i "active LC"

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
5.0(2a), 5.1(1)
Known Fixed Releases:
5.0(5)S7, 5.0(5.27)S0, 5.1(1)S29, 5.1(1.26)S0, 5.1(1.32)S0
Bug Id:
CSCum10704
Title:
465 byte leak with epld during show run can cause copy r s to abort
Description:

Symptom:
It is not possible to save the configuration anymore and the memory shows up as full :

%SYSMGR-2-NON_VOLATILE_DB_FULL: System non-volatile storage usage is unexpectedly high at 100%.

N7K# copy run start
[########################################] 100%
Configuration update aborted: request was aborted
N7K#

Conditions:
Each time "copy run start" or "show run" is issued, the size of the epld_auto_log file in /mnt/pss/epld_log is growing.
This fills up /mnt/pss space. When the /mnt/pss gets full, "copy run start would fail. This can be seen with

N7K# show system internal dir /mnt/pss/epld_log

Workaround:
Prevent such commands from being run by scripts and call TAC to delete the file.

Further Problem Description:
Affected releases are from 6.2(1) to 6.2(6a).
It has been fixed in 6.2(8).

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(6)S10
Known Fixed Releases:
Bug Id:
CSCus97711
Title:
Unable to delete files from /tmp directory using filesys delete
Description:

Symptom:
Can not delete files from /tmp/var directory on Line cards using filesys delete cli

Conditions:
n/a

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.37), 7.1(0)AV(0.81), 7.2(0)D1(0.492), 7.2(0)VZD(0.26), 7.2(0)ZD(0.174)
Bug Id:
CSCud63152
Title:
F2/F2E/F3 improper programming gateway mac on some instances
Description:

Symptom:
Traffic destined to CPU is flooded instead of being punted.
This causes symptoms such as ARP being incomplete, L3 routed traffic not getting routed correctly

Conditions:
We have determined this is a result of the Interface VLAN MAC address not programmed in the hardware

Workaround:
shut/no shut of the interface vlan
This will force the switch to reprogram the router mac address

Further Problem Description:
Additional information regarding this fix:
After ISSU to a fixed release (ie., 6.1(5) and above), reload of F2/F2E/F3 modules are required to get the fix applicable. If the F2/F2E/F3 modules are not reloaded, this problem may continue to happen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.0(3)
Known Fixed Releases:
6.1(5), 6.1(5)S11, 6.1(5.10)S0, 6.2(0)HS(0.10), 6.2(8), 6.2(8)S1, 6.2(8.5)
Bug Id:
CSCue79881
Title:
SNMP crashes on SNMP bulk get query
Description:

The SNMP process may crash with the following syslogs

%KERN-2-SYSTEM_MSG: mts_is_q_space_available_new():1416:Total mtsbuf size 10070872 for sap 28, exceeds limit 15 perc of 67108864 - kernel
%KERN-2-SYSTEM_MSG: mts_acquire_q_space() failing - no space in sap 28, uuid 26 send_opc 3176, pid 3616, proc_name sctpt_rx_thr - kernel
%KERN-2-SYSTEM_MSG: [sap 28][pid 4406][comm:snmpd] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 4406) hasn't caught signal 6 (core will be saved).

Symptom:
The SNMP process may crash with the following syslogs

%KERN-2-SYSTEM_MSG: mts_is_q_space_available_new():1416:Total mtsbuf size 10070872 for sap 28, exceeds limit 15 perc of 67108864 - kernel
%KERN-2-SYSTEM_MSG: mts_acquire_q_space() failing - no space in sap 28, uuid 26 send_opc 3176, pid 3616, proc_name sctpt_rx_thr - kernel
%KERN-2-SYSTEM_MSG: [sap 28][pid 4406][comm:snmpd] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 4406) hasn't caught signal 6 (core will be saved).

Conditions:
This has been observed when a monitoring device is using snmp-bulk-get requests on the entity-MIB for multiple FEX modules at one time. Also this can be observed if there is continuous
polling from multiple polling stations on slow mibs.

Even if FEX modules were not present if continuous snmpbulkwalk is getting done using multiple devices simultaneously on slow mibs for long time then it can happen.
Some mibs like qos mib, entity mib, entity-fru mib, bridge mib are little slow and continuous snmp bulk walk on these might affect.
To check if mts buffer size is increasing you can use
#show system internal mts buffers summary
and see notificaitons for sap 28 increasing.

Workaround:
Workaround(s):
Possible workaround is configuring the "no snmp-server counter cache enable" command. This command prevents SNMP bulk gets from getting cached via the use of MTS buffers. This will prevent the MTS buffers from getting consumed and resulting in a process crash. The result of the command is that the interface table might be slower to update the statistics (since caching is disabled). This is fixed in 5.2.9, 6.1.4 and in 6.2.1.

Note: This workaround is only available on Nexus 7000 switches.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
5.2(7), 5.2(7)S20, 6.1(1.66)S0, 6.1(3), 6.1(4)S17, 6.2(0.294)S11, 6.2(0.294)S12, 6.2(1.23)
Known Fixed Releases:
5.2(1)N1(5), 5.2(9), 5.2(9)S53, 5.2(9.98)S0, 6.0(2)N1(2a), 6.0(2)U1(1)
Bug Id:
CSCus88425
Title:
pvlan configured ports error disabled iftmc: invalid argument
Description:

Symptom:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Conditions:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Workaround:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Further Problem Description:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Err

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(12), 7.2(0.2), 7.2(0.4)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.454), 7.2(0)RTG(0.143), 7.2(0)VOF(0.2), 7.2(0)ZD(0.135)
Bug Id:
CSCut17599
Title:
N7K-F248XT-25E: Periodic PortLoopback Failures for Unknown Reason
Description:

Symptom:
PortLoopback test failure with failure reason 'Loopback test failed. Unable to analyze the reason for failure'

Conditions:
- Unused port
- N7K-F248XT-25E

Workaround:
1. If diagnostic test is error-disabled (DIAG TEST ERR DISABLE) due to this reason, you can reset the diagnostic by doing the following:

# diagnostic clear result module all
(config)# no diagnostic monitor module test 6
(config)# diagnostic monitor module test 6
# diagnostic start module test 6

2. If the Port loopback test is failing (DIAG TEST FAIL) even after resetting the condition, then see if you are hitting CSCuq34116. If yes, please the attachment - Workaround

3. If the fix of CSCuq34116 in step 2 is not helping recover, it is most likely a hw issue.

4. Reloading the module might recover the ports (Secure a maintenance window and reload the module)



Further Problem Description:
If this is not a CSCuq34116, then its very likely a hw issue. Recommend an RMA.

Status:
Terminated
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.1(5), 6.2(10)
Known Fixed Releases:
Bug Id:
CSCup20959
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:NXOS versions prior to 6.2(10)

Workaround:None

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.1(4), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10.16)S0, 6.2(8)E10, 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)EV(0.116), 7.1(0)OTT(0.45), 7.1(0)PDB(0.241)
Bug Id:
CSCus02026
Title:
PIM crash seen on with high scale mcast source on VPC
Description:

Symptom:
PIM may crash with high number of sources per group in VPC setup

Conditions:
High scale of sources per group

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110)
Bug Id:
CSCut14381
Title:
Inproper 16 way ECMP hasing with IPv6 traffic
Description:

Symptom:
Traffic for the destination which is reachable via IPv6 ECMP with unresolved paths will experience traffic loss.

Conditions:
IPv6 adjacency for some of the ECMP next hop is in unresolved state

Workaround:
Execute the command "ping6" for each of the affected IPv6 ECMP next hop to get the ECMP next hop in resolved state.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10)S102, 7.2(0)D1(0.493)
Known Fixed Releases:
6.2(10)E7, 6.2(12)E1, 6.2(12)E2, 6.2(14)FB(0.8), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)PDB(0.364), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCut23978
Title:
soft-voq detects congestion and taildrops inband tx traffic on sup2
Description:

Symptom:
On high scale setups (large RSTP scale for instance) we may notice some BPDUs missing in Tx direction from SUP in-band toward network.

Conditions:
Supervisor kernel is queuing packets for egress toward network and may tail-drop control-plane traffic.

Workaround:
None

Further Problem Description:
This issue may impact Tx traffic from in-band toward network for any protocol at high packet rates.

Status:
Other
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
Bug Id:
CSCus91417
Title:
Nexus 7000 fails to trasmitt RSTP BPDUs consistently
Description:

Symptom:
STP Instability in layer 2 domain with N7K (Rapid PVST)

Conditions:
unknown

Workaround:
enable peer-switch if N7K is the root to mitigate this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12)S33
Known Fixed Releases:
6.2(12)E1, 6.2(13)FM(0.52), 6.2(13)GS(0.13), 6.2(13.1)S0, 6.2(14)FB(0.21), 7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)PDB(0.378), 7.2(0)VOF(0.2), 7.2(0)VZD(0.26)
Bug Id:
CSCut75759
Title:
ACL change fail "hardware resource allocation failure"
Description:

Symptom:
unable to modify/remove ACL from SVI. getting the following error: "ERROR: Module 1 returned status: hardware resource allocation failure"

Conditions:
Issue is seen when modification is done to ACL attached to SVI. This is due to memory leak in policer being allocated by qos. With each modification to ACL number of policer in QOS keeps on increasing. It reaches a point where there are not sufficient quantity of policers free and error is generated.

Workaround:
Remove the QOS policy from VLAN config, this results in deallocation of all allocated policers for that vlan.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.42), 7.2(0)D1(0.495), 7.2(0)ZD(0.177)
Bug Id:
CSCus99375
Title:
OTV crashes with vlan process in crash core
Description:

Symptom:
OTV crashes with vlan process in crash core

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.2(8.1)
Known Fixed Releases:
Bug Id:
CSCuj17755
Title:
SNMPd process crash
Description:

Symptom:
the SNMPd process may restart unexpectedly

Conditions:
SNMP active on the switch. The specific conditions are not known at this time. Aggressive snmp polling of the switch and periodically high cpu is observed. The debug info collected is not sufficient to root cause the problem, but it shows several thousand mts messages which were not getting freed.

Workaround:
None at this time.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
Bug Id:
CSCut49944
Title:
sw reload would put range of private-vlan are STP blocked state
Description:

Symptom:
sw reload its observed that range of private-vlan are STP blocked state

Conditions:
sw reload its observed that range of private-vlan are STP blocked state

Workaround:
workaround : realod of LC

Further Problem Description:
sw reload its observed that range of private-vlan are STP blocked state

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184)
Bug Id:
CSCui36490
Title:
BGP outbound messages can get stuck in certain conditions.
Description:

Symptom:
BGP outbound messages can get stuck in certain conditions

Conditions:
If BGP has caught up with updating its peers with all route updates, the sender thread may inadvertently go to sleep because of this bug. In such a case, residual outbound messages to the peers will be stuck until another message (keepalive, update, etc.) gets queued to wake the sender thread

Workaround:
"clear ip bgp" or "restart bgp" may resolve the issue but it may end up in the same situation later.

Further Problem Description:
PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(0)PF(0.296), 6.2(2)S31, 6.2(8)
Known Fixed Releases:
6.0(2)N3(1), 6.2(10), 6.2(10)CM(0.34), 6.2(11)FM(0.7), 6.2(8)E1, 6.2(8)IAS(0.18), 6.2(9.4)S0, 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(0.122)
Bug Id:
CSCuq39448
Title:
Nexus EIGRP crash when distribute list is configured under interface
Description:

Symptom:
A Nexus 5000, 6000, or 7000 switch may reload unexpectedly due to an EIGRP process crash. Reset reason will look similar to the following:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 306358 usecs after Wed Sep 3 04:32:21 2014
Reason: Reset triggered due to HA policy of Reset
Service: __inst_001__eigrp hap reset
Version: 7.0(2)N1(1)

Conditions:
This crash can be hit when a distribute-list is configured on a physical interface or SVI. It will occur when a new neighborship is formed on that interface.

Workaround:
No known workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
6.2(14)FB(0.17), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZN(0.693), 7.0(6)N1(0.202), 7.0(6)N1(1), 7.1(0)D1(0.253), 7.1(0)N1(0.314), 7.1(0)N1(1), 7.1(0)OTT(0.32)
Bug Id:
CSCus36521
Title:
ISIS Neighbor with network type p2p not coming up between NXOS and IOS
Description:

Symptom:
ISIS Neighbor with network type p2p not coming up between NXOS and IOS

Conditions:
With network type p2p the adjacency is not coming up.
It shows INIT State on IOS Device and does not list the adjacency on NXOS end.

Workaround:
Remove p2p network type command from the interfaces on both ends.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
Bug Id:
CSCuu54461
Title:
Traffic loss seen after BGP Autodiscovery triggers
Description:

Symptom:
In VPLS BGP auto-discovery, if L2VPN changes the route-target configs for a VFI, the config changes may not be reflected in outgoing routes until a route refresh is done in BGP.

Conditions:
Changing route-target configs like in the following condition.
l2vpn vfi context test7
vpn id 7
autodiscovery bgp signaling ldp
route-target import 1.2.3.4:7 <<<<<<
route-target export 1.2.3.4:7 <<<<<<
no auto-route-target <<<<<<

Workaround:
Route-target changes are typically done across the network, not just limited to one router. So, it is cautious to do a "clear bgp l2vpn vpls * soft" in routers that will see its effect percolate across the whole network, after all config changes are completed.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu59408
Title:
Gibraltor:post ISSU, reload F2 -fex uplink results in DCBX ACK lost
Description:

Symptom:
On Nexus 7018 switch with software 7.2.0 release, where Fabric Extender N2232PP uplink is connected to the only one F2 Module ports and the host interface connected to the physical host UCS is shared with the storage virtual device (VDC).

If reload of F2 module is performed post module up the host interface connected to the UCS host will see that DCBX PDU ACK gets lost.

Conditions:
Nexus 7000 series switch F2 only one module having uplink of fabric extender FEX N2232PP and host interface of FEX is shared with the storage VDC.

Workaround:
To resolve the issue, in the owner virtual device ( vdc) of nexus 7018 switch ,flap the host interface (HIF) port of Fabric extender FEX, So that the DCBX exchange will get reinitialized.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu24710
Title:
ISSU failed 6.2(10) to 6.2(12) on a non-existing FEX
Description:

Symptom:
ISSU from 6.2(10) to 6.2(12) failed on a no longer existing FEX 110.

This physical device - N2K [fex 110] - was reused in another vdc and had a new fex number there.

Module 10:
Upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
-- SUCCESS


FEX image downloading in progress.
-- SUCCESS


Non-disruptive upgrading.


Module 161 upgrade completed successfully.


Non-disruptive upgrading.
-- SUCCESS


Non-disruptive upgrading.


Module 110 upgrade failed. >>>>>>>>>>>>>>>module 110 is not existing.


Non-disruptive upgrading.
-- FAIL.

Conditions:
Fex was present in one vdc and then later was moved to another VDC with a different fex number.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(12), 7.2(0)D1(0.490)
Known Fixed Releases:
Bug Id:
CSCti40402
Title:
N7K-M132XP: Some frames truncated by 4 bytes when TXing shared-mode int
Description:

Problem Description:
A small percentage of packets (0.0001%) transmitted (tx) on a N7K-M132XP-12 shared-mode interface may be truncated by 4 bytes.

Symptom:
Customers may see the following messages that could indicate malformed packets have been received:

1. %EEM_ACTION-6-INFORM: Packets dropped due to IDS check length consistent on module

Cisco NX-OS supports Intrusion Detection System (IDS) checks that validate IP packets to ensure proper formatting. The length consistent check will drops IP packets where the Ethernet frame size is greater than or equal to the IP packet length (contained in packet header) plus the length of a standard Ethernet header.


2. %STP-2-RECV_BAD_TLV: Received SSTP BPDU with bad TLV on

Cisco NX-OS PVST BPDUs contain a PVID field identifying the vlan instance of the BPDU (located in the last 4 bytes of the PVST BPDU). This message can be reported if there is a native vlan mismatch on a trunk interface, or the error could be reported because the PVID field is missing.


If either message is logged, you should check if the upstream interface is a N7K-M132XP-12 shared-mode interface. Ingress packet captures on the interface/module logging the above messages will allow you to verify the condition of the packet and confirm if you are affected by this bug.


Conditions:
Traffic egressing a N7K-M132XP-12 shared-mode interface may be affected. At high traffic rates >300MB a tiny percentage of frames 0.0001% have 4 bytes removed.

Workaround:
Configure N7K-M132XP-12 ports to 'rate-mode dedicated'.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.0(2a)
Known Fixed Releases:
5.0(5)S6, 5.0(5.1)S0
Bug Id:
CSCus77706
Title:
Phy vpc: Can't bring up 2 orphan ports in I mode
Description:

Symptom:
PXE boot servers won't work with phy. port vPC.

Conditions:
PXE boot servers won't work with phy. port vPC.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(0.390)
Known Fixed Releases:
Bug Id:
CSCus54220
Title:
Service not responding when attaching ACLs to many SVIs at the same time
Description:

Symptom:
This was found when verifying CSCur31394. Service not responding followed by router crash occurs when applying ACLs to many SVIs at the same time. (1000 SVIs and 140 port-channels) Details are shown in the attached log.

Conditions:
This happened when ACL is applied to large number of SVIs.

Workaround:
Apply ACL config in smaller chunks, for example:

interface vlan 1-100
ip access-list X

Further Problem Description:
Is it a duplicate of CSCur31394?
Probably not.
it might be moved to Aclmgr to either reduce the number or increase their memlimit.
It's not the same problem of CSCur31394, other than mem exhaustion.
But at a totally different point in code.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(10)S102, 6.2(12)FT(0.26), 6.2(12)S21, 6.2(12)S25, 6.2(12)S31
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.3), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(3)I1(1.213), 7.0(3)I1(2), 7.0(3)ISH1(2), 7.0(3)ISH1(2.13), 7.1(0)AV(0.74), 7.1(0)ES(0.7)
Bug Id:
CSCut43602
Title:
NXOS/VLAN: VLAN_MGR crash when large size of ranges are used in config
Description:

Symptom:
vlan_mgr continue crash due to heartbeat failure during system boot (or VDC boot)

Conditions:
Problem happen only when string length of the vlan range in vlan configuration is larger than 4096 (including commas and dash in configuration)

Workaround:
Reduce vlan range such that the vlan representation string is size smaller than 4096

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.22), 7.0(3)I1(1.226), 7.0(3)I1(2), 7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)PDB(0.381), 7.2(0)VZD(0.26)
Bug Id:
CSCuu37319
Title:
F3:QoS Policer is inconsistent in policing traffic to the desired rate.
Description:

Symptom:
Traffic policing applied on a vlan is not providing the desired policing rate.
The actual traffic rate through the vlan with policing in place could be higher or lower than the configured limit.

Conditions:
issue seen on F3/6.2.8a

Workaround:
Remove and reapply the service policy on the vlan may work.
if it does not then please reach out to TAC for further troubleshooting

Further Problem Description:
Any subsequent member addition/deletion operation from a VLAN or a port-channel is triggering this problem.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(14)FB(0.62)
Bug Id:
CSCul57133
Title:
N7K: ACLQOS crash observed in aclqos_uf_get_num_vls
Description:

Symptom:
ACLQOS crash was observed and F2E line card was brought down when N7K running 6.2.2 is reloaded.

Conditions:
nq-7e policy is configured on a system that was previously configured with 8e policy.

Workaround:
The issue is fixed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S38, 7.1(0)D1(0.238), 7.1(0)OTT(0.27), 7.1(0)PDB(0.175)
Bug Id:
CSCuh33729
Title:
Memory leak on snmp get: libport_m
Description:

Symptom:
Memory leak is seen on CISCO-ENTITY-SENSOR-MIB.
snmpd is crashed finally by memory leak.

Conditions:
SNMP client try get-request to OID of CISCO-ENTITY-SENSOR-MIB.

Workaround:
Do not use SNMP to poll these OID.

Further Problem Description:
Example configuration for blocking all of CISCO-ENTITY-SENSOR-MIB:
snmp-server community communityString group name
role name name
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.91

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.2(9), 6.1(3)S32, 6.1(4), 6.2(2)S19
Known Fixed Releases:
5.2(9.206)S0, 5.2(9a)E1, 6.1(4.97)S0, 6.1(4a), 6.1(4a)S7, 6.1(5.32)S0, 6.2(2), 6.2(2)S23, 6.2(5.2)S0, 7.0(0)ZD(0.84)
Bug Id:
CSCun34812
Title:
BGP OSH: URIB not triggering notification of next-hop registration
Description:

Symptom:
Next hop for random routes could point to wrong destination interface in hardware forwarding engine

Conditions:
This can happen after BGP restart/crash.

Workaround:
Switchover to standby supervisor

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.1(4a), 7.2(0)MV(0.1)
Known Fixed Releases:
6.2(10), 6.2(10)S9, 6.2(10.5)
Bug Id:
CSCua77416
Title:
Sup reload or Switchover may occur due to Leap second update
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs a N7K SUP1 could have the kernel hit what is known a "livelock" condition under the following circumstances:

a. When the NTP server pushes the update to the N7K NTPd client, which in turn schedules the update to
the Kernel. This push should have happened 24 hours before June 30th, by most NTP servers.

b. When the NTP server actually updates the clock

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
Please note this is an issue for the SUP1 only and the SUP2 is not susceptible to leap second.

On switches configured for NTP and running affected code, following workaround can be used.

1) Remove NTP/PTP configuration on the switch at least two days prior to June 30, 2015 Leap second event date.
2) Add NTP/PTP configuration back on the switch after the Leap second event date(July 1, 2015).

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.1(5)E2, 5.2(5), 6.0(4)
Known Fixed Releases:
5.2(6.16)S0, 5.2(7), 6.1(1)S28, 6.1(1.30)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCuu10841
Title:
NXOS RPM crash due to the CLI "show ip prefix-list | xml"
Description:

Symptom:
%SYSMGR-2-SERVICE_CRASHED: Service "rpm" (PID 4664) hasn't caught signal 11 (core will be saved).

Conditions:
In NXOS code 6.2.(12), running CLI "show ip prefix-list | xml" will cause RPM crash in case the prefix-list is not existing.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E6, 6.2(14)FB(0.57)
Bug Id:
CSCuu30447
Title:
F2/F2E port will keep up even the rx power is -26dBm due to ISP break
Description:

Symptom:
Topology:
N7K-c1(port e4/31)---15454-1===ISP===15454-2------(port4/3)N7K-c2
Software:
both N7K-c1 and N7K-c2 are running with 6.2.12.
module 4 is the N7K-F248XP-25E

Transceiver info:
both e4/31 and e4/3 are installed with GLC-SX-MMD.

Configuration for port e4/31 and e4/3:
interface Ethernet4/31
no shutdown
interface Ethernet4/3
no shutdown

Failure scenario:
if we break the ISP fiber, you might see one of the port e4/31 and e4/3 will be up while the other one is in link failure status.

N7K-3-c1# show int e4/31
Ethernet4/31 is down (Link not connected)
admin state is up, Dedicated Interface
Hardware: 1000/10000 Ethernet, address: 8478.ac56.4645 (bia 8478.ac5a.0fb2)
MTU bytes (CoS values): MTU 1500(0-2,4-7) bytes MTU 2112(3) bytes
BW 10000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is routed
auto-duplex, auto-speed, media type is 1G
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is off
Auto-mdix is turned on
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
EEE (efficient-ethernet) : n/a
Last link flapped 00:26:03
Last clearing of "show interface" counters 02:27:02
8 interface resets
Load-Interval #1: 30 seconds
30 seconds input rate 0 bits/sec, 0 packets/sec
30 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
Load-Interval #2: 5 minute (300 seconds)
300 seconds input rate 0 bits/sec, 0 packets/sec
300 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
L3 in Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
L3 out Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
RX
76 unicast packets 90 multicast packets 0 broadcast packets
90 input packets 25587 bytes
0 jumbo packets 0 storm suppression packets
0 runts 0 giants 0 CRC/FCS 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 0 input discard
0 Rx pause
TX
76 unicast packets 89 multicast packets 0 broadcast packets
89 output packets 19394 bytes
0 jumbo packets
0 output error 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
0 Tx pause

N7K-3-c1# show int e4/31 tran details
Ethernet4/31
transceiver is present
type is 1000base-SX
name is CISCO
part number is FTLF8519P3BNL-CS
revision is A
serial number is FNS17371AE5
nominal bitrate is 1300 MBit/sec
cisco id is --
cisco extended id number is 4
cisco part number is 10-2626-01
cisco product id is GLC-SX-MMD
cisco vendor id is V01
number of lanes 1

SFP Detail Diagnostics Information (internal calibration)
----------------------------------------------------------------------------
Current Alarms Warnings
Measurement High Low High Low
----------------------------------------------------------------------------
Temperature 38.44 C 90.00 C -10.00 C 85.00 C -5.00 C
Voltage 3.30 V 3.59 V 3.00 V 3.50 V 3.09 V
Current 7.13 mA 15.00 mA 1.00 mA 12.00 mA 2.00 mA
Tx Power -5.11 dBm 0.00 dBm -13.49 dBm -2.99 dBm -9.50

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuu21836
Title:
Port was Error disabled, Reason:Port not found when NAM module installed
Description:

Symptom:
If there is a NAM module installed and when a dce (core/edge) interface belonged to an another module flaps, then Port Client process in NAM sends "Port Not found".

This makes the EthPM to put the port to ErrDisable state

Example syslog:
============
ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/41 is down (Error disabled. Reason:Port not found)

Conditions:
NAM module is present on the box
dce (core/edge) interface belonged to an another module flaps

Workaround:
If Customer could afford to reload the NAM module, secure a maintenance window and reload the NAM module.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(9c), 7.2(0)D1(0.392)
Known Fixed Releases:
6.2(14)FB(0.51), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184)
Bug Id:
CSCur12364
Title:
N5K: ISSU fails 5.1(3)Nx(x)/5.2(1)N1(x) -> 6.0(2)Nx(x) -> 7.0(x)N1(1)
Description:

Symptom:
When performing ISSU with this path: 5.1(3)N1(1) / 5.1(3)N1(1a) => 6.0(2)N2(5) => 7.0(3)N1(1)

We can see that 1st step is fine. But when switch is rebooted on the second step for upgrade 6.0(2)N2(5) => 7.0(3)N1(1) switch is crashing at boot at URIB process.

And this error is shown:

show install all status

This is the log of last installation.
Need to perform cleanup of failed upgrade.
Install has failed. Return code 0x40930039 (aborting due to failed upgrade).

Conditions:
Issue seen with these conditions:
- N5K VPC pair with AA FEX
- perform ISSU: 5.1(3)N1(1) -> 6.0(2)N2(5) -> 7.0(3)N1(1) (without reload between after intermediate upgrade)

Workaround:
Issue is not seen when N5K pair booted 6.0(2)N2(5) and configured from clear config.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.1(3)N1(1a), 6.0(2)N2(5), 7.0(3)N1(0.125)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.505), 7.2(0)N1(0.199), 7.2(0)N1(1), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.185), 7.2(0)ZN(0.200)
Bug Id:
CSCun60221
Title:
F2/F3 redirect policy config failure causing aclqos crash
Description:

Symptom:
Aclqos crashes and Linecard goes to failure state.

Conditions:
The problem happens in following scenario,

1. A multi-instance card, like F2/F3 where any redirection feature is configured on multiple instances.
2. There is not enough space in the tcam on one of the instances where the policy will get programmed as well.
3. Atomic update goes through on one of the instance, but fails on next.
4. Non-atomic update is turned on, that also fails on the next instance.
5. During recovery path, aclqos will crash.

Workaround:
Avoid tunnel programing in cases when tcam in any instance is completely full and the programing is likely to fail. Check the utilization of the tcam before programming a tunnel policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(10)S36, 6.2(10)S8, 6.2(6)S10, 6.2(7.19)S0, 6.2(8)ES(0.3)
Known Fixed Releases:
7.1(0)D1(0.243), 7.1(0)NF(0.32), 7.1(0)OTT(0.31), 7.1(0)RTG(0.32), 7.1(0)ZD(0.292)
Bug Id:
CSCut72659
Title:
can not attach rise nam from sup, need to update ssh client version
Description:

Fix Description
=================
As per openssh6.7 code, FIPS-approved ciphers are the following:
aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

For NXOS SSH client, ctr ciphers were not enabled by default on FIPs mode.
Fixed the issue by setting the FIPS mode flag for ctr ciphers.
can not attach to rise nam from sup

N7K-6# attach rise slot 332
Attaching to RISE 332 ...

Username:root
no matching cipher found: client \
aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se server \
aes128-ctr,aes192-ctr,aes256-ctr
N7K-6#

Symptom:
can not attach to rise nam from sup

N7K-6# attach rise slot 332
Attaching to RISE 332 ...

Username:root
no matching cipher found: client \
aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se server \
aes128-ctr,aes192-ctr,aes256-ctr
N7K-6#

Conditions:
The issue occurs only if the server does not support any CBC ciphers.

Workaround:
The workaround is to add the client CBC ciphers in sshd_config/dcos_sshd_config file of the server to re-enable them, so that there will be matching ciphers.
Edit the following files in the server from Linux prompt:
/isan/etc/dcos_sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

/isan/etc/sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(13)FM(0.66), 6.2(13)S12, 7.2(0)D1(0.430), 7.2(0)D1(0.451)
Known Fixed Releases:
6.2(13)S15, 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.487), 7.2(0)D1(0.489), 7.2(0)N1(0.183), 7.2(0)N1(0.185), 7.2(0)N1(0.187), 7.2(0)N1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCtz13307
Title:
kgdb on udld process while peer-link shut no shut continuously
Description:

Symptom:
A Nexus 5500 switch running NX-OS 5.1(3)N1(1) might reload with kernel
panic.

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 543702 usecs after Wed Feb 1 03:27:24 2012
Reason: Kernel Panic
Service:
Version: 5.1(3)N1(1)

Conditions:
Observed on Nexus5K and Nexus7k as well.

Workaround(s):
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.2(4)
Known Fixed Releases:
5.1(3)N2(1a), 5.2(4.83)S0, 6.0(4)S1, 6.1(0.280)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCuu50227
Title:
LISP Mcast: RPF selection broken
Description:

Symptom:
When mrib is learning RPF from LISP and a static null0 route is installed in the rib, whether more or less specific than the map-cache entry, we see mrib install RPF of null. If mrib was listening directly to the rib, we'd expect the rpf to be null0.

Conditions:
Miscommunication between LISP and MRIB

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCui72592
Title:
N7k: F3 module reloads due to Kernel Panic
Description:

N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE/
OK

(2) The output of 'show logging onboard module internal reset-reason' will indicate that the reload reason was due to a kernel panic.

Reset Reason for this card:
Image Version : 6.2(8a)
Reset Reason (LCM): Line card not responding (60) at time Thu Aug 21 20:21:59 2014
Reset Reason (SW): Kernel Panic (19) at time Thu Aug 21 20:19:28 2014
Service (Additional Info): Kernel Panic
Reset Reason (HW): System reset by active sup (by writing to PMFPGA regs) (100) at time Thu Aug 2
1 20:21:59 2014
Last log in OBFL was written at time Thu Aug 21 19:32:39 2014

(3) The output of 'show logging onboard module stack-trace' will provide the kernel stack trace. The top function on this stack will be 'InstructionTLBError47x'. The running process and the rest of the stack are not relevant.

Example:

---------------------------------
Module: 2 stack-trace
---------------------------------

------------------ LOG 01 -------------------

Logging time: Thu Aug 21 20:19:28 2014
1408670368:500000000 process xxxxxxxx (1219), jiffies 0xb79c1f6
Machine Check in kernel mode : Process xxxxxxxxx (1219)
MCSR: 0x0 MCAR: 0x0 MCSSR0: 0xc040100c MCSSR1: 0x21000


STACK

CPU 1 Call Trace:

[]InstructionTLBError47x+0x6c/0xa8 <------------- HERE



Symptom:N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(5.41)S0, 6.2(5.41)S1, 6.2(5.41)S2, 6.2(5.41)S3, 6.2(5.7), 6.2(8a), 7.0(0.33)S0, 7.1(0)D1(0.169)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 6.2(10)S9, 6.2(10.5), 6.2(6b)E2, 6.2(8)E4, 6.2(8)E5, 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCun86081
Title:
7.X Ping to SVI fails with CMD/SGT encapsulation
Description:

Symptom:
Pings to a nexus 5000 series switch SVI may fail when the packet is coming with a CMD/SGT tag

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.1(0)D1(0.237), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.183)
Bug Id:
CSCuu53383
Title:
Multicast IP packet with Unicast dmac is punted to the control plane
Description:

Symptom:
High RX rate on the inband interface due to IP multicast packets.

Conditions:
IP multicast packet (224.0.0.0/4) with a unicast destination mac address of which the Nexus 7000 ingress L3 interface owns.

Workaround:
None.

Further Problem Description:
This traffic should be dropped in hardware by the parser as it violates packet format standards. This traffic should not be sent to the control plane for processing.

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(8a), 6.2(8b)
Known Fixed Releases:
Bug Id:
CSCus22805
Title:
N7K-SUP2/E: Compact Flash Failure or Unable to Save Configuration
Description:

Symptom:The following symptoms have been seen:
- Compact flash diagnostic failure
- Unable to perform a 'copy run start'

To display the current status of the RAID devices, please run the following commands:

switch# show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xf0

Where x is the standby supervisor slot number:

switch# slot x show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xd2

Last number in the RAID data indicate the number of disks failed:

0xf0 ==>> No failures reported
0xe1 ==>> Primary flash failed
0xd2 ==>> Alternate (or mirror) flash failed
0xc3 ==>> Both primary and alternate failed

Conditions:- N7K-SUP2 or N7K-SUP2E
- N77k-SUP2 and N77K-SUP2E are NOT effected
- Several months or years of uptime

Workaround:While system can operate with only one flash device, its highly recommended to recover and add the removed flash back into RAID configuration. Second flash device can also get into this condition over time triggering the read-only mode.

Flash Recovery Tool:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz is available to be downloaded from Cisco support site. This works as a custom plug-in that can be run using the 'load' CLI.

- To run the tool, download and copy it to bootflash/volatile/slot0 and run the load command.
- Tool automatically fixes any single flash errors when present.
- If a standby available, it will copy itself to standby and run there.
- No side effects if there are no errors reported at the time.
- Tool will not attempt dual flash recovery either on active or standby.

Single flash failure on active or standby:
Systems running with single flash failure can be repaired while in service using the flash recovery tool.

Dual flash failure on the standby:
This is a recoverable situation by reloading the standby and making sure that the flashes are healthy once it comes back online. Flash recovery tool should be run after reload to put both flashes back into service.

Dual flash failures on Active:
This is not a recoverable situation, unless there is at least one working flash on the standby. Otherwise, switch need to be reloaded during next maintenance window. If the standby is healthy a switchover can be attempted and then recover the old active. Latest running configurations need to be saved external to the switch to be restored after reload. Flash recovery tool should be run after reload to make sure flashes back into service.

Additional verification steps and further information can be found in the Read Me file with the recovery tool.

More Info:Fix is available in 6.2(14), 7.2(x), and later.

Each Nexus 7000 Supervisor board are equipped with 2 identical eUSB flash devices in a RAID1 mirror configuration. Called primary and mirror, they together provide for non-volatile repositories for storing boot images, startup configuration and other persistent application data.

Over years in service, one of these devices may get disconnected from the USB bus. This causes the RAID software to drop the affected device to be removed from its configuration. System still can function normally with the remaining working device.

However, if the second device also experiences similar issue and drops out of the RAID array, boot flash devices will re-mounted as read-only preventing configuration copying. Even though there is no operational impact on systems running in this state, a reload of the affected supervisor is needed to recover from this situation. Moreover, the latest running configuration may be lost in the event of a power outage.



Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.1(5a), 6.2(12)
Known Fixed Releases:
6.2(14)FB(0.26), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(122), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.456), 7.2(0)N1(0.152), 7.2(0)N1(1), 7.2(0)PDB(0.395)
Bug Id:
CSCug47483
Title:
'bgp' process crashes due to missing heartbeats
Description:

Symptom:
Both core file and syslog show that BGP was killed by sysmgr due to missing heartbeats. . A very rare situation was hit and messed up the linked-list, and it's difficult to find out why BGP got into it based on the current information. Instrumented image is needed to debug the root cause and/or verify some treatment.
Conditions:
core file
Workaround:
none
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.2(1.83)S4
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.29)S0, 6.2(1.118)S0, 6.2(2)
Bug Id:
CSCug90667
Title:
Traffic Blackhole after "wccp redirect exclude-in" configuration
Description:

Symptom:
After updating configuration of "wccp redirect exclude-in" traffic from WCCP device passing through Nexus 7000 maybe black-holed.

Conditions:
This happens when using redirect exclude-in feature to enable WCCP bypass.

Workaround:
Reload the linecards handling the reconfigured interface or vlan.

Further Problem Description:
The failing HW programming remains in effect also after the relevant configuration command is removed.

Please also note that if Customer is running a fix version and upgrade was done via ISSU and line card was not related, we are still impacted, so verify the upgrade process and see if ISSU was done, and if yes, then use the same workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
5.1(4), 5.2(9)
Known Fixed Releases:
5.2(3a)E2, 5.2(9.195)S0, 6.1(4.97)S0, 6.1(4a), 6.1(4a)S4, 6.1(5.32)S0, 6.2(6)
Bug Id:
CSCut72641
Title:
L2BFD: some L2BFD links are not coming up after ascii replay
Description:

Symptom:
After write erase, reload and applying ascii configuration containing per-link port-channels with 2 members, only the 1st member will be added to the port-channel session. The second member will not get bootstrapped onto the port-channel session. This will seen randomly in some port-channels. On the peer, the same port-channel will have 2 members - the first in UP state and the second in DOWN state.

Conditions:
Problem is seen only when you do write-erase, reload and apply ascii config. The problem is timing dependent and is random.

Workaround:
Doing a shut and no-shut of the port-channel will recover it from the problematic state.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(0.456)
Known Fixed Releases:
Bug Id:
CSCuu58619
Title:
IPFIB vrf dependency database doesnt cleanup on VDC reload
Description:

Symptom:
Traffic drops can be seen for multicast and/or unicast flows.

Conditions:
In the presence of Vinci configurations, when a VDC is reloaded, we can get into this condition of unicast/multicast routes not getting updated in certain asic instances

Workaround:
reloading of the affected LC.

Further Problem Description:
n/a

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCtx46109
Title:
Clipper KLM Interrupt Throttling trigger MTM FE timer expired.
Description:

Kernel Loadable Module may permanently mask interrupts for F2 modules which are consider as spurious interrupt event.

Symptom:
Certain commands like "show mac address-table" will time out without displaying any output.
The message "service not responding" will be displayed.

The following errors may also be seen in the logs:
%MTM-SLOT-0-FE_TIMER_EXPIRED: FE timer expired for fe !

Conditions:
Seen on N7k with F2 modules

Workaround(s):
Reload the module which are effected. After that upgrade the code to 6.0.3 to overcome this issue.

Do not perform an ISSU to a fixed release without reloading the affected modules first.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
6.0(1), 6.0(1)E1, 6.0(2)
Known Fixed Releases:
6.0(3)S1, 6.1(0.193)S0, 6.1(0.205)S4, 6.1(0.208)S0
Bug Id:
CSCuu59455
Title:
ports were error-disabled sequence timeout with MTS_SAP_ETH_PORT_SEC
Description:

Symptom:
Interfaces were error disabled due to sequence timeout communicating with MTS_SAP_ETH_PORT_SEC

Conditions:
interfaces enabled port-security and this problem was found in 6.2(10).

Workaround:
disable port-security feature on affected interface.

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
30-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu57637
Title:
FCOE traffic is dropped at FEX FPC if storage vdc is created after ISSU
Description:

Symptom:
CRC giant-drops(ingress_giant_drops) seen on fex FPC ports on any qos template change after issu.

Conditions:
after issu if you do any qos template change and if you have fex in your setup, you will see MTU mismatch resuling in giant/CRC drops in the ingress of FPC ports.

Workaround:
configure/change qos template before issu.
or
shut/no-shut on fex FPC ports to reconfigure the mtu

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
7.2(0)D1(0.514)
Known Fixed Releases:
Bug Id:
CSCuu59433
Title:
ports were error-disabled sequence timeout with MTS_SAP_ETH_PORT_SEC
Description:

Symptom:
Interfaces were error disabled due to sequence timeout communicating with MTS_SAP_ETH_PORT_SEC

Conditions:
interfaces enabled port-security and this problem was found in 6.2(10).

Workaround:
disable port-security feature on affected interface.

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
30-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu55233
Title:
Mac addresses not learnt after Port-security violation stops
Description:

Symptom:
On a Nexus 7700 mac addresses are not learnt on an interface after port-security violation happens and then stops.

Conditions:
This issue has currently been observed on Nexus 7700 with F3 module running on 6.2(12).
Issue only happens after max. mac address violation occurs and then stops.
shut/no-shut of interface does NOT recover mac-learning.

Workaround:
Default-interface and reconfiguring interface fixes the problem.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuu59466
Title:
ports were error-disabled sequence timeout with MTS_SAP_ETH_PORT_SEC
Description:

Symptom:
Interfaces were error disabled due to sequence timeout communicating with MTS_SAP_ETH_PORT_SEC

Conditions:
interfaces enabled port-security and this problem was found in 6.2(10).

Workaround:
disable port-security feature on affected interface.

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
30-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCut08818
Title:
SNMPD crash with role with only deny OIDs
Description:

Symptom:
If the SNMP community name is associated with a role which has only a deny OID will cause SMNP to unexpectedly write out a core file when polled with a SNMP bulk request. If multiple SNMP crashes occur then the SUP will switchover and the SNMP configuration will be lost.

Conditions:
The N7K is configured with SNMP and a role which only denies OIDs.

Workaround:
For the configured role add in a permit OID.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.492), 7.2(0)N1(0.187), 7.2(0)N1(1), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.174), 7.2(0)ZN(0.189), 7.2(1)N1(0.1)
Bug Id:
CSCuu38580
Title:
7.2.0.506.S2 UI - congestion on F2 LC after vdc reload
Description:

Symptom:
Applicable to all F2 (Clipper/Clipper CR) based cards.
Congestion seen on ingress traffic on some/all of the ports. This is because, frames are stuck in the IB caused due to bad acos to ccos table.

To confirm if the issue is due to bad table, please compare the acos to ccos mapping in the below commands

show hardware internal qengine inst x vq acos_ccos_4cl/acos_ccos_8cl
compare it with the ccos mapping in
show hardware internal qengine inst x table fr_dcx4q_oq_ccos/fr_dcx8q_oq_ccos

if the acos to ccos mapping are different, then the Credit Loop logic will affected and frames will be stuck in the IB resulting in congestion on the ingress ports.

Conditions:
Do ISSU and then VDC reload (VDC containing ports from F2 LC).

This is because, the shadow memory in our Qengine driver was corrupted during ISSU and VDC reload causes a shadow refresh to the HW.

Workaround:
Workaround1(preferred as less traffic interrupt):
Copy the Applied network QoS Template:
1) find the applied tempalte
show policy-map system

Type network-qos policy-maps
============================
policy-map type network-qos default-nq-8e-policy template 8e
class type network-qos c-nq-8e
match cos 0-7
congestion-control tail-drop threshold burst-optimized
mtu 1500

2) Copy:
qos copy policy-map type network-qos default-nq-8e-policy prefix Copy_

3) Apply Ciopy to trigger reporgramming:
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos Copy_nq-8e

4) Optional: Reapply back the previous template
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos default-nq-8e-policy

Note: Applicable for any networkqos template. During Template Change traffic on All VDC which contain F cards will be disrupted for less than a Second

Workaround2: reload the LC after ISSU or
Workaround3: reload the LC after VDC reload

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)ZD(0.202)
Bug Id:
CSCus55589
Title:
NX-OS IS-IS Net Command
Description:

Symptom:
n7k-3a-wnlb-dcore-3a# conf t
Enter configuration commands, one per line. End with CNTL/Z.
n7k-3a-wnlb-dcore-3a(config)# router isis core
n7k-3a-wnlb-dcore-3a(config-router)# net 47.0124.0010.6301.0a00.0508.1103.2230.4100
^
% Invalid command at '^' marker.
n7k-3a-wnlb-dcore-3a(config-router)#

Conditions:
always present

Workaround:
adding 00 - but this is not accepted as it changes the area ID

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(12)E4, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.440), 7.2(0)FM(0.3), 7.2(0)PDB(0.379), 7.2(0)RTG(0.96), 7.2(0)VOF(0.2)
Bug Id:
CSCus16438
Title:
sh ip/ipv6 eigrp neigh cmd takes time to execute on router eigrp shutdow
Description:

Symptom:
CLI do not take affect when EIGRP shutdown command is executed

Conditions:
Seen in scaled setup where there are >50000 routes

Workaround:
After a few minutes, EIGRP processing is complete and CLIs can be executed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)ZD(0.6)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.408), 7.2(0)FM(0.3), 7.2(0)PDB(0.353), 7.2(0)VZD(0.6), 7.2(0)ZD(0.94), 7.2(0)ZN(0.114)
Bug Id:
CSCur33396
Title:
OTV cannot match extended vlan range
Description:

Symptom:
OTV extended vlan range cannot go above 3967 in NX-OS 6.2 releases even when the reserved vlan range is re-allocated from 3968-4095

Conditions:
NX-OS 6.2 release software running on Nexus 7000.

Workaround:
Potentially vlan translation on Layer2 link can be used as a workaround but it may or may not work depending on RSTP or MST.

Further Problem Description:
OTV works fine with the extended vlan range in NX-OS releases 6.0 and 6.1.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.359), 7.2(0)RTG(0.65), 7.2(0)VZD(0.6), 7.2(0)ZD(0.103), 7.2(0)ZN(0.122)
Bug Id:
CSCut68515
Title:
SSTE: multiple port-profile cores with 7.2(0)D1(0.456) on autoconfig
Description:

$$IGNORE

Symptom:
port-profile crash & switch hap reset.

Conditions:
auto config

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(0.456), 7.2(0)D1(0.490)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.499), 7.2(0)D1(0.506), 7.2(0)D1(0.509), 7.2(0)ZD(0.188)
Bug Id:
CSCut19573
Title:
some vpc portchannels are not up upon RAX config
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger. Extented fix for CSCus90226

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(12)E2
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.11), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.442), 7.2(0)FM(0.3), 7.2(0)PDB(0.368), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus94535
Title:
SNMP crash during OIR of transceiver and walk ciscoEntitySensorMIB
Description:

Symptom:
SNMP may crash on a Nexus 7000 switch during OIR of 1G, 10G, 40G DOM capable transceiver.

Conditions:
Process snmpd dumps core when the following steps are met:
1. SNMP walk CISCO-ENTITY-SENSOR-MIB when a DOM capable transceiver is inserted.
2. Remove the DOM capable transceiver
3. SNMP walk CISCO-ENTITY-SENSOR-MIB again

Workaround:
1. Insert any transceiver back to the port
2. Once snmpd crashed, the newly started snmpd will not have the issue
unless the steps described in "Conditions" happen again.
3. Disable SNMP walk for CISCO-ENTITY-SENSOR-MIB

Further Problem Description:
Problem exists in 6.2(12) only.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
6.2(14)FB(0.3), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.352), 7.2(0)VZD(0.6)
Bug Id:
CSCus62432
Title:
RP not treating itself as rp for remote source traffic.
Description:

Symptom:
If the RP is rebooted, it's discarding PIM register messages from itself and the other PE:

2015 Jan 20 14:13:30.092655 pim: [8115] (default-base) Received Register from 10.1.1.18 for (10.1.1.18/32, 239.255.254.0/32)
2015 Jan 20 14:13:30.092702 pim: [8115] (default-base) We are not RP for group 239.255.254.0, message discarded

Conditions:
RP router reboot.

Workaround:
1. Restart pim on the RP router
2. Remove and reconfigure "ip pim rp-address <>" in global configuration on the RP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(9)S0
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3)
Bug Id:
CSCus68473
Title:
urib crash after running "clear ip route vrf xxx *"
Description:

Symptom:
N7K running 6.2(8E10) crash on the urib process after clearing all routes in the VRF rib.

Conditions:
Clearing all routes in the RIB when there is high route count

Workaround:
Clear individual routes, instead of the entire table using *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(8)E10
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)D1(0.451), 7.2(0)FM(0.3), 7.2(0)N1(0.146), 7.2(0)N1(1), 7.2(0)PDB(0.387), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCuo90184
Title:
NXOS/OTV: ARP ACL Applies to all VLAN without Arp inspection Filter
Description:

Symptom:
ARP packets will not processed and all ARP packets will be dropped due to block ACL due to the following ARP access-list,

N7k-TEST(config)# arp access-list OTV-BLOCK-HSRP-ARP
N7k-TEST(config-arp-acl)# 10 deny ip any mac 0000.0c07.ac00 ffff.ffff.ff00
N7k-TEST(config-arp-acl)# 20 deny ip any mac 0000.0c9f.f000 ffff.ffff.f000
N7k-TEST(config-arp-acl)# 30 permit ip any mac any

without calling the arp inspection filter(ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan), the ARP access-list will be applied to all vlans and block ARP.

Conditions:
The issue is seen after the ip arp inspection filter command is applied twice on the same vlan and then if we try to remove the config.
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
no ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10

Workaround:
Reload ASCII

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(2a), 6.2(8)S8, 6.2(8)S9
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.7), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.350), 7.2(0)VZD(0.6)
Bug Id:
CSCut23832
Title:
Netconf output of show bgp statistics miss information
Description:

Symptom:
Netconf/XML output of "show bgp statistics" does not match its regular CLI output, which contains a lot of internal BGP output.

Conditions:
No conditions.

Workaround:
No workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.446), 7.2(0)FM(0.3), 7.2(0)N1(0.143)
Bug Id:
CSCur54182
Title:
NX-OS Tacacs Daemon hap reset
Description:

<B>
Symptom:</B>
Device configured for TACACS may face crash due to "Tacacs
Daemon hap reset"
Reason: Reset triggered due to HA policy of Reset
Service: Tacacs Daemon hap reset

<B>
Conditions:</B>
On a switch running NX-OS 6.2(8a) or later, if a very long command is
given with remote authorization using TACACS enabled, a crash is seen in TACACS. Because
TACACS expects the strings to be of size 255, it is unable to handle strings greater than 255.

<B>
Workaround:</B>
None.


More Info:


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.4/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2014-8013 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.41), 6.0(2)A6(1), 6.0(2)U6(0.41), 6.0(2)U6(1), 6.1(2)I3(2.15), 6.1(2)I3(3), 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.12), 7.0(0)BZ(0.46)
Bug Id:
CSCur22627
Title:
6210::Seeing EIGRP flap after SSO with authentication
Description:

Symptom:
EIGRP neighborship flap after SSO due to Auth failure on the peer

Conditions:
EIGRP authentication is configured on the interface

Workaround:
Disable authentication

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10)S98, 6.2(10)S99, 7.1(0)ZD(0.95)
Known Fixed Releases:
6.2(14)FB(0.44), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.392), 7.2(0)D1(0.397)
Bug Id:
CSCus78697
Title:
N7K wrong source-interface selected for IPv6 logging after device reload
Description:

Symptom:
logging source-interface seems to be non-working with v6 syslog server on N7K after device reload even the loggingsource-interface pointing to the loopback0 interface

Conditions:
After device reload

Workaround:
reapply logging source-interface loopback0

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.1(5), 6.2(10)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.443), 7.2(0)FM(0.3), 7.2(0)PDB(0.379), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6), 7.2(0)ZD(0.126), 7.2(0)ZN(0.144)
Bug Id:
CSCur22182
Title:
SNMP walk aborts as BGP MIB OID does not increase with BGP VPNv4
Description:

Symptom:
snmpwalk aborts when performing a snmpwalk on CISCO-BGP4-MIB, when any bgp peer is configured with both VPNv4 Unicast AF(afi=1, safi=128), IPv6 Unicast AF (afi=2, safi=1) and/or IPv6 Multicast AF(afi=2, safi=2). Snmpwalk on the following tables are affected and will not be queried completely and aborts when querying VPNv4 unicast AF of any peer with above mentioned configuration:

- cbgpPeerAddrFamilyTable
- cbgpPeerAddrFamilyPrefixTable
- cbgpPeer2AddrFamilyTable
- cbgpPeer2AddrFamilyPrefixTable

This issue will abort snmpwalk on cbgpPeer (1.3.6.1.4.1.9.9.187.1.2) or any oid tree that includes these tables.

Example:
.1.3.6.1.4.1.9.9.187.1.2.7.1.3.1.4.19.0.101.6.2.1 = IPv6 Unicast
.1.3.6.1.4.1.9.9.187.1.2.7.1.3.1.4.19.0.101.6.1.128 = VPNv4 Unicast


Conditions:
Occurs when any bgp peer is configured with both VPNv4 Unicast AF(afi=1, safi=128), IPv6 Unicast AF (afi=2, safi=1) and/or IPv6 Multicast AF(afi=2, safi=2)

Workaround:
Since this issue breaks the snmpwalk to cbgpPeer and the other oid trees which queries the tables in CISCO-BGP4-MIB, snmpwalks can work only with oid trees which do not include CISCO-BGP4-MIB, under this configuration/scenario without aborting. The CISCO-BGP4-MIB tables can be queried separately to get the information from the unaffected tables. Further, snmpget is not affected by this issue and will provide the correct outputs but can only be used to query specific oids.

Further Problem Description:
Snmpwalk oids have to be queried incrementally, but in this case, IPv6 unicast and IPv6 multicast AFs are sent queries before VPNv4 unicast AF which has a lower oid value, this aborts the snmpwalk query.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10)S97
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.12), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.359)
Bug Id:
CSCus67594
Title:
7.2.0.D1.0.386.S2::UIN-1::Seeing eigrp-3 core after LC reload trigger
Description:

Symptom:
EIGRP crash after LC reload

Conditions:
EIGRP v6 neighborship exists

Workaround:
No workarounds exist

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(0.386), 7.2(0)D1(0.437)
Known Fixed Releases:
6.2(14)FB(0.44), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.437), 7.2(0)D1(0.444), 7.2(0)D1(0.449)
Bug Id:
CSCut03089
Title:
After ISSU from 6.2.10 to 6.2.12 Optical Modules doesn't show DOM info
Description:

Symptom:
On N7K running 6.2.12 code, some of the DWDM optical modules will not show DOM info.

Example Output.

switch-core# sh int e1/25 trans de
Returning from 1
unknown error 0x40290003

Ethernet1/25
transceiver is present
type is DWDM-SFP10G-35.04
name is CISCO-FUJITSU
part number is FIM35060/201W53
revision is 0002
serial number is FLJ1718K016
nominal bitrate is 11100 MBit/sec
Link length supported for 9/125um fiber is 80 km
cisco id is --
cisco extended id number is 4
cisco part number is 10-2779-01
cisco product id is DWDM-SFP10G-35.04
cisco vendor id is V01
switch-core#

Conditions:
This behavior is seen only after ISSU from 6.2.10 to 6.2.12 on DWDM optical modules.
This behavior is not seen while performing traditional code upgrade from 6.2.10 to 6.2.12

Workaround:
Problem is not seen after traditional code upgrade from 6.2.10 to 6.2.12

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)FM(0.3), 7.2(0)PDB(0.365), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus49797
Title:
Inter-Op BGP issue between N7K and juniper device
Description:

Symptom:
6PE BGP peering establishes. After that, Juniper device sends a notification message saying that Cisco Nexus sent a non-negotiated IPV6 unicast update packet and tears down the BGP session.

Conditions:
6PE BGP session between N7k and Juniper device.

Workaround:
No known workarounds.

Further Problem Description:
The IPv6 unicast packets sent by NX-OS are due to backwards compatibility with legacy IOS devices.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(8b)
Known Fixed Releases:
6.2(12)E4, 6.2(14)FB(0.19), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(3)I1(1.211), 7.0(3)I1(2), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3)
Bug Id:
CSCut01933
Title:
default route not withdrawn after removing "default originate"
Description:

Symptom:
Default route will not be withdrawn from vpnv4 table.

Conditions:
Multiple [no] default-originate command toggles being configured in addess-family vpnv4. More especifically, the following steps are the minimum required to hit the issue considering the vpnv4 unicast address-family is clean of any configurations:

1. default-information originate always rd route-target
2. no default-information originate always rd route-target
3. default-information originate always rd route-target
4. no default-information originate always rd route-target

Step 3 must be executed quickly after number 2. In this case, after executing step 4, the issue will be seen.

Workaround:
Restart BGP.

Further Problem Description:
The problem will only happen if you reconfigure default-originate quickly after previously removing it, such that there was no time to completely clean up the default-route from the vpnv4 table.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.2(0)D1(0.451), 7.2(0)FM(0.3), 7.2(0)N1(1), 7.2(0)PDB(0.387), 7.2(0)RTG(0.119), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus74176
Title:
boot loop w/ 'no logging logfile' in config w/ power outage/reload VDC3
Description:

Symptom:
core dump generated in boot loop when sudden power outage such as unplug power cord. soft reload worked fine. issue can be recreated with reload VDC 3

Conditions:
suddenly lost power when the command 'no logging logfile' is in the configuration

Workaround:
Remove 'no logging logfile' from the configuration

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10), 7.2(0)D1(0.430)
Known Fixed Releases:
6.2(14)FB(0.40), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.443), 7.2(0)FM(0.3), 7.2(0)PDB(0.379), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus42054
Title:
after eigrp restart on CE, some neighbors get struck in waiting for init
Description:

Symptom:
EIGRP neighbors are stuck in waiting for init

Conditions:
After EIGRP process restart when the GR helper peer does not have any routes to be advertised to the peer undergoing restart

Workaround:
Clear the neighborship by flapping the interface or using clear command

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)ZN(99.85)
Known Fixed Releases:
11.1(0.168), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.397), 7.2(0)D1(0.404), 7.2(0)D1(0.408), 7.2(0)FM(0.3), 7.2(0)PDB(0.353)
Bug Id:
CSCus42725
Title:
Breakout ports have 40G latency buffer carving values instead of 10G val
Description:

Symptom:
Nexus 7ks running vPCs and utilizing breakout cables on the N7K-F312FQ-25 modules will hit this failure condition after some time(a relatively short period of time). The result is all vPCs will show a downed state because of the vPC peer link being down.

This issue is caused because of the misconfiguration of the latency buffers. We can see for the breakout ports has 40G latency buffer carving values, instead of the 10G breakout latency values. This results in corrupted packets and sometimes packet truncation.

Conditions:
Nexus 7ks running vPCs and utilizing breakout cables on the N7K-F312FQ-25 modules.

Workaround:
No current work-around.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S25, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.359)
Bug Id:
CSCur97641
Title:
MPLS QoS:Show policy is showing Pkt count 0 where byte count is proper
Description:

Symptom:
Sometimes when egress policy-map is applied to a VLAN, the "packets" count will not increment in "show policy map vlan"


N7K-1# sh policy-map vlan 100
***SNIP***
Class-map (qos): test (match-any)

Aggregate forwarded :
0 packets 82687055970 bytes <----bytes increment but packets don't

Conditions:
egress policy-map applied on vlan

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(8a), 7.1(0)D1(0.328)
Known Fixed Releases:
7.1(0)AV(0.38), 7.2(0)D1(0.402), 7.2(0)OTT(0.5), 7.2(0)PDB(0.332)
Bug Id:
CSCut13324
Title:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:
Description:

Symptom:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Conditions:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Workaround:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Further Problem Description:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.442), 7.2(0)FM(0.3), 7.2(0)PDB(0.368), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus51150
Title:
Some created MSDP SA cache data are not updated immediately
Description:

Symptom:
When new mcast traffics are coming into N7K side(MSDP RP), new created S,G entries should be transmitted to MSDP peer immediately, however, some of entries of SA cache data are not transmitted to peer device.
The remained entries are updated at next MSDP update period of time(maximum 60seconds later).

Conditions:
Running MSDP RP
many S,G entries are created within very short period of time at once

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(1), 6.1(2)I3(3.74), 6.1(2)I3(4), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7)
Bug Id:
CSCur32209
Title:
LDP should not remove/free entries while walking the xos radix tree
Description:

Symptom:
LDP can encounter memory corruption or process crash.

Conditions:
Because of the nature of the bug, the problem can happen at any point, unexpectedly.

Workaround:
No workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.1(0)ZD(0.341)
Known Fixed Releases:
6.2(10)E5, 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)ES(0.7), 7.1(0)EV(0.125), 7.1(0)OTT(0.41), 7.1(0)PDB(0.317), 7.2(0)D1(0.356)
Bug Id:
CSCut25648
Title:
N7K - SNMP - large 180,224 memory leak in vlan_mgr w mibwalk ciscoVtpMIB
Description:

Symptom:
Mem leak when running the below snmp cli's

1.) snmpwalk -v2c -c private plat17 ciscoVtpMIB
2.) snmpbulkwalk -v2c -c private -Cr50 plat17 ciscoVtpMIB

Conditions:
Happens only when there are access port and the above 2 snmp cli's are run

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(0.424)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.443), 7.2(0)FM(0.3), 7.2(0)RTG(0.129)
Bug Id:
CSCum04858
Title:
Mem Leak observed on running Routing APP
Description:

Symptom:
Memory leak is observed when adding routes on NXOS routers using onePK route add apis

Conditions:
Memory leak is seen when programming routes using onePK api when an application connects & disconnects several times and does route add during each session. Memory leak does not seem to increase depending on the number of routes programmed during one application session.

Workaround:
Minimize application connection flaps to reduce memory leak.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.0(2)N3(1), 7.0(0.9)CA
Known Fixed Releases:
6.0(2)N3(0.89), 6.0(2)N3(1), 6.0(2)U2(0.10), 6.0(2)U2(1a), 6.0(2)U2(2), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)KM(0.37), 7.0(0)N1(0.438), 7.0(0)N1(1)
Bug Id:
CSCuq96822
Title:
After ISSU 6.1.4 to 6.2.8 crash due to heartbeat failure on scale
Description:

This is a scale config on an interface

Symptom:
When 4k vlans are assigned to an interface, the heartbeat fails as it is looping and it will crash due to timeout

Conditions:
Same as above

Workaround:
Assign about 1000 vlans at a time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(10)S77
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)PDB(0.359), 7.2(0)RTG(0.70), 7.2(0)VZD(0.6), 7.2(0)ZD(0.103)
Bug Id:
CSCur26436
Title:
Nexus 7000 & MDS 9000 evaluation of SSLv3 vulnerability (POODLE)
Description:

Symptom:
Nexus 7000 and MDS 9000 switches include a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

Conditions:
A POODLE exploit requires a man in the middle attack between the switch (the LDAP client utilising the SSL client) and the LDAP server. Nexus 7000 and MDS 9000 both contain an SSL client with SSLv3 support. The client supports fallback to SSLv3 if negotiation with TLS 1.0 fails.

The LDAP SSL feature may be configured to utilise this client. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP feature is enabled.

Workaround:
Disable the LDAP SSL feature with the ldap-server host ip_address enable-ssl command.

Further Problem Description:
All previously released versions of SAN-OS and NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

MDS:
NX-OS 5.2 release - first fixed release is 5.2(8f), released on 18 Feb 2015
NX-OS 6.2 releases:
- 6.2(9b), released on 01 Apr 2015
- 6.2(11b), released on 02 Mar 2015
- 6.2(13), projected to be available in Q3 2015

There are no fixed MDS NX-OS releases that are FICON certified yet.

Nexus 7000:
NX-OS 6.2 release - first fixed release is 6.2(12), released on 03 Feb 2015

There will not be any fixed releases for software trains that are past the end of software maintenance support.

The current fix is for the NX-OS SSL client to refuse to fall back to SSLv3. If the server tries to negotiate to SSLv3, the client will now terminate the SSL session. SSLv3 support will be completely removed in future releases.

A Cisco Security Advisory has been published to document this vulnerability at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(7), 6.2(8)
Known Fixed Releases:
5.2(8f), 5.2(8f)S3, 6.2(11b), 6.2(11b)S1, 6.2(11c)S2, 6.2(12), 6.2(12)S24, 6.2(12.4)S0, 6.2(13)FM(0.65), 6.2(9b)
Bug Id:
CSCus90226
Title:
6.2.12: Route programming inconsistency between instances on a LC
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.4), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.430), 7.2(0)FM(0.3), 7.2(0)PDB(0.358), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus53498
Title:
lc_port_channel crashed, when storage vdc reloaded on 383 S1
Description:

Symptom:
Storage VDC reload after doing a "write erase" of the start-up configuration can cause crash in PCM client on line card.

Conditions:
Clearing of the start-up config and a subsequent reload of the storage VDC causes the port channels in the VDC to be removed. While the port channels are being removed , it may cause a failure to delete the port-channel from the PSS. This is because the Ethernet Port Channel type in N7k wasn't properly handled in the Line card. The following Debug log indicates this failure:

lc_port_channel_pss_delete_data: unknown type being stored into pss 22 for ifindex

Port channel ifindex can be read from the show port-channel internal info interface port-channel , command.

When this failure occurs its likely that some stale members and port-channel will be left behind in the Line card memory with the same ifindex. When subsequently, the configuration is restored for the storage VDC for the same port-channel and member, it finds the stale port-channel member pointing to an existing port as indicated in the error logs in symptoms. It then tries to delete this stale member from the stale port channel causing the crash.

Workaround:
Restarting the port-channel process or reloading the line card will clear out the stale interfaces, after the reload of the VDC with empty config. This will ensure that there's no crash when the VDC subsequently reloads with config.

Further Problem Description:
The lc_port_channel process on the line card throws segmentation violation exception aborts while the VDC is reloading with the following error messages on the console: (Note: here Slot Number is marked with a X)

%LC_PORT_CHANNEL-SLOTX-3-LC_PORT_CHANNEL_MBR_PC_INFO_INCORRECT: member pc info for interface EthernetX/Y pointing to old pc
%SYSMGR-SLOTX-2-SERVICE_CRASHED: Service "lc_port_channel" (PID X) hasn't caught signal 11 (core will be saved).

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(0.383)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)BA(0.12), 7.2(0)D1(0.409), 7.2(0)FM(0.3), 7.2(0)PDB(0.353), 7.2(0)RTG(0.113)
Bug Id:
CSCus50427
Title:
7.2.0: eigrp crashes when trying to print mem-stats
Description:

Symptom:
EIGRP crashes when printing mem-stats

Conditions:
When printing mem-stats or running the CLI as part of show tech

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(0.381), 7.2(0)D1(0.386), 7.2(0)D1(0.395), 7.2(0)D1(0.397), 7.2(0)ZD(0.27)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.397), 7.2(0)D1(0.404), 7.2(0)D1(0.409)
Bug Id:
CSCuq46564
Title:
SSTE:LDP core observed after process restart LDP with 7.1(0)D1(0.232)
Description:



Symptom:

LDP crashes due to heartbeat failure following a proc restart of LDP.

Conditions:

Happens when user does a proc restart of LDP.

Workaround:

No workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.1(0)D1(0.232)
Known Fixed Releases:
6.2(10)E5, 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)OTT(0.45), 7.2(0)D1(0.417), 7.2(0)FM(0.3), 7.2(0)OTT(0.4)
Bug Id:
CSCuu60878
Title:
IFTMC cores with pvlan configuration secondary configs
Description:

Symptom:
IFTMC cores with pvlan configuration secondary configs

Conditions:
IFTMC cores with pvlan configuration secondary configs

Workaround:
IFTMC cores with pvlan configuration secondary configs

Further Problem Description:
IFTMC cores with pvlan configuration secondary configs

Status:
Open
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCul11180
Title:
BGP session is closed due to fd read error
Description:

Symptom:
BGP flapping on N7K running 6.2.2 due to fd read error

sh bgp internal event-history events |inc "Read error from peer"
[8682]: [8693]: (default) EVT: Read error from peer : No buffer space available

N7K#show ip bgp neighbors show

Connections established 1000, dropped 999<<<<<<
Last reset by us 00:00:18, due to fd read error<<<<<<<<<
Reset error value 64
Last reset by peer never, due to No error

Conditions:
Issue is seen in Nexus7000 with 6.2 releases., what conditions to see this ?

Workaround:
Reload the VDC or Switch.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
6.2(0)PF(0.296), 6.2(5.41)S2
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.5)S0, 6.2(7.7)S0, 6.2(8), 6.2(8)BF(0.24), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.0(0)N1(0.514), 7.0(0)N1(1), 7.0(0)ZD(0.217)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论