Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -ASR 1000 Series Router-01-Jul-2015 16:48 GMT

 

 

 

 

 

 

 


Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1001-universalk9_npe_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001-universal.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1001-universalk9_npe.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1001-universal.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL W/O LI

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Release Version:
3.15.1S
Alert Type:
New File
File Name:
asr1001-universal.03.15.01.S.155-2.S1-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_noli.03.15.01.S.155-2.S1-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL W/O LI

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe.03.15.01.S.155-2.S1-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9.03.15.01.S.155-2.S1-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe_noli.03.15.01.S.155-2.S1-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
30-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.03.11.04.S.154-1.S4-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.03.11.04.S.154-1.S4-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.03.11.04.S.154-1.S4-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9.03.11.04.S.154-1.S4-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE - ENCRYPTION UNIVERSAL

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universal.03.11.04.S.154-1.S4-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universal.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
3.15.1S
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL W/O LI

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universal.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
30-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.02.S.155-1.S2-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.02.S.155-1.S2-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Release Version:
3.11.4S
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.11.04.S.154-1.S4-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
06-JUN-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.11.04.S.154-1.S4-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
06-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
asr1001x-universalk9_noli.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universal.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe_noli.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
02-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe.03.14.02.S.155-1.S2-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
02-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Release Version:
3.15.1S
Alert Type:
New File
File Name:
asr1001x-universalk9_npe_noli.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_noli.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL W/O LI

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universalk9.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL

File Release Date:
30-JUN-2015
Alert Type:
New File
File Name:
asr1001x-universal.03.15.01.S.155-2.S1-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
30-JUN-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Alert Type:
 
 
Previously Suggested:
 

Find additional information in Software Downloads index.

Known Bugs - ASR 1000 Series Aggregation Services Routers

Bug Id:
CSCus46259
Title:
ASR1k (ISG Radius-Proxy): Memory Leak after excessive client roaming
Description:

Symptom:
The memory leak increase slowly during client roaming. Meaning a client roams on a hotspot from Subnet A to B and receives a new IP-Address and the ISG (ASR1k with radius-proxy feature enabled) creates a new session for the client and the old session is deleted due to accounting stop.

Conditions:
Radius-Proxy feature is enabled on the ISG and clients are using EAP-SIM

Workaround:
None. Booting the ASR1k if he used up 3.5GB of memory otherwise the box won't accept any furhter new sessions.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
15.3(3)S3, 15.4(3)S
Known Fixed Releases:
15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.3, 15.5(1.18)S0.12, 15.5(2)S, 15.5(2.12)S
Bug Id:
CSCus28745
Title:
POS FRR issue with traffic loss around 1 sec instead of 50ms
Description:

Symptom:
Traffic loss of around 1 sec.

Conditions:
1) "pos action b3-ber prdi" must be configured on one of the interfaces and path level B3 errors are introduced on that interface to such an extent that B3 TCA alarm is asserted.
2) POS FRR should be configured.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
15.3(3)S3.1, 15.3(3)S3.10
Known Fixed Releases:
15.3(3)S5.1, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S2.1, 15.4(3)S3, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.8, 15.5(2)S
Bug Id:
CSCup48518
Title:
FTP ALG create incomplete token in case of EPSV passive
Description:

Symptom:
FTP ALG create incomplete token in case of EPSV passive

Conditions:
nat+FW+FTP EPSV

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCty05282
Title:
Last reload reason is seen as LocalSoft on ASR1ks
Description:

Symptoms: Last reload reason in "show version" output is seen as LocalSoft
after some reloads.

Conditions: The conditions under which these symptoms are observed is unknown.

Workaround: There is no workaround.


Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
12.2(33)XNC0d, 15.1(1)S1, 15.3(2)S
Known Fixed Releases:
15.2(4)S1, 15.3(1)S
Bug Id:
CSCsv87997
Title:
DHCPv6 relay: IOSd crash on Active RP
Description:

Symptom:
DHCPv6 relay process crash on Actice RP.

Conditions:
Unknown at this time.

Workaround:
Unknown at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(32.8.11)SR179, 12.2(32.8.6)REC177, 12.2(32.8.6)REE177, 12.2(33)CX, 12.2(33)IRF, 12.2(33)IRG, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16
Bug Id:
CSCuq85985
Title:
ASR1K:ESP80, 100, 200 crash on SSO when FRF.12 enabled on MFR bundle
Description:

Symptom:
Crash of both active and standby ESP. Applies to ESP80, 100, and 200.

Conditions:
Updating the bandwidth of an active MFR bundle member-link. A bandwidth update will be sent from the RP to the FP if the FMAN-RP and FMAN-FP have different bandwidth values for the same link. This occurs immediately after boot if the startup-config has MFR member-links configured with FRF.12 fragmentation (active RP and standby RP will boot with different bandwidths, so that on switchover the standby RP will send a bandwidth update to the FP). Other situations that can lead to the bandwidth mismatch include adding/removing links to an MFR bundle with FRF.12 enabled and adding/removing FRF.12 from a main MFR interface prior to performing a switchover.

Workaround:
None. Normal router operation and configuration can lead to this crash such that there are no viable workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.4(3)S2.18, 15.4(3)S3, 15.5(1)S0.3, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S, 15.5(2)S
Bug Id:
CSCte89787
Title:
Segment Switch manager Error followed by crash at 'sw_mgr_sm_cm_send_msg
Description:

Symptoms: A Cisco ASR 1000 crashes after the Segment Switch Manager (SSM)
reports that an invalid segment has been detected:

%SW_MGR-3-INVALID_SEGMENT: Segment Switch Manager Error - Invalid segment - no
segment class.

The crash follows this message.

Conditions: The symptom is observed on a Cisco ASR 1002 that is running Cisco
IOS Release 12.2(33)XND1. The crash is caused by a NULL pointer de-reference
following the "no segment class" error. The error itself is not fatal and the
crash should have been avoided.

Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(32.8.11)SX349, 12.2(33)SXI10, 12.2(33)SXI11, 12.2(33)SXI12, 12.2(33)SXI13, 12.2(33)SXI14, 12.2(33)SXI4, 12.2(33)SXI6, 12.2(33)SXI8a, 12.2(33)SXJ
Bug Id:
CSCuu66754
Title:
ASR1001 Drops Interface Traffic as Overruns
Description:

Symptom:
ASR1001 may drop all control plane traffic and interface stops responding to ICMP. In the problem state, the overruns counter and Output Pause frames will keep incrementing on the interface

DUTt#show interface gig 0/0/2 | in input error
1875404 input errors, 0 CRC, 0 frame, 1875404 overrun, 0 ignored

DUTt#show interface gig 0/0/2 | in pause
0 watchdog, 0 multicast, 0 pause input
0 lost carrier, 0 no carrier, 87054602 pause output

Conditions:
None

Workaround:
Reload the box to recover from the problem state.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCus51697
Title:
BDI not working correctly on ipbase license
Description:

Symptom:
ASR unable to initiate ping from BDI, it doesn't seem to populate Bridge-Domain with MAC entry.

If you initiate traffic to the ASR from the directly connected device, entry gets populated and ASR is able to initiate traffic from the BDI until MAC times out.

Conditions:
BDI running on ASR with IP Base License.

Workaround:
Move to advipservices or adventerprise license.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(3)S1.1
Known Fixed Releases:
15.4(2)S3, 15.4(3)S3, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCuq10904
Title:
ISR4331:MMA perf-mon out-of-order in punted packets
Description:

Symptom:
The customer will see warning messages on the console that look like "%PERF_MONITOR_RESOURCE-1-RM_SET: RESOURCE EVENT RAISE" and "%PERF_MONITOR_RESOURCE-1-RM_CLEAR: RESOURCE EVENT CLEAR".

Conditions:

Workaround:
There is no known workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.5(1)S2, 15.5(2)S
Bug Id:
CSCut41684
Title:
ASR 1K crash due to CCM_ACK interupt
Description:

Symptom:
FP reloads with the core file reporting:
GIM_CSR32_GIM_ERR_CCM_NOACK_LEAF_INT__INT_GIM_HPI_CCM_ACK_ERR
interrupt.

Conditions:
This issue only applies to ASR1001-X, ASR1002-X, ESP100 and ESP200. To hit this issue, three rare conditions internal to the QFP forwarding engine have to be present at the same time. These conditions are influenced by which features are configured, instantaneous traffic characteristics, as well as instantaneous processing load on the QFP. It is very, very rare for these conditions to occur.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCus71003
Title:
ASR1002-X - Kernel crash - general protection fault
Description:

Symptom:
ASR1002-X reloaded due to kernel crash.

Conditions:
Unknown at this moment

Workaround:
Unknown at this moment

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases:
15.4(3)S3
Bug Id:
CSCuu12008
Title:
rework CSCut21885: chunk_destroy memory leak.
Description:

Symptom:
fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory

show platform software memory forwarding-manager FP active brief
show platform software memory qfp-control-process qfp active brief

QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578
Summary 4262097059 4221917059 81523186 79011936

AL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)

RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 3076255744
cpp_cp_svr 28858 28431 28858 S 20 1849511936
fman_rp 21120 20336 21120 S 20 1452556288

4+ weeks later:

RAL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)


RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 4294967295
cpp_cp_svr 28858 28431 28858 S 20 2942447616
fman_rp 21120 20336 21120 S 20 1462714368

Conditions:
PfR is enabled and activated.

Workaround:
Avoid using PfR

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(2)S1
Known Fixed Releases:
Bug Id:
CSCus75546
Title:
mcp_dev hw_dcache invalidates too many dTLBs
Description:

Symptom:
Crash due to dTLB miss

Conditions:
Under extremely rare conditions where threads on the same processing core have both opened virtual windows, one thread may accidentally invalidate a dtlb entry associated with another threads virtual window.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.5(1)S2
Bug Id:
CSCus70057
Title:
Obsolete OTV route entries not deleted from TCAM
Description:

Symptom:
Under multihoming scaling topology(1000 vlans, 50 overlay interfaces), sometimes the obsolete OTV entries of some vlans have not been deleted so that incoming packet will hit these entries and lead to packet drop with drop reason "Layer2NoRoute" and "EvcEfpEgressFilterDrop"

Conditions:
Multihoming OTV, high scaling

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(3)S1.11
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCut03813
Title:
ASR1K ucode crash seen at mpls_icmp_create
Description:

<B>Symptom:</B>
ASR 1000 may experience an ESP ucode crash causing network outage in non-redundant setup

<B>Conditions:</B>
currently observed on ESP100 and ASR1002-X with deployments having MPLS, IPv6 and NAT configured.

<B>Workaround:</B>
None at this point.

<B>Further Problem Description:</B>
On ESP40, instead of crash, you may see following error message-
%NAT-6-ADDR_ALLOC_FAILURE:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.2(4)S5.1, 15.4(3)S
Known Fixed Releases:
15.4(3)S3
Bug Id:
CSCum04325
Title:
Duplicate entry seen in "sh lldp neighbor"
Description:

Symptom:
Duplicate entry seen in "sh lldp neighbor"

Conditions:
if the physical link is a member of a etherchannel bundle. lldp packets are processed on the bundle UIDB.

Workaround:

Further Problem Description:
Solution:
if the physical link is a member of a etherchannel bundle. lldp packets are processed on physical link UIDB instead of the bundle UIDB.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCut56117
Title:
ASR NAT timeouted out sessions not cleared.
Description:

Symptom:
Some times ASR NAT timeouted out sessions may not be cleared.

Conditions:
This problem seems to happen when NAT is enabled and certain type of ALG packets are sent.

Workaround:
Work around for this issue is run the CLI clear ip nat * periodically.

Further Problem Description:
Some times ASR NAT timeouted out sessions may not be cleared.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)S5.1
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCus60838
Title:
ASR1K:FP200:cpp_svr core on deleteing policy-map
Description:

Symptom:
cpp_svr core detected.

Conditions:
On deleting policy-map

Workaround:
-

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCut41061
Title:
ESP crash with monitor capture and debug platform-trace
Description:

Symptom:
Router crash with conditional debugging

Conditions:
This issue is seen when conditional debug is configured for all the interfaces
and interfaces are dynamically created/deleted in large number.

Workaround:
Conditional debugging should not be used if lot of interfaces are created/deleted
dynamically.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)S3
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCuu55787
Title:
ASR1001-X: Router fails to come online with No Service Password Recovery
Description:

Symptom:
Router fails to come online after attempting to return to factory defaults with "No Service Password Recovery" enabled.

Conditions:
ASR1001-X with No Service Password Recover enabled. An attempt to send a to the ROMMON followed by answer "Y" to
Do you want to reset the router to the factory default
configuration and proceed [y/n] ?

Workaround:
Do not enable No Service Password Recovery
or
Do not attempt to return router to factory defaults after having done so

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCut68598
Title:
ASR1k BFD randomly down at NAT configured interface
Description:

Symptom:
ASR1k BFD randomly down at NAT configured interface

Conditions:
At ASR1k's BFD interface, NAT is also configured

Workaround:
None at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)S2.1, 15.5(2)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCus53146
Title:
ASR crashes at hal_get_next_packet
Description:

Symptom:
ASR crashes every night.

Conditions:
An FNF IPv6 monitor is configured on the interface with AS fields. The crash happens in context of dropped packets, so it probably relates to certain specific network conditions which result in dropping of relevant packets.

The issue isn't necessarily related specifically to IPv6, and can probably happen in relevant conditions in case of IPv4 as well.

Workaround:
Disable the relevant monitot/s with AS fields.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(3)S0.9
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCuc82634
Title:
ASR1K ESP: Allow the ESP cards to come up when Crypto complex does not
Description:

Symptom:
Some ESPxx cards ( ESP10/20/40 ) fails to come up as a result of a multi-bit memory failure in crypto device.

Conditions:
ESP10/20/40 cards on ASR1k during power hard reset

Workaround:
None

Further Problem Description:
This fix will let the card come up fine even though the encryption chip will not come up. Card can still be used for all other functions if ipsec feature is not licensed/used.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.4(1)S, n/a
Known Fixed Releases:
15.2(4)S2.11, 15.2(4)S3, 15.2(4)S3a, 15.3(1)S1.2, 15.3(1)S2, 15.3(1.11)S, 15.3(2)S
Bug Id:
CSCuu16709
Title:
$$SS MACsec Interop between Nightster and Overlord fails.
Description:

Symptom:
MACsec encryption between ISR 4451 and ASR 1001-X may fail.

Conditions:

Workaround:
Issue macsec/no macsec on the interface

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuh18824
Title:
XE3.10-ST: AFW Crash with contact center callflow load test
Description:

RNE Enclosure

Symptom:
cube crashed

Conditions:
normal condition

Workaround:
none

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
Bug Id:
CSCur57035
Title:
ASR 1k crash on __be_bfd_fib_nh_change_cb
Description:

Symptom:
IOS crash

Conditions:
ASR running 15.3(1)S1 with bfd

Workaround:
none at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.3(1)S1
Known Fixed Releases:
15.3(3)S4.16, 15.3(3)S5, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.14, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)SN1, 15.5(1.21)PI28a
Bug Id:
CSCuo72961
Title:
ASR1K:%FMFP-3-OBJ_DWNLD_TO_CPP_FAILED: F1: fman_fp_image: Batch type
Description:

Symptom: An error message is logged in during QoS configuration during an FPM test.
Conditions: This symptom occurs due to a policy with FPM class.
Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.3(2)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1)IC273.77, 15.2(1)ICA4.30, 15.2(2)DB101.101, 15.2(2)DB101.112, 15.2(2)E
Bug Id:
CSCuq77051
Title:
out of ids when configuring xconnect
Description:

Symptom:
Attempting to create or modify a xconnect context using the command
l2vpn xconnect context command may fail with the
error message:

%IDMGR-3-INVALID_ID: bad id in id_get (Out of IDs!) (id: 0x0)

Conditions:
This symptom has been observed after entering and exiting xconnect
context sub-modes many times (over 65000) over an extended period of
time.

Workaround:
There is no workaround. Once this error occurs, the router must be
reloaded.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.3(3)S4.2, 15.3(3)S5, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.6, 15.5(0.22)T
Bug Id:
CSCus85852
Title:
CPP DRV: Disable IIC Interrupts (Revert CSCuq05197)
Description:

Symptom:
ESP crash occurs after one of the following interrupts are reported (can be seen on the IOS console):
HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED64
HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED65

Conditions:
Router configuration or traffic pattern does not affect this problem. This issue occurs if a data parity error is reported in the QFP L2 instruction cache controller, and impacts all CPP10-based ESPs (asr1001, asr1002, ESP5, ESP10, ESP20, ESP40). This issue does not impact Yoda (asr1002-x, ESP100, ESP200) or Luke (asr1001-x) based ESPs.

Workaround:
None. Almost all data parity errors are random events that can not be fixed by replacing hardware.

Further Problem Description:
The exception handler for the L2 instruction cache handler is restored / fixed in the following releases:
XE310 / 15.3(3)S6
XE312 / 15.4(2)S3
XE313 / 15.4(3)S3
XE314 / 15.5(1)S2

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.4(2)S3, 15.4(3)S3, 15.5(1)S2, 15.5(2)S
Bug Id:
CSCuu60301
Title:
ESP100 crash because of hardware interrupt
Description:

Symptom:
ESP/QFP crash on ASR1k running as LNS

Conditions:
No known trigger

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.4(3)S2.16
Known Fixed Releases:
Bug Id:
CSCuu37200
Title:
SC install fails after link re-route
Description:

Symptom:
SC install fails after link re-route happens in the network

Conditions:
SC install fails after link re-route happens in the network.

Workaround:
issue no macsec/macsec to recover SC's.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
15.4(3)SS
Known Fixed Releases:
Bug Id:
CSCut34273
Title:
ASR1K, "unknown" process leak under cpp_cp_svr
Description:

Symptom:
on ASR1K, we may observe memory leak on the ESP under "cpp_cp_svr"

from "show platform software process list f0 sort memory"

Name Pid PPid Group Id Status Priority Size

cpp_cp_svr 7140 6694 7140 S 20 812957696 <<< the size here keep increasing.

and from "show platform software memory qfp-control-process qfp active brief" we see "unknown" is increasing.

module allocated requested allocs frees

unknown 219295960 131577576 10964798 0

Conditions:
This is first observed on ASR1K running 15.4(1)S with WCCP enabled.
The leak could be triggered by WCCP statistic update

Workaround:
do FP switch-over or router reload will clear the memory used, but the memory leak will still exists

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCun27206
Title:
ESP in F1 crashed pointing to multicast
Description:

Symptom:
ESP crashed

Conditions:
Inner multicast fragments with well-known multicast address

Workaround:
From our test, Disabling MLRE( an internal feature to improve mcast performance for big packets on ESP40/ESP100/ASR100-X) )
asr1k-dev-1006-5#set platform hardware qfp active feature multicast v4mcast lre off

The workaround has no functional impact and only some performance impact(Eg. multicast performance from 30G to 20G, like that,not accurate)
So if we don't have a high multicast throughput, this can be used a workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.2(2)S1
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCut50228
Title:
ASR1001-X ping loss with peer ASR1k at fixed speed 10M
Description:

Symptom:
ASR1001-X ping loss with peer ASR1k at fixed speed 10M and half-duplex

This issue is specific to ASR1001-X and will not be seen in ASR1001

Conditions:
Only half-duplex could trigger this issue when ping big packet like 1280
and could be seen at the setup below:

1)ASR1001-X (0/0) <---> other ASR1k
2)ASR1002-X (0/0) <---> ASR1002-X (0/0)
3)ASR1002-X (0/0) <---> other ASR1k

For 1) this bug will fix it.
For 2) ASR1002-X 0/0 MAC does not support half-duplex in 10/100M
3) same as 2

Workaround:
None

Further Problem Description:
This issue is specific to ASR1001-X box with half-duplex in any other 1G ports of 0/0 "only"

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S2.1
Known Fixed Releases:
15.4(3)S2.16, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2)S0.8
Bug Id:
CSCuu36411
Title:
ASR1k - 16k Policy-Map - active RP crash with 10k PM
Description:

Symptom:
active RP crash when more than 10 K Policy-maps are installed

Conditions:
scale testing: 15 K ppp sessions with 10 K policy-maps

Workaround:
n/a

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCum90509
Title:
No RTP Connections for RSVP Features in XE3.7 image
Description:

Symptom: No RTP Connections for RSVP Features in Cisco IOS Release XE3.7 image.
Conditions: This symptom is observed Only for RSVP call.
Workaround: Use the version where CSCuj58299 not integrated.

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.2(4)M5.6, 15.2(4)S4.21
Known Fixed Releases:
15.2(4)GC3, 15.2(4)M6.2, 15.2(4)M6a, 15.2(4)M6b, 15.2(4)M7, 15.2(4)S5.5, 15.2(4)S6
Bug Id:
CSCuo36917
Title:
XE3.12 DPSS : CFT returns out of memory error under load
Description:

Symptom:
When handling greater than 50000 concurrent flows, the following error is seen by dpss_mp:

src/main/onep_dpss_engine.c:1482: cft_handle_packet() returned error [2]:out of memory

Packets associated with flows greater than 50000 do not have the flow action applied and are returned to the router without being sent to the onePK application.

Conditions:
- ASR 1000 platform running IOS XE
- More than 50000 uni-directional flows established

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.2(1)IC273.212, 15.2(3)E1, 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.5, 15.5(1.8)T, 15.5(2)S, 15.5(2.2)S, 7.0(3)I1(0.198)
Bug Id:
CSCus43594
Title:
rp crash when cleanup vpls scale configuration
Description:

RP crashed when doing config replace with a cleanup config.

Symptom:

Conditions:
Scale vpls bgp signaling config.

Workaround:
No.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.3(3)S5.1, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S2.1, 15.4(3)S3, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1)T1.1, 15.5(1)T2
Bug Id:
CSCul35389
Title:
1RU: %SERVICES-3-NORESOLVE_ACTIVE causing occasional mcpcc-lc-ms crash
Description:

Symptom:
Following error messages re observed with SPA reload
==================================================================

Nov 26 2013 15:14:31.496 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP
Nov 27 2013 17:31:42.464 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP

The process mcpcc-lc-ms is held down and the SIP is reloaded.

Logs may also be flooded with these errors:

12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0

Conditions:
Error are observed when SPA is reloaded

Workaround:
NA

Further Problem Description:
The error messages are caused due to IOS trying to establish a connection with a non-existing process on ASR1001.As a result of these error messages, we are observing a SIP reload (mcpcc).The issue is observed in XE311 (ASR1001 and possibly ASR1002-X).

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.4(1)S, 15.4(2)S, 15.4(3)S, 16.0(0)
Known Fixed Releases:
15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.4(1)S0.3, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1.16)S, 15.4(2)S, 15.4(2)S1
Bug Id:
CSCuu36031
Title:
Kernel crash is related to a GPF related to memory corruption.
Description:

Symptom:
Unexpetced reboot

Conditions:
Router rebooted itself and no changes has been made.

Workaround:
NA

Further Problem Description:
This is a MPLS router in a data center multiple connections depend on this connection. Over 12 devices paged down when this happened.

Status:
Terminated
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
15.2(4)S5.1
Known Fixed Releases:
Bug Id:
CSCum41815
Title:
L2TPv3 session pending between ASR1k and ISR
Description:

Symptom: L2TPv3 session between ASR1k and ISR is stuck at pending state, wiccn and wicrp respectively. Depending on the tiebreaker result, the tunnel session might come up after 10 minutes or not.
Conditions: The problem is seen when an ASR1k (or any S-train) router is connected to ISR (or any T-train) router, and the ASR1k router is first configured with L2TPv3 tunnel then the ISR router is configured.
Workaround: Perform the following workaround:
1. If use configured dynamic l2tpv3 tunnel, configure the ISR router first then configure the ASR1k router.
OR
2, Use static l2tpv3 session to avoid the tunnel signal lost issue. The corresponding configuraton sample:
PE1:
pseudowire-class fixid
encapsulation l2tpv3
protocol none
ip local interface Loopback0
connect atmb Serial0/1/0 100 l2transport
xconnect 2.2.2.2 100 encapsulation l2tpv3 manual pw-class fixid
l2tp id 102 102
l2tp cookie local 4 102
l2tp cookie remote 4 102

PE2:
pseudowire-class fixid
encapsulation l2tpv3
protocol none
ip local interface Loopback0
connect atmb Serial0/0/0 200 l2transport
xconnect 1.1.1.1 100 encapsulation l2tpv3 manual pw-class fixid
l2tp id 102 102
l2tp cookie local 4 102
l2tp cookie remote 4 102

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
15.4(1.1)T, 15.4(2.13)T
Known Fixed Releases:
15.4(1)T1.1, 15.4(1)T2, 15.4(1)T3, 15.4(1.25)T, 15.4(2)T0.1, 15.4(2)T1, 15.4(2)T2, 15.4(2.20)T, 15.4(3)M, 15.4(3)M1
Bug Id:
CSCtj47922
Title:
RLS33: %PLATFORM-4-ELEMENT_WARNING: R1/0: smand: SIP/0: Committed Memor
Description:

Symptom:
Following messages are noticed on a ASR1k having 4 SPAs in a single SIP10.

Oct 3 21:09:25.083 CEST: %PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0:Committed Memory value 96% exceeds warning level 95%
!
Oct 4 22:10:19.411 CEST: %PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0:Committed Memory value 96% exceeds warning level 95%
!

Conditions:
This issue is more likely to occur when a SIP has many SPAs.

Workaround:
NA

Further Problem Description:
Warning logs are totally cosmetic and miscalculation by SIP.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.0(1)S, 15.1(0.18)S0.9, 15.1(2)S
Known Fixed Releases:
15.0(1)S3, 15.1(1)S, 15.1(2)S
Bug Id:
CSCum73773
Title:
NAT: QFP crash when ip nat setting CGN is removed with 40CPS
Description:

Symptom:
QFP crash

Conditions:
remove ip nat setting mode and run "sh pl hard qfp ac statistics drop"

Workaround:
no

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.3(3)S, 15.3(3.3)S3
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S
Bug Id:
CSCuu56477
Title:
TenGi IF and channel down when doing "redundancy force-switchover"
Description:

Symptom:
did "redundancy force-switchover" on ASR1K (2RP) caused TenGigabitEthernet IF and port-channel down.

Conditions:
none

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCud31634
Title:
XE38 Yoda BQS crash on during MLPPP link removal
Description:

Symptom:

ASR1K 2RU-VE or ASR1K with FP100 may encounter a Ucode and cpp_cp_svr crash when links are removed from a active MLPPP bundle with traffic.

Hardware interrupts that may appear in the console output include:

PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_STEM_CB_SEL_INV_ERR
PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_BRANCH_CB_SEL_INV_ERR
QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR1
QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR2
QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR3

Conditions:

ASR1K 2RU-VE or ASR1K with FP100 may encounter a Ucode and cpp_cp_svr crash when links are removed from a active MLPPP bundle with traffic. Failure is not consistent and is more prevalent with active traffic to the MLPPP bundles.

Workaround:

None

Status:
Other
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
Bug Id:
CSCua10556
Title:
crypto ikev2 sa stuck in delete state
Description:

Symptoms: A few IKEv2 SAs get stuck in delete state.

Conditions: The symptom is observed when bringing up 2k flex sessions.

Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.1(1)SY, 15.1(1)SY1, 15.1(1)SY2, 15.1(1)SY3, 15.1(1)SY4, 15.1(2)SY, 15.1(2)SY1, 15.1(2)SY2, 15.1(2)SY3, 15.1(2)SY4
Bug Id:
CSCut65374
Title:
PTP Leap Second: ASR1002-X incorporate leap second addition 6/30/15
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time. The leap second event can be propagated via Precision Time Protocol (PTP) if configured.

When the leap second update occurs and the device is configured to use PTP as a Boundary Clock (BC) then an incorrect Coordinated Universal Time (UTC) offset and PTP Leap Indicator could propagate incorrect time downstream. This could cause the PTP network time to be off as much as thirty five seconds.

Conditions:
The leap second update is propagated from the configured PTP Grandmaster clock.

A Cisco device running the PTP protocol would have the "feature ptp" command in the running configuration.

Workaround:
For this problem of the incorrect PTP UTC offset and Leap Second update flag for Cisco devices configured as a PTP boundary clock the following workaround can be used:

1. Increase the Time To Live (TTL) on the IPV4 multicast PTP frames from the PTP Grand Master clock from the default of one (1) to something higher than the number of multicast hops the PTP packets would have to traverse in the network to reach the Cisco device.

2. Disable PTP on the affected cisco devices configured as PTP boundary clocks.

3. If the now disabled Cisco devices configured as a PTP boundary clock supports Internet Group Management Protocol (IGMP) snooping then nothing additional is required.
If the device does not support IGMP snooping then static multicast Content Addressable Memory (CAM) entries would need to be created for the devices downstream which need the PTP frames from the PTP Grand Master clock.

If this workaround cannot be implemented than an upgrade is recommended.

Further Problem Description:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCud14945
Title:
XE3.8 dCM IPSec tunnel bring up time is much longer compared to XE3.7
Description:

-- Release-note --

Symptoms: IPv4 IP Security (IPSec) tunnel bring up time is taking longer in
dynamic crypto-map deployment.

Conditions: This symptom is observed on a Cisco ASR1000 series router when
functions as an IPSec termination and aggregation router, and when dynamic
crypto-map technology is deployed.

The tunnel setup rate is measured in the setup of:
(1) key negotiation utilizing Internet Key Exchange version 1 (IKEv1).
(2) single dynamic crypto-map configuration on one input interface.
(3) 8000 IPSec tunnel end-to-end connectivities. That is, data traffic is
able to flow through all 8000 IPSec dynamic tunnels.
And compares with previous release, IOS-XE 15.2(04)S.

Workaround: there is no workaround for this particular deployment.

Status:
Terminated
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
Bug Id:
CSCuc13500
Title:
CPP Crashes seen on Active and Standby FP following RP switchover
Description:








Symptom:
ESP with scaled configuration may crash during RP switchover







Conditions:
This problem happens if user configure more than supported/published scaled limits





Workaround:
Configure the router within supported limits.




Further Problem Description:













Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
3.6(6.0)
Known Fixed Releases:
15.2(4)S1
Bug Id:
CSCud42197
Title:
ASR1K_XE39: map-request is not getting to LISP conctrol process
Description:

Symptom:
map-request is missing in xTR
Conditions:
cli lig self all
Workaround:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.3(1)S, 15.3(2)S
Known Fixed Releases:
15.3(2)S
Bug Id:
CSCur31425
Title:
ASRNAT: PPTP ALG: Incorrect UNNAT of Peer-Call-ID in Outgoing-Call-Reply
Description:

Symptom:
ASR1k PAT may not function properly for PPTP. PPTP control connection is not established.

Conditions:
This was first found in XE3.10.3. The sequence of events which can lead to this failure:

- PPTP ALG is disabled;
- PPTP clients try to connect, but fail;
- PPTP ALG is enabled with "ip nat service pptp";
- PPTP clients are still unable to connect to PPTP server.

Workaround:
Use "clear ip nat translations *" after enabling PPTP NAT ALG.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUN-2015
Known Affected Releases:
15.3(3)S3, 15.4(2)S, 15.4(3)SS
Known Fixed Releases:
15.4(3)S3
Bug Id:
CSCty54702
Title:
FP crash in aom_update when doing RP Switchover with ISG sessions
Description:

Symptom:

ASR1K ESP crash.

Conditions:

FP reload might be occured while RP switchover if SNMP enabled.

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUN-2015
Known Affected Releases:
15.2(2)S, 15.2(4)S
Known Fixed Releases:
15.2(2)S
Bug Id:
CSCut68825
Title:
PFRv3: unexpected byte loss reported due to TCP packet flow out of order
Description:

Symptom:
Current TCP BYTES LOSS metric's implementation assumes there is no tcp packet reordering. Thus in case of reordering the loss is reported.

Conditions:
TCP packets' reordering.

Workaround:
Prevent TCP packets' reordering.

Further Problem Description:
Given customer's network contains the equipment from different vendors preventing reordering is not always feasible. The metric should handle the out of order cases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
15.4(3)S2.3, 15.5(2)S0.1
Known Fixed Releases:
15.4(3)S3
Bug Id:
CSCuf25027
Title:
DROP in performance with Full AVC config + Ipsec
Description:

Symptom:
Substantial drop of performance. High latency and packets drops.
Conditions:
Router is configured with full AVC config (NBAR,ART,QoS) and Ipsec. This issue will be seen with high traffic (more than 500mbps). Packet drops can be verified by issuing this command.
show platform hardware qfp active statistics drop clear
-------------------------------------------------------------------------
Global Drop Stats Packets Octets
-------------------------------------------------------------------------
IpsecOutput 3250 3242721
Ipv4NoAdj 797 1056357
PuntErr 1 276


Workaround:
Disable AVC from the interface.

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
15.3(0.3)S, 15.3(2)S
Known Fixed Releases:
15.3(2)S1, 15.3(3)S
Bug Id:
CSCus00801
Title:
ASR1002-X cpp crash while processing ICMP Unreachable
Description:

Symptom:
ASR1002-X nat/cpp crash

Conditions:
VASI , NAT configured on the box. Crash is triggered by ICMP unreachable generated by vasi.

Workaround:
Unknown at this stage.
Potential workaround may be to disable unreachables : 'no ip unreachables' and 'no ip redirects' under the vasi interfaces.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.3(3)S2
Known Fixed Releases:
15.4(3)S3, 15.5(2)S
Bug Id:
CSCut64644
Title:
ASR1K goes to crash after TCAM messages appearing
Description:

Symptom:
Customer observes syslog messages:
%CPP_FM-3-CPP_FM_TCAM_WARNING: F0: cpp_sp: TCAM limit exceeded: HW TCAM cannot hold Class group cce-cg:9895136. Use SW TCAM instead
After some time a router goes to crash due to a lack of memory
Total TCAM Cell Usage Information
----------------------------------
Name : TCAM #0 on CPP #0
Total number of regions : 3
Total tcam used cell entries : 23728
Total tcam free cell entries : 500560
Threshold status : below critical limit

Conditions:
ISG, configured on ASR1K

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
16-JUN-2015
Known Affected Releases:
15.4(3)S, 15.4(3)S1.1, 15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCuu50414
Title:
ASR1k: %IOSXE-4-PLATFORM kernel error message
Description:

Symptom:
When huge number of HSRP interfaces become up, the following messages appear and VIPs cannot be communicated tentatively. The messages will be stopped after a while.

%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM DA Failed to find space for MAC insert region 1
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port4 ERROR: LPM DA Failed to find space for MAC insert region 1
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port5 ERROR: LPM DA Failed to find space for MAC insert region 1

Conditions:
-There are about 1000 or more HSRP interfaces in ASR1000.
-The issue may happen when these interfaces are up or down.
-The issue was found in 15.4(3)S2/ASR1001-X.

Workaround:
None at this moment.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.4(3)S2.1, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCtr56576
Title:
QFP crash w *GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_REGULAR_SW_ERR* du to QOS
Description:

Symptoms:
Cisco ASR 1000 may experience a QFP crash pointing to fragmentation/reassembly of packets if a QOS input or output service policy is configured

Conditions:
QOS(service-policy), a service-policy configured with "class-default" only, or only 1 of the following match filters: "match ip precedence", "match ip dscp", "match vlan", or "match "mpls exp"

Workaround:
Remove service-policy applied to interface, or add an additional "dummy" class-map to the policy-map using a different match filter type. Example, if the policy-map has configured only "match ip prec", then add an extra "dummy" class-map that will match on an unused vlan id, or an unused qos-group.


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2011-4007 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.1(2)S
Known Fixed Releases:
15.1(2)S2, 15.1(3)S1, 15.2(1)S
Bug Id:
CSCuq67798
Title:
XE313 Mcast Service Reflection:IpFormatErr packet drop seen in KP
Description:

Symptom:While testing XE313 with "xe39_1588" and "xe34_v4mcast_sr(Service reflection) features in ASR1002-X platform,observing packet drops.

Conditions:Packet drops are seen only in ASR1002-X platform platform when 1588 configuration is present.

Workaround:Removing 1588 configuration will make the flow normal without any drops.

More Info:


Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuu68669
Title:
ASR1001x ping failure when config negotate-auto to FastEthernet
Description:

Symptom:
when asr1001x gig interface connects to FastEthernet and both enabled as negotiation auto

Conditions:
when asr1001x connect to FastEthrent and asr1001x configured "negotiation auto"

Workaround:
configure the asr1001x side as "speed 100"

Further Problem Description:
none

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuq09004
Title:
RP crashed with cpp_cp_svr crash in cpp_qm_event_insert_leaf_node
Description:

Symptom:
After upgrading the ASR to the latest 15.2(04)S and later 15.X releases the ASR1K started crashing. The trigger for this crash is when a flat QoS policy with fair-queue is applied to a frame-relay interface.

Conditions:
The trigger for this crash is the flat QoS policy with fair-queue applied to the frame-relay interface. In this case the two key components that together triggered this failure was the frame-relay plus the flat policy with fair-queue.

Workaround:
The workaround is a cosmetic change that will cause NO functional impact. The workaround is to convert this flat policy to a hierarchical policy with a parent shaper set to 100%.

policy-map PM_POS_PARENT
class class-default
shape average percent 100
service-policy PM_POS
!
interface POS0/1/0
no ip address
encapsulation frame-relay
load-interval 30
crc 32
pos scramble-atm
frame-relay lmi-type ansi
service-policy output PM_POS_PARENT hold-queue 4096 out

Further Problem Description:
This issue is specic to the ASR1K X platforms (ASR1002x, ASR1001x) and ASR1K with ESP100/ESP200.

This issue is not applicable to the older ASR1K platforms using ESP5/10/20/40 or non-X series ASR1002/1001 platforms.

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
15.3(3)S2.1
Known Fixed Releases:
15.2(4)S6, 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCus62358
Title:
ASR1k: MAC based filter does not work with EPC
Description:

Symptom:
MAC based filter does not work with EPC for control plane packets I tried to capture packets using a mac based filter and lot of packets were caught which did not match the filter.

Images tested:
asr1000rp1-adventerprise.03.13.01.S.154-3.S1-ext.bin
asr1000rp1-adventerprisek9.03.12.02.S.154-2.S2-std.bin

Conditions:
NA

Workaround:
NA

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
15.4(2)S2.1
Known Fixed Releases:
15.4(2)S3, 15.4(3)S3, 15.5(1)S2
Bug Id:
CSCus69026
Title:
ASR1K B2B CGN NAT ASR1K lost sync in standby IP NAT allocated addresses
Description:

Symptom:
In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 lost sync in standby IP NAT allocated addresses after a long period. (More than 1 week)

Conditions:
PAP+BPA configured ASR1013 with ESP200 B2B CGN NAT.

Workaround:
Redundancy fail over to corrected the issue.Once the standby CGN became active, the IP allocated addresses would be corrected.

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
Bug Id:
CSCuu75584
Title:
cpp ucode crash related to Nat config changes
Description:

Symptom:
cpp-ucode crash followed by fman-Fp crash

Conditions:
possible NAT configuration changes

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.3(3)S5.9
Known Fixed Releases:
Bug Id:
CSCto03123
Title:
cman-fp/cman-cc slow memory leak is seen
Description:

Symptom:1. A slow memory leak is seen on cman_fp process on FP and cmcc process on
a SIP. This is seen on all the flavors for FPs and CCs. Leak is of the order of
less than 100-122K bytes per day.
2. Additional memory leak can happen when there are frequent sensor value
changes take place.


Conditions:No special condition is required for first leak to happen. Second leak happens
when sensor related changes take place.

In show log OR syslog output, you can expect to see the following message:
%OOM-3-NO_MEMORY_AVAIL: SIP0: oom.sh: The system is very low on available memory. Operations will begin to fail


Workaround:None.




Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
12.2(33)XNF1, 15.0(1)S2, 15.0(1)S3, 15.1(1)S, 15.1(2)S
Known Fixed Releases:
12.2(33)XNF2e, 15.0(1)S4, 15.1(1)S2, 15.1(2)S1, 15.1(3)S
Bug Id:
CSCuc03831
Title:
Last reload reason is LocalSoft on combined architecture platforms
Description:

Symptom:
Combined architecture platforms (ASR1001, ASR1002-x, etc) can experience a system reset that causes the system to not save logs and the reset reason is noted as "LocalSoft"

Conditions:
When the bootflash is detected as removed on these platforms, or a critical processes fails.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.1(1)S1
Known Fixed Releases:
15.2(4)S2, 15.3(1)S
Bug Id:
CSCuu36926
Title:
XE317:IP Ping connectivity failure with atm_pmcr_pcr configs
Description:

Symptom:
While testing XE316 image with "xe35_atm_pmcr_pcr"(SPA-3XOC3-ATM-V2 & SPA-2CHT3-CE-ATM are used) feature in RP2 platform, observing IP ping failure.

Conditions:
Issue is seen in RP2 platform.

Workaround:
Check "Workaround" enclosure.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.5(3)S, 15.6(1)S
Known Fixed Releases:
Bug Id:
CSCut82336
Title:
ASR1002-X: Handle leap second in ToD IN
Description:

Symptom:
Time of day variation between master and source when ASR1002-X is used as ToD IN from 30 June 2015.

There will be one second difference between ASR1002-X master and slave, with the actual UTC time.

ASR1002X#show platform software ptpd tod
PTPd ToD information:

Time: 04/21/15 09:07:02

ASR1002X#

There will be one sec difference in above time and the actual UTC time.

Conditions:
ToD input is used to synchronize time-of-day.

When ASR1002-X acts as a MASTER in ordinary clock configuration, it takes 10M or 2M for frequency synchronization and ToD input from symmetricom for ToD synchronization.

This frequency and ToD is transmitted to other PTP Boundary clocks and slave clocks for synchronization.

Due to leap second, when UTC Offset increases by one second, MASTER PTP Clock does not handle that. So, there is a difference between actual UTC time and the time transmitted by PTP Master.

Config
-----------
ptp clock ordinary domain 0
tod R0 ntp
input 1pps R0
clock-port master master
transport ipv4 unicast interface Lo0 negotiation

Workaround:
None

Further Problem Description:
See CSCut65374 for details.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCut48055
Title:
ESP100 periodically crashes with hardware interrupt
Description:

Symptom:
Periodical ESP/QFP crashes on ASR1k running as LNS

Conditions:
When updating the schedule exponent that has more than 128 queue, the queue-move operation completes prematurely. This causes a hardware interrupt because the hierarchy resumes forwarding the traffic before all queues have been moved to the new tree.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCuq64148
Title:
Pkt drops + CRC errors when connected to built-in ports on ASR1001-X
Description:

Symptom:
Ping fails when ASR1001-X Builtin ports are connected to ISR 3900/3925/3945 Builtin ports or ONS15454 .

Conditions:
This is seen with the built-in ports only on an ASR1001-X and not when using any other GigE SPA.

Workaround:
There is a temporary workaround which needs to be applied every time router/SIP/SPA reload for each builtin port.

ASR1001-X#ipc-con 0 0
Entering CONSOLE for slot 0
Type "^C^C^C" to end this session

Slot-0-0#
Slot-0-0#test hw-module subslot 0 phy write 31 0 0 3
op 1, port_num 4, phy_reg 0x1F, addr 0x2
Dev = 0x00000000, Reg = 0x0000001F, value = 0x00000003
Slot-0-0#
Slot-0-0#test hw-module subslot 0 phy write 23 0 0 0
op 1, port_num 4, phy_reg 0x17, addr 0x2
Dev = 0x00000000, Reg = 0x00000017, value = 0x00000000

Port Number Mapping :
====================
GigabitEthernet0/0/0 2
GigabitEthernet0/0/1 3
GigabitEthernet0/0/2 4
GigabitEthernet0/0/3 5
GigabitEthernet0/0/4 6
GigabitEthernet0/0/5 7

----

OR

Adding a switch in between ASR1001-X and the connected device will also prevent the issue.

Further Problem Description:
Issue might not be reproducible on all the ports and is intermittent. This issue is fixed in 15.4(3)S2 (XE 3.13.2S) through CSCur24110.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S
Known Fixed Releases:
15.5(1.15)S, 15.5(2)S
Bug Id:
CSCur24793
Title:
l2protocol forward not work for STP, LLDP, PPTPv2 and E-LMI in EVC
Description:

Symptom:
STP, LLDP, PPTPv2 and E-LMI keep being punted/forward regardless of the l2protocol forward CLI

Conditions:
Config l2protocol forward stp elmi lldp under EVC

Workaround:
N/A

Further Problem Description:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.3(3)S5.11, 15.5(1.18)S0.9, 15.5(2)S, 15.5(2.10)S
Bug Id:
CSCus13106
Title:
Error in generating keys:no available resources
Description:

Symptom:
After ESP Switchover SSH on ASR stops working

Conditions:
ASR 1006 RP2
15.2(4) S4
Happens after ESP switchover

Workaround:
n/a

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
15.2(4)S4.1
Known Fixed Releases:
Bug Id:
CSCus13268
Title:
ASR seg fault crash on VTEMPLATE Background Mgr
Description:

Symptom:
ASR1K router crash with:
UNIX-EXT-SIGNAL: Segmentation fault(11), Process = VTEMPLATE Background Mgr

Conditions:

Workaround:

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
15.2(4)S5.1
Known Fixed Releases:
Bug Id:
CSCuu71411
Title:
ASR1K DMVPN: Packets not getting decrypted with uws_vpn3 profile
Description:

Symptom:ASR1K DMVPN Spoke-to-Spoke packets not getting decrypted.
Conditions:Regression found issue.
Workaround:N/A

Status:
Open
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
15.5(2)S, 15.5(3)S
Known Fixed Releases:
Bug Id:
CSCuo99185
Title:
Multiple IOS-XE CPP Ucode crashes due to invalid static route
Description:

Symptom:
When PE receives a packet with the destination of CE's interface's address, PE router crashes.

Conditions:
topo:
CE(1.1.1.1)------PE1------(mpls)--------PE2
there is a static ip route on PE1: ip route vrf xxx 1.1.1.1 255.255.255.255 3.3.3.3. and 3.3.3.3 is the PE1's VRRP address. Then PE2 sends traffic with dst address 1.1.1.1 to PE1 and PE1 crashes.

Workaround:
remove above static ip route.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3.7, 15.3(3)S4, 15.4(1)S2.15, 15.4(1)S3, 15.4(2)S1.5, 15.4(2)S2, 15.4(3)S0.2, 15.4(3)S0z, 15.4(3)S1, 15.4(3)S2
Bug Id:
CSCuu82195
Title:
ASR1k experiences CPP crash with DMVPN setup and QoS on spokes
Description:

Symptom:
ASR1k with DMVPN configuration experiences a crash when bringing up tunnels. This is due to lack of resources (queues on BQS).
This can be checked with "show platform hardware qfp active infrastructure bqs sorter memory available" -> LEAF:STEM available.

Conditions:
DMVPN configuration, policy-map applied to the spoke

Workaround:
Do not oversubscribe the platform with many policy-maps

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
15.4(3)S2.9
Known Fixed Releases:
Bug Id:
CSCus86476
Title:
ASR1K NAT ALG ucode crash @ipv4_nat_destroy_addrport_bind
Description:

Symptom:
Crash occurs in chunk malloc. Backtrace indicates call from ipv4_nat_destroy_addrport_bind

Conditions:
The PPTP ALG must be enabled for this condition to occur (enabled by default)

Workaround:
Disable PPTP ALG through use of configuration command "no ip nat service pptp"

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
15.4(2)S2.1
Known Fixed Releases:
Bug Id:
CSCur46656
Title:
3.10.4S-UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task
Description:

Symptom:
A router running IOS-XE (ISR 4000 series, ASR 1000 series), containing a SPA-4XT3/E3 module, may crash with the following error message:

UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task

Conditions:
In order for this bug to be encountered, all of the following conditions must be met :

The router is running one of the following software versions:
3.10.4S and earlier
3.11.3S and earlier
3.12.2S and earlier
3.13.1S and earlier
3.14.1S and earlier
3.7.6S and earlier

The router has a SPA-4XT3/E3 module installed.

The router is sending DS3 SNMP traps, ie the line 'snmp-server enable traps ds3' is present in the router's configuration.

Workaround:
Booting the device without the following configs :

snmp-server enable traps ds3

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases:
15.3(3)S4.11, 15.3(3)S5, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S1.4, 15.4(3)S2, 15.5(1)S0.6, 15.5(1)S1, 15.5(1)SN1, 15.5(1.15)S
Bug Id:
CSCty26186
Title:
Enhancement request to capture watchdog reset on asr1k
Description:

Symptom:
reset did not save any core or crashinfo file. no error log either.

under show version:
"Last reload reason: Watchdog"

under "Reset reason Power On"
watchdog reset

Conditions:
normal operation. reset did not save any core or crashinfo file. no error log either.

Workaround:
this is a code enhancement. not a bug. therefore, no workaround applicable.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.1(2)S, 15.1(2)S2
Known Fixed Releases:
15.5(2)S
Bug Id:
CSCui25696
Title:
ASR 1K router - Kernel Core Crash on find_busiest_group()
Description:

Symptom:
Cisco ASR 1K router experiences a watchdog reset due to a kernel core dump triggered by a possible invalid calculation.

Conditions:
This symptom can occur under any condition.

Workaround:
There is no workaround.

Further Problem Description:
The bug mentions "watchdog". On platforms that have dedicated FP/ESPs (example would 1002, 1004, 1006 and 1013), there is no reload of the RP and so, the show version output will not reflect watchdog.

The may be as much as 10 minutes or more from the time you see
IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0
tp when you see
IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0

The interruption to network services are likely to happen close to when you see online in slot F0 message.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.2(4)S1
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S
Bug Id:
CSCut72639
Title:
ASR1k CPP crash with IP Options
Description:

Symptom:
ASR may reload or have a CPP crash when configured with MPLS.

Conditions:
ASR receives following packet from mpls interface. the packet's format is as follows:


Workaround:
none

Further Problem Description:
The router crashes because of receiving a mpls packet with explicit null label as well as LSR ip option from mpls interface

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.3(3)S3
Known Fixed Releases:
Bug Id:
CSCut74937
Title:
ASR1K PBR VRF Selection not working when source is local router
Description:

Symptom:
ae_test_cp1#show plat hard qfp acti stat drop
-------------------------------------------------------------------------
Global Drop Stats Packets Octets
-------------------------------------------------------------------------
ForUs 15 858
Icmp 205 23210
IpFragErr 3369 5146500
Ipv4NoAdj 465301 38263494
Ipv4NoRoute 1188 100002
Ipv4RoutingErr 6 600
NatIn2out 3117 362895
NatOut2in 3018 229816
UnconfiguredIpv4Fia 260203 17732393
UnconfiguredIpv6Fia 596925 152893250

ae_test_cp1#ping vrf ae_vpn1 10.20.30.1 source 10.20.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.20.30.1, timeout is 2 seconds:
Packet sent with a source address of 10.20.10.1
.....
Success rate is 0 percent (0/5)
ae_test_cp1#show plat hard qfp acti stat drop
-------------------------------------------------------------------------
Global Drop Stats Packets Octets
-------------------------------------------------------------------------
ForUs 15 858
Icmp 210 23780
IpFragErr 3369 5146500
Ipv4NoAdj 465301 38263494
Ipv4NoRoute 1188 100002
Ipv4RoutingErr 6 600
NatIn2out 3117 362895
NatOut2in 3018 229816
UnconfiguredIpv4Fia 260203 17732393
UnconfiguredIpv6Fia 596925 152893250

Conditions:
No specific condition, just need to configure VRF Selection and it happens

Workaround:
No workaround

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.2(4.0.1)
Known Fixed Releases:
Bug Id:
CSCuu97977
Title:
Pfrv2 load-balance not working with passive mode.
Description:

Symptom:
Traffic is not load-balancing in Outbound /Inbound direction while running PFRv2 with Internet Edge Solution.

Conditions:
while running PFRv2 with Internet Edge Solution and load-balance with passive mode.

Workaround:

Further Problem Description:
Customer is running Pfrv2 Internet Edge solution to load-balance Outbound and Inbound Traffic.

Seems like the new link-group algorithms not work well for load-balance with passive mode.

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.4(3)S2.2
Known Fixed Releases:
Bug Id:
CSCur57558
Title:
To fix limitation of 20sec TBAR for ASR1K GM
Description:

Symptom:
On an ASR1000 series router running GETVPN, there is currently a limitation with the
Time Based Anti-Replay window of 20 seconds or longer. This restriction should be removed
to accommodate a more reasonable window threshold.

Conditions:
This is only a limitation on the ASR1000 series router platforms.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
15.4(3)S, 15.5(1)S
Known Fixed Releases:
15.3(3)S5, 15.4(1)S3, 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCug63564
Title:
IKEv2: Crafted IKE_SA_INIT packet causes traceback
Description:

Symptoms:
Under certain conditions, malformed IKEv2 packets may cause a traceback in the ''Crypto IKEv2'' process:
*Feb 13 21:07:15.812: %SYS-2-MALLOCFAIL: Memory allocation of 4294967078 bytes failed from 0x16A15FF8, alignment 0
Conditions:
The condition is only causing traceback message to be printed. No actual crash is happening.
Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(0.1)T, 15.4(0.6)S, 15.4(1)CG, 15.4(1)CG1, 15.4(1)S, 15.4(1)S0a, 15.4(1)S0b, 15.4(1)S0c
Bug Id:
CSCun25912
Title:
IKEv2 auto-reconnect: some virtual-access dynamic configs are lost
Description:

Symptom: Configurations dynamically applied to the virtual-access interface might be lost over the reconnection while using the autoreconnect feature on Cisco Anyconnect on the ASR platform.

For example, the interface after initial connection establishment would have a QOS service policy applied:

ROUTER#sh derived-config int virtual-access 1

!
interface Virtual-Access1
ip unnumbered GigabitEthernet0/0/1
tunnel source 10.1.1.1
tunnel mode ipsec ipv4
tunnel destination 10.10.1.100
tunnel protection ipsec profile ipsec-profile
no tunnel protection ipsec initiate
service-policy input INPUT-POLICY
end


After reconnection the INPUT-POLICY is missing:

ROUTER#sh derived-config int virtual-access 1

!
interface Virtual-Access1
ip unnumbered GigabitEthernet0/0/1
tunnel source 10.1.1.1
tunnel mode ipsec ipv4
tunnel destination 10.10.1.100
tunnel protection ipsec profile ipsec-profile
no tunnel protection ipsec initiate
end

Conditions: This symptom is observed with configurations being applied from the user AAA profile over radius authentication. Affected parameters observed are QOS service policies and access-group.
Workaround: 1. Do not use the reconnect feature.
or
2. Apply the configurations directly to the virtual-template (if this is an option).

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(1)S1.8, 15.4(1)S2, 15.4(1)S3, 15.4(1)T1.2, 15.4(1)T2, 15.4(1)T3, 15.4(2.11)S, 15.4(2.5)T
Bug Id:
CSCun13772
Title:
NHRP: CPUHOGs seen when many child entries expire simultaneously
Description:

Symptom:
CPUHOG messages and watchdog timeout crashes are observed on an ASR1000 series router running DMVPN.

Conditions:
This has been observed on a router with a very large NHRP table (10-20k individual entries) with a very high number (thousands) of child entries per parent entry.

Workaround:
Reduce the number of child entries per parent entry through the use of supernetting.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.2(4)S1
Known Fixed Releases:
15.2(1)SY1.13, 15.2(4.0.21)E, 15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10, 15.3(3)S5, 15.4(2.17)S0.7, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S
Bug Id:
CSCuq86382
Title:
FLEXVPN IKEv2 auto reconnect | virtual-access | VRF lost | anyconnect
Description:

Symptom:
ASR/FLEXVPN
ANYCONNECT

Conditions:
On client side, AnyConnect is used. Pings are sent in the VPN during all the tests.

The reconnect feature is activated with timeout = 600

An outage is simulated by blackholing the trafic on an intermediate router: the source IP and the destination IP are sent to null 0. When doing this, the client starts the reconnect process and the PE brings the Virtual-Access interface after a short period.

If the connectivity is restored before the Vi interface goes down, the reconnect feature works fine.
If the connectivity is restored after the Vi interface goes down, the client reconnects but something is broken in the installation of the route into the VRF. As a result, the VPN is up but the client connectivity is still down.

Workaround:
NONE

Further Problem Description:
NONE

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S0.8, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.7, 15.5(0.25)T0.2
Bug Id:
CSCum22612
Title:
ASR1k IKE SA Stuck in MM_KEY_EXCH with RSA-SIG blocking new SAs with CAC
Description:

Symptom:
Since the ASR fails to send MM6 [being a responder] in the absence of a valid certificate, IKE SAs start leaking and hence get stuck in MM_KEY_EXCH state. Multiple MM_KEY_EXCH exist for a single Peer on the ASR, however the Peer does not retain any SAs for ASR in this case.
Along with CAC for in-negotiation IKE SAs, these stuck SAs block any new SAs or IKE rekeys even after renewing the certificates on the ASR.

Conditions:
This symptom is observed under the following conditions:
- ASR acting as IKEv1 termination point [sVTI for example] and is a responder.
- IKE authentication mode is RSA-SIG [Certificates].
- On the ASR, the ID-Certificate is either Expired or Not-present for a given sVTI tunnel
- The ASR also has a IKE in-negotiation CAC of a certain value.
Example:
crypto call admission limit ike in-negotiation-sa 30

Workaround:
Perform the following workarounds:
a) Manually delete stuck SAs by using:
clear crypto isakmp 12345
.. where 12345 is conn_id of a stuck SA.
Repeat this for each stuck SA

b) Temporarily increase CAC to accommodate new SA requests:
crypto call admission limit ike in-negotiation-sa 60

Further Problem Description:
Found and Tested in Cisco Release XE 3.7.4/Cisco IOS Release 15.2(4)S4.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(1)IC273.175, 15.2(1)IC273.8, 15.2(2)EA1, 15.2(2.0)EA, 15.2(2.1)EB, 15.2(2.2.75)ST, 15.2(2.6.68)EA, 15.2(2.7.9)EA, 15.2(2.8.1)EA1, 15.2(4)GC1
Bug Id:
CSCur02734
Title:
IOS-XE evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
The following Cisco products running IOS-XE software

Cisco ASR 1000 Series Aggregation Services Router
Cisco ASR 920 Series Aggregation Services Router
Cisco ASR 900 Series Aggregation Services Router
Cisco 4400 Series Integrated Services Routers
Cisco 4300 Series Integrated Services Routers
Cisco Cloud Services Router 1000V Series

include a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-6277
CVE-2014-6278
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187

This bug has been opened to address the potential impact on this product.

Conditions:
In all version before the Known Fixed Releases with either

The Persistent SSH feature enabled
The Persistent telnet feature enabled

Information on the Persistent SSH & persistent telnet feature is available on :

http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Console_Telnet_SSH_Handling.html#pgfId-1057023

The Persistent SSH or Persistent telnet feature is only available on the Management interface (GigabitEthernet0) in the VRF Mgmt-intf.

With Persistent SSH, a user must first successfully log in and authenticate via SSH to trigger this vulnerability.
With Persistent telnet, an unauthenticated user can exploit this vulnerability

Other conditions may exist. This release note will be updated if other attack vectors are discovered.

Workaround:
Disable the Persistent SSH feature. Disable the Persistent telnet feature.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.2(4)S, 15.2(4)S6, 15.3(3)S, 15.3(3)S4, 15.4(1)S, 15.4(1)S2, 15.4(2)S, 15.4(2)S1, 15.4(3)S
Known Fixed Releases:
15.2(4)S7, 15.3(3)S5, 15.4(1)S3, 15.4(2)S2, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCut77070
Title:
SPA-1xCHOC12/DS0 not supporting Framed E1 connections.
Description:

Symptom:
Framed E1 on SPA-1xCHOC12/DS0 is not coming up. The device is sending AIS to the remote node.

Conditions:
The issue is with Framed E1's. When we configure unframed E1, the link is coming up.

Workaround:
No workaround

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases:
15.4(3)S3.3, 15.5(1)S2.2, 15.5(2)S0.8, 15.5(2.21)S
Bug Id:
CSCuu24757
Title:
ASR1k QFP leak with cpp_sp_svr at module FM CACE
Description:

Symptom:
An ASR1k router will have a leak on the QFP with cpp_sp_svr. Listing the modules under this service, FM CACE which deals with software TCAM will be holding the majority of the memory:

Router#show platform software memory qfp-service-process qfp active
.
.
Module: FM CACE
allocated: 1866346946, requested: 1857054514, overhead: 9292432
Allocations: 1161692189, failed: 0, frees: 1161111412

Conditions:
Currently, this is seen when tunnel interface is configured with IPSEC in a DMVPN environment but the exact conditions are unknown at this time.

Workaround:
None at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.4(3)S2.2
Known Fixed Releases:
Bug Id:
CSCuu86738
Title:
ASR router crash while adding/deleting route-map/prefix entry
Description:

Symptom:
ASR router crash during route-map addition/deletion

Conditions:
This has been seen on ASR1K running 15.2(4)S3 code

Workaround:
Not known

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.2(4)S3
Known Fixed Releases:
Bug Id:
CSCuu44128
Title:
GETVPN on ASR with vasi interface fail to install the Rekey
Description:

Symptom:
In GETVPN scenario ASR as Group Member where crypto map is applied on Vasi interface rekey fails to install. For registration there is no problem.

Conditions:
When ASR as GM where crypto map is applied on Vasi interface

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCuq14700
Title:
TDL message buffers memory leak
Description:

Symptom:
memory leaking in mcp_dev - cpp_packet_drop_count_entry TDL message buffers.

Conditions:
normal

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.2(4)S4.9
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCur43882
Title:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: in mcp_dev
Description:

Symptom:
*Oct 28 10:55:10.568: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP

Conditions:
This issue is seen after doing router reload with latest MCP_DEV image.

Workaround:
-

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.3(3)S4.1, 15.4(3)S, 15.5(1)S, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu88964
Title:
ASR1K Kernel crash at pidns_get()
Description:

Symptom:
ASR1K kernel crash

Conditions:
This has been seen on ASR1K running 3.10.2 code.

Workaround:
Not known

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.3(3)S2
Known Fixed Releases:
Bug Id:
CSCut81614
Title:
OTV non-AED wrongly replies to ARP request received from internal intf
Description:

Symptom:
non-AED will reply to ARP request which will make L2 traffic loss

How to verify if your problem hits this ddts:
For target Mac address(duplicated in otv database), check the mac table on all related switches and ASR1K(ED). If the the port of the mac address is wrong, you may meet the problem hits this ddts.

Conditions:
Multi-homing

Workaround:
disable otv arp-nd cache

Further Problem Description:
None

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
25-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2
Bug Id:
CSCus69732
Title:
IOS-XE: Evaluation of glibc GHOST vulnerability - CVE-2015-0235
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

The following IOS-XE related products are affected:
Cisco ASR 1000 Series Aggregation Services Router
Cisco ASR 920 Series Aggregation Services Router
Cisco ASR 900 Series Aggregation Services Router
Cisco 4400 Series Integrated Services Routers
Cisco 4300 Series Integrated Services Routers
Cisco Cloud Services Router 1000V Series


A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on these products.

Conditions:
Exposure is not configuration dependent.

All versions prior to the following ones are shipping with the vulnerable code:
15.5(1)S/XE3.14.S
15.4(3)S2/XE3.13.2S
15.4(2)S2/XE3.12.2S
15.4(1)S3/XE3.11.3S
15.3(3)S5/XE3.10.5S
15.2(4)S6/XE3.7.6S
15.1(3)S7/XE3.4.7S

The following are active releases and planned CCO date:
release CCO_Date
15.5(2)S/XE3.15.0S 3/31/2015
15.5(1)S1/XE3.14.1S 3/3/2015
15.4(3)S3/XE3.13.3S 5/29/2015
15.4(2)S3/XE3.12.3S 3/28/2015
15.4(1)S4/XE3.11.4S 5/29/2015
15.3(3)S6/XE3.10.6S 7/30/2015
15.2(4)S7/XE3.7.7S 3/20/2015
15.5(3)S/XE3.16.0S 7/31/2015

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.2(4)S7, 15.4(1)S4, 15.4(2)S3, 15.4(3)S3, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCus66974
Title:
ASR1K QFP reload in a B2B CGN NAT scenario with PAP+BPA
Description:

Symptom:
The ESP may reload in an ASR1000 chassis.

Conditions:
This has been seen when Carrier Grade NAT (CGN) is deployed

Workaround:
There is no workaround.

Further Problem Description:
NA

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
25-JUN-2015
Known Affected Releases:
15.3(3)S, 15.6(1)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2, 15.5(2)S
Bug Id:
CSCus09942
Title:
ASR Crash on ipv4_nat_ha_upd_to
Description:

Symptom:
ASR1k crash due to nat

logs prior to crash :

Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 107: pesrtr2: Dec 3 11:15:54.343 CET: %IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0
Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 108: pesrtr2: Dec 3 11:15:54.346 CET: %CPPHA-3-FAULT: SIP0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8
Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 109: pesrtr2: Dec 3 11:15:54.347 CET: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_ha: cpp_ha encountered an error -Traceback= 1#9188fb8134aeba8cd2f10ae207ddad9c errmsg:7F376F5E1000+121D cpp_common_os:7F3773041000+DC08 cpp_common_os:7F3773041000+1B77E cpp_drv_cmn:7F3772909000+29CC7 :400000+237E9 :400000+232AC :400000+22CD9 :400000+135AD :400000+1258C cpp_common_os:7F3773041000+11DF0 cpp_common_os:7F3773041000+124D6 evlib:7F376E798000+B937 evlib:7F376E798000+E200 cpp_common_os:7F3773041000+14012 :400000+D8ED c:7F37672B3000+1E514 :400
Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 110: pesrtr2: Dec 3 11:15:54.347 CET: %CPPHA-3-FAULTCRASH: SIP0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump.
Dec 3 11:20:06 pwanrtr2.vlan1212.delot.de 77: pesrtr2: *Dec 3 11:20:05.263 CET: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to up

Conditions:
unknown

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.4(3)S, n/a
Known Fixed Releases:
15.4(3)S3, 15.5(1)S2, 15.5(2)S
Bug Id:
CSCus86120
Title:
RP1: CLI run slow in new XE313/XE314 image
Description:

Symptom:
A Cisco router that is rebooted may display the following logs repeatedly:
%PNP-6-HTTP_CONNECTING: PnP Discovery trying to connect to PnP server https://devicehelper.cisco.com/pnp/HELLO
%SYS-3-HARIKARI: Process Wait on Autoinstall top-level routine exited

Conditions:
This happens at bootup under some conditions incorrectly.

Workaround:
There is no workaround for the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.2(1)IC273.283, 15.4(3)S, 15.5(2)S
Known Fixed Releases:
15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.7, 15.4(3)S3
Bug Id:
CSCut03205
Title:
SPA modules on ASR1002-X show "missing" under show platform output
Description:

Symptom:
When a new/compatible SPA module is inserted in a ASR1002-X chassis in certain cases it may exhibit one of the following symptoms:

1) SPA module shows "missing" under "show platform" output

Slot Type State Insert time (ago)
--------- ------------------- --------------------- -----------------
0 ASR1002-X ok 12w0d
0/0 6XGE-BUILT-IN ok 12w0d
0/1 SPA-8XCHT1/E1 missing 5w4d

2) Shows as "Out Of Service". Not to be confused for an existing module which might have failed and shows "out of service".

Chassis type: ASR1002-X

Slot Type State Insert time (ago)
--------- ------------------- --------------------- -----------------
0 ASR1002-X ok 12w0d
0/0 6XGE-BUILT-IN ok 12w0d
0/1 SPA-8XCHT1/E1 out of service 5w4d

3) Does not show at all under "show platform" or "show inventory" and no logs are generated when its inserted/removed. The following command will confirm if the router sees it and its state:
# show platform hardware slot 0 spa stat

Bay SPA Type State PST POK SOK PENB RST DENB HSS
-------------------------------------------------------------------------------
0 6XGE-BUILT-IN Online 0 1 1 1 1 0 1
1 Unknown Detection 0 0 0 0 0 1 0 <<<
2 Empty Detection 1 0 0 0 0 1 0
3 Empty Detection 1 0 0 0 0 1 0

Conditions:
Has been seen only when a SPA is installed for the first time in a ASR1002-X chassis.

Workaround:
The SPA in this case should come online after a reboot.

Further Problem Description:
The same SPA modules work without any issues on other ASR1K chassis.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
Bug Id:
CSCto82630
Title:
CC/SPA package modification to reduce SIP 10 memory usage
Description:

Symptom:
ASR1000 with SIP module may report a low memory warning. This is a cosmetic non impacting issue.

%PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0: Committed Memory value 96% exceeds warning level 95%

Conditions:
SIP memory usage can be verified with the following command:

show platform soft status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
SIP0 Healthy 449776 445428 (99%) 4348 ( 1%) 429456 (95%)
SIP1 Warning 449776 443572 (99%) 6204 ( 1%) 431344 (96%)
SIP2 Healthy 449776 397796 (88%) 51980 (12%) 318364 (71%)

Workaround:
None. Cosmetic issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
12.2(33)XNF2, 15.1(3)S
Known Fixed Releases:
15.1(2)S1, 15.1(3)S, 15.2(1)S
Bug Id:
CSCuu92634
Title:
ASR1K:FP100: cpp_svr core file seen with uws_wan_xe311 profile
Description:

Symptom:
cpp_svr core file seen with uws-wan_xe311 profile.

Conditions:
while removing and adding service-policy from parent tunnel policy

Workaround:
-

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCuu35388
Title:
IKEv2 - IPSec SA lifetime expires immediately after SA is established
Description:

Symptom:
SA is created within in the same instance a (lifetime_expiry) message is printed stating "SA lifetime threshold reached, expiring in 3599 seconds" this is followed by a (delete_sa).


358463: Apr 2 12:59:19.348 EDT: IPSEC:(SESSION ID = 2127) (lifetime_expiry) SA lifetime threshold reached, expiring in 3599 seconds
358464: Apr 2 12:59:48.420 EDT: IPSEC:(SESSION ID = 2127) (delete_sa) deleting SA,

Conditions:
This condition is observed in asr1002x-universalk9.03.15.00.S.155-2.S-std.SPA code.

Workaround:
Disable volume based rekey

Reduce the crypto ipsec security-association replay window-size to a value below 1024

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
15.5(2)S, 15.5(3)M, 15.5(3)S
Known Fixed Releases:
Bug Id:
CSCuu17412
Title:
ASR903: H-VPLS VFI Leak on Xconnects, Routes and IGP Flaps
Description:

Symptom:
On an ASR903 PE router, H-VPLS VFIs are leaked, stale VFI entries are created and traffic loss is observed for traffic that is to be switched by the VFIs.

Conditions:
H-VPLS is configured with multiple neighbors present in the H-VPLS core and with a few neighbors present as spokes.
With this configuration, one condition to trigger the problem is that Xconnects, IP routes and CLNS neighborships are flapped multiple times on the H-VPLS nodes and the "spoke" nodes.
Another condition to trigger the problem is that H-VPLS configuration is deleted and reconfigured multiple times.

Workaround:
There is no work-around known as yet.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCuu58443
Title:
ASR1001: SMC-2-BAD_ID_HW or SCC-3-XCVR_BAD_ID_HW with GLC-SX-MMD
Description:

Symptom:
The following error messages may be seen on an ASR1001 router and the interface stays down.

%SMC-2-BAD_ID_HW: SIP0/0: Failed Identification Test in 0/0/2
%SCC-3-XCVR_BAD_ID_HW: SIP0/0: Failed identification test in 0/0/0

Conditions:
The issue occurs when inserting a GLC-SX-MMD SFP or rebooting the router.

Workaround:
Contact TAC to check for a workaround.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu85007
Title:
split-horizon group communication failure
Description:

Symptom:
split-horizon group communication failure

Conditions:
upgrade from 3.7.4S to 3.10.1S or 3.13.0S

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCun39803
Title:
OTV Drops ARP Broadcasts due to corrupt Flood List Pointer
Description:

Symptom:
Intermittent connectivity loss between hosts at different OTV sites. Pinging from one host to the other more than 8 times restores connectivity for about 8-10 minutes. Packet captures show ARP request broadcasts from a host at one site not being received by the host at the other site for about 7-8s, and then suddenly starting to work.

This problem has a tendency to get worse over time, with more and more hosts being affected over the course of a week or two until connectivity between sites is essentially gone.

Additionally ARP requests both arriving from an Overlay interface or from the inside interface could be lost.

Conditions:
ASR1K running 15.4 or 15.3 code, possibly earlier code, with OTV configured.

Workaround:
Remove the EVC's involved from all interfaces and overlay interface.
Wait for a minute. Then it is OK to reconfigure them back.

Statically configuring ARP entries on the hosts will work also.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCtz61014
Title:
f Linux 2.6.27 kernel NTP leap second handling could cause deadlock
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs the system will crash when adding or deleting NTP leap second in NTP
master mode.

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
To prevent an issue when the leap second update is received do not configure the system as NTP master.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.0(1)S
Known Fixed Releases:
15.1(3)S4, 15.2(2)S1
Bug Id:
CSCuv05361
Title:
cpp_cp_svr crash on AR1K
Description:

Symptom:
A cpp_cp_svr and a fman_fp_image core file was generated after configuring adaptive QoS.

Conditions:
Not known

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCut17865
Title:
ASR1K:13RU IOSd crash @PnP Agent Discovery after router reload
Description:

Symptom:
IOSd crash occurs at PnP Agent Discovery

Conditions:
after doing write erase and reload

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.7, 15.4(3)S3
Bug Id:
CSCun87685
Title:
WCCP Crash @ ipv4_wccp_input_perf
Description:

Symptom:
ASR1006/15.4(1)S crashed while adding port and host specific deny statements on specifc lines for the WCCP-Redirect ACL

Conditions:
Adding port and host specific deny statements on specifc lines for the WCCP-Redirect ACL

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCut21885
Title:
fman_fp_image and cpp_cp_svr memory leak - QFP PfR MP Prefix H...
Description:

Symptom:
fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory

show platform software memory forwarding-manager FP active brief
show platform software memory qfp-control-process qfp active brief

QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578
Summary 4262097059 4221917059 81523186 79011936

AL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)

RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 3076255744
cpp_cp_svr 28858 28431 28858 S 20 1849511936
fman_rp 21120 20336 21120 S 20 1452556288

4+ weeks later:

RAL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)


RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 4294967295
cpp_cp_svr 28858 28431 28858 S 20 2942447616
fman_rp 21120 20336 21120 S 20 1462714368

Conditions:
normal operation

Workaround:
unknown at this point

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.4(2)S1
Known Fixed Releases:
Bug Id:
CSCuo61455
Title:
Crash in NAT with ALG enabled
Description:

Symptom:
Router crash with NAT ALG enabled on the router

Conditions:
NAT ALG feature enabled on the router.

Workaround:
Disable NAT ALG using:
"no ip nat service all-alg"

Further Problem Description:
Initially the issue was found to be on the box running with CGN and PPTP however those are not the only conditions. The issue is with NAT ALG and disabling it would prevent these ucode crashes.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCub31873
Title:
ASR1K Crash on incomplete/glean adjacencies processing.
Description:

<B>Symptom:</B>
ASR RP/ESP crash.

<B>Conditions:</B>
If a router has to process a lot of IP packets that are either incomplete adjacencies or glean adjacencies, they will be punted for ARP processing.

A condition occurs that may prevent the ESP from processing the RP keep alive for a certain period and the RP will force the ESP to crash.

Workaround:
None. Upgrade to 15.2(04)S05-XE3.7.5 or later.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2015-0685 has been assigned to document this issue.

More information about this vulnerability is made available at: http://tools.cisco.com/security/center/viewAlert.x?alertId=38124

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(1)S
Bug Id:
CSCut14502
Title:
Address pool leak upon Anyconnect reconnect and subsequent disconnect
Description:

Symptom:
ASR1K acting as an IKEv2 VPN server experiences an address pool leak when we have local address pools configured with the group parameter. The issue is seen upon AnyConnect auto-reconnect and subsequent disconnect (the disconnect being a graceful one).

Conditions:
Issue first found on ASR1K running 3.13 and 3.14 codes. The important thing is the group parameter in the address pool being used. The format of this is:

ip local pool pool1 x.x.x.x y.y.y.y group V1

Workaround:
Reload the router

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.4(3)S1.1
Known Fixed Releases:
15.2(4.0.21)E, 15.5(1.18)S0.16, 15.5(2)S, 15.5(2)T1, 15.5(2.15)S, 15.5(2.23)T
Bug Id:
CSCuu75086
Title:
ROMMON should use the revocation key offered by the secure boot FPGA
Description:

Symptom:
A issue in secure boot process of the Cisco ASR 1000 Series Aggregation
Services Routers could allow a user to overwrite the revocation key on the
bootflash of the device.

The issue is due to improper storage of the revocation key on bootflash.

Conditions:
Device running with default configuration running an affected version of ROMMON software (prior to 15.5(3r)S) which supports secure boot. This includes the ASR1001-X and ASR1002-X routers as well as the ASR1000-ESP100 and ASR1000-ESP200 forwarding cards.

Workaround:
None.

Further Problem Description:
Please refer to http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s1.html#wp1425056588

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal
resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Planned to be addressed in the 15.5(3r)S ROMMON release

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(0.1)
Known Fixed Releases:
Bug Id:
CSCtd33567
Title:
Traceback seen when receiving crafted H.323 packets
Description:

Summary

The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version of Cisco IOS Software.

Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml.

Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier:

http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33.2.5)XNE1, 12.4(15)T14, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ7, 12.4(22)YB8, 12.4(22)YD4, 12.4(24)MDA13, 12.4(24)MDB13, 12.4(24)MDB14
Bug Id:
CSCuu73790
Title:
PFRv3: packet loss reported unexpectedly by MMA with smart-probes
Description:

Symptom:
PFRV3 can report RTP packet loss.

Conditions:
PFRV3 SMP packets traffic

Workaround:
None

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.4(3)S2.3, 15.5(2)S0.1
Known Fixed Releases:
Bug Id:
CSCuu09050
Title:
asr1001x may crash when unconfiguring large QoS policy
Description:

Symptom:
asr1001x may reload when unconfiguring large QoS policy

Conditions:
A very large QoS policy with hundreds of class-maps is used on the router and removed.

Workaround:
Do not unconfigure large QoS policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.5(2)S, 15.5(3)M, 15.5(3)S
Known Fixed Releases:
Bug Id:
CSCut52677
Title:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image after RP switchover
Description:

Symptom:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP. This error message is seen.

Conditions:
This issue is seen while doing sweep ping after doing RP switchover with latest MCP_DEV image.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.5(2)S0.4, 15.5(2.18)S

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论