| |
Bug Id: | CSCus96586 |
Title: | Ptp clock stuck on ACQUIRING state for very long time |
|
Description: | Symptom: PTP slave stuck on ACQUIRING state for very long time . seems to be large mean path delay and clock offset .
Conditions: you could see this issue with ptp config .
Workaround: not known
Further Problem Description: none
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 01-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | 15.4(3)S2.5, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.5, 15.6(0.7)S |
|
|
| |
| |
Bug Id: | CSCub36217 |
Title: | MAC securtiy is not working in MCP_DEV/XE37 |
|
Description: | Symptom: When the ME3800 router is running IOS 15.2(04)S software, if EVC maximum MAC security address limit is reached for a service instance, new MAC address is not rejected.
Conditions: when EVC MAC security is enabled under a service instance.
Workaround: There is no workaround.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.3: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 01-JUL-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(1)S |
|
Known Fixed Releases: | 12.2(50)SE1, 12.2(50)SE2, 12.2(50)SE3, 12.2(50)SE4, 12.2(50)SE5, 12.2(50)SG4, 12.2(50)SG6, 12.2(50)SQ, 12.2(50)SQ5, 12.2(50)SQ6 |
|
|
| |
| |
Bug Id: | CSCur98665 |
Title: | ciscoipc process crashed when do swap ptp master/slave role |
|
Description: | Symptom: ciscoipc process crashed , service disruptive
Conditions: you can see this issue while swap the ptp role
Workaround: The PTP processor could be reloaded to apply the configuration again through the following command:
test platform software ptp reset
Further Problem Description: none
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUL-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.6(0.7)S |
|
|
| |
| |
Bug Id: | CSCuu13846 |
Title: | MET resource exhaustion with IGMP Snooping |
|
Description: | Symptom: MET exhaustion message may be seen.
*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src-asic-nile/nile_adjmgr_utils.c: 832: adjmgr_free_met *Apr 23 05:04:52.804: -Traceback= 776728z 263995Cz 277A9C0z 275CC7Cz 27610C4z 2EEBEC8z 2EED8ACz 20DDEB0z 20EE1E0z 20C2294z 3918E40z 391405Cz *Apr 23 05:04:52.804: Bad adjmgr_met_free type=3 err=4
*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src
Conditions: Issue is seen when IGMP snooping is enabled and IGMP join/leave messages are frequently received. MET entries are leaking on every igmp timeout/leave/ interface shut/no shut.
Workaround: disable igmp snooping
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S2.1 |
|
Known Fixed Releases: | 15.4(3)S3.2, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.6(0.2)S |
|
|
| |
| |
Bug Id: | CSCuu49953 |
Title: | Unicast Flooding is observed on a Customer routed Pseudo wire network |
|
Description: | Symptom: Unicast Flooding is observed on a Customer routed Pseudo wire network
Conditions: Topology ======== HostA === SW1 === SW2 === HostB
1. Configure a Routed Pseudowire between SW1 and SW2. 2.Configure a routed port between SW1 to router HostA working as NAT. 3. Create a loopback ip address on HostA router. 4. Ping the loopback ip address from SW2. 5. We could see the packets are flooded to pirent2.
customer is trying to ping the lopopback address which is located on cisco HostA router from SW2. Ping packet are flodded to all the ports in vlan 10 . On our topogy, It going out to HostB.
Workaround: NA
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S2.1 |
|
Known Fixed Releases: | 15.4(3)S3.3, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.6(0.4)S |
|
|
| |
| |
Bug Id: | CSCtz16622 |
Title: | ME3600X drop Checksum 0xFFFF packet when act as a label disposition LSR |
|
Description: | Symptoms: A Cisco ME 3600X acts as a label disposition Edge-LSR when receiving MPLS packets with Checksum 0xFFFF that will continue to drop with Ipv4HeaderErr and Ipv4ChecksumError at nile.
Conditions: This symptom is seen with label pop action at the Edge-LSR.
Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-JUL-2015 |
|
Known Affected Releases: | 15.1(2)EY1a, 15.2(2)S |
|
Known Fixed Releases: | 15.1(2)EY3, 15.2(2)S0.4, 15.2(2)S1, 15.2(2.19)S0.2, 15.2(4)S, 15.3(0.2)S |
|
|
| |
| |
Bug Id: | CSCtq77363 |
Title: | Traceback while reading license boot levelno |
|
Description: | Symptoms: License images are not working properly.
Conditions: This symptom is seen when the license image is loaded. There is a traceback due to access of uninitialized variables.
Workaround: There are no workarounds.
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 08-JUL-2015 |
|
Known Affected Releases: | 15.1(2.0.0)EY, 15.2(1)S |
|
Known Fixed Releases: | 15.0(1.33)EZD, 15.0(10.16)EMW, 15.0(2)EA, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EK, 15.0(2)EK1, 15.0(2)EX |
|
|
| |
| |
Bug Id: | CSCus30555 |
Title: | Mcast stops for bridge-domain if the 1st host joined mcast group leaves |
|
Description: | Symptom: On ME3600x multicast stream stops for all EFPs in the same bridge-domain when the host which joined the group first (from that bridge-domain) leaves it.
Conditions: ME3600x passing L2 multicast to end-users connected via EFPs with TenGig uplink in L2 Port-channel1.
Workaround: The issue is met only if Port-channel id is 1, so changing that to Po2 and onwards can be used as a WA.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-JUL-2015 |
|
Known Affected Releases: | 15.3(1)S1 |
|
Known Fixed Releases: | 15.4(3)S3.5, 15.5(2.5)S |
|
|
| |
| |
Bug Id: | CSCud74670 |
Title: | Remote LFA FRR Convergence fails with 3000 prefixes |
|
Description: | Symptom:
When using RLFA repair paths traffic loss may occur during reconvergence following a link failure.
Conditions:
RLFA tunnel is used as a repair path. The greater the number of prefixes affected by the topology change the more likely the traffic loss is to be seen.
Workaround: No workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 11-JUL-2015 |
|
Known Affected Releases: | 15.2(2)SNI, 15.2(4)S, 15.3(1)S, 15.3(2)S |
|
Known Fixed Releases: | 15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB40.1, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.3(1.17)S0.14, 15.3(2)S, 15.3(2)S0a, 15.3(2)S1 |
|
|
| |
| |
Bug Id: | CSCuo93299 |
Title: | AN:Zero Touch Bootstrap not working |
|
Description: | Symptom: ZTB does not work. Conditions: This symptom occurs when the image is loaded and left without aborting the setup dialogue box. Workaround: This issue has been fixed.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | 15.2(4.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.5(0.11)S |
|
|
| |
| |
Bug Id: | CSCuv24255 |
Title: | ME3600X crashes when removing service instance |
|
Description: | Symptom: ME3600X might crash when removing the service-instance from the interface.
Conditions: The issue was observed on the device with egress policy map applied on the interface and ingress policy maps applied on the service instances associated with this interface. The exact steps leading to the crash are:
1) configure the new service instance on the interface 2) configure xconnect on the service instance 3) while in the 'cfg-if-ether-vc-xconn' prompt remove another service instance
Workaround: Exit the "cfg-if-ether-vc-xconn" prompt before removing another service instance.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 13-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu77218 |
Title: | AN: AN not using user configured native vlan as channel |
|
Description: | Symptom: AN not using user configured native vlan as channel
Conditions: When connected to a L3 device
Workaround: N/A
Further Problem Description: Whales when connected to a L3 device, is not using user configured native vlan interface as channel to form neighborship.
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 14-JUL-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus84535 |
Title: | ME3600 - Native Vlan Packets Getting Tagged. |
|
Description: | Symptom: ME3600 - Native Vlan Packets Getting Tagged. The issue is seen only for the forwarding traffic not the device generated traffic.
Issue was seen on IOS 15.4(3)S1
Conditions: nterface GigabitEthernet0/5 switchport trunk native vlan 901 switchport trunk allowed vlan 901 switchport mode trunk
The packets leaving the interface Gi0/5 if it is forwarding traffic will tagged with vl 901 which they shouldn't The issue is seen only for forwarding traffic not the device generated traffic.
Workaround: Configure the interface as access interface if the allowed vlan and native vlan is same But it vary based on the scenario.
Further Problem Description: none
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-JUL-2015 |
|
Known Affected Releases: | 15.4(3)SS |
|
Known Fixed Releases: | 15.4(3)S3.5, 15.5(1)S2.6, 15.5(2.22)S |
|
|
| |
| |
Bug Id: | CSCur34990 |
Title: | CPUHOG and Traceback seen with MSTP and EFP configurations |
|
Description: | Symptom: CPU-HOG seen when configuring (adding/removing) EFP with MST running
Conditions: MST running
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-JUL-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.4(3)S3.5, 15.5(1)S2.6, 15.5(2.7)S |
|
|
| |
| |
Bug Id: | CSCuu76064 |
Title: | AN: Whales establishing ACP to non directly connected devices |
|
Description: | Symptom: Whales is establishing neighborship and ACP to devices which are not directly connected.
Conditions: Default scenario
Workaround: N/A
Further Problem Description: Whales is establishing neighborship and ACP to devices which are not directly connected even tough there is no active L2 channel to the non directly connected devices.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-JUL-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.6(0.10)S |
|
|
| |
| |
Bug Id: | CSCuu71516 |
Title: | AN: Channel not getting formed in Whales. |
|
Description: | Symptom: CD channel is not getting formed in whales platform.
Conditions: With default interface config.
Workaround: N/A
Further Problem Description: Continuous channel creation and deletion observed and hence neighborship, ACP etc won't get established.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-JUL-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.6(0.10)S |
|
|
| |
| |
Bug Id: | CSCui23725 |
Title: | ACL : Disable Egress ACL via platform CLI |
|
Description: | Symptom: Currently there is no way to disable internal egress ACL processing in a manner that persists across reloads. This issue relates to the workaround for CSCul27742.
Conditions: me3600 or me3800 platforms
Workaround: Egress ACL processing can be manually disabled via ----------- service internal exit (to return to enable mode) sdcli nile pp reg configegressouteracl configure 1 0 aclEnable 0 nile pp reg configegressouteracl configure 0 0 aclEnable 0 arsenic mmap i_write 0x40 0x00c24018 0x32 arsenic mmap i_write 0x40 0x00c2401c 0x30 arsenic mmap i_write 0x45 0x00c24018 0x32 arsenic mmap i_write 0x45 0x00c2401c 0x30 exit ----------- These changes will not persist across reload.
Further Problem Description: This defect created the command "platform acl egress-disable". This will allow the system to disable egress packet processing and persist across reloads. Please be aware that enabling this feature will make any configured egress ACLs not filter or match traffic.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-JUL-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S |
|
Known Fixed Releases: | 15.3(3)S0.4, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.4(0.18)S, 15.4(1)S, 15.4(1)S0a |
|
|
| |
| |
Bug Id: | CSCuv04392 |
Title: | ME3600X: VLAN MET programming issue on NIL |
|
Description: | Symptom: ISIS not coming up after moving link to Gi0/1
Conditions: ME3600 with ISIS on Gi0/1 access port
Workaround: Use another interface
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 27-JUL-2015 |
|
Known Affected Releases: | 15.3(3)S4 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus25858 |
Title: | Bad magic number in chunk header, ME crash due to memory corruption |
|
Description: | Symptom: ME3600 Crashes with following info in the syslog/crashinfo:
... Dec 2 10:20:04.735: %SYS-2-CHUNKBADMAGIC: Bad magic number in chunk header, chunk 14A32EEC data 14A3CB28 chunkmagic 3A554E44 chunk_freemagic 0 -Process= "Check heaps", ipl= 0, pid= 5 -Traceback= 7742B8z 1C97204z 1C97F64z 1CBF798z 3BA8CE0z 3BA3FC4z Dec 2 10:20:06.715: %SYS-3-CPUHOG: Task is running for (2000)msecs, more than (2000)msecs (4/1),process = Check heaps. -Traceback= 0x2BDE9E0z 0x2BDF6ECz 0x27B3F18z 0x27B55FCz 0x27B2A34z 0x1CBAD70z 0x1C985E8z 0x1C97214z 0x1C97F64z 0x1CBF798z 0x3BA8CE0z 0x3BA3FC4z Dec 2 10:20:08.731: %SYS-3-CPUHOG: Task is running for (4000)msecs, more than (2000)msecs (8/1),process = Check heaps. -Traceback= 0x2BDE9E4z 0x2BDF6ECz 0x27B3F18z 0x27B5638z 0x27B2A34z 0x1CBAD70z 0x1C9860Cz 0x1C97214z 0x1C97F64z 0x1CBF798z 0x3BA8CE0z 0x3BA3FC4z
Reason is memory corruption in one of the internal memory structures.
Conditions: Not currently known. Problem was noticed so far only on ME 3600 platform running: 15.4(3)S1
Workaround: n/a
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 28-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S0.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus21141 |
Title: | Traffic stops flowing in L3VPN setup after mac-aging time |
|
Description: | Symptom: Traffic stops flowing in L3VPN setup after mac-aging time
Conditions: Traffic stops flowing in L3VPN setup after mac-aging time
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 28-JUL-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(2.2)S |
|
|
| |
| |
Bug Id: | CSCua60395 |
Title: | IPv6 packets are looped on pseudowire |
|
Description: | Symptoms: When an IPv6 packet is received via EoMPLS pseudowire, the packet is punted to the CPU and sent back on the pseudowire.
Conditions: This has been identified on a Cisco ME3600X with Cisco IOS Release 15.2(1)S1.
Workaround:
Option 1: Configure the xconnect under a interface vlan and configure a (dummy) IP address. Example: interface vlan XXX ip address A.B.C.D M.M.M.M xconnect N.N.NN encapsulation mpls
Option 2: Block IPv6 packets on remote end so that these packets are not sent over pseudowire.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 28-JUL-2015 |
|
Known Affected Releases: | 15.2(1)S1 |
|
Known Fixed Releases: | 15.2(4)S0.1, 15.2(4)S1, 15.2(4)S1c, 15.2(4)S2, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4, 15.2(4)S4a, 15.2(4)S5, 15.2(4)S6 |
|
|
| |
| |
Bug Id: | CSCut84010 |
Title: | Lots of Rx power low and high warning messages seen for BX optics. |
|
Description: | Symptom: Lot of Rx power low warning & Rx power high warning messages occurred in ME3600X
Conditions: After IOS Upgrade to 15.4(2)S
Workaround: None
Further Problem Description: After upgrading IOS version from 15.1(2)EY2a to 15.4(2)S, there have been a lot of Rx power low warning & Rx power high warning messages occurred in ME3600X. However, those alarms did not appear before the IOS upgrade.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUL-2015 |
|
Known Affected Releases: | 15.4(2)S |
|
Known Fixed Releases: | 15.4(3)S3.8, 15.5(1)S2.6, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.6(0.1)S |
|
|
| |
| |
Bug Id: | CSCuj96741 |
Title: | SIIT : Whales Crash @nl2vpn_atom_clean_pw_data |
|
Description: | Symptom: Crash @nl2vpn_atom_clean_pw_data
Conditions: Crash observed on un-provisioning of L2VPN neighbors. There are tracebacks seen too upon clearing Xconnects.
Workaround: NA
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUL-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 12.2(52)EY4, 15.3(3)S1.8, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.3(3)S3, 15.3(3)S4, 15.4(0.19)S0.11, 15.4(1)S, 15.4(1)S1 |
|
|
| |
| |
Bug Id: | CSCus80710 |
Title: | ME-3600X broadcast packets amount (dst FF:FF:FF:FF:FF:FF) doubles on SVI |
|
Description: | Symptom: broadcast packets amount (ETHER: Destination FF:FF:FF:FF:FF:FF) doubles on SVI
Conditions: ME-3600X-24FS-M under 15.5(1)S
Workaround: ip address configured on SVI solved this issue
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S, 15.5(1)S |
|
Known Fixed Releases: | 15.4(3)S3.8, 15.5(2.12)S |
|
|
| |
| |
Bug Id: | CSCuv34896 |
Title: | VPLS autodiscovery PW failed to comeup when BGP recovers from failure |
|
Description: | Symptom: A Virtual Private LAN Service (VPLS) Virtual Circuit (VC) which is created using BGP Autodiscovery goes down and stays down when it is reprovisioned due to a BGP route change. The output of show l2vpn vfi or show vfi shows that the pseudowire was not created.
Conditions: This symptom has been observed when multiple BGP NLRI messages are received from the same BGP peer with the same route information. All IOS/IOS-XE versions and platforms are affected.
Workaround: Perform the exec command clear ip bgp.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 30-JUL-2015 |
|
Known Affected Releases: | 15.4(3)S2.1 |
|
Known Fixed Releases: | 15.4(3)S3.8, 15.6(0.11)S, 7.3(0)OTT(0.11) |
|
|
| |
没有评论:
发表评论