| |
Bug Id: | CSCtz27137 |
Title: | Installing S640 Signature Package Causes Crash Loop |
|
Description: | Symptoms: An upgrade to the S639 or later signature package may cause a Cisco IOS router to crash.
Conditions: This symptom is observed in a Cisco 1841, 1941, and 2911 router running one of the following Cisco IOS versions:
- Cisco IOS Release 12.4(24)T4 - Cisco IOS Release 15.0(1)M4 - Cisco IOS Release 15.0(1)M8 - Cisco IOS Release 15.2(3)T
Workaround: Update the signature package to anything less than S639. If already updated with any package larger than or equal to S639, follow the below steps to disable IPS:
- Access the router via the console. - Enter break sequence to access ROMmon mode. - Change the config-register value to 0x2412. - Boot the router to bypass the startup-configuration. - Configure the basic IP parameters. - TFTP a modified configuration to the router's running-configuration with Cisco IOS IPS disabled. - Reset the config-register to 0x2102. - Enter the write memory command and reload. |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 03-JUN-2015 |
|
Known Affected Releases: | 12.4(24)T4, 15.0(1)M3, 15.0(1)M4, 15.0(1)M8, 15.2(3)T |
|
Known Fixed Releases: | 12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T8, 12.4(24)T9, 15.0(1)M10, 15.0(1)M8.11, 15.0(1)M9, 15.1(3)T4, 15.1(4)GC1 |
|
|
| |
| |
Bug Id: | CSCuh36583 |
Title: | ISRG2 - DSP Crash due to Backplane Switch Lockup During T1 Errors |
|
Description: | Symptom: An ISR G2 router using a PVDM3 may experience simultaneous failure on several DSPs. Eg:
DSPRM-3-DSPALARMINFO Device (0/1) Host GIGE ack timeout DSPRM-3-DSPALARMINFO DSP (0/7) Host keepalive timeout
Conditions: May be seen when T1 errors cause the router's backplane switch to hang, preventing proper function of the DSPs.
Workaround: Attempt to fix any T1 clock source misconfig.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.1(4)M4 |
|
Known Fixed Releases: | 15.1(4)M10, 15.4(3)M3, 15.5(2.10)T |
|
|
| |
| |
Bug Id: | CSCud06180 |
Title: | CWAN_SHIM/SDK crash EHWIC-4G-LTE-V |
|
Description: | Symptoms: Periodically, the Cisco EHWIC-4G-LTE-V would stop passing traffic. The user would execute "test cellular 0/1/0 mod-power-cycle" to restore service.
Conditions: This symptom is observed during temporary network outage.
Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 09-JUN-2015 |
|
Known Affected Releases: | 15.1(4)M4, 15.1(4)M5 |
|
Known Fixed Releases: | 15.1(4)M5.14, 15.1(4)M6, 15.2(1.2.6)PI22, 15.2(4)M2.4, 15.2(4)M3, 15.2(4)XB11, 15.3(1)T0.1, 15.3(1)T1, 15.3(1.11)T, 15.3(1.13.1)PIH21 |
|
|
| |
| |
Bug Id: | CSCub14145 |
Title: | ISM-VPN Spurious Error command and counters show wrong values. |
|
Description: | Symptoms: A Cisco ISR-G2 with VPN-ISM logs output similar to:
!! Cannot find ISM-VPN counters struct for flowid: 0x44000084
Conditions: The symptom is observed when using a VPN-ISM in an IPsec deployment with images from the Cisco IOS 15.2 train.
Workaround: There is no workaround.
Further Problem Description: The issue is cosmetic in nature while the VPN-ISM is queried for counters (e.g.: show commands). |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 15-JUN-2015 |
|
Known Affected Releases: | 15.2T |
|
Known Fixed Releases: | 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M2.6, 15.2(4)M3, 15.2(4)M4, 15.2(4)M5, 15.2(4)M6, 15.2(4)M6a |
|
|
| |
| |
Bug Id: | CSCup43333 |
Title: | Crash due to avl_search |
|
Description: | Symptom: We see the avl_search function could be included in the main traceback of the crash or in previous tracebacks. Sometimes we can see CPU Hogs.
Conditions: This symptom is observed when ISM is used.
Workaround: There is no workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M6 |
|
Known Fixed Releases: | 15.2(4)M8, 15.3(3)M4, 15.4(3)M2.2, 15.4(3)M3, 15.5(0.9)T, 15.5(1.2.1a)GB |
|
|
| |
| |
Bug Id: | CSCud96075 |
Title: | IOS crash due to DSP crash when Transcoder is activated |
|
Description: | Symptom: A router running Cisco IOS Release 15.2(4)M2 will reload with a bus error soon after the DSP reloads when there is a live transcoding session.
Conditions: This symptom is observed with Cisco IOS Release 15.2(4)M2.
Workaround: There is no workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M2 |
|
Known Fixed Releases: | 15.1(4)M7.4, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.4, 15.2(4)M4, 15.2(4)M5 |
|
|
| |
| |
Bug Id: | CSCut86321 |
Title: | Tx hang on 2951`s GigabitEthernet IF |
|
Description: | Symptom: 2951`s Gi interface is hung. the output rate drop to 0 and the output queue got stuck at 40/40.
Conditions: - hardware is PQ3_TSEC - with duplex half - Output queue got 40/40
Workaround: "shut/no shut" the IF
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus91250 |
Title: | Basic call in Conference block scenarios fail with 15.5(1.23)T0.2 |
|
Description: | Symptom: Basic call in conference block scenarios fail
Conditions: Issue is observed in 15.5(1.23)T0.2
Workaround: No workaround
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 17-JUN-2015 |
|
Known Affected Releases: | 15.5(1.18)S0.10, 15.5(1.23)T, 15.5(2)T, 15.5(2.2)S, 15.5(2.2)T, 15.5(3)S |
|
Known Fixed Releases: | 15.4(2)S2.19, 15.4(2)S3, 15.4(2)T2.1, 15.4(2)T3, 15.5(1.18)S0.11, 15.5(1.23)T0.3, 15.5(2)S, 15.5(2)T, 15.5(2.12)S, 15.5(2.4)T |
|
|
| |
| |
Bug Id: | CSCtz51773 |
Title: | ISM-VPN crashing due to an assert in IPSec classification code |
|
Description: | Symptoms: High CPU seen on routers equipped with an ISM-VPN module. The output of show process cpu shows that the process "REVT Background" is using around 70% of the CPU cycles.
The ISM-VPN module is not visible in show diag, and the output of show crypto engine configuration indicates that the module status is DEAD.
Conditions: The symptom is observed with an ISM VPN with a few IPSec tunnels. This can take between a day and a week.
Workaround 1: Reload the router.
Workaround 2: For a longer-run workaround and if the traffic volume is not too high, switch to the onboard crypto hardware using the configuration no crypto engine slot 0.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.2(1)T1, 15.2(2)T1, 15.2(3)T1 |
|
Known Fixed Releases: | 15.2(1)T2.13, 15.2(1.2.3)PI22, 15.2(2)T1.12, 15.2(3.16)M0.4, 15.2(4)XB10, 15.3(0.5)T |
|
|
| |
| |
Bug Id: | CSCus56080 |
Title: | Memory leak in using ISM-VPN module at pse2_ge_rx_interrupt |
|
Description: | Symptom: While passing multicas traffic with ISM-VPN module enabled, we can see a memory leak in the I/O pool Specifically Normal buffers
Normal buffers, 1548 bytes (total 10257, permanent 3840): 0 in free list (128 min, 4096 max allowed) 13709 hits, 6843 misses, 0 trims, 6417 created 4510 failures (5750 no memory)
Conditions: Multicast traffic ISM-VPN module enabled
Workaround: TBD
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 22-JUN-2015 |
|
Known Affected Releases: | 15.5(1)T |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuj86253 |
Title: | 2900 w/ Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's drops 50% multicast |
|
Description: | Symptom: Cisco 2900 with Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's (one per SVI) drops 50% multicast on pre-existing and working L2TPv3 sessions when attempting to establish a new L2TPv3 tunnel to a new destination that is not yet reachable/configured. Conditions: Cisco 2900 with Multiple EHWIC-4ESG-P's
pseudowire-class L2TP encapsulation l2tpv3 interworking ethernet ip local interface Loopback100 ! interface GigabitEthernet0/0/0 switchport access vlan 101 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/1 switchport access vlan 102 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/2 switchport access vlan 103 no ip address shutdown spanning-tree portfast ! interface Vlan101 no ip address xconnect 192.168.1.181 101 pw-class L2TP ! interface Vlan102 no ip address xconnect 192.168.1.182 102 pw-class L2TP ! interface Vlan103 no ip address xconnect 192.168.1.183 103 pw-class L2TP Workaround: Physically cable EHWIC-4ESG-P to the onboard c2900 GigE interface and tie L2TPv3 tunnels to dot1q sub interfaces:
pseudowire-class L2TP encapsulation l2tpv3 interworking ethernet ip local interface Loopback100 ! interface GigabitEthernet0/1 no ip address ! interface GigabitEthernet0/1.101 encapsulation dot1Q 101 xconnect 192.168.255.2 101 pw-class L2TP ! interface GigabitEthernet0/1.102 encapsulation dot1Q 102 xconnect 192.168.255.3 102 pw-class L2TP ! interface GigabitEthernet0/1.103 encapsulation dot1Q 103 xconnect 192.168.255.4 104 pw-class L2TP ! interface GigabitEthernet0/0/0 switchport access vlan 101 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/1 switchport access vlan 102 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/2 switchport access vlan 103 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/3 switchport mode trunk no ip address
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M2, 15.4(2)T1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut45177 |
Title: | CWS HTTPs traffic fails to load on ISR configured with NVI |
|
Description: | Symptom:When Cloud Web Security and NAT Virtual Interface are configured on the same box, CWS will fail to load HTTPS traffic on any client that is subject to redirection to CWS. HTTP traffic will display correctly in the browser as expected.
NAT Virtual Interfaces are required to be used in VRF-lite configurations if the inside and outside interfaces are both in two different VRFs.
Conditions:CWS and NVI (NAT Virtual Interface) need to be configured together on the ISR.
Workaround:Use traditonal Nat to identify the NAT inside and outside interface in VRF-Lite setups where only one interface is in a VRF and another interface is in global.
If when using VRF-Lite and both interfaces are in different VRFs then there is no workarounds at this time.
More Info:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.4(3)M, 15.5(1)T |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu95643 |
Title: | CISCO2921/K9 with Call Manager XML client crashes |
|
Description: | Symptom: You can see cmapp_xml_get_attr_value as the latest trace in crashinfo. TLB (load or instruction fetch) exception is reported:
15:10:10 UTC Mon Jun 8 2015: TLB (load or instruction fetch) exception, CPU signal 10, PC = 0x351F58BC
Conditions: Call manager configured Other conditions are under investigation
Workaround: None
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.4(3) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq36627 |
Title: | WAAS Express:Failed to create SSL session. (no available resources) |
|
Description: | Symptom: WAAS-X SSL error message seen when SSL-AO is enabled Failed to create SSL session. (no available resources)
Conditions: The problem is seen if there are too many Aborts of the SSL session when packets are in flight.
Workaround: Disable SSL-AO and only use TDL
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.2(4.0.1) |
|
Known Fixed Releases: | 12.2(33)CX, 12.2(33)IRC, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16, 12.2(33)SB17, 12.2(33)SB4, 12.2(33)SB6a, 12.2(33)SB6aa |
|
|
| |
| |
Bug Id: | CSCuh29880 |
Title: | CPUHOG watchdog crash shdsl_efm background |
|
Description: | Symptom: Device crashes with similar logs:
SYS-2-WATCHDOG Process aborted on watchdog timeout, process = shdsl_efm background
-Traceback= 0x48A7DB8z 0x48A8B94z 0x48C54F8z 0x48A3C0Cz 0x48A35D4z 0x48A37D0z 0x4899EC8z 0x489A7ECz 0x4C4157Cz 0x4C268F0z
Conditions: hwic-4shdsl-e
Workaround: Unknown
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuv01607 |
Title: | Invalid spi, Attempt to use contiguous buffer as scattered, Full queue |
|
Description: | Symptom: Traceback & buffer error:
%CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, prot=50, spi=0x410D57F3(1091393523), srcaddr=Y.Y.Y.Y, input interface=GigabitEthernet0/1 Jun 16 12:31:00.744: %SYS-2-BADBUFFER: Attempt to use contiguous buffer as scattered src, ptr= 3DE47CB4, pool= 3DE47634 -Process= "", ipl= 1 -Traceback= 300BE43Cz 37116CF8z 37108568z 30402C18z 304037E0z 30406CE4z 37108BDCz 300C04ECz 300BFE30z 3002A23Cz 30F4D278z
Interfaces associated with tunnels get wedged shortly - input queue full.
Conditions:
Workaround:
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.5(1)T |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu98467 |
Title: | FNF stops working after a few hours |
|
Description: | Symptom: The FNF stops working after few hours
Conditions: FNF configured on the router
Workaround: Reload the router or re-apply the FNF config.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.3(0.1) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut55649 |
Title: | Bender c2951 router crashes with 15.5(2.6)T Image |
|
Description: | Symptom: When router loaded with "c2951-universalk9-mz.SSA.155-2.6.T" image, In the process of session Embedded service engine we are getting traceback with immediate continous reloads.
Conditions: When router loaded with "c2951-universalk9-mz.SSA.155-2.6.T" image, In the process of session Embedded service engine we are getting traceback with immediate continous reloads.
Workaround: unknown
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.5(2.14)T, 15.5(2.6)T |
|
Known Fixed Releases: | 15.5(2)T1, 15.5(2.25)M0.1, 15.6(0.1)T |
|
|
| |
| |
Bug Id: | CSCuv07808 |
Title: | BSTUN async-generic combining input frames |
|
Description: | Symptom: BSTUN asyn-generic is combining input frames that are properly seperated by 100ms gap.
Conditions: Applies to BSTUN async-generic only
Workaround: None.
Further Problem Description: None.
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus38556 |
Title: | ISM-VPN: DTLS Traffic fails when crypto map is applied on SSLVPN intf |
|
Description: | Symptom: IOS Router with ISM module stops pass-through DTLS traffic from Anyconnect client, when crypto map is applied on SSLVPN interface. We can ping Router's interfaces but could not ping anything connected on LAN side
Conditions: DTLS enabled Anyconnect VPN client connected IOS Router with ISM module and crypto map is applied on SSLVPN interface
Workaround: Disable DTLS
Example:
Config t webvpn context GLOBAL gateway PERTH_AIRPORT domain GLOBAL ! ssl authenticate verify all ! policy group GLOBAL no svc dtls exit
OR
Disable ISM module
no crypto engine slot 0
OR
Remove crypto map from SSL VPN interface
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M6, 15.5(1)T |
|
Known Fixed Releases: | 15.3(3)M5.2, 15.5(1.20)T, 15.5(1.21)PI28a |
|
|
| |
| |
Bug Id: | CSCus95226 |
Title: | Compact Flash corruption due to call-home directory being created |
|
Description: | Symptom: A cisco 2911 router fails to boot due to a corrupted compact flash. When the problem occurs, the following messages will be displayed on the console:
*Jan 31 09:42:22.419: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:15189 Chunk:0x21A03EC4 Name:FDNODE -Process= "Init", ipl= 4, pid= 3 -Traceback= 3051B2C4z 3051B538z 30522B54z 30521E0Cz 3052C320z 305356ECz 3210D498z 3210EC18z 32108E60z 30BC73E8z 30BC94F0z 3069E94Cz 3069FD34z 3067E734z 302F49ACz 3067F430z
Removing the compact flash and reading it on a PC shows a directory called "call-home" that is corrupted (the directory size is 1.2gb even though the actual size of the flash is only 256mb). Manually deleting the "call-home" directory results in the router correctly booting from the flash
Conditions:
Workaround: Manually delete the call-home directory on the flash then reinstall the flash card in the router.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.3(3)M4 |
|
Known Fixed Releases: | 15.3(3)M5.2, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S2.10, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2)S0.3, 15.5(2)T0.1 |
|
|
| |
| |
Bug Id: | CSCuu73697 |
Title: | ISM drops fragmented traffic if virtual-reassembly configured |
|
Description: | Symptom: ISM-VPN drops fragmented IPsec packets when decrypting
Conditions: o ISM-VPN module enabled o ip virtual-reassembly enabled on the crypto interface
Workaround: o disable virtual-reassembly o disable ISM module
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M, 15.3(3)M4 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq99888 |
Title: | 2900/ISM-VPN: IPv6 Egress ACL Intermittently Misclassifies ESP packets |
|
Description: | Symptom: Intermittent misclassification of IPv6 ESP traffic in egress interface access-lists
Conditions: This issue was seen when running debug images with the fix for CSCuq17550 based on 15.2(4)M_latest
Workaround: n/a
Further Problem Description: n/a
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.4(3)M |
|
Known Fixed Releases: | 15.3(3)M5.2, 15.4(3)M0.4, 15.4(3)M1, 15.5(1.10.1)GB, 15.5(1.6)T |
|
|
| |
| |
Bug Id: | CSCuu33351 |
Title: | Input queue Wedge due pool_grow_cache |
|
Description: | Symptom: Input queue Wedge due pool_grow_cache
Conditions: NA
Workaround: Router Reload
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M6 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuj06856 |
Title: | Memory leak in Normal Buffers @if_hdlc32_rx_isr |
|
Description: | Symptom: Memory leak of normal buffers.
Conditions: Cisco 2900 series routers with a VWIC2-xMFT-T1/E1 installed, with TDM clocking (clock source line or clock source internal)
Workaround: To configure the command "clock source line independent' under channel-group.
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M4.3 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur70959 |
Title: | Memory leak @ sipContentObjPvtSetBody |
|
Description: | Symptom: Memory leak on processor pool occurs when SIP phones register via a register pool (e.g. voice register pool 60) using TCP.
The leak is reflected as the "CCSIP_SPI_CONTROL" and "Dialog Manager" processes:
Head Total(b) Used(b) Free(b) Lowest(b) Largest(b) Processor 129E0FDC 1844461672 926816936 917644736 695680236 641408232 I/O 3D000000 50331648 32294840 18036808 17988704 15203772
PID TTY Allocated Freed Holding Getbufs Retbufs Process 307 0 635342772 306024464 320536812 0 0 Dialog Manager 384 0 107120680 107902680 221925672 0 0 CCSIP_SPI_CONTRO 0 0 347781848 163431556 176266660 0 0 *Init* 0 0 0 0 142589620 0 0 *MallocLite*
PC Total Count Name 0x0897CE54 198191196 90251 CCSIP_SPI_CONTROL 0x088E2864 81210960 90268 CCSIP_SPI_CONTROL 0x088E2824 81207048 90256 Dialog Manager 0x0469D474 48614232 39588 *Packet Header*
Conditions: Registration method must be via a voice registration pool with TCP.
Workaround: Use UDP in the pools to register SIP phones.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M6.1 |
|
Known Fixed Releases: | 15.2(4)M8, 15.3(3)M5.2, 15.3(3)S5.8, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.11, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1 |
|
|
| |
没有评论:
发表评论