| |
Bug Id: | CSCus46259 |
Title: | ASR1k (ISG Radius-Proxy): Memory Leak after excessive client roaming |
|
Description: | Symptom: The memory leak increase slowly during client roaming. Meaning a client roams on a hotspot from Subnet A to B and receives a new IP-Address and the ISG (ASR1k with radius-proxy feature enabled) creates a new session for the client and the old session is deleted due to accounting stop.
Conditions: Radius-Proxy feature is enabled on the ISG and clients are using EAP-SIM
Workaround: None. Booting the ASR1k if he used up 3.5GB of memory otherwise the box won't accept any furhter new sessions.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 01-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S3, 15.4(3)S |
|
Known Fixed Releases: | 15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.3, 15.5(1.18)S0.12, 15.5(2)S, 15.5(2.12)S |
|
|
| |
| |
Bug Id: | CSCus28745 |
Title: | POS FRR issue with traffic loss around 1 sec instead of 50ms |
|
Description: | Symptom: Traffic loss of around 1 sec.
Conditions: 1) "pos action b3-ber prdi" must be configured on one of the interfaces and path level B3 errors are introduced on that interface to such an extent that B3 TCA alarm is asserted. 2) POS FRR should be configured.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 01-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S3.1, 15.3(3)S3.10 |
|
Known Fixed Releases: | 15.3(3)S5.1, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S2.1, 15.4(3)S3, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.8, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCup48518 |
Title: | FTP ALG create incomplete token in case of EPSV passive |
|
Description: | Symptom: FTP ALG create incomplete token in case of EPSV passive
Conditions: nat+FW+FTP EPSV
Workaround: n/a
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 01-JUN-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCty05282 |
Title: | Last reload reason is seen as LocalSoft on ASR1ks |
|
Description: | Symptoms: Last reload reason in "show version" output is seen as LocalSoft after some reloads.
Conditions: The conditions under which these symptoms are observed is unknown.
Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XNC0d, 15.1(1)S1, 15.3(2)S |
|
Known Fixed Releases: | 15.2(4)S1, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCsv87997 |
Title: | DHCPv6 relay: IOSd crash on Active RP |
|
Description: | Symptom: DHCPv6 relay process crash on Actice RP.
Conditions: Unknown at this time.
Workaround: Unknown at this time. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XNB |
|
Known Fixed Releases: | 12.2(32.8.11)SR179, 12.2(32.8.6)REC177, 12.2(32.8.6)REE177, 12.2(33)CX, 12.2(33)IRF, 12.2(33)IRG, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16 |
|
|
| |
| |
Bug Id: | CSCuq85985 |
Title: | ASR1K:ESP80, 100, 200 crash on SSO when FRF.12 enabled on MFR bundle |
|
Description: | Symptom: Crash of both active and standby ESP. Applies to ESP80, 100, and 200.
Conditions: Updating the bandwidth of an active MFR bundle member-link. A bandwidth update will be sent from the RP to the FP if the FMAN-RP and FMAN-FP have different bandwidth values for the same link. This occurs immediately after boot if the startup-config has MFR member-links configured with FRF.12 fragmentation (active RP and standby RP will boot with different bandwidths, so that on switchover the standby RP will send a bandwidth update to the FP). Other situations that can lead to the bandwidth mismatch include adding/removing links to an MFR bundle with FRF.12 enabled and adding/removing FRF.12 from a main MFR interface prior to performing a switchover.
Workaround: None. Normal router operation and configuration can lead to this crash such that there are no viable workarounds.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-JUN-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.4(3)S2.18, 15.4(3)S3, 15.5(1)S0.3, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCte89787 |
Title: | Segment Switch manager Error followed by crash at 'sw_mgr_sm_cm_send_msg |
|
Description: | Symptoms: A Cisco ASR 1000 crashes after the Segment Switch Manager (SSM) reports that an invalid segment has been detected: %SW_MGR-3-INVALID_SEGMENT: Segment Switch Manager Error - Invalid segment - no segment class. The crash follows this message. Conditions: The symptom is observed on a Cisco ASR 1002 that is running Cisco IOS Release 12.2(33)XND1. The crash is caused by a NULL pointer de-reference following the "no segment class" error. The error itself is not fatal and the crash should have been avoided. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XND |
|
Known Fixed Releases: | 12.2(32.8.11)SX349, 12.2(33)SXI10, 12.2(33)SXI11, 12.2(33)SXI12, 12.2(33)SXI13, 12.2(33)SXI14, 12.2(33)SXI4, 12.2(33)SXI6, 12.2(33)SXI8a, 12.2(33)SXJ |
|
|
| |
| |
Bug Id: | CSCuu66754 |
Title: | ASR1001 Drops Interface Traffic as Overruns |
|
Description: | Symptom: ASR1001 may drop all control plane traffic and interface stops responding to ICMP. In the problem state, the overruns counter and Output Pause frames will keep incrementing on the interface
DUTt#show interface gig 0/0/2 | in input error 1875404 input errors, 0 CRC, 0 frame, 1875404 overrun, 0 ignored
DUTt#show interface gig 0/0/2 | in pause 0 watchdog, 0 multicast, 0 pause input 0 lost carrier, 0 no carrier, 87054602 pause output
Conditions: None
Workaround: Reload the box to recover from the problem state.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus51697 |
Title: | BDI not working correctly on ipbase license |
|
Description: | Symptom: ASR unable to initiate ping from BDI, it doesn't seem to populate Bridge-Domain with MAC entry.
If you initiate traffic to the ASR from the directly connected device, entry gets populated and ASR is able to initiate traffic from the BDI until MAC times out.
Conditions: BDI running on ASR with IP Base License.
Workaround: Move to advipservices or adventerprise license.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S1.1 |
|
Known Fixed Releases: | 15.4(2)S3, 15.4(3)S3, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuq10904 |
Title: | ISR4331:MMA perf-mon out-of-order in punted packets |
|
Description: | Symptom: The customer will see warning messages on the console that look like "%PERF_MONITOR_RESOURCE-1-RM_SET: RESOURCE EVENT RAISE" and "%PERF_MONITOR_RESOURCE-1-RM_CLEAR: RESOURCE EVENT CLEAR".
Conditions:
Workaround: There is no known workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.5(1)S2, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCut41684 |
Title: | ASR 1K crash due to CCM_ACK interupt |
|
Description: | Symptom: FP reloads with the core file reporting: GIM_CSR32_GIM_ERR_CCM_NOACK_LEAF_INT__INT_GIM_HPI_CCM_ACK_ERR interrupt.
Conditions: This issue only applies to ASR1001-X, ASR1002-X, ESP100 and ESP200. To hit this issue, three rare conditions internal to the QFP forwarding engine have to be present at the same time. These conditions are influenced by which features are configured, instantaneous traffic characteristics, as well as instantaneous processing load on the QFP. It is very, very rare for these conditions to occur.
Workaround: None.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus71003 |
Title: | ASR1002-X - Kernel crash - general protection fault |
|
Description: | Symptom: ASR1002-X reloaded due to kernel crash.
Conditions: Unknown at this moment
Workaround: Unknown at this moment
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S4 |
|
Known Fixed Releases: | 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCuu12008 |
Title: | rework CSCut21885: chunk_destroy memory leak. |
|
Description: | Symptom: fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory
show platform software memory forwarding-manager FP active brief show platform software memory qfp-control-process qfp active brief
QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578 Summary 4262097059 4221917059 81523186 79011936
AL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 3076255744 cpp_cp_svr 28858 28431 28858 S 20 1849511936 fman_rp 21120 20336 21120 S 20 1452556288
4+ weeks later:
RAL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 4294967295 cpp_cp_svr 28858 28431 28858 S 20 2942447616 fman_rp 21120 20336 21120 S 20 1462714368
Conditions: PfR is enabled and activated.
Workaround: Avoid using PfR
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus75546 |
Title: | mcp_dev hw_dcache invalidates too many dTLBs |
|
Description: | Symptom: Crash due to dTLB miss
Conditions: Under extremely rare conditions where threads on the same processing core have both opened virtual windows, one thread may accidentally invalidate a dtlb entry associated with another threads virtual window.
Workaround: None.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus70057 |
Title: | Obsolete OTV route entries not deleted from TCAM |
|
Description: | Symptom: Under multihoming scaling topology(1000 vlans, 50 overlay interfaces), sometimes the obsolete OTV entries of some vlans have not been deleted so that incoming packet will hit these entries and lead to packet drop with drop reason "Layer2NoRoute" and "EvcEfpEgressFilterDrop"
Conditions: Multihoming OTV, high scaling
Workaround: None
Further Problem Description: None
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S1.11 |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCut03813 |
Title: | ASR1K ucode crash seen at mpls_icmp_create |
|
Description: | <B>Symptom:</B> ASR 1000 may experience an ESP ucode crash causing network outage in non-redundant setup
<B>Conditions:</B> currently observed on ESP100 and ASR1002-X with deployments having MPLS, IPv6 and NAT configured.
<B>Workaround:</B> None at this point.
<B>Further Problem Description:</B> On ESP40, instead of crash, you may see following error message- %NAT-6-ADDR_ALLOC_FAILURE:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S5.1, 15.4(3)S |
|
Known Fixed Releases: | 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCum04325 |
Title: | Duplicate entry seen in "sh lldp neighbor" |
|
Description: | Symptom: Duplicate entry seen in "sh lldp neighbor"
Conditions: if the physical link is a member of a etherchannel bundle. lldp packets are processed on the bundle UIDB.
Workaround:
Further Problem Description: Solution: if the physical link is a member of a etherchannel bundle. lldp packets are processed on physical link UIDB instead of the bundle UIDB.
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S2, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCut56117 |
Title: | ASR NAT timeouted out sessions not cleared. |
|
Description: | Symptom: Some times ASR NAT timeouted out sessions may not be cleared.
Conditions: This problem seems to happen when NAT is enabled and certain type of ALG packets are sent.
Workaround: Work around for this issue is run the CLI clear ip nat * periodically.
Further Problem Description: Some times ASR NAT timeouted out sessions may not be cleared.
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S5.1 |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus60838 |
Title: | ASR1K:FP200:cpp_svr core on deleteing policy-map |
|
Description: | Symptom: cpp_svr core detected.
Conditions: On deleting policy-map
Workaround: -
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCut41061 |
Title: | ESP crash with monitor capture and debug platform-trace |
|
Description: | Symptom: Router crash with conditional debugging
Conditions: This issue is seen when conditional debug is configured for all the interfaces and interfaces are dynamically created/deleted in large number.
Workaround: Conditional debugging should not be used if lot of interfaces are created/deleted dynamically.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S3 |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCuu55787 |
Title: | ASR1001-X: Router fails to come online with No Service Password Recovery |
|
Description: | Symptom: Router fails to come online after attempting to return to factory defaults with "No Service Password Recovery" enabled.
Conditions: ASR1001-X with No Service Password Recover enabled. An attempt to send a to the ROMMON followed by answer "Y" to Do you want to reset the router to the factory default configuration and proceed [y/n] ?
Workaround: Do not enable No Service Password Recovery or Do not attempt to return router to factory defaults after having done so
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut68598 |
Title: | ASR1k BFD randomly down at NAT configured interface |
|
Description: | Symptom: ASR1k BFD randomly down at NAT configured interface
Conditions: At ASR1k's BFD interface, NAT is also configured
Workaround: None at this time
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S2.1, 15.5(2)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus53146 |
Title: | ASR crashes at hal_get_next_packet |
|
Description: | Symptom: ASR crashes every night.
Conditions: An FNF IPv6 monitor is configured on the interface with AS fields. The crash happens in context of dropped packets, so it probably relates to certain specific network conditions which result in dropping of relevant packets.
The issue isn't necessarily related specifically to IPv6, and can probably happen in relevant conditions in case of IPv4 as well.
Workaround: Disable the relevant monitot/s with AS fields.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S0.9 |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCuc82634 |
Title: | ASR1K ESP: Allow the ESP cards to come up when Crypto complex does not |
|
Description: | Symptom: Some ESPxx cards ( ESP10/20/40 ) fails to come up as a result of a multi-bit memory failure in crypto device.
Conditions: ESP10/20/40 cards on ASR1k during power hard reset
Workaround: None
Further Problem Description: This fix will let the card come up fine even though the encryption chip will not come up. Card can still be used for all other functions if ipsec feature is not licensed/used.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUN-2015 |
|
Known Affected Releases: | 15.4(1)S, n/a |
|
Known Fixed Releases: | 15.2(4)S2.11, 15.2(4)S3, 15.2(4)S3a, 15.3(1)S1.2, 15.3(1)S2, 15.3(1.11)S, 15.3(2)S |
|
|
| |
| |
Bug Id: | CSCuu16709 |
Title: | $$SS MACsec Interop between Nightster and Overlord fails. |
|
Description: | Symptom: MACsec encryption between ISR 4451 and ASR 1001-X may fail.
Conditions:
Workaround: Issue macsec/no macsec on the interface
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 05-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuh18824 |
Title: | XE3.10-ST: AFW Crash with contact center callflow load test |
|
Description: | RNE Enclosure
Symptom: cube crashed
Conditions: normal condition
Workaround: none
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 05-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur57035 |
Title: | ASR 1k crash on __be_bfd_fib_nh_change_cb |
|
Description: | Symptom: IOS crash
Conditions: ASR running 15.3(1)S1 with bfd
Workaround: none at this time
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.3(1)S1 |
|
Known Fixed Releases: | 15.3(3)S4.16, 15.3(3)S5, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.14, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)SN1, 15.5(1.21)PI28a |
|
|
| |
| |
Bug Id: | CSCuo72961 |
Title: | ASR1K:%FMFP-3-OBJ_DWNLD_TO_CPP_FAILED: F1: fman_fp_image: Batch type |
|
Description: | Symptom: An error message is logged in during QoS configuration during an FPM test. Conditions: This symptom occurs due to a policy with FPM class. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.3(2)S, 15.3(3)S, 15.4(1)S |
|
Known Fixed Releases: | 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1)IC273.77, 15.2(1)ICA4.30, 15.2(2)DB101.101, 15.2(2)DB101.112, 15.2(2)E |
|
|
| |
| |
Bug Id: | CSCuq77051 |
Title: | out of ids when configuring xconnect |
|
Description: | Symptom: Attempting to create or modify a xconnect context using the command l2vpn xconnect context command may fail with the error message:
%IDMGR-3-INVALID_ID: bad id in id_get (Out of IDs!) (id: 0x0)
Conditions: This symptom has been observed after entering and exiting xconnect context sub-modes many times (over 65000) over an extended period of time.
Workaround: There is no workaround. Once this error occurs, the router must be reloaded.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.3(3)S4.2, 15.3(3)S5, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.6, 15.5(0.22)T |
|
|
| |
| |
Bug Id: | CSCus85852 |
Title: | CPP DRV: Disable IIC Interrupts (Revert CSCuq05197) |
|
Description: | Symptom: ESP crash occurs after one of the following interrupts are reported (can be seen on the IOS console): HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED64 HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED65
Conditions: Router configuration or traffic pattern does not affect this problem. This issue occurs if a data parity error is reported in the QFP L2 instruction cache controller, and impacts all CPP10-based ESPs (asr1001, asr1002, ESP5, ESP10, ESP20, ESP40). This issue does not impact Yoda (asr1002-x, ESP100, ESP200) or Luke (asr1001-x) based ESPs.
Workaround: None. Almost all data parity errors are random events that can not be fixed by replacing hardware.
Further Problem Description: The exception handler for the L2 instruction cache handler is restored / fixed in the following releases: XE310 / 15.3(3)S6 XE312 / 15.4(2)S3 XE313 / 15.4(3)S3 XE314 / 15.5(1)S2
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.4(2)S3, 15.4(3)S3, 15.5(1)S2, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuu60301 |
Title: | ESP100 crash because of hardware interrupt |
|
Description: | Symptom: ESP/QFP crash on ASR1k running as LNS
Conditions: No known trigger
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.16 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu37200 |
Title: | SC install fails after link re-route |
|
Description: | Symptom: SC install fails after link re-route happens in the network
Conditions: SC install fails after link re-route happens in the network.
Workaround: issue no macsec/macsec to recover SC's.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 09-JUN-2015 |
|
Known Affected Releases: | 15.4(3)SS |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut34273 |
Title: | ASR1K, "unknown" process leak under cpp_cp_svr |
|
Description: | Symptom: on ASR1K, we may observe memory leak on the ESP under "cpp_cp_svr"
from "show platform software process list f0 sort memory"
Name Pid PPid Group Id Status Priority Size
cpp_cp_svr 7140 6694 7140 S 20 812957696 <<< the size here keep increasing.
and from "show platform software memory qfp-control-process qfp active brief" we see "unknown" is increasing.
module allocated requested allocs frees
unknown 219295960 131577576 10964798 0
Conditions: This is first observed on ASR1K running 15.4(1)S with WCCP enabled. The leak could be triggered by WCCP statistic update
Workaround: do FP switch-over or router reload will clear the memory used, but the memory leak will still exists
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 09-JUN-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCun27206 |
Title: | ESP in F1 crashed pointing to multicast |
|
Description: | Symptom: ESP crashed
Conditions: Inner multicast fragments with well-known multicast address
Workaround: From our test, Disabling MLRE( an internal feature to improve mcast performance for big packets on ESP40/ESP100/ASR100-X) ) asr1k-dev-1006-5#set platform hardware qfp active feature multicast v4mcast lre off
The workaround has no functional impact and only some performance impact(Eg. multicast performance from 30G to 20G, like that,not accurate) So if we don't have a high multicast throughput, this can be used a workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.2(2)S1 |
|
Known Fixed Releases: | 15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCut50228 |
Title: | ASR1001-X ping loss with peer ASR1k at fixed speed 10M |
|
Description: | Symptom: ASR1001-X ping loss with peer ASR1k at fixed speed 10M and half-duplex
This issue is specific to ASR1001-X and will not be seen in ASR1001
Conditions: Only half-duplex could trigger this issue when ping big packet like 1280 and could be seen at the setup below:
1)ASR1001-X (0/0) <---> other ASR1k 2)ASR1002-X (0/0) <---> ASR1002-X (0/0) 3)ASR1002-X (0/0) <---> other ASR1k
For 1) this bug will fix it. For 2) ASR1002-X 0/0 MAC does not support half-duplex in 10/100M 3) same as 2
Workaround: None
Further Problem Description: This issue is specific to ASR1001-X box with half-duplex in any other 1G ports of 0/0 "only"
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S2.1 |
|
Known Fixed Releases: | 15.4(3)S2.16, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2)S0.8 |
|
|
| |
| |
Bug Id: | CSCuu36411 |
Title: | ASR1k - 16k Policy-Map - active RP crash with 10k PM |
|
Description: | Symptom: active RP crash when more than 10 K Policy-maps are installed
Conditions: scale testing: 15 K ppp sessions with 10 K policy-maps
Workaround: n/a
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCum90509 |
Title: | No RTP Connections for RSVP Features in XE3.7 image |
|
Description: | Symptom: No RTP Connections for RSVP Features in Cisco IOS Release XE3.7 image. Conditions: This symptom is observed Only for RSVP call. Workaround: Use the version where CSCuj58299 not integrated.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.2(4)M5.6, 15.2(4)S4.21 |
|
Known Fixed Releases: | 15.2(4)GC3, 15.2(4)M6.2, 15.2(4)M6a, 15.2(4)M6b, 15.2(4)M7, 15.2(4)S5.5, 15.2(4)S6 |
|
|
| |
| |
Bug Id: | CSCuo36917 |
Title: | XE3.12 DPSS : CFT returns out of memory error under load |
|
Description: | Symptom: When handling greater than 50000 concurrent flows, the following error is seen by dpss_mp:
src/main/onep_dpss_engine.c:1482: cft_handle_packet() returned error [2]:out of memory
Packets associated with flows greater than 50000 do not have the flow action applied and are returned to the router without being sent to the onePK application.
Conditions: - ASR 1000 platform running IOS XE - More than 50000 uni-directional flows established
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S |
|
Known Fixed Releases: | 15.2(1)IC273.212, 15.2(3)E1, 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.5, 15.5(1.8)T, 15.5(2)S, 15.5(2.2)S, 7.0(3)I1(0.198) |
|
|
| |
| |
Bug Id: | CSCus43594 |
Title: | rp crash when cleanup vpls scale configuration |
|
Description: | RP crashed when doing config replace with a cleanup config.
Symptom:
Conditions: Scale vpls bgp signaling config.
Workaround: No.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.3(3)S5.1, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S2.1, 15.4(3)S3, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1)T1.1, 15.5(1)T2 |
|
|
| |
| |
Bug Id: | CSCul35389 |
Title: | 1RU: %SERVICES-3-NORESOLVE_ACTIVE causing occasional mcpcc-lc-ms crash |
|
Description: | Symptom: Following error messages re observed with SPA reload ==================================================================
Nov 26 2013 15:14:31.496 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP Nov 27 2013 17:31:42.464 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP
The process mcpcc-lc-ms is held down and the SIP is reloaded.
Logs may also be flooded with these errors:
12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0
Conditions: Error are observed when SPA is reloaded
Workaround: NA
Further Problem Description: The error messages are caused due to IOS trying to establish a connection with a non-existing process on ASR1001.As a result of these error messages, we are observing a SIP reload (mcpcc).The issue is observed in XE311 (ASR1001 and possibly ASR1002-X).
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 10-JUN-2015 |
|
Known Affected Releases: | 15.4(1)S, 15.4(2)S, 15.4(3)S, 16.0(0) |
|
Known Fixed Releases: | 15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.4(1)S0.3, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1.16)S, 15.4(2)S, 15.4(2)S1 |
|
|
| |
| |
Bug Id: | CSCuu36031 |
Title: | Kernel crash is related to a GPF related to memory corruption. |
|
Description: | Symptom: Unexpetced reboot
Conditions: Router rebooted itself and no changes has been made.
Workaround: NA
Further Problem Description: This is a MPLS router in a data center multiple connections depend on this connection. Over 12 devices paged down when this happened.
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 11-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S5.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCum41815 |
Title: | L2TPv3 session pending between ASR1k and ISR |
|
Description: | Symptom: L2TPv3 session between ASR1k and ISR is stuck at pending state, wiccn and wicrp respectively. Depending on the tiebreaker result, the tunnel session might come up after 10 minutes or not. Conditions: The problem is seen when an ASR1k (or any S-train) router is connected to ISR (or any T-train) router, and the ASR1k router is first configured with L2TPv3 tunnel then the ISR router is configured. Workaround: Perform the following workaround: 1. If use configured dynamic l2tpv3 tunnel, configure the ISR router first then configure the ASR1k router. OR 2, Use static l2tpv3 session to avoid the tunnel signal lost issue. The corresponding configuraton sample: PE1: pseudowire-class fixid encapsulation l2tpv3 protocol none ip local interface Loopback0 connect atmb Serial0/1/0 100 l2transport xconnect 2.2.2.2 100 encapsulation l2tpv3 manual pw-class fixid l2tp id 102 102 l2tp cookie local 4 102 l2tp cookie remote 4 102
PE2: pseudowire-class fixid encapsulation l2tpv3 protocol none ip local interface Loopback0 connect atmb Serial0/0/0 200 l2transport xconnect 1.1.1.1 100 encapsulation l2tpv3 manual pw-class fixid l2tp id 102 102 l2tp cookie local 4 102 l2tp cookie remote 4 102
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 11-JUN-2015 |
|
Known Affected Releases: | 15.4(1.1)T, 15.4(2.13)T |
|
Known Fixed Releases: | 15.4(1)T1.1, 15.4(1)T2, 15.4(1)T3, 15.4(1.25)T, 15.4(2)T0.1, 15.4(2)T1, 15.4(2)T2, 15.4(2.20)T, 15.4(3)M, 15.4(3)M1 |
|
|
| |
| |
Bug Id: | CSCtj47922 |
Title: | RLS33: %PLATFORM-4-ELEMENT_WARNING: R1/0: smand: SIP/0: Committed Memor |
|
Description: | Symptom: Following messages are noticed on a ASR1k having 4 SPAs in a single SIP10.
Oct 3 21:09:25.083 CEST: %PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0:Committed Memory value 96% exceeds warning level 95% ! Oct 4 22:10:19.411 CEST: %PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0:Committed Memory value 96% exceeds warning level 95% !
Conditions: This issue is more likely to occur when a SIP has many SPAs.
Workaround: NA
Further Problem Description: Warning logs are totally cosmetic and miscalculation by SIP. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.0(1)S, 15.1(0.18)S0.9, 15.1(2)S |
|
Known Fixed Releases: | 15.0(1)S3, 15.1(1)S, 15.1(2)S |
|
|
| |
| |
Bug Id: | CSCum73773 |
Title: | NAT: QFP crash when ip nat setting CGN is removed with 40CPS |
|
Description: | Symptom: QFP crash
Conditions: remove ip nat setting mode and run "sh pl hard qfp ac statistics drop"
Workaround: no
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S, 15.3(3.3)S3 |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCuu56477 |
Title: | TenGi IF and channel down when doing "redundancy force-switchover" |
|
Description: | Symptom: did "redundancy force-switchover" on ASR1K (2RP) caused TenGigabitEthernet IF and port-channel down.
Conditions: none
Workaround: none
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCud31634 |
Title: | XE38 Yoda BQS crash on during MLPPP link removal |
|
Description: | Symptom:
ASR1K 2RU-VE or ASR1K with FP100 may encounter a Ucode and cpp_cp_svr crash when links are removed from a active MLPPP bundle with traffic.
Hardware interrupts that may appear in the console output include:
PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_STEM_CB_SEL_INV_ERR PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_BRANCH_CB_SEL_INV_ERR QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR1 QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR2 QSM_CSR32_QSM_LOGIC_ERR_LEAF_INT__INT_INCORRECT_POP_STATUS_ERR3
Conditions:
ASR1K 2RU-VE or ASR1K with FP100 may encounter a Ucode and cpp_cp_svr crash when links are removed from a active MLPPP bundle with traffic. Failure is not consistent and is more prevalent with active traffic to the MLPPP bundles.
Workaround:
None |
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCua10556 |
Title: | crypto ikev2 sa stuck in delete state |
|
Description: | Symptoms: A few IKEv2 SAs get stuck in delete state.
Conditions: The symptom is observed when bringing up 2k flex sessions.
Workaround: There is no workaround. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.1(1)SY, 15.1(1)SY1, 15.1(1)SY2, 15.1(1)SY3, 15.1(1)SY4, 15.1(2)SY, 15.1(2)SY1, 15.1(2)SY2, 15.1(2)SY3, 15.1(2)SY4 |
|
|
| |
| |
Bug Id: | CSCut65374 |
Title: | PTP Leap Second: ASR1002-X incorporate leap second addition 6/30/15 |
|
Description: | Symptom: There are periodic leap second events which can add or delete a second to global time. The leap second event can be propagated via Precision Time Protocol (PTP) if configured.
When the leap second update occurs and the device is configured to use PTP as a Boundary Clock (BC) then an incorrect Coordinated Universal Time (UTC) offset and PTP Leap Indicator could propagate incorrect time downstream. This could cause the PTP network time to be off as much as thirty five seconds.
Conditions: The leap second update is propagated from the configured PTP Grandmaster clock.
A Cisco device running the PTP protocol would have the "feature ptp" command in the running configuration.
Workaround: For this problem of the incorrect PTP UTC offset and Leap Second update flag for Cisco devices configured as a PTP boundary clock the following workaround can be used:
1. Increase the Time To Live (TTL) on the IPV4 multicast PTP frames from the PTP Grand Master clock from the default of one (1) to something higher than the number of multicast hops the PTP packets would have to traverse in the network to reach the Cisco device.
2. Disable PTP on the affected cisco devices configured as PTP boundary clocks.
3. If the now disabled Cisco devices configured as a PTP boundary clock supports Internet Group Management Protocol (IGMP) snooping then nothing additional is required. If the device does not support IGMP snooping then static multicast Content Addressable Memory (CAM) entries would need to be created for the devices downstream which need the PTP frames from the PTP Grand Master clock.
If this workaround cannot be implemented than an upgrade is recommended.
Further Problem Description: N/A
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCud14945 |
Title: | XE3.8 dCM IPSec tunnel bring up time is much longer compared to XE3.7 |
|
Description: | -- Release-note --
Symptoms: IPv4 IP Security (IPSec) tunnel bring up time is taking longer in dynamic crypto-map deployment.
Conditions: This symptom is observed on a Cisco ASR1000 series router when functions as an IPSec termination and aggregation router, and when dynamic crypto-map technology is deployed.
The tunnel setup rate is measured in the setup of: (1) key negotiation utilizing Internet Key Exchange version 1 (IKEv1). (2) single dynamic crypto-map configuration on one input interface. (3) 8000 IPSec tunnel end-to-end connectivities. That is, data traffic is able to flow through all 8000 IPSec dynamic tunnels. And compares with previous release, IOS-XE 15.2(04)S.
Workaround: there is no workaround for this particular deployment. |
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuc13500 |
Title: | CPP Crashes seen on Active and Standby FP following RP switchover |
|
Description: |
Symptom: ESP with scaled configuration may crash during RP switchover
Conditions: This problem happens if user configure more than supported/published scaled limits
Workaround: Configure the router within supported limits.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 3.6(6.0) |
|
Known Fixed Releases: | 15.2(4)S1 |
|
|
| |
| |
Bug Id: | CSCud42197 |
Title: | ASR1K_XE39: map-request is not getting to LISP conctrol process |
|
Description: | Symptom: map-request is missing in xTR Conditions: cli lig self all Workaround: none |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUN-2015 |
|
Known Affected Releases: | 15.3(1)S, 15.3(2)S |
|
Known Fixed Releases: | 15.3(2)S |
|
|
| |
| |
Bug Id: | CSCur31425 |
Title: | ASRNAT: PPTP ALG: Incorrect UNNAT of Peer-Call-ID in Outgoing-Call-Reply |
|
Description: | Symptom: ASR1k PAT may not function properly for PPTP. PPTP control connection is not established.
Conditions: This was first found in XE3.10.3. The sequence of events which can lead to this failure:
- PPTP ALG is disabled; - PPTP clients try to connect, but fail; - PPTP ALG is enabled with "ip nat service pptp"; - PPTP clients are still unable to connect to PPTP server.
Workaround: Use "clear ip nat translations *" after enabling PPTP NAT ALG.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 14-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S3, 15.4(2)S, 15.4(3)SS |
|
Known Fixed Releases: | 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCty54702 |
Title: | FP crash in aom_update when doing RP Switchover with ISG sessions |
|
Description: | Symptom:
ASR1K ESP crash.
Conditions:
FP reload might be occured while RP switchover if SNMP enabled.
Workaround:
None. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 14-JUN-2015 |
|
Known Affected Releases: | 15.2(2)S, 15.2(4)S |
|
Known Fixed Releases: | 15.2(2)S |
|
|
| |
| |
Bug Id: | CSCut68825 |
Title: | PFRv3: unexpected byte loss reported due to TCP packet flow out of order |
|
Description: | Symptom: Current TCP BYTES LOSS metric's implementation assumes there is no tcp packet reordering. Thus in case of reordering the loss is reported.
Conditions: TCP packets' reordering.
Workaround: Prevent TCP packets' reordering.
Further Problem Description: Given customer's network contains the equipment from different vendors preventing reordering is not always feasible. The metric should handle the out of order cases.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 15-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.3, 15.5(2)S0.1 |
|
Known Fixed Releases: | 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCuf25027 |
Title: | DROP in performance with Full AVC config + Ipsec |
|
Description: | Symptom: Substantial drop of performance. High latency and packets drops. Conditions: Router is configured with full AVC config (NBAR,ART,QoS) and Ipsec. This issue will be seen with high traffic (more than 500mbps). Packet drops can be verified by issuing this command. show platform hardware qfp active statistics drop clear ------------------------------------------------------------------------- Global Drop Stats Packets Octets ------------------------------------------------------------------------- IpsecOutput 3250 3242721 Ipv4NoAdj 797 1056357 PuntErr 1 276
Workaround: Disable AVC from the interface. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 15-JUN-2015 |
|
Known Affected Releases: | 15.3(0.3)S, 15.3(2)S |
|
Known Fixed Releases: | 15.3(2)S1, 15.3(3)S |
|
|
| |
| |
Bug Id: | CSCus00801 |
Title: | ASR1002-X cpp crash while processing ICMP Unreachable |
|
Description: | Symptom: ASR1002-X nat/cpp crash
Conditions: VASI , NAT configured on the box. Crash is triggered by ICMP unreachable generated by vasi.
Workaround: Unknown at this stage. Potential workaround may be to disable unreachables : 'no ip unreachables' and 'no ip redirects' under the vasi interfaces.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S2 |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCut64644 |
Title: | ASR1K goes to crash after TCAM messages appearing |
|
Description: | Symptom: Customer observes syslog messages: %CPP_FM-3-CPP_FM_TCAM_WARNING: F0: cpp_sp: TCAM limit exceeded: HW TCAM cannot hold Class group cce-cg:9895136. Use SW TCAM instead After some time a router goes to crash due to a lack of memory Total TCAM Cell Usage Information ---------------------------------- Name : TCAM #0 on CPP #0 Total number of regions : 3 Total tcam used cell entries : 23728 Total tcam free cell entries : 500560 Threshold status : below critical limit
Conditions: ISG, configured on ASR1K
Workaround: none
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S, 15.4(3)S1.1, 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCuu50414 |
Title: | ASR1k: %IOSXE-4-PLATFORM kernel error message |
|
Description: | Symptom: When huge number of HSRP interfaces become up, the following messages appear and VIPs cannot be communicated tentatively. The messages will be stopped after a while.
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM DA Failed to find space for MAC insert region 1 %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port4 ERROR: LPM DA Failed to find space for MAC insert region 1 %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port5 ERROR: LPM DA Failed to find space for MAC insert region 1
Conditions: -There are about 1000 or more HSRP interfaces in ASR1000. -The issue may happen when these interfaces are up or down. -The issue was found in 15.4(3)S2/ASR1001-X.
Workaround: None at this moment.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.1, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtr56576 |
Title: | QFP crash w *GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_REGULAR_SW_ERR* du to QOS |
|
Description: | Symptoms: Cisco ASR 1000 may experience a QFP crash pointing to fragmentation/reassembly of packets if a QOS input or output service policy is configured
Conditions: QOS(service-policy), a service-policy configured with "class-default" only, or only 1 of the following match filters: "match ip precedence", "match ip dscp", "match vlan", or "match "mpls exp"
Workaround: Remove service-policy applied to interface, or add an additional "dummy" class-map to the policy-map using a different match filter type. Example, if the policy-map has configured only "match ip prec", then add an extra "dummy" class-map that will match on an unused vlan id, or an unused qos-group.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2011-4007 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.1(2)S |
|
Known Fixed Releases: | 15.1(2)S2, 15.1(3)S1, 15.2(1)S |
|
|
| |
| |
Bug Id: | CSCuq67798 |
Title: | XE313 Mcast Service Reflection:IpFormatErr packet drop seen in KP |
|
Description: | Symptom:While testing XE313 with "xe39_1588" and "xe34_v4mcast_sr(Service reflection) features in ASR1002-X platform,observing packet drops.
Conditions:Packet drops are seen only in ASR1002-X platform platform when 1588 configuration is present.
Workaround:Removing 1588 configuration will make the flow normal without any drops.
More Info:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu68669 |
Title: | ASR1001x ping failure when config negotate-auto to FastEthernet |
|
Description: | Symptom: when asr1001x gig interface connects to FastEthernet and both enabled as negotiation auto
Conditions: when asr1001x connect to FastEthrent and asr1001x configured "negotiation auto"
Workaround: configure the asr1001x side as "speed 100"
Further Problem Description: none
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 16-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq09004 |
Title: | RP crashed with cpp_cp_svr crash in cpp_qm_event_insert_leaf_node |
|
Description: | Symptom: After upgrading the ASR to the latest 15.2(04)S and later 15.X releases the ASR1K started crashing. The trigger for this crash is when a flat QoS policy with fair-queue is applied to a frame-relay interface.
Conditions: The trigger for this crash is the flat QoS policy with fair-queue applied to the frame-relay interface. In this case the two key components that together triggered this failure was the frame-relay plus the flat policy with fair-queue.
Workaround: The workaround is a cosmetic change that will cause NO functional impact. The workaround is to convert this flat policy to a hierarchical policy with a parent shaper set to 100%.
policy-map PM_POS_PARENT class class-default shape average percent 100 service-policy PM_POS ! interface POS0/1/0 no ip address encapsulation frame-relay load-interval 30 crc 32 pos scramble-atm frame-relay lmi-type ansi service-policy output PM_POS_PARENT hold-queue 4096 out
Further Problem Description: This issue is specic to the ASR1K X platforms (ASR1002x, ASR1001x) and ASR1K with ESP100/ESP200.
This issue is not applicable to the older ASR1K platforms using ESP5/10/20/40 or non-X series ASR1002/1001 platforms.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 17-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S2.1 |
|
Known Fixed Releases: | 15.2(4)S6, 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCus62358 |
Title: | ASR1k: MAC based filter does not work with EPC |
|
Description: | Symptom: MAC based filter does not work with EPC for control plane packets I tried to capture packets using a mac based filter and lot of packets were caught which did not match the filter.
Images tested: asr1000rp1-adventerprise.03.13.01.S.154-3.S1-ext.bin asr1000rp1-adventerprisek9.03.12.02.S.154-2.S2-std.bin
Conditions: NA
Workaround: NA
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 17-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S2.1 |
|
Known Fixed Releases: | 15.4(2)S3, 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus69026 |
Title: | ASR1K B2B CGN NAT ASR1K lost sync in standby IP NAT allocated addresses |
|
Description: | Symptom: In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 lost sync in standby IP NAT allocated addresses after a long period. (More than 1 week)
Conditions: PAP+BPA configured ASR1013 with ESP200 B2B CGN NAT.
Workaround: Redundancy fail over to corrected the issue.Once the standby CGN became active, the IP allocated addresses would be corrected.
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 17-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu75584 |
Title: | cpp ucode crash related to Nat config changes |
|
Description: | Symptom: cpp-ucode crash followed by fman-Fp crash
Conditions: possible NAT configuration changes
Workaround: None
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S5.9 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCto03123 |
Title: | cman-fp/cman-cc slow memory leak is seen |
|
Description: | Symptom:1. A slow memory leak is seen on cman_fp process on FP and cmcc process on a SIP. This is seen on all the flavors for FPs and CCs. Leak is of the order of less than 100-122K bytes per day. 2. Additional memory leak can happen when there are frequent sensor value changes take place.
Conditions:No special condition is required for first leak to happen. Second leak happens when sensor related changes take place.
In show log OR syslog output, you can expect to see the following message: %OOM-3-NO_MEMORY_AVAIL: SIP0: oom.sh: The system is very low on available memory. Operations will begin to fail
Workaround:None.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XNF1, 15.0(1)S2, 15.0(1)S3, 15.1(1)S, 15.1(2)S |
|
Known Fixed Releases: | 12.2(33)XNF2e, 15.0(1)S4, 15.1(1)S2, 15.1(2)S1, 15.1(3)S |
|
|
| |
| |
Bug Id: | CSCuc03831 |
Title: | Last reload reason is LocalSoft on combined architecture platforms |
|
Description: | Symptom: Combined architecture platforms (ASR1001, ASR1002-x, etc) can experience a system reset that causes the system to not save logs and the reset reason is noted as "LocalSoft"
Conditions: When the bootflash is detected as removed on these platforms, or a critical processes fails.
Workaround: None.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.1(1)S1 |
|
Known Fixed Releases: | 15.2(4)S2, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCuu36926 |
Title: | XE317:IP Ping connectivity failure with atm_pmcr_pcr configs |
|
Description: | Symptom: While testing XE316 image with "xe35_atm_pmcr_pcr"(SPA-3XOC3-ATM-V2 & SPA-2CHT3-CE-ATM are used) feature in RP2 platform, observing IP ping failure.
Conditions: Issue is seen in RP2 platform.
Workaround: Check "Workaround" enclosure.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S, 15.6(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut82336 |
Title: | ASR1002-X: Handle leap second in ToD IN |
|
Description: | Symptom: Time of day variation between master and source when ASR1002-X is used as ToD IN from 30 June 2015.
There will be one second difference between ASR1002-X master and slave, with the actual UTC time.
ASR1002X#show platform software ptpd tod PTPd ToD information:
Time: 04/21/15 09:07:02
ASR1002X#
There will be one sec difference in above time and the actual UTC time.
Conditions: ToD input is used to synchronize time-of-day.
When ASR1002-X acts as a MASTER in ordinary clock configuration, it takes 10M or 2M for frequency synchronization and ToD input from symmetricom for ToD synchronization.
This frequency and ToD is transmitted to other PTP Boundary clocks and slave clocks for synchronization.
Due to leap second, when UTC Offset increases by one second, MASTER PTP Clock does not handle that. So, there is a difference between actual UTC time and the time transmitted by PTP Master.
Config ----------- ptp clock ordinary domain 0 tod R0 ntp input 1pps R0 clock-port master master transport ipv4 unicast interface Lo0 negotiation
Workaround: None
Further Problem Description: See CSCut65374 for details.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut48055 |
Title: | ESP100 periodically crashes with hardware interrupt |
|
Description: | Symptom: Periodical ESP/QFP crashes on ASR1k running as LNS
Conditions: When updating the schedule exponent that has more than 128 queue, the queue-move operation completes prematurely. This causes a hardware interrupt because the hierarchy resumes forwarding the traffic before all queues have been moved to the new tree.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCuq64148 |
Title: | Pkt drops + CRC errors when connected to built-in ports on ASR1001-X |
|
Description: | Symptom: Ping fails when ASR1001-X Builtin ports are connected to ISR 3900/3925/3945 Builtin ports or ONS15454 .
Conditions: This is seen with the built-in ports only on an ASR1001-X and not when using any other GigE SPA.
Workaround: There is a temporary workaround which needs to be applied every time router/SIP/SPA reload for each builtin port.
ASR1001-X#ipc-con 0 0 Entering CONSOLE for slot 0 Type "^C^C^C" to end this session
Slot-0-0# Slot-0-0#test hw-module subslot 0 phy write 31 0 0 3 op 1, port_num 4, phy_reg 0x1F, addr 0x2 Dev = 0x00000000, Reg = 0x0000001F, value = 0x00000003 Slot-0-0# Slot-0-0#test hw-module subslot 0 phy write 23 0 0 0 op 1, port_num 4, phy_reg 0x17, addr 0x2 Dev = 0x00000000, Reg = 0x00000017, value = 0x00000000
Port Number Mapping : ==================== GigabitEthernet0/0/0 2 GigabitEthernet0/0/1 3 GigabitEthernet0/0/2 4 GigabitEthernet0/0/3 5 GigabitEthernet0/0/4 6 GigabitEthernet0/0/5 7
----
OR
Adding a switch in between ASR1001-X and the connected device will also prevent the issue.
Further Problem Description: Issue might not be reproducible on all the ports and is intermittent. This issue is fixed in 15.4(3)S2 (XE 3.13.2S) through CSCur24110.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S |
|
Known Fixed Releases: | 15.5(1.15)S, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCur24793 |
Title: | l2protocol forward not work for STP, LLDP, PPTPv2 and E-LMI in EVC |
|
Description: | Symptom: STP, LLDP, PPTPv2 and E-LMI keep being punted/forward regardless of the l2protocol forward CLI
Conditions: Config l2protocol forward stp elmi lldp under EVC
Workaround: N/A
Further Problem Description: N/A
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 19-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.3(3)S5.11, 15.5(1.18)S0.9, 15.5(2)S, 15.5(2.10)S |
|
|
| |
| |
Bug Id: | CSCus13106 |
Title: | Error in generating keys:no available resources |
|
Description: | Symptom: After ESP Switchover SSH on ASR stops working
Conditions: ASR 1006 RP2 15.2(4) S4 Happens after ESP switchover
Workaround: n/a
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 19-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S4.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus13268 |
Title: | ASR seg fault crash on VTEMPLATE Background Mgr |
|
Description: | Symptom: ASR1K router crash with: UNIX-EXT-SIGNAL: Segmentation fault(11), Process = VTEMPLATE Background Mgr
Conditions:
Workaround:
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 19-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S5.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu71411 |
Title: | ASR1K DMVPN: Packets not getting decrypted with uws_vpn3 profile |
|
Description: | Symptom:ASR1K DMVPN Spoke-to-Spoke packets not getting decrypted. Conditions:Regression found issue. Workaround:N/A
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 20-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuo99185 |
Title: | Multiple IOS-XE CPP Ucode crashes due to invalid static route |
|
Description: | Symptom: When PE receives a packet with the destination of CE's interface's address, PE router crashes.
Conditions: topo: CE(1.1.1.1)------PE1------(mpls)--------PE2 there is a static ip route on PE1: ip route vrf xxx 1.1.1.1 255.255.255.255 3.3.3.3. and 3.3.3.3 is the PE1's VRRP address. Then PE2 sends traffic with dst address 1.1.1.1 to PE1 and PE1 crashes.
Workaround: remove above static ip route.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.3(3)S3.7, 15.3(3)S4, 15.4(1)S2.15, 15.4(1)S3, 15.4(2)S1.5, 15.4(2)S2, 15.4(3)S0.2, 15.4(3)S0z, 15.4(3)S1, 15.4(3)S2 |
|
|
| |
| |
Bug Id: | CSCuu82195 |
Title: | ASR1k experiences CPP crash with DMVPN setup and QoS on spokes |
|
Description: | Symptom: ASR1k with DMVPN configuration experiences a crash when bringing up tunnels. This is due to lack of resources (queues on BQS). This can be checked with "show platform hardware qfp active infrastructure bqs sorter memory available" -> LEAF:STEM available.
Conditions: DMVPN configuration, policy-map applied to the spoke
Workaround: Do not oversubscribe the platform with many policy-maps
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 22-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.9 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus86476 |
Title: | ASR1K NAT ALG ucode crash @ipv4_nat_destroy_addrport_bind |
|
Description: | Symptom: Crash occurs in chunk malloc. Backtrace indicates call from ipv4_nat_destroy_addrport_bind
Conditions: The PPTP ALG must be enabled for this condition to occur (enabled by default)
Workaround: Disable PPTP ALG through use of configuration command "no ip nat service pptp"
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S2.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur46656 |
Title: | 3.10.4S-UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task |
|
Description: | Symptom: A router running IOS-XE (ISR 4000 series, ASR 1000 series), containing a SPA-4XT3/E3 module, may crash with the following error message:
UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task
Conditions: In order for this bug to be encountered, all of the following conditions must be met :
The router is running one of the following software versions: 3.10.4S and earlier 3.11.3S and earlier 3.12.2S and earlier 3.13.1S and earlier 3.14.1S and earlier 3.7.6S and earlier
The router has a SPA-4XT3/E3 module installed.
The router is sending DS3 SNMP traps, ie the line 'snmp-server enable traps ds3' is present in the router's configuration.
Workaround: Booting the device without the following configs :
snmp-server enable traps ds3
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S4 |
|
Known Fixed Releases: | 15.3(3)S4.11, 15.3(3)S5, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S1.4, 15.4(3)S2, 15.5(1)S0.6, 15.5(1)S1, 15.5(1)SN1, 15.5(1.15)S |
|
|
| |
| |
Bug Id: | CSCty26186 |
Title: | Enhancement request to capture watchdog reset on asr1k |
|
Description: | Symptom: reset did not save any core or crashinfo file. no error log either.
under show version: "Last reload reason: Watchdog"
under "Reset reason Power On" watchdog reset
Conditions: normal operation. reset did not save any core or crashinfo file. no error log either.
Workaround: this is a code enhancement. not a bug. therefore, no workaround applicable.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.1(2)S, 15.1(2)S2 |
|
Known Fixed Releases: | 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCui25696 |
Title: | ASR 1K router - Kernel Core Crash on find_busiest_group() |
|
Description: | Symptom: Cisco ASR 1K router experiences a watchdog reset due to a kernel core dump triggered by a possible invalid calculation.
Conditions: This symptom can occur under any condition.
Workaround: There is no workaround.
Further Problem Description: The bug mentions "watchdog". On platforms that have dedicated FP/ESPs (example would 1002, 1004, 1006 and 1013), there is no reload of the RP and so, the show version output will not reflect watchdog.
The may be as much as 10 minutes or more from the time you see IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0 tp when you see IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
The interruption to network services are likely to happen close to when you see online in slot F0 message.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S1 |
|
Known Fixed Releases: | 15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCut72639 |
Title: | ASR1k CPP crash with IP Options |
|
Description: | Symptom: ASR may reload or have a CPP crash when configured with MPLS.
Conditions: ASR receives following packet from mpls interface. the packet's format is as follows:
Workaround: none
Further Problem Description: The router crashes because of receiving a mpls packet with explicit null label as well as LSR ip option from mpls interface
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S3 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut74937 |
Title: | ASR1K PBR VRF Selection not working when source is local router |
|
Description: | Symptom: ae_test_cp1#show plat hard qfp acti stat drop ------------------------------------------------------------------------- Global Drop Stats Packets Octets ------------------------------------------------------------------------- ForUs 15 858 Icmp 205 23210 IpFragErr 3369 5146500 Ipv4NoAdj 465301 38263494 Ipv4NoRoute 1188 100002 Ipv4RoutingErr 6 600 NatIn2out 3117 362895 NatOut2in 3018 229816 UnconfiguredIpv4Fia 260203 17732393 UnconfiguredIpv6Fia 596925 152893250 ae_test_cp1#ping vrf ae_vpn1 10.20.30.1 source 10.20.10.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.20.30.1, timeout is 2 seconds: Packet sent with a source address of 10.20.10.1 ..... Success rate is 0 percent (0/5) ae_test_cp1#show plat hard qfp acti stat drop ------------------------------------------------------------------------- Global Drop Stats Packets Octets ------------------------------------------------------------------------- ForUs 15 858 Icmp 210 23780 IpFragErr 3369 5146500 Ipv4NoAdj 465301 38263494 Ipv4NoRoute 1188 100002 Ipv4RoutingErr 6 600 NatIn2out 3117 362895 NatOut2in 3018 229816 UnconfiguredIpv4Fia 260203 17732393 UnconfiguredIpv6Fia 596925 152893250
Conditions: No specific condition, just need to configure VRF Selection and it happens
Workaround: No workaround
Further Problem Description: none
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.2(4.0.1) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu97977 |
Title: | Pfrv2 load-balance not working with passive mode. |
|
Description: | Symptom: Traffic is not load-balancing in Outbound /Inbound direction while running PFRv2 with Internet Edge Solution.
Conditions: while running PFRv2 with Internet Edge Solution and load-balance with passive mode.
Workaround:
Further Problem Description: Customer is running Pfrv2 Internet Edge solution to load-balance Outbound and Inbound Traffic.
Seems like the new link-group algorithms not work well for load-balance with passive mode.
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur57558 |
Title: | To fix limitation of 20sec TBAR for ASR1K GM |
|
Description: | Symptom: On an ASR1000 series router running GETVPN, there is currently a limitation with the Time Based Anti-Replay window of 20 seconds or longer. This restriction should be removed to accommodate a more reasonable window threshold.
Conditions: This is only a limitation on the ASR1000 series router platforms.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 23-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S, 15.5(1)S |
|
Known Fixed Releases: | 15.3(3)S5, 15.4(1)S3, 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCug63564 |
Title: | IKEv2: Crafted IKE_SA_INIT packet causes traceback |
|
Description: | Symptoms: Under certain conditions, malformed IKEv2 packets may cause a traceback in the ''Crypto IKEv2'' process: *Feb 13 21:07:15.812: %SYS-2-MALLOCFAIL: Memory allocation of 4294967078 bytes failed from 0x16A15FF8, alignment 0 Conditions: The condition is only causing traceback message to be printed. No actual crash is happening. Workaround: None |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.3(2)S |
|
Known Fixed Releases: | 15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(0.1)T, 15.4(0.6)S, 15.4(1)CG, 15.4(1)CG1, 15.4(1)S, 15.4(1)S0a, 15.4(1)S0b, 15.4(1)S0c |
|
|
| |
| |
Bug Id: | CSCun25912 |
Title: | IKEv2 auto-reconnect: some virtual-access dynamic configs are lost |
|
Description: | Symptom: Configurations dynamically applied to the virtual-access interface might be lost over the reconnection while using the autoreconnect feature on Cisco Anyconnect on the ASR platform.
For example, the interface after initial connection establishment would have a QOS service policy applied:
ROUTER#sh derived-config int virtual-access 1
! interface Virtual-Access1 ip unnumbered GigabitEthernet0/0/1 tunnel source 10.1.1.1 tunnel mode ipsec ipv4 tunnel destination 10.10.1.100 tunnel protection ipsec profile ipsec-profile no tunnel protection ipsec initiate service-policy input INPUT-POLICY end
After reconnection the INPUT-POLICY is missing:
ROUTER#sh derived-config int virtual-access 1
! interface Virtual-Access1 ip unnumbered GigabitEthernet0/0/1 tunnel source 10.1.1.1 tunnel mode ipsec ipv4 tunnel destination 10.10.1.100 tunnel protection ipsec profile ipsec-profile no tunnel protection ipsec initiate end
Conditions: This symptom is observed with configurations being applied from the user AAA profile over radius authentication. Affected parameters observed are QOS service policies and access-group. Workaround: 1. Do not use the reconnect feature. or 2. Apply the configurations directly to the virtual-template (if this is an option).
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(1)S1.8, 15.4(1)S2, 15.4(1)S3, 15.4(1)T1.2, 15.4(1)T2, 15.4(1)T3, 15.4(2.11)S, 15.4(2.5)T |
|
|
| |
| |
Bug Id: | CSCun13772 |
Title: | NHRP: CPUHOGs seen when many child entries expire simultaneously |
|
Description: | Symptom: CPUHOG messages and watchdog timeout crashes are observed on an ASR1000 series router running DMVPN.
Conditions: This has been observed on a router with a very large NHRP table (10-20k individual entries) with a very high number (thousands) of child entries per parent entry.
Workaround: Reduce the number of child entries per parent entry through the use of supernetting.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S1 |
|
Known Fixed Releases: | 15.2(1)SY1.13, 15.2(4.0.21)E, 15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10, 15.3(3)S5, 15.4(2.17)S0.7, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCuq86382 |
Title: | FLEXVPN IKEv2 auto reconnect | virtual-access | VRF lost | anyconnect |
|
Description: | Symptom: ASR/FLEXVPN ANYCONNECT
Conditions: On client side, AnyConnect is used. Pings are sent in the VPN during all the tests.
The reconnect feature is activated with timeout = 600
An outage is simulated by blackholing the trafic on an intermediate router: the source IP and the destination IP are sent to null 0. When doing this, the client starts the reconnect process and the PE brings the Virtual-Access interface after a short period.
If the connectivity is restored before the Vi interface goes down, the reconnect feature works fine. If the connectivity is restored after the Vi interface goes down, the client reconnects but something is broken in the installation of the route into the VRF. As a result, the VPN is up but the client connectivity is still down.
Workaround: NONE
Further Problem Description: NONE
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | 15.2(1)SY1.13, 15.2(4.0.21)E, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S0.8, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.7, 15.5(0.25)T0.2 |
|
|
| |
| |
Bug Id: | CSCum22612 |
Title: | ASR1k IKE SA Stuck in MM_KEY_EXCH with RSA-SIG blocking new SAs with CAC |
|
Description: | Symptom: Since the ASR fails to send MM6 [being a responder] in the absence of a valid certificate, IKE SAs start leaking and hence get stuck in MM_KEY_EXCH state. Multiple MM_KEY_EXCH exist for a single Peer on the ASR, however the Peer does not retain any SAs for ASR in this case. Along with CAC for in-negotiation IKE SAs, these stuck SAs block any new SAs or IKE rekeys even after renewing the certificates on the ASR.
Conditions: This symptom is observed under the following conditions: - ASR acting as IKEv1 termination point [sVTI for example] and is a responder. - IKE authentication mode is RSA-SIG [Certificates]. - On the ASR, the ID-Certificate is either Expired or Not-present for a given sVTI tunnel - The ASR also has a IKE in-negotiation CAC of a certain value. Example: crypto call admission limit ike in-negotiation-sa 30
Workaround: Perform the following workarounds: a) Manually delete stuck SAs by using: clear crypto isakmp 12345 .. where 12345 is conn_id of a stuck SA. Repeat this for each stuck SA
b) Temporarily increase CAC to accommodate new SA requests: crypto call admission limit ike in-negotiation-sa 60
Further Problem Description: Found and Tested in Cisco Release XE 3.7.4/Cisco IOS Release 15.2(4)S4.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.2(1)IC273.175, 15.2(1)IC273.8, 15.2(2)EA1, 15.2(2.0)EA, 15.2(2.1)EB, 15.2(2.2.75)ST, 15.2(2.6.68)EA, 15.2(2.7.9)EA, 15.2(2.8.1)EA1, 15.2(4)GC1 |
|
|
| |
| |
Bug Id: | CSCur02734 |
Title: | IOS-XE evaluation for CVE-2014-6271 and CVE-2014-7169 |
|
Description: | Symptom: The following Cisco products running IOS-XE software
Cisco ASR 1000 Series Aggregation Services Router Cisco ASR 920 Series Aggregation Services Router Cisco ASR 900 Series Aggregation Services Router Cisco 4400 Series Integrated Services Routers Cisco 4300 Series Integrated Services Routers Cisco Cloud Services Router 1000V Series
include a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187
This bug has been opened to address the potential impact on this product.
Conditions: In all version before the Known Fixed Releases with either
The Persistent SSH feature enabled The Persistent telnet feature enabled
Information on the Persistent SSH & persistent telnet feature is available on :
http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Console_Telnet_SSH_Handling.html#pgfId-1057023
The Persistent SSH or Persistent telnet feature is only available on the Management interface (GigabitEthernet0) in the VRF Mgmt-intf.
With Persistent SSH, a user must first successfully log in and authenticate via SSH to trigger this vulnerability. With Persistent telnet, an unauthenticated user can exploit this vulnerability
Other conditions may exist. This release note will be updated if other attack vectors are discovered.
Workaround: Disable the Persistent SSH feature. Disable the Persistent telnet feature.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.2(4)S6, 15.3(3)S, 15.3(3)S4, 15.4(1)S, 15.4(1)S2, 15.4(2)S, 15.4(2)S1, 15.4(3)S |
|
Known Fixed Releases: | 15.2(4)S7, 15.3(3)S5, 15.4(1)S3, 15.4(2)S2, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCut77070 |
Title: | SPA-1xCHOC12/DS0 not supporting Framed E1 connections. |
|
Description: | Symptom: Framed E1 on SPA-1xCHOC12/DS0 is not coming up. The device is sending AIS to the remote node.
Conditions: The issue is with Framed E1's. When we configure unframed E1, the link is coming up.
Workaround: No workaround
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.1(3)S |
|
Known Fixed Releases: | 15.4(3)S3.3, 15.5(1)S2.2, 15.5(2)S0.8, 15.5(2.21)S |
|
|
| |
| |
Bug Id: | CSCuu24757 |
Title: | ASR1k QFP leak with cpp_sp_svr at module FM CACE |
|
Description: | Symptom: An ASR1k router will have a leak on the QFP with cpp_sp_svr. Listing the modules under this service, FM CACE which deals with software TCAM will be holding the majority of the memory:
Router#show platform software memory qfp-service-process qfp active . . Module: FM CACE allocated: 1866346946, requested: 1857054514, overhead: 9292432 Allocations: 1161692189, failed: 0, frees: 1161111412
Conditions: Currently, this is seen when tunnel interface is configured with IPSEC in a DMVPN environment but the exact conditions are unknown at this time.
Workaround: None at this time
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu86738 |
Title: | ASR router crash while adding/deleting route-map/prefix entry |
|
Description: | Symptom: ASR router crash during route-map addition/deletion
Conditions: This has been seen on ASR1K running 15.2(4)S3 code
Workaround: Not known
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S3 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu44128 |
Title: | GETVPN on ASR with vasi interface fail to install the Rekey |
|
Description: | Symptom: In GETVPN scenario ASR as Group Member where crypto map is applied on Vasi interface rekey fails to install. For registration there is no problem.
Conditions: When ASR as GM where crypto map is applied on Vasi interface
Workaround: none
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 24-JUN-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq14700 |
Title: | TDL message buffers memory leak |
|
Description: | Symptom: memory leaking in mcp_dev - cpp_packet_drop_count_entry TDL message buffers.
Conditions: normal
Workaround: none
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S4.9 |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCur43882 |
Title: | %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: in mcp_dev |
|
Description: | Symptom: *Oct 28 10:55:10.568: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP
Conditions: This issue is seen after doing router reload with latest MCP_DEV image.
Workaround: -
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S4.1, 15.4(3)S, 15.5(1)S, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu88964 |
Title: | ASR1K Kernel crash at pidns_get() |
|
Description: | Symptom: ASR1K kernel crash
Conditions: This has been seen on ASR1K running 3.10.2 code.
Workaround: Not known
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut81614 |
Title: | OTV non-AED wrongly replies to ARP request received from internal intf |
|
Description: | Symptom: non-AED will reply to ARP request which will make L2 traffic loss
How to verify if your problem hits this ddts: For target Mac address(duplicated in otv database), check the mac table on all related switches and ASR1K(ED). If the the port of the mac address is wrong, you may meet the problem hits this ddts.
Conditions: Multi-homing
Workaround: disable otv arp-nd cache
Further Problem Description: None
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2 |
|
|
| |
| |
Bug Id: | CSCus69732 |
Title: | IOS-XE: Evaluation of glibc GHOST vulnerability - CVE-2015-0235 |
|
Description: | Symptom: On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.
The following IOS-XE related products are affected: Cisco ASR 1000 Series Aggregation Services Router Cisco ASR 920 Series Aggregation Services Router Cisco ASR 900 Series Aggregation Services Router Cisco 4400 Series Integrated Services Routers Cisco 4300 Series Integrated Services Routers Cisco Cloud Services Router 1000V Series
A Cisco Security Advisory has been published to document this vulnerability at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost
This bug has been opened to address the potential impact on these products.
Conditions: Exposure is not configuration dependent.
All versions prior to the following ones are shipping with the vulnerable code: 15.5(1)S/XE3.14.S 15.4(3)S2/XE3.13.2S 15.4(2)S2/XE3.12.2S 15.4(1)S3/XE3.11.3S 15.3(3)S5/XE3.10.5S 15.2(4)S6/XE3.7.6S 15.1(3)S7/XE3.4.7S The following are active releases and planned CCO date: release CCO_Date 15.5(2)S/XE3.15.0S 3/31/2015 15.5(1)S1/XE3.14.1S 3/3/2015 15.4(3)S3/XE3.13.3S 5/29/2015 15.4(2)S3/XE3.12.3S 3/28/2015 15.4(1)S4/XE3.11.4S 5/29/2015 15.3(3)S6/XE3.10.6S 7/30/2015 15.2(4)S7/XE3.7.7S 3/20/2015 15.5(3)S/XE3.16.0S 7/31/2015
Workaround: Not available.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.2(4)S7, 15.4(1)S4, 15.4(2)S3, 15.4(3)S3, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCus66974 |
Title: | ASR1K QFP reload in a B2B CGN NAT scenario with PAP+BPA |
|
Description: | Symptom: The ESP may reload in an ASR1000 chassis.
Conditions: This has been seen when Carrier Grade NAT (CGN) is deployed
Workaround: There is no workaround.
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S, 15.6(1)S |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCus09942 |
Title: | ASR Crash on ipv4_nat_ha_upd_to |
|
Description: | Symptom: ASR1k crash due to nat
logs prior to crash :
Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 107: pesrtr2: Dec 3 11:15:54.343 CET: %IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0 Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 108: pesrtr2: Dec 3 11:15:54.346 CET: %CPPHA-3-FAULT: SIP0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8 Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 109: pesrtr2: Dec 3 11:15:54.347 CET: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_ha: cpp_ha encountered an error -Traceback= 1#9188fb8134aeba8cd2f10ae207ddad9c errmsg:7F376F5E1000+121D cpp_common_os:7F3773041000+DC08 cpp_common_os:7F3773041000+1B77E cpp_drv_cmn:7F3772909000+29CC7 :400000+237E9 :400000+232AC :400000+22CD9 :400000+135AD :400000+1258C cpp_common_os:7F3773041000+11DF0 cpp_common_os:7F3773041000+124D6 evlib:7F376E798000+B937 evlib:7F376E798000+E200 cpp_common_os:7F3773041000+14012 :400000+D8ED c:7F37672B3000+1E514 :400 Dec 3 11:15:54 pwanrtr2.vlan1212.delot.de 110: pesrtr2: Dec 3 11:15:54.347 CET: %CPPHA-3-FAULTCRASH: SIP0: cpp_ha: CPP 0.0 unresolved fault detected, initiating crash dump. Dec 3 11:20:06 pwanrtr2.vlan1212.delot.de 77: pesrtr2: *Dec 3 11:20:05.263 CET: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to up
Conditions: unknown
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S, n/a |
|
Known Fixed Releases: | 15.4(3)S3, 15.5(1)S2, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCus86120 |
Title: | RP1: CLI run slow in new XE313/XE314 image |
|
Description: | Symptom: A Cisco router that is rebooted may display the following logs repeatedly: %PNP-6-HTTP_CONNECTING: PnP Discovery trying to connect to PnP server https://devicehelper.cisco.com/pnp/HELLO %SYS-3-HARIKARI: Process Wait on Autoinstall top-level routine exited
Conditions: This happens at bootup under some conditions incorrectly.
Workaround: There is no workaround for the problem.
Further Problem Description: |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-JUN-2015 |
|
Known Affected Releases: | 15.2(1)IC273.283, 15.4(3)S, 15.5(2)S |
|
Known Fixed Releases: | 15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.7, 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCut03205 |
Title: | SPA modules on ASR1002-X show "missing" under show platform output |
|
Description: | Symptom: When a new/compatible SPA module is inserted in a ASR1002-X chassis in certain cases it may exhibit one of the following symptoms:
1) SPA module shows "missing" under "show platform" output
Slot Type State Insert time (ago) --------- ------------------- --------------------- ----------------- 0 ASR1002-X ok 12w0d 0/0 6XGE-BUILT-IN ok 12w0d 0/1 SPA-8XCHT1/E1 missing 5w4d
2) Shows as "Out Of Service". Not to be confused for an existing module which might have failed and shows "out of service".
Chassis type: ASR1002-X
Slot Type State Insert time (ago) --------- ------------------- --------------------- ----------------- 0 ASR1002-X ok 12w0d 0/0 6XGE-BUILT-IN ok 12w0d 0/1 SPA-8XCHT1/E1 out of service 5w4d
3) Does not show at all under "show platform" or "show inventory" and no logs are generated when its inserted/removed. The following command will confirm if the router sees it and its state: # show platform hardware slot 0 spa stat
Bay SPA Type State PST POK SOK PENB RST DENB HSS ------------------------------------------------------------------------------- 0 6XGE-BUILT-IN Online 0 1 1 1 1 0 1 1 Unknown Detection 0 0 0 0 0 1 0 <<< 2 Empty Detection 1 0 0 0 0 1 0 3 Empty Detection 1 0 0 0 0 1 0
Conditions: Has been seen only when a SPA is installed for the first time in a ASR1002-X chassis.
Workaround: The SPA in this case should come online after a reboot.
Further Problem Description: The same SPA modules work without any issues on other ASR1K chassis.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCto82630 |
Title: | CC/SPA package modification to reduce SIP 10 memory usage |
|
Description: | Symptom: ASR1000 with SIP module may report a low memory warning. This is a cosmetic non impacting issue.
%PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0: Committed Memory value 96% exceeds warning level 95%
Conditions: SIP memory usage can be verified with the following command:
show platform soft status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) SIP0 Healthy 449776 445428 (99%) 4348 ( 1%) 429456 (95%) SIP1 Warning 449776 443572 (99%) 6204 ( 1%) 431344 (96%) SIP2 Healthy 449776 397796 (88%) 51980 (12%) 318364 (71%)
Workaround: None. Cosmetic issue. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XNF2, 15.1(3)S |
|
Known Fixed Releases: | 15.1(2)S1, 15.1(3)S, 15.2(1)S |
|
|
| |
| |
Bug Id: | CSCuu92634 |
Title: | ASR1K:FP100: cpp_svr core file seen with uws_wan_xe311 profile |
|
Description: | Symptom: cpp_svr core file seen with uws-wan_xe311 profile.
Conditions: while removing and adding service-policy from parent tunnel policy
Workaround: -
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 27-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu35388 |
Title: | IKEv2 - IPSec SA lifetime expires immediately after SA is established |
|
Description: | Symptom: SA is created within in the same instance a (lifetime_expiry) message is printed stating "SA lifetime threshold reached, expiring in 3599 seconds" this is followed by a (delete_sa).
358463: Apr 2 12:59:19.348 EDT: IPSEC:(SESSION ID = 2127) (lifetime_expiry) SA lifetime threshold reached, expiring in 3599 seconds 358464: Apr 2 12:59:48.420 EDT: IPSEC:(SESSION ID = 2127) (delete_sa) deleting SA,
Conditions: This condition is observed in asr1002x-universalk9.03.15.00.S.155-2.S-std.SPA code.
Workaround: Disable volume based rekey
Reduce the crypto ipsec security-association replay window-size to a value below 1024
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 27-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)M, 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu17412 |
Title: | ASR903: H-VPLS VFI Leak on Xconnects, Routes and IGP Flaps |
|
Description: | Symptom: On an ASR903 PE router, H-VPLS VFIs are leaked, stale VFI entries are created and traffic loss is observed for traffic that is to be switched by the VFIs.
Conditions: H-VPLS is configured with multiple neighbors present in the H-VPLS core and with a few neighbors present as spokes. With this configuration, one condition to trigger the problem is that Xconnects, IP routes and CLNS neighborships are flapped multiple times on the H-VPLS nodes and the "spoke" nodes. Another condition to trigger the problem is that H-VPLS configuration is deleted and reconfigured multiple times.
Workaround: There is no work-around known as yet.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu58443 |
Title: | ASR1001: SMC-2-BAD_ID_HW or SCC-3-XCVR_BAD_ID_HW with GLC-SX-MMD |
|
Description: | Symptom: The following error messages may be seen on an ASR1001 router and the interface stays down.
%SMC-2-BAD_ID_HW: SIP0/0: Failed Identification Test in 0/0/2 %SCC-3-XCVR_BAD_ID_HW: SIP0/0: Failed identification test in 0/0/0
Conditions: The issue occurs when inserting a GLC-SX-MMD SFP or rebooting the router.
Workaround: Contact TAC to check for a workaround.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu85007 |
Title: | split-horizon group communication failure |
|
Description: | Symptom: split-horizon group communication failure
Conditions: upgrade from 3.7.4S to 3.10.1S or 3.13.0S
Workaround: none
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCun39803 |
Title: | OTV Drops ARP Broadcasts due to corrupt Flood List Pointer |
|
Description: | Symptom: Intermittent connectivity loss between hosts at different OTV sites. Pinging from one host to the other more than 8 times restores connectivity for about 8-10 minutes. Packet captures show ARP request broadcasts from a host at one site not being received by the host at the other site for about 7-8s, and then suddenly starting to work.
This problem has a tendency to get worse over time, with more and more hosts being affected over the course of a week or two until connectivity between sites is essentially gone.
Additionally ARP requests both arriving from an Overlay interface or from the inside interface could be lost.
Conditions: ASR1K running 15.4 or 15.3 code, possibly earlier code, with OTV configured.
Workaround: Remove the EVC's involved from all interfaces and overlay interface. Wait for a minute. Then it is OK to reconfigure them back.
Statically configuring ARP entries on the hosts will work also.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S, 15.4(1)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCtz61014 |
Title: | f Linux 2.6.27 kernel NTP leap second handling could cause deadlock |
|
Description: | Symptom: There are periodic leap second events which can add or delete a second to global time.
When the leap second update occurs the system will crash when adding or deleting NTP leap second in NTP master mode.
Conditions: The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.
Workaround: To prevent an issue when the leap second update is received do not configure the system as NTP master.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.0(1)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(2)S1 |
|
|
| |
| |
Bug Id: | CSCuv05361 |
Title: | cpp_cp_svr crash on AR1K |
|
Description: | Symptom: A cpp_cp_svr and a fman_fp_image core file was generated after configuring adaptive QoS.
Conditions: Not known
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut17865 |
Title: | ASR1K:13RU IOSd crash @PnP Agent Discovery after router reload |
|
Description: | Symptom: IOSd crash occurs at PnP Agent Discovery
Conditions: after doing write erase and reload
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.7, 15.4(3)S3 |
|
|
| |
| |
Bug Id: | CSCun87685 |
Title: | WCCP Crash @ ipv4_wccp_input_perf |
|
Description: | Symptom: ASR1006/15.4(1)S crashed while adding port and host specific deny statements on specifc lines for the WCCP-Redirect ACL
Conditions: Adding port and host specific deny statements on specifc lines for the WCCP-Redirect ACL
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S |
|
Known Fixed Releases: | 15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCut21885 |
Title: | fman_fp_image and cpp_cp_svr memory leak - QFP PfR MP Prefix H... |
|
Description: | Symptom: fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory
show platform software memory forwarding-manager FP active brief show platform software memory qfp-control-process qfp active brief
QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578 Summary 4262097059 4221917059 81523186 79011936
AL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 3076255744 cpp_cp_svr 28858 28431 28858 S 20 1849511936 fman_rp 21120 20336 21120 S 20 1452556288
4+ weeks later:
RAL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 4294967295 cpp_cp_svr 28858 28431 28858 S 20 2942447616 fman_rp 21120 20336 21120 S 20 1462714368
Conditions: normal operation
Workaround: unknown at this point
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.4(2)S1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuo61455 |
Title: | Crash in NAT with ALG enabled |
|
Description: | Symptom: Router crash with NAT ALG enabled on the router
Conditions: NAT ALG feature enabled on the router.
Workaround: Disable NAT ALG using: "no ip nat service all-alg"
Further Problem Description: Initially the issue was found to be on the box running with CGN and PPTP however those are not the only conditions. The issue is with NAT ALG and disabling it would prevent these ucode crashes.
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCub31873 |
Title: | ASR1K Crash on incomplete/glean adjacencies processing. |
|
Description: | <B>Symptom:</B> ASR RP/ESP crash.
<B>Conditions:</B> If a router has to process a lot of IP packets that are either incomplete adjacencies or glean adjacencies, they will be punted for ARP processing.
A condition occurs that may prevent the ESP from processing the RP keep alive for a certain period and the RP will force the ESP to crash.
Workaround: None. Upgrade to 15.2(04)S05-XE3.7.5 or later.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0685 has been assigned to document this issue.
More information about this vulnerability is made available at: http://tools.cisco.com/security/center/viewAlert.x?alertId=38124
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.2(4)S5, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCut14502 |
Title: | Address pool leak upon Anyconnect reconnect and subsequent disconnect |
|
Description: | Symptom: ASR1K acting as an IKEv2 VPN server experiences an address pool leak when we have local address pools configured with the group parameter. The issue is seen upon AnyConnect auto-reconnect and subsequent disconnect (the disconnect being a graceful one).
Conditions: Issue first found on ASR1K running 3.13 and 3.14 codes. The important thing is the group parameter in the address pool being used. The format of this is:
ip local pool pool1 x.x.x.x y.y.y.y group V1
Workaround: Reload the router
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S1.1 |
|
Known Fixed Releases: | 15.2(4.0.21)E, 15.5(1.18)S0.16, 15.5(2)S, 15.5(2)T1, 15.5(2.15)S, 15.5(2.23)T |
|
|
| |
| |
Bug Id: | CSCuu75086 |
Title: | ROMMON should use the revocation key offered by the secure boot FPGA |
|
Description: | Symptom: A issue in secure boot process of the Cisco ASR 1000 Series Aggregation Services Routers could allow a user to overwrite the revocation key on the bootflash of the device.
The issue is due to improper storage of the revocation key on bootflash.
Conditions: Device running with default configuration running an affected version of ROMMON software (prior to 15.5(3r)S) which supports secure boot. This includes the ASR1001-X and ASR1002-X routers as well as the ASR1000-ESP100 and ASR1000-ESP200 forwarding cards.
Workaround: None.
Further Problem Description: Please refer to http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s1.html#wp1425056588
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Planned to be addressed in the 15.5(3r)S ROMMON release
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.3(0.1) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtd33567 |
Title: | Traceback seen when receiving crafted H.323 packets |
|
Description: | Summary
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version of Cisco IOS Software.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml.
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier:
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 12.2(33)XNE |
|
Known Fixed Releases: | 12.2(33.2.5)XNE1, 12.4(15)T14, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ7, 12.4(22)YB8, 12.4(22)YD4, 12.4(24)MDA13, 12.4(24)MDB13, 12.4(24)MDB14 |
|
|
| |
| |
Bug Id: | CSCuu73790 |
Title: | PFRv3: packet loss reported unexpectedly by MMA with smart-probes |
|
Description: | Symptom: PFRV3 can report RTP packet loss.
Conditions: PFRV3 SMP packets traffic
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.4(3)S2.3, 15.5(2)S0.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu09050 |
Title: | asr1001x may crash when unconfiguring large QoS policy |
|
Description: | Symptom: asr1001x may reload when unconfiguring large QoS policy
Conditions: A very large QoS policy with hundreds of class-maps is used on the router and removed.
Workaround: Do not unconfigure large QoS policy.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)M, 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut52677 |
Title: | %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image after RP switchover |
|
Description: | Symptom: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP. This error message is seen.
Conditions: This issue is seen while doing sweep ping after doing RP switchover with latest MCP_DEV image.
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUN-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.5(2)S0.4, 15.5(2.18)S |
|
|
| |
没有评论:
发表评论