| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz72942 | Title: | mtc_usd service crashed |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: * | Symptom: mtc_usd service crashed on a Nexus 3k
Conditions: The issue can happen while executing a lengthy command, like "show tech" or something similar. The box crashes due to a heartbeat failure.
Workaround: Not known
Further Problem Description:
|
|
Last Modified: | 31-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A7(2) |
|
Known Fixed Releases: | 6.0(2)A8(0.3), 6.0(2)A8(1), 6.0(2)U8(0.3), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz20812 | Title: | N3500 as DR creates duplicates of IGMP GQs |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: When an IGMP query is received on N3500 acting as DR, two IGMP queries egress from switch instead of forwarding only one original query packet.
Conditions: N3500 acting as DR receiving IGMP general queries.
Workaround: There are no known workarounds
Further Problem Description: The Igmp GQ packet sent from igmp querier is being forwarded twice by 3500 and two copies are being received by PIM DR. The root-cause is that N3500 ASIC settings are being done to copy the query packet to cpu and forward the query packet normally as well. So, ASIC forwards one copy of packet normally and CPU egress the second copy after processing.
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A6(5), 6.0(2)A6(5.252) |
|
Known Fixed Releases: * | 6.0(2)A6(6.255), 6.0(2)A6(7), 6.0(2)A8(0.368), 6.0(2)A8(0.384), 6.0(2)A8(1), 6.0(2)U6(6.255), 6.0(2)U6(7), 6.0(2)U8(0.368), 6.0(2)U8(0.384), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv33390 | Title: | MSDP timers should match (S,G) state |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Currently in NX-OS, MSDP timers rely on the generation of Null-Registers on the RP to keep the SA state active. Even if the (S,G) expiry timer is increased and the source stops sending, the SA will eventually time out due to inactivity from the source as the Null-Registers will stop even though the (S,G) is still active.
Conditions: This is the default behavior in NX-OS.
Workaround: None.
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A4(3) |
|
Known Fixed Releases: * | 6.0(2)A6(6), 6.0(2)A7(2), 6.0(2)A8(0.334), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(6), 6.0(2)U8(0.334), 6.0(2)U8(0.337), 6.0(2)U8(1), 7.0(3)F1(0.228) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz19834 | Title: | NXOS is missing subnet check when considering new IGMP querier |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom:Layer 3 ip igmp querier ip address belongs to an ip in different subnet.
Conditions:Query received on a Vlan from a different Vlan with querier address belonging to a different subnet. Workaround:none More Info:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A6(5.252) |
|
Known Fixed Releases: * | 6.0(2)A6(6.256), 6.0(2)A6(7), 6.0(2)A8(0.384), 6.0(2)A8(1), 6.0(2)U6(6.256), 6.0(2)U6(7), 6.0(2)U8(0.384), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz46114 | Title: | RJ45 Port LEDs not up on N3172 TQ platform |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: First 48 RJ45 port LEDs are not working on Nexus N3172TQ
Conditions: Always
Workaround: None available
Further Problem Description:
|
|
Last Modified: | 05-MAY-2016 |
|
Known Affected Releases: | 7.0(3)I4(0.112) |
|
Known Fixed Releases: * | 7.0(3)I3(1.31), 7.0(3)I3(2), 7.0(3)I4(0.115), 7.0(3)I4(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz09640 | Title: | ERSPAN-Source with header-type 3 stops working after interface flap |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Captured traffic is no longer received on the ERSPAN destination device after an interface flaps on the ERSPAN source Nexus 3500 switch.
Conditions: ERSPAN-Source session configured with header-type 3 and IP reachability to the ERSPAN destination is done using a non-default VRF on a Nexus 3500 switch. The flapping interface has to be part of the interfaces configured in the monitor session.
Workaround: Shut/no shut on the ERSPAN-Source session can be used to temporary recover from this issue.
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A7(2) |
|
Known Fixed Releases: * | 6.0(2)A6(6.253), 6.0(2)A6(7), 6.0(2)A8(0.360), 6.0(2)A8(0.384), 6.0(2)A8(1), 6.0(2)U6(6.253), 6.0(2)U6(7), 6.0(2)U8(0.360), 6.0(2)U8(0.384), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy06002 | Title: | N3500 PTP process crash with SYSMGR_DEATH_REASON_FAILURE_SIGNAL (2) |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: A Nexus 3548 running 6.0(2)A1(1c) and newer version may crash in Precision Time Protocol (PTP)
Reason: Reset triggered due to HA policy of Reset System version: 6.0(2)A1(1c) Service: ptp hap reset
Conditions: normal operation
Workaround: unknown at this point
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A1(1c) |
|
Known Fixed Releases: * | 6.0(2)A6(6), 6.0(2)A7(2), 6.0(2)A8(0.334), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(6), 6.0(2)U8(0.334), 6.0(2)U8(0.337), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux86334 | Title: | Nexus 3500 January 2016 OpenSSH Vulnerabilities |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: * | Symptom: This product may include a version of OpenSSH that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2016-0777 and CVE-2016-0778
This bug has been raised to investigate the impact to this product.
Conditions: Device enabled with SSH client support.
Workaround:
Further Problem Description: Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 5.1/3.8
http://tools.cisco.com/security/center/cvssCalculator.x?version=2&vector=AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Last Modified: | 19-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A6(1) |
|
Known Fixed Releases: * | 6.0(2)A8(0.392), 6.0(2)A8(1), 6.0(2)U8(0.392), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuz32718 | Title: | N3500 mac-move counters do not work |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: N3500 mac-move counters do not work
Conditions: Enable MAC move notification,Trigger MAC loop detection.
Workaround: Working as expected.
Further Problem Description: Added timestamp info to identify the MAC move counters last increment & last reset of MAC move triggers delta.
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A6(5) |
|
Known Fixed Releases: | 6.0(2)A8(0.379), 6.0(2)A8(1), 6.0(2)U8(0.379), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux67091 | Title: | N3K BGP Slab message |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: When modifying BGP neighbors / attributes the logs below are being displayed
2015 Nov 5 17:23:03 TCLSW01 %BGP-3-SLAB_ERR: -Traceback: librsw.so+0x96c7f librsw.so+0x96f63 librpm_dll.so+0x29cba librpm.so+0x3e9c 0x81b8ca1 0x807765e 0x80894e8 0x808bacd 0x80b0129 librsw.so+0xcda28 librsw.so+0xcde66 librsw.so+0xcc2c2 librsw.so+0xcd6b6 librsw.so+0x9ea37 libpt* 2015 Nov 5 17:23:03 TCLSW01 %BGP-2-SLAB_LIB_SLAB_ELEM_ERR: Slab element Alloc PC: 0xab3848ad, Element index: 741 2015 Nov 5 17:23:03 TCLSW01 %BGP-2-SLAB_ELEM_ERR: -Traceback: librsw.so+0x96dd0 librsw.so+0x96f63 librpm_dll.so+0x29cba librpm.so+0x3e9c 0x81b8ca1 0x807765e 0x80894e8 0x808bacd 0x80b0129 librsw.so+0xcda28 librsw.so+0xcde66 librsw.so+0xcc2c2 librsw.so+0xcd6b6 librsw.so+0x9ea37 * 2015 Nov 5 17:23:03 TCLSW01 %BGP-3-SLAB_LIB_SLAB_ERR: Slab error [double free attempted] in RPM Prefix tree slab 2015 Nov 5 17:23:03 TCLSW01 %BGP-3-SLAB_ERR: -Traceback: librsw.so+0x96c7f librsw.so+0x96f63 librpm_dll.so+0x29cf7 librpm.so+0x3e9c 0x81b8ca1 0x807765e 0x80894e8 0x808bacd 0x80b0129 librsw.so+0xcda28 librsw.so+0xcde66 librsw.so+0xcc2c2 librsw.so+0xcd6b6 librsw.so+0x9ea37 libpt* 2015 Nov 5 17:23:03 TCLSW01 %BGP-2-SLAB_LIB_SLAB_ELEM_ERR: Slab element Alloc PC: 0xab38472f, Element index: 933 2015 Nov 5 17:23:03 TCLSW01 %BGP-2-SLAB_ELEM_ERR: -Traceback: librsw.so+0x96dd0 librsw.so+0x96f63 librpm_dll.so+0x29cf7 librpm.so+0x3e9c 0x81b8ca1 0x807765e 0x80894e8 0x808bacd 0x80b0129 librsw.so+0xcda28 librsw.so+0xcde66 librsw.so+0xcc2c2 librsw.so+0xcd6b6 librsw.so+0x9ea37 *
Conditions: When editing route-maps assigned to neighbors / deleting neighbor statements
Workaround: n/a
Further Problem Description: n/a
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U3(3.87) |
|
Known Fixed Releases: * | 6.0(2)A6(6), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(6), 6.0(2)U8(0.337), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux40440 | Title: | N3k - Unable to hardcode interface Duplex to Half with Speed 100 |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Unable to hardcore Duplex to Half on N3k Copper ports. Even with Speed 100, Duplex Half configured port comes up as Full Duplex
Conditions: Speed 100, Duplex Half configured
Workaround: Set speed to 100 with "negotiate auto" if peer side is hardcoded for speed 100 and Duplex Half, N3k negotiates to half duplex
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U6(4) |
|
Known Fixed Releases: * | 6.0(2)A6(5.189), 6.0(2)A6(6), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(5.189), 6.0(2)U6(6), 6.0(2)U8(0.337), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz00868 | Title: | N3k - service-reflect - Typo in show ip mroute sr command output |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Typo in sh ip mroute sr command
switch# sh ip mr sr IP Multicast Routing Table for VRF "default"
(10.5.44.10/32, 232.1.2.7/32), uptime: 20:34:24, static ip pim Tranlated Route Info : (205.203.107.1 , 232.1.2.7) Incoming interface: Ethernet1/21, RPF nbr: 10.8.252.201, uptime: 20:34:15 Outgoing interface list: (count: 1) loopback1, uptime: 20:34:24, static
Conditions: service-reflect is configured.
switch# sh run | i hard hardware profile multicast service-reflect port 22 switch#
The multicast service reflection feature is supported only on Cisco Nexus 3548-X platforms from Release 6.0(2)A6(1).
Workaround: none
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A7(1) |
|
Known Fixed Releases: * | 6.0(2)A8(0.384), 6.0(2)A8(1), 6.0(2)U8(0.384), 6.0(2)U8(1), 7.3(0)DG(0.3) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux05949 | Title: | Multipath unmarked when an update with different AS_PATH is received |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: When BGP multipath is enabled only a single path is installed to a destination even though the multipath flag should be set. In other words, you will only see one path in the routing table even though there should be more then one paths. BGP table will show no paths marked with the multipath flag
Nexus-1# show ip bgp 10.8.67.0/24 Path type: external, path is valid, received and used AS-Path: 65000 65001 65002 , path sourced external to AS 10.10.10.1 (metric 0) from 10.1.1.1 (10.173.253.71) Origin IGP, MED 0, localpref 100, weight 0
Path type: external, path is valid, received and used <== this path update, with different AS_PATH, triggered the unmarking of the other paths AS-Path: 65000 65005 65002 , path sourced external to AS 10.10.10.2 (metric 0) from 10.1.1.2 (10.173.253.64) Origin IGP, MED 0, localpref 100, weight 0 Path type: external, path is valid, received and used, is best path AS-Path: 65000 65001 65002 , path sourced external to AS 10.10.10.3 (metric 0) from 10.1.1.3 (10.173.253.66) Origin IGP, MED 0, localpref 100, weight 0
Conditions: Issue occurs after a path is introduced with different AS_PATH as the best path but the same length.
Workaround: Configure the following under the BGP process to avoid this issue.
bestpath as-path multipath-relax
Further Problem Description:
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U4(5) |
|
Known Fixed Releases: * | 6.0(2)A6(6), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(6), 6.0(2)U8(0.337), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy92412 | Title: | N3500 crashed during Regex configuration. |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: After regex configuration changes switch crashed with "vshd hap reset".
Conditions: Regex configuration changes.
Workaround: Not using regular expressions.
Further Problem Description: n/a
|
|
Last Modified: | 13-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A7(2) |
|
Known Fixed Releases: * | 6.0(2)A6(6.253), 6.0(2)A6(7), 6.0(2)A8(0.343), 6.0(2)A8(0.384), 6.0(2)A8(1), 6.0(2)U6(6.253), 6.0(2)U6(7), 6.0(2)U8(0.343), 6.0(2)U8(0.384), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy32907 | Title: | Prunes not sent for S,G from vpc non-forwarder causing duplicate traffic |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Prunes not being sent for S,G routes which causes S,G routes to have multiple OIF for S,G routes to both vpc peers. This cause duplicate multicast traffic to be received.
Conditions: Prunes not being sent for S,G routes which causes S,G routes to have multiple OIF for S,G routes to both vpc peers. This cause duplicate multicast traffic to be received.
Workaround: Following workarounds can be used to prevent duplication issue: 1. Configure "hardware profile multicast prefer-source-tree eternity" command on vpc devices 2. Configure "ip pim pre-build-spt" on vpc devices and Spine devices.
Further Problem Description:
|
|
Last Modified: | 11-MAY-2016 |
|
Known Affected Releases: | 7.0(3)I3(1) |
|
Known Fixed Releases: * | 7.0(3)I3(1.4), 7.0(3)I3(2), 7.0(3)I4(0.3), 7.0(3)I4(1), 7.0(3)IBL3(1), 7.0(3)IBL3(1.52), 7.0(3)IDM3(0), 7.0(3)IDM3(0.6) |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCux70771 | Title: | N3500 intf may get tx stuck indefinitely when span is used |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: No traffic will be sent out of the switch.
Conditions: hen the MTU size of the packet is greater than the MTU configured on VL 5, the buffer gets stuck at max and never releasing. This will not allow any traffic to go out of that port.
So now for VL5 configuring the MTU size as jumbo MTU size to avoid the stuck of the buffers.
Workaround: None
Further Problem Description:
|
|
Last Modified: | 31-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A7(1) |
|
Known Fixed Releases: | 6.0(2)A6(5.230), 6.0(2)A6(6), 6.0(2)A7(1.22), 6.0(2)A7(2), 6.0(2)A8(0.334), 6.0(2)A8(0.337), 6.0(2)A8(1), 6.0(2)U6(6.230), 6.0(2)U6(7), 6.0(2)U7(1.22) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuz82149 | Title: | Data Broker activation error due to quota |
|
Status: | Open |
|
Severity: | 3 Moderate |
Description: * | Symptom: while activating Data Broker error appears :
2016 May 16 14:03:25 switch %VMAN-2-VIRT_INST_DISK: Virtual Service [ndb_emb]::Disk reservation::Failed to reserve disk storage for virtual service::Disk storage request (400 MB) exceeds remaining quota (260 MB) on storage media
2016 May 16 14:03:26 switch %VMAN-2-ACTIVATION_STATE: Failed to activate virtual service 'ndb_emb' Disk storage request (400 MB) exceeds remaining quota (260MB) on storage media
Conditions: guestshell enabled
Workaround: disable guestshell: N3K(config)# guestshell destroy <<======== Disable guestshell
Further Problem Description:
|
|
Last Modified: | 30-MAY-2016 |
|
Known Affected Releases: | 7.0(3)I3(1) |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuy35718 | Title: | VXLAN: Ping fails when arp and mac is updated using vpc-peer link |
|
Status: | Terminated |
|
Severity: | 3 Moderate |
Description: | Symptom: If a ping is initiated to the attached hosts on VXLAN vlan from a VPC Vtep node, the source ip used by default will be the anycast ip configured on the SVI. This ping can fail to get a response from the host in case the response is hashed to the VPC peer node.
Conditions: This issue can happen when a ping is initiated from a VXLAN Vpc node to the attached hosts with using any unique source-ip
Workaround: Customers need to use unique source ip per vpc node when initiating a ping to hosts. This ensures that the icmp response packet will be routed back to this vpc node ensuring ping success.
Further Problem Description:
|
|
Last Modified: | 25-MAY-2016 |
|
Known Affected Releases: | 7.0(3)IDP3(1.126) |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux48252 | Title: | openflow flow not able to match on 0x0 ethertype |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Customers not able to match traffic on "all ethertypes" special value 0x0
Conditions: 6.0(2)A6(5) using openflow
Workaround: Specify explicit ethertypes
Further Problem Description:
|
|
Last Modified: | 24-MAY-2016 |
|
Known Affected Releases: | 6.0(2)A6(5) |
|
Known Fixed Releases: * | 6.0(2)A8(0.6), 6.0(2)A8(1), 6.0(2)U8(0.6), 6.0(2)U8(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuo88390 | Title: | Nexus 3k bcm_usd crash after parity error |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: * | Symptom: Nexus 3000 switch may reboot unexpectedly. Last reset reason is recorded as 'bcm_usd hap reset'.
`show system reset-reason` ----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) --- 1) At 369448 usecs after Tue May 6 16:49:37 2014 Reason: Reset triggered due to HA policy of Reset Service: bcm_usd hap reset Version: 6.0(2)U1(1a)
Conditions: The crash occurs while recovering from a parity error. This bug will not be seen if a parity error does not occur first.
Workaround: Not known at this time.
Further Problem Description:
|
|
Last Modified: | 20-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U1(1a) |
|
Known Fixed Releases: | 6.0(2)A3(3.77), 6.0(2)A3(4), 6.0(2)A4(0.805), 6.0(2)A4(1), 6.0(2)U2(10.103), 6.0(2)U2(11Z), 6.0(2)U3(3.77), 6.0(2)U3(4), 6.0(2)U4(0.805), 6.0(2)U4(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCur14636 | Title: | n3k: bcm_usd process not restarting after crash |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: * | Symptom: bcm_usd crashed and does not restart All interface counters all show zero even though switch is passing traffic w/o any performance impact Unable to bring up ports copy run start does not work and returns the following error (%SYSMGR-3-CFGWRITE_FAILED: Configuration copy failed (error-id 0x401E0003).)
There might be other symptoms but all the above were seen.
Conditions: This is seen is the bcm_usd process fails for some reason.
Workaround: Reloading the switch will force the bcm_usd process to restart.
Further Problem Description:
|
|
Last Modified: | 20-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U2(1), 6.0(2)U3(3.81) |
|
Known Fixed Releases: | 6.0(2)A3(3.83), 6.0(2)A3(4), 6.0(2)A4(1.23), 6.0(2)A4(2), 6.0(2)A5(0.924), 6.0(2)A5(1), 6.0(2)U2(10.102), 6.0(2)U2(11Z), 6.0(2)U2(5.87), 6.0(2)U2(6) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuh12177 | Title: | When none configured, show vtp password output should indicate so |
|
Status: | Terminated |
|
Severity: | 4 Minor |
Description: * | Symptom: With no VTP password configured, show vtp password output should be "The VTP password is not configured.".
Conditions: No VTP password set.
Workaround: None
Further Problem Description: NA
|
|
Last Modified: | 12-MAY-2016 |
|
Known Affected Releases: | 5.0(3)A1(2), 6.0(2)A1(1) |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuz70841 | Title: | Show Hardware command fails through Python shell |
|
Status: | Open |
|
Severity: | 4 Minor |
Description: | Symptom: 'show hardware' command fails intermittently when trying to pull the information through NXAPI and Python
Conditions: none
Workaround: none
Further Problem Description:
|
|
Last Modified: | 18-MAY-2016 |
|
Known Affected Releases: | 7.0(3)I2(2d) |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuy27018 | Title: | N3K: OSPF Graceful Restart function explanation on CCO |
|
Status: | Open |
|
Severity: | 5 Cosmetic |
Description: | It is document bug.
Symptom: Current N3K doesn't support Graceful Restart function, but CCO configuration document said it support. At this time, CCO configuration document is wrong. But in the future, if N3K is going to support Graceful Restart function, it should be back on CCO documentation.
Conditions: CCO configuration document bug.
Workaround: Check and correct CCO configuration document.
Further Problem Description: The Graceful Restart function is requested to support by CSCut42024. It is customer request from Field. We hope to add this function into N3K.
|
|
Last Modified: | 25-MAY-2016 |
|
Known Affected Releases: | 5.0(3)U5(1g) |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuq21095 | Title: | Akamai: Camden 2.4/D++ N3000 need to support snmp dot1qTpFdbTable |
|
Status: | Fixed |
|
Severity: | 6 Enhancement |
Description: | Symptom: snmpwalk on dot1qTpFdbTable returns error SNMPv2-SMI::mib-2.17.7.1.2.2 = No Such Object available on this agent at this OID
Conditions: snmpwalk on dot1qTpFdbTable
Workaround: No workaround
Further Problem Description: dot1qTpFdbTable does not seem to be currently supported.
|
|
Last Modified: | 28-MAY-2016 |
|
Known Affected Releases: | 6.0(2)U4(0.841) |
|
Known Fixed Releases: * | 7.0(3)I2(3.5), 7.0(3)I2(4), 7.0(3)I4(1.8), 7.0(3)I4(2) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCtz45314 | Title: | RACL deny for CPU destined packets does not work for PACL (Port ACL) |
|
Status: | Open |
|
Severity: * | 6 Enhancement |
Description: | Symptom:
Packets bound to CPU that are denied by ACL are not dropped, when applied as PACL (port ACL) on L2 interfaces. This issue is seen only for CPU bound traffic. Transit traffic will be denied correctly.
Workaround:
Apply the ACL as a RACL on the L3 Vlan (SVI) interface, and enable the global command ip access-list match-local-traffic. This would enable denying CPU bound traffic too.
|
|
Last Modified: | 24-MAY-2016 |
|
Known Affected Releases: | 5.0(3)U3(1) |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论