Cisco Blog » The Platform

2015年8月1日星期六

Cisco Notification Alert -Cisco Cloud Service Router CSR 1000v-01-Aug-2015 16:54 GMT

 

 

 

 

 

 

 


Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Remote Management Software
Release Version:
3.16.0 S
Alert Type:
New File
File Name:
iosxe-remote-mgmt.03.16.00.S.155-3.S-ext.ova
File Description:

REST API Support for IOS XE

File Release Date:
30-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.15.1S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.15.01.S.155-2.S1-std.qcow2
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - QCOW2

File Release Date:
23-JUL-2015

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.16.0S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.16.00.S.155-3.S-ext.ova
File Description:

CSR1000v Universal Image with Crypto OVA

File Release Date:
30-JUL-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.16.00.S.155-3.S-ext.qcow2
File Description:

CSR1000v Universal Image with Crypto QCOW2

File Release Date:
30-JUL-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.16.00.S.155-3.S-ext.SPA.bin
File Description:

CSR1000v Universal Image with Crypto BIN

File Release Date:
30-JUL-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.16.00.S.155-3.S-ext.iso
File Description:

CSR1000v Universal Image with Crypto ISO

File Release Date:
30-JUL-2015

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.14.2S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.14.02.S.155-1.S2-std.qcow2
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - QCOW2

File Release Date:
23-JUL-2015
Find additional information in Software Downloads index.

Known Bugs - Cloud Services Router 1000V Series

Bug Id:
CSCut26305
Title:
CSR1000V: next reload license level is NOT working.
Description:

Symptom:
next reload license level is shown to be wrong.

Conditions:
change license boot level over CSR1000V

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(2)S0.5, 15.5(2)S1, 15.5(2.12)T, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28, 15.5(2.19)S, 16.1(0.222)
Bug Id:
CSCut66361
Title:
CSR1000V: throughput subsystem initialzation failed.
Description:

Symptom:
throughput is failed to be configured.

Conditions:
smart license is used.

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUL-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(2)S0.5, 15.5(2)S1, 15.5(2.22)S
Bug Id:
CSCuu64399
Title:
CSR1000V: vxlan is not supported over APPX technology package
Description:

Symptom:
vxlan feature is not supported.

Conditions:
apps technology package.

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.6(0.6)S
Bug Id:
CSCuu35769
Title:
CSR1000V 4GB mem license may not allocate properly to dataplane
Description:

Symptom:
When the CSR1000V VM is allocated 8192MB as per the documentation, installing the 4GB mem add-on license sends all 4GB memory to IOSd. It should be allocating 3GB to IOSd and 1GB to Data Plane.

http://www.cisco.com/c/en/us/td/docs/routers/csr1000/software/configuration/csr1000Vswcfg/licensing.html#17673

Conditions:
CSR1000V with the 4GB add-on license installed.

Workaround:
Add another ~512MB to the VM and reload the CSR.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(2.21)S0.10, 15.5(2.21)S0.12
Bug Id:
CSCus06143
Title:
CSR1k SSLVPN: Mask unsupported virtual-template type VPN from config
Description:

Symptom:
Configuration options allow the admins to configure:
interface virtual-template type vpn
...

crypto ssl profile
virtual-template
...

And these config options are not yet supported on CSR1k.

Conditions:
CSR1k on XE 3.13 acting as AnyConnect SSLVPN Server.

Workaround:
Detach the virtual-template from the sslvpn profile, and remove the interface virtual-template type vpn.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S3.5, 15.5(1.18)S0.5, 15.5(2)S, 15.5(2.2)S
Bug Id:
CSCuu58498
Title:
CSR1000V AMI Stuck Thread Crash on XE 3.16 w/ PV Images
Description:

Symptom:






CSR1000V AMI instance crash with 3.16
Conditions:




Load testing for performance
Workaround:



Unknown
More Info:












Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCus81420
Title:
CSR1000v crashes upon boot-up with smart-licensing in day-0 config
Description:

Symptom:





We're seeing sporadically (30-40% of boot attempts) that a CSR1000v crashes right at boot-up.

Conditions:




The following should be configured in the Day-0 config:
1.Smart Licensing is configured and a token is included in Day-0 config
2.Using IPV6
3.Using a HTTP proxy to reach the SLS server

Workaround:



None

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)SN1, 15.5(1.18)S0.12, 15.5(2)S, 15.5(2.11)S
Bug Id:
CSCus71994
Title:
TCP checksum offload issue with virtio interface type on CSR1000v
Description:

Symptom:
SSH from a VM with virtio NIC and CSR1000v with a virtio NIC will not work when both are on same compute host.

Conditions:
CSR1000v spun up with virtio NIC interfaces on a compute host.
SSH to CSR1000v from a Linux VM(virtio NIC) on the same compute host as above.
Unable to SSH from Linux VM to CSR1000v.
Hypervisor is KVM.

Workaround:
Disable TCP checksum on Linux VM solves the issue

Further Problem Description:
SSH from a VM with virtio NIC and CSR1000v with a virtio NIC will not work when both are on same compute host.
CSR1000v spun up with virtio NIC interfaces on a compute host.
SSH to CSR1000v from a Linux VM(virtio NIC) on the same compute host as above.
Unable to SSH from Linux VM to CSR1000v.
Hypervisor is KVM.

Workaround is to disable TCP checksum on Linux VM

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S3, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCut98493
Title:
CSR1000v Leap Second Added Twice
Description:

Symptom:
Leap second addition may occur twice

Conditions:
A CSR1000v router acting as an ntp server or ntp client when a leap second add occurs.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(3)S2.17, 15.4(3)S3, 15.5(1)S1.4, 15.5(1)S2, 15.5(1)S2.1, 15.5(2)S0.8, 15.5(2)S1, 15.5(2.21)S0.10, 15.5(2.21)S0.12, 15.6(0.3)S
Bug Id:
CSCuq29087
Title:
Periodic BFD Session Flaps on CSR1000v running 3.13.0
Description:

Symptom:
The primary symptom in this case is intermittent BFD session flaps on the CSR. The session flaps occur when the CSR does not send necessary BFD control packets within the appropriate time interval. Those packets are late because the associated timer events are delayed due to bad host BIOS settings that increase the time it takes the VM to resume running on a physical processor.

Conditions:
CSR VM running on vSphere 5.5
Host with less than optimal BIOS settings related to power management

Workaround:
You can modify the host BIOS settings, exact settings vary depending on type of host.
Generally, you want to do the following things:
1. Disable C-states
2. Disable Package C-states
3. Set any power-saving related option to maximum performance setting

VMware documentation and server documentation will generally provide guidance on low-latency BIOS settings that are generally best for hosts with CSR VMs.

Further Problem Description:
CSR1000v sensitivity to environmental time loss.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuq12347
Title:
CSR1000v/ASR1001-x - Memory leak in CPP HA due to Throughput Monitor
Description:

Symptom:
A CSR1000v router may experience a memory leak. This will generally first manifest itself as syslog warnings:

Jan 01 02:34:56.789: %PLATFORM-4-ELEMENT_WARNING: F0: smand: RP/0: Committed Memory value 97% exceeds warning level 95%

The cpp_ha_top_level_server process is found to be consuming a slowly incrementing quantity of memory.

CSR1000v#show platform software process list RP active sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 15401 15105 15401 S 20 2352599040
fman_fp_image 20166 19684 20166 S 20 1558065152
cpp_cp_svr 18962 18243 18962 S 20 1271418880
cpp_ha_top_leve 19612 19071 19612 S 20 1180131328 <-----------
fman_rp 14687 13973 14687 S 20 876077056
qfp-ucode-csr 20659 20224 20659 S 20 764862464

"CPP HA", which is a subset of the cpp_ha_top_level_server process, shows a large difference between "Allocations" and "Frees" which increases over time.

CSR1000v#show platform software memory qfp-ha-server qfp active | begin CPP HA
Module: CPP HA
allocated: 507327220, requested: 501167108, overhead: 6160112 <-------------- "Allocated" slowly increases over time
Allocations: 781851, failed: 0, frees: 396844 <-------------- Note large delta between "Allocations" and "frees"

Conditions:
Platform throughput monitor is enabled.

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: enabled <---------------

Workaround:
Once memory is leaked, the device must be reloaded to recover it. In order to stop any additional memory from leaking, disable platform throughput monitor. This is not service impacting, but the device will no longer produce a syslog alert should the aggregate device throughput approach the licensed limit.

CSR1000V#set platform hardware throughput-monitor disable

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: disabled <---------------

Note that this command will not persist across a reload, so it will be necessary to re-apply the command each time the device is rebooted.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S1, 15.5(1)S

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论