Cisco Blog » The Platform

2016年5月1日星期日

Cisco Notification Alert -Nexus 3000 Series Switch-01-May-2016 16:53 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - Nexus 3000 Series Switches

Title:
End-of-Sale and End-of-Life Announcement for the Cisco Nexus 3500 Series Switches
Description:

Description: Cisco announces the end-of-sale and end-of-life dates for the Cisco Nexus 3500 Series Switches. The last day to order the affected product(s) is October 7, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
11-APR-2016
Title:
End-of-Sale and End-of-Life Announcement for the Cisco Nexus 3132Q Switch (40 GE)
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco Nexus 3132Q Switch (40 GE). The last day to order the affected product(s) is October 20, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
21-APR-2016

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3132Q Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172TQ Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2d.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2d)

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3048 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3048 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3016 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3016 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3048 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064-T Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064-T Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 31128PQ Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2d.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2d)

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 31128PQ Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3548 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)A6(5b)
Alert Type:
New File
File Name:
n3500-uk9.6.0.2.A6.5b.bin
File Description:

Nexus 3500 Release 6.0(2)A6(5b) System Image

File Release Date:
29-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3548 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)A6(5b)
Alert Type:
New File
File Name:
n3500-uk9-kickstart.6.0.2.A6.5b.bin
File Description:

Nexus 3500 Release 6.0(2)A6(5b) Kickstart Image

File Release Date:
29-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.A6.5b.tcl
File Description:

Nexus 3500 Release 6.0(2)A6(5b) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
29-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.A6.5b.py
File Description:

Nexus 3500 Release 6.0(2)A6(5b) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
29-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064-T Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3016 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.tcl
File Description:

Nexus 3000 Release 6.0(2)U6(5c) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Kickstart Image

File Release Date:
08-APR-2016
Alert Type:
New File
File Name:
poap_script.6.0.2.U6.5c.py
File Description:

Nexus 3000 Release 6.0(2)U6(5c) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3132Q Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3132Q Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U6(5c)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U6.5c.bin
File Description:

Nexus 3000 Release 6.0(2)U6(5c) System Image

File Release Date:
08-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2d.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
25-APR-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 3000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuy96311
Title:
IPFIB-2-FIB_ADJ_TABLE_FULL Log Created When FIB Table Isn't Full
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
This behavior will result in the below log message and the punting of all traffic to the CPU potentially crashing the device.

2012 Mar 15 14:55:59 hostname %IPFIB-2-FIB_ADJ_TABLE_FULL: FIB Adjacency table is full

Conditions:
When the same adjacency entry is added to the adjacency table, which consist of an software cache and an matching hardware entry. Two entries will be allocated in the software cache but only one will be added as an hardware entry. The repetition of this behavior will result in exhausting the software entry space of 64Kb were there will still be free space within the hardware adjacency table to create new entries.


This behavior isn't visible via the [sho ip fib adjacency] command as the output won't display a full table. To verify this issue the software/hardware adjacency table will need to be compared to each other. As these tables should be close to an 1-on-1 representation of each other.

show hardware internal libsdk mtc l3 sw-adj-tbl-cache valid-only | count ---->To view the software cache in which the table will become full at 65535 entries.

show hardware internal libsdk mtc l3 adj-tbl all valid-only | count ---->To view the hardware entry table.

Workaround:
None

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
6.0(2)A6(2)
Known Fixed Releases: *
6.0(2)A6(5.253), 6.0(2)A6(6), 6.0(2)A8(0.344), 6.0(2)A8(0.346), 6.0(2)A8(1)
Alert Type:
Updated *
Bug Id:
CSCuv54592
Title:
Additional secondary IPv6 addresses removed on upgrade to Camden
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
In 6.X and previous NXOS versions the "secondary" keyword is required to add multiple IPv6 addresses to an interface as with the IPv4 behavior. In 7.X NXOS versions, the "secondary" keyword is no longer needed to match RFC. When upgrading from 6.X to 7.X code, the IPv6 secondary keywords will be removed correctly in order to maintain all IPv6 addresses configured on interfaces.

Conditions:
In 6.X and previous NXOS versions the "secondary" keyword is required to add multiple IPv6 addresses to an interface as with the IPv4 behavior. In 7.X NXOS versions, the "secondary" keyword is no longer needed to match RFC. When upgrading from 6.X to 7.X code, the IPv6 secondary keywords will be removed correctly in order to maintain all IPv6 addresses configured on interfaces.

Workaround:
In 6.X and previous NXOS versions the"secondary" keyword is required to configure multiple IPv6 address on an interface. Starting in 7.X NXOS code, the secondary keyword is no longer needed.

Further Problem Description:

Last Modified:
08-APR-2016
Known Affected Releases:
7.0(3)I2(0.495)
Known Fixed Releases: *
7.0(3)I2(0.546), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCuv33390
Title:
MSDP timers should match (S,G) state
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Currently in NX-OS, MSDP timers rely on the generation of Null-Registers on the RP to keep the SA state active. Even if the (S,G) expiry timer is increased and the source stops sending, the SA will eventually time out due to inactivity from the source as the Null-Registers will stop even though the (S,G) is still active.

Conditions:
This is the default behavior in NX-OS.

Workaround:
None.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.0(2)A4(3)
Known Fixed Releases: *
6.0(2)A6(6), 6.0(2)A7(2), 6.0(2)A8(0.334), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U8(0.334), 6.0(2)U8(0.337), 6.0(2)U8(1), 7.0(3)F1(0.228), 7.0(3)I4(0.3)
Alert Type:
New
Bug Id:
CSCuw10613
Title:
CAMDEN_GLDN:"neutron_usd " core is seen on QI with build 601
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Nexus might crash due to neutron_usd process.

Conditions:
Neutron is the component which is using the USB for internal communication. The defect in the USB library might cause this issue.

Workaround:
None

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.0(3)I2(0.601), 7.0(3)I3(1), 7.0(3)IM3(1.40)
Known Fixed Releases:
7.0(3)I4(0.90), 7.0(3)I4(1)
Alert Type:
New
Bug Id:
CSCuz30306
Title:
N3K: Crashed at Service "iftmc" after upgrade to dublin plus image
Status:
Other
Severity:
2 Severe
Description:

Symptom:
After upgraded to the latest nxos.7.0.3.I4.0.91.bin image on Paris, the crashed happened

copy core:2011 Jan 9 15:11:01 Paris %$ VDC-1 %$ %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "iftmc" (PID 15587) hasn't caught signal 11 (core will be saved).
2011 Jan 9 15:11:01 Paris %$ VDC-1 %$ %SYSMGR-SLOT1-2-HAP_FAILURE_SUP_RESET: Service "iftmc" in vdc 1 has had a hap failure

Conditions:
after the crash, the system start rebooting

here is the console for the system:
telnet 172.22.150.17 2033
Term server pass is "cisco"

currently running the last stable image: 7.0(3)IDP5(0.42)

Workaround:
reBoot to back to the previous image build 7.0(3)IDP5(0.42)
the system is stable now

Further Problem Description:
log file and core file in the attachment

Log and core file locates at:

/auto/cores/fjw/CSCuz30306

Last Modified:
28-APR-2016
Known Affected Releases:
7.0(3)I4(0.91)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur04934
Title:
Nexus 3000/3500 - Product evaluation for CVE-2014-6271 and CVE-2014-7169
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-3410

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-3410 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-APR-2016
Known Affected Releases:
6.0(2)U4(1), 7.0(99.1)ZZ, 7.2(0.1)PR(0.1), 9.5(1)N1(7.8)
Known Fixed Releases:
5.0(3)U5(0.214), 5.0(3)U5(1j), 6.0(2)A3(3.80), 6.0(2)A3(3.82), 6.0(2)A3(4), 6.0(2)A4(1.21), 6.0(2)A4(2), 6.0(2)A5(0.918), 6.0(2)A5(0.920), 6.0(2)A5(1)
Alert Type:
Updated *
Bug Id:
CSCuy69477
Title:
Packet drops due to FCS-Err (CRC) for multicast traffic
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Between 2 Nexus 3500, multicast traffic which is switches from a source to the link between the 2 nexus 3500 may result in a very low amount of CRC error'ed frames being received by the receiving nexus 3500.

Conditions:
The issue has a lower frequency when non-port-channel interfaces are used.

Workaround:
None

Further Problem Description:

Last Modified:
25-APR-2016
Known Affected Releases:
6.0(2)A6(2)
Known Fixed Releases: *
6.0(2)A6(4.2), 6.0(2)A6(4.3), 6.0(2)A6(5.253), 6.0(2)A6(6), 6.0(2)U6(4.2), 6.0(2)U6(4.3), 6.0(2)U6(6.253), 6.0(2)U6(7)
Alert Type:
Updated *
Bug Id:
CSCuy57375
Title:
10Gbase-SR SFPs not coming up on Nexus 3548-X
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
10Gbase-SR SFP transceivers might become stuck in "link not connected" state on Nexus 3500-X devices;
At the same time the affected interfaces do recognize that the transceivers are installed, and even a good Rx/Tx power signal could be seen in "show interface transceiver detail" outputs;
This issue could be seen only on N3500-X devices, non-X N3500 devices are not affected;

Conditions:
The issue could be seen on N3500-X devices running NX-OS versions 6.0(2)A6(5a) and 6.0(2)A7(2)

Workaround:
Downgrade to the unaffected 6.0(2)A6(4a)

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.0(2)A6(5), 6.0(2)A7(2)
Known Fixed Releases: *
6.0(2)A6(4.2), 6.0(2)A6(5.246), 6.0(2)A6(5a), 6.0(2)A6(6), 6.0(2)A7(1.64), 6.0(2)A7(2a), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(4.2), 6.0(2)U6(5a)
Alert Type:
New
Bug Id:
CSCuz10567
Title:
Nexus 3000 - GLC-T comes online only on 100m
Status:
Open
Severity:
2 Severe
Description:

Symptom:
GLC-T SFP inserted into N3K-C3064PQ-10GX doesn't come up with speed set auto/1000

Conditions:
unknown

Workaround:
unknown

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.0(2)U6(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy38921
Title:
Evaluation of nexus-3000 for glibc_feb_2016
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cisco Nexus 3016 series switches
Cisco Nexus 3048 series switches
Cisco Nexus 3064 series switches
Cisco Nexus 3132 series switches
Cisco Nexus 3172 series switches

may includes a version of glibc that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-7547

And disclosed in http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-glibc

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Affected devices running a version of NX-OS software numbered as 6.0(2)Ux(x) or 5.0(3)Ux(x) are NOT affected by this vulnerability.

Devices running a version of NX-OS labeled 7.0(3)I2(x) or 7.0(3)I3(1) prior to the first fixed version are affected.

Cisco has reviewed and concluded that this product is affected by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-7547

Workaround:
Not available.

Further Problem Description:
Nexus 3000 is not affected in any release based off of 5.0(3)Ux(x) or 6.0(2)Ux(x) as these releases are on GLIBC version 2.8 which is not affected.

Nexus 3000 running unified code with Nexus 9000 7.0(3)I2(x) is affected and the fix for CSCuy36553 provides the fix for Nexus 3000 also in these releases.

There are SMU patches for these releases that have been published for both Nexus 3000 and Nexus 9000.

For more details on the SMU patches, refer to SMU release notes at:

7.0(3)I2(2a)

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/release/notes/70322a_patch_nxos_rn.html

7.0(3)I2(2b)
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/release/notes/70322b_patch_nxos_rn.html

Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10.0/9.5

http://tools.cisco.com/security/center/cvssCalculator.x?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Last Modified:
20-APR-2016
Known Affected Releases:
7.0(3)I2(2a), 7.0(3)I2(2b), 7.0(3)I3(1)
Known Fixed Releases: *
7.0(3)I2(2b), 7.0(3)I2(2c), 7.0(3)I4(1)
Alert Type:
Updated *
Bug Id:
CSCum55820
Title:
Nexus 3172 Not Creating Any S,G Entries
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
Nexus 3172 not creating any S,G entries.

Conditions:
Multicast routing is configured on the device. Device is both a first-hop router for multicast sources, in addition to having attached receivers.

Workaround:
None

Further Problem Description:

Last Modified:
25-APR-2016
Known Affected Releases: *
6.0(2)U2(1), 7.0(3)I4(0.86)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz09640
Title:
ERSPAN-Source with header-type 3 stops working after interface flap
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Captured traffic is no longer received on the ERSPAN destination device after an interface flaps on the ERSPAN source Nexus 3500 switch.

Conditions:
ERSPAN-Source session configured with header-type 3 and IP reachability to the ERSPAN destination is done using a non-default VRF on a Nexus 3500 switch.
The flapping interface has to be part of the interfaces configured in the monitor session.

Workaround:
Shut/no shut on the ERSPAN-Source session can be used to temporary recover from this issue.

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
6.0(2)A7(2)
Known Fixed Releases: *
6.0(2)A6(5.253), 6.0(2)A6(6), 6.0(2)A8(0.360), 6.0(2)A8(1), 6.0(2)U6(6.253), 6.0(2)U6(7), 6.0(2)U8(0.360), 6.0(2)U8(1)
Alert Type:
Updated *
Bug Id:
CSCuy92412
Title:
N3500 crashed during Regex configuration.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After regex configuration changes switch crashed with "vshd hap reset".

Conditions:
Regex configuration changes.

Workaround:
Not using regular expressions.

Further Problem Description:
n/a

Last Modified:
20-APR-2016
Known Affected Releases:
6.0(2)A7(2)
Known Fixed Releases: *
6.0(2)A6(5.253), 6.0(2)A6(6), 6.0(2)A8(0.343), 6.0(2)A8(1), 6.0(2)U6(6.253), 6.0(2)U6(7), 6.0(2)U8(0.343), 6.0(2)U8(1)
Alert Type:
Updated *
Bug Id:
CSCuy64495
Title:
N3K // RBAC | Json // fail
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
error when logging with a role that is limited to " | json"
/isan/bin/nxpython: can't open file '/isan/bin/pipejson': [Errno 13] Permission denied

Conditions:
N3K with roles configured with | json. and login to the switch using this role

Workaround:
NA

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
6.0(2)U6(5)
Known Fixed Releases: *
6.0(2)A6(5.253), 6.0(2)A6(6), 6.0(2)U6(6.253), 6.0(2)U6(7)
Alert Type:
Updated *
Bug Id:
CSCuz00736
Title:
netconf get for "show boot" fetches no output
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
netconf get for "show boot" fetches no output

Conditions:
netconf get for "show boot"

affects all pre-camden codes.

Workaround:
use scripts to manually collect "show boot" output.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.0(2)U6(6)
Known Fixed Releases: *
6.0(2)A6(5.253), 6.0(2)A6(5.254), 6.0(2)A6(6), 6.0(2)A8(0.352), 6.0(2)A8(0.353), 6.0(2)A8(1), 6.0(2)U6(6.253), 6.0(2)U6(6.254), 6.0(2)U6(7), 6.0(2)U8(0.352)
Alert Type:
Updated *
Bug Id:
CSCuv59159
Title:
LLDP DCBX TLV disable does not move interface to operational OFF state
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Using "no lldp tlv-select dcbxp" on interfaces that are operational ON for PFC will only result in one side going to operational OFF while other side stays operational ON

Conditions:

Workaround:
Force mode to OFF instead of AUTO at interface level on both ends

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
6.0(2)U3(7.99)
Known Fixed Releases: *
7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCut95639
Title:
Adding basic show commands to feature show techs (N3K)
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
some commands are missing in feature show tech which causes BDB/BORG data analysis automation to fail

Conditions:
all

Workaround:
na

Further Problem Description:

Last Modified:
18-APR-2016
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy61171
Title:
N3000 routing hash does not work with SVI in-interface option
Status:
Fixed
Severity:
3 Moderate
Description: *

Keyword "in-interface" is not really required for n3000 and n3100 to provide routing hash result.

Symptom:
"show routing hash" command could result in error message on T2/T+ N3000 platforms when in-interface option is provided.

Conditions:
"show routing hash" used with "in-interface" option on T2/T+ based N3000 platforms.

Workaround:
Skip the "in-interface" option in "show routing hash" command.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
7.0(3)I3(1)
Known Fixed Releases: *
7.0(3)I4(0.80), 7.0(3)I4(1)
Alert Type:
Updated *
Bug Id:
CSCue68402
Title:
QOS:Incorrect MTU in show queuing int after changing network-qos
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Changing other parameters in network-qos class-map, MTU gets changed.

Conditions:
This issue happens when other parameters are changed in a network-qos class-map

Workaround:
None

Further Problem Description:

Last Modified:
13-APR-2016
Known Affected Releases:
6.0(2)U1(1)
Known Fixed Releases: *
6.0(2)U3(1)
Alert Type:
Updated *
Bug Id:
CSCux02122
Title:
Loss of control plane with high Memory utilization on 3k - no core
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Memory utilization increased from 62% to 78% over the last 3-months. The memory is leaking in the FWM process:

Nexus# show process memory

PID MemAlloc MemLimit StkSize RSSMem LibMem StackBase/Ptr Process

----- -------- ---------- ------- ------- ------- ------------- ---------
.
.

3380 421928960 931326668 86016 458145792 78491648 ffbab540/ffffffff fwm


In the example above we see the RSSMEM (holding memory) for the fwm process is at 458145792. Looking in more detail, we find that the memory is being held by FWM_MEM_fwm_temp_t:

Nexus# show platform fwm mem-stats detail
.
.
Private Mem stats for UUID : Forwarding manager Daemon(652) Max types: 371

--------------------------------------------------------------------------------

TYPE NAME ALLOCS BYTES

CURR MAX CURR MAX
41 FWM_MEM_fwm_temp_t 1560000 1560002 299520000 299524016

When memory got above 78% the switch became unresponsive. Initially SNMP access was lost. Then, L2 forwarding loop was observed. Nothing coming out of console serial port. Upon reload the switch came back fine.

Conditions:
When "show mac address-table" or "show mac address-table static" is executed,

Workaround:
Not to execute "show mac address-table" or "show mac address-table static"

Further Problem Description:
Each iteration was found to be leaking around 96KB of memory.
Issue not present in NXOS 7.x

Last Modified:
13-APR-2016
Known Affected Releases:
6.0(2)U5(2)
Known Fixed Releases: *
6.0(2)A6(4.4), 6.0(2)A6(5.183), 6.0(2)A6(5a), 6.0(2)A6(6), 6.0(2)U6(4.183), 6.0(2)U6(4.4), 6.0(2)U6(5), 6.0(2)U6(5a)
Alert Type:
Updated *
Bug Id:
CSCux02274
Title:
N3172TQ - "no negotiation auto" fails to bring port in 100Mbps
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
N3172TQ switch may fail to bring port UP with speed 100Mbps when Auto negotiation is disabled.

Conditions:
Enabled Auto-negotiation on N3100

Workaround:
none

Further Problem Description:

Last Modified:
13-APR-2016
Known Affected Releases:
7.0(3)I2(1), 7.0(3)I3(0.75)
Known Fixed Releases: *
7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCts58414
Title:
route-map removed from running-config when set community modified
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptoms:
Configuring 'no community' in route-map results in removing the route-map from running configuration.

Conditions:
Always
Workaround:
Delete the route-map and re-configure the route-map.


Last Modified:
13-APR-2016
Known Affected Releases:
5.0(3)U2(1)
Known Fixed Releases: *
5.0(3)U2(2)
Alert Type:
Updated *
Bug Id:
CSCuf90234
Title:
show tech ip pim is not included in show tech ip multicast
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show tech ip multicast or show tech multicast does not include show tech ip igmp snooping and show tech ip pim. It gives a syntax error


n3k2# show tech multicast | be "show tech-support ip pim"
Syntax error while parsing 'show tech-support ip igmp snoopingshow tech-support
ip pim'

`show tech-support routing ip multicast`
`show running-config routing ipv4 multicast`

!Command: show running-config routing ipv4 multicast
!Time: Thu Mar 28 17:02:24 2013

version 5.0(3)U5(1d)

`show ip mroute vrf all`
IP Multicast Routing Table for VRF "default"

(*, 232.0.0.0/8), uptime: 00:01:05, pim ip
Incoming interface: Null, RPF nbr: 0.0.0.0
Outgoing interface list: (count: 0)


`show routing ip multicast vrf all bitfield`
IP Multicast Routing Table for VRF "default"
-------------------SNIP-----------------------------------------------


n3k2# show tech ip multicast | be "show tech-support ip pim"
Syntax error while parsing 'show tech-support ip igmp snoopingshow tech-support
ip pim'

`show tech-support routing ip multicast`
`show running-config routing ipv4 multicast`

!Command: show running-config routing ipv4 multicast
!Time: Thu Mar 28 17:06:37 2013

version 5.0(3)U5(1d)

`show ip mroute vrf all`
IP Multicast Routing Table for VRF "default"

(*, 232.0.0.0/8), uptime: 00:05:19, pim ip
Incoming interface: Null, RPF nbr: 0.0.0.0
Outgoing interface list: (count: 0)
--------------------------------------SNIP--------------------------------------

Conditions:

Workaround:
Please get show techs ip pim and show tech ip igmp snoooping along with show tech ip multicast

Further Problem Description:

Last Modified:
13-APR-2016
Known Affected Releases:
5.0(3)U5(1d)
Known Fixed Releases: *
7.0(3)I3(1)
Alert Type:
New
Bug Id:
CSCuy76055
Title:
Upgrade from A1(1d) to IMR4 and deleting static nat rule fails
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:After the upgrade from A1(1d) to A6(5), some of nat-rules can't be deleted.
Conditions:there should be some nat-rules existing on device and upgrade should be done from A1(1d) to A6(5).
Workaround:1. do 'no feature nat'
2. and 'copy r s'
3. reload and reconfig new nat-configurations.



Last Modified:
06-APR-2016
Known Affected Releases:
6.0(2)A6(5)
Known Fixed Releases:
6.0(2)A6(5.252), 6.0(2)A6(6), 6.0(2)A8(0.337), 6.0(2)A8(1)
Alert Type:
New
Bug Id:
CSCuy90656
Title:
Routes are not purged from rib after bgp table-map filter is applied
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
Routes are not removed from RIB after table-map filter is applied on BGP process
Conditions:
Add table-map filter on BGP
Workaround:
Clear ip route * will fix the issue. New routes learnt via BGP will go through the table-map as expected.

Last Modified:
03-APR-2016
Known Affected Releases:
7.0(3)I2(2a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux69836
Title:
N3K: v6 RIP Neighborship doesn't come up over tunnel interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RIPng neighborship won't come-up between peers when configured above Ipv4 tunnel.

Conditions:
When RIPv6 is configured above IPv4 tunnel.

Workaround:
Avoid using RIPng above IPv4 tunnel (Other IGRP protocol can be used such as EIGRP,OSPF,IBGP)

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
7.0(3)I3(0.216)
Known Fixed Releases: *
7.0(3)I3(1.12), 7.0(3)I3(1.7), 7.0(3)I3(2), 7.0(3)I4(0.115), 7.0(3)I4(0.6), 7.0(3)I4(1), 7.0(3)IED5(0), 7.0(3)IED5(0.19)
Alert Type:
Updated *
Bug Id:
CSCub35279
Title:
Netconf may crash upon receiving crafter payload
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom
Crash in NX-OS NetConf Process

Symptom:

Conditions:
An authenticated session, sends a crafted NetConf Payload to the device.

Workaround:
None.

Further Problem Description:
After a NetConf process crash, if the NetConf client reconnects the NetConf agent will be restarted.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2012-3942 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
01-APR-2016
Known Affected Releases:
5.0(3)U5(1)
Known Fixed Releases: *
6.0(2)A8(0.345), 6.0(2)A8(1), 6.0(2)U8(0.345), 6.0(2)U8(1)
Alert Type:
Updated *
Bug Id:
CSCuy03757
Title:
Specific SNMP GET request causes 'snmpd' and 'licmgr' services to crash
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Cisco NX-OS Software-based devices contain a buffer overflow vulnerability in the SNMP subsystem.
An authenticated, remote attacker can exploit the vulnerability by submitting a malicious SNMP
query via UDP port 161 to trigger a buffer overflow condition in the SNMP and License Manager
components of the device. Successful exploitation could allow the attacker to execute arbitrary
code with elevated privileges.

SNMP is disabled by default and must be explicitly configured by an administrator. Because SNMP
is primarily a UDP-based protocol, no TCP three-way handshake is required to exploit this vulnerability,
and the malicious request could contain a spoofed origin. The attacker must know the configured
community strings for SNMP version 1 and version 2. Exploitation also requires a valid username
and password when a device is configured for SNMP version 3.

This vulnerability can be triggered via SNMP over IPv4 and SNMP over IPv6.

Conditions:
The NX-OS device is configured for SNMP.

Workaround:
The SNMP community string should be secure.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 9/7.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2013-1179, CVE-2013-1180 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
01-APR-2016
Known Affected Releases:
7.0(7)ZN(0.265)
Known Fixed Releases: *
6.0(2)A8(0.345), 6.0(2)A8(1), 6.0(2)U8(0.345), 6.0(2)U8(1)
Alert Type:
Updated *
Bug Id:
CSCuz37102
Title:
clock protocol ptp requirement for ptp operation
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
ptp corrections out of acceptable 2-3 digits range when "clock protocol ptp" is not configured.

Conditions:
Enable ptp on interfaces, without "clock protocol ptp".

Workaround:
Enable "clock protocol ptp" globally.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
6.0(2)A7(0.10)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz25317
Title:
N3048 does not allow 10M speed interface configuration
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"speed 10" configuration is not available on RJ45 ports of Nexus 3048.

Conditions:
Always

Workaround:
"speed auto" advertises 10M, 100M and 1000M speeds. If the partner port support only 10M speed, it auto negotiate to 10M speed. However, there will be no option to force speed 10M on N3048.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.0(3)I2(2c)
Known Fixed Releases:
7.0(3)I4(0.101), 7.0(3)I4(1)
Alert Type:
Updated *
Bug Id:
CSCuy55754
Title:
Nexus 3000 running 7.0(3)I2(2b) floods multicast traffic
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Nexus 3000 running 7.0(3)I2(2b). Multicast gets flooded to all ports on a vlan

Conditions:
this only occurs when the router with the host port does not have a (*,G) for the group

Workaround:
none

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.0(3)I2(2b)
Known Fixed Releases: *
7.0(3)I4(0.111), 7.0(3)I4(1)
Alert Type:
New
Bug Id:
CSCuz43841
Title:
100G transceiver links up in 10G if port is already in breakout mode
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
When the QSFP port is in 10g-4x breakout map mode with 100G transceiver inserted, the 4 member ports can sometimes detect false link up and sometimes flap continuously.

Conditions:
The issue will happen only when the port is first configured in 10g-4x mode and then 100G transceiver is plugged in. If the 100G transceiver is already present, then breakout to 10g-4x mode will not be allowed.

Workaround:
100G transceiver does not support 10g-4x breakout mode. Therefore, the unsupported configuration has to be reverted manually.

switch(config) # no interface breakout module 1 port 49 map 10g-4x

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.0(3)I4(0.109)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy40542
Title:
DPLUS_N3K: Diff's on runn & startup with lldp configs
Status:
Fixed
Severity:
3 Moderate
Description:

Previous releases showed difference between running configuration and startup configuration for LLDP, even after running configuration is saved to startup configuration. This issue is fixed now.

Symptom:
Display issue

Conditions:
When LLDP is configured

Workaround:
None

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.0(3)IDP3(1.135)
Known Fixed Releases:
7.0(3)IDP3(1.149), 7.0(3)IED5(0), 7.0(3)IED5(0.19)
Alert Type:
New
Bug Id:
CSCuz17880
Title:
N3K/N9K IPv6 BFD echo does not work even enabled for ospfv3 Session
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
BFD IPv6 Sessions does not working in Echo mode, when BFD IPv6 Session end-point address is Link-local.

Conditions:
BFD IPv6 Sessions does not working in Echo mode, when BFD IPv6 Session end-point address is Link-local.
Issue seen for OSPFv3 BFD Sessions.
Issue seen even with "bfd echo-interface loopback" configuration.

Workaround:
None.

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.0(3)I2(2b)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz40585
Title:
Incorrect DSCP marking for ERSPAN packets
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Incorrect DSCP marking for ERSPAN packets

Conditions:
Setting DSCP for ERSPAN

Workaround:
use equivalent TOS values

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.0(2)U6(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut13672
Title:
Disable LLFC CLIs on N3K platform
Status:
Fixed
Severity:
3 Moderate
Description: *

When the device was booted up with 'flowcontrol [receive on/ send on] " on some interfaces, some control protocols and data traffic wasnt flowing fine on the ports, the solution was to remove the "flowcontrol send on" or "flowcontrol receive on"


Symptom:Some control protocols like ARP and data traffic does not flow on some of the ports in the system.

Conditions:When device is booted up with "flowcontrol receive on"/"flowcontrol send on"" on some interfaces, some control protocols like ARP and data traffic doesn't flow fine on these ports

Workaround:remove "flowcontrol send on"/"flowcontrol receive on" CLI on these interafces.

option 1)

configure dummy policy and remove it.

policy-map type queuing XXX
class type queuing class-default
bandwitdh percent 100
queue-limit dynamic 7


system qos
service-policy type queueing output xxx
no service-policy type queueing output xxx

Or

option 2)

Remove the config line and reload the switch.
More Info:When the device was booted up with 'flowcontrol [receive on/ send on] " on some interfaces, some control protocols and data traffic wasnt flowing fine on the ports, the solution was to remove the "flowcontrol send on" or "flowcontrol receive on"



Last Modified:
27-APR-2016
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
6.0(2)U5(1.36), 6.0(2)U5(2), 6.0(2)U6(0.100), 6.0(2)U6(1), 7.0(3)I2(0.604), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.37)
Alert Type:
New
Bug Id:
CSCuz43747
Title:
"interface breakout module 1" cli stops at first 100G port
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
"interface breakout module 1" cli command does not breakout all 40G ports if there are any 100G transceivers present

Conditions:
This issue will be seen when we have a mix of 40G and 100G transceivers present in QSFP ports.

For example, let us assume port 49, 50 and 52 has 40G transceivers, and port 51 has 100G transceiver.
"interface breakout module 1" command does breakout successfully on ports 49 and 50. But it will fail on port 51 and the command stops without breaking out port 52.

Workaround:
An easy workaround is to apply "interface breakout" for each port individually, like,

switch(config)# interface breakout module 1 port 49 map 10g-4x
switch(config)# interface breakout module 1 port 50 map 10g-4x
switch(config)# interface breakout module 1 port 52 map 10g-4x

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.0(3)I4(0.109)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz27398
Title:
"show lldp neighbor details" doesn't list all neighbors
Status:
Open
Severity:
4 Minor
Description:

Symptom:
"show lldp neighbor details" doesn't list all neighbors

Conditions:
Exact trigger not known. When cusotmer performed this validation this behavior is noticed on nodes running 6.0(2)U5(2).

Workaround:

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
6.0(2)U5(2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz14818
Title:
Allow breakout of 3264Q to 4x10G instead of 2x10G
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
This enhancement request is filed to allow break out of 3264Q ports to 4x10GB until the 128 port maximum is hit.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases:
7.0(3)EV(0.1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq21095
Title:
Akamai: Camden 2.4 N3000 need to support snmp dot1qTpFdbTable
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
snmpwalk on dot1qTpFdbTable returns error
SNMPv2-SMI::mib-2.17.7.1.2.2 = No Such Object available on this agent at this OID

Conditions:
snmpwalk on dot1qTpFdbTable

Workaround:
No workaround

Further Problem Description:
dot1qTpFdbTable does not seem to be currently supported.

Last Modified:
14-APR-2016
Known Affected Releases:
6.0(2)U4(0.841)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz23076
Title:
HSRP holdtimer doesn't reset upon receiving HSRP hello
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:

Conditions:
HSRP running between N3548

Workaround:
none

Further Problem Description:
HSRP command " show hsrp interface " displays incorrect expiry value for HSRP peer due to which user will think that HSRP is going to flap.

Example

if we have HSRP timers configured to 4 and 1.
show hsrp interface command will show that PEER is sending a HSRP hello within 3-3.5 seconds.
The expiry timer even goes to 0.757000 seconds.

Last Modified:
27-APR-2016
Known Affected Releases:
6.0(2)A6(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv97195
Title:
n3048 : cannot boot tftp or boot usb from loader prompt
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
1. The n30xx platform fails to boot tftp: from the loader prompt unless a reboot command is executed from the loader prompt first.

2. The usb device is not recognized from the loader prompt.

Conditions:Normal conditions.
Workaround:1. Execute the reboot command from the loader prompt prior to the tftp. When the reboot completes and execution returns to the loader prompt, the boot tftp: command will be successful.

Last Modified:
24-APR-2016
Known Affected Releases:
7.0(3)I2(0.585)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论