Cisco Blog » The Platform

2015年8月1日星期六

Cisco Notification Alert -4500 Series Switch-01-Aug-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for Catalyst 4500 Series Switches

Product Name:
Catalyst 4507R+E Switch
Software Type:
Cisco Plug-in for OpenFlow
Release Version:
2.0.2
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500es8-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP8E Switches

File Release Date:
28-JUL-2015
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP7E Switches

File Release Date:
28-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 4500 Series Switches

Product Name:
Catalyst 4506 Switch
Software Type:
Cisco Plug-in for OpenFlow
Release Version:
2.0.2
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500es8-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP8E Switches

File Release Date:
28-JUL-2015
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP7E Switches

File Release Date:
28-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 4500 Series Switches

Product Name:
Catalyst 4510R Switch
Software Type:
Cisco Plug-in for OpenFlow
Release Version:
2.0.2
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP7E Switches

File Release Date:
28-JUL-2015
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500es8-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP8E Switches

File Release Date:
28-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 4500 Series Switches

Product Name:
Catalyst 4510R+E Switch
Software Type:
Cisco Plug-in for OpenFlow
Release Version:
2.0.2
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500es8-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP8E Switches

File Release Date:
28-JUL-2015
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP7E Switches

File Release Date:
28-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 4500 Series Switches

Product Name:
Catalyst 4503 Switch
Software Type:
Cisco Plug-in for OpenFlow
Release Version:
2.0.2
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP7E Switches

File Release Date:
28-JUL-2015
Alert Type:
New File
File Name:
ofa-2.0.2-r2-cat4500es8-SPA-k9.ova
File Description:

Cisco Plug-in for OpenFlow for CAT4500E-SUP8E Switches

File Release Date:
28-JUL-2015
Find additional information in Software Downloads index.

Known Bugs - Catalyst 4500 Series Switches

Bug Id:
CSCuu42117
Title:
C4503-E sup7 crash on qpair_full after processing dhcpd_ functions
Description:

Symptom:
Switch crashed twice within 4 days and generated the following tracebacks each time:

trace back 0. 0x2413cea8 qpair_full ---> qpair.h:287
trace back 1. 0xNone process_enqueue ---> event_mgmt.c:3138
trace back 2. 0x212df404 process_enqueue_pak ---> network_netinput.c:169
trace back 3. 0x234e9a10 enqueue_ip_socket ---> udp_api_cmn.c:123
trace back 4. 0x22bd4904 dhcpc_for_us ---> dhcpc.c:5596
trace back 5. 0x22bee298 reg_invoke_dhcp_udp_input ---> ip_registry.regh:42750
trace back 6. 0xNone dhcpd_read_packet ---> dhcpd_relay.c:6330
trace back 7. 0x22bee6ec dhcpd_receive_loop ---> dhcpd_relay.c:6678
trace back 8. 0x22beed40 dhcpd_receive_process ---> dhcpd_relay.c:6814
trace back 9. 0x22beebac dhcpd_receive_loop ---> dhcpd_relay.c:6696
trace back 10. 0x00000000 ??

According to the crashinfo file log there was user action taken right before it crashed (confirmed by the customer).

Conditions:
NA

Workaround:
NA

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
15.2(2)E2
Known Fixed Releases:
Bug Id:
CSCua52800
Title:
4500-Sup7E when rebooted causes the int of 2k/3K to errdisabl
Description:

Symptom:
downstream DSBU switches' int goes err-disable if we reload 4500 Sup7E connected to them

Conditions:

cat4500e-universalk9.SPA.03.01.00.SG.150-1.XO.bin ----- No issue
cat4500e-universalk9.SPA.03.01.01.SG.150-1.XO1.bin ----No issue
cat4500e-universalk9.SPA.03.02.01.SG.150-2.SG1.bin ------- No Issue
cat4500e-universalk9.SPA.03.02.02.SG.150-2.SG2.bin ------- 3550 affected but not 2960(tried twice to make sure...)
cat4500e-universalk9.SPA.03.02.03.SG.150-2.SG3.bin -------- Issue exists
cat4500e-universalk9.SPA.03.02.04.SG.150-2.SG4.bin ------ Issue exists
cat4500e-universalk9.SPA.03.03.00.SG.151-1.SG.bin ------ Issue exists


Workaround:
enable err-dsiable recovery time

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
15.2(3.7.1)
Known Fixed Releases:
15.0(2)SG5.5.38, 15.0(2)SG5.5.39, 15.0(2)SG6, 15.0(2)SG7, 15.0(2)SG8, 15.0(2)SG8.0.131, 15.1(1.25)SID, 15.1(2)SG, 15.1(2)SG1, 15.1(2)SG2
Bug Id:
CSCuq32728
Title:
3.6.0 - IP phones reboots continuously
Description:

Symptom:
IP phones reboots continuously after the upgrade to 3.6.0

Conditions:
LLDP enabled

Workaround:
Disable LLDP

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
05-JUL-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases:
15.2(2)E1, 15.2(2)EA1.1, 15.2(2.2.73)ST, 15.2(2.4.5)EA, 15.2(2.54)PSR, 15.2(2b)E, 15.2(3)E, 15.2(4.0)ST, 3.6(1)E, 3.7(0)E
Bug Id:
CSCuu88479
Title:
Some ports on WS-X4248-FE-SFP remain down/down
Description:

Symptom:
Sometimes the FastEthernet ports on WS-X4248-FE-SFP stuck in down/down state, although transceiver and fiber are working properly. Bouncing interface with "shutdown/no shutdown" or reconfiguring from default doesn't fix the issue.

Conditions:
Issue is seen on Catalyst 4506-E with Sup8-E. There are WS-X4248-FE-SFP modules populated with only GLC-FE-100BX-D.

Workaround:
Reset particular linecard or reload chassis

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
15.2(2)E2
Known Fixed Releases:
Bug Id:
CSCuv06235
Title:
"no vlan configuration" with "no ip igmp snooping" crash
Description:

Symptom:
crash after issuing "no vlan configuration" crash
first reported on WS-C4500X-32 with 15.1(2)SG2

Conditions:
vlan configuration X
no ip igmp snooping

Workaround:
avoid using this command

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
15.1(2)SG2
Known Fixed Releases:
Bug Id:
CSCtx09632
Title:
4500 crash on removing switchport trunk allowed interface config.
Description:

Symptom:
Crash

Conditions:
1. Interface with following configuration:-

interface GigabitEthernet2/1
switchport trunk allowed vlan 100
switchport mode trunk
ip device tracking maximum 10

2. no switchport mode trunk
3. no switchport trunk allowed vlan 100

Workaround:
Not seen all the time. But was able to recreate in lab withing 5 attempts.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
12.2(44)SG1
Known Fixed Releases:
12.2(53)SG10, 12.2(53)SG11, 12.2(53)SG7, 12.2(53)SG9, 15.0(2)SG2.2.188, 15.0(2)SG2.2.189, 15.0(2)SG4, 15.0(2)SG6, 15.0(2)SG7, 15.0(2)SG8
Bug Id:
CSCuv14614
Title:
WS-X4640-CSFP-E ports (Tx) are disabled
Description:

Symptom:
In Cisco Catalyst 4506-E, 4507R-E, 4507R+E,4510R-E, and 4510R+E chassis with WS-X4640-CSFP-E line cards, random ports are disabled in the transmit direction, when the switch is booted-up. The following message is observed:


Jun 3 14:12:45.607: %SFF8472-5-THRESHOLD_VIOLATION: Gi3/58: Rx power low alarm; Operating value: -40.0 dBm, Threshold value: -23.5 dBm.

+show interface transceiver
Gi3/58 37.4 3.25 -6.3 -40.0


NAME: "GigabitEthernet3/59", DESCR: "1000Base-2BX10-D"
PID: GLC-2BX-D , VID: V01

Conditions:
This problem is seen on Cisco Catalyst 4506-E, 4507R-E, 4507R+E,4510R-E, and 4510R+E chassis when they are fully populated with WS-X4640-CSFP-E line cards, running cat4500e-universalk9.SPA.03.07.01.E.152-3.E1.bin

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases:
Bug Id:
CSCun45846
Title:
Mimatch of STP states in hardware and software on 4500-X
Description:

Symptom:
While performing a failovers between active and standby supervisor on a 4500-X VSS, the hardware and Software STP states do not sync

Conditions:
1) 4500-X VSS running cat4500e-universalk9.SPA.03.04.03.SG.151-2.SG3.bin
2) Dual NIC server connected to the 4500.
3) Active Server NIC connects to Active 4500 switch and Standby server NIC connected to standby 4500
4 )Only Active server NIC passes traffic and hence only its MAC is learned on the 4500. Passive Server NIC does not pass traffic
5)Failovers are performed by executing the "redundancy force-switchover" command
6) Port config on the 4500 has portfast configured as follows:

switchport mode access
no snmp trap link-status
spanning-tree portfast
spanning-tree bpduguard enable

Workaround:
1)Shut/no shut of the port with the missing floodset/unsynced STP state fixes the issue
2) Removing "spanning-tree portfast" prevents the problem from happening

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
15.1(2)SG3.0.1
Known Fixed Releases:
12.2(33)SXI10, 12.2(33)SXI11, 12.2(33)SXI12, 12.2(33)SXI13, 12.2(33)SXI14, 12.2(33)SXI4, 12.2(33)SXI6, 12.2(33)SXI8a, 12.2(33)SXJ, 12.2(33)SXJ2
Bug Id:
CSCum80951
Title:
TCAM does not share when same policy is applied to multiple interfaces
Description:

Symptom:
When you apply the same policy to multiple interfaces, you should use the same label. Incrementing labels when adding them to multiple interfaces quickly exhausts TCAM resources.
The example below is the output of "show platform software acl input paths" where each interface gets a new label.

sh platform software acl input paths:

Path Current Label Next Label
------------------------------------------------------------
(in :0, null) (NQ:16382/PermitAll, Q:16215/Unknown)NotPresent
(in :1, null) (NQ:16382/PermitAll, Q:16365/Unknown)NotPresent
(in :2, null) (NQ:16382/PermitAll, Q:16327/Unknown)NotPresent
(in :3, null) (NQ:16382/PermitAll, Q:16271/Unknown)NotPresent
(in :4, null) (NQ:16382/PermitAll, Q:16336/Unknown)NotPresent
(in :5, null) (NQ:16382/PermitAll, Q:16349/Unknown)NotPresent

Conditions:
This condition was first seen on a cat4K with a sup7-e running 03.03.02.SG. The affected platform has 260 VOIP (phones) attached to WS-X4748-UPOE+E line cards. The problem also occurs in a situation where there are fewer devices and a couple of line cards.


------------------ show platform hardware acl statistics utilization brief ------------------

CAM Utilization Statistics
--------------------------

Used Free Total
--------------------------------

Output Security (160) 6 (0 %) 2042 (100%) 2048
Output Security (320) 12 (0 %) 2036 (100%) 2048
Output Qos (160) 2909 (71 %) 1187 (29 %) 4096 <------------
Output Qos (320) 5116 (83 %) 1028 (17 %) 6144 <------------
Output Unallocated (160) 0 (0 %) 51200 (100%) 51200


#### Log messages seen ###

Dec 5 22:09:19.691: C4K_HWACLMAN-4-ACLHWPROGERR Input VV-7E-Phone-Input-Policy - hardware TCAM limit, qos being disabled on relevant interface.
Dec 5 22:09:19.691: C4K_HWACLMAN-4-ACLHWPROGERRREASON Input(NQ:16382/PermitAll, Q:16199/Unknown) VV-7E-Phone-Input-Policy - insufficient hardware TCAM entries with usable masks.
Dec 5 22:09:20.980: C4K_COMMONHWACLMAN-4-HWPROGSUCCESS Input VV-7E-Phone-Input-Policy - now fully loaded in hardware
Dec 5 22:09:21.116: C4K_COMMONHWACLMAN-4-ALLACLINHW All configured ACLs now fully loaded in hardware - hardware switching / QoS restored.

Workaround:
Remove all service policies and reapply to fix the problem. You can use the range command to remove and reapply all at once.

Example:

1. #int range G2/1-48,G3/1-48
2. #no auto qos trust
3. #auto qos trust

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
14-JUL-2015
Known Affected Releases:
15.1(100.1), 15.1(2)SG1.0
Known Fixed Releases:
15.1(2)SG5, 15.2(2)E1, 15.2(2.54)PSR, 15.2(2b)E, 15.2(3)E, 15.2(4.0)ST, 15.2(5.0)ST, 3.6(1)E, 3.7(0)E
Bug Id:
CSCun97605
Title:
4510 RSP physical removal missing default route for 60 seconds
Description:

Symptom:
Upon physically removing the active SUP from the switch, Multicast and Unicast packet loss for 60 seconds until route convergence takes place.

Conditions:
Default route is learned via SUP uplink interfaces: Te5/1 and Te6/1(ECMP).
ECMP (Equal Cost Multi Path) is affected by physical removal of the active SUP and causing SSO to standby SUP. Only that ECMP path that is taking TenGigabitEthernet ports on the SUPs is affected.
Any ECMP with line card ports is never affected.

Workaround:
None

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
15.4(3)
Known Fixed Releases:
15.1(2)SG3.0.214, 15.1(2)SG4, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E, 15.2(4.0)ST, 15.2(5.0)ST, 3.6(0)E
Bug Id:
CSCuq39071
Title:
Mcast packet loss when other receiver leaves group in IGMPv3
Description:

Symptom:
Multicast packet loss when other receiver leaves group using v3 block source

Conditions:
This happens under the following conditions:

1. IGMPv3 should be used and the receivers must use SSM.
2. We need to shut the interface or unplug it.

Workaround:
Disable IGMP snooping.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
15.1(2.0)
Known Fixed Releases:
15.1(2)SG5, 15.2(2)E1, 15.2(2.23)PSR, 15.2(2.39)PSR, 15.2(2b)E, 15.2(3)E, 15.2(4.0)ST, 3.6(1)E, 3.7(0)E
Bug Id:
CSCur20444
Title:
I/O memory leak due to DHCPv6 packets.
Description:

Symptom:
I/O memory leak observed with small or middle buffer pools showing very few buffers in the free list.

Conditions:
The issue is seen when DHCPv6 packets are received on the switch, and the port is configured with 'ipv6 dhcp guard'.

Workaround:
The workaround is to remove the 'ipv6 dhcp guard' configuration from the interface on which DHCPv6 packets are being received.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
15.2(2)E
Known Fixed Releases:
15.2(2)E2, 15.2(2.1)EB, 15.2(2.2.35)EB, 15.2(2.9.2)EA2, 15.2(3)E1, 15.2(4.0)ST, 15.2(5.0)ST, 15.3(3)S5.20, 15.4(1)S3.2, 15.4(1)S4
Bug Id:
CSCus46086
Title:
Dot1x/Mab re-authentication Success with "Status: Unauthorized"
Description:

Symptom:

The interface is configured for Dot1x/MAC Address Bypass (MAB) authentication. When the interface goes through re-authentication because of a
session timeout it was possible that the Dot1x/MAB re-authentication could be completed with success but the main authentication status would be
unauthorized.

Conditions:
The C4500 interface is configured for Dot1x/MAC Address Bypass (MAB) authentication.

Workaround:
1. Disable /MAC Address Bypass (MAB) re-authentication.

2. Reboot end device so that initial authentication is done properly.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal
resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
3.6(0), 3.7(0)
Known Fixed Releases:
15.2(2)E2, 15.2(3)E1, 15.2(5.0)ST, 3.6(2)E, 3.7(1)E
Bug Id:
CSCui56867
Title:
switch isolated on 'no monitor session <id> filter packet-type good rx'
Description:

Symptom:
Removing default config of 'monitor session filter packet-type good rx' from an active SPAN session triggers HSRP and EIGRP flaps making switch unreachable from directly connected peers.

Conditions:
Removing default config of 'monitor session filter packet-type good rx' from an active SPAN session is the trigger for switch isolation.

Workaround:
Restoring the default config of 'monitor session filter packet-type good rx' and bouncing 'err-disabled' ports restores normalcy.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
15.1(2)SG, 15.1(2)SG1.80
Known Fixed Releases:
15.1(1)XO0.18, 15.1(1)XO1, 15.1(1.0.33)XO1, 15.1(2)SG3.0.152, 15.1(2)SG4, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST
Bug Id:
CSCur79622
Title:
4500 Sup8E Supervisor enhanced error logging.
Description:

Symptom:
The dual-sup switch was in SSO. When switchover was initiated using the "redundancy force-switchover" command, the entire chassis rebooted.

Note: This fix does not address the crash, instead it enhances error logging for further investigating this crash.

Conditions:
Switchover

Workaround:
none

Further Problem Description:
The existing logs and crashinfo are not adequate to determine the root cause of the issue. With this fix, additional logging capabiliies have been added. If the issue is observed again, we will have additional logs to further debug the issue and identify the root cause.

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
15.1(1.45)
Known Fixed Releases:
15.2(1)SY1, 15.2(2)E2, 15.2(3)E1, 15.2(4.0)ST, 15.2(5.0)ST, 3.6(2)E, 3.7(1)E
Bug Id:
CSCuu40317
Title:
Applying Medianet to interface bypasses SA Miss queue on 4500
Description:

Symptom:
Using Medianet on L2 trunks, we see unknown unicast flooding because MACs are not being learned on interfaces that medianet is configured. When medianet is applied, the SA MISS CPU queue does not increment but medianet CPU queue does.

Conditions:
3.6.0 4500 Sup8 using medianet on the interface, where the medianetMonitor has a match-all criteria specified

Workaround:
For medianet configure a policy with a criteria other than a match-all. Preferably the MediaMonitor policy should match specific flows , that are of interest.

Further Problem Description:
Impacts 4500e and 4500es8 switches

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases:
15.2(4.0)ST, 15.2(4.10.62)PI5
Bug Id:
CSCur98467
Title:
VSL-MGMT access-list mac address changes after entire VSS reload
Description:

Symptom:
VSL-MGMT access-list mac address changes every time after both two VSS switches reload or power off/on.

Conditions:
Cat4k VSS

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
15.1(2)SGN3.9
Known Fixed Releases:
15.1(2)SG6, 15.2(1)SY1, 15.2(3)E1, 15.2(4.0)ST, 15.2(5.0)ST, 3.7(1)E
Bug Id:
CSCus13479
Title:
4500X VSS: multicast traffic blackholed on orphan L3 egress portchannel
Description:

Symptom:
4500X VSS multicast traffic blackholed on orphan L3 egress portchannel. During problem symptom, traffic hits L2 floodset entry even though L3 entry si present and get dropped.There is a mismatch seen in state of ipv4MulticastEn between active and standby when switch is in this state.

hrn3-4500x-vss-01#sh platfo hardware rxvlan-map-table vl 200 <<< Ingress port

Executing the command on VSS member switch role = VSS Active, id = 1


Vlan 200:
l2LookupId: 200
srcMissIgnored: 0
ipv4UnicastEn: 1
ipv4MulticastEn: 1 <<<<<
ipv6UnicastEn: 0
ipv6MulticastEn: 0
mplsUnicastEn: 0
mplsMulticastEn: 0
privateVlanMode: Normal
ipv4UcastRpfMode: None
ipv6UcastRpfMode: None
routingTableId: 1
rpSet: 0
flcIpLookupKeyType: IpForUcastAndMcast
flcOtherL3LookupKeyTypeIndex: 0
vlanFlcKeyCtrlTableIndex: 0
vlanFlcCtrl: 0


Executing the command on VSS member switch role = VSS Standby, id = 2


Vlan 200:
l2LookupId: 200
srcMissIgnored: 0
ipv4UnicastEn: 1
ipv4MulticastEn: 0 <<<<<
ipv6UnicastEn: 0
ipv6MulticastEn: 0
mplsUnicastEn: 0
mplsMulticastEn: 0
privateVlanMode: Normal
ipv4UcastRpfMode: None
ipv6UcastRpfMode: None
routingTableId: 1
rpSet: 0
flcIpLookupKeyType: IpForUcastAndMcast
flcOtherL3LookupKeyTypeIndex: 0
vlanFlcKeyCtrlTableIndex: 0
vlanFlcCtrl: 0

Conditions:
NA

Workaround:
Unconfigure and reconfigure PIM on the ingress L3 port. For eg:

hrn3-4500x-vss-01#sh int po11 | i rate
Queueing strategy: fifo
30 second input rate 0 bits/sec, 0 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec <<< OIL not sending traffic
hrn3-4500x-vss-01#
hrn3-4500x-vss-01#
hrn3-4500x-vss-01#conf t
Enter configuration commands, one per line. End with CNTL/Z.
hrn3-4500x-vss-01(config)#int vl 200 <<< Ingress L3 port
hrn3-4500x-vss-01(config-if)#no ip pim sparse-mode
hrn3-4500x-vss-01(config-if)# ip pim sparse-mode
hrn3-4500x-vss-01(config-if)

没有评论:

发表评论