Cisco Blog » The Platform

2016年5月1日星期日

Cisco Notification Alert -Nexus 6000 Series Switch-01-May-2016 16:53 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6004 Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)N1(1)
Alert Type:
Software Advisory
File Name:
n6000-uk9.7.2.1.N1.1.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) System Image

Software Advisory Date:
14-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6004 Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)N1(1)
Alert Type:
Software Advisory
File Name:
n6000_poap_script.7.2.1.N1.1.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) Python Reference script for PowerOn Auto Provisioning (POAP)

Software Advisory Date:
14-APR-2016
Alert Type:
Software Advisory
File Name:
n6000_poap_script.7.2.1.N1.1.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) TCL Reference script for PowerOn Auto Provisioning (POAP)

Software Advisory Date:
14-APR-2016
Alert Type:
Software Advisory
File Name:
n6000-uk9-kickstart.7.2.1.N1.1.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) Kick Start Image

Software Advisory Date:
14-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6001 Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)N1(1)
Alert Type:
Software Advisory
File Name:
n6000-uk9.7.2.1.N1.1.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) System Image

Software Advisory Date:
14-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6001 Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)N1(1)
Alert Type:
Software Advisory
File Name:
n6000-uk9-kickstart.7.2.1.N1.1.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) Kick Start Image

Software Advisory Date:
14-APR-2016
Alert Type:
Software Advisory
File Name:
n6000_poap_script.7.2.1.N1.1.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) TCL Reference script for PowerOn Auto Provisioning (POAP)

Software Advisory Date:
14-APR-2016
Alert Type:
Software Advisory
File Name:
n6000_poap_script.7.2.1.N1.1.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.2(1)N1(1) Python Reference script for PowerOn Auto Provisioning (POAP)

Software Advisory Date:
14-APR-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 6000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCux92689
Title:
VMM_TIMEOUT: Service SAP 175 for slot 33 timed out in UPGRADE_READY_SEQ
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Observed %VMM-2-VMM_TIMEOUT: Service SAP 175 for slot 33 timed out in UPGRADE_READY_SEQ during ISSU

Conditions:
On a scaled vpc setup with 24 fexes, observed that ND-ISSU from 7.1(3)N1(2) to .upg image is consistently failing during upgrading first fex due to vmm timeout in upgrade_ready sequence.

Workaround:
None

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
7.1(2)N1(0.599), 7.1(3)N1(1.5)
Known Fixed Releases: *
7.1(3)N1(1.6), 7.1(3)N1(2), 7.1(3)ZN(0.242), 7.1(4)N1(0.777), 7.1(4)N1(1), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.106), 7.3(0)IZN(0.13), 7.3(0)N1(0.272)
Alert Type:
New
Bug Id:
CSCuz44008
Title:
Nexus reboot __inst_001__isis_fabricpath crash
Status:
Open
Severity:
1 Catastrophic
Description:

Symptom:
Service: __inst_001__isis_fabricpath - Description: IS-IS Data-Center Ethernet Protocol
Exit code: signal 6 (no core)
Started at Thu Aug 16 04:46:15 2001 (509705 us)
Stopped at Fri Jun 7 05:58:24 2002 (319097 us)
Uptime: 295 days 1 hours 12 minutes 9 seconds
Last heartbeat 4.32 secs ago
Death reason: SYSMGR_DEATH_REASON_FAILURE_SIGNAL (2)
RLIMIT_AS: 683885248
Virtual Memory TOTAL used: 667856 KB

NX-OS Core Decode Info (Info obtained from a NX-OS Core Decode)
Core Type is 'Nexus NXOS'
Found Build Type is 'final'
Found Build Root is '/auto/iluka/daily_build/iluka/nexus/184/src'
Found Hardware Model is 'n5000_uk9'
Found Release Version is '7.0(5)N1(1)S0'
VBE Version is '5.1.5.1'
Application Name is '/auto/iluka/daily_build/iluka/nexus/184/src/build/n5k/x86s/final/isis/supnuovaor/isis_l2mp'
CPU Architecture is 'Intel'
customize_target_fs
Build tree is /auto/iluka/daily_build/iluka/nexus/184/src
dir name is n5000_uk9
ucdfsp
ucdbsp /tmp/ucd.bDoDilkWXDwzZ31767
finallink is /auto/iluka/daily_build/iluka/nexus/184/src/build/n5k/x86s/final/libcrdcfgnuova/supnuovaor/libcrdcfgnuova_5k.so /tmp/ucd.bDoDilkWXDwzZ31767/isan/lib/libcrdcfgnuova.so
Program terminated with signal 6, Aborted.

1. 0x414875a6 raise ---> /tmp/ucd.bDoDilkWXDwzZ31767/lib/libc.so.6
2. 0x4148ad18 abort ---> /tmp/ucd.bDoDilkWXDwzZ31767/lib/libc.so.6
3. 0x082b5185 vni_sbmp_new ---> ../include/isan/sbmp_template.h:2122
4. isis_l2mp_show_vni_in_sbmp ---> ../routing-sw/routing/isis/isis_l2mp_ui.c:15216
5. 0x082ba252 isis_l2mp_show_vlan_range_cmd ---> ../routing-sw/routing/isis/isis_l2mp_ui.c:15305
6. 0x778e50b8 command_context_c::call_command ---> ../feature/vsh/cli/cli_common/cli_component.cc:1071
7. 0x778e58da cli_transient_run ---> ../feature/vsh/cli/cli_common/cli_component.cc:517
8. 0x77af602f procket_pthread_rtn ---> ../routing-sw/libs/syswrap/procket_pthread.c:843
9. 0x415c4140 start_thread ---> /tmp/ucd.bDoDilkWXDwzZ31767/lib/libpthread.so.0
10. 0x415278ce clone ---> /tmp/ucd.bDoDilkWXDwzZ31767/lib/libc.so.6

ucd 1.3b-cli +ucsm
Copyright (c) 2013-2015 Cisco Systems, Inc.
For Internal Use Only

A universal core decoder for UCS, Nexus, MDS & ACE products
across Intel, PowerPC, MIPS & ARM CPU architectures

INFO: Given Core Name is '/nobackup/bsitomer/smartdecoder-tmp/BHY-N5K-DC-041460031896_0x101_isis_fabricpath_log.7662.tar.gz'
INFO: Core Type is 'Nexus NXOS'
INFO: Found Build Type is 'final'
INFO: Found Build Root is '/auto/iluka/daily_build/iluka/nexus/184/src'
INFO: Found Hardware Model is 'n5000_uk9'
INFO: Found Release Version is '7.0(5)N1(1)S0'
INFO: VBE Version is '5.1.5.1'
INFO: Application Name is '/auto/iluka/daily_build/iluka/nexus/184/src/build/n5k/x86s/final/isis/supnuovaor/isis_l2mp'
INFO: CPU Architecture is 'Intel'
INFO: Creating NXOS target file system...
INFO: customize_target_fs
INFO: Build tree is /auto/iluka/daily_build/iluka/nexus/184/src
INFO: dir name is n5000_uk9
INFO: ucdfsp
INFO: ucdbsp /tmp/ucd.bDoDilkWXDwzZ31767
INFO: finallink is /auto/iluka/daily_build/iluka/nexus/184/src/build/n5k/x86s/final/libcrdcfgnuova/supnuovaor/libcrdcfgnuova_5k.so /tmp/ucd.bDoDilkWXDwzZ31767/isan/lib/libcrdcfgnuova.so
creating links .... /auto/andpkg/rep_cache//wr-x86/3.0FCS/sysroot/lib /tmp/ucd.bDoDilkWXDwzZ31767/lib
Core type is :: NEXUS
bld type is :: /auto/iluka/daily_build/iluka/nexus/184/src

warning: .dynamic section for "/tmp/ucd.bDoDilkWXDwzZ31767/isan/lib/libif_index.so" is not at the expected address (wrong library or version mismatch?)


Last Modified:
29-APR-2016
Known Affected Releases:
7.0(5)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz28231
Title:
N6K LACP Not being processed to SUP
Status:
Open
Severity:
1 Catastrophic
Description:

Symptom:
After an upgrade to NX-OS 7.0(8)N1(1), under rare conditions, LACP packets can get dropped and LACP port-channels go into an individual or suspended state

Conditions:
Seen under rare conditions after an upgrade.

Workaround:
None for LACP. Using static port-channels is a potential workaround.

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.0(8)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz01388
Title:
Dell B22 fex does not detect Link Down on LACP Windows server. Linux OK
Status:
Open
Severity:
2 Severe
Description:

Symptom:
B22 Dell Fexes dual-homed to a pair of Nexus 6000 running 7.0(6)N1(1).

Server connected by eVPC with LACP NIC teaming, running Windows HyperV

When the server disables the NIC team member, the fex reports the link is still up. When the server re-enables the port, connectivity is broken.

Shut/no shut on the Fex side or reconfiguring the Fex port or power-cycling the Fex does not help.

Reloading the server resolves the issue.

Keeping the same HW configuration, if the same server is booted with Linux OS, there is no issue: the Fex detects the link down.

replacing the Fex with a pass-through module, when the Windows server disables one NIC, the parent switch correctly detects the link down.

Dell reproduced the problem. Opening this defect for tracking

Conditions:
Server running Hyper V NIC teaming and running Windows.

Workaround:
reload the Windows Server.

Further Problem Description:

Last Modified:
01-APR-2016
Known Affected Releases:
7.0(6)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw61635
Title:
vpc crash at fu_fsm_engine_post_event_processing on 48 AA fex bringup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vpc core

Conditions:
copying bootflash file to running-config with 600+po

Workaround:
issue is fixed

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
7.3(0)N1(0.150)
Known Fixed Releases: *
7.1(3)ZN(0.158), 7.1(4)N1(0.713), 7.1(4)N1(1), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.104), 7.3(0)IZN(0.7), 7.3(0)N1(0.171), 7.3(0)N1(1), 7.3(0)ZN(0.158)
Alert Type:
Updated *
Bug Id:
CSCuz12597
Title:
5600: Fex fails to boot on 7.1(0)N1(1b)
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
A FEX plugged into a Nexus 5600 switch running 7.1(0)N1(1b) may remain stuck in "Image Download" state and not boot.

Conditions:
FEX attached to Nexus 5600

Workaround:
Contact Cisco TAC

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv99658
Title:
VPC peer link is not coming up after peer-link flap
Status:
Open
Severity: *
2 Severe
Description:

Symptom:
VPC peer-link down.VPC peer link is not coming up after peer-link flap (reason:vPC peer is not reachable over cfs).

Conditions:
Its a timing issue and happens very very rarely. Mostly after first peer-link flap post reload.

Workaround:
Shut and no shut on the peer-link ie flapping the vpc peer-link will solve the issue.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.3(0)N1(0.104)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu21817
Title:
High convergence time for multicat/broadcast trf during vPC Primary ISSU
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Seeing convergence delay of around 20 Sec , on FTAG-1 reload on scaled setup (4000 VLANs/ 5000 Multicast routes)

Conditions:
Scaled setup :
1) multiple FP core ports / nodes
2) 4000 FP VLANs
3) 5000 multicast routes

Workaround:
Config recommendations:
1. BFD on Fabricpath enabled interfaces ? Better convergence for Unicast

feature bfd
fabricpath domain default >>> This enabled for all fabricpath interfaces
Bfd

feature bfd
Interface >>>> for specific fabricpath interfaces
fabricpath isis bfd


2. IS-IS parameters for better re-convergence


>>> On Leaf
fabricpath domain default
spf-interval 400 50 50
lsp-gen-interval 100 50 50


>>> On Spine
fabricpath domain default
spf-interval 100 50 50
lsp-gen-interval 100 50 50


3. Remove unsed vlans

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.2(0)N1(0.186), 7.2(1)N1(0.286)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu37102
Title:
N5K kernel Panic on AIPC driver causing crash
Status:
Fixed
Severity:
2 Severe
Description:

A Nexus 5K/6K could reload due to a kernel panic

Symptom:

Conditions:
This has been seen on Nexus running 7.1(1)N1(1) and 7.0(6)N1(1)

Workaround:
Software fix is currently available in NX-OS 7.1(2)N1(1).
A debug plugin based workaround also exists. Please contact TAC to obtain the workaround.

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases: *
6.0(2)N2(7), 7.1(1)N1(1), 7.2(0)N1(0.97), 7.3(0)N1(0.104)
Known Fixed Releases:
7.0(6)N1(1.4), 7.0(6)N1(2s), 7.0(7)N1(0.65), 7.0(7)N1(1), 7.0(7)ZN(0.141), 7.1(2)N1(0.575), 7.1(2)N1(1), 7.1(2)ZN(0.36), 7.2(1)N1(0.246), 7.2(1)N1(1)
Alert Type:
New
Bug Id:
CSCuw45151
Title:
BrdCast Drop / incorrect Ofil with the elam Capture in Vinci Spine
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
mCast with Autoconfiguration is not supported

Conditions:

Workaround:

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.2(0)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux95887
Title:
port-security internal information not cleared on feature de-activation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When port-security is disabled from an interface, port-security internal information remains in the system.

Conditions:
Port-security enabled and disabled on a port.

Workaround:
Reload the FEX of disabled the port-security globally

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.2(1)N1(0.331)
Known Fixed Releases:
7.1(3)N1(4), 7.1(3)ZN(0.224), 7.1(4)N1(0.764), 7.1(4)N1(1), 7.3(1)N1(0.38), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuv37294
Title:
2248: Packets getting Blackholed in the HIF VPC port-channel
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Packets will get black holed in the HIF VPC Port-channel

Conditions:
1) FEX 2248
2) 55xx based Platforms
3) Running 7.0(6)N1(1)

Workaround:
1) Keep one single HIF port in the HIF port-channel.
2) If there are more ports in port-channel, Change the hashing by shutting down ports on HIF side.

Further Problem Description:

Last Modified:
24-APR-2016
Known Affected Releases:
7.0(6)N1(0.1)
Known Fixed Releases:
7.0(3)I2(2d), 7.0(3)I4(0.90), 7.0(3)I4(1), 7.0(7)N1(0.288), 7.0(7)N1(1), 7.0(7)ZN(0.173), 7.1(3)N1(0.619), 7.1(3)N1(1), 7.1(3)ZN(0.25), 7.2(1)N1(0.283)
Alert Type:
Updated *
Bug Id:
CSCuy83222
Title:
N5696+N5696-M12Q with sub-interf;Snmppolling Cause MTS Buff leak-pfstats
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Nexus 5696 with N5696-M12Q Ethernet Modules running sub interfaces, On 7.0(6)N1.1 code.

Conditions:
Polling via SNMP MIBs

1.3.6.1.2.1.31.1.1.1.10
1.3.6.1.2.1.31.1.1.1.6
1.3.6.1.2.1.31.1.1.1.7
1.3.6.1.2.1.2.2.1

Workaround:
Disable snmp on switch , this will slowly reduce the MTS buffer, but takes hours. To clear whole MTS buffer quick rather than waiting after disabling SNMP, Reload the box.

Command to disable SNMP:

No snmp-server protocol enable

Further Problem Description:
None

Last Modified:
20-APR-2016
Known Affected Releases: *
7.0(6)N1(1), 7.2(0)N1(0.144)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy02812
Title:
ifmgr hap reset: show system internal im info module "non existing slot"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ifmgr hap reset when running CLI:
show system internal im info module "non existing slot"

Conditions:
show system internal im info module CLI is run

Workaround:
do not use "show system internal im info module x" with any non existing, non initialized module number

Further Problem Description:
ifmgr hap reste is seen when running the CLI:
show system internal im info module "non existing slot"

Issue is seen for some slot#s like 99, 59, 39, etc..

Last Modified:
19-APR-2016
Known Affected Releases:
7.3(0)N1(0.268)
Known Fixed Releases: *
7.1(3)ZN(0.242), 7.1(4)N1(0.777), 7.1(4)N1(1), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.106), 7.3(0)N1(0.278), 7.3(0)N1(1), 7.3(0)ZN(0.256)
Alert Type:
Updated *
Bug Id:
CSCur13534
Title:
ptplc reset while copy ptp config followed by poweroff & no poweroff mod
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ptplc process crash

Conditions:
issue is specific to UP LEM(N6004X-M20UP). If ptp is configured on UP LEM interfaces and reload(or module power off/power on) is performed.

Workaround:
before triggering reload(or module power off/power on), remove ptp config and apply config back once device is UP.

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
7.1(0)N1(0.339)
Known Fixed Releases: *
7.1(3)ZN(0.250), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.112), 7.3(1)N1(0.332), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCui84039
Title:
ascii-cfg core and n6k reload observed no feature-set fabricpath
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ascii-cfg process crash when doing "no feature-set fabricpath"

Nexus# sh core
Module Instance Process-name PID Date(Year-Month-Day Time)
------ -------- --------------- -------- -------------------------
1 1 ascii-cfg 3675 2011-03-27 00:00:46

Nexus(config)# no feature-set fabricpath
Feature-set Operation may take up to 30 minutes depending on the size of configuration.

[362482.443853] Shutdown Ports..
[362482.479243] writing reset reason 16, ascii-cfg hap reset

Broadcast message from root (console) (Fri MSending all processes the TERM signal...
Sending all processes the KILL signal...
Unmounting filesystems...

Conditions:
Issue command:
Nexus(config)# no feature-set fabricpath

Workaround:
N/A

Further Problem Description:

Last Modified:
15-APR-2016
Known Affected Releases:
6.0(2)N2(2), 6.0(2)N3(0.195)
Known Fixed Releases: *
5.2(1)N1(9.179), 5.2(1)N1(9a), 7.0(0)N1(0.501), 7.0(0)N1(1), 7.0(0)ZN(0.208)
Alert Type:
Updated *
Bug Id:
CSCuw59277
Title:
FEX 2348 A-A: Packets send to wrong FEX HIF interface
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms:
Packets are being forwarded to wrong port in FEX A-A setup. This issue can be seen when FEX is
connected to any parent switch like Nexus 5000/6000 or Nexus 7000 or Nexus 9000.

Conditions:
2348 in A-A Mode

Workaround:
Either of the following workaround should help mitigate the issue.

- Reload the impacted FEX.
- When the host is dual-homed both FEX should be reloaded.
- If FEXes are dual homed, then change them to single homed.
- If this is an EVPC setup and servers are in VPC to the fex, then shut down one interface link
going to one of the fexes. Ie make the Server standalone to the FEX.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
13-APR-2016
Known Affected Releases:
7.1(2)N1(1), 7.1(3)N1(0.647), 7.1(4)N1(0.722), 7.3(0)D1(0.138), 7.3(0)N1(0.208), 7.3(0)N1(0.245)
Known Fixed Releases: *
7.1(3)N1(2.7), 7.1(3)N1(4), 7.1(3)ZN(0.196), 7.1(4)N1(0.740), 7.1(4)N1(1), 7.3(1)N1(0.319), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz16221
Title:
FWM crash and switch reloads.
Status:
Open
Severity:
2 Severe
Description:

Symptom:
FWM crash and switch reloads.

Conditions:
1) lot of PVLAN MAC clone/delete calls around the time of crash from trace log and double mac delete as well).
2) Segmentation fault happen inside fwm_malloc/mtrack_alloc call.
3) Fix for CSCut55443 is present in image but never kicked-in, not seeing trace logs present on the fix on
collected trace log from core.

Workaround:
NONE

Further Problem Description:

Last Modified:
13-APR-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw51800
Title:
unable to delete param-list from config file
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When using auto-config, the param-list of a profile are not removed when a profile is un-applied.

Conditions:
This happens after "copy r s" and reload reload with param-list / applied configs present in startup config.

Workaround:
Use no param-list xyz cross-check command to force remove the param-list if it is not actually being used.

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases:
7.3(0)N1(0.150)
Known Fixed Releases: *
7.0(3)I3(0.276), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.100), 7.0(3)IDM3(0), 7.0(3)IDM3(0.6), 7.1(3)N1(2.13), 7.1(3)N1(3), 7.1(3)ZN(0.131), 7.1(4)N1(0.696)
Alert Type:
Updated *
Bug Id:
CSCuw78727
Title:
Nexus 6000 crash due to "fwm hap reset"
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:Nexus 6000 crash in "fwm hap reset".

Conditions:Customers moving from hyams to
Issues should not be seen in Nexus 56xx switches since pre iluka images are not supported in these.
Workaround:Customer has done a two step ND ISSU.
ND ISSU hyams to ND ISSU from
Switch has not been reloaded throughout the process.

Before triggering a ISSU from 7.0(6)N1(1) to 7.0(7)N1(1),

Scenario 1 :
if some VLANs were deleted in 7.0(6)N1(1) then you will not see the VLAN in running config but you can see the VLAN in PSS
1. The vlan will not be seen in "show platform fwm info vlan" or "running-config"
2. But, the vlan is present in "show platform fwm info pss runtime_vlan". This contains the stale entries.

Customer has hit the issue. At this stage, if customer triggers a subsequent ND ISSU, system will crash.

Workaround :-
Recreate all the VLANs before the ISSU, so the running config and PSS are in sync. After system is moved to 7.0(7)N1(1) VLANs can be deleted safely.
Upgrade the system in maintenance mode.

Scenario 2:
If some (S,G)s were delete, recreated and then deleted after first ISSU.
1. The (S,G) is not present in "sh ip igmp snooping groups"
2. But the (S,G) is present in "show platform fwm info pss runtime_sg".

Customer has hit the issue. At this stage, if customer triggers a subsequent ND ISSU, system will crash.

Workaround :-
Upgrade the system in maintenance mode.



"A cleaner approach to get rid of this issue at this point would be to suggest the customers which have moved from ?hyams" to ?
More Info:the same crash can be present in other areas as well.
VLAN
Multicast (S,G)
Static MAC
Reg MAC
Runtime IF

All the entries which use this structure ?fwm_pss_runtime_ha_key_t? to form the key in PSS.

Orginal issue was introduced in iluka, when we move from hyams to higher version, the size of fwm_pss_runtime_ha_key_t has changed from 28 to 32 byte, so when we perform a ND ISSU from hyams to higher version, it creates a stale entry of 28 bytes in PSS. PSS can read the 28 byte entry and restore it, but it is not altered with subsequent create and delete on that object. Subsequent operations on that object will only create/delete a 32 byte entry.

This issue was leading to crash for Multicast (S,G) in iluka(<7.0.7) where customer was perorming a double step ISSU from hyams to iluka and then higher version.This was fixed by CSCuo28747. As part of the fix, we are converting every 28 byte entry to a 32 byte entry and deleting any further duplicates if present. But one corner case was missed out, if we delete the entry after first step ISSU, then the stale entry of 28 byte still exists in PSS and with subsequent ISSU it gets converted to 32 bytes and we try restoring a entry which does not exists in runtime database so the systems asserts.

Note :- PSS can read 28 byte entry but will write 32 byte entry with create and delete.

Following scenarios are there :-
1 . Customer moving from hyams to >=iluka6(7.0.7) or iplus2(7.1.2) directly will not hi

Last Modified:
11-APR-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy97195
Title:
Nexus 6000: Switch reload due to Kernel Panic
Status:
Open
Severity:
2 Severe
Description:

Symptom:
A Nexus 6000 series switch running NX-OS 7.1(3)N1(1) can experience a reset due to Kernel panic

Conditions:
Nexus 6000 series switch running NX-OS 7.1(3)N1(1)

Workaround:
None. Contact Cisco TAC

Further Problem Description:

Last Modified:
11-APR-2016
Known Affected Releases:
7.1(3)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCur99346
Title:
PPM_VSH_MAX_CMD_BUF_SIZE 4K limitation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Output of command "show running-config" will not show all vlans configured.

Conditions:
If a large number of vlans are configured such that the textual running configuration of vlans exceeds 4000 characters, output will get truncated.

Workaround:
If the buffer to print the complete list of vlan's in the configuration is not big enough, pick a vlan in the middle of your range and give it a non default vlan name.

Exampel: vlan 2000
default vlan name: VLAN2000

change the name to: VLAN-2000

that breaks the buffer in two and you get the complete list vlan;s printed in the show running-config output.
Depending on how many vlan's are individually configured you may have to do this 2 or 3 times to get all vlans printed.

Another workaround is to create a consecutive range of vlans, i.e:

vlan 1 - 2000

instead of vlan 1, 3,5,7,9,......

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.1(0)N1(0.386)
Known Fixed Releases:
7.1(3)N1(2.11), 7.1(3)N1(4), 7.1(3)ZN(0.234), 7.1(4)N1(0.770), 7.1(4)N1(1), 7.3(1)N1(0.36), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuy22192
Title:
Netapp Interop: Netapp F8040 LIF FDISC reject with Command not supported
Status: *
Other
Severity: *
3 Moderate
Description:

Symptom:
FDISC is rejected coming from FC ports on 2348UPQ.

Conditions:
Flogi will be accepted and Fdisc will be rejected on 2348UPQ FC ports

Workaround:
No workaround.

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
7.3(0)N1(0.287)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv81286
Title:
adm_eprom_get_hw_version_O2: Error: wbd failed to disable the black box
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
show version will show below

show version

adm_xbar_eprom_get_hw_version: Error: wbd failed to disable the black box <<<
adm_xbar_eprom_get_hw_version: writing to location failed, slot 0 <<<
adm_xbar_eprom_get_hw_version: cmd: dmesg > /tmp/i2cdebug <<<
Get hardware version failed <<<
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Documents: http://www.cisco.com/en/US/products/ps9372/tsd_products_support_series_home.html
Copyright (c) 2002-2014, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained herein are owned by
other third parties and are used and distributed under license.
Some parts of this software are covered under the GNU Public
License. A copy of the license is available at
http://www.gnu.org/licenses/gpl.html.

Software
BIOS: version 1.6.0
loader: version N/A
kickstart: version 7.0(1)N1(1)
system: version 7.0(1)N1(1)
Power Sequencer Firmware:
Module 1: version v4.0
Module 2: version v4.0
Fabric Power Sequencer Firmware: not available <<<

Conditions:
5596 or 6001(running 7.0(1)N1(1)

Workaround:
none;
not seen in latest 7.3(0)N1(1)

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
7.3(0)N1(0.91)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux81143
Title:
Specific SNMP GET request causes 'snmpd' and 'licmgr' services to crash
Status:
Fixed
Severity:
3 Moderate
Description:

Symptoms:
Cisco NX-OS Software-based devices contain a buffer overflow vulnerability in the SNMP subsystem.
An authenticated, remote attacker can exploit the vulnerability by submitting a malicious SNMP
query via UDP port 161 to trigger a buffer overflow condition in the SNMP and License Manager
components of the device. Successful exploitation could allow the attacker to execute arbitrary
code with elevated privileges.

SNMP is disabled by default and must be explicitly configured by an administrator. Because SNMP
is primarily a UDP-based protocol, no TCP three-way handshake is required to exploit this vulnerability,
and the malicious request could contain a spoofed origin. The attacker must know the configured
community strings for SNMP version 1 and version 2. Exploitation also requires a valid username
and password when a device is configured for SNMP version 3.

This vulnerability can be triggered via SNMP over IPv4 and SNMP over IPv6.

Conditions:
The NX-OS device is configured for SNMP.

Workaround:
The SNMP community string should be secure.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 9/7.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2013-1179, CVE-2013-1180 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
15-APR-2016
Known Affected Releases:
7.0(7)ZN(0.265)
Known Fixed Releases: *
5.2(1)N1(8.173), 5.2(1)N1(9a), 7.0(7)ZN(0.266), 7.0(8)N1(0.316), 7.0(8)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuo97783
Title:
Nexus 6000: 3-4 Packet loss during power off LEM operation/switch reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
During LEM power off operation in a Nexus 6000/5600, 3-4 seconds re-convergence time can be seen

Conditions:
Seen during LEM power off operation or reload of the switch.

Workaround:
Shutdown the interfaces on the switch before powering off the LEM or reload.

Further Problem Description:
This problem is seen due to laser not cut on all interfaces at the same time.

Last Modified:
25-APR-2016
Known Affected Releases:
7.0(2)N1(1)
Known Fixed Releases: *
7.1(3)N1(3.17), 7.1(3)N1(4), 7.1(3)ZN(0.258), 7.1(4)N1(0.793), 7.1(4)N1(1), 7.2(2)N1(0.412), 7.2(2)N1(1), 7.2(2)ZN(0.119), 7.3(1)N1(0.308), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz18744
Title:
N6K send-community gets removed on upgrade
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
send-community is removed from configuration

Conditions:
an upgrade from 6.0(2) to 7.0(0) or above

Workaround:
reapply configuration after upgrade.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
6.0(2)N1(2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCut92301
Title:
EEM redirection to file adds Cannot change the ownership of file: lines
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
After triggering a python script via source or EEM that redirects to a file, "Cannot change the ownership of file:" is added to the redirected file. This causes issues when trying to read back the file.

Conditions:
Specified software installed on device.

Workaround:
Modify file before file read is performed.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
7.0(5)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz02835
Title:
PBR -Applied PBR doesn't match the last ACE of the called ACL
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Packets follow the routing table path even though the PBR is applied.

This is noticed in N5600 (N56128P) version 7.0(2)N1(1).

Conditions:
ACL only using a remark entry

Workaround:
Add a ip ACE entry to the blank ACL

Further Problem Description:
From: gopasaha@cisco.com
To: "Abayomi Adefila (aadefila)" ,"Bing He (bhe2)" ,"Malaka Pathirana (mpathira)" ,"Nitin
Kakkar (nitkakka)" ,"Chandra Sekhar Vanka (cvanka)"
Cc: "email-in@cisco.com" ,"n5k6k-platform(mailer list)" ,"n5k6k-acl-dev(mailer list)" ,"nxos-rpm-dev(mailer list)" ,"nxos-aclmgr-dev(mailer list)" ,"nxos-acl-dev(mailer list)"
Subject: RE: SR 638307215 : Applied PBR doesn't match the last ACE of the called ACL

Hi,
Here is my analysis:

Due to the 'remark' ACE in the ACL "Latency-ACL-3" default permit all tcam entry (marked in red below) is getting added before the last ACE of ACL "Latency-ACL-2"
K:IPV4 (0x7/0x0) IN L-[V-0x1FF/0x3 ] routed
[1014] SA Label:0x0/0x0 DA Label:0x0/0x0
[1014] SA:0x00000000/0x00000000 DA:0xFFFFFFFF/0x0A0A7515
[1014]-> prio:7 stats:133 IFMAP REDIRECT:0 PERMIT
count:[0]-vmr_handle[460010104400136]


K:IPV4 (0x7/0x0) IN L-[V-0x1FF/0x3 ] routed
[1015] SA Label:0x0/0x0 DA Label:0x0/0x0
[1015] SA:0x00000000/0x00000000 DA:0xFFFFFFFF/0x0A0A7461
[1015]-> prio:7 stats:132 IFMAP REDIRECT:0 PERMIT
count:[0]-vmr_handle[460010104400137]


K:ALL (0x0/0xFFFF) IN L-[V-0x1FF/0x3 ] wide:h
[1016] SA Label:0x0/0x0 DA Label:0x0/0x0
[1016]-> prio:7 PERMIT


K:IPV4 (0x7/0x0) IN L-[V-0x1FF/0x3 ] routed
[1018] SA Label:0x0/0x0 DA Label:0x0/0x0
[1018] SA:0x00000000/0x00000000 DA:0xFFFFFFFF/0x0A0A7463
[1018]-> prio:7 stats:130 IFMAP REDIRECT:0 PERMIT
count:[0]-vmr_handle[460010104400138]


K:IPV4 (0x7/0x0) IN L-[V-0x1FF/0x3 ]
[1019] SA Label:0x0/0x0 DA Label:0x0/0x0
[1019] SA:0x00000000/0x00000000 DA:0x00000000/0x00000000
[1019]-> prio:7 stats:129 PERMIT
count:[0]-vmr_handle[460010100000000]

Looks like acl-manager is sending in this order. Due to this, the last entry [1018] of the ACL "Latency-ACL-2" is never getting hit and default permit entry [1016] is causing the traffic to take default RIB nexthop.

After removing the "Latency-ACL-3" , PBR next hop is taking effect.
513E.B.17-3750X-2#traceroute 10.10.116.99
Type escape sequence to abort.
Tracing the route to 10.10.116.99
VRF info: (vrf in name/id, vrf out name/id)
1 10.2.2.106 0 msec 0 msec 9 msec
2 10.2.2.170 0 msec * 0 msec


There are two issues here:


1. 'remark' ace for PBR is getting programmed as "permit all" entry in tcam. This is similar to "CSCus28695< https://cdetsng.cisco.com/webui/#view=CSCus28695>"; which was WCCP specific. Looks like for PBR also we need similar fix. I can build a private image with that fix and share it. Let me know from which release you need this private image.

2. Why 'rmark' ace s getting reorder ? May be acl-manager folks ca

Last Modified:
03-APR-2016
Known Affected Releases:
7.0(2)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu21983
Title:
mts leak between Mcecm SAP and CFS after mct flap followed by reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
observed MTS leak between Mcecm SAP and CFS services.

Conditions:
These MTS leaks are observed after mct flap on primary followed by reload.

Workaround:
none

Further Problem Description:

Last Modified:
01-APR-2016
Known Affected Releases:
7.2(0)N1(0.186)
Known Fixed Releases: *
7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.2(2)ZN(0.103), 7.3(0)IZN(0.7), 7.3(0)N1(0.150), 7.3(0)N1(1), 7.3(0)ZN(0.138)
Alert Type:
Updated *
Bug Id:
CSCuy85524
Title:
Bios image should be md5 verified after extraction prior to application
Status:
Open
Severity: *
3 Moderate
Description: *

Symptom:
On a Nexus 5xxx or Nexus 6xxx series switch if the bios image gets corrupted during file extraction the image is not verified currently before trying to apply it. This is an enhancement to verify the image before removing the old bios to make sure it is good.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases:
7.0(7)N1(1), 7.1(1)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq60111
Title:
Incorrect Type 1 vPC consistency for "vPC card type" in Enhanced vPC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show vpc consistency-parameters interface port-channel

Name Type Local Value Peer Value
------------- ---- ---------------------- -----------------------
vPC card type 1 FEX Empty -> Peer1 output
vPC card type 1 Empty FEX -> Peer2 output
OR
vPC card type 1 Empty Empty -> Peer1 output
vPC card type 1 Empty Empty -> Peer2 output

Conditions:
While configuring enhanced vPC on Nexus 6000 for first time or when recent reload has performed on both peers. We may see "vPC card type" Value mismatch on vpc peers.
- Expected output is

Name Type Local Value Peer Value
------------- ---- ---------------------- -----------------------
vPC card type 1 FEX FEX -> Peer1 output
vPC card type 1 FEX FEX -> Peer2 output

Workaround:
- Shut on FEX up-link port-channels on both vPC peers FIRST and then no-shut on both sides.

Note:- Fex interfaces will go offline when uplinks are disabled on both vpc peers

Further Problem Description:
This behavior does not affect funcationality of FEX or Host connected to HIF interfaces.

Last Modified:
19-APR-2016
Known Affected Releases:
6.0(2)N2(5)
Known Fixed Releases: *
7.1(3)ZN(0.242), 7.1(4)N1(0.777), 7.1(4)N1(1), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.104), 7.3(1)N1(0.308), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuj20687
Title:
Enh: Configuring static multicast mac-address for N6K NLB implementation
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
This is an enhancement request being filed for the Nexus 6000 platform to provide us with the ability to configure static multicast mac addresses for NLB type implementations. Currently configuring static multicast mac addresses (by way of either a static mac or igmp static-group) is not supported since the N6K does layer 3 based multicast lookup.

Conditions:
This bug only applies to Nexus 6000 up until the 6.0(2)N2(1) release.

Workaround:
None.

Further Problem Description:
For NLB type implementations, we need to map a unicast IP to a multicast mac address. On the N5K, we achieve this by a workaround of configuring static-group using corresponding layer 3 multicast IP address for that multicast MAC in question:


5548-2(config)# vlan x
5548-2(config-vlan)# ip igmp snooping static-group interface x

If the N5K is the layer 3 boundary, then we would also need to add a static ARP entry on the interface vlan on the N5K
Interface vlan
ip arp


For the N7K, we perform the following:

vlan configuration 10
layer-2 multicast lookup mac

vlan configuration 10
ip igmp snooping static-group 239.1.1.1 interface Ethernet8/2
ip igmp snooping static-group 239.1.1.1 interface Ethernet8/4
ip igmp snooping static-group 239.1.1.1 interface Ethernet8/7

For the N6K, although you can configure the static-group, it still does not work since the N6K does multicast forwarding based on multicast IP lookup i.e. It does *,G or S,G based lookup unlike N5K which does lookup based on multicast mac. If destination IP is multicast IP, traffic gets forwarded. If dest IP is unicast IP, though MAC is multicast MAC, traffic does not get forwarded. Hence it worked for N5K and not for the N6K.

Last Modified:
12-APR-2016
Known Affected Releases:
6.0(2)N2(1), 6.0(2)N2(3)
Known Fixed Releases:
7.0(0)N1(0.394), 7.0(0)N1(1), 7.0(0)ZN(0.122)
Alert Type:
Updated *
Bug Id:
CSCuy73026
Title:
sh run for ascii-cfg not displayed correctly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Configs under line vty, dont show up correctly during sh run

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
05-APR-2016
Known Affected Releases:
7.1(3)N1(1)
Known Fixed Releases: *
7.1(3)ZN(0.241), 7.1(4)N1(0.776), 7.1(4)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuw01221
Title:
N5K VPC orphan-port suspend (vpc peerlink is down) w/ peer adjacency OK
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After a reload of VPC primary, which comes up with VPC role primary, operational secondary, VPC orphan ports configured with 'orphan-port suspend' remain disabled with (vpc peerlink is down) after the delay restore timers expire. At the same time, vPC port-channels that meet consistency VPC requirements are up


R1-CS-5548-B-U41# sh vpc

Legend:
(*) - local vPC is down, forwarding via vPC peer-link

vPC domain id : 1
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive


R1-CS-5548-B-U41# show interface brief | inc peer

Eth1/11 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/13 302 eth access down vpc peerlink is down 1000(D) --
Eth1/14 302 eth access down vpc peerlink is down 1000(D) --
Eth1/17 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/18 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/19 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/20 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/21 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/22 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/23 302 eth trunk down vpc peerlink is down 10G(D) --
Eth1/24 302 eth trunk down vpc peerlink is down 10G(D) --

Conditions:
Start with normalized VPC pair (roles resolved). Power cycle or reload VPC.

In this scenario, the peer-link was using 10G twinaxe cables SFP-H10GB-CU1M.

Workaround:
Configure shut / no shut on the VPC orphan port

Further Problem Description:
Un-reproduce-able in the lab so far.

Last Modified:
19-APR-2016
Known Affected Releases:
6.0(2)N2(4)
Known Fixed Releases: *
7.1(3)ZN(0.242), 7.1(4)N1(0.777), 7.1(4)N1(1), 7.2(2)N1(0.407), 7.2(2)N1(1), 7.2(2)ZN(0.106), 7.3(1)N1(0.21), 7.3(1)N1(0.27), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz06292
Title:
n6k crash due to fwm hap reset
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
n6k crash due to fwm hap-reset

Conditions:

Workaround:
NONE

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
8.3(0)CV(0.54)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论