Cisco Blog » The Platform

2015年8月1日星期六

Cisco Notification Alert -ME 3600X Series Switch-01-Aug-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S
Release Date:
30-JUL-2015
Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S
Release Date:
30-JUL-2015
Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S
Release Date:
30-JUL-2015
Find additional information in Software Downloads index.

Known Bugs - ME 3600X Series Ethernet Access Switches

Bug Id:
CSCus96586
Title:
Ptp clock stuck on ACQUIRING state for very long time
Description:

Symptom:
PTP slave stuck on ACQUIRING state for very long time . seems to be large mean path delay and clock offset .

Conditions:
you could see this issue with ptp config .

Workaround:
not known

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S2.5, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.5, 15.6(0.7)S
Bug Id:
CSCub36217
Title:
MAC securtiy is not working in MCP_DEV/XE37
Description:

Symptom:
When the ME3800 router is running IOS 15.2(04)S software, if EVC maximum MAC security
address limit is reached for a service instance, new MAC address is not rejected.

Conditions:
when EVC MAC security is enabled under a service instance.

Workaround:
There is no workaround.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
1.7/1.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
15.2(4)S, 15.3(1)S
Known Fixed Releases:
12.2(50)SE1, 12.2(50)SE2, 12.2(50)SE3, 12.2(50)SE4, 12.2(50)SE5, 12.2(50)SG4, 12.2(50)SG6, 12.2(50)SQ, 12.2(50)SQ5, 12.2(50)SQ6
Bug Id:
CSCur98665
Title:
ciscoipc process crashed when do swap ptp master/slave role
Description:

Symptom:
ciscoipc process crashed , service disruptive

Conditions:
you can see this issue while swap the ptp role

Workaround:
The PTP processor could be reloaded to apply the configuration again through the following command:

test platform software ptp reset

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.6(0.7)S
Bug Id:
CSCuu13846
Title:
MET resource exhaustion with IGMP Snooping
Description:

Symptom:
MET exhaustion message may be seen.

*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src-asic-nile/nile_adjmgr_utils.c: 832: adjmgr_free_met
*Apr 23 05:04:52.804: -Traceback= 776728z 263995Cz 277A9C0z 275CC7Cz 27610C4z 2EEBEC8z 2EED8ACz 20DDEB0z 20EE1E0z 20C2294z 3918E40z 391405Cz
*Apr 23 05:04:52.804: Bad adjmgr_met_free type=3 err=4

*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src

Conditions:
Issue is seen when IGMP snooping is enabled and IGMP join/leave messages are frequently received. MET entries are leaking on every igmp timeout/leave/ interface shut/no shut.

Workaround:
disable igmp snooping

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases:
15.4(3)S3.2, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.6(0.2)S
Bug Id:
CSCuu49953
Title:
Unicast Flooding is observed on a Customer routed Pseudo wire network
Description:

Symptom:
Unicast Flooding is observed on a Customer routed Pseudo wire network

Conditions:
Topology
========
HostA === SW1 === SW2 === HostB

1. Configure a Routed Pseudowire between SW1 and SW2.
2.Configure a routed port between SW1 to router HostA working as NAT.
3. Create a loopback ip address on HostA router.
4. Ping the loopback ip address from SW2.
5. We could see the packets are flooded to pirent2.

customer is trying to ping the lopopback address which is located on cisco HostA router from SW2.
Ping packet are flodded to all the ports in vlan 10 .
On our topogy, It going out to HostB.

Workaround:
NA

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases:
15.4(3)S3.3, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.6(0.4)S
Bug Id:
CSCtz16622
Title:
ME3600X drop Checksum 0xFFFF packet when act as a label disposition LSR
Description:

Symptoms: A Cisco ME 3600X acts as a label disposition Edge-LSR when
receiving MPLS packets with Checksum 0xFFFF that will continue to drop with
Ipv4HeaderErr and Ipv4ChecksumError at nile.

Conditions: This symptom is seen with label pop action at the Edge-LSR.

Workaround: There is no workaround.


Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
15.1(2)EY1a, 15.2(2)S
Known Fixed Releases:
15.1(2)EY3, 15.2(2)S0.4, 15.2(2)S1, 15.2(2.19)S0.2, 15.2(4)S, 15.3(0.2)S
Bug Id:
CSCtq77363
Title:
Traceback while reading license boot levelno
Description:

Symptoms: License images are not working properly.

Conditions: This symptom is seen when the license image is loaded. There is a
traceback due to access of uninitialized variables.

Workaround: There are no workarounds.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
08-JUL-2015
Known Affected Releases:
15.1(2.0.0)EY, 15.2(1)S
Known Fixed Releases:
15.0(1.33)EZD, 15.0(10.16)EMW, 15.0(2)EA, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EK, 15.0(2)EK1, 15.0(2)EX
Bug Id:
CSCus30555
Title:
Mcast stops for bridge-domain if the 1st host joined mcast group leaves
Description:

Symptom:
On ME3600x multicast stream stops for all EFPs in the same bridge-domain when the host which joined the group first (from that bridge-domain) leaves it.

Conditions:
ME3600x passing L2 multicast to end-users connected via EFPs with TenGig uplink in L2 Port-channel1.

Workaround:
The issue is met only if Port-channel id is 1, so changing that to Po2 and onwards can be used as a WA.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
15.3(1)S1
Known Fixed Releases:
15.4(3)S3.5, 15.5(2.5)S
Bug Id:
CSCud74670
Title:
Remote LFA FRR Convergence fails with 3000 prefixes
Description:

Symptom:

When using RLFA repair paths traffic loss may occur during reconvergence following a link failure.

Conditions:

RLFA tunnel is used as a repair path.
The greater the number of prefixes affected by the topology change the more likely the traffic loss
is to be seen.

Workaround:
No workaround.


Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUL-2015
Known Affected Releases:
15.2(2)SNI, 15.2(4)S, 15.3(1)S, 15.3(2)S
Known Fixed Releases:
15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB40.1, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.3(1.17)S0.14, 15.3(2)S, 15.3(2)S0a, 15.3(2)S1
Bug Id:
CSCuo93299
Title:
AN:Zero Touch Bootstrap not working
Description:

Symptom: ZTB does not work.
Conditions: This symptom occurs when the image is loaded and left without aborting the setup dialogue box.
Workaround: This issue has been fixed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.2(4.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.5(0.11)S
Bug Id:
CSCuv24255
Title:
ME3600X crashes when removing service instance
Description:

Symptom:
ME3600X might crash when removing the service-instance from the interface.

Conditions:
The issue was observed on the device with egress policy map applied on the interface and ingress policy maps applied on the service instances associated with this interface.
The exact steps leading to the crash are:

1) configure the new service instance on the interface
2) configure xconnect on the service instance
3) while in the 'cfg-if-ether-vc-xconn' prompt remove another service instance

Workaround:
Exit the "cfg-if-ether-vc-xconn" prompt before removing another service instance.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuu77218
Title:
AN: AN not using user configured native vlan as channel
Description:

Symptom:
AN not using user configured native vlan as channel

Conditions:
When connected to a L3 device

Workaround:
N/A

Further Problem Description:
Whales when connected to a L3 device, is not using user configured native vlan interface as channel to form neighborship.

Status:
Open
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCus84535
Title:
ME3600 - Native Vlan Packets Getting Tagged.
Description:

Symptom:
ME3600 - Native Vlan Packets Getting Tagged.
The issue is seen only for the forwarding traffic not the device generated traffic.

Issue was seen on IOS 15.4(3)S1

Conditions:
nterface GigabitEthernet0/5
switchport trunk native vlan 901
switchport trunk allowed vlan 901
switchport mode trunk

The packets leaving the interface Gi0/5 if it is forwarding traffic will tagged with vl 901 which they shouldn't
The issue is seen only for forwarding traffic not the device generated traffic.

Workaround:
Configure the interface as access interface if the allowed vlan and native vlan is same
But it vary based on the scenario.

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
15.4(3)SS
Known Fixed Releases:
15.4(3)S3.5, 15.5(1)S2.6, 15.5(2.22)S
Bug Id:
CSCur34990
Title:
CPUHOG and Traceback seen with MSTP and EFP configurations
Description:

Symptom:
CPU-HOG seen when configuring (adding/removing) EFP with MST running

Conditions:
MST running

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.4(3)S3.5, 15.5(1)S2.6, 15.5(2.7)S
Bug Id:
CSCuu76064
Title:
AN: Whales establishing ACP to non directly connected devices
Description:

Symptom:
Whales is establishing neighborship and ACP to devices which are not directly connected.

Conditions:
Default scenario

Workaround:
N/A

Further Problem Description:
Whales is establishing neighborship and ACP to devices which are not directly connected even tough there is no active L2 channel to the non directly connected devices.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.6(0.10)S
Bug Id:
CSCuu71516
Title:
AN: Channel not getting formed in Whales.
Description:

Symptom:
CD channel is not getting formed in whales platform.

Conditions:
With default interface config.

Workaround:
N/A

Further Problem Description:
Continuous channel creation and deletion observed and hence neighborship, ACP etc won't get established.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.6(0.10)S
Bug Id:
CSCui23725
Title:
ACL : Disable Egress ACL via platform CLI
Description:

Symptom:
Currently there is no way to disable internal egress ACL processing in a manner that persists across reloads. This issue relates to the workaround for CSCul27742.

Conditions:
me3600 or me3800 platforms

Workaround:
Egress ACL processing can be manually disabled via
-----------
service internal
exit (to return to enable mode)
sdcli
nile pp reg configegressouteracl configure 1 0 aclEnable 0 nile pp reg configegressouteracl configure 0 0 aclEnable 0 arsenic mmap i_write 0x40 0x00c24018 0x32 arsenic mmap i_write 0x40 0x00c2401c 0x30 arsenic mmap i_write 0x45 0x00c24018 0x32 arsenic mmap i_write 0x45 0x00c2401c 0x30 exit
-----------
These changes will not persist across reload.

Further Problem Description:
This defect created the command "platform acl egress-disable". This will allow the system to disable egress packet processing and persist across reloads. Please be aware that enabling this feature will make any configured egress ACLs not filter or match traffic.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S
Known Fixed Releases:
15.3(3)S0.4, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.4(0.18)S, 15.4(1)S, 15.4(1)S0a
Bug Id:
CSCuv04392
Title:
ME3600X: VLAN MET programming issue on NIL
Description:

Symptom:
ISIS not coming up after moving link to Gi0/1

Conditions:
ME3600 with ISIS on Gi0/1 access port

Workaround:
Use another interface

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases:
Bug Id:
CSCus25858
Title:
Bad magic number in chunk header, ME crash due to memory corruption
Description:

Symptom:
ME3600 Crashes with following info in the syslog/crashinfo:

...
Dec 2 10:20:04.735: %SYS-2-CHUNKBADMAGIC: Bad magic number in chunk header,
chunk 14A32EEC data 14A3CB28 chunkmagic 3A554E44 chunk_freemagic 0 -Process= "Check heaps", ipl= 0, pid= 5
-Traceback= 7742B8z 1C97204z 1C97F64z 1CBF798z 3BA8CE0z 3BA3FC4z
Dec 2 10:20:06.715: %SYS-3-CPUHOG: Task is running for (2000)msecs, more than (2000)msecs (4/1),process = Check heaps.
-Traceback= 0x2BDE9E0z 0x2BDF6ECz 0x27B3F18z 0x27B55FCz 0x27B2A34z 0x1CBAD70z 0x1C985E8z 0x1C97214z 0x1C97F64z 0x1CBF798z 0x3BA8CE0z 0x3BA3FC4z
Dec 2 10:20:08.731: %SYS-3-CPUHOG: Task is running for (4000)msecs, more than (2000)msecs (8/1),process = Check heaps.
-Traceback= 0x2BDE9E4z 0x2BDF6ECz 0x27B3F18z 0x27B5638z 0x27B2A34z 0x1CBAD70z 0x1C9860Cz 0x1C97214z 0x1C97F64z 0x1CBF798z 0x3BA8CE0z 0x3BA3FC4z

Reason is memory corruption in one of the internal memory structures.

Conditions:
Not currently known. Problem was noticed so far only on ME 3600 platform running: 15.4(3)S1

Workaround:
n/a

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
15.4(3)S0.1
Known Fixed Releases:
Bug Id:
CSCus21141
Title:
Traffic stops flowing in L3VPN setup after mac-aging time
Description:

Symptom:
Traffic stops flowing in L3VPN setup after mac-aging time

Conditions:
Traffic stops flowing in L3VPN setup after mac-aging time

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(2.2)S
Bug Id:
CSCua60395
Title:
IPv6 packets are looped on pseudowire
Description:

Symptoms: When an IPv6 packet is received via EoMPLS pseudowire, the packet
is punted to the CPU and sent back on the pseudowire.

Conditions: This has been identified on a Cisco ME3600X with Cisco IOS
Release 15.2(1)S1.

Workaround:

Option 1: Configure the xconnect under a interface vlan and configure a
(dummy) IP address.
Example:
interface vlan XXX
ip address A.B.C.D M.M.M.M
xconnect N.N.NN encapsulation mpls

Option 2: Block IPv6 packets on remote end so that these packets are not sent
over pseudowire.


Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
15.2(1)S1
Known Fixed Releases:
15.2(4)S0.1, 15.2(4)S1, 15.2(4)S1c, 15.2(4)S2, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4, 15.2(4)S4a, 15.2(4)S5, 15.2(4)S6
Bug Id:
CSCut84010
Title:
Lots of Rx power low and high warning messages seen for BX optics.
Description:

Symptom:
Lot of Rx power low warning & Rx power high warning messages occurred in ME3600X

Conditions:
After IOS Upgrade to 15.4(2)S

Workaround:
None

Further Problem Description:
After upgrading IOS version from 15.1(2)EY2a to 15.4(2)S, there have been
a lot of Rx power low warning & Rx power high warning messages occurred in ME3600X.
However, those alarms did not appear before the IOS upgrade.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(3)S3.8, 15.5(1)S2.6, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.6(0.1)S
Bug Id:
CSCuj96741
Title:
SIIT : Whales Crash @nl2vpn_atom_clean_pw_data
Description:

Symptom:
Crash @nl2vpn_atom_clean_pw_data

Conditions:
Crash observed on un-provisioning of L2VPN neighbors. There are tracebacks seen too upon clearing Xconnects.

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
12.2(52)EY4, 15.3(3)S1.8, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.3(3)S3, 15.3(3)S4, 15.4(0.19)S0.11, 15.4(1)S, 15.4(1)S1
Bug Id:
CSCus80710
Title:
ME-3600X broadcast packets amount (dst FF:FF:FF:FF:FF:FF) doubles on SVI
Description:

Symptom:
broadcast packets amount (ETHER: Destination FF:FF:FF:FF:FF:FF) doubles on SVI

Conditions:
ME-3600X-24FS-M under 15.5(1)S

Workaround:
ip address configured on SVI solved this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
15.4(3)S, 15.5(1)S
Known Fixed Releases:
15.4(3)S3.8, 15.5(2.12)S
Bug Id:
CSCuv34896
Title:
VPLS autodiscovery PW failed to comeup when BGP recovers from failure
Description:

Symptom:
A Virtual Private LAN Service (VPLS) Virtual Circuit (VC) which is created
using BGP Autodiscovery goes down and stays down when it is reprovisioned
due to a BGP route change. The output of show l2vpn vfi
or show vfi shows that the pseudowire was not created.

Conditions:
This symptom has been observed when multiple BGP NLRI messages are received
from the same BGP peer with the same route information. All IOS/IOS-XE
versions and platforms are affected.

Workaround:
Perform the exec command clear ip bgp.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases:
15.4(3)S3.8, 15.6(0.11)S, 7.3(0)OTT(0.11)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论