Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -Nexus 7000 Series Switch-01-Jul-2015 16:48 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
poap_ng.7.2.0.D1.1.py
File Description:

Nexus 7000 common python script for all Nexus releases power-on auto-provisioning feature

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.0.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.0.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.0.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS XML Schema Definition
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000_xsd.7.2.0.D1.1.tar.gz
File Description:

Nexus 7000 XML Schema Definition for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(0)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.0.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(0)D1(1)

File Release Date:
18-JUN-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Bug Id:
CSCun57894
Title:
Memory leak is seen in the 'adjmgr' process
Description:

Symptom:
Memory held by 'adjmgr' may increase over time and eventually be exhausted within the process. Alternatively, the following errors may be seen even though memory looks stable in the process -

am[3378]: Warning! Malloc Failure in ../routing-sw/libs/timers/active_timer.c[927] for size 8196
%ADJMGR-3-ATIMERS_ERROR: malloc failed in heap_create

Conditions:
No specific conditions or triggers are known at this time. This appears to occur during normal NX-OS operation.

Workaround:
None.

Further Problem Description:
To check memory within the process, the following command can be used -

show process memory | in adjmgr

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
7.1(0.1)
Known Fixed Releases:
7.0(1)N1(0.146), 7.0(1)N1(1), 7.0(1)ZD(0.145), 7.0(1)ZN(0.201)
Bug Id:
CSCur03040
Title:
N7K - OTV crashes at isis_otv-default
Description:

Symptom:
Nexus 7000 may experience a process crash with OTV configuration.

Reason: Reset triggered due to HA policy of Reset
System version: 6.2(8a)
Service: Service "__inst_001__isis_otv" in vdc 2 hap reset

Conditions:
OTV must be configured. This issue was first seen on 6.2(8).

Workaround:
Unknown.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
6.2(8a), 7.1(0)SIB(99.39)
Known Fixed Releases:
6.0(2)A6(0.59), 6.0(2)A6(1), 6.0(2)U6(0.59), 6.0(2)U6(1), 6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.10), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357)
Bug Id:
CSCum18198
Title:
restrictions for wccp redirect access-list and such other limitations
Description:

Symptom:
restrictions for wccp redirect access-list and such other limitations

Conditions:
restrictions for wccp redirect access-list and such other limitations

Workaround:
restrictions for wccp redirect access-list and such other limitations

Further Problem Description:
restrictions for wccp redirect access-list and such other limitations

Status:
Open
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
6.2(6)S9
Known Fixed Releases:
Bug Id:
CSCue92562
Title:
Memory Leak in "clp_fwd" Process
Description:

Symptom:
N7K-F248XP-24 module running NX-OS 6.0.1 crashes due to clp_fwd

Conditions:
Start type: SRV_OPTION_RESTART_STATELESS (23)
Death reason: SYSMGR_DEATH_REASON_FAILURE_SIGNAL (2)

Workaround(s):
None

Status:
Other
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
Bug Id:
CSCuu27341
Title:
Post ISSU to 7.2, shared ports i/f bind fails in FCoE VDC on mod reload
Description:

Symptom:
On N7K/ N7700 all ports of a module will fail to bind to FCoE VDC. show vdc membership status shows "module has become offline" though the module status is ok

Conditions:
ISSU from 6.2 to 7.2 with shared interfaces from F2e or F3 module to FCoE VDC. After ISSU do Module Reload/Poweroff-powerOn. When the module comes up again notice that no port from that module is available in FCoE VDC.

Workaround:
To recover from the problem:
Reload module one more time and the issue gets resolved. Alternatively, a switch reload will resolve the affected module as well as prevent any other modules that may be susceptible.

To prevent the problem choose any of the following:
(1) Cold boot upgrade to 7.2 (instead of ISSU)
(2) Unconfigure the port sharing in 6.2 prior to ISSU and reconfigure it in 7.2
(3) Perform a switch reload after ISSU (and prior to any of the line cards being individually powered off/on)

Further Problem Description:
Issue is observed only on the first module reload/ poweroff-poweron. Issue gets resolved on a consecutive reload and does not reoccur

Status:
Open
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu59455
Title:
ports were error-disabled sequence timeout with MTS_SAP_ETH_PORT_SEC
Description:

Symptom:
Interfaces were error disabled due to sequence timeout communicating with MTS_SAP_ETH_PORT_SEC

Conditions:
interfaces enabled port-security and this problem was found in 6.2(10).

Workaround:
disable port-security feature on affected interface.

Further Problem Description:

Status:
Other
Severity:
1 Catastrophic
Last Modified:
01-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu63346
Title:
vPC leg no BD after multiple link flaps
Description:

Symptom:
vPC leg (on one side) ended up without BD after a particular sequence of link flap. The other side, vPC leg is in STP BLK state.

vPC status
---------------------------------------------------------------------
id Port Status Consistency Active VLANs Active BDs
----- ------------ ------ ----------- ---------------- --------------
100 Po100 up success - - <<< No BD
200 Po200 up success - 100-107
A#

Conditions:
Happens with below particular sequence:

vPC Peerlink down -> A vPC leg(100) down -> vPc peerlink up -> A vPC leg(100)up

Workaround:
The sequence of recovery steps that will avoid the system coming into this unrecoverable bad state is to bring up the primary vpc leg up first followed by the peer link. This will ensure consistency and correctness in the final state.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuj86229
Title:
Fexes reloading due to watchdog timeout
Description:

Symptom:
Fexes bouncing due to 'watchdog timeout' reset reason

Conditions:
Using 6.2(2) and multiple fexes are bouncing due to watchdog timeout

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.1(0)FE(0.49), 6.2(0)FH(0.146), 6.2(0)HS(0.10), 6.2(5.58)S0, 6.2(6), 7.1(0)ZD(0.71), 7.1(0)ZD(0.74)
Bug Id:
CSCug44109
Title:
FT:aclmgr core at aclmgr_intf_run_iter
Description:

Symptom:
aclmgr crashes while executing the command:

install all kickstart bootflash:n7000-s2-kickstart.6.2.2.bin system bootflash:n7000-s2-dk9.6.2.2.bin

or

show install all impact kickstart bootflash:n7000-s1-kickstart.6.2.6.bin system bootflash:n7000-s1-dk9.6.2.6.bin

Ignore the versions used.
This is applicable to any version in 6.2 train and for both Sup 1 and Sup 2.

Conditions:
If user configuration has a mac packet-classify configuration under any interface, while doing an ISSU aclmgr will crash.

Workaround:
To perform an ISSU upgrade or check ISSU impact to Release 6.2(2)

1. Enter the show running-config aclmgr inactive-if-config command for all VDCs.
2. Enter the clear inactive-config acl command for all VDCs.
3. If configuration has any "mac packet-classify" configuration, remove this configuration from all interfaces using the no command.
4. Start the ISSU procedure.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.1(2), 6.2(1.121)S1, 6.2(1.121)S2
Known Fixed Releases:
Bug Id:
CSCuu60878
Title:
IFTMC cores with pvlan configuration secondary configs
Description:

Symptom:
IFTMC cores with pvlan configuration secondary configs

Conditions:
IFTMC cores with pvlan configuration secondary configs

Workaround:
IFTMC cores with pvlan configuration secondary configs

Further Problem Description:
IFTMC cores with pvlan configuration secondary configs

Status:
Terminated
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCut17447
Title:
SPAN dest port load balancing doesn't work with M2 as span src
Description:

Symptom:
If SPAN source is on M2 module in the RX direction, then load balancing on SPAN destination port-channel does not work.

Hostname(config-monitor)# sh port-channel traffic interface po X
NOTE: Clear the port-channel member counters to get accurate statistics

ChanId Port Rx-Ucst Tx-Ucst Rx-Mcst Tx-Mcst Rx-Bcst Tx-Bcst
------ --------- ------- ------- ------- ------- ------- -------
19 Eth8/18 100.00% 65.15% 40.00% 100.00% 0.0% 0.0%
19 Eth8/19 0.0% 34.84% 59.99% 0.0% 0.0% 0.0%
Hostname(config-monitor)#

Conditions:
SPAN source is on M2 module and SPAN direction in RX only
This problem is seen on 6.2 code when ISSU was performed from 6.1 code.

Workaround:
This problem is not seen when N7K was upgraded to code 6.2 code traditionally or N7K is reloaded after ISSU to 6.2

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCtr74930
Title:
lldp process crashes on executing "show lldp entry <system-name>"
Description:

Symptom:
lldp crash

Conditions:
LLDP crashes when user issues "show lldp entry" and system-name tlv was de-selected.

Workaround:
Enable system-name tlv

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
5.2(1)S84
Known Fixed Releases:
6.0(0.14)S0
Bug Id:
CSCuj56624
Title:
OIL not programmed in MFDM
Description:

Symptom:
Routed multicast traffic gets black-holed on a Nexus 7000. The Multicast Routing Table (MRIB) has the correct interfaces in the S,G outgoing interface list (OIL), but they are missing from Multicast Forwarding Distribution Manager (MFDM).

MRIB:
Nexus7000# sho ip mroute 10.1.1.100 239.192.100.100
IP Multicast Routing Table for VRF "default"

(10.1.1.100/32, 239.192.100.100/32), uptime: 1w1d, pim mrib ip
Incoming interface: port-channel383, RPF nbr: 10.113.255.53
Outgoing interface list: (count: 4)
Vlan100, uptime: 1d11h, mrib
Vlan101, uptime: 1d11h, mrib
Vlan102, uptime: 1d11h, mrib
Vlan400, uptime: 1d11h, mrib, pim

MFDM:
Nexus7000# sho forwarding distribution ip multicast route source 10.1.1.100 | b 239.192.100.100
(10.1.1.100/32, 239.192.100.100/32), RPF Interface: port-channel383, flags:
Received Packets: 23430091 Bytes: 22011464043
Number of Outgoing Interfaces: 1
Outgoing Interface List Index: 63
Vlan400

Conditions:
This may be seen in a multicast environment after a multicast source feed is stopped then restarted, such as during a server reload.

Workaround:
clear ip mroute for the misprogrammed group

Further Problem Description:
MFDM programs the mroute OIFs on the line card forwarding engine. Since the OIFs are missing in MFDM, they are not programmed on the ingress forwarding engine Multicast Forwaridng Information Base (MFIB) on the line cards.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.2(2a)S11, 6.2(2a)S19, 6.2(5.49)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5)BF(0.41), 6.2(5.45)S5, 6.2(5.50)S0, 6.2(5.52)S0, 6.2(6), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(0.131), 7.0(0)ZN(0.29)
Bug Id:
CSCuu59408
Title:
Gibraltor:post ISSU, reload F2 -fex uplink results in DCBX ACK lost
Description:

Symptom:
On Nexus 7018 switch with software 7.2.0 release, where Fabric Extender N2232PP uplink is connected to the only one F2 Module ports and the host interface connected to the physical host UCS is shared with the storage virtual device (VDC).

If reload of F2 module is performed post module up the host interface connected to the UCS host will see that DCBX PDU ACK gets lost.

Conditions:
Nexus 7000 series switch F2 only one module having uplink of fabric extender FEX N2232PP and host interface of FEX is shared with the storage VDC.

Workaround:
To resolve the issue, in the owner virtual device ( vdc) of nexus 7018 switch ,flap the host interface (HIF) port of Fabric extender FEX, So that the DCBX exchange will get reinitialized.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCum89436
Title:
n7k:6.2.6a:mvpn traffic not forwarded on the encap PE on the mti int
Description:

Symptom:
-

Conditions:
-

Workaround:
-

Further Problem Description:
-

Status:
Terminated
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.2(6a)S4
Known Fixed Releases:
Bug Id:
CSCup82982
Title:
N7K: M1 linecard reload observed due to leak in ipfib
Description:

Symptom:
A N7K M1 linecard may reset because of a generic sysmgr reset. No core file/service crash has been written as the result of this incident. The exception log shows:

System Errorcode : 0x401e008c sysmgr on linecard had an internal error
Error Description : send_redun_heartbeat: Unable to start send redundancy timer.

It is suspected this was triggered by a leak with ipfib service. To see how much memory is held by ipfib, attach to the module and collect "show forwarding internal mem-stats detail" and "show system internal processes memory"

Conditions:
OTV is enabled

Workaround:
Due to OTV code restructuring in 6.2.x releases, this leak should not been see there.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
Bug Id:
CSCur40034
Title:
N7K - F2 Clipper Card "IFTMC" Crashes When Freeing a Deleted Index
Description:

Symptom:A Nexus 7k with an F2 card may experience a crash in the "IFMC" process if another linecard in the chassis is undergoing an OIR event (either a physical reseating or a soft reset.) Eg:

== Module 1 OIR event ==

%PLATFORM-5-MOD_STATUS: Module 1 current-status is MOD_STATUS_ERRDOWN
%PLATFORM-2-MOD_PWRFAIL_EJECTORS_OPEN: All ejectors open, Module 1 will not be powered up (Serial number XXX)

== Module 2 crashes ==

%SYSMGR-SLOT2-2-SERVICE_CRASHED: Service "iftmc" (PID XXXX) hasn't caught signal 11 (core will be saved).

Conditions:Another card in the chassis is either being soft or hard reset triggering a global VLAN delete event. When this update propagates to the forwarding table of an F2 card, under certain conditions, it can trigger a crash.

This issue is not seen in NX-OS versions 6.2(6) or later, this was addressed by code changes committed as part of CSCty30696 software enhancement.

Workaround:None known.

More Info:



Status:
Other
Severity:
1 Catastrophic
Last Modified:
03-JUN-2015
Known Affected Releases:
6.1(4a)
Known Fixed Releases:
Bug Id:
CSCuj42636
Title:
igmp cored in if (avl_insert(igmp_snoop_cfs_fex_groups_tree
Description:

Symptom:
core happens after mct flap

Conditions:
sh not sh of mct causes crash.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
1.1(0.226)
Known Fixed Releases:
6.0(2)N3(0.327), 6.0(2)N3(1), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(0.106), 7.0(1)N1(0.47), 7.0(1)N1(1), 7.0(3)I1(0.2), 7.0(3)I1(1), 7.1(0)ARP(0.2)
Bug Id:
CSCut25162
Title:
VPLS VC's don't come after delete/add VFI's in EFP scale setup
Description:

Symptom:
Few VPLS PW's remain down

Conditions:
With L2VPN VFI's scaled, delete all VFIs and Re-add all VFI's.

Workaround:
clear l2vpn service vfi all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.430)
Known Fixed Releases:
15.5(1)S0.17, 15.5(1)S1.1, 15.5(1)S2, 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(122), 7.1(0)LR(0.4), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12)
Bug Id:
CSCuj89847
Title:
CB-40: Service "pim6" crashed when v6 mcast traffic running
Description:

Symptom:
Pim6 crash

Conditions:
Test - IPV6 mcast N-N test
Started the traffic on 20 ports - pim6 crashed

Workaround:
None yet

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.2(5.27)S0, 6.2(5.49)S0
Known Fixed Releases:
6.0(2)N3(0.358), 6.0(2)N3(1), 6.2(0)HS(0.10), 6.2(5)BF(0.59), 6.2(5.66)S0, 6.2(6), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)KM(0.37), 7.0(0)ZD(0.154)
Bug Id:
CSCty30696
Title:
Changes in IFTMC for Flanker ASIC
Description:

Symptom:
F-Series linecard may experience a core of the IFTMC component, and generate a core file. This may also lead to a HAP (High Availability Policy) reset of the linecard.

Conditions:
Error in hardware index management.
Exact triggers for issue are not clear, so the fix is in the IFTMC component handling.

Workaround:
N/A

Fix is in 6.2(6) and later codes.
More Info:



Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
03-JUN-2015
Known Affected Releases:
6.1(4a), 7.0(0)FT(0.1)
Known Fixed Releases:
6.2(0.214)S0, 6.2(0.228)S0, 6.2(0.233)S9, 6.2(0.243)S3, 6.2(0.247)S0, 6.2(0.248)S0, 6.2(0.253)S0, 6.2(0.260)S0, 6.2(0.282)S0, 6.2(0.61)S16
Bug Id:
CSCut43413
Title:
DCi: HSRP Virtual MAC Flapping through FHRP Isolation PACL
Description:

Symptom:
FHRP hello causing vMAC to flap between local interface and Layer 2 vPC DCi.

Conditions:
- FHRP isolation PACL on Layer 2 vPC DCi interface
- Device acting as L2 vPC DCi is not FHRP gateway

Workaround:
Two options dependent on the design of the network:

- If the DCi device is only connected to the FHRP gateway, a VACL with an ARP inspection filter is recommended to isolate the data centers.
- If the DCi device has connections to other devices in the local data center using the PACL with a static MAC entry is the only option. This will not stop the duplicate gateway gratuitous ARPs between the two sites.

Further Problem Description:
This is a hardware limitation. The MAC learning process takes place before the PACL drops the HSRP hello.

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCtq30996
Title:
KGDB: CONFIG_KMALLOC_ACCOUNTING bug
Description:

Symptom:
Supervisor crash and reload due to Kernel Panic.

Conditions:
System is running low on memory.

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
5.2(0.905)
Known Fixed Releases:
5.2(1)S20, 5.2(1.23)S0
Bug Id:
CSCut12851
Title:
CPU HOG with STEC M2+ CF 9.0.2
Description:

Symptom:
CPU HOG could occur with certain "STEC M2+ CF 9.0.2" model log flash in a N7K SUP1 systems.

Conditions:
presence of "STEC M2+ CF 9.0.2" log flash in SUP1 N7K system.

Workaround:
replace log flash

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.1(4a)E2, 6.2(10)
Known Fixed Releases:
Bug Id:
CSCuo62072
Title:
Nexus WCCP crash due to corrupted redirect assignment packets
Description:

Symptom:
WCCP process crash on Nexus 7K may be seen due to corrupted redirect assignment packets from the cache engine.

Conditions:
WCCP is configured

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.2(2)S42
Known Fixed Releases:
6.2(10), 6.2(10)FM(0.27), 6.2(10)NO(0.20), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73)
Bug Id:
CSCum05295
Title:
BGP multipath entry in uRIB does not get updated after attribute change
Description:

Symptom:
There are two symptoms that can be seen for this bug.

1. The following error message can be seen in syslog and IGP redistributing BGP routes may fail.

2013 Dec 13 01:21:58 PTAINTS410 %OSPF-3-RPM_LIB_API_FAILED: bgp_lookup_ext_attr() - failed in rpm_acquire_bgp_shmem_lock()

2. A route with a stale metric in the routing table exists

`DC1-CORE-3# sho ip bgp 10.10.63.0

BGP routing table information for VRF default, address family IPv4 Unicast
BGP routing table entry for 10.10.63.0/25, version 127677
Paths: (6 available, best #1)
Flags: (0x00001a) on xmit-list, is in urib, is best urib route
Multipath: eBGP iBGP


Path type: internal, path is valid, received and used, not best reason: Router Id, multipath
AS-Path: NONE, path sourced internal to AS
1.1.2.3 (metric 101) from 1.1.2.3 (1.1.2.3)
Origin IGP, MED 409, localpref 100, weight 0 <====== MED 409 should match routing table


DC1-CORE-3# sho ip route 10.10.63.0
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

10.10.63.0/25, ubest/mbest: 5/0
*via 1.1.2.2, [200/409], 00:10:12, bgp-65001, internal, tag 65001
*via 1.1.2.5, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.6, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.7, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.8, [200/409], 00:43:22, bgp-65001, internal, tag 65001
via 1.1.2.3, [200/65940], 00:15:17, bgp-65001, internal, tag 65001 <<======= OLD MED 409 not updated

Conditions:
1. IGP (e.g., OSPF) redistributes BGP routes.
2. The redistribution uses route-map to evaluate community associated with the routes.
3. Maximum-paths command is configured.
4. BGP receives paths with only attribute (e.g., AS-PATH,MED) change.

Workaround:
A few possible workarounds:
1. Post-fault (impact low->high): clear ip route , clear ip bgp and restart BGP process.
2. Do not configure multi-paths (maximum-paths command).
3. Do not use redistribution route-map to match community/other BGP attributes.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.1(1)
Known Fixed Releases:
6.1(4.112)S0, 6.1(5), 6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.2), 6.2(9)FM(0.37), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(1.18)
Bug Id:
CSCuh42629
Title:
CSCuh42629SNMPd crashed in idle state
Description:

Symptom:
snmpd crashes on Nexus switch resulting in supervisor crash

Conditions:
Errors:
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID ) hasn't caught signal 11
(core will be saved).

Workaround:
Seen when polling OSPF MIBs on Nexus switches. Crash is random and not related to the amount of time spent polling the device, or a specific OSPF MIB under OID 1.3.6.1.2.1.14.4.1.8

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.2(1.125)S6
Known Fixed Releases:
5.2(1)N1(7.99), 5.2(1)N1(8), 6.0(2)N3(0.73), 6.0(2)N3(1), 6.0(2)U3(0.650), 6.0(2)U3(1), 6.2(1.136)S6, 6.2(1.141)S0, 6.2(2), 7.0(0)N1(0.385)
Bug Id:
CSCut47891
Title:
NVT: Missing (S,G) between MSDP peers, when there are 4 spine with MSDP
Description:

Symptom:
(S,G) entries are not in between MSDP peers

Conditions:
Four Spine devices configured as MSDP peers

Workaround:
no workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
Bug Id:
CSCtt14198
Title:
ERROR: Get port-channel database failed with show vlan cmd post switover
Description:

Symptom:
when enter sh vlan in CLI, the following error message is displayed.
ERROR: Get port-channel database failed

Conditions:
The problem is reported in 5.2(1).


Workaround:
You can view the same essential output with the following commands:

show spanning-tree vlan X

or for fabricpath:

show fabricpath isis interface brief

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
5.2(3)S7, 5.2(3.6)S0, 6.0(2)S11, 6.1(0.148)S0
Bug Id:
CSCti95293
Title:
Due to EOBC Congestion, PortLoopback test failed to threoshold times
Description:

Symptoms:

Consecutive PortLoopback failure message reported. As a result, linecards may
be reported as faulty.

Conditions:

Nexus7000 running 5.0 or 5.1 releases.

Workaround(s):

None.

Further Problem Description:

As this issue is due to EOBC congestion, following symptoms may also be seen:

- Unable to login to module(s)
%IPQOSMGR-4-QOSMGR_LC_SESSION_ERROR_MSG: Linecard returned the
following error for statistics session: Operation timed out.

- Configuration change is not updated, or saving configuration fails
E.g., After "shutdown" command issued for an interface, it stays up.

- Interface status is not updated
E.g., After removing SFP, interface status still shown as UP.

- Unsuccessful Sup engine failover.

- Changes in software state are not propagated to hardware on some modules (STP state, LTL, CBL, RBH, etc...)
AIPC timeouts due to EOBC congestion can cause PIXM to remove the module from the active linecard mask. This can be verified via "show system internal pixm info global | i "active LC"

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
5.0(2a), 5.1(1)
Known Fixed Releases:
5.0(5)S7, 5.0(5.27)S0, 5.1(1)S29, 5.1(1.26)S0, 5.1(1.32)S0
Bug Id:
CSCuh33729
Title:
Memory leak on snmp get: libport_m
Description:

Symptom:
Memory leak is seen on CISCO-ENTITY-SENSOR-MIB.
snmpd is crashed finally by memory leak.

Conditions:
SNMP client try get-request to OID of CISCO-ENTITY-SENSOR-MIB.

Workaround:
Do not use SNMP to poll these OID.

Further Problem Description:
Example configuration for blocking all of CISCO-ENTITY-SENSOR-MIB:
snmp-server community communityString group name
role name name
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.91

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
5.2(9), 6.1(3)S32, 6.1(4), 6.2(2)S19
Known Fixed Releases:
5.2(9.206)S0, 5.2(9a)E1, 6.1(4.97)S0, 6.1(4a), 6.1(4a)S7, 6.1(5.32)S0, 6.2(2), 6.2(2)S23, 6.2(5.2)S0, 7.0(0)ZD(0.84)
Bug Id:
CSCus51150
Title:
Some created MSDP SA cache data are not updated immediately
Description:

Symptom:
When new mcast traffics are coming into N7K side(MSDP RP), new created S,G entries should be transmitted to MSDP peer immediately, however, some of entries of SA cache data are not transmitted to peer device.
The remained entries are updated at next MSDP update period of time(maximum 60seconds later).

Conditions:
Running MSDP RP
many S,G entries are created within very short period of time at once

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(1), 6.1(2)I3(3.74), 6.1(2)I3(4), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(0)KM(0.119), 7.1(0)AV(0.74)
Bug Id:
CSCtg90112
Title:
N7k Linecard is reset due to "Metro fatal interrupt in device 79"
Description:

Symptom:Linecards, in Nexus 7000 systems
may be reset with the following messages.

Nexus 7000
%MODULE-2-MOD_DIAG_FAIL: Module reported failure on ports 8/2-8/2
(Ethernet) due to Metro fatal
interrupt in device 79 (device error 0xc4f00202)


Conditions:This issue can occur when an n7k linecard is responsible for
SPAN and multiple packet replication of the same packets.

1) Overlapping SPAN sessions can increase the chance of running into the issue
as shown below.

- Overlapping source vlan/interface, configured in tx or both directions, in 2
separate SPAN sessions.
Example:
monitor session 1 source vlan 11 - 20
monitor session 2 source vlan 11 - 20 (or any vlans that are in the session 1)

2) High # of OIFs for a specific multicast group with SPAN configured for any
of these OIFs. This has been observed with approx 60+ OIFs.

To determine if a linecard is susceptible, use the following commands.

Nexus7000# attach mod 2

module-2# sh hardware internal version
-------------------------------------------------
Name InstanceNum Version
-------------------------------------------------
Octopus 1 0.4
Octopus 2 0.4
Sotra 1 186.3
Sotra 2 186.3
Metropolis 1 0.3 <<<<<< version is irrelevent
Metropolis 2 0.3
Metropolis 3 0.3
Metropolis 4 0.3

Workaround:The only true workaround if you are hitting the described conditions, is to not have tx SPAN of multicast. You can do this by only using the "rx" option for the span source, or you can use the multicast best-effort command which disables tx span for mcast.
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_14span.html#pgfId-1309359

You may decrease the chances of running into the issue (if you're hitting the scenario with 2 SPAN sessions) via the following
respectively:
- Do not use overlapping SPAN sessions
or
- Use Virtual SPAN session
http://www.cisco.com/en/US/partner/docs/switches/datacenter/sw/4_2/nx-os/system_management/configuration/guide/sm_14span.html#wp1214731









Status:
Terminated
Severity:
2 Severe
Last Modified:
07-JUN-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCun92129
Title:
VPLS::sh int pw - throwing invalid range
Description:

Symptom:
'show interface pseudowire ' throws Invalid range error for dynamically created pseudowire and traffic loss is observed for the particular AC.

Conditions:
After script doing Enable/Disable feature BGP or Delete/Re-add BGP Config on a PE router, the pseudowire interface on a bgp signalled vfi on remote PEs.

Workaround:
No known workaround, other than to restart the PEs

Further Problem Description:
This is seen on automated script testing. Also not reproducible in all testbeds and sometime needs multiple iteration of the triggers to see the issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
6.2(10)FM(0.7), 6.2(8)S14, 7.1(0)ZD(0.143)
Known Fixed Releases:
15.4(2)S2, 15.4(2.17)S0.11, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S, 15.4(3)SN1a, 15.5(0.16)T, 15.5(0.16.1)CG, 15.5(0.20)PI27a, 15.5(1.2.1a)GB
Bug Id:
CSCuo86388
Title:
NXOS-VPC-VPLS Scale-after Core LC OIR,subset of PW Remain in Down state
Description:

Symptom:
In a setup with scaled VFI's & PW's, some PW's may not come up.

Conditions:
Line Card OIR

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
7.1(0)ZD(0.181)
Known Fixed Releases:
15.4(3)M2.1, 15.4(3)M3, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.8, 15.5(1)S, 15.5(1)SN, 15.5(1)T1.1
Bug Id:
CSCus02026
Title:
PIM crash seen on with high scale mcast source on VPC
Description:

Symptom:
PIM may crash with high number of sources per group in VPC setup

Conditions:
High scale of sources per group

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110)
Bug Id:
CSCut44571
Title:
VPC Excessive packet loss during tcn or clear mac address
Description:

Symptom:
On a nexus 7000 series switch, packet loss towards a vpc may be seen for a few seconds after a spanning-tree topology change or a manual clearing of the mac addresses table.

Conditions:
- VPC is configured
- "no port-channel limit" is configured under vpc domain

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCub96980
Title:
ipfib core found during ISSU from 5.1.6 to 5.2.7
Description:

Symptom:
During ISSU upgrade to 5.2(7) or later, we may see these error messages:
%IPFIB-SLOT2-2-FIB_TCAM_HA_ERROR: FIB recovery errors, please capture 'show
tech forwarding l3 unicast' and 'show tech forwarding l3 multicast'

This can accompany with ipfib crash also.

Conditions:
ISSU from any previous code (5.0.x or 5.1.x) to 5.2(1), 5.2(3a), 5.2(4), 5.2(5)
later may trigger this issue.
For eg:
ISSU upgrade from 5.1.3 to 5.2.1. Then make some configuration changes when
running 5.2.1 and then ISSU upgrade to 5.2.7 or 6.1.1 can trigger this issue


Workaround:
This can be impacted even if LISP is not running
1) Before the upgrade is attempted, please do the following to avoid hitting
this bug.
feature lisp
Configure "ip lisp etr" for all vrfs followed by "no ip lisp etr"
no feature lisp

2) In the problem state(if Nexus 7000 is hit by this bug), reload the affected
modules and this should resolved the issue


Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases:
5.2(7), 5.2(7)S15, 5.2(7.21)S0, 6.1(2), 6.1(2)E10, 6.1(2)E10.4, 6.1(2)S9, 6.1(2.14)S0, 6.1(2.27), 6.2(0.285)
Bug Id:
CSCtq93304
Title:
Observing ARP service crash @arp_adj_timer_callback
Description:

Symptoms:

Nexus7000 report crash in the ARP service.

Conditions:

This issue is observed in Nexus7000 running 5.x releases.

Workaround(s):

None.

This issue should be fixed in 5.2(1) release onwards.




Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
5.0(2), 5.0(3)N2(2), 5.2(1)
Known Fixed Releases:
5.2(1)S43, 5.2(1.48)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCut63393
Title:
Border Leaf needs to advertise hash-len for BSR
Description:

Symptom:
Border Leaf doesn't advertise the correct hash-len as advertised by PIM running @ the Border-Leafs for BSR in Vinci Asti Multicast.

Conditions:
BSRs listen and accumulate candidate RP announcements. For every group range known, the BSR builds a set of candidate RPs, including all routers that advertised their willingness to service this range. This is called group range to RP set mapping. The resulting array of group range to RP set mappings is distributed by the BSR. Ultimately, the bootstrap messages containing Group to RP-set mappings are received by every multicast router in the domain and used to populate their RP caches. It's up to the routers to select the best matching RP from the sets advertised by the BSR router. It is important that all routers select the same RP for the same group, otherwise the multicast sources might miss receivers. Based on a consistent hash-len information sent from the BL's the routers will ensure they pick the same RP for the same group.
In the present Janjuc image, although PIM advertises a hash-len to be chosen for BSR, this communication doesn't get sent to NGMVPN @ Border-leaf node which results in PIM @ all leaf nodes using a default hash-len of 0 to calculate the RP for the group. This causes mismatch in hash-len information between PIM @ Border-Leaf vs PIM @ Leaf node.

Workaround:
Work-around is not to configure the candidate-RP's in the RP-set for BSR case with the same priority.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases:
Bug Id:
CSCuo68846
Title:
aclqos crash on LC due to FU_MEM_hashtable_node_array_t continuous alloc
Description:

Symptom:
Following errors are logged on the switch:
%SYSMGR-SLOT10-2-SERVICE_CRASHED: Service "aclqos" (PID 12914) hasn't caught signal 6 (core will be saved).
%SYSMGR-SLOT10-5-SUBPROC_TERMINATED: "System Manager (core-client)" (PID 17560) has finished with error code SYSMGR_EXITCODE_CORE_CLIENT_ERR (11).

After the crash, monitoring memory usage on LCs, following object is showing continuous allocations:
FU_MEM_hashtable_node_array_t continuous

Module 10
4/28

module-10# sh processes memory |i aclqos
12914 247832576 0 350027776 7fe2da50/7fe2c500 aclqos

module-10# sh system internal aclqos mem-stats detail


Private Mem stats for UUID : FSM Utils(53) Max types: 82
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX
13 FU_MEM_hashtable_node_array_t 71108 71108 145906852 145906852

34 ACLQOS_MEM_parse_cntx_t 71103 71103 18202368 18202368
36 ACLQOS_MEM_fltrlist_t 71103 71103 29010024 29010024
117 ACLQOS_MEM_aclqos_fhdl_list_t 71103 71103 1990884 1990884

-======================================
4/29

module-10# sh processes memory |i aclqos
12914 292724736 0 394919936 7fe2da50/7fe2c500 aclqos

module-10# sh system internal aclqos mem-stats detail

Private Mem stats for UUID : FSM Utils(53) Max types: 82
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX
13 FU_MEM_hashtable_node_array_t 86763 86763 178030912 178030912


34 ACLQOS_MEM_parse_cntx_t 86758 86758 22210048 22210048
36 ACLQOS_MEM_fltrlist_t 86758 86758 35397264 35397264
117 ACLQOS_MEM_aclqos_fhdl_list_t 86758 86758 2429224 2429224


-======================================
4/29 - Evening
module-10# sh processes memory | i aclqos
12914 302288896 0 404484096 7fe2da50/7fe2c500 aclqos


Private Mem stats for UUID : FSM Utils(53) Max types: 82
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX
13 FU_MEM_hashtable_node_array_t 90114 90114 184907164 184907164

34 ACLQOS_MEM_parse_cntx_t 90109 90109 23067904 23067904
36 ACLQOS_MEM_fltrlist_t 90109 90109 36764472 36764472
117 ACLQOS_MEM_aclqos_fhdl_list_t 90109 90109 2523052 2523052

-======================================
4/30 - Morning

module-10# sh processes memory | i aclqos
12914 337563648 0 439758848 7fe2da50/7fe2c500 aclqos

module-10# sh system internal aclqos mem-stats detail

Private Mem stats for UUID : FSM Utils(53) Max types: 82
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX

13 FU_MEM_hashtable_node_array_t 102427 102427 210173440 210173440

34 ACLQOS_MEM_parse_cntx_t 102422 102422 26220032 26220032
36 ACLQOS_MEM_fltrlist_t

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
6.2(6a)S17
Known Fixed Releases:
6.1(2)I3(2), 6.2(10), 7.0(3)I1(1)
Bug Id:
CSCud02139
Title:
Access to nexus7k via vty may get lost at random times with tacacs+
Description:

Symptom:

TACACS+ services(authen/author/acct)) would fail due to child defunt process getting stuck without cleanup

Conditions:
1. Not Reproducible
2. For every five minutes there is an internal procedure that does an address resolution(forking a child process) of the TACACS server and caches the same for 5 minutes
3. This issue would occur, only if these child process are failed to cleanup(Max allowed failed child process: 64), we could say this is a rare corner case

Workaround:
disable and re-enable the feature or switchover SUP or Reboot the switch

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
5.2(5)S23
Known Fixed Releases:
5.2(1)N1(5), 5.2(9), 5.2(9)S11, 5.2(9.21)S0, 6.0(2)A1(1b), 6.1(3), 6.1(3)S8, 6.1(3.15)S0, 6.1(3.23), 6.2(0.304)
Bug Id:
CSCuu68022
Title:
VPC:Duplicate traffic after config and unconfig feature vpc
Description:

Symptom:
Duplicate traffic for the receivers after doing deconfiguration and reconfiguration of feature vpc

Conditions:
PIM protocol is up and the user is doing "no feature vpc" and feature vpc along with vpc relatted commands.
When the chassis role is being changed, PIM is not able to get the proper role information due to sdb lookup failure. This causes PIM to think that VPC is not enabled and hence does not do necessary steps like RPF source election etc and depending upon the placement of receivers and sources, there will be duplicate traffic.

Workaround:
restart PIM using "restart pim" command will fix the problem.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCud10012
Title:
Unexpected reload of nexus 7000 due to res_mgr hap reset
Description:

Symptoms
A nexus 7000 may unexpectedly reload due to a res_mgr hap reset.
The logs of the switch will show several cores for the res_mgr process prior to
the hap reset:
%SYSMGR-2-SERVICE_CRASHED: Service "res_mgr" (PID 4055) hasn't caught signal 11
(core will be saved).

Conditions
Steps to recreate

(1) Create a large VLAN range, for eg. 1000-2000
(2) Delete VLANs in between such as "no VLAN 1005" followed by "no VLAN 1010" and so forth.
If you show the list of VLANs in the format "1000-1004,1006-1009,............" there are 19 characters to show the string "1000-1004,1006-1009" alone (1 for 1, 1 for 0, 1 for 0, 1 for 0, 1 for -, 1 for 1, 1 for 0, 1 for 0, 1 for 0, 1 for 4, 1 for ,, 1 for 1 and so forth). If you have too many VLAN or VRF ranges such that the representation in a string in the fashion above takes more than 512 characters, the problem will happen.
(3) For the problem to happen, after (1) and (2), you have to issue "show vdc resources".

Workaround
None known at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
5.2(4)
Known Fixed Releases:
5.2(9), 5.2(9)S20, 5.2(9.38)S0, 6.1(3), 6.1(3)S21, 6.1(3.31)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCuu68969
Title:
UIN-1::Seeing multicast traffic loss as forwarding has null OIF in H/W
Description:

Symptom:
Traffic lose is seen in some routes because of mrib and mfdm go out of sync in these routes.

Conditions:
ISSU from 6.2.10 to 7.2.0.D1.1.S14 followed by reload of all 10 LCs may hit the issue.

Workaround:
Use "clear ip mroute" for the affected routes will fix the issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCur32209
Title:
LDP should not remove/free entries while walking the xos radix tree
Description:

Symptom:
LDP can encounter memory corruption or process crash.

Conditions:
Because of the nature of the bug, the problem can happen at any point, unexpectedly.

Workaround:
No workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
7.1(0)ZD(0.341)
Known Fixed Releases:
6.2(10)E5, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.119), 7.1(0)AV(0.38), 7.1(0)ES(0.7), 7.1(0)EV(0.125), 7.1(0)OTT(0.41)
Bug Id:
CSCun26418
Title:
OTV encapsulation fails for multicast/broadcast traffic
Description:

Symptom:
The replication ASIC responsible for SPAN, OTV encapsulation, and multicast replication stops replicating all traffic. As a result, each of the above features will also fail. This is particular to the SPAN/multicast replication pipeline so customer in an OTV environment will see that multicast traffic (including link-local multicast 224.0.0.0/24), along with broadcast traffic are not forwarded across the overlay.

Conditions:
This has been observed in OTV environment with a high rate of traffic egressing the OTV join-interface with ERSPAN configured to span the join-interface, which is very rare.

Workaround:
Once the issue has been encountered, a reload of the module is required to clear the problem. Removing the ERSPAN session will prevent the issue from reoccurring.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(10)S47, 6.2(10)S48, 6.2(10)S57, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.300), 7.1(0)EV(0.116), 7.1(0)OTT(0.41)
Bug Id:
CSCue51797
Title:
N7K: Egress unicast traffic is polarized to single port-channel member
Description:

Symptom:


Egress unicast traffic is polarized on FEX HIF port-channel.

Conditions:


This issue is observed when Nexus 2200 series FEX is single attached to Nexus 7000 F2 series modules.

Workaround:

None.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S50, 5.2(9.94)S0, 6.1(4.18)S0, 6.1(4a), 6.1(4a)S12, 6.2(1.38)S0, 6.2(1.93), 6.2(2), 7.0(0.6)
Bug Id:
CSCun93402
Title:
PIM process leaking memory
Description:

Symptom:
A Cisco Nexus switch may see a memory leak in the PIM process. The following command can be used to examine the memory being used by the PIM process:
show ip pim internal mem-stats detail

A sign of this leak is to see the PIM_MEM_RPF_SOURCE_IPC allocations growing without bound.

Conditions:
The current conditions to trigger the leak are unknown at this current time.

Workaround:
There is no workaround at this time. If the process in question consumes all of the allowed memory pim functions and commands may cease to work. If the process does not crash TAC can kill the process manually which will allow the process to restart and become operational.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)N3(0.111), 6.0(2)N3(1), 6.2(0)HS(0.10), 6.2(8), 6.2(8)S10, 6.2(8.5), 7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)ZD(0.267), 7.0(1)ZN(0.581)
Bug Id:
CSCuo05318
Title:
Vlan in blocking state (CBL) on one vpc leg
Description:

Symptom:
VPC leg on N7K VPC Primary may be in STP Disable (DIS) state while the vpc leg is being brought up.

Conditions:
* VPC Leg on VPC Primary Switch
* There are one or more member link flaps while the VPC leg is being brought up.

Workaround:
Step 1: Shut the problem VPC leg on both Primary and Secondary.
Step 2: No-shut the problem VPC leg on both Primary and Secondary.

Further Problem Description:
When a VPC leg on a N7K is being brought up, if there are member-link flaps causing port-channel cleanups, the STP state for the VPC leg be in DIS state when the VPC leg is up. The issue is resolved by the above workaround.

The issue exists in 6.2(6) and 6.2(8). Issue is resolved in 6.2(10) and all later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.2(8)S1, 6.2(8)S11, 6.2(8)S30, 6.2(8)S33, 7.1(0)D1(0.82)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.8), 6.2(10)FM(0.18), 6.2(10)NO(0.19), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.1(0)GF(0.36)
Bug Id:
CSCuq90846
Title:
l2fm crash in scale frame-snooping trigger after vdc reload
Description:

Symptom:
L2FM Crashing while handling stale AGE notifications from MTM.

Conditions:
Corner case scenario happened during all VDC reload.

Workaround:
None

Further Problem Description:
AGE notifications were getting processed for non-existing Vlans.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
7.1(0)D1(0.254)
Known Fixed Releases:
7.1(0)D1(0.269)
Bug Id:
CSCtt02688
Title:
'fex' cores seen while issuing 'show fex transceiver detail'
Description:

Symptom:
Switch may crash due to "fex hap reset" after issuing "show fex transceiver detail"

Conditions:

Workaround:
Do not issue "show fex transceiver detail"

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
6.0(1)S16, 6.1(0.113)S0
Bug Id:
CSCul45644
Title:
vlan_mgr crashed if dynamic reserved vlan range conflicts with vtp vlan.
Description:

Symptom:
When reserved vlan range is within the VTP vlan range (vlan 2-1001) and
this vtp switch receives a vtp message from the network carrying a user vlan that has been locally configured as reserved, the new vlan creation message to vlan_mgr causes a crash.

Conditions:
This bug is hit with VTP enabled and reserved vlan range falls under VTP vlan range.

Example:
1. vdc1 and vdc2 have two trunks links between them.
2. vdc1 is vtp mode server, vdc2 is vtp client or server mode.
3. vdc2 has a reserved vlan range 100-227 configured.
ex: switch(config)>system vlan 100 reserve.
4. vdc1 creates vlan 100.
5. when vdc2 receives vtp add vlan message, vlan_mgr crashes.

Workaround:
Disable VTP or do not move the reserved vlan range into the VTP vlan range.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
6.2(5.52)
Known Fixed Releases:
6.2(6), 6.2(6)S2, 6.2(6.13)S0
Bug Id:
CSCuc16550
Title:
memory leak in ipqosmgr
Description:

Symptom:
ipqosmgr service crashes

Service "ipqosmgr" (PID 4668) hasn't caught signal 6 (core will be saved).

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
5.2(5)
Known Fixed Releases:
5.2(7.30)S0, 5.2(9), 6.0(2)N2(1), 6.0(2)U1(1), 6.1(2), 6.1(2)E10, 6.1(2)E10.4, 6.1(2)S8, 6.1(2.13)S0, 6.1(2.27)
Bug Id:
CSCuu20942
Title:
ACOS CCOS table is not programmed on Sup on n77
Description:

Symptom:
Once you assign a network qos template on the box and then change any Cos2Q map separately via config, that change is not getting reflected in the Sup card table.

Conditions:
Happens for 4Q4Q template for released code.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
7.1(0)AV(0.72)
Known Fixed Releases:
7.2(0)AV(0.89)
Bug Id:
CSCuo73479
Title:
F348XP:1Gig interface remain up with copper SFP and cable pulled out
Description:

Symptom:
Interface is remaining in "up/up" state when there is an SFP inserted into an F348XP line card running 6.2(8), even when the opposite end is admin down or the cable is removed from the SFP.
This was duplicated using an Avago??, GLC-T, and GE-T SFP.
Support for gig transceiver was introduced in 6.2.8

Conditions:
Issue seen for 1gig SFP on N77-F348XP-23 module.
Seen on 6.2.8
Issue seen when speed on interface is hardcoded to 1gig.

Workaround:
Admin down local interface.

configure speed auto on the interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.13), 6.2(8)E5, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75)
Bug Id:
CSCut86302
Title:
LIF entry incorrect (inconsistent) on F2 module
Description:

Symptom:
LIF entry incorrect (inconsistent) on F2 module.

Conditions:
multi ISSU to 6.2(10)

Workaround:
Clear the route or
Reload the module

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCur75014
Title:
("sequence timeout") communicating with MTS_SAP_PVLAN for opcode
Description:

Symptom:
When large number of PVLAN ports are brought down simultaneously either through cli or OIR of line module, or change of mode, sequence timeout errors occur and when the ports are brought back up traffic is not forwarded out of them.

%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RID_PORT: Ethernet4/27)
%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_PVLAN for opcode MTS_OPC_ETHPM_PORT_LOGICAL_CLEANUP (RID_PORT: Ethernet4/26)

Conditions:
Having more than 5 PVLAN ports (L2 trunk or PC) with any PVLAN mode other than "host"

Workaround:
There is no workaround.

Recovery step to clean database is to reload switch

Further Problem Description:
There is no way to avoid hitting issue if you match pre-conditions and triggers.
NXOS 6.1.2 until 6.2(10) is affected.
Fix is upcoming in 6.2(12)

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
6.1(2), 6.1(4a), 6.2(10), 6.2(6b)S2, 6.2(8), 6.2(8a)
Known Fixed Releases:
6.1(2)I3(3.65), 6.1(2)I3(4), 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320)
Bug Id:
CSCtz59944
Title:
Port Error disabled - ELTMc port structure doesn't exist on swover/upgr
Description:

Symptom:
Unable to add ports to port-channel. Upon adding them, member links went error disabled.

Router(config-if)# sh int Eth x/y
Ethernetx/y is down (Error disabled, eltmc: Port structure doesn't exist.)

Router %ETHPORT-5-IF_SEQ_ERROR: Error ("Port structure doesn't exist.") communicating with MTS_SAP_ELTM for opcode MTS_OPC_ETHPM_PORT_PRE_CFG (RID_PORT: Ethernetx/y)

Conditions:
The scenario can happen when the port-channel/member gets deleted and the cleanup does not happen properly in ELTM. In this condition, after ISSU if there are new updates and/or port-channel configuration modified manually, then this issue happens.

Workaround:
Delet the port-channel, reload the modules that had member ports belonging to this port channel and re configure the port-channel

Further Problem Description:
This issue is resolved in 5.2(7) or later releases, in 5.2 train.
And, this issue can be carried over from earlier releases in ISSU.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
5.2(4.72)
Known Fixed Releases:
5.2(4.85)S0, 5.2(7)
Bug Id:
CSCuo00442
Title:
WCCP redirect index misprogrammed on Nexus 7000 F2
Description:

Symptom:
WCCP misprogrammed on F2 line cards causing traffic to be dropped instead of being redirected

Conditions:
WCCP configured on F2 - the issue is seen after ISSU upgrade to 6.2(X)
Also seen when the box was running 6.2(x) and was reloaded.
Or when the line card reloads

Workaround:
Remove and reapply WCCP on the interface

no ip wccp 61 redirect in

ip wccp 61 redirect in

Issue is fixed in 6.2(8)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
Bug Id:
CSCuu68733
Title:
N77/SNMP: show sys intern snmp mem-stats shows incremental user memory
Description:

Symptom:
Continuous polling a range of OIDs

Conditions:
Continuously polling of OIDs from DCNM tool

Workaround:
snmpd is freeing up the memory acquired after returning the response query to the polling

Further Problem Description:
Leak is not that much to initiate a process crash because the analysis showed that the memory is going up but its also getting freed after sometime.

Status:
Terminated
Severity:
2 Severe
Last Modified:
14-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCut26394
Title:
M148 vPC secondly drop packet
Description:

Symptom:
when the vPC secondly configure as L2 ports , specific destination IP forwarding fail on M148 module.

Conditions:
when add the vlan information to vPC secondry :see the setting change logs

Workaround:
change the the dest dest IP ;VIP to SVI actual IP

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
Bug Id:
CSCur21785
Title:
N7K - M1/M2 Egress Queuing behavior post 6.2(x) for control plane packet
Description:

Symptom:
Control plane packet ( marked with DSCP value for Example PIM etc ) received on ACCESS port, and then get bridged into same VLAN do not queued in priority Queue on Egress port. The issue is not seen after doing "no ip igmp snooping"

Conditions:
- Nexus 7000 running 6.2(x) image; Earlier images like 5.2(x) do not see the same condition.
- Packet is coming in ACCESS port and getting bridged into same VLAN via ACCESS or Trunk port.
- M series Line cards

Workaround:
Not available yet

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuc24368
Title:
Netstack - TCPUDP hang on to opcode 86017 for an extended amount of time
Description:

Symptom:
The interface might be down due to Error disabled. Reason: fu unknown error.
Conditions:
The symptom is observed after reload with a scale setup wtih MIB polling and when MTS buffers is filled.
Workaround:
Once the MTS buffers is recovered, shut/no shut interface that is down will bring up the interface.

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.1(2), 6.1(2)S1, 6.1(2)S27, 6.1(2)S3, 6.1(2)S8, 6.2(0.233)S7, 6.2(0.265)S4, 6.2(0.287)S4, 6.2(1X)
Known Fixed Releases:
Bug Id:
CSCuu77244
Title:
port-profile core at ppm_profile_global_level_2_acfg_gen after- sh start
Description:

Symptom:
PPM will crash when issued show run or show start. This happens when there are lots of aging of profile and at the same time traffic is being sent and there are errors in the profiles being applied.

Conditions:
Happens when there are errors in application of network profiles like failure of command and aging happening at the same time.

Workaround:
System is already buggy. Do a write erase and reload.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu40239
Title:
ARP traffic sent out on incorrect VLAN
Description:

Symptom:
ARP traffic sent out on incorrect VLAN

Conditions:
Mixed chassis with F1 & M1 cards

Workaround:
1. Shut and no shut the SVI that is having problems, or
2. Disable glean fast-path via the config command ? no ip arp fast-path, or
3. Disable and reenable glean fast-path
4. Reload the switch.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCun40658
Title:
Nexus 7700-SPAN capturing in one direction when VLAN in fabricpath mode
Description:

Symptom:
In Nexus 7000 systems running 6.2.2a/6.2.6 code, if fabric path traffic egressing out of a core port is captured using Egress SPAN sessions, the MiM header will not be stripped off at the SPAN destination. The reason for this particular enhancement is that, many times, capture the packet in its entirety, including the MiM header is desirable. But in 6.2.2a and 6.2.6 releases, there was no option to let the user decide whether MiM header should be preserved or not. Some end analyzers are not able to detect/parse MiM headers, hence the scenario looked like no egress copies were being generated for traffic going out of a core port.
Hence, 6.2.8 on wards, a new per-port CLI was provided which lets the user decide whether MiM/other internal headers should be preserved for the SPAN copy or not. Command to be used is "switchport monitor exclude header". More details for the command is present in the configuration guide.

Conditions:
Nexus 7000/Nexus 7700 switches with 6.2.2a or 6.2.6, traffic egressing out of a core port is being copied in the Egress SPAN Session and end analyzer does not have capability to parse MiM header.

6.2.8 on wards, traffic egressing out of a core port is being copied in the Egress SPAN Session, end analyzer does not have capability to parse MiM header and the CLI to enable stripping of internal headers "switchport monitor exclude header" is not applied on the SPAN destination port.

Workaround:
This is expected behavior and an enhancement has been put in place for 6.2.8 using CSCun74440 to enable user to pick whether MiM header should be seen at the destination or not, depending on the end analyzer capabilities.

This bug is now used to document the behavior.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(2a), 6.2(6)
Known Fixed Releases:
6.2(10), 6.2(10)S3
Bug Id:
CSCuh68097
Title:
aclqos hap-reset at aclqos_ses_dst_link_find
Description:

Symptom:ACLQOS crashed while collecting show tech

Conditions:show tech run while there was an outstanding session.

Workaround:avoid collecting show tech output

Status:
Other
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(1.136)
Known Fixed Releases:
Bug Id:
CSCuu72620
Title:
rise nam: sh rise detail does not dispaly which vdc the dataport belongs
Description:

Symptom:
When RISE NAM is configured on the system, sometimes the vdc name is not visible in the "show rise detail" command output , there is no functional impact of this

Conditions:
unknown

Workaround:
User can run show vdc membership on default vdc to see which vdc contains the nam rise data port

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCur38749
Title:
Connection to a non-existent host is consumed/precessed by xTR itself
Description:

Symptom:
A vulnerability in Cisco Locator/ID Separation Protocol (LISP) feature of Cisco NX-OS could allow an authenticated, remote attacker to use SSH connection to a non-existent host covered by lisp mobile prefix
from outside of the DC and get presented with the xTR login prompt.
An attacker still needs to have login credentials for NX-OS device in order to be able to log in.

Conditions:
LISP mobility and lisp enabled interface need to be configured.

Workaround:
VTY ACL preventing login prompt to be displayed to the user connecting from the outside can
prevent unauthorized logins

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/2.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.112), 7.1(0)PDB(0.317), 7.2(0)D1(0.368)
Bug Id:
CSCus42725
Title:
Breakout ports have 40G latency buffer carving values instead of 10G val
Description:

Symptom:
Nexus 7ks running vPCs and utilizing breakout cables on the N7K-F312FQ-25 modules will hit this failure condition after some time(a relatively short period of time). The result is all vPCs will show a downed state because of the vPC peer link being down.

This issue is caused because of the misconfiguration of the latency buffers. We can see for the breakout ports has 40G latency buffer carving values, instead of the 10G breakout latency values. This results in corrupted packets and sometimes packet truncation.

Conditions:
Nexus 7ks running vPCs and utilizing breakout cables on the N7K-F312FQ-25 modules.

Workaround:
No current work-around.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S25, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)FM(0.3), 7.2(0)N1(1)
Bug Id:
CSCtw98915
Title:
Cisco NX-OS Message Transfer Service DoS Vulnerability
Description:

Symptom:
Advisory ID: cisco-sa-20140521-nxos

Revision 1.0

For Public Release 2014 May 21 16:00 UTC (GMT)

Summary
=======

Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Cisco NX-OS Virtual Device Context SSH Privilege Escalation Vulnerability
* Cisco NX-OS Virtual Device Context SSH Key Privilege Escalation Vulnerability
* Cisco NX-OS-Based Products Smart Call Home Buffer Overflow Vulnerability
* Cisco NX-OS Message Transfer Service Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Conditions:
A device running an affected version of software.

Workaround:
None

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2014-2201 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.0(1), 6.0(2)
Known Fixed Releases:
6.0(2)S30, 6.0(2)S31, 6.1(0.174)S0, 7.0(1)ZD(0.3), 7.2(0)N1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCur12912
Title:
rpm cores following module failure
Description:

Symptom:
Following module bringup after failure, vmm timeout seen causing ports not getting allocated to vdc. RPM cored post that and VDC came up

Conditions:
none

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(10)S90
Known Fixed Releases:
6.2(10), 6.2(10)S93, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.2(0)D1(0.358), 7.2(0)N1(1), 7.2(0)ZD(0.47)
Bug Id:
CSCus62432
Title:
RP not treating itself as rp for remote source traffic.
Description:

Symptom:
If the RP is rebooted, it's discarding PIM register messages from itself and the other PE:

2015 Jan 20 14:13:30.092655 pim: [8115] (default-base) Received Register from 10.1.1.18 for (10.1.1.18/32, 239.255.254.0/32)
2015 Jan 20 14:13:30.092702 pim: [8115] (default-base) We are not RP for group 239.255.254.0, message discarded

Conditions:
RP router reboot
AND
Customer has an interface configured with a primary AND secondary IP address, and the secondary address is used as the address called in the "ip pim rp-address" command.

There is a bug in the code that if the secondary address is configured AFTER the rp info is created by PIM, PIM does not identify itself as the RP.

It is possible during bootup that before IP component had a chance to configure the secondary address, PIM process reads the static RP configuration and then it receives the secondary address addition message and hence the bug.

Workaround:
1. Restart pim on the RP router

2. Remove and reconfigure "ip pim rp-address <>" in global configuration on the RP.

3. Configure the primary address to be the RP instead of the secondary address of the interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(9)S0
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(0)KM(0.119), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422)
Bug Id:
CSCus70619
Title:
aclqos crash in aclqos_commit at aclqos_ppf_common.c:1942
Description:

Symptom:
N7K-M132XP-12 module reloaded due aclqos crash

Conditions:
N7K-M132XP-12 module reloaded due aclqos crash

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
Bug Id:
CSCuq82625
Title:
Eigrp classic/wide metric count incorrect leading to incorrect updates
Description:

Symptom:
EIGRP Router configured with wide metric updates ("metric version 64bit")
is sending classic updates, which will be ignored by peer. Peer will
no longer add routes from that peer.

Conditions:
- Have configured "metric version 64bit" for the EIGRP process.
- Have invalid values for "classic / wide metric" peers in "show eigrp interface"
to where the # of classic peers is > then the number of total peers.

n7k1-1# sh ip eigrp interfaces
IP-EIGRP interfaces for process 100 VRF default

Xmit Queue Mean Pacing Time Multicast Pending
Interface Peers Un/Reliable SRTT Un/Reliable Flow Timer Routes
Eth1/25 2 0/0 1 0/0 50 0
Hello interval is 5 sec
Holdtime interval is 15 sec
Next xmit serial
Un/reliable mcasts: 0/7 Un/reliable ucasts: 36/44
Mcast exceptions: 6 CR packets: 5 ACKs suppressed: 4
Retransmissions sent: 15 Out-of-sequence rcvd: 11
Authentication mode is not set
Use multicast
Classic/wide metric peers: 3/-1 <<<<<<<<<<<< We cannot have 3 classic peers if we only have a total of 2 peers.

Workaround:
- Unconfig and reconfig the eigrp instance
- no ip router eigrp and then reconfig ip router eigrp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.326), 7.1(0)EV(0.116), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283)
Bug Id:
CSCud81736
Title:
EIGRP stops communicating until the SIAQueries are sent.
Description:

Symptom:
EIGRP stops communicating between the Nexus devices) until the SIAQueries are sent.

Conditions:
seen between a pair of Nexus 7K's
In Nexus1, Nexus2 is being installed as a successor for 2001:420:1411::/48 even though it doesn't meet the Dual FC condition. This is because there's another path with same metric which passes Dual FC condition and during installation to RIB, the 2 paths are considered to be ECMP and FC condition is not checked again.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases:
Bug Id:
CSCtg90667
Title:
OSPF service crashes @ip_get_secondary_count on restarting netstack
Description:

Symptom:
When the netstack process crashed, existing BGP sessions may flap and routes may be re-learnt. This may cause traffic loss.

Conditions:
This only happens when the netstack process had crashed or was terminated ungracefully.

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.1(0.288)S1, 6.1(2)S29, 6.2(0.166)
Known Fixed Releases:
5.0(0)MP1(0.332), 5.2(1)S1, 5.2(1.3)S0, 6.1(0.143)S0, 6.2(0.228)S0, 6.2(2), 7.2(0)N1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCur31394
Title:
aclmgr crash seen when adding/removing ACL to many SVIs at the same time
Description:

Symptom:
aclmgr crash is seen when applying/removing large ACL config to SVI, for example:

interface vlan 1-800
no ip access-list X

will see something like:

SYSMGR-2-SERVICE_CRASHED: Service "aclmgr" (PID 6058) hasn't caught signal 6 (core will be saved)

Conditions:
This is not traffic impacting.

Workaround:
apply ACL config in smaller chunks, for example:

interface vlan 1-100
no ip access-list X

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.2(10)S100, 6.2(10)S102, 6.2(12)FT(0.26), 6.2(12)S21, 6.2(12)S25, 6.2(8a)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.1(2)I3(3.44), 6.1(2)I3(4), 6.2(10.21)S0, 6.2(12)
Bug Id:
CSCuu73376
Title:
multicast traffic loss due to snooping entry programmed with wrong LTL
Description:

Symptom:
After these set of triggers,
a)ASCII replay ( with mcast config on a vxlan setup)
b)switchover
c) LC ISSU ,

there may be loss of few mcast streams .

RCA-
Problem surfaces wherein we see some "pending" l2mcast entries in the LC. These pending entries look to be stale ones - those that were added before the ISSU. Pending entries are those routes psuhed to the LC by MFDM wherein the ltl index for the OIF is not resolved. MFDM typically sends an update after the ltl is resolved and these pending entries are popped off the list and progarmmed to hw.. Some how that never seems to happen for these entries and after the ISSU is done they will be recovered again with the stale RID info ( index for set of ltls) . Any update coming in for the RID after the ISSU will cause these entries to be programmed with wrong LTL.

Conditions:
The issue is ocassionally when the following sequence was done

1. ASCII replay - followed by
2. switchover - followed by
3. LC ISSU

Workaround:
To do away with the wrong entries LC reload is the only workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCtx54822
Title:
Specific SNMP GET request causes 'snmpd' service to crash on Nexus 7K
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
9.0/7.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1180 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
17-JUN-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.11)S0, 7.1(0)BF(0.74), 7.1(0)ZD(0.158), 7.1(0)ZD(0.225)
Bug Id:
CSCuu89566
Title:
pvlan mcast traffic black-hole on ISSU from 6.2.8b to S28 GBR
Description:

Symptom:
Multicast traffic drop in the SVI when Secondary VLANs are higher that primary VLAN for MD(multi-destination) packet

Conditions:
F2 or F2E linecards with PVLAN SVI.
Multicast packet egress in SVI with PVLAN.

Following show command gives the state that system is vulnerable state.

SDB ALIF should never exceed 12bits. In this case it is MSB has been set with 0x8000.

module-8# show system internal iftmc hardware lif detail | beg 0x0902025a
LIF : 0x1d , VDC : 2, IF Index : 0x0902025a, IF : Vlan602
---- -------- -------- -------------
INST LDB ALIF SDB ALIF SDB If Index
---- -------- -------- -------------
0x0 0x8823 0x8823 0x00000000
0x1 0x8001 0x8001 0x00000000

Workaround:
Option 1 : Flap SVI after ISSU to 6.2.10 or any later release.
Option 2 : LC reload

Further Problem Description:
Following show command gives the state that system is vulnerable state.
SDB ALIF should never exceed 12bits.

module-8# show system internal iftmc hardware lif detail | beg 0x0902025a
LIF : 0x1d , VDC : 2, IF Index : 0x0902025a, IF : Vlan602
---- -------- -------- -------------
INST LDB ALIF SDB ALIF SDB If Index
---- -------- -------- -------------
0x0 0x8823 0x8823 0x00000000
0x1 0x8001 0x8001 0x00000000

Following trace from MFIB shows that Index mapping is not programmed correct.
There will be multicast MultiDestination packets drop in that particular ASIC.

module-8# show forwarding internal errors

1) Event:E_DEBUG, length:210, at 228055 usecs after Wed Jun 17 11:53:45 2015
[111] clp_mfib_oif_create_or_update(4902):ERROR: Unable to allocate replicated LDB region: inst:0x1, index:0x25c, e_lif:0x881c syserr 0xffffffff Device Name:[0x3FF] Instance:[63] Error Type:[(null)] code:[255]

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu08389
Title:
R2D2:Speed patch failed & link not coming up(on etherchannel interfaces)
Description:

Symptom:
- 2 interfaces eth7/1 and eth8/1 stopped working. Module 7 and 8 are of ?N7K-M148GT-11L?
- Shut/No Shut will not resolve the issue, but reload of modules resolved the problem
- Similar bugs CSCtq34950 & CSCtf84832 (R2D2:Speed patch failed and Interface not comming up), which matches the issue closely, but they seem to be fixed in the version (6.2.2a) in which the customer is running.
- Trigger is unknown at this point.

Conditions:

Workaround:
Reload of module

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
Bug Id:
CSCuq25337
Title:
Broadcast & multicast fail after multiple ISSU, no port select for LTL
Description:

Symptom:Broadcast / multicast traffic may not egress out port channel members and/or physical ports.
pixm pss has duplicate entries for BD LTLs after multiple ISSU

slot 4 show hardware intern ltl start-index 0x802b end-index 0x802b egress-port 6
----------------------------------------------------------------
|fp ports|inst| ltl | rbh| vqi |mi(v5)|mi(v4)|drop|eg ports|
|--------------------------------------------------------------|
| 5- 8 | 1| 802b| 0| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 1| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 2| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 3| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 4| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 5| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 6| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 7| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 8| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 9| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 10| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 11| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 12| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 13| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 14| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 15| | c9| ca| 0|no port selects
Conditions:Multiple ISSUs causing incorrect setting of the port bitmaps due to pss key corruption.
For example, lets take a 2 ISSUs case from 6.2.8 to 6.2.8a to 6.2.10

- Switch loaded with 6.2.8 image.
- On a BD ltl operation if any, upon updation of the pss entry in the pss file, there is a mismatch between the pixmc internal data structure and the pss entry.
- After ISSU from 6.2.8 to 6.2.8a, the restoration of BD LTL is done based on the mismatched state. This results in inconsistency between pixmc internal sw state and its pss file only without affected the hardware programming.
- Now, any BD ltl operation on the above affected BD LTL will result in creation of a duplicate key in the pss file.
- Another ISSU from 6.2.8a to 6.2.10 will result in restoration of an invalid PSS entry (because of duplicate pss key) which has stale port bitmaps set for that BD LTL.
Workaround:Bounce the port channel members which do not have the port selects set properly to cause reprogramming of the affected BD LTL due to the port-channel membership change.
OR
Flap the affected vlan to cause reprogramming of the BD LTL with the right port selects.
OR
Resetting the affected module(s)
More Info:Double ISSU is a commonly seen condition. This issue can also be seen after an ISSU followed by M1-to-M2 replacement (which involves port-channels flap)

The fix for this is in 6.2(10). This means that:
a) ISSU from any prior release to 6.

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.1(2), 6.2(10)S38, 6.2(2a), 6.2(6a), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S45, 7.1(0)AV(0.38), 7.1(0)D1(0.267), 7.1(0)OTT(0.36), 7.1(0)PDB(0.206)
Bug Id:
CSCut78387
Title:
l2fm crash @l2fm_rvtep_free_entry after shut/no shut nve interface.
Description:

Symptom:
l2fm crash

Conditions:
shut/no shut nve interface

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.482), 7.2(0)ZD(0.162), 7.3(0)RTG(0.17)
Bug Id:
CSCut84904
Title:
Process "mtm" Cores on F3 Cards Shortly After Boot
Description:

Symptom:
Repeated "mtm" cores on an F3 linecard

Conditions:
Unknown, first seen after an ISSU from 6.2(8b) to 6.2(10)

Workaround:
Unknown

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuj29140
Title:
frequent aclmgr crash when applying L4 protocol filtering racl
Description:

Symptom:
While applying acl with L4 protocol filtering, aclmgr crashes frequently causing switch overr and vdc reload
it will happend when we have "stale" entries in the state-cache.
by issuing show command - "show system internal aclmgr state-cache" , we will see state-cache entries in the aclmgr.

Conditions:
applying L4 Protocol ACL to interface with stale entry

Workaround:
ascii reload would resolve the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.5), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.117), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCuj48042
Title:
N7K-OFF-DIAG:Sup 2:spine_diagdsp falure w. BIOS v.2.12
Description:

Symptom:
a

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.0(0)FR(0.5)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(10)FM(0.3), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)KM(0.64), 7.3(0)TSH(0.4)
Bug Id:
CSCuu58892
Title:
Traffic loss observed after changing VPLS-id
Description:

Symptom:
After changing the VPLS-id, Traffic loss is being observed over the PW's.

Conditions:
# Change VPLS-ID on PE-a
# Change VPLS-ID on PE-b & PE-c
# Revert VPLS-ID to default on all Pes

Workaround:
clear l2vpn service

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu87265
Title:
OTV UDP ISSU: Packet decap is broken on ISSU from S28 to UPG
Description:

Symptom:






While OTV UDP encapsulation mode enabled, after ISSU there is a traffic interrupt.
Conditions:




ISSU with OTV UDP encapsulation mode enabled.
Workaround:



None.
More Info:











Status:
Open
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuq57457
Title:
Service clis cored after applying config to range of fex hif ports
Description:

Symptom:
clis process crash and core generated:

%SYSMGR-2-SERVICE_CRASHED: Service "clis" (PID 7590) hasn't caught signal 11 (core will be saved).
%SYSMGR-STANDBY-2-SERVICE_CRASHED: Service "clis" (PID 7586) hasn't caught signal 11 (core will be saved).

Conditions:
the issue was seen when applying config to range of fex hif ports

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
6.2(10)S58
Known Fixed Releases:
6.1(2)I3(3.68), 6.1(2)I3(4), 6.2(10), 6.2(10)S69, 6.2(10.16)S0, 7.1(0)D1(0.326), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.2(0)ZD(0.21), 7.2(0)ZN(0.22)
Bug Id:
CSCus71454
Title:
PVLAN VPC: peer-link flap causes primary legs in PVLAN host mode to flap
Description:

Symptom:
In a Private-Vlan VPC setup in private-vlan host mode, when peer link flaps, VPC leg in private-vlan host mode also flaps and comes back up in some time. There will be traffic loss from the VPC leg until the leg bringup happens again.

Conditions:
The VPC legs have to be private-vlan host mode as follows: "switchport mode private-vlan host"

Example configuration:
interface port-channel10
switchport
switchport mode private-vlan host
switchport private-vlan host-association 2 3
vpc 1

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
7.2(2)PVF(0.6)
Bug Id:
CSCuu68566
Title:
NVT-DC1:IGMP snooping for VLANs disabled in hardware
Description:

Symptom:
IGMP Snooping remains disabled in hardware. In some VPC setup, there could be duplicate traffic also.

Conditions:
There are some IGMP snooping related commands for a vlan but the vlan itself is not present in the running config. ie the vlan is not created either through CLI or VTP. When such configs are present, it is possible that IGMP may pack updates for such vlans along with explicitly created vlans to m2rib module for hardware programming. But that message might be rejected by m2rib due to some vlans not explicitly created.
If the update contained snooping status info, then, we will end up with snooping status unchanged in the hardware.

Workaround:
Deleting all unnecessary configs and restarting igmp will fix the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1)
Bug Id:
CSCuu88922
Title:
partial configuration applied after configuring fabric-control on pvlan
Description:

Symptom:
Trying to configure/unconfigure a vlan as fabric-control which is initially configured as a private-vlan irrespective of primary or isolated or community. Such a config is not supported and ideally vlan_mgr needs to log an error or warning on the console. If such a config is applied then pixm_vl crashes.

Conditions:
vlan need to be private vlan and configure it as fabric-control and then again remove fabric-control.

vlan 10
fabric-control
exit
vlan 10
no fabric-control
exit

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1.14), 7.2(0)ZD(0.221)
Bug Id:
CSCus96878
Title:
Nexus7700 FEX interface link flap with FET-10G
Description:

Symptom:
Nexus7700 FEX interface may link flap with FET-10G

Conditions:
Nexus7706
N77-F348XP-23
Nexus2232TM
FET-10G
NXOS 6.2.10

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
Bug Id:
CSCua50779
Title:
admin vdc migration CLI stuck due to the banner config
Description:

Symptom:
User doesn't get router prompt back after attempting an admin-vdc migration with a Nexus 7000 router

Conditions:
Occurs when banner motd is in configuration

Workaround:
Remove banner motd line from configuration

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
6.1(1)S10
Known Fixed Releases:
6.1(1)S12, 6.1(1.11)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCuc23279
Title:
SYSTEST:FCoE:core detected due to hwclock crash on standby sup
Description:

Symptom:
Core detected due to hwclock crash on standby sup.

Conditions:
None

Workaround(s):

No impact reported.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.1(2), 6.1(2)S11, 6.1(2)S41, 6.1(4a)S14, 6.2(1.42), 6.2(1.59)S2, 6.2(1.59)S5, 6.2(1.69), 6.2(1.69)S5, 6.2(1.83)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5.9)S0, 6.2(0.304), 6.2(1.72)S0, 6.2(1.84)S0, 6.2(2), 7.0(0.7), 7.1(0)D1(0.14)
Bug Id:
CSCup55118
Title:
ORIB buffer exhaustion on IGMP join/leave
Description:

Symptom:
ORIB buffer exhaustion when we receive continuous IGMP join/leave

show ip igmp snooping internal ribs
IGMP Snooping internal RIB information
RIB name: M2RIB (type 0), ready: Yes No , xid 0x1f6cd
Max. outstanding buffers: 4
Current outstanding buffers: 0
Max. OMF entries per buffer: 400
Max. OMF route entries per buffer: 50
Max. route entries per buffer: 400
Fabricpath redist instance: 1
Used buffer queue count: 0
Free buffer queue count: 10
Buffer: 0x0x98650ac, type: none, xid: 0x0, count: 0
Buffer: 0x0x9869f04, type: none, xid: 0x0, count: 0
Buffer: 0x0x986ed5c, type: none, xid: 0x0, count: 0
Buffer: 0x0x9873bb4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985174c, type: none, xid: 0x0, count: 0
Buffer: 0x0x984c8f4, type: none, xid: 0x0, count: 0
Buffer: 0x0x9847a9c, type: none, xid: 0x0, count: 0
Buffer: 0x0x98565a4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985b3fc, type: none, xid: 0x0, count: 0
Buffer: 0x0x9860254, type: none, xid: 0x0, count: 0
TXLIST member version: 0
RIB name: ORIB (type 1), ready: Yes No , xid 0x10009
Used buffer queue count: 10
Buffer: 0x0x97ff7ac, type: route, xid: 0x10000, count: 1
Buffer: 0x0x9804604, type: route, xid: 0x10001, count: 1
Buffer: 0x0x980945c, type: route, xid: 0x10002, count: 1
Buffer: 0x0x980e2b4, type: route, xid: 0x10003, count: 1
Buffer: 0x0x981310c, type: route, xid: 0x10004, count: 1
Buffer: 0x0x97e6ff4, type: route, xid: 0x10005, count: 1
Buffer: 0x0x97ebe4c, type: route, xid: 0x10006, count: 1
Buffer: 0x0x97f0ca4, type: route, xid: 0x10007, count: 1
Buffer: 0x0x97f5afc, type: route, xid: 0x10008, count: 1
Buffer: 0x0x97fa954, type: route, xid: 0x10009, count: 1
Free buffer queue count: 0
TXLIST member version: 69545

Conditions:
this issue is seen in OTV environment

Workaround:
restart igmp process

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
5.2(1), 6.1(4), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.189), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.240), 7.1(0)N1(1)
Bug Id:
CSCup42943
Title:
DMAC 0000.0000.0000 loops endlessly between fabricpath peers
Description:

Symptom:
In a mixed VDC M2/F2E running fabricpath, a frame with DMAC 0000.0000.0000 is looping endlessly between the fabricpath peers.

A mac flap can be seen between the GPC and peer SW.ID

This could increase the bandwidth utilizaiton on the link.

Conditions:
Issue seems to be seen in a M2/F2E chassis running fabricpath. This bug applies to 6.2(6) and 6.2(8) only.

Workaround:
downgrade to 6.2(2a) OR
upgrade to 6.2.8a or 6.2.6b or 6.2.8e6 or 6.2.10

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.2(6), 6.2(8)S2
Known Fixed Releases:
6.2(10), 6.2(10)S8, 6.2(10.5), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.14), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCtu28085
Title:
mac-flap may cause address learning not be updated on all linecards
Description:

Symptom:
In certain rare situations, L2 forwarding table (mac address) might become inconsistent between linecards on Nexus 7000. This leads to blackholing of traffic destined to the affected mac address.

Conditions:
Problem was encountered following a mac-flap event (external trigger).

Workaround:
Clearing the affected mac address from the L2 table will restore connectivity (address will be learned on the correct interface).

clear mac address-table dynamic [address

]

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
5.1(3), 5.1(4), 5.2(1), 6.0(1)
Known Fixed Releases:
5.2(3.57)S0, 5.2(3.59)S0
Bug Id:
CSCuq81832
Title:
l2mcast process crashes during Vlan entry cleanup
Description:

Symptom:
Modules may experience l2mcast process crashes:

2-SERVICE_CRASHED: Service "l2mcast" (PID 1220) hasn't caught signal 11 (core will be saved).

A process crash may occur multiple times over multiple modules

Conditions:
The issue was first seen with v2 joins (*,G) and v3 joins (S,G) and has OMF disabled on the fabric path vlan 182. We see a bunch of leaves coming in for the (*,G)s on vlan 182. Since there are v3 joins as well , some of the (*,G)s have corresponding (S,G) s. Ideally , if a (*,G) delete comes in we wouldn't be deleting the (*,G) from our software db if we have an (S,G) entry for the same group and that (S,G) delete is yet to come . Only when all the (S,G) leaves comes in and number of Source specific entries for that Group becomes zero , we cleanup the (*,G) entry node in our software. Once all the Groups in a Vlan are cleaned up , we will go ahead and clean up the Vlan entry in our sw db. To be able to do so in a correct manner we keep count of number of G entries per Vlan per ftag and number of S entries per G etc. { note : S is short for Source , and G is multicast group address}

Workaround:
Enabling OMF is the workaround only if the customer has the following combination

1) f3 only vdc - only f3 cards

2) f2e f3 vdc - combination of f2e and f3 cards in the vdc

If there are other cards like f2 , this workaround of enabling omf will NOT work as it will disrupt Ipv6 traffic

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S74, 6.2(10.16)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.276), 7.1(0)EV(0.116), 7.1(0)OTT(0.36), 7.1(0)PDB(0.215)
Bug Id:
CSCuu53383
Title:
Multicast IP packet with Unicast dmac is punted to the control plane
Description:

Symptom:
High RX rate on the inband interface due to IP multicast packets.

Conditions:
IP multicast packet (224.0.0.0/4) with a unicast destination mac address of which the Nexus 7000 ingress L3 interface owns.

Workaround:
None.

Further Problem Description:
This traffic should be dropped in hardware by the parser as it violates packet format standards. This traffic should not be sent to the control plane for processing.

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8a), 6.2(8b)
Known Fixed Releases:
Bug Id:
CSCuj45281
Title:
Crafted LLDP packet causes an interface to go error-disable
Description:

Symptom:
A vulnerability in the Link Layer Discovery Protocol (LLDP) code of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the switch port on which the packet is received to stop forwarding traffic.

The vulnerability is due to an error in processing a malformed LLDP packet. An attacker could exploit this vulnerability by sending a specially crafted, malformed LLDP packet to an interface enabled for LLDP packet processing. Other ports on the switch are not affected.

Conditions:
LLDP is enabled on the interface on which the malformed packet is received.

Workaround:
There are no workarounds

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/3.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
5.0(3)
Known Fixed Releases:
Bug Id:
CSCuu93235
Title:
ipfib service resets
Description:

Symptom:
On a nexus 7000/7700 series switch, ipfib service may reset on linecards. Such reset is noticeable by the following log in the main VDC :
%SYSMGR-SLOT4-2-SERVICE_CRASHED: Service "ipfib" (PID 1200) hasn't caught signal 6 (core will be saved).

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuu53392
Title:
Multicast IP packet with Unicast dmac is punted to the control plane
Description:

Symptom:
High RX rate on the inband interface due to IP multicast packets.

Conditions:
IP multicast packet (224.0.0.0/4) with a unicast destination mac address of which the Nexus 7000 ingress L3 interface owns.

Workaround:
None.

Further Problem Description:
This traffic should be dropped in hardware by the parser as it violates packet format standards. This traffic should not be sent to the control plane for processing.

Status:
Other
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCus83584
Title:
ISIS crashes due to corruption of stack on scale setup
Description:

Symptom:
ISIS cored

Conditions:
change interface priority on scale setup

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
7.2(0)D1(0.383), 7.2(0)D1(0.444)
Known Fixed Releases:
7.2(1)PIB(0.13)
Bug Id:
CSCuj86243
Title:
CB-40/vPC+ Dynamic MAC insert failed syslog with just 4K dynamic MACs
Description:

Symptom:
The following syslog is seen on an F series system with only 4,000 dynamic macs:

2013 Oct 16 12:10:55 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 4 Slot:3
2013 Oct 16 12:10:55 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 4 Slot:2
2013 Oct 16 12:10:55 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 3 Slot:3
2013 Oct 16 12:10:55 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 6 Slot:3
2013 Oct 16 12:10:55 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 2 Slot:3
2013 Oct 16 12:10:56 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 2 Slot:2
2013 Oct 16 12:10:56 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 4 Slot:2
2013 Oct 16 12:10:56 sw144-n7k1 %L2FM-6-L2FM_DYN_MAC_INS_FAILED: Dynamic mac insertion failure!fail_cnt: 2 Slot:8

Conditions:
F series LC and a dynamic mac count less than the verified scale limit of 16,000 macs per SoC.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
5.2(5), 6.2(5.27)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5)FH(0.57), 6.2(5.64)S0, 6.2(6)
Bug Id:
CSCue19535
Title:
Fabric Sync loss brings resets all the modules
Description:

Symptom:

All linecards fail to sync to a single fabric module, causes the modules to be reset, instead of
the fabric module being powered down.

Conditions:

As above.

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
4.2(8), 5.2(7), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S41, 6.1(4), 6.1(4)S6, 6.1(4.8)S0, 6.2(1.93), 6.2(2), 7.1(0)D1(0.14)
Bug Id:
CSCut72659
Title:
SSH connection failure with 'no matching cipher found ' syslog
Description:

Symptom:
SSH connections initiated form the device fails with the below syslog

switch# ssh admin@10.196.98.73 vrf management
no matching cipher found: client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server aes128-ctr,aes192-ctr,aes256-ctr
switch#


Upon failed ssh connections connection, similar syslog is reported at the server also.

switch(config)# e2015 Mar 9 10:03:55 $ VDC-1 %$ %DAEMON-2-SYSTEM_MSG: fatal: no matching cipher found: client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server aes128-ctr,aes192-ctr,aes256-ctr - dcos_sshd[18259]

Conditions:
The issue occurs only if the server does not support any CBC ciphers.

Workaround:
The workaround is to add the client CBC ciphers in sshd_config/dcos_sshd_config file of the server to re-enable them, so that there will be matching ciphers.
Edit the following files in the server from Linux prompt:
/isan/etc/dcos_sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

/isan/etc/sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

Further Problem Description:
Fix Description
=================
As per openssh6.7 code, FIPS-approved ciphers are the following:
aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

For NXOS SSH client, ctr ciphers were not enabled by default on FIPs mode.
Fixed the issue by setting the FIPS mode flag for ctr ciphers.

On Nexus 7000 this problem can manifest itself also in the following way:
can not attach to rise nam from sup

N7K-6# attach rise slot 332
Attaching to RISE 332 ...

Username:root
no matching cipher found: client \
aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server \
aes128-ctr,aes192-ctr,aes256-ctr
N7K-6#

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUN-2015
Known Affected Releases:
6.2(13)FM(0.66), 6.2(13)S12, 7.2(0)D1(0.430), 7.2(0)D1(0.451)
Known Fixed Releases:
5.2(8g)S9, 6.2(13)S15, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.2(0)D1(0.487), 7.2(0)D1(0.489), 7.2(0)N1(0.183), 7.2(0)N1(0.185), 7.2(0)N1(0.187)
Bug Id:
CSCuu73828
Title:
ipfib crash upon ISSU from 6.2.10 to GBR
Description:

Symptom:
IPFIB crash on ISSU.

Conditions:
sh ipv6 route 14:211:1::
14:211:1::/64, ubest/mbest: 2/0, attached
*via 14:211:1::1, Vlan964, [0/0], 15:38:20, direct,
*via 14:211:1::8, Vlan964, [0/0], 06:10:04, direct,

When there is a direct and attached route with an ECMP of PATHs, IPFIB process will crash during ISSU(recovery).

This is because we do NOT expect a Direct route with an ECMP of PATHs.

Also we can see that clearing the route does not add the ECMP again, in which case we should NOT see the crash.

n7k-fex1-f3# sh ipv6 route 14:211:1::

14:211:1::/64, ubest/mbest: 2/0, attached
*via 14:211:1::1, Vlan964, [0/0], 16:13:11, direct,
*via 14:211:1::8, Vlan964, [0/0], 06:44:55, direct,
n7k-fex1-f3# clear ipv6 route 14:211:1::/64
Clearing 14:211:1::/64
n7k-fex1-f3# sh ipv6 route 14:211:1::

14:211:1::/64, ubest/mbest: 1/0, attached
*via 14:211:1::1, Vlan964, [0/0], 00:00:07, direct,
n7k-fex1-f3#

Workaround:
if we notice any Direct route with an ECMP of paths we can clear the route, which will fix the # of paths. And then if we do the ISSU, we should NOT see IPFIB crash.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCur52940
Title:
N7K - snmpd cores cause Supervisor HAP reset - transceivers
Description:

Symptom:
The "snmpd" process may crash continuously leading to a supervisor HAP reset.

Conditions:
Polling "ciscoEntitySensorMIB", that result in reading DOM information from 10G or 40G or 100G transceiver, during (re)initialization of the transceiver.

(Re)Initialization of transceiver happens only when -
- The transceiver is being reseated
- The linecard in which the transceiver is seated is reseated or reloaded
- The switch itself is being reloaded

Workaround:
Block ciscoEntitySensorMIB from being polled. This can be done by creating a new role, as follows:

(config)# role name skipEntSensor <--------------------- name can be anything.
(config-role)# rule 1 permit read
(config-role)# rule 2 deny read oid 1.3.6.1.4.1.9.9.91
(config-role)# end

(config)# snmp-server community safeWalk group skipEntSensor <-------------- safeWalk in this example is the community name. Change it to whatever is used in production.

After this when a snmpwalk (getnext) is done ciscoEntitySensorMIB is skipped.

All community strings configured on the switch will need the
role group skipEntSensor applied to include public, private, etc. community strings

Further Problem Description:
The snmpd crash is caused by invalid data returned by port-client due to an internal timeout when reading the DOM of a transceiver that is still initializing.

This problem is seen only on 6.2.10 software version.

DOM is not accessible through CLI when the port/transceiver is still initializing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10)E6, 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.14), 6.2(12)FT(0.20), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.137)
Bug Id:
CSCud75360
Title:
F2 module fails to install routes after CLP_FIB_TCAM_PF_INSERT_FAIL seen
Description:

Symptom:

A Nexus 7000 with F2 modules may experience an issue with the following message:

2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 4
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 5
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 5
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 7
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 7
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 8
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 10
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 8
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 11
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 10

After this log appears, it is possible that the fib tcam may freeze, and no new prefixes can be inserted.

Conditions:

This issue occurs when the fib capacity is near the upper advertised limit of the F2 module, even if only for a brief period of time

Workaround:

To prevent the issue it is required to reduce the fib size. The only way to recover is to reload the module affected.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
6.1(2)E4, 6.1(4), 6.1(4)S4, 6.1(4)S5, 6.1(4.25)S0, 6.1(4.39)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCuu53575
Title:
sh vlan id 1 shows incorrect ports after doing ASCII replay twice
Description:

Symptom:
Any port which is not in mode trunk should not have config for trunk allowed vlan's under it. For exmaple

int po10
switchport
switchport mode fabricpath
switchport trunk allowed vlan 11-20
no shutdown

Conditions:
Only happens when "switchport trunk allowed vlan " is done after the mode is changed to no trunk mode.

Workaround:
Do no switchport trunk allowed vlan in case of fabricpath/pvlan mode as this config is of no use.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu11602
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:
A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:
1. There should be NO cpu/eobc hog on LC.
2. Upon LC bring up, post_code should be in range 0x00 and 0xf0 only. (sh mod internal act mod shows PWR_MGMT_POST_CODE_REG(0xb) = 0xab)

Workaround:

Further Problem Description:
This was fixed in 6.2(10) via CSCup20959, but the problem is still seen

Status:
Other
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCut76387
Title:
FEX crashed at "satctrl" process
Description:

Symptom:
FEX crashed at "satctrl" process

Conditions:
UNKOWN

Workaround:
NONE

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCup19405
Title:
targeted ldp session fails when frr is in use
Description:

Symptom:
Targeted ldp session is up when the primary tunnel is up, but goes down when frr goes active.

Conditions:
"In the scenarios where the MPLS core interface is a SVI or a sub-interface, packets coming in with two or more NULL labels and bound to the Supervisor card will be dropped"

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
7.1(0)D1(0.151), 7.2(0)D1(0.456)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.475), 7.2(0)D1(0.507), 7.2(0)D1(0.510), 7.2(0)ZD(0.186), 7.2(0)ZD(0.190), 7.3(0)RTG(0.17)
Bug Id:
CSCuh75899
Title:
N7K -core in xbar_driver_usd
Description:

Symptom:
Process xbar_driver_usd on a module will leak memory, and eventually core.
The module will reboot.
Eventually, after three occurrences of running out of memory and then rebooting, the module will remain powered off.

A log message similar to the following will be generated:
1970 Jan 1 00:00:00.000 switch %MODULE-1-MOD_DIAG_FAIL: Module 1 (Serial number: JAF0000ABCD) reported failure due to Service on linecard had a hap-reset in device DEV_SYSMGR (device error 0xfe)

A core file for xbar_driver_usd will be generated and saved in logflash:core/
switch# show cores
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 1 1 xbar_driver_usd 2182 1970-01-01 00:00:00

On the module, show logging onboard will have the following error:
module-1# show logging onboard

Exception Log Record : Sun Jan 1 00:00:00 1970 (000000 us)

Device Id : 34304
Device Name : 0x8600
Device Error Code : fe000000(H)
Device Error Type : NULL
Device Error Name : NULL
Device Instance : 0
Sys Error : (null)
Errtype : CATASTROPHIC
PhyPortLayer : 0x0
Port(s) Affected :
Error Description : xbar_driver_usd hap reset
DSAP : 0
UUID : 16777216
Time : Sun Jan 1 00:00:00 1970
(000000 usecs 00000000(H) jiffies)

Conditions:
Polling ciscoSwitchFabricMIB with SNMP
Executing commands beginning with show hardware fabric-utilization internal snmp

Walking ciscoSwitchFabricMIB roughly 1000-2000 times will use all 100MB of available memory for the xbar_driver_usd process.

Workaround:
Restrict access to the following:
show hardware fabric-utilization internal snmp
ciscoSwitchFabricMIB (1.3.6.1.4.1.9.9.803)

More Info:
Memory usage can be monitored with the following command:
slot slot show processes memory | grep xbar_driver_usd
2182 3051520 MemoryLimit CurrentMemoryUsage 7fe3aa80/7fe3a460 xbar_driver_usd

Example configuration for blocking only ciscoSwitchFabricMIB:
role namename
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.803
snmp-server community
communityString group name

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.1(4), 6.1(4.9)S0, 6.2(1.143)S3, 6.2(1.159)S1, 6.2(5.7), 7.0(0.50)S0
Known Fixed Releases:
6.1(4.97)S0, 6.1(4a), 6.1(4a)S1, 6.1(5.32)S0, 6.2(2), 6.2(2)S1, 6.2(3)S1, 6.2(3.5)S0, 6.2(5.2)S0, 7.0(0)ZD(0.84)
Bug Id:
CSCty86291
Title:
MTS buffer exhaustion with sequential add of large vlans.
Description:

Symptom:
Memory leak .

Conditions:
The condition can trigger if huge number of Vlans along with name are created without range command. Basically using script or copying some thing from note pad to Nexus7000 in config mode.
For Example.
conf t
vlan 2000
name D-Lan-n7000
vlan 2001
name D-Lan-n7001
vlan 2002
name D-Lan-n7002
vlan 2003

----Snip-----

vlan 2297
name D-Lan-n72297
vlan 2298
name D-Lan-n72298
vlan 2299
name D-Lan-n72299
vlan 2300
name D-Lan--n72300
end

Workaround:
To avoid this problem first creat just Vlans using range command as follows.

Config t
vlan 2000-2300

Make sure L2 Vlans are created.

After that one can cut and paste Vlan name config from txt file.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
5.2(3a), 5.2(4.68), 6.0(4)
Known Fixed Releases:
5.2(1)N1(6.93), 5.2(1)N1(7), 5.2(4.70)S0, 6.0(2)N2(4.60), 6.0(2)N2(5), 6.1(0.268)S0, 7.0(1)ZN(0.550), 7.0(4)N1(0.157), 7.0(4)N1(1), 7.1(0)N1(0.301)
Bug Id:
CSCuu60496
Title:
NVT: mroute stuck in pending after sso
Description:

Symptom:
MRIB routes seem to be in pending state. "show ip mroute" will show routes with pending flag.

Conditions:
when a "pim restart" command is issued, in rare occasions, it is possible that PIM does not a proper mrib_deregister() and when it restarts, does mrib_register instead of mrib_reregister. This makes PIM a sort of invalid client of MRIB and MRIB does not send any updates to PIM and also postpones sending any update to hardware.

Workaround:
The workaround for this issue is "restart pim" command itself. This command will restart and MRIB should see PIM as a valid client. It is possible that under various scenarios, this workaround might have to be done multiple times.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCul44262
Title:
Ping over fabric-control-svi b/w N6K leaf and N7K RR spine may not work
Description:

Some times Nexus 6000 DFA leaf may not establish the communication with Nexus 7000 BGP route-reflector node.

Symptom:
Any ping can not be executed successfully between Nexus 6000 DFA leaf and Nexus 7000 DFA Route-Reflector Spine nodes. The BGP session will not be established and the Nexus 6000 DFA node will be isolated from the network if it does not have redundant BGP RR session.

Conditions:
A reload on either Nexus 6000 or Nexus 7000 may cause that to happen, or interface flaps over fabric control-segment may also cause it.
The Nexus 7000 switch must be running 6.2.6 code for this to happen where this BGP RR spine feature was first introduced.

Workaround:
The work-around is to flap the fabric control-segment SVI once at the Nexus 6000 DFA leaf node.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(6a), 6.2(6a)S4, 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.6), 6.2(9)FM(0.37), 7.0(0)GI(0.5), 7.0(1)FVL(0.80), 7.0(2)NF(0.17)
Bug Id:
CSCul63398
Title:
Shutting down a Vrf staying in Admin Down pending forever
Description:

Symptom:
Shutting down a VRF staying in Admin Down pending forever

Conditions:
In a non-default VRF, BGP is redistributing HMM route. Now do a "no vrf context xxx" or shut down the VRF and then the problem will happen.

Workaround:
Restart BGP will recover (proceed to shut down the VRF which is stuck in Admin Down Pending state).

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(1), 6.2(0)PF(0.296), 7.0(0)ZN(0.104), 7.0(1)ZN(0.36)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)N1(0.420), 7.0(0)N1(1), 7.0(0)ZD(0.179), 7.0(0)ZN(0.142), 7.0(1)N1(0.58), 7.0(1)N1(1), 7.0(1)ZD(0.113), 7.0(1)ZN(0.126)
Bug Id:
CSCug37665
Title:
"copy r s" causes ifmgr crashes
Description:

Symptom:
ifmgr crashes after reload and issuing "copy r s"
Conditions:
reload switch with titanium images, and then issue "copy r s"
Workaround:
no

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(0)PF(0.231)
Known Fixed Releases:
6.2(0)PF(0.245), 7.0(0)BNZ(0.23), 7.0(2)NF(0.17), 7.1(0)D1(0.14), 7.2(0)D1(1)
Bug Id:
CSCug71873
Title:
ip addr/ip route command fails in the second time configuration
Description:

Symptom:
The second ip addr/ip route configuration will fail on pf_dev1.
Conditions:
Load with pf_dev1 images without ip configured. Configure ip addr/ip route, and then configure it again. The second configuration fails.
Workaround:
no

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(0)PF(0.242)
Known Fixed Releases:
6.2(0)PF(0.267), 7.0(0)BNZ(0.23), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1)
Bug Id:
CSCug43851
Title:
F2/F2E: Capture-filter not filtering any pkts
Description:

Symptom:

Conditions:

Workaround:
Since there is an additional 12 bytes of recirc-header added to Ethernet header, the capture-filter is failing for packets coming from F1,F2 and F2E cards. The common workaround will be using display-filters. The display-filter syntax can be obtained from wireshark's website.

For capture-filter :
If the filter string "ether proto " is used, then "ether[24:2] = " is the workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.1(1), 6.1(2), 6.1(5)S2, 6.2(1.74)S4
Known Fixed Releases:
6.2(5.7)S0, 6.2(6), 7.0(0)FM(0.11), 7.0(0)FM(0.7), 7.0(0)FM(0.8), 7.0(0.51)S0, 7.1(0)D1(0.14), 7.1(0)D1(0.15), 7.2(0)D1(1)
Bug Id:
CSCul52014
Title:
OF cmds timeout without proper error message
Description:

Symptom:
Openflow show commands hang in scale scenario and do not return any output

Conditions:
When Large number of flows are being modified/deleted, simultaneously "show openflow ..." command will get stuck until the modification/deletion is complete. Commands hang for 30 seconds and come out without any output. Retrying command after some time provides the output properly.

Workaround:
Retry command after some time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)ZD(99.55)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.243), 7.1(0)OTT(0.31), 7.1(0)PDB(0.191), 7.1(0)RTG(0.32), 7.1(0)ZD(0.292), 7.2(0)D1(1)
Bug Id:
CSCul53494
Title:
vzw 6.2.6 EFT: PIM over GRE not working
Description:

Symptom:
IP multicast ping over GRE tunnel doesn't work. The ping packets are getting dropped at the tunnel destination.

Conditions:
The first two (or few) packets are reaching SUP with proper SHIM header at the remote side until (S,G) route is installed in the hardware. All further packets are going to hit this (S,G) and punt to SUP without SHIM header, which caused these packets to be dropped by packet manager. This is a special case where we have (S,G) with punt flag and no OIFs associated with the route. Problem is only there for tunnel interface which needs a decap at the tunnel end. Multicast ping over non-tunnel interface will not have this problem.

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10), 6.2(5.41)S4
Known Fixed Releases:
6.2(10)E8, 7.0(0)BNZ(0.23), 7.0(0)GI(0.5), 7.1(0)ARP(0.2), 7.1(0)BF(0.17), 7.1(0)D1(0.47), 7.2(0)D1(1)
Bug Id:
CSCug99362
Title:
EEM : Timer events are triggered twice - once for active and standby
Description:

Symptom:
Timer events are triggered twice - once for active and standby
Conditions:
Timer events are triggered twice - once for active and standby
Workaround:
Dont use timer ed.
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(0)PF(0.264)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(0.37), 7.0(2)NF(0.17), 7.1(0)D1(0.14), 7.1(0)EVN(0.18), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)ZN(0.112), 7.2(0)ZN(0.28)
Bug Id:
CSCul66222
Title:
pixm_vl service crash on Nexus 7000
Description:

Symptom:
The pixm_vl service may crash unexpectedly and result in a reload (with single sup) or a switchover (with dual sups).

2014 Jul 18 14:49:42 N7K %$ VDC-2 %$ %SYSMGR-2-SERVICE_CRASHED: Service pixm_vl" (PID 8053) hasn't caught signal 11 (core will be saved).

Conditions:
The following actions may trigger the issue:

- Deleting one or more VLANs
- Shutting down an interface

There may be other as-yet-unknown conditions.

Workaround:
No workaround.

Further Problem Description:
Although the code fix for this defect is included in NX-OS release 6.2(6), it is possible for this issue to carry through an ISSU from a vulnerable release to a fixed release. For example, this was seen on a customer device after an ISSU from 6.2(2a) [vulnerable] to 6.2(8a) [fixed].

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.60), 6.2(5.65)S1, 6.2(8)S0, 7.1(0)D1(0.22)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.67)S0, 6.2(6), 7.0(0)FVX(0.66), 7.0(2)NF(0.17), 7.1(0)ARP(0.2), 7.1(0)D1(0.37), 7.1(0)ZD(0.99), 7.2(0)D1(1)
Bug Id:
CSCum18808
Title:
Backup paths updates are not notified to HMM
Description:

Symptom:
Since BGP backup path updates are not sent to HMM by Urib, HMM mobility is broken and host move cannot be complete.

Conditions:
This scenario will be hit when the box is reloaded with the startup config and when host move is done.

Workaround:
1) While reloading the box with startup config, make sure BGP configs are done and BGP is up before applying enabling HMM feature.
2) After reloading the box with startup config, perform restart bgp on all the boxes

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(99.1)ZD
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)N1(0.449), 7.0(0)N1(1), 7.0(0)ZD(0.189), 7.0(0)ZN(0.162), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60), 7.1(0)SDN(0.6)
Bug Id:
CSCul57133
Title:
N7K: ACLQOS crash observed in aclqos_uf_get_num_vls
Description:

Symptom:
ACLQOS crash was observed and F2E line card was brought down when N7K running 6.2.2 is reloaded.

Conditions:
nq-7e policy is configured on a system that was previously configured with 8e policy.

Workaround:
The issue is fixed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S38, 7.1(0)D1(0.238), 7.1(0)OTT(0.27), 7.1(0)PDB(0.175), 7.2(0)D1(1)
Bug Id:
CSCui02949
Title:
pimv6 anycast RP not working due to checksum error
Description:

Symptom:
100% traffic loss for multicastv6 group configured with anycast RP

Conditions:
PIMv6 anycast RP configured, last-hop-router sends a join to one RP in the anycast RP set, first-hop-router registers with the second RP in the anycast RP set

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(1.155), 6.2(2a)S1, 6.2(2a)S4
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(2a), 6.2(2a)S11, 6.2(5.45)S0, 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)KM(0.37), 7.0(0)ZD(0.155), 7.0(0)ZN(0.78), 7.1(0)ARP(0.2)
Bug Id:
CSCul43908
Title:
LISP ACL: VRF forwarding broken on egress; acl issue
Description:

Symptom:
Shared and parallel mode VRF forwarding broken on egress, after LISP decapsulation

Conditions:
The traffic is not matching any ACLs

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.52)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.59)S0, 6.2(6), 7.1(0)ZD(0.74), 7.2(0)D1(1)
Bug Id:
CSCul50951
Title:
vlan mgr crash -applying an encap template to VSI with 25bd-vni mapping
Description:

Symptom:
Issue is due to memory corruption while free.

Conditions:
Happens only when there are multiple writes to lpss at a single instance.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)FVL(0.12), 7.0(1)FVL(0.13), 7.0(2)FD(0.41)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)GI(0.5), 7.0(1)FVL(0.15), 7.0(1)FVL(0.9), 7.0(2)NF(0.17), 7.1(0)D1(0.55), 7.2(0)D1(1)
Bug Id:
CSCul87609
Title:
I:392:FP non-default topo doesn't works after ISSU downgrade I to H+
Description:

Symptom:
I:392:FP non-default topo doesn't works after ISSU downgrade I to H+

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)N1(0.433), 7.0(0)N1(1), 7.0(0)ZD(0.183), 7.0(0)ZN(0.150), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1)
Bug Id:
CSCul33530
Title:
Apex10: FCOE license is getting installed after reload
Description:

Symptom:
Nexus 7000 shows F2 FCOE license installed even if it was not installed

Example

7710-1# sh lic usa
Feature Ins Lic Status Expiry Date Comments
Count
--------------------------------------------------------------------------------
MPLS_PKG No - Unused -
STORAGE-ENT No - Unused -
VDC_LICENSES Yes 4 In use Never -
FCOE-N7K-F248XP Yes 4 Unused Never 4 license(s) missing
ENHANCED_LAYER2_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused Never -
LAN_ENTERPRISE_SERVICES_PKG Yes - Unused Never -
--------------------------------------------------------------------------------
**** WARNING: License file(s) missing. ****
7710-1#

If you do "show file [license file name]" command you will see FCOE license was not installed.
It has been also seen that even if F2 line card in not installed in the system this error is seen.

Conditions:
TRANSPORT_SERVICES_PKG license installed in the system

Workaround:
"clear license sprom" command will clear the problem but it will re-appear after reload

Further Problem Description:
This happens because of an error in the license specfile. Because of overlapping bit positions FCOE is falsely turned on. The license spec file has been fixed. With these specfile after doing "clear license sprom" the problem should not happen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.45)S3
Known Fixed Releases:
6.2(10), 6.2(10)S77, 6.2(10.16)S0, 6.2(10.502)S0, 6.2(11)FM(0.26), 7.1(0)D1(0.278), 7.2(0)D1(1)
Bug Id:
CSCuh24768
Title:
PVLAN-vPC: Xlation entries messed up for a TS vPC; has entry Vi ->Vp egr
Description:

Symptom:
The VLAN translation table entries might not be correct for VPC leg port-channels with PVLAN mode configured
This might cause incorrect VLAN translation in egress direction for PVLAN VPC legs.

Conditions:
This will be seen if VPC leg is in some PVLAN mode and PVLAN port mapping is configured. Now if mode is changed say from Trunk promiscuous to Trunk secondary, and TS port mappings are added on the VPC leg PC, VLAN translation tables may contain both translations, for the previous TP mode too and for the current TS mode too.

The correct behavior would have been for the VPC leg to have only the Translation table programming specific to the current port-mode.

Workaround:
Deleting the VPC leg port-channel and recreating it using "channel-group X" command for member ports will cleanup the stale translation table entries, and restore translation table entries according to the current port mode of the VPC leg port-channel

1. Delete port-channel
switch-two(config)# no interface port-channel 10
switch-two(config)#

2. Recreate port-channel using the member port-config:

switch-two(config)# int e7/1-2
switch-two(config-if-range)# channel-group 10
switch-two(config-if-range)#

3. The translation table entries will be correct after this

4. Make the port-channel 10 a vpc again:
switch-two(config-if-range)# int po10
switch-two(config-if)# vpc 1

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(1.121), 6.2(8)S17
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.20), 6.2(10)S21, 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCul98625
Title:
Prefix present in (AM) sh ip arp but not in (URIB) sh ip route
Description:

Symptom:
unicast drops seen after reload access switches several times.
HB-L3EDC-CARMEL-2# sh plat afm info copp | grep glean
36 glean 128000 4687 8976371536 507761370
00
HB-L3EDC-CARMEL-2# sh plat afm info copp | grep glean
36 glean 128000 4687 8976593024 507943467
68
HB-L3EDC-CARMEL-2#

Conditions:
see eng notes

Workaround:
workaround on carmel-2
int po34000
shut/no sh

traffic will resume

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(2)UI(0.2)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)N1(0.491), 7.0(0)N1(1), 7.0(0)ZD(0.208), 7.0(0)ZN(0.200), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60), 7.1(0)SDN(0.6)
Bug Id:
CSCui35602
Title:
traffic drops with rbh enabled on m/f2e vdc
Description:

Symptom:
Packets received on a port for a DCE VLAN will experience drops.

Conditions:
The modulo rbh will not work if there is a vdc with MX and F2e linecards when it is operating in proxy mode.

Workaround(s):

None. Recommend not to use modulo rbh in proxy vdc.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(5.15)S0, 6.2(6), 7.0(0)FF(0.2), 7.1(0)D1(0.14), 7.2(0)D1(1)
Bug Id:
CSCul03740
Title:
Install remove <package> fails after switchover
Description:

Symptom:
install remove operation fails after switchover

Conditions:
install remove operation fails after switchover

Workaround:
None

Further Problem Description:
install remove operation fails after switchover. Deactivation of package done before switchover.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)ZD
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(2)NF(0.17), 7.1(0)ZD(0.40), 7.1(0)ZN(0.53), 7.2(0)D1(1)
Bug Id:
CSCul94195
Title:
timeout while configuring 4K policer-classmaps in a policy
Description:

Symptom:
timeout while configuring 4K policer-classmaps in a policy

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)S42, 6.2(6)S3
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.5)S0, 6.2(7.7)S0, 6.2(8), 6.2(8)AA(0.7), 6.2(8)FM(0.10), 6.2(8)FM(0.12), 6.2(9)FM(0.37), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.109)
Bug Id:
CSCul51350
Title:
Traffic blackhole w/ dataMDT cfg & src starts few mins after IGMP join
Description:

Symptom:
Traffic blackhole on ingress PE with data MDT configuration

Conditions:
1. Topology (RP and source behind the same PE):
Src------CE1 (FHR and RP) --------PE1-----Core------PE2------Rcvr

2. Data MDT configured

3. Src starts traffic few minutes after IGMP join received from Rcvr

Workaround:
Multiple workarounds:
1) retart pim
2)
Stop traffic and joins and wait for routes to time out
Start traffic and joins at around the same time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5)BF(0.61)
Known Fixed Releases:
6.2(10), 6.2(10)S34, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.214), 7.1(0)FC(0.2), 7.1(0)N1(0.267), 7.1(0)N1(1), 7.1(0)NF(0.32)
Bug Id:
CSCuj98135
Title:
N7K: FP Proxy L2 Learning breaks Proxy L3 Forwarding For Unicast Traffic
Description:

Symptom:
After configuring Fabricpath Proxy l2 Learning and dynamic mac entries are flushed from the mac table Proxy L3 Routing is affected. Unicast traffic sent from the supervisor or from an M Series line card towards a fabricpath core port may be dropped because the fabricpath Outer Destination Address is misprogrammed during encapsulation.

Conditions:
Nexus 7000 running NX-OS 6.2(2)a in mixed chassis VDC where M1/M2 and F2e modules are used with proxy l2 learning.

Workaround:
Enable FabricPath core port MAC learning. The egress module must have the destination mac address programmed to avoid this issue.

cli config:
hardware fabricpath mac-learning module [port-group ]

Further Problem Description:
This bug is specific to F2 and F2E only in NX-OS release 6.2(2)a

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2a)S20, 6.2(5.38)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.38)S1, 6.2(5.40)S0, 6.2(5.43)S0, 6.2(6), 7.1(0)ZD(0.74), 7.2(0)D1(1)
Bug Id:
CSCul33688
Title:
ipqosmgr cores and runs into weird state in a sequence with pc/brk-out
Description:

Symptom:
A Nexus 7000 system may not be able to save its configuration and log the following
errors:

switch# copy r s
[################################## ] 83%
%SYSMGR-3-CFGWRITE_SRVFAILED: Service "ipqosmgr" failed to store its configuration (error-id 0x41170008).
[########################################] 100%
%SYSMGR-2-CFGWRITE_ABORTED: Configuration copy aborted.
Configuration update aborted: request was aborted
%SYSMGR-3-CFGWRITE_FAILED: Configuration copy failed (error-id 0x401E0000).
switch#

switch# show system error-id 0x41170008
Error Facility: DDB Library
Error Description: Deleting a linked node

switch# show system error-id 0x401E0000
Error Facility: sysmgr
Error Description: request was aborted

Conditions:
Unknown

Workaround:
Steps tp recover:
1. Manually backup the current config
2. Erase the config with "write erase"
3. Reload the box
4. Manually restore the configuration

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.50)S1
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.58)S0, 6.2(6), 7.1(0)ZD(0.74), 7.2(0)D1(1)
Bug Id:
CSCul48837
Title:
SSTE: Clis Core Observed on 6.2(5.59)S0
Description:

Symptom:
clis core is observed on default vdc with l2vpn config

Conditions:
On N7k reload

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.55)S2, 6.2(5.59)S0, 7.1(0)D1(0.58), 7.1(0)D1(0.64)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.67)S0, 6.2(6), 7.1(0)D1(0.64), 7.2(0)D1(1)
Bug Id:
CSCul96643
Title:
npacl core seen while adding rmap entry with Detailed logging enabled
Description:

Symptom:
npacl service crash

Conditions:
This has been seen on N7K running 6.2(6), npacl service crash while adding route-map/acl with logging detailed enabled.

Workaround:
Disable logging detailed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5)BF(0.66)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.5), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCul25514
Title:
VPC port in Root Blocking state
Description:

Symptom:
Spanning tree marks a vPC port as "Root BLK" if it receives a superior BPDU

# sh span int po1

Vlan Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
VLAN20 Root BLK 1 128.4096 (vPC) P2p

Conditions:
This issue occurs on a Nexus 7000 running vPC
It has been seen after upgrade to 6.2.
Occurs when the N7k vPC pair loses root bridge election off a vPC

Workaround:
make the N7K vPC pair the root bridge by giving it a superior priority

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.45)S3, 6.2(5.49)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.52)S2, 6.2(5.55)S0, 6.2(6), 7.1(0)ZD(0.74), 7.2(0)D1(1)
Bug Id:
CSCul11180
Title:
BGP session is closed due to fd read error
Description:

Symptom:
BGP flapping on N7K running 6.2.2 due to fd read error

sh bgp internal event-history events |inc "Read error from peer"
[8682]: [8693]: (default) EVT: Read error from peer : No buffer space available

N7K#show ip bgp neighbors show

Connections established 1000, dropped 999<<<<<<
Last reset by us 00:00:18, due to fd read error<<<<<<<<<
Reset error value 64
Last reset by peer never, due to No error

Conditions:
Issue is seen in Nexus7000 with 6.2 releases., what conditions to see this ?

Workaround:
Reload the VDC or Switch.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(0)PF(0.296), 6.2(5.41)S2
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.5)S0, 6.2(7.7)S0, 6.2(8), 6.2(8)BF(0.24), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.0(0)N1(0.514), 7.0(0)N1(1), 7.0(0)ZD(0.217)
Bug Id:
CSCuj18321
Title:
F3: Adjacency allocation failed on instance 0 with mcast scale 12K
Description:

Symptom:
2013 Sep 11 23:20:38 %$ VDC-1 %$ %IPFIB-SLOT9-4-FLN_FIB_ADJ_EXHAUSTED: Adjacency allocation failed on instance 0

Conditions:
Using pim
More than a few hundred multicast routes or a loop impacting the modules with the routes

Workaround:
Reload affected modules once loop or route churn is no longer present

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.7), 7.0(0.50)S0
Known Fixed Releases:
6.2(5.15)S0, 6.2(6), 7.0(0)FF(0.8), 7.1(0)D1(0.14), 7.1(0)D1(0.15), 7.2(0)D1(1)
Bug Id:
CSCui63440
Title:
Interface bdi command not appearing in latest zd7_0
Description:

Symptom:
Interface bdi was not appearing after the sync

Conditions:
BDI could not be configured as a result

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)ZD(0.56)
Known Fixed Releases:
7.0(0)FV(0.69), 7.0(0)ZD(0.53), 7.0(0)ZD(0.59), 7.0(1)ZD(0.3), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1)
Bug Id:
CSCui85485
Title:
EIGRP IPv6 neighborship in non-default VRF fails in certain scenarios
Description:

Symptom:
EIGRP IPv6 neighborship in non-default VRF fails in certain scenarios

Conditions:
This is only seen
1. with SVIs
2. when we execute "no interface " followed by "interface ".
3. in non-default VRF

Workaround:
unconfigure and re-configure EIGRP under the interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)S40
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(0.146), 7.0(0)ZN(0.49), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.1(0)ZD(0.95), 7.2(0)D1(1)
Bug Id:
CSCui11913
Title:
ARP req dropped on secondary switch after shut on vPC leg of primary sw
Description:

Symptom:
When Spanning-tree is disabled on certain vlans on a vpc-leg, when the vpc-leg is shut on the primary, STP on the secondary sets the vpc-leg to disable for those vlans.

Conditions:
*Spanning-tree must be disabled on the vlans of a vpc leg
*Happens only for VPC legs on the secondary switch

Workaround:
Flap the vpc leg on the secondary.

Further Problem Description:
Issue is found only in 6.2.2 and 6.2.2a and has been resolved in 6.2.6

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)S4, 6.2(2a), 6.2(5.7), 7.0(0.30)
Known Fixed Releases:
6.2(5.7)S0, 6.2(6), 7.0(0)FI(0.3), 7.0(0.37)S0, 7.1(0)D1(0.14), 7.2(0)D1(1)
Bug Id:
CSCuj53029
Title:
port-sec crashes when static mac port-sec configured on po-channel
Description:

Symptom:
When port-security is configured with a static mac-address on a port-channel, shows Service not responding and then eth-port-sec process crashes and generates cores

Conditions:
The bug is verified exists in 7.0(0)ZD(0.90)

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)ZD(0.90)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)KM(0.37), 7.0(0)ZD(0.129), 7.0(2)NF(0.17), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.1(0)ZD(0.95), 7.2(0)D1(1)
Bug Id:
CSCul34935
Title:
SAL crashed while disabling cts caching mode 1
Description:

Symptom:
disabling sgt-mode 2 caching

Conditions:
disabling sgt-mode 2 caching

Workaround:
disabling feature

Further Problem Description:
disabling sgt-mode 2 caching - results in crash

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.53)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(5.56)S0, 6.2(6), 7.1(0)ZD(0.74), 7.2(0)D1(1)
Bug Id:
CSCul36627
Title:
hmm crash by mts_opc_version_get ()
Description:

Symptom:
scaled

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.77), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.130), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCul36036
Title:
Unable to modify VLAN Failed to run the commands. Please try again later
Description:

Symptom:
Unable to change VLAN mode to fabricpath

gf-agg2# conf
Enter configuration commands, one per line. End with CNTL/Z.
gf-agg2(config)# vlan 501-1000
gf-agg2(config-vlan)# mode fabricpath
gf-agg2(config-vlan)#
Failed to run the commands. Please try again later.

Conditions:

Workaround:
Issue the command in enable mode
"terminal reset vlan-config-mutex"


After this you will be able to change VLAN mode

Further Problem Description:
none.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.50)S0, 6.2(5.55)S3, 7.1(0)D1(0.91)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.3), 7.0(0)BNZ(0.23), 7.1(0)D1(0.132), 7.1(0)FC(0.2), 7.1(0)PDB(0.94), 7.1(0)ZD(0.179), 7.1(0)ZD(0.200)
Bug Id:
CSCul59318
Title:
Memory leak with otv isis during shut/no shut of otv join interface
Description:

Symptom:
isis_otv process crashes when a new LSP is created.

Conditions:
memory leak encountered with isis_otv which could be triggered when the OTV join interface bounces

Workaround:
There is no workaround

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2a)S9, 6.2(5.52)S0
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(1.31), 7.0(0)ZN(1.68), 7.0(1)N1(0.36), 7.0(1)N1(0.47), 7.0(1)N1(1), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.1(0)ZD(0.95)
Bug Id:
CSCuj17443
Title:
Inherit command on Nexus is not working with TACACS authorization
Description:

Symptom:
Unable to add inherit command

N7K(config)# interface port-channel1006
N7K(config-if)# inherit port-profile Blade-Servers
ERROR: Failed to write VSH commands
N7K(config-if)# exit

Conditions:
H/W: cisco Nexus7000 C7009 (9 Slot) Chassis ("Supervisor Module-1X")
S/W: 6.0(4) to 6.2(1)
ACS: 5.3 patch 6

Inherit command on Nexus is not working with TACACS authorization enabled.

Workaround:
Remove TACACS authorization commands

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(1)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(8)NO(0.6), 6.2(8)S9, 6.2(8.5), 6.2(9)FM(0.37), 7.0(0)BZ(0.46)
Bug Id:
CSCum10921
Title:
Norca64 (SPINE)- IGMP core @igmp_group_expiry
Description:

Symptom:
In rare cases, when an IGMP group ages out, the IGMP process can crash.

Conditions:
Memory is being accessed immediately after free. If it gets used for some other purposes immediately after free, then the invalid access can cause a crash

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(0.350)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 7.0(0)ZD(1.30), 7.0(0)ZN(1.66), 7.0(1)N1(0.36), 7.0(1)N1(0.47), 7.0(1)N1(1), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.1(0)ZD(0.95)
Bug Id:
CSCul84608
Title:
N7K-L2VPN VPLS Scale-No switchover after 4 times l2vpn Process crash
Description:

Symptom:
According to the HA policy, the router should perform an RP failover when the
L2VPN process crashes and tries restarting 3 times, but instead it doesn't perform
the failover and remains at the failure state.

Conditions:
L2VPN crashes 4 or more times.

Workaround:
No workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)BF(0.2), 7.1(0)ZD(0.181)
Known Fixed Releases:
15.4(2)S2, 15.4(2.17)S0.8, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S, 15.4(3)SN1a, 15.5(0.16)T, 15.5(0.16.1)CG, 15.5(0.20)PI27a, 15.5(0.8)S
Bug Id:
CSCui43441
Title:
6.9.0.29.S75:Error with:MTS_SAP_PLCMGRwhile allocating interfaces to vdc
Description:

Symptom:
plcmgr timeout

Conditions:
mixed mode

Workaround:

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.9(0.28), 6.9(0.29)S0
Known Fixed Releases:
6.9(0.31)S0, 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)KM(0.37), 7.0(2)NF(0.17), 7.1(0)ARP(0.2), 7.1(0)BF(0.23), 7.1(0)D1(0.43), 7.1(0)ZN(0.181), 7.2(0)D1(1)
Bug Id:
CSCuj64873
Title:
QOS Time out causing VDC creation failure or module to come up
Description:

Symptom:
Line cards fail to come up
VDC creation failure

Conditions:
Large scale of ports or port-channels
QOS Policy configurations on ports
With at least 5 line cards F2/F2E (48 ports) user will see this problem on switch reload. 5th linecard might fail to come up.

Workaround:
Bring up cards one at a time or maximum of four line cards at a time.
Or
Use 8q default queueing policy and in default

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)S42
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(8), 6.2(8)S0, 6.2(8.1)S0, 6.2(9)FM(0.45), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCul54387
Title:
BDI not coming up:RTM not sendin MTS_OPC_RTM_L2_TOPO_ACTIVE_VLANS to SVI
Description:

Symptom:
BDI not coming up if doing out of order execution to bring up the BDI

Conditions:
Out of order Execution, mainly add the vni to the bridge-domain at the very end.

Workaround:
Flap the physical interface

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(2)FD(0.49)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FV(0.122), 7.0(0)GI(0.5), 7.0(1)FVL(0.11), 7.0(2)NF(0.17), 7.1(0)D1(0.14), 7.1(0)D1(0.55), 7.1(0)ZD(0.37), 7.2(0)D1(1)
Bug Id:
CSCul44598
Title:
Multicast group stats not getting updated on core switch
Description:

Symptom:
Intermittent traffic loss for hosts with spt-threshold infinity configured in a network which also has sparse mode hosts.

Conditions:
This issue is seen when the Host with spt-threshold infinity and the sparse mode host have the common intermediate router which is in the shared tree path for both the hosts and also in the (S, G, R) prune path from the sparse mode host while it sends joins to the source tree.

Workaround:
Make shared tree and source tree the same path for the sparse mode host or have spt-threshold infinity hosts only.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.55)S2, 6.2(5.59)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(8)NO(0.3), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCuj70143
Title:
PPF out of sync between SUP and LCs
Description:

Symptom:
The following error can be seen when applying ACL changes:

"Failed to complete Verification: Link exists" or
"Database Internal error"

Conditions:
Applying a large amount of config change.

Workaround:
Reload the module, or change the name of the ACL/object-group

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
5.2(9)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.96), 7.1(0)BNB(0.1), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.153)
Bug Id:
CSCun90491
Title:
VLAN BD change causes Traffic outage on 'untouched' VLAN IGMPV3 S entry
Description:

Symptom:
Traffic loss will be observed on IGMPV3 (G,S) entries for untouched VLAN's on F3 modules.

Conditions:
1) IGMP snooping enabled and working in IGMPv3 mode (and)
2) Delete of VLAN (and)
3) Deleted VLAN's HW_BD should be same as the mac table HW BD field value of any other VLAN's S entry.

Under the above conditions traffic loss on IGMPV3 (G,S) entries will be seen. The traffic loss is not applicable when IGMPV2 (G,*) entries are used. This issue happens very rarely because of condition 3.

Workaround:
1) IGMPV3 leave and join for the untouched VLAN's that got affected [OR]
2) Do a shut / no shut on the affected VLAN.

This issue is fixed in image version 6.2.10

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)S4
Known Fixed Releases:
6.2(10), 6.2(10)S77, 6.2(10.16)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.291), 7.1(0)EV(0.116), 7.1(0)OTT(0.40), 7.1(0)PDB(0.226), 7.2(0)D1(1)
Bug Id:
CSCuo86477
Title:
LISP crash due to mts buffers leak
Description:

Symptom:
LISP service crash due to mts buffer leaks in SAP associated with LISP UFDM MTS queue

Conditions:
Feature LISP is configured on the switch and MTS buffers leak causing the crash

Workaround:
Disable feature lisp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.22), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCup00538
Title:
nfp cored after ISSD from 7.1.D1.147 to 6.2.8.S35
Description:

Symptom:
Nfp process cored.

Conditions:
During ISSD.

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.147)
Known Fixed Releases:
7.1(0)D1(0.154), 7.1(0)D1(0.156), 7.1(0)FC(0.2), 7.1(0)GF(0.14), 7.1(0)IF(99.16), 7.1(0)ZD(0.207), 7.1(1)SP(0.4), 7.2(0)D1(1)
Bug Id:
CSCuo83041
Title:
N7K : getnext cbeDot1dTpVlanAgingTime for partial value system crashes
Description:

Symptom:
Performing getnext operation on cbeDot1dTpVlanAgingTime with the index value more than 4094 will system crash.

Conditions:
Performing getnext operation on cbeDot1dTpVlanAgingTime with the index value more than 4094

Workaround:
Avoid using invalid index value more than 4094 for performing getnext operation on cbeDot1dTpVlanAgingTime.

Further Problem Description:
The problem exists in 6.2.x release.
Fixes has been integrated into 6.2(10) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.139)
Known Fixed Releases:
6.2(10), 6.2(10)S14, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.177), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.11), 7.1(0)PDB(0.100), 7.1(0)VX(0.3)
Bug Id:
CSCup89222
Title:
F3: PBR causes misprogramming of route
Description:

Symptom:
FIB programming on the module does not match with the RIB. This causes traffic to be blackholed.

Conditions:
N7k running 6.2.8a.
PBR is applied on the ingress SVIs.
F3 module in use and was reloaded.

Workaround:
remove PBR and reapply it causes the programming to be corrected.

Further Problem Description:
N7k# sh ip route 129.186.254.131
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

129.186.254.131/32, ubest/mbest: 1/0, attached
*via 129.186.254.131, Vlan254, [250/0], 16:19:07, am

Module 5 is F3. There are 6 instances on the module.

N7k# sh sys intern for ipv4 route 129.186.254.131 module 5 det

RPF Flags legend:
S - Directly attached route (S_Star)
V - RPF valid
M - SMAC IP check enabled
G - SGT valid
E - RPF External table valid
129.186.254.131/32 , Vlan254
Dev: 0 , Idx: 0x109d6 , Prio: 0x62db , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x7 )
AdjIdx: 0x5c , LIFB: 0 , LIF: Vlan254 (0x7 ), DI: 0x0
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 1 , Idx: 0xd587 , Prio: 0x5b11 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x22 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 2 , Idx: 0x171fb , Prio: 0x48e3 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x23 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan34
Dev: 4 , Idx: 0x1278f , Prio: 0x4b73 , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x22 )
AdjIdx: 0x5a , LIFB: 0 , LIF: Vlan34 (0x7 ), DI: 0x0 >>>>>> INCORRECT LIF
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3
129.186.254.131/32 , Vlan254
Dev: 5 , Idx: 0xe187 , Prio: 0x5ebe , RPF Flags: VS , DGT: 0 , VPN: 7
RPF_Intf_5: Vlan254 (0x7 )
AdjIdx: 0x73 , LIFB: 0 , LIF: Vlan254 (0x7 ), DI: 0x0
DMAC: 002a.6aa4.98c3 SMAC: 002a.6aa4.d0c3

Some of the instances have incorrect programming

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S21, 6.2(6)S21, 6.2(7.28)S0, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S52, 6.2(10.16)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.271), 7.1(0)OTT(0.36), 7.1(0)PDB(0.209), 7.2(0)D1(1)
Bug Id:
CSCuo96373
Title:
ipfib crash while recovering from NNHOP frr in fln lfib delete adj
Description:

Symptom:
Thread 1 (process 1205):
#0 0x1030363c in fln_lfib_delete_mpls_adj (pi_handle=0x15b81170, hardware_handle=0x80000062,
platform_space=0x15b81206) at ../platform/dc3/flanker/fln_fib/fln_lfib.c:1789
#1 0x101c4620 in lfib_platform_delete_adj (adj=)
at ../feature/forwarding-sw/fib/lfib_platform.c:289
#2 0x101eaa08 in lfib_adj_destroy (adj=0x15b81170) at ../feature/forwarding-sw/fib/lfib_adj.c:946
#3 0x100d0f64 in ufib_obj_delete (ups_object=0x0, object=0x15b81170)
at ../feature/forwarding-sw/fib/ufib_obj.c:228
#4 0x100d11f8 in ufib_obj_unlink_objects (from_object=, delete_now=1)
at ../feature/forwarding-sw/fib/ufib_obj.c:305
#5 0x10219988 in lfib_te_related_adj_obj_destroy (te_related_adj_obj=0x15bba194)
at ../feature/forwarding-sw/fib/lfib_te.c:5125
#6 0x100d0f8c in ufib_obj_delete (ups_object=0x0, object=0x15bba194)
at ../feature/forwarding-sw/fib/ufib_obj.c:240
#7 0x100d11f8 in ufib_obj_unlink_objects (from_object=, delete_now=1)
at ../feature/forwarding-sw/fib/ufib_obj.c:305
#8 0x101fe214 in lfib_te_destroy_backup_adj (te_node_p=0x15b947b8)
at ../feature/forwarding-sw/fib/lfib_te.c:1215
#9 0x1021ca40 in lfib_te_normalize_adj (vdb=0x15305048, te_node_p=0x15b947b8, nhlfe_p=0xbf9452ec)
at ../feature/forwarding-sw/fib/lfib_te.c:2853
#10 0x1021e080 in lfib_te_update_non_normal (vdb=0x15305048, te_node_p=0x15b947b8,
nhlfe_p=0xbf9452ec) at ../feature/forwarding-sw/fib/lfib_te.c:3116
#11 0x1021f618 in lfib_te_update (vdb=0x15305048, te_node_p=0x15b947b8, nhlfe_p=0xbf9452ec,
rr_info=0x0) at ../feature/forwarding-sw/fib/lfib_te.c:3413
#12 0x10220620 in lfib_te_get_create (vdb=0x15305048, fec_def_p=,
nhlfe_p=0xbf9452ec, rr_info=0x0) at ../feature/forwarding-sw/fib/lfib_te.c:3639
#13 0x101ede3c in lfib_get_create_fec_te (vdb=, fec_op=Cannot access memory at
ddress 0x0
)
at ../feature/forwarding-sw/fib/lfib_fec.c:1128
#14 0x101f3e9c in lfib_get_create_fec (vdb=0x15305048, fec_op=
{operation = 0 '\0', fec_type = 5 '\005', fec = {if_index = 571473931, option_b = {rd = 245461844161560576, addr = {ip_addr = 0, v6_addr = '\0' }, label_space_id = 0, label_i
= 0}, lsp_id_v4 = {tunnel_ipv4_source = 571473931, tunnel_ipv4_dest = 0, tunnel_id = 0, ext_tunnel_
d = 0, lsp_id = 0}, lsp_id_v6 = {tunnel_ipv6_source = "\"\020\000\v", '\0' , tunne
_ipv6_dest = '\0' , tunnel_id = 0, ext_tunnel_id = 0, lsp_id = 0}, v4_prefix = {ta
le_id = 571473931, prefix = 0, prefix_len = 0 '\0'}, v6_prefix = {table_id = 571473931, prefix = '\0
, prefix_len = 0 '\0'}, deagg = {table_id = 571473931}, cbts = {master_tunnel = 5
1473931, member = {0, 0, 0, 0, 0, 0, 0, 0}}}, tlv = {num_tlvs = 0, tlv = 0xbf946b22}},
nhlfe=0xbf9452ec, nhlfe_v6=0xbf945aec, num_nhlfe=1 '\001', num_labels=0 '\0',
fec_obj=0xbf944f9c, next_obj=0xbf944f98, nh_count=0xbf944f92 "", rr_info=0x0)
at ../feature/forwarding-sw/fib/lfib_fec.c:1465
#15 0x101f68f4 in lfib_fec_update (vdb=0x15305048, fec=0x4b83928d, rr_info=)
at ../feature/forwarding-sw/fib/lfib_fec.c:1815
#16 0x101f75d8 in lfib_bulk_label_update (vdb=0x15305048, update=)
at ../feature/forwarding-sw/fib/lfib_fec.c:2470
#17 0x100828c0 in ufib_ufdm_label_update (event=,
ret_fsm_event_list=) at ../feature/forwarding-sw/fib/ipfib_msg

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)MPL(0.24)
Known Fixed Releases:
7.1(0)D1(0.151), 7.1(0)D1(0.161), 7.1(0)FC(0.2), 7.1(0)GF(0.14), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)ZD(0.213), 7.1(1)SP(0.4), 7.2(0)D1(1)
Bug Id:
CSCun11657
Title:
zd7_1_0_bf_bundle breakage likely due to some infra/new_installer commit
Description:

Symptom:
Build failure

Conditions:
Build

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)BF(0.21)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)GI(0.5), 7.0(0)KM(0.37), 7.0(2)NF(0.17), 7.1(0)ARP(0.2), 7.1(0)D1(0.47), 7.1(0)PDB(0.13), 7.1(0)ZN(0.181), 7.2(0)D1(1)
Bug Id:
CSCuo84700
Title:
Option B Same RD - ASBR does not reflect PE client routes to remote ASBR
Description:

Symptom:
From below topology, vrf1 uses same RD across the PE's and ASBR's

PE1(vrf1) ----------- ASBR1 (vrf1) ----------- BGP 3107 ----------- ASBR2 (vrf1) ----------- PE2 (vrf1)

ASBR1 does not reflect PE1 learnt vpn routes (vrf1) to ASBR2.

Conditions:
This symptom is seen on Nexus 7000 Series Switch acting as ASBR/PE/RR.

Workaround:
Use unique RD.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)E1
Known Fixed Releases:
6.2(8)E1, 7.2(0)D1(1), 7.2(0)ZD(0.44), 7.2(0)ZN(0.52)
Bug Id:
CSCum87318
Title:
non-default vrf ping not working
Description:

Symptom:
non-default vrf ping not working

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)FVL(0.41)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)GI(0.5), 7.0(0)GI(0.6), 7.0(0)KM(0.37), 7.0(1)FVL(0.48), 7.0(1)FVL(0.49), 7.0(2)NF(0.17), 7.1(0)D1(0.55), 7.1(0)PDB(0.13), 7.2(0)D1(1)
Bug Id:
CSCun04290
Title:
Multicast Vinci: sparse mode with BL load balancing, packets duplication
Description:

Symptom:
multicast packets might get duplicated

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)N1(0.93), 7.0(1)N1(1), 7.0(1)ZD(0.130), 7.0(3)I1(0.2), 7.0(3)I1(1), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCur80369
Title:
Iplus Build 405 : Ospf hap reset on clear ip route *
Description:

Symptom:
clear ip route *

Conditions:
System reset due to OSPF hap

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)N1(0.405)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.0(2)FIP(0.6), 7.1(0)AV(0.38), 7.1(0)N1(0.416), 7.1(0)N1(1), 7.1(0)ZD(0.373), 7.1(0)ZN(0.491), 7.1(1)N1(0.34)
Bug Id:
CSCug40707
Title:
6.1(4) / 6.2(1) - Multiple Process crash - SIGABRT not setting heartbeat
Description:

Symptom:
Multiple Services crashing with the following log messages:

2013 Jun 12 09:26:10.467 TAA-RZ-2 %SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 148.45 secs ago.
2013 Jun 12 09:28:42.938 TAA-RZ-2 %SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 150.07 secs ago.

++ This is followed by several other process to crash.
++ The VDC becomes unresponsive with the following log messages:

++ Due to multiple crash of the service, the supervisor switchover takes place.
++ In a single supervisor, the device may reload.

Reason: Reset triggered due to HA policy of Reset
Service: Service "bgp" in vdc 2 hap reset
Version: 6.1(4)

Conditions:
++ Customer device is running 6.1(4) or 6.1(4a) or 6.2(1).
++ Customer tries to execute the command which tears down the BGP session.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.1(4), 6.2(1.100)S5, 6.2(1.103)S8, 6.2(1.74)S3
Known Fixed Releases:
6.0(2)U2(1), 6.0(2)ZD(0.7), 6.1(4)S19, 6.1(4.97)S0, 6.1(4a), 6.1(5.6)S0, 6.2(2)
Bug Id:
CSCun14548
Title:
IM 83: vlans removed from non-default topo after dis ISSU from hmaint
Description:

Symptom:
vlans removed from non-default topo after dis ISSU from hmaint

Conditions:
Dis ISSU from hmaint to iluka or imaint.

Workaround:
After the ISSU, reconfigure the interface topology member using the new syntax.

Further Problem Description:
The topology member CLI has changed for better readability.
That is, not to be confused with the topology creation CLI.

interface
fabricpath topology

to

interface
fabricpath topology-member

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.0(1)N1(0.105), 7.0(1)N1(1), 7.0(1)ZD(0.132), 7.0(1)ZN(0.172), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60)
Bug Id:
CSCup60051
Title:
Qos policy stats not working in 6.2.10 S7 for F3
Description:

Symptom:
QOS stats is not incrementing in 6.2.10 S7 for F3

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S14, 6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S24, 7.1(0)D1(0.229), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)RTG(0.22), 7.1(0)ZD(0.283), 7.2(0)D1(1)
Bug Id:
CSCuo63409
Title:
FP Flood LTL entry misprogramed after reload spine VDC with transit mode
Description:

When fabricpath spine node is configure in "transit" mode, this issue could cause misprogramming of flood LTL that cause traffic outage.

Symptom:
This is issue is specific to "fabricpath mode transit" configuration. Traffic outage would be observed as a result with drop occuring at the transit spine.

Conditions:
The is issue is more likely to occur in a scaled testbed, with more number of vlans, SVIs or L2 mcast group entries. Reload or vdc restart can also trigger the same on a scale bed.

Workaround:
As a workaround, when transit mode is configured on the spine remove the rest of the vlan's from the node and then reload.
[In this case 1-3900 vlans are configured, remove them all].It resolves the issue.
The above workaround is suggested because is not neccesary to have the FP vlans configured on the spine when in transit mode. But the transit node needs to be connected to more than 1 leaf, simply because FP topology needs to have more than 1 node with vlans configured for the FP mcast trees to come up.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.19), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)GF(0.14), 7.1(0)NF(0.28)
Bug Id:
CSCup88022
Title:
G bit is not set on SUP but set on LC after vPC peer-link flap
Description:

Symptom:
Unicast arp reply destined to vPC peer's mac is forwarded to the RPC in a mixed mode VDC instead of peer-link DI. The arp reply is then forwarded to the peer-link DI by the M-series LC and dropped on egress of the PL interfaces under the following:

slot x quoted "show hardware internal errors"

73 EB credited packet drop 0000000000000004 23-24 -

506 Egress crdt pkts LTL/Forwarding drop 0000000000000004 23-24 -

Conditions:
Peer gateway disabled
Peer-link flap
Module reload of module that has peerlink

Workaround:
Shut/No shut the impacted SVI on the peer with the incorrect programming in the hardware mac table

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.162)
Known Fixed Releases:
6.2(10), 6.2(10)S34, 7.1(0)D1(0.196), 7.1(0)D1(0.210), 7.1(0)D1(0.215), 7.1(0)FC(0.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)VX(0.3)
Bug Id:
CSCun68731
Title:
n7k F3 vpcp: isis_fabricpath core found @isis_ha_lsp_db_pss_recover
Description:

Symptom:
The bug is hit on performing a switchover of the active SUP with fabricpath isis configured along with multiple topologies. When the bug is hit, fabricpath isis process crashes while recovering the LSP database from its PSS for stateful recovery

Conditions:
Configuration - Multiple topologies and then perform a switchover
Problem frequency - rare
Network conditions - fabricpath isis process is respawned and performs a graceful restart after crashing

Workaround:
The bug is not seen if multiple topologies aren't configured. When the bug happens farbicpath isis respawns on its own and fixes the issue.

Further Problem Description:
This bug is not seen every time we configure multiple topologies and perform a switchover but only sometimes. QA performed multiple iterations and mentioned that this situation was rarely hit.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)FM(0.24), 6.2(7.23)S0
Known Fixed Releases:
6.2(10), 6.2(10)S13, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.329), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)D1(1)
Bug Id:
CSCuo27488
Title:
ipv6 forward command does not enable ipv6 on the i/f
Description:

Symptom:
v6 forwarding will not work on the core

Conditions:

Workaround:
Enable ipv6 address on fabric control segment

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)ZN(0.120)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.80), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.130), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCup05713
Title:
IGMP: Invalid XML output - BF113 status
Description:

Symptom:
IGMP: Invalid XML output - BF113 status

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)BF(0.112)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.124), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115), 7.1(0)VXE(0.2)
Bug Id:
CSCun86081
Title:
7.X Ping to SVI fails with CMD/SGT encapsulation
Description:

Symptom:
Pings to a nexus 5000 series switch SVI may fail when the packet is coming with a CMD/SGT tag

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.1(0)D1(0.237), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.183), 7.2(0)D1(1)
Bug Id:
CSCup43563
Title:
[GBR HA] Back to back SWO suffers with impact from interface-vlan
Description:

Symptom:
The standby stuck in boot/init and doesn't become ha-standby

Conditions:
During the event of switchover triggered manually or automatic and sometimes it may require more than one swo to see this issue (eg., back-back swo)

Workaround:
Unknown

Further Problem Description:
na

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.169), 7.1(0)D1(0.174)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.179), 7.1(0)D1(0.185), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.14)
Bug Id:
CSCun65741
Title:
HMM Entry for locally connected host is not available
Description:

Symptom:
HMM local host DB is not updated. Issue was caused because of the CSCun57894 fix in AM.

Conditions:
When Vinci forwarding mode is configured under an SVI. Local hosts are not discovered by HMM as AM is not notifying HMM about the local adjacencies.

Workaround:
Remove the Vinci forwarding mode and reapply. But new adjacencies will not be discovered. To discover new adjacencies one must remove and reapply the forwarding mode again for every new adjacency.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(1)ZN(0.204)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)N1(0.152), 7.0(1)N1(1), 7.0(1)ZD(0.149), 7.0(1)ZN(0.209), 7.1(0)D1(0.181), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.230)
Bug Id:
CSCup65296
Title:
Memory leak detected in 'svi' component - 41256 (Bytes)
Description:

Symptom:
After perturbing FabricPath VLANs in the FP network, the interface_vlan component leaks memory.

Conditions:
The VLAN perturbance involves VLAN addition/deletion, VLAN shut/no shut, VLAN mode change. Perturb the FabricPath VLANs, the memory starts to leak.

Workaround:
There is no workaround.

Further Problem Description:
The problem is resolved!

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S79, 6.2(10.16)S0, 6.2(12)BFP(0.9), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.232), 7.1(0)D1(0.280)
Bug Id:
CSCun20061
Title:
FEX : Incorrect ucdidvif table programming on F2 upon fpc flap
Description:

Symptom:
Unicast traffic destined to egress a FEX Host Interface (HIF) may be dropped due to the incorrect programming of the Unicast Destination Index to Destination Virtual InterFace (ucdidvif) table on the egress module.

Conditions:
- Nexus 7000 running NX-OS version 6.2(2) or higher
- Nexus 7000 F2 or F2E series modules
- Nexus 2000 Fabric Extenders (FEX) connected to the F2/F2E modules
- LTL Indexes not allocated contiguously to the FEX HIFs by PIXM

Workaround:
Affected Versions:
1) Bring down all FEXs in the system.
2) Bring up FEXs sequentially based on number of HIFs from greatest to smallest.
- I.e. Bring up all 48 port FEXs, then 32 port FEXs.

Resolved Versions:
The issue has been resolved in NX-OS versions 6.2(8) and higher for the Nexus 7000.

Note:
This behaviour will persist through an In Service Software Upgrade (ISSU) to a resolved version. After performing an ISSU, reload all F2/F2E modules with FEXs attached.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)FM(0.20)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.30)S0, 6.2(8), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCun03978
Title:
STP Sends CBL + BD Ops Request on Secondary Vlan (PVlan)
Description:

Symptom:
Flood LTL Index missing after removing private-vlan from port-channel
CBL state for private-vlan goes to blocking state after removing private-vlan from the port-channel

Conditions:
Vlan type is Private vlan

Workaround:
shut and no shut of the port-channel can fix Flood LTL Index miss programming

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a)S10, 7.1(0)D1(0.104), 7.1(0)D1(0.64)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(8), 6.2(8)S0, 6.2(8.1)S0, 6.2(9)FM(0.45), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.1(0)D1(0.100), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCum81252
Title:
Merge XOS/LPSS with NXOS pss2: XOS/LPSS part
Description:

Symptom:
Need to merge xos/lpss@dev1 to NXOS. There are some small issues fixed in this merger

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.162), 7.1(0)ZN(0.22)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(3)I1(0.64), 7.0(3)I1(1), 7.1(0)BF(0.107), 7.1(0)BF(0.108), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16)
Bug Id:
CSCum41587
Title:
Cost community value incorrect with communityid higher than 127
Description:

Symptom:
when you try to configure Pre-bestpath cost using route-map for community ID 127 or higher, then switch will change the cost value to "4294967295" , irrespective of what costs user tries to enter.

Conditions:
Community ID should be higher that 127 and cost should be tried to change using route-map

Workaround:
none known so far.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)N1(0.400)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.112), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.188), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCum74698
Title:
n7k detailed acl logging affecting system cli operation
Description:

Symptom:
n7k running nxos version 6.2.6 and configured for detailed ip acl logging (logging ip access-list detailed) fills up /var/tmp part of the disk which affect system cli.

Conditions:
show tech output cannot be collected or various other show cli are not producing expected output with error message 'No space left on device'.

Workaround:
No Workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.9), 6.2(9)FM(0.37), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.108), 7.1(0)D1(0.171), 7.1(0)FC(0.2)
Bug Id:
CSCup94791
Title:
vlan crashed @ mts_vlan_bridge_domain_tech_check
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)PDB(0.154), 7.1(0)ZD(0.260)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.201), 7.1(0)D1(0.207), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)VX(0.3)
Bug Id:
CSCum46336
Title:
Cos2q Mapping is changed after ISSU 6.1.4a to 6.2.6 with Single Sup
Description:

Symptom:
Cos to Queue and DSCP to queue Mapping will not be same as before ISSU.

Conditions:
Seen after ISSU from 6.1.3 and above 6.1.3 to 6.2.X and above 6.2.X
Seen after ISSU with Single Sup
With Dual Sup after ISSU the Cos/DSCP to queue mapping will be ok but after further change on Cos/DSCP to queue mapping the programming will not reflect the mapping anymore
Specific to 8e-4q4q template

Workaround:
1) Remove all DSCP to queue Mapping using
class-map type queuing match-any 4q1t-8e-4q4q-in-q-default
match dscp 0-63
no match dscp 0-63
2) Remove All Queuing policies associated with interfaces (if any)
3) Change the Qos Template to default 8e using
system qos
service-policy type network-qos default-nq-8e-policy
4) Perform ISSU (single/dual sup) to 6.2.X Code
5) if DSCP to queue is used enable "hardware qos dscp-to-queue ingress module-type f-series" before step 6)
6) Restore QoS template
7) Restore Cos/DSCP to queue Mapping which were removed before ISSU
8) Restore Queuing policies on interfaces which were removed before ISSU

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2), 6.2(6)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(6)E1, 6.2(6a), 6.2(6a)S10, 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.9), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCup60247
Title:
Memory leak detected in 'isis_l2mp' compon in FP setup - 194898 (Bytes)
Description:

Symptom:
Leak detected when we get EthPM triggers for interface down

Conditions:
We would leak memory for a message

Workaround:
restarting of ISIS would get rid of the leak as long as port is not flapped again

Further Problem Description:
Fixed in 6.2.10

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S19, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.329), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)D1(1)
Bug Id:
CSCup43085
Title:
BD is down after copy r s reload with all configs intact
Description:

Symptom:
Na

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.169), 7.1(0)D1(0.172), 7.1(0)D1(0.174)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.179), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.14)
Bug Id:
CSCup65294
Title:
Memory leak detected in 'vlan' component - 870268 (Bytes)
Description:

Symptom:
After perturbing FabricPath VLANs in the FP network, the VLAN leaks memory.

Conditions:
The VLAN perturbance involves VLAN addition/deletion, VLAN shut/no shut, VLAN mode change. Perturb the FabricPath VLANs, the memory starts to leak.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S12, 6.2(10)S7
Known Fixed Releases:
6.2(10), 6.2(10)S79, 6.2(10.16)S0, 6.2(12)BFP(0.9), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.232), 7.1(0)D1(0.280), 7.1(0)EV(0.116)
Bug Id:
CSCuo77566
Title:
OTV Overlay Interface stuck at "Cleanup in Progress"
Description:

Symptom:
Under certain sequence of events, OTV Overlay Interface goes into a stuck state showing "Cleanup in Progress".
Once in this stuck state, delete/re-configuration of Overlay interface does not recover this, below error message is seen:
"Overlay in delete holddown, reject command"

Conditions:
Issue seen on N7k / Sup2 / 6.2(2)
Issue seen to carry over through ISSU to 6.2(6a).

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S3, 6.2(10.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.178), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.220), 7.1(0)N1(1)
Bug Id:
CSCun27512
Title:
Nexus: reload due to PIM process crash
Description:

Symptom:
A Nexus device may reload. Last reload reason is seen as "pim hap reset":

Nexus# show system reset-reason

----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 62610 usecs after Mon Dec 9 16:35:07 2013
Reason: Reset triggered due to HA policy of Reset
Service: pim hap reset
Version:

Conditions:
PIM is configured. The crash occurs when a particular timing condition is encountered during the processing of PIM Join and Prune messages.

Workaround:
None known at this time.

Further Problem Description:
This defect tracks this PIM issue in the N7K/PI case only. For the Nexus 5000 and 6000, please refer to CSCuj36520.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
5.2(1), 6.0(2)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)N1(0.121), 7.0(1)N1(1), 7.0(1)ZD(0.137), 7.0(1)ZN(0.184), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60)
Bug Id:
CSCup35771
Title:
7.1.0.D1.162.S3: After switchover on leaf vni config is missing from bd
Description:

Symptom:
After switchover on leaf vni config is missing from bd

Conditions:
switchover

Workaround:
reconfigure after doing copy r s and reload

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.162), 7.1(0)D1(0.172), 7.1(0)D1(0.174)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.169), 7.1(0)D1(0.174), 7.1(0)D1(0.175), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16)
Bug Id:
CSCuo44890
Title:
OTV FC: Inter-op between ASR1K and N7K failed
Description:

Symptom:
OTV routes are not exchanged between a Nexus 7000 switch running 6.2(x) image and an ASR1K device. The overlay adjacency comes up fine, however no OTV routes are exchanged.

Conditions:
Nexus 7000 switch running 6.2(x) image

Workaround:
None so far. The fix would be integrated into the 6.2(12) release. 6.1(x) image work fine with the latest IOS code.
Another option for the customer is to use older IOS code - XE 3.12 with 6.2(x), as the interop issue exists
between XE 3.13 and 6.2(x).

Further Problem Description:
The fix that has been integrated into the 6.2(12) code needs to be implemented as follows.

N77-1(config)# inter overlay 1
N77-1(config-if-overlay)# shut (<<<N77-1(config-if-overlay)# otv-isis default
N77-1(config-router)# interop-enable
N77-1(config-router)# end
N77-1(config)# inter overlay 1
N77-1(config-if-overlay)# no shut
N77-1(config-if-overlay)# end

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8a), 7.1(0)OTV(0.5)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.330), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283)
Bug Id:
CSCup60557
Title:
F2 / F2e does not send ICMP unreachable for ip length 1501-1516 bytes
Description:

Symptom:
Routing between interfaces with F2 or F2e modules where the ingress interface has an MTU of 9216 and the egress interface has an MTU of 1500, with no 802.1Q trunking or fabricpath configured and ICMP unreachables enabled on the ingress interface, a N7K will not generate an ICMP unreachable for packets with an ip length between 1501 bytes and 1516 bytes with the DF bit set for path MTU discovery.

In other words, even though the MTU for the egress interface is 1500 Bytes, it will still hardware-switch the packets in the range of 1501-1516 Bytes (includes IP Header, ICMP Header and ICMP payload). On the wire, up to 1534 bytes (1516 + 18 Bytes for L2 header).

Conditions:
Issue will only occur when PMTU discovery is required between networks where jumbo MTU support is required, but connecting device is not able to accept packets with ip length greater than 1500 bytes.

Workaround:
None

Further Problem Description:
The F2 or F2e forwarding engine architecture to accommodate mac-in-mac encapsulation for fabricpath functionality. currently software programs the forwarding engine with the configured MTU + 16 bytes to accommodate the fabicpath header, even if fabricpath is not enabled/configured.

Until the packet length is greater-than MTU + 16 bytes in length for the egress interface, the packet will not be subjected to fragmentation or sent to cpu for ICMP unreachable message generation.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a), 6.2(8), 7.1(0)D1(0.152)
Known Fixed Releases:
6.2(10), 6.2(10)S24, 6.2(10)S27, 6.2(10)S66, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.289), 7.1(0)D1(0.312)
Bug Id:
CSCuo50084
Title:
6.2.10 :ERROR: internal error: Failed to get if record on ASCII
Description:

Symptom:
The following error messages may be seen occasionally when applying an ascii config to switch which contains a large number of HSRP groups:
"ERROR: internal error: Failed to get if record"
"ERROR: HSRP V6 groups are not supported on HSRPV1 interface"

Conditions:
Issue only occurs when there are HSRP groups configured on interfaces that are VRF members.

Workaround:
The failed HSRP config can be reapplied manually afterwards and will be accepted.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)FM(0.20), 6.2(10)FM(0.24), 6.2(12)E2, 6.2(12)FM(0.8)
Known Fixed Releases:
6.2(12)E1, 6.2(12)E5, 7.1(0)BF(0.123), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115), 7.1(0)VXE(0.2), 7.1(0)ZD(0.225)
Bug Id:
CSCun16347
Title:
banner motd with "!" and "#" may cause admin vdc migration to hang
Description:

Symptom:
CLI hangs, to get back CLI, either need to power cycle or need to reload the router by telnet to the mgmt ip.

Conditions:
1. This happens in 6.2.6 with "system admin-vdc migrate xxx" when user has banner motd configurations with "!" and "#" as delimiter.
2. "#" and "!" work in all other releases except 6.2.8. The following characters are known to cause similar issue:
[ $ ^ . | ? \ >
The following characters works fine
{}]*+<

Workaround:
1. Before migrate to admin VDC, it's recommended to remove CLI "banner motd " from the config, or use known working characters like "*", "+", "{" or "}" as delimiter. banner command can be applied after vdc migration.
2. Once CLI hangs, either need to power cycle or need to reload the router by telnet to the mgmt ip. Don't save the configuration before reload.

Further Problem Description:
bug CSCur12074 has similar appearance, but happens for other delimiters like "^", "." and "$"

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(5.52)S0, 6.2(6), 6.2(6a)S12
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.17), 6.2(7.17)S0, 6.2(7.19)S0, 6.2(8), 6.2(8)EC(0.8), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCuo19840
Title:
Anycast HSRP in initial state after supervisor failover
Description:

Symptom:
Anycast HSRP in initial state after supervisor failover

Conditions:
Supervisor switchover

Workaround:

Further Problem Description:
Switch# sh hsrp anycast
Anycast bundle - 1 (IPv4)
Admin Status: Up Oper Status: Down
Reason: Invalid switch-id Cfged, :
Anycast Switch ID XXX

%HSRP_ENGINE-3-BUNDLE_ASID_REG_FAIL: Switch-id:XXX DRAP registration failed for bundle:1.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)S15
Known Fixed Releases:
6.2(10), 6.2(10)S3, 6.2(10.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.178), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.220), 7.1(0)N1(1)
Bug Id:
CSCun74514
Title:
bridge-domain remains down after shut/no-shut
Description:

Symptom:
na

Conditions:
na

Workaround:
na

Further Problem Description:
na

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)FVX(0.68)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.80), 7.1(0)D1(0.117), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)SDN(0.6), 7.2(0)D1(1)
Bug Id:
CSCun23230
Title:
Imaint: v4 ping failure from host to the leaf
Description:

Symptom:
Seeing the error message -
arp: arp_handle_arp_request: VINCI: No configured gateway anycast mac




ARP process may not be able to handle the request

Conditions:
Intermittent issue.
This happens because of timing problem where the ARP does not receive the HMM anycast gateway mac config notification. As a result arp does not have the anycast mac and it fails to process the received request.

Workaround:
The issue is fixed now.
ARP uses the cached HMM api to get the relevant information.

Further Problem Description:
Explained

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)N1(0.120), 7.0(1)N1(1), 7.0(1)ZD(0.137), 7.0(1)ZN(0.183), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60)
Bug Id:
CSCuo71245
Title:
BD is up if switch reloaded with vni shutdown
Description:

Symptom:
BD remains up if we do a copy r s reload with vni in shut state

Conditions:
vni has to be down,

Workaround:
do a shut / no shut on bd again to bring back the bd.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.130)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.189), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.14), 7.1(0)PDB(0.141), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCup83732
Title:
N7K: PIM crash on shutdown loopback interface on egress PE in MVPN ASM
Description:

Symptom:
PIM process crashed

Conditions:
loopback interface which used by BGP and multicast, is shutdown.

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.188)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.214), 7.1(0)FC(0.2), 7.1(0)N1(0.267), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)PDB(0.163)
Bug Id:
CSCun00533
Title:
Seeing ipqosmgr crash when applied to range of vlan's
Description:

Symptom:
On configuring the vlan for 4k class-map, the ipqosmgr is crashing

Conditions:
the time taken is very long

Workaround:
nothing, decrease the class-maps and see

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)FM(0.17)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)NO(0.6), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCuo37800
Title:
N7K - SNMP snmpd core when blank community string snmpCommunityName
Description:

Symptom:
NOne

Conditions:
None

Workaround:
None

Further Problem Description:
Fix needed in 7.1 release

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)S31, 7.1(0)D1(0.131)
Known Fixed Releases:
6.2(10), 6.2(8)KR(0.8), 6.2(8.13)S0, 6.2(9)FM(0.55), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.109), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28)
Bug Id:
CSCuo10029
Title:
Traffic drop to VPC+ host on M1/F1 DI driving GPC instead of Peer-link
Description:

Symptom:
Upon a VPC+ peer reload, in a mixed chassis scenario [M*F1/M*F2] routed traffic ingressing on M card will blackhole as the DI will not drive the peer switch switchID and will drive ES switchID. This DMAC was learnt on the other peer and was not installed correctly on this peer upon reload.

Conditions:
VPC+, Reload, Mixed Chassis, Routed East-West traffic

Workaround:
Clear mac address dynamic for the destination MAC.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2), 6.2(2)S22, 6.2(6)S18, 6.2(6a), 6.2(7.23)S0, 6.2(8)S13, 7.0(1)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.10), 6.2(10)EC(0.11), 6.2(10)FM(0.18), 6.2(10)NO(0.19), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.1(0)D1(0.108)
Bug Id:
CSCun46513
Title:
SSTE: BGP set nh incorrectly with inbound RPM set ip nh peer-address
Description:

Symptom:
BGP set the nexthop incorrectly when the inbound route-map with set ip nexthop peer-address is configured.

Conditions:
The symptoms are observed when the prefixes are learned from rfc5549 v6 RRC neighbors and advertised to rfc5549 v4 RRC neighbor when v4 RRC has the set ip next-hop peer-address configured.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(7.12)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.23)S0, 6.2(8), 6.2(9)FM(0.37), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.272), 7.0(3)I1(1), 7.1(0)BF(0.81), 7.1(0)D1(0.171)
Bug Id:
CSCum89825
Title:
switchover reloads both sup with iscm cores .
Description:

Symptom:
iscm crash on switchover , reloads the standby active both ,
GNU GRUB version 0.97

Autobooting bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin bootflash:/n7000-s
2-dk9.6.2.8.FH.0.36.gbin...
Filesystem type is ext2fs, partition type 0x83
Booting kickstart image: bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin....
........................................
telnet> q
Connection closed.
and-sw-ibuild4:138>
and-sw-ibuild4:138> dd1
Trying 10.106.29.33...
Connected to 10.106.29.33.
Escape character is '^]'.

Password OK
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6178) hasn't caught signal 11 (core will be saved).
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %LICMGR-2-LOG_LIC_NO_LIC: No license(s) present for feature LAN_ENTERPRISE_SERVICES_PKG. Application(s) shut down in 108 days.
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %LICMGR-2-LOG_LICAPP_NO_LIC: Application pbr running without LAN_ENTERPRISE_SERVICES_PKG license, shutdown in 108 days
2014 Jan 31 05:11:31 india-29 %$ VDC-1 %$ %SYSMGR-2-LAST_CORE_BASIC_TRACE: : PID 6213 with message iscm(non-sysmgr) crashed, core will be saved .
2014 Jan 31 05:11:31 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6213) hasn't caught signal 11 (no core).
2014 Jan 31 05:11:32 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6239) hasn't caught signal 11 (core will be saved).

Conditions:
GNU GRUB version 0.97

Autobooting bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin bootflash:/n7000-s
2-dk9.6.2.8.FH.0.36.gbin...
Filesystem type is ext2fs, partition type 0x83
Booting kickstart image: bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin....
........................................
telnet> q
Connection closed.
and-sw-ibuild4:138>
and-sw-ibuild4:138> dd1
Trying 10.106.29.33...
Connected to 10.106.29.33.
Escape character is '^]'.

Password OK
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6178) hasn't caught signal 11 (core will be saved).
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %LICMGR-2-LOG_LIC_NO_LIC: No license(s) present for feature LAN_ENTERPRISE_SERVICES_PKG. Application(s) shut down in 108 days.
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %LICMGR-2-LOG_LICAPP_NO_LIC: Application pbr running without LAN_ENTERPRISE_SERVICES_PKG license, shutdown in 108 days
2014 Jan 31 05:11:31 india-29 %$ VDC-1 %$ %SYSMGR-2-LAST_CORE_BASIC_TRACE: : PID 6213 with message iscm(non-sysmgr) crashed, core will be saved .
2014 Jan 31 05:11:31 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6213) hasn't caught signal 11 (no core).
2014 Jan 31 05:11:32 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6239) hasn't caught signal 11 (core will be saved).

Workaround:
iscm crash on switchover , reloads the standby active both
GNU GRUB version 0.97

Autobooting bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin bootflash:/n7000-s
2-dk9.6.2.8.FH.0.36.gbin...
Filesystem type is ext2fs, partition type 0x83
Booting kickstart image: bootflash:/n7000-s2-kickstart.6.2.8.FH.0.36.gbin....
........................................
telnet> q
Connection closed.
and-sw-ibuild4:138>
and-sw-ibuild4:138> dd1
Trying 10.106.29.33...
Connected to 10.106.29.33.
Escape character is '^]'.

Password OK
2014 Jan 31 05:11:29 india-29 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "iscm" (PID 6178) hasn't caught signal 11 (core will be saved).
2014 Jan 31 05:11:29 india-

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)FH(0.36)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.11)S0, 6.2(8), 6.2(8)EC(0.6), 6.2(8)NO(0.12), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCup01813
Title:
FEX : arp reply fails on F2-FEX L3 interface due to incorrect port-grp
Description:

Symptom:
issue can happen for any traffic

Conditions:
trigger so far is FEX reload (but it do not happen always after reload and it is not simple hit) , link down on remote site also trigger this problem

Workaround:
There is no workaround as issue is not always happen after FEX reload you can try to reload FEX again or remove port-group from VDC put it back and connect fex again and see if it still happening.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)FM(0.32)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.28), 6.2(8)TS(0.28), 6.2(9.2)S0, 7.1(0)GF(0.11)
Bug Id:
CSCup80317
Title:
GBR-Bundle->GBR-Bugfix sync:switch got stuck during bridge domain config
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.179), 7.1(0)D1(0.231), 7.1(0)PDB(0.138)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.196), 7.1(0)D1(0.201), 7.1(0)D1(0.204), 7.1(0)D1(0.215), 7.1(0)D1(0.221), 7.1(0)D1(0.232), 7.1(0)FC(0.2)
Bug Id:
CSCup17536
Title:
GBR-BUGFIX->GBR-top sync::fabric-control config is absent under run-cfg
Description:

Symptom:
Just a show issue.

Conditions:
A fag is not set when configuring fabric-control.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.160), 7.1(0)D1(0.162)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.162), 7.1(0)D1(0.164), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)VXE(0.2), 7.1(0)ZD(0.217)
Bug Id:
CSCuo13444
Title:
IP Packets are dropped at LC when one sub interface is deleted
Description:

Symptom:
Traffic breaks for all sub-interfaces under a parent interface when we remove a sub-interface under that parent interface.

Conditions:
Sub-interfaces configured on F2 linecard

Workaround:
shut/no shut another configured sub-interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.85), 7.1(0)ZD(0.193)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.19), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.1(0)D1(0.153), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)ZD(0.204), 7.1(1)SP(0.4), 7.2(0)D1(1)
Bug Id:
CSCup97286
Title:
vlans crash @ subbmp_find_bit
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.196), 7.1(0)D1(0.201)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.196), 7.1(0)D1(0.201), 7.1(0)D1(0.219), 7.1(0)D1(0.220), 7.1(0)FC(0.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.20), 7.1(0)VX(0.4)
Bug Id:
CSCun60481
Title:
snmpbulkwalk : Error: OID not increasing: IP-FORWARD-MIB for IPV6
Description:

Symptom:
SNMP bulkwalk fails with an error indicating that OID is not increasing in IP-FORWARD table.

Conditions:
This occurs in particular v6 topology that are complete and contains L3VPN configuration.

Workaround:
There is no workaround this issue. However, should have no impact on traffic or any other functionality.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.1(5)S4
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.245), 7.1(0)OTT(0.31), 7.1(0)PDB(0.194), 7.1(0)RTG(0.17), 7.1(0)ZD(0.294), 7.2(0)D1(1)
Bug Id:
CSCuo36343
Title:
N7K-SUP1 ipqosmgr process crash after upgrading from 6.1.3 to 6.2.2a
Description:

Symptom:
N7K-SUP1 experience ipqosmgr crashed after upgrading from 6.1.3 to 6.2.2a.

Conditions:
dual N7K-SUP1 running 6.1.3 which was upgraded to 6.2.2a.

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
6.2(10), 6.2(10)S59, 6.2(10.16)S0, 7.1(0)D1(0.264), 7.1(0)OTT(0.36), 7.1(0)PDB(0.213), 7.1(0)SIB(99.38), 7.1(0)ZD(0.314), 7.2(0)D1(1)
Bug Id:
CSCup72846
Title:
monitor hap reset on deleting VLAN
Description:

Symptom:One or both supervisors in a Nexus 7000 chassis might reload unexpectedly. Reset reason is shown as 'monitor hap reset'
`show system reset-reason`
----- reset reason for module 2 (from Supervisor in slot 2) ---
1) At 781550 usecs after Thu Jul 3 07:49:04 2014
Reason: Reset triggered due to HA policy of Reset
Service: monitor hap reset
Version: 6.2(2a)

Conditions:This might happen only with VLAN addition/deletion,
AND when SPAN is configured,
AND the SPAN source contains a FPC interface.

Workaround:avoid the multiple conditions above.

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
6.2(10), 6.2(10)S19, 7.1(0)D1(0.227), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.162), 7.2(0)D1(1)
Bug Id:
CSCuo89198
Title:
post SSO fabric_mcast process is not running on the new active sup
Description:

Symptom:
configure 'ip multicast fabric-forwarding' causes stdby goes to init

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.136), 7.1(0)D1(0.146)
Known Fixed Releases:
7.1(0)D1(0.161), 7.1(0)D1(0.162), 7.1(0)D1(0.163), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)PDB(0.110), 7.1(0)VXE(0.2), 7.1(0)ZD(0.215)
Bug Id:
CSCun34206
Title:
CLI and VSH cores after configuring 'switchport'
Description:

Symptom:
Nexus switch crashes after switchport configuration.

Conditions:
This was seen while configuring switchport on an interface of a non default VDC.

Workaround:
Unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.23), 6.2(10)FM(0.17), 6.2(10)NO(0.12), 6.2(8)KR(0.8), 6.2(8.9)S0, 7.1(0)D1(0.117), 7.1(0)FC(0.2), 7.1(0)PDB(0.65), 7.1(0)ZD(0.166)
Bug Id:
CSCuo90184
Title:
NXOS/OTV: ARP ACL Applies to all VLAN without Arp inspection Filter
Description:

Symptom:
ARP packets will not processed and all ARP packets will be dropped due to block ACL due to the following ARP access-list,

N7k-TEST(config)# arp access-list OTV-BLOCK-HSRP-ARP
N7k-TEST(config-arp-acl)# 10 deny ip any mac 0000.0c07.ac00 ffff.ffff.ff00
N7k-TEST(config-arp-acl)# 20 deny ip any mac 0000.0c9f.f000 ffff.ffff.f000
N7k-TEST(config-arp-acl)# 30 permit ip any mac any

without calling the arp inspection filter(ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan), the ARP access-list will be applied to all vlans and block ARP.

Conditions:
The issue is seen after the ip arp inspection filter command is applied twice on the same vlan and then if we try to remove the config.
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
no ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10

Workaround:
Reload ASCII

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2a), 6.2(8)S8, 6.2(8)S9
Known Fixed Releases:
6.2(12)E2, 6.2(14)FB(0.7), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.350)
Bug Id:
CSCun87659
Title:
In large vlan scale setup SPM is timing out causing issues
Description:

Symptom:
VDC creation may take long time

Conditions:
Any port bring up activity on a scale testbed of total 400+ vlans and 500 L2 ports or port-channels

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)S3
Known Fixed Releases:
7.1(0)AV(0.38), 7.1(0)D1(0.343), 7.1(0)EV(0.125), 7.1(0)OTT(0.47), 7.1(0)PDB(0.280), 7.2(0)D1(1)
Bug Id:
CSCum82162
Title:
"show nice detail" struck or not return to prompt after adding 15 nodes
Description:

Symptom:
"show nice detail" struck or not return to prompt after adding 15 nodes

Conditions:
"show nice detail" struck or not return to prompt after adding 15 nodes

Workaround:
"show nice detail" struck or not return to prompt after adding 15 nodes

Further Problem Description:
after configuration of basic wccp the programming on LC is not present .

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)FH(0.35), 6.2(8)FM(0.17)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.5)S0, 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.3), 6.2(8)CM(0.5), 6.2(8)CM(0.6), 6.2(8)FM(0.20), 6.2(9)FM(0.37), 7.1(0)ZD(0.200)
Bug Id:
CSCuo67870
Title:
VTP Pruning causes traffic outage in a vPC when primary leg is flapped
Description:

Symptom:
vPC VLANs on a trunk interface are incorrectly pruned by VTP on the vPC Operational Secondary Nexus 7000. The interface can be configured as a vPC leg or as a vPC Orphan port.

Conditions:
This issue will only occur on a Nexus 7000 vPC setup running NX-OS version 6.2(6) or higher that is also configured to use VTP for VLAN pruning.

The trigger for the issue is a flap of a vPC leg on the vPC Operational Primary switch. After the link flap, VTP does not successfully process join messages for the VLANs, resulting in a timeout and the VLANs being pruned from the link.

Workaround:
1) Flap any vPC leg on the vPC Operational Secondary switch to force a VTP to recalculate the pruning state
2) Remove and re-add the VTP Pruning configuration*
* Note: When VTP is removed, all broadcast traffic for VLANs in the trunk allowed list is allowed expectedly to be flooded out of the interface

The issue is resolved in the 6.2(10) release of NX-OS for the Nexus 7000.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S59, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.176), 7.2(0)D1(1)
Bug Id:
CSCuo90941
Title:
Unable to add vlan to trunk on port-profile post upgarde from 6.0 to 6.2
Description:

Symptom:
The following error is returned when executing a "switchport trunk allowed vlan add" command in following two scenarios:
- under a port-profile
- under an interface inheriting a port-profile

N7KA(config-port-prof)# switchport trunk allowed vlan add 6
ERROR: This form of the command has no effect on the current system
N7KA(config-port-prof)#

Conditions:
- This occurs after an upgrade of NX-OS via ISSU or disruptive upgrade
- The Port-profile being modified or inherited must have been created prior to the upgrade

Workaround:
- The user can re-apply the original trunk allowed list under the port-profile that existed before the ISSU. Then the new vlans can be added or old vlans removed without seeing any issues.
- Delete and recreate port-profile from scratch after the ISSU.
- Reboot is not effective workaround. Condition remains after reloading switch.

Further Problem Description:
- you may see duplication of lines in the running configuration under virtual port-channel

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.1(4)S26, 6.2(10)E3, 6.2(2a), 6.2(8a)S3
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.2(0)BA(0.12), 7.2(0)D1(0.401), 7.2(0)D1(1), 7.2(0)OTT(0.5), 7.2(0)PDB(0.345), 7.2(0)RTG(0.91), 7.2(0)ZD(0.88)
Bug Id:
CSCum96491
Title:
6.2.8.FM.0.17.S0:XBOW F3:Seeing few BFD sessions going down after SSO
Description:

Symptom:
Seeing few BFD sessions going down after SSO

Conditions:
Its seen on supervisor switchover very rarely

Workaround:
LC reload

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a)S17, 6.2(8)FM(0.17), 6.2(8)S33
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.19)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCup06023
Title:
u6route-mem allocation failure even though there is plenty of headroom
Description:

running into u6route mem allocation failure even though there's plenty of memory left.

e.g. A-VDC1# sh vdc resource u6route-mem detai

u6route-mem 6 used 134 unused 202 free 68 avail 208 total
-------------
Vdc Min Max Used Unused Avail
--- --- --- ---- ------ -----
AB-VDC1 24 24 1 23 23
A-1-B-VDC1 100 100 1 99 99
Test-VDC3 4 4 1 3 3
Test-VDC4 4 4 1 3 3
Test-VDC5 4 4 1 3 3
Test-VDC6 4 4 1 3 3

Symptom:
A-1-B-VDC1# sh log last 10

get warning messages with failure to allocate shared memory:

Failed to allocate shared memory for route trie node

2014 May 27 17:59:33 A-1-B-VDC1 %U6RIB-2-NOSMEM: u6rib [9610] (default-base)
Failed to allocate shared memory for recursive nexthop trie node
2014 May 27 17:59:43 A-1-B-VDC1 %U6RIB-4-SYSLOG_SL_MSG_WARNING: U6RIB-2-NOSME
M: message repeated 30671 times in last 121 sec
2014 May 27 18:00:23 A-1-B-VDC1 %BGP-5-ADJCHANGE: bgp-64896 [9979] (default)
neighbor cafe:1890:e000:1::10 Down - holdtimer expired error
2014 May 27 18:00:26 A-1-B-VDC1 %U6RIB-2-NOSMEM: u6rib [9610] (default-base)
Failed to allocate shared memory for route trie node
2014 May 27 18:00:36 A-1-B-VDC1 %U6RIB-4-SYSLOG_SL_MSG_WARNING: U6RIB-2-NOSME
M: message repeated 14688 times in st 52 sec
A-1-B-VDC1#

Conditions:
Verified with scale with 30k ipv6 and 655K ipv4 routes.
and with a hard swithover

Workaround:
N/A

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)E1, 6.2(10)S70, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.271), 7.1(0)OTT(0.36), 7.1(0)PDB(0.219)
Bug Id:
CSCun78718
Title:
N7k 6.2(2) Port-Profile modification removing the entire VDC config-tion
Description:

Symptom:
An incorrect rollback of failed Port-Profile modification might be seen in some very specific cases on N7k devices. As a result of this incorrect PPM rollback, significant part of running configuration might be negated on the device. Reloading the device recovers it from the issue as the device gets re-initialized from its startup configuration.

Conditions:
This is a scalability-related issue. The problem might be seen on heavily over-configured N7k devices with lots of attached FEXes (~1,5K interfaces on the system, ~10K lines in "show run all", ~200 interfaces managed by a single Port-Profile). Under these specific conditions some port-profile operations can take several minutes to be completed, or even just to be rejected.

The problem could be triggered if two different port-profiles are being modified simultaneously from two different management sessions to the N7k device (VDC), and both of the two PPM modifications are failed. In this very specific case two PPM rollback operations could be initiated simultaneously thus breaking the normal PPM rollback operation and resulting in incorrect completion of the PPM rollback operation.

Workaround:
1. Ensure that only one person is modifying configuration on such system, avoid initiating a new Port-Profile modification before the previous Port-Profile modification is completed;
2. Consider any ways to reduce the amount of interfaces handled by a single Port-Profile;
3. Follow Cisco-verified Scalability Guide for the setup.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S37, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.263), 7.1(0)OTT(0.34), 7.1(0)PDB(0.208), 7.1(0)SIB(99.16), 7.1(0)ZD(0.312), 7.1(0)ZN(0.411)
Bug Id:
CSCup35883
Title:
Multicast Vinci A/B: SG stuck when RP on border router
Description:

Symptom:
Multicast Vinci A/B: SG stuck when RP on border router after traffic stop

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(1), 7.1(0)D1(0.162), 7.1(0)D1(0.163), 7.1(0)D1(0.179)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.238), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.14)
Bug Id:
CSCus73066
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:
A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:
Unknown

Workaround:
None

Further Problem Description:
The defect is similar to CSCup20959 which should be fixed in 6.2(10) code but still seen in 6.2(10)

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.1(4), 6.2(10), 6.2(12), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10)E5, 6.2(10)E8, 6.2(12)E2, 6.2(14)FB(0.14), 6.2(8)E10, 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)PDB(0.395), 7.2(0)PDB(0.396), 7.2(0)VZD(0.26)
Bug Id:
CSCun58253
Title:
SSTE: ipfib crashed at ufib_vobj_init after restart ipfib on LC
Description:

Symptom:
ipfib on the LC might crash

Conditions:
The symptoms is observed after ipfib on the LC is restarted

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(7.16)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.30)S0, 6.2(8), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCup18117
Title:
vlan_mgr cored after ISSD
Description:

Symptom:
NA

Conditions:
ISSD

Workaround:
NONE

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.160), 7.1(0)D1(0.162)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115), 7.1(0)RT(95.2), 7.1(0)VXE(0.2)
Bug Id:
CSCun42840
Title:
F3+brkout: ospf cores observed during cfd verification
Description:

Symptom:
OSPF crashes when trying to add a route that changes its type from either discard-internal or discard-external to a different route type (other than NONE). ONLY OSPFv2 in 6.2.6a is affected by this bug.

Conditions:
This issue is related to the presence of discard routes that OSPF adds into the RIB. When the discard route changes its type from discard internal(also discard-external) to some other type (other than NONE), which may be the case if the area range or summary address overlap with one of the component routes, OSPF can crash.

Both internal and external discard routes are affected by this bug. ONLY OSPFv2 in 6.2.6a is affected.

Workaround:
The following steps may be taken to minimize the exposure to this bug.

1. Configuring an area range/summary address that is less specific than all component routes.
2. Suppressing discard route may help in avoiding this crash;

Recovery: OSPF automatically recovers from this crash by doing a stateful recovery.

Further Problem Description:
Some additional questions answered.

1) Summary address is typically less specific than the component routes. Is the issue seen only when the summary address is the same as a component route?

The problem would be seen if the route-type changed from (a) discard-internal to some other type (e.g., inter or intra), or (b) from some other type (e.g., inter or intra) to discard-internal . Now, let us take the example of route-type changing from discard-internal to intra. This would be the case if there is a component in that area range that has the same prefix/masklen. If you have a area range that is strictly less specific than each one of the component routes, then, the route-type can only change from discard-internal to NONE, or NONE to discard-internal, and this will NOT cause the crash.

We can draw similar conclusions for discard-external routes also.

2) Would there be a crash if route changes *to* discard-*?
Yes. This would also result in a next-hop being deleted for the summarized route (e.g., intra) and another one added (discard-*) subsequently.

3) Can the router run into constant crashes? In which theoretical scenario?
In the stable network, we would only see this once. Once the route-type changes from (or changes to) a discard-*, then, we will not see further crashes. On the flip side though, each time the route-type changes from (or changes to) a discard-* , we will see the crash.


Example:
Let us say that the router is an ABR that summarizes everything under 123.123.123.0/24 coming in area 1.

router ospf 1
area 1 range 123.123.123.0/24

This will cause the following route to be installed in the RIB.
123.123.123.0/24, ubest/mbest: 1/0
*via Null0, [220/0], 00:00:02, ospf-1, discard

Due to this bug, OSPF will crash when trying to install an intra-area route that overlaps with the configured area range, such as the one below:

123.123.123.0/24, ubest/mbest: 1/0
*via 192.168.10.3, Eth2/7, [110/80], 00:00:02, ospf-1, intra

A similar problem will be seen with summary-address/external routes also. See the Unit test attachment for some more examples.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(7.10)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.30)S0, 6.2(8), 6.2(9)FM(0.37), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.72), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.120)
Bug Id:
CSCun99687
Title:
VTY ACL not programmed after code upgrade to 6.2.6 and switchover
Description:

Symptoms:
This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.

Conditions:
Device configured with default configuration.

Workaround:
Not applicable or available.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.23), 6.2(10)FM(0.17), 6.2(10)NO(0.12), 6.2(8)E10, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)BZ(0.46)
Bug Id:
CSCuo12118
Title:
NXOS-L2VPN-VPLS-PWs are down after remove then add VFI/PW
Description:

Symptom:
PW to remote PE in VFI not present.

Conditions:
Following are the conditions in which the issue would be encountered:
- VFI is configured with BGP AD (AND)
- BGP session with Address family L2VPN is configured and BGP session is established (AND)
- PWs in the VFI are established
- L2VPN Process Restarts
- Reconfigure VFI (Un-configure/Configure VFI)

Workaround:
clear ip bgp *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)BF(0.48)
Known Fixed Releases:
15.4(2.11)T, 15.4(2.12.1)PIH25, 15.4(2.16)S, 15.4(3)S, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.106), 7.1(0)BF(0.127), 7.1(0)D1(0.162), 7.1(0)FC(0.2)
Bug Id:
CSCum69960
Title:
SNMP trap is disabled after upgrade to 626
Description:

Symptom:
cseFailSwCoreNotifyExtended trap is disabled from switch.

Conditions:
Reload/upgrade to 626

Workaround:
manually re enable trap :-

N7k(config)#snmp-server enable traps sysmgr cseFailSwCoreNotifyExtended

Further Problem Description:
No other trap is affected.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(8)NO(0.11), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCut86729
Title:
vPC Multicast optimization doesn't work after disable/enable the CLI
Description:

Symptom:
Multicast traffic flows through the MCT link (vpc peer-link) even though VPC Multicast optimization is enabled using CLI "no ip igmp snooping mrouter vpc peer-link".

Conditions:
VPC Multicast optimization is enabled using CLI -
"no ip igmp snooping mrouter vpc peer-link"

Workaround:
If vPc multicast optimization is required such that multicast traffic doesn't traverse MCT link and if this issue is observed in the network, enabling the command by configuring "ip igmp snooping mrouter vpc peer-link" and disabling the command after some time by using "no ip igmp snooping mrouter vpc peer-link" will work.

Further Problem Description:
Enabling Multicast optimisation through CLI doesn't take effect in a scale setup. No issue is seen if we do not enable VPC Multicast optimization. It is disabled by default.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.2(0)N1(0.163)
Known Fixed Releases:
7.3(0)RTG(0.22)
Bug Id:
CSCun11509
Title:
IPFIB crashes multiple times after ISSU
Description:

Symptom:
When upgrading the N7K via ISSU there were unexpected crashes of the IPFIB application and core file were written out.

Conditions:
Upgrading the N7K via ISSU from the Command Line Interface (CLI).

Workaround:
Update the N7K by changing the boot variables and doing a reload.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)FM(0.20), 7.1(0)D1(0.136)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.21)S0, 6.2(8), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCuo93631
Title:
N7K MAC address in hardware but missing from software after ISSU
Description:

Symptom:
Nexus 7000 does not learn new MAC addresses in software after ISSU.

"show hardware mac address-table " contains MAC entry in hardware (x = ingress module in question)

"show mac address-table" does not contain MAC entry in software

Conditions:
a) ISSU performed on N7K
b) In combination with ISSU, a new learn mac address caused by a new mac, or a flush of the mac table and re-learn of existing macs while system is undergoing ISSU.

Workaround:
Run the following command: "test l2fm pending-ack slot for all modules which have the "sup_ack_pend" bit set to 1. To check what the bit is set to run the following command:

- slot show system internal mtm info global | eg -i ack_pend
nl_mv_rd num_ack_pending 1 sup_ack_pending 1
age num_ack_pending 0 sup_ack_pending xxx
- any module with "ack_pending" status = "non-zero" is the module(s) to be reloaded

A reload of the module also resolves this issue.

Also, "clear mac address-table dynamic" resolves this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.143), 7.1(0)D1(0.146), 7.1(0)D1(0.153)
Known Fixed Releases:
6.2(10), 6.2(10)S22, 7.1(0)D1(0.196), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCum84238
Title:
LISP ACL: Label2sel table incorrect for lisp decaps with mpls VPN
Description:

Symptom:
LISP Parallel mode does not work on decaps when the locator VPN is a BGP/MPLS VPN

Conditions:
The top bit is set incorrectly in teh Label2sel table

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6), 6.2(8)AA(0.4), 6.2(8)FM(0.9), 7.1(0)ZN(0.99)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.3), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCup74698
Title:
ipqosmgr crash @ mts_opc_get
Description:

Symptom:
crash happening when qosmgr specific configuration done

Conditions:
When any configuration like priority flow control configuration on interface or any qosmgr specific configuration is done, the qosmgr was crashing

Workaround:
NA

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S16
Known Fixed Releases:
6.2(10), 6.2(10)S17, 7.1(0)D1(0.285), 7.1(0)EV(0.116), 7.1(0)OTT(0.39), 7.1(0)PDB(0.235), 7.1(0)RTG(0.50), 7.1(0)SIB(99.52), 7.1(0)ZD(0.332), 7.2(0)D1(1)
Bug Id:
CSCuo64219
Title:
bfd core @ bfd_disc_bmp_set_bit on applying config
Description:

Symptom:
Crash due to asset failure when bfd session discriminator reaches(xxxxFFFF) before wrapping around.

Conditions:
Have 65535+ sessions per VDC so that discriminator reaches boundary condition which causes asset failure.

Workaround:
Have fewer than 65535 sessions

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.113), 7.1(0)D1(0.161)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.108), 7.1(0)D1(0.169), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115)
Bug Id:
CSCup65916
Title:
F3 LC reload after system switchover due to xbar_manager timeout
Description:

Symptom:
An F3 LC may reload after a system switchover

Conditions:
Unknown

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S12, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S14, 6.2(10)S15, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.249), 7.1(0)OTT(0.32), 7.1(0)PDB(0.184), 7.2(0)D1(1)
Bug Id:
CSCup67732
Title:
N7K: some mroutes leftover on some vrfs on ingress PE under MVPN scale
Description:

Symptom:
Some mroute state left over on some vrf contexts after multicast traffic and joins were stopped

Conditions:
When 200 vrfs are configuration and over 200 groups per vrfs are injected to FHR PE router

Workaround:
No workaround

Further Problem Description:
We are unable to allocate memory for 50k routes and that is the cause of stale routes between different modules.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.179)
Known Fixed Releases:
6.2(10), 6.2(10)S70, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.243), 7.1(0)N1(0.303), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.31)
Bug Id:
CSCup19027
Title:
N7K Dual SUP lost configurations after power up
Description:

Symptom:
The N7K SUP1 had the configuration saved and was powered down. When the N7K was then powered up it came up with no configuration. The startup-configuration had been corrupted due to an abnormal termination when it had been previously saved.

Conditions:
When the "copyrunning-config startup-config" was entered it was terminated abnormally either the user entering CNTRL-C or the connection to the N7K, for example via SSH, being terminated before the "copy" was complete.

Workaround:
The configuration must be restored manually.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases:
6.2(10), 6.2(10)S64, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.195), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)N1(0.245)
Bug Id:
CSCum64236
Title:
Bdi not coming up on spine even after there is no shut
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)FVL(0.36), 7.0(1)FVL(0.39)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)GI(0.5), 7.0(0)KM(0.37), 7.0(1)FVL(0.50), 7.0(2)NF(0.17), 7.1(0)D1(0.55), 7.1(0)PDB(0.13), 7.2(0)D1(1)
Bug Id:
CSCuo55926
Title:
crash on mrib on VDC reload
Description:

Symptom:
mrib crashes when VDC is reloaded

Conditions:
This issue may hit during MRIB bring up time (system boot up/vdc bring up) in rare cases.

Workaround:
On VDC reload, there is no workaround is required. ( VDC reload will happen) again. On cold boot case, system will reload due to this crash

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6), 6.2(6)S17, 6.2(8b)S4
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.9), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.104)
Bug Id:
CSCuo02430
Title:
SSTE: hsrp process crashed with SSO trigger
Description:

Symptom:
HSRP process on the standby sup becomes unresponsive and eventually crashes with heartbeat timeout when system switchover is performed. HSRP process is then restarted by sysmgr.

Conditions:
HSRP groups are configured on interfaces with invalid VRFs (i.e. where the VRF is shutdown or not defined). Switch is booted up with saved startup config. System switchover is performed.

Workaround:
Ensure VRFs are valid before system switchover, i.e. if the VRF is shutdown then "no shut" the VRF, and if VRF is not defined then define it.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)S11, 6.2(8)S19, 6.2(8)S9, 7.0(3)I2(0.375)
Known Fixed Releases:
6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.18), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(3)I2(0.390), 7.0(3)I2(1), 7.1(0)BF(0.98)
Bug Id:
CSCup13170
Title:
The leaf0 is getting hang after configured "no vrf context vpn1"
Description:

Symptom:
"no vrf context vpn1"
Upon giving this CLI, leaf0 hangs

Conditions:
Should configure the vrf context cli

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)BF(0.116), 7.1(0)BF(0.117), 7.1(0)BF(0.119), 7.1(0)D1(0.172), 7.1(0)D1(0.174), 7.1(0)ZD(0.227)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.179), 7.1(0)D1(0.188), 7.1(0)D1(0.191), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)OTT(0.14), 7.1(0)PDB(0.141)
Bug Id:
CSCtq34950
Title:
R2D2 : Speed patch failed - no frames transmitted
Description:

Symptom:

Ports randomly lose connectivity with error messages

%MODULE-2-MOD_SOMEPORTS_FAILED: Module 2 (serial: XXXXXXXX) reported failure on
ports 2/36-2/36 (Ethernet) due to R2D2 : Speed patch failed - no frames
transmitted in device 143 (error )

Conditions:

Issue is seen with N7K-M148GT-11 module.

Workaround:

Move connected device to another port.

Further Problem Description:

This issue is triggered by physical layer event (link up, link down or speed
change) and occurs due to a race condition. It should be fixed in 5.1(5) or
later, and 5.2(2) or later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
5.1(3)
Known Fixed Releases:
5.1(10.37)S0, 5.1(5)S1, 5.2(2)S2, 5.2(2.4)S0, 6.0(0.17)S0, 6.0(0.4)S17
Bug Id:
CSCup20769
Title:
Pause not getting enabled for VL3 in Gibraltor image
Description:

Symptom:
NA

Conditions:
NA

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.123), 7.1(0)D1(0.64), 7.1(0)GF(0.10)
Known Fixed Releases:
7.1(0)GF(0.29), 7.1(0)QFF(0.1), 7.1(0)QFF(0.2), 7.1(0)QFF(0.3), 7.1(0)ZD(0.225), 7.1(0)ZN(0.271), 7.2(0)D1(1)
Bug Id:
CSCuo20605
Title:
SVI stuck in delete
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)FVX(0.98)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.110), 7.0(0)KM(0.64), 7.1(0)D1(0.117), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)SDN(0.6), 7.2(0)D1(1)
Bug Id:
CSCun32066
Title:
On "no bridge-domain 100" vnsegment_mgr is sending a BD_PORT_DELETE
Description:

Symptom:
bd port delete is sent out if there are any vsis under the bd

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)FVL(0.84), 7.1(0)D1(0.58)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.69), 7.0(0)GI(0.7), 7.0(0)KM(0.37), 7.0(1)FVL(0.91), 7.0(2)NF(0.17), 7.1(0)D1(0.117), 7.1(0)D1(0.60), 7.1(0)D1(0.64), 7.1(0)FC(0.2)
Bug Id:
CSCuh09675
Title:
6.1(4)/(4a)/6.2(1): BGP Service Crash cause multiple processes to crash
Description:

Symptom:
BGP service crashes with following log messages:

%SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 148.45 secs ago.
%SYSMGR-3-HEARTBEAT_FAILURE: Service "bgp" sent SIGABRT for not setting heartbeat for last 4 periods. Last heartbeat 150.07 secs ago.

This is followed by several other process to crash.
The VDC becomes unresponsive with the following log messages:

Due to multiple crash of the service, the supervisor switchover may take place.
In a single supervisor, the device may reload.

Reason: Reset triggered due to HA policy of Reset
Service: Service "bgp" in vdc 2 hap reset
Version: 6.1(4)

Conditions:
Nexus 7000 switch running 6.1(4), 6.1(4a) or 6.2(1).
This issue is normally seen when an IGP (OSPF, EIGRP etc.) and/or BGP convergence is triggered in the network.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(1.111)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.31)S0, 6.2(1.135)S0, 6.2(2)
Bug Id:
CSCup95948
Title:
LISP crash in lisp_build_eid_notify due to two EIS Notify GWs configured
Description:

Symptom:
The N7K unexpectedly wrote out a LISP core file.

Conditions:
The N7K is configured with LISP Multihop, the node is acting as First Hop and two eid_notify gateways are configured.

Workaround:
Configured just one eid_notify gateway (if the Network design allows)

Further Problem Description:
The core file will only happen for certain numbers of dynamic prefixes. The length of the generated UDP packet must be a multiple of 256, which makes it hard to predict when this defect is triggered.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S28, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.228), 7.1(0)D1(0.271), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179)
Bug Id:
CSCum58258
Title:
BGP stuck after modifying vrf RD with traffic running
Description:

Symptom:
BGP stuck after modifying vrf RD with traffic running

Conditions:
In vinci scenario, BGP redistributes hmm routes under ipv6 address-family in a VRF. When RD changes, the hmm routes cannot be deleted and hence the VRF/table cleanup is never complete.

Workaround:
Restart BGP process

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)ZN(0.199)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)N1(0.503), 7.0(0)N1(1), 7.0(0)ZD(0.212), 7.0(0)ZN(0.210), 7.0(1)N1(0.58), 7.0(1)N1(1), 7.0(1)ZD(0.113), 7.0(1)ZN(0.126), 7.1(0)D1(0.104)
Bug Id:
CSCuo77146
Title:
port-profile crashed while reloading leaf vdc
Description:

Symptom:
ppm crashes while vdc is reloaded

Conditions:
reload vdc

Workaround:
no

Further Problem Description:
ppm crashes while vdc is reloaded.
Customer may not see it, as it depends on timing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.136)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.136), 7.1(0)D1(0.143), 7.1(0)D1(0.147), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.94), 7.1(0)ZD(0.194)
Bug Id:
CSCun24092
Title:
Changing the speed of in with 4k-classmap seeing ipqosmgr core
Description:

Symptom:
Changing the speed of in with 4k-classmap seeing ipqosmgr core

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(7.7)S0
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.20)S0, 6.2(7.21)S0, 6.2(8), 6.2(8)EC(0.16), 6.2(8)NO(0.9), 6.2(9)FM(0.37), 7.1(0)ZD(0.200), 7.2(0)D1(1)
Bug Id:
CSCuo62938
Title:
fabricpath: LID for l3 control mcast packets uses 0x10e5 instead 0xffff
Description:

Symptom:
Networks with N7k gateway devices running software versions between 6.2.2 and 6.2.8 using F1 M1 with Fabricpath may have other N7k nodes notice persistent mac moves.
The continuous mac moves further cause high CPU usage which lead to other problems for the control and data plane.
The gateway macs will change their association between the gateway device's local switchID.0.SUP Lid and gateway device's local switchID.0.ffff

Conditions:
To be affected by this issue:
[1] N7k Gateway devices must be using F1 M1 with Fabricpath
[2] N7k leaf devices must be using F1 or F1 with M1
[3] Gateway devices must be running s/w versions between 6.2.2 and 6.2.8

Workaround:
Segregating the VLANs carrying the routed traffic by having dedicated "transit" VLANs, by adding another layer of routing at the leaf switches, as the traffic comes from and goes back to hosts will prevent the issue from being encountered.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.11), 6.2(10)FM(0.35), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)GF(0.14)
Bug Id:
CSCun79573
Title:
Multicast: Invalid XML output - BF48 status
Description:

Symptom:
6 multicast CLIs give invalid XML outputs

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)BF(0.48)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.76), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.125), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCup42401
Title:
control packet on mpls tunnel (te and pw) not transmitted after PM crash
Description:

Symptom:
On pktmgr crash, control packet on mpls tunnel (te and pw) not transmitted

Conditions:
Pktmgr crash

Workaround:
Restart Netstack after PM crash

Further Problem Description:
Committed to 7.1 train as well

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S1, 7.0(1)S1, 7.1(0)ZN(0.333), 7.1(1)BF(196)
Known Fixed Releases:
6.2(10), 6.2(10)S11, 6.2(10.5), 7.1(0)D1(0.191), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.241), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.14)
Bug Id:
CSCuo50598
Title:
VDC reload may cause F3 line card to flap links and corrupt PDUs
Description:

Symptom:
Nexus 7000 with F3 module may experience link flaps on port-channels upon VDC reload.
We also see STP BPDU, LACP, UDLD issues as these packets could be potentially corrupted.

Conditions:
Port-channel config on F3 module with active traffic

Workaround:
Reload LC

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(6a), 6.2(8), 7.1(0)D1(0.138), 7.1(0)D1(0.161)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.6), 6.2(10)S2, 6.2(10)S9, 6.2(10.5), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75), 7.0(0)BZ(0.46)
Bug Id:
CSCun60221
Title:
F2/F3 redirect policy config failure causing aclqos crash
Description:

Symptom:
Aclqos crashes and Linecard goes to failure state.

Conditions:
The problem happens in following scenario,

1. A multi-instance card, like F2/F3 where any redirection feature is configured on multiple instances.
2. There is not enough space in the tcam on one of the instances where the policy will get programmed as well.
3. Atomic update goes through on one of the instance, but fails on next.
4. Non-atomic update is turned on, that also fails on the next instance.
5. During recovery path, aclqos will crash.

Workaround:
Avoid tunnel programing in cases when tcam in any instance is completely full and the programing is likely to fail. Check the utilization of the tcam before programming a tunnel policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S36, 6.2(10)S8, 6.2(6)S10, 6.2(7.19)S0, 6.2(8)ES(0.3)
Known Fixed Releases:
7.1(0)D1(0.243), 7.1(0)NF(0.32), 7.1(0)OTT(0.31), 7.1(0)RTG(0.32), 7.1(0)ZD(0.292), 7.2(0)D1(1)
Bug Id:
CSCup90903
Title:
vlan_mgr core seen on GBR-196S2
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.196)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.196), 7.1(0)D1(0.201), 7.1(0)D1(0.210), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12)
Bug Id:
CSCun19859
Title:
Imaint: nd debug msgs show vlan not vinci-enabled
Description:

Symptom:
ND proxy/anycast stops working on switch boot-up because of a timing issue.

Conditions:
Because of a timimg iusse during system bootup, ND API returns Vinci not enabled if below 3 conditions are not set: AMAC, fwdmode:proxy/anycast, switch role:Leaf
Because of a timing issue during boot-up, ICMPv6 process misses the AMAC config notifications from HMM because
before HMM adds icmpv6 as its client, these notificaions are already sent.

Workaround:
Manually need to remove and reconfigure the HMM anycast gateway mac commands.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(1)N1(0.113), 7.0(1)N1(1), 7.0(1)ZD(0.135), 7.0(1)ZN(0.178), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60), 7.1(0)SDN(0.6)
Bug Id:
CSCun80740
Title:
vlan_mg crashed @ vlan_bitset_copy
Description:

Symptom:
NA

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.64)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.86), 7.0(0)KM(0.64), 7.0(1)FVL(0.113), 7.1(0)D1(0.108), 7.1(0)D1(0.117), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.65), 7.1(0)SDN(0.6)
Bug Id:
CSCun74507
Title:
bridge-domain is in down state after deleting tenant-vni & reconfig
Description:

Symptom:
When the issue happens, bridge domain is missing VSI and in down state.

Conditions:
Repetitively config and delete VNI.

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(0)FVX(0.84), 7.1(0)D1(0.64)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.1(0)D1(0.114), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.65), 7.1(0)SDN(0.6), 7.1(0)ZD(0.166), 7.2(0)D1(1)
Bug Id:
CSCun76034
Title:
FCoE-FEX:Ser SAP Plcmgr Err 0x40480003 (no such pss key) in if_bind seq
Description:

Symptom:
In XBOW running 7.1(0)D1(0.64)S1 observing that the allocation of interfaces to eth vdc failed due to GIM returned 40480003 [no such pss key] after reload.

Conditions:
In XBOW running 7.1(0)D1(0.64)S1 observing that the allocation of interfaces to eth vdc failed due to GIM returned 40480003 [no such pss key] after reload.

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.64)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.1(0)BF(0.102), 7.1(0)D1(0.99), 7.1(0)FC(0.2), 7.1(0)I1(0.17), 7.1(0)I1(1), 7.1(0)NF(0.28), 7.1(0)PDB(0.60), 7.1(0)ZD(0.144)
Bug Id:
CSCum08767
Title:
WCCP:Interfaces level CLI configurations removed after invalid id to spm
Description:

Symptom:
When wccp service groups are configured in closed mode, and a hia-timeout of less than or equal to 3 is set, a flap of the Cache Engine connected interface causes the wccp configs to be removed.

Conditions:
1. Closed mode
2. Hia timeout of equal to or less than 3 sec
example: ip wccp 61 mode closed service-list ser1 hia-timeout 2
3. Flap of CE connected interface

Workaround:
Configure HIA timeout to be more than 3 sec. Or use the default configuration of 10 sec.
ip wccp 61 mode closed service-list ser1

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases:
Bug Id:
CSCuo08118
Title:
60 usec traffic loss at sup sw
Description:

Symptom:
dc3s1# sh version internal build-identifier
Kickstart image file: bootflash:///n7000-s2-kickstart.7.1.0.D1.0.85.gbin : S2
System image file: bootflash:///n7000-s2-dk9.7.1.0.D1.0.85.gbin : S2
dc3s1#

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)D1(0.85)
Known Fixed Releases:
7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)GF(0.14), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)PDB(0.73), 7.1(1)SP(0.4), 7.2(0)D1(1)
Bug Id:
CSCuo71517
Title:
mti tunnel info missing in PIM after vrf shut/no shut
Description:

Symptom:
mvpn nbr not forming

Conditions:
When PIM is restarted for some reason when the mdt-source interface is down, it is possible that PIM does not process the OIM update message and is expecting a create-message instead. This causes the MVPN to be in pending state.

Workaround:
shut and unshut the mdt-source interface should fix the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.1(0)MPL(0.11)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.107), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.178), 7.1(0)N1(1), 7.1(0)NF(0.28), 7.1(0)OTT(0.6)
Bug Id:
CSCun86274
Title:
if_bind sequence failure due to RBACL
Description:

Symptom:
Ports go to failure state and VMM Bind fails.

Conditions:
Rbacl configured on the system.

Qos Policies configured in Egress direction and Vacl configured in egress direction.

Enabled deny ace by the command "hardware access-list allow deny ace".

Linecard is reloaded with the configuration.

Workaround:
Disabled "hardware access-list allow deny ace"

Reload the module First.

The apply "hardware access-list allow deny ace"

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.2(10)S12, 6.2(8)S1
Known Fixed Releases:
6.2(10), 6.2(10)S74, 6.2(10.16)S0, 7.1(0)D1(0.242), 7.1(0)NF(0.32), 7.1(0)OTT(0.31), 7.1(0)RTG(0.32), 7.1(0)ZD(0.291), 7.2(0)D1(1)
Bug Id:
CSCuo05645
Title:
STP doesn't handle delete of all the VSI when bd/vni shut cmd is issued
Description:

Symptom:
When we have two VSI present in the bridge-domain range and we do a shut on the bridge-domain, lim doesn't handle request for both VSI, it only takes care of removing one of them hence stp still has it.

Conditions:
Have multiple VSI mapped to same bd, and shutdown that bd.

Workaround:
remove the bridge-domain and recreate the vni membership.

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
7.0(1)FVL(0.118)
Known Fixed Releases:
7.0(0)FVX(0.107), 7.1(0)LZB(0.9), 7.2(0)D1(1)
Bug Id:
CSCus21952
Title:
PVLAN:Forward table is not programmed with correct DI
Description:

Symptom:
L3 traffic does not egress out of Trunk secondary port/PC/VPC

Conditions:
Routed traffic gets dropped and does not egress out of Private vlan Trunk Secondary port.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12)S10
Known Fixed Releases:
6.2(12), 6.2(12)S20, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387), 7.2(0)D1(1)
Bug Id:
CSCus09312
Title:
PVLAN:VPC PO member (M1 LC) flaps.
Description:

Symptom:
Port-channels which have
1) PVLAN trunk secondary config
and
2)LACP or other control protocols running,
could flap continuously, due to BPDU's not flowing. They don't flow because the native vlan is in CBL disabled state, instead of being in CBL Blocking state.

Conditions:
The issue is specific to M1 module since the programming model is different on F2/F3 LC's.
There is no issue on F2 and F3 modules.

Even if the customer uses M1 module there is NO issue, if customer is allowing native VLAN on VPC Leg.

Below are the 3 conditions that need to be satisfied to hit this bug:
1) PVLAN port mode should be TRUNK Secondary
2) Native VLAN is NOT allowed on VPC Leg
3) LC Module should be M1 module

Workaround:
Workaround is to have customer have the native vlan in allowed list for the port, by configuration.

For a private-vlan port, the command to add trunk allowed vlan 1 would be:
switchport private-vlan trunk allowed vlan 1

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)S102, 6.2(12)FT(0.7)
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)D1(1), 7.2(0)PDB(0.382)
Bug Id:
CSCus24030
Title:
F3/100G: CRC errors when pkts sent from dot1q/FP to untagged/access intf
Description:

Symptom:
CRC errors and packet drop on traffic received from 100G F3 interface.

Conditions:
The issue happens when a packet is received on a trunk enabled interface (trunk port or Fabricpath port or layer 3 sub-interface) and has to exit on an interface with no tag. Even if it arrives on the native vlan or main interface on the input interface without a tag it will still cause CRCs on the next hop device.

Workaround:
Configure the egress port as trunk with dot1q tagging

This issue is resolved in 6.2(12) or later releases.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8b)
Known Fixed Releases:
6.2(12), 6.2(12)S17, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.314), 7.2(0)D1(0.387), 7.2(0)D1(1)
Bug Id:
CSCur69114
Title:
HSRP PACL Filter Broken - Packets are flooded to layer2 domain
Description:

Symptom:
HSRP hello is passing through interface with PACL in place to drop these packets.

Conditions:
6.2(10)

Workaround:
None.

Further Problem Description:
This issue is only affects 6.2(10) and is resolved in 6.2(12).

A similar issue relating to VACL filtering HSRP packets: CSCut75457

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.16), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCus29686
Title:
Mcast Bidir - LHR lost DF after flapping ssm config
Description:

Symptom:
By correcting an SSM misconfig, it breaks bidir functionality

Conditions:
By correcting an SSM misconfig, it breaks bidir functionality

Workaround:
restart pim

Further Problem Description:
By correcting an SSM misconfig, it breaks bidir functionality, and as a results no bidir states are form and traffic are all dropped

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.360)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.1(0)SIB(99.82), 7.2(0)D1(0.378), 7.2(0)D1(1), 7.2(0)N1(0.56), 7.2(0)N1(1)
Bug Id:
CSCus15529
Title:
OTV trunk intf err-disabled due to "IFTMC PD commit db search failed"
Description:

Symptom:
Interface getting error disabled on changing native vlan

Conditions:
It happens in a OTV enabled VDC with a trunk port carrying OTV extended vlans.

Workaround:
shut/no shut of interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12)S6
Known Fixed Releases:
7.1(0)AV(0.38), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCur83912
Title:
Multiple private vlan crashes after reload
Description:

Symptom:
After switch reload PVLAN was crashing. This crash will only be seen in gdb images, and will not affect final images. This happens when PVLAN is already in an errored state and no PVLAN config is going through due PVLAN being in locked state.

Conditions:
The setup was already in an errored state where some of the port-channels in PVLAN db were in an errored state, whereas the member ports of the same port-channels were in a good state with the pvlan mapping saved in PSS. When box reload was done, the PC and member port config did not match, hence when HW programming request for PC was sent after reload, it did not find any PVLAN mappings on PC from PSS and asserted.

Workaround:
This issue has been resolved.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12)FT(0.14)
Known Fixed Releases:
6.2(12), 6.2(12)S1, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.320), 7.2(0)D1(0.387), 7.2(0)D1(1)
Bug Id:
CSCur96497
Title:
VLAN translation not programmed on hardware
Description:

Symptom:
A newly configured port-channel for vlan translation does not seem to forward traffic.

Conditions:
order of config where the port-channel member has the vlan translation commands defined before the port is added to a channel-group

Workaround:
Re-configure the port-channel with the correct order. That is, delete the port-channel and add the member port to the channel-group. Add the vlan translation commands under the port-channel.

In some cases, removing the translation commands under the port-channel and adding them back also resolves the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)PDB(0.293), 7.2(0)D1(0.362), 7.2(0)D1(1)
Bug Id:
CSCur70861
Title:
F3 - Ports should not be err-disabled for TCAM single bit ECC errors
Description:

Symptom:
If F3 module experiences repeated single bit ECC errors it will error-disable the associated ports with that forwarding instance.

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 197
Device Name : Flanker L3 Driver
Device Errorcode : 0xcc503600
Device ID : 197 (0xc5)
Device Instance : 03 (0x03)
Dev Type (HW/SW) : 06 (0x06)
ErrNum (devInfo) : 00 (0x00)
System Errorcode : 0x429b0026 failure recovery threshold
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/25-32
Error Description : FLN_FW_INT_STATUS_TCAM_MATCH0_ECC_0
DSAP : 0 (0x0)
UUID : 0 (0x0)
Time : Tue Nov 11 16:37:55 2014
(Ticks: 546281B3 jiffies)

Conditions:
When repeated single-bit ECC errors are detected.

Workaround:
No known workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.16), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCur92755
Title:
"l2fm" cores at "l2fm_static_mac_ins_del" on configuring "peer-gateway"
Description:

Symptom:
l2fm cores are seen

Conditions:
triggers should be peer gw enable.
The number of static macs n system should be greater than 3.6K.
This defect affects all releases which do not have the fix, it is a scale issue.

Workaround:
For the fix, upgrade to integrated release recommended.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)E3
Known Fixed Releases:
6.2(10)E3, 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)PDB(0.293), 7.2(0)D1(0.362), 7.2(0)D1(1)
Bug Id:
CSCut23832
Title:
Netconf output of show bgp statistics miss information
Description:

Symptom:
Netconf/XML output of "show bgp statistics" does not match its regular CLI output, which contains a lot of internal BGP output.

Conditions:
No conditions.

Workaround:
No workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.446), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCus96272
Title:
pvlan Channel-group members add/remove fails .
Description:

Symptom:
pvlan Channel-group members add/remove fails .

Conditions:
pvlan Channel-group members add/remove fails .

Workaround:
pvlan Channel-group members add/remove fails .

Further Problem Description:
pvlan Channel-group members add/remove fails .

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)D1(1), 7.2(0)PDB(0.390), 7.2(0)VZD(0.26)
Bug Id:
CSCus78697
Title:
N7K wrong source-interface selected for IPv6 logging after device reload
Description:

Symptom:
logging source-interface seems to be non-working with v6 syslog server on N7K after device reload even the loggingsource-interface pointing to the loopback0 interface

Conditions:
After device reload

Workaround:
reapply logging source-interface loopback0

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.1(5), 6.2(10)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.443), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(1), 7.2(0)PDB(0.379), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6), 7.2(0)ZD(0.126)
Bug Id:
CSCut47663
Title:
SSTE: OSPF Adj are struct in TWO-WAY state after ospf process restart
Description:

Symptom:
OSPF Adj are struct in TWO-WAY state

Conditions:
restart opsf 100. If there is no BDR.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.74), 7.2(0)D1(0.468), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)PDB(0.401), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.147)
Bug Id:
CSCus56648
Title:
EIGRP crash in ipigrp2_get_tmap_distance
Description:

Symptom:
EIGRP crash in ipigrp2_get_tmap_distance

Conditions:
Crash is seen with table map if redistributed route is learnt when the corresponding dndb is active

Workaround:
Unconfigure table-map

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.408), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(1), 7.2(0)PDB(0.353), 7.2(0)VZD(0.6)
Bug Id:
CSCus53498
Title:
lc_port_channel crashed, when storage vdc reloaded on 383 S1
Description:

Symptom:
Storage VDC reload after doing a "write erase" of the start-up configuration can cause crash in PCM client on line card.

Conditions:
Clearing of the start-up config and a subsequent reload of the storage VDC causes the port channels in the VDC to be removed. While the port channels are being removed , it may cause a failure to delete the port-channel from the PSS. This is because the Ethernet Port Channel type in N7k wasn't properly handled in the Line card. The following Debug log indicates this failure:

lc_port_channel_pss_delete_data: unknown type being stored into pss 22 for ifindex

Port channel ifindex can be read from the show port-channel internal info interface port-channel , command.

When this failure occurs its likely that some stale members and port-channel will be left behind in the Line card memory with the same ifindex. When subsequently, the configuration is restored for the storage VDC for the same port-channel and member, it finds the stale port-channel member pointing to an existing port as indicated in the error logs in symptoms. It then tries to delete this stale member from the stale port channel causing the crash.

Workaround:
Restarting the port-channel process or reloading the line card will clear out the stale interfaces, after the reload of the VDC with empty config. This will ensure that there's no crash when the VDC subsequently reloads with config.

Further Problem Description:
The lc_port_channel process on the line card throws segmentation violation exception aborts while the VDC is reloading with the following error messages on the console: (Note: here Slot Number is marked with a X)

%LC_PORT_CHANNEL-SLOTX-3-LC_PORT_CHANNEL_MBR_PC_INFO_INCORRECT: member pc info for interface EthernetX/Y pointing to old pc
%SYSMGR-SLOTX-2-SERVICE_CRASHED: Service "lc_port_channel" (PID X) hasn't caught signal 11 (core will be saved).

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.383)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)BA(0.12), 7.2(0)D1(0.409), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.353)
Bug Id:
CSCus50427
Title:
7.2.0: eigrp crashes when trying to print mem-stats
Description:

Symptom:
EIGRP crashes when printing mem-stats

Conditions:
When printing mem-stats or running the CLI as part of show tech

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.381), 7.2(0)D1(0.386), 7.2(0)D1(0.395), 7.2(0)D1(0.397), 7.2(0)ZD(0.27)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.397), 7.2(0)D1(0.404), 7.2(0)D1(0.409)
Bug Id:
CSCus66218
Title:
Deleted vlans are still showing in show fabricpath output
Description:

Symptom:
Delete the vlan from the global database, but still it be present in the Fb database.

Conditions:
if the vlan is part of the Port-channel

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(1)ZN(0.744), 7.0(6)N1(0.244), 7.0(6)N1(0.4), 7.0(6)N1(0.5), 7.0(6)N1(1), 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.1(1)N1(0.454)
Bug Id:
CSCut83358
Title:
nve memory leak@ libnve_pd in n7k-platform
Description:

Symptom:
nve memory leak

Conditions:
nve peer down and up

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.475), 7.2(0)D1(0.476), 7.2(0)D1(1), 7.2(0)N1(0.168), 7.2(0)N1(1), 7.2(0)PDB(0.408), 7.2(0)ZD(0.155), 7.2(0)ZN(0.171)
Bug Id:
CSCus34642
Title:
RIB sets LOCAL flag while importing a LISP /32 route in VRF
Description:

Symptom:
When LISP added /32 route is imported in other VRF that time RIB is setting LOCAL flag incorrectly while downloading routes to FIB. It makes FIB to punt all packets to
SUP for this prefix.

Conditions:
Importing LISP /32 route in another VRF

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.1(1)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.2(0)D1(0.396), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)OTT(0.5), 7.2(0)PDB(0.345), 7.2(0)RTG(0.55), 7.2(0)ZD(0.82)
Bug Id:
CSCuu29773
Title:
Crash in the pim process after exceeding 32K multicast routes
Description:

Symptom:
Multiple pim process crashes seen resulting in a hap-reset that restarts the system

Conditions:
This issue occurs after exceeding the limit of 32K multicast routes and PIM assert message for a new S,G arrives.

show ip mroute detail vrf all`
IP Multicast Routing Table for VRF "default"

Total number of routes: 44037
Total number of (*,G) routes: 141
Total number of (S,G) routes: 43895
Total number of (*,G-prefix) routes: 1

Also saw many SLAB memory errors which could potentially be the result of a memory leak:

2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-CREATE_ROUTE: pim [15748] Couldn't create PIM route for (141.214.83.211/32, 239.255
.255.253/32) in join notification
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: PIM-3-SLAB_ALLOC: message repeated 1349 times in last 7710408
sec
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:29 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: SYSLOG-4-SL_MSG_WARNING: message repeated 1 times in last 7710
418 sec
2015 May 6 18:11:30 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro

Workaround:
Reduce the total mulitciast routes to less than 32K

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.58), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)N1(0.215), 7.2(0)N1(1), 7.2(0)ZD(0.196), 7.2(0)ZN(0.215), 7.2(1)PIB(0.3)
Bug Id:
CSCuu05012
Title:
Post ISSU : EXP based classification is not working
Description:

Symptom:
Before fixing the issue ISSU from 6.2.x to 7.2, qos was not working properly.

Conditions:
The hardware initialization is modified in 7.2 and if did ISSU from 6.2.x to 7.2 with flanker card, hardware is with still old 6.2.x programming and in some qos cases may not work properly in 7.2, since ISSU do not touch the hardware.

To fix this qos tables are reprogrammed at the time of ISSU when moved to 7.2.

Workaround:
Reload LC.

Further Problem Description:
There may be some packet drops while doing ISSU from 6.2.x to 7.2 till qos tables get reprogrammed in the hardware.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.2(0)D1(0.496), 7.2(0)D1(1), 7.2(0)ZD(0.178), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCus67594
Title:
EIGRP with v6 crashes in igrp2_destroy_iidb after LC reload
Description:

Symptom:
EIGRP crash after LC reload

Conditions:
EIGRP v6 neighborship exists

Workaround:
No workarounds exist

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.386), 7.2(0)D1(0.437)
Known Fixed Releases:
6.2(14)FB(0.44), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.437), 7.2(0)D1(0.444), 7.2(0)D1(0.449)
Bug Id:
CSCus77610
Title:
N7710G: ports down due to UDLD empty echo after neighbor LC reloaded
Description:

Symptom:
Link may go to errdisable state with "UDLD empty echo" very rarely when line card reload

Conditions:
On 10G board, configure
1. UDLD protocol enabled
2. Option "system default link-fail laser-on" enabled
3. interface debounce time is set to 0

then reload the line card.

Workaround:
1. shut/no shut the port that in "errdisable" state, or
2. configure the link debounce time to 10ms or larger, or
3. disable the UDLD protocol, or
4. configure "no system default link-down laser-on" option

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)D1(1), 7.2(0)PDB(0.373), 7.2(0)VOF(0.2), 7.2(0)VZD(0.26)
Bug Id:
CSCut07477
Title:
IPLUS_469_VXLAN:NVE PD crash while sending traffic
Description:

Symptom:
NVE crash on vpc secondary.

Conditions:
while reloading vpc primary.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.1(0)ZN(91.469)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.1(1)N1(0.483), 7.1(1)N1(1), 7.1(1)ZD(0.19), 7.1(1)ZN(0.34)
Bug Id:
CSCut20914
Title:
EIGRP IPv6 neighbour sessions flaps after LC reload
Description:

Symptom:
EIGRP ipv6 neighbor sessions flap

Conditions:
After LC reload

Workaround:
None

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCuu29945
Title:
SSTE: m2rib core on POAP + autoconfig
Description:

Symptom:
m2rib core

Conditions:
POAP + autoconfig

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)D1(0.506), 7.2(0)D1(0.510), 7.2(0)D1(1), 7.2(0)ZD(0.190)
Bug Id:
CSCut35336
Title:
after reload itd needs restart , means the user has to typein sh nosh
Description:

Symptom:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Conditions:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Workaround:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Further Problem Description:
after n7k box reload the service needs restart , means the user has to typein shut and noshut

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.430)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.444), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)RTG(0.129), 7.2(0)VOF(0.2)
Bug Id:
CSCut09489
Title:
Distribute-list out not working for set tag with route-type match
Description:

Symptom:
Distribute-list out not working for set tag

Conditions:
when route-type is used for match

Workaround:
use a different criteria for match

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCut61977
Title:
Crash after show forwarding route adjacency <interface> <ip address>
Description:

Symptom:
A ipfib process crash is seen. This may lead a HAP-Reset which could reload a module:

Nexus# sh core vdc-all
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 4 1 ipfib 18455 2015-03-26 11:06:19
1 4 1 ipfib 2173 2015-03-26 11:06:23
1 3 1 ipfib 12089 2015-03-26 11:06:29
1 3 1 ipfib 2173 2015-03-26 11:06:3

Conditions:
This occurs after the show forwarding route command is entered with the adjacency options.

Workaround:
Avoid using the show forwarding route adjacency command

Further Problem Description:
This is similar to the CSCur91392 bug but additional changes are needed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(14)FB(0.41)
Bug Id:
CSCus76724
Title:
NVT-DC1:PVLAN traffic block-hole upon Primary VLAN remove/add
Description:

Symptom:
On M1XL linecards, when some vlan config causes a private-vlan association to be non-operational , private-vlan trunk secondary port sees traffic loss. Similarly, when the trunk association is unconfigured and re-configured on private-vlan trunk-secondary port, the issue might be observed.

Conditions:
This issue is seen on M1XL linecards. Will not be seen with M1 and F-series line cards

Example config and trigger:
Config:
switch(config-if)# show running-config interface e3/3

!Command: show running-config interface Ethernet3/3
!Time: Wed Feb 4 00:38:51 2015

version 6.2(12)

interface Ethernet3/3
switchport
switchport mode private-vlan trunk secondary
switchport private-vlan association trunk 2 3
no shutdown


The issue will be seen after any of the following triggers

1. Delete and recreate of primary vlan
switch(config-if)# no vlan 2
switch(config)# vlan 2
switch(config-vlan)# private-vlan primary
switch(config-vlan)# private-vlan association 3
switch(config-vlan)# ex

2. Delete and recreate secondary vlan
switch(config-if)# no vlan 3
switch(config)# vlan 3
switch(config-vlan)# private-vlan isolated
switch(config-vlan)# ex

3. Delete and re-add trunk association on the port
switch(config)# int e3/3
switch(config-if)# no switchport private-vlan association trunk 2 3
switch(config-if)# switchport private-vlan association trunk 2 3

Workaround:
Workaround is to do a shut no-shut on the port or PC or VPC leg where the issue is observed

switch(config)# int e3/3
switch(config-if)# shutdown
switch(config-if)# no shutdown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12)S32
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.364), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCut25648
Title:
N7K - SNMP - large 180,224 memory leak in vlan_mgr w mibwalk ciscoVtpMIB
Description:

Symptom:
Mem leak when running the below snmp cli's

1.) snmpwalk -v2c -c private plat17 ciscoVtpMIB
2.) snmpbulkwalk -v2c -c private -Cr50 plat17 ciscoVtpMIB

Conditions:
Happens only when there are access port and the above 2 snmp cli's are run

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.424)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.443), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCut94069
Title:
libbmp memory leak because libnve_pd calls libbmp incorretly
Description:

Symptom:
libbmp memory leak

Conditions:
nve peers flapping

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.475), 7.2(0)D1(0.485), 7.2(0)D1(1), 7.2(0)N1(0.179), 7.2(0)N1(1), 7.2(0)ZD(0.166), 7.2(0)ZN(0.182), 7.2(1)N1(0.1)
Bug Id:
CSCus69869
Title:
NVT:traffic blackhole for receiver on sec. Vlan when one vpc-leg is down
Description:

Symptom:
Traffic black-hole for receivers in secondary vlan on non-forwarder peer when source is in core.

Conditions:
On forwarder peer VPC leg is down and there are no other port on secondary Vlan on this box

Workaround:
Bring the vpc leg up on forwarding peer. OR make sure source has better metric to non-forwarding peer.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.404), 7.2(0)D1(1)
Bug Id:
CSCus97711
Title:
Unable to delete files from /tmp directory using filesys delete
Description:

Symptom:
Can not delete files from /tmp/var directory on Line cards using filesys delete cli

Conditions:
n/a

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.37), 7.1(0)AV(0.81), 7.2(0)D1(0.492), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.174), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCuf60213
Title:
F2 card reload with "clp_mac" cores
Description:

Symptom:

F2 crashes due to the "clp_mac" process. Within the core file, we see the EEM is trying to process an error message "CLM_CFG_PARITY_ERR".

Conditions:
Issue is triggered by a port config register parity error. Current code only gracefully handles ASIC-level parity errors, not port-level errors -- this will be changed.

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.1(2), 6.2(1.79)S2
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.5)S0, 6.2(1.101)S0, 6.2(2), 7.0(0)ZD(0.53), 7.0(0)ZD(0.55)
Bug Id:
CSCut37620
Title:
VXLAN VPC pair reboot con if peer cnt slightly more thank 1k
Description:

Symptom:
NVE crash

Conditions:
NVE peer count slightly more thank 1k.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)ZN(99.131)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.446), 7.2(0)D1(1)
Bug Id:
CSCup22563
Title:
Vulnerabilities in OpenSSL: LDAP over SSL
Description:

Symptom:
The following Cisco products

Cisco Nexus 7000 series switches
Cisco MDS 9000 series switches

running software versions:
7.1(0), 6.2(8), 6.2(7), 5.2(8d)

are affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-0076 - Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
CVE-2014-0195 - DTLS invalid fragment vulnerability
CVE-2014-0221 - DTLS recursion flaw
CVE-2014-0224 - SSL/TLS MITM vulnerability
CVE-2014-3470 - Anonymous ECDH denial of service

This bug has been opened to address the potential impact on this product. The above list of versions are not exhaustive.

Conditions:
Devices using LDAP in SSL mode, say, the ones with the following command may be vulnerable:

ldap-server host {ipv4-address | ipv6-address | host-name} [enable-ssl]

All versions prior to the first fixed version of a train are affected by one or more of the above CVE's.

Workaround:
Not available. Either a patch has to be applied or the entire package has to be upgraded.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 10/9.5:

https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
5.2(8d), 6.2(7), 6.2(8)
Known Fixed Releases:
5.2(8e), 5.2(8e)S4, 6.2(10), 6.2(10)S79, 6.2(10)S80, 6.2(10.16)S0, 6.2(12)BFP(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97)
Bug Id:
CSCuu77709
Title:
LISP: map-caches entries to non-routable RLOCs are installed in fwd
Description:

Symptom:
A LISP map-cache entry on a xTR lists a group of locators as being in state "up" even while the routing table does not have an entry to reach them. They should be listed in state "no-route".
These locators are pushed down to the forwarding table and flows that match this forwarding entry are blackholed.

Conditions:
The main condition to see this problem is that the setup has a "split" RLOC view, i.e. the eTR registering the lisp database entry is able to see the RLOCs while the iTR is not.

From there the following needs to happen simultaneously to face this problem:
(1) Multiple map-cache entries in the xTR have the same locator set
(2) Some of the RLOCs in this locator set are permanently unreachable (no routing entry in RIB) from iTR

Workaround:
Enabling RLOC probing, which will complement the information from the routing table.
"lisp loc-reach-algorithm rloc-probing"

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuq98748
Title:
Nexus 7000 evaluation for CVE-2014-6271 and CVE-2014-7169
Description:



Symptom:

The Nexus 7000 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-6277
CVE-2014-7169
CVE-2014-6278
CVE-2014-7186
CVE-2014-7187

This bug has been opened to address the potential impact on this product.

All current versions of NX-OS on this platform are affected unless otherwise stated
.
Exposure is not configuration dependent.
Authentication is required to exploit this vulnerability.

This bug is fixed in NX-OS versions specified below:

5.2(9a)
6.1(5a)
6.2(8b)
6.2(10) and above




Conditions:

A user must first successfully log in and authenticate via SSH to trigger this vulnerability.



Workaround:

Not available.



Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
4.2(8), 5.2(9), 5.2(9a)S3, 6.1(5), 6.2(12)FF(0.4), 6.2(6), 6.2(8a), 7.0(2), 7.1(0)ZN(91.98), 7.1(0)ZN(91.99)
Known Fixed Releases:
5.2(4)FD(0.46), 5.2(4)FD(0.47), 5.2(9a), 5.2(9a)S1, 5.2(9a)S2, 5.2(9a)S3, 5.2(9a)S4, 5.2(9a)S6, 6.1(4)E2, 6.1(5a)
Bug Id:
CSCuu96175
Title:
L2FM/MCEM/CFS need more robust registration & retry infra
Description:

Symptom:
This is to address possible timeouts between L2FM and CFS under failure condition (CFS crash, control plane congestion) that could cause registration issues between applications.

Conditions:
This may occur under high control plane load.

Workaround:
Perform Supervisor Switchover or reload device

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(6b)
Known Fixed Releases:
Bug Id:
CSCuu72109
Title:
MSDP TCP connection doesn't establish properly
Description:

Symptom:
A MSDP session may not establish properly on a Nexus platform due to the TCP connection repeatedly closing prematurely. The error that will be seen from 'show ip msdp internal event-history tcp' is as follows -

Resetting connection with peer X.X.X.X ,reset reason: Received reset in TCP read

Conditions:
MSDP is configured. It may also require that the Nexus device is in 'Listening' state for the peer and is therefore passive, not active.

Workaround:
Restart the MSDP process -

restart msdp

If this does not work, remove the feature and re-add it -

no feature msdp
feature msdp

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu58619
Title:
IPFIB vrf dependency database doesnt cleanup on VDC reload
Description:

Symptom:
Traffic drops can be seen for multicast and/or unicast flows.

Conditions:
In the presence of Vinci configurations, when a VDC is reloaded, we can get into this condition of unicast/multicast routes not getting updated in certain asic instances

Workaround:
reloading of the affected LC.

Further Problem Description:
n/a

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu24710
Title:
ISSU failed 6.2(10) to 6.2(12) on a non-existing FEX
Description:

Symptom:
ISSU from 6.2(10) to 6.2(12) failed on a no longer existing FEX 110.

This physical device - N2K [fex 110] - was reused in another vdc and had a new fex number there.

Module 10:
Upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
-- SUCCESS


FEX image downloading in progress.
-- SUCCESS


Non-disruptive upgrading.


Module 161 upgrade completed successfully.


Non-disruptive upgrading.
-- SUCCESS


Non-disruptive upgrading.


Module 110 upgrade failed. >>>>>>>>>>>>>>>module 110 is not existing.


Non-disruptive upgrading.
-- FAIL.

Conditions:
Fex was present in one vdc and then later was moved to another VDC with a different fex number.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(12), 7.2(0)D1(0.490)
Known Fixed Releases:
Bug Id:
CSCur04856
Title:
Cisco Nexus 7000 Series evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
Symptoms:
The Cisco Nexus 7000 Series switches includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.

Conditions:
Devices with default configuration.

Workaround:
Not Available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.0(2)
Known Fixed Releases:
Bug Id:
CSCus42054
Title:
after eigrp restart on CE, some neighbors get struck in waiting for init
Description:

Symptom:
EIGRP neighbors are stuck in waiting for init

Conditions:
After EIGRP process restart when the GR helper peer does not have any routes to be advertised to the peer undergoing restart

Workaround:
Clear the neighborship by flapping the interface or using clear command

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)ZN(99.85)
Known Fixed Releases:
11.1(0.168), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.397), 7.2(0)D1(0.404), 7.2(0)D1(0.408), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCuu10618
Title:
Traffic loss on some vlans after line card reload
Description:

Symptom:
after reload there is 100% packet drop on a few vlans

Conditions:
LC reload on scaled setup

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.475)
Known Fixed Releases:
15.5(2.20)T, 15.5(2.21)S0.5, 15.6(0.2)S, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCus98916
Title:
BGP Vinci: For 0.0.0.0/0, BGP installs non-best/multi paths in URIB
Description:

Symptom:
In a vinci setup, customer is not able to chose one out of two Border Leaf because URIB is doing ECMP for both paths learnt via BGP.

Conditions:
1. Two paths in BGP vrf table for 0.0.0.0/0 from two Border Leaf.
2. First path is marked as best-path.
3. Second path is not marked as multi-path or best-path
4. BGP installs both paths in URIB vrf table.
5. URIB sees both paths having exact same metrics and interprets ECMP.

Workaround:
Config can be reworked in a way that the Leaf only receives one path via BGP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(1)N1(0.481), 7.1(1)N1(1), 7.1(1)ZD(0.18), 7.1(1)ZN(0.33), 7.2(0)D1(0.487), 7.2(0)D1(1), 7.2(0)N1(0.134), 7.2(0)N1(0.183)
Bug Id:
CSCuu32375
Title:
SSTE:Traffic loss is observed after doing ISSU followed by module reload
Description:

Symptom:
EoMPLS services may not come up

Conditions:
Consider a VDC that has multiple LCs and EoMPLS configurations with all the EoMPLS ports (AC and PW interfaces) on only one LC. Say LC1 has the AC and PW ports, while LC2, which is a part of the VDC, does not have any ports. When LC1 is reloaded, it is possible that the services may not get deleted properly in LC2 resulting in an inconsistent state, subsequently causing the control plane to withdraw the xconnects.

Workaround:
Reloading of mod LC2 after LC1 has come up will resolve the issue.

Further Problem Description:
This problem is intermittent in nature.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.499), 7.2(0)D1(0.501)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.14), 7.2(0)ZD(0.221)
Bug Id:
CSCut75759
Title:
ACL change fail "hardware resource allocation failure"
Description:

Symptom:
unable to modify/remove ACL from SVI. getting the following error: "ERROR: Module 1 returned status: hardware resource allocation failure"

Conditions:
Issue is seen when modification is done to ACL attached to SVI. This is due to memory leak in policer being allocated by qos. With each modification to ACL number of policer in QOS keeps on increasing. It reaches a point where there are not sufficient quantity of policers free and error is generated.

Workaround:
Remove the QOS policy from VLAN config, this results in deallocation of all allocated policers for that vlan.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14)FB(0.42), 7.2(0)D1(0.495), 7.2(0)D1(1), 7.2(0)ZD(0.177), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCut13324
Title:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:
Description:

Symptom:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Conditions:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Workaround:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Further Problem Description:
pvlan scale configs results in %PIXM-3-PIXM_SYSLOG_MESSAGE_TYPE_ERR:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.442), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.368), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCut99084
Title:
Expecting egress queue mismatched on F2E card of Crossbow(6.2.10)
Description:

Symptom:
When sending traffic with COS3 ( port trust COS , and no DSCP rewrite) or sending traffic with ip precedence 3
( have DSCP rewrite) , then issue show policy-map interface "F2E port" command.
Checking egress queue match , streams hit incorrect queue "8e-4q8q-out-q2". The correct queue for COS3 should be "8e-4q8q-out-q5".
Hardware and OS version: Crossbow N77XX (6.2.10) , F2E linecard.

Conditions:
When apply the following service-policy on F2E card of N77XX , and send traffic with COS 3 and IP precedence 3.

Class-map:
class-map type queuing match-any 8e-4q8q-in-q1

match cos 5-7
match dscp 40-63
class-map type queuing match-any 8e-4q8q-in-q-default

match cos 0-1
match dscp 0-8
class-map type queuing match-any 8e-4q8q-in-q3

match cos 3-4
match dscp 24-39
class-map type queuing match-any 8e-4q8q-in-q4

match cos 2
match dscp 9-23

class-map type queuing match-any 8e-4q8q-out-q1

match cos 5
class-map type queuing match-any 8e-4q8q-out-q2

match cos 7
class-map type queuing match-any 8e-4q8q-out-q3

match cos 6
class-map type queuing match-any 8e-4q8q-out-q4

match cos 4
class-map type queuing match-any 8e-4q8q-out-q5

match cos 3
class-map type queuing match-any 8e-4q8q-out-q6

match cos 2
class-map type queuing match-any 8e-4q8q-out-q7

match cos 1
class-map type queuing match-any 8e-4q8q-out-q-default

match cos 0

Policy-map:
policy-map type queuing NAC_TEST_IN8e-4q8q-in

class type queuing 8e-4q8q-in-q1
queue-limit percent 10
bandwidth percent 80
class type queuing 8e-4q8q-in-q-default
queue-limit percent 40
bandwidth remaining percent 35
class type queuing 8e-4q8q-in-q3
queue-limit percent 30
bandwidth remaining percent 45
class type queuing 8e-4q8q-in-q4
queue-limit percent 20
bandwidth remaining percent 20

policy-map type queuing NAC_Eg8e-4q8q-out
class type queuing 8e-4q8q-out-q1
priority level 1
shape average percent 50
class type queuing 8e-4q8q-out-q2
bandwidth remaining percent 1
class type queuing 8e-4q8q-out-q3
bandwidth remaining percent 25
class type queuing 8e-4q8q-out-q4
bandwidth remaining percent 15
class type queuing 8e-4q8q-out-q5
bandwidth remaining percent 10
class type queuing 8e-4q8q-out-q6
bandwidth remaining percent 10
class type queuing 8e-4q8q-out-q7
bandwidth remaining percent 4
class type queuing 8e-4q8q-out-q-default
bandwidth remaining percent 35

Workaround:
no workarounds

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu12677
Title:
ISL down from show topology after changing service policy of Eth port
Description:

Symptom:N7706 and N7710 connected using a 10G F3 ISL Link and the ISL is up. The ISL goes off from the show topology after some time.

Conditions:When a queuing policy is attached/removed/edited to an interface in ISL, the ISL goes off from the topology.

Workaround:The work around is to do a shut-no shut on the interface on which the queuing policy is attached.

More Info:



Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
7.2(0)D1(0.485)
Known Fixed Releases:
Bug Id:
CSCup52842
Title:
bgp flapping with fd read error
Description:

Symptom:
014 Jun 20 18:32:24.386535 bgp: 64896 [9115] (default) EVT: 172.23.96.107 peer connection retry timer expired
2014 Jun 20 18:32:24.386607 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Triggered active open for peer
2014 Jun 20 18:32:24.387329 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Active (Active setup)
2014 Jun 20 18:32:24.388533 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Schedule wait for connect
2014 Jun 20 18:32:24.388563 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.850982 bgp: 64896 [9115] (default) EVT: 172.23.96.107 connect to peer is successful
2014 Jun 20 18:32:24.851013 bgp: 64896 [9115] (default) EVT: 172.23.96.107 sending OPEN message to peer
2014 Jun 20 18:32:24.851060 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Active to OpenSent (Active setup)
2014 Jun 20 18:32:24.851101 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.851498 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Process OPEN message from peer
2014 Jun 20 18:32:24.851573 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenSent to OpenConfirm (Active setup)
2014 Jun 20 18:32:24.851617 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.852853 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenConfirm to Established (Active setup)
2014 Jun 20 18:32:24.852898 bgp: 64896 [9115] (default) EVT: 172.23.96.107 cleaning up active peer setup, thread id 0x0
2014 Jun 20 18:32:24.852991 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Established
2014 Jun 20 18:32:24.853018 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Scheduling peer 172.23.96.107 for soft refresh out
2014 Jun 20 18:32:25.867395 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 [peer index 245]
2014 Jun 20 18:32:25.879017 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Adding peer 172.23.96.107 for update gen
2014 Jun 20 18:32:25.879032 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Insert marker dest 0xe1525d64 into xmitlist for 172.23.96.107 with 0 routes on new list and 10475 routes on Tx list
2014 Jun 20 18:32:26.652 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Mark AF update completion for peer 172.23.96.107 (sent prefixes: 4670)
2014 Jun 20 18:32:27.054140 bgp: 64896 [9115] (default) EVT: Read error from peer 172.23.96.107: Broken pipe
2014 Jun 20 18:32:27.054221 bgp: 64896 [9115] (default) EVT: Reset by us (fd read error) in session to 172.23.96.107, value 187, state was Established
2014 Jun 20 18:32:27.054242 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Stopping keepalive, hold timers, peer state Established
2014 Jun 20 18:32:27.054261 bgp: 64896 [9115] (default) EVT: peer:172.23.96.107, state: Established, peer GR STATE: none, AF GR state: none, saved flags: 0
2014 Jun 20 18:32:27.054275 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 Close AF session, gr state none saved flags 0
2014 Jun 20 18:32:27.054290 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requesting cleanup thread to delete/stale routes for peer 172.23.96.107, with index 245
2014 Jun 20 18:32:27.054303 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requ

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(8)S33, 6.2(9), 7.1(0)D1(0.169)
Known Fixed Releases:
6.1(2)I3(2.42), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10), 6.2(10)S18, 6.2(8)E9, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.248)
Bug Id:
CSCuu49365
Title:
Wrong set of bd's are sent in TMC when no bridge-domain is done
Description:

Symptom:
Here proper set of bd's or vlan's are not sent in port affected notif to ethpm for bringing them down.
This will lead to inconsistency in peer-link i.e. vpc_mgr, ethpm and vlan components.
This only pertains to vxlan setup and not vinci/autoconfig.

Conditions:
Only on "no bridge-domain " and vxlan setup.
This is not seen in vinci and autoconfig setup.

Workaround:
For peerlink do shut/no shut i.e. flap the port.
For normal ports aswell do the same flap them.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.512), 7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.14), 7.2(0)ZD(0.221), 7.2(1)PIB(0.14)
Bug Id:
CSCut17793
Title:
SSTE:Traffic loss observed after flapp mpls interf with 7.2(0)D1(0.422)
Description:

Symptom:
Few VPLS PWs are down

Conditions:
Flap MPLS interface used by PWs

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.484)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.2(0)D1(0.503), 7.2(0)D1(1), 7.2(0)N1(0.196), 7.2(0)N1(1), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34), 7.2(0)ZD(0.183)
Bug Id:
CSCui72592
Title:
N7k: F3 module reloads due to Kernel Panic
Description:

N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE/
OK

(2) The output of 'show logging onboard module internal reset-reason' will indicate that the reload reason was due to a kernel panic.

Reset Reason for this card:
Image Version : 6.2(8a)
Reset Reason (LCM): Line card not responding (60) at time Thu Aug 21 20:21:59 2014
Reset Reason (SW): Kernel Panic (19) at time Thu Aug 21 20:19:28 2014
Service (Additional Info): Kernel Panic
Reset Reason (HW): System reset by active sup (by writing to PMFPGA regs) (100) at time Thu Aug 2
1 20:21:59 2014
Last log in OBFL was written at time Thu Aug 21 19:32:39 2014

(3) The output of 'show logging onboard module stack-trace' will provide the kernel stack trace. The top function on this stack will be 'InstructionTLBError47x'. The running process and the rest of the stack are not relevant.

Example:

---------------------------------
Module: 2 stack-trace
---------------------------------

------------------ LOG 01 -------------------

Logging time: Thu Aug 21 20:19:28 2014
1408670368:500000000 process xxxxxxxx (1219), jiffies 0xb79c1f6
Machine Check in kernel mode : Process xxxxxxxxx (1219)
MCSR: 0x0 MCAR: 0x0 MCSSR0: 0xc040100c MCSSR1: 0x21000


STACK

CPU 1 Call Trace:

[]InstructionTLBError47x+0x6c/0xa8 <------------- HERE



Symptom:N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(5.41)S0, 6.2(5.41)S1, 6.2(5.41)S2, 6.2(5.41)S3, 6.2(5.7), 6.2(8a), 7.0(0.33)S0, 7.1(0)D1(0.169)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 6.2(10)S9, 6.2(10.5), 6.2(6b)E2, 6.2(8)E4, 6.2(8)E5, 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCut87473
Title:
bfd crash @bfd_sys_get_remote_ip_info on BDI/peer link i/f shut/unshut
Description:

Symptom:
bfd crash

Conditions:
On BDI/VPC peer link interface shut/no shut few times with scaled configuration

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.490)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14), 7.3(0)RTG(0.17)
Bug Id:
CSCuu59073
Title:
UIN-1::Seeing ifmgr core @ ethpm_get_max_port_speed
Description:



Symptom:

User triggered command for sub-interface causing ifmgr core

Conditions:

Using invalid data for the sub-interface with uninitialized value.

Workaround:

None

Further Problem Description:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.209), 7.2(1)PIB(0.14)
Bug Id:
CSCuq96869
Title:
CNH programmed to 0/0, Null0
Description:

Symptom:
Some routes may either be missing or mis-programmed.

Conditions:
At VDC reload some early new route updates might be processed and dropped before processing the vdc-create. this causes ipfib to ignore the messages since they will be treated as invalid. Issue is seen during line card reload and during issu as well.This is a corner case timing issue and very rare

Workaround:
re download the routing table using 'clear ip route *' and 'clear ip arp' . In some cases flapping the layer 3 interface/interface vlan which is used to reach the next-hop can also clear the problem. Finally if the above workaround does not work reload of the module will be required.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(10)S73, 6.2(8b)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)OTT(0.45), 7.1(0)PDB(0.241), 7.2(0)D1(1)
Bug Id:
CSCuu08730
Title:
DAI: ARP Response dropped when the local vPC leg is down
Description:

Symptom:
A nexus 7000 series switch in a vpc/vpc+ environment configured for dynamic arp inspection may drop arp replies targetted to itself under certain conditions

Conditions:
- The local vpc leg is down causing the arp reply to be sent to the peer and tunneled to the switch that sent the arp request.
- The vpc is trusted for dynamic arp inspection

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(10), 7.2(0)N1(0.217)
Known Fixed Releases:
6.2(10)E3, 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)N1(1), 7.2(0)ZD(0.199), 7.2(0)ZN(0.218), 7.2(1)PIB(0.14)
Bug Id:
CSCuu21836
Title:
Port was Error disabled, Reason:Port not found when NAM module installed
Description:

Symptom:
If there is a NAM module installed and when a dce (core/edge) interface belonged to an another module flaps, then Port Client process in NAM sends "Port Not found".

This makes the EthPM to put the port to ErrDisable state

Example syslog:
============
ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/41 is down (Error disabled. Reason:Port not found)

Conditions:
NAM module is present on the box
dce (core/edge) interface belonged to an another module flaps

Workaround:
If Customer could afford to reload the NAM module, secure a maintenance window and reload the NAM module.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(9c), 7.2(0)D1(0.392)
Known Fixed Releases:
6.2(14)FB(0.51), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCuu96337
Title:
N5672UP NFM crash after config change
Description:

Symptom:
N5672UP rebooted causeed by nfm crash after config and save.

Conditions:
Nexus5672UP
NXOS7.0(6)N1(1)

Workaround:
unknown

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.0(99)ZD(99.1)
Known Fixed Releases:
Bug Id:
CSCud91672
Title:
Nexus7000: DEV_LOCAL_SAC_ASIC (device error 0xc910026d) [Sup2+M2]
Description:

Symptom:
Nexus7000 module reports:
%MODULE-4-MOD_WARNING: Module (Serial number: ) reported warning on ports
due to SAC sync lost in device DEV_LOCAL_SAC_ASIC (device error 0xc910026d)

Conditions:
Issue is seen only with M2 modules in Nexus7000 with SUP1 or SUP2 engines running 6.x releases

Workaround:
None

Issue is fixed in 6.1(4) and 6.2(2) or later releases.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.1(3)S32
Known Fixed Releases:
5.2(9.95)S0, 6.1(4), 6.1(4)S3, 6.1(4.25)S0, 6.2(1.41)S0, 6.2(1.93), 6.2(2), 7.0(0.6)
Bug Id:
CSCub73193
Title:
BGP routes stuck in delete state blocked by ulib flow control
Description:

Symptom:
Under rare situation, BGP bestpath run may stall due to a bug
in the BGP-ULIB flow control logic. To confirm the problem, search
the 'show tech bgp' or 'show tech l3vpn' for:
Last xid sent to ULIB: 4294967295
Last xid received from ULIB: 65535
ULIB flow control blocks: 5 (currently blocked)

Conditions:
This can only happen to MPLS deployments where label allocation
is required (L3VPN, 6VPE, 6PE).

There is an integer wrap-around bug in the BGP-ULIB flow control
logic. If during the wrap-around period, ULIB is busy and slow to
respond, the BGP bestpath run will be blocked indefinitely.
This problem is very time sensitive and the window is very small.
It is not guaranteed to happen every time.

This is no specific trigger, as long as new labels are continuously allocated
from ULIB (new prefixes, label mode change, etc), it may hit the wrap-around
condition.

Workaround:
There's no workaround. To recover from the situation, perform 'restart bgp'.
A less disruptive recovery method is to use 'per-vrf' label mode by configuring
a dummy l3vpn vrf context. Example:

vrf context dummy
rd
router bgp <>
vrf dummy
address-family ipv4 unicast
label-allocation-mode per-vrf

This should unblock the BGP bestpath run. If not, try adding another dummy vrf (without removing the previous one). After BGP bestpath run had been unblocked, the dummy vrfs can be removed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
5.2(5), 5.2(5)S19
Known Fixed Releases:
5.2(7), 5.2(7)S3, 5.2(7.6)S0, 6.0(2)N2(1), 6.0(2)U1(1), 6.1(1.66)S0, 6.1(2), 6.1(2.27), 6.2(0.285), 6.2(2)
Bug Id:
CSCuu11726
Title:
LIM flush clears non VxLAN macs on the BD affected
Description:

Symptom:
For silent orphan hosts, we can see traffic drops if traffic reaches other VPC peer.
We can also experience flooding if it reaches the peer containing the silent host.

Conditions:
PeerLink shut, Dismembering VNI from BD, NVE flap
BD should be common for VxLAN and non VxLAN hosts.

Workaround:
ReARP the silent hosts after the flush

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCus26870
Title:
December 2014 ntpd CVEs for Nexus 5k/6k/7k/MDS
Description:

Symptom:
The following Cisco products:

NEXUS 7000
NEXUS 6000
NEXUS 5000
MDS

include a version of NTPd that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-9293
CVE-2014-9294
CVE-2014-9295
CVE-2014-9296

This bug has been opened to address the potential impact on this product.

Conditions:
This issue is configuration dependant and applies only when the following command is configured:

feature ntp

All prior versions of NX-OS are affected.

Workaround:
1. If the upstream mgmt0 device supports uRPF then ensure it is configured.

2a. Filter incoming NTP queries and restrict them to trusted NTP server addresses only by using the ntp access-group configuration command.

2b. For affected platforms that do not support the ntp access-group command, configure an inbound ACL for trusted NTP server addresses to the NTP port (UDP port 123) on mgmt0.

Further Problem Description:
All previously released versions of SAN-OS and NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

Nexus 50xx:
NX-OS 5.2 release - a to be determined release
Nexus 55xx, 56xx
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 60xx:
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 7xxx:
NX-OS 6.2 release - first fixed release is 6.2(12), released on 03 Feb 2015

MDS:
NX-OS 5.2 release - first fixed release is 5.2(8f), released on 20 Feb 2015
NX-OS 6.2 releases:
- 6.2(9b), released on 01 Apr 2015
- 6.2(11b), released on 02 Mar 2015
- 6.2(13), to be released in June 2015

There are no fixed MDS NX-OS releases that are FICON certified yet. There will not be any fixed releases for software trains that are past the end of software maintenance support.

A Cisco Security Advisory has been published to document this vulnerability at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(3), 6.2(13)FM(0.8), 6.2(9)S32, 6.2(9a)S5, 7.2(0)ZD(0.1), 7.2(0)ZN(0.4), 7.9(0)ZD(0.4), 8.0(0.1), 9.9(9)
Known Fixed Releases:
5.2(1)N1(8.155), 5.2(1)N1(8.158), 5.2(1)N1(9), 5.2(8f), 5.2(8f)S9, 6.0(2)N2(6.132), 6.0(2)N2(6.133), 6.0(2)N2(7), 6.2(11b), 6.2(11b)S4
Bug Id:
CSCup16103
Title:
N7k: Copp fails to rate limit Pause frames from Hosts on 2248TP type FEX
Description:

Symptom:
Pause frames from Host reach the 7K CPU

Conditions:
Issue seen when host is connected to FEX N2248TP and host is sending a PAUSE storm
Affects both 6.2(6a)/6.2(8)

Workaround:
Offending host generating pause frames can be taken offline.

Further Problem Description:
Issue reported:
=========
Pause frames from FEX front panel (HIF) ports, end up at the SUP on N7K.

Observation:
=========
* On FEX type N2248TP, Pause frames are not handled correctly. Even with Rx flow-control enabled on the interface, pause frames are being forwarded upstream to the N7K instead of being consumed on the FEX.

* For all other FEX types including the latest N2248PQ, Pause frames are consumed at the FEX if Rx flow-control is enabled.


Potential Impact:
===========
* If volume of pause frames generated from the servers connecting to the FEX is EXTREMLY HIGH, then control path to the SUP can get congested
** Other control plane traffic destined to SUP can be dropped

Common case:
=========
* Pause frames volume is typically not so high in a real network to really congest SUP
* If there are malicious servers which are generating such high volume of traffic, those servers need to turned off.


Desired (Can be tracked as a separate enhancement requests):
============================================
1. Presently, Rx flow-control is not enabled by default for FEX HIFs. Behavior is documented.
*** Desired that Rx flow-control be enabled by default

2. Even if flow-control is not enabled, quench the pause frames at the MAC layer.
*** Must be tracked with FEX hardware/platform team (SAVTG)

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(6a), 6.2(8)
Known Fixed Releases:
7.2(0)N1(0.172), 7.2(0)N1(1), 7.2(0)VZN(0.34), 7.2(0)ZN(0.174), 7.3(0)N1(0.25), 7.3(0)N1(1), 7.3(0)ZN(0.24)
Bug Id:
CSCut34478
Title:
unicast route for the NVE peer loopback IP is missing on some ASIC inst
Description:

Symptom:
This issue is specific to Vxlan - Flood and Learn. When the peer LC goes down and it is the only core facing LC on the peer switch, the peer route is not programmed properly on all the instances and hence the traffic fails.

Conditions:
This issue is specific to Vxlan - Flood and Learn.

The peer route must be programmed on the VDC instances. This is achieved through the following two updates -
a. URIB route update for programming the route on core vrf instances.
b. NVE Manager peer add updates for programming the route on the VDC instances.

This issue is observed when the peer LC goes down and it is the only core facing LC on the peer switch. In such a scenario, when OSPF timeouts, URIB triggers an unlearn for the peer route.

However, the MAC Table timeout is longer than the OSPF timeout. Hence, the MAC table still has the Remote host MAC entry - thus the NVE peer is still seen in NVE Manager.

When the peer LC is up again, OSPF sends an update for the peer route. However, NVE manager doesn't resend the peer route update since it already has the peer update. As a result, we end up with the peer route programmed only on the URIB notified VRF instances and not the other instances in the VDC.

Workaround:
clear ip route vrf all
shut / no shut on the nve interface.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.424)
Known Fixed Releases:
Bug Id:
CSCtq62339
Title:
NX-OS 5.1 Kernel Memory Leak
Description:

Symptom:

Nexus7000 may report platform memory alert due to high memory utilization:

%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: MINOR. Usage 85% of Available Memory
%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: SEVERE. Usage 90% of Available Memory


N7K# sh system internal memory-status
MemStatus: Severe Alert

N7K# sh system internal memory-alerts-log | inc "ALERT INFO|MemTotal|MemFree|LowTotal|LowFree"
MINOR ALERT INFO
MemTotal: 8254672 kB
MemFree: 4295324 kB
LowTotal: 727120 kB
LowFree: 109332 kB
SEVERE ALERT INFO
MemTotal: 8254672 kB
MemFree: 4255408 kB
LowTotal: 727120 kB
LowFree: 72392 kB


Conditions:

CSCtq62339 is only being encountered if the following conditions are true:

Switch is running a release between 5.1(1) to 5.1(3).


>>>>=====
On these releases, the bug will be exposed
irrespective any feature enabled/disabled.
There is no precondition for this.
<<<<<====

Memory alert log shows only a snapshot of kernel memory *when* the alert threshold (85,90,95%) is crossed. Historical information can be misleading and needs to be understood clearly.

To calculate the CURRENT kernel memory, use the following procedure:
N7K# show system internal kernel memory usage | in Low

Low memory condition is logged when the following formula is at/above the logging threshold:
(LowTotal - LowFree) ?? LowTotal x 100

Ex: (727120 - 72392 ) ?? 727120 x 100 = 90% (threshold reached due to utilization in low region)


Low memory condition has been seen after approximately 3 months of supervisor uptime.

Workaround(s):


Reload of the active supervisor will clear the issue in a setup with two supervisor cards.
Reload of the switch will clear the issue in a setup with a single supervisor.

Software upgrade to fixed release, 5.1(4) or 5.2(1) or later.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
25-JUN-2015
Known Affected Releases:
5.1(1), 5.1(2), 5.2(1)
Known Fixed Releases:
5.1(10.4)S0, 5.1(4)S3, 5.2(1)S36, 5.2(1.43)S0
Bug Id:
CSCus52139
Title:
post L3, l2 flood traffic not going out on peer-link
Description:

Symptom:
Post L3 Flood to BD packet are not forwarded in the Peer Link

Conditions:
VPC setup with VxLAN configuration.

Workaround:
MAC table should be populated.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.383)
Known Fixed Releases:
Bug Id:
CSCud42302
Title:
SNMP process crash with DCNM discovery
Description:

Symptom:
Device sees a snmpd process crash. The log might show something similar to:

%SNMPD-2-CRITICAL: SNMP log critical : netsnmp_tcp_send : TRACE - send returned error : rc(-1), errno(11)
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 28261) hasn't caught signal 11 (core will be saved).

Conditions:
The issue appears to occur with DCNM discovery

Workaround:
Possible workaround is to disable DCNM discovery

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(4)S20
Known Fixed Releases:
Bug Id:
CSCun24082
Title:
N7K - GARP Storm Detection is not working as expected
Description:

Symptom:
With default configuration(ip arp garp-storm timer 1 count 100), when sever NIC is failovered, a ARP entry is to be Storm status without updating with new mac(failovered NIC mac) even GARP pps rate of the entry is just 1pps. This issue occurs intermittently.(If the customer tries to do failover test 10 times, this issue occurs 2-3 times)

Conditions:
- NX-OS: 6.2(2)
- Default Configuration of GARP storm

Workaround:
Disable GARP Storm function(no ip garp garp-storm)

Further Problem Description:
please see the documentation for behavior details

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(2)S42
Known Fixed Releases:
5.2(9.280)S0, 6.0(2)A4(0.764), 6.0(2)A4(1), 6.0(2)A5(0.943), 6.0(2)A5(1), 6.0(2)U4(0.764), 6.0(2)U4(1), 6.0(2)U5(0.943), 6.0(2)U5(1), 6.1(5.9)S0
Bug Id:
CSCus08720
Title:
DHCP_SNOOP service crash after apply DHCP relay agent cnofig on SVI
Description:

Symptom:
dhcp_snoop service crash

Conditions:
This has been seen on N7K running 6.2(10) code.
This happens when smart relay is enabled and a DHCP operation fails after a DHCP Discover packet is received and no Offer is received for the same.
The probability of occurrence of this crash is low.

Workaround:
Disable Smart relay.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(1), 6.1(2)I3(3.71), 6.1(2)I3(4), 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38)
Bug Id:
CSCuq55749
Title:
HSRP MGO: Slave may enter Init due to 'No Master for Slave'
Description:

Symptom:
When using HSRP MGO an attempt to configure a new HSRP follow group may result in this group being stuck in the Initial state with HSRP reporting a reason of "No Master for Slave".

Conditions:
HSRP MGO is configured and some HSRP follow groups are deleted from running config after which a supervisor switchover is performed.

Workaround:
Delete all affected stuck follow groups. Delete and reconfigure master group. Reconfigure follow groups.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(8)S11
Known Fixed Releases:
6.2(10), 6.2(10)S92, 6.2(10.16)S0, 6.2(8)E10, 7.1(0)AV(0.38), 7.1(0)D1(0.289), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.363), 7.1(0)N1(1)
Bug Id:
CSCuo81646
Title:
N77-F348XP-23 port 41-48 link remain up even cable disconnected
Description:

Symptom:
port 41-48 link remain up even cable disconnected or partner device is admin down

Conditions:
1G Optics or 1G copper are used on N77-F348XP-23 port 41-48

Workaround:
there is no work around
upgrade to fixed version

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(10)FM(0.27)
Known Fixed Releases:
6.2(10), 6.2(8)E5, 6.2(8.12)S0
Bug Id:
CSCuu20761
Title:
Delete MAC sync issue after LC module reload that does not have PL
Description:

Symptom:
VxLAN Mac inconsistency across VPC peers OR
Stale vxlan mac on one side of VPC complex

Conditions:
LC reload which contains VxLAN coreports but does not contain the peerlink.

Workaround:
clear mac address dynamic.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCuo80937
Title:
Nexus 7000 Stuck Sending TCNs Every 2 Seconds
Description:

Symptom:
If there is any TC after upgrade to 6.2.(6), 6.2.(6a) or 6.2.(8), then after approximately 90 days of active supervisor uptime, STP TC BPDUs are sent out every 2 seconds for a long period of time.

Conditions:
Nexus 7000 or 7700 running 6.2(6), 6.2.(6a), or 6.2(8).

Workaround:
In order to circumvent this issue until an upgrade to fixed code can be performed,
execute the appropriate workaround depending on whether you have a dual-supervisor or single-supervisor
configuration before each 90 days of Active supervisor uptime.

For dual-supervisor setups:
1. Reload the standby supervisor using cli "reload module x" where x is standby supervisor slot number.
2. Use the 'show module' command to confirm that the standby supervisor is up and in the ha-standby mode.
3. Use the 'system switchover' command to switch to the standby supervisor.

For single-supervisor setups:
1. Upgrade to 6.2.6b or 6.2.8a, depending on your business requirements.
2. Reload the switch.

Further Problem Description:
Active Supervisor Uptime can be found from "show system uptime":
N7K-7009-3# show system uptime
System start time: Fri Oct 25 09:40:58 2013
System uptime: 236 days, 8 hours, 56 minutes, 59 seconds
Kernel uptime: 110 days, 23 hours, 7 minutes, 49 seconds
Active supervisor uptime: 110 days, 23 hours, 2 minutes, 23 seconds <<<<<<<<<<<

-----------------

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(10)E1, 6.2(6)
Known Fixed Releases:
6.1(2)I3(1), 6.2(10), 6.2(10)S5, 6.2(10.5), 6.2(6)E2, 6.2(6b), 6.2(6b)S1, 6.2(8)E1, 6.2(8)E2, 6.2(8)E5
Bug Id:
CSCua82201
Title:
BGP process fail due to constant BGP socket open/close state changes
Description:

Symptom

BGP process fails due to constant BGP socket open/close state changes. If there are several idle peers, over a period of time due to excessive churn of netstack client for BGP sockets, newly provisioned BGP session fail to come up with the following error

BGP-3-SOCKCREATE: bgp-XXXX [24958] Cannot create socket for peer X.X.X.X: Bad file descriptor, stats: 28391553/496156/28887500/14303942/14143771


Workaround

If BGP graceful restart is configured, then clear all BGP neighbors may clear the issue

If BGP graceful restart is not configured then disabling and enabling 'feature bgp' from the active configuration will clear this issue

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(2)S31
Known Fixed Releases:
6.0(2)U2(1), 6.0(2)ZD(0.6), 6.1(2), 6.1(2)E10, 6.1(2)E10.4, 6.1(2)S6, 6.1(2.11)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCth40877
Title:
NxOS: OSPF DR not sending out network LSAs
Description:

Symptom
OSPF does not advertise Network LSAs

Conditions
There are a few possible triggers for this - one is doing a shut/no shut on the interface. Adjacency flaps can also cause this issue

Workaround
This can be recovered by doing a shut/no shut on the interface

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
5.0(3), 5.1(0.227), 5.1(0.236), 5.2(0.1)
Known Fixed Releases:
5.0(0)MP1(0.368), 5.0(5)S12, 5.1(1)S12, 5.1(1.1)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCui02208
Title:
stp techsupport on X.1 causes stp disputes & BA_block
Description:

Symptom:
On a scale setup with a high number of logical ports, when stp tech-support is collected, stp spends a lot of time in dumping out the event-history for all ports from the backend. This could lead to a delay in sending bpdus in stp, thus causing STP Disputes.

Conditions:
This condition happens when there are a large number of logical ports, in either Rapid Spanning or Multiple Spanning tree configurations.

Workaround:
The workaround is to collect show tech-support binary all.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(1.157)S0, 6.2(2)S42, 6.2(8a)
Known Fixed Releases:
7.1(163)GVB(0.3)
Bug Id:
CSCue36257
Title:
AAA crash and leading to possible hap reset
Description:

AAA Crash observed.

Symptom:
AAA Process Crash.

Conditions:
When we execute show accounting log command.

Workaround:
No Work Around and It is very corner case.

Further Problem Description:
When the accounting log file in logflash becomes more than 250,000 bytes , it is moved to archive file. But when the current accounting logfile size also becomes more than 250,000 and 'show accounting log' command was executed at this time(No accounting message before show accounting log) , then due to buffer overflow , crash happens.But if instead of 'show accounting log ' command , if any other command is executed , then an accounting update message will be sent to aaa which will move the current accounting log to archive and old archive file will be removed. Due to this , the total size of the accounting log will be less than 500 k and hence the bug was not seen everytime .

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.2(0.304)S15, 6.2(1.111)
Known Fixed Releases:
6.0(2)U3(0.641), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1), 6.1(4.97)S0, 6.1(5), 6.1(5.32)S0, 6.2(1.146)S0, 6.2(2), 7.0(0)ZD(0.84)
Bug Id:
CSCur12364
Title:
N5K:ISSU fails 5.1(3)Nx(x)/5.2(1)N1(x) -> 6.0(2)Nx(x)/5.2 -> 7.0(x)N1(1)
Description:

Symptom:
When performing ISSU with this path: 5.1(3)N1(1) / 5.1(3)N1(1a) => 6.0(2)N2(5) => 7.0(3)N1(1)
This issue is hit with ISSU upgrade path of 5.1.x->5.2.x->7.x as well. Not necessary that 6.0 should be interim.

We can see that 1st step is fine. But when switch is rebooted on the second step for upgrade 6.0(2)N2(5) => 7.0(3)N1(1) switch is crashing at boot at URIB process.

And this error is shown:

show install all status

This is the log of last installation.
Need to perform cleanup of failed upgrade.
Install has failed. Return code 0x40930039 (aborting due to failed upgrade).

Conditions:
Issue seen with these conditions:
- N5K VPC pair with AA FEX
- perform ISSU: 5.1(3)N1(1) -> 6.0(2)N2(5) -> 7.0(3)N1(1) or 5.1.x->5.2.x->7.x (without reload between after intermediate upgrade)

Workaround:
Issue is not seen when N5K pair booted 6.0(2)N2(5) and configured from clear config.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
5.1(3)N1(1a), 6.0(2)N2(5), 7.0(3)N1(0.125)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(7)ZN(0.112), 7.1(0)AV(0.81), 7.1(2)N1(0.549), 7.1(2)ZD(0.6), 7.1(2)ZN(0.8), 7.2(0)D1(0.505), 7.2(0)D1(1), 7.2(0)N1(0.199), 7.2(0)N1(1)
Bug Id:
CSCum30306
Title:
Security service crashes while configuring an SSH authentication key
Description:

Symptom:
The security service crashes when configuring an SSH authentication key.

Configuring SSH keys multiple times within 10 minutes results in a HAP reset that resets the active supervisor.

Conditions:
This issue intermittently occurs when configuring an SSH authentication key.

Workaround:
To avoid the supervisor reset, do not configure more than 2 SSH keys per 10 minutes.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
5.2(8), 6.2(2a)
Known Fixed Releases:
6.2(0)HS(0.10), 6.2(7.5)S0, 6.2(7.7)S0, 6.2(8), 6.2(8)BF(0.21), 6.2(8)BF(0.24), 6.2(9)FM(0.37)
Bug Id:
CSCuq20660
Title:
L3 PC Sub interface MTU not programmed/shown when Network Qos MTU exits
Description:

Symptom:
Show interface will show wrong MTU on SubInterface in case Network QoS based MTU is configured. But this is only Show CLI issue. The HW is programmed correctly.
For Port-channel SI's, HW programming is also not happening

Conditions:
Network QoS is used to changed the Port MTU

Workaround:
Apply port MTU on port-Channel parent First and than on Subinterfaces.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(10)S36
Known Fixed Releases:
Bug Id:
CSCue67277
Title:
Interface does not recover from err-disable state during ISSU from 5.2.7
Description:

Symptom:
During ISSU, if any ports flap they get error disabled and stay error disabled even after ISSU is completed.
Conditions:
Issue occurs only if ports flap while ISSU is in progress.

Workaround(s):
shut/no shut will bring up the error disabled ports.
Workaround:
Workaround for recovering error disabled ports :

- Wait till the ISSU is over. Once the system is ready, issue a "shut / no shut" on the ports to recover them to normal state.
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
5.2(5)S2, 6.1(3)S47, 6.2(1.111)S4, 6.2(1.118)S1, 6.2(1.125)S5, 6.2(1.91)S7, 6.2(5.7), 7.0(0)FV(0.88), 7.0(0.1)
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.20)S0, 6.2(1.121)S0, 6.2(1.127)S0, 6.2(2), 7.1(0)D1(0.14), 7.2(0)VZN(0.30)
Bug Id:
CSCuo85450
Title:
Nexus 5000 crashed with arp hap reset
Description:

Symptom:
switch reload with following log:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 141764 usecs after Wed May 14 03:21:41 2014
Reason: Reset triggered due to HA policy of Reset
Service: arp hap reset
Version: 7.0(1)N1(1)

Conditions:
Gratuitious ARP storms are suspected as the trigger for this issue.

Workaround:
currently unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(2)
Known Fixed Releases:
6.0(2)A5(0.943), 6.0(2)A5(1), 6.0(2)U5(0.943), 6.0(2)U5(1), 6.2(10), 6.2(10)S40, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(1)ZD(0.248)
Bug Id:
CSCur32142
Title:
mcast traffic blackhole for upto 4min as assert cancel not sent by winne
Description:

Symptom:
Multicast traffic blackhole for up to 4 minutes

Conditions:
If more than one router forwards traffic onto a LAN - in initial bootup phase or when 'ip multicast multipath' command is configured - PIM assert election happens and one router becomes the winner. This could be the non-PIM-DR having a PIM receiver. There may also be local IGMP receivers on this LAN.
Now, if the winner receives a PIM Prune message and no other PIM receivers exist on that LAN, the winner should send an assert cancel message, to conclude the election and let the PIM-DR on the LAN forward for local receivers.

Under certain circumstances, the winner does not always send out the assert cancel thereby causing traffic blackhole until the loser router ages out the winner's assert message. This could take up to 4 minutes.

Workaround:
clear ip mroute

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(10), 6.2(10)S102, 7.1(0)D1(0.324)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)D1(0.325), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)D1(1), 7.2(0)N1(0.12)
Bug Id:
CSCuu71685
Title:
N7k-Fex: Ethpm timed out on port sec with sticky config during bringup
Description:

Symptom:
When member ports of port channels are configured with stick mac and during reload port security is trying to restore the stick mac of all ports causing delay in sending the response to ethpm resulting the ports and port channels to be in down state.

Conditions:

Workaround:
The work around is to un-configure the sticky mac as dynamic Mac learning is highly preferred than sticky. Removing the sticky mac configuration will resolve the sequence timing out issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu09287
Title:
SSTE: pixm critical message on 'no feature-set fabric'
Description:

Symptom:
error message seen when no feature-set fabric is issued.

Conditions:
configure several feature sets and multiple VDCs.

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases:
Bug Id:
CSCur68350
Title:
F3: MAC Address is not Learned in Software after ISSU
Description:

Symptom:
A MAC address is present in hardware but not software. Since the MAC is not in software other processes and features are not notified of new MAC address. This can result in black-holed traffic.

Conditions:
- ISSU to 6.2(10)
- F3 module
- OTV or vPC

Workaround:
Upgrade via a traditional reload.

If issue is hit via ISSU, flap the interface. If they are part of a port channel that spans multiple forwarding engines (FE), flap the member interfaces one at a time force mac learning on a different FE.

If the internal interface is not a port channel or the members are on the same FE then flapping the interface in OTV will trigger OTV AED failover or in vPC shut down the vPC leg.

If you believe problem exist even after flapping the interface please contact TAC for further workaround.

Further Problem Description:
This impacts OTV as locally learned MAC address will not be advertised to the remote otv site and vPC as new MAC learns will not be advertised to the vPC peer

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.24), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.303), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCut51575
Title:
VPC breaks due to incorrect emulated switch-id after ISSU upgrade
Description:

Symptom:
Emulated switch-id changed to default value(2750) instead of configured one causing network connectivity issue. Software shows the correct switch-id.

Software:
`show vpc`
Legend:
(*) - local vPC is down, forwarding via vPC peer-link

vPC domain id : 150
vPC+ switch id : 2010--------------------------------------------->Correct value
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
vPC fabricpath status : peer is reachable through fabricpath
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 consistency status : success
vPC role : secondary
Number of vPCs configured : 85
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)


`show platform fwm info l2mp myswid`
switch id
-------------------------------------------------------------------
switch id manager
-------------------------------------------------------------------
vpc role: 0
my primary switch id: 1011 (0x3f3)
emu switch id: 2750 (0xabe)--------------------------------???instead of 2010
peer switch id: 1010 (0x3f2)

Conditions:
ISSU upgrade

Workaround:
Remove the switch-id and reconfigure the same.

Conf ter
Vpc domain 150
No fabricpath switch-id 2010
fabricpath switch-id 2010

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.0(2)N2(3)
Known Fixed Releases:
Bug Id:
CSCuf55953
Title:
vntagmgr crashed while configuring Fex ports
Description:

Symptom:
Crash observed with vntag_mgr following changes made to an existing SPAN session

Conditions:
Active changes to the SPAN session configurgation

Workaround:
None at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(1.52)
Known Fixed Releases:
6.2(1.61)S0, 6.2(2), 7.0(0)ZD(0.53), 7.0(0)ZD(0.55), 7.0(0.7)
Bug Id:
CSCur26436
Title:
Nexus 7000 & MDS 9000 evaluation of SSLv3 vulnerability (POODLE)
Description:

Symptom:
Nexus 7000 and MDS 9000 switches include a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

Conditions:
A POODLE exploit requires a man in the middle attack between the switch (the LDAP client utilising the SSL client) and the LDAP server. Nexus 7000 and MDS 9000 both contain an SSL client with SSLv3 support. The client supports fallback to SSLv3 if negotiation with TLS 1.0 fails.

The LDAP SSL feature may be configured to utilise this client. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP feature is enabled.

Workaround:
Disable the LDAP SSL feature with the ldap-server host ip_address enable-ssl command.

Further Problem Description:
All previously released versions of SAN-OS and NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

MDS:
NX-OS 5.2 release - first fixed release is 5.2(8f), released on 18 Feb 2015
NX-OS 6.2 releases:
- 6.2(9b), released on 01 Apr 2015
- 6.2(11b), released on 02 Mar 2015
- 6.2(13), projected to be available in Q3 2015

There are no fixed MDS NX-OS releases that are FICON certified yet.

Nexus 7000:
NX-OS 6.2 release - first fixed release is 6.2(12), released on 03 Feb 2015

There will not be any fixed releases for software trains that are past the end of software maintenance support.

The current fix is for the NX-OS SSL client to refuse to fall back to SSLv3. If the server tries to negotiate to SSLv3, the client will now terminate the SSL session. SSLv3 support will be completely removed in future releases.

A Cisco Security Advisory has been published to document this vulnerability at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(7), 6.2(8)
Known Fixed Releases:
5.2(8f), 5.2(8f)S3, 6.2(11b), 6.2(11b)S1, 6.2(11c), 6.2(11c)S2, 6.2(12), 6.2(12)S24, 6.2(12.4)S0, 6.2(13)FM(0.65)
Bug Id:
CSCuu50227
Title:
LISP Mcast: RPF selection broken
Description:

Symptom:
When mrib is learning RPF from LISP and a static null0 route is installed in the rib, whether more or less specific than the map-cache entry, we see mrib install RPF of null. If mrib was listening directly to the rib, we'd expect the rpf to be null0.

Conditions:
Miscommunication between LISP and MRIB

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.1), 7.2(1)PIB(0.12)
Bug Id:
CSCur77280
Title:
N6k m2rib missing interfaces from OIFL
Description:

Symptom:
Multicast/broadcast packet drops on certain vlans.

Conditions:
After flapping several links or recreating fabricpath vlans in specific order.

Workaround:
Remove and add back vlan, trying to start from the spines and then going to the leafs.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases:
7.0(1)ZN(0.736), 7.0(6)N1(0.236), 7.0(6)N1(0.4), 7.0(6)N1(1)
Bug Id:
CSCut77411
Title:
Assess April 2015 NTPd vulnerabilities for N5k/N6k/N7k
Description:

Symptom:
This has been opened to document the potential impact on the following products:

Cisco Nexus 5/6k switch family
Cisco Nexus 7k switch family

of the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798
CVE-2015-1799

Conditions:
Exposure is configuration dependent. The configuration that can expose the vulnerability are

ntp authenticate
ntp authentication-key 1234 md5 104D000A0618 7
ntp trusted-key 1234
ntp peer 1.2.3.4 key 1

Workaround:
Remove the applicable configuration.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.3(0)ZN(0.3), 7.3(0.9)
Known Fixed Releases:
5.2(1)N1(8.167), 5.2(1)N1(9), 6.0(2)N2(6.141), 6.0(2)N2(7), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(7)ZN(0.108), 7.1(0)AV(0.74), 7.1(2)N1(0.545), 7.1(2)N1(0.546)
Bug Id:
CSCuu30447
Title:
F2/F2E port will keep up even the rx power is -26dBm due to ISP break
Description:

Symptom:
Topology:
N7K-c1(port e4/31)---15454-1===ISP===15454-2------(port4/3)N7K-c2
Software:
both N7K-c1 and N7K-c2 are running with 6.2.12.
module 4 is the N7K-F248XP-25E

Transceiver info:
both e4/31 and e4/3 are installed with GLC-SX-MMD.

Configuration for port e4/31 and e4/3:
interface Ethernet4/31
no shutdown
interface Ethernet4/3
no shutdown

Failure scenario:
if we break the ISP fiber, you might see one of the port e4/31 and e4/3 will be up while the other one is in link failure status.

N7K-3-c1# show int e4/31
Ethernet4/31 is down (Link not connected)
admin state is up, Dedicated Interface
Hardware: 1000/10000 Ethernet, address: 8478.ac56.4645 (bia 8478.ac5a.0fb2)
MTU bytes (CoS values): MTU 1500(0-2,4-7) bytes MTU 2112(3) bytes
BW 10000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is routed
auto-duplex, auto-speed, media type is 1G
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is off
Auto-mdix is turned on
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
EEE (efficient-ethernet) : n/a
Last link flapped 00:26:03
Last clearing of "show interface" counters 02:27:02
8 interface resets
Load-Interval #1: 30 seconds
30 seconds input rate 0 bits/sec, 0 packets/sec
30 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
Load-Interval #2: 5 minute (300 seconds)
300 seconds input rate 0 bits/sec, 0 packets/sec
300 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
L3 in Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
L3 out Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
RX
76 unicast packets 90 multicast packets 0 broadcast packets
90 input packets 25587 bytes
0 jumbo packets 0 storm suppression packets
0 runts 0 giants 0 CRC/FCS 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 0 input discard
0 Rx pause
TX
76 unicast packets 89 multicast packets 0 broadcast packets
89 output packets 19394 bytes
0 jumbo packets
0 output error 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
0 Tx pause

N7K-3-c1# show int e4/31 tran details
Ethernet4/31
transceiver is present
type is 1000base-SX
name is CISCO
part number is FTLF8519P3BNL-CS
revision is A
serial number is FNS17371AE5
nominal bitrate is 1300 MBit/sec
cisco id is --
cisco extended id number is 4
cisco part number is 10-2626-01
cisco product id is GLC-SX-MMD
cisco vendor id is V01
number of lanes 1

SFP Detail Diagnostics Information (internal calibration)
----------------------------------------------------------------------------
Current Alarms Warnings
Measurement High Low High Low
----------------------------------------------------------------------------
Temperature 38.44 C 90.00 C -10.00 C 85.00 C -5.00 C
Voltage 3.30 V 3.59 V 3.00 V 3.50 V 3.09 V
Current 7.13 mA 15.00 mA 1.00 mA 12.00 mA 2.00 mA
Tx Power -5.11 dBm 0.00 dBm -13.49 dBm -2.99 dBm -9.50

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(14)FB(0.64)
Bug Id:
CSCur07245
Title:
Nexus switch may see repeated crashes of ntpd process
Description:

Symptom:
NTP process may crash repeatedly on a Nexus switch.

Nexus7010# sh core
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 5 1 ntpd 19361 2015-01-31 05:18:22
1 5 1 ntpd 19348 2015-01-31 05:18:22
1 5 1 ntpd 19096 2015-01-31 05:18:22
1 5 1 ntpd 21817 2015-01-31 05:30:25
1 5 1 ntpd 21201 2015-01-31 05:31:20
1 5 1 ntpd 21196 2015-01-31 05:31:20
1 5 1 ntpd 21188 2015-01-31 05:31:20
1 5 1 ntpd 21208 2015-01-31 05:31:21

In some cases the cores may not be properly bundled and will pile up in the /var/sysmgr/tmp_logs directory. This may result in messages similar to the following:

2015 Mar 28 00:34:06.644 Switch %SYSMGR-3-VAR_SYSMGR_FULL: System Manager file storage usage is unexpectedly high at 100%. This may impact system functions.
2015 Mar 28 00:40:29.912 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30892 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.057 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30914 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.463 Switch %SYSMGR-3-CORE_OP_FAILED: Core operation failed: core_client_run_system_cmd: Command: /isan/bin/sysmgr_logmgr /var/sysmgr/tmp_logs 0 1>> /var/sysmgr/core_handling.log failed wi

Conditions:
This has been observed on Nexus 5000, 6000, and 7000 series switches.

It is more likely to occur if the device is being polled via IPv6 NTP requests. However, this also affects IPv4-only configurations.

It may also be more likely to occur if an unreachable NTP peer is configured.

Workaround:
If either of the above two conditions are present in the configuration (IPv6 NTP polling, or an unreachable NTP peer) then removing these may make the crash less likely to occur.

However, the only guaranteed workaround would be to disable the NTP feature completely (remove all NTP configuration from the affected switch).

Further Problem Description:
This problem occurs due to memory corruption in a receive buffer in memory which is used by NTP. NTP will crash repeatedly after the corruption occurs.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.25), 7.0(7)ZN(0.108), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(1)N1(0.495), 7.1(1)N1(1), 7.1(1)ZN(0.48), 7.2(0)AB(9)
Bug Id:
CSCuu69821
Title:
Issue in configuring persistent logging and utilization alert
Description:

Symptom:
Due to this bug user will not be able to configure "utilization-alert" and would observe below message popping on the screen.
"Exceeded persistent logging utilization threshold limit. Please cleanup old logs and try again !!"

Conditions:
User can configure Max 10 files each of it can be of Max 4MB. So there will actually be 11 file (10 backup and 1 current). In general there will always be 1 more file besides what user configures. Due to this bug user will not be able to configure utilization alert IFF, ((fileno+1)*filesize*utilization-alert) exceeds MAX value of INT32.
For example, lets assume fileno = 10, filesize = 4194304(4MB), utilization alert = 50%.
Now ((10+1)*4MB*50 = 2,306,867,200 )which is greater thanINT32_MAX value (2,147,483,647)

Workaround:
Any combination of ((fileno+1)*filesize*utilization-alert) which is less than INT32_MAX(2,147,483,647)
For Example, (fileno = 10, filesize = 4MB, utilization alert = 45%)
((10+1)*4194304*45 = 2076180480)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.1), 7.2(1)PIB(0.11)
Bug Id:
CSCuu90608
Title:
nvt: mcecm and vpc cores on doing a cold boot from S22 to S28
Description:

Symptom:
vPC process crashes

Conditions:
no graceful type-1 check configured and switch reloads

Workaround:
turn on graceful type-1 check by default

Further Problem Description:
This is memory overrun issue.

The issue is only hit when graceful type-1 check is disable. Because from 6.2.10, the check is enabled by default, we decided to fix after GBR.

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCut93487
Title:
OTV: AED stays inactive for all VLANs
Description:

Symptom:
One AED stays inactive for all VLANs

Conditions:
Using OTV with 2 AEDs

Workaround:
Remove the vlans that won't come up and add them back to the OTV vdc.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuo51846
Title:
N7K: 3rd party SFP-10G-SR reported as "Unsupported transceiver"
Description:

Symptom:
3rd-party SFP-10G-SR reported as "Unsupported transceiver":
ETHPORT-3-IF_UNSUPPORTED_TRANSCEIVER Transceiver on interface Ethernet2/1 is not supported

To verify if its the same issue
module-7# sh hard int transceiver ins 0 sprom raw

+-------------------------------------------------------------------------------
| Get sprom/dom data for XCVR_USD Driver

SPROM in raw format:
-------------------

Comment Addr Value
------- ---- -----
Identifier 0 03
Ext. Identifier 1 04
Connector Type 2 07
10G Ethernet Compliance Code 3 00
ESCON/SONET Compliance Code 4 00 00
Ethernet Compliance Code 6 00
Transceiver (Fibre Channel) 7 40 >>>>> Having 7,8 and 9th bytes programmed with any non-zero number will result in this bug.
Transceiver (Fibre Channel) 8 40
Transceiver (Fibre Channel) 9 0c
Transceiver (Fibre Channel) 10 80

Conditions:
This is observed on a Nexus 7000 or 7700 port running a 6.2(8) release.Its not seen in any other releases
before 6.2.8 . Its fixed in 6.2.10
It is applicable for all LCs and only affects some of the 3rd party transceivers.

Workaround:
Use a Cisco Transceiver.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.4), 6.2(8)E1, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(8a)E2
Bug Id:
CSCup89391
Title:
SNMP process crash
Description:

Symptom:
SNMP crash causing device reload

Conditions:
N/A

Workaround:
- use SNMPv2 instead SNMPv3

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
5.2(8b), 6.2(8)
Known Fixed Releases:
Bug Id:
CSCut08818
Title:
SNMPD crashes with role with only deny OIDs
Description:

Symptom:
If the SNMP community name is associated with a role which has only a deny OID will cause SMNP to unexpectedly write out a core file when polled with a SNMP bulk request. If multiple SNMP crashes occur then the SUP will switchover and the SNMP configuration will be lost.

Conditions:
The N7K is configured with SNMP and a role which only denies OIDs.

Workaround:
For the configured role add in a permit OID.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a), 6.2(9a)
Known Fixed Releases:
6.2(14)FB(0.63), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(2)N1(0.548), 7.1(2)ZD(0.6), 7.1(2)ZN(0.7), 7.2(0)D1(0.492), 7.2(0)D1(1), 7.2(0)N1(0.187), 7.2(0)N1(1)
Bug Id:
CSCuv05083
Title:
Vlan learnt SGT mappings not downloaded to HW after module comes online
Description:

Symptom:
On a nexus 7000 series switches, IP to DGT mappings, may not be honored for vlan learnt SGT mappings following a supervisor switchover and a module reload.

Conditions:

Workaround:
clear ip arp x.x.x.x force

will allow the switch to correct the IP-SGT binding .

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCtw72949
Title:
Slow drain of udp sock mts buffers for some bulk requests in bridge-mib
Description:

Symptom:
On nexus 7000 series switch, polling at a sustained rate certain objects from
bridge-mib may cause a relatively high cpu for snmpd for some time after polling and new requests to time out.

On pre 5.2 NX-OS versions, this polling may cause internal messages for inter
process communications to be queued and affect other services.

This problem is also observed on Nexus 5xxx switch running 5.2 release. The fix
for this issue is in 5.2(1)N1(4) release of the 5k and 6.0(2)N1(2a) and later releases.

Conditions:
A large amount of SNMP access to the device against BRIDGE-MIB

Workaround:
Reduce the amount of SNMP traffic to a acceptable level.

If using Orion or Solarwinds Network Management Server uncheck option
Topology: L2.

Further Problem Description:
Problem exists in 5.2(1-3), 6.0(x) and earlier releases on Nexus 7000 switch.
Fixes had been integrated in 5.2(4), 6.1(1), 6.2(2) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
5.1(4), 5.2(1), 6.2(0.1)
Known Fixed Releases:
5.2(1)N1(4), 5.2(4)S3, 5.2(4.10)S0, 5.2(4.4)S0, 6.0(2)N1(2a), 6.0(2)N2(1), 6.0(2)U3(0.599), 6.0(2)U3(1), 6.1(0.205)S0, 6.1(0.209)S0
Bug Id:
CSCur17440
Title:
snmpwalk on cpmCPUTotalTable(1.3.6.1.4.1.9.9.109.1.1.1) failing
Description:

Symptom:
On nexus 5500/6000 series switches, snmpwalk on 1.3.6.1.4.1.9.9.109.1.1.1( cpmCPUTotalTable) does not return the expected objects.

Conditions:
This is seen with 7.1 train, the issue does not exist with previous trains such as 7.0

Workaround:
An snmpget to the object will work, for instance to 1.3.6.1.4.1.9.9.109.1.1.1.1.8.1 for cpmCPUTotal5minRev

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
7.1(0)N1(1), 7.1(1)N1(0.8)
Known Fixed Releases:
Bug Id:
CSCuu66415
Title:
VINCI UI: ethpm receiving an empty vlan list from vlan_mgr
Description:

Symptom:
vlan_mgr sends notifications to ethpm with empty interest list

Conditions:
happens during bridge-domain create

Workaround:
this has no operational impact

Further Problem Description:
this is an interaction between vlan_mgr and ethpm. the empty list becomes a NOP for ethpm and this has no impact on operation or functionality

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.2), 7.2(1)ZD(0.2)
Bug Id:
CSCur97641
Title:
MPLS QoS:Show policy is showing Pkt count 0 where byte count is proper
Description:

Symptom:
Sometimes when egress policy-map is applied to a VLAN, the "packets" count will not increment in "show policy map vlan"


N7K-1# sh policy-map vlan 100
***SNIP***
Class-map (qos): test (match-any)

Aggregate forwarded :
0 packets 82687055970 bytes <----bytes increment but packets don't

Conditions:
egress policy-map applied on vlan

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(8a), 7.1(0)D1(0.328)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65), 7.1(0)AV(0.38), 7.2(0)D1(0.402), 7.2(0)D1(1), 7.2(0)OTT(0.5), 7.2(0)PDB(0.332)
Bug Id:
CSCut03089
Title:
After ISSU from 6.2.10 to 6.2.12 Optical Modules doesn't show DOM info
Description:

Symptom:
On N7K running 6.2.12 code, some of the DWDM optical modules will not show DOM info.

Example Output.

switch-core# sh int e1/25 trans de
Returning from 1
unknown error 0x40290003

Ethernet1/25
transceiver is present
type is DWDM-SFP10G-35.04
name is CISCO-FUJITSU
part number is FIM35060/201W53
revision is 0002
serial number is FLJ1718K016
nominal bitrate is 11100 MBit/sec
Link length supported for 9/125um fiber is 80 km
cisco id is --
cisco extended id number is 4
cisco part number is 10-2779-01
cisco product id is DWDM-SFP10G-35.04
cisco vendor id is V01
switch-core#

Conditions:
This behavior is seen only after ISSU from 6.2.10 to 6.2.12 on DWDM optical modules.
This behavior is not seen while performing traditional code upgrade from 6.2.10 to 6.2.12

Workaround:
Problem is not seen after traditional code upgrade from 6.2.10 to 6.2.12

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.365), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus90226
Title:
6.2.12: Route programming inconsistency between instances on a LC
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.4), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.430), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.358), 7.2(0)VOF(0.2)
Bug Id:
CSCuq46564
Title:
SSTE:LDP core observed after process restart LDP with 7.1(0)D1(0.232)
Description:



Symptom:

LDP crashes due to heartbeat failure following a proc restart of LDP.

Conditions:

Happens when user does a proc restart of LDP.

Workaround:

No workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.1(0)D1(0.232)
Known Fixed Releases:
6.2(10)E5, 6.2(13.3)S0, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)OTT(0.45), 7.2(0)D1(0.417)
Bug Id:
CSCuf47376
Title:
Trunk/FEX FPC port config removed by "system def switchport fabricpath"
Description:

Symptom:
adding/removing 'system default switchport fabricpath' cli seems to affect the configuration of trunks/access/fex fabric ports.

On a system with this command, a disruptive upgrade/reload might also cause config issues

Conditions:
adding/removing 'system default switchport fabricpath' cli / reload/disruptive upgrade with this command

Workaround:
If reload/disruptive upgrade has to be done, take a config backup first to restore

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.37), 7.1(0)AV(0.38), 7.1(0)PDB(0.324), 7.2(0)D1(0.392), 7.2(0)OTT(0.5)
Bug Id:
CSCut68515
Title:
SSTE: multiple port-profile cores with 7.2(0)D1(0.456) on autoconfig
Description:

$$IGNORE

Symptom:
port-profile crash & switch hap reset.

Conditions:
auto config

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(0.456), 7.2(0)D1(0.490)
Known Fixed Releases:
7.0(0)HSK(0.474), 7.1(0)AV(0.81), 7.2(0)D1(0.499), 7.2(0)D1(0.506), 7.2(0)D1(0.509), 7.2(0)D1(1), 7.2(0)ZD(0.188), 7.2(1)PIB(0.14), 7.3(0)D1(0.21)
Bug Id:
CSCuu02941
Title:
linecard crashing due to clp_fwd hap reset
Description:

Symptom:
N7K-SM-NAM-K9 and LCs with less than 12 instances of Clipper will have their clp_fwd process crash when the system has Fex with L2 mcast is active. I.e. when the Fex ports are flapped or when the LC itself is reloaded, then clp_fwd will crash.

Conditions:
The issue happens when we boot the module on 6.2(10)

Workaround:
None

Further Problem Description:
l2mcast assumes that in every line card 12 Forwarding instances are available. With this assumptions, when it sends a message to clp_fwd driver, the clp_fwd driver does not handle this error correctly. Hence, crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.43), 6.2(14)FB(0.47), 7.1(0)AV(0.81), 7.2(0)D1(0.494), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.176), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCus94535
Title:
SNMP crash during OIR of transceiver and walk ciscoEntitySensorMIB
Description:

Symptom:
SNMP may crash on a Nexus 7000 switch during OIR of 1G, 10G, 40G DOM capable transceiver.

Conditions:
Process snmpd dumps core when the following steps are met:
1. SNMP walk CISCO-ENTITY-SENSOR-MIB when a DOM capable transceiver is inserted.
2. Remove the DOM capable transceiver
3. SNMP walk CISCO-ENTITY-SENSOR-MIB again

Workaround:
1. Insert any transceiver back to the port
2. Once snmpd crashed, the newly started snmpd will not have the issue
unless the steps described in "Conditions" happen again.
3. Disable SNMP walk for CISCO-ENTITY-SENSOR-MIB

Further Problem Description:
Problem exists in 6.2(12) only.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.3), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.352), 7.2(0)VZD(0.6)
Bug Id:
CSCuu27816
Title:
IPv6 prefixes of OSPFv3 interfaces not present in intra-area-prefix LSA
Description:

Symptom:
IPv6 prefixes of interfaces part of OSPFv3 not present in intra-area-prefix LSA.

Conditions:
Interfaces without adjacency can run into this problem after interface flap or VDC reload

Workaround:
Use "redistribute direct" instead of configuring the interfaces in OSPFv3 if possible.

Further Problem Description:
Recovery is via clear ospfv3 neighbors.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.0(0)HSK(0.474), 7.1(0)AV(0.81), 7.2(0)D1(0.511), 7.2(0)D1(1), 7.2(0)N1(0.209), 7.2(0)N1(1), 7.2(0)ZD(0.191), 7.2(0)ZN(0.209), 7.2(1)PIB(0.14)
Bug Id:
CSCut49944
Title:
sw reload would put range of private-vlan are STP blocked state
Description:

Symptom:
sw reload its observed that range of private-vlan are STP blocked state

Conditions:
sw reload its observed that range of private-vlan are STP blocked state

Workaround:
workaround : realod of LC

Further Problem Description:
sw reload its observed that range of private-vlan are STP blocked state

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(14)FB(0.72), 7.2(0)D1(0.444)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCuu10841
Title:
NXOS RPM crash due to the CLI "show ip prefix-list | xml"
Description:

Symptom:
%SYSMGR-2-SERVICE_CRASHED: Service "rpm" (PID 4664) hasn't caught signal 11 (core will be saved).

Conditions:
In NXOS code 6.2.(12), running CLI "show ip prefix-list | xml" will cause RPM crash in case the prefix-list is not existing.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E6, 6.2(13.3)S0, 6.2(14)FB(0.57)
Bug Id:
CSCut96140
Title:
6.2.12: L2 port channels not programmed correctly in LACP INDI
Description:

Symptom:
Port configured as LACP individual mode.

ELTM does not have the PC member in the database after port becoming part of port-channel.

"show system internal eltm info interface port-channel xyx" does not contain all the PC members.

Conditions:
L2 port-channel with LACP Individual mode

Workaround:
Flap port-channel members which is not added to the PC member

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E5, 6.2(13.3)S0, 6.2(14)FB(0.36), 7.1(0)AV(0.74), 7.2(0)D1(0.485), 7.2(0)D1(1), 7.2(0)ZD(0.167), 7.3(0)RTG(0.17)
Bug Id:
CSCut43602
Title:
NXOS/VLAN: VLAN_MGR crash when large size of ranges are used in config
Description:

Symptom:
vlan_mgr continue crash due to heartbeat failure during system boot (or VDC boot)

Conditions:
Problem happen only when string length of the vlan range in vlan configuration is larger than 4096 (including commas and dash in configuration)

Workaround:
Reduce vlan range such that the vlan representation string is size smaller than 4096

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.22), 7.0(3)I1(1.226), 7.0(3)I1(2), 7.0(3)IX1(1.93), 7.0(3)IX1(2), 7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)D1(1), 7.2(0)PDB(0.381)
Bug Id:
CSCup66750
Title:
BGP routes not advertised after "default address-family ipv4/6 unicast"
Description:

Symptom:
Nexus 7k running with version 6.1.5 and 6.2.8 stops advertising the routes to neighboring peer as soon "default address-family ipv4/6 unicast" is issued under the neighbor statement.

router bgp xxxx
csw06d.lla1(config-router)# neighbor 10.46.177.47
csw06d.lla1(config-router-neighbor)# default address-family ipv6 unicast
csw06d.lla1(config-router-neighbor)# default address-family ipv4 unicast

end

Conditions:
Happens only when "default address-family ipv6 unicast" is issued under the neighbor statement for BGP.

Workaround:
Clear ip bgp soft * resolves the issue.

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.1(5)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.39), 7.0(3)I2(0.406), 7.0(3)I2(1)
Bug Id:
CSCut21667
Title:
MIM header for F2 F2E F3 vdc type needs to be stripped
Description:

Symptom:
Arp is incomplete for hosts on F3 LC
Control plane pkts going from fex connected hosts to CPU maybe dropped and not reaching SUP.

Conditions:
VDC is F2, F2E and F3 vdc type , but there is no F2 line card in vdc or chassis at all.
Have more number of links as part of port-channel towards Fex (FPC) than per port-channel towards host (HIFPC).

Workaround:
Flap Fabric port-channel and configure less or equal number of links in FPC as compared to the HIFPC.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.17), 7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)D1(1), 7.2(0)PDB(0.375), 7.2(0)VOF(0.2)
Bug Id:
CSCut50838
Title:
M2 VLAN Translation Not Translating Non-Native VLAN BPDUs
Description:

Symptom:
Ingress non local VLAN BPDUs are dropped as "igr ifc: total pkts dropped due to cbl? and egress BPDUs are not tagged with translated VLAN causing both devices to see them self as spanning-tree root for translated VLAN

Conditions:
When VLAN translation is configured on N7K-M224XP-23L

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65)
Bug Id:
CSCut06258
Title:
F1 card MTM misprogramming on "VLAN UP/Down" event
Description:

Symptom:
MAC are not learned in HW on F1 card. From SUP , show mac address-table shows correct info, but show hardware mac address-table X for module X - is incorrect.
Affects on per VLAN/per port-pair basis (e.g. port-pairs are : 1,2 ; 3,4; ... 31,32. and some of them may stop learning MACs on some of the VLANs)
This lead to Unknown Unicast Flood scenario

Conditions:
shut/no shut of VLAN on a busy system (especially on many VLANs simultaneously). Removing and adding many VLANs at once.

Workaround:
Reload affected module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.21), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.493), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.175), 7.3(0)IB(0.19)
Bug Id:
CSCus54220
Title:
Service not responding when attaching ACLs to many SVIs at the same time
Description:

Symptom:
This was found when verifying CSCur31394. Service not responding followed by router crash occurs when applying ACLs to many SVIs at the same time. (1000 SVIs and 140 port-channels) Details are shown in the attached log.

Conditions:
This happened when ACL is applied to large number of SVIs.

Workaround:
Apply ACL config in smaller chunks, for example:

interface vlan 1-100
ip access-list X

Further Problem Description:
Is it a duplicate of CSCur31394?
Probably not.
it might be moved to Aclmgr to either reduce the number or increase their memlimit.
It's not the same problem of CSCur31394, other than mem exhaustion.
But at a totally different point in code.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)S102, 6.2(12)FT(0.26), 6.2(12)S21, 6.2(12)S25, 6.2(12)S31
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.3), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(3)I1(1.213), 7.0(3)I1(2), 7.0(3)ISH1(2), 7.0(3)ISH1(2.13), 7.0(3)IX1(1.93)
Bug Id:
CSCus99375
Title:
OTV crashes with vlan process in crash core
Description:

Symptom:
OTV crashes with vlan process in crash core

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(8.1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.63)
Bug Id:
CSCun50901
Title:
Service (FEX) "satctrl" (PID 1723) hasn't caught signal 9 (no core)
Description:

Symptom:
N7K FEXs might crash with below errors without save core dump

2014 Mar 3 08:18:25 DALS_SW1_C7009_MDF-Production SYSMGR-FEX109-3-BASIC_TRACE core_copy: PID 1476 with message Core not generated by system for satctrl(0). WCOREDUMP(9) returned zero .
2014 Mar 3 08:18:25 DALS_SW1_C7009_MDF-Production SYSMGR-FEX109-2-SERVICE_CRASHED Service (FEX) "satctrl" (PID 1723) hasn't caught signal 9 (no core).
2014 Mar 3 08:18:25 DALS_SW1_C7009_MDF-Production SYSMGR-FEX109-2-HAP_FAILURE_SUP_RESET System reset due to service "satctrl" in vdc 1 has had a hap failure

Conditions:
normal operation but signal 9 might be related to memory leak. memleak would be a separate issue and need root cause to confirm.

Workaround:
unknown at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(0)FH(0.152), 6.2(0)HS(0.10), 6.2(10), 6.2(10)EC(0.23), 6.2(10)FM(0.20), 6.2(10)NO(0.19), 6.2(8), 6.2(8)S16, 6.2(8.3)S0, 6.2(9)FM(0.53)
Bug Id:
CSCut14381
Title:
Inproper 16 way ECMP hasing with IPv6 traffic
Description:

Symptom:
Traffic for the destination which is reachable via IPv6 ECMP with unresolved paths will experience traffic loss.

Conditions:
IPv6 adjacency for some of the ECMP next hop is in unresolved state

Workaround:
Execute the command "ping6" for each of the affected IPv6 ECMP next hop to get the ECMP next hop in resolved state.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)S102, 7.2(0)D1(0.493)
Known Fixed Releases:
6.2(10)E7, 6.2(12)E1, 6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.8), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCut13349
Title:
EIGRP hap reset seen on primary vpc+ switch with Janjuc build 111
Description:

Symptom:
This issue is seen on L3 over Fabricpath testbed. N64P switches are vpc+ peers. P2 is primary and P1 is secondary.

Fwm reset happened on P1 (vpc secondary) and switch went for a reload. All the L3 protocols between P1 and P2 went down. Around 3 minutes later primary vpc switch (P2) went down due to eigrp hap reset.

No triggers executed this time. Switch was left idle with traffic on for around 12 hours. Then the fwm crash was seen on secondary switch and few minutes later eigrp hap reset was seen on primary vpc+ switch.

Conditions:
Eigrp hap reset seen

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(0.409), 7.2(0)N1(0.111)
Known Fixed Releases:
7.0(0)HSK(0.474), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)N1(0.213), 7.2(0)N1(1), 7.2(0)ZD(0.194), 7.2(0)ZN(0.213), 7.2(1)PIB(0.14)
Bug Id:
CSCug39011
Title:
N7K: F2 may reset in case of receiving excessive error frames
Description:

Symptom:
A faulty F2 module may cause resetting other multiple F2 modules
within the chassis.

Conditions:
very rare condition. the faulty F2 module may send out excessive error
frames to other F2 modules.

Workaround:
Module reload to recover. Isolate the faulty module and remove from the chassis.=

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.2(10)E7, 6.2(10)E8, 6.2(13.3)S0, 6.2(14)FB(0.34), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.2(0)D1(0.482), 7.2(0)VZD(0.26), 7.2(0)ZD(0.162), 7.3(0)RTG(0.17)
Bug Id:
CSCut06852
Title:
N7K - BGP using set metric-type internal under RM not triggering update
Description:

Symptom:
The 'set metric-type internal' route-map configuration command causes BGP to advertise a MED that corresponds to the IGP metric associated with the next hop of the route

This command doesn't work properly in 6.1(4a), 6.2(12)

Whenever that command is applied to an BGP peer and there is change in the IGP cost of multiple ECMP in sequence, we don't always send an update to the peer with the new cost, so the eBGP neighbor is left with the old incorrect MED.

Conditions:
eBGP peering using an outbound route-map with 'set metric-type internal' and IGP cost change on multiple interfaces (ECMP) in sequence, ie

configure terminal
interface Eth1/1 ; ip ospf cost 1000
...
interface Eth1/8 ; ip ospf cost 1000
end

--
N7K# show ip bgp 10.39.176.0/21
10.38.0.5 (metric 1000) from 10.38.0.5 (10.38.0.5) << metric 1000 from above change IGP
Origin IGP, MED not set, localpref 100, weight 0
--
eBGP-peer# show ip bgp
Network Next Hop Metric LocPrf Weight Path
*>e10.39.176.0/21 100.65.97.64 2001 0 64801 i <<< metric 2001 is not refreshed
--

Workaround:
Use interface range:

configure terminal
interface Eth1/1 - 8
ip ospf cost 1000
end

Further Problem Description:
Note a soft bgp reset will trigger an update with correct MED

N7K# clear ip bgp 100.65.97.65 soft out

eBGP-peer# sh ip bgp
Network Next Hop Metric LocPrf Weight Path
*>e10.39.176.0/21 100.65.97.64 1000 0 64801 i <<< metric 1000 correct

This bug is fixed from 6.2(14) onwards in 6.2 release.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.1(4a), 6.1(4a)E1, 6.2(12), 7.2(0)D1(0.406)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.25), 7.0(3)I1(1.211), 7.0(3)I1(2)
Bug Id:
CSCuu93248
Title:
IPFIB core due to SW index leak in MFIB for F3 modules
Description:

Symptom:
On a nexus 7000/7700 series switch, ipfib service may reset on a linecard as indicated by the following log in the main vdc :
%SYSMGR-SLOT4-2-SERVICE_CRASHED: Service "ipfib" (PID 1200) hasn't caught signal 6 (core will be saved).

Conditions:
This can possibly be seen when there has been a significant number of adjacencies updates on the system.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.79)
Bug Id:
CSCur22627
Title:
6210::Seeing EIGRP flap after SSO with authentication
Description:

Symptom:
EIGRP neighborship flap after SSO due to Auth failure on the peer

Conditions:
EIGRP authentication is configured on the interface

Workaround:
Disable authentication

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)S98, 6.2(10)S99, 7.1(0)ZD(0.95)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.44), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)ES(0.7), 7.1(0)SIB(99.92), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.392)
Bug Id:
CSCue11653
Title:
LC Reset due to LM_INT_CL1_TCAM_B_PARITY_ERR or LM_INT_L3_TCAM_PARITY
Description:

Symptom

All the below three symptoms should be seen.

1. SYSMGR-SLOT8-2-SERVICE_CRASHED: Service "lamira_usd" (PID 1944) hasn't caught signal 6 (core will be saved).

2. In "show logging onboard mod 2 exception-log"

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <----- this should be 1
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description : LM_INT_CL1_TCAM_B_PARITY_ERR <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)


or

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <---------- this should be '1'
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description :LM_INT_L3_TCAM_PARITY <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)

3. Attach to linecard, and check this.

show logging onboard internal lamira

You will see something like this below.


ACLQOS: STAT Register Scan - No Correctable Error Found

or

IPFIB: STAT Register Scan - No Correctable Error Found


If all the above are seen the issue is that software reset the linecard due to an error in handling parity interrupt.

Symptom:

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
5.1(5), 6.0(4), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S59, 5.2(9)S60, 5.2(9)S66, 5.2(9.107)S0, 5.2(9.115)S0, 5.2(91.1)S0, 6.1(4), 6.1(4)S3, 6.1(4)S5
Bug Id:
CSCut28707
Title:
stale/no MAC on Hw of F1 as FE not programmed on MTM due to DFTM
Description:

Symptom:
Unicast flooding or traffic blackhole if the MAC is not programmed or programmed with wrong index respectively.

Conditions:
F1 module.

Workaround:
remove the affected ports from PC and add it back.

or

reload module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.19), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.2(0)D1(0.493), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.175), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCua43329
Title:
N7k - sysmgr crash - Service (FEX) "lacp" without core file generated
Description:

Symptom:
A Nexus 2000 may crash when is receives a PDU larger than it expects.
Conditions:
This sill only be seen on a Nexus 2000 connected to a Nexus 7000. Nexus 2000
connected to Nexus 5000 are not effected.
Workaround:
None at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
5.2(4)FD(0.21), 5.2(6.7)S0, 5.2(7), 6.1(0)FE(0.17), 6.1(1)S21, 6.1(1.20)S0, 7.0(2)FIP(0.4), 7.1(0)FGI(0.3), 7.3(0)FH(0.2)
Bug Id:
CSCuu70292
Title:
N7000 iftmc crash after applying vacl redirect
Description:

Symptom:
IFMTC crash when applying VACL redirect when the port is down

Conditions:
VACL redirect applied in the port which is down.
or
After applying VACL redirect, reload LC of the redirected port.

Workaround:
Remove the VACL redirect and reload the LC
Bringup the port before applying the VACL redirect policy.

Before reload LC, the VACL redirect policy must be removed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.70), 7.2(0)D1(1.20), 7.2(0)ZD(0.226), 7.2(1)PGB(0.2)
Bug Id:
CSCus62502
Title:
OTV Tunnel Depolarization causes traffic loss when some tunnels are down
Description:

Symptom:
if OTV Tunnel Depolarization is implemented, traffic will be dropped when several OTV tunnels down

Conditions:
none

Workaround:
none

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.63)
Bug Id:
CSCuu53826
Title:
MPLS QoS : not enough memory after vdc suspend/resume
Description:

Symptom:
*With more 50% of aggregate policer usage and subinterface configuration, an vdc reload or suspend/resume event will trigger this issue.

Conditions:
*vdc suspend
no vdc suspend
reload vdc

Workaround:
*reload the module.

Further Problem Description:
*

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65)
Bug Id:
CSCut36425
Title:
F3 in FP transit mode - All traffic drop due to ports in CE mode
Description:

Symptom:
All traffic is dropped on whole LC for various reasons - CBL drop, MIM on edge port etc - depending on interface configuration.

Conditions:
Issue can only on VDC/device in FabricPath in transit mode "fabricpath mode transit"
After removing the port-channel from the VPC configuration, the configuration is not wiped out in the LC.
Later when the Port-channel is used for any non-VPC configuration traffic is dropped.

Workaround:
Option 1 : Reload affected module
Option 2: Delete port-channel after making it non-VPC and then add the port-channel.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)D1(1), 7.2(0)PDB(0.382)
Bug Id:
CSCus91417
Title:
Nexus 7000 fails to trasmitt RSTP BPDUs consistently
Description:

Symptom:
STP Instability in layer 2 domain with N7K (Rapid PVST)

Conditions:
unknown

Workaround:
enable peer-switch if N7K is the root to mitigate this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12)S33
Known Fixed Releases:
6.2(12)E1, 6.2(13)FM(0.52), 6.2(13)GS(0.13), 6.2(13.1)S0, 6.2(13.3)S0, 6.2(14)FB(0.21), 7.1(0)AV(0.74), 7.2(0)D1(0.453), 7.2(0)D1(1), 7.2(0)PDB(0.378)
Bug Id:
CSCuu38580
Title:
7.2.0.506.S2 UI - congestion on F2 LC after vdc reload
Description:

Symptom:
Applicable to all F2 (Clipper/Clipper CR) based cards.
Congestion seen on ingress traffic on some/all of the ports. This is because, frames are stuck in the IB caused due to bad acos to ccos table.

To confirm if the issue is due to bad table, please compare the acos to ccos mapping in the below commands

show hardware internal qengine inst x vq acos_ccos_4cl/acos_ccos_8cl
compare it with the ccos mapping in
show hardware internal qengine inst x table fr_dcx4q_oq_ccos/fr_dcx8q_oq_ccos

if the acos to ccos mapping are different, then the Credit Loop logic will affected and frames will be stuck in the IB resulting in congestion on the ingress ports.

Conditions:
Do ISSU and then VDC reload (VDC containing ports from F2 LC).

This is because, the shadow memory in our Qengine driver was corrupted during ISSU and VDC reload causes a shadow refresh to the HW.

Workaround:
Workaround1(preferred as less traffic interrupt):
Copy the Applied network QoS Template:
1) find the applied tempalte
show policy-map system

Type network-qos policy-maps
============================
policy-map type network-qos default-nq-8e-policy template 8e
class type network-qos c-nq-8e
match cos 0-7
congestion-control tail-drop threshold burst-optimized
mtu 1500

2) Copy:
qos copy policy-map type network-qos default-nq-8e-policy prefix Copy_

3) Apply Ciopy to trigger reporgramming:
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos Copy_nq-8e

4) Optional: Reapply back the previous template
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos default-nq-8e-policy

Note: Applicable for any networkqos template. During Template Change traffic on All VDC which contain F cards will be disrupted for less than a Second

Workaround2: reload the LC after ISSU or
Workaround3: reload the LC after VDC reload

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases:
7.0(0)HSK(0.474), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.202), 7.2(1)PIB(0.14)
Bug Id:
CSCut75457
Title:
HSRP VACL Filter Broken
Description:

Symptom:
HSRP hello is passing through device with VACL in place to drop these packets.

Conditions:
6.2(10) or 6.2(12)

Workaround:
None.

Further Problem Description:
This behavior is seen in 6.2(10) and 6.2(12). It is not seen in 6.2(8b).


A similar issue relating to PACL filtering HSRP packets fixed in 6.2(12): CSCur69114

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.66)
Bug Id:
CSCut57953
Title:
N7K "ipfib" process crash
Description:

Symptom:
N7K line card crash with "ipfib" core file generated.

Conditions:
crash observed on N7K running ospfv3 on 6.2.12 code

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.58)
Bug Id:
CSCut19573
Title:
some vpc portchannels are not up upon RAX config
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger. Extented fix for CSCus90226

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)E2
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.11), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.442), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.368), 7.2(0)VOF(0.2)
Bug Id:
CSCut23557
Title:
N7K platform: netstack crash while saving tech-support in bootflash
Description:

Symptom:
The netstack process on a Nexus 7000 switch running 6.2(8a) may unexpectedly crash while collecting a 'show tech' and redirecting it to bootflash

Conditions:
saving tech-support in bootflash

Workaround:
please do not save "show-tech" to bootflash.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8a)S2
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.28), 7.0(0)HSK(0.433), 7.2(0)D1(0.479), 7.2(0)D1(1), 7.2(0)ZD(0.159), 7.3(0)RTG(0.17)
Bug Id:
CSCus49797
Title:
Inter-Op BGP issue between N7K and juniper device
Description:

Symptom:
6PE BGP peering establishes. After that, Juniper device sends a notification message saying that Cisco Nexus sent a non-negotiated IPV6 unicast update packet and tears down the BGP session.

Conditions:
6PE BGP session between N7k and Juniper device.

Workaround:
No known workarounds.

Further Problem Description:
The IPv6 unicast packets sent by NX-OS are due to backwards compatibility with legacy IOS devices.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(8b)
Known Fixed Releases:
6.2(12)E4, 6.2(13.3)S0, 6.2(14)FB(0.19), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.0(3)I1(1.211), 7.0(3)I1(2), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422)
Bug Id:
CSCuu09362
Title:
OTV VLAN not extended after VLAN is removed from the overlay and SSO
Description:

Symptom:
VLAN can not be extending over overlay after the VLAN is removed prior to SSO.

Conditions:
When a VLAN is removed from the overlay, copy run start vdc-all is entered and a supervisor switchover is performed, the VLAN that was removed can not be added back to the overlay.

Workaround:
Reload OTV VDC

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.63)
Bug Id:
CSCur05565
Title:
Traffic loss for intermittent source as rcvr PE does not rejoin data MDT
Description:

Symptom:
Traffic blackhole for intermittent source

Conditions:
1. Data MDT configured
2. Intermittent Source (source starts/ stops for few minutes/ starts again)

Workaround:
Stop traffic and joins and wait for routes to time out before restarting again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)S77
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.64), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)AV(0.38), 7.1(0)D1(0.293), 7.1(0)EV(0.116), 7.1(0)EVN(0.18), 7.1(0)N1(0.367)
Bug Id:
CSCuu13344
Title:
Rackspace - pixmc crash and M2 LC - communication failure
Description:

Symptom:
During the HA switch over of the supervisors, the neighbor switch crashed with pixmc core.

Conditions:
have a M2 LC and more than 128 interfaces within a BD LTL.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(12)E5, 6.2(13.3)S0, 6.2(14)FB(0.46), 7.1(0)AV(0.81), 7.2(0)D1(0.496), 7.2(0)D1(1), 7.2(0)ZD(0.178), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCuq39448
Title:
Nexus EIGRP crash when distribute list is configured under interface
Description:

Symptom:
A Nexus 5000, 6000, or 7000 switch may reload unexpectedly due to an EIGRP process crash. Reset reason will look similar to the following:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 306358 usecs after Wed Sep 3 04:32:21 2014
Reason: Reset triggered due to HA policy of Reset
Service: __inst_001__eigrp hap reset
Version: 7.0(2)N1(1)

Conditions:
This crash can be hit when a distribute-list is configured on a physical interface or SVI. It will occur when a new neighborship is formed on that interface.

Workaround:
No known workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.17), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZN(0.693), 7.0(3)I2(0.414), 7.0(3)I2(1), 7.0(6)N1(0.202), 7.0(6)N1(1), 7.1(0)D1(0.253)
Bug Id:
CSCus74176
Title:
boot loop w/ 'no logging logfile' in config w/ power outage/reload VDC3
Description:

Symptom:
core dump generated in boot loop when sudden power outage such as unplug power cord. soft reload worked fine. issue can be recreated with reload VDC 3

Conditions:
suddenly lost power when the command 'no logging logfile' is in the configuration

Workaround:
Remove 'no logging logfile' from the configuration

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
6.2(10), 7.2(0)D1(0.430)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.40), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.443), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.379), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCut18721
Title:
gbr_422: urib core at urib_chlist_segv_handler
Description:

Symptom:
urib crashes and since it is not restartable, the crash will result in reload of the switch in single SUP scenario or will result in SSO when dual SUP is present.

Conditions:
Inter VRF case where routes in one VRF are pointing to next hops in different VRF.

Workaround:
no workaround

Further Problem Description:
This issue mainly happens when routes are being flapped in large scale by BGP due to multiple restart or some other reasons or repeated execution of "clear ip route *".

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.444)
Known Fixed Releases:
6.2(10)E8, 6.2(12)E1, 6.2(13.3)S0, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)D1(0.451), 7.2(0)D1(0.463), 7.2(0)D1(0.479)
Bug Id:
CSCtq89240
Title:
Packets destined to the VDC MAC may be dropped by F1 module on N7K
Description:

Symptom:
On the n7k packets destined to the VDC MAC may be dropped when received on a F1 module.

Conditions:
N7k with F1 module. Packets destined to the VDC MAC will be dropped under the following conditions:
- no SVI present or admin down
- packets received on the F1 module

Likely scenarios to see this condition include:
- transparent firewall bridging
- hair pinning traffic
- L2 load balancers

Workaround:
Configure the SVI(s) with a user-configured mac address rather than using the default VDC MAC.

This problem is isolated to the F1 module regardless of the NXOS version of code.

This workaround is not applicable to FabricPath deployment as in FabricPath VLANs user SVI's inf F1 card go to RMM table due to CSCtc39594. Thus if transparent bridging has to be done with FP, workaround has to configure 32 user SVI's to fill up RMM table and continue with desired user SVI which will go to Mac table.


Are the HSRP/VRRP/GLBP virtual MAC addresses also inserted into the RMM table?
1) If yes, will we have same impact and drop packets if bridged through the FW (when packets arrive on F1 port that does not have the SVI)
No HSRP/VRRP/GLBP are not inserted in RMM. You will not have this issue for any other macs other than svi macs.

2) If HSRP vMAC is not in the RMM table, how does the F1 module know the packet has to be routed?
It is through mac table. G bit set will indicate routing has to be done.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
5.1(3), 6.2(6a)
Known Fixed Releases:
Bug Id:
CSCuu68734
Title:
NVT: L3 oif DEL and ADD after SSO
Description:

Symptom:
Timing out L3 IGMP oif's of a multicast flow on VxLAN L3 gateway.

Conditions:
Supervisor Switchover on Vxlan Gateway which is the only Gateway having connected hosts receiving traffic for this flow.

Workaround:
Increasing IGMP robustness to 3 on L3 Vxlan Gateway.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCut44076
Title:
ISSU from 628/6212 to GBR:HMM-3-AUTO_CONF_PROFILE_ERROR
Description:

Symptom:
HMM-3-AUTO_CONF_PROFILE_ERROR: hmm [16977] Data Snooping Host: Unable to find mapping for encap 31 on interface Ethx/y/z

Conditions:
Enable "feature-set fabric and feature vni after ISSU from 62x to GBR. Both of them must be enabled. If only one of them enabled, then issue not seen. Seen only with private-vlan pairs.

Packet start coming on secondary vlan , but since dhcp relay is configured only on primary vlan, it fails.

Delete secondary vlan, but primary vlan is pointing to a secondary vlan. Dhcp doesn't work at all for primary vlan since pktmgr sending packet on secondary vlan which is not present.

Workaround:
Try in the following order. If one doesn't work, move on to the next.

1) Disable one or both features (feature-set fabric or feature vni).
2) Delete secondary vlan and then recreate secondary vlan.
3) Delete and recreate the pvaln primary and secondary vlans.
3) "copy r s" switch reload.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
7.2(0)D1(0.441)
Known Fixed Releases:
Bug Id:
CSCut01933
Title:
default route not withdrawn after removing "default originate"
Description:

Symptom:
Default route will not be withdrawn from vpnv4 table.

Conditions:
Multiple [no] default-originate command toggles being configured in addess-family vpnv4. More especifically, the following steps are the minimum required to hit the issue considering the vpnv4 unicast address-family is clean of any configurations:

1. default-information originate always rd route-target
2. no default-information originate always rd route-target
3. default-information originate always rd route-target
4. no default-information originate always rd route-target

Step 3 must be executed quickly after number 2. In this case, after executing step 4, the issue will be seen.

Workaround:
Restart BGP.

Further Problem Description:
The problem will only happen if you reconfigure default-originate quickly after previously removing it, such that there was no time to completely clean up the default-route from the vpnv4 table.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(2)N1(0.554), 7.1(2)ZD(0.9), 7.1(2)ZN(0.13), 7.2(0)D1(0.451), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(1)
Bug Id:
CSCuu72286
Title:
ThReloading VDC has a timeout issue with scale configuration
Description:

Symptom:
Reloading non-default VDC with Rackspace's scale configuration causes vdc timeout.

Conditions:
Using Rackspace's scale configuration.

Workaround:
Working on it.

Further Problem Description:
The problem happen when the non-default VDC is reloaded.

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(12)E5
Known Fixed Releases:
Bug Id:
CSCup20959
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:NXOS versions prior to 6.2(10)

Workaround:None

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.1(4), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10.16)S0, 6.2(8)E10, 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)EV(0.116), 7.1(0)OTT(0.45), 7.1(0)PDB(0.241), 7.2(0)D1(1)
Bug Id:
CSCuu84358
Title:
N77/F3/MPLS: mcast traffic drop 6-8 secs after SSO
Description:

Symptom:
traffic loss is seen after SSO

Conditions:
SSO is performed, traffic outage is seen for a very short duration and then recovers

Workaround:
no workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu72468
Title:
UDLD-4-UDLD_SFP_TYPE_CHANGED: User changed SFP type from fiber to copper
Description:

Symptom:
Switch may report below message when interface comes up although no changes are made:

%UDLD-4-UDLD_SFP_TYPE_CHANGED: User changed SFP type on Ethernet7/6 from fiber to copper, default udld port configuration was applied, 'copy running-config startup-config' recommended

Conditions:
Linkflap seems to trigger this message.

Workaround:
No known workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCut98473
Title:
PortLoopback test fails following EOBC congestion
Description:

Symptom:
After seeing EOBC congestion in some rare circumstances it is possible to starting seeing false Gold port loopback failures

/* example of EOBC congestion */

2015 Apr 13 18:07:43 iad7-ws-dis-r2 %MODULE-4-MOD_WARNING: Module 18 reported
warning due to EOBC heartbeat failure in device DEV_EOBC_MAC (device error 0xc0a09145)

/* example of the false errors */

2015 Apr 13 18:07:43 iad7-ws-dis-r2 %MODULE-4-MOD_WARNING: Module 18 reported warning due to EOBC heartbeat failure in device DEV_EOBC_MAC (device error 0xc0a09145)

Conditions:
Problem occurs after heavy EOBC congestion and link flapping

Workaround:
To recover from the issue you can reload the affected LC

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
Bug Id:
CSCuu57637
Title:
FCOE traffic is dropped at FEX FPC if storage vdc is created after ISSU
Description:

Symptom:
CRC giant-drops(ingress_giant_drops) seen on fex FPC ports on any qos template change after issu.

Conditions:
after issu if you do any qos template change and if you have fex in your setup, you will see MTU mismatch resuling in giant/CRC drops in the ingress of FPC ports.

Workaround:
configure/change qos template before issu.
or
shut/no-shut on fex FPC ports to reconfigure the mtu

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
7.2(0)D1(0.514)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.205), 7.2(1)PIB(0.14)
Bug Id:
CSCtz65462
Title:
broadcast get dropped on F2, learning source broadcast frame
Description:

Symptoms:
ARP requests and other Layer 2 traffic with a broadcast destination address is NOT flooded to all ports on the same VLAN.
In addition to that, the following message may be seen on the device logs:

%MTM-SLOT3-2-MULTICAST_SOURCE_MAC_LEARNT: Inserted dynamically learnt multicast source mac ff:ff:ff:ff:ff:ff!

Conditions:
Upon receiving a Layer 2 frame with a broadcast source address (FFFF.FFFF.FFFF), the F2 line card will learn and add this address to its hardware
table. Having this entry on the hardware table, Layer 2 traffic with a broadcast destination address (such as ARP requests) will be dropped on the
Nexus 7000 device because the ingress controller fails to flood it to the broadcast domain.

Workaround:
Clear the entry from the dynamic MAC address table by executing the following command from a privileged EXEC prompt:

clear mac address dynamic vlan x address ffff.ffff.ffff

Replace ''x'' with the appropriate VLAN number.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-3048 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
6.1(0.307)S0, 6.1(1)S23, 6.1(1.22)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCuu55233
Title:
Mac addresses not learnt after Port-security violation stops
Description:

Symptom:
On a Nexus 7700 mac addresses are not learnt on an interface after port-security violation happens and then stops.

Conditions:
This issue has currently been observed on Nexus 7700 with F3 module running on 6.2(12).
Issue only happens after max. mac address violation occurs and then stops.
shut/no-shut of interface does NOT recover mac-learning.

Workaround:
Default-interface and reconfiguring interface fixes the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.70)
Bug Id:
CSCuu76634
Title:
CFS process crash with Eth and IPv4 distribution configured in VPC setup
Description:

Symptom:
CFS process my crash if running:

- cfs ipv4 distribute
- cfs eth distribute

This configuration is not supported on Nexus 7000 with VPC configuration

Conditions:
If both IPv4 and Eth distribution are configured for CFS

Workaround:
Remove unsupported configuration, IPv4 is not required.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(6b), 7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu37319
Title:
F3:QoS Policer is inconsistent in policing traffic to the desired rate.
Description:

Symptom:
Traffic policing applied on a vlan is not providing the desired policing rate.
The actual traffic rate through the vlan with policing in place could be higher or lower than the configured limit.

Conditions:
issue seen on F3/6.2.8a

Workaround:
Remove and reapply the service policy on the vlan may work.
if it does not then please reach out to TAC for further troubleshooting

Further Problem Description:
Any subsequent member addition/deletion operation from a VLAN or a port-channel is triggering this problem.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.62)
Bug Id:
CSCus55589
Title:
NX-OS IS-IS Net Command
Description:

Symptom:
n7k-3a-wnlb-dcore-3a# conf t
Enter configuration commands, one per line. End with CNTL/Z.
n7k-3a-wnlb-dcore-3a(config)# router isis core
n7k-3a-wnlb-dcore-3a(config-router)# net 47.0124.0010.6301.0a00.0508.1103.2230.4100
^
% Invalid command at '^' marker.
n7k-3a-wnlb-dcore-3a(config-router)#

Conditions:
always present

Workaround:
adding 00 - but this is not accepted as it changes the area ID

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(12)E4, 6.2(13.3)S0, 6.2(14)FB(0.76), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.440), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCus44856
Title:
vdc-admin on N7K VDC can execute shell commands using tar
Description:

Symptoms:
Cisco Nexus devices running an affected version of Cisco NX-OS software contain a local privilege escalation vulnerability within the command line interpreter (CLI) that could
allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with user privileges.

The vulnerability exists due to insufficient input sanitization of parameters passed to the tar command on the CLI of an affected device. An attacker could leverage this behavior to
execute arbitrary commands on the underlying operating system with the privileges of the user authenticated to the device.

Conditions:
Cisco Nexus devices running an affected version of Cisco NX-OS software.

Workaround:
Not available.

Further Problem Description:

Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C

CVE ID CVE-2015-4232 has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.43), 6.0(2)A6(1), 6.0(2)U6(0.43), 6.0(2)U6(1), 6.1(2)I3(3.72), 6.1(2)I3(4), 6.2(12), 6.2(12)S21, 6.2(12.4)S0, 7.1(0)AV(0.74)
Bug Id:
CSCue79881
Title:
SNMP crashes on SNMP bulk get query
Description:

The SNMP process may crash with the following syslogs

%KERN-2-SYSTEM_MSG: mts_is_q_space_available_new():1416:Total mtsbuf size 10070872 for sap 28, exceeds limit 15 perc of 67108864 - kernel
%KERN-2-SYSTEM_MSG: mts_acquire_q_space() failing - no space in sap 28, uuid 26 send_opc 3176, pid 3616, proc_name sctpt_rx_thr - kernel
%KERN-2-SYSTEM_MSG: [sap 28][pid 4406][comm:snmpd] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 4406) hasn't caught signal 6 (core will be saved).

Symptom:
The SNMP process may crash with the following syslogs

%KERN-2-SYSTEM_MSG: mts_is_q_space_available_new():1416:Total mtsbuf size 10070872 for sap 28, exceeds limit 15 perc of 67108864 - kernel
%KERN-2-SYSTEM_MSG: mts_acquire_q_space() failing - no space in sap 28, uuid 26 send_opc 3176, pid 3616, proc_name sctpt_rx_thr - kernel
%KERN-2-SYSTEM_MSG: [sap 28][pid 4406][comm:snmpd] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 4406) hasn't caught signal 6 (core will be saved).

Conditions:
This has been observed when a monitoring device is using snmp-bulk-get requests on the entity-MIB for multiple FEX modules at one time. Also this can be observed if there is continuous
polling from multiple polling stations on slow mibs.

Even if FEX modules were not present if continuous snmpbulkwalk is getting done using multiple devices simultaneously on slow mibs for long time then it can happen.
Some mibs like qos mib, entity mib, entity-fru mib, bridge mib are little slow and continuous snmp bulk walk on these might affect.
To check if mts buffer size is increasing you can use
#show system internal mts buffers summary
and see notificaitons for sap 28 increasing.

Workaround:
Workaround(s):
Possible workaround is configuring the "no snmp-server counter cache enable" command. This command prevents SNMP bulk gets from getting cached via the use of MTS buffers. This will prevent the MTS buffers from getting consumed and resulting in a process crash. The result of the command is that the interface table might be slower to update the statistics (since caching is disabled). This is fixed in 5.2.9, 6.1.4 and in 6.2.1.

Note: This workaround is only available on Nexus 7000 switches.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
5.2(7), 5.2(7)S20, 6.1(1.66)S0, 6.1(3), 6.1(4)S17, 6.2(0.294)S11, 6.2(0.294)S12, 6.2(1.23)
Known Fixed Releases:
5.2(1)N1(5), 5.2(8g)S11, 5.2(9), 5.2(9)S53, 5.2(9.98)S0, 6.0(2)N1(2a), 6.0(2)U1(1)
Bug Id:
CSCuv05652
Title:
itd scale swover SAP 230 (iscm sap not respod)" and stby powerup forever
Description:

Symptom:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Conditions:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Workaround:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Further Problem Description:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(14)FB(0.79), 7.2(0)D1(1.20)
Known Fixed Releases:
Bug Id:
CSCut38574
Title:
Wrong EIGRP delay calculation
Description:

Symptom:
Two port-channels with different bandwidth are being populated in the routing table as equal-path. And two port-channels with same bandwidth are not both populated as equal-path in the routing table.

Conditions:
Using EIGRP with 40G links/port-channels.

Workaround:
We figure out the issue. The delay value is getting cached and we are no updating it on b/w change.
I will fix this issue.

The main thing is we need to update delay on bandwidth change. Or we need to flush it. So it will get updated with correct value
corresponding to updated bandwidth.

Work around:
That can be done with,
#SVS-N7K-C1-61# conf t
#SVS-N7K-C1-61(config)# interface port-channel 12
#SVS-N7K-C1-61(config-if)# ip delay eigrp 100 200000 << some random value
#SVS-N7K-C1-61(config-if)#no ip delay eigrp 100 200000

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.23), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCsv08579
Title:
TCP connections get stuck in FINWAIT1 state indefinitely
Description:


Symptom:


Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control
Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain
in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a
system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot
may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a
TCP three-way handshake with a vulnerable system.

In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash.
This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.


This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
Conditions:
See PSIRT Security Advisory.

Workaround
See PSIRT Security Advisory.

Further Problem Description:
See PSIRT Security Advisory.

PSIRT Evaluation:
Cisco has released free software updates that address this vulnerability.
Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.0(3)
Known Fixed Releases:
4.0(4), 4.1(1.51), 4.1(1.53), 4.1(3), 4.2(0.140), 4.2(1), 7.2(0)ZN(0.111)
Bug Id:
CSCuo57743
Title:
N7k-M108-12L LC Err-disabling ports with X2-10GB-ER after ISSU to 6.1.4a
Description:

Symptom:
Random Ports with non-cisco X2-10GB-ER ports go Error-disabled after ISSU upgrade to 6.1.4a

Conditions:
-- Issue so far only seen with non-cisco X2-10GB-ER SFP's plugged in M108 Module
-- Issue NOT seen in 5.1.5. Only after an ISSU upgrade to 6.1.4a

Workaround:
-- Reseating the SFP will temporarily bring the ports back up, until the next reload of LC.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.1(4a)E1
Known Fixed Releases:
Bug Id:
CSCuo15015
Title:
urib process crash on N7k
Description:

Symptom:
A N7k running 6.2(2a) crashed on the urib process

Conditions:
This is a corner case. With frequent binding and unbinding of dynamic saps during lots of parallel CLI command processing, q handle management may cause the system subject to this bug.

Workaround:
None. But reducing the number of parallel CLI commands being processed by an application may reduce the chance of this bug.

Further Problem Description:
Impact: Process can crash and will be re-started by HA.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(2a), 7.1(0)D1(0.179)
Known Fixed Releases:
6.0(2)A6(0.78), 6.0(2)A6(1), 6.0(2)U6(0.78), 6.0(2)U6(1), 6.1(2)I3(2.19), 6.1(2)I3(3), 6.2(10), 6.2(10)CM(0.10), 6.2(10)CM(0.9), 6.2(8)KR(0.8)
Bug Id:
CSCuq34116
Title:
N7K-F248XT-25E interfaces fail PortLoopback test and fail to initialize
Description:

Symptom:
Interfaces on an N7K-F248-XT-25E fail to initialize.

- Gaurdian is in stuck state.
- Shut / no shut of the interface does not help.
- Not easily reproducible.
- Once we reload the LC, issue goes away.
- So this is very rare and intermittent case.

Conditions:
N7K-F248-XT-25E running 6.2(x)

Workaround:
Reload the impacted line card

Further Problem Description:
The interface in question will fail the port loopback diagnostic test. However, if you were to check the exception log for the module you will see the following exception being raised for the interface:

n7k# sh module internal exceptionlog module 5
********* Exception info for module 5 ********

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 143
Device Name : Port-Client
Device Errorcode : 0xc8f0c269
Device ID : 143 (0x8f)
Device Instance : 12 (0x0c)
Dev Type (HW/SW) : 02 (0x02)
ErrNum (devInfo) : 105 (0x69)
System Errorcode : 0x42370069 GD link down
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/13
Error Description : send_exp_info: Operational param config failed in port client linkup handler port: 12 error 0x42370069
DSAP : 0 (0x0)
UUID : 323 (0x143)
Time : Wed Jul 9 09:43:16 2014
(Ticks: 53BD5504 jiffies)

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(2), 6.2(6), 6.2(6a), 6.2(6b), 6.2(8a)
Known Fixed Releases:
6.2(12)E6, 6.2(13.3)S0, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.2(0)D1(0.469), 7.2(0)D1(1), 7.2(0)PDB(0.394), 7.2(0)VZD(0.26)
Bug Id:
CSCut72641
Title:
L2BFD: some L2BFD links are not coming up after ascii replay
Description:

Symptom:
After write erase, reload and applying ascii configuration containing per-link port-channels with 2 members, only the 1st member will be added to the port-channel session. The second member will not get bootstrapped onto the port-channel session. This will seen randomly in some port-channels. On the peer, the same port-channel will have 2 members - the first in UP state and the second in DOWN state.

Conditions:
Problem is seen only when you do write-erase, reload and apply ascii config. The problem is timing dependent and is random.

Workaround:
Doing a shut and no-shut of the port-channel will recover it from the problematic state.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(0)D1(0.456)
Known Fixed Releases:
Bug Id:
CSCtb02431
Title:
tacacs crash on receiving malformed packets from tacacs server
Description:

Symptom:

Switch crashes when receiving malformed TACACS packets.

Conditions:

This has been observed on versions PRIOR to 4.2(1).

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(1)
Known Fixed Releases:
4.2(1), 4.2(1.44), 4.2(2)
Bug Id:
CSCus68473
Title:
urib crash after running "clear ip route vrf xxx *"
Description:

Symptom:
N7K running 6.2(8E10) crash on the urib process after clearing all routes in the VRF rib.

Conditions:
Clearing all routes in the RIB when there is high route count

Workaround:
Clear individual routes, instead of the entire table using *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(8)E10
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)D1(0.451), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(0.146), 7.2(0)N1(1), 7.2(0)PDB(0.387), 7.2(0)VOF(0.2)
Bug Id:
CSCus68892
Title:
N7K: assess GHOST vulnerability in glibc (CVE-2015-0235)
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Workaround:
Not available.

Further Problem Description:
A heap-based buffer overflow in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname* glibc function calls.

All previously released versionsand NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

NX-OS 7.0 release - is scheduled to be available in May 2015
NX-OS 6.2 release - first fixed release is 6.2(12) which is available on CCO

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(8), 5.2(9), 6.1(5), 6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S32, 6.2(12.3)S0, 6.2(12.4)S0, 6.2(13.1)S0, 7.2(0)D1(0.410), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.347)
Bug Id:
CSCup13175
Title:
SSTE: LDP core while doing SSO and LC reload
Description:

Symptom:
LDP process crashes during cleanup. This mostly happens during the clean-up stage, when user unconfigures LDP or interfaces used by LDP go down.

Conditions:
During cleanup, if two threads access/modify the same resource, LDP may crash.

Workaround:
There is no workaround for this fix.

Further Problem Description:
LDP uses cross-OS radix tree API which is not thread safe. Issue happens when one thread modifies the tree, while another is reading it, resulting in memory corruption and crash of LDP process.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(10)S82, 7.1(0)D1(0.151), 7.1(0)D1(0.188), 7.1(0)D1(0.196), 7.1(0)D1(0.228), 7.1(0)D1(0.240)
Known Fixed Releases:
6.2(10)E5, 6.2(13.3)S0, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.251), 7.1(0)D1(0.262), 7.1(0)N1(0.313), 7.1(0)N1(1)
Bug Id:
CSCui58446
Title:
M1/M2 module with F2E in same VDC suspends VLAN above 4040 reserved vlan
Description:

Symptom:
In a mixed chassis setup - M cards with F2E card in same VDC, on using any VLAN > 4040 , vPC will not come up.
SVI will remain down

Conditions:
M module with F2E in same VDC

Workaround:
remove any vlans above 4040

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(2)S30, 7.0(0)ZD(0.85)
Known Fixed Releases:
6.2(2a), 6.2(2a)S2, 6.2(5.45)S0, 6.2(5.7)S0, 7.0(0.51)S0, 7.1(0)D1(0.14), 7.2(0)D1(1)
Bug Id:
CSCuu87267
Title:
N7K:aclmgr crash seeen with logevity testing
Description:

Symptom:
Crash in the aclmgr process.

Conditions:
Only in 6.2.12.E5. ACLs applied on a tunnel interface that is a member of a port-channel.

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(12)E5
Known Fixed Releases:
6.2(12)E5
Bug Id:
CSCuu83574
Title:
Error in syslog of interface flap event after reload in remote server
Description:

Symptom:
This can occur when logging source interface loopback is configured with ipv6 address and logging server is configured.

Conditions:
This issue occurs in certain conditions when ipv6 address configured on loopback being used as logging source interface is in compact form:
ex:
1::1/64

Workaround:
Reconfigure the logging source interface with the loopback interface after reload.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.5), 7.2(1)N1(0.239), 7.2(1)N1(1), 7.2(1)ZD(0.5), 7.2(1)ZN(0.5)
Bug Id:
CSCte90369
Title:
File System Access
Description:

Symptoms:
A vulnerability exists in NX-OS which allows an authenticated, local attacker to read or write arbitrary files in volatile storage. A successful exploit could
allow the attacker to gain unauthorized access to sensitive files on the device, or to overwrite arbitrary files in volatile storage.

Conditions:
Devices running affected versions of NX-OS are vulnerable.

Workaround:
None

Further Problem Description:
This issue was discovered in internal security testing and has been resolved in all current versions of affected software.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.2/4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:P/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2011-4490 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(1)
Known Fixed Releases:
4.2(3)
Bug Id:
CSCuu84449
Title:
IGMP snooping entries ageout in AA FEX topologies
Description:

Symptom:
IGMP snooping entries are expiring after 5 seconds on one of the two vPC switches, while the entries are stable on the other vPC switch, which might cause traffic loss for 15-16 seconds (depending on the port-channel hashing result).

Conditions:
Issue can be seen in a vPC topology with AA FEX without having configured the IGMP snooping switch-querier (under "vlan configuration XYZ"), but when having PIM enabled SVI interfaces.

Workaround:
Configure IGMP snooping querier under the "vlan configuration XYZ" configuration mode.

or

Configure "ip igmp query-interval 30" under the SVI configuration mode.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.1(0)N1
Known Fixed Releases:
7.3(0)RTG(0.27)
Bug Id:
CSCus88425
Title:
pvlan configured ports error disabled iftmc: invalid argument
Description:

Symptom:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Conditions:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Workaround:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Further Problem Description:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Err

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(12), 7.2(0.2), 7.2(0.4)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65), 7.1(0)AV(0.74), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.454), 7.2(0)D1(1), 7.2(0)RTG(0.143), 7.2(0)VOF(0.2)
Bug Id:
CSCur00057
Title:
vdc-admin on N7K VDC can read other VDCs (and Admin VDC) config files
Description:

Symptoms:
Cisco Nexus devices running Cisco NX-OS software contain an information disclosure vulnerability within the command line interpreter that could allow an authenticated, local attacker to disclose the configuration
of a Virtual Device Context (VDC) to which they are not assigned.

The vulnerability exists due to a lack of path sanitization on a certain show command. An attacker assigned to the administrative role of a VDC could leverage this vulnerability to display the configuration of a VDC
to which they are not assigned.

Conditions:
Cisco Nexus devices running an affected version of Cisco NX-OS software

Workaround:
None.

Further Problem Description:

Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)S90, 6.2(10.16)S0, 7.1(0)AV(0.38), 7.1(0)D1(0.298), 7.1(0)EV(0.116), 7.1(0)OTT(0.41), 7.1(0)PDB(0.245), 7.1(0)RTG(0.62), 7.1(0)ZD(0.342)
Bug Id:
CSCus57051
Title:
Hsrp_Engine crash during ISSU from 6.2(8a) to 6.2.10
Description:

Symptom:
Failure recovery action::

"Standby will be rebooted to force netboot and image download".

Install has failed. Return code 0x4093005E (system switchover failed).
Please identify the cause of the failure, and try 'install all' again.

Conditions:
ISSU from 6.2(8a) to 6.2.10

Workaround:
Upgrade without ISSU

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(12)S27, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.1(2)N1(0.543), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.398), 7.2(0)D1(1), 7.2(0)N1(0.87)
Bug Id:
CSCup05444
Title:
Peer switch causes STP dispute through ASA
Description:

Symptom:
On a Nexus 7000 running peer-switch if you bridge two vlans with an ASA in transparant bridge mode the Nexus puts one of the vlans into spanning-tree dispute incorrectly

Conditions:
Nexus 7000 running peer-switch through an ASA.

Workaround:
Disable peer-switch or Spanning-tree on the port

Further Problem Description:
When peer-switch is enabled:
BPDUs go out on both N7K peers
ASA would retransmit the bpdus to the other peer.
So the port on one of the N7K would go into dispute.
This is the expected behavior on N7K

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.1(5), 6.2(8)
Known Fixed Releases:
Bug Id:
CSCua77416
Title:
Sup reload or Switchover may occur due to Leap second update
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs a N7K SUP1 could have the kernel hit what is known a "livelock" condition under the following circumstances:

a. When the NTP server pushes the update to the N7K NTPd client, which in turn schedules the update to
the Kernel. This push should have happened 24 hours before June 30th, by most NTP servers.

b. When the NTP server actually updates the clock

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
Please note this is an issue for the SUP1 only and the SUP2 is not susceptible to leap second.

On switches configured for NTP and running affected code, following workaround can be used.

1) Remove NTP/PTP configuration on the switch at least two days prior to June 30, 2015 Leap second event date. Note the entire NTP configuration does not need to be removed and the user can do "no feature ntp" so the NTP feature will be disabled but the NTP configuration will remain in place.

2) Add NTP/PTP configuration back on the switch after the Leap second event date(July 1, 2015). Note if just the feature was disabled the user can now do "feature ntp".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
5.1(1), 5.1(5)E2, 5.2(5), 6.0(4)
Known Fixed Releases:
5.2(6.16)S0, 5.2(7), 6.1(1)S28, 6.1(1.30)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCus22805
Title:
N7K-SUP2/E: Compact Flash Failure or Unable to Save Configuration
Description:

Symptom:The following symptoms have been seen:
- Compact flash diagnostic failure
- Unable to perform a 'copy run start'

To display the current status of the RAID devices, please run the following commands:

switch# show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xf0

Where x is the standby supervisor slot number:

switch# slot x show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xd2

Last number in the RAID data indicate the number of disks failed:

0xf0 ==>> No failures reported
0xe1 ==>> Primary flash failed
0xd2 ==>> Alternate (or mirror) flash failed
0xc3 ==>> Both primary and alternate failed

Conditions:- N7K-SUP2 or N7K-SUP2E
- N77k-SUP2 and N77K-SUP2E are NOT effected
- Several months or years of uptime

Workaround:While system can operate with only one flash device, its highly recommended to recover and add the removed flash back into RAID configuration. Second flash device can also get into this condition over time triggering the read-only mode.

Flash Recovery Tool:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz is available to be downloaded from Cisco support site. This works as a custom plug-in that can be run using the 'load' CLI.

- To run the tool, download and copy it to bootflash/volatile/slot0.
extract it
#tar extract bootflash:n7000-s2-flash-recovery-tool.10.0.2.tar.gz
run with the load command
#load bootflash:n7000-s2-flash-recovery-tool.10.0.2.gbin
- Tool automatically fixes any single flash errors when present.
- If a standby available, it will copy itself to standby and run there.
- No side effects if there are no errors reported at the time.
- Tool will not attempt dual flash recovery either on active or standby.

Single flash failure on active or standby:
Systems running with single flash failure can be repaired while in service using the flash recovery tool.

Dual flash failure on the standby:
This is a recoverable situation by reloading the standby and making sure that the flashes are healthy once it comes back online. Flash recovery tool should be run after reload to put both flashes back into service.

Dual flash failures on Active:
This is not a recoverable situation, unless there is at least one working flash on the standby. Otherwise, switch need to be reloaded during next maintenance window. If the standby is healthy a switchover can be attempted and then recover the old active. Latest running configurations need to be saved external to the switch to be restored after reload. Flash recovery tool should be run after reload to make sure flashes back into service.

Additional verification steps and further information can be found in the Read Me file with the recovery tool.

More Info:Fix is available in 6.2(14), 7.2(x), and later.

Each Nexus 7000 Supervisor board are equipped with 2 identical eUSB flash devices in a RAID1 mirror configuration. Called primary and mirror, they together provide for non-volatile repositories for storing boot images, startup configuration and other persistent application data.

Over years in service, one of these devices may get disconnected from the USB bus. This causes the RAID software to drop the affected device to be removed from its configuration. System still can function normally with the remaining working device.

However, if the second device also experiences similar issue and drops out of the RAID array, boot flash devices will re-mounted as read-only preventing configuration copying. Even though there is no operational impact on systems running in this state, a reload of the affected supervisor is needed to recover f

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.1(5a), 6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.26), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)IB(122), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.456), 7.2(0)D1(1), 7.2(0)N1(0.152)
Bug Id:
CSCuu95464
Title:
N7K cannot ping own ip L3 port-channel
Description:

Symptom:
After an upgrade to 6.2(12) certain layer 3 port-channels are not pingable from N7K itself
Affects all control plane traffic on the interface. CPU does not send any packet egress for that interface

Conditions:
N7K upgraded from 6.2(10) to 6.2(12)

Workaround:
shut/no shut of port-channel interface fixes the issue

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCut29799
Title:
Privilege escalation with o+w files and directories
Description:

Symptoms:
Cisco NX-OS based devices contain a number of files and directories that are assigned weak file permissions. This could allow an attacker that was able to gain access to the
underlying operating system to view or modify certain files that should be restricted.

Conditions:
Nexus devices running an affected version of NX-OS Software.

Workaround:
None.

Further Problem Description:

Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
7.0(0)HSK(0.392)
Bug Id:
CSCus42713
Title:
2014 and 2015 OpenSSL Vulnerabilities
Description:

Symptom:Cisco NX-OS (Covering Nexus 5K, N6K and N7K and Cisco MDS) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE)
IDs:

CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275,
CVE-2015-0204, CVE-2015-0205, CVE-2015-0206

This bug has been opened to address the potential impact on this product.

Conditions:This device has a vulnerable version of OpenSSL, this bug is being used to update the OpenSSL package used on the product.


Product doesn't support DTLS so is not affected by either:
CVE-2014-3571
CVE-2015-0206

The LDAP SSL authentication feature may be configured to use OpenSSL. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP SSL Authentication feature is enabled.

Workaround:1. Nexus 5000 (N5K) : The following features can use SSL and would need to
be disabled.

a) Avoid any "fabric database" configuration with keyword "enable-ssl".

For example:
fabric database type network
server protocol ldap ip 172.29.21.2 enable-ssl
b) Make sure the 'secure LDAP' option is unchecked when defining POAP
template on DCNM.
c) Do not use Cisco's One Platform Kit (OnePK) with the transport type tls
..." open.
d) Remove the VM Tracker Configuration.

2. Nexus 7000 (N7K) : The LDAP feature uses Open SSL. To disable the LDAP
SSL Authentication feature. LDAP can be disabled or used without SSL
Authentication.

More Info:PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.6

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from
multiple sources. This includes the CVSS score assigned by the third-party
vendor when available. The CVSS score assigned may not reflect the actual
impact on the Cisco Product.

Additional information on Ciscos security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
5.2(8f), 6.2(10), 6.2(11), 6.2(7), 6.2(8)S3, 6.2(8a), 7.2(0)VX(0.9), 7.2(0.1)PR(0.1), 7.3(0.9), 9.9(0)XS(0.1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.52), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14)
Bug Id:
CSCur00089
Title:
vdc-admin on N7K can break out of vsh-"chroot" using symbolic links
Description:

Symptom:
Cisco Nexus devices running Cisco NX-OS software contain a symbolic link vulnerability that could allow a local, authenticated attacker to break out of the chroot environment that their Virtual Device Context (VDC)
has been assigned. This could result in the attacker gaining the ability to write files to locations that should be restricted to the context to which they belong. This could also have an extended impact of allowing the
attacker to read data that should be restricted.

Conditions:
Cisco Nexus devices running an affected version of Cisco NX-OS Software

Workaround:
None.

Further Problem Description:
Credit:
Cisco would like to thank Jens Krabbenhoeft for reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.2/2.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.74), 7.3(0)IB(0.17)
Bug Id:
CSCtf19827
Title:
VSH parsing of backquotes allows linux cli access
Description:



Symptom:

An authenticated, local attacker could leverage an input handling flaw to execute arbitrary commands on the underlying operating system with elevated
privileges.



Conditions:

Cisco devices running an affected version of NXOS software.

This issue affects:
Nexus 7000
Nexus 5000




Workaround:

Restrict local console access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of the Cisco UCS and relate devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.
The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-4075 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4075

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCuv00717
Title:
LSA3 is not generating
Description:

Symptom:
If connected interface that is excluded from OSPF for the same prefix like LSA is present on ABR, LSA3 will not be generated

Conditions:
NX-OS 6.0(2)N2(3). For NX-OS 7 that behavior is not observed.

Workaround:
enable ospf on connected interface

Further Problem Description:
.

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
Bug Id:
CSCul24462
Title:
FabricPath interface incorrectly programmed by PIXM after nbr reload
Description:

Symptom:
In certain cases Fabricpath flood BD LTL could be incorrectly programmed on N7k device, resulting in multicast and broadcast traffic loss. This is seen on N7K-F248XP-25E line card when the N7k device is running NX-OS 6.1(4a) and 6.1(4).

Issuing "shut" / "no shut" for the affected interface on either side (N7k or N5k) recovers the interface from the issue.

Conditions:
In the current case the issue is seen if there is a directly attached N5k VPC+ system, and one of the VPC peers is being reloaded.
This issue is not specific to 6.2.6 although was observed in this release. This could occur in a fabricpath deployment when there exists multiple path to a fabricpath switch and one such switch is reloaded. The issue is not easily reproduced, and occurs in certain cases where cumulative route change triggers are simulated. In this particular case switch reload resulted in router port entry modification as well as switch routes being changed. The issue should most likely be observed only when router port entries are configured on the impacted vlan or per-vdc.

Workaround:
1. Set LSP-gen interval on the N5k devices to 1000 or greater:

config command:
fabricpath domain default
lsp-gen-interval 1000 1000 1000

2. Increase the link debounce timer on the VPC peer-link of the N5ks to 500ms:

config command:
interface ethX/Y
link debounce time 500

Further Problem Description:
The root cause of the issue has been identified as the fact that local link failures are seen by ISIS on N7k slower than remote LSPs from VPC peer of the reloaded N5k (indicating reachability change). This could cause ISIS not to factor in the local link failure in the first SPF run but include the remote LSP data in the SPF run. The local link failure would then be included in a later SPF run. This would in turn cause route deletes to go to M2RIB later than route changes. M2RIB seems to have issues when it tries to handle such cumulative updates and attempts to send a single update to PIXM. Hence we see the issue. This issue will addressed in a future release.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.1(4), 6.1(4a), 6.2(2)S42
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.12), 6.2(10)FM(0.35), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75)
Bug Id:
CSCtt41698
Title:
NXOS subinf MTU inconsistency
Description:

Symptom:

When changing MTU on main interface, subinterface inherits this MTU as per the
"show interface ethernet x/y.z" command. Although, internally, MTU for subinterface
is still set to default.

Conditions:
Subinterface configuration.

Workaround:
Explicitly configure the non-default MTU on both main and subinterface.

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
6.1(0.184)S10, 6.1(0.197)S0, 6.2(0.228)S0, 7.2(0)VZN(0.30)
Bug Id:
CSCtf25457
Title:
VSH parsing of SED parameters allows linux cli access
Description:



Symptom:

An authenticated, local attacker could leverage an input handling flaw to execute arbitrary commands on the underlying operating system with elevated
privileges.



Conditions:

Cisco devices running an affected version of NXOS software.

This issue affects:
Nexus 7000
Nexus 5000




Workaround:

Restrict local console access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of the Cisco UCS and relate devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.
The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-4077 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4077

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
4.2(5.13), 4.2(5.14), 7.0(1)ZD(0.3)
Bug Id:
CSCtf81850
Title:
OpenSSL Record of Death Issue
Description:

Symptom:
The device may be affected by an OpenSSL vulnerability.

This vulnerability is tracked as CVE-2010-0740

In TLS connections, certain incorrectly formatted records can cause an OpenSSL
client or server to crash due to a read attempt at NULL.

Conditions:
Device configured with any feature that uses SSL.

Workaround:
Not available

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCsy98980
Title:
Nexus N7k does not support required password complexity
Description:

Symptom:

Nexus 7000 does not allow the '$' dollar sign character to be used in a password per the documentation:

http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli/sec_rbac.html#wp1258879

Conditions:
Affects all versions.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.1(4)
Known Fixed Releases:
4.2(1.17), 4.2(2)
Bug Id:
CSCtf40008
Title:
LESS allows bash access
Description:

Symptom:
Cisco Nexus OS contains a vulnerability that could allow an authenticated,
local attacker to execute arbitrary commands on a targeted device. The
vulnerability is due to improper sanitization of user-supplied values to
command line interface commands.

An authenticated, local attacker could exploit the vulnerability by issuing
commands that contain malicious options on the device command line interface.
If successful, the attacker could gain elevated privileges on the targeted device.

Conditions:

Injection can be done via either the less or the section sub command. Full
details below:

----------------------------------------------------------------------
NX-OS - "less" sub-command - Command injection / sanitization issues.
----------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+-----------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+----------------|
| Cisco Nexus 7000 Series Switches | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 5000 Series Switches | CSCtf40008 | 4.2(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 2000 Series Switches | CSCtf40008 | 4.1(1)N2(1) |
|-----------------------------------+------------+----------------|
| Cisco Nexus 1000V Series Switches | CSCtf40008 | 4.2(1)SV1(5.1) |
|-----------------------------------+------------+----------------|
| Cisco MDS 9000 Software | CSCtf40008 | 4.2(6) |
| | | 5.1(1) |
|-----------------------------------+------------+----------------|
| Cisco Unified Computing System | CSCtg18363 | 1.3(1c) |
| | | 1.4(1i) |
+-----------------------------------------------------------------+

The following are not affecfed by the "less" sub-command - command injection
vulnerability.

* Cisco Nexus 3000 Series Switches
* Cisco Nexus 4000 Series Switches

-------------------------------------------------------------------------
NX-OS - "section" sub-command - Command injection / sanitization issues.
-------------------------------------------------------------------------

Affected Products:
==================

The following products are affected by this vulnerability:

+--------------------------------------------------------------+
| Affected Product | Cisco Bug | First Fixed |
| | ID | Release |
|-----------------------------------+------------+-------------|
| Cisco Nexus 7000 Series Switches | CSCtr44645 | 5.2(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 5000 Series Switches | CSCtr44645 | 5.1(3)N1(1) |
|-----------------------------------+------------+-------------|
| Cisco Nexus 3000 Se

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
4.2(4), 4.2(6), 5.1(1a), 5.1(2)
Known Fixed Releases:
4.2(1)N2(1), 4.2(5.10), 5.1(0.76), 5.1(1), 7.0(1)ZD(0.3)
Bug Id:
CSCui04729
Title:
Memory leak on eureka_usd while polling cshcMacUsageEntry
Description:

Symptom:
M1/M2 module might be reloaded due to memory leak after SNMP walk against cshcMacUsageTable in CISCO-SWITCH-HARDWARE-CAPACITY-MIB.
A core file with eureka_usd_log in the name will be generated.
A syslog similar to Service "eureka_usd" (PID 1234) hasn't caught signal 6 (core will be saved) will be generated.

Conditions:
Problem only exists on M1 or M2 modules while SNMP walk against cshcMacUsageTable in CISCO-SWITCH-HARDWARE-CAPACITY-MIB.

Workaround:
Restrict access to the following:
cshcMacUsageEntry in CISCO-SWITCH-HARDWARE-CAPACITY-MIB (1.3.6.1.4.1.9.9.663.1.1.1.1.1)

Further Problem Description:
Problem exists only in 6.1(4).
Fixes had been integrated into 6.1(4a), 6.2(2) and later releases.

Memory usage can be monitored with the following command:
switch# slot slot show processes memory | grep eureka_usd
2182 3051520 0 CurrentMemoryUsage 7fe3aa80/7fe3a460 eureka_usd

Example configuration for blocking only cshcMacUsageEntry in CISCO-SWITCH-HARDWARE-CAPACITY-MIB:
snmp-server community communityString group name
role name name
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.663.1.1.1.1.1

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
6.1(4.97)S0, 6.1(4a), 6.1(4a)S2, 6.1(5.32)S0, 6.2(2), 6.2(2)S6, 6.2(5.2)S0, 7.0(0)ZD(0.84)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论