Cisco Blog » The Platform

2016年3月1日星期二

Cisco Notification Alert -Cisco Cloud Service Router CSR 1000v-01-Mar-2016 17:49 GMT

 

 

 

 

 

 

 


Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
NBAR2 Protocol Packs
Release Version:
17.0.0
Alert Type:
New File
File Name:
pp-adv-csr1000v-155-3.S2-23-17.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 17.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
17-FEB-2016
Find additional information in Software Downloads index.

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.10.7S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.10.07.S.153-3.S7-ext.SPA.bin
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - BIN

File Release Date:
22-FEB-2016
Alert Type:
New File
File Name:
csr1000v-universalk9.03.10.07.S.153-3.S7-ext.iso
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - ISO

File Release Date:
22-FEB-2016
Alert Type:
New File
File Name:
csr1000v-universalk9.03.10.07.S.153-3.S7-ext-C1-M2560-N3-DS8.ova
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - OVA

File Release Date:
22-FEB-2016

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.16.2S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.16.02.S.155-3.S2-ext.qcow2
File Description:

CSR1000v Universal Image with Crypto QCOW2

File Release Date:
17-FEB-2016

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.13.5S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.13.05.S.154-3.S5-ext.ova
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - OVA

File Release Date:
02-FEB-2016
Alert Type:
New File
File Name:
csr1000v-universalk9.03.13.05.S.154-3.S5-ext.SPA.bin
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - BIN

File Release Date:
02-FEB-2016
Alert Type:
New File
File Name:
csr1000v-universalk9.03.13.05.S.154-3.S5-ext.iso
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - ISO

File Release Date:
02-FEB-2016

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Known Bugs - Cloud Services Router 1000V Series

Alert Type:
New
Bug Id:
CSCux36581
Title:
CSR1000v: part of MMA punt records lost and not accounted on LSMPI intf
Status:
Open
Severity:
2 Severe
Description:

Symptom:
CSR1000v keeps export "%PERF_MONITOR_RESOURCE-1-RM_SET: RESOURCE EVENT RAISE" for each several export intervals, and it complains that performance monitor punt records get lost unexpectedly.

Conditions:
PfRV3 IWAN deployment with CSR1000v as branch MC/BR, and when there are about 100 traffic-classes, and 60 channels, with 40% datapath utilization.

Workaround:
No known workaround yet.

Further Problem Description:

Last Modified:
24-FEB-2016
Known Affected Releases:
15.5(3)S0.2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut11544
Title:
AN: ANR crashes (Segmentation fault) while coming UP after save & reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
AN Registrar crashes after save & reload.

Conditions:
Save & Reload

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
06-FEB-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
15.4(3)S3, 15.5(2.16)S, 15.5(3)S, 15.6(0.17)PI30e, 15.6(0.19)T, 15.6(1)SN, 15.6(1.9)T0.1, 15.6(1.9)T0.2
Alert Type:
Updated *
Bug Id:
CSCuq12347
Title:
CSR1000v/ASR1001-x - Memory leak in CPP HA due to Throughput Monitor
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A CSR1000v router may experience a memory leak. This will generally first manifest itself as syslog warnings:

Jan 01 02:34:56.789: %PLATFORM-4-ELEMENT_WARNING: F0: smand: RP/0: Committed Memory value 97% exceeds warning level 95%

The cpp_ha_top_level_server process is found to be consuming a slowly incrementing quantity of memory.

CSR1000v#show platform software process list RP active sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 15401 15105 15401 S 20 2352599040
fman_fp_image 20166 19684 20166 S 20 1558065152
cpp_cp_svr 18962 18243 18962 S 20 1271418880
cpp_ha_top_leve 19612 19071 19612 S 20 1180131328 <-----------
fman_rp 14687 13973 14687 S 20 876077056
qfp-ucode-csr 20659 20224 20659 S 20 764862464

"CPP HA", which is a subset of the cpp_ha_top_level_server process, shows a large difference between "Allocations" and "Frees" which increases over time.

CSR1000v#show platform software memory qfp-ha-server qfp active | begin CPP HA
Module: CPP HA
allocated: 507327220, requested: 501167108, overhead: 6160112 <-------------- "Allocated" slowly increases over time
Allocations: 781851, failed: 0, frees: 396844 <-------------- Note large delta between "Allocations" and "frees"

Conditions:
Platform throughput monitor is enabled.

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: enabled <---------------

Workaround:
For the CSR 1000V:

Once memory is leaked, the device must be reloaded to recover it. In order to stop any additional memory from leaking, disable platform throughput monitor. This is not service impacting, but the device will no longer produce a syslog alert should the aggregate device throughput approach the licensed limit.

CSR1000V#set platform hardware throughput-monitor disable

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: disabled <---------------

Note that this command will not persist across a reload, so it will be necessary to re-apply the command each time the device is rebooted.
________________________________________

For the ASR1001-X:

Once memory is leaked, the device must be reloaded to recover it. No long-term workaround is available for the ASR1001-X platform. The ability to disable throughput monitoring was added to the ASR1001-X in 03.13.03.S, where this defect is already fixed.

Further Problem Description:

Last Modified:
11-FEB-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S1, 15.5(1)S
Alert Type:
Updated *
Bug Id:
CSCuw70580
Title:
csr 1000v reboot when configuring firewall
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CSR1000v randomly reboots (generate crash dump)when firewall related configuration pushing from NSO

Conditions:
when configuring firewall from NSO

Workaround:
N/A

Further Problem Description:

Last Modified:
05-FEB-2016
Known Affected Releases:
15.3TPI
Known Fixed Releases: *
15.4(3)S5
Alert Type:
Updated *
Bug Id:
CSCuv87599
Title:
Manually entered IKEv2 crypto profile not NVgen-ed with AN active
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Manually entered IKEv2 crypto profile not NVgen-ed

Conditions:
When autonomic in enabled.

Workaround:
N/A

Further Problem Description:

Last Modified:
06-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(3)S0.14, 15.5(3)S1, 15.5(3)S1a, 15.6(0.20)S, 15.6(1)SN, 16.2(1)
Alert Type:
Updated *
Bug Id:
CSCuo39508
Title:
ACL source port operator returned as "TWOBYTE" instead of "RANGE"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Getter API for ACE returns wrong value for source port operator.

Conditions:
When Getter API get_acl_by_name() is called to retrieve source port operator for an ace.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
05-FEB-2016
Known Affected Releases:
15.2(3)S
Known Fixed Releases: *
15.1(2)IC66.2, 15.2(1)IC273.56, 15.2(1)ICA4.30, 15.2(2)DB101.101, 15.2(2)DB101.112, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.14)T
Alert Type:
Updated *
Bug Id:
CSCuw96928
Title:
CSR1000V: unexpected memupgrade log when boots
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
unexpected log when csr1kv boots:

*Oct 28 23:39:16.794: memupgrade reg_invoke_iosxe_license_register_feature: VXE_MEM_LIC_STR

Conditions:
boot csr1kv

Workaround:
N/A

Further Problem Description:

Last Modified:
05-FEB-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
16.2(0.281), 16.3(0.78)
Alert Type:
Updated *
Bug Id:
CSCux98955
Title:
XE317/NAT: traceback when ping from inside
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
traceback is seen when ping

*Jan 26 21:40:58.766: %CPPOSLIB-3-ERROR_NOTIFY: F0: cpp_cp: cpp_cp encountered an error -Traceback= 1#7971869cb4a9d29ea23b3df153908208 errmsg:7FA017AA9000+121D cpp_common_os:7FA01AF3B000+DA3C cpp_common_os:7FA01AF3B000+1B5AE cpp_nat_svr_lib:7FA02498D000+50792 cpp_nat_svr_lib:7FA02498D000+46BE3 cpp_nat_svr_lib:7FA02498D000+11DE3 cpp_nat_svr_lib:7FA02498D000+1DF50 cpp_common_os:7FA01AF3B000+18526 cpp_nat_svr_lib:7FA02498D000+4F50A cpp_common_os:7FA01AF3B000+18526 cpp_common_os:7FA01AF3B000+18526 cpp_fm_clien

Traceback summary
-----------------
% 0x7fa017aaa21d : errmsg
% 0x7fa01af48a3c : cpp_vbuginf_flags_error
% 0x7fa01af565ae : cpp_buginf_flags_internal_error
% 0x7fa0249dd792 : cpp_nat_ea_cfm_mapid_free
% 0x7fa0249d3be3 : cpp_nat_ea_dyn_db_cleanup
% 0x7fa02499ede3 : cpp_nat_ea_remove_all_in_cg_list
% 0x7fa0249aaf50 : cpp_nat_ea_cg_edit_cb
% 0x7fa01af53526 : cpp_aem_exec_next_sub_task
% 0x7fa0249dc50a : cpp_nat_ea_class_bind_cb
% 0x7fa01af53526 : cpp_aem_exec_next_sub_task

Conditions:
PAT

Workaround:
N/A

Further Problem Description:

Last Modified:
06-FEB-2016
Known Affected Releases:
15.6(1.17)T
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut96108
Title:
CSR1000v Fails to Read Startup-config / Boots with Default Config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A CSR 1000v may boot with defaulted configurations because the startup-config fails to be properly read.

Conditions:
May be seen in Amazon AWS deployments and other scenarios. The bug is caused by a timing issue that would cause the CSR to try to read the startup-config before the device is ready. The bug fix adds a small delay in reading the startup-config to resolve this scenario.

Workaround:
Reloading the CSR 1000v several times may allow the startup-config to be read properly.

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.4(3), 15.5(1)S
Known Fixed Releases: *
15.4(3)S4.4, 15.4(3)S5, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1, 15.5(3)S1a, 15.5(3)SN, 15.6(0.2)S
Alert Type:
Updated *
Bug Id:
CSCuw82377
Title:
Polaris_dev: Two license throughput msg seen at bootup
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:





Extra/wrong log message seen regarding "throughput level change" during CSR boot-up:
VXE_THROUGHPUT-6-LEVEL: Throughput level has been set to 100 kbps

Conditions:



Issue occurs only in 16.2 release

Workaround:


The actual throughput level of the CSR is not impacted and continues to operate at the installed license's throughput level, as seen in show platform hardware throughput level

Further Problem Description:












Last Modified:
05-FEB-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases: *
16.2(0.280), 16.3(0.75)
Alert Type:
Updated *
Bug Id:
CSCuj28656
Title:
Netflow option table config missing on v9 flow exporter after reboot
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If a netflow v9 flow exporter is configured with option tables data export, after the config is saved and the router rebooted, the option table config will be missing from the running-config. The output below shows that the option tables config is intact on the startup-config, but running-config does not show the options tables config after the reload:
csr#sh startup-config | b exporter
flow exporter netflow-v9
destination 192.168.10.37 vrf mgmt-netflow-export
transport udp 3000
option interface-table
option application-table
!
--- snip ---

csr#
csr#sh run flow exporter
Current configuration:
!
flow exporter netflow-v9
destination 192.168.10.37 vrf mgmt-netflow-export
transport udp 3000
!
csr#sh flow exporter
Flow Exporter netflow-v9:
Description: User defined
Export protocol: NetFlow Version 9
Transport Configuration:
Destination IP address: 192.168.10.37
VRF label: mgmt-netflow-export
Source IP address: 1.1.1.1
Transport Protocol: UDP
Destination Port: 3000
Source Port: 61263
DSCP: 0x0
TTL: 255
Output Features: Used


csr#

During the boot up of the router, the following error message is seen on the console:
% Flow Exporter: failed to add 'interface-table' option to exporter 'netflow-v9'.

The above error message is only logged to the console during bootup, but not to syslog.

This only happen for netflow v9 exporter; IPFIX exporter retains the option table config after reload. Option table is not supported for netflow v5.

Conditions:
Option table config for netflow v9 exporter.

Workaround:
None.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
15.3(3)S, 15.4(1)S
Known Fixed Releases: *
15.3(3)S1.3, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.3(3)S3, 15.3(3)S4, 15.4(0.19)S0.8, 15.4(0.26)T0.6, 15.4(1)CG, 15.4(1)CG1
Alert Type:
Updated *
Bug Id:
CSCuo83946
Title:
HSECK9 missing in new >1G licenses
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
With Cisco IOS-XE 15.4(2)S, when adv/prem 2.5G, 5G or 10G license is installed, no more than 150 IPSec tunnels could be established.

Conditions:

Workaround:
No workaround available

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
15.4(1)S, 15.4(3)S
Known Fixed Releases:
15.4(2)S0.11, 15.4(2)S1, 15.4(2)S2, 15.4(2.17)S0.7, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1, 15.5(0.7)S
Alert Type:
Updated *
Bug Id:
CSCux35824
Title:
CLI for restAPI application name is not fixed for AAA server
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cisco ACS server needs a hardcoded session name to allow AAA access. This configuration of REST API allows only a single session at a time so the session name can be hardcoded as restApp. Existing multiple sessions with unique session names is still supported and the default configuration

Conditions:
All

Workaround:
None

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S2.1, 15.6(0.22)S0.13, 16.2(0.281), 16.3(0.78)
Alert Type:
New
Bug Id:
CSCux82092
Title:
QOS tracebacks seen on CSR1000v when bringing up 8K PPP sessions
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
The system fails to bring up all the sessions and continuously spews error messages of this sort:

Sep 2 10:56:44.823: %IOSXE-3-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:000 TS:00000006460690163668 %QOS-3-INVALID_STAT_QID: Stat Queuing error for interface EVSI71, qid 496 vqid 56755043 -Traceback=1#dc41c50b3b07281cadec8fe48038c0d5 80d388d7 80d339d7 80d2de17 80d2e1f1 80d3c390 80c367db 80989a32 80c94953
Sep 2 10:56:44.823: %IOSXE-3-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:000 TS:00000006460690169971 %QOS-3-INVALID_STATS_INFO: Invalid address e831c690 detected -Traceback=1#dc41c50b3b07281cadec8fe48038c0d5 80d388d7 80d339d7 80d2de17 80d2e1f1 80d3c390 80c367ef 80989a32 80c94953
Sep 2 10:57:28.576: %IOSXE-3-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:000 TS:00000006504443940688 %QOS-3-INVALID_CLASS_QID: Class Queuing error for interface GigabitEthernet3.139, qid 240 vqid 16777473 -Traceback=1#dc41c50b3b07281cadec8fe48038c0d5 80d388d7 80d339d7 80d2de17 80d2e1f1 80d3c390 80d1296b 80be281e e74d6e88
Sep 2 10:57:28.576: %IOSXE-3-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:000 TS:00000006504443947185 %QOS-3-VALID_DEFAULT_QID: Using Default Queue for interface GigabitEthernet3.139, qid 92 vqid 92 -Traceback=1#dc41c50b3b07281cadec8fe48038c0d5 80d388d7 80d339d7 80d2de17 80d2e1f1 80d3c390 80d12aa4 80be281e e74d6e88

Conditions:
The occurs when the intermediate scheduling nodes that sit above the leaf nodes (class queues) is depleted.
Workaround:
Avoid creating more than 1000 tunnels with HQF configuration on each.
More Info:












Last Modified:
02-FEB-2016
Known Affected Releases:
15.6(1.3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux16492
Title:
XE317/KVM:wrong performance stats in "show platform software system all"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show platform software system all" over KVM

Router#show platform software system all
Processor Details
=================
Number of Processors : 2
Processor : 1 - 2
vendor_id : GenuineIntel
cpu MHz : 2660.070
cache size : 4096 KB
Crypto Supported : No
model name : QEMU Virtual CPU version 2.0.0

Memory Details
==============
Physical Memory : 4194304KB

VNIC Details
============
Name Mac AddressStatus
Platform MTU
GigabitEthernet1 5254.00f4.5102 UP9238
GigabitEthernet2 5254.001a.6ccb DOWN9238
GigabitEthernet3 5254.005c.1c36 DOWN9238

Hypervisor Details
===================
Manufacturer: QEMU
Product Name: Standard PC (i440FX + PIIX, 1996)
Serial Number: Not Specified
UUID: 40BA1E7C-09F4-B0D1-D8A8-76B31F59842D

Performance Stats
==================

Error in retrieving vmguest stats
Router#

Conditions:
kvm

Workaround:
n/a

Further Problem Description:

Last Modified:
02-FEB-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.6(0.22)S0.16

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论