Cisco Blog » The Platform

2016年5月1日星期日

Cisco Notification Alert -Nexus 7000 Series Switch-01-May-2016 16:53 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - Nexus 7000 Series Switches

Title:
End-of-Sale and End-of-Life Announcement for the Cisco Nexus 7000 M1-Series (XL Version) I/O Modules
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco Nexus 7000 M1 Series (XL Version) I/O Modules. The last day to order the affected product(s) is October 30, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
15-APR-2016

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s1-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 1 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 1 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-dk9.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-kickstart.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-epld.6.2.16.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-epld.6.2.16.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s1-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
28-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
28-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
28-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-kickstart.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-dk9.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s1-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-dk9.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.CSCuw76278.bin
File Description:

Reload sockets Netstack panic crash due to buffer lockup

File Release Date:
28-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-kickstart.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-dk9.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-epld.6.2.16.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7700-s2-dk9.6.2.16.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(16)

File Release Date:
06-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.6.2.14.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(14)
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s2-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart.6.2.14.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016
Alert Type:
Software Advisory
File Name:
n7000-s1-kickstart-npe.6.2.14.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(14)

Software Advisory Date:
13-APR-2016

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-kickstart-npe.6.2.16.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s1-kickstart.6.2.16.bin
File Description:

Nexus 7000 Supervisor 1 Kick Start Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.2(16)
Alert Type:
New File
File Name:
n7000-s1-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 1 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Alert Type:
New File
File Name:
n7000-s2-epld.6.2.16.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 6.2(16)

File Release Date:
06-APR-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuw86978
Title:
F2E 6.2.(14) upgrade fail %VMM-2-VMM_SERVICE_ERR: VDC1: Service SAP
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
upgrade fail with error message
%$ VDC-1 %$ %VMM-2-VMM_SERVICE_ERR: VDC1: Service SAP Aclmgr SAP
for slot 3 returned error 0x41040069 (Sufficient free entries are
not available in TCAM bank) in if_bind sequence

and interfeces are removed , not shown in show interface though show module status is ok state.

`show module`
Mod Ports Module-Type Model Status
--- ----- ----------------------------------- ------------------ ----------
1 0 Supervisor Module-2 N7K-SUP2 active *
3 48 1/10 Gbps Ethernet Module N7K-F248XP-25E ok

* this terminal session
`show vdc membership`
Flags : b - breakout port
---------------------------------

vdc_id: 0 vdc_name: XXXXXXXXX interfaces:

vdc_id: 1 vdc_name: XXXXXXXXX interfaces:
*Ethernet3/1 *Ethernet3/2 *Ethernet3/3
*Ethernet3/4 *Ethernet3/5 *Ethernet3/6
*Ethernet3/7 *Ethernet3/8 *Ethernet3/9
*Ethernet3/10 *Ethernet3/11 *Ethernet3/12
*Ethernet3/13 *Ethernet3/14 *Ethernet3/15
*Ethernet3/16 *Ethernet3/17 *Ethernet3/18
*Ethernet3/19 *Ethernet3/20 *Ethernet3/21
*Ethernet3/22 *Ethernet3/23 *Ethernet3/24
*Ethernet3/25 *Ethernet3/26 *Ethernet3/27
*Ethernet3/28 *Ethernet3/29 *Ethernet3/30
*Ethernet3/31 *Ethernet3/32 *Ethernet3/33
*Ethernet3/34 *Ethernet3/35 *Ethernet3/36
*Ethernet3/37 *Ethernet3/38 *Ethernet3/39
*Ethernet3/40 *Ethernet3/41 *Ethernet3/42
*Ethernet3/43 *Ethernet3/44 *Ethernet3/45
*Ethernet3/46 *Ethernet3/47 *Ethernet3/48

Conditions:
F2E module
6.2.(14)

Workaround:
reduce the number of SVI

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(8.13), 7.3(0)D1(0.165)
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.3(0)D1(0.190), 7.3(0)D1(1), 7.3(0)ZD(0.208), 7.3(1)PDB(0.19), 7.3(1)PIB(0.24)
Alert Type:
Updated *
Bug Id:
CSCuw58529
Title:
repeating aclqos crashes caused N7K line card hap reset
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
N7K line card may see service "aclqos" crashes

Conditions:
this was seen on N7K running code 6.2.12 on M1 card.

Workaround:
no known for now.

Further Problem Description:
This issue may be seen on N7K line cards under the following conditions -

1. Bank chaining is enabled
2. Statistics is enabled for ACLs
3. Due to resources being fully utilized, policies are not split across tcams.

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(12)S33
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.2(1)D1(1), 7.2(1)ZD(0.110), 7.2(2)D1(0.1), 7.3(0)D1(0.141), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)OTT(0.73)
Alert Type:
Updated *
Bug Id:
CSCux20846
Title:
Nexus 6k: IGMP HAP Reset during "install all" upgrades with IGMPv3
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
During an install upgrade of NX-OS in a VPC Nexus 5K/6k vPC, the peer switch may crash due to the IGMP process during pre-upgrade checks.

VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "igmp" (PID XXXX) hasn't caught signal 11 (core will be saved).

Conditions:
Seen on systems with IGMPv3 configurations and if switch has received IGMP v3 membership reports. This issue is only seen during upgrades or during IGMP process restarts and not during steady state.

Workaround:
Disable IGMP snooping globally on the vPC pair of switches prior to upgrade

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.0(7)ZN(0.266), 7.0(8)N1(0.314), 7.0(8)N1(1), 7.1(3)ZD(0.61), 7.1(3)ZN(0.125), 7.1(4)N1(0.690), 7.1(4)N1(1), 7.3(0)D1(0.166)
Alert Type:
Updated *
Bug Id:
CSCuc94570
Title:
N7k: Fabricpath traffic loss for unicast flooded traffic
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Unidirectional North-South traffic does not flow through VPC+ ports in F2 modules

Conditions:
When the core ports and vpc+ edge ports are part of the same F2/F2E ASIC instance, the unknown unicast flood may be incorrectly pruned and not make it out of the vpc+ ports

Workaround(s):
Locate the vpc+ ports in a separate ASIC instance than the core ports.
The ports and the corresponding ASIC instances in a F2 card are as follows
--------------------
ASIC | ports
---------+---------
1 : 1-4
2 : 5-8
3 : 9-12
4 : 13-16
5 : 17-20
6 : 21-24
7 : 25-28
8 : 29-32
9 : 33-36
10 : 37-40
11 : 41-44
12 : 45-48

Issue affects F3 cards only if in the same VDC as F2 or F2E

Workaround:

Further Problem Description:

Last Modified:
22-APR-2016
Known Affected Releases: *
6.1(2), 6.2(5.27)S0, 7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut86729
Title:
vPC Multicast optimization doesn't work after disable/enable the CLI
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Multicast traffic flows through the MCT link (vpc peer-link) even though VPC Multicast optimization is enabled using CLI "no ip igmp snooping mrouter vpc peer-link".

Conditions:
VPC Multicast optimization is enabled using CLI -
"no ip igmp snooping mrouter vpc peer-link"

Workaround:
If vPc multicast optimization is required such that multicast traffic doesn't traverse MCT link and if this issue is observed in the network, enabling the command by configuring "ip igmp snooping mrouter vpc peer-link" and disabling the command after some time by using "no ip igmp snooping mrouter vpc peer-link" will work.

Further Problem Description:
Enabling Multicast optimisation through CLI doesn't take effect in a scale setup. No issue is seen if we do not enable VPC Multicast optimization. It is disabled by default.

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)N1(0.163)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.22), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.85)
Alert Type:
Updated *
Bug Id:
CSCux30775
Title:
ipfib crash during ISSU
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ipfib on F2 module may crash during ISSU

Conditions:
F2 module has some VRF with no local member ports before ISSU.

Workaround:
Unknown.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.157), 7.3(0)DX(0.141)
Known Fixed Releases: *
7.3(0)D1(0.175), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.191)
Alert Type:
Updated *
Bug Id:
CSCuu13792
Title:
VPC doesn't come up after HMM is enabled
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VPC peer-link comes up

Conditions:
two sides of port-channel mismatch

Workaround:
none

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)VZN(0.1)
Known Fixed Releases: *
7.0(0)FHS(0.23), 7.2(0)VZD(0.40), 7.3(0)D1(0.21), 7.3(0)D1(0.33), 7.3(0)D1(1), 7.3(0)DHB(0.2), 7.3(0)HM(0.36), 7.3(0)IB(0.35), 7.3(0)OTT(0.8), 7.3(0)RTG(0.39)
Alert Type:
Updated *
Bug Id:
CSCuw38904
Title:
LIM is not maintaining its encap's correctly
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Not able to Modify VSI after SSO

Conditions:
SSO and Modification of VSI

Workaround:
no workarounds

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.99X), 7.3(0)D1(1A)
Known Fixed Releases: *
7.3(0)D1(0.122), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)IB(0.122), 7.3(0)IZN(0.7), 7.3(0)N1(0.160), 7.3(0)N1(1), 7.3(0)OTT(0.73), 7.3(0)PDB(0.90), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuw61079
Title:
Tenant multicast encap route missing in FIB on border leaf
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vxlan encap is not happening because vxlan encap route is missing from mfdm/mfib, eg.

show forwarding distribution nve multicast route.

Conditions:
With vxlan configured - "feature nv overlay". If config "feature otv" then "no feature otv", vxlan encap routes will be deleted.

Workaround:
We don't support otv and vxlan configured in the same vdc. If by accident someone configured otv then unconfigured it, workaround will be unconfig vxlan - "no feature nv overlay". Then reconfigure it and the corresponding nve interface(s).

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.111)
Known Fixed Releases: *
7.3(0)D1(0.145), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.162)
Alert Type:
Updated *
Bug Id:
CSCut89986
Title:
N77: module in failure state after power cycle due to BFDC hogging CPU
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With L2 fabricpath BFD on one side is up and the peer side is not applied or delay in applying the BFD config, but link is up, then the BFDC process on the LC will hog the CPU and line card will be reset.

Conditions:
L2 Fabricpath BFD configured on one side and other side is not configured or configuring with some delay

Workaround:
Remove the L2 Fabricpath BFD configurations on all the switches.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.472), 7.2(0)D1(0.475), 7.2(0)D1(1.1)
Known Fixed Releases: *
7.3(0)D1(0.175), 7.3(0)D1(0.178), 7.3(0)D1(0.179), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.191), 7.3(0)ZD(0.195)
Alert Type:
Updated *
Bug Id:
CSCuw65271
Title:
OAM session goes down after applying trunk allowed vlan
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ELOAM sessions do not come up on sessions with an allowed VLAN configured.

Also, ELOAM sessions do not come up on ports which are blocked by STP. A side effect of this is that when an interface is first configured as a switchport, it can take around 1 minute before the ELOAM session comes up.

Conditions:
Any switchport interface running Ethernet Link OAM can be affected if STP blocks that port, or if the interface has "switchport trunk allowed vlan " config.

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.96)
Known Fixed Releases: *
7.3(0)D1(0.135), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.102), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuw50467
Title:
F3 module drops to failure state after ISSU
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After ISSU a LC drops to failure state. "sh system reset-reason module" lists the reason as "elo_io hap reset => [Failures < MAX] : powercycle"

Conditions:
ELOAM must be configured and running on the LC while the ISSU occurs.

Workaround:
Remove all ELOAM config before the ISSU and then reapply afterwards.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.112)
Known Fixed Releases: *
7.3(0)D1(0.122), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.90), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuu11726
Title:
LIM flush clears non VxLAN macs on the BD affected
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
For silent orphan hosts, we can see traffic drops if traffic reaches other VPC peer.
We can also experience flooding if it reaches the peer containing the silent host.

Conditions:
PeerLink shut, Dismembering VNI from BD, NVE flap
BD should be common for VxLAN and non VxLAN hosts.

Workaround:
ReARP the silent hosts after the flush

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.475), 7.3(0)D1(0.64)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.47), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw02224
Title:
PVLAN missing programming for host-association on vpc port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PVLAN missing programming for host-association on vpc port

Conditions:
PVLAN missing programming for host-association on vpc port

Workaround:
PVLAN missing programming for host-association on vpc port

Further Problem Description:
PVLAN missing programming for host-association on vpc port

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(0.60)
Known Fixed Releases: *
7.3(0)D1(0.141), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)RSP(0.7), 7.3(0)RTG(0.115), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.159)
Alert Type:
Updated *
Bug Id:
CSCuw81299
Title:
OAM session not coming up with F3-M2
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ELOAM sessions do not come up on M2 linecards. Further, sessions may be incorrectly detected as miswired.

Conditions:
ELOAM is configured on interfaces on an M2 linecard.

Workaround:
None, but ELOAM works fine on F3 cards.

Further Problem Description:
The problem occurs because metadata attached to received packets is incorrect, making it look as if ELOAMPDU packets were received on a different interface to that which they actually came in on.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.127), 7.3(0.99)
Known Fixed Releases: *
7.3(0)D1(0.135), 7.3(0)D1(0.138), 7.3(0)D1(0.142), 7.3(0)D1(0.146), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)IB(0.122), 7.3(0)IZN(0.13), 7.3(0)N1(0.195), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuu53575
Title:
sh vlan id 1 shows incorrect ports after doing ASCII replay twice
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Any port which is not in mode trunk should not have config for trunk allowed vlan's under it. For exmaple

int po10
switchport
switchport mode fabricpath
switchport trunk allowed vlan 11-20
no shutdown

Conditions:
Only happens when "switchport trunk allowed vlan " is done after the mode is changed to no trunk mode.

Workaround:
Do no switchport trunk allowed vlan in case of fabricpath/pvlan mode as this config is of no use.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)D1(0.69), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.21), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv64056
Title:
N7K/N77 support NX-OS mechanism to upgrade firmware on eUSB flash
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Over a period of several months or years, eUSB flash goes unresponsive. When the first flash fails GOLD's CF test report fails. At a later point in time,the boot-flash mounted will go to a state of read-only causing configuration copy to fail.

Conditions:
This happens after several months of system being in use.

Workaround:
6.2.14 has a plugin Load the plugin on the active, which will attempt to repair single flash failures on both active and standby. Double flash failures cannot be repaired; a reload of the affected sup is needed for that.

Further Problem Description:
kickstart images for 7.2(1)D1(1) and 7.3 have the eUSB firmware upgrade solution which is more than a workaround. Kickstart images will upgrade the firmware for the eUSB bootflash and eUSB obfl from Unigen vendor if the eUSB is responding at time of the firmware upgrade. The solution in CSCuv64056 is available for both N77 and N7K. This N77 and N7K solution in CSCuv64056 is unlike CSCus22805 which is only a workaround for N7K and does not help with N77.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10), 6.2(12), 6.2(13.16), 6.2(14), 6.2(14)FB(0.49), 7.2(0)D1(1), 7.2(1)D1(0.32), 7.3(0)D1(0.53)
Known Fixed Releases: *
6.2(14)E1, 6.2(14.4)S0, 6.2(14b)S1, 6.2(16), 6.2(16)S1, 7.2(1)D1(0.90), 7.2(1)D1(1), 7.2(1)ZD(0.81), 7.3(0)D1(0.120), 7.3(0)D1(1)
Alert Type:
Updated *
Bug Id:
CSCuu33340
Title:
Param-list is not cleaned up when the vrf are gone
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
param-list entries still showing in "show run" even when all profiles have been un-applied

Conditions:
Auto-Configuration has been used to apply profiles and profiles have subsequently been un-applied (either manually or due to host aging).

Workaround:
User can remove param-list entries manually by doing "no param-list ..."

Further Problem Description:
The param-list entries do not cause a problem with subsequent profile applies.

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.484), 7.2(0)VZD(0.33)
Known Fixed Releases: *
7.3(0)D1(0.179), 7.3(0)D1(1), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.195)
Alert Type:
Updated *
Bug Id:
CSCuu84449
Title:
IGMP snooping entries ageout in AA FEX topologies
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IGMP snooping entries are expiring after 5 seconds on one of the two vPC switches, while the entries are stable on the other vPC switch, which might cause traffic loss for 15-16 seconds (depending on the port-channel hashing result).

Conditions:
Issue can be seen in a vPC topology with AA FEX without having configured the IGMP snooping switch-querier (under "vlan configuration XYZ"), but when having PIM enabled SVI interfaces.

Workaround:
Configure IGMP snooping querier under the "vlan configuration XYZ" configuration mode.

or

Configure "ip igmp query-interval 30" under the SVI configuration mode.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.1(0)N1
Known Fixed Releases: *
7.2(1)D1(0.7), 7.2(1)D1(1), 7.2(1)N1(0.240), 7.2(1)N1(1), 7.2(1)ZD(0.6), 7.2(1)ZN(0.6), 7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9)
Alert Type:
Updated *
Bug Id:
CSCuu66415
Title:
VINCI UI: ethpm receiving an empty vlan list from vlan_mgr
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vlan_mgr sends notifications to ethpm with empty interest list

Conditions:
happens during bridge-domain create

Workaround:
this has no operational impact

Further Problem Description:
this is an interaction between vlan_mgr and ethpm. the empty list becomes a NOP for ethpm and this has no impact on operation or functionality

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1), 7.2(1)D1(0.80), 7.3(0)D1(0.24)
Known Fixed Releases: *
7.2(1)D1(0.2), 7.2(1)D1(1), 7.2(1)ZD(0.2), 7.3(0)D1(0.70), 7.3(0)D1(0.71), 7.3(0)D1(1), 7.3(0)D1(1A), 7.3(0)EG(0.3), 7.3(0)IB(0.67), 7.3(0)MMD(0.9)
Alert Type:
Updated *
Bug Id:
CSCuv87645
Title:
Traffic not classified according to the static SGT
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
If an IP-SGT mapping overlapping with a VLAN-SGT mapping is first learned over SXP and then deleted the 7k will not classify the traffic with the static VLAN-SGT configured.

Conditions:

Workaround:
force-delete the ARP entry for the source IP

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)E3, 7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)D1(0.156), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)RSP(0.7), 7.3(0)RTG(0.115), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.171)
Alert Type:
Updated *
Bug Id:
CSCuw96276
Title:
CVE-2013-4548 Vulnerability Nexus 7000
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cisco Nexus 7000 (N7K) Series Switch includes a version of the Open Secure Host (OpenSSH) protocol
that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2013-4548

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
As a workaround, customers may disable AES-GCM in the SSH client configuration. The following sshd_config option will disable AES-GCM while leaving other ciphers active:

Ciphers aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6/5.7:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:P/I:P/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2013-4548 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(8), 7.2(0)D1(1)
Known Fixed Releases: *
6.2(15)S10, 6.2(15.2)S0, 6.2(17)S0, 7.3(0)D1(0.147), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IZN(0.13), 7.3(0)N1(0.196), 7.3(0)N1(1), 7.3(0)PDB(0.112)
Alert Type:
Updated *
Bug Id:
CSCuu45553
Title:
bfd crash seen with bfd_mts_flush_all_bfdc_msgs decodes
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
BFD core seen

Conditions:
During copy config to run config

Workaround:
none

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases: *
7.3(0)D1(0.89), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.78), 7.3(0)SC(0.14), 7.3(0)SL(0.115), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw01105
Title:
DFA: multicast duplicate packets or loop on border leafs
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Duplicate multicast packets seen in multicast receiver in fabric for outside fabric source.
Multicast loop packets seen for multicast receiver in fabric for inside fabric source.

Conditions:
Connection between fabric and external devices happend to 2 border leafs that see each other on a shared L2 segment, i.e. each border leaf sees the external router as well as the other border leaf as PIM neighbor.

Workaround:
Under investigation.

Further Problem Description:
N/A

Last Modified:
21-APR-2016
Known Affected Releases:
7.1(2)N1(1)
Known Fixed Releases: *
7.1(3)N1(0.639), 7.1(3)N1(1), 7.1(3)ZD(0.24), 7.1(3)ZN(0.47), 7.2(1)D1(0.88), 7.2(1)D1(1), 7.2(1)N1(0.315), 7.2(1)N1(1), 7.2(1)ZD(0.79), 7.2(1)ZN(0.77)
Alert Type:
Updated *
Bug Id:
CSCuw74438
Title:
N7k L3vm crash during ISSU
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
L3vm crash during ISSU

Conditions:
This has been observed on N7k MPLS PE running MVPN during an ISSU to 7.2(0)D1(1)

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)RSP(0.7), 7.3(0)RTG(0.97), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.195), 7.3(0)ZN(0.211)
Alert Type:
Updated *
Bug Id:
CSCuv48908
Title:
Cisco NX-OS IGMP Malformed Packet DoS Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in the Internet Group Management Protocol (IGMP) Version 3 (IGMPv3) input
packet processing of the Nexus Operating System (NX-OS) could allow an unauthenticated,
adjacent attacker to cause the IGMP process to restart due to a malformed IGMP packet.
This can cause a denial of service (DoS) condition on the device.

The vulnerability is due to improper input validation when ensuring that the memory allocated
is large enough for the number of included sources in the IGMPv3 packet. An attacker could
exploit this vulnerability by sending a crafted IGMPv3 packet to the device. An exploit could
allow the attacker to cause the IGMP process to restart due to a buffer overflow which causes
the DoS condition. If the malformed IGMPv3 packet is continuously sent the device the DoS
condition will remain and the device is unavailable.

Conditions:
IGMP Version 3 snooping is configured on one or more Virtual Local Area Networks (VLANs).

Workaround:
The IGMP Version 3 snooping configuration has to be removed.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4324 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)N1(0.1)
Known Fixed Releases: *
6.2(14), 6.2(14)S6, 6.2(14.3)S0, 7.0(3)I2(0.546), 7.0(3)I2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1.36), 7.0(7)N1(0.293), 7.0(7)N1(1), 7.0(7)ZN(0.188)
Alert Type:
Updated *
Bug Id:
CSCuw92095
Title:
NXAPI: json "show monitor session" destination interfaces incomplete
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
some destination interfaces are missing from JSON format output of the "show monitor session" command in the NXAPI Sandbox

Conditions:
On Nexus 6004 running version 7.2(0)N1(1) or 7.2(1)N1(1), using the "show monitor session all" command in the NX-API SandBox, with JSON output format, not all the destinations will appear in the output but the last one.

Workaround:
Request the response in XML format.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)N1(1), 7.2(1)N1(0.9)
Known Fixed Releases: *
7.0(0)BZ(0.108), 7.3(0)D1(0.175), 7.3(0)D1(1), 7.3(0)DX(0.56), 7.3(0)EG(0.14), 7.3(0)GLF(0.44), 7.3(0)IZN(0.13), 7.3(0)N1(0.229), 7.3(0)N1(1), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuv50831
Title:
BGP is installing route with AD 255 in URIB
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Routes with an AD of 255 are permitted for redistribution.

Conditions:
When using the [distance # # #] command for BGP to set summarized/local routes to an administrative distance of 255. The summary routes remain in the routing table, but marked with an AD of 255 from its default of 220 and also permitted to be redistributed into other protocols.


10.10.0.0/16, ubest/mbest: 1/0
*via Null0, [255/0], 00:00:11, bgp-65545, discard, tag 65012 ---------------->Route remained in routing table but AD did adjust to 255.
r12.7k-VDC3(config-router-af)#


############Redistributing BGP into OSPF############################
##Route shouldn't be redistributed as it is within the RIB with an AD of 255.
version 6.2(12)

feature ospf

router ospf 1
router-id 172.16.0.1
redistribute bgp 65545 route-map test ----------------------->Sending route to OSPF

ip prefix-list bgp seq 5 permit 0.0.0.0/0 le 32
route-map test permit 10
match ip address prefix-list bgp


r12.7k(config)# sho ip ospf database | b Ex
Type-5 AS External Link States

Link ID ADV Router Age Seq# Checksum Tag
0.0.0.0 172.16.0.1 14 0x80000002 0xea3c 65005
10.10.0.0 172.16.0.1 14 0x80000002 0x50cd 65012 ---------->Summary is installed within OSPF database and advertised to OSPF peers. Which shouldn't happen as AD is 255

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.1(4), 6.2(12)
Known Fixed Releases: *
7.0(3)I2(1.24), 7.0(3)I2(2), 7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66), 7.3(0)SC(0.14)
Alert Type:
Updated *
Bug Id:
CSCuw95510
Title:
MVPN flag missing after ospf,bgp,pim restart
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic loss due to PIM process not sending join towards upstream neighbor.

Show ip pim route internal detail vrf

command shows the RPF interface and RPF neighbor as null and 0.0.0.0 respectively.

But "show ip mroute" output shows the correct RPF interface and RPF neighbor.

Conditions:
When the command, "restart pim" is done, PIM process enables the protocol on the configured interfaces and
requests MRIB process to send all the routes also. In addition, it asks for all the RPF change notification also.
It is possible that when MRIB lets PIM of all the existing routes, PIM is yet to enable the protocol on certain interfaces and hence the RPF information is not set correctly due to which joins will not be propagated upstream causing data loss.

Workaround:
The workaround is to just "disable and enable " PIM protocol on the RPF interface.

Further Problem Description:
This problem usually occurs if there are large number of multicast routes present in the system and the user does a "restart pim". It is highly unlikely that the bug is seen under any other circumstances.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.131)
Known Fixed Releases: *
7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)IB(0.122), 7.3(0)IZN(0.13), 7.3(0)N1(0.216), 7.3(0)N1(1), 7.3(0)PDB(0.121), 7.3(0)RSP(0.7), 7.3(0)SC(0.14)
Alert Type:
Updated *
Bug Id:
CSCuw95078
Title:
M2 VLAN Translation Missing after Module Reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic loss for VLAN translated flows crossing M2 module after recent module reload or possible link flap on M2 module ports with VLAN mapping configured.

Conditions:
Noticed on M2 module, symptoms do not match other M2 VLAN translation defects, seen after module reload.

Workaround:
Only current know workaround is to rebuild the port-channel configuration (delete port-channel, default member interfaces, reconfigure).

Further Problem Description:
Example of missing translations in hardware:

interface Ethernet3/7
switchport
switchport mode trunk
switchport vlan mapping 499 500
switchport trunk allowed vlan 190-200,500
mtu 9216
channel-group 3 mode active
no shutdown

module-3# show system internal eltmc info interface ethernet 3/7 vdc 4 | no
ELTM Detailed info for Interface Ethernet3/7

vlan_xlt_tlb_en_egress : 1 vlan_xlt_tlb_en_ingress: 1
num_vlan_xlt_entries : 2
num_m2_ingress_vlan_xlt_entries : 0
num_m2_egress_vlan_xlt_entries : 0

Vlan Translation Table
--------------------------------
dir tbl_idx in_vlan xlt_vlan <---- Missing translations


Correct table would show:

Vlan Translation Table
--------------------------------
dir tbl_idx in_vlan xlt_vlan
IG 0 499 500
EG 0 500 499

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(14), 6.2(8b), 7.2(0)D1(1)
Known Fixed Releases: *
6.2(14)E1, 6.2(16), 6.2(16)S1, 7.2(2)D1(0.3), 7.2(2)ZD(0.1), 7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.103), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuv11993
Title:
Cisco IOS NX-OS Malformed LISP Packet Denial of Service Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in the Locator/ID Separation Protocol (LISP) of Cisco IOS Software running on the Cisco Catalyst 6500 and 6800 Series Switches and Cisco NX-OS Software running on the Cisco Nexus 7000 and Nexus 7700 Series Switches with an M1 Series Gigabit Ethernet Module could allow an unauthenticated, remote attacker to cause a reload of the vulnerable device.

The vulnerability is due to a lack of proper input validation when a malformed LISP packet header is received. An attacker could exploit this vulnerability by sending a malformed LISP packet on UDP port 4341. An exploit could allow the attacker to cause a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp

Conditions:
Cisco Catalyst 6500 and 6800 Series Switches running Cisco IOS Software, and Cisco Nexus 7000 and Nexus 7700 Series Switches with an M1 Series Gigabit Ethernet Module running Cisco NX-OS Software are vulnerable when LISP is configured. LISP is not enabled by default on either platform.

Workaround:
None.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2016-1351 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12), 6.2(16)S30, 7.3(0)D1(0.151)
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.2(2)D1(0.33), 7.2(2)ZD(0.63), 7.3(0)D1(0.157), 7.3(0)D1(0.161), 7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)IB(0.122), 7.3(0)PDB(0.110)
Alert Type:
Updated *
Bug Id:
CSCux38877
Title:
"private-vlan mapping" needs tobe blocked at fex interface ports
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
"private-vlan mapping? needs tobe blocked at fex interface ports

Conditions:
"private-vlan mapping? needs tobe blocked at fex interface ports

Workaround:
"private-vlan mapping? needs tobe blocked at fex interface ports

Further Problem Description:
"private-vlan mapping? needs tobe blocked at fex interface ports

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.169)
Known Fixed Releases: *
7.3(0)D1(0.179), 7.3(0)D1(1), 7.3(0)PDB(0.130), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv71201
Title:
Evaluation of n7k-infra for OpenSSL June and July 2015 Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms:
This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176

This bug has been opened to address the potential impact on this product.

Conditions:


Workaround:


Further Problem Description:



PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.8/6.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(8g), 5.2(9), 6.2(1), 6.2(11), 6.2(12), 6.2(13), 6.2(2), 7.3(0)ZD(0.60)
Known Fixed Releases: *
6.2(15)S3, 6.2(15)S4, 6.2(15.2)S0, 6.2(17)S0, 7.3(0)BZN(0.47), 7.3(0)D1(0.73), 7.3(0)D1(0.74), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)IB(0.67)
Alert Type:
Updated *
Bug Id:
CSCuu77825
Title:
port profile crash with port-profile refresh script
Status:
Fixed
Severity:
2 Severe
Description:

When a profile delete (like no configure profile) and refresh happens in parallel.

Symptom:
port-profile crash

Conditions:
delete of configure profile is taking place

Workaround:
delete a configure profile after completing the refresh

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)D1(0.104), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.74), 7.3(0)RSP(0.7), 7.3(0)RTG(0.88), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.118)
Alert Type:
Updated *
Bug Id:
CSCuz00345
Title:
ISSU from 6214 to 6216 policy caching enabled will not download >1 ACE's
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cold boot/ ISSU from 6214 to 6216 with policy caching enabled , will not download SGACL's with multiple aces even after refreshing the cts policy using the cli "cts refresh role-based-policy

Conditions:
Cold boot/ ISSU from 6214 to 6216 with policy caching enabled and SGACL's with multiple aces

Workaround:
Try adding an ace for that SGACL and then issue "cts refresh role-based-policy"

In 7.3.0.DX release a new cli "cts refresh role-based-accesslist all" has been added to refresh the SGACLs irrespective of gen-id criteria. So user need not update the SGACL in ISE to issue the refresh command on the switch.

Further Problem Description:

Last Modified:
22-APR-2016
Known Affected Releases:
6.2(16)S65, 7.3(0)DX(0.131)
Known Fixed Releases: *
7.3(0)DX(0.133), 7.3(0)DX(0.141)
Alert Type:
Updated *
Bug Id:
CSCur54182
Title: *
Tacacs service triggers supervisor reload
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The tacacs+ service crashes 2 times triggering a supervisor reload. The supervisor reset reason logs the following:

Reason: Reset triggered due to HA policy of Reset
Service: Tacacs Daemon hap reset

Conditions:
This issue only occurs on systems running NX-OS 6.2(8a) or later if a command longer than 255 characters is
issued while tacacs+ remote authorisation is enabled.

Workaround:
Do not execute CLI commands longer than 255 characters when tacacs+ command authorisation is enabled.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.4/3.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2014-8013 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
22-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.41), 6.0(2)A6(1), 6.0(2)U6(0.41), 6.0(2)U6(1), 6.1(2)I3(2.15), 6.1(2)I3(3), 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.12), 7.0(0)BZ(0.46)
Alert Type:
Updated *
Bug Id:
CSCtz51047
Title:
RBACL programming is missing from hardware
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
RBACL policies are shown in "show cts role-based policy" but they are not programmed in the hardware and hence not hit by the traffic.


Conditions:
This issue happens only on system reload & when there are a large number of IP-SGT mappings in the start-up config. (This bug was seen with 67K mappings)

Workaround(s):
Once the CTS process shows low CPU utilization after the programming,
- Issue the CLI commands for static policies
- "cts refresh role-based-policy" for dynamic policies

Last Modified:
22-APR-2016
Known Affected Releases:
5.2(4)
Known Fixed Releases: *
6.2(0.211)S0, 6.2(2), 8.3(0)CSS(0.4), 8.3(0)CV(0.398), 8.3(0)SF(0.94)
Alert Type:
Updated *
Bug Id:
CSCua34546
Title:
CTS: Policy download fails for supplicant when N7K is authenticator.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A CTS link between a Catalyst 6500 and Nexus 7000 may fail re-authentication if
radius server access for catalyst 6500 fails.

Conditions:
1. The catalyst 6500 (or any other device) should be in Authenticator mode and
the nexus 7000 in Supplicant mode on the CTS link, before re-authentication.

2. Radius server access to catalyst 6500 is not available during
re-authentication.


More Information:
During re-authentication because of failure to access the radius-server, the
catalyst 6500 will change role from Authenticator to supplicant and the Nexus
7000 from Supplicant to Authenticator. In this scenario the Nexus 7000 fails to
relay the re-auth requests from the catalyst 6500 to the radius server.

Workaround:

Shut and no-shut the link will clear the problem.


Last Modified:
22-APR-2016
Known Affected Releases:
5.1(5)
Known Fixed Releases: *
6.2(1.17)S0, 6.2(2), 6.2(2)S19, 6.2(5.2)S0, 7.0(0)ZD(0.84), 7.0(0.6), 8.3(0)CSS(0.4), 8.3(0)CV(0.398), 8.3(0)SF(0.94)
Alert Type:
New
Bug Id:
CSCuz33019
Title:
diag_port_lb HAP reset
Status:
Open
Severity:
2 Severe
Description:

Symptom:
A SUP2E may experience a diag_port_lb HAP reset:

1) At xxxxxx usecs after ddd mmm hh:mm:ss yyyy
Reason: Reset triggered due to HA policy of Reset
Service: diag_port_lb hap reset
Version: 6.2(8b)

yyy Mmm dd hh:mm:ss Hostname %SYSMGR-2-SERVICE_CRASHED: Service "diag_port_lb" (PID xxxx) hasn't caught signal 11 (core will be saved).

Conditions:
Unknown at this time.

Workaround:
None

Further Problem Description:

Last Modified:
25-APR-2016
Known Affected Releases:
6.2(8b)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui88768
Title:
HSRP mac not updating after role change
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:


HSRP virtual mac points to local supervisor instead of newly active HSRP router following an HSRP state change.

Conditions:


HSRP state change triggers above issue

Workaround:


Flap the SVI for the vlans whose macs fail to move

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
5.2(7)
Known Fixed Releases:
6.2(5)FE(0.7), 6.2(5.22)S0, 6.2(6), 7.1(0)D1(0.14), 7.1(0)D1(0.15)
Alert Type:
Updated *
Bug Id:
CSCuy92109
Title:
N7k: M1/M2 Mixed VDC TCAM Merge failure
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
M2 or M108 card interfaces will be kicked out of VDC

Note: M148GS, M148GT, M132(all 3-XL modules) are NOT affected when this problem is triggered.

Conditions:
-M1 and M2(both XL) cards should be present within the same VDC
-VDC or chassis reload(or even M2 module reload)
-Bank mapping should be enabled in the default VDC(using the command- hardware access-list resource feature bank-mapping)
-Atomic Updates are disabled

Workaround:
a) Power off any M1 modules allocated to the VDC and bring up the VDC only with M2. This will make sure that the M2 interfaces are allocated properly to the VDC. Once M2 is online, initiate ?no poweroff? for the M1 modules.

b) Other workaround would be to follow below steps.
1) Take backup of the startup configuration for the VDC and do a write erase for the affected VDC.
2) Reload the VDC and once the same is Active, Allocate the interfaces back and make sure those are online within the VDC
3) After this, copy back the configuration into running.
c)Third option would be to delete the QoS configuration which is causing the TCAM to get filled. Once configuration is cleaned up, a VDC reload would be required to restore the interfaces.

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases: *
6.2(14), 7.3(0)D1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy73277
Title:
Mac Addresses at last 2 ports on FEX are out of range in allocated ones
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Mac Addresses at last 2 ports on FEX are out of range in allocated ones

Conditions:
Use FEX

Workaround:
No workaround

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)D1(1)
Known Fixed Releases: *
7.3(1)D1(0.52)
Alert Type:
New
Bug Id:
CSCuz33853
Title:
M3:CTS rol-based enforcement is not effective for one specfic scenario.
Status:
Open
Severity:
2 Severe
Description:

Symptom:
CTS IP-SGT maps are not programmed in FIB even if role-based enforcement is enabled after VDC reload

Conditions:
VDC with all interfaces of a LC and 200K ip-sgt configs then do a vdc reload trigger.

Workaround:
re-issue cts role-based enforcement for that VRF/VLAN.

Further Problem Description:
Agnostic to Line card, probably Line card boot time might influence this timing issue.

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy77708
Title:
Optimize the Bytes stats and remove the syslog for RIT stats exhaustion
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
We would see a SYSLOG message indicating "F4_FIB_RIT_EXHAUSTED: RIT entry for packet stats"

Conditions:
When there are more than 40K prefix's which require stats.

Workaround:
None

Further Problem Description:
10k prefixes which have both byte and packet stats supported
and the remaining 30k we have pkt stats, but we would provide the byte counts by multiplying 512 bytes per packet.

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(0.116), 7.3(0)DX(0.131)
Known Fixed Releases:
7.3(0)DX(1), 7.3(1)DX(0.4)
Alert Type:
New
Bug Id:
CSCuz25546
Title:
SSTE: LISP Process crash during continuous process restart
Status:
Open
Severity:
2 Severe
Description:



Symptom:
lisp process crashes

Conditions:
continous process restart from cli

Workaround:
none

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz29940
Title:
MFIB fail to install route with Tunnel after LC reload
Status:
Open
Severity:
2 Severe
Description:

Symptom:
For systems with multicast over GRE configuration (multicast with tunnel in the oiflist), it's possible that a module reload will result in the some routes not being installed on the reloaded module. This will result in traffic drops for all affected routes.

Conditions:
The problem is more likely to occur in a scale topology with >20K multicast routes, but may happen with less. This problem has only been seen thus far with Flanker (F3) based modules. However, the condition applies to other module types.

Workaround:
The CLI "clear ip mroute" for the affected VRFs will fix up the HW programming.

Further Problem Description:
None

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz21326
Title:
Aclmgr Crashes on 6214
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Multiple aclmgr crash

Conditions:
frequent ACL add/delete/edit of ACEs is done using config session
changes can be done manually or via script

Must condition :-
During the time changes are done, and config
session is not committed yet. Now, if there is a switch reload , then cleanup of the session post switch reload causes crash.

Other condition for crash is TBD

Workaround:
tbd

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.2(14)
Known Fixed Releases: *
6.2(16)E1, 7.3(1)D1(0.51)
Alert Type:
New
Bug Id:
CSCuz41729
Title:
Police with remarking is not getting classified properly
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Inner tag is getting rewritten for dscp values.

Conditions:
Police with remarking is not getting properly classified.

Workaround:

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz35540
Title:
SSTE: Reliance Sol: Label issue with BGP send label enabled on 7.2 MR
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Labels that should be present in ULIB are not present. This cascades to forwarding as well.

Conditions:
When a routing protocol allocates FEC in ULIB and a second routing protocol deletes the FEC without first allocating it, the FEC and associated local label is deleted from ULIB for both routing protocols.

Workaround:
none

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.2(1)D1(1)
Known Fixed Releases: *
7.3(1)DX(0.11)
Alert Type:
New
Bug Id:
CSCuz43417
Title:
mvpn qos : Discard-class classification is not working on P box
Status:
Open
Severity:
2 Severe
Description:

Symptom:
'discard-class' classification is not working in P router (egress qos) in MVPN setup

Conditions:
when QoS policies applied on VLAN

Workaround:

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz42342
Title:
NXOS:ISIS:FP - ISIS crash during ISSU on PSS recovery
Status:
Open
Severity:
2 Severe
Description:

Symptom:
ISIS crash with error:
%SYSMGR-2-SERVICE_CRASHED: Service "__inst_001__isis_fabricpath" (PID 6120) hasn't caught signal 6 (core will be saved).

Conditions:
ISSU crash could happened during ISSU upgrade

Workaround:
none

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
6.2(14)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy72326
Title:
M3CB10: During Rollback CFGWRITE_FAILED, ERROR: Rollback Patch not Empty
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
When rollback is performed from admin vdc, rollback operation is failing.

Conditions:
If the current vdc is admin vdc and rollback is performed from this vdc then rollback process will fail.

Workaround:
Since, from day 1 rollback is not supported from admin vdc, this is a limitation and there is no work around in this situation.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.3(0)DX(0.110)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz24167
Title: *
N77/N7K - M3 SNMP cshcModRxTotalDroppedPackets - all zeros for M3
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
snmp walk output for cshcModRxTotalDroppedPackets MIB is not matching with sh int eth x/y counters errors.

Conditions:
show hardware capacity interface? CLI support added for M3 - which follows the new design and it only shows the accumulation of all the drops whichever is disclosed to stats client through LPSS

Workaround:
compare "sh int eth x/y counters errors snmp" CLI to match SNMP walk output for cshcModRxTotalDroppedPackets MIB.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz12626
Title:
IGP label has been missed after MPLS TE FRR
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
when protected link goes down and active TE traffic is diverted over the backup tunnel, packets go out with additional one label on tunnel head

Conditions:
mpls te frr is triggering the issue

Workaround:
flap the tunnel-te

Further Problem Description:
n/a

Last Modified:
28-APR-2016
Known Affected Releases:
7.3(0)D1(1)
Known Fixed Releases:
7.3(0)DX(1), 7.3(1)DX(0.3)
Alert Type:
New
Bug Id:
CSCuy19010
Title:
SNMPd causes boot loop after reload with unload-MIB configuration
Status:
Open
Severity:
2 Severe
Description:

Symptom:
SNMPd may crash repeatedly immediately after boot. While a single crash of the SNMPd service will not cause a reload, multiple crashes in quick succession are considered fatal and so the system will reboot.

Due to this issue, the system will enter a boot loop that can be recovered only by erasing the configuration (via 'write erase' from kickstart) and re-applying it.

Conditions:
The trigger for this issue is to configure 'no snmp-server load-mib ' and save the configuration. This does not cause any impact during runtime, but if the switch later reboots for any reason this will trigger the crashes and bootloop.

This is known to affect all currently available versions of code in the 7.1, 7.2 and 7.3 code trains for the Nexus 5000. The 7.0 code train is not affected.
The code problem is platform-independent and therefore likely affects other Nexus switching platforms as well.

Workaround:
Do not unload MIBs via the 'no snmp-server load-mib' command.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
8.3(0)CV(0.300)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy52663
Title:
6.2(16) (S40) - ipfib core @ fln_ufib_pd_ecmp_adj_handles_pss_insert
Status:
Fixed
Severity:
2 Severe
Description:

The problem happens because MPLS is configured and this release (6.2(16) does not support MPLS.

Symptom:
Configuration of MPLS may lead to crash and MPLS malfunction.

Conditions:
MPLS configuration.

Workaround:
Do not configure MPLS

Further Problem Description:
The problem happened when a route pointing to two MPLS paths was received by FIB

Last Modified:
29-APR-2016
Known Affected Releases:
6.2(16)S40
Known Fixed Releases:
6.2(16), 6.2(16)S46, 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCuz06671
Title:
SSTE:Per-vlan consistency check failed with ISSU + both vPC peers reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In the scale setup, the vPC consistency check failed after sequence of ISSU and reload both vPC switches

Conditions:
- ISSU from HSK2 to UPG
- Reload both vPC devices
- The switches were auto-configured in scale setup of > 1K vlans

Workaround:
Option1:
Make sure to config the vPC peer-link port-channel after all LC modules are up

Option2:
Manually recover the particular inconsistent vlan(s)

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)DX(0.125), 7.3(0)DX(0.131)
Known Fixed Releases: *
7.3(0)DX(1), 7.3(1)DX(0.12)
Alert Type:
New
Bug Id:
CSCtj70898
Title:
NX-OS/SNMP - loopback interface gives erroneous output for snmp counters
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When polled from SNMP, loopback interface provides erroneous output.

Conditions:
Multiple SNMP pollers fetching data or multiple repeated attempts to pull interface counters/statistics.

Workaround:
not available. For N5k/6k switches fix is available in 7.0 and later releases

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
5.1(1)
Known Fixed Releases:
5.2(0.221)S0, 7.2(0)ZN(0.111)
Alert Type:
Updated *
Bug Id:
CSCuw10098
Title:
FPC members in error disabled state with error as INVALID INTERFACE
Status:
Fixed
Severity:
2 Severe
Description:

FEX uplink interfaces are in error state

Symptom:
FEX uplink interfaces are in error state:
switch# show interface ethernet 2/9
Ethernet2/9 is down (Error disabled, sim: invalid interface)

Conditions:
After ISSU/switchover a FEX module is removed / reloaded. It may come back up in an error state.

Workaround:
Reload of switch will resolve the issue

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)D1(0.82)
Known Fixed Releases: *
7.3(0)D1(1), 7.3(0)DX(1), 7.3(0)TSH(0.99), 7.3(1)D1(0.12), 7.3(1)DX(0.10), 7.3(1)DX(0.9)
Alert Type:
Updated *
Bug Id:
CSCuy26997
Title:
eirgp core @ urib_rt_mod_nh_del
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Crash seen while withdrawing routes from rib since eigrp tid is being set to BAD_TID_VALUE.

Conditions:
On doing a "no vrf context xxx" we set tid = BAD_TID_VALUE, if by that time routes are not withdrawn from
rib , we encounter this issue since as an invalid tid is passed to rib.

Workaround:
No work around

Further Problem Description:
refer Eng-Notes

Last Modified:
29-APR-2016
Known Affected Releases:
6.2(16)S25
Known Fixed Releases: *
6.2(16), 6.2(16)S46, 7.3(0)DX(1), 7.3(1)D1(0.54), 7.3(1)N1(0.340), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz15332
Title:
SSTE: ipfib crash on F3 during longevity - 7.3.0.DX.0.141.S1
Status:
Open
Severity:
2 Severe
Description:

Symptom:
1> Syslogs for LS_MET table exhaustion / high usage :

2016 Mar 1 01:26:04 N77-A %$ VDC-1 %$ %IPFIB-SLOT5-4-FLN_FIB_LSMET_EXHAUSTED: ls-met entry allocation from unicast region failed on instance 7
2016 Mar 1 01:26:04 N77-A %$ VDC-1 %$ %IPFIB-SLOT5-4-FLN_FIB_LSMET_EXHAUSTED: ls-met entry allocation from unicast region failed on instance 7

2> Inconsistency in programming causing traffic drops (when we reach high scale)

Conditions:
This issue is seen :

1> When there is a high scale ( number of paths, BGP peers, prefixes) and path table utilization is high.
For example :
If there are two BGP peers, advertising the same route then the number of paths that can be taken totally is 16k and on a config that has a large number of routes ( such that the number of routes * number of next hop paths ~ 13-15k) with path changes , this error maybe encountered.

2> The network is unstable and the next hop is continuously flapping.
* There is a higher probability on hitting this issue on high scale L3VPN/Inter AS Option B setups

Workaround:
1> Reload Linecard if the network conditions caused path change to the next hop adjacencies.
2> Reduce the scale to reduce the utilization of the LS MET

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
7.3(0)DX(0.141)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz45422
Title:
eltm cores while modify association of secondary trunk configs
Status:
Open
Severity:
2 Severe
Description:

Symptom:
eltm cores while modify association of secondary trunk configs

Conditions:
eltm cores while modify association of secondary trunk configs

Workaround:
eltm cores while modify association of secondary trunk configs

Further Problem Description:
eltm cores while modify association of secondary trunk configs

Last Modified:
30-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu87265
Title:
OTV UDP ISSU: Packet decap is broken on ISSU from S28 to UPG
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:






While OTV UDP encapsulation mode enabled, after ISSU there is a traffic interrupt.

Conditions:




ISSU with OTV UDP encapsulation mode enabled.

Workaround:



None.

Further Problem Description:












Last Modified:
04-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.2(1)D1(1), 7.2(1)ZD(0.100), 7.2(1)ZN(0.94), 7.2(2)D1(0.2), 7.3(0)N1(1), 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCuw76844
Title:
N77-F348XP-23 may reload on executing some show CLI on down-rev firmware
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Line card reloads with syslog :-

MODULE-2-MOD_DIAG_FAIL: Module 1 reported failure Ethernet1/1-8due to non-fatal error in device DEV_FLN_FWD (device error 0xcbb00203)

Conditions:
Running following CLI :-

show tech detail
OR
show tech module X

on some "N77-F348XP-23" cards with VID = V03 and affected NXOS SW versions (6212 or 6214 or 7.2.0.D1 )

Workaround:
none.

Do not run mentioned CLIs if you have exactly above combination of SW+HW

Further Problem Description:
Please call TAC to upgrade firmware for your affected line card. New firmware takes affect post reload of line card.

For module X you can check VID , like so:-

N7700# show sprom module X 1 | egrep -i VID
VID : V03

Last Modified:
04-APR-2016
Known Affected Releases:
6.2(12), 6.2(14), 7.2(0)D1(1.9)
Known Fixed Releases: *
6.2(16)S29, 7.2(1)D1(1), 7.2(1)ZD(0.110), 7.2(2)D1(0.1), 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCuy47006
Title:
SSTE: MEv6 BGP neighbours not coming up after Admin VDC migration
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
After executing Admin VDC Migration (moving the configs from default VDC to non-default VDC), MEv6 BGP neighbours adjacencies will not come up .

Conditions:
Move Configs from default VDC to non-default VDC

Workaround:
We need to configure dynamic BGP peering in the peer so that when request comes with new MAC address embedded, it will respond back.

Further Problem Description:
After the Admin VDC migration, the MAC on the new VDC will change and the request will be sent with new MAC embedded, so if we have static neighbor configured in peer it will response back for the opensent.

Last Modified:
04-APR-2016
Known Affected Releases:
6.2(16)S38
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum10704
Title:
465 byte leak with epld during show run can cause copy r s to abort
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
It is not possible to save the configuration anymore and the memory shows up as full :

%SYSMGR-2-NON_VOLATILE_DB_FULL: System non-volatile storage usage is unexpectedly high at 100%.

N7K# copy run start
[########################################] 100%
Configuration update aborted: request was aborted
N7K#

Conditions:
Each time "copy run start" or "show run" is issued, the size of the epld_auto_log file in /mnt/pss/epld_log is growing.
This fills up /mnt/pss space. When the /mnt/pss gets full, "copy run start would fail. This can be seen with

N7K# show system internal dir /mnt/pss/epld_log

Workaround:
Prevent such commands from being run by scripts and call TAC to delete the file.

Further Problem Description:
Affected releases are from 6.2(1) to 6.2(6a).
It has been fixed in 6.2(8).

Last Modified:
05-APR-2016
Known Affected Releases:
6.2(6)S10
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy77657
Title:
BGP did not update the NH of all MAC routes in l2rib
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
BGP did not update the NH of all MAC routes in l2rib

Conditions:
mac routes via bgp evpn.

Workaround:
There's no workaround. To recover:
Shut bgp neighbor ; wait for all mac-routes to be removed; re-establish bgp neighbor.
Clear bgp all * will not work.

Further Problem Description:

Last Modified:
05-APR-2016
Known Affected Releases:
7.0(3)IAB3(0.102)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy48431
Title:
PHY port VPC in F2/F2E cards does not work with F3 card in same VDC
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
PHY port VPC with F3 cards is not supported in 6.2.x train. When having PHY port with F2/F2E interfaces, F3 interfaces should not be present in the same VDC. If present, the ltl programming would go wrong.

Conditions:
PHY port VPC is configured with either F3 interfaces or with F2/F2E interfaces with presence of F3 card in the same VDC

Workaround:
Remove the PHY port configuration on F3 interfaces. OR when having PHY port configuration on F2/F2E interfaces, make sure that F3 card is in another VDC.

Further Problem Description:

Last Modified:
05-APR-2016
Known Affected Releases:
6.2(16)S38
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy99701
Title:
N77 - N77-F3 modules not populated for cshcMacUsageTable
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
SNMP MIB cshcMacUsageTable is not populated for Nexus 7k F3 Line cards. There are no functionality impact.

Conditions:
No specific condition is required. SNMP MIB cshcMacUsageTable foes not get populated for F3 line cards for Nexus 7k.

Workaround:
There is no workaround.

Further Problem Description:
SNMP MIB cshcMacUsageTable fails to get populated for F3 line cards for Nexus 7k. It is seen 6.2.x/7.2.x. There is no functionality impact.

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(16)S67, 7.2(3)S8, 7.3(0)DX(0.124), 7.3(1)D1(0.20)
Known Fixed Releases:
7.3(0)DX(0.141)
Alert Type:
Updated *
Bug Id:
CSCuu83574
Title:
Error in syslog of interface flap event after reload in remote server
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
This can occur when logging source interface loopback is configured with ipv6 address and logging server is configured.

Conditions:
This issue occurs in certain conditions when ipv6 address configured on loopback being used as logging source interface is in compact form:
ex:
1::1/64

Workaround:
Reconfigure the logging source interface with the loopback interface after reload.

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(16)S32, 7.2(0)D1(1), 7.3(0)D1(0.86)
Known Fixed Releases: *
6.2(16), 6.2(16)S40, 7.2(1)D1(0.5), 7.2(1)D1(1), 7.2(1)N1(0.239), 7.2(1)N1(1), 7.2(1)ZD(0.5), 7.2(1)ZN(0.5), 7.3(0)N1(1), 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCuw70817
Title:
"port-profile type <type>" should not be expected in the rollback diff.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Rollback should not modify port-profiles when port-profiles configs are not user-modified and not part of user-defined checkpoint.

Conditions:
User-defined rollback is executed and FP vlans are rolled back

Workaround:
None

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(16), 6.2(16)S46, 7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)IB(0.101), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)ZD(0.194), 7.3(0)ZN(0.210)
Alert Type:
Updated *
Bug Id:
CSCux28796
Title:
OIL is not copied from (*,G) to (S,G)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On an intermediate hop router sometimes, the OIF list of *,G is not inherited into S,G entry correctly.

It happens in certain conditions such as this.


src---rtr1---rtr2- intf1----rtr3---rcvr
|
rp
rtr2 has a *,G entry with oif (intf1) towards rcvr.
when the source starts, the rtr2 receives a SG join from RP.
rtr2 create the SG entry with oif (intf2) only towards RP, instead of two OIFs. (intf1 and intf2)
Only after receiving a SG join the rtr3, does the intf1 gets added to the entry. This causes a traffic blackholing upto a minute.

Conditions:
This typically happens on a IHR only where the SG creation happens due to receiving a SG join and there is already a *,G entry with other oifs.

Workaround:
As such there is no workaround and the system correctly itself within a minute.
The other possible workaround is to change the topology. For example if we connect the RP router to the rtr3 in the above topology, the problem will no longer be seen.

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.0(3)I3(0.271), 7.0(3)I3(1), 7.3(0)D1(0.166), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)IB(0.122), 7.3(0)IZN(0.13), 7.3(0)N1(0.220)
Alert Type:
Updated *
Bug Id:
CSCuy42849
Title:
Wrong PIM assert sent by the PE device in MPLS network (Nexus device)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Multicast packet drop observed at receiver side.

Conditions:
Two PE must connect to the CE in a Ethernet segment and has same subnet .

Workaround:
Remove and re add the MDT configuration under VRF .

Further Problem Description:
PE is running SSM in the core and the customer routes are in VRF DCT .
vrf context DCT
ip pim rp-address 8.8.8.8 group-list 239.0.0.0/8
ip pim ssm range 232.0.0.0/8
mdt default 232.100.99.1
mdt source loopback0
mdt data 232.100.99.128/25 threshold 10

RP 8.8.8.8 is CE1 in the device . Source is with IP address 50.50.50.2 sending Multicast traffic to 239.1.1.1

Last Modified:
07-APR-2016
Known Affected Releases:
9.9(9.9)
Known Fixed Releases: *
6.2(16), 6.2(16)S46
Alert Type:
Updated *
Bug Id:
CSCuv95316
Title:
Pixmc core being observed after insert new sup or reload chassis
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After upgraded code, insert new sup or reload module generates PIXMC core

Conditions:
1. SPAN/ESPAN config is there on the switch
2. More than 128 PHY ports should be present in that VDC

Workaround:
Remove SPAN/ESPAN config before inserting new SUP/Module or during module reload. Later apply back the SPAN/ERSPAN config.

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(14), 6.2(14)S25, 7.3(0)D1(0.79)
Known Fixed Releases: *
6.2(16), 6.2(16)S1, 7.3(0)D1(0.126), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.71), 7.3(0)SC(0.14)
Alert Type:
Updated *
Bug Id:
CSCuy51650
Title:
iscm cores for vdc deletion
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
iscm cores for vdc deletion ,

bld type is :: /auto/andfreetown/REL_6_2_16_S40
Core was generated by `/isan/bin/iscm'.
Program terminated with signal 6, Aborted.
[New process 17360]
#0 0x455fc3d8 in wait ()
from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#0 0x455fc3d8 in wait () from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#1 0x082e4115 in push_nice_configuration (cfg_file_name=0x839bdf5 "/tmp/itd_no_cfg_file") at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:2672
#2 0x082ec977 in iscm_svc_nice_clear_config (svc_ent=0x8fd99e0) at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:1043
#3 0x0823b5f0 in iscm_mts_fm_handler (event=0x8fb7040, ret_fsm_event_list=0xffb5f568) at ../feature/iscm/server/rise/iscm_rise_msg_handlers.c:1412
#4 0x080fe939 in iscm_demux (event=0x8fb7040, ret_fsm_event_list=0xffb5f568) at ../feature/iscm/server/iscm_fu.c:3112
#5 0xf676e273 in fu_fsm_engine_process_app_ev (event=0x8fb7040, new_ev=0x8fb70f0, fsm_event_list_ref=0xffb5f568, demux_ev_ref=0xffb5f564) at ../utils/fsmutils/fsm.c:2431
#6 0xf677d83d in fu_fsm_engine () at ../utils/fsmutils/fsm.c:2782
#7 0x081147b9 in main (argc=, argv=) at ../feature/iscm/server/iscm_main.c:393
warning: .dynamic section for "/ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/isan/lib/libsse_common.so" is not at the expected address
All.Done.

Conditions:
iscm cores for vdc deletion ,

bld type is :: /auto/andfreetown/REL_6_2_16_S40
Core was generated by `/isan/bin/iscm'.
Program terminated with signal 6, Aborted.
[New process 17360]
#0 0x455fc3d8 in wait ()
from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#0 0x455fc3d8 in wait () from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#1 0x082e4115 in push_nice_configuration (cfg_file_name=0x839bdf5 "/tmp/itd_no_cfg_file") at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:2672
#2 0x082ec977 in iscm_svc_nice_clear_config (svc_ent=0x8fd99e0) at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:1043
#3 0x0823b5f0 in iscm_mts_fm_handler (event=0x8fb7040, ret_fsm_event_list=0xffb5f568) at ../feature/iscm/server/rise/iscm_rise_msg_handlers.c:1412
#4 0x080fe939 in iscm_demux (event=0x8fb7040, ret_fsm_event_list=0xffb5f568) at ../feature/iscm/server/iscm_fu.c:3112
#5 0xf676e273 in fu_fsm_engine_process_app_ev (event=0x8fb7040, new_ev=0x8fb70f0, fsm_event_list_ref=0xffb5f568, demux_ev_ref=0xffb5f564) at ../utils/fsmutils/fsm.c:2431
#6 0xf677d83d in fu_fsm_engine () at ../utils/fsmutils/fsm.c:2782
#7 0x081147b9 in main (argc=, argv=) at ../feature/iscm/server/iscm_main.c:393
warning: .dynamic section for "/ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/isan/lib/libsse_common.so" is not at the expected address
All.Done.

Workaround:
iscm cores for vdc deletion ,

bld type is :: /auto/andfreetown/REL_6_2_16_S40
Core was generated by `/isan/bin/iscm'.
Program terminated with signal 6, Aborted.
[New process 17360]
#0 0x455fc3d8 in wait ()
from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#0 0x455fc3d8 in wait () from /ramfs/ucd_tmp/ucd.4YBr0whV0khlcUGkNl/lib/libpthread.so.0
#1 0x082e4115 in push_nice_configuration (cfg_file_name=0x839bdf5 "/tmp/itd_no_cfg_file") at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:2672
#2 0x082ec977 in iscm_svc_nice_clear_config (svc_ent=0x8fd99e0) at ../feature/iscm/server/nice/iscm_svc_nice_fsm_ac.c:1043
#3 0x0823b5f0 in iscm_mts_fm_handler (event=0x8fb7040, ret_fsm_event_list=0xffb5f568) at ../f

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(16)S40
Known Fixed Releases: *
6.2(16), 6.2(16)S46, 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCuq18021
Title:
SNMPset to community strings with special characters cause hap reset
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
NX-OS SNMPd process crashes with HAP reset.

Conditions:
Community string has leading ''%'' and ends with a number.
(however some other combination of special characters may cause this problem, we haven't seen them yet but can't exclude)

Workaround:
don't use leading % as a character. Better to avoid using special characters in RW communities or at least not as a leading characters

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
07-APR-2016
Known Affected Releases:
7.1(0)ZD(0.278)
Known Fixed Releases: *
5.2(1)N1(8.156), 5.2(1)N1(9), 6.0(2)N2(5.107), 6.0(2)N2(6), 6.2(16), 6.2(16)S16, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZN(0.772), 7.0(6)N1(0.264)
Alert Type:
Updated *
Bug Id:
CSCuv42308
Title:
MST Disputes VPC peer-switch secondary peer sending cost of 250
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
STP/MST disputes downstream from vPC domain with peer-switch

Conditions:
vpc peer-switch configured, this was noticed with MST, unaware if it also affects PVST

Workaround:
Flap the peer-link

Further Problem Description:
If this is encountered, please gather the following from both N7K's and engage TAC:

# show tech detail
# show tech vpc
# show tech stp
# show tech l2fm detail

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(14a)S2, 6.2(14a)S3, 6.2(16), 6.2(16)S2, 7.2(1)D1(0.104), 7.2(1)D1(1), 7.2(1)ZD(0.95), 7.3(0)D1(0.126), 7.3(0)D1(1), 7.3(0)GLF(0.25)
Alert Type:
Updated *
Bug Id:
CSCuw25153
Title:
Traffic loss during HSRP Recovery
Status:
Fixed
Severity:
2 Severe
Description:

HSRP is configured on 2 Nexus 7700, one is active and the other one is standby.
When the link on the active one is down, the standby one will take over the role of the active one. However, after the link is up, when the original active one try to take back the role, there will be a traffic loss of more than 1s. This issue occurs once in 30 trials.

Symptom:
HSRP is configured on 2 Nexus 7700, one is active and the other one is standby.
When the link on the active one is down, the standby one will take over the role of the active one. However, after the link is up, when the original active one try to take back the role, there will be a traffic loss of more than 1s. This issue occurs once in 30 trials.

Conditions:
Hsrp sessions over BFD and we need to keep on doing shut and no shut

Workaround:
No workaround is there for the drop. Its random.

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(13)S8, 7.0(3)I4(0.15), 7.2(0)D1(1)
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.0(3)I4(0.23), 7.0(3)I4(1), 7.2(2)D1(0.3), 7.2(2)N1(0.334), 7.2(2)N1(1), 7.2(2)ZD(0.8), 7.2(2)ZN(0.7), 7.3(0)D1(0.178)
Alert Type:
Updated *
Bug Id:
CSCuw51522
Title:
Mac learnt on ES ID for host vpc+ port operating in individual mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On a pair of nexus 7000 series switches configured for fabricpath vpc+, the mac address for an host vpc+ operating in individual mode may point to an incorrect interface on the non-parent nexus 7000, either pointing to the local vpc+ leg that is down, or to the fabricpath address for the emulated switch (ES ID.1.65535). Traffic destined for devices behind the host vpc+ ingressing the non-parent nexus 7000 will not reach its destination.

Conditions:
- This is seen in a host vpc+ configuration, a port-channel configured for vpc made of HIF interfaces residing on seperate FEXes, each connected to a single parent nexus 7000
- The port is running in standalone mode allowed by the configuration of no lacp suspend-individual on the port-channel and the absence of lacp configuration on the attached system.

Workaround:

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(10), 6.2(14), 7.2(0)D1(1)
Known Fixed Releases: *
6.2(16), 6.2(16)S1, 7.2(1)D1(0.99), 7.2(1)D1(1), 7.2(1)ZD(0.90), 7.3(1)D1(0.29)
Alert Type:
Updated *
Bug Id:
CSCtf45721
Title:
RD in config out of sync with BGP for VRF
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
RD in running config out of sync with RD in BGP. Per prefix labels for VRF routes held in ULIB
Conditions:
In a short window, RD change to new RD followed nu old RD. Latter operation did nor require RD delete.
Workaround:

None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.0(0)MP1(0.254), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCth47931
Title:
288: Copying 3950 vrfs configs to running cfg takes more than 100mins
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Configs from 51 to 4k vrfs takes long time to get copied to running cfg. 50 vrfs are already configured on the router before copying the cfgs and all the bgp,RIB and FIB was up and running fine
Conditions:
Check description section
Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.2(0.217)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCth36775
Title:
288:%BGP-3-TX_TXLIST_ERRO BGP traceback after shut/no shut of interfaces
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Traffic never coming up
Conditions:
Check repro steps in the description section
Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.0(0)MP1(0.302), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtz98916
Title:
HSRP Interface state changes observed during Sys-Switchover
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
HSRP Interface state changes observed during System Switchover
Conditions:
When links are established and a system switchover is performed, the HSRP interface state changes are observed.
Workaround:
N/A

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(0.288)S0
Known Fixed Releases: *
6.1(0.298)S0, 6.2(0.217), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCty01628
Title:
Some BGP routes remain invalid on 'restart bgp'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In rare occasions, 'restart bgp <>' may cause valid paths to be stuck at 'invalid' state.

Conditions:
This issue had only been seen when the next-hops of the paths are directly attached and in setup with large number of directly attached peers (~1000).

Workaround:
Restart bgp again will usually fix the issue. Or a 'clear ip route ' where next-hop is the next-hop of the paths stuck at 'invalid' state, will also help to recover.

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(4)
Known Fixed Releases: *
5.2(4.86)S0, 6.1(0.282)S0, 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCub11461
Title:
ip mroutes are stuck in "initializing - suppressing MFDM updates"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
MRIB context will be stuck in initializing after the SUP switchover when "ip routing multicast holddown" is set to 0/Disabled.
Conditions:
when "ip routing multicast holddown" is set to 0/Disabled.
Workaround:
Not to disable "ip routing multicast holddown"

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(1)
Known Fixed Releases: *
6.1(1)S41, 6.1(1.42)S0, 6.2(0.217), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtn13055
Title:
BGP does not filter updates with incorrect AS-PATH values
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path values. This could allow an upstream BGP neighbor to pass
an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in a rest of and
resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4098 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases: *
5.2(0.218)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtf40008
Title:
LESS allows bash access
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cisco Nexus OS contains a vulnerability that could allow an authenticated,
local attacker to execute arbitrary commands on a targeted device. The
vulnerability is due to improper sanitization of user-supplied values to
command line interface commands.

An authenticated, local attacker could exploit the vulnerability by issuing
commands that contain malicious options on the device command line interface.
If successful, the attacker could gain elevated privileges on the targeted device.

Conditions:

Injection can be done via either the less or the section sub command. Full
details below:

----------------------------------------------------------------------
NX-OS - "less" sub-command - Command injection / sanitization issues.
----------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+-----------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+----------------|
| Cisco Nexus 7000 Series Switches | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 5000 Series Switches | CSCtf40008 | 4.2(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 2000 Series Switches | CSCtf40008 | 4.1(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 1000V Series Switches | CSCtf40008 | 4.2(1)SV1(5.1) |
|-----------------------------------+------------+----------------|
| Cisco MDS 9000 Software | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Unified Computing System | CSCtg18363 | 1.3(1c) |
| | | 1.4(1i) |
+-----------------------------------------------------------------+

The following are not affecfed by the "less" sub-command - command injection
vulnerability.

* Cisco Nexus 3000 Series Switches
* Cisco Nexus 4000 Series Switches

-------------------------------------------------------------------------
NX-OS - "section" sub-command - Command injection / sanitization issues.
-------------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+--------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+-------------|
| Cisco Nexus 7000 Series Switches | CSCtr44645 | 5.2(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 5000 Series Switches | CSCtr44645 | 5.1(3)N1(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 3000 Se

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(4), 4.2(6), 5.1(1a), 5.1(2)
Known Fixed Releases: *
4.2(1)N2(1), 4.2(5.10), 5.1(0.76), 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCth16459
Title:
274:IPFIB-SLOT1-4-FIB_TCAM_PF_INSERT_FAIL:FIB TCAM prefix insertion fail
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
TCAM insertion failures after loading 500vrfs and 200k routes
Conditions:
Check repro steps in description
Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.0(0)MP1(0.324), 5.0(0)MP1(0.365), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCto45260
Title:
245_S6: BGP tracebacks after bgp restart
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic never converges after bgp process restart
Conditions:
Load the scale setup of 1k vrfs and 490k routes in per-vrf mode.
Send traffic from remote to local
Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.245)
Known Fixed Releases: *
5.2(0.270)S6, 5.2(0.276)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCua00534
Title:
N7K: mvpn bgp mdt-safi has old bgp rd value
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
mvpn bgp mdt-safi has old bgp rd value
Conditions:
mvpn bgp mdt-safi has old bgp rd value
Workaround:
none

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(5)S5
Known Fixed Releases: *
5.2(5)S14, 5.2(5)S19, 5.2(5.21)S0, 5.2(5.27)S0, 6.1(1)S4, 6.1(1.6)S0, 6.2(0.217), 6.2(2), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtf37179
Title:
BGP label allocated to iBGP route
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
BGP assigns label to iBGP routes
Conditions:
Configure multihome topology where route is learned from both eBGP & iBGP
Workaround:

None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.0(0)MP1(0.182), 5.0(1), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtn13043
Title:
BGP does not filter updates with invalid AS Path Segment type
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path Segment Types. This could allow an upstream BGP
neighbor to pass an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in
a rest of and resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4097 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases: *
5.2(0.218)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCto72759
Title:
IBGP to IGP redistribution is enabled by default in NX-OS
Status:
Fixed
Severity:
2 Severe
Description:

By default in NX-OS IBGP routes are redistributed into the IGP when redistribution is configured. In IOS
"bgp redistribute-internal" router bgp command is needed. We need to have this behavior consistent with
IOS

Workaround:

Redistribution of IBGP into IGP can be blocked via a route-map:

router ospf 1
redistribute bgp 1 route-map bgp-to-ospf

route-map bgp-to-ospf deny 5
match route-type internal

route-map bgp-to-ospf permit 10

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(6), 5.1(3)
Known Fixed Releases: *
5.2(1)S13, 5.2(1)S19, 5.2(1.16)S0, 5.2(1.23)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtg90667
Title:
OSPF service crashes @ip_get_secondary_count on restarting netstack
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When the netstack process crashed, existing BGP sessions may flap and routes may be re-learnt. This may cause traffic loss.

Conditions:
This only happens when the netstack process had crashed or was terminated ungracefully.

Workaround:
None.

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(0.288)S1, 6.1(2)S29, 6.2(0.166)
Known Fixed Releases: *
5.0(0)MP1(0.332), 5.2(1)S1, 5.2(1.3)S0, 6.1(0.143)S0, 6.2(0.228)S0, 6.2(2), 7.2(0)N1(1), 7.2(0)ZN(0.111), 8.3(0)CV(0.297), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtz78495
Title:
BGP-3-ALLOCFAIL - Private malloc failed for: URIB buf - BGP unresponsive
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
BGP may leak memory when outbound route-map and/or filter-list is configured. The leak is usually very slow, but will happen and accumulate every time an update is generated when the condition is met. Usually it took days or months to observe any adverse effect. Eventually (may take weeks or months), the entire address space of the BGP process could be filled and all memory allocation will fail with 'BGP-3-ALLOCFAIL' errors.

Conditions:
Happens when an outbound route-map/filter-list with prefix matches and actions to be taken (like set commands). Only setup/config with outbound route-map filtering is subject to this bug. However, not every setup/config with with outbound route-map filtering will observe the bug, it also depends on match condition, etc. Instead of enumerating all possible cases, the most accurate and reliable way is to use the following simple procedure to test for memory leak for a particular peer:

sh bgp internal mem-stats detail | egrep rpm
! note the current #bytes allocated for librpm_dl
clear bgp soft out
! wait till all updates had been sent to
sh bgp internal mem-stats detail | egrep rpm
! compare current #bytes allocated for librpm_dl with previous value for leak

Workaround:
There's no workaround. The situation can be recovered via a restart of the bgp process.

Last Modified:
08-APR-2016
Known Affected Releases:
6.0(2)
Known Fixed Releases: *
5.2(5)S5, 5.2(5.6)S0, 6.0(2)A1(1), 6.0(2)N1(1), 6.0(2)U1(1), 6.0(4)S1, 6.1(0.292)S0, 6.2(0.217), 6.2(2), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtn13065
Title:
BGP does not filter BGP update with incorrect AS-PATH Segment Length
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path Segment Lengths. This could allow an upstream BGP
neighbor to pass an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in
a rest of and resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4099 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases: *
5.2(0.218)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCub46108
Title:
ASCII config is lost for some modules in "power supply combined" mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Certain linecards might loose interface specific configurations

Conditions:
power mode needs to be combined to power up all the line cards in the switch

Workaround(s):
After all the linecards go online, please issue the following command to update ASCII configuration again on all the linecards to ensure interface configuration on all line cards are set correctly:
copy startup-config running-config

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(1)S62
Known Fixed Releases: *
6.1(1.65)S0, 6.1(2), 6.2(0.285), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtn84156
Title:
N7K-Reg: SPAN session not coming up with PVLAN as source
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
SPAN session will not come up on primary vlan

Conditions:
When private-vlan is enabled and SPAN session is created on primary vlan

Workaround:
None.

Last Modified:
12-APR-2016
Known Affected Releases:
5.1(3)
Known Fixed Releases: *
5.1(10.1)S0, 5.2(0.249)S0, 8.3(0)SF(0.10), 8.3(0)SF(0.2), 8.3(0)SF(0.75)
Alert Type:
New
Bug Id:
CSCuz16227
Title:
dot1x proc reset at malloc/realloc_internal after few days of MAB/EAPrun
Status:
Open
Severity:
2 Severe
Description:

Symptom:
When EAP and MAB authentication happening in scaled environment and periodic frequent interface flaps used to recover the error disabled interfaces this issue is seen.

Conditions:
When memory allocation and re-allocation happens very frequently due to authentication, failed authentication, link flaps etc., at some rare race condition this crash is observed.

Workaround:
There is no direct workaround.
But avoiding lot of interface going to error-disable (auth failures/frequent link flaps) and giving few seconds (3 to 5 sec for range of 5 interfaces) delay between link flaps and avoiding flapping large no. of interfaces with range command in one shot will minimize the chances the hitting this issue greatly.

Further Problem Description:

Last Modified:
13-APR-2016
Known Affected Releases:
7.3(0)N1(0.295)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux59548
Title:
Chnage CLP_EB_INT_ECC_ERR_FLD_EE_TILE0_2ERR from FATAL to non-fatal
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An active supervisor may reset during an ISSU/D very soon after becoming active but while the standby supervisor is still reloading. This causes the switch to reboot.

Conditions:
This is a rare issue which applies only to MDS 9700 supervisors. All reported instances have occurred specifically during an ISSU/D.

Workaround:
None.

Further Problem Description:
The active supervisor reload is triggered when an uncorrectable memory error is detected during startup.

Last Modified:
13-APR-2016
Known Affected Releases:
6.2(13)
Known Fixed Releases: *
7.0(0)BZ(0.115), 7.3(0)DX(0.119)
Alert Type:
New
Bug Id:
CSCuz17787
Title:
after ISSU with 0.141 UPG and delete of pvlan l2fm cores
Status:
Other
Severity:
2 Severe
Description:

Symptom:
after ISSU and delete of pvlan lwfm cores

Conditions:
after ISSU and delete of pvlan lwfm cores

Workaround:
after ISSU and delete of pvlan lwfm cores

Further Problem Description:
after ISSU and delete of pvlan lwfm cores

Last Modified:
15-APR-2016
Known Affected Releases:
7.3(0)DX(0.141)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz16968
Title:
delete of vlan would error %ETHPORT-2-IF_SEQ_ERROR mmunicating with MTS
Status:
Other
Severity:
2 Severe
Description:

Symptom:
upon deleting vlan associated to PVLAN the following error occurred ,

<>
2016 Apr 12 11:35:04 XBOW last message repeated 6 times
2016 Apr 12 11:46:28 XBOW %ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") co
mmunicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RI
D_PORT: port-channel222) (Follow PM FAQ #3 at: http://wikicentral.cisco.com/conf
luence/display/KGP/Port+Manager+FAQ)
2016 Apr 12 12:35:45 XBOW last message repeated 3 times
2016 Apr 12 12:47:37 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 1 rrtoken 0x1e6e671
2016 Apr 12 12:49:47 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 5 rrtoken 0x1e741e2

Conditions:
upon deleting vlan associated to PVLAN the following error occurred ,

<>
2016 Apr 12 11:35:04 XBOW last message repeated 6 times
2016 Apr 12 11:46:28 XBOW %ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") co
mmunicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RI
D_PORT: port-channel222) (Follow PM FAQ #3 at: http://wikicentral.cisco.com/conf
luence/display/KGP/Port+Manager+FAQ)
2016 Apr 12 12:35:45 XBOW last message repeated 3 times
2016 Apr 12 12:47:37 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 1 rrtoken 0x1e6e671
2016 Apr 12 12:49:47 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 5 rrtoken 0x1e741e2

Workaround:
upon deleting vlan associated to PVLAN the following error occurred ,

<>
2016 Apr 12 11:35:04 XBOW last message repeated 6 times
2016 Apr 12 11:46:28 XBOW %ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") co
mmunicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RI
D_PORT: port-channel222) (Follow PM FAQ #3 at: http://wikicentral.cisco.com/conf
luence/display/KGP/Port+Manager+FAQ)
2016 Apr 12 12:35:45 XBOW last message repeated 3 times
2016 Apr 12 12:47:37 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 1 rrtoken 0x1e6e671
2016 Apr 12 12:49:47 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 5 rrtoken 0x1e741e2

Further Problem Description:
upon deleting vlan associated to PVLAN the following error occurred ,

<>
2016 Apr 12 11:35:04 XBOW last message repeated 6 times
2016 Apr 12 11:46:28 XBOW %ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") co
mmunicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RI
D_PORT: port-channel222) (Follow PM FAQ #3 at: http://wikicentral.cisco.com/conf
luence/display/KGP/Port+Manager+FAQ)
2016 Apr 12 12:35:45 XBOW last message repeated 3 times
2016 Apr 12 12:47:37 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 1 rrtoken 0x1e6e671
2016 Apr 12 12:49:47 XBOW %VLAN_MGR-2-VLAN_SEQUENCE_TIMEOUT: VLAN_MGR Event Seq.
Timed Out while communicating for Seq. Id 5 rrtoken 0x1e741e2

Last Modified:
15-APR-2016
Known Affected Releases:
7.3(0)DX(0.135)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCup03080
Title:
continuous snmp polling observing process crashes
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With continuous snmp polling trigger device to crash

Conditions:
SNMP is stuck in TCP api

Workaround:
no workaround

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
7.1(0)D1(0.130), 7.1(0)D1(0.136), 7.1(0)D1(0.143)
Known Fixed Releases:
6.1(2)I3(1.19), 6.1(2)I3(2), 6.2(10), 6.2(10)S71, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162), 7.1(0)D1(0.169), 7.1(0)FC(0.2)
Alert Type:
Updated *
Bug Id:
CSCuy35651
Title:
Removing IPSG config from one Client int, clears other entries from H/W
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Problem:
I am observing that on removal of IPSG config on one Client facing interface, the IPSG entry of the other is being removed from the hardware programming.
The issue is seen even in 6.2.12, 7.2.1.D1

RCA:
DHCP is sending "MTS_OPC_IPSG_DISABLE" event for a vlan when entry deleted is last entry for the vlan. Upon receiving "MTS_OPC_IPSG_DISABLE" event in SAL we are removing the complete table. We are assuming that there's a one to one mapping for vlan to table-id but this is not true for SVI where table id is getting allocated based on VRF. So for default VRF all entries will be under single table-id and upon receiving disable event we are deleting the table which will delete all other entries in table too

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
6.2(16)S32, 7.3(0)DX(0.110)
Known Fixed Releases: *
6.2(16)S51, 6.2(16)S64, 7.0(0)BZ(0.115), 7.3(0)DX(0.122), 7.3(0)DX(0.133), 7.3(0)DX(0.141)
Alert Type:
Updated *
Bug Id:
CSCus52139
Title:
post L3, l2 flood traffic not going out on peer-link
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Post L3 Flood to BD packet are not forwarded in the Peer Link

Conditions:
VPC setup with VxLAN configuration.

Workaround:
MAC table should be populated.

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases: *
7.2(0)D1(0.383), 7.3(0)D1(0.111), 7.3(0)D1(0.142)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz00514
Title:
Rollback removes switchport mode trunk in port-profile
Status:
Fixed
Severity:
2 Severe
Description:

The port-profile with switchport mode trunk an doing rollback removes the switchport mode trunk command which is the day 1 issue in rollback

Symptom:
Create port-profile with switchport mode trunk and take the checkpoint, do any config changes which are not related with port-profile. After that when we do rollback the switchport mode trunk gets removed from port-profile in running config

Conditions:
Rollback with port-profile containing switchport mode trunk

Workaround:
workaround is to after rollback done with port-profile and switchport mode trunk we need to manually configure the switchport mode trunk under port-profile

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases:
6.2(16)S46, 7.3(1)D1(0.21)
Known Fixed Releases: *
6.2(16)E1, 7.3(1)D1(0.49)
Alert Type:
Updated *
Bug Id:
CSCut25162
Title:
VPLS VC's don't come after delete/add VFI's in EFP scale setup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Few VPLS PW's remain down

Conditions:
With L2VPN VFI's scaled, delete all VFIs and Re-add all VFI's.

Workaround:
clear l2vpn service vfi all

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.430)
Known Fixed Releases: *
15.5(1)S0.17, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)S2.15, 15.6(0.16)S, 15.6(0.17)PI30d, 15.6(0.25)T, 15.6(1)SN, 15.6(1.1)T
Alert Type:
Updated *
Bug Id:
CSCuw10915
Title:
MPLS ldp sync disappears after interface flap
Status:
Fixed
Severity:
2 Severe
Description:

MPLS ldp sync disappears after interface flap

Symptom:
MPLS ldp sync disappears after interface flap

Conditions:
MPLS ldp sync is enabled and interface is configured as ISIS level-2-only

Workaround:
Configure interface as ISIS level-1-2 or level-1.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.2(1)D1(0.102), 7.2(1)D1(1), 7.2(1)N1(0.323), 7.2(1)N1(1), 7.2(1)ZD(0.92), 7.2(1)ZN(0.85), 7.3(0)D1(0.171), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuw39946
Title:
MAC learnt on non existent F2e port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
MAC address learnt on a non existent port

"show sys int l2fm info move_db" will show stale entries.

Conditions:
Seen when a loop occurs and multiple mac flaps were seen. While this happens, if the port-channel is deleted, the process responsible for mac learning still believes the interface exist

When PeerLink is in VPC+ and legs are still in VPC , STP mac moves may cause this situation.

Workaround:
create the port-channel again and issue clear mac address-table and then delete the port-channel.
OR
issue "debug l2fm clear move_db" in affected VDC.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.140), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.79), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCtz59354
Title:
cNTP ACL Does Not Continue Processing After Matching Deny Entry
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When an NTP ACL is configured for "peer", "serve", "serve-only", or "query-only" and a deny ACE is matched, the other NTP options are not checked.

For example:


ntp access-list peer 10
ntp access-list serve 11

ip access-list 10 permit host 192.168.1.1 any
ip access-list 10 deny ip any any

ip access-list 11 permit host 172.16.1.1 any


If the host matching ACL 11, 172.16.1.1, sends an NTP message it will be blocked by the "peer" ACL. However, it should be permitted by the "serve" ACL, but it is not.

Conditions:
Multiple NTP ACLs configured.

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(4), 6.1(3)S5, 6.1(3)S6, 6.2(1.121)S0, 7.2(1)D1(1), 7.3(0)ZN(0.161), 7.3(1)N1(0.1)
Known Fixed Releases: *
6.1(2.30)S0, 6.1(4.97)S0, 6.1(5), 6.1(5.32)S0, 6.2(0.285), 6.2(1.149)S0, 6.2(2), 7.0(0)ZD(0.84), 7.0(1)ZD(0.3), 7.0(3)I2(0.315)
Alert Type:
Updated *
Bug Id:
CSCuv75088
Title:
Phyport vPC with Esxi does not come up thr FEX
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Phyport vPC with Esxi does not come up thr FEX

Conditions:
When trying to bring up phyport vPC thr FEX

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.0(2)FIP(0.55), 7.2(1)D1(0.62), 7.2(1)D1(0.63), 7.2(1)D1(1), 7.2(1)ZD(0.54), 7.2(1)ZD(0.56), 7.3(0)D1(0.81), 7.3(0)D1(1), 7.3(0)DX(0.16)
Alert Type:
Updated *
Bug Id:
CSCuw21334
Title:
F3/OTV:packets flooded into BD 0(DI:0xC000) after decapsulation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic drop over OTV on F3 modules on decapsulation side.

Conditions:
F3 module used for OTV.
SVI configured for OTV extended vlan(could have occurred prior to ISSU).

Workaround:
remove and readd the vlan to otv extended list.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.171), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.131), 7.3(0)RSP(0.7), 7.3(0)RTG(0.80), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw18366
Title:
OTV core while bringing up 42+ OTV adjacency
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OTV process crash.

Conditions:
While add more than 42 OTV adjacency are added for on N7k.

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)S33
Known Fixed Releases: *
7.3(0)D1(0.171), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.131), 7.3(0)RSP(0.7), 7.3(0)RTG(0.80), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuv82106
Title:
Multicast traffic gets blackholed when MVR configured
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
New Setup's with MVR configured will have issue with traffic getting blackholed in egress direction due to MVR vlan pruning

Conditions:
7.x Release

Workaround:
shut / no shut of the receiver port will solve the issue

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases: *
7.0(7)N1(0.302), 7.0(7)N1(1), 7.0(7)ZN(0.206), 7.1(3)N1(0.633), 7.1(3)N1(1), 7.1(3)ZD(0.20), 7.1(3)ZN(0.41), 7.3(0)TSH(0.99), 7.3(1)D1(0.12), 7.3(1)PIB(0.15)
Alert Type:
Updated *
Bug Id:
CSCuu09287
Title:
SSTE: pixm critical message on 'no feature-set fabric'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
error message seen when no feature-set fabric is issued.

Conditions:
configure several feature sets and multiple VDCs.

Workaround:
none

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases: *
7.2(1)D1(0.51), 7.2(1)D1(1), 7.2(1)N1(0.283), 7.2(1)N1(1), 7.2(1)ZD(0.45), 7.2(1)ZN(0.47), 7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9)
Alert Type:
Updated *
Bug Id:
CSCup56162
Title:
Anycast HSRP custom VMAC not programmed after hsrp restart
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Anycast HSRP with custom VMAC is not programmed at L2FM as gateway after HSRP process stateful restart.

Conditions:
Anycast HSRP is configured with non-default VMAC and HSRP engine process is restarted.

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.6), 7.3(0)PDB(0.112), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw52501
Title:
GBMR1: Multicast traffic loss post ISSU due to incorrect PIM DR election
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Receiver doesn't get traffic from source ( RP doesn't get register packet from first hop router)

Conditions:
In LAN, when more than one PIM node exists, the router higher metrics may not elect DR as himself ( When all nodes support dr priority)

Workaround:
One of the following can be used as workaround

Increase dr priority in problematic node
[OR]
reduce priority in DR which has been incorrectly elected
[OR]
shut and unshut the interface

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(0.93)
Known Fixed Releases: *
7.2(1)D1(1), 7.3(0)D1(0.137), 7.3(0)D1(0.171), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)IB(0.122), 7.3(0)IZN(0.7), 7.3(0)N1(0.185), 7.3(0)N1(1), 7.3(0)OTT(0.73)
Alert Type:
Updated *
Bug Id:
CSCuw39581
Title:
OSPF sessions flap seen when scaled upto 1000 sessions.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OSPF session flap continuously when configured in 1000 sub-interfaces between 2 routers back to back.

Conditions:
OSPF running in 1000 sub-interfaces between 2 routers back to back:

Box bring up.
Interface flap.
Reload.

Workaround:
"timers throttle lsa 50 5000 15000" in router ospf mode.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(0.82), 7.3(0)D1(0.98)
Known Fixed Releases: *
7.2(1)D1(1), 7.2(1)ZD(0.101), 7.2(1)ZN(0.95), 7.2(2)D1(0.2), 7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.87), 7.3(0)N1(1), 7.3(0)PDB(0.112)
Alert Type:
Updated *
Bug Id:
CSCuw51463
Title:
HSK: %SYSMGR-2-SERVICE_CRASHED: Service "vpc_config_sync"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
config-sync service crashes

Conditions:
when lacp mode is configured differently on vpc peer switch for the same physical vpc and config-sync is enabled.

Workaround:
Disable config-sync before make lacp mode changes.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.105), 7.3(0)D1(0.111)
Known Fixed Releases: *
7.3(0)D1(0.173), 7.3(0)D1(0.175), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.125), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw03410
Title:
Nexus 6.2.x OSPF taking long time in LSA generation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
- Customer reported that there was a delay in LSA generation.
- The cost was increased at 03:42:36 but the LSA was generated at 03:43:20 which caused an impact for the customer as all the traffic moved to this router and cause congestion on the port-channel causing an impact for nearly 45 seconds.
- The first LSA was generated at the same time for the first port-channel but for the next 3 port-channels it throttled and took over 40+ seconds

Conditions:
> Info:

1. OSPF maintains a wheel with 600 slots in which LSAs will be inserted if they are to be generated and also tracks the current slot which is being processed. Lets say an LSA is to be generated after 100 msec, then it will be inserted in (current + 2) slot (1 slot equals 50 msec).
2. There is a common throttle timer which fires every 50 msec and increments the current slot. This is done by timer thread.
3. The flooding thread picks the LSA's from the current slot and generates the LSA's. Both these happen independently.

> Sequence of steps leading to problem:

In the customer's case, an LSA was to be generated after 5000 msec and hence was inserted at (current + 100) slot. Looks like the timer thread incremented the current slot before the flooding thread could process the LSA's in current slot.
This could happen if the order of thread execution is:

Lets say that the current slot is 199 and there is an LSA at 200.
Timer thread executes and increments current slot to 200.
Scheduler schedules some other OSPF thread for the next 50 msec or more. This means the throttle timer would have fired.
Scheduler schedules timer thread which will increment the current slot to 201.

Now, OSPF will have to wait for the current slot to reach 600, then cycle back, and then from 1 to 200 again. This will take 50 * 600 = 30000 msec or 30 sec.

Workaround:
Though the issue is timing related, using interface range command seems to not lead to the problem.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(12)E6, 6.2(14.3)S0, 7.0(3)I2(1.19), 7.0(3)I2(2), 7.2(1)D1(0.79), 7.2(1)D1(1), 7.2(1)N1(0.307), 7.2(1)N1(1), 7.2(1)ZD(0.71), 7.2(1)ZN(0.70)
Alert Type:
Updated *
Bug Id:
CSCus97380
Title:
plcmgr crash during OpenFlow extended sanity
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Crash in plcmgr.

Conditions:
Occurs sometimes during addition of OpenFlow matches to end of policy.

Workaround:
None known.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.402)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.1(0)ES(0.5), 7.3(0)D1(0.86), 7.3(0)D1(1), 7.3(0)DHB(0.32), 7.3(0)DX(0.16), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.37), 7.3(0)PDB(0.57)
Alert Type:
Updated *
Bug Id:
CSCuv61321
Title:
Cisco Nexus 7000 ARP Denial of Service (DoS) Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in the Address Resolution Protocol (ARP) input packet
processing of the Cisco Nexus Operating System (NX-OS) devices
unauthenticated, adjacent attacker to cause a denial of service (DoS)
condition.

The vulnerability is due to improper input validation of the ARP packet and
the Maximum Transmission Unit (MTU) size which results in a buffer overflow
which can cause the DoS condition. An attacker could exploit this vulnerability
by sending a crafted ARP packet to the device. An exploit could allow the attacker
to cause the device to be unavailable due to a DoS condition of the ARP module.

Conditions:
Device running with default configuration running an affected version of software.

Workaround:
The MTU size should be configured lower.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2015-4323 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(14)S1
Known Fixed Releases: *
6.2(14), 6.2(14)S13, 6.2(14.3)S0, 7.1(3)N1(0.616), 7.1(3)N1(1), 7.1(3)ZD(0.11), 7.1(3)ZN(0.22), 7.2(1)D1(1), 7.2(1)ZD(0.105), 7.2(1)ZN(0.99)
Alert Type:
Updated *
Bug Id:
CSCur21785
Title:
N7K - M1/M2 Egress Queuing behavior post 6.2(x) for control plane packet
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Control plane packet ( marked with DSCP value for Example PIM etc ) received on ACCESS port, and then get bridged into same VLAN do not queued in priority Queue on Egress port. The issue is not seen after doing "no ip igmp snooping"

Conditions:
- Nexus 7000 running 6.2(x), 7.2(x) image; Earlier images like 5.2(x) do not see the same condition.
- Packet is coming in ACCESS port and getting bridged into same VLAN via ACCESS or Trunk port.
- M series Line cards

Workaround:
Not available yet

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(14), 6.2(8a), 7.2(0)D1(1)
Known Fixed Releases: *
7.2(1)D1(0.38), 7.2(1)D1(1), 7.2(1)N1(0.272), 7.2(1)N1(1), 7.2(1)ZD(0.33), 7.2(1)ZN(0.36), 7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9)
Alert Type:
Updated *
Bug Id:
CSCut17793
Title:
SSTE:Traffic loss observed after flapp mpls interf with 7.2(0)D1(0.422)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Few VPLS PWs are down

Conditions:
Flap MPLS interface used by PWs

Workaround:
clear l2vpn service all

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.484)
Known Fixed Releases: *
15.5(1)S1.5, 15.5(1)S2.15, 15.5(1)S2.7, 15.5(1)S3, 15.6(0.16)S, 15.6(0.17)PI30d, 15.6(0.25)T, 15.6(1)SN, 15.6(1.1)T, 15.6(1.3)S
Alert Type:
Updated *
Bug Id:
CSCuu10618
Title:
Traffic loss on some vlans after line card reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
after reload there is 100% packet drop on a few vlans

Conditions:
LC reload on scaled setup

Workaround:
clear l2vpn service all

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.475)
Known Fixed Releases: *
15.5(1)S1.5, 15.5(1)S2.15, 15.5(1)S2.7, 15.5(1)S3, 15.5(2.20)T, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1
Alert Type:
Updated *
Bug Id:
CSCuu34174
Title:
UIN-1::After switch reload macs are not in sync between VPC peers
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Duplicate traffic is noticed on downstream FEX connected to F2 cards (not F2CR or F3)

Conditions:
On switch reload, mac missing on one side of VPC and traffic hashes to the side missing.

Workaround:
clear mac address dynamic
OR clear mac address on the side present.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases: *
7.3(0)D1(0.69), 7.3(0)D1(1), 7.3(0)DHB(0.31), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.15), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCux94893
Title:
N77: There is difference to detect removing linecard by slot number
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
N77: There is difference to detect removing linecard by slot number

Conditions:
- port-channel member port is in one slot.
- when remove module, there is difference by slot number.
- time for down lag
- remove connected route
- slot of highest number is about one second.
- slot of lowest number is about three seconds.

Workaround:
none in this time.

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(14)
Known Fixed Releases: *
6.2(16), 6.2(16)S39, 7.3(0)DX(0.91), 7.3(1)D1(0.40)
Alert Type:
Updated *
Bug Id:
CSCuy49752
Title:
N7K-C7700 : Unable to manually walk nexus coppoids cbQosPoliceStatsTable
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cu reported, they are not able to poll CoPP OIDs ( cbQosPoliceConformedPkt64 & cbQosPoliceViolatedPkt64) for their Nexus 7700 SWs.

NX-SW - Nexus7700
NX-OS version : 6.2(10)

Conditions:
This issue is noticed for only Nexus 7700 platform release : 6.2(10).
Not applicable for Nexus 70xx platforms.

Workaround:
None

Further Problem Description:
BU DE team identified as the other bug fix brake the CoPP MIB functionality.
Engineering team confirmed that, this issue is exist in 6.2.12 and 6.2.14 releases also.

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(16), 6.2(16)S47, 7.3(1)D1(0.30)
Alert Type:
Updated *
Bug Id:
CSCup81570
Title:
npacl filter missing for line vty, also action logged is incorrect
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
committed into bender barnch

Conditions:
committed into bender barnch

Workaround:
NA

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(10)S17
Known Fixed Releases: *
6.2(14a)S3, 6.2(16), 6.2(16)S16, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.228), 7.1(0)D1(0.233), 7.1(0)N1(0.280), 7.1(0)N1(0.290), 7.1(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCtr91121
Title:
NX-OS isis auth configuration not retained under p2p ethernet interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When ISIS authentication configuration is applied under a point-to-point Ethernet interface
on a Cisco Nexus 7000 series switch with NX-OS releases 5.1(2), 5.1(3), 5.1(4),
the configuration does not appear under the "show run interface ethernet x/y" and
therefore cannot be saved into the startup-config.

If isis authentication is configured without specifying level-1 or level-2, it will not function.
If isis authentication is configured with a level, i.e. level-2, it will function but only until a reload.

Conditions:
The interface is configured as isis point-to-point, i.e. with the "medium p2p" command.

Workaround:
Configure the interface as isis broadcast, i.e. remove the "medium p2p" command.

Other:
The issue applies to port-channel interfaces as well as long as they are configured as isis point-to-point, i.e. with the "medium p2p" command.

Last Modified:
08-APR-2016
Known Affected Releases:
5.1(2), 5.2(1)
Known Fixed Releases: *
5.2(1)N1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtz13215
Title:
VSH library memory leak (libutils.)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A memory leak occurs in the VHS library , which can lead to a tacacs crash

Conditions:
This symptom is seen when you have aaa authorization enabled and you issue commands that require authorization checking. Note, each time the leak happens is relatively small but over time (months, years, etc ) it can grow large enough that it causes the tacacs process to crash

Workaround:
None, this issue is resolved in 5.2(5) and 6.1(1).

Further Problem Description:

Last Modified:
08-APR-2016
Known Affected Releases:
5.1(5)
Known Fixed Releases: *
5.2(4.73)S0, 6.0(2)U2(1), 6.0(2)ZD(0.5), 6.1(0.273)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtn53150
Title:
Nexus does not send new BGP updates
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

Nexus does not send new attribute updates to RR

Conditions:

The issue happens when the bgp attributes from an external ASs are changed

Workaround:

Sof Clear BGP

Last Modified:
08-APR-2016
Known Affected Releases:
5.0(3)
Known Fixed Releases: *
4.2(8)S16, 4.2(8.60)S0, 5.2(1)S7, 5.2(1.8)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtr88741
Title:
Interface commands not working when pushing configuration with SNMP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Interface related configurations are not being processed and are causing an error to be printed in the form of a syslog message. Configurations could not be properly applied using SNMPSET.

Conditions:
Configurations cannot be applied using SNMPSET.

Workaround(s):
Workaround is to manually make the interface configuration changes through the CLI or XML interface, instead of using the SNMPSET option.

Last Modified:
08-APR-2016
Known Affected Releases:
5.1(4)
Known Fixed Releases: *
5.1(10.40)S0, 5.1(5)S1, 5.1(5)S2, 5.1(5)S5, 5.2(2)S14, 5.2(2)S22, 5.2(2.12)S0, 5.2(2.19)S0, 6.0(0.31)S0, 6.0(0.35)S0
Alert Type:
Updated *
Bug Id:
CSCtn13332
Title:
Peers shutdown due to NOMEM on receiving around 63K attributes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
N7K runs into BGP related errors:
2011 Feb 8 01:52:02 N2 %BGP-3-ATTRID_OP: bgp-65001 [12126] Failed to find attribute ID
2011 Feb 8 01:52:02 N2 %BGP-3-NOMEMORY: bgp-65001 [12126] Could not allocate Attr entry, attr id

Conditions:
Seen on NXOS 5.1 code

Workaround:
None. Fix is available in 5.2.1

More Info:

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.180)
Known Fixed Releases: *
5.2(0.218)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCto36485
Title:
XML requests rejected when AAA login enabled but CLI accepted
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

- DCNM discovery for Nexus platform devices will fail with message as 'Insufficient user privileges to set the DCNM required log levels' even if the user has sufficient privileges when TACACS+ AAA login is enabled in the device

Conditions:

This issue could occur if we discover the switch in DCNM with the following setup:

- TACACS+ AAA authentication enabled in the switch by disabling the shell service in AAA server( eg. ACS server) for the User used to login to the switch.

Workaround:

- Enable shell service in AAA server(eg. ACS server) for the user with role which has privilege to configure the device.
eg., network-admin
- After enabling the shell service in AAA server(eg. ACS server) as specified above, rediscover the device in DCNM.

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(3)
Known Fixed Releases: *
5.2(0.264)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCti35846
Title:
346: bgp crash while creating 4k interfaces
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BGP crash is seen while creating 1k subinterfaces
Conditions:
Create 4k subinterfaces
Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.0(0)MP1(0.354), 5.1(0.231)S0, 5.1(1), 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtc54335
Title:
NXOS range creates MST region boundaries
Status:
Fixed
Severity:
3 Moderate
Description:


Symptom:

Cisco Nexus 5k/7k NXOS vlan range is as follows:
1-3967,4048-4093

So the following vlans are reserved:
3968 to 4047 and 4094

This differs from the Cisco Catalyst switch reserved vlans:
0, 4095, 1002-1005 reserved by the cat6k

Best practice is to create mapping for all used and non-used vlans from the
very beginning. Because of this change of vlan mapping between the two set of
switches, it causes MST regions to be separated and as a result it creates a
region boundary.

Conditions:

The problem happens only when Cisco Nexus switch is connected to Cisco Catalyst
switch running MST and which has different range of reserved vlans

Workaround(s):

In the MST region, please specify the range of vlans which does not contain a
vlan which is in the reserved list of any of the switches.






Last Modified:
08-APR-2016
Known Affected Releases:
4.2(1)
Known Fixed Releases: *
4.2(1)N2(1), 5.0(0.253), 5.0(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtz18472
Title:
bgp process crash on "clear ip bgp vrf < > *"
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
BGP process somtimes may crash after attempting clear ip bgp < > or restart BGP

Conditions:
when sendbuf msg limits exceeds the max_buf limit.

Workaround:
So far seen over a user CLI driven activity, track CLI used prior to the crash.

Further Problem Description:
sendbuf and the previous sendbuf overwrites the malloc header of the next

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(0.249)S7
Known Fixed Releases: *
6.1(0.267)S0, 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCus67129
Title:
vrf import map doesn't process multiple paths
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
vrf import map doesn't process multiple paths in VRF-lite scenario

Conditions:
When importing ECMP's from a source VRF to a target VRF locally, if the import-map is configured in the target VRF to set any attribute, the "set" operation will only be performed on one of the multiple paths. Due to this, ECMP is broken (one path has different attribute after import-map processing).

Workaround:
none

Further Problem Description:

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(2), 7.2(0.1)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.39), 7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(3)I1(1.198), 7.0(3)I1(2), 7.0(3)IST2(1.2), 7.1(0)AV(0.74), 7.1(0)ES(0.18)
Alert Type:
Updated *
Bug Id:
CSCuu06829
Title:
SUP switchover causes duplicate connection on switchover device
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On sup switchover or BGP process restart, duplicate connection request error is seen on switchover device.

Conditions:
1. Multiple sessions between switchover peer and helper peer.
2. High route scale


Workaround(s):


Workaround:
If multiple sessions are to be run between two boxes, configure one peer to be a passive listener always.

Further Problem Description:

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(5), 7.0(3)I1(1.206), 7.0(3)I1(1.233)
Known Fixed Releases: *
7.0(3)I2(0.365), 7.0(3)I2(0.367), 7.0(3)I2(0.381), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.72), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCub32420
Title:
bgp show cmds timeout, after configuring template/password for 1k peers
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BGP commands get stuck after removing a password command.

Conditions:
MD5 authentication has to be enabled on BGP peers

Workaround(s):
to restart BGP issue "restart bgp ".

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(1)S50
Known Fixed Releases: *
6.1(1.65)S0, 6.1(2), 6.2(0.285), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtl21401
Title:
RBAC, Nexus show role feature does not map IF-MIB
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RBAC, Nexus show role feature does not map IF-MIB

Conditions:

Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(4)
Known Fixed Releases: *
5.2(0.225)S0, 7.0(1)ZD(0.3), 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCty57734
Title:
igmp snoping not enabled back if vlan configuration <> cmd is remo first
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Removing VLAN configuration doesn't remove IGMP Snooping configuration under VLAN Configuration.

(1) disable IGMP Snooping
Switch(config)# vlan configuration 2
Switch(config-vlan-config)# no ip igmp snooping

Switch(config-vlan-config)# show ip igmp snooping | inc ooping
Global IGMP Snooping Information:
IGMP Snooping enabled
IGMP Snooping information for vlan 1
IGMP snooping enabled <========### default is enabled
IGMP Snooping information for vlan 2
IGMP snooping disabled

(2) Delete VLAN Configuration
Switch(config)# no vlan configuration 2

(3) IGNMP Snooping Configuration remains
Switch(config)# show ip igmp snooping | inc ooping
Global IGMP Snooping Information:
IGMP Snooping enabled
IGMP Snooping information for vlan 1
IGMP snooping enabled
IGMP Snooping information for vlan 2
IGMP snooping disabled <========= It should be enabled

Conditions:
Remove VLAN Configuration

Workaround:
Manually "enable IGMP"(default) Snooping under VLAN Configuration.

More Info:

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(0.226)
Known Fixed Releases: *
6.0(2)U3(0.655), 6.0(2)U3(1), 6.1(0.282)S0, 6.1(1)S14, 6.1(1.12)S0, 6.2(0.217), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCua68725
Title:
'mpls static binding' CLI missing after rollback operation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On rolling back to a checkpoint containing 'mpls static binding' command which uses dynamic integer label values,label value is not retained.

Conditions:
Configure 'mpls static binding ' using a label range.Remove this configuration.Rollback to the checkpoint.Not able to retain the label value.

Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(9)S2, 6.1(1)S10
Known Fixed Releases: *
5.2(9.18)S0, 6.1(1)S29, 6.1(1.31)S0, 6.1(4.1)S0, 6.2(0.217), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtz48447
Title:
Block non-default vrf creationin admin VDC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"Default VRF" is not deleted on sup2. Only non-default VRF's are deleted.

Conditions:
Happens when a switch boots directly as admin-vdc.

Workaround(s):
"Default VRF" cannot be removed, there is a lot of dependency on default VRF information.

Last Modified:
08-APR-2016
Known Affected Releases:
6.1(0.267)S1, 6.1(1)S24
Known Fixed Releases: *
6.1(1)S38, 6.1(1.42)S0, 6.2(0.217), 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCto88789
Title:
NXOS: L3VPN-MIB; issue with mplsL3VpnVrfVpnId object
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:mplsL3VpnVrfVpnId object returns wrong data

Conditions:mplsL3VpnVrfVpnId object walk

Workaround:check configured VpnId via cli

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(0.1)
Known Fixed Releases: *
5.2(1)S6, 5.2(1.8)S0, 7.0(1)ZD(0.3), 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtk46878
Title:
SNMP community not removed in show tech when using an ACL
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In a Nexus 5000 or 7000 series switch, SNMP community is not removed in the output of show run in the output of show tech when the community has an ACL tied to it

snmp-server community group network-operator
snmp-server community group network-admin
snmp-server community group network-admin
snmp-server community testing123 use-acl snmp-acl

Conditions:
There is an access-list tied to the snmp-server community.

Workaround:
None

Last Modified:
08-APR-2016
Known Affected Releases:
5.0(2)N1(1)
Known Fixed Releases: *
5.1(10.1)S0, 5.1(2.16)S0, 5.2(0.225)S0, 7.0(1)ZD(0.3), 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCta10776
Title:
n7k: 4.2.0.232.S3: sshd: Broken pipe length of packet
Status:
Fixed
Severity:
3 Moderate
Description: *

Syslog message displayed when sshd session to NXOS platform is abruptly
interrupted and NXOS fails to record the IP address for the syslog function.

Symptom:
%DAEMON-2-SYSTEM_MSG: fatal: Write failed: Broken pipe length of packet causing
error 140 140 - sshd[14913]

Conditions:

Workaround:
None at this time. The log message is not indicative of any known serious issue.

Further Problem Description:
Resolution Summary:
Syslog warnings will still appear if SSH session is prematurely terminated.
However, now the message will log the associated Client IP address.

Example:

fatal: Write failed: Broken pipe .Client is ,length of packet causing error 52 52 - ssh

Last Modified:
08-APR-2016
Known Affected Releases:
4.1(4)
Known Fixed Releases:
4.2(0.247), 4.2(1), 4.2(1)N1(1), 5.0(0.153), 5.0(0.156), 5.0(1)
Alert Type:
Updated *
Bug Id:
CSCuy92780
Title:
bgp table-map filter not applying to routes already in rib
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BGP Routes that are in RIB already are not withdrawn from RIB even though they are denied by table-map

Conditions:
table-map filter is configured, and routes are already in RIB before the table-map filter config.

Workaround:
None without impact - e.g. neighbor shut/noshut., or clear ip route

Further Problem Description:

Last Modified:
09-APR-2016
Known Affected Releases:
7.0(3)I3(0.315)
Known Fixed Releases: *
7.0(3)I4(0.60), 7.0(3)I4(1), 8.3(0)SF(0.70)
Alert Type:
Updated *
Bug Id:
CSCtn85246
Title:
bridgemib walk can cause infinite walk on NMS
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SNMP walk on bridge MIB can cause infinite walk on NMS when there are private vlan is enabled.

Workaround:
Disable private-vlan before doing SNMP walk on bridge MIB.

Last Modified:
12-APR-2016
Known Affected Releases:
5.1(3)
Known Fixed Releases: *
5.2(0.249)S0, 8.3(0)SF(0.10), 8.3(0)SF(0.2), 8.3(0)SF(0.75)
Alert Type:
Updated *
Bug Id:
CSCut94161
Title:
EEM: Configuration failed with: 0x412c000d validation timed out
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Configuring EEM with syslog as trigger is not accepted in a Nexus 5500/5600/6000

esc-5648-left(config)# event manager applet ntp
esc-5648-left(config-applet)# event syslog pattern "%PFMA-5-MOD_STATUS: Module 1 current-status is MOD_STATUS_ONLINE"
Configuration failed with: 0x412c000d validation timed out

Conditions:
Configuring EEM

Workaround:
Restart of evmc process can be done. Please open a TAC case for this since it needs to be done from the linux prompt.

Further Problem Description:

Last Modified:
12-APR-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
7.0(3)I2(0.528), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.1(2)N1(0.556), 7.1(2)N1(1), 7.1(2)ZD(0.11), 7.1(2)ZN(0.15)
Alert Type:
Updated *
Bug Id:
CSCuq69790
Title:
'sh spanning-tree internal event-history all' causes STP instability
Status:
Other
Severity:
3 Moderate
Description:

Symptom:






In large scale configurations running 'sh spanning-tree internal event-history all' may cause network instabilities (BPDU loss, other control plane protocol traffic loss) at the time command is ran

Conditions:




Workaround:



Issue is being investigated

Only workaround known at present is to avoid running command

Further Problem Description:












Last Modified:
13-APR-2016
Known Affected Releases:
6.2(8a)
Known Fixed Releases: *
6.1(2)I3(3.44), 6.1(2)I3(4), 7.0(3)I1(0.264), 7.0(3)I1(1), 7.0(3)I2(0.101), 7.0(3)I2(0.97T), 7.0(3)I2(1)
Alert Type:
Updated *
Bug Id:
CSCuy38146
Title:
RIP keep advertising route even though original route source is down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RIP keeps prefix in RIP database as "redistributed", even though original prefix gone from RIB:

N7K-1# sh ip rip ro 10.0.5.0/24
>10.0.5.0/24 next-hops 2
via 0.0.0.0, metric 1, tag 0, redistributed route <<<<<<<<<<<<<<<<<
via 10.0.12.2 Ethernet8/1, metric 2, tag 0, timeout 00:02:40

Conditions:
Prefix (for example, static) is redistributed into RIP.
Same prefix is learnt from RIP with higher metric.
Original (static) prefix has been removed from configuration.

Workaround:
Redistribute the prefix with metric higher, than learnt from RIP.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
6.2(12), 7.0(6)N1(1)
Known Fixed Releases: *
7.3(1)D1(0.47), 7.3(1)N1(0.331), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuy64775
Title:
EIGRP redistributed routes wedged in topology table
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If the nexus is redistributing a route into EIGRP (a floating static route for example), then receives an update for the same route via EIGRP from a neighbor, the nexus will compare the routes based on metric rather than based on AD. The defect has been observed on 7.3(0)D1(1) and 7.2(1)D1(1) code versions on the nexus 7k.

Conditions:
The Static route the nexus has configured, must be installed in the RIB and redistributed into EIGRP firstly on the Nexus, creating a local redistributed entry in the EIGRP topology table. The EIGRP route received from the neighbor has to have a less preferred metric than the calculated metric of the redistributed static route on the Nexus.

Workaround:
clear ip eigrp topology x.x.x.x/yy on the nexus
set a less preferred metric on the redistributed route on the nexus

Further Problem Description:
The defect has only been observed in EIGRP on Nexus devices.

Last Modified:
14-APR-2016
Known Affected Releases:
7.2(1)D1(1), 7.3(0)D1(1)
Known Fixed Releases: *
7.3(1)D1(0.47), 7.3(1)N1(0.331), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz18325
Title:
Outage may be observed during vPC recovery
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
In a vPC environment, when the vPC domain on the vPC primary (or operational secondary) is reloaded, the STP state of the vlans on the peer-link may remain in blocking state until the delay-restore timer expires.
This results in the vlan remaining in Vlan/BD down status.

Conditions:
This issue is observed when all of the following conditions are true:
- peer-switch is configured on the device
- There are no orphan trunk ports carrying the vlan.

Workaround:
Remove peer-switch from the vPC pair or add an orphan trunk port carrying the vlans.

Further Problem Description:

Last Modified:
14-APR-2016
Known Affected Releases:
7.2(1)D1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut94652
Title:
Adding basic show commands to feature show techs (N7K)
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
some commands are missing in feature show tech which causes BDB/BORG data analysis automation to fail

Conditions:
all

Workaround:
na

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui33220
Title:
SSTE: OSPF/BFD convergence time high after a trigger clear ip ospf nei
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
OSPF takes 45 sec to converge and BFD takes around 2 min 30 sec to converge after doing clear ospf neighbor for a large number of sessions on physical interfaces.

Conditions:
BFD takes around 2min 10 sec to converge after a clear ospf is done from a steady state. This is seen only with a clear of large number of OSPF/BFD neighbors together and there be should be no major difference in convergence for a small number of BFD sessions.

Workaround:
None

More Info:

Last Modified:
20-APR-2016
Known Affected Releases:
6.2(2)S17
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy71149
Title:
show logging log mixed old and new log after logging monitor command
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show logging log output broken after configuring "logging monitor".
After configuring it , old log and new log are showed alternately like below.

2016 Mar 11 17:56:17 N5672-G12 %ETHPORT-5-IF_UP: Interface loopback0 is up
2016 Mar 11 17:59:09 N5672-G12 %ETHPORT-5-IF_UP: Interface loopback300 is up <====
2016 Mar 11 17:56:17 N5672-G12 %ETHPORT-5-IF_UP: Interface loopback2 is up
2016 Mar 11 17:59:09 N5672-G12 %ETHPORT-5-IF_UP: Interface loopback301 is up <====
2016 Mar 11 17:56:17 N5672-G12 %ETHPORT-5-IF_UP: Interface loopback3 is up

Conditions:
Nexus5672
NXOS7.2(0)N1(1),7.3(0)N1(1)

After configuring "logging monitor [number]"

Workaround:
clear log after configuring "logging monitor [number]"

Further Problem Description:

Last Modified:
20-APR-2016
Known Affected Releases: *
7.0(3)I4(0.61)
Known Fixed Releases: *
7.0(3)I4(0.91), 7.0(3)I4(1), 7.3(1)D1(0.48), 7.3(1)N1(0.332), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuu76369
Title:
Random characters in show ip igmp policy statistics reports vlan
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Random characters are observed in the output of 'show ip igmp policy statistics vlan <>
Nexus9k# show ip igmp policy statistics reports vlan 100
Interface \6?? doesn't exist
Nexus 9k# show ip igmp policy statistics reports vlan 100
Interface tN?? doesn't exist

Conditions:
If a SVI is not deployed on Nexus 9k and , show ip igmp policy statistics reports vlan <> is executed for the VLAN ,

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.20), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.85)
Alert Type:
Updated *
Bug Id:
CSCuu66267
Title:
LISP: implicit iid 0 does not get assigned with proxy-itr configuration
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
LISP traffic encapsulated with no Instance-ID may fail to be forwarded on the eTR/PeTR

Conditions:
The problem depends on configuration sequence and timing, i.e. is a race condition.

Workaround:
Configure explicitly "lisp instance-id 0" in the VRF that receives LISP-encapsulated packet with no Instance-ID

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0.70), 7.3(0)ZD(0.10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)DHB(0.31), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.21), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw55057
Title:
urib not updating FIB when the RP has the same admin distance as AM
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When customer does a IP change for the host in a vlan and check the route for the destination Nexus 7000 shows the best path as the LISP route which is expected but the FIB shows the route which is different than LISP route.

Conditions:
When customer does a IP change for the host in a vlan.

Workaround:
clear ip route is solving the issue.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12), 6.2(14)
Known Fixed Releases: *
7.3(0)TSH(0.99), 7.3(1)D1(0.12), 7.3(1)PIB(0.9)
Alert Type:
Updated *
Bug Id:
CSCuw81067
Title:
DFA: Multicast SG join state missing in BGP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
L3 multicast over DFA fabric may not be forwarded to some receivers connected behind DFA leaves

Conditions:
L3 multicast over DFA with receivers behind leaf switches

Workaround:
Clear the bgp mvpn table on DFA switches

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.1(2)N1(0.599)
Known Fixed Releases: *
7.1(3)N1(0.673), 7.1(3)N1(1), 7.1(3)ZD(0.44), 7.1(3)ZN(0.85), 7.2(2)D1(0.5), 7.2(2)N1(0.334), 7.2(2)N1(1), 7.2(2)ZD(0.10), 7.2(2)ZN(0.9), 7.3(0)D1(0.178)
Alert Type:
Updated *
Bug Id:
CSCuv12718
Title:
G bit set for HSRP VMAC in vPC setup with state Listen/Listen
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Reachability to gateway IP (HSRP VIP) breaks when HSRP state is Listen/Listen.
Issue seen in a DCI setup where HSRP state across DCs with Active/Standby in one site and Listen/Listen in other site is preferred.

Conditions:
vPC setup maintaining HSRP state with 4 gateways.
Peer-link configured on F1 where proxy routing occurs with F1-M1 combination.
Device running 6.2.8 code, seen with 6.2.8b.

Not seen with 6.2.10, 6.2.12

Workaround:
If the setup is a DCI, apply FHRP isolation filters for the vlans in question.
If all 4 gateways in the same site, limit the hsrp number of gateway only to 2 devices by shutting down SVIs on two devices is the only workaround possible.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(8b), 7.3(0)D1(0.64)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.31), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCur09129
Title:
Snmp walk on syslogMessageSeverity returns raw enum 3112 for vmm.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SNMP query for syslogMessageSeverity returns raw enum 3112 for VMM facility.

Conditions:
SNMP query for syslogMessageSeverity.

Workaround:
It is just display issue.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)S87
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.29), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuu53397
Title:
[VxLAN EVPN] clear bgp * results in assert failed msgs with Traceback
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traceback seen-
%BGP-3-ASSERT: bgp-65001 [6952] ../routing-sw/routing/bgp/bgp_util.c:3338: Assertion `def_tbl_ctx->first_bestpath_done' failed.

Conditions:
Shut one of the VRFs and do - clear bgp all * vrf all

No functional impact seen with the traceback.

Workaround:
Issue not seen without vrf shut.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.0(3)I2(0.484), 7.2(0)D1(1)
Known Fixed Releases: *
7.0(3)I2(0.513), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57)
Alert Type:
Updated *
Bug Id:
CSCuz11696
Title:
ISSU during upgrade process, removal of SFP is not recognized
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After ISSU is completed, the port which has no SFP inserted still shows as "connected". Although DOM and SPROM values are empty, the switch port still sees the SFP details of the removed SFP (show int ethx transceiver details).

The peer port has the correct "notconnected" state

Conditions:
Issue only appears when you remove of a SFP during the module upgrading phase of ISSU.

Workaround:
Shut the affected port, plug the SFP back in, then "no shut" the port.

SFP status of affected port and peer port will be corrected.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)DX(0.141)
Known Fixed Releases: *
7.3(1)DX(0.3)
Alert Type:
Updated *
Bug Id:
CSCuu31339
Title:
Seeing issue with track config applied when HSRP in INIT state
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
This problem will occur when a down track is configured on VPC peer hsrp . This is NOT recommended as per Cisco VPC best practices (Strong Recommendation: Do not use HSRP/VRRP object tracking in a vPC domain.)

Hsrp in case of vpc config with configured track as down , doesn't take mac to the reserve state even though the hsrp priority decrements lesser than the lower threshold.

"Show hsrp detail" or "show hsrp int <> detail" doesn't show (Lower threshold touched) when the track is down & it decrements the hsrp priority to less than lower threshold value configured(default is 1) and as a result of it , it never brings the Mac of this vpc-peer (with Zero priority) to MAC reserve state.

Conditions:
This issue will occur when HSRP absorbs the track config before it changes it state from init to listen/standby/active.

Such condition can be achieved by configuring a track object which is down on hsrp group before applying the VIP on the hsrp group.

For eg the below config , if the track 1 is down and we apply the below config

n7k-01-S1(config-if)# hsrp 10
n7k-01-S1(config-if-hsrp)# priority 100
n7k-01-S1(config-if-hsrp)# track 1 decrement 150
n7k-01-S1(config-if-hsrp)# ip 10.10.10.10
n7k-01-S1(config-if-hsrp)# end


Then , hsrp group (due to this bug) is not going into the "lower threshold logic".

Workaround:
Bring hsrp group into any state other than init before applying Track config. I.e Configure the hsrp groups with VIP address first and then add track config (which is down).

for eg : If we do config like this

n7k-01-S1(config-if)# hsrp 10
n7k-01-S1(config-if-hsrp)# priority 100 forwarding-threshold lower 10 upper 100
n7k-01-S1(config-if-hsrp)# ip 10.10.10.10
n7k-01-S1(config-if-hsrp)# track 1 decrement 150
n7k-01-S1(config-if-hsrp)# end

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.9), 7.3(0)PDB(0.112), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCux19294
Title:
MPLS TE - RSVP BW incorrect for 40G and 100G interfaces
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
For 40G and 100G BW reported for RSVP does not match interfaces speed:

switch# sh run int e6/6,e9/6 | i mpls
mpls traffic-eng tunnels
mpls traffic-eng bandwidth percent 100
mpls traffic-eng tunnels
mpls traffic-eng bandwidth percent 100
switch#
switch# sh int e6/6,e9/6 | i BW
MTU 1500 bytes, BW 40000000 Kbit, DLY 10 usec
MTU 1500 bytes, BW 40000000 Kbit, DLY 10 usec
switch#
switch# sh mpls traffic-eng link-management interfaces e6/6 | i kbits/sec
Physical Bandwidth: 5640261 kbits/sec
Max Res Global BW: 5640261 kbits/sec (reserved: 0% in, 0% out)
switch# sh mpls traffic-eng link-management interfaces e9/6 | i kbits/sec
Physical Bandwidth: 5640261 kbits/sec
Max Res Global BW: 5640261 kbits/sec (reserved: 0% in, 0% out)
switch#

Conditions:
This happens with 40G M2 and F3 modules running 6.2 and 7.2

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12), 7.2(1)D1(1)
Known Fixed Releases: *
6.2(16), 6.2(16)S4, 7.3(0)D1(0.165), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)OTT(0.73), 7.3(0)PDB(0.127), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuu11282
Title:
N7k: ITD probe with frequency config less than 5s seconds reverts to 60s
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ITD probes are only sent every 60 seconds when probe frequency is configured less than 5 seconds

Conditions:
ITD probe configured on Nexus 7000 running 6.2(10)

Workaround:
Configure probe frequency with at least 5 seconds frequency

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.52), 7.2(0)D1(1), 7.2(0)D1(1.8), 7.2(0)ZD(0.216), 7.2(1)PIB(0.14), 7.3(0)D1(0.69), 7.3(0)D1(1), 7.3(0)DHB(0.31)
Alert Type:
Updated *
Bug Id:
CSCua39152
Title:
Command injection with CA functionality
Status:
Fixed
Severity:
3 Moderate
Description:

Symptoms:
Cisco Nexus devices contain a local command injection vulnerability within the CA configuration commands of the CLI. An authenticated, local attacker could inject commands
that are subsequently executed on the underlying operating system with elevated privileges.

The vulnerability exists due to a failure to properly sanitize all user supplied input prior to using it to execute commands on the underlying operating system. An attacker with
administrative level privileges on an affected device could inject arbitrary commands that are then executed on the underlying operating system with elevated privileges.

Conditions:
Cisco Nexus devices running an affected version of Cisco NX-OS software.

Workaround:
None.

Further Problem Description:
This vulnerability can only be exploited by an administrator with sufficient privileges to execute the affected commands.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/6.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2012-4139 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
6.0(2)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.3(0)D1(0.67), 7.3(0)D1(1), 7.3(0)DHB(0.31), 7.3(0)EG(0.3), 7.3(0)IB(0.43), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.32), 7.3(0)RTG(0.68)
Alert Type:
Updated *
Bug Id:
CSCus66235
Title:
Match Statements within route-map do not function as AND for table-map
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:






Match statements in a single sequence of route-map are supposed to behave like AND. It is not happening when 'match ip next-hop' or 'match interface' is present in the sequence. The behaviour is fine with any other combination of match statements.

Conditions:




In a route-map, when 'match ip next-hop' or 'match interface' statement is used in combination with other match statements. This is not behaving as AND. The final result is TRUE if 'match ip next-hop' or 'match interface' turns out to be true and even if the other match statements are evaluated to FALSE.

route-map OSPF-FILTER1 permit 10
match interface Ethernet5/39.321
match metric 20 <-- final result is TRUE even if this match statement is FALSE.

Workaround:



Add another sequence in a 'deny' statements for the other match statements.

route-map OSPF-FILTER1 permit 10
match interface Ethernet5/39.321
match metric 20
route-map OSPF-FILTER1 deny 20
match metric 10 < we can add unwanted attribute values for deny here.

Further Problem Description:












Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.57), 7.2(1)D1(0.29), 7.2(1)D1(1), 7.2(1)N1(0.264), 7.2(1)N1(1), 7.2(1)ZD(0.24), 7.2(1)ZN(0.28), 7.3(0)D1(0.143)
Alert Type:
Updated *
Bug Id:
CSCuw57347
Title:
IS reachability TLV not suppressed while extended reachability TLV is
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
LSPs do not contain TLV 22 under certain conditions - which is the correct behaviour - but TLV 2 is still advertised. This contradicts the intention of not advertising TLV 22.

Conditions:
IS-IS must be run with "metric-style transition", otherwise no TLV 2 is generated

Workaround:
No workaround known. The advice is to not use "metric-style transition" unless it is really necessary.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.121), 7.3(0.121)
Known Fixed Releases: *
6.2(14)E1, 6.2(16), 6.2(16)S9, 7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)RSP(0.7), 7.3(0)RTG(0.90), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw99731
Title:
Multicast routing doesnt work if IPv4 routes are learnt over IPv6 NH
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Multicast routing doesn't work and RPF stays if even

Conditions:
Ipv4 unicast route has IPv6 next-hop.

Workaround:
Using a default route to reach IPv4 prefixes via a IPv4 Next-hop.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1.6)
Known Fixed Releases: *
7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)RSP(0.7), 7.3(0)RTG(0.114), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.195), 7.3(0)ZN(0.211)
Alert Type:
Updated *
Bug Id:
CSCuw09891
Title:
BGP peers flap continuously
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
BGP peers will flap continuously and not stabilize even after several hours have passed.

Conditions:
Outbound policy with multiple AS Path regex matches that deny the route, coupled with non-default holdtimers (4/12, 10/30).

Workaround:
Change holdtimer to default values. Simplify the regex is possible and match the access-list *after* the prefix list in the route-map sequence.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)S102
Known Fixed Releases: *
7.3(0)D1(0.171), 7.3(0)PDB(0.131), 7.3(0)RSP(0.7), 7.3(0)RTG(0.71), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCux01711
Title:
N7k / N77k - Interface (HIF) counters on Nexus 2348 may be erroneous
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Fex 2348 report erroneous / false counters.

aur_l3_sw1# show int Eth101/1/2
Ethernet101/1/2 is up
admin state is up, Dedicated Interface
Hardware: 100/1000/10000 Ethernet, address: e0d1.732f.4903 (bia
e0d1.732f.4903)
Description: axe1fw01p
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 255/255, rxload 255/255
Encapsulation ARPA, medium is broadcast
Port mode is access
full-duplex, 1000 Mb/s
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is on
Auto-mdix is turned off
Switchport monitor is off
EtherType is 0x8100
Last link flapped 6week(s) 4day(s)
Last clearing of "show interface" counters never
4 interface resets
Load-Interval #1: 30 seconds
30 seconds input rate 1481841587208 bits/sec, 371280410 packets/sec
30 seconds output rate 2333645761384 bits/sec, 438267561 packets/sec
input rate 1481.84 Gbps, 371.28 Mpps; output rate 2333.65 Gbps, 438.27
Mpps

This issue is seen when N7k / N77k is a parent switch. Fix on N5k / N6k is available via CSCuv29358

Conditions:
N2k-2348 fex

Workaround:
This is a cosemtic counter bug. please use show inter <> counters / show inter <> summary to get the exact counters values.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.0(2)FIP(0.158), 7.2(2)D1(0.32), 7.2(2)D1(0.33), 7.2(2)D1(0.34), 7.2(2)D1(0.35), 7.2(2)D1(0.36), 7.2(2)ZD(0.47), 7.2(2)ZD(0.48), 7.2(2)ZD(0.49)
Alert Type:
Updated *
Bug Id:
CSCuu79263
Title:
ISIS_MTS_SYSMGR: Leaks seen after ND ISSU from IPMR1->JJ226 in5548P
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ISSU on N5k is causing a (small) memory leak

Conditions:


Workaround(s):


Workaround:
No workaround known

Further Problem Description:
This is a small leak, a single message that is left from the image from where the ISSU starts

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)N1(0.226)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.59), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCur57084
Title:
FEX Core Fails to Upload in Non-default VDC - No Workaround on NPE Image
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Nexus 2000 may fail to copy the core file to the Nexus 7000 during a crash but continues to try over and over:

N7k-2 SYSMGR-FEX101-3-CORE_OP_FAILED Core operation failed: send_msg_to_ccdmon: Could not send to CORE_DMON return -1 errno 32
N7k-2 SYSMGR-FEX101-5-SUBPROC_TERMINATED "System Manager (core-client)" (PID 1903) has finished with error code SYSMGR_EXITCODE_CORE_CLIENT_ERR (11).

Conditions:
When the Nexus 2000 connected to a non-default VDC crashes.

Workaround:
Contact Cisco TAC.

Further Problem Description:
Fix is present starting in 7.2. Issue exists in all releases prior to 7.2.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)FHS(0.23), 7.0(0)HSK(0.395), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.0(2)FIP(0.19), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109)
Alert Type:
Updated *
Bug Id:
CSCuu36071
Title:
Packets encaped with wrong VNI after addition of new link to Peerlink PC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Receivers at remote vxlan L2 gateway may experience traffic lose. This is because the packets at vPC L3 gateway is encapped with wrong VNI value. This can be confirmed by examine the VNI field of the vxlan encapped packet received at remote L2 gateway.

Conditions:
The condition to hit the issue is to configure new vPC peer-link in a new hardware instance. This may cause timing issue when program the encap route in the new peer-link instance.

Workaround:
unconfig, then reconfig the multicast encap for this bridge-domain under nve interface will clear the wrong encap route and reprogram with correct information.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.490), 7.2(0)VZD(0.33)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.1(0)ES(0.24), 7.2(1)D1(0.36), 7.2(1)D1(1), 7.2(1)ZD(0.31), 7.3(0)D1(0.34), 7.3(0)D1(0.45), 7.3(0)D1(0.52), 7.3(0)D1(0.53), 7.3(0)D1(1)
Alert Type:
Updated *
Bug Id:
CSCur18621
Title:
Show snmp trap cmd doesn't show status of msdp trap configs.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Status of MSDP trap is not shown in the output of 'show snmp trap'

Conditions:
Trap type, Description and status is not shown for show snmp trap command for MSDP.

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)S89
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)EV(0.137), 7.1(0)PDB(0.317), 7.1(0)SIB(99.82), 7.2(0)D1(0.360), 7.2(0)D1(1), 7.2(0)N1(0.43)
Alert Type:
Updated *
Bug Id:
CSCuu41125
Title:
LSA are present after configuring "area 1 range not-advertise"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Component LSA's are present after configuring "area range not-advertise"

Conditions:
After configuring "area range not-advertise"

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)ZD(0.161), 7.3(0)ZN(0.49), 7.3(0.1), 8.3(0)CV(0.162)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.11), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuw74054
Title:
Traffic outage issue on switch reload - multicast scale testbed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Under scale conditions, when the neighboring router is rebooting, it is possible that PIM and MRIB routes go out of sync and hence possible black holing of traffic for some receivers.

Conditions:
Under scale (like 25k-32k routes) conditions and the neighbor router is coming up after a cold reboot.

Under these conditions, PIM module does not update MRIB module about the correct OIF states.
"show ip pim oif-list" and "show ip mroute" will show different set of outgoing interfaces. This bug is due to incorrect processing of txlist used by PIM to update MRIB module.

Although this bug is rarely under less scale, it is still possible to get into this condition.

Workaround:
Use "clear ip mroute" command to clear out the problematic routes will fix the issue.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(1), 7.3(0.149)
Known Fixed Releases: *
7.3(0)D1(0.174), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)IZN(0.13), 7.3(0)N1(0.228), 7.3(0)N1(1), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.189)
Alert Type:
Updated *
Bug Id:
CSCut71442
Title:
"PIM Data Register" debug message missing after receiving data packets
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When the FHR receives the data packets, a data register is sent to the RP. As part of the conformance test, the script expects following debug msg -
2014 Dec 2 00:58:13.070567 mcastfwd: libpim [6339] Sent PIM Data Register for (10.10.2.201, 239.23.23.23) to RP 10.10.10.1, ttl 254 (1 registers in last sec)

But the above debug is not observed on the console

Conditions:
There is no functionality impact here. Only when we enable mcastfwd debugs, we expect the debugs to show up on the console but for some reason the debugs are not showing up on the console.

Workaround:
No workaround. The bug is purely for development purpose.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.475), 7.2(0)D1(0.499), 7.2(1)D1(0.54)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuu30252
Title:
N7K:aclmgr: cmd_dynamic_string_add bad item
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Access-list is completely not removed after executing the command
no ip access-list [name]
The command will be accepted but if you do
"show ip access-list ? " then you still will be able to see that deleted access-list name

Conditions:
Observed in 6.2.12 code

Workaround:
None.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)E5
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.23), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.85)
Alert Type:
Updated *
Bug Id:
CSCuw61767
Title:
eloam_bugfix/32 BnB commit into hsk_bundle
Status:
Fixed
Severity:
3 Moderate
Description:

This DDTS was used to release CSCuw54273 and CSCuw56149. See the release notes for those.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.120)
Known Fixed Releases: *
7.3(0)D1(0.126), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)IB(0.122), 7.3(0)IZN(0.7), 7.3(0)N1(0.166), 7.3(0)N1(1), 7.3(0)OTT(0.73), 7.3(0)PDB(0.90), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuw66926
Title:
errors observed in xml validation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The XML generated by ELOAM in response to manageability requests does not conform to the schema.

Conditions:
This impacts all ELOAM show commands.

Workaround:
Running the show commands from the CLI works successfully.

Further Problem Description:
The XML interface returns all the correct data but not in a schema compatible form.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.96)
Known Fixed Releases: *
7.3(0)D1(0.135), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.102), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCux11029
Title:
Route tag lost on internal routes when using eigrp wide metric on Nexus
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When we configure wide metric on nexus using command "metric version 64bit", nexus starts ignoring route-tags for internal routes, external route-tags still shows up in routing and topology table. But routes that are internal looses their route-tags.

Conditions:
Using eigrp metric on nexus.

Workaround:
remove eigrp wide metric

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)IB(0.114), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.194), 7.3(0)ZN(0.210)
Alert Type:
Updated *
Bug Id:
CSCuv42487
Title:
show tech-support fcoe needs to contain all pertinent FC information
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Enhance show tech-support fcoe so that it includes all FC pertinent information. This should be similar to the MDS show tech-support details

Conditions:
Applicable to the Nexus 7000 switch in the FCoE storage VDC.

Workaround:
Use individual show tech-support commands. For example:

show tech-support zone
show tech-support fcns
show tech-support fcdomain
show tech-support port
etc...

Further Problem Description:
None.

Resolution Summary:
show tech-support fcoe is renamed to show tech-support fcoe_mgr and continues to contain just fcoe manager information.
show tech-support fcoe will now contain a large amount of information specifically for troubleshooting FCoE related problems. It will include show tech-support fcoe_mgr and other FC/FCoE related show techs.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.148), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)IZN(0.13), 7.3(0)N1(0.197), 7.3(0)N1(1), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)RTG(0.115)
Alert Type:
Updated *
Bug Id:
CSCuu01234
Title:
OTV, next hop pointing to wrong AED - OTV Part
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
-> Host in vlan 257 points to wrong AED.

Conditions:
-> This behaviour is observed in Image: n7000-s1-dk9.6.2.10.bin

Workaround:
-> Avoid VLAN-mapping from ODD?> to EVEN vlans (257 -> 534).
EVEN?>ODD mapping works fine, as the ACTIVE AED is N7k2 (100 -> 101).
In the real life, it may not be feasible to implement.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(16), 6.2(16)S20, 7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)DHB(0.31), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.37)
Alert Type:
Updated *
Bug Id:
CSCux09435
Title:
N7K - MSDP SA information not exchange after reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Source Active messages not sent to MSDP peers after router reload.

The MSDP session is established, control messages exchanged periodically to keep state up, but SA not created/exchanged.

Conditions:
Anycast RP with MSDP implementation. Issue occurs after device reload with overlapping RP groups.

Workaround:
The issue clears and SA exchange resumes after MSDP process restart

restart msdp

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10), 6.2(12), 7.2(0)D1(1)
Known Fixed Releases: *
7.0(3)I3(0.156), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2), 7.0(3)ITI2(1), 7.0(3)ITI2(1.100), 7.3(0)D1(0.156), 7.3(0)D1(1)
Alert Type:
Updated *
Bug Id:
CSCuw90721
Title:
LISP: RNH notifies for db RLOCs gone when coincide with map-cache RLOCs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On a LISP site with multiple eTRs, one of the eTRs shows an incorrect status of the locators of the rest of eTRs. As an example it may mark the locator as "down" but have a route to the locator.

Conditions:
In order to reach this state the eTR (that is also working as iTR) must receive a map-reply in which one of the locators is part of the database-mapping locator-set. The problem is that this map-cache will be rapidly removed, as it is considered local, which also removes RNH tracking for the affected locators.

An easy way to reproduce this problem is to issue a "lig self"

Workaround:
The only possible workaround now is to reapply the configuration of the affected database-mapping, so that RNH tracking is reinstated

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(1)
Known Fixed Releases: *
7.2(2)D1(0.6), 7.2(2)N1(0.334), 7.2(2)N1(1), 7.2(2)ZD(0.11), 7.2(2)ZN(0.10), 7.3(0)D1(0.202), 7.3(0)D1(1), 7.3(0)IZN(0.13), 7.3(0)N1(0.264), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuv90027
Title:
NXOSv Interface ACL config should be blocked until supported
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
NXOSv (virtual) will allow interface ACL configs to be configured without error. But if applied to non management interfaces, they won't block traffic.

Conditions:
ONly applies to virtual NXOS (a.k.a. titanium)

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(0.57)
Known Fixed Releases: *
7.2(1)D1(0.70), 7.2(1)D1(1), 7.2(1)ZD(0.62), 7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.67)
Alert Type:
Updated *
Bug Id:
CSCuv06177
Title:
copy run to sftp on linux server fails
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
copy run sftp: fails for non-root users as it always uses root directory(/) as target. copy bootflash: sftp: works perfectly as it always uses /var/home/

Conditions:
++SFTP service should be running on Linux/Unix
++Non root credentials should be used.

Workaround:
Specify the complete path

switch# copy bootflash:test sftp:
Enter vrf (If no input, current vrf 'default' is considered): management
Enter hostname for the sftp server: /home/kmuruga2/test^C

switch# copy running-config sftp:
Enter destination filename: [switch-running-config] /home/kmuruga2/test
Enter vrf (If no input, current vrf 'default' is considered): management
Enter hostname for the sftp server: 173.36.137.136
Enter username: kmuruga2

Password:
Connected to 173.36.137.136.
sftp> put /var/tmp/vsh/switch-running-config //home/kmuruga2/test
Uploading /var/tmp/vsh/switch-running-config to //home/kmuruga2/test
/var/tmp/vsh/switch-running-config 100% 3134 3.1KB/s 00:00
sftp> exit
Copy complete.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(13.11)S0, 6.2(14), 7.2(1)D1(0.50), 7.2(1)D1(1), 7.2(1)ZD(0.45), 7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.33), 7.3(0)PDB(0.112)
Alert Type:
Updated *
Bug Id:
CSCuv34380
Title:
vPC switch keeps sending (S, G) joins even after (*, G) entry gone.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PIM (S, G) joins are sent upstream even when corrosponding (*, G) entry has expired.

Conditions:
vpc-peers with "ip pim pre-built spt" configured. Active source but receivers are expired.

Workaround:
clear ip mroute will remove the unwanted (S, G) entry.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)ZD(0.99)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)DHB(0.31), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.43), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCut84064
Title:
Duplicate traffic on FEXAA HIFPC while ST to AA conversion after ISSU
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Duplication of traffic is seen on traffic egressing on FEXAA HIFPC after doing below steps
1. VPC peers were running CCO images which doesnt support FEXAA
2. FEXes were in ST mode in that image
3. Did ISSU to GBR image and then converted it to AA mode
4. Configured the FEX AA HIFPC on both the vpc peers and then the duplication was seen
Root cause looks like the vsl bit was not programmed correctly on the fabric vpc.
Refer the Mailthread enclosure for more details.

Conditions:
ST to AA conversion

Workaround:
deconfig and reconfig the hif-pc

Further Problem Description:
Duplication of traffic is seen on traffic egressing on FEXAA HIFPC after doing below steps
1. VPC peers were running CCO images which doesnt support FEXAA
2. FEXes were in ST mode in that image
3. Did ISSU to GBR image and then converted it to AA mode
4. Configured the FEX AA HIFPC on both the vpc peers and then the duplication was seen
Root cause looks like the vsl bit was not programmed correctly on the fabric vpc.
Refer the Mailthread enclosure for more details.

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.47), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw54273
Title:
"where" returning empty under profile level config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The CLI command "where" does not work inside the ethernet link oam profile configuration, CLI submode.

Conditions:
Always happens inside the ethernet oam profile submode. For example:

switch# conf
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# ether oam profile profile-name
switch(config-eoam)# where


Does not happen in other CLI submodes, including the ethernet link oam interface submode.

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.96)
Known Fixed Releases: *
7.3(0)D1(0.126), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.90), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuv81861
Title:
OSPF NSSA sending type 7 LSA after converted to regular area
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Type 7 LSA being sent by a device that is not a NSSA device

Conditions:
After changing from NSSA to regular area

Workaround:
None

Further Problem Description:
Recovery: restart ospf

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.0(3)I2(1.19), 7.0(3)I2(2), 7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.47), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCut75242
Title:
ISSU upgrade: igmp HAP reset
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
An ISSU upgrade on a Nexus 6000 experiences a HAP reset when upgrading to 7.0(5)N1. On the vPC peer, each chassis crashes while the other is in the process of upgrading:

At 764728 usecs after
Reason: Reset triggered due to HA policy of Reset
Service: igmp hap reset
Version: 7.0(2)N1(1) << crash on standby as primary is in the process of upgrading during ISSU

At 203979 usecs after
Reason: Reset triggered due to HA policy of Reset
Service: igmp hap reset
Version: 7.0(5)N1(1) << crash on primary as standby is in the process of upgrading during ISSU

Conditions:
The device(s) experiences an 'igmp' process HAP reset during this upgrade regardless of whether or not the Aggregate is provisioned for igmp/multicast.

Workaround:
N/A

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)N1(0.117)
Known Fixed Releases: *
7.0(3)I2(0.519), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.0(7)N1(0.293), 7.0(7)N1(1), 7.0(7)ZN(0.188), 7.2(1)D1(0.9)
Alert Type:
Updated *
Bug Id:
CSCuu78729
Title:
EIGRP can install non-successor to RIB in case of ECMP paths
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In N7K1 , N7K2 is being installed as a successor for 2001:420:1411::/48 even though it doesn't meet the Dual FC condition.


fe80::224:f7ff:fe19:2e41 metric 19968/19456
fe80::226:98ff:fe0c:6bc1 metric 19968/19712

Conditions:
If there's another path with same metric which passes Dual FC condition and during installation to RIB, the 2 paths are considered to be ECMP

Workaround:
Increase the total metric of the path which fails the FC condition using "ip delay eigrp" or distribute-list command

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(7)
Known Fixed Releases: *
6.2(13.11)S0, 6.2(14), 7.0(3)I2(0.542), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.2(1)D1(0.51), 7.2(1)D1(1)
Alert Type:
Updated *
Bug Id:
CSCut10399
Title:
MAC address flooding on F3 linecard
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Brief flooding is noticed when vPC leg, on which the mac-address is learnt, is shut.

Conditions:
1. Happens only on F3 modules.
2. The mac-address is learnt only on one leg of vPC due to polarized flow.

Workaround:
No work around- default behavior.

Further Problem Description:
Per original design, when vPC leg is shut, the mac-address aging logic purges the mac-address if it was learnt only on that vPC leg causing a temporary flooding till the mac-address is learnt on the other vPC leg.

This fix provides a configuration knob ?mac address-table aging-mode portchannel-refresh? to prevent the temporary flooding. Rather the MAC would wait for a full age cycle across all the members before it would get purged.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12), 7.3(0)D1(0.64)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.27), 6.2(14)FB(0.29), 6.2(14)FB(0.30), 7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.93), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuw81680
Title:
ELOAM syslog to all VDCs does not work during LC boot
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

During LC boot, if ELOAM hits any errors it is unable to syslog to alert the user.

Conditions:

- ELOAM must be configured
- The linecard must be booting up
- ELOAM must hit an unexpected error condition

Workaround:

This is a secondary failure in which the user might not be alerted to potential errors. No workaround should be needed, but the "show ethernet oam" commands can be used to verify protocol state.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.127)
Known Fixed Releases: *
7.3(0)D1(0.135), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.102), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuv45849
Title:
FEX HIF Po load-balancing issue when connected to Nexus 7700 F3 linecard
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traffic destined to a HIF port-channel (with 2 x HIF ports as members) is distributed only on a HIF port although the forwarding-path shows both HIF ports as outgoing interfaces for two different flows.

Conditions:
FEX model N2K-C2248TP-1GE is connected to a F3 linecard on a Nexus 7700 switch running 6.2(12).

Workaround:
None at the moment.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.41), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuu39870
Title:
NAM Module flooding accounting log
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When a N7K-SM-NAM-9G-K9 Network Analysis Module is inserted into a chassis and powered up, it floods the accounting logs with unhelpful information:

Wed May 6 04:20:05 2015:type=start:id=vsh.5698:user=root:cmd=
Wed May 6 04:20:05 2015:type=stop:id=vsh.5698:user=root:cmd=
Wed May 6 04:20:07 2015:type=start:id=vsh.5714:user=root:cmd=
Wed May 6 04:20:08 2015:type=stop:id=vsh.5714:user=root:cmd=
Wed May 6 04:21:05 2015:type=start:id=vsh.5758:user=root:cmd=
Wed May 6 04:21:05 2015:type=stop:id=vsh.5758:user=root:cmd=

Conditions:
- Neuxs 7K with NX-OS 6.2(12) or other newer NX-OS
- This problem happens when the NAM module is powered on.

Workaround:
No workaround except to poweroff the NAM module.

Further Problem Description:
This is an issue for the accounting log that impacts TAC's ability to troubleshoot. This is a very serious issue. When the NAM module is inserted and powered up, it floods 4 empty accounting log messages every minute, which basically makes the "show accounting log" command useless to TAC. See below for an example of the flooding:

Wed May 6 04:20:05 2015:type=start:id=vsh.5698:user=root:cmd=
Wed May 6 04:20:05 2015:type=stop:id=vsh.5698:user=root:cmd=
Wed May 6 04:20:07 2015:type=start:id=vsh.5714:user=root:cmd=
Wed May 6 04:20:08 2015:type=stop:id=vsh.5714:user=root:cmd=
Wed May 6 04:21:05 2015:type=start:id=vsh.5758:user=root:cmd=
Wed May 6 04:21:05 2015:type=stop:id=vsh.5758:user=root:cmd=

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.188), 7.3(0)D1(1), 7.3(0)RSP(0.7), 7.3(0)TSH(0.99), 7.3(0)ZD(0.206), 7.3(1)PDB(0.19), 7.3(1)PIB(0.24)
Alert Type:
Updated *
Bug Id:
CSCux38743
Title:
VPC - IGMP membership query is leaked to IGMP router port
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IGMP membership query is leaked to router port if leave is received on an orphan port

Conditions:
The leave is received on an orphan port

Workaround:
Do not use orphan port, use VPC port instead.

The second workaround is to increase the group timeouts in the network.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)ZN(0.105)
Known Fixed Releases: *
7.3(0)TSH(0.99), 7.3(1)D1(0.17), 7.3(1)N1(0.309), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuv40977
Title:
Tunnel flap after applying config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Existing tunnel flaps when applying config

It seems the tunnel is flapping after applying a config to an existing tunnel that is up. Here is some info that might help:

This is the tunnel state before applying config:

14:57:15.638: Name: nxosA_t1000 (tunnel-te1000) Destination: 192.168.0.4^M
14:57:15.638: Status:^M
14:57:15.648: Admin: up Oper: up Path: valid Signalling: connected^M
14:57:15.648: path option 10, type explicit lsp0 (Basis for Setup, path weight 80)^M
14:57:15.648: path option 20, type explicit lsp1^M
14:57:15.648: ^M
14:57:15.648: Config Parameters:^M
14:57:15.648: Bandwidth: 1000 kbps (Global) Priority: 7 7 Affinity: 0x0/0xffff^M
14:57:15.658: Metric Type: TE (interface)^M
14:57:15.658: AutoRoute: enabled LockDown: disabled ^M
14:57:15.658: auto-bw: disabled^M
14:57:15.658: Active Path Option Parameters:^M
14:57:15.658: State: explicit path option 10 is active^M
14:57:15.658: BandwidthOverride: disabled LockDown: disabled Verbatim: disabled^M
14:57:15.669: ^M
14:57:15.669: ^M
14:57:15.669: InLabel : - ^M
14:57:15.669: OutLabel : Ethernet2/1, 20^M
14:57:15.669: RSVP Signalling Info:^M
14:57:15.669: Src 192.168.0.1, Dst 192.168.0.4, Tun_Id 1000, Tun_Instance 5^M
14:57:15.669: RSVP Path Info:^M
14:57:15.669: My Address: 192.168.0.1 ^M
14:57:15.669: Explicit Route: 10.10.10.2 14.14.14.2 14.14.14.4 192.168.0.4 ^M
14:57:15.679: Record Route: NONE^M
14:57:15.679: Tspec: ave rate=1000 kbits, burst=1000 bytes, peak rate=1000 kbits^M
14:57:15.679: RSVP Resv Info:^M
14:57:15.679: Record Route: 10.10.10.2 14.14.14.4 ^M
14:57:15.679: Fspec: ave rate=1000 kbits, burst=1000 bytes, peak rate=1000 kbits^M
14:57:15.679: Shortest Unconstrained Path Info:^M
14:57:15.679: Path Weight: 80 (TE)^M
14:57:15.679: Explicit Route: 13.13.13.1 13.13.13.3 16.16.16.3 16.16.16.4 ^M
14:57:15.689: 192.168.0.4 ^M
14:57:15.689: History:^M
14:57:15.689: Tunnel:^M
14:57:15.689: Time since created: 1 minutes, 2 seconds^M
14:57:15.689: Time since path change: 11 seconds^M
14:57:15.689: Number of LSP IDs (Tun_Instances) used: 5^M
14:57:15.689: Current LSP:^M
14:57:15.689: Uptime: 14 seconds^M
14:57:15.689: Selection: reoptimization^M
14:57:15.689: Prior LSP:^M
14:57:15.689: ID: path option 20 [3]^M
14:57:15.699: Removal Trigger: reoptimization completed^M



Applying config here (Same as the config that was already applied except added path-option 5):

14:57:16.052: ^MnxosA(config)# <[LF]>mpls traffic-eng configuration^M^M
14:57:16.395: ^MnxosA(config-te)# explicit-path name lsp0<[LF]>^M^M
14:57:16.739: ^MnxosA(config-te-expl-path)# <[LF]>index 10 next-address strict 10.10.10.2^M^M
14:57:17.082: ^MnxosA(config-te-expl-path)# index 20 next-address strict 14.14.14.4<[LF]>^M^M
14:57:17.455: ^MnxosA(config-te-expl-path)# mpls traffic-eng confi<[LF]>guration^M^M
14:57:17.789: ^MnxosA(config-te)# <[LF]>explicit-path name lsp1^M^M
14:57:18.152: ^MnxosA(config-te-expl-path)# index 10 next-address strict 11.11.11.2<[LF]>^M^M
14:57:18.516: ^MnxosA(config-te-exp

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)TE(0.9)
Known Fixed Releases: *
7.3(0)D1(0.140), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.21), 7.3(0)PDB(0.102), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.114), 7.3(0)ZN(0.125)
Alert Type:
Updated *
Bug Id:
CSCuu70539
Title:
N5K bgp process crash after configuring default-originate
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
N5K BGP process crash caused hap reset.

Conditions:
Configure "default-originate route-map " under router bgp ipv4 unicast mode.

Workaround:
No workarounds.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.0(5)N1(1)
Known Fixed Releases: *
7.0(3)I2(0.470), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.0(7)N1(0.73), 7.0(7)N1(1), 7.0(7)ZN(0.154), 7.1(2)N1(0.576), 7.1(2)N1(1), 7.1(2)ZD(0.27)
Alert Type:
Updated *
Bug Id:
CSCuw56149
Title:
ELOAM should identify interfaces of rx packets based on VQI
Status:
Other
Severity:
3 Moderate
Description:


Symptom:

ELOAM does not come up on interfaces which are members of a port-channel. In particular, the sessions on such interfaces will not process any packets sent to them.

Conditions:

Any interface which is configured with both "ethernet oam" and "channel-group will be affected.

Workaround:

None. Either remove ethernet oam or remove the interface from the port-channel.

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0.99)
Known Fixed Releases: *
7.3(0)D1(0.126), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.90), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuw46432
Title:
GBR MR1: dcefib crash @ *__GI_raise post ISSU
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After ISSU from GBR MR to upgrade images followed by manually issued line-card upgrades for F2E modules, the process DCEFIB may at times crash on the module.

Conditions:
In a VPC+ topology with Fabricpath multi-topo feature enabled, after the VPC peers are upgraded from GBR MR1 to the upgrade images , if line-card upgrade is manually issued for the F2E modules in the VDC, the process DCEFIB may sometimes crash.

Workaround:
The process should recover after a single crash. IF it does not, module reload may be required to fix the issue.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)D1(0.89), 7.3(0.140)
Known Fixed Releases: *
7.3(0)D1(0.169), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.120), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuu06999
Title:
adding a large number of Vlans to a port-profile failing.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:Viewing or adding port-profile with a large number of VLAN ranges my fail.
Conditions:The limit for VLAN ranges is currently set to 64, adding more than this will cause the following error:

"ERROR: Command Parsing Failed"
Workaround:Reduce the number of VLAN ranges to less than 64

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases: *
6.2(13.4)S0, 6.2(14), 7.0(0)BZ(0.98), 7.0(0)FHS(0.23), 7.0(0)HSK(0.587), 7.1(0)ES(0.24), 7.2(0)BA(0.25), 7.3(0)D1(0.27), 7.3(0)D1(1), 7.3(0)DHB(0.2)
Alert Type:
Updated *
Bug Id:
CSCuw71136
Title:
Static Mac address assigned on interface after default interface command
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Static mac address got configured on L2 port after defaulting the interface configuration

Conditions:
This problem is seen when Supervisor is staged in Chassis 1 and then moved to Chassis 2. Now on chassis 2 if you run default interface command on L2 ports then you will observed static mac address got configured on those L2 ports. This problem was seen on 6.2.10 code.

Workaround:
Remove the static mac address using the command "no mac address xxxx.xxxx.xxx"

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(16), 6.2(16)S9, 7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.115), 7.3(0)RSP(0.7), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw97457
Title:
SVI interfaces are not displayed in "show interface description"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SVI Vlan interfaces are not displayed in "show interface description" command.
At the same time "show interface brief" displays these SVI interfaces correctly.

Conditions:
This is seen on N77-C7710 chassis with N77-SUP2E supervisor and F2e/F3 linecards installed.

Workaround:
This is a cosmetic issue.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10), 6.2(14)
Known Fixed Releases: *
7.3(0)D1(0.162), 7.3(0)D1(0.177), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.114), 7.3(0)PDB(0.128), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv56604
Title:
N7K:ospf pushing BFD into admin down state
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
All BFD/OSPF sessions flap on the local chassis.

Conditions:
This happens when sup switchover through physical removal or through CLI "system switchover" command with OSPF having passive-interface default in SR mode and no ip ospf passive-interface in certain interfaces.

Workaround:
The following workaround solved the issue
- no bfd echo
- bfd timers 150 min-rx 150 interval 3

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.0(3)I3(0.267), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.100), 7.0(3)IDM3(0), 7.0(3)IDM3(0.6), 7.0(3)ITI2(1), 7.0(3)ITI2(1.100), 7.1(3)N1(0.611), 7.1(3)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuv44967
Title:
Unable to modify access-list using config session
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Unable to modify ACL using config session
Following error is shown

N7K# conf session impulse
Config Session started, Session ID is 1
Enter configuration commands, one per line. End with CNTL/Z.
N7K(config-s)# ip access-list test
N7K(config-s-acl)# permit ip host 1.1.1.1 any
N7K(config-s-acl)# commit
Failed to start Verification: Checkpoint Name already exists
N7K(config-s)#



N7K# conf session test
Config Session started, Session ID is 1
Enter configuration commands, one per line. End with CNTL/Z.
N7K(config-s)# ip access-list test
Maximum number of commands reached
N7K(config-s)#

Conditions:
This problem was observed on 6.2.10 code after using config session for couple of days.

Workaround:
Clear the checkpoint database and try to do the session commit

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)S92
Known Fixed Releases: *
7.3(0)D1(0.87), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.37), 7.3(0)PDB(0.57), 7.3(0)RTG(0.78), 7.3(0)SC(0.14), 7.3(0)SL(0.115), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCut83347
Title:
MFDM crashes due to HB loss
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MFDM crashes due to Heartbeat loss to sysmgr

Conditions:
This failure can occur if there is a high number of Fex host side or network side port changes such as port flaps and PC membership updates. We do not have a quantifiable number of port change events that can lead to this crash since it is highly dependent on other components at the time of the port change events. There is a low risk of this problem occurring in normal scenarios.

Workaround:
None

Further Problem Description:
This crash will be seen under heavy system load (overall mts queues being stuck) and not under normal scenarios.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(8)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.42), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCut18591
Title:
tshark: Segmentation Violation with IP Protocol 89 Capture Filter
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Ethanalyzer crashes with the following reason:

tshark: Child dump cap process died: Segmentation violation

Conditions:
Unknown at this time

Workaround:
None.

Further Problem Description:
Issue was due to overflow issue in memcpy.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.140), 7.3(0)D1(0.144), 7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)IB(0.122), 7.3(0)OTT(0.73), 7.3(0)PDB(0.89), 7.3(0)PDB(0.93), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuw29235
Title:
"restart igmp" command or ND ISSU results in "igmp hap reset"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Non-Disruptive ISSU is performed from version 7.1(2)N1(1) (or older version) to version 7.2(1)N1(1).

Conditions:
1. Have L2 Multicast/Unicast on N5k vPC pair switches running with 7.1(3)N1(1) build.
2. Perform ND ISSU to 7.2(1)N1(1) image on vPC primary switch.
3. vPC Primary switch will be crashing due to "IGMP hap reset".

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(1)N1(0.328), 7.2(2)N1(0.349), 7.3(0)N1(0.113)
Known Fixed Releases: *
7.3(0)N1(0.276), 7.3(0)N1(1), 7.3(0)TSH(0.99), 7.3(0)ZN(0.254), 7.3(1)D1(0.5), 7.3(1)PDB(0.19), 7.3(1)PIB(0.24)
Alert Type:
Updated *
Bug Id:
CSCuw16936
Title:
N7K - Removing/Adding tunnel dest. throws %LDP-3-OIM_SDB_OPEN: Error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When removing or adding GRE tunnel destination ip address, the following error message is getting displayed.

%LDP-3-OIM_SDB_OPEN: Error opening volatile:/dev/shm/4/oim_sdb_info, error - 0x0 (ksink_sdb_open() failed) in oim_api_init()

Tue Aug 25 19:02:04 2015:type=update:id=10.110.252.121@pts/0:user=SVC-UDC-PSC:cmd=configure terminal ; interface Tunnel143 ; tunnel source 10.1.15.10 (SUCCESS)
Tue Aug 25 19:02:05 2015:type=update:id=10.110.252.121@pts/0:user=SVC-UDC-PSC:cmd=configure terminal ; interface Tunnel143 ; tunnel destination 10.110.241.155 (SUCCESS)
2015 Aug 25 19:02:05.158 m-awvpdc01-nsw-udc-n7k01-vdc03 %LDP-3-OIM_SDB_OPEN: Error opening volatile:/dev/shm/4/oim_sdb_info, error - 0x0 (ksink_sdb_open() failed) in oim_api_init()

Conditions:
The OIM service must not be running.

Workaround:
None.

Further Problem Description:
This is a cosmetic bug; no service is impacted. The log message can be safely ignored.

LDP needs to know the destination of traffic engineering (TE) tunnels, and so listens for changes in L3 parameters on interfaces. In this case there was a change (the non-TE tunnel addition or removal) and LDP is assuming that it's a TE tunnel when it's not. LDP attempts to query OIM about the TE tunnel, but OIM is not running because TE is not running. For that reason LDP unable to get the information from OIM's SDB about the tunnel, and so logs that message.

Since TE is not supported in 7.2 releases and thus customers are not using TE, there is no need for LDP to be aware of the TE tunnel destinations, and so the log message can be safely ignored.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.140), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.49), 7.3(0)PDB(0.102), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.155), 7.3(0)ZN(0.170)
Alert Type:
Updated *
Bug Id:
CSCuw37945
Title:
HSK:UDLD should check FEX HIF and report error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
udld feature is not supported on fex port

Conditions:
Issue is seen only on fex ports

Workaround:

Further Problem Description:
udld feature is not supported on fex port

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)D1(0.98)
Known Fixed Releases: *
7.3(0)D1(0.140), 7.3(0)D1(1), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.80), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCun84222
Title:
Error in help command for python cli/clid/clip apis
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Error in help command for python cli/clid/clip apis

Conditions:

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(8)S1
Known Fixed Releases: *
7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)IB(0.96), 7.3(0)IB(0.98), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.194), 7.3(0)ZN(0.210)
Alert Type:
New
Bug Id:
CSCuz27017
Title:
bridge-domain and mapping it to a particular VNI doesnt shown in config
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
bridge-domain and mapping it to a particular VNI doesnt shown in config

Conditions:
Issue is present only for fabric bridge domain

Workaround:
n/a

Further Problem Description:
.

Last Modified:
26-APR-2016
Known Affected Releases:
7.3(0)D1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz39613
Title:
F3: null0-routed traffic hits CPU with IP redirects enabled
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Null0-routed traffic hits CPU and L3 TTL rate-limiter. With large amount of null0-routed traffic this may lead to ingress drops on interface

Conditions:
Traffic comes through F3 linecard interface
IP redirects configured on ingress interface
Traffic routed to Null0

Workaround:
Disable IP redirects on ingress interface

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.2(12), 6.2(14)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux35766
Title: *
Incorrect power mode w supplies are shutdown on N7k PS-Redundant config
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Incorrect power mode is indicated as Non-Redundant for ps redundant mode while having enough power for the chassis and modules

Conditions:
- Configured with ps redundant mode
switch(config)# power redundancy-mode ps-redundant

- Present with shutdown power supplies.

10 N77-AC-3KW 706 W 3000 W Ok
11 N77-AC-3KW 706 W 3000 W Ok
12 N77-AC-3KW 0 W 0 W Shutdown
13 N77-AC-3KW 701 W 3000 W Ok
14 N77-AC-3KW 703 W 3000 W Ok
15 N77-AC-3KW 705 W 3000 W Ok
16 N77-AC-3KW 0 W 0 W Shutdown

Workaround:
Physically remove the shutdown power supplies from the chassis

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
7.3(0)DX(0.88)
Alert Type:
New
Bug Id:
CSCuz22196
Title:
Nexus: snmpd Program terminated with signal 8, Arithmetic exception.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 3927) hasn't caught signal 8 (core will be saved)

Conditions:
All Nexus platforms
When device is being polled with GetBulk requests.

Workaround:
None

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
7.3(1)D1(0.51), 7.3(1)N1(0.338), 7.3(1)N1(1)
Alert Type:
New
Bug Id:
CSCuz32937
Title:
SNMPd process crash: N7k
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
SNMPd encounters an unexpected HAP reset and a core file could be seen/generated as a result.

Conditions:
SNMP is enabled and configured on the device/VDC.

Workaround:
N/A

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy79367
Title:
M3:IFTMC_INTERFACE_INTERNAL_ERROR: Invalid intf state provided to IFTMC
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
During LC ISSU, an IFTMC_INTERNAL_INTERFACE_ERROR syslog may appear.

Conditions:
A large number of interfaces (thousands) are flapped or receive a trigger during LC ISSU (generally needs to be on the scale of 4k subinterfaces), which is too large to be cached in MTS, so it is only partially saved.

Workaround:
Flap the affected interfaces.

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(0.116)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz34593
Title:
N7K: Incorrect filename when issuing 'copy run ftp'
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
The Nexus 7K does not save the configuration filename correctly on the remote host when performing a "copy running-config ftp". This behaviour has been observed on both the default and non-default VDC's.

When performing an FTP copy to a remote host, the command allows the user to use the default filename or to specify a different name. In either case the result always writes the file as "HOSTNAME-running-config".

Example:
N7K# copy run ftp://ftp.cisco.com/system.cfg

filename on remote host: N7K-running-config

Conditions:

Workaround:
Rename the file on the remote host

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.2(14)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz39212
Title:
FP & VPC ports has Vlan membership in ELTM although no config present
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Extra mac learning on fabricpath port for non-fabricpath vlan

Conditions:
copy r s vdc-all
followed by,
vdc reload with configuration,

vlan 10-100
vlan 10-50
mode fabricpath

int ethernet 3/1
switchport mode fabricpath
no shutdown

Workaround:
shut/no shut on the interface port

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz34391
Title:
Multicast traffic loss during ISSU or SSO
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Multicast traffic loss for brief interval during SSO or ISSU

Conditions:
SSO or ISSU

Workaround:
Traffic recovers after brief interval

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtz10925
Title:
F2 ports failed with error CLP_PS_INT_ERR_FLD_EG_PKT_PNUM_ERR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

LC resets with the following error -

MODULE-2-MOD_SOMEPORTS_FAILED Module 8 (Serial number: XXXX) reported failure on ports X/X-X/X (Ethernet) due to error in device DEV_CLP_FWD (error 0xca80b600)

Conditions:

ASIC interrupts could be seen when packets with random packet headers are seen, and these interrupts should be ignored. From the 'show accounting log' output, the following error will be seen -

type=update:id=invalid_ip@pts/0:user=svc-isan:cmd=exceptionlog module 8 syserr 0x424f001b devid 168 errtype 2 errcode 3397432832 phylayer 2 ports 45-48 harderror 0 desc CLP_PS_INT_ERR_FLD_EG_PKT_PNUM_ERR inband 0 (SUCCESS)

The key part of this error is "CLP_PS_INT_ERR_FLD_EG_PKT_PNUM_ER".

Workaround:

None.

Last Modified:
28-APR-2016
Known Affected Releases: *
6.0(2), 6.0(3)S2
Known Fixed Releases:
6.0(3)S6, 6.1(0.261)S0
Alert Type:
Updated *
Bug Id:
CSCui18245
Title:
LACP BPDUs should always be untagged irrespective of Port-ch config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When forming LACP port-channel, the port channel does not come up. The interface goes to suspended state stating the following: 'Suspended: No LACP PDUs.'

Conditions:
One of the following configured:

Globally: vlan dot1q tag native
Per Interface: switchport trunk native vlan

Workaround:
Set the configuration above to it's default value on both sides of the link.

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases: *
6.1(3)S50, 6.1(4), 6.1(4)S26, 6.2(1.143)S5, 6.2(2)S5
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.10), 6.2(10)CM(0.8), 6.2(10)CM(0.9), 6.2(10)MS(0.1), 6.2(10)MS(0.2), 6.2(8)E1, 6.2(8)ES(0.5), 6.2(8)KR(0.8), 6.2(8)TS(0.28)
Alert Type:
New
Bug Id:
CSCuz24669
Title:
M3-10 : 7k ACL config failed due to TCAM Spanlogic
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Configuration of an acl/qos/pbr or any policies that use access-lists on an M1-XL, M2-XL or M3 cards fail with the following error:
"Failed - Insertion of TCAM entry failed due to Spanslogic"

Conditions:
When there are large number of randomly generated source/destination address masks in ACEs, mostly non prefix masks. Ex:
10 permit tcp 157.145.112.100 0.22.216.207 127.101.157.94 0.188.86.95
20 permit udp 89.86.177.144 0.174.101.91 127.59.154.69 0.219.160.164

Workaround:
Try to avoid random masks & use prefix masks

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz19882
Title:
non initial frag pkt does not match tcp/udp any any entry
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Non initial fragment packet (frag offset != 0) does not match acl entry

Conditions:
With the following ACE entry
permit tcp any any
permit udp any any

Workaround:
Add another entry with the fragment keyword:
permit tcp any any
permit tcp any any fragment
permit udp any any
permit udp any any fragment

Workaround:
Add another entry with the fragment keyword:
permit tcp any any
permit tcp any any fragment
permit udp any any
permit udp any any fragment

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)DX(0.141)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz33057
Title:
ACLQOS failure: ELTMC COMMIT ERROR 0x42650010, when VDC is suspended
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
A harmless error message like:
2016 Apr 19 10:03:09 SW12-admin %$ VDC-1 %$ %ACLQOS-SLOT1-2-ACLQOS_FAILED: ACLQOS failure: ELTMC COMMIT ERROR 0x42650010 for Inst:2 VDC-5 Inband_vrf_table 9, dir egress

Conditions:
When a vdc is suspended.

Workaround:
None

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz42524
Title:
FEX: BLOGGERD_INVALID_IP_ADDRESS in ISSU from 7.2.1.D1.1 to HSK2
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
While performing ISSU from 7.2.0(D1)1 to 7.3.0 (DX)1 or from 7.2.1.(D1)1 to 7.3.0(DX)1, a syslog containing the phrase "BLOGGERD_INVALID_IP_ADDRESS" might appear.

Conditions:
ISSU from 7.2.0(D1)1 to 7.3.0 (DX)1 or from 7.2.1.(D1)1 to 7.3.0(DX)1

Workaround:
This has no functionality impact and there is no workaround.

Further Problem Description:

Last Modified:
29-APR-2016
Known Affected Releases:
7.3(0)DX(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz23469
Title:
Port profile crash in N7K DCI ( Opflex setup) on doing "no feature ipp"
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
When the feature ipp which being turned off by doing no feature ipp, the ppm process crashes.

Conditions:
When the tenants are configured onto the switch using the feature ipp

Workaround:
ipp process need to wait before it exits, because with no feature ipp, ppm process will being cleaning up the profile applied for ipp to configure the tenants.

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
7.3(0)DX(0.132)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz45591
Title:
BFDC core generated on M1 module
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
BFDC core generated on M1 module

Conditions:

Workaround:

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy91444
Title:
Enabling vtp in Fabricpath enabled setup should throw error
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
No error is thrown on enabling vtp when fabricpath is already enabled on the system

Conditions:
fabric path is enabled & user trying to enable vtp

Workaround:
no workaround

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
7.3(0)DX(0.116)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy90969
Title:
N7K Eompls decap uses wrong MTU
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
EoMPLS packets with size more than MTU of the interface - 26 bytes are dropped on the egress interface of decap.

Conditions:
- This happens when packet size is more than 26 short of the MTU of the interafce
- Smaller packets does not have any issues.
- F3 Linecards are used
- Seen in 7.2(1)D1(1)

Workaround:
Increase the MTU on the egress interface of decap with original size + 26 bytes

Further Problem Description:
If the interface MTU is 1500, packets bigger than 1474 were getting dropped. Ideally packets bigger than 1500 bytes only should be dropped.

Last Modified:
30-APR-2016
Known Affected Releases:
7.2(1)D1(1)
Known Fixed Releases:
7.3(0)DX(0.133), 7.3(0)DX(0.145)
Alert Type:
New
Bug Id:
CSCuy96171
Title:
Few BFD sessions flapping after vdc suspend/resume, reload, lc reload
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
1000 SVI's are configured, and the SVI's are allowed through ports from different LC's. On vdc suspend/resume, reload, lc reload few BFD sessions flap continuously.

Conditions:
1000 SVI's are configured, and the SVI's are allowed through ports from different LC's. On vdc suspend/resume, reload, lc reload few BFD sessions flap continuously.

Workaround:
No workaround

Further Problem Description:

Last Modified:
30-APR-2016
Known Affected Releases:
7.3(0)DX(0.125)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtc24985
Title:
cannot configure interface description that starts with ';' character
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
NX-OS does not support the interface description that starts with a ';' character.

Conditions:
When you configure the interface description that starts with a ';' character the following message appears: Invalid command at '^' marker.

Workaround(s):
No workaround.

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(1), 4.2(3)
Known Fixed Releases: *
5.1(0.64), 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCui06909
Title:
ENH: Nexus 7000 RMON events limit needs to be raised
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
This is seen error when more than 128 RMON Events are attempted:
"You have exceeded the max number of events that can be configured".

The number of events at the time:
samplemachine# show run | in "rmon event" | count
128

Conditions:
Nexus 7000 running NX-OS 5.1(2)

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.1(6)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.52), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv80855
Title:
BGP Nexthop is not correct in the case of Multiaccess Networks
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
eBGP nexthop is not the third party address for the route that is learned via IGP on a multi-access network(eg. Ethernet).

Conditions:
eBGP peering on multi-access network, and routes are learned internally.

Basically, it's the "BGP Next Hop (Multiaccess Networks)" case in
http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/26634-bgp-toc.html#bgpnexthop

Workaround:
Set an outbound policy map on the neighbor with "set ip next-hop unchanged".

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.0(3)I3(0.123), 7.0(3)I3(1), 7.0(3)IDP3(1.12), 7.0(3)IDP3(2), 7.0(3)ITI2(1), 7.0(3)ITI2(1.100), 7.3(0)D1(0.178), 7.3(0)D1(1), 7.3(0)RSP(0.7), 7.3(0)RTG(0.102)
Alert Type:
Updated *
Bug Id:
CSCuj28897
Title:
N7k logging level all # does not change logging facility pim or pim6
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The bug I see is that pim/pim6 do not go to ?6? but stay at their previous values when the ?logging level all 6? command is issued. This is a minor bug.

B16u1-DC1-Agg1-vdc1(config)# logging level all 6

Then via ?show logging?:

Facility Default Severity Current Session Severity
-------- ---------------- ------------------------
pim 5 7
pim6 5 5

Conditions:
B16u1-DC1-Agg1-vdc1(config)# no logging logfile
B16u1-DC1-Agg1-vdc1(config)# clear logging logfile
B16u1-DC1-Agg1-vdc1(config)# logging logfile log 7 size 2000000
B16u1-DC1-Agg1-vdc1(config)# logging level all 6
B16u1-DC1-Agg1-vdc1(config)# logging level sysmgr 1
B16u1-DC1-Agg1-vdc1(config)# clear logging logfile

Workaround:
User can try changing the pim and pim6 levels individually by logging level ip pim <> " and "logging level ipv6 pim "

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.1(3)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.53), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCum09975
Title:
SSTE: show tech bfd throws error if size greater than 500M
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
When collecting a showtech from the Command Line Interface (CLI) on a N7K chassis with many Line Cards (LCs) which are of type "F3" the user can error message saying "No space left on device" in the volatile: disk.

Conditions:
Incomplete show tech ouput.

Workaround:
Need to collect the show tech output from the particular LC's for which error message is displayed.

Further Problem Description:
Whenever there is too many LC's plugged in, and the show tech output greater than 500M, the error message will be displayed "No space left on device".

Since only 500M is allocated.

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(6)S12
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.85), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
New
Bug Id:
CSCuz41935
Title:
KERN-0-SYSTEM_MSG: tracback for memrlimit_cgroup_uncharge_as
Status:
Open
Severity:
4 Minor
Description:

Symptom:
%KERN-n-SYSTEM_MSG: messages seen for a kernel traceback like:

78483140.693744] Pid: 8066, comm: sysinfo Tainted: P W 2.6.99.99 #1
[78483140.693794]
[78483140.693795] Call Trace:
[78483140.693860] [] warn_on_slowpath+0x5d/0x84
[78483140.693913] [] ? jiffies_to_msecs+0x9/0x11
[78483140.693965] [] ? _raw_spin_unlock+0x83/0xd7
[78483140.694016] [] ? _spin_unlock+0xe/0x10
[78483140.694066] [] ? unmap_vmas+0x5a9/0x801
[78483140.694118] [] res_counter_uncharge_locked+0x27/0x31
[78483140.694183] [] res_counter_uncharge+0x30/0x44
[78483140.694233] [] memrlimit_cgroup_uncharge_as+0x2d/0x2f
[78483140.694282] [] exit_mmap+0x92/0x100
[78483140.694326] [] mmput+0x41/0xb6
[78483140.694367] [] exit_mm+0x107/0x113
[78483140.694412] [] ? _spin_unlock_irq+0xe/0x11
[78483140.694455] [] do_exit+0x257/0x89e
[78483140.694496] [] ? jiffies_to_msecs+0x9/0x11
[78483140.694542] [] do_group_exit+0x78/0xa5
[78483140.694584] [] sys_exit_group+0x17/0x19
[78483140.694630] [] ia32_syscall_done+0x0/0x21
[78483140.694676]
[78483140.694712] ---[ end trace de7fa95f2c32e752 ]---

Conditions:
Unknown.

Workaround:

Further Problem Description:
The process reported varies.

The messages are harmless

Last Modified:
28-APR-2016
Known Affected Releases:
6.1(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy89883
Title:
TACACS+ authorization request with single-connection using flags 0x04
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
TACACS+ authorization requests are intermittently sent using flags 0x04 (encrypted payload, single connection), while most of the time the requests are sent using flags 0x00 (encrypted payload, multiple connections).

Conditions:
"single-connection" keyword not configured for the tacacs-server definition.
Nexus 7000/7700 sends hundreds of TACACS+ authorization requests in a very short time.

Workaround:
None at the moment.

Further Problem Description:

Last Modified:
01-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCug96112
Title:
Configuration Session editable for user with same privilege
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The user gets an error when trying to access the configuration session of a second user when the roles are the same.

Conditions:
The user of "configuration sessions" with different usernames and roles.

Workaround:
Use role network-admin or user admin. Further workarounds being investigated. The code is fixed to make the users with the same role to access and modify the session

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.1(3)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.52), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCtk54101
Title:
N7K: BGP graceful restart may fail when BGP MD5 password set
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
BGP graceful restart fails

Conditions:
BGP peer established with
- BGP MD5 authentication
- BGP hold timer is within 20 seconds

Workaround:
not use BGP password or use default bgp timer

Last Modified:
08-APR-2016
Known Affected Releases:
5.0(5), 5.2(0.222)
Known Fixed Releases: *
5.3(0.169)S0, 6.0(0.2)S0, 8.3(0)SF(0.67)
Alert Type:
New
Bug Id:
CSCuz25484
Title:
LACP flags in RECV PDU shows up as wrong
Status:
Other
Severity:
4 Minor
Description:

Symptom:show lacp internal pdu interface eth < > parse output will show wrong flags for RECV PDUs only.
Ideally after LACP FSM has reached final stage of up/up port-channel, flags seen for actor and partner in SEND PDU and RECV PDU should be exactly same. Note, that flags can be different when the channel is not up/up or in any other transient state.

Conditions:n/a

Workaround:none

More Info:

There is no operational impact due to this show cli output being wrong.

Last Modified:
24-APR-2016
Known Affected Releases:
6.2(12), 6.2(14), 6.2(16)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtc39072
Title:
N7K: Arrow keys do not work for retrieving commands
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:

NXOS up arrow key doesn't retrieve old commands after "copy tftp: bootflash:" under "Enter source filename:".
"Later in "Enter vrf .." or "Enter hostname for the tftp server:", only the commands just entered from "Enter source filename:" can be retrieved.

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(1)
Known Fixed Releases: *
5.1(0.149)S0, 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtk54167
Title:
N7K: BGP graceful restart may fail in aggregate route
Status:
Fixed
Severity:
4 Minor
Description:

N7K: BGP graceful restart may fail in aggregate route

Symptom:
BGP graceful restart fails in aggregate route

Conditions:
Graceful restart by BGP speaker who executes aggregate bgp route

Workaround:
not to use bgp aggregate route

Last Modified:
08-APR-2016
Known Affected Releases:
5.0(5)
Known Fixed Releases: *
5.2(0.215)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtf86297
Title:
N7k VDC should create tac-pac in VDC directory instead of bootflash root
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
When using the tac-pac command into a VDC, if the file is saved to the bootflash, the default VDC bootflash is used instead of the VDC directory

Conditions:
Use of VDC

Workaround:
Use the following command:
tac-pac bootflash:///vdc_X/filename
where X is the VDC number

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(4)
Known Fixed Releases: *
4.2(8)S29, 4.2(8.102)S0, 5.1(0.107)S0, 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCue01036
Title:
N7K OSPF unable to set metric for redistributed route as zero
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Unable to set metric for redistributed routes as zero in NxOS OSPF

Conditions:
We can set metric as zero by a route-map. However, in that case NxOS applies the value of default-metric instead of the one set by the route-map.

Workaround:
none.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.0(3)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.46), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCut80582
Title:
logging level spm6 missing after non-ISSU from 6.0.4 to 6.2.10
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
After upgrade from 6.0(4) to 6.2(10), customer lost the config: 'logging level spm6'

Conditions:

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.171), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.131), 7.3(0)RTG(0.72), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCtr47838
Title:
idle-timeout in tacacs-server test has different range
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
idle-timeout in "tacacs-server test" has the range as 0 to 1440, while "tacacs-server host test" has the range as 1 to 1440.

Conditions:
Always.

Workaround:
None.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(1)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.54), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCth86446
Title:
%XMLMA-3-XMLMAERR: XML master agent: XML sub agent session 6283 termina
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
XML agent error message.
Conditions:
n/a
Workaround:
no workaround.

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(3), 5.0(3)
Known Fixed Releases: *
4.2(7.47)S0, 5.1(0.197)S0, 5.1(1), 5.2(0.57)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtk60962
Title:
Capability to turn off port channel bundling syslog messages
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Require CLI option to turn on/off port channel interface logging per port channel

Conditions:
Configured port channel and member link flap.Current logging event command does not suppress port channel link events.

Workaround:
None

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
4.2(4)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.37), 7.3(0)PDB(0.53), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCus40106
Title:
EIGRP might incorrectly advertise tag values in ECMP case
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
There is a route-map which matches tags and set a new value.
This route-map is used in an EIGRP outbound distribute list. One in 10 times
based on the received route tag, the correct route tag value is not set while
advertising out.

Conditions:
The symptom is observed when you use a route map which matches
tags and sets a new tag.

Workaround:
Clear the EIGRP process or re-advertise the route.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)ZD(0.6)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.17), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCtf34078
Title:
remove side effect of 'human' (switches output permanently to xml)
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
cli output for a session switches permanently to xml format when a '... | human' command is used.

Conditions:
all.

Workaround:
reissue another '... | human' command to switch back to human readable format.

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(4)
Known Fixed Releases: *
5.1(0.114)S0, 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCue35705
Title:
Getting password prompt even when entering password in copy ftp command
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
When specifying the user password in the copy ftp command, the password prompt is still popped:

nexus# copy ftp://test:test@ftpserver/file bootflash:
Enter vrf (If no input, current vrf 'default' is considered): management
Password: <<<<<<<<<<<

Conditions:
Nexus switch

Workaround:
- Use the "terminal password" command to set the password to be used for the password prompts on this terminal session:

nexus# terminal password test
nexus# copy ftp://test@ftpserver/file bootflash:
Enter vrf (If no input, current vrf 'default' is considered): management
***** Transfer of file Completed Successfully *****
Copy complete, now saving to disk (please wait)...
nexus#

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(3a), 6.1(2), 6.2(10)S53
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.51), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCtu36649
Title:
BGP sends TCP SYN even if link to peer is down
Status:
Fixed
Severity:
4 Minor
Description: *

Symptom:

When using update-source on a neighbor where the the source is a physical interface, BGP will still try and establish a neighbor with this source even if the interface is down.

Conditions:

The problem will occur whenever there is some prefix in the routing table that can be used to send to the destination, including the default route or a route to null0.

Workaround:

There is no workaround

Last Modified:
08-APR-2016
Known Affected Releases: *
5.2(1), 6.0(1)
Known Fixed Releases: *
6.1(0.170)S0, 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCur25927
Title:
"logging level session-mgr 7" not shown in running config after sso
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Logging level configuration "logging level session-mgr 7" got lost after switchover.

Conditions:
Problem happened only after switchover.

Workaround:
Manually configure "logging level session-mgr 7" again after switchover.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)S98
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.46), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 8.3(0)CV(0.337), 8.3(0)KMT(0.24)
Alert Type:
Updated *
Bug Id:
CSCuu19139
Title:
"Default information originate always" not working
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
"default-information originate always" not working

Conditions:
When a learnt route replaces the route added and then the learnt route is lost

Workaround:
unconfigure and re-configure the command

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.3(0)TD(0.1)
Known Fixed Releases: *
7.3(0)D1(0.143), 7.3(0)D1(1), 7.3(0)GLF(0.43), 7.3(0)IB(0.27), 7.3(0)PDB(0.112), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv45421
Title:
Multicast source address inverted in igmpv3 event-history log message
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Incorrect SRC address in log IGMP event-history message:
#show ip igmp snooping event-history vlan
2015 Jul 15 15:00:48.128938 igmp [1663]: [1676]: SN: <405> Received v3 Group-source-specific query for 239.195.1.3 from 10.21.25.252 on Vlan405 (mrt 1 sec)
2015 Jul 15 15:00:48.128928 igmp [1663]: [1676]: SN: <405> Received a v3 GSS-Query for group 239.195.1.3 (source-count 1) on Vlan405 (mrt 1 sec) src0:225.253.203.91, srcN:225.253.203.91

Conditions:
N7k + IGMPv3 + IGMP snooping

Workaround:
none

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.50), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(0)ZD(0.85)
Alert Type:
Updated *
Bug Id:
CSCuv66924
Title:
Need to shorten the time to suspend ports when LACP min-link mis-config
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
With the current NX-OS release for N7K, it takes several seconds (~10sec, depending on number of LACP members) to suspend all member ports in the LACP port once LACP min-link condition is broken, such as member port brought down.

Conditions:
Using LACP with min-link feature.

Workaround:
none. The time cannot be shorten in the current implementation.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.48), 7.3(0)PDB(0.55), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCum22663
Title:
Missing description for parameter under show lisp internal event-history
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
miss description for parameter under show lisp internal event-history

Conditions:

Workaround:

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(2)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuo02299
Title:
Overlay1 Last link flapped timer is flushed after 24 hours
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
In "show interface Overlay1" output , counter "Last link flapped" never goes above 24 hours. It is reseted to 00:00:00 every 24 hours , so it can't be used to access how long interface was UP.
sh int o1
Overlay1 is up
Last link flapped 23:59:59
Last clearing of "show interface" counters 07:45:30

zixu-PE2# sh int o1
Overlay1 is up
Last link flapped 00:00:00
Last clearing of "show interface" counters 07:45:31

Conditions:
Normal operations

Workaround:
None. It' just a cosmetic issue it doesn't affect OTV communications. To check liveliness of OTV connections please use "show otv isis adjacency detail" and check for how long ISIS sessions has been stable.

show otv isis adjacency detail
OTV-IS-IS process: default VPN: Overlay1
OTV-IS-IS adjacency database:
System ID SNPA Level State Hold Time Interface Site-ID
nexus-OTV1 001b.54c2.4242 1 UP 00:00:12 Overlay1 0000.0000.0001
Up/Down transitions: 1, Last transition: 20:23:22 ago <---------------- last transition 20 hours ago
...
nexus-OTV2 001b.54c2.4244 1 UP 00:00:12 Overlay1 0000.0000.0002
Up/Down transitions: 1, Last transition: 20:19:26 ago <---------------- last transition 20 hours ago

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(2)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)OTT(0.55), 7.3(0)PDB(0.57), 7.3(0)RTG(0.57), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCtl42946
Title:
nxos: less do not work (more used instead)
Status:
Fixed
Severity:
5 Cosmetic
Description: *

Symptom:

Instead of "less" pager when show long output is always used "more" regardless cli

Workaround:

none

Last Modified:
08-APR-2016
Known Affected Releases: *
4.2(6), 5.1(1a), 5.1(2)
Known Fixed Releases: *
4.2(8.8)S0, 5.2(0.189)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtt31905
Title:
'Show interface status' output is not aligned correctly
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
'Show interface status' output is not aligned correctly

Conditions:
Issue observed on 5.1.3 and 5.1.4.
Could be caused by a new line feed in the description field.

Workaround:
Manually removing the description and adding it back can fix the issue

Last Modified:
08-APR-2016
Known Affected Releases:
5.1(3)
Known Fixed Releases: *
5.2(8.16)S0, 5.2(9), 6.0(1)S28, 6.1(0.120)S0, 6.1(4.1)S0, 6.1(5), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCuo77368
Title:
N7K interface config is out of position
Status: *
Terminated
Severity:
5 Cosmetic
Description:

Symptom:
N7K running config is out of position .



interface Vlan2
description "interface Vlan2"
no shutdown
no ip redirects
ip address 2.2.2.2
ip ospf authentication message-digest
ip ospf cost 10
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.0

interface Vlan3
description "interface Vlan3"
no shutdown
no ip redirects
ip address 3.3.3.3
ip ospf authentication message-digest
ip ospf cost 10
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.0



-------------------------------------------------------------------------
< when hit this issue>
#show running-config

interface Vlan1

interface Vlan2

interface Vlan3
description "interface Vlan2" <<<<<no shutdown
no ip redirects
ip address 2.2.2.2
ip ospf authentication message-digest
ip ospf cost 10
ip ospf hello-interval 5
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.6

Conditions:
when insert the all commands below at one time.

nexus4# show version?
show running-config
show startup-config
show ip interface brief
show interface brief
show interface status
show interface transceiver
show interface
show udld
show port-channel summary
show ip route summary
show ip route
show ip ospf
show ip ospf interface
show ip ospf neighbor
show ip ospf database
show ip bgp
show ip bgp summary
show ip bgp neighbors
show udld neighbor
show hsrp brief
show ip arp
show mac address-table
show hardware rate-limiter
show hardware internal cpu-mac inband stats
show process cpu sort
show module
show environment
show inventory
show logging
terminal length 24
terminal length 0
show version
show running-config
show startup-config
show ip interface brief
show interface brief
show interface status
show interface transceiver
show interface
show udld
show port-channel summary
show ip route summary
show ip route

Workaround:
insert one line command at the same time.

Further Problem Description:

Last Modified:
06-APR-2016
Known Affected Releases:
6.2(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur80960
Title:
eigrp interface configs not removed after eigrp process is disabled
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
eigrp interface configs not removed after eigrp process is diabled

Conditions:
++ eigrp should be configured and then removed

Workaround:
disable eigrp feature and then re-enable it

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
6.1(4.6)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz37129
Title:
N7K - IPv6 tunnel support
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Documentation to be updated regarding non-support of IPv6 GRE tunnels on N7K.

Conditions:
Ipv6 in Ipv6 GRE tunneling

Workaround:
NA

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtx27232
Title:
need a way to get CLI output in TCL without showing it on terminal
Status:
Terminated
Severity:
6 Enhancement
Description: *

Request to add capability to TCL to have CLI output collected to variable without showing it on terminal
Symptom:When redirecting output to variables or files, output is still shown on the terminal/screen.

Conditions:All conditions where output is redirected.

Workaround(s):
Use clis instead of cli

Workaround:Use clis instead of cli

Last Modified:
25-APR-2016
Known Affected Releases:
5.2(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCue27895
Title:
NXOS/OTV: sh tech otv need include also sh tech forwarding otv
Status:
Fixed
Severity:
6 Enhancement
Description: *

This is enhancement to have sh tech forwarding otv unicast/multicast included already in sh tech otv

Symptom:
N/A

Conditions:

Workaround:

Further Problem Description:

Last Modified:
22-APR-2016
Known Affected Releases:
5.2(4)
Known Fixed Releases:
7.3(0)TSH(0.99), 7.3(1)D1(0.24), 7.3(1)N1(0.316), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCtc97478
Title:
CTS: Implement the use of ACS/ISE timer 'Download SGACL lists'
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The Nexus does not refresh policies periodically.
It should comply with the 'Download SGACL lists' timer sent from ACS or ISE

Conditions:
Occurs when CTS policies have been downloaded to the Nexus. Default 'Download
SGACL lists' timer in ACS or ISE is 1 day or 86400 seconds.

Workaround:
None.

Further Problem Description:

Last Modified:
22-APR-2016
Known Affected Releases:
4.2(1), 6.1(2)
Known Fixed Releases: *
6.2(4), 6.2(5.7)S0, 6.2(6), 7.0(0)FM(0.5), 7.0(0)FM(0.6), 7.0(0.51)S0, 8.3(0)CSS(0.4), 8.3(0)CV(0.398), 8.3(0)SF(0.94)
Alert Type:
Updated *
Bug Id:
CSCux25385
Title:
Install all CLI should force kickstart and system image
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
User runs 'install all' and doesn't specify the kickstart AND system image name. The install all will fail.

Conditions:
Nexus switch doing ISSU (install all)

Workaround:
Specify the kickstart and system images when running the 'install all' command?

- install all kickstart bootflash: system bootflash:

Further Problem Description:
When you run install all with only kickstart image specified, the installer will use the current system image that the switch is booted up with to continue with the installer.

Similarly, if you run install all with only a system image specified, installer will use the current kickstart image that the switch is booted up with.

The command error out because it was trying to use your new kickstart image with a different version of the system image, which generally is not compatible.

N3K:

Verifying image bootflash:/n3000-uk9-kickstart.6.0.2.U6.4.bin for boot variable "kickstart".
[####################] 100% -- SUCCESS

Verifying image bootflash:/n3000-uk9.5.0.3.U5.1e.bin for boot variable "system".
[####################] 100% -- SUCCESS


N7K:
Verifying image bootflash:/n7000-s2-kickstart.7.2.0.D1.1.bin for boot variable "kickstart".
[####################] 100% -- SUCCESS

Verifying image bootflash:/n7000-s2-dk9.6.2.14.bin for boot variable "system".
[####################] 100% ? SUCCESS

Last Modified:
22-APR-2016
Known Affected Releases:
6.2(13), 6.2(13)S26, 6.2(14), 8.3(0)CV(0.249)
Known Fixed Releases: *
8.3(0)CV(0.414)
Alert Type:
Updated *
Bug Id:
CSCuq63391
Title:
clear ip mroute for NXOS routers.
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
No single CLI to clear multicast state information from all multicast components.

Conditions:
The problem that exists with the current implementation may remove the state from MRIB but not essentially from other components which are MRIB clients.

Workaround:
Currently, we may be need to issue all the following CLIs to completely remove the multicast state entries:
1. clear ip igmp group vrf [do this only if you don't need traffic from any sources for this group]
2. clear ip pim route vrf
3. clear ip mroute data-created vrf
4. clear ip mroute vrf

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
4.2(6), 6.2(0.278)S10, 6.2(8)
Known Fixed Releases: *
7.3(0)BZN(0.47), 7.3(0)D1(0.76), 7.3(0)D1(1), 7.3(0)EG(0.3), 7.3(0)IB(0.67), 7.3(0)MMD(0.9), 7.3(0)N1(0.103), 7.3(0)N1(1), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45)
Alert Type:
Updated *
Bug Id:
CSCut78155
Title:
Add granular GM-LSP statistics for FabricPath IS-IS
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
"sh fabricpath isis traffic ethernet x/y" shoes all LSPs summed into a single value. Needs to show GM-LSP in a separate row:

S1# sh fabricpath isis traffic ethernet 4/5
Fabricpath IS-IS domain: default
Fabricpath IS-IS Traffic for Ethernet4/5:
PDU Received Sent RcvAuthErr OtherRcvErr ReTransmit
P2P-IIH 1195500 1195504 0 0 n/a
CSNP 2 1 0 0 n/a
PSNP 127592 151578 0 0 n/a
LSP 154109 128906 0 0 0

S1#

Conditions:
When you run fabricpath and monitor the traffic using "sh fabricpath isis traffic ethernet x/y" or "sh fabricpath isis traffic"

Workaround:
No Workaround

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0.10)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.3(0)D1(0.63), 7.3(0)D1(1), 7.3(0)DHB(0.2), 7.3(0)EG(0.3), 7.3(0)HM(0.47), 7.3(0)OTT(0.19), 7.3(0)PDB(0.25), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCty67801
Title:
SVI should not be allowed for vpls vlan
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
This is a feature request for SVI, where SVI creation has to fail if VFI is configured under a vlan, and vice-versa, VFI configuration under a vlan has to fail if corresponding SVI is created.

Conditions:
If both SVI and VFI are configured for a vlan at the sam time.

Workaround(s):
User has to be careful not to configure both SVI and VFI for a vlan at same time.

Workaround:
User has to be careful not to configure both SVI and VFI for a vlan at same time.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
5.2(0)LV1(0.274), 6.2(1.125)S6, 7.3(0)D1(1)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.166), 7.3(0)GLF(0.25), 7.3(0)OTT(0.73), 7.3(0)PDB(0.80), 7.3(0)RSP(0.7)
Alert Type:
Updated *
Bug Id:
CSCuw39246
Title:
Change Severity for "%VPC-2-VPC_SVI_EXCLUDE" to informational
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
changing Sev for %VPC-2-VPC_SVI_EXCLUDE to informational

Conditions:
Every time a vPC bounces or is turned up, we will see the
"%VPC-2-VPC_SVI_EXCLUDE:" error message. this need not be a SEV-2 message.

Workaround:
Change the severity level

Further Problem Description:
NA

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)D1(0.162), 7.3(0)D1(1), 7.3(0)GLF(0.44), 7.3(0)PDB(0.91), 7.3(0)RSP(0.7), 7.3(0)SC(0.14), 7.3(0)TSH(0.99)
Alert Type:
Updated *
Bug Id:
CSCuv52259
Title:
Restrict vpc on port-channels configured for port-security
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
On nexus 7000 series switches, it's currently not supported to run port-security on vpc legs and the system currently disallows to configure it in that order. However the system allows you to configure vpc on port-channels already configured for port-security. This defect is an enhancement to disallow this reverse operation.

Conditions:
On nexus 7000 series switches, vpc and port security can not both configured on a port channel at the same time. This bugs occurs when user configures port-security on a vpc leg.

Workaround:
N/A

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.3(0)D1(1), 7.3(0)FMD(0.9), 7.3(0)GLF(0.25), 7.3(0)OTT(0.55), 7.3(0)PDB(0.55), 7.3(0)SC(0.14), 7.3(0)TSH(0.99), 7.3(1)D1(0.12), 7.3(1)PDB(0.8)
Alert Type:
Updated *
Bug Id:
CSCtb48863
Title:
cannot use SVI as source-interface for syslog/AAA group/NTP
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
It isn't possible to use a SVI as source-interface for syslog, AAA (TACACS+/RADIUS) group or NTP while it should be possible to use any physical or logical interface configured as L3 as the source of those protocols.

Conditions:

Workaround:
Make use of a loopback interface to originate packets from.

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
4.2(1), 4.2(1j)
Known Fixed Releases: *
5.0(0.201), 5.0(0.214), 5.0(1), 7.0(0)BZ(0.98), 7.0(0)FHS(0.23), 7.1(0)ES(0.24), 7.1(0)ZN(0.231), 7.2(0)BA(0.25), 7.2(0)ZN(0.111), 7.3(0)D1(0.22)
Alert Type:
Updated *
Bug Id:
CSCut75676
Title:
VSI_OVER_FEX changes
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
This bug is used to track the development of VSI Over Project

Conditions:
This bug is used to track the development of VSI Over Project

Workaround:
Enhancement

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
7.2(0)D1(0.462)
Known Fixed Releases: *
7.0(0)BZ(0.98), 7.0(0)FHS(0.23), 7.1(0)ES(0.24), 7.2(0)EVF(0.3), 7.2(0)VOF(0.11), 7.2(0)VOF(0.2), 7.2(0)VOF(0.3), 7.2(0)VOF(0.4), 7.2(0)VOF(0.6), 7.2(0)VOF(0.8)
Alert Type:
Updated *
Bug Id:
CSCuz09493
Title:
PTP over Fabricpath does not work when there are multiple FTAG trees
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
When PTP is enabled on Fabricpath links connecting multiple switches and there are multiple paths, PTP may not work on some links. PTP will remain in Master state on both sides of the non-working links, instead of going to Master-Slave states at both ends. If PTP packets are captured, it will be seen that no PTP packet is received on the non-working links.

Conditions:
There has to be multiple Fabricpath trees (i.e., multiple paths) between the non-working switches.

Workaround:
Using non-fabricpath links to propagate PTP packets (i.e., configuring PTP on non-fabricpath based links) will be a work-around in this condition.

Further Problem Description:

Last Modified:
19-APR-2016
Known Affected Releases:
6.2(14), 7.3(0)D1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh10646
Title:
gibt-mvrp project collapse into Gibraltar
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
this is an internal tracking ID for a source code merge
Conditions:
not a bug, tracking ID
Workaround:
N/A
More Info:
N/A

Last Modified:
14-APR-2016
Known Affected Releases:
6.2(5.7), 7.0(0.7)
Known Fixed Releases: *
7.0(0)KM(0.64), 7.0(0.8)S0, 7.0(1)ZD(0.3), 7.1(0)D1(0.14), 7.1(0)D1(0.15), 7.2(0)D1(1), 7.3(0)DX(0.4), 7.3(0)EG(0.14), 7.3(0)GLF(0.53), 8.3(0)CSS(0.4)
Alert Type:
Updated *
Bug Id:
CSCty67352
Title:
ER: need to prevent "system switchover" command during ISSU
Status:
Fixed
Severity:
6 Enhancement
Description:

This enhancement request is to limit the commands a user can issue during ISSU upgrade.

Symptom:

You can execute a "system switchover" cli command while the "upgrade all" cli command is still in progress (from another cli session). There should be a warning that this might not be the most opportune time to start a switchover.

Conditions:

happens each time, except in releases >= Edinburgh2 (6.1.x) where a a fix is present.

Workaround:

no work around, just be careful...
You could try to enter config mode and execute the "system switchover" from there, since config mode ("configure terminal") is locked during ISSU.

Last Modified:
08-APR-2016
Known Affected Releases:
5.2(3a)
Known Fixed Releases: *
6.1(0.283)S0, 6.2(0.143)S0, 6.2(2), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtg09812
Title:
definitions of the systems define roles in Nexus 7000
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Customer wants to know the definition of each of the systems define roles

Conditions:
N/A

Workaround:
N/A

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(2)
Known Fixed Releases: *
5.1(0.107)S0, 5.1(1), 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtf04410
Title:
Citi requires full command accounting to AAA
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
"terminal log-all" command has become a configuration command starting from 5.0.5. The new command replaces existing exec mode command.

Conditions:
From 5.0.5 and forward.

Workaround:
N/A

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(3)
Known Fixed Releases: *
5.0(5)S18, 5.0(5)S22, 5.1(0.126)S0, 5.1(1), 5.1(1.66)S0, 7.0(1)ZD(0.3), 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtq53578
Title:
router-id is 0.0.0.0 in "show ip bgp" for locally originated route
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

The way of command output "show ip bgp " for locally originated prefix
differs between NX-OS and IOS. See below.

# NX-OS 5.2(1)

0.0.0.0 (metric 0) from 0.0.0.0 (0.0.0.0) <-------- Router-ID in the bracket is 0.0.0.0

# IOS 12.4

0.0.0.0 from 0.0.0.0 (1.1.1.2) <-------- Router-ID in the bracket is local system

Conditions:

Locally originated routes.

Workaround:

None

Last Modified:
08-APR-2016
Known Affected Releases:
5.1(3), 5.2(1)
Known Fixed Releases: *
5.3(0.212)S0, 6.0(0.2)S0, 8.3(0)SF(0.67)
Alert Type:
Updated *
Bug Id:
CSCtj79451
Title:
BGP eror message logging is not appropriate
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

When there is a mismatch between the neighboring parameters like AS number, password etc the Nexus does not report any specific error message instead the only thing that will happen is either the neighbor ship would go down or it will never come up.

Conditions:

Mismatch between neighboring parameters

Workaround:

None

Last Modified:
08-APR-2016
Known Affected Releases:
4.2(6), 5.1(1)
Known Fixed Releases: *
5.2(0.223)S0, 7.2(0)ZN(0.111), 8.3(0)SF(0.67)
Alert Type:
New
Bug Id:
CSCuz11312
Title:
N7K: Replication engine monitoring cli for F-Series
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Tracking for F-series support of `show hardware replication statistics`
Currently only supported for M-series modules

Conditions:
Tracking for F-series support of `show hardware replication statistics`
Currently only supported for M-series modules

Workaround:
none

Further Problem Description:

Last Modified:
08-APR-2016
Known Affected Releases:
6.2(16)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux19585
Title:
Increase the auto-recovery to 1 day (86400 secs)
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The maximum current delay time for vpc auto-recovery is 1 hour (3600 secs) only which could be a bottleneck sometimes in larger topologies with more and more number of vpc legs. We need the maximum delay time to be 24 hrs (86400 secs).

Conditions:
When the auto-recovery reload-delay is about to be configured.

Workaround:
N/A

Further Problem Description:

Last Modified:
07-APR-2016
Known Affected Releases:
6.2(14)S24
Known Fixed Releases: *
6.2(16), 6.2(16)S16, 7.3(0)D1(0.198), 7.3(0)D1(1), 7.3(0)HIB(0.3), 7.3(0)RSP(0.7), 7.3(0)ZD(0.225), 7.3(1)PDB(0.19), 7.3(1)PIB(0.24)
Alert Type:
Updated *
Bug Id:
CSCun85740
Title:
RPM crash when route-map assigned to interface (w/ ~450 seq entries)
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Unable to use more than 512 sequences in a single route-map used for PBR.


Conditions:
In PBR when a single route-map containing match and set statements attached at an interface.


Workaround:
Split the single route-map into multiple route-maps and try to use multiple route-maps instead of single route-map for PBR.


Further Problem Description:
When a single route-map containing more than 512 sequences is used for PBR, we bail out with an error. With the enhancement we can configure more than 2048 sequences in a single route-map.

Last Modified:
05-APR-2016
Known Affected Releases:
4.1(3), 6.1(1)S60, 6.2(8)S1
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(3)I3(1.11), 7.0(3)I3(2), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)CF(0.11), 7.2(0)D1(0.408), 7.2(0)D1(1), 7.2(0)FM(0.3)

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论