Cisco Blog » The Platform

2016年5月1日星期日

Cisco Notification Alert -ASR 1000 Series Router-01-May-2016 16:54 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - ASR 1000 Series Aggregation Services Routers

Title:
End-of-Sale and End-of-Life Announcement for the Cisco IOS XE 16.2.1
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco IOS XE 16.2.1. The last day to order the affected product(s) is October 11, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
14-APR-2016
Title:
End-of-Sale and End-of-Life Announcement for the Cisco ASR 1000 Series 5- and 10-Gbps Embedded Services Processors, ASR 1000 Series Route Processor (RP1), ASR 1000 Series 10Gbps SPA Interface Processor, and ASR 1001 and 1002 Routers
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco ASR 1000 Series 5- and 10-Gbps Embedded Services Processors, ASR 1000 Series Route Processor (RP1), ASR 1000 Series 10Gbps SPA Interface Processor, and ASR 1001 and 1002 Routers. The last day to order the affected product(s) is April 29, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.

Date:
22-APR-2016

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1000rpx86-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-HX Router
Software Type:
IOS XE Software
Release Version:
Polaris - Phase 2-16.2.1
Alert Type:
New File
File Name:
asr1002hx-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR1002-HX IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
27-APR-2016
Alert Type:
New File
File Name:
asr1002hx-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1002-HX IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
27-APR-2016
Alert Type:
New File
File Name:
asr1002hx-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1002-HX IOS XE UNIVERSAL W/O LI

File Release Date:
27-APR-2016
Alert Type:
New File
File Name:
asr1002hx-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR1002-HX IOS XE UNIVERSAL

File Release Date:
27-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006-X Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006-X Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1002x-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL

File Release Date:
02-APR-2016

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
Polaris - Phase 2-16.2.1
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
27-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1009-X Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1001x-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1001x-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1001x-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1001x-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR1001-X IOSXE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1009-X Router
Software Type:
IOS XE Software
Release Version:
16.2.1
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_npe_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9_noli.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL W/O LI

File Release Date:
02-APR-2016
Alert Type:
New File
File Name:
asr1000rpx86-universalk9.16.02.01.SPA.bin
File Description:

Cisco ASR 1000 Series RPX86 UNIVERSAL

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS-XE 3.16.2S Version 15.5(3)S2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE ROMMON Software
Release Version:
16.2.1r
Alert Type:
New File
File Name:
asr1000-rommon.162-1r.pkg
File Description:

ASR1K series Rommon Image

File Release Date:
02-APR-2016
Find additional information in Software Downloads index.

Known Bugs - ASR 1000 Series Aggregation Services Routers

Alert Type:
Updated *
Bug Id:
CSCte89787
Title:
Segment Switch manager Error followed by crash at 'sw_mgr_sm_cm_send_msg
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: A Cisco ASR 1000 crashes after the Segment Switch Manager (SSM)
reports that an invalid segment has been detected:

%SW_MGR-3-INVALID_SEGMENT: Segment Switch Manager Error - Invalid segment - no
segment class.

The crash follows this message.

Conditions: The symptom is observed on a Cisco ASR 1002 that is running Cisco
IOS Release 12.2(33)XND1. The crash is caused by a NULL pointer de-reference
following the "no segment class" error. The error itself is not fatal and the
crash should have been avoided.

Workaround: There is no workaround.

Last Modified:
02-APR-2016
Known Affected Releases:
12.2(33)XND
Known Fixed Releases: *
12.2(32.8.11)SX349, 12.2(33)SXI10, 12.2(33)SXI11, 12.2(33)SXI12, 12.2(33)SXI13, 12.2(33)SXI14, 12.2(33)SXI4, 12.2(33)SXI6, 12.2(33)SXI8a, 12.2(33)SXJ
Alert Type:
Updated *
Bug Id:
CSCtb01505
Title:
Router crashes with ospf_build_net_lsa
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: A Cisco router may crash when building an OSPF Network LSA.

Conditions: This symptom is observed while unconfiguring ospf configurations.

Workaround: There is no workaround.


Last Modified:
02-APR-2016
Known Affected Releases:
12.2(33)SXH, 12.2(33)XND, 15.0(1)M
Known Fixed Releases: *
12.2(32.8.11)SX300, 12.2(32.8.11)XJC273.18, 12.2(32.8.29)REC186, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE12, 12.2(33)SRE13, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9
Alert Type:
Updated *
Bug Id:
CSCsv73721
Title:
ISSU ERP tracebacks on active RP during router bootup
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: The following tracebacks appeared on the active RP console during router boot up:

000131: *Nov 12 16:16:43.075 EST: %ISSU-3-FAILED_TO_ALLOC_UNDER_ENDPOINT: Can not allocate
transport id(131072) control block.

-Traceback= 1#04182c093c3bf3fa21a9ef089770e5a6 :10000000+5179E0 :10000000+518294
:10000000+515F3C :10000000+200F5DC :10000000+200E5C4 :10000000+1F78A0C
000132: *Nov 12 16:16:43.077 EST: %ISSU-3-ERP_CLIENT: For context ID 131072, Current context
for ERP isn't available

-Traceback= 1#04182c093c3bf3fa21a9ef089770e5a6 :10000000+5179E0 :10000000+518294
:10000000+515F3C :10000000+200E898 :10000000+1F78A0C
000133: *Nov 12 16:16:43.078 EST: %IPC-3-ISSU_ERROR: ISSU register peer failed failed with error
code 0 for seat 20000

-Traceback= 1#04182c093c3bf3fa21a9ef089770e5a6 :10000000+5179E0 :10000000+518294
:10000000+515F3C :10000000+1F78D5C

Conditions: The symptom will show up at boot up if the box has more than 10 ISSU endpoints.
ISSU aware RP, SP, linecards all count as endpoints.

Workaround: There is no workaround.

Last Modified:
03-APR-2016
Known Affected Releases:
12.2(33)XN, 12.2(33)ZZ
Known Fixed Releases: *
12.2(32.8.10)REC154, 12.2(32.8.11)REC154, 12.2(32.8.11)SX227, 12.2(32.8.12)REE154, 12.2(32.8.9)YCA206.8, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8
Alert Type:
Updated *
Bug Id:
CSCsm82551
Title:
MCP hit watchdog in diff processes as Pool Mgr, CDP while booting
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:

You may see ASR1000-WATCHDOG: Process = IP Background followed by
Traceback message during system bootup.

Conditions:

This happens when L2VPN is configured. It may be likely to occurr when
many interfaces are configured.

Workaround:

There is no known workaround available.












Last Modified:
03-APR-2016
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(32.8.1)REE177, 12.2(32.8.10)REC154, 12.2(32.8.11)YCA246.10, 12.2(32.8.12)REE154, 12.2(32.8.3)YCA206.8, 12.2(33)XNB, 12.2(33)XND, 12.4(21.14.14)PIC1, 15.0(1)SY, 15.1(1)SG1.3
Alert Type:
Updated *
Bug Id:
CSCuv79776
Title:
Router with Pfr feature crashed at cpp_free_exmem
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A Cisco router may crash and generated a RP core file

Conditions:
Issue is now seen on a ISR4331 with Pfr feature running 15.5(3)S code

Workaround:

Further Problem Description:

Last Modified:
03-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S, 16.1(0.1)
Alert Type:
Updated *
Bug Id:
CSCsx32049
Title:
CC: ESM logger cause tracebacks and RP reload at boot
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: Traceback is observed and the system may reboot, depending on the
platform.

Conditions: The symptom is observed when the ESM filter is configured and
contains an ios_config statement.

Workaround: Remove ios_config statements from ESM filter.




Last Modified:
04-APR-2016
Known Affected Releases:
12.2XN, 3.4
Known Fixed Releases: *
12.2(32.8.10)REC186, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)XND, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCuv25212
Title:
ucode crashes with Fair Queue and FNF export is configured
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ucode crashes when there is a dropped packet with Fair Queue and FNF export is configured

Conditions:
ucode crashes when there is a dropped packet with Fair Queue and FNF export is configured

Workaround:
Either remove Fair Queue configuration or FNF export, until there is an image available with a fix

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S4, 15.5(1)S3, 15.5(2)S2, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S, 16.2(0.170)
Alert Type:
Updated *
Bug Id:
CSCuv36911
Title:
ASR1K active CGN ESP200 may crash when the CGN standby realoded
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, active CGN ESP200 crashed while the reloaded standby CGN. Active CGN started to crash when standby CGN reloaded and come back online and started to sync NAT translations.

Conditions:
This has been seen when Carrier Grade NAT (CGN) is deployed

Workaround:
none

Further Problem Description:
NA

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S, 15.6(1)S
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S5, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S, 16.2(0.185)
Alert Type:
Updated *
Bug Id:
CSCuv02537
Title:
ASR1K ESP200 reload in a B2B CGN NAT scenario with PAP+BPA
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The ESP may reload in an ASR1000 chassis.

Conditions:
This has been seen when Carrier Grade NAT (CGN) and B2B redundancy are deployed.

Workaround:
There is no workaround.

Further Problem Description:
NA

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S, 15.4(2)S1
Known Fixed Releases: *
15.3(3)S7, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S, 16.2(0.194)
Alert Type:
Updated *
Bug Id:
CSCuv52648
Title:
ESP memory leak under cpp_cp_svr due to BFD feature
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASR1K ESP memory leak:

From "show platform software status control-proc brief":
we see ESP memory utilization(committed field) is going up over time:
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 3874504 1769324 (46%) 2105180 (54%) 2414216 (62%)
ESP0 Healthy 969088 897480 (93%) 71608 ( 7%) 680672 (70%) <<<
SIP0 Healthy 471832 268616 (57%) 203216 (43%) 235364 (50%)

From "show platform software process list f0 sort mem" we see cpp_cp_svr holding more and more memory over time

From a breakdown view, from "show platform software memory qfp-control-process qfp active brief"
we see the leak is under the following chunk:

CPP AEM SUB-TASK CHUNK
CPP AEM TASK CHUNK
CPP HASH CHUNK

Conditions:
The leak is seen when BFD feature is enabled.

Workaround:

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S3.1
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S4, 15.5(1)S3, 15.5(2)S2, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S, 16.2(0.170)
Alert Type:
Updated *
Bug Id:
CSCtz61014
Title:
f Linux kernel NTP leap second handling could cause deadlock
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs the system will crash when adding or deleting NTP leap second in NTP
master mode.

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
To prevent an issue when the leap second update is received do not configure the system as NTP master.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.0(1)S
Known Fixed Releases: *
15.1(3)S4, 15.2(2)S1, 15.2(4)S8, 15.3(3)S7, 15.4(2)S4, 15.4(3)S4, 15.5(1)S3, 15.5(2)S2
Alert Type:
Updated *
Bug Id:
CSCuv57459
Title:
ASR1K Kernel crash at pidns_get() - part 2
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASR1K kernel crash

Conditions:
This has been seen on ASR1K running 3.10.2 code.

Workaround:
Not known

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S2
Known Fixed Releases: *
15.2(4)S8, 15.3(3)S7, 15.4(2)S4, 15.4(3)S4, 15.5(1)S3, 15.5(2)S2, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S
Alert Type:
Updated *
Bug Id:
CSCux57066
Title:
ASR1K : Lawful Intercept not working as expected for IPv6 traffic
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Lawful Intercept feature not working as expected

Conditions:
Ipv6 traffic going towards the subscriber is not intercepted

Workaround:
None

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S3.1
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 16.2(0.260), 16.3(0.57)
Alert Type:
Updated *
Bug Id:
CSCux52451
Title:
VRF Domain half open counter increments when aggressive aging occurs
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VRF domain level half open counters (current count) continue to increment.
This may eventually result in the denial of flow creation.

# show platform hardware qfp active feature firewall runtime
VRF Global Action Block
L7 Inspection disable flags: 0x0
Total Sessions:
max limit: 4294967295, current count: 0, exceed: 0
aggr-age high watermark: 4294967295, low watermark: 0
num of times enter aggr-age: 0, aggr-age period: off
TCP SYN Cookie:
max limit: 4294967295, current count: 0, exceed: 0
Total Half Open Sessions:
max limit: 200000, current count: 0, exceed: 0
aggr-age high watermark: 150000, low watermark: 100000
num of times enter aggr-age: 0, aggr-age period: off
TCP Half Open Sessions:
max limit: 250000, current count: 0, exceed: 0
UDP Half Open Sessions:
max limit: 50000, current count: 0, exceed: 0
ICMP Half Open Sessions:
max limit: 1000, current count: 0, exceed: 0

or

# platform hardware qfp active feature firewall datapath vrf
VRF:(id=)
VRF Action Block
L7 Inspection disable flags: 0x0
Total Sessions:
max limit: 4294967295, current count: 0, exceed: 0
aggr-age high watermark: 4294967295, low watermark: 0
num of times enter aggr-age: 0, aggr-age period: off
TCP SYN Cookie:
max limit: 4294967295, current count: 0, exceed: 0
Total Half Open Sessions:
max limit: 200000, current count: 0, exceed: 0
aggr-age high watermark: 150000, low watermark: 100000
num of times enter aggr-age: 0, aggr-age period: off
TCP Half Open Sessions:
max limit: 250000, current count: 0, exceed: 0
UDP Half Open Sessions:
max limit: 50000, current count: 0, exceed: 0
ICMP Half Open Sessions:
max limit: 1000, current count: 0, exceed: 0

Conditions:
The parameter maps use a default session rate parameters that may cause the aggressive
aging to kick in without being configured. Setting the session rate in the parameter map may
exacerbate the issue.

Workaround:
Set the session rate to a very high value

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S5.1
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.226), 16.3(0.2)
Alert Type:
Updated *
Bug Id:
CSCux33568
Title:
ESP crash while reconfiguring FR interface to MFR bundle
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ESP40 crash with ESP core file only generated, no CPP core file on hard disk

Conditions:
reconfiguration of FR interface into MFR bundle with applied QoS

Workaround:
none

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.257), 16.3(0.52)
Alert Type:
Updated *
Bug Id:
CSCuw47720
Title:
ASR1001-X/ISR4k Mgmt port negotation issue with peer device
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When no shutdown ASR1001-X/ISR4k Mgmt port, it links up with 100M/full, which should be 1000M/full

Conditions:
Shut/no shut and interval more than about 30s

Workaround:
Shut/no shut and interval less than about 30s

Further Problem Description:
other ASR1k except ASR1001-X don't have this issue
ISR4k series also are affected by this defect.

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.271), 16.3(0.71)
Alert Type:
Updated *
Bug Id:
CSCux42411
Title:
ASR1001-X Frame Relay with Fortitude NIM fails due to LMI packet padding
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Serial interfaces with Frame Relay or HDLC encapsulation remain down. Frame Relay LMI timeouts.

Conditions:
NIM-1CE1T1-PRI or NIM-2MFT-T1/E1 in ASR1001-X chassis.

Workaround:
None.

Further Problem Description:
Customers can use SPA-8XCHT1/E1-V2 as an alternative on ASR1001-X.

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)SS
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.213)
Alert Type:
Updated *
Bug Id:
CSCux02656
Title:
ASR1K: Crash related to collecting NetFlow data for IPv6 flows
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A crash is observed on an ASR1K running 15.5(2)S2.

Conditions:
The crash is known to occur when Flexible NetFlow is configured and IPv6 traffic flows are being processed by the NetFlow engine. The crash appears to be related to the NetFlow processing of IPv6 fragments.

Workaround:
Disable NetFlow collection.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.193)
Alert Type:
Updated *
Bug Id:
CSCux00303
Title:
Router crash after stopping EPC
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Router configured for EPC may crash after executing the command "monitor capture < > stop".

Conditions:
EPC session is configured using ACL filter. The crash occurs when the capture is stopped.

Workaround:
Not known

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.261), 16.3(0.57)
Alert Type:
Updated *
Bug Id:
CSCux19336
Title:
XE316:cpp_cp_svr core files seen while removing mulitlink interface
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:






This is a merge problem that happens when multilink interfaces are removed. The issue crashed the CP process resulting in service outage.

Conditions:




A crash would occur due to accessing invalidated memory while collapsing a node that has shrunk to below 4001 entries. The issue could also occur due to removing QOS configuration that required a hierarchy layer node to be inserted.

Workaround:



There is no workaround other than upgrading to an image with the fix.

Further Problem Description:












Last Modified:
04-APR-2016
Known Affected Releases:
15.6(2)S
Known Fixed Releases: *
15.5(2)S3, 15.5(3)S2, 15.5(3)S2a
Alert Type:
Updated *
Bug Id:
CSCux40633
Title:
ISR 4451 Continuous Crash/ Core Crash File generated with WAAS/Appnav
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Crash might be seen when WAAS/AppNav enabled ISR-4451; is configured with HSRP.

Conditions:
Currently crash is seen while adding HSRP configuration; when WAAS/AppNav is running in ISR-4451.

Workaround:
Removing the WAAS/AppNav with HSRP still running; has solved the issue.

Further Problem Description:
Crash is seen in Branch ISR-4451 while HSRP is configured; when already WAAS/AppNav is running.

As a first step; WAAS/AppNav was removed then issues seems to have stopped.

Issue not reproduced after re-adding the WAAS/AppNav back.

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(3)S1.4
Known Fixed Releases: *
15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.255), 16.3(0.48)
Alert Type:
Updated *
Bug Id:
CSCur72779
Title:
XE314 : B2B NAT : Stale NAT translations observed on Active rtr
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Stale NAT translations may be observed on the router even after the traffic stops.

Conditions:
Translations count as seen in 'show ip nat translations total' is non-zero value.

Workaround:

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S, 16.2(0.67)
Alert Type:
Updated *
Bug Id:
CSCuw73223
Title:
Polaris : cpp_cp_svr crash when the interface goes down
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASR1001X, ASR1002X and ASR1Ks equipped with ESP100 or ESP200 crashes.

Conditions:
When ATM VC w/ QoS policy map is deleted and there are no other VCs configured on the COS node for the VC being deleted.

Workaround:
None

Further Problem Description:
Anything that triggers the deletion of VC that has policy map attached causes ESP (FP) to crash if this is the only VC currently on the COS node.

Last Modified:
04-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.211)
Alert Type:
Updated *
Bug Id:
CSCux14860
Title:
ASR1K:Packet Tracing failed with FW,NAT&FW enabled.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Packet Tracing causes the system to crash.

Conditions:
when FW feature is enabled.

Workaround:
NA

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.6(1)S, 16.2(0)
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.201)
Alert Type:
Updated *
Bug Id:
CSCuy57879
Title:
6XGE-BUILT-IN module crashed in ASR1002-X router
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
6XGE-BUILT-IN module crashes in ASR1002-X router, when the below command is executed from the IPC console mode:
sh hw-module subslot 0 drops-rx mac 0

Conditions:
When bad crc packets are pushed to one of the Gig interface belonging to this module "6XGE-BUILT-IN" then it causes the increment in Input error or CRC counters. And once the counter is increasing then executing the below command causes the crash in this module 6XGE-BUILT-IN.

ROLO#ipc-con 0 0
Slot-0-0>
Slot-0-0>en
Slot-0-0#sh hw-module subslot 0 drops-rx mac 0



This issue is seen to 6XGE-BUILT-IN and SPA-2X1GE-SYNCE, which uses the same Tempo FPGA

SPA-2X1GE-SYNCE supporting routers:
7600 and ASR1k

6XGE-BUILT-IN supporting router:
ASR1002-X

Workaround:
None

Further Problem Description:
None

Last Modified:
05-APR-2016
Known Affected Releases:
15.4(3)S3.1
Known Fixed Releases: *
15.4(3)S5.3, 15.5(3)S2.4, 15.6(0.22)S2, 16.3(0.121)
Alert Type:
Updated *
Bug Id:
CSCuy20489
Title:
ASR experiences ucode crashes on 15.6(1)S due to sipvicious
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
ASR experiences ucode core crashes.

Conditions:
The issue is suspected to be caused by L2 multicast code with BDI interface and NAT. NAT is not a supported feature listed in the BDI configuration guide.

http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/bdi.html

Workaround:
Configure BDI as subinterfaces if possible. NAT is not supported on BDI.

Further Problem Description:

Last Modified:
05-APR-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux41920
Title:
PAP issue in B2B A/R setup
Status:
Open
Severity:
2 Severe
Description:

Symptom:
false pool exhaustion

Conditions:
with pap in a/r scenario

Workaround:
none

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw66752
Title:
"SSM connection manager" high CPU if VAIs under scale have QOS applied
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Constantly High CPU (> 15%) usage by the "SSM connection manager"

Conditions:
ASR1k (rp2) BRAS terminating high (~28,800) number of PPPoE sessions with QOS policies applied to all VAIs
and continuous control-plane churn (session establishment & teardown.

Workaround:
Reduce the scale (frequency of session churn) or or avoid applying QOS policies to all the individual VAIs.

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.3(3)S5, 15.3(3)S6, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1)S4
Alert Type:
Updated *
Bug Id:
CSCuy61296
Title:
polaris: 16.2 throttle: Memory leaks @ IsVoiceHuntGrpSIPLocalDN
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Memory leaks are seen at IsVoiceHuntGrpSIPLocalDN at the end of dynamo2 call parking script execution.

Conditions:
After hunt group is configured if CLI "no voice register global"
is executed, only dynamically joined voice hunt group members were deleted.
Statically tied voice hunt group DNs were not deleted.

Workaround:
In config_voice_register_global , before calling remove_voice_reg_dn_tag to remove all the existing DNs.
setting vhg_info->ties_voice_huntgrp to 0, so that DN will be deleted.

Further Problem Description:

Last Modified:
11-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases: *
15.6(2.7)T, 16.3(0.161)
Alert Type:
Updated *
Bug Id:
CSCuv01168
Title:
SPA-2XCT3/DS0 controller is not coming up on fresh reboot.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
While testing with the mcp_ceop_t3t1_cem_func functionality the serial interface was not able to up..

Conditions:
Issue is seen with asr1k platform

Workaround:
Can Make the serial interface up by giving no shut again to the other end which was already in no shut mode
..

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S1.4, 15.5(3)S2, 15.6(0.22)S0.15, 15.6(1.17)S0.10, 15.6(1.19)SP, 15.6(2)S, 15.6(2.8)T, 16.2(0.195)
Alert Type:
Updated *
Bug Id:
CSCun13772
Title:
NHRP: CPUHOGs seen when many child entries expire simultaneously
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CPUHOG messages and watchdog timeout crashes are observed on an ASR1000 series router running DMVPN.

Conditions:
This has been observed on a router with a very large NHRP table (10-20k individual entries) with a very high number (thousands) of child entries per parent entry.

Workaround:
Reduce the number of child entries per parent entry through the use of supernetting.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
15.2(4)S1
Known Fixed Releases: *
15.2(1)SY1.13, 15.2(1)SY2, 15.2(4.0)ST, 15.2(4.0.21)E, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1)IE101.170, 15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10
Alert Type:
Updated *
Bug Id:
CSCun25912
Title:
IKEv2 auto-reconnect: some virtual-access dynamic configs are lost
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: Configurations dynamically applied to the virtual-access interface might be lost over the reconnection while using the autoreconnect feature on Cisco Anyconnect on the ASR platform.

For example, the interface after initial connection establishment would have a QOS service policy applied:

ROUTER#sh derived-config int virtual-access 1

!
interface Virtual-Access1
ip unnumbered GigabitEthernet0/0/1
tunnel source 10.1.1.1
tunnel mode ipsec ipv4
tunnel destination 10.10.1.100
tunnel protection ipsec profile ipsec-profile
no tunnel protection ipsec initiate
service-policy input INPUT-POLICY
end


After reconnection the INPUT-POLICY is missing:

ROUTER#sh derived-config int virtual-access 1

!
interface Virtual-Access1
ip unnumbered GigabitEthernet0/0/1
tunnel source 10.1.1.1
tunnel mode ipsec ipv4
tunnel destination 10.10.1.100
tunnel protection ipsec profile ipsec-profile
no tunnel protection ipsec initiate
end

Conditions: This symptom is observed with configurations being applied from the user AAA profile over radius authentication. Affected parameters observed are QOS service policies and access-group.
Workaround: 1. Do not use the reconnect feature.
or
2. Apply the configurations directly to the virtual-template (if this is an option).

Last Modified:
21-APR-2016
Known Affected Releases:
15.4(1)S
Known Fixed Releases: *
15.2(1)SY1.13, 15.2(1)SY2, 15.2(4.0)ST, 15.2(4.0.21)E, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1)IE101.209, 15.4(1)IA1.1, 15.4(1)S1.8, 15.4(1)S2
Alert Type:
Updated *
Bug Id:
CSCuq86382
Title:
FLEXVPN IKEv2 auto reconnect | virtual-access | VRF lost | anyconnect
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASR/FLEXVPN
ANYCONNECT

Conditions:
On client side, AnyConnect is used. Pings are sent in the VPN during all the tests.

The reconnect feature is activated with timeout = 600

An outage is simulated by blackholing the trafic on an intermediate router: the source IP and the destination IP are sent to null 0. When doing this, the client starts the reconnect process and the PE brings the Virtual-Access interface after a short period.

If the connectivity is restored before the Vi interface goes down, the reconnect feature works fine.
If the connectivity is restored after the Vi interface goes down, the client reconnects but something is broken in the installation of the route into the VRF. As a result, the VPN is up but the client connectivity is still down.

Workaround:
NONE

Further Problem Description:
NONE

Last Modified:
21-APR-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.2(1)SY1.13, 15.2(1)SY2, 15.2(4.0)ST, 15.2(4.0.21)E, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1)IE101.209, 15.4(1)IA1.1, 15.4(3)M0.3, 15.4(3)M1
Alert Type:
New
Bug Id:
CSCuz13399
Title:
ISSU XE316 ->XE317: ATMoMPLS ip ping failed CEoP link for port mode conf
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ATMoMPLS with Port Mode configured via CEoP link failed end to end ping after ISSU upgrade of active RP (switchover) from XE3.16 to XE3.17

Conditions:
Only happens in sub-package upgrade.

Workaround:
none

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
15.5(3)S2.7
Known Fixed Releases:
15.5(3)S2.9, 15.6(0.22)S4, 16.4(0.1)
Alert Type:
New
Bug Id:
CSCux32911
Title:
2KP: Router crash at ptpd_mcp_rp while removing PTP clock config
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Crash at ptpd_mcp_rp on ASR1002-X with Multiple config/unconfig events

Conditions:
Multiple config/unconfig events continuously without delay

Workaround:
None.

Further Problem Description:
Issue seen consistently with script. Manual repro is difficult.

Last Modified:
27-APR-2016
Known Affected Releases:
16.3(0)
Known Fixed Releases:
16.3(0.182)
Alert Type:
Updated *
Bug Id:
CSCud37408
Title: *
PerfMon entries not idle timing out
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Flows in performance-history are not aged out under certain conditions. Which eventually leads to high memory usage. Also this leads to the perfmon flows not getting updated since the old flows still arent aged out.

Conditions:
When sum of counters from all history buckets overflow. For example, if byte count is 4,000,000,000 in one bucket and 3,000,000,000 in another bucket then sum of bytes across all buckets overflows. When that happens flows are not aged out.

Workaround:

Use the history size of 1 if the problem is observed. In case the perfmon data is not seen on the collector side, then removing and applying the performance monitor will resolve the issue temporarily.


Further Problem Description:
Issue is also seen on 3850 series of switches running on release upto 3.6.4.

Last Modified:
27-APR-2016
Known Affected Releases:
15.3(99)S
Known Fixed Releases:
15.3(2.14)S, 15.3(2.15.1)XEB, 15.3(2.21)PI23a, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4
Alert Type:
New
Bug Id:
CSCuz39721
Title:
ASR1K/RP2/SW 15.4(3)S4 crash
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Router crash

Conditions:
Upgrade from 15.1(3)S3 to 15.4(3)S4
ASR1K/RP2 configured as BRAS (L2TP sessions)

Workaround:
none

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
15.4(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux35719
Title:
ASR1K QFP crash with SSLVPN
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An ASR1000 series router may exhibit an unexpected crash in the QFP ucode (cpp-mcplo-ucode) process.

On a modular chassis, this will result in a reload of the active ESP module and a switchover to the standby (if one is present). On an integrated chassis (ASR1001[-X], ASR1002-X) the entire chassis will reload.

Conditions:
This has been observed with the SSLVPN feature configured while running IOS-XE release 03.16.01a.S. The crash appears to occur due to a race condition between threads while processing TCP Selective ACK (SACK) messages from an SSL VPN client.

Further, exact conditions are not currently known.

Workaround:
Not known at this time.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
15.5(2)S, 15.5(3)S0.18
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.371), 16.3(0.6)
Alert Type:
Updated *
Bug Id:
CSCuz10855
Title:
ASR1002x crash in crypto_pstate_dequeueue
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASR1002x could crash in CPP because of a issue with packet processing in crypto engine.

Conditions:
ASRs with Octeon processor

Workaround:
none

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
15.4(3)
Known Fixed Releases: *
16.3(0.192), 16.4(0.7)
Alert Type:
Updated *
Bug Id:
CSCuy64412
Title:
ISSU:Polaris 16.2 ISO1->ISO2:Traceback@lisp_os_ios_if_handle after RV
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Error message

%LISP-4-ASSERT: Internal LISP error (os ios if 673)

and a traceback may be seen in the syslog of router running Cisco IOS.
Conditions:LISP is enabled in the configuration.
Workaround:No actions is necessary, router automatically recovers from the error condition.
More Info:Up until now the problem was seen only on redundant systems at the time whem Standby RP becomes Active. But the problem is not specific to this situation and may be seen in other scenarios such as interface OIR or removing an interface from router's configuration.

Last Modified:
30-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases: *
15.4(1)IA1.31, 15.4(1)IA1.35, 15.6(1.17)S0.21, 16.2(0.363), 16.3(0.178)
Alert Type:
Updated *
Bug Id:
CSCsx73290
Title:
Rework CSCsu73842 - RP2 ERROR: no error set by session Trbk@l2tp_avp_pro
Status:
Fixed
Severity:
3 Moderate
Description:








Symptom:

Traceback seen on configuring tunnel and session establishment







Conditions:
This symptom is observed on a Cisco ASR1000 router with RP2 processor





Workaround:
No Workaround



Last Modified:
02-APR-2016
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(32.8.1)REC186, 12.2(32.8.11)XJC206.42, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)SXI10
Alert Type:
Updated *
Bug Id:
CSCuz03703
Title:
EPA-10x10GE: interface CRC errors are seen
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
EPA-10X10GE could exhibit intermittent CRC errors

Conditions:
Issue is seen with 16.2.1 Release at very high or very low temperatures.

Workaround:
No workaround.
This is fixed in next16.2.2 and 16.3.1 releases

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
16.2(1.3), 16.3(0.153)
Alert Type:
Updated *
Bug Id:
CSCsz23139
Title:
NBAR PD mib is not able to collect details from the Gigi sub-interface
Status:
Fixed
Severity:
3 Moderate
Description:

None

Symptom:

NBAR PD mib is not able to collect details from the Gigi sub-interface

Conditions:

While doing getmany on cnpdStatusPdEnable SNMP manager is not able to collect the PD information
from the sub-interface

Workaround:

Further Problem Description:


Last Modified:
02-APR-2016
Known Affected Releases:
12.2(33)SRD2, 12.2XN
Known Fixed Releases: *
12.2(32.8.11)REC186, 12.2(33)SRD4, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCuw81487
Title:
Kahuna RP crash when bringing up PTA sessions with QoS
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Kahuna RP crash when bringing up PTA sessions with QoS.

Conditions:
Egress queues are configured on PPP sessions. This only happens on Kahuna (ASR1002-HX) platform.

Workaround:
None.

Further Problem Description:

Last Modified:
03-APR-2016
Known Affected Releases:
15.6(2)S
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S1, 15.5(3)S1a, 15.6(1)S
Alert Type:
Updated *
Bug Id:
CSCsr40394
Title:
Delete small buffer pool causes %ASR1000_INFRA-5-IOS_INTR_OVER_LIMIT TB.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

Delete small buffer pool causes %ASR1000_INFRA-5-IOS_INTR_OVER_LIMIT traceback.

Conditions:

When the small buffer pool is configured with a user defined value, a traceback is generated when this buffer pool is deleted. This happens only in ASR routers.

Workaround:

None.

Last Modified:
04-APR-2016
Known Affected Releases:
12.2(33)XN, 12.2(33)XNB1, 12.2(33)XND, 12.2XN
Known Fixed Releases: *
12.2(32.8.1)REE186, 12.2(32.8.2)REC186, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)XNC0b
Alert Type:
Updated *
Bug Id:
CSCsw87700
Title:
sonetMediumLoopbackConfig returns incorrect values on SPA-1XOC48
Status:
Fixed
Severity:
3 Moderate
Description:


None







Symptom:
when the loop back is configured on POS interface, the
sonetMediumLoopbackConfig doesnt reflect the value set through CLI.
It will populate the correct value only after the reload of SPA.









Conditions:





Workaround:
spa reload



Further Problem Description:















Last Modified:
04-APR-2016
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(32.8.7)REC186, 12.2(33)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)XNC1, 12.2(33)XND
Alert Type:
New
Bug Id:
CSCuz03040
Title:
NAT outside add-route randomly even though add-route was not configured
Status:
Other
Severity:
3 Moderate
Description:

Symptom:Extra /32 host outside-global routes are added for Outside->Inside (ip nat source outside ...) w/o add-route options.
Conditions:
With Overlap NAT configuration, such that "ip nat inside source ..." + "ip nat outside source ..." are used for overlap address ranges.

The /32 static routes created by NAT would point to the "inside" direction, even though it was coming out of "outside-pool" because it use the "outside-global" to follow the routing table ("inside-local"), therefore the return traffic back to outside interface gets forwarded to inside.
Workaround:There is no workaround at this time.

Temporary workaround:
"clear ip nat trans *" will clear those /32 static routes.


Extra effort workaround:
add a physical loop between global and VRF, and then do "inside-outside" with global routing table + "inside-outside" with VRF

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)SS, 15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv90904
Title:
ASR1K B2B CGN NAT lost sync in standby IP NAT allocated addresses
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 lost sync in standby in NAT entries & IP NAT allocated addresses.

Conditions:
PAP+BPA configured ASR1013 with ESP200 B2B CGN NAT

Workaround:
Redundancy fail over to corrected the issue.Once the standby CGN became active, the IP allocated addresses would be corrected.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S
Known Fixed Releases: *
15.3(3)S7, 15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.197)
Alert Type:
Updated *
Bug Id:
CSCuw94014
Title:
cpp_cp crashes with BB profile #6 48k PTA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:The CP process may crash when bringing up PPPoE sessions on PTA with hierarchical QoS. When single-queue leaf nodes being are deleted, the software is decrementing the counter in the parent node more than necessary which causes the processing code to skip the hierarchy layer collapse logic.

The problem is specific to the asr1001-x, asr002-x, esp-100 and esp-200 and it causes service outage. This issue is also noticed on cBR8 platform with no PPPoE feature.

Conditions:This issue occurs when bringing up highly scaled PTA sessions with hierarchical QoS. It occurs when there is a combination of add and deletion events of the same object in the same transaction. This issue also occurs on cBR8 with no PPPoE feature.

Workaround:None

More Info:


Last Modified:
04-APR-2016
Known Affected Releases:
15.6(2)S
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.196)
Alert Type:
Updated *
Bug Id:
CSCux53201
Title:
ASR1K: IPv6 traffic classification issue
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IPv6 traffic is not classified correctly under QoS

Conditions:
class-map with match-any to match both IPv4 and IPv6 traffic.

Workaround:
The following commands can work as a workaround

platform qos marker-statistics
platform qos match-statistics per-filter
platform qos match-statistics per-ace

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(2)S
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.3(0.42)
Alert Type:
Updated *
Bug Id:
CSCut49714
Title:
GEC:QoS: pkt buff util high after apply/remove flat policy w/ fair-queue
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Packet buffer utilization goes high under oversubscription condition.

Conditions:
When using ASR1001-X, ASR1002-X or ESP100/200 hardware with aggregate port-channel feature. If there has been a QoS policy applied and removed from the port-channel interface which contains the "fair-queue" feature, we might see the packet buffer utilization goes high with oversubscribed traffic condition. If the packet buffers utilization goes really high, then the important control protocols packets might get dropped.

Workaround:
Don't apply and remove the QoS policy-map containing fair-queue feature to aggregate port-channel. If the condition is hit, then resetting ESP or reload router is needed.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(3)S, 16.2(0)
Known Fixed Releases: *
15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.271), 16.3(0.46)
Alert Type:
Updated *
Bug Id:
CSCuw73226
Title:
GRE checksum is wrong for Fragmented packets
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
GRE checksum is wrong for Fragmented packets in ASR1k

Conditions:
Hardware :ASR1k

Software :asr1001-universalk9.03.13.02.S.154-3.S2-ext.bin

Topology :

2800-1(Fa0/1)-------------------G0/0/0 ASR1000-2 G0/0/1-------------------Gig0/2 3900-1Gig0/1--------------------Fa0/0 2800-2

GRE is established between 2800-1& 2800-1 with default MTU
IPSEC is established between ASR1000-2 & 3900-1 with MTU1400
ISIS is running on top of the GRE interface.

Workaround:
1, Configure a big mtu to avoid fragment in outgoing interface of the ASR1k. Or,
2, Remove "tunnel checksum" on ASR1K.

Further Problem Description:
This is ASR1K/CSR/ISR G3 tunnel common issue, not ISIS specific.
It will appear if fragment happened on tunnel interface which have "tunnel checksum" configured.

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S2
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.184)
Alert Type:
Updated *
Bug Id:
CSCuw33451
Title:
AVC: revert workaround for conversation tool following CSCuv05447 fix
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Due to the workaround applied the server and client byte counts might be incomplete.

Conditions:
IP Packet fragmentation.

Workaround:
N/A

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.180)
Alert Type:
Updated *
Bug Id:
CSCuw39062
Title:
ASR1K: temperature sensor threshold values are showing wrong
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Temperature sensor threshold values are showing wrong for CC slots.

Conditions:
Checking sensors on ASR1K

Workaround:
none

Further Problem Description:
none

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S, 16.2(0)
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 16.2(0.166)
Alert Type:
Updated *
Bug Id:
CSCuw41346
Title:
ESP packets discarded during re-key with static NAT on ASR1k
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traffic loss through IPSEC tunnels (at the time of Phase-2 rekey). After the re-key, the NatIN2out drop counter is seen to increment on the router performing the ESP NAT:

BGL.I.06-ASR1000-1#sh plat hardware qfp active statistics drop
-------------------------------------------------------------------------
Global Drop Stats Packets Octets
-------------------------------------------------------------------------
NatIn2out 5 670 <<<<<<<<< NatIN2out drops

Conditions:
NAT is implemented in such a way that the Tunnel end points are not aware of it, therefore, NAT-T does not come into picture and the VPN endpoints do not encapsulate ESP into UDP\4500.

Workaround:
Deploy NAT in a way that the tunnel end points detect the NAT in between using NAT-Detection and hence encapsulate the ESP into UDP\4500 to avoid NAT ESP processing on the NAT routers.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S4
Known Fixed Releases: *
15.5(3)S1.4, 15.5(3)S2, 15.5(3)S2a, 15.6(1.10)S, 15.6(2)S, 16.2(0.177), 16.2(1)
Alert Type:
Updated *
Bug Id:
CSCuw39613
Title:
ASR1K fails to perform NAT when flow cache entries are disabled.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
NAT router fails to translate the source ip-address of outside-to-inside packets.

Conditions:
The problem is seen when the following conditions are met.
- "no ip nat create flow-entries" is configured.
- Both source and destination ip-addresses are targeted for translation.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S3.1, 15.5(3)S
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.2(0.184)
Alert Type:
Updated *
Bug Id:
CSCux62928
Title:
IOS-XE IKE over 4500 & IKE nat-t keepalive drop with certain possibility
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IKE over 4500 and IKE NAT-T keepalive packets drop with certain possibility.

Conditions:
DMVPN NAT-T setup error could be seen with some specific tunnel source and tunnel destination.
In details, by chance IKE packets will be recognized as IPSEC NATT UDP packets, and get dropped later after found there is no inner IPv4 or IPv6 header. This is caused by the characteristic pattern of IKE packets happen to be the same as IPSEC NATT UDP tunnel packets.

Workaround:
Change the tunnel configuration with a different tunnel source or different tunnel destination for the problematic VPN.

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.3(3)S1.16, 15.4(1)S
Known Fixed Releases: *
15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.3(0.59)
Alert Type:
Updated *
Bug Id:
CSCuv52997
Title:
/32 static route added without add-route enabled for outside dynamic nat
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Static route incorrectly added by NAT into the RIB.

Conditions:
Outside dynamic NAT configured without add-route option & inbound connection initiated from an outside host.

Workaround:
None

Further Problem Description:
When using Outside dynamic NAT we are seeing /32 route added for outside local ip address.
This should be injected into the RIB only when we have add-route option enabled in the nat statement.
Issue is observed in 15.4(3)S3.

Last Modified:
04-APR-2016
Known Affected Releases: *
15.4(3)SS, 15.5(3)S, 16.2(0)
Known Fixed Releases:
15.6(2)S, 16.2(0.193)
Alert Type:
Updated *
Bug Id:
CSCux16182
Title:
ECFM cannot work on EFP with VPWS interworking vlan
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ECFM packets cannot be sent out of ASR1K

Conditions:
EFP with VPWS interworking vlan

Workaround:
none

Further Problem Description:
ECFM packets are dropped by asr1k internally.

Last Modified:
04-APR-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 16.2(0.193)
Alert Type:
Updated *
Bug Id:
CSCuw79438
Title:
NAT64: MAP-T 1300-bytes packet drop at high traffic rate
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
NAT64 MAP-T packets bigger than 1280 default IPV6 MTU size may be dropped with high rate
with "nat64 settings fragmentation header disable" is set.

Conditions:
"nat64 settings fragmentation header disable" is set, and high traffic load.

Workaround:
Do not turn on "nat64 settings fragmentation header disable"

Further Problem Description:












Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S3.3
Known Fixed Releases: *
15.4(3)S5, 15.5(3)S2, 15.5(3)S2a, 15.6(2)S
Alert Type:
Updated *
Bug Id:
CSCuw95617
Title:
QFP crash in NAT ALG after ipv4_nat_destroy_session
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR1k might experience a QFP microcode crash :

%CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8
%CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump.
%CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump.
%CPPDRV-6-INTR: F0: cpp_driver-0: CPP10(0) Interrupt : 15-Sep-23 15:36:03.561809 UTC+0600:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0
%CPPDRV-3-LOCKDOWN: F0: cpp_ha: CPP10(0) CPP Driver LOCKDOWN due to fatal error.


As a result the cpp-mcplo-ucode_xxxxxxx.core.gz file is generated.

Conditions:
NAT ALG enabled.
The crash might occur when a NAT session expires.

Workaround:
unknown yet

Further Problem Description:

Last Modified:
04-APR-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.4(3)S5, 15.5(2)S3, 15.5(3)S2, 15.5(3)S2a, 15.6(1)S1, 15.6(2)S, 16.3(0.68)
Alert Type:
Updated *
Bug Id:
CSCuw88491
Title: *
show inventory shows suffix 1 for SN of CPAK-100G-SR10 shipped in 2014
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
show inventory and other CLIs shows suffix of 1 for Serial Number of CPAK-100G-SR10 modules.

Conditions:
CPAK modules inserted in the EPA-1X100GE in ASR1000-MIP100 card on ASR 1000 platform.

Workaround:
None.

Further Problem Description:

Last Modified:
05-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux94913
Title:
Changing bridge-domain number under Overlay interface not taking effect
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Changing bridge-domain number under overlay service instance doesn't get reflected in the 'show otv vlan' till reload

Conditions:
Simple bridge-domain number change under the overlay service instance configuration does not get reflected in the 'show otv vlan' till we reload the router

Workaround:
reload the router

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtg37296
Title:
PIM J/P timer stuck after RPSO
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MC (zenkoku stream) Packet losses 800sec or more after RPSO.
The reproducibility of this issue is very low.

Conditions:

Workaround:

Last Modified:
02-APR-2016
Known Affected Releases:
12.2(33)XN
Known Fixed Releases: *
12.2(32.0.36)SRE, 12.2(33)SRE10, 12.2(33)SRE11, 12.2(33)SRE2, 12.2(33)SRE5, 12.2(33)SRE8, 12.2(33)SRE9, 12.2(33)SRE9a, 12.2(33)XNF2, 12.2(58)EZ
Alert Type:
Updated *
Bug Id:
CSCuy06618
Title:
DMVPN Phase 3 Hub is not sending NHRP redirect with Shared IPsec profile
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR 1k is configured as DMVPN Phase 3 Hub. "nhrp redirect" and "nhrp shortcut" commands are configured appropriately. Intermittently, ASR DMVPN Hub may stop sending NHRP Redirect / Traffic indication messages to DMVPN spokes. When this happens, spoke-to-spoke tunnels are not built, and the spoke-to-spoke traffic is going through the Hub. Also, in this state the Hub is not producing any NHRP debugs when spoke-to-spoke traffic is sent through it.

Conditions:
- ASR is DMVPN Phase 3 Hub
- On the Hub, p2p GRE tunnel interface and mGRE tunnel interface have the same tunnel source interface and the same SHARED ipsec profile applied for tunnel protection

Workaround:
1. Use different tunnel sources for p2p GRE and mGRE tunnel interfaces, and different ipsec profiles
-or-
2. Keep the same tunnel source, but create separate tunnel profiles for p2p GRE and mGRE tunnel interfaces.

Note: 2nd workaround assumes that you create two ipsec profiles without the keyword "shared". This configuration works. But, if there are multiple mGRE tunnels usning the same tunnel source, you will need to apply 1st ipsec profile without "shared" to p2p GRE tunnel, and apply 2nd ipsec profile with "shared" keyword to all mGRE tunnels with common tunnel source. But, the bug CSCuu54392 may prevent you from making last configuration, and upgrade may be needed.

-or-
3. Downgrade ASR to 03.10.05.S / 15.3.3S5, where the problem was not exist

Further Problem Description:
Issue is intermittent. Its appearance may depend on the order in which p2p GRE and mGRE tunnels are enabled and coming up. It seems to appear when p2p GRE is coming up first, and mGRE is coming up second. It does not seem to appear when mGRE is coming first, and p2p GRE - second.

Last Modified:
30-APR-2016
Known Affected Releases:
15.4(3)
Known Fixed Releases: *
16.3(0.192), 16.4(0.3)
Alert Type:
Updated *
Bug Id:
CSCuz04378
Title:
ICMP Time exceed dropped due to uRPF on the MPLS PE (per-ce label)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Packets are dropped due to uRPF

Conditions:
MPLS label mode per-ce, no issue when we are using per-prefix mode

Workaround:
Use per-prfix label allocation mode or disable uRPF

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(1)IA1.32, 15.4(1)IA1.35, 15.5(3)S2.10, 15.6(0.22)S5, 16.3(0.176)
Alert Type:
Updated *
Bug Id:
CSCuy61888
Title: *
With static network NAT, ASR1K fails to NAT first two packets
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
NAT fails to process First two TCP / ICMP packets whenever a new entry needs to be created in the NAT database.

Conditions:
Issue seen with nat inside source static network is configured. The behavior is not seen with plain static NAT or with dynamic NAT.

Workaround:
none.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
15.6(1.17)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux87741
Title:
OTV router retains ARP ND cache after it becomes non-AED
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
OTV router retains ARP neighbor discovery cache even after it becomes non-AED
and keep responding to ARP requests received on internal interfaces.

Conditions:
ARP neighbor discovery cache is not disabled.

Workaround:
Disable ARP neighbor discovery cache.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
15.4(3)S4.1
Known Fixed Releases: *
16.4(0.8)
Alert Type:
New
Bug Id:
CSCuy38110
Title:
EPA-10X10GE: Interface Input errors are seen
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
EPA-10X10GE could exhibit CRC or interface input errors

Conditions:
Issue is seen with 16.2.1 Release

Workaround:
No workaround.

Further Problem Description:
This is fixed in future 16.2 and 16.3 releases

Last Modified:
29-APR-2016
Known Affected Releases:
16.3(0)
Known Fixed Releases:
16.2(1.1), 16.3(0.103)
Alert Type:
New
Bug Id:
CSCuz44452
Title:
EPA-10X10GE: Packet drops and CRCS are seen at very cold temperatures
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
EPA-10x10GE EPA showed packet drops and interface CRCs.

Conditions:
Cold temperatures at (-5/-10 degrees)

Workaround:
No Workaround.
This is fixed in upcoming 16.2.2 and 16.3.1 releases.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
16.2.0
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw11097
Title:
ASR one way audio due to incorrect provision by FMAN-RP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR one way audio, and not streaming the RTP packets which it received in Local interface to Service provider interface.

Conditions:
In this specific instance, it is contact center call flow, where CVP enagged VXML gateway to play prompts, ringback and more prompts. So when there is multiple sip re-invites with different media details within span of few hundred ms, this issue is seen, which will result in one way audio at middle of the call. Intermittent issue.

Workaround:
In this case we increased the duration of the prompts, so ASR will not run into race. So ideally if there is enough gap between multiple sip transactions, then we may not see this issue.

Further Problem Description:
Refer summary.

Last Modified:
27-APR-2016
Known Affected Releases:
15.5(2)S
Known Fixed Releases: *
15.4(3)S5.8, 15.5(3)S2.10
Alert Type:
Updated *
Bug Id:
CSCuz28604
Title: *
L3-EoGRE:DHCPv4 clients over GREv6 tunnel get ip failed on Polaris
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
L3-EoGRE:DHCPv4 clients over GREv6 tunnel get ip failed on Polaris

Conditions:
DHCPv4 client over GREv6 tunnel

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
27-APR-2016
Known Affected Releases: *
16.4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz28770
Title:
L3-EoGRE:Priority !=0 in inner vlan header will result in dhcpv4 failed
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
L3-EoGRE:Priority !=0 in inner vlan header will result in dhcpv4 failed

Conditions:
Priority value rather than 0 in inner vlan header

Workaround:
Make the Priority value =0 in inner vlan header

Further Problem Description:
N/A

Last Modified:
27-APR-2016
Known Affected Releases: *
15.6(1)S, 16.4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz21435
Title:
IOS-XE: 'ACE event' process watchdog crash.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A router could encounter a watchdog with the following logs preceding the crash:

IOSXE-WATCHDOG: Process = ACE event

The device could also generate a 0 byte core dump from the crash.

Conditions:
This issue coincided while pushing ACL configs via CSM on an ISR4k

Workaround:
N/A

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
15.4(3)S1.9
Known Fixed Releases: *
15.5(3)S2.9, 15.6(0.22)S5, 16.3(0.178)
Alert Type:
New
Bug Id:
CSCuz40148
Title:
ASR1K Crashed after changing to CGN mode
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
ASR1K Crashed after changing to CGN mode

Conditions:
NAT mode changed from default to CGN.

Workaround:

Further Problem Description:
Software Version
================
03.16.00.S

*************************
** Decoded Stack Trace **
*************************

1: ipv4_nat_ha_upd_alg_sess_to ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/dplane/feature/nat/ipv4_nat_ha.c:2466
2: 0x40418e99 time_process_timer_ev ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/infra/time.c:593
3: 0x4041a15c process_recycle_control ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/infra/control_rx.c:101
4: 0x40811d75 mpass_restart_processing ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/infra/multipass.c:1242
5: 0x40822de0 infra_main ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/infra/packet.c:373
6: 0x40823515 pal_main ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/platform/mcp/mcp.c:77
7: 0x40823522 main ---> /auto/mcpbuilds21/release/03.16.00.S/BLD-V03_16_00_S_FC6/cpp/dp/hardware/cpp/common/hal_init.c:330

Last Modified:
26-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux73951
Title:
fman fp crash with 500k translations with bpa enabled
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
fman fp crash with 500k translations

Conditions:
fman fp crash with 500k translations

Workaround:
none

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy33103
Title:
incoming frame from AC is punted even though l2tp session is down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When l2tp session is down, packets which is coming from AC port is not dropped but punted to cpu.

Conditions:
NA

Workaround:
shutdown/no shut the AC interface will recover

Further Problem Description:
This issue does not happen every time in all l2tp sessions.
In our lat setup, the issue was seen in 50-60 sessions when 500 sessions went to down.

Last Modified:
07-APR-2016
Known Affected Releases:
15.4(3)S, 15.6(1)S
Known Fixed Releases: *
15.5(3)S2.6, 16.3(0.151)
Alert Type:
Updated *
Bug Id:
CSCum04472
Title:
ASR1K: Pb-free Patriot Prowler: IDB errors on scaling ds0 channels
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After did a scaled config, remove an existing channel and adding a new one leads to trace back

Conditions:
On b-b Patriot/Prowler setup , configure more than maximum allowed ds0 channels. Once the maximum no of channels are created , delete couple of them and recreate new ones

Workaround:
None.

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases: *
15.2(2)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5.13, 15.2(4)S6, 15.3(3)S3.2, 15.3(3)S4, 15.4(1)S1.12, 15.4(1)S2, 15.4(1)S3, 15.4(1.16)S0.6, 15.4(1.16)S0.7, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCut63804
Title:
CPP crashed when device in pair became active
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When the active asr1k failed due to a parity error, almost at the same time, standby device was also crashed with following logs

Mar 28 14:31:56.511 EDT: %RG_PROTOCOL-5-ROLECHANGE: RG id 1 role change from Active to Init
Mar 28 14:31:56.512 EDT: %CPPDRV-3-LOCKDOWN: F0: cpp_ha: CPP10(0) CPP Driver LOCKDOWN due to fatal error.
Mar 28 14:31:56.515 EDT: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8
Mar 28 14:31:56.516 EDT: %CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump.
Mar 28 14:31:56.516 EDT: %CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump.
Mar 28 14:31:56.516 EDT: %CPPDRV-6-INTR: F0: cpp_driver-0: CPP10(0) Interrupt : 15-Mar-28 14:31:56.509130 UTC-0400:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0
Mar 28 14:31:56.521 EDT: %CPPDRV-3-LOCKDOWN: F0: fman_fp_image: CPP10(0) CPP Driver LOCKDOWN due to fatal error.
Mar 28 14:31:57.145 EDT: %IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0
Mar 28 14:31:57.145 EDT: %IOSXE_RP_ALARM-6-INFO: ASSERT MAJOR module F0 Unknown state
Mar 28 14:31:57.145 EDT: %IOSXE_RP_ALARM-2-ESP: ASSERT CRITICAL module R0 No Working ESP
Mar 28 14:31:57.542 EDT: %CPPCDM-3-ERROR_NOTIFY: F0: cpp_cdm: QFP 0 thread 143 encountered an error -Traceback= 1#dbab8adbe0e71d7303480441c1e031fc 805F9A1C 805ABD61 80020708 80351FD6 80623E6C
Mar 28 14:31:57.784 EDT: %IOSXE-3-PLATFORM: F0: cpp_cdm: CPP crashed, core file /tmp/corelink/cgn2.wsf.prnynj_ESP_0_cpp-mcplo-ucode_032815143157.core.gz
Mar 28 14:32:00.815 EDT: %CPPDRV-3-LOCKDOWN: F0: cpp_cp: CPP10(0) CPP Driver LOCKDOWN due to fatal error.
Mar 28 14:32:15.560 EDT: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:CPP Client process failed: FMAN-FP det:HA class:CLIENT_SW sev:FATAL id:1 cppstate:RUNNING res:UNKNOWN flags:0x0 cdmflags:0x0

Conditions:
Device becoming active

Workaround:

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases:
15.3(3)S2.1
Known Fixed Releases: *
15.3(3)S6, 15.4(3)S4, 15.5(3)S, 16.2(0.67)
Alert Type:
Updated *
Bug Id:
CSCuw31230
Title:
ASR1K B2B CGN NAT ASR1K ESP200 crashed with clear ip nat translation
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 may crash when execute the "clear ip nat translation .

Conditions:
ESP200 will not crash immediately when execute the "clear ip nat translation " but it appeared that when the ip nat translation hit the "0" count, that was when the ESP200 crashed.

Workaround:
None

Further Problem Description:
None

Last Modified:
12-APR-2016
Known Affected Releases: *
15.3(3)S, 15.3(3)S6.10, 15.4(2)S1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw97986
Title:
LLDP not working between ios-xe and ios-xr on subinterfaces
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR9K does not process all LLDP packets sent by ASR1K for subinterfaces.

Conditions:
ASR1K sends LLDP packets which include a VLAN tag.

Workaround:
In order for ASR9K to process LLDP packets, they must not have a VLAN tag. If ASR1K can be configured not to do VLAN tagging for LLDP, then this will work.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
15.3(3)S5.1
Known Fixed Releases: *
15.5(3)S2.8, 15.6(0.22)S3, 16.2(0.352), 16.3(0.149)
Alert Type:
Updated *
Bug Id:
CSCux36675
Title:
VLAN Unlimited not working in certain case with port-channel
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
All the TAG(s) should gets programmed into FP, SPA should not received any of the tag configuration on tcam.

Conditions:
In case of VLAN-unlimited mode, when we configure
port-channel with sub-interface all the TAG(s) should gets programmed into FP
instead of SPA.

Workaround:

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(3)S2.7, 15.6(0.22)S3, 16.2(0.355), 16.3(0.101)
Alert Type:
Updated *
Bug Id:
CSCux81971
Title:
637488237: ASR1k crash in nat_alg_create_session
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Router running NAT crashes at nat_alg_create_session

hal_abort ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/hardware/cpp/common/hal_logger.c:81
2. 0x40337dd1 ipv4_nat_sess_getindex ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/infra/hash.c:100
3. 0x4034c534 ipv4_nat_find_session_entry_second ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/fw_nat_common/sessiondb.c:119
4. 0x403465e4 ipv4_nat_alg_create_session ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_alg_common.c:1461
5. 0x40348025 ipv4_nat_process_token ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_alg_common.c:2052
6. 0x4034854c ipv4_nat_alg_common_action_handler ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_alg_common.c:2168
7. 0x40349880 ipv4_nat_alg_invoke ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_alg_common.c:2475
8. 0x4034a4ac ipv4_nat_tcp_fixup ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_tcp_fixup.c:522
9. 0x4034b030 ipv4_nat_l3_fixup ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat_fixup.c:209
10. 0x40357b71 ipv4_nat_translate ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat.c:3505
11. 0x4034f19d ipv4_nat_translate_out2in ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/dplane/feature/nat/ipv4_nat.c:6930
12. 0x4092ba5b ??
13. 0x40802478 infra_main ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/hardware/cpp/common/hal_feature_invoke.c:80
14. 0x40802944 pal_main ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/platform/mcp/mcp.c:77
15. 0x4080294e main ---> /auto/mcpbuilds24/release/03.17.00.S/BLD-V03_17_00_S_FC4/cpp/dp/hardware/cpp/common/hal_init.c:330

Conditions:
Router running Nat

Workaround:
Na

Further Problem Description:
Na

Last Modified:
15-APR-2016
Known Affected Releases:
15.6(1)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh72756
Title:
Traceback on RP1 with 3.10+ PP 6.0 and PP 6.1
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When loading protocol-pack 6.0 or 6.1 a traceback might occur.
There is no functionality impact.

Conditions:
When loading protocol-pack 6.0 or 6.1 on top of version 15.3(3)S with RP1 platform.

Workaround:
Currently there is no workaround.

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S0.6, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.4(1)S, 15.4(1)S0a, 15.4(1)S0b
Alert Type:
Updated *
Bug Id:
CSCux74788
Title:
ASR1002-X: Memory leak in IOSD: acl-handle
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR1002-X with 8GB memory running Version 15.1 goes unresponsive within 5-6 days the router crashes with Watchdog. For testing they upgraded to 15.4(3)S4 and then to 15.5(3)s1a as well but same issue.

IOSD memory leak in acl-handle process is noticed.

Logs during issue before crash on Dec 2:
Dec 2 13:31:47.777 EST: %PLATFORM-3-ELEMENT_CRITICAL: SIP0: smand: RP/0: Committed Memory value 115% exceeds critical level 100%

CMD: 'show plat softw status contr br' 14:06:32 EST Wed Dec 2 2015
IOSXE-WATCHDOG: Process = Exec
.Dec 2 14:07:04.115 EST: %SCHED-0-WATCHDOG: Scheduler running for a long time, more than the maximum configured (120) secs.
-Traceback= 1#a3fe01abba2bac2871f0e4442db8a494 ld-linux-x86-64:7FED81E8A000+8A

Conditions:
With PFR on head end master controller and BR

Workaround:
They disabled the PfR on the head end Master Controller and Border Routers (DMVPN Hub routers). The memory looks stable since then.
--------------------------------------------------------------
NADC2-PfR-MC#sh pfr ma
OER state: disabled

NADC2R4-DMVPN-HUB2#sh pfr bo
OER BR 10.220.253.52 DISABLED, MC 172.27.0.186 UP/DOWN: DOWN
Conn Status: CLOSED
OER Netflow Status: ENABLED, PORT: 3949
Version: 3.3 MC Version: 0.0
Nbar Status: Inactive
Exits

NADC1R2-DMVPN-HUB1#sh pfr bo
OER BR 10.220.253.51 DISABLED, MC 172.27.0.186 UP/DOWN: DOWN
Conn Status: RETRY
OER Netflow Status: ENABLED, PORT: 3949
Version: 3.3 MC Version: 0.0
Nbar Status: Inactive
Exits

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.4(3)S5.1, 15.5(3)S2.7, 15.6(0.22)S4, 16.3(0.158)
Alert Type:
Updated *
Bug Id:
CSCux23929
Title:
DL RPC timeout during FPD upgrade of CEOP SPAs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When using "upgrade hw-module subslot fpd file force" to upgrade the firmware of the CEOP SPA, the DL RPC Timeout message is seen and the fpd upgrade fails. Even if the upgrade fails, there will be no issues with the state of the SPA and it will work as it was before the upgrade was tried.

Conditions:
This is intermittent and seen only with CEOP SPAs.
The FPD upgrade works fine most of the times.

Workaround:
No workaround. Only suggestion is to keep some time gap between 2 successive fpd upgrades.

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(3)S2.7, 15.6(0.22)S4, 16.3(0.127)
Alert Type:
Updated *
Bug Id:
CSCus55505
Title:
ASRNAT: Static PAT commands are lost from the config after reboot
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
It is possible to configure static PAT to router interface (or interface IP) and dynamic PAT to router interface (or interface IP) at the same time. This is a valid and supported configuration used by many customers which have single public IP address. Example:

ip nat inside source static tcp 10.1.75.2 23 interface GigabitEthernet0/0/1.99 5000
ip nat inside source list 100 interface GigabitEthernet0/0/1.99 overload

In this case, static PAT command will be lost after router reload, because we put commands into the running-config and startup-config in reverse order. Dynamic PAT command is processed first during bootup, NAT allocates dynamic TCP portblock 4096 - 5119 for dynamic PAT and static PAT command is rejected, because TCP/5000 is within the 4096 - 5119 range.

So, the requirement is: we need to place static NAT/PAT commands into configuration before dynamic NAT/PAT commands and process them first after reboot.

Conditions:
IOS-XE versions have this defect.

Workaround:
Do not use router interfaces or router IPs for either static or dynamic PAT if possible. Use pools instead. The pools should not include any of router IPs.

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.4(3)S5.7, 15.5(2.16)S, 15.5(3)S
Alert Type:
Updated *
Bug Id:
CSCup01088
Title:
CPUHOG and crash on 'clear dmvpn session' with large NHRP cache
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On an ASR 1000 Series Aggregation Services Router configured with DMVPN, CPUHOG messages may be observed after 'clear dmvpn session' is invoked.

In certain cases, this may lead to a watchdog timeout and an unexpected reboot of the router.

Conditions:
This issue is observed when a router has a very large NHRP table (10-20k entries or more) with a large number (thousands) of child entries per parent entry.

Workaround:
Reduce the size of the NHRP database through supernetting or similar.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
15.2(4)S1
Known Fixed Releases: *
15.2(1)SY1.13, 15.2(1)SY2, 15.2(4.0)ST, 15.2(4.0.21)E, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1)IE101.170, 15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10
Alert Type:
Updated *
Bug Id:
CSCuy99510
Title:
ASR 1000 crash due to memory corruption - chunk magic overwritten.
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Unexpected reload due to memory corruption. In crashinfo information about bad magic number in chunk header .

Conditions:
No special conditions. No known traffic attribute which can causes the issue.

Workaround:
No None Workaround

Further Problem Description:
Suggest to Upgrade to a later long lived release.

Last Modified:
22-APR-2016
Known Affected Releases:
15.2(4)S3
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCub14611
Title:
%IOSXE-3-PLATFORM: R0/0: kernel: physmap-flash.0: Chip not ready
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
%IOSXE-3-PLATFORM: R0/0: kernel: physmap-flash.0: Chip not ready

Conditions:
When the flash is updated, such as ROMMON upgrade or card reboot.

Workaround:
None

Further Problem Description:

Last Modified:
25-APR-2016
Known Affected Releases:
15.2(4)S, 15.3(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
New
Bug Id:
CSCuz28483
Title:
After OIR the power, power state shows "ps, fail" at ASR1001
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
After OIR the power, power state shows "ps, fail" at ASR1001/ASR1001-X

Conditions:
when OIR the power module

Workaround:
none

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
15.6(0.1)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux28792
Title:
ASR1K PIM Register process memory leak in processor pool
Status:
Other
Severity:
3 Moderate
Description: *

Symptom:
IOS-XE memory leak in PIM Register Process

Conditions:
This has been see on ASR1K running 3.10.2 code.

Potential triggers: with auto-rp config.

When PIM register creates a PIM encap and PIM decap tunnels upon leaning RP via auto-rp group-rp mapping.

seems like when router loss RP and learned again it will create new tunnels but won't free the memory for old ones.

Workaround:
Not known



Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
15.3(3)S2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy62083
Title:
If the Upgrade package is missing a desired package the box gets hold up
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
If ROMMON release 16.2(1r) is used to upgrade ESP40, the upgrade progress will fail. ESP40 will display "upgrade in progress" even it has failed.
16.2(1r) ROMMON package does not include older ESP40's ROMMON.
ROMMON upgrade on ESP40 will fail.

Conditions:
Use IOS command "upgrade rommon file [all | F0 | F1]" where FP are older (such as ESP40).

Workaround:
Use hw-module to reload the ESP40 to bring it back on line.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux59083
Title:
ASR1K: Error-objects after reloading scale DOWN MEP routed mode
Status:
Open
Severity:
4 Minor
Description:

Symptom:
ASR1K: Error-objects after reloading scale DOWN MEP routed mode

Conditions:
define down mep over subinterface,
reloading uut.

Workaround:
reloading EFP.

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw10240
Title:
traceback @cpp_ipc_stats_check_pending_requests during sslvpn scale
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Scaling the SSLVPN configuration followed by clearing all the sessions abruptly and re connecting results in a traceback

Conditions:
With 5000 sslvpn sessions scaled, if we bring them all down abruptly, then, start re-connecting one client, but at the authentication prompt cancel the connection, we happen to see a traceback on the SSLVPN gateway

Workaround:
none

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
15.6(1)S, 16.2(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw81845
Title:
"dir harddisk:" doesn't display files post loading incorrect image 4RU
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Loading incorrect image leads to kernal core

Conditions:
Loading incorrect image on 4RU

Workaround:

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
16.2(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj84864
Title:
dev_pluggable_optics_selftest attribute table internally inconsistent
Status:
Open
Severity:
4 Minor
Description:

Symptom:The following message is seen while booting the router with XE311 image:
dev_pluggable_optics_selftest attribute table internally inconsistent @ 0x121

Conditions:if router will be booted with XE311 image
Workaround:
none

Last Modified:
25-APR-2016
Known Affected Releases: *
15.4(1)S, 16.3(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy84247
Title:
Platform hardware throughput showing 2.5G on ASR1002-HX
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
Platform hardware throughput showing 2.5G on ASR1002-HX

Conditions:
Platform hardware throughput showing 2.5G on ASR1002-HX and the crypto throughput showing 40G when the configured crypto throughput license is 8g-25g

Workaround:

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
16.3(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtx17869
Title:
Actual IPv6 Traffic Path doesn't Match sh ipv6 cef exact-route(+ASR Bug)
Status:
Other
Severity:
6 Enhancement
Description: *

Symptom:
The command sh ipv6 cef exact-route does not show the correct egress interface for traffic

Conditions:
In a network with multiple parallel paths the commad sh ipv6 cef exact-route does not show the correct egress interface for traffic streams. This happens when using any of the cef load sharing
algorithms:

ipv6 cef load-sharing algorithm include-ports source
ipv6 cef load-sharing algorithm include-ports destination
ipv6 cef load-sharing algorithm include-ports source destination

Workaround:
No known workaround.

Last Modified:
06-APR-2016
Known Affected Releases:
15.1(3)S1
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz12624
Title:
IOS-XE: ENH: Match-in-vrf should support interface overloading
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
This is an enhancement defect filed to bring in interface overloading support in the match-in-vrf scenario

Conditions:
Router must be running IOS-XE. ISR routers running IOS are not affected.

Workaround:
Use another available routable IP address for PAT overload

Further Problem Description:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-2/nat-xe-2-book/iadnat-match-vrf.html#GUID-C3DA78F1-231C-4C7C-B57E-53B1EF32B385
Presently in the match-in-vrf scenario where the inside and outside interfaces both belong to the same f-vrf, then interface overloading is not supported. This enhancement defect is filed to bring in the support so, our customers do not have to purchase an additional IP address from their ISPs.

Last Modified:
08-APR-2016
Known Affected Releases:
15.1(1.13.17)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux59115
Title:
ASR1002-X Crash with dpidb_tableid_params_initialize
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
1. Memory increased gradually since the BB virtual interface grew up
QoS database objects are created by BB in tdl context, so we can observe the undeleted object rising up when virtual interface is created due to subscriber coming in.
TDL name 11/03 11/04 11/05 11/06 11/09
[cce_comm] type cce_classinfo 6545 6930 7000 8150 5660
[cce_comm] type cce_parent_info 1309 1386 1400 1630 1132
[mcp_comm] type if_handle 1309 1386 1400 1630 1132
[qos_defs] type hqf_node_id 1309 1386 1400 1630 1132
[qos_hqf] type tdl_hqf_queue_params 1308 1385 1399 1080 979
[qos_hqf] type tdl_hqf_priority_params 186 197 199 202 140
[qos_hqf] type tdl_hqf_shape_params 185 196 198 202 139
[qos_hqf] type tdl_hqf_reparent_params 1309 1386 1400 1630 1132
[qos_hqf] type hqf_node 1309 1386 1400 1630 1132
[qos_hqf] type hqf_nodelist 1309 1386 1400 1630 1132

The different value day-to-day
TDL name 11/04-11/03 11/05-1104
[cce_comm] type cce_classinfo 385 70
[cce_comm] type cce_parent_info 77 14
[mcp_comm] type if_handle 77 14
[qos_defs] type hqf_node_id 77 14
[qos_hqf] type tdl_hqf_queue_params 77 14
[qos_hqf] type tdl_hqf_priority_params 11 2
[qos_hqf] type tdl_hqf_shape_params 11 2
[qos_hqf] type tdl_hqf_reparent_params 77 14
[qos_hqf] type hqf_node 77 14
[qos_hqf] type hqf_nodelist 77 14

VA interface numbers
11/03 11/04 11/05 11/06 11/09
173 184 186(include one deleted) 377(280 deleted) 426(307 deleted)
So we can see 11/03-11/04, 11 new VA interfaces come into box, and 2 among 11/04-11/05. They match the tdl statistics in the above table.
When the subscribers of BB increase, VA increase at the same time, the memory grow up gradually. Looks like it is expected behavior.


2. VA interfaces accumulated more than 11/05 included many interfaces in state 'deleted' at 11/06.

Conditions:
We see the following logs in the syslog :

Oct 1 16:39:31 asr-lotim-1 124543: Oct 1 16:40:38: %PLATFORM-3-ELEMENT_CRITICAL: SIP0: smand: RP/0: Committed Memory value 119% exceeds critical level 100%
Oct 1 16:39:31 asr-lotim-1 124544: Oct 1 16:40:43: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#d7cb43846ce742756d3c512c783a19d5 errmsg:7F176F8B7000+121D cpp_common_os:7F1772D39000+DA3C cpp_common_os:7F1772D39000+1B5AE cpp_ifdb:7F178656D000+82CE cpp_ifdb:7F178656D000+15E3B cpp_qos_ea_lib:7F17879E8000+72F4A cpp_qos_ea_lib:7F17879E8000+72289 cpp_common_os:7F1772D39000+11C20 cpp_common_os:7F1772D39000+12306 evlib:7F1771AB0000+B937 evlib:7F1771AB0000+E200 cpp_common_os:7F1772D39000+13E42 :400000+5D26 c:7

Oct 1 16:39:33 asr-lotim-1 124549: Oct 1 16:40:53: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#d7cb43846ce742756d3c512c783a19d5 errmsg:7F176F8B7000+121D cpp_common_os:7F1772D39000+DA3C cpp_common_os:7F1772D39000+1B5AE cpp_ifdb:7F178656D000+82CE cpp_ifdb:7F178656D000+15E3B cpp_qos_ea_lib:7F17879E8000+72F4A cpp_qos_ea_lib:7F17879E8000+72289 cpp_common_os:7F1772D39000+11C20 cpp_common_os:7F1772D39000+12306 evlib:7F1771AB0000+B937 evlib:7F1771AB0000+E200 cpp_common_os:7F1772D39000+13E42 :400000+5D26 c:7

Traceback summary for these logs :
-----------------
% 0x7f176f8b821d : errmsg
% 0x7f1772d46a3c : cpp_vbuginf_flags_error
% 0x7f1772d545ae : cpp_buginf_flags_internal_error
% 0x7f17865752ce : cpp_ifdb_if_read_validate
% 0x7f1786582e3b : cpp_ifdb_feature_read
% 0x7f1787a5af4a : cpp_qos_ea_stats_query_intf
% 0x7f1787a5a289 : cpp_qos_ea_stats_query_n_async_handler_cmn
% 0x7f1772d4ac20 : smc_invoke_msg_callback
% 0x7f1772d4b306 : smc_msg_read_internal..1
% 0x7f1771abb937 : __evDispatch
% 0x7f1771abe200 : __evMainLoop
%

Last Modified:
12-APR-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz43804
Title:
ENH: FlexVPN Anyconnect-EAP Dual Authorization for dual-auth
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
This enhancemnet is about having about having clear authorization scheme for dual authentication.

Conditions:
dual-authorization

Workaround:
none

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
15.4(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum12999
Title: *
Tunnel QoS Rooted from Port-Channel Interface
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
There is currently no support for QoS configuration on a tunnel interface which is sourced from a port-channel.

Conditions:
The commands to configure QoS on a port-channel rooted tunnel are available but the QoS polices will not be applied properly.

Workaround:
No workaround as this feature is not supported. It may be possible to configure QoS on a different interface to accomplish the same functionality.

Further Problem Description:

Last Modified:
18-APR-2016
Known Affected Releases:
15.2(4.1.1)
Known Fixed Releases:
15.5(0.1)S
Alert Type:
New
Bug Id:
CSCuz46362
Title:
Monitoring ASR1000 hardware TCAM usage
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
This is an enhancement to provide a tool for monitoring hardware TCAM of ASR1000

Such possibility is not available in any release as of May 2016. At this time, there is no plan to provide such tool.

Conditions:

Workaround:
Use command:
show platform hardware qfp active tcam resource-manager usage

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
n/a
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论