Cisco Blog » The Platform

2015年8月1日星期六

Cisco Notification Alert -Nexus 7000 Series Switch-01-Aug-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(1)
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.1.exe
File Description:

DCNM 7.2.1 Installer for Windows (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.ova
File Description:

DCNM 7.2.1 Open Virtual Appliance for VMWare

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.1.zip
File Description:

DCNM 7.2.1 Silent Installer Property Files

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.1.zip
File Description:

DCNM 7.2.1 San Client Package

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.1.bin
File Description:

DCNM 7.2.1 Installer for Linux (64-bit)

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.1.zip
File Description:

DCNM 7.2.1 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
06-JUL-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.1.iso
File Description:

DCNM 7.2.1 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
06-JUL-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Bug Id:
CSCtx66099
Title:
CDP crashes when receiving malformed packet
Description:

Symptoms:
Cisco Nexus 1000, 3000, 4000, 5000, and 7000 switches as well as Cisco Unified Computing System Fabric Interconnect devices may restart after receiving malformed Cisco Discovery Protocol (CDP) Packets. An adjacent attacker, with the ability to submit malformed CDP traffic to an affected device could cause a denial of service condition while the device reloads or fails over to a redundant Supervisor card if so equipped.

Conditions:
Cisco Nexus Switches running an affected version of NX-OS.
Cisco Unified Computing System, Fabric Interconnect devices running an affected version of UCS Software.

Workaround:
Disable CDP on the affecte device, the CDP protocol is enabled by default.

NX-OS:
no cdp enable

UCS:
Add the 'disable cdp' command to all Network Control Policies


Further Problem Description:
This issue was identified through internal hardening efforts on the NX-OS platform.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-1322 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(4.12)S0
Bug Id:
CSCtx54818
Title:
Specific SNMP GET request causes 'ipqosmgr' to crash on Nexus 7K
Description:

Symptoms:
Cisco Nexus 7000 devices contain a denial of service vulnerability within the SNMP subsystem. This vulnerability could allow an authenticated,
remote attacker to crash the device by submitting a malformed SNMP request to a specific MIB.

Conditions:
Cisco Nexus 7000 devices running an affected version of Cisco NX-OS Software.

Workaround:
None.

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/6.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-4126 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.9)S0
Bug Id:
CSCtn13065
Title:
BGP does not filter BGP update with incorrect AS-PATH Segment Length
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path Segment Lengths. This could allow an upstream BGP
neighbor to pass an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in
a rest of and resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4099 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases:
5.2(0.218)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCts56669
Title:
Read-only user can create and overwrite files
Description:



Symptom:

Cisco Nexus devices contain an input validation vulnerability. This issue could allow a local, authenticated attacker to create or overwrite arbitrary files
on the device. This issue affects all user account types including Read-Only users.

This issue affects Nexus 7000 series and Nexus 5000 series devices.



Conditions:

Devices running an affected version of NX-OS Software.



Workaround:

Restrict access to trusted users only.



Further Problem Description:

This issue was identified during an internal security audit of Cisco Nexus devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.6/3.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:C/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2012-4122 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4122

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.1(3)
Known Fixed Releases:
6.2(0.41)S0, 6.2(2), 7.0(1)ZD(0.3)
Bug Id:
CSCuj13702
Title:
Make 'to' option of lig only available to admin-level users
Description:


Symptom:
Cisco IOS and Cisco NX-OS contain a vulnerability that could allow an authenticated, local attacker to poison the LISP routing cache on the router
configured as a ITR.
Conditions:
An attacker needs to have a privilege 0 local access to the ITR router and execute ''lig'' commands.
Workaround:
1. configure ''privilege exec level 15 lig'', to prevent privilege level 1 users from executing the lig command.
2. use separate VRFs for the EID and RLOC spaces, assuming the attacker does not have access to the RLOC case.
3. using GETVPN or other crypto in the RLOC space may mitigate against this, but not in the common deployment scenario, where crypto maps are
applied to the LISP0 interface.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.5/1.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:W/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(5)BF(0.23), 6.2(5.42)S0, 6.2(6)
Bug Id:
CSCtn13055
Title:
BGP does not filter updates with incorrect AS-PATH values
Description:



Symptom:

Cisco NXOS based devices configured for BGP routing do not properly filter invalid AS Path values. This could allow an upstream BGP neighbor to pass
an invalid update to an NXOS based device that would then be propagated down stream of the affected device. This will likely result in a rest of and
resync with the BGP peer that received the invalid update.



Conditions:

Cisco devices running an affected version of NXOS software and configured for BGP.

This issue affects:
Nexus 7000



Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4098 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(0.180)S14
Known Fixed Releases:
5.2(0.218)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCtx54822
Title:
Specific SNMP GET request causes 'snmpd' service to crash on Nexus 7K
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
9.0/7.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1180 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.11)S0, 7.1(0)BF(0.74), 7.1(0)ZD(0.158), 7.1(0)ZD(0.225)
Bug Id:
CSCtx54830
Title:
Specific SNMP GET request causes 'snmpd' and 'licmgr' services to crash
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

Conditions:
See published Cisco Security Advisory

Workarounds:
See published Cisco Security Advsiory

Further Problem Description:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
9.0/7.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1179 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.11)S0, 7.1(0)BF(0.74), 7.1(0)ZD(0.158), 7.1(0)ZD(0.225)
Bug Id:
CSCtx54797
Title:
Specific SNMP GET request causes 'vlan_mgr' to crash on Nexus switches
Description:

Symptoms:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices contain a denial of service vulnerability within the SNMP subsystem. An
authenticated, remote attacker could submit a request to an affected device designed to trigger a null pointer dereference error that results in a crash
and reload of the affected device.

Conditions:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices running an affected version of Cisco NX-OS Software.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/6.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-4125 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
5.2(4.47)S0
Bug Id:
CSCtj73415
Title:
RIP crash at rip_ipv4_pkt_debug_message during UDP port reconnaisance
Description:



Symptom:

Cisco NXOS based devices contain a denial of service vulnerability within the Routing Information Protocol (RIP) service engine. An unauthenticated,
remote attacker with the ability to submit a malformed RIPv4 or RIPv6 message to port UDP/520 could cause the RIP service engine to restart. This
may result in a temporary inability for the device to pass traffic to a destination populated in the route table by RIP.



Conditions:

Cisco devices running an affected version of NXOS software and configured to utilize RIP.

This issue affects:
Nexus 7000




Workaround:

None



Further Problem Description:

This issue was identified during an internal security audit of Cisco NXOS based devices.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score and has issued this Release Note Enclosure. There will be no further
communications from the Cisco PSIRT regarding this issue.

The Base and Temporal CVSS scores as of the time of evaluation are 5/3.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

CVE ID CVE-2012-4091 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4091

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(0.1)
Known Fixed Releases:
5.0(0)MP1(0.420), 5.1(1.49)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCud69928
Title:
N7K: Received Duplicate DBD packets cause 7K to increase sequence number
Description:

Symptom:
N7K may incorrectly increment its DBD sequence number by 2 instead of 1 when it receives
duplicate DBD packets. This will cause the neighboring device to detect a bad sequence number
and reset the neighbor relationship to extart state.

Conditions:
N7K is Master in the Neighbor relationship. N7K sends a DBD with relative sequence number of 1:

Neighbor <--------seq 1------- N7K

Neighbor echos DBD with sequence number of 1 as per RFC but it sends one or more duplicates:

Neighbor ----------seq 1-------> N7K
Neighbor ----------seq 1-------> N7K

N7K should discard the duplicate packets but in some instances it may incorrectly increment the
relative sequence number buy 2 instead of 1:

Neighbor <-------seq 3--------- N7K

This will cause the neighbor to detect a bad sequence number and send a DBD with the I bit set
which will move the state machine from exchange to exstart:

Neighbor ----------seq 2(I bit set)----- N7K

Workaround:
Eliminate the duplicate DBD packets.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.9/2.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.1(5)
Known Fixed Releases:
5.2(9), 5.2(9)S26, 5.2(9.50)S0, 6.0(2)A1(1), 6.0(2)N2(1), 6.0(2)U1(1), 6.1(3), 6.1(3)S30, 6.1(3.44)S0, 6.2(1.93)
Bug Id:
CSCus77610
Title:
N7710G: ports down due to UDLD empty echo after neighbor LC reloaded
Description:

Symptom:
Link may go to errdisable state with "UDLD empty echo" very rarely when line card reload

Conditions:
On 10G board, configure
1. UDLD protocol enabled
2. Option "system default link-fail laser-on" enabled
3. interface debounce time is set to 0

then reload the line card.

Workaround:
1. shut/no shut the port that in "errdisable" state, or
2. configure the link debounce time to 10ms or larger, or
3. disable the UDLD protocol, or
4. configure "no system default link-down laser-on" option

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.453), 7.2(0)D1(1), 7.2(0)PDB(0.373), 7.2(0)VOF(0.2), 7.2(0)VZD(0.26)
Bug Id:
CSCus88425
Title:
pvlan configured ports error disabled iftmc: invalid argument
Description:

Symptom:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Conditions:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Workaround:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Error disabled auto(D) --
Eth1/16 1 eth access down Error disabled auto(D) --
Eth1/30 1 eth access down Error disabled auto(D) --
Eth1/34 1 eth access down Error disabled auto(D) --
Eth1/36 1 eth access down Error disabled auto(D) --
Eth1/38 1 eth access down Error disabled auto(D) --
india-29(config-vlan)#
india-29(config-vlan)#
india-29(config-vlan)# sh int eth1/10
Ethernet1/10 is down (Error disabled, iftmc: invalid argument to function call)
admin state is up, Dedicated Interface
Hardware: 10/100/1000 Ethernet, address: 0024.986f.20e5 (bia 0024.986f.20e5)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
auto-duplex, 1000 Mb/s

Further Problem Description:
<>
india-29(config-vlan)# sh int bri | i error
india-29(config-vlan)# sh int bri | i dis
Eth1/10 1 eth access down Err

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(12), 7.2(0.2), 7.2(0.4)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.454), 7.2(0)D1(1), 7.2(0)RTG(0.143)
Bug Id:
CSCut28707
Title:
stale/no MAC on Hw of F1 as FE not programmed on MTM due to DFTM
Description:

Symptom:
Unicast flooding or traffic blackhole if the MAC is not programmed or programmed with wrong index respectively.

Conditions:
F1 module.

Workaround:
remove the affected ports from PC and add it back.

or

reload module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.19), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)D1(0.493), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.175), 7.3(0)IB(0.19)
Bug Id:
CSCub81080
Title:
MTM cores found during l2fm
Description:

Symptoms:
Line card may crash when processing a number of packets with broadcast source MAC address.
Conditions:
receiving multiple packets with source MAC address set to broadcast on a F2 Line Card.
Workaround:
None
Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
3.3/2.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(7), 6.1(1.62)S0, 6.1(2)
Known Fixed Releases:
5.2(7.23)S0, 5.2(9), 6.1(2.27), 6.1(2.6)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCti11629
Title:
Cisco NX-OS VDC SSH Privilege Escalation Vulnerability
Description:

Symptom:
Advisory ID: cisco-sa-20140521-nxos

Revision 1.0

For Public Release 2014 May 21 16:00 UTC (GMT)

Summary
=======

Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Cisco NX-OS Virtual Device Context SSH Privilege Escalation Vulnerability
* Cisco NX-OS Virtual Device Context SSH Key Privilege Escalation Vulnerability
* Cisco NX-OS-Based Products Smart Call Home Buffer Overflow Vulnerability
* Cisco NX-OS Message Transfer Service Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Conditions:
A device running an affected version of software.

Workaround:
None

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/6.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C

CVE ID CVE-2014-2200 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html



Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUL-2015
Known Affected Releases:
5.0(2a)
Known Fixed Releases:
5.0(3)N1(1), 5.0(5.1)S0
Bug Id:
CSCus57051
Title:
Hsrp_Engine crash during ISSU from 6.2(8a) to 6.2.10
Description:

Symptom:
Failure recovery action::

"Standby will be rebooted to force netboot and image download".

Install has failed. Return code 0x4093005E (system switchover failed).
Please identify the cause of the failure, and try 'install all' again.

Conditions:
ISSU from 6.2(8a) to 6.2.10

Workaround:
Upgrade without ISSU

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(12)S27, 6.2(12.4)S0, 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.1(2)N1(0.543), 7.2(0)AB(2), 7.2(0)BA(0.12), 7.2(0)D1(0.398), 7.2(0)D1(1), 7.2(0)N1(0.87)
Bug Id:
CSCut01933
Title:
default route not withdrawn after removing "default originate"
Description:

Symptom:
Default route will not be withdrawn from vpnv4 table.

Conditions:
Multiple [no] default-originate command toggles being configured in addess-family vpnv4. More especifically, the following steps are the minimum required to hit the issue considering the vpnv4 unicast address-family is clean of any configurations:

1. default-information originate always rd route-target
2. no default-information originate always rd route-target
3. default-information originate always rd route-target
4. no default-information originate always rd route-target

Step 3 must be executed quickly after number 2. In this case, after executing step 4, the issue will be seen.

Workaround:
Restart BGP.

Further Problem Description:
The problem will only happen if you reconfigure default-originate quickly after previously removing it, such that there was no time to completely clean up the default-route from the vpnv4 table.

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(2)N1(0.554), 7.1(2)ZD(0.9), 7.1(2)ZN(0.13), 7.2(0)D1(0.451), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCtw98915
Title:
Cisco NX-OS Message Transfer Service DoS Vulnerability
Description:

Symptom:
Advisory ID: cisco-sa-20140521-nxos

Revision 1.0

For Public Release 2014 May 21 16:00 UTC (GMT)

Summary
=======

Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Cisco NX-OS Virtual Device Context SSH Privilege Escalation Vulnerability
* Cisco NX-OS Virtual Device Context SSH Key Privilege Escalation Vulnerability
* Cisco NX-OS-Based Products Smart Call Home Buffer Overflow Vulnerability
* Cisco NX-OS Message Transfer Service Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Conditions:
A device running an affected version of software.

Workaround:
None

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2014-2201 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.0(1), 6.0(2)
Known Fixed Releases:
6.0(2)S30, 6.0(2)S31, 6.1(0.174)S0, 7.0(1)ZD(0.3), 7.2(0)N1(1), 7.2(0)ZN(0.111)
Bug Id:
CSCum42151
Title:
Enable secret hashes improperly calculated
Description:

Symptoms:
The salt of 'enable secrets' is not randomized properly.
Conditions:
'feature privilege' is configured.
Workaround:
None
Further Problem Description:
None
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
6.0(2)A4(0.764), 6.0(2)A4(1), 6.0(2)U4(0.764), 6.0(2)U4(1), 6.2(10), 6.2(8)KR(0.8), 6.2(8.13)S0, 6.2(9)FM(0.67)
Bug Id:
CSCut38574
Title:
Wrong EIGRP delay calculation
Description:

Symptom:
Two port-channels with different bandwidth are being populated in the routing table as equal-path. And two port-channels with same bandwidth are not both populated as equal-path in the routing table.

Conditions:
Using EIGRP with 40G links/port-channels.

Workaround:
We figure out the issue. The delay value is getting cached and we are no updating it on b/w change.
I will fix this issue.

The main thing is we need to update delay on bandwidth change. Or we need to flush it. So it will get updated with correct value
corresponding to updated bandwidth.

Work around:
That can be done with,
#SVS-N7K-C1-61# conf t
#SVS-N7K-C1-61(config)# interface port-channel 12
#SVS-N7K-C1-61(config-if)# ip delay eigrp 100 200000 << some random value
#SVS-N7K-C1-61(config-if)#no ip delay eigrp 100 200000

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.23), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCuc19553
Title:
RADIUS insufficient attribute length check
Description:

Symptoms:
Cisco NXOS contains a vulnerability in the RADIUS authentication code.
Conditions:
Malformed packets are returned from a RADIUS authentication server.
Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-6377 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.0(3)
Known Fixed Releases:
6.1(2.45)S0, 6.2(0.273)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCtz01813
Title:
N7K-F248XP-25 fex port may hang when in vntag mode
Description:

Symptom:

Any port that connects any Fabric Extender (FEX) device terminated on a N7K-F248XP-25 module of
a Nexus 7000 chassis may go err-disable and possibly take the FEX offline.

Conditions:

Only seen on N7K-F248XP-25 ports in fex mode

Workaround:

Reload the module to recover from the condition.

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
6.0(3)S2, 6.0(3)S5, 6.1(0.252)S0
Bug Id:
CSCuu11331
Title:
N7K - SNMP snmpd core os_syscall_ioctl, tcp_api.c, libmts.c running UTE
Description:

Symptom:snmpd crashed. In the background 8 out of 10 times its aclqos mib causing the problem.
Conditions:This happens when CPU utilization is high from the normal.
Workaround:snmpd restart is stateful so it boots up with all the configs intact.

Status:
Open
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(10), 6.2(10)S102, 7.2(0)D1(0.475), 7.2(0)D1(0.484), 7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCud24904
Title:
DIAGCLIENT-2-EEM_ACTION_HM_SHUTDOWN: Test <RealTime Clock> disabled
Description:

Symptom:
Diagclient failures are reported on the sup.

%DIAGCLIENT-2-EEM_ACTION_HM_SHUTDOWN: Test has been disabled as a part of default EEM action
%DEVICE_TEST-2-RTC_FAIL: Module 1 has failed test RealTimeClock 20 times on device RealTimeClock due to error The clock jiffies were found to be not moving
%MODULE-4-MOD_WARNING: Module 1 (Serial number: <>) reported warning due to The clock jiffies were found to be not moving in device DEV_UNDEF (device error 0x0)

MDS# sh module
Mod Ports Module-Type Model Status
--- ----- ----------------------------------- ------------------ ----------
1 0 Supervisor module-1X N7K-SUP1 active *
2 0 Supervisor module-1X N7K-SUP1 ha-standby
3 48 1/10 Gbps Ethernet Module N7K-F248XP-25 ok
4 48 1/10 Gbps Ethernet Module N7K-F248XP-25 ok
5 32 10 Gbps Ethernet XL Module N7K-M132XP-12L ok
6 32 10 Gbps Ethernet XL Module N7K-M132XP-12L ok

.....
....
Mod Online Diag Status
--- ------------------
1 Fail
2 Pass
3 Pass
4 Pass
5 Pass
6 Pass
Conditions:MDS 9700 or Nexus 7K

There were no specific triggers prior to these failures.
Workaround:None at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.1(3)S11, 6.1(3)S18, 6.1(3)S4, 6.1(4a)S11, 6.1(4a)S12, 6.2(1.121)S0, 6.2(1.121)S1, 6.2(1.131), 6.2(1.23)S3, 6.2(2)S1
Known Fixed Releases:
6.1(4a), 6.1(4a)S14, 6.1(5)S8, 6.1(5.6)S0, 6.2(0)HS(0.10), 6.2(1.112)S0, 6.2(1.156)S0, 6.2(2), 6.2(2)S25, 6.2(2)S9
Bug Id:
CSCut20914
Title:
EIGRP IPv6 neighbour sessions flaps after LC reload
Description:

Symptom:
EIGRP ipv6 neighbor sessions flap

Conditions:
After LC reload

Workaround:
None

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCus09312
Title:
PVLAN:VPC PO member (M1 LC) flaps.
Description:

Symptom:
Port-channels which have
1) PVLAN trunk secondary config
and
2)LACP or other control protocols running,
could flap continuously, due to BPDU's not flowing. They don't flow because the native vlan is in CBL disabled state, instead of being in CBL Blocking state.

Conditions:
The issue is specific to M1 module since the programming model is different on F2/F3 LC's.
There is no issue on F2 and F3 modules.

Even if the customer uses M1 module there is NO issue, if customer is allowing native VLAN on VPC Leg.

Below are the 3 conditions that need to be satisfied to hit this bug:
1) PVLAN port mode should be TRUNK Secondary
2) Native VLAN is NOT allowed on VPC Leg
3) LC Module should be M1 module

Workaround:
Workaround is to have customer have the native vlan in allowed list for the port, by configuration.

For a private-vlan port, the command to add trunk allowed vlan 1 would be:
switchport private-vlan trunk allowed vlan 1

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
6.2(10)S102, 6.2(12)FT(0.7)
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.459), 7.2(0)D1(1), 7.2(0)PDB(0.382)
Bug Id:
CSCut29918
Title:
UIN-1::Seeing IPV6 eigrp auth failure during system switchover
Description:

Symptom:
IPV6 eigrp auth failure during system switchover

Conditions:
Authentication is enabled for IPv4 EIGRP on the same interface

Workaround:
Unconfigure/Reconfigure ipv6 eigrp on the interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.2(0)D1(0.437)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)SIB(99.109), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.444), 7.2(0)D1(0.456), 7.2(0)D1(0.457), 7.2(0)D1(1)
Bug Id:
CSCue67277
Title:
Interface does not recover from err-disable state during ISSU from 5.2.7
Description:

Symptom:
During ISSU, if any ports flap they get error disabled and stay error disabled even after ISSU is completed.
Conditions:
Issue occurs only if ports flap while ISSU is in progress.

Workaround(s):
shut/no shut will bring up the error disabled ports.
Workaround:
Workaround for recovering error disabled ports :

- Wait till the ISSU is over. Once the system is ready, issue a "shut / no shut" on the ports to recover them to normal state.
More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(5)S2, 6.1(3)S47, 6.2(1.111)S4, 6.2(1.118)S1, 6.2(1.125)S5, 6.2(1.91)S7, 6.2(5.7), 7.0(0)FV(0.88), 7.0(0.1)
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.20)S0, 6.2(1.121)S0, 6.2(1.127)S0, 6.2(2), 7.1(0)D1(0.14), 7.2(0)VZN(0.30)
Bug Id:
CSCua10013
Title:
During ISSU from FH1a to GC181,traffic loss due to ISIS tree computation
Description:

Symptom:
With peer link having the default ISIS metric in vPC+ environment -during ISSU from 5.1.3 to 5.2.1, L2MP traffic can be lost.

NOTE: usually mct(peer-link) is configured with higher ISIS metric to avoid data taking this path. To make data go through the DCE cloud.

Trigger:

1.peer-link should have default ISIS metric on both vpc peers
2.ISSU from 5.1.3 to 5.2.1

Conditions:

Workaround:
Configure a high metric for peer link and then do the ISSU.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(1), 6.1(3)
Known Fixed Releases:
6.2(0.260)S0, 6.2(2)
Bug Id:
CSCud44300
Title:
EntitySensor MIB handler should validate if_idx before query port client
Description:

Symptom:

On a Nexus 7000 switch, if an interface index is queried that is higher than the number of
ports on the specific linecard, there is a chance that mts memory may be held indefinitely by
snmpd and eventually will exhaust mts resources. In a dual supervisor environment , snmpd will
core and a HAP reset will be observed. In a single sup, a core should be saved and the system
will crash/reboot.

Conditions:

This problem would typically happen if a higher-density linecard is replaced in the same slot
with a lower-densitiy card, and the management station continues to try and poll the
non-existant higher ports.

Workaround:

Workaround is to rediscover the devices to eliminate the out of bounds polling of the
non-existant interfaces or if the device is statically-configured with the mib, disable polling
for that non-existant object.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-6396 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
5.2(7), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S26, 5.2(9.50)S0, 6.0(2)A1(1c), 6.0(2)U1(3), 6.0(2)U2(1), 6.1(3), 6.1(3)S19, 6.1(3.29)S0, 6.2(1.93)
Bug Id:
CSCut47663
Title:
SSTE: OSPF Adj are struct in TWO-WAY state after ospf process restart
Description:

Symptom:
OSPF Adj are struct in TWO-WAY state

Conditions:
restart opsf 100. If there is no BDR.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.468), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)PDB(0.401), 7.2(0)VZD(0.26), 7.2(0)VZN(0.34)
Bug Id:
CSCuu29945
Title:
SSTE: m2rib core on POAP + autoconfig
Description:

Symptom:
m2rib core

Conditions:
POAP + autoconfig

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)D1(0.506), 7.2(0)D1(0.510), 7.2(0)D1(1), 7.2(0)ZD(0.190), 7.2(1)PIB(0.14)
Bug Id:
CSCut19573
Title:
some vpc portchannels are not up upon RAX config
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger. Extented fix for CSCus90226

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(12)E2
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.11), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.442), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.368), 7.2(0)VOF(0.2)
Bug Id:
CSCum58738
Title:
On vdc reload: netstack and syslogd cored and vdc remained in fail state
Description:

Symptom:
On VDC reload , the VDC goes into a failed state.
In the logs you would see "netstack" and "syslogd" fail.

%SYSMGR-2-SIGKILL_FAILURE: Service "netstack" failure to respond to SIGKILL causing supervisor to reset. Last heartbeat 122.0 8 secs ago.

Conditions:
when VDC is reloaded or suspended

Workaround:
none - need to reload the switch to recover

This issue is resolved in code 6.2(6a) and later

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
Bug Id:
CSCur38749
Title:
Connection to a non-existent host is consumed/precessed by xTR itself
Description:

Symptom:
A vulnerability in Cisco Locator/ID Separation Protocol (LISP) feature of Cisco NX-OS could allow an authenticated, remote attacker to use SSH connection to a non-existent host covered by lisp mobile prefix
from outside of the DC and get presented with the xTR login prompt.
An attacker still needs to have login credentials for NX-OS device in order to be able to log in.

Conditions:
LISP mobility and lisp enabled interface need to be configured.

Workaround:
VTY ACL preventing login prompt to be displayed to the user connecting from the outside can
prevent unauthorized logins

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/2.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FB(0.11), 6.2(12)FT(0.5), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.112), 7.1(0)PDB(0.317), 7.2(0)D1(0.368)
Bug Id:
CSCur54182
Title:
NX-OS Tacacs Daemon hap reset
Description:

<B>
Symptom:</B>
Device configured for TACACS may face crash due to "Tacacs
Daemon hap reset"
Reason: Reset triggered due to HA policy of Reset
Service: Tacacs Daemon hap reset

<B>
Conditions:</B>
On a switch running NX-OS 6.2(8a) or later, if a very long command is
given with remote authorization using TACACS enabled, a crash is seen in TACACS. Because
TACACS expects the strings to be of size 255, it is unable to handle strings greater than 255.

<B>
Workaround:</B>
None.


More Info:


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.4/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2014-8013 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.41), 6.0(2)A6(1), 6.0(2)U6(0.41), 6.0(2)U6(1), 6.1(2)I3(2.15), 6.1(2)I3(3), 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.12), 7.0(0)BZ(0.46)
Bug Id:
CSCuq22841
Title:
M1 Module: Invalid COS (0x41040021) after ISSU from 5.2(x) to 6.2(x)
Description:

Symptom:
Ports are not allocated to a secondary VDC with the following logs:

2014 Jul 24 16:14:26.864 N7K %IM-3-IM_RESP_ERROR: Component MTS_SAP_VMM opcode:MTS_OPC_IM_IF_VDC_BIND in vdc:2 returned error:Invalid COS value.
2014 Jul 24 16:14:35.568 N7K last message repeated 1 time
2014 Jul 24 16:14:35.568 N7K %VDC_MGR-3-VDC_ERROR: vdc_mgr: Error for port Ethernet . Port is currently in vdc N7K-VDC2 [2]. GIM returned 41040021 [Invalid COS value.]. Please run the command "allocate interface Ethernet force" to try again

In 'show vdc membership status' we see the following as the reason for the ports not being allocated: 'ERROR:Invalid COS value. (0x41040021)'.

Conditions:
- ISSU from 5.2(x) to 6.2(x)
- M1 Module

Workaround:
Reload affected module.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(8a), 6.2(8a)S3
Known Fixed Releases:
Bug Id:
CSCuf47376
Title:
Trunk/FEX FPC port config removed by "system def switchport fabricpath"
Description:

Symptom:
adding/removing 'system default switchport fabricpath' cli seems to affect the configuration of trunks/access/fex fabric ports.

On a system with this command, a disruptive upgrade/reload might also cause config issues

Conditions:
adding/removing 'system default switchport fabricpath' cli / reload/disruptive upgrade with this command

Workaround:
If reload/disruptive upgrade has to be done, take a config backup first to restore

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.37), 7.1(0)AV(0.38), 7.1(0)PDB(0.324), 7.2(0)D1(0.392), 7.2(0)OTT(0.5)
Bug Id:
CSCus52139
Title:
post L3, l2 flood traffic not going out on peer-link
Description:

Symptom:
Post L3 Flood to BD packet are not forwarded in the Peer Link

Conditions:
VPC setup with VxLAN configuration.

Workaround:
MAC table should be populated.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
7.2(0)D1(0.383)
Known Fixed Releases:
7.1(0)AV(0.38), 7.1(0)SIB(99.82), 7.2(0)BA(0.12), 7.2(0)D1(0.386), 7.2(0)D1(0.388), 7.2(0)OTT(0.5), 7.2(0)RTG(0.91), 7.2(0)ZD(0.75)
Bug Id:
CSCut25162
Title:
VPLS VC's don't come after delete/add VFI's in EFP scale setup
Description:

Symptom:
Few VPLS PW's remain down

Conditions:
With L2VPN VFI's scaled, delete all VFIs and Re-add all VFI's.

Workaround:
clear l2vpn service vfi all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.430)
Known Fixed Releases:
15.5(1)S0.17, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(122), 7.1(0)LR(0.4)
Bug Id:
CSCuu58619
Title:
IPFIB vrf dependency database doesnt cleanup on VDC reload
Description:

Symptom:
Traffic drops can be seen for multicast and/or unicast flows.

Conditions:
In the presence of Vinci configurations, when a VDC is reloaded, we can get into this condition of unicast/multicast routes not getting updated in certain asic instances

Workaround:
reloading of the affected LC.

Further Problem Description:
n/a

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.8)
Bug Id:
CSCuo67870
Title:
VTP Pruning causes traffic outage in a vPC when primary leg is flapped
Description:

Symptom:
vPC VLANs on a trunk interface are incorrectly pruned by VTP on the vPC Operational Secondary Nexus 7000. The interface can be configured as a vPC leg or as a vPC Orphan port.

Conditions:
This issue will only occur on a Nexus 7000 vPC setup running NX-OS version 6.2(6) or higher that is also configured to use VTP for VLAN pruning.

The trigger for the issue is a flap of a vPC leg on the vPC Operational Primary switch. After the link flap, VTP does not successfully process join messages for the VLANs, resulting in a timeout and the VLANs being pruned from the link.

Workaround:
1) Flap any vPC leg on the vPC Operational Secondary switch to force a VTP to recalculate the pruning state
2) Remove and re-add the VTP Pruning configuration*
* Note: When VTP is removed, all broadcast traffic for VLANs in the trunk allowed list is allowed expectedly to be flooded out of the interface

The issue is resolved in the 6.2(10) release of NX-OS for the Nexus 7000.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S59, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.176), 7.2(0)D1(1)
Bug Id:
CSCut03089
Title:
After ISSU from 6.2.10 to 6.2.12 Optical Modules doesn't show DOM info
Description:

Symptom:
On N7K running 6.2.12 code, some of the DWDM optical modules will not show DOM info.

Example Output.

switch-core# sh int e1/25 trans de
Returning from 1
unknown error 0x40290003

Ethernet1/25
transceiver is present
type is DWDM-SFP10G-35.04
name is CISCO-FUJITSU
part number is FIM35060/201W53
revision is 0002
serial number is FLJ1718K016
nominal bitrate is 11100 MBit/sec
Link length supported for 9/125um fiber is 80 km
cisco id is --
cisco extended id number is 4
cisco part number is 10-2779-01
cisco product id is DWDM-SFP10G-35.04
cisco vendor id is V01
switch-core#

Conditions:
This behavior is seen only after ISSU from 6.2.10 to 6.2.12 on DWDM optical modules.
This behavior is not seen while performing traditional code upgrade from 6.2.10 to 6.2.12

Workaround:
Problem is not seen after traditional code upgrade from 6.2.10 to 6.2.12

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.365), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCuf65721
Title:
IGMP frames not forwarded correctly in VPC+ setup
Description:

Symptom:
IGMP joins/leaves received on on VPC+ device may not correctly be forwarded through the fabricpath domain.

VPC+ edge switches may not have the proper IGMP state showing the interested clients.

Conditions:
Nexus 7000 In a vPC+ setup, all multi destination frames (broadcast, multicast, unicast flood) are forwarded by the VPC designated forwarder (DF). This issue occurs when an IGMP message is received on the VPC device that is not the DF for the mrouter port-channel.

Workaround:
Disable IGMP snooping

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
6.0(2)U3(0.641), 6.0(2)U3(1), 6.1(4.50)S0, 6.1(5), 6.2(1.69)S0, 6.2(2), 7.0(0.7)
Bug Id:
CSCut93487
Title:
OTV: AED stays inactive for all VLANs
Description:

Symptom:
One AED stays inactive for all VLANs

Conditions:
Using OTV with 2 AEDs

Workaround:
Remove the vlans that won't come up and add them back to the OTV vdc.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
Bug Id:
CSCut84904
Title:
Process "mtm" Cores on F3 Cards Shortly After Boot
Description:

Symptom:
Repeated "mtm" cores on an F3 linecard

Conditions:
Unknown, first seen after an ISSU from 6.2(8b) to 6.2(10)

Workaround:
Unknown

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuo93631
Title:
N7K MAC address in hardware but missing from software after ISSU
Description:

Symptom:
Nexus 7000 does not learn new MAC addresses in software after ISSU.

"show hardware mac address-table " contains MAC entry in hardware (x = ingress module in question)

"show mac address-table" does not contain MAC entry in software

Conditions:
a) ISSU performed on N7K
b) In combination with ISSU, a new learn mac address caused by a new mac, or a flush of the mac table and re-learn of existing macs while system is undergoing ISSU.

Workaround:
Run the following command: "test l2fm pending-ack slot for all modules which have the "sup_ack_pend" bit set to 1. To check what the bit is set to run the following command:

- slot show system internal mtm info global | eg -i ack_pend
nl_mv_rd num_ack_pending 1 sup_ack_pending 1
age num_ack_pending 0 sup_ack_pending xxx
- any module with "ack_pending" status = "non-zero" is the module(s) to be reloaded

A reload of the module also resolves this issue.

Also, "clear mac address-table dynamic" resolves this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
7.1(0)D1(0.143), 7.1(0)D1(0.146), 7.1(0)D1(0.153)
Known Fixed Releases:
6.2(10), 6.2(10)S22, 7.1(0)D1(0.196), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)NF(0.32), 7.1(0)OTT(0.18), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCum81252
Title:
Merge XOS/LPSS with NXOS pss2: XOS/LPSS part
Description:

Symptom:
Need to merge xos/lpss@dev1 to NXOS. There are some small issues fixed in this merger

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
7.1(0)D1(0.162), 7.1(0)ZN(0.22)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(3)I1(0.64), 7.0(3)I1(1), 7.1(0)BF(0.107), 7.1(0)BF(0.108), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)IF(99.16)
Bug Id:
CSCuo02430
Title:
SSTE: hsrp process crashed with SSO trigger
Description:

Symptom:
HSRP process on the standby sup becomes unresponsive and eventually crashes with heartbeat timeout when system switchover is performed. HSRP process is then restarted by sysmgr.

Conditions:
HSRP groups are configured on interfaces with invalid VRFs (i.e. where the VRF is shutdown or not defined). Switch is booted up with saved startup config. System switchover is performed.

Workaround:
Ensure VRFs are valid before system switchover, i.e. if the VRF is shutdown then "no shut" the VRF, and if VRF is not defined then define it.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
6.2(8)S11, 6.2(8)S19, 6.2(8)S9, 7.0(3)I2(0.375)
Known Fixed Releases:
6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.18), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(3)I2(0.390), 7.0(3)I2(1), 7.1(0)BF(0.98)
Bug Id:
CSCuu84358
Title:
N77/F3/MPLS: mcast traffic drop 6-8 secs after SSO
Description:

Symptom:
traffic loss is seen after SSO

Conditions:
SSO is performed, traffic outage is seen for a very short duration and then recovers

Workaround:
no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.8), 7.2(1)N1(0.241), 7.2(1)N1(1), 7.2(1)ZD(0.7), 7.2(1)ZN(0.7)
Bug Id:
CSCuu57637
Title:
FCOE traffic is dropped at FEX FPC if storage vdc is created after ISSU
Description:

Symptom:
CRC giant-drops(ingress_giant_drops) seen on fex FPC ports on any qos template change after issu.

Conditions:
after issu if you do any qos template change and if you have fex in your setup, you will see MTU mismatch resuling in giant/CRC drops in the ingress of FPC ports.

Workaround:
configure/change qos template before issu.
or
shut/no-shut on fex FPC ports to reconfigure the mtu

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
7.2(0)D1(0.514)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.205), 7.2(1)PIB(0.14)
Bug Id:
CSCut61977
Title:
Crash after show forwarding route adjacency <interface> <ip address>
Description:

Symptom:
A ipfib process crash is seen. This may lead a HAP-Reset which could reload a module:

Nexus# sh core vdc-all
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 4 1 ipfib 18455 2015-03-26 11:06:19
1 4 1 ipfib 2173 2015-03-26 11:06:23
1 3 1 ipfib 12089 2015-03-26 11:06:29
1 3 1 ipfib 2173 2015-03-26 11:06:3

Conditions:
This occurs after the show forwarding route command is entered with the adjacency options.

Workaround:
Avoid using the show forwarding route adjacency command

Further Problem Description:
This is similar to the CSCur91392 bug but additional changes are needed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.41), 7.2(1)D1(0.9)
Bug Id:
CSCur52940
Title:
N7K - snmpd cores cause Supervisor HAP reset - transceivers
Description:

Symptom:
The "snmpd" process may crash continuously leading to a supervisor HAP reset.

Conditions:
Polling "ciscoEntitySensorMIB", that result in reading DOM information from 10G or 40G or 100G transceiver, during (re)initialization of the transceiver.

(Re)Initialization of transceiver happens only when -
- The transceiver is being reseated
- The linecard in which the transceiver is seated is reseated or reloaded
- The switch itself is being reloaded

Workaround:
Block ciscoEntitySensorMIB from being polled. This can be done by creating a new role, as follows:

(config)# role name skipEntSensor <--------------------- name can be anything.
(config-role)# rule 1 permit read
(config-role)# rule 2 deny read oid 1.3.6.1.4.1.9.9.91
(config-role)# end

(config)# snmp-server community safeWalk group skipEntSensor <-------------- safeWalk in this example is the community name. Change it to whatever is used in production.

After this when a snmpwalk (getnext) is done ciscoEntitySensorMIB is skipped.

All community strings configured on the switch will need the
role group skipEntSensor applied to include public, private, etc. community strings

Further Problem Description:
The snmpd crash is caused by invalid data returned by port-client due to an internal timeout when reading the DOM of a transceiver that is still initializing.

This problem is seen only on 6.2.10 software version.

DOM is not accessible through CLI when the port/transceiver is still initializing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10)E6, 6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.14), 6.2(12)FT(0.20), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)EV(0.137)
Bug Id:
CSCut57953
Title:
N7K "ipfib" process crash
Description:

Symptom:
N7K line card crash with "ipfib" core file generated.

Conditions:
crash observed on N7K running ospfv3 on 6.2.12 code

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.58), 7.2(1)D1(0.10)
Bug Id:
CSCua82201
Title:
BGP process fail due to constant BGP socket open/close state changes
Description:

Symptom

BGP process fails due to constant BGP socket open/close state changes. If there are several idle peers, over a period of time due to excessive churn of netstack client for BGP sockets, newly provisioned BGP session fail to come up with the following error

BGP-3-SOCKCREATE: bgp-XXXX [24958] Cannot create socket for peer X.X.X.X: Bad file descriptor, stats: 28391553/496156/28887500/14303942/14143771


Workaround

If BGP graceful restart is configured, then clear all BGP neighbors may clear the issue

If BGP graceful restart is not configured then disabling and enabling 'feature bgp' from the active configuration will clear this issue

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.0(2)S31
Known Fixed Releases:
6.0(2)U2(1), 6.0(2)ZD(0.6), 6.1(2), 6.1(2)E10, 6.1(2)E10.4, 6.1(2)S6, 6.1(2.11)S0, 6.2(0.285), 6.2(2)
Bug Id:
CSCui36490
Title:
BGP outbound messages can get stuck in certain conditions.
Description:

Symptom:
BGP outbound messages can get stuck in certain conditions

Conditions:
If BGP has caught up with updating its peers with all route updates, the sender thread may inadvertently go to sleep because of this bug. In such a case, residual outbound messages to the peers will be stuck until another message (keepalive, update, etc.) gets queued to wake the sender thread

Workaround:
"clear ip bgp" or "restart bgp" may resolve the issue but it may end up in the same situation later.

Further Problem Description:
PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.2(0)PF(0.296), 6.2(2)S31, 6.2(8)
Known Fixed Releases:
6.0(2)N3(1), 6.2(10), 6.2(10)CM(0.34), 6.2(11)FM(0.7), 6.2(8)E1, 6.2(8)IAS(0.18), 6.2(9.4)S0, 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(0.122)
Bug Id:
CSCut76387
Title:
FEX crashed at "satctrl" process
Description:

Symptom:
FEX crashed at "satctrl" process

Conditions:
UNKOWN

Workaround:
NONE

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuf60213
Title:
F2 card reload with "clp_mac" cores
Description:

Symptom:

F2 crashes due to the "clp_mac" process. Within the core file, we see the EEM is trying to process an error message "CLM_CFG_PARITY_ERR".

Conditions:
Issue is triggered by a port config register parity error. Current code only gracefully handles ASIC-level parity errors, not port-level errors -- this will be changed.

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.1(2), 6.2(1.79)S2
Known Fixed Releases:
6.1(4.97)S0, 6.1(5), 6.1(5.5)S0, 6.2(1.101)S0, 6.2(2), 7.0(0)ZD(0.53), 7.0(0)ZD(0.55)
Bug Id:
CSCut39102
Title:
stp disputes are seen during vdc reload in vPC + setup
Description:

Symptom:In a VPC+ setup running MST and with a large scale logical port count , on reloading the primary peer, stp disputes may sometimes be seen on the secondary switch.
Conditions:*VPC+ scenario.
*Primary Peer reload


Workaround:More Info:If disputes occur, they will clear as soon as the secondary switches to Operational primary.



Status:
Open
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
7.2(0)D1(0.441), 7.2(0)D1(0.451)
Known Fixed Releases:
7.1(0)ES(0.18), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.2(0)BA(0.12), 7.2(0)D1(0.451), 7.2(0)D1(0.455), 7.2(0)D1(0.470), 7.2(0)RTG(0.143), 7.2(0)RTG(0.150), 7.2(0)VOF(0.2)
Bug Id:
CSCuo22348
Title:
port-state request triggers burst of bpdu's from VPC primary switch.
Description:

Symptom:
Nexus 7000 switch may exhibit excessive TX inband traffic rates affecting control-plane services after attempting to collect show interface trunk command output.

Bug is not specific to show int trunk command. It can happen anytime port state info request event is processed.
Request may come via SNMP request or another show command.

Check output of "sh hardware internal cpu-mac inband stats" for TX packet rate. With this bug, TX rate shoots up very high.

N7K1# sh hardware internal cpu-mac inband stats | in rate
Packet rate limit ........... 64000 pps
Rx packet rate (current/max) 1 / 16 pps
Tx packet rate (current/max) 15215 / 18753 pps <<====

AND

Check for below logs in the output of "show spanning-tree internal interactions".

+++++++++++++++++++++
1080) Event:(null), length:87, at 988005 usecs after Wed Oct 29 10:26:46 2014
stp_send_bpdu_now(4995): Start: reason During handling of port state info request

1081) Event:(null), length:85, at 980152 usecs after Wed Oct 29 10:26:46 2014
stp_send_bpdu_now(5017): End: reason During handling of port state info request
++++++++++++++++++++++

Conditions:
Nexus 7000 running 6.2(2) or later release with a high VLAN count. Whenever a port-state request is sent to STP, there are additional BPDUs sent out for each STP logical port in the system.

Workaround:
Do not use the command.
If using AAA with command authorization, the commands may be blocked in the ACS profile.

Further Problem Description:
To monitor CPU-Mac inband stats during an event use show hardware internal cp-mac statistics. The Tx rate increases drastically.

Rx packet rate (current/max) 632 / 3372 pps
Tx packet rate (current/max) 3174 / 31054 pps <<<<<

To verify when the MAX rate was triggered use "sh hardware internal cpu-mac inband events"

Note: The command will only record the MAX rate event if it surpasses the previously recorded max rate event.

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.2(6), 6.2(6a), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.22), 6.2(10)FM(0.26), 6.2(10)NO(0.20), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73)
Bug Id:
CSCuo51846
Title:
N7K: 3rd party SFP-10G-SR reported as "Unsupported transceiver"
Description:

Symptom:
3rd-party SFP-10G-SR reported as "Unsupported transceiver":
ETHPORT-3-IF_UNSUPPORTED_TRANSCEIVER Transceiver on interface Ethernet2/1 is not supported

To verify if its the same issue
module-7# sh hard int transceiver ins 0 sprom raw

+-------------------------------------------------------------------------------
| Get sprom/dom data for XCVR_USD Driver

SPROM in raw format:
-------------------

Comment Addr Value
------- ---- -----
Identifier 0 03
Ext. Identifier 1 04
Connector Type 2 07
10G Ethernet Compliance Code 3 00
ESCON/SONET Compliance Code 4 00 00
Ethernet Compliance Code 6 00
Transceiver (Fibre Channel) 7 40 >>>>> Having 7,8 and 9th bytes programmed with any non-zero number will result in this bug.
Transceiver (Fibre Channel) 8 40
Transceiver (Fibre Channel) 9 0c
Transceiver (Fibre Channel) 10 80

Conditions:
This is observed on a Nexus 7000 or 7700 port running a 6.2(8) release.Its not seen in any other releases
before 6.2.8 . Its fixed in 6.2.10
It is applicable for all LCs and only affects some of the 3rd party transceivers.

Workaround:
Use a Cisco Transceiver.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.4), 6.2(8)E1, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(8a)E2
Bug Id:
CSCus58902
Title:
Potential of opening al back door
Description:

Symptom:
If the admin user is able to reach the underlying OS shell, it migh be possible to create a fully functional operating system account that could have unlimited access to the underlying operating system.

Conditions:
Requires full administrative access to the device and the existence of a separate bug that would allow the administrator to access the underlying operating system

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
06-JUL-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
Bug Id:
CSCup90186
Title:
Queuing policy of eth interface is removed when added to port-channel
Description:

Specific to case where queuing policy on the port-channel and port moving to it are same.

Symptom:
When queuing policy on port-channel and port moving to it are same, policy on physical port resets to default.

Conditions:
Only when queuing policy on the port-channel and port moving to it are same.

Workaround:
Remove the queuing policy from physical port before moving to port-channel.

Or if the error has already occured:
Move physical port out of port-channel and bring it back in. Moving out resets queuing to default, bringing back will apply port-channel queuing policy.

Further Problem Description:
Q. How does customer land in this situation?
A. If customer configures the "same" queuing policy on an eth interface and a port-channel. And then he moves the eth interface to the port-channel, he will hit this bug. Please notice that the "same" policy should be configured on both eth interface as well as port-channel to land into this situation.

Q. How do I resolve this situation?
A. If you are in this situation, just move your port out of the port-channel and bring it back in. Just a simple out-in of the eth port will resolve this condition.

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(12)FF(0.8), 7.1(0)D1(0.197)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.12), 7.2(0)D1(0.402), 7.2(0)D1(1), 7.2(0)OTT(0.5), 7.2(0)PDB(0.329)
Bug Id:
CSCup47983
Title:
F3 CB-10:Ports in same port-group flap when speed change on another port
Description:

%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/29 is down (Link failure)
%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/30 is down (Link failure)
%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/31 is down (Link failure)

Symptom:%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/29 is down (Link failure)
%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/30 is down (Link failure)
%ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet6/31 is down (Link failure)

Port on same SOC may flap during while removing 10G SFP and using 1G SFP instead.
Conditions:When an SFP is inserted into an interface after module is UP and no shut is executed on that interface, the port of the same speed and in the same port-group might flap.

Workaround:- Insert SFPs into all ports in the port-group before bringing up any port in the port group

OR

- Link debounce time of 50 ms or more on both ends of the link

More Info:



Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(8)E5, 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S9, 6.2(10.5), 6.2(8)E5
Bug Id:
CSCtj86613
Title:
n7k standby sup may continuously reset after bootup
Description:

A Nexus 7000 system's standby supervisor may continuously reset after
the system is reloaded or powercycled. The following error messages may
be seen on the active supervisor:

%BOOTVAR-5-NEIGHBOR_UPDATE_AUTOCOPY: auto-copy supported by neighbor supervisor, starting...
%SNMPD-2-CRITICAL: SNMP log critical : do_pssurl_snapshot : SNMP Could not do a snapshot to volatile:/dev/shm/im_sdb_extension_267_0 from sync:/mnt/pss/snmp.d/engine_db
%SYSMGR-2-GSYNC_SNAPSHOT_SRVFAILED: Service "snmpd" on active supervisor failed to store its snapshot (error-id 0xFFFFFFFF).
%SYSMGR-STANDBY-5-SUBPROC_TERMINATED: "System Manager (gsync controller)" (PID 4238) has finished with error code SYSMGR_EXITCODE_GSYNCERR (7).
%SYSMGR-2-STANDBY_BOOT_FAILED: Standby supervisor failed to boot up.

%SNMPD-2-CRITICAL: SNMP log critical : do_pssurl_snapshot : SNMP Could not open the PSS file sync:/mnt/pss/snmp.d/engine_db
%SYSMGR-2-GSYNC_SNAPSHOT_SRVFAILED: Service "snmpd" on active supervisor failed to store its snapshot (error-id 0xFFFFFFFF).
%SYSMGR-2-STANDBY_BOOT_FAILED: Standby supervisor failed to boot up.
%SYSMGR-STANDBY-3-SERVICE_TERMINATED: Service "ntp" (PID 4165) has finished with error code SYSMGR_EXITCODE_SYSERR (1).


Workaround:

None.

Status:
Terminated
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
4.2(6)
Known Fixed Releases:
Bug Id:
CSCuo61576
Title:
FTAG tree seems to be incorrectly formed affecting broadcast/multicast
Description:

Symptom:
Broadcast/multicast/flooded might be affected depending on which FTAG tree has RPF failures.

That is, if FTAG-1 seems to be incorrect, Broadcast/multicast/flooded will be affected and if FTAG-2 is incorrect, multicast is affected for certain flows. As we know multicast is load balanced between FTAG 1 and 2.

Conditions:
FP domain with multiple paths.

Workaround:
Shut the link that is failing RPF link.
Bundle multiple links to a port-channel if possible.
Reload does not seem to fix the problem once the issue is seen.

Further Problem Description:
This issue will be seen on Nexus 5K/6K goldcoast images. H+ onwards has the fix.

Status:
Other
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
Bug Id:
CSCty88512
Title:
Netstack Crash and Core File
Description:

Symptom:

%SYSMGR-2-SERVICE_CRASHED: Service "netstack" (PID 4143) hasn't caught signal 11 (core will be saved).

Core file visible on system:

Issue "show cores vdc-all" from default vdc or show cores from VDC with the crash.


Conditions:

Nexus 7000 running NX-OS 5.2(1)


Workaround:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases:
5.2(1)N1(1), 5.2(4.56)S0, 5.2(5)S1, 5.2(5.2)S0, 6.0(2)A1(1), 6.0(2)N1(1), 6.0(2)U1(1), 6.0(4)S13, 6.1(0.294)S0, 6.2(0.217)
Bug Id:
CSCuv09863
Title:
IF-MIB::ifInDiscards erroneously increment for SNMP on M2
Description:

Symptom:
Interface discards (ifInDiscards) erroneously increment for some interfaces when polling via SNMP but those same discard counters don't increment for the CLI

Conditions:
Problem occurs on the Nexus M2 series linecard. On the N7K-M224XP-23L the problem occurs on port pairs ( 1,11) (13,23). At some point valid input discards incremented on these ports but because of this software problem the discards increment for SNMP

Workaround:
reload the affected linecard to clear out the problem

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(14)FB(0.78)
Known Fixed Releases:
6.2(13.4)S0
Bug Id:
CSCut89882
Title:
NXOS-MPLS-TE:Traffic loss after SUP Failover
Description:

Symptom:
TE tunnels flap 2 minutes after the 1st switchover.

Conditions:
The issue is present when RSVP graceful restart is configured and head-end TE tunnels are present. The issue occurs only after the 1st failover occurs after the mpls traffic-eng feature is enabled.

Workaround:
As only the first failover triggers the issue, performing a manual switchover after enabling the mpls traffic-eng feature will prevent this issue from being seen subsequently.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
7.2(0)ZD(0.145)
Known Fixed Releases:
Bug Id:
CSCuu11602
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:
A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:
1. There should be NO cpu/eobc hog on LC.
2. Upon LC bring up, post_code should be in range 0x00 and 0xf0 only. (sh mod internal act mod shows PWR_MGMT_POST_CODE_REG(0xb) = 0xab)

Workaround:

Further Problem Description:
This was fixed in 6.2(10) via CSCup20959, but the problem is still seen

Status:
Other
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuu77244
Title:
port-profile core at ppm_profile_global_level_2_acfg_gen after- sh start
Description:

Symptom:
PPM will crash when issued show run or show start. This happens when there are lots of aging of profile and at the same time traffic is being sent and there are errors in the profiles being applied.

Conditions:
Happens when there are errors in application of network profiles like failure of command and aging happening at the same time.

Workaround:
System is already buggy. Do a write erase and reload.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuu90608
Title:
nvt: mcecm and vpc cores on doing a cold boot from S22 to S28
Description:

Symptom:
vPC process crashes

Conditions:
no graceful type-1 check configured and switch reloads

Workaround:
turn on graceful type-1 check by default

Further Problem Description:
This is memory overrun issue.

The issue is only hit when graceful type-1 check is disable. Because from 6.2.10, the check is enabled by default, we decided to fix after GBR.

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.7), 7.2(1)ZD(0.6)
Bug Id:
CSCtz53329
Title:
Standby sup stuck in powered-up: syslogd failed to store its snapshot
Description:

Symptom:
This bug affects both Nexus 7000 and MDS platforms.

Standby supervisor reloads continuously. show logging nvram
contains the following messages:

%SYSMGR-2-GSYNC_SNAPSHOT_SRVFAILED: Service "syslogd" on active supervisor
failed to store its snapshot (error-id 0x80480018).
%SYSMGR-2-STANDBY_BOOT_FAILED: Standby supervisor failed to boot up.

Conditions:
This issue only occurs if the standby supervisor reloads many times.

Workaround:
None. Contact Cisco TAC to recover from this issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
5.2(2d), 5.2(4)
Known Fixed Releases:
5.2(4.80)S0, 7.0(1)ZD(0.3)
Bug Id:
CSCuu77709
Title:
LISP: map-caches entries to non-routable RLOCs are installed in fwd
Description:

Symptom:
A LISP map-cache entry on a xTR lists a group of locators as being in state "up" even while the routing table does not have an entry to reach them. They should be listed in state "no-route".
These locators are pushed down to the forwarding table and flows that match this forwarding entry are blackholed.

Conditions:
The main condition to see this problem is that the setup has a "split" RLOC view, i.e. the eTR registering the lisp database entry is able to see the RLOCs while the iTR is not.

From there the following needs to happen simultaneously to face this problem:
(1) Multiple map-cache entries in the xTR have the same locator set
(2) Some of the RLOCs in this locator set are permanently unreachable (no routing entry in RIB) from iTR

Workaround:
Enabling RLOC probing, which will complement the information from the routing table.
"lisp loc-reach-algorithm rloc-probing"

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCus90226
Title:
6.2.12: Route programming inconsistency between instances on a LC
Description:

Symptom:
When the port-channel configured with LACP individual and shut and no shut of VPC or port-channel will trigger

Conditions:
LACP Individual configured on the port-channel

Workaround:
Remove the LACP Individual config for the Port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.4), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.430), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.358), 7.2(0)VOF(0.2)
Bug Id:
CSCuu30447
Title:
F2/F2E port will keep up even the rx power is -26dBm due to ISP break
Description:

Symptom:
Topology:
N7K-c1(port e4/31)---15454-1===ISP===15454-2------(port4/3)N7K-c2
Software:
both N7K-c1 and N7K-c2 are running with 6.2.12.
module 4 is the N7K-F248XP-25E

Transceiver info:
both e4/31 and e4/3 are installed with GLC-SX-MMD.

Configuration for port e4/31 and e4/3:
interface Ethernet4/31
no shutdown
interface Ethernet4/3
no shutdown

Failure scenario:
if we break the ISP fiber, you might see one of the port e4/31 and e4/3 will be up while the other one is in link failure status.

N7K-3-c1# show int e4/31
Ethernet4/31 is down (Link not connected)
admin state is up, Dedicated Interface
Hardware: 1000/10000 Ethernet, address: 8478.ac56.4645 (bia 8478.ac5a.0fb2)
MTU bytes (CoS values): MTU 1500(0-2,4-7) bytes MTU 2112(3) bytes
BW 10000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is routed
auto-duplex, auto-speed, media type is 1G
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is off
Auto-mdix is turned on
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
EEE (efficient-ethernet) : n/a
Last link flapped 00:26:03
Last clearing of "show interface" counters 02:27:02
8 interface resets
Load-Interval #1: 30 seconds
30 seconds input rate 0 bits/sec, 0 packets/sec
30 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
Load-Interval #2: 5 minute (300 seconds)
300 seconds input rate 0 bits/sec, 0 packets/sec
300 seconds output rate 0 bits/sec, 0 packets/sec
input rate 0 bps, 0 pps; output rate 0 bps, 0 pps
L3 in Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
L3 out Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
RX
76 unicast packets 90 multicast packets 0 broadcast packets
90 input packets 25587 bytes
0 jumbo packets 0 storm suppression packets
0 runts 0 giants 0 CRC/FCS 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 0 input discard
0 Rx pause
TX
76 unicast packets 89 multicast packets 0 broadcast packets
89 output packets 19394 bytes
0 jumbo packets
0 output error 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
0 Tx pause

N7K-3-c1# show int e4/31 tran details
Ethernet4/31
transceiver is present
type is 1000base-SX
name is CISCO
part number is FTLF8519P3BNL-CS
revision is A
serial number is FNS17371AE5
nominal bitrate is 1300 MBit/sec
cisco id is --
cisco extended id number is 4
cisco part number is 10-2626-01
cisco product id is GLC-SX-MMD
cisco vendor id is V01
number of lanes 1

SFP Detail Diagnostics Information (internal calibration)
----------------------------------------------------------------------------
Current Alarms Warnings
Measurement High Low High Low
----------------------------------------------------------------------------
Temperature 38.44 C 90.00 C -10.00 C 85.00 C -5.00 C
Voltage 3.30 V 3.59 V 3.00 V 3.50 V 3.09 V
Current 7.13 mA 15.00 mA 1.00 mA 12.00 mA 2.00 mA
Tx Power -5.11 dBm 0.00 dBm -13.49 dBm -2.99 dBm -9.50

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.64), 7.2(1)D1(0.13), 7.2(1)ZD(0.9)
Bug Id:
CSCuu53826
Title:
MPLS QoS : not enough memory after vdc suspend/resume
Description:

Symptom:
*With more 50% of aggregate policer usage and subinterface configuration, an vdc reload or suspend/resume event will trigger this issue.

Conditions:
*vdc suspend
no vdc suspend
reload vdc

Workaround:
*reload the module.

Further Problem Description:
*

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65)
Bug Id:
CSCuf38843
Title:
IF_SEQ timeout with SPM for op MTS_OPC_ETHPM_PORT_PRE_CFG on mod reload
Description:

Symptom:
%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with MTS_SAP_SPM for opcode MTS_OPC_ETHPM_PORT_PRE_CFG (RID_PORT: Ethernetx/y)
%ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernetx/y is down (Error disabled. Reason:sequence timeout)

Conditions:
Multiple linecards coming online at once

Workaround:
none, this is a scalability issue that will be corrected in future releases.

Status:
Other
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
Bug Id:
CSCua77416
Title:
Sup reload or Switchover may occur due to Leap second update
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs a N7K SUP1 could have the kernel hit what is known a "livelock" condition under the following circumstances:

a. When the NTP server pushes the update to the N7K NTPd client, which in turn schedules the update to
the Kernel. This push should have happened 24 hours before June 30th, by most NTP servers.

b. When the NTP server actually updates the clock

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
Please note this is an issue for the SUP1 only and the SUP2 is not susceptible to leap second.

On switches configured for NTP and running affected code, following workaround can be used.

1) Remove NTP/PTP configuration on the switch at least two days prior to June 30, 2015 Leap second event date. Note the entire NTP configuration does not need to be removed and the user can do "no feature ntp" so the NTP feature will be disabled but the NTP configuration will remain in place.

2) Add NTP/PTP configuration back on the switch after the Leap second event date(July 1, 2015). Note if just the feature was disabled the user can now do "feature ntp".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
5.1(1), 5.1(5)E2, 5.2(5), 6.0(4)
Known Fixed Releases:
5.2(6.16)S0, 5.2(7), 6.1(1)S28, 6.1(1.30)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCua34604
Title:
OTV : OTV_ISIS cored on deleting redistributed route-map
Description:

Symptom:
ISIS-OTV cores on deleting the route-map applied for filtering HSRP packets.

Conditions:
Making changes to route-map

Workaround:

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
5.2(5)S14, 6.1(1)S11
Known Fixed Releases:
6.1(1)S18, 6.1(1.18)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCup19027
Title:
N7K Dual SUP lost configurations after power up
Description:

Symptom:
The N7K SUP1 had the configuration saved and was powered down. When the N7K was then powered up it came up with no configuration. The startup-configuration had been corrupted due to an abnormal termination when it had been previously saved.

Conditions:
When the "copyrunning-config startup-config" was entered it was terminated abnormally either the user entering CNTRL-C or the connection to the N7K, for example via SSH, being terminated before the "copy" was complete.

Workaround:
The configuration must be restored manually.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases:
6.2(10), 6.2(10)S64, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.195), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)IF(99.16), 7.1(0)N1(0.245)
Bug Id:
CSCug37851
Title:
N7K - entPhysicalTable and BRIDGE-MIB slow with FEX indexes
Description:

Symptom:Nexus 7000 may experience SNMP timeouts when using SNMP Bulk Get requests. It is also possible that under aggressive SNMP polling that the N7K SNMP application could restart and write out a core file.

If the SNMP process crashes 3 times, a supervisor switchover can be expected
Conditions:
This is more likely when using SNMP polling to the BRIDGE-MIB and ENTITY-MIB especially when using FEX modules.

Workaround:Increase timeout of SNMP polling.

More Info:Fixes had been integrated in 5.2(9)E2, 6.1(4a), 6.2(2) and later releases.





Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
5.2(9)S71, 6.1(1), 6.1(4)S13, 6.2(1.74)S3
Known Fixed Releases:
5.2(9)E2, 5.2(9.157)S0, 6.1(4.97)S0, 6.1(4a), 6.1(4a)S4, 6.1(5.11)S0, 6.1(5.12)S0, 6.2(1.107)S0, 6.2(1.112)S0, 6.2(1.113)S0
Bug Id:
CSCur28450
Title:
[6210-S100] Rollback to a checkpoint fails verification at FEX SAT PO
Description:

Symptom:
Rollback fails the verification phase, saying "flowcontrol send on" is present in the running-config on the port-channel.

switch# rollback running-config checkpoint checkpoint_name



Verification patch contains the following commands:
---------------------------------------------------
!!
interface port-channel###
no flowcontrol send on
exit

Conditions:
When trying to rollback to a checkpoint where a current HifPC (a port-channel with FEX host interfaces as its members) becomes a simple port-channel (no FEX host interfaces as its members), rollback will fail the verification phase.

Workaround:
Rollback running checkpoint checkpoint_name best-effort
So that it wont do verification and won't revert back to original running config.
And then do "no flowcontrol send on" on the affected interfaces

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
6.2(10)S100
Known Fixed Releases:
7.1(0)AV(0.74), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.360), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCus91417
Title:
Nexus 7000 fails to trasmitt RSTP BPDUs consistently
Description:

Symptom:
STP Instability in layer 2 domain with N7K (Rapid PVST)

Conditions:
unknown

Workaround:
enable peer-switch if N7K is the root to mitigate this issue

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12)S33
Known Fixed Releases:
6.2(12)E1, 6.2(13)FM(0.52), 6.2(13)GS(0.13), 6.2(13.1)S0, 6.2(13.3)S0, 6.2(14)FB(0.21), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.453), 7.2(0)D1(1)
Bug Id:
CSCus96272
Title:
pvlan Channel-group members add/remove fails .
Description:

Symptom:
pvlan Channel-group members add/remove fails .

Conditions:
pvlan Channel-group members add/remove fails .

Workaround:
pvlan Channel-group members add/remove fails .

Further Problem Description:
pvlan Channel-group members add/remove fails .

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases:
6.2(13.6)S0, 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.469), 7.2(0)D1(1), 7.2(0)PDB(0.390), 7.2(0)VZD(0.26)
Bug Id:
CSCul47752
Title:
Unicast packets getting dropped as the Mac is pointing to an Invalid DI
Description:

Symptom:
Traffic can be leaked between VDCs or dropped in specific VDCs

Conditions:
This is observed on Nexus 7000 with F2 modules running 6.1(4) and 6.2(2)

Workaround:
Reload of F2 modules absolute necessary to fix the issue, before upgrade to fixed in Version

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
6.1(1), 6.2(5.52)S0
Known Fixed Releases:
6.1(4.99)S0, 6.1(5), 6.2(6)
Bug Id:
CSCuu79551
Title:
routes installed with recursive next hop have null next hop in hardware
Description:

Symptom:
next hop in show forwarding route shows null for recursive routes

nexus# sh forwarding route X.X.X.X vrf VRF_N7K

slot 1
=======


IPv4 routes for table VRF_N7K/base

'*' denotes recursive route
------------------+------------------+----------------------+-----------------
Prefix | Next-hop | Interface | Labels
------------------+------------------+----------------------+-----------------
*X.X.X.X/29 0.0.0.0 Null0

Conditions:
recursive next hop

Workaround:
none known at this time

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCue19535
Title:
Fabric Sync loss brings resets all the modules
Description:

Symptom:

All linecards fail to sync to a single fabric module, causes the modules to be reset, instead of
the fabric module being powered down.

Conditions:

As above.

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
4.2(8), 5.2(7), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S41, 6.1(4), 6.1(4)S6, 6.1(4.8)S0, 6.2(1.93), 6.2(2), 7.1(0)D1(0.14)
Bug Id:
CSCuu37319
Title:
F3:QoS Policer is inconsistent in policing traffic to the desired rate.
Description:

Symptom:
Traffic policing applied on a vlan is not providing the desired policing rate.
The actual traffic rate through the vlan with policing in place could be higher or lower than the configured limit.

Conditions:
issue seen on F3/6.2.8a

Workaround:
Remove and reapply the service policy on the vlan may work.
if it does not then please reach out to TAC for further troubleshooting

Further Problem Description:
Any subsequent member addition/deletion operation from a VLAN or a port-channel is triggering this problem.
ISSU does not auto correct the problem. Reapply the policy configuration

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.62), 7.2(1)D1(0.15), 7.2(1)ZD(0.11)
Bug Id:
CSCuh75899
Title:
N7K -core in xbar_driver_usd
Description:

Symptom:
Process xbar_driver_usd on a module will leak memory, and eventually core.
The module will reboot.
Eventually, after three occurrences of running out of memory and then rebooting, the module will remain powered off.

A log message similar to the following will be generated:
1970 Jan 1 00:00:00.000 switch %MODULE-1-MOD_DIAG_FAIL: Module 1 (Serial number: JAF0000ABCD) reported failure due to Service on linecard had a hap-reset in device DEV_SYSMGR (device error 0xfe)

A core file for xbar_driver_usd will be generated and saved in logflash:core/
switch# show cores
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 1 1 xbar_driver_usd 2182 1970-01-01 00:00:00

On the module, show logging onboard will have the following error:
module-1# show logging onboard

Exception Log Record : Sun Jan 1 00:00:00 1970 (000000 us)

Device Id : 34304
Device Name : 0x8600
Device Error Code : fe000000(H)
Device Error Type : NULL
Device Error Name : NULL
Device Instance : 0
Sys Error : (null)
Errtype : CATASTROPHIC
PhyPortLayer : 0x0
Port(s) Affected :
Error Description : xbar_driver_usd hap reset
DSAP : 0
UUID : 16777216
Time : Sun Jan 1 00:00:00 1970
(000000 usecs 00000000(H) jiffies)

Conditions:
Polling ciscoSwitchFabricMIB with SNMP
Executing commands beginning with show hardware fabric-utilization internal snmp

Walking ciscoSwitchFabricMIB roughly 1000-2000 times will use all 100MB of available memory for the xbar_driver_usd process.

Workaround:
Restrict access to the following:
show hardware fabric-utilization internal snmp
ciscoSwitchFabricMIB (1.3.6.1.4.1.9.9.803)

More Info:
Memory usage can be monitored with the following command:
slot slot show processes memory | grep xbar_driver_usd
2182 3051520 MemoryLimit CurrentMemoryUsage 7fe3aa80/7fe3a460 xbar_driver_usd

Example configuration for blocking only ciscoSwitchFabricMIB:
role namename
rule 1 permit read
rule 2 deny read oid 1.3.6.1.4.1.9.9.803
snmp-server community
communityString group name

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.1(4), 6.1(4.9)S0, 6.2(1.143)S3, 6.2(1.159)S1, 6.2(5.7), 7.0(0.50)S0
Known Fixed Releases:
6.1(4.97)S0, 6.1(4a), 6.1(4a)S1, 6.1(5.32)S0, 6.2(2), 6.2(2)S1, 6.2(3)S1, 6.2(3.5)S0, 6.2(5.2)S0, 7.0(0)ZD(0.84)
Bug Id:
CSCur14589
Title:
vulnerability related to cmd injection via DHCP offer options
Description:


Symptom:

Command injection via DHCP offer options used with PowerOn Auto Provisioning (POAP)


Conditions:

NX-OS Switch would have to be in a state where POAP is initiated, and if
an attacker can either:
A) Inject their own DHCP server and respond to the POAP DHCP request with
crafted DHCP options.
B) Compromise an existing DHCP server, and craft the specific DHCP
options.

Then during the POAP process, when the crafted DHCP options are processed
arbitrary commands on the system could be executed in the context of root
user.

Note this issue only occurs during the POAP DHCP boot process.

First Fixed Releases:
6.2(10)
7.1(0)N1(1)
7.1(2)N1(1)
7.2(0)N1(1)




Workaround:

None.


More Info:


The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dis
patch=1&version=2&vector=AV:A/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

CVE ID CVE-2015-0658 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
7.1(0)D1(0.226)
Known Fixed Releases:
6.2(10), 6.2(10)S98, 6.2(10.17)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.291), 7.1(0)D1(0.292), 7.1(0)D1(0.293), 7.1(0)EV(0.116)
Bug Id:
CSCtc83165
Title:
SNMP crash due to mutex lock assert fail in 4.2(2a)
Description:


Problem/Description:

Both Nexus 7000 and Nexus 5000 boxes will crash on snmpd pid.

Workaround:

Software upgrade

Further Actions:

gather show tech details and engage Cisco TAC.

Other:

`show cores`
Module-num Instance-num Process-name PID Core-create-time
---------- ------------ ------------ --- ----------------
1 1 snmpd 3870 Oct 2 10:30

Look for this in the output of

show logging nvram:

%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 3870) hasn't caught signal 11
(core will be saved).


Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
10-JUL-2015
Known Affected Releases:
4.2(2a)
Known Fixed Releases:
4.2(1)N2(1), 4.2(3), 4.2(3.19), 4.2(4), 7.2(0)ZN(0.111)
Bug Id:
CSCuv21910
Title:
after ISSU itd shows raise/ invaild/unknown values
Description:

Symptom:
After ISSU from 6.2.10 to 6.2.14 ,
<< issue >>
switch# sh runn services

Conditions:
After ISSU from 6.2.10 to 6.2.14 ,
<< issue >>
switch# sh runn services

Workaround:
After ISSU from 6.2.10 to 6.2.14 ,
<< issue >>
switch# sh runn services

Further Problem Description:
After ISSU from 6.2.10 to 6.2.14 ,
<< issue >>
switch# sh runn services

Status:
Open
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.2(14)FB(0.79)
Known Fixed Releases:
Bug Id:
CSCuu55233
Title:
Mac addresses not learnt after Port-security violation stops
Description:

Symptom:
On a Nexus 7700 mac addresses are not learnt on an interface after port-security violation happens and then stops.

Conditions:
This issue has currently been observed on Nexus 7700 with F3 module running on 6.2(12).
Issue only happens after max. mac address violation occurs and then stops.
shut/no-shut of interface does NOT recover mac-learning.

Workaround:
Default-interface and reconfiguring interface fixes the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.70)
Bug Id:
CSCuv16195
Title:
NX-OS 6.2(12) ISIS + IPv6 + BFD + F3 only form two neighbours
Description:

Symptom:
Unable to form more than two neighbours when using ISIS routing protocol with IPv6 and BFD with upstream ASR9K. N77K_A can form neighbours with ASR9K_1 and ASR9K_2 but not with it's back-to-back N77K_B. When supervisor is re-booted, we get N77K_A connected to ASR9K_1 and N77K_B connected to ASR9K_2, only. In third case, we see N77K_B connected to both ASR9K_1 and ASR9K_2 but not to it's back to back N77K_A.

Conditions:
ISIS protocol using IPv6 with BFD on NX-OS code 6.2(12) running in multi-access or broadcast medium.

Workaround:
Toggling the port-channel connected to the broadcast medium.

Further Problem Description:
We have not tested ISIS with BFD with IPv4 or in point to point environment - because customer does not require this solution.

Status:
Other
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuv05652
Title:
itd scale swover SAP 230 (iscm sap not respod)" and stby powerup forever
Description:

Symptom:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Conditions:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Workaround:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Further Problem Description:
after itd scale switchover SAP 230 (iscm sap not respod)? and takes 3 m

Status:
Other
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.2(14)FB(0.79), 7.2(0)D1(1.20)
Known Fixed Releases:
Bug Id:
CSCus26870
Title:
December 2014 ntpd CVEs for Nexus 5k/6k/7k/MDS
Description:

Symptom:
The following Cisco products:

NEXUS 7000
NEXUS 6000
NEXUS 5000
MDS

include a version of NTPd that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-9293
CVE-2014-9294
CVE-2014-9295
CVE-2014-9296

This bug has been opened to address the potential impact on this product.

Conditions:
This issue is configuration dependant and applies only when the following command is configured:

feature ntp

All prior versions of NX-OS are affected.

Workaround:
1. If the upstream mgmt0 device supports uRPF then ensure it is configured.

2a. Filter incoming NTP queries and restrict them to trusted NTP server addresses only by using the ntp access-group configuration command.

2b. For affected platforms that do not support the ntp access-group command, configure an inbound ACL for trusted NTP server addresses to the NTP port (UDP port 123) on mgmt0.

Further Problem Description:
All previously released versions of SAN-OS and NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

Nexus 50xx:
NX-OS 5.2 release - a to be determined release
Nexus 55xx, 56xx
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 60xx:
NX-OS 7.0 release - first fixed release is 7.0(6)N1(1), available in Apr 2015

Nexus 7xxx:
NX-OS 6.2 release - first fixed release is 6.2(12), released on 03 Feb 2015

MDS:
NX-OS 5.2 release - first fixed release is 5.2(8f), released on 20 Feb 2015
NX-OS 6.2 releases:
- 6.2(9b), released on 01 Apr 2015
- 6.2(11b), released on 02 Mar 2015
- 6.2(13), to be released in June 2015

There are no fixed MDS NX-OS releases that are FICON certified yet. There will not be any fixed releases for software trains that are past the end of software maintenance support.

A Cisco Security Advisory has been published to document this vulnerability at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUL-2015
Known Affected Releases:
6.0(3), 6.2(13)FM(0.8), 6.2(9)S32, 6.2(9a)S5, 7.2(0)ZD(0.1), 7.2(0)ZN(0.4), 7.9(0)ZD(0.4), 8.0(0.1), 9.9(9)
Known Fixed Releases:
5.2(1)N1(8.155), 5.2(1)N1(8.158), 5.2(1)N1(9), 5.2(8f), 5.2(8f)S9, 6.0(2)N2(6.132), 6.0(2)N2(6.133), 6.0(2)N2(7), 6.2(11b), 6.2(11b)S4
Bug Id:
CSCtw77593
Title:
ERROR: Entry not found in copp database while apllying custom copp polic
Description:

Symptom:
Modifying the CoPP profile or CoPP policy throws error "ERROR: Entry not found in copp database"

Conditions:
The issue happens when a reload based upgrade is performed.

Workaround(s):

Please follow the below steps:

1) Reload the switch with NX-OS version where the CoPP profile was last changed/applied
2) Removing the current CoPP profile
3) Upgrade the switch to the newer version and apply the new CoPP profile or CoPP policy

Description:

CoPP uses shadow database to delete the current CoPP profile if the current software version and CoPP profile version are different. Shadow database is created only when the install all based upgrade is performed. It is not created for reload based upgrade.

The issue is fixed by creating shadow database when the running-config is stored as startup-config. So that the shadow database can also be used to delete the CoPP profile when the reload based upgrade is performed. In case if the shadow database is not present, CoPP will delete the current CoPP profile by using the running CoPP database.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUL-2015
Known Affected Releases:
5.2(3), 5.2(3)S24
Known Fixed Releases:
5.2(3.44)S0, 6.1(1)
Bug Id:
CSCuv21939
Title:
Linecard Kernel Panic due to Kernel Stack Overflow
Description:

Symptom:
Linecards on a 7k reloaded unexpectedly from kernel panics.

Conditions:
Currently believe it was due to some large traffic event impacting these cards from the remote device, details are unknown.

Workaround:
Unknown

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.1(4a)
Known Fixed Releases:
Bug Id:
CSCut10829
Title:
sac_usd crash on standby supervisor
Description:

Symptom:
hw sw
n7000-s2-dk9.6.2.8a
N7K-C7009

Conditions:
None

Workaround:
None

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCun86405
Title:
Orphan Ports on FEX have the MAC learnt on ES ID instead of local SWID
Description:

Symptom:
Orphan ports connected over FEX HIF may observe traffic getting black holed due to incorrect learning of MAC address in a VPC+ domain.
The MAC is learned from Emulated SWID (ESID) instead of Local SWID as observed on other switches in FabricPath Domain.

On the problem switch:
Software MAC learning would pick on the right physical port, though hardware MAC tables would shows MAC learned from ESID instead of Local SWID.

Conditions:
Problem may trigger if ports which were part of VPC+ complex (VPC port-channel) and were then moved to FEX-Fabric mode using channel-group force option.
This does not clear the register setting properly and MAC learning still picks on ESID as is treated to be coming across a VPC+ Port-channel.

This is the only known and analyzed trigger though may not be the only one.

Workaround:
- Shutdown the affected Ports.

- Move them out of FEX Fabric PO.

- Make them regular Access or Trunk ports (not VPC)

- Unshut them. >>>>>>>>> If FET's (Fabric Extender Transceiver) are used then once these ports are taken out from FEX Fabric mode FET SFP's would fail validation hence software state machine would not be complete to unset the corresponding registers. "service unsupported-transceiver" will help bypass validation checks.

- Move ports back to FEX-Fabric mode. This should clear the problem.

Further Problem Description:
N7k-switch# sh mac address-table address 0000.0000.0001
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False
VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 106 0000.0000.0001 dynamic 0 F F Eth150/1/2 >>>>> Here it looks correct

Module-X# show hardware mac address-table address 0000.0000.0001
FE | Valid| PI| BD | MAC | Index| Stat| SW | Modi| Age| Tmr| GM| Sec| TR| NT| RM| RMA| Cap| Fld|Always| PV | RD| NN| UC|PI_E8| VIF | SWID| SSWID| LID
1 1 1 32 0000.0000.0001 0x012d1 0 0x089 1 35 1 0 0 0 0 0 0 0 0 0 0x00 0 0 1 0 0x004 0x2de 0x001 0x012d1

SWID is picked as ESID and not as local SWID. Hardware MAC table will reflect the problem.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.17), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.1(0)D1(0.162), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.4), 7.1(0)PDB(0.92), 7.1(1)SP(0.4)
Bug Id:
CSCut77411
Title:
Assess April 2015 NTPd vulnerabilities for N5k/N6k/N7k
Description:

Symptom:
This has been opened to document the potential impact on the following products:

Cisco Nexus 5/6k switch family
Cisco Nexus 7k switch family

of the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798
CVE-2015-1799

Conditions:
Exposure is configuration dependent. The configuration that can expose the vulnerability are

ntp authenticate
ntp authentication-key 1234 md5 104D000A0618 7
ntp trusted-key 1234
ntp peer 1.2.3.4 key 1

Workaround:
Remove the applicable configuration.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
7.3(0)ZN(0.3), 7.3(0.9)
Known Fixed Releases:
5.2(1)N1(8.167), 5.2(1)N1(9), 6.0(2)N2(6.141), 6.0(2)N2(7), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(7)ZN(0.108), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(2)N1(0.545)
Bug Id:
CSCuu20761
Title:
Delete MAC sync issue after LC module reload that does not have PL
Description:

Symptom:
VxLAN Mac inconsistency across VPC peers OR
Stale vxlan mac on one side of VPC complex

Conditions:
LC reload which contains VxLAN coreports but does not contain the peerlink.

Workaround:
clear mac address dynamic.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCuu76634
Title:
CFS process crash with Eth and IPv4 distribution configured in VPC setup
Description:

Symptom:
CFS process my crash if running:

- cfs ipv4 distribute
- cfs eth distribute

This configuration is not supported on Nexus 7000 with VPC configuration

Conditions:
If both IPv4 and Eth distribution are configured for CFS

Workaround:
Remove unsupported configuration, IPv4 is not required.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.2(6b), 7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCtz04952
Title:
STP-2-SET_PORT_STATE_FAIL: Port state change req to PIXM failed
Description:

Symptom:
Port-channel or interface fails to come up with the following logs

%STP-2-SET_PORT_STATE_FAIL: Port state change req to PIXM failed, status = 0x12 [fu hashtable key not present] vdc 3, tree id 0, num ports 1, ports state BLK, opcode MTS_OPC_PIXM_SET_MULT_CBL_VLAN_BM_FOR_MULT_PORTS, msg id (66549), rr_token 0x103F5

Conditions:
Reload VDC or Chassis

Workaround(s):
No workaround. Try reloading chassis again for a possible recovery

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.1(0.249), 6.1(0.298), 6.1(1)
Known Fixed Releases:
5.2(7), 5.2(7)S13, 5.2(7.18)S0, 6.1(1)S31, 6.1(1)S32, 6.1(1.33)S0, 6.1(1.34)S0, 6.1(2.27), 6.2(0.217), 6.2(2)
Bug Id:
CSCuu93248
Title:
IPFIB core due to SW index leak in MFIB for F3 modules
Description:

Symptom:
On a nexus 7000/7700 series switch, ipfib service may reset on a linecard as indicated by the following log in the main vdc :
%SYSMGR-SLOT4-2-SERVICE_CRASHED: Service "ipfib" (PID 1200) hasn't caught signal 6 (core will be saved).

Conditions:
This can possibly be seen when there has been a significant number of adjacencies updates on the system.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.79), 7.2(1)D1(0.13), 7.2(1)ZD(0.9)
Bug Id:
CSCug47000
Title:
HSRP Standby unknown for one group
Description:

Symptom:HSRP hellos may not be received for some HSRP groups.

Conditions:This issue was experience across a VPC peer link.

Workaround:Flapping the effected peer link interface will recover HSRP temporarily but the issue may resurface.




Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.1(2), 6.1(3)
Known Fixed Releases:
6.2(1.135)S0, 6.2(2), 7.1(0)D1(0.14)
Bug Id:
CSCus63847
Title:
7.2.0::XBOW DCE F3::Seeing l2fm hap reset with switch reload trigger
Description:

Symptom:
L2FM crashes with a similar looking backtrace:
Thread 1 (process 6961):
#0 0x081f09e8 in l2fm_conv_and_send_flush_vlan_mp_to_lcs_es (p_req=0x8f1a76c)
at ../feature/forwarding-sw/l2fm/server/l2fm_msg_handlers.c:20482
#1 0x08168efb in l2fm_send_flush_l2ft_vlan_mp (mts_event=0x0,
p_req=0x8f1a70c, p_filtered_req=0x8f1a76c, p_rsp=0x8f1a744,
reason=L2FM_FLUSH_PVLAN_ASSOC_CREATE,
cb_func=0x816620a , num_req=0)
at ../feature/forwarding-sw/l2fm/server/l2fm_msg_handlers.c:5808
#2 0x0816801a in l2fm_flush_l2ft_vlan_mp (mts_event=0x0, p_req=0x8f1a70c,
pp_rsp=0xffb68a00, reason=L2FM_FLUSH_PVLAN_ASSOC_CREATE)
at ../feature/forwarding-sw/l2fm/server/l2fm_msg_handlers.c:5701

Conditions:
Triggers: Per-Vlan based flush coming from CLR MAC, STP, PVLAN, VLAN DEL, etc are some triggers which will cause this [any trigger using vlan multi port flush]

Conditions: VPC+ configured AND MCT_down AND some condition like LC's are not up or coming up or MTS message send failed, etc.
All this happens during Switch reload or LC reload.

Workaround:
Move to fix version. Crash cannot be avoided.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
7.2(0)D1(0.390)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.67), 7.2(0)D1(1), 7.2(0)ZD(0.87)
Bug Id:
CSCur68350
Title:
F3: MAC Address is not Learned in Software after ISSU
Description:

Symptom:
A MAC address is present in hardware but not software. Since the MAC is not in software other processes and features are not notified of new MAC address. This can result in black-holed traffic.

Conditions:
- ISSU to 6.2(10)
- F3 module
- OTV or vPC

Workaround:
Upgrade via a traditional reload.

If issue is hit via ISSU, flap the interface. If they are part of a port channel that spans multiple forwarding engines (FE), flap the member interfaces one at a time force mac learning on a different FE.

If the internal interface is not a port channel or the members are on the same FE then flapping the interface in OTV will trigger OTV AED failover or in vPC shut down the vPC leg.

If you believe problem exist even after flapping the interface please contact TAC for further workaround.

Further Problem Description:
This impacts OTV as locally learned MAC address will not be advertised to the remote otv site and vPC as new MAC learns will not be advertised to the vPC peer

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.24), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.303), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCun49409
Title:
ISSU (6.1.5 (S4) to 6.2.6 CCO) failed with naxos_usd core.
Description:

Symptom:
June 10, 15: Issue Didn't reproduced when I did ISSU. See the attached logs.

Conditions:

Workaround:

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.1(5)S4
Known Fixed Releases:
Bug Id:
CSCuu83574
Title:
Error in syslog of interface flap event after reload in remote server
Description:

Symptom:
This can occur when logging source interface loopback is configured with ipv6 address and logging server is configured.

Conditions:
This issue occurs in certain conditions when ipv6 address configured on loopback being used as logging source interface is in compact form:
ex:
1::1/64

Workaround:
Reconfigure the logging source interface with the loopback interface after reload.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.5), 7.2(1)N1(0.239), 7.2(1)N1(1), 7.2(1)ZD(0.5), 7.2(1)ZN(0.5)
Bug Id:
CSCud75360
Title:
F2 module fails to install routes after CLP_FIB_TCAM_PF_INSERT_FAIL seen
Description:

Symptom:

A Nexus 7000 with F2 modules may experience an issue with the following message:

2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 4
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 5
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 5
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 7
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 7
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 8
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 10
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 8
2012 Nov 30 16:38:31 switch %IPFIB-SLOT2-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 11
2012 Nov 30 16:38:31 switch %IPFIB-SLOT3-4-CLP_FIB_TCAM_PF_INSERT_FAIL: FIB TCAM prefix insertion failed for IPV6 unicast on instance 10

After this log appears, it is possible that the fib tcam may freeze, and no new prefixes can be inserted.

Conditions:

This issue occurs when the fib capacity is near the upper advertised limit of the F2 module, even if only for a brief period of time

Workaround:

To prevent the issue it is required to reduce the fib size. The only way to recover is to reload the module affected.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
6.1(2)
Known Fixed Releases:
6.1(2)E4, 6.1(4), 6.1(4)S4, 6.1(4)S5, 6.1(4.25)S0, 6.1(4.39)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCuu21836
Title:
Port was Error disabled, Reason:Port not found when NAM module installed
Description:

Symptom:
If there is a NAM module installed and when a dce (core/edge) interface belonged to an another module flaps, then Port Client process in NAM sends "Port Not found".

This makes the EthPM to put the port to ErrDisable state

Example syslog:
============
ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/41 is down (Error disabled. Reason:Port not found)

Conditions:
NAM module is present on the box
dce (core/edge) interface belonged to an another module flaps

Workaround:
If Customer could afford to reload the NAM module, secure a maintenance window and reload the NAM module.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(9c), 7.2(0)D1(0.392)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.51), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14)
Bug Id:
CSCug39011
Title:
N7K: F2 may reset in case of receiving excessive error frames
Description:

Symptom:
A faulty F2 module may cause resetting other multiple F2 modules
within the chassis.

Conditions:
very rare condition. the faulty F2 module may send out excessive error
frames to other F2 modules.

Workaround:
Module reload to recover. Isolate the faulty module and remove from the chassis.=

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.2(10)E7, 6.2(10)E8, 6.2(13.3)S0, 6.2(14)FB(0.34), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.482), 7.2(0)VZD(0.26)
Bug Id:
CSCut23557
Title:
N7K platform: netstack crash while saving tech-support in bootflash
Description:

Symptom:
The netstack process on a Nexus 7000 switch running 6.2(8a) may unexpectedly crash while collecting a 'show tech' and redirecting it to bootflash

Conditions:
saving tech-support in bootflash

Workaround:
please do not save "show-tech" to bootflash.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)S2
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.28), 7.0(0)HSK(0.433), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.479), 7.2(0)D1(1), 7.2(0)ZD(0.159), 7.3(0)RTG(0.17)
Bug Id:
CSCut96140
Title:
6.2.12: L2 port channels not programmed correctly in LACP INDI
Description:

Symptom:
Port configured as LACP individual mode.

ELTM does not have the PC member in the database after port becoming part of port-channel.

"show system internal eltm info interface port-channel xyx" does not contain all the PC members.

Conditions:
L2 port-channel with LACP Individual mode

Workaround:
Flap port-channel members which is not added to the PC member

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E5, 6.2(13.3)S0, 6.2(14)FB(0.36), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.485), 7.2(0)D1(1), 7.2(0)ZD(0.167), 7.3(0)RTG(0.17)
Bug Id:
CSCut78387
Title:
l2fm crash @l2fm_rvtep_free_entry after shut/no shut nve interface.
Description:

Symptom:
l2fm crash

Conditions:
shut/no shut nve interface

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.482), 7.2(0)D1(1), 7.2(0)ZD(0.162), 7.3(0)RTG(0.17)
Bug Id:
CSCut94069
Title:
libbmp memory leak because libnve_pd calls libbmp incorretly
Description:

Symptom:
libbmp memory leak

Conditions:
nve peers flapping

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.475), 7.2(0)D1(0.485), 7.2(0)D1(1), 7.2(0)N1(0.179), 7.2(0)N1(1), 7.2(0)ZD(0.166)
Bug Id:
CSCup10643
Title:
Enabling netflow causes Line card to crash
Description:

Symptom:
Nexus Line card crashes with netflow is enabled

Conditions:
hardware rate-limiter layer-2 netflow 500 module 3

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(6a)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.31), 6.2(11)FM(0.7), 6.2(8)TS(0.28), 6.2(9.4)S0
Bug Id:
CSCtt38844
Title:
DHCP relay does not flood packet to BD with broadcast bit set
Description:

Symptom:

Nexus 7000 DCHP relay is not flooding DHCP Offer received from the server where client set broadcast bit. The destination mac address is ffff.ffff.ffff, but the cpu is sending the packet out the interface that the corresponding DHCP Discover packet was received from the client and not flooding it to the vlan.

Conditions:

When broadcast bit is set to client. the result should be flood to vlan. In this case, the DHCP offer is not flooded, and if the client is now known via a different interface, or circumstances prevent that broadcast packet making it to the client via the original path, DHCP will time out.

Workaround:

To ensure that the DHCP Offer arrives back on the client, ensure that to path to the client has not moved due to some layer 2 topology change.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
5.1(1)
Known Fixed Releases:
5.2(2.74)S0, 6.0(2)S7, 6.1(0.131)S0
Bug Id:
CSCuu02941
Title:
linecard crashing due to clp_fwd hap reset
Description:

Symptom:
N7K-SM-NAM-K9 and LCs with less than 12 instances of Clipper will have their clp_fwd process crash when the system has Fex with L2 mcast is active. I.e. when the Fex ports are flapped or when the LC itself is reloaded, then clp_fwd will crash.

Conditions:
The issue happens when we boot the module on 6.2(10)

Workaround:
None

Further Problem Description:
l2mcast assumes that in every line card 12 Forwarding instances are available. With this assumptions, when it sends a message to clp_fwd driver, the clp_fwd driver does not handle this error correctly. Hence, crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.43), 6.2(14)FB(0.47), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.494), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.176)
Bug Id:
CSCut06258
Title:
F1 card MTM misprogramming on "VLAN UP/Down" event
Description:

Symptom:
MAC are not learned in HW on F1 card. From SUP , show mac address-table shows correct info, but show hardware mac address-table X for module X - is incorrect.
Affects on per VLAN/per port-pair basis (e.g. port-pairs are : 1,2 ; 3,4; ... 31,32. and some of them may stop learning MACs on some of the VLANs)
This lead to Unknown Unicast Flood scenario

Conditions:
shut/no shut of VLAN on a busy system (especially on many VLANs simultaneously). Removing and adding many VLANs at once.

Workaround:
Reload affected module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.21), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.493), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCud63152
Title:
F2/F2E/F3 improper programming gateway mac on some instances
Description:

Symptom:
Traffic destined to CPU is flooded instead of being punted.
This causes symptoms such as ARP being incomplete, L3 routed traffic not getting routed correctly

Conditions:
We have determined this is a result of the Interface VLAN MAC address not programmed in the hardware

Workaround:
shut/no shut of the interface vlan
This will force the switch to reprogram the router mac address

Further Problem Description:
Additional information regarding this fix:
After ISSU to a fixed release (ie., 6.1(5) and above), reload of F2/F2E/F3 modules are required to get the fix applicable. If the F2/F2E/F3 modules are not reloaded, this problem may continue to happen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.0(3)
Known Fixed Releases:
6.1(5), 6.1(5)S11, 6.1(5.10)S0, 6.2(0)HS(0.10), 6.2(8), 6.2(8)S1, 6.2(8.5)
Bug Id:
CSCub16539
Title:
SNMP MTS Buffer Leak on VLAN MIBs - dot1d bridge, vlan membership, smon
Description:

Symptom:
A Nexus 7k or 5k switch may experience crashes in the SNMPd process. Errors leading up to the crash hint at an MTS issue with the SAP used by SNMP. Eg:

KERN-2-SYSTEM_MSG mts_is_q_space_available_old(): NO SPACE - node=4, sap=27, uuid=26, pid=28679, sap_opt = 0x1, hdr_opt = 0x0, rq=1122(322640), lq=0(0), pq=0(0), nq=0(0), sq=0(0), fast: rq=0, lq=0, pq=0, nq=0, sq=0 - kernel
KERN-2-SYSTEM_MSG mts_print_longest_queue_state: opcode counts for first and last 50 messages in recv_q of sap 27: - kernel
KERN-2-SYSTEM_MSG mts_print_msg_opcode_in_queue: opcode 7679 - 100 messages - kernel
KERN-2-SYSTEM_MSG mts_do_msg_input() failing since no space available in 27 (src_sap = 27, opc = 8923) - kernel

Conditions:
The leak occurs when polling a VLAN MIB and performing a walk down the MIB's subtree -- specifically the dot1d bridge MIB, vlan membership MIB, and smon MIB.

Workaround(s):
None known.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
5.2(5), 6.1(1)
Known Fixed Releases:
5.2(1)N1(5), 5.2(6.23)S0, 5.2(7), 6.0(2)A1(1), 6.0(2)N1(1), 6.0(2)U1(1), 6.1(1)S50, 6.1(1.48)S0, 6.1(1.69)
Bug Id:
CSCut87473
Title:
bfd crash @bfd_sys_get_remote_ip_info on BDI/peer link i/f shut/unshut
Description:

Symptom:
bfd crash

Conditions:
On BDI/VPC peer link interface shut/no shut few times with scaled configuration

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.490)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14), 7.3(0)RTG(0.17)
Bug Id:
CSCtz65462
Title:
broadcast get dropped on F2, learning source broadcast frame
Description:

Symptoms:
ARP requests and other Layer 2 traffic with a broadcast destination address is NOT flooded to all ports on the same VLAN.
In addition to that, the following message may be seen on the device logs:

%MTM-SLOT3-2-MULTICAST_SOURCE_MAC_LEARNT: Inserted dynamically learnt multicast source mac ff:ff:ff:ff:ff:ff!

Conditions:
Upon receiving a Layer 2 frame with a broadcast source address (FFFF.FFFF.FFFF), the F2 line card will learn and add this address to its hardware
table. Having this entry on the hardware table, Layer 2 traffic with a broadcast destination address (such as ARP requests) will be dropped on the
Nexus 7000 device because the ingress controller fails to flood it to the broadcast domain.

Workaround:
Clear the entry from the dynamic MAC address table by executing the following command from a privileged EXEC prompt:

clear mac address dynamic vlan x address ffff.ffff.ffff

Replace ''x'' with the appropriate VLAN number.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-3048 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
6.1(0.307)S0, 6.1(1)S23, 6.1(1.22)S0, 6.2(0.217), 6.2(2)
Bug Id:
CSCuq93334
Title:
[Performance impact] M2 reload stuck in power cycle for 17-18 minutes
Description:

Symptom:
Module power cycle takes 17-18 mins to complete.

Conditions:
we observed this issue with the reload module scenario with more than about 100+ BFD session in the system.
as module goes off, PPF session can't reach the destination which cause ppf server do a retry internally and it takes approximately 10 sec for each session. we got over 100 session (1000 sec =16 mins) that's the reason why power-cycle took 17~18 mins

Workaround:
before reloading the module, I recommend doing a no feature bfd, and then do a module reload, finally add bfd feature back to the system.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(10)E1, 7.2(0)ZD(0.106)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.476), 7.2(0)D1(1), 7.2(0)PDB(0.408), 7.2(0)VZD(0.26), 7.2(0)ZD(0.156)
Bug Id:
CSCut43413
Title:
DCi: HSRP Virtual MAC Flapping through FHRP Isolation PACL
Description:

Symptom:
FHRP hello causing vMAC to flap between local interface and Layer 2 vPC DCi.

Conditions:
- FHRP isolation PACL on Layer 2 vPC DCi interface
- Device acting as L2 vPC DCi is not FHRP gateway

Workaround:
Two options dependent on the design of the network:

- If the DCi device is only connected to the FHRP gateway, a VACL with an ARP inspection filter is recommended to isolate the data centers.
- If the DCi device has connections to other devices in the local data center using the PACL with a static MAC entry is the only option. This will not stop the duplicate gateway gratuitous ARPs between the two sites.

Further Problem Description:
This is a hardware limitation. The MAC learning process takes place before the PACL drops the HSRP hello.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCut63393
Title:
Border Leaf needs to advertise hash-len for BSR
Description:

Symptom:
Border Leaf doesn't advertise the correct hash-len as advertised by PIM running @ the Border-Leafs for BSR in Vinci Asti Multicast.

Conditions:
BSRs listen and accumulate candidate RP announcements. For every group range known, the BSR builds a set of candidate RPs, including all routers that advertised their willingness to service this range. This is called group range to RP set mapping. The resulting array of group range to RP set mappings is distributed by the BSR. Ultimately, the bootstrap messages containing Group to RP-set mappings are received by every multicast router in the domain and used to populate their RP caches. It's up to the routers to select the best matching RP from the sets advertised by the BSR router. It is important that all routers select the same RP for the same group, otherwise the multicast sources might miss receivers. Based on a consistent hash-len information sent from the BL's the routers will ensure they pick the same RP for the same group.
In the present Janjuc image, although PIM advertises a hash-len to be chosen for BSR, this communication doesn't get sent to NGMVPN @ Border-leaf node which results in PIM @ all leaf nodes using a default hash-len of 0 to calculate the RP for the group. This causes mismatch in hash-len information between PIM @ Border-Leaf vs PIM @ Leaf node.

Workaround:
Work-around is not to configure the candidate-RP's in the RP-set for BSR case with the same priority.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases:
Bug Id:
CSCua39287
Title:
System reloads due to TACACS+ process crash
Description:

Symptom:
NX-OS system running 5.2.5 may reload due to TACACS+ process crash.

Conditions:
This issue may occur when TACACS+ is configured for remote accounting. It is caused by a high rate of invalid accounting packets (2 to 3 every second) which create "invalid_ip@" records in the accounting log. This may be confirmed with the following command:

show accounting log | i invalid_ip@

Workaround:
Disable the remote accounting for tacacs.

This can done by removing the aaa accounting config statement for tacacs.

ex:
switch(config)# no aaa accounting default xxxx

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
5.2(5)S8
Known Fixed Releases:
5.2(1)N1(5), 5.2(6)S14, 5.2(6.16)S0, 5.2(7), 6.1(1)S39, 6.1(1.41)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCut83358
Title:
nve memory leak@ libnve_pd in n7k-platform
Description:

Symptom:
nve memory leak

Conditions:
nve peer down and up

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.475), 7.2(0)D1(0.476), 7.2(0)D1(1), 7.2(0)N1(0.168), 7.2(0)N1(1), 7.2(0)PDB(0.408)
Bug Id:
CSCtj07918
Title:
Eigrp flap on switchover
Description:

Symptom:
EIGRP sessions flap on switchover.

Conditions:
This will happen if large number of eigrp passive interfaces are used (over 500) on a redundant system with heavy load and multiple features running. After switchover, the processing on the standby supervisor takes longer than the hold timer. Subsequently, the remote end times out the peer hold timers resulting in the sessions going down.

Workaround(s):
By increasing the hold timer to 20 to 25 seconds the switchover node will have enough time to send the hellos out before the sessions time out on the remote end. For even larger number of passive interfaces, larger hold timer must be used.


Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
5.1(1), 5.2(5)S18, 6.1(1)S11
Known Fixed Releases:
5.1(1.26)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCuv30404
Title:
vrf name change and switchover - routing table mapped to previous vrf
Description:

Symptom:
Our customer changed vrf names as below and those changes are saved.
And they did switchover and found that vrf for routing table was not updated and mapped to previous one.

BACKUP_BB ---> Backup_NW
RND_BB ---> Ext_RND
PRIBIT_NETWORK ---> Private_NW

Conditions:
version : n7700-s2-dk9.6.2.12.bin
module:

Mod Ports Module-Type Model Status
--- ----- ----------------------------------- ------------------ ----------
1 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok
3 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok
5 0 Supervisor Module-2 N77-SUP2E active *
6 0 Supervisor Module-2 N77-SUP2E ha-standby
7 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok

Our customer changed vrf names as below and those changes are saved.
And they did switchover

Workaround:
None

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(9c)S5
Known Fixed Releases:
Bug Id:
CSCum52399
Title:
Fixing EIGRP to take Interface MTU as default Max-Packet Size
Description:

Symptom:
Symptom:
In 6.2.2, the default EIGRP mtu is 16384 regardless of the interface MTU. If system receives large update packets then they will get fragmented. The CoPP on the nexus can drop these fragments as they get classified under default-class of CoPP. These fragments are not considered as EIGRP packets being fragmented packets.

Conditions:
EIGRP MTU is 16384.

Workaround:
Modify COPP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)A4(0.814), 6.0(2)A4(1), 6.0(2)U4(0.814), 6.0(2)U4(1), 6.2(10), 6.2(10)EC(0.12), 6.2(10)FM(0.10), 6.2(10)NO(0.6), 6.2(8)KR(0.8), 6.2(8)TS(0.28)
Bug Id:
CSCur70861
Title:
F3 - Ports should not be err-disabled for TCAM single bit ECC errors
Description:

Symptom:
If F3 module experiences repeated single bit ECC errors it will error-disable the associated ports with that forwarding instance.

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 197
Device Name : Flanker L3 Driver
Device Errorcode : 0xcc503600
Device ID : 197 (0xc5)
Device Instance : 03 (0x03)
Dev Type (HW/SW) : 06 (0x06)
ErrNum (devInfo) : 00 (0x00)
System Errorcode : 0x429b0026 failure recovery threshold
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/25-32
Error Description : FLN_FW_INT_STATUS_TCAM_MATCH0_ECC_0
DSAP : 0 (0x0)
UUID : 0 (0x0)
Time : Tue Nov 11 16:37:55 2014
(Ticks: 546281B3 jiffies)

Conditions:
When repeated single-bit ECC errors are detected.

Workaround:
No known workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.16), 7.1(0)AV(0.38), 7.1(0)EV(0.144), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCup42943
Title:
DMAC 0000.0000.0000 loops endlessly between fabricpath peers
Description:

Symptom:
In a mixed VDC M2/F2E running fabricpath, a frame with DMAC 0000.0000.0000 is looping endlessly between the fabricpath peers.

A mac flap can be seen between the GPC and peer SW.ID

This could increase the bandwidth utilizaiton on the link.

Conditions:
Issue seems to be seen in a M2/F2E chassis running fabricpath. This bug applies to 6.2(6) and 6.2(8) only.

Workaround:
downgrade to 6.2(2a) OR
upgrade to 6.2.8a or 6.2.6b or 6.2.8e6 or 6.2.10

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(6), 6.2(8)S2
Known Fixed Releases:
6.2(10), 6.2(10)S8, 6.2(10.5), 7.1(0)D1(0.186), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)NF(0.32), 7.1(0)OTT(0.14), 7.1(0)RTG(0.12), 7.1(0)SIB(99.6)
Bug Id:
CSCuu96175
Title:
L2FM/MCEM/CFS need more robust registration & retry infra
Description:

Symptom:
This is to address possible timeouts between L2FM and CFS under failure condition (CFS crash, control plane congestion) that could cause registration issues between applications.

Conditions:
This may occur under high control plane load.

Workaround:
Perform Supervisor Switchover or reload device

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(6b)
Known Fixed Releases:
6.2(13.7)S0, 7.2(1)D1(0.20)
Bug Id:
CSCup10049
Title:
ACLQOS crash and %IPQOSMGR-3-QOSMGR_PPF_ERROR: PPF library error:
Description:

Symptom:
A Nexus C7009 running NX-OS version 6.2(2a) may have a crash in aclqos with accompanied core file(s).

%SYSMGR-SLOT3-2-SERVICE_CRASHED: Service "aclqos" (PID ) hasn't caught signal 6 (core
will be saved).

Post crash, the below messages may also be seen:

%IPQOSMGR-3-QOSMGR_PPF_ERROR: PPF library error: MTS
Error 0x801c0010 (Device or resourc e busy) after 1706 retries .

Conditions:
there were too many queries from ipqosmgr and COPP to aclqos

Workaround:
Not known at this time.

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(2a), 6.2(6)
Known Fixed Releases:
6.1(2)I3(1.19), 6.1(2)I3(2), 6.2(10), 6.2(10)S92, 6.2(10)S93, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.326)
Bug Id:
CSCut44076
Title:
ISSU from 628/6212 to GBR:HMM-3-AUTO_CONF_PROFILE_ERROR
Description:

Symptom:
HMM-3-AUTO_CONF_PROFILE_ERROR: hmm [16977] Data Snooping Host: Unable to find mapping for encap 31 on interface Ethx/y/z

Conditions:
Enable "feature-set fabric and feature vni after ISSU from 62x to GBR. Both of them must be enabled. If only one of them enabled, then issue not seen. Seen only with private-vlan pairs.

Packet start coming on secondary vlan , but since dhcp relay is configured only on primary vlan, it fails.

Delete secondary vlan, but primary vlan is pointing to a secondary vlan. Dhcp doesn't work at all for primary vlan since pktmgr sending packet on secondary vlan which is not present.

Workaround:
Try in the following order. If one doesn't work, move on to the next.

1) Disable one or both features (feature-set fabric or feature vni).
2) Delete secondary vlan and then recreate secondary vlan.
3) Delete and recreate the pvaln primary and secondary vlans.
3) "copy r s" switch reload.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
7.2(0)D1(0.441)
Known Fixed Releases:
Bug Id:
CSCuv23184
Title:
Mac is egress learnt pointing to index in different VDC on M
Description:

Symptom:
Mac is pointing to wrong DI in different VDC. Packet may leak between VDC.

Conditions:
Have a linecard in the admin VDC and configure some port channels not necesarily on this port-channel.
Move all ports of this LC at once to another VDC.

Workaround:
reload LC

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(14)FB(0.78), 6.2(8b)
Known Fixed Releases:
6.2(13.9)S0, 7.2(1)D1(0.17), 7.2(1)ZD(0.13)
Bug Id:
CSCtf36357
Title:
n7k: Need ability to configure ingress netflow sampling with dhcp relay
Description:

A Nexus 7000 switch does not currently support having ingress netflow sampling and DHCP relay configured on the same interface. We need this restriction removed.

Symptom:
When trying to configure the two features together you might see error message similar to:

%$ VDC-1 %$ %NFM-2-VERIFY_FAIL: Verify failed - Client 0x87000146, Reason: feature combination is not supported in tcam, Interface: Vlan601
Verify failed - Client 0x83000146, Reason: feature combination is not supported in tcam, Interface: Vlan601

Conditions:
none

Workaround:
When you remove the ip monitor netflow input, you need to bounce the l3 interface to take a effect.

Fix is available in 6.2(2)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
4.2(2a), 4.2(3), 5.2(0.266)
Known Fixed Releases:
6.2(0.279)S0, 6.2(0.287)S0, 6.2(2), 7.0(1)ZD(0.3)
Bug Id:
CSCuo90184
Title:
NXOS/OTV: ARP ACL Applies to all VLAN without Arp inspection Filter
Description:

Symptom:
ARP packets will not processed and all ARP packets will be dropped due to block ACL due to the following ARP access-list,

N7k-TEST(config)# arp access-list OTV-BLOCK-HSRP-ARP
N7k-TEST(config-arp-acl)# 10 deny ip any mac 0000.0c07.ac00 ffff.ffff.ff00
N7k-TEST(config-arp-acl)# 20 deny ip any mac 0000.0c9f.f000 ffff.ffff.f000
N7k-TEST(config-arp-acl)# 30 permit ip any mac any

without calling the arp inspection filter(ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan), the ARP access-list will be applied to all vlans and block ARP.

Conditions:
The issue is seen after the ip arp inspection filter command is applied twice on the same vlan and then if we try to remove the config.
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10
no ip arp inspection filter OTV-BLOCK-HSRP-ARP vlan 1-10

Workaround:
Reload ASCII

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.2(2a), 6.2(8)S8, 6.2(8)S9
Known Fixed Releases:
6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.7), 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.422), 7.2(0)D1(1), 7.2(0)FM(0.3)
Bug Id:
CSCut51575
Title:
VPC breaks due to incorrect emulated switch-id after ISSU upgrade
Description:

Symptom:
Emulated switch-id changed to default value(2750) instead of configured one causing network connectivity issue. Software shows the correct switch-id.

Software:
`show vpc`
Legend:
(*) - local vPC is down, forwarding via vPC peer-link

vPC domain id : 150
vPC+ switch id : 2010--------------------------------------------->Correct value
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
vPC fabricpath status : peer is reachable through fabricpath
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 consistency status : success
vPC role : secondary
Number of vPCs configured : 85
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)


`show platform fwm info l2mp myswid`
switch id
-------------------------------------------------------------------
switch id manager
-------------------------------------------------------------------
vpc role: 0
my primary switch id: 1011 (0x3f3)
emu switch id: 2750 (0xabe)--------------------------------???instead of 2010
peer switch id: 1010 (0x3f2)

Conditions:
ISSU upgrade

Workaround:
Remove the switch-id and reconfigure the same.

Conf ter
Vpc domain 150
No fabricpath switch-id 2010
fabricpath switch-id 2010

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUL-2015
Known Affected Releases:
6.0(2)N2(3)
Known Fixed Releases:
7.0(6)N1(0.276), 7.0(6)N1(1b), 7.0(7)N1(0.70), 7.0(7)N1(1), 7.0(7)ZN(0.148), 7.1(2)N1(0.576), 7.1(2)N1(1a), 7.1(2)ZD(0.26), 7.1(2)ZN(0.38), 7.2(1)D1(0.14)
Bug Id:
CSCur99327
Title:
N7K10G: Rollback is failing on the scale setup
Description:

Symptom:
Rollback to a previously created checkpoint might fail at "no license grace-period" command.

Conditions:
This only happened when performing rollback after "write erase" and on scale setup.
This issue is not always reproducible.

Workaround:
Issue another rollback with "best-effort" option first. And do "no license grace-period" manually if necessary.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
6.2(12)FT(0.26)
Known Fixed Releases:
Bug Id:
CSCut29799
Title:
Privilege escalation with o+w files and directories
Description:

Symptoms:
Cisco NX-OS based devices contain a number of files and directories that are assigned weak file permissions. This could allow an attacker that was able to gain access to the
underlying operating system to view or modify certain files that should be restricted.

Conditions:
Nexus devices running an affected version of NX-OS Software.

Workaround:
None.

Further Problem Description:

Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
7.0(0)HSK(0.392), 7.3(0)PDB(0.11)
Bug Id:
CSCuv30417
Title:
vrf name changed and switchover - routing table mapped to previous vrf
Description:

Symptom:
After changed vrf names as below and those changes are saved.
And did switchover and found that vrf for routing table was not updated and mapped to previous one.

Conditions:
version : n7700-s2-dk9.6.2.12.bin
module:

Mod Ports Module-Type Model Status
--- ----- ----------------------------------- ------------------ ----------
1 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok
3 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok
5 0 Supervisor Module-2 N77-SUP2E active *
6 0 Supervisor Module-2 N77-SUP2E ha-standby
7 48 1/10 Gbps Ethernet Module N77-F348XP-23 ok

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
6.2(9c)S5
Known Fixed Releases:
Bug Id:
CSCus57881
Title:
VPC PO continuously flapping when untagged frame statement exist
Description:

Symptom:
When a profile containing a "untagged frame VNI" configuration is mapped to a vPC port channel the port channel will be unstable and continuously flap.

Conditions:
The issue will be seen with link level protocols like LACP etc. Due to the 'untagged VNI frame' configuration applied to the port, the following behavior is seen: the LACP untagged packet coming in hits the port profile and gets the VNI encapsulation. Then the VSI if index is determined when the packet reaches the SUP. The packet is then forwarded to the client (LACP in this case )with the physical if index value replaced by the VSI ifindex. The client expects the packet to contain the physical if index and not the VSI if index, this causes the port lookup to fail and the packet gets dropped at the client.

Workaround:
NONE

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
7.2(0)D1(0.386)
Known Fixed Releases:
Bug Id:
CSCuc40079
Title:
Reserved vlan range reverts to default after upgrade
Description:

Symptom:
After upgrade from version 5.2.1 to version 5.2.5 or later the reserved vlan list changes back to default settings. Any vlans in that range will show up in the startup config but are not active and not in running config. This occurs randomly but is reproducible.

Work Around:
Add the missing line to the config " system vlan xxx reserve" and reboot.

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
5.2(5), 6.1(2)
Known Fixed Releases:
Bug Id:
CSCuo05318
Title:
Vlan in blocking state (CBL) on one vpc leg
Description:

Symptom:
VPC leg on N7K VPC Primary may be in STP Disable (DIS) state while the vpc leg is being brought up.

Conditions:
* VPC Leg on VPC Primary Switch
* There are one or more member link flaps while the VPC leg is being brought up.

Workaround:
Step 1: Shut the problem VPC leg on both Primary and Secondary.
Step 2: No-shut the problem VPC leg on both Primary and Secondary.

Further Problem Description:
When a VPC leg on a N7K is being brought up, if there are member-link flaps causing port-channel cleanups, the STP state for the VPC leg be in DIS state when the VPC leg is up. The issue is resolved by the above workaround.

The issue exists in 6.2(6) and 6.2(8). Issue is resolved in 6.2(10) and all later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
6.2(8)S1, 6.2(8)S11, 6.2(8)S30, 6.2(8)S33, 7.1(0)D1(0.82)
Known Fixed Releases:
6.2(10), 6.2(10)EC(0.8), 6.2(10)FM(0.18), 6.2(10)NO(0.19), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.1(0)GF(0.36)
Bug Id:
CSCuu68566
Title:
NVT-DC1:IGMP snooping for VLANs disabled in hardware
Description:

Symptom:
IGMP Snooping remains disabled in hardware. In some VPC setup, there could be duplicate traffic also.

Conditions:
There are some IGMP snooping related commands for a vlan but the vlan itself is not present in the running config. ie the vlan is not created either through CLI or VTP. When such configs are present, it is possible that IGMP may pack updates for such vlans along with explicitly created vlans to m2rib module for hardware programming. But that message might be rejected by m2rib due to some vlans not explicitly created.
If the update contained snooping status info, then, we will end up with snooping status unchanged in the hardware.

Workaround:
Deleting all unnecessary configs and restarting igmp will fix the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1)
Bug Id:
CSCuu63346
Title:
vPC leg no BD after multiple link flaps
Description:

Symptom:
vPC leg (on one side) ended up without BD after a particular sequence of link flap. The other side, vPC leg is in STP BLK state.

vPC status
---------------------------------------------------------------------
id Port Status Consistency Active VLANs Active BDs
----- ------------ ------ ----------- ---------------- --------------
100 Po100 up success - - <<< No BD
200 Po200 up success - 100-107
A#

Conditions:
Happens with below particular sequence:

vPC Peerlink down -> A vPC leg(100) down -> vPc peerlink up -> A vPC leg(100)up

Workaround:
The sequence of recovery steps that will avoid the system coming into this unrecoverable bad state is to bring up the primary vpc leg up first followed by the peer link. This will ensure consistency and correctness in the final state.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCus02026
Title:
PIM crash seen on with high scale mcast source on VPC
Description:

Symptom:
PIM may crash with high number of sources per group in VPC setup

Conditions:
High scale of sources per group

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U6(0.44), 6.0(2)U6(1), 6.2(12), 6.2(12)S2, 6.2(12.4)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110)
Bug Id:
CSCuj82684
Title:
"fips mode" enable before the All LC s are online leads to LC failure
Description:

Symptom:
"fips mode" enable before the All LC s are online leads to LC failure

Conditions:
"fips mode" enable before the All LC s are online leads to LC failure

Workaround:
enable fips mode only after all the LC s are up .

Further Problem Description:
for more details refer to test plan ,

NEXUS_FIPS_140-2_Detailed_Test_Plan
http://wwwin-eng.cisco.com/Workgroup/Eng/DC_OS/QA/NEXUS_FIPS_140-2_Detailed_Test_Plan.doc
Status: AP EDCS Rev: 5 Date: 27-AUG-2010 Size: 2 M
Doc No: EDCS-664107 Format: WORD PDF

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
Bug Id:
CSCuu73376
Title:
multicast traffic loss due to snooping entry programmed with wrong LTL
Description:

Symptom:
After these set of triggers,
a)ASCII replay ( with mcast config on a vxlan setup)
b)switchover
c) LC ISSU ,

there may be loss of few mcast streams .

RCA-
Problem surfaces wherein we see some "pending" l2mcast entries in the LC. These pending entries look to be stale ones - those that were added before the ISSU. Pending entries are those routes psuhed to the LC by MFDM wherein the ltl index for the OIF is not resolved. MFDM typically sends an update after the ltl is resolved and these pending entries are popped off the list and progarmmed to hw.. Some how that never seems to happen for these entries and after the ISSU is done they will be recovered again with the stale RID info ( index for set of ltls) . Any update coming in for the RID after the ISSU will cause these entries to be programmed with wrong LTL.

Conditions:
The issue is ocassionally when the following sequence was done

1. ASCII replay - followed by
2. switchover - followed by
3. LC ISSU

Workaround:
To do away with the wrong entries LC reload is the only workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.22), 7.2(1)ZD(0.17)
Bug Id:
CSCuu68733
Title:
N77/SNMP: show sys intern snmp mem-stats incr memory leak - snmpmib_proc
Description:

Symptom:
Continuous polling a range of OIDs

Conditions:
Continuously polling of OIDs from DCNM tool

Workaround:
snmpd is freeing up the memory acquired after returning the response query to the polling

Further Problem Description:
Leak is not that much to initiate a process crash because the analysis showed that the memory is going up but its also getting freed after sometime.

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(0)D1(1), 7.3(0)D1(0.24)
Known Fixed Releases:
Bug Id:
CSCur34065
Title:
u6rib cored @u6rib_process_clt_stale while deleting vdc
Description:

Symptom:
the crash seems to occur because of a client clean up issue

Conditions:
Crash is seen when vdc is reloaded

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.1(0)D1(0.303), 7.1(0)D1(0.308), 7.1(0)ZD(0.348), 7.1(0)ZD(0.355), 7.1(2)ZD(0.11), 7.2(0)ZD(0.5)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.315), 7.1(0)OTT(0.45), 7.1(0)PDB(0.269), 7.1(0)SIB(99.52), 7.1(2)N1(0.576), 7.1(2)ZD(0.26), 7.1(2)ZN(0.38)
Bug Id:
CSCuu40239
Title:
ARP traffic sent out on incorrect VLAN
Description:

Symptom:
ARP traffic sent out on incorrect VLAN

Conditions:
++ Mixed chassis with F1 & M1 cards

Workaround:
1. Shut and no shut the SVI that is having problems, or
2. Disable glean fast-path via the config command ? no ip arp fast-path, or
3. Disable and reenable glean fast-path
4. Reload the switch.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.11)S0
Bug Id:
CSCut49295
Title:
7.2.0.D1.0.444.S3::UIN-1::Seeing BFD/EIGRP flap after doing 2nd SSO
Description:

Symptom:
EIGRP session flap after SSO

Conditions:
Seen after multiple consecutive SSOs

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(0)D1(0.444)
Known Fixed Releases:
Bug Id:
CSCuo50084
Title:
6.2.10 :ERROR: internal error: Failed to get if record on ASCII
Description:

Symptom:
The following error messages may be seen occasionally when applying an ascii config to switch which contains a large number of HSRP groups:
"ERROR: internal error: Failed to get if record"
"ERROR: HSRP V6 groups are not supported on HSRPV1 interface"

Conditions:
Issue only occurs when there are HSRP groups configured on interfaces that are VRF members.

Workaround:
The failed HSRP config can be reapplied manually afterwards and will be accepted.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(10)FM(0.20), 6.2(10)FM(0.24), 6.2(12)E2, 6.2(12)FM(0.8)
Known Fixed Releases:
6.2(12)E1, 6.2(12)E5, 6.2(13.11)S0, 7.1(0)BF(0.123), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)OTT(0.6), 7.1(0)PDB(0.115), 7.1(0)VXE(0.2)
Bug Id:
CSCuv26132
Title:
Evaluation of n7k-infra for OpenSSL July 2015 vulnerability
Description:

b>

Symptom:
Cisco Nexus 6000 Series Switches;Cisco Nexus 7000 Series Switches; includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) ID:

CVE-2015-1793

This bug has been opened to address the potential impact on this product.

Conditions:


Exposure is not configuration dependent.

Workaround:


Not available.

Further Problem Description:



PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 4.3/3.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(1)S8
Known Fixed Releases:
Bug Id:
CSCuu53383
Title:
Multicast IP packet with Unicast dmac is punted to the control plane
Description:

Symptom:
High RX rate on the inband interface due to IP multicast packets.

Conditions:
IP multicast packet (224.0.0.0/4) with a unicast destination mac address of which the Nexus 7000 ingress L3 interface owns.

Workaround:
None.

Further Problem Description:
This traffic should be dropped in hardware by the parser as it violates packet format standards. This traffic should not be sent to the control plane for processing.

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a), 6.2(8b)
Known Fixed Releases:
Bug Id:
CSCuh20873
Title:
IPV6 default route URIB and UFIB inconsistency cause traffic drop
Description:

Symptom:
In the customer testing setup, there are eBGP ECMP for IPv6 default route, which works fine at stable mode, but upon any path fail, the URIB and UFIB shows inconsistent, and UFIB point to th epath which is already down which cause traffic blackholed.

Conditions:
NONE

Workaround:
"clear ipv6 route 0::0/0" will cause default route reprogrammed, and can clear the issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
5.0(3)U5(1f)
Known Fixed Releases:
5.0(3)U5(1f), 5.2(1)N1(6), 6.0(2)N2(1), 6.0(2)U1(1a), 6.0(2)U1(2), 6.2(1.137)S0, 6.2(2), 7.2(0)ZN(0.111)
Bug Id:
CSCuv16257
Title:
iscm crash at in raise () from /ramfs/
Description:

Symptom:
iscm crash at in raise () from /ramfs/

Conditions:
iscm crash at in raise () from /ramfs/

Workaround:
iscm crash at in raise () from /ramfs/

Further Problem Description:
iscm crash at in raise () from /ramfs/

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(14)FB(0.79)
Known Fixed Releases:
Bug Id:
CSCuu00672
Title:
vMotion across DCI fails due to RARP packet drop on BL
Description:

Symptom:
A Cisco Nexus 7000 Border Leaf switch does not forward incoming RARP frame toward DCI links if Enhanced Forwarding is configured on the VLAN. This may cause vMotion move failures for Virtual Machines (VMs) moving from one fabric to another across DCI.

Conditions:
This problem occurs if Enhanced Forwarding mode is configured on the Border Leaf VLAN.

Workaround(s):
Use Traditional Forwarding mode.

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCup16103
Title:
N7k: Copp fails to rate limit Pause frames from Hosts on 2248TP type FEX
Description:

Symptom:
Pause frames from Host reach the 7K CPU

Conditions:
Issue seen when host is connected to FEX N2248TP and host is sending a PAUSE storm
Affects both 6.2(6a)/6.2(8)

Workaround:
Offending host generating pause frames can be taken offline.

Further Problem Description:
Issue reported:
=========
Pause frames from FEX front panel (HIF) ports, end up at the SUP on N7K.

Observation:
=========
* On FEX type N2248TP, Pause frames are not handled correctly. Even with Rx flow-control enabled on the interface, pause frames are being forwarded upstream to the N7K instead of being consumed on the FEX.

* For all other FEX types including the latest N2248PQ, Pause frames are consumed at the FEX if Rx flow-control is enabled.


Potential Impact:
===========
* If volume of pause frames generated from the servers connecting to the FEX is EXTREMLY HIGH, then control path to the SUP can get congested
** Other control plane traffic destined to SUP can be dropped

Common case:
=========
* Pause frames volume is typically not so high in a real network to really congest SUP
* If there are malicious servers which are generating such high volume of traffic, those servers need to turned off.


Desired (Can be tracked as a separate enhancement requests):
============================================
1. Presently, Rx flow-control is not enabled by default for FEX HIFs. Behavior is documented.
*** Desired that Rx flow-control be enabled by default

2. Even if flow-control is not enabled, quench the pause frames at the MAC layer.
*** Must be tracked with FEX hardware/platform team (SAVTG)

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.2(6a), 6.2(8)
Known Fixed Releases:
7.1(2)N1(0.574), 7.1(2)ZN(0.35), 7.2(0)N1(0.172), 7.2(0)N1(1), 7.2(0)VZN(0.34), 7.2(0)ZN(0.174), 7.3(0)N1(0.25), 7.3(0)N1(1), 7.3(0)ZN(0.24)
Bug Id:
CSCus96878
Title:
Nexus7700 FEX interface link flap with FET-10G
Description:

Symptom:
Nexus7700 FEX interface may link flap with FET-10G

Conditions:
Nexus7706
N77-F348XP-23
Nexus2232TM
FET-10G
NXOS 6.2.10

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases:
Bug Id:
CSCub15899
Title:
constant high cpu in snmpd - upon polling invalid tunnel interfaces
Description:

Symptom:

Under rare conditions SNMPd process may cause high CPU utilization even without SNMP polling

Conditions:

This happens when SNMPd consumes maximum allowed amount of memory and no more memory cannot be allocated for received packet processing

Workaround:

Currently possible workarounds are being investigated.

TAC can help to restart snmpd process to clear the issue. Supervisor switchover should also clear the issue

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
4.2(8)
Known Fixed Releases:
5.2(6.16)S0, 5.2(7), 6.0(2)A1(1), 6.0(2)N1(1), 6.0(2)U1(1), 6.1(1)S46, 6.1(1.45)S0, 6.1(1.69), 6.2(0.217), 6.2(2)
Bug Id:
CSCut93469
Title:
SUP2,F2E ,arp response failing with SI set as GPC LTL
Description:

Symptom:
ARP responses for the HSRP VIP are dropped.

Conditions:
An ARP response from the active HSRP Anycast is dropped on the HSRP Anycast standby when enabling Dynamic ARP Inspection.

This problem only occurs when having the vdc configured for 'limit-resource module-type F2 F2E' and only hosting F2E linecards on the chassis.

Workaround:
Reconfigure the vdc for F2E only support and rebind the interfaces.

vdc xxx id 1
limit-resource module-type f2e

This ensures that the F2E linecard is using the physical source interface instead of using the HSRP anycast GPC as the source interface for incoming ARP responses.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-JUL-2015
Known Affected Releases:
6.2(10)E8
Known Fixed Releases:
6.2(10)E3, 7.2(0)D1(1)
Bug Id:
CSCus68473
Title:
urib crash after running "clear ip route vrf xxx *"
Description:

Symptom:
N7K running 6.2(8E10) crash on the urib process after clearing all routes in the VRF rib.

Conditions:
Clearing all routes in the RIB when there is high route count

Workaround:
Clear individual routes, instead of the entire table using *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
6.2(8)E10
Known Fixed Releases:
6.2(13.4)S0, 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)SIB(99.109), 7.1(2)N1(0.569), 7.1(2)ZD(0.21), 7.1(2)ZN(0.29), 7.2(0)AB(9), 7.2(0)D1(0.451), 7.2(0)D1(1)
Bug Id:
CSCtq62339
Title:
NX-OS 5.1 Kernel Memory Leak
Description:

Symptom:

Nexus7000 may report platform memory alert due to high memory utilization:

%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: MINOR. Usage 85% of Available Memory
%PLATFORM-2-MEMORY_ALERT: Memory Status Alert: SEVERE. Usage 90% of Available Memory


N7K# sh system internal memory-status
MemStatus: Severe Alert

N7K# sh system internal memory-alerts-log | inc "ALERT INFO|MemTotal|MemFree|LowTotal|LowFree"
MINOR ALERT INFO
MemTotal: 8254672 kB
MemFree: 4295324 kB
LowTotal: 727120 kB
LowFree: 109332 kB
SEVERE ALERT INFO
MemTotal: 8254672 kB
MemFree: 4255408 kB
LowTotal: 727120 kB
LowFree: 72392 kB


Conditions:

CSCtq62339 is only being encountered if the following conditions are true:

Switch is running a release between 5.1(1) to 5.1(3).


>>>>=====
On these releases, the bug will be exposed
irrespective any feature enabled/disabled.
There is no precondition for this.
<<<<<====

Memory alert log shows only a snapshot of kernel memory *when* the alert threshold (85,90,95%) is crossed. Historical information can be misleading and needs to be understood clearly.

To calculate the CURRENT kernel memory, use the following procedure:
N7K# show system internal kernel memory usage | in Low

Low memory condition is logged when the following formula is at/above the logging threshold:
(LowTotal - LowFree) ?? LowTotal x 100

Ex: (727120 - 72392 ) ?? 727120 x 100 = 90% (threshold reached due to utilization in low region)


Low memory condition has been seen after approximately 3 months of supervisor uptime.

Workaround(s):


Reload of the active supervisor will clear the issue in a setup with two supervisor cards.
Reload of the switch will clear the issue in a setup with a single supervisor.

Software upgrade to fixed release, 5.1(4) or 5.2(1) or later.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-JUL-2015
Known Affected Releases:
5.1(1), 5.1(2), 5.2(1)
Known Fixed Releases:
5.1(10.4)S0, 5.1(4)S3, 5.2(1)S36, 5.2(1.43)S0
Bug Id:
CSCte53614
Title:
Memory leak in MTS
Description:

Symptom:

A Nexus 7K or MDS running 4.2.x may run out of memory due to a memory leak in
the MTS module under specific conditions. A continuous memory leak can
eventually lead to the active Supervisor crash and a switchover will happen.
This defect does not affect the standby SUP (if the system does have one).

This leak can be confirmed by CLI command "show system internal kernel
malloc-stats".

On the last column of 'klm_mts' entry, the number will be very large (more than
100,000) and increase through time.

Example:
Nexus-7K# show system internal kernel malloc-stats
Module kmalloc kcalloc kfree diff
...
klm_mts 860524980 00000000 845560260 14964720
...

Condition:

When the following CLI commands are performed, a 32-byte memory block will be leaked:
show cdp global
show cdp interface <>
show cdp all
show cdp entry
show cdp traffic <>


Workaround:

1. The preferred workaround is to stop above mentioned SNMP walk,
query, and CLI commands.

2. A manual switchover of the sup can avoid ungraceful active
SUP failure due to this bug. The manual switch should be
preformed when the following condition is met:

The output of "show system internal kernel meminfo | inc LowFree"
is less than 200MB

3. Review upgrade options.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
4.2(2)
Known Fixed Releases:
4.2(1)N1(1), 4.2(4), 4.2(4.14), 4.2(5), 7.0(1)ZD(0.3), 7.2(0)ZN(0.111)
Bug Id:
CSCuo15015
Title:
urib process crash on N7k
Description:

Symptom:
A N7k running 6.2(2a) crashed on the urib process

Conditions:
This is a corner case. With frequent binding and unbinding of dynamic saps during lots of parallel CLI command processing, q handle management may cause the system subject to this bug.

Workaround:
None. But reducing the number of parallel CLI commands being processed by an application may reduce the chance of this bug.

Further Problem Description:
Impact: Process can crash and will be re-started by HA.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(2a), 7.1(0)D1(0.179)
Known Fixed Releases:
6.0(2)A6(0.78), 6.0(2)A6(1), 6.0(2)U6(0.78), 6.0(2)U6(1), 6.1(2)I3(2.19), 6.1(2)I3(3), 6.2(10), 6.2(10)CM(0.10), 6.2(10)CM(0.9), 6.2(8)KR(0.8)
Bug Id:
CSCuu33340
Title:
Param-list is not cleaned up when the vrf are gone
Description:

Symptom:
param-list entries still showing in "show run" even when all profiles have been un-applied

Conditions:
Auto-Configuration has been used to apply profiles and profiles have subsequently been un-applied (either manually or due to host aging).

Workaround:
User can remove param-list entries manually by doing "no param-list ..."

Further Problem Description:
The param-list entries do not cause a problem with subsequent profile applies.

Status:
Open
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
7.2(0)D1(0.484), 7.2(0)VZD(0.33)
Known Fixed Releases:
Bug Id:
CSCut30001
Title:
Camden NAT: SPM throws error on unconfig of nat from an intf
Description:

Symptom:
On N9K switch, deleting an NAT INSIDE/OUTSIDE policy makes SPM generat an error: PPF Library: Invalid argument. The error is caused by SPM deleting ststs of a filter node.
I think this bug will be hit on almost all N9K camden switches.

Conditions:
deleting an NAT INSIDE policy on a N9K switch

Workaround:
Do not delete that NAT policy

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
7.2(0.1)VB(0.1)
Known Fixed Releases:
7.0(3)I2(0.134), 7.0(3)I2(1)
Bug Id:
CSCup55118
Title:
ORIB buffer exhaustion on IGMP join/leave
Description:

Symptom:
ORIB buffer exhaustion when we receive continuous IGMP join/leave

show ip igmp snooping internal ribs
IGMP Snooping internal RIB information
RIB name: M2RIB (type 0), ready: Yes No , xid 0x1f6cd
Max. outstanding buffers: 4
Current outstanding buffers: 0
Max. OMF entries per buffer: 400
Max. OMF route entries per buffer: 50
Max. route entries per buffer: 400
Fabricpath redist instance: 1
Used buffer queue count: 0
Free buffer queue count: 10
Buffer: 0x0x98650ac, type: none, xid: 0x0, count: 0
Buffer: 0x0x9869f04, type: none, xid: 0x0, count: 0
Buffer: 0x0x986ed5c, type: none, xid: 0x0, count: 0
Buffer: 0x0x9873bb4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985174c, type: none, xid: 0x0, count: 0
Buffer: 0x0x984c8f4, type: none, xid: 0x0, count: 0
Buffer: 0x0x9847a9c, type: none, xid: 0x0, count: 0
Buffer: 0x0x98565a4, type: none, xid: 0x0, count: 0
Buffer: 0x0x985b3fc, type: none, xid: 0x0, count: 0
Buffer: 0x0x9860254, type: none, xid: 0x0, count: 0
TXLIST member version: 0
RIB name: ORIB (type 1), ready: Yes No , xid 0x10009
Used buffer queue count: 10
Buffer: 0x0x97ff7ac, type: route, xid: 0x10000, count: 1
Buffer: 0x0x9804604, type: route, xid: 0x10001, count: 1
Buffer: 0x0x980945c, type: route, xid: 0x10002, count: 1
Buffer: 0x0x980e2b4, type: route, xid: 0x10003, count: 1
Buffer: 0x0x981310c, type: route, xid: 0x10004, count: 1
Buffer: 0x0x97e6ff4, type: route, xid: 0x10005, count: 1
Buffer: 0x0x97ebe4c, type: route, xid: 0x10006, count: 1
Buffer: 0x0x97f0ca4, type: route, xid: 0x10007, count: 1
Buffer: 0x0x97f5afc, type: route, xid: 0x10008, count: 1
Buffer: 0x0x97fa954, type: route, xid: 0x10009, count: 1
Free buffer queue count: 0
TXLIST member version: 69545

Conditions:
this issue is seen in OTV environment

Workaround:
restart igmp process

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
5.2(1), 6.1(4), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.189), 7.1(0)FC(0.2), 7.1(0)GSD(99.0), 7.1(0)N1(0.240), 7.1(0)N1(1)
Bug Id:
CSCus15529
Title:
OTV trunk intf err-disabled due to "IFTMC PD commit db search failed"
Description:

Symptom:
Interface getting error disabled on changing native vlan

Conditions:
It happens in a OTV enabled VDC with a trunk port carrying OTV extended vlans.

Workaround:
shut/no shut of interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12)S6
Known Fixed Releases:
7.1(0)AV(0.38), 7.1(0)PDB(0.301), 7.2(0)D1(0.387), 7.2(0)D1(1), 7.2(0)OTT(0.5)
Bug Id:
CSCuv30648
Title:
STP cores while configure VPC setup at stathashe_get_another_entry
Description:

Symptom:
STP cores while configure VPC setup at stathashe_get_another_entry ,

STP core seen while configuring VPC setup ,

Conditions:
basic wccp configuration , No entry for SPM policy programming after wccp configuration on F2e LC

Workaround:
STP cores while configure VPC setup at stathashe_get_another_entry ,

STP core seen while configuring VPC setup ,

Further Problem Description:
STP cores while configure VPC setup at stathashe_get_another_entry ,

STP core seen while configuring VPC setup ,

Status:
Open
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(14)FB(0.78)
Known Fixed Releases:
Bug Id:
CSCus68892
Title:
N7K: assess GHOST vulnerability in glibc (CVE-2015-0235)
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Workaround:
Not available.

Further Problem Description:
A heap-based buffer overflow in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname* glibc function calls.

All previously released versionsand NX-OS software are affected. The fix will be delivered for currently supported releases as follows:

NX-OS 7.0 release - is scheduled to be available in May 2015
NX-OS 6.2 release - first fixed release is 6.2(12) which is available on CCO

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
4.2(8), 5.2(9), 6.1(5), 6.2(10)
Known Fixed Releases:
6.2(12), 6.2(12)S32, 6.2(12.3)S0, 6.2(12.4)S0, 6.2(13.1)S0, 7.2(0)D1(0.410), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.347)
Bug Id:
CSCut17447
Title:
SPAN dest port load balancing doesn't work with M2 as span src
Description:

Symptom:
If SPAN source is on M2 module in the RX direction, then load balancing on SPAN destination port-channel does not work.

Hostname(config-monitor)# sh port-channel traffic interface po X
NOTE: Clear the port-channel member counters to get accurate statistics

ChanId Port Rx-Ucst Tx-Ucst Rx-Mcst Tx-Mcst Rx-Bcst Tx-Bcst
------ --------- ------- ------- ------- ------- ------- -------
19 Eth8/18 100.00% 65.15% 40.00% 100.00% 0.0% 0.0%
19 Eth8/19 0.0% 34.84% 59.99% 0.0% 0.0% 0.0%
Hostname(config-monitor)#

Conditions:
SPAN source is on M2 module and SPAN direction in RX only
This problem is seen on 6.2 code when ISSU was performed from 6.1 code.

Workaround:
This problem is not seen when N7K was upgraded to code 6.2 code traditionally or N7K is reloaded after ISSU to 6.2

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuu38313
Title:
ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout")
Description:

Symptom:
ETHPORT-2-IF_SEQ_ERROR: Error ("sequence timeout") seen on syslog

Conditions:
On Scale Setup - with 384 fabric path bfd sessions & 1616 FP bfd sessions on L3 SVI. While adding/removing the FP members from Vlan

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases:
Bug Id:
CSCus78697
Title:
N7K wrong source-interface selected for IPv6 logging after device reload
Description:

Symptom:
logging source-interface seems to be non-working with v6 syslog server on N7K after device reload even the loggingsource-interface pointing to the loopback0 interface

Conditions:
After device reload

Workaround:
reapply logging source-interface loopback0

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.1(5), 6.2(10)
Known Fixed Releases:
6.2(13.4)S0, 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.443), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(1), 7.2(0)PDB(0.379), 7.2(0)VOF(0.2), 7.2(0)VZD(0.6)
Bug Id:
CSCug77418
Title:
SUP goes to failure state after starting traffic in vpc/vpls scale setup
Description:

Symptom:
supervisor on N7k platform may crash with the following reason in 'show module internal exceptionlog' command

System Errorcode : 0x410b003a Octopus internal error
Error Type : FATAL error
PhyPortLayer : Supervisor Inband

Conditions:
The issue happens because Sup Metro receives packets (FF) with ccc bit set to 0x2 (L3 Multicast Rewrite).

Workaround:

Further Problem Description:
To determine if we are hitting this bug, we need to match 2 conditions:

first, from the exception log we need to see
"System Errorcode : 0x410b003a Octopus internal error"
"PhyPortLayer : Supervisor Inband"

second, in the output of `show hardware internal statistics device rewrite all` the following two counter should be non-zero

98 Multicast L3 PR replication pkt cnt 0000000000000348 - I1
130 Invalid MET entry cnt 0000000000000348 - I1

if we match both condition above, we are hitting this bug

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.1(3), 6.2(1.33)S2, 6.2(1.93)S3
Known Fixed Releases:
6.2(1.103)S7, 6.2(1.106)S3, 6.2(1.110)S0, 6.2(2), 7.0(0)ZD(0.53), 7.0(0)ZD(0.55)
Bug Id:
CSCuu60496
Title:
NVT: mroute stuck in pending after sso
Description:

Symptom:
MRIB routes seem to be in pending state. "show ip mroute" will show routes with pending flag.

Conditions:
when a "pim restart" command is issued, in rare occasions, it is possible that PIM does not a proper mrib_deregister() and when it restarts, does mrib_register instead of mrib_reregister. This makes PIM a sort of invalid client of MRIB and MRIB does not send any updates to PIM and also postpones sending any update to hardware.

Workaround:
The workaround for this issue is "restart pim" command itself. This command will restart and MRIB should see PIM as a valid client. It is possible that under various scenarios, this workaround might have to be done multiple times.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuo81646
Title:
N77-F348XP-23 port 41-48 link remain up even cable disconnected
Description:

Symptom:
port 41-48 link remain up even cable disconnected or partner device is admin down

Conditions:
1G Optics or 1G copper are used on N77-F348XP-23 port 41-48

Workaround:
there is no work around
upgrade to fixed version

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(10)FM(0.27)
Known Fixed Releases:
6.2(10), 6.2(8)E5, 6.2(8.12)S0
Bug Id:
CSCur64055
Title:
ISIS cores when Lookup mode change with static MAC entry
Description:

This bug affects MACs redistributed into FP ISIS from M2RIB

Symptom:
When lookup mode is changed from IP to MAC

Conditions:
ISIS crashes and restarts

Workaround:
the default lookup mode is IP so if we use it and don't redistribute MAC routes we don't see the crash. Avoid the configuration of static MAC addresses, and the use of "layer-2 multicast lookup mac".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
6.2(10)S102
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.15), 6.2(8a)E3, 7.2(0)D1(1), 7.2(0)ZD(0.82)
Bug Id:
CSCuj45281
Title:
Crafted LLDP packet causes an interface to go error-disable
Description:

Symptom:
A vulnerability in the Link Layer Discovery Protocol (LLDP) code of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the switch port on which the packet is received to stop forwarding traffic.

The vulnerability is due to an error in processing a malformed LLDP packet. An attacker could exploit this vulnerability by sending a specially crafted, malformed LLDP packet to an interface enabled for LLDP packet processing. Other ports on the switch are not affected.

Conditions:
LLDP is enabled on the interface on which the malformed packet is received.

Workaround:
There are no workarounds

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/3.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.0(3)
Known Fixed Releases:
Bug Id:
CSCud01394
Title:
N7K - F1 / F2 line card: Mac addresses out of sync across FEs
Description:

Symptom:
Following a MAC Flap, the hardware MAC address table on a F1 or F2 modules will not have the same consistent entry across all the forwarding engines (FEs) when the vlan mode is CE and learning mode is non-conversational.

Conditions:
Issue is seen on F1 modules on 5.2(5).

Rapid mac move that happen between two FEs and there is a Flood to bd / flood to fabric miss in hardware

Workaround:
Clear the specific mac address
Fix is present from 5.2(9) onwards for F series cards.


Will this issue impact Nexus7009 running 6.1.3?
Yes. As Integrated-release says its fixed from 6.1.5 onwards for 6.1.x train and all future releases.

Is this issue F1 module specific??
No

Will N7K-F248XP-25E be impacted??
Yes. Fix is present from 6.1.5 onwards.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.2(4), 5.2(5)
Known Fixed Releases:
5.2(9), 5.2(9)S64, 5.2(9.113)S0, 5.2(9.114)S0, 6.1(4.3)S0, 6.1(5), 6.2(1.93), 6.2(2), 7.1(0)D1(0.14), 7.1(0)D1(0.15)
Bug Id:
CSCuv26663
Title:
Static mac missing from M card for L3 BD in HW
Description:

Symptom:
L3 interfaces can not resolve ARP. Packet may get flooded.
HW mac table on LC will not have static mac for L3 BD.

Conditions:
add , delete , add L3 subifs couple times in quick succession (either via script or copy paste on terminal)
Or
add/delete/add any fhrp

Workaround:
reload LC

Further Problem Description:
This is a timing issue and is not HW dependent issue.

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8b)
Known Fixed Releases:
Bug Id:
CSCub73193
Title:
BGP routes stuck in delete state blocked by ulib flow control
Description:

Symptom:
Under rare situation, BGP bestpath run may stall due to a bug
in the BGP-ULIB flow control logic. To confirm the problem, search
the 'show tech bgp' or 'show tech l3vpn' for:
Last xid sent to ULIB: 4294967295
Last xid received from ULIB: 65535
ULIB flow control blocks: 5 (currently blocked)

Conditions:
This can only happen to MPLS deployments where label allocation
is required (L3VPN, 6VPE, 6PE).

There is an integer wrap-around bug in the BGP-ULIB flow control
logic. If during the wrap-around period, ULIB is busy and slow to
respond, the BGP bestpath run will be blocked indefinitely.
This problem is very time sensitive and the window is very small.
It is not guaranteed to happen every time.

This is no specific trigger, as long as new labels are continuously allocated
from ULIB (new prefixes, label mode change, etc), it may hit the wrap-around
condition.

Workaround:
There's no workaround. To recover from the situation, perform 'restart bgp'.
A less disruptive recovery method is to use 'per-vrf' label mode by configuring
a dummy l3vpn vrf context. Example:

vrf context dummy
rd
router bgp <>
vrf dummy
address-family ipv4 unicast
label-allocation-mode per-vrf

This should unblock the BGP bestpath run. If not, try adding another dummy vrf (without removing the previous one). After BGP bestpath run had been unblocked, the dummy vrfs can be removed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.2(5), 5.2(5)S19
Known Fixed Releases:
5.2(7), 5.2(7)S3, 5.2(7.6)S0, 6.0(2)N2(1), 6.0(2)U1(1), 6.1(1.66)S0, 6.1(2), 6.1(2.27), 6.2(0.285), 6.2(2)
Bug Id:
CSCut36425
Title:
F3 in FP transit mode - All traffic drop due to ports in CE mode
Description:

Symptom:
All traffic is dropped on whole LC for various reasons - CBL drop, MIM on edge port etc - depending on interface configuration.

Conditions:
Issue can only on VDC/device in FabricPath in transit mode "fabricpath mode transit"
After removing the port-channel from the VPC configuration, the configuration is not wiped out in the LC.
Later when the Port-channel is used for any non-VPC configuration traffic is dropped.

Workaround:
Option 1 : Reload affected module
Option 2: Delete port-channel after making it non-VPC and then add the port-channel.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(13.16)S0, 6.2(13.3)S0, 6.2(14)FB(0.20), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.459), 7.2(0)D1(1), 7.2(0)PDB(0.382), 7.2(1)D1(0.27), 7.2(1)ZD(0.22)
Bug Id:
CSCud03634
Title:
RIP keep advertising route even though original route source is down
Description:

Symptom:
RIP keep advertising route even though the original advertising source is down.

Conditions:
The route is redistributed to RIP.
Original source (other Routing protocols or Connected link) is down.
or
RIP native route

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.0(2)N1(0.349)
Known Fixed Releases:
5.2(9.51)S0, 6.0(2)A1(1c), 6.0(2)N2(1), 6.0(2)U1(3), 6.1(4.1)S0, 6.1(5), 6.2(1.93), 6.2(2), 7.2(0)ZN(0.111)
Bug Id:
CSCul45644
Title:
vlan_mgr crashed if dynamic reserved vlan range conflicts with vtp vlan.
Description:

Symptom:
When reserved vlan range is within the VTP vlan range (vlan 2-1001) and
this vtp switch receives a vtp message from the network carrying a user vlan that has been locally configured as reserved, the new vlan creation message to vlan_mgr causes a crash.

Conditions:
This bug is hit with VTP enabled and reserved vlan range falls under VTP vlan range.

Example:
1. vdc1 and vdc2 have two trunks links between them.
2. vdc1 is vtp mode server, vdc2 is vtp client or server mode.
3. vdc2 has a reserved vlan range 100-227 configured.
ex: switch(config)>system vlan 100 reserve.
4. vdc1 creates vlan 100.
5. when vdc2 receives vtp add vlan message, vlan_mgr crashes.

Workaround:
Disable VTP or do not move the reserved vlan range into the VTP vlan range.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(5.52)
Known Fixed Releases:
6.2(6), 6.2(6)S2, 6.2(6.13)S0
Bug Id:
CSCuu73828
Title:
ipfib crash upon ISSU from 6.2.10 to GBR
Description:

Symptom:
IPFIB crash on ISSU.

Conditions:
sh ipv6 route 14:211:1::
14:211:1::/64, ubest/mbest: 2/0, attached
*via 14:211:1::1, Vlan964, [0/0], 15:38:20, direct,
*via 14:211:1::8, Vlan964, [0/0], 06:10:04, direct,

When there is a direct and attached route with an ECMP of PATHs, IPFIB process will crash during ISSU(recovery).

This is because we do NOT expect a Direct route with an ECMP of PATHs.

Also we can see that clearing the route does not add the ECMP again, in which case we should NOT see the crash.

n7k-fex1-f3# sh ipv6 route 14:211:1::

14:211:1::/64, ubest/mbest: 2/0, attached
*via 14:211:1::1, Vlan964, [0/0], 16:13:11, direct,
*via 14:211:1::8, Vlan964, [0/0], 06:44:55, direct,
n7k-fex1-f3# clear ipv6 route 14:211:1::/64
Clearing 14:211:1::/64
n7k-fex1-f3# sh ipv6 route 14:211:1::

14:211:1::/64, ubest/mbest: 1/0, attached
*via 14:211:1::1, Vlan964, [0/0], 00:00:07, direct,
n7k-fex1-f3#

Workaround:
if we notice any Direct route with an ECMP of paths we can clear the route, which will fix the # of paths. And then if we do the ISSU, we should NOT see IPFIB crash.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.27), 7.2(1)ZD(0.22)
Bug Id:
CSCup89391
Title:
SNMP process crash
Description:

Symptom:
SNMP crash causing device reload

Conditions:
N/A

Workaround:
- use SNMPv2 instead SNMPv3

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.2(8b), 6.2(8)
Known Fixed Releases:
Bug Id:
CSCud10012
Title:
Unexpected reload of nexus 7000 due to res_mgr hap reset
Description:

Symptoms
A nexus 7000 may unexpectedly reload due to a res_mgr hap reset.
The logs of the switch will show several cores for the res_mgr process prior to
the hap reset:
%SYSMGR-2-SERVICE_CRASHED: Service "res_mgr" (PID 4055) hasn't caught signal 11
(core will be saved).

Conditions
Steps to recreate

(1) Create a large VLAN range, for eg. 1000-2000
(2) Delete VLANs in between such as "no VLAN 1005" followed by "no VLAN 1010" and so forth.
If you show the list of VLANs in the format "1000-1004,1006-1009,............" there are 19 characters to show the string "1000-1004,1006-1009" alone (1 for 1, 1 for 0, 1 for 0, 1 for 0, 1 for -, 1 for 1, 1 for 0, 1 for 0, 1 for 0, 1 for 4, 1 for ,, 1 for 1 and so forth). If you have too many VLAN or VRF ranges such that the representation in a string in the fashion above takes more than 512 characters, the problem will happen.
(3) For the problem to happen, after (1) and (2), you have to issue "show vdc resources".

Workaround
None known at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.2(4)
Known Fixed Releases:
5.2(9), 5.2(9)S20, 5.2(9.38)S0, 6.1(3), 6.1(3)S21, 6.1(3.31)S0, 6.2(1.93), 6.2(2)
Bug Id:
CSCum05295
Title:
BGP multipath entry in uRIB does not get updated after attribute change
Description:

Symptom:
There are two symptoms that can be seen for this bug.

1. The following error message can be seen in syslog and IGP redistributing BGP routes may fail.

2013 Dec 13 01:21:58 PTAINTS410 %OSPF-3-RPM_LIB_API_FAILED: bgp_lookup_ext_attr() - failed in rpm_acquire_bgp_shmem_lock()

2. A route with a stale metric in the routing table exists

`DC1-CORE-3# sho ip bgp 10.10.63.0

BGP routing table information for VRF default, address family IPv4 Unicast
BGP routing table entry for 10.10.63.0/25, version 127677
Paths: (6 available, best #1)
Flags: (0x00001a) on xmit-list, is in urib, is best urib route
Multipath: eBGP iBGP


Path type: internal, path is valid, received and used, not best reason: Router Id, multipath
AS-Path: NONE, path sourced internal to AS
1.1.2.3 (metric 101) from 1.1.2.3 (1.1.2.3)
Origin IGP, MED 409, localpref 100, weight 0 <====== MED 409 should match routing table


DC1-CORE-3# sho ip route 10.10.63.0
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

10.10.63.0/25, ubest/mbest: 5/0
*via 1.1.2.2, [200/409], 00:10:12, bgp-65001, internal, tag 65001
*via 1.1.2.5, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.6, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.7, [200/409], 00:43:22, bgp-65001, internal, tag 65001
*via 1.1.2.8, [200/409], 00:43:22, bgp-65001, internal, tag 65001
via 1.1.2.3, [200/65940], 00:15:17, bgp-65001, internal, tag 65001 <<======= OLD MED 409 not updated

Conditions:
1. IGP (e.g., OSPF) redistributes BGP routes.
2. The redistribution uses route-map to evaluate community associated with the routes.
3. Maximum-paths command is configured.
4. BGP receives paths with only attribute (e.g., AS-PATH,MED) change.

Workaround:
A few possible workarounds:
1. Post-fault (impact low->high): clear ip route , clear ip bgp and restart BGP/IGP process.
2. Do not configure multi-paths (maximum-paths command).
3. Do not use redistribution route-map to match community/other BGP attributes.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.1(1)
Known Fixed Releases:
6.1(4.112)S0, 6.1(5), 6.2(0)HS(0.10), 6.2(7.7)S0, 6.2(8), 6.2(8)CM(0.2), 6.2(9)FM(0.37), 7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)ZD(1.18)
Bug Id:
CSCue95703
Title:
Syslog needed when OSPFv3's neigh interface ID changes due to L2 flood
Description:

Symptom:
OSPFv2 / OSPFv3 session in EXCHANGE state that causes unexpected flaps.

Conditions:
Configure OSPFv2 and OSPFv3 on multiple links going through a layer-2 switch.

Workaround:
None.

Status:
Other
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(1)
Known Fixed Releases:
Bug Id:
CSCuu45553
Title:
bfd crash seen with bfd_mts_flush_all_bfdc_msgs decodes
Description:

Symptom:
BFD core seen

Conditions:
During copy config to run config

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases:
Bug Id:
CSCuu71685
Title:
N7k-Fex: Ethpm timed out on port sec with sticky config during bringup
Description:

Symptom:
When member ports of port channels are configured with stick mac and during reload port security is trying to restore the stick mac of all ports causing delay in sending the response to ethpm resulting the ports and port channels to be in down state.

Conditions:

Workaround:
The work around is to un-configure the sticky mac as dynamic Mac learning is highly preferred than sticky. Removing the sticky mac configuration will resolve the sequence timing out issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuv42487
Title:
show tech-support fcoe needs to contain all pertinent FC information
Description:

Symptom:
Enhance show tech-support fcoe so that it includes all FC pertinent information. This should be similar to the MDS show tech-support details

Conditions:
Applicable to the Nexus 7000 switch in the FCoE storage VDC.

Workaround:
Use individual show tech-support commands. For example:

show tech-support zone
show tech-support fcns
show tech-support fcdomain
show tech-support port
etc...

Further Problem Description:
None.

Resolution Summary:
To be completed once resolved.

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuv43297
Title:
Breakout not working in M3
Description:

Symptom:
Logs attached

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
7.0(0)HSK(0.475)
Known Fixed Releases:
Bug Id:
CSCuv05083
Title:
Vlan learnt SGT mappings not downloaded to HW after module comes online
Description:

Symptom:
On a nexus 7000 series switches, IP to DGT mappings, may not be honored for vlan learnt SGT mappings following a supervisor switchover and a module reload.

Conditions:

Workaround:
clear ip arp x.x.x.x force

will allow the switch to correct the IP-SGT binding .

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCur07245
Title:
Nexus switch may see repeated crashes of ntpd process
Description:

Symptom:
NTP process may crash repeatedly on a Nexus switch.

Nexus7010# sh core
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 5 1 ntpd 19361 2015-01-31 05:18:22
1 5 1 ntpd 19348 2015-01-31 05:18:22
1 5 1 ntpd 19096 2015-01-31 05:18:22
1 5 1 ntpd 21817 2015-01-31 05:30:25
1 5 1 ntpd 21201 2015-01-31 05:31:20
1 5 1 ntpd 21196 2015-01-31 05:31:20
1 5 1 ntpd 21188 2015-01-31 05:31:20
1 5 1 ntpd 21208 2015-01-31 05:31:21

In some cases the cores may not be properly bundled and will pile up in the /var/sysmgr/tmp_logs directory. This may result in messages similar to the following:

2015 Mar 28 00:34:06.644 Switch %SYSMGR-3-VAR_SYSMGR_FULL: System Manager file storage usage is unexpectedly high at 100%. This may impact system functions.
2015 Mar 28 00:40:29.912 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30892 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.057 Switch %SYSMGR-2-CORE_SAVE_FAILED: zip_copy_file_to_logflash: PID 24109 with message Failed to copy 0x1201_ntpd_core.30914 to logflash. Error file
error (srcerr 0x0 dsterr 0x807b001c) .
2015 Mar 28 00:40:30.463 Switch %SYSMGR-3-CORE_OP_FAILED: Core operation failed: core_client_run_system_cmd: Command: /isan/bin/sysmgr_logmgr /var/sysmgr/tmp_logs 0 1>> /var/sysmgr/core_handling.log failed wi

Conditions:
This has been observed on Nexus 5000, 6000, and 7000 series switches.

It is more likely to occur if the device is being polled via IPv6 NTP requests. However, this also affects IPv4-only configurations.

It may also be more likely to occur if an unreachable NTP peer is configured.

Workaround:
If either of the above two conditions are present in the configuration (IPv6 NTP polling, or an unreachable NTP peer) then removing these may make the crash less likely to occur.

However, the only guaranteed workaround would be to disable the NTP feature completely (remove all NTP configuration from the affected switch).

Further Problem Description:
This problem occurs due to memory corruption in a receive buffer in memory which is used by NTP. NTP will crash repeatedly after the corruption occurs.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.25), 7.0(7)ZN(0.108), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(1)N1(0.495), 7.1(1)N1(1), 7.1(1)ZN(0.48), 7.2(0)AB(9)
Bug Id:
CSCtz13307
Title:
kgdb on udld process while peer-link shut no shut continuously
Description:

Symptom:
A Nexus 5500 switch running NX-OS 5.1(3)N1(1) might reload with kernel
panic.

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 543702 usecs after Wed Feb 1 03:27:24 2012
Reason: Kernel Panic
Service:
Version: 5.1(3)N1(1)

Conditions:
Observed on Nexus5K and Nexus7k as well.

Workaround(s):
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUL-2015
Known Affected Releases:
5.2(4)
Known Fixed Releases:
5.1(3)N2(1a), 5.2(4.83)S0, 6.0(4)S1, 6.1(0.280)S0, 7.2(0)ZN(0.111)
Bug Id:
CSCuo76751
Title:
Port asic in shared mode does not set Don't_fwd and Don't_learn bit
Description:

Symptom:
Symptom 1: Port-channel member interfaces go into an LACP suspended state b/c because they stop sending LACP PDUs.
Symptom 2: Ports may stop learning mac addresses and stop passing traffic
Symptom 3: Ports may stop learning mac addresses but still flood traffic

Conditions:
Symptom 1 & 2 can be seen when a span destination is configured on a port M132 port in shared mode. Other ports in the port-group will set the DL (Don't Learn) and DF (Don't Forward) bit set to ON.
N7K# slot 1 sho hard int mac port 26 state | egrep -i "dont"
dont_forward: ***On***, dont_learn: ***On***

Symptom 3 is seen when the peer-link is on a shared-mode M132 port. MAC learning is disabled on the peer-link by default. Configuring a peer-link member interface on a shared-mode M132 port will disable MAC learning on the other three ports in the port-group.
N7K# slot 1 sho hard int mac port 26 state | egrep -i "dont"
dont_forward: Off, dont_learn: ***On***

These conditions may be triggered by reloading a VDC or flapping an interface (the VDC reload results in a link flap, the link flap triggers the error condition), though it has been seen when no link flap could be confirmed. When the VDC reload is complete the links in the port channel remain in the suspended state since LACP PDUs are not forwarded.

Workaround:
Symptom 1 & 2:
To restore service:
Remove the SPAN and then shut/no shut ports in the port-group

To configure a SPAN destination on a port in shared-mode, enable ingress learning:
switchport monitor ingress learning

Symptom 3:
Do not put the Peer-link member interfaces on an M132 port in shared mode. This is against best-practice and is documented here:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/interfaces/configuration/guide/if_cli/if_vPC.html#pgfId-1803465

Further Problem Description:
Don't_fwd and Don't_learn bits are set only for SPAN configuration and VPC peer-links to disable mac learning.This is a day one issue in all codes prior to 6210. Only M132 and M132-XL line cards are affected by this bug.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(8), 6.2(8)S25
Known Fixed Releases:
6.2(10), 6.2(10)S35, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.169)
Bug Id:
CSCul33530
Title:
Apex10: FCOE license is getting installed after reload
Description:

Symptom:
Nexus 7000 shows F2 FCOE license installed even if it was not installed

Example

7710-1# sh lic usa
Feature Ins Lic Status Expiry Date Comments
Count
--------------------------------------------------------------------------------
MPLS_PKG No - Unused -
STORAGE-ENT No - Unused -
VDC_LICENSES Yes 4 In use Never -
FCOE-N7K-F248XP Yes 4 Unused Never 4 license(s) missing
ENHANCED_LAYER2_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused Never -
LAN_ENTERPRISE_SERVICES_PKG Yes - Unused Never -
--------------------------------------------------------------------------------
**** WARNING: License file(s) missing. ****
7710-1#

If you do "show file [license file name]" command you will see FCOE license was not installed.
It has been also seen that even if F2 line card in not installed in the system this error is seen.

Conditions:
TRANSPORT_SERVICES_PKG license installed in the system

Workaround:
"clear license sprom" command will clear the problem but it will re-appear after reload

Further Problem Description:
This happens because of an error in the license specfile. Because of overlapping bit positions FCOE is falsely turned on. The license spec file has been fixed. With these specfile after doing "clear license sprom" the problem should not happen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(5.45)S3
Known Fixed Releases:
6.2(10), 6.2(10)S77, 6.2(10.16)S0, 6.2(10.502)S0, 6.2(11)FM(0.26), 7.1(0)D1(0.278), 7.2(0)D1(1)
Bug Id:
CSCtt41698
Title:
NXOS subinf MTU inconsistency
Description:

Symptom:

When changing MTU on main interface, subinterface inherits this MTU as per the
"show interface ethernet x/y.z" command. Although, internally, MTU for subinterface
is still set to default.

Conditions:
Subinterface configuration.

Workaround:
Explicitly configure the non-default MTU on both main and subinterface.

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
5.2(1), 6.0(1)
Known Fixed Releases:
6.1(0.184)S10, 6.1(0.197)S0, 6.2(0.228)S0, 7.2(0)VZN(0.30)
Bug Id:
CSCut47891
Title:
NVT: Missing (S,G) between MSDP peers, when there are 4 spine with MSDP
Description:

Symptom:
(S,G) entries are not in between MSDP peers

Conditions:
Four Spine devices configured as MSDP peers

Workaround:
no workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
Bug Id:
CSCuv40883
Title:
F3 unexpected reload after span session config
Description:

Symptom:
After enable a span session for a Port-channel source in vPC with N77-F348XP-23 physical port in module 1 and destination port in module 6 (both modules N77-F348XP-23) a core crash is created for both modules. they are restored after reload crash reload.

Conditions:
I saw this problem by the very first time during a customer network troubleshooting.

I reproduced problem on CALO with the next conditions:
HW:
1 x N77-SUP2E
2 x N77-F348XP-23
1 x N77-C7706-FAB-2
1 x N77-C7709

2 VDCs were created , 1 for SPINE Fabric Path VDC 1 for LEAF Fabric Path VDC
Problem occurs on LEAF VDC just after we do 'no shut' under the monitor session config mode

problem was reproduced on 6.2(8a) and 6.2(10)

Workaround:

Further Problem Description:
Cores from 6.2(10)
http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437208662_0x102_fln_fwd_usd_log.1178.tar.gz

http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437208661_0x802_fln_fwd_usd_log.1178.tar.gz

Cores from 6.2(8a)
http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437203676_0x102_fln_fwd_usd_log.1160.tar.gz

http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437203675_0x802_fln_fwd_usd_log.1160.tar.gz


|
| Severity: error
| lcfln_n77 - Nexus 7700 platform running 6.2(10)S102 experienced a crash
| at 2015-07-18 08:37:42.
| The decoded stack traces are:
| 0x0ff4a4b0 usd_sse_process_msg
| 0x0ff4a4b0 usd_sse_process_msg ---> usd_sse.c:826
| 0x100673e8 fln_fwd_sse_hdlr ---> fln_fwd_services.c:9067
| 0x0ff5bf48 usd_handle_event ---> usdw_main.c:344
| 0x0ff5c4cc usd_loop ---> usdw_main.c:466

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
Bug Id:
CSCus72364
Title:
N7K BFD brings down additional BFD peers - bfd optimize subinterface
Description:

Symptom:
N7K BFD brings down additional BFD peers

When shutting one of the links, BFD session on another link also flaps. Both are sub-interfaces with "bfd optimize subinterface" feature enabled.

Conditions:
sub-interfaces with "bfd optimize subinterface" feature enabled.

Code- 6.2(8a) and will be seen on versions greater than 6.2.8 if config is saved in 6.2.8 and reloaded with upgraded images (like 6.2.10/12 etc)

Mod 9 - N7K-M224XP-23L
Mod 3 - N7K-F248XP-25E

Workaround:
After that unexpected flap - BFD re-establishes the session.
Work Around in 6.2.10 or later is to remove "bfd optimize sub-interface" config from interfaces and reapply them.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(13.11)S0
Bug Id:
CSCun93402
Title:
PIM process leaking memory
Description:

Symptom:
A Cisco Nexus switch may see a memory leak in the PIM process. The following command can be used to examine the memory being used by the PIM process:
show ip pim internal mem-stats detail

A sign of this leak is to see the PIM_MEM_RPF_SOURCE_IPC allocations growing without bound.

Conditions:
The current conditions to trigger the leak are unknown at this current time.

Workaround:
There is no workaround at this time. If the process in question consumes all of the allowed memory pim functions and commands may cease to work. If the process does not crash TAC can kill the process manually which will allow the process to restart and become operational.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)N3(0.111), 6.0(2)N3(1), 6.2(0)HS(0.10), 6.2(8), 6.2(8)S10, 6.2(8.5), 7.0(0)BNZ(0.23), 7.0(0)KM(0.64), 7.0(1)ZD(0.267), 7.0(1)ZN(0.581)
Bug Id:
CSCuu10841
Title:
NXOS RPM crash due to the CLI "show ip prefix-list | xml"
Description:

Symptom:
%SYSMGR-2-SERVICE_CRASHED: Service "rpm" (PID 4664) hasn't caught signal 11 (core will be saved).

Conditions:
In NXOS code 6.2.(12), running CLI "show ip prefix-list | xml" will cause RPM crash in case the prefix-list is not existing.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(12)E6, 6.2(13.3)S0, 6.2(14)FB(0.57)
Bug Id:
CSCuu72468
Title:
UDLD-4-UDLD_SFP_TYPE_CHANGED: User changed SFP type from fiber to copper
Description:

Symptom:
Switch may report below message when interface comes up although no changes are made:

%UDLD-4-UDLD_SFP_TYPE_CHANGED: User changed SFP type on Ethernet7/6 from fiber to copper, default udld port configuration was applied, 'copy running-config startup-config' recommended

Issue seen at least on CFP and CPAK transceivers, includes fix for 10Gbase-CX in X2 form-factor

Conditions:
Linkflap seems to trigger this message.

Workaround:
No known workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(10), 6.2(14)FB(0.78)
Known Fixed Releases:
6.2(13.4)S0, 7.2(1)D1(0.14), 7.2(1)ZD(0.10)
Bug Id:
CSCuo28456
Title:
N7K: ospf select wrong next-hop when redistribute route in NSSA area
Description:

Symptom:
External routes in OSPF are installed over a NSSA area (instead of backbone area).

Conditions:
In case, there is reachability of OSPF external prefixes in both NSSA area and the backbone area, OSPF will install routes over those prefixes over the NSSA area.

Example topology:

area 0
N7K-1-----------N7k-2--lo1
(ABR) (ABR/ASBR)
| |
| area 1 |
| nssa |
| |
4948-1----------4948-2

The problem only occurs if one of the links between the ABRs is in the backbone
area and another is in a NSSA area. Only releases 6.2.x/7.0.x are affected by this, and prior releases are unaffected.

Workaround:
There are the following workarounds for this bug:

(1) Configure a lower-cost, normal non-backbone area adjacency between the 2 ABRs.

(2) Configure the link between the 2 ABRs as P2P, and add a multi-area link.

For example, in the topology below, the link between the 2 N7K ABRs is P2P and both in area0, and multi-area 10 at the same time.

Multi-area 10
--------------------
| area 0 |
N7K-1-----------N7k-2--lo1
(ABR) (ABR/ASBR)
| |
| area 1 |
| nssa |
| |
4948-1----------4948-2

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(2a)
Known Fixed Releases:
6.1(2)I3(1.22), 6.1(2)I3(2), 6.2(10), 6.2(10)CM(0.28), 6.2(8)TS(0.28), 6.2(9.3)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.191), 7.1(0)FC(0.2)
Bug Id:
CSCuv44868
Title:
L2FMC is not in the card config of M3 VMM bind/unbind
Description:

Symptom:
VDC pointer not cleared after vdc reload from mtm db

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
7.0(0)HSK(0.475)
Known Fixed Releases:
Bug Id:
CSCur32209
Title:
LDP should not remove/free entries while walking the xos radix tree
Description:

Symptom:
LDP can encounter memory corruption or process crash.

Conditions:
Because of the nature of the bug, the problem can happen at any point, unexpectedly.

Workaround:
No workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
7.1(0)ZD(0.341)
Known Fixed Releases:
6.2(10)E5, 6.2(13.3)S0, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.119), 7.1(0)AV(0.38), 7.1(0)ES(0.7), 7.1(0)EV(0.125)
Bug Id:
CSCus42713
Title:
2014 and 2015 OpenSSL Vulnerabilities
Description:

Symptom:Cisco NX-OS (Covering Nexus 5K, N6K and N7K and Cisco MDS) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE)
IDs:

CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275,
CVE-2015-0204, CVE-2015-0205, CVE-2015-0206

This bug has been opened to address the potential impact on this product.

Conditions:This device has a vulnerable version of OpenSSL, this bug is being used to update the OpenSSL package used on the product.


Product doesn't support DTLS so is not affected by either:
CVE-2014-3571
CVE-2015-0206

The LDAP SSL authentication feature may be configured to use OpenSSL. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP SSL Authentication feature is enabled.

Workaround:1. Nexus 5000 (N5K) : The following features can use SSL and would need to
be disabled.

a) Avoid any "fabric database" configuration with keyword "enable-ssl".

For example:
fabric database type network
server protocol ldap ip 172.29.21.2 enable-ssl
b) Make sure the 'secure LDAP' option is unchecked when defining POAP
template on DCNM.
c) Do not use Cisco's One Platform Kit (OnePK) with the transport type tls
..." open.
d) Remove the VM Tracker Configuration.

2. Nexus 7000 (N7K) : The LDAP feature uses Open SSL. To disable the LDAP
SSL Authentication feature. LDAP can be disabled or used without SSL
Authentication.

More Info:PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.6

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from
multiple sources. This includes the CVSS score assigned by the third-party
vendor when available. The CVSS score assigned may not reflect the actual
impact on the Cisco Product.

Additional information on Ciscos security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
5.2(8f), 6.2(10), 6.2(11), 6.2(7), 6.2(8)S3, 6.2(8a), 7.2(0)VX(0.9), 7.2(0.1)PR(0.1), 7.3(0.9), 9.9(0)XS(0.1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.52), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Bug Id:
CSCus56648
Title:
EIGRP crash in ipigrp2_get_tmap_distance
Description:

Symptom:
EIGRP crash in ipigrp2_get_tmap_distance

Conditions:
Crash is seen with table map if redistributed route is learnt when the corresponding dndb is active

Workaround:
Unconfigure table-map

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUL-2015
Known Affected Releases:
7.1(0)IB(103)
Known Fixed Releases:
6.2(13.12)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.408), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)N1(1), 7.2(0)PDB(0.353)
Bug Id:
CSCuu16775
Title:
NVE config is missing after doing ISSU from 7.1(1)N(1a) to 7.2
Description:

Symptom:
VXLAN traffic will get dropped due to missing Network virtualization interface (interface nve) configuration.

Conditions:
Vxlan feature configured on Nexus OS version 7.1.x and upgrading from this version to Nexus OS version 7.2.

Workaround:
Copy the saved running-configuration to switch's running configuration using the command "copy running-config". This will restore the missing configuration related to nve interfaces. Since other parts of configuration already existed prior to the operation of copying save file to running-config, certain warnings will be displayed. These warnings can be ignored.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
7.2(0)ZN(99.191)
Known Fixed Releases:
7.2(1)N1(0.263), 7.2(1)N1(1), 7.2(1)ZN(0.27)
Bug Id:
CSCue02901
Title:
Logging server shows unreachable, syslog not delivered
Description:

Symptom:
show logging server output shows the following text for a logging server:

'This server is temporarily unreachable'

While ping to the same server IP / hostname is successful.

Conditions:

Workaround:
Run following commands:

DC1-4(config)# no logging server 172.28.92.10 7 use-vrf management facility local6
DC1-4(config)# logging server 172.28.92.10 7 facility local6
DC1-4(config)# logging source-interface loopback 0
Configuring logging source-interface will open UDP/syslog socket(514).
DC1-4(config)# logging server 172.28.92.10 7 use-vrf management facility local6
DC1-4(config)# no logging source-interface loopback 0
UDP/syslog socket(514) is being closed.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
5.2(7), 6.1(2)
Known Fixed Releases:
6.0(2)U2(2.29), 6.0(2)U2(3), 6.0(2)U3(0.617), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1), 6.2(5)BF(0.24), 6.2(5.42)S0, 6.2(6)
Bug Id:
CSCuo85450
Title:
Nexus 5K/6000 crash with arp hap reset
Description:

Symptom:
A Nexus 5K/6000 switch might reload with following hap reset:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 141764 usecs after Wed May 14 03:21:41 2014
Reason: Reset triggered due to HA policy of Reset
Service: arp hap reset
Version: 7.0(1)N1(1)

Conditions:
Gratuitious ARP storms are suspected as the trigger for this issue.

Workaround:
Identify source of ARP storm and stop it.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(2)
Known Fixed Releases:
6.0(2)A5(0.943), 6.0(2)A5(1), 6.0(2)U5(0.943), 6.0(2)U5(1), 6.2(10), 6.2(10)S40, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(1)ZD(0.248)
Bug Id:
CSCuq22831
Title:
Crash in snmpd process due to heartbeat failure after netstack hogs CPU
Description:

Symptom:
The snmpd process crashed multiple times triggering a HAP-Reset:

----- reset reason for Supervisor-module 5 (from Supervisor in slot 5) ---
1) At 885418 usecs after Fri Jul 25 08:21:03 2014
Reason: Reset triggered due to HA policy of Reset
Service: Service "snmpd" in vdc 2 hap reset
Version: 6.1(3)

Conditions:
This occurs while polling interface counter statistics via SNMP.

Workaround:
Slowing down the interval of SNMP polling should help reduce the odds of hitting the issue. Disabling SNMP altogether should prevent the issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
6.1(2)I3(2.39), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.1(5)E1, 6.2(10), 6.2(10)S48, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.248)
Bug Id:
CSCuj57803
Title:
dcos-telnetd process crash
Description:

Symptom:
A device running NXOS may see the dcos-telnetd process crash

Conditions:
This is seen running large commands, like show tech.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.0(2)N3(0.340), 6.0(2)N3(0.89), 6.0(2)N3(1), 6.2(5)BF(0.27), 6.2(5.42)S0, 6.2(6), 7.0(0)ZN(0.60), 7.0(1)N1(0.135), 7.0(1)N1(1), 7.0(1)ZN(0.193)
Bug Id:
CSCur77280
Title:
N6k m2rib missing interfaces from OIFL
Description:

Symptom:
Multicast/broadcast packet drops on certain vlans.

Conditions:
After flapping several links or recreating fabricpath vlans in specific order.

Workaround:
Remove and add back vlan, trying to start from the spines and then going to the leafs.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases:
7.0(1)ZN(0.736), 7.0(6)N1(0.236), 7.0(6)N1(0.4), 7.0(6)N1(1)
Bug Id:
CSCur08379
Title:
DOC: N7k Macsec is not supported on vPC/vPC+ in 5.x
Description:

Symptom:
Documentation for Macsec support is wrong. Configuration guide for 5.x doesn't mention this limitation.

Conditions:
Macsec on vPC/vPC+ on Nexus 7k in 5.x

Workaround:
Use non vPC/vPC+ setup

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.3(2)S4
Known Fixed Releases:
Bug Id:
CSCuu38580
Title:
7.2.0.506.S2 UI - congestion on F2 LC after vdc reload
Description:

Symptom:
Applicable to all F2 (Clipper/Clipper CR) based cards.
Congestion seen on ingress traffic on some/all of the ports. This is because, frames are stuck in the IB caused due to bad acos to ccos table.

To confirm if the issue is due to bad table, please compare the acos to ccos mapping in the below commands

show hardware internal qengine inst x vq acos_ccos_4cl/acos_ccos_8cl
compare it with the ccos mapping in
show hardware internal qengine inst x table fr_dcx4q_oq_ccos/fr_dcx8q_oq_ccos

if the acos to ccos mapping are different, then the Credit Loop logic will affected and frames will be stuck in the IB resulting in congestion on the ingress ports.

Conditions:
Do ISSU and then VDC reload (VDC containing ports from F2 LC).

This is because, the shadow memory in our Qengine driver was corrupted during ISSU and VDC reload causes a shadow refresh to the HW.

Workaround:
Workaround1(preferred as less traffic interrupt):
Copy the Applied network QoS Template:
1) find the applied tempalte
show policy-map system

Type network-qos policy-maps
============================
policy-map type network-qos default-nq-8e-policy template 8e
class type network-qos c-nq-8e
match cos 0-7
congestion-control tail-drop threshold burst-optimized
mtu 1500

2) Copy:
qos copy policy-map type network-qos default-nq-8e-policy prefix Copy_

3) Apply Ciopy to trigger reporgramming:
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos Copy_nq-8e

4) Optional: Reapply back the previous template
switch(config)# system qos
switch(config-sys-qos)# service-policy type network-qos default-nq-8e-policy

Note: Applicable for any networkqos template. During Template Change traffic on All VDC which contain F cards will be disrupted for less than a Second

Workaround2: reload the LC after ISSU or
Workaround3: reload the LC after VDC reload

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases:
6.2(13.4)S0, 7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.202), 7.2(1)PIB(0.14)
Bug Id:
CSCus71454
Title:
PVLAN VPC: peer-link flap causes primary legs in PVLAN host mode to flap
Description:

Symptom:
In a Private-Vlan VPC setup in private-vlan host mode, when peer link flaps, VPC leg in private-vlan host mode also flaps and comes back up in some time. There will be traffic loss from the VPC leg until the leg bringup happens again.

Conditions:
The VPC legs have to be private-vlan host mode as follows: "switchport mode private-vlan host"

Example configuration:
interface port-channel10
switchport
switchport mode private-vlan host
switchport private-vlan host-association 2 3
vpc 1

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(12)S29
Known Fixed Releases:
6.2(13.18)S0
Bug Id:
CSCuv46246
Title:
various vpc crashes in core after linecard having peer-link crashed
Description:

Symptom:
various vpc crashes in core after linecard having peer-link crashed/reload.

Conditions:
card having peerlink crashed.

Workaround:
N.A.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCut68515
Title:
SSTE: multiple port-profile cores with 7.2(0)D1(0.456) on autoconfig
Description:

$$IGNORE

Symptom:
port-profile crash & switch hap reset.

Conditions:
auto config

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.2(0)D1(0.456), 7.2(0)D1(0.490)
Known Fixed Releases:
7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)D1(0.499), 7.2(0)D1(0.506), 7.2(0)D1(0.509), 7.2(0)D1(1), 7.2(0)ZD(0.188), 7.2(1)PIB(0.14)
Bug Id:
CSCtz29341
Title:
N7k M1/F2 module ports stuck in init state and error disable
Description:

Symptom:
Nexus 7000 using M1 or F2 series linecards may experience ports stuck in initializing state following a switch reload. After some time the port may go error disabled due to a sequence timeout. The following errors will be reported for the affected interfaces:

%ETHPORT-5-IF_SEQ_ERROR: Error ("sequence timeout") communicating with for opcode (RID_PORT: Ethernet2/48)
%ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet2/48 is down (Error disabled. Reason:sequence timeout)

If the Peer Keep-alive is affected the Peer-link and VPCs will remain down.

Workaround:
A temporary workaround is reload the affected switch
--or--
Power off the impacted modules and fail over the supervisor. Once the failover is complete, power on the modules

A long term workaround to ensure the Peer Keep-Alive is not impacted is to move the Peer Keep-Alive over the management interface.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.0(2)
Known Fixed Releases:
5.2(4.79)S0, 6.1(0.277)S0
Bug Id:
CSCuq46564
Title:
SSTE:LDP core observed after process restart LDP with 7.1(0)D1(0.232)
Description:

Symptom:
LDP crashes due to heartbeat failure following a proc restart of LDP.

Conditions:
Happens when user does a proc restart of LDP.

Workaround:
No workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.1(0)D1(0.232)
Known Fixed Releases:
6.2(10)E5, 6.2(13.3)S0, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)OTT(0.45), 7.2(0)D1(0.417)
Bug Id:
CSCum18198
Title:
restrictions for wccp redirect access-list and such other limitations
Description:

Symptom:
restrictions for wccp redirect access-list and such other limitations

Conditions:
restrictions for wccp redirect access-list and such other limitations

Workaround:
restrictions for wccp redirect access-list and such other limitations

Further Problem Description:
restrictions for wccp redirect access-list and such other limitations

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(6)S9
Known Fixed Releases:
Bug Id:
CSCuu34174
Title:
UIN-1::After switch reload macs are not in sync between VPC peers
Description:

Symptom:
Duplicate traffic is noticed on downstream FEX connected to F2 cards (not F2CR or F3)

Conditions:
On switch reload, mac missing on one side of VPC and traffic hashes to the side missing.

Workaround:
clear mac address dynamic
OR clear mac address on the side present.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.2(0)D1(0.506)
Known Fixed Releases:
7.3(0)PDB(0.15)
Bug Id:
CSCuu08730
Title:
DAI: ARP Response dropped when the local vPC leg is down
Description:

Symptom:
A nexus 7000 series switch in a vpc/vpc+ environment configured for dynamic arp inspection may drop arp replies targetted to itself under certain conditions

Conditions:
- The local vpc leg is down causing the arp reply to be sent to the peer and tunneled to the switch that sent the arp request.
- The vpc is trusted for dynamic arp inspection

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(10), 7.2(0)N1(0.217)
Known Fixed Releases:
6.2(10)E3, 6.2(13.11)S0, 7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.0(0)KM(0.138), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)N1(1), 7.2(0)ZD(0.199), 7.2(0)ZN(0.218)
Bug Id:
CSCuv42308
Title:
MST Disputes VPC peer-switch secondary peer sending cost of 250
Description:

Symptom:
STP/MST disputes downstream from vPC domain with peer-switch

Conditions:
vpc peer-switch configured, this was noticed with MST, unaware if it also affects PVST

Workaround:
Remove "peer-switch" from secondary peer sending incorrect root cost value and re-add peer-switch

Further Problem Description:
If this is encountered, please gather the following from both N7K's and engage TAC:

# show tech detail
# show tech vpc
# show tech stp
# show tech l2fm detail

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCuq34116
Title:
N7K-F248XT-25E interfaces fail PortLoopback test and fail to initialize
Description:

Symptom:
Interfaces on an N7K-F248-XT-25E fail to initialize.

- Gaurdian is in stuck state.
- Shut / no shut of the interface does not help.
- Not easily reproducible.
- Once we reload the LC, issue goes away.
- So this is very rare and intermittent case.

Conditions:
N7K-F248-XT-25E running 6.2(x)

Workaround:
Reload the impacted line card

Further Problem Description:
The interface in question will fail the port loopback diagnostic test. However, if you were to check the exception log for the module you will see the following exception being raised for the interface:

n7k# sh module internal exceptionlog module 5
********* Exception info for module 5 ********

exception information --- exception instance 1 ----
Module Slot Number: 5
Device Id : 143
Device Name : Port-Client
Device Errorcode : 0xc8f0c269
Device ID : 143 (0x8f)
Device Instance : 12 (0x0c)
Dev Type (HW/SW) : 02 (0x02)
ErrNum (devInfo) : 105 (0x69)
System Errorcode : 0x42370069 GD link down
Error Type : Minor error
PhyPortLayer : Ethernet
Port(s) Affected : Ethernet5/13
Error Description : send_exp_info: Operational param config failed in port client linkup handler port: 12 error 0x42370069
DSAP : 0 (0x0)
UUID : 323 (0x143)
Time : Wed Jul 9 09:43:16 2014
(Ticks: 53BD5504 jiffies)

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(2), 6.2(6), 6.2(6a), 6.2(6b), 6.2(8a)
Known Fixed Releases:
6.2(12)E6, 6.2(13.3)S0, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.469), 7.2(0)D1(1), 7.2(0)PDB(0.394), 7.2(0)VZD(0.26)
Bug Id:
CSCup66750
Title:
BGP routes not advertised after "default address-family ipv4/6 unicast"
Description:

Symptom:
Nexus 7k running with version 6.1.5 and 6.2.8 stops advertising the routes to neighboring peer as soon "default address-family ipv4/6 unicast" is issued under the neighbor statement.

router bgp xxxx
csw06d.lla1(config-router)# neighbor 10.46.177.47
csw06d.lla1(config-router-neighbor)# default address-family ipv6 unicast
csw06d.lla1(config-router-neighbor)# default address-family ipv4 unicast

end

Conditions:
Happens only when "default address-family ipv6 unicast" is issued under the neighbor statement for BGP.

Workaround:
Clear ip bgp soft * resolves the issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.1(5)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.39), 7.0(3)I2(0.406), 7.0(3)I2(1), 7.2(1)D1(0.29), 7.2(1)N1(0.264), 7.2(1)N1(1), 7.2(1)ZD(0.24), 7.2(1)ZN(0.28), 8.3(0)CV(0.72)
Bug Id:
CSCuv42949
Title:
Nexus 7k Crashes due to "isis_otv-default" Process
Description:

Symptom:
Nexus 7k crashed due to the "isis_otv-default" process multiple times in quick succession. If redundant supervisor engines are installed, both may crash within a short timeframe of one another, leading to a full chassis reset if the switch briefly has no ready active supervisor.

Conditions:
None known. May be caused by OTV depolarization feature, but uncertain at this point.

Workaround:
None known.

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCup13175
Title:
SSTE: LDP core while doing SSO and LC reload
Description:

Symptom:
LDP process crashes during cleanup. This mostly happens during the clean-up stage, when user unconfigures LDP or interfaces used by LDP go down.

Conditions:
During cleanup, if two threads access/modify the same resource, LDP may crash.

Workaround:
There is no workaround for this fix.

Further Problem Description:
LDP uses cross-OS radix tree API which is not thread safe. Issue happens when one thread modifies the tree, while another is reading it, resulting in memory corruption and crash of LDP process.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(10)S82, 7.1(0)D1(0.151), 7.1(0)D1(0.188), 7.1(0)D1(0.196), 7.1(0)D1(0.228), 7.1(0)D1(0.240)
Known Fixed Releases:
6.2(10)E5, 6.2(13.3)S0, 6.2(14)FB(0.65), 6.2(8)E10, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.251), 7.1(0)D1(0.262), 7.1(0)N1(0.313), 7.1(0)N1(1)
Bug Id:
CSCuv42813
Title:
aclmgr crashes with unknown trigger
Description:

Symptom:On ISSU upgrading from 6.2.8a to 6.2.12 S33 image with ACL config, it was noticed that multiple acl_mgr process crash and eventual vdc_reload.
Conditions:This happens when some of ACL config internal data structure which get stored in PSS is not ISSU proof. Due to this later release ACL_MGR process reads it resulting in non-interpreting correctly and crashes.
Workaround:Either loading 6.2.12 S33 directly or do "write erase" of startup-config followed ASCII replay to restore config.
More Info:












Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Bug Id:
CSCup96876
Title:
N7K FIB Entry Miss-programmed into wrong SPL Bank
Description:

Symptom:
Traffic to a subset of hosts is punted to the CPU and either forwarded in software or dropped.

Conditions:
ISSU from 6.2(8) to 6.2(8a)
ISSU from older releases to 6.2(8) or 6.2(8a)
Problem specific to M1-XL or M2 (Does not apply to F2/F3)

Workaround:
Reload the affected linecard

Further Problem Description:
This occurs when the FIB entry is programmed in the wrong SPL bank. As a result, the longest prefix match is not hit and traffic is punted for an ARP glean.

For example, a host exists in a /24 subnet. Checking 'show ip route' to the host will show a /32 installed in the RIB. However, checking the longest prefix match in hardware will show the /24 route.

N7K-1# show system internal forwarding ipv4 route 172.22.31.173 module 7

Routes for table default/base
----+---------------------+----------+----------+------+-----------
Dev | Prefix | PfxIndex | AdjIndex | LIFB | LIF
----+---------------------+----------+----------+------+-----------
1 172.22.31.0/24 0x423e 0xa2cb 0 0x1ff8b <------hardware only finds the /24 entry

Note, the /32 entry is present in hardware but since it is programmed in the wrong bank it will always hit the /24 entry.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S55, 6.2(10)S56, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.258), 7.1(0)OTT(0.34), 7.1(0)PDB(0.196), 7.2(0)D1(1)
Bug Id:
CSCut18721
Title:
gbr_422: urib core at urib_chlist_segv_handler
Description:

Symptom:
urib crashes and since it is not restartable, the crash will result in reload of the switch in single SUP scenario or will result in SSO when dual SUP is present.

Conditions:
Inter VRF case where routes in one VRF are pointing to next hops in different VRF.

Workaround:
no workaround

Further Problem Description:
This issue mainly happens when routes are being flapped in large scale by BGP due to multiple restart or some other reasons or repeated execution of "clear ip route *".

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.444)
Known Fixed Releases:
6.2(10)E8, 6.2(12)E1, 6.2(13.3)S0, 6.2(14)FB(0.28), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)SIB(99.109), 7.1(2)N1(0.571), 7.1(2)ZD(0.22), 7.1(2)ZN(0.30)
Bug Id:
CSCur32142
Title:
mcast traffic blackhole for upto 4min as assert cancel not sent by winne
Description:

Symptom:
Multicast traffic blackhole for up to 4 minutes

Conditions:
If more than one router forwards traffic onto a LAN - in initial bootup phase or when 'ip multicast multipath' command is configured - PIM assert election happens and one router becomes the winner. This could be the non-PIM-DR having a PIM receiver. There may also be local IGMP receivers on this LAN.
Now, if the winner receives a PIM Prune message and no other PIM receivers exist on that LAN, the winner should send an assert cancel message, to conclude the election and let the PIM-DR on the LAN forward for local receivers.

Under certain circumstances, the winner does not always send out the assert cancel thereby causing traffic blackhole until the loser router ages out the winner's assert message. This could take up to 4 minutes.

Workaround:
clear ip mroute

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
6.2(10), 6.2(10)S102, 7.1(0)D1(0.324)
Known Fixed Releases:
6.2(13.5)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(0)KM(0.110), 7.1(0)AV(0.38), 7.1(0)D1(0.325), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68), 7.2(0)D1(1)
Bug Id:
CSCup52842
Title:
bgp flapping with fd read error
Description:

Symptom:
014 Jun 20 18:32:24.386535 bgp: 64896 [9115] (default) EVT: 172.23.96.107 peer connection retry timer expired
2014 Jun 20 18:32:24.386607 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Triggered active open for peer
2014 Jun 20 18:32:24.387329 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Active (Active setup)
2014 Jun 20 18:32:24.388533 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Schedule wait for connect
2014 Jun 20 18:32:24.388563 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.850982 bgp: 64896 [9115] (default) EVT: 172.23.96.107 connect to peer is successful
2014 Jun 20 18:32:24.851013 bgp: 64896 [9115] (default) EVT: 172.23.96.107 sending OPEN message to peer
2014 Jun 20 18:32:24.851060 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Active to OpenSent (Active setup)
2014 Jun 20 18:32:24.851101 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.851498 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Process OPEN message from peer
2014 Jun 20 18:32:24.851573 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenSent to OpenConfirm (Active setup)
2014 Jun 20 18:32:24.851617 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Wait (30 sec) for session setup response
2014 Jun 20 18:32:24.852853 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from OpenConfirm to Established (Active setup)
2014 Jun 20 18:32:24.852898 bgp: 64896 [9115] (default) EVT: 172.23.96.107 cleaning up active peer setup, thread id 0x0
2014 Jun 20 18:32:24.852991 bgp: 64896 [9115] (default) EVT: 172.23.96.107 went from Idle to Established
2014 Jun 20 18:32:24.853018 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Scheduling peer 172.23.96.107 for soft refresh out
2014 Jun 20 18:32:25.867395 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 [peer index 245]
2014 Jun 20 18:32:25.879017 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Adding peer 172.23.96.107 for update gen
2014 Jun 20 18:32:25.879032 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Insert marker dest 0xe1525d64 into xmitlist for 172.23.96.107 with 0 routes on new list and 10475 routes on Tx list
2014 Jun 20 18:32:26.652 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Mark AF update completion for peer 172.23.96.107 (sent prefixes: 4670)
2014 Jun 20 18:32:27.054140 bgp: 64896 [9115] (default) EVT: Read error from peer 172.23.96.107: Broken pipe
2014 Jun 20 18:32:27.054221 bgp: 64896 [9115] (default) EVT: Reset by us (fd read error) in session to 172.23.96.107, value 187, state was Established
2014 Jun 20 18:32:27.054242 bgp: 64896 [9115] (default) EVT: 172.23.96.107 Stopping keepalive, hold timers, peer state Established
2014 Jun 20 18:32:27.054261 bgp: 64896 [9115] (default) EVT: peer:172.23.96.107, state: Established, peer GR STATE: none, AF GR state: none, saved flags: 0
2014 Jun 20 18:32:27.054275 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] 172.23.96.107 Close AF session, gr state none saved flags 0
2014 Jun 20 18:32:27.054290 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requesting cleanup thread to delete/stale routes for peer 172.23.96.107, with index 245
2014 Jun 20 18:32:27.054303 bgp: 64896 [9115] (default) EVT: [IPv4 Unicast] Requ

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
6.2(8)S33, 6.2(9), 7.1(0)D1(0.169)
Known Fixed Releases:
6.1(2)I3(2.42), 6.1(2)I3(3), 6.1(2)I3(3.16), 6.1(2)I3(4), 6.2(10), 6.2(10)S18, 6.2(8)E9, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I1(0.248)
Bug Id:
CSCur00089
Title:
vdc-admin on N7K can break out of vsh-"chroot" using symbolic links
Description:

Symptom:
Cisco Nexus devices running Cisco NX-OS software contain a symbolic link vulnerability that could allow a local, authenticated attacker to break out of the chroot environment that their Virtual Device Context (VDC)
has been assigned. This could result in the attacker gaining the ability to write files to locations that should be restricted to the context to which they belong. This could also have an extended impact of allowing the
attacker to read data that should be restricted.

Conditions:
Cisco Nexus devices running an affected version of Cisco NX-OS Software

Workaround:
None.

Further Problem Description:
Credit:
Cisco would like to thank Jens Krabbenhoeft for reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.2/2.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
6.2(13.3)S0, 6.2(13.4)S0, 6.2(14)FB(0.74), 7.2(1)D1(0.30), 7.2(1)ZD(0.25), 7.3(0)IB(0.17)
Bug Id:
CSCuu82356
Title:
Evaluation of n7k-infra for OpenSSL June 2015
Description:

Symptom:
This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:


CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1792


This bug has been opened to address the potential impact on this product.

Conditions:
NXOS uses OpenSSL 0.9.8 release and is vulnerable.

Workaround:
Nexus 7000 (N7K) : The LDAP feature uses Open SSL. To disable the LDAP
SSL Authentication feature. LDAP can be disabled or used without SSL
Authentication.

Further Problem Description:



PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.8/6.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Please check IMPACT_ASSESSMENT attachment for more details.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUL-2015
Known Affected Releases:
7.3(0)ZD(0.9)
Known Fixed Releases:
6.2(13.6)S0, 7.2(1)D1(0.17), 7.2(1)D1(0.22), 7.2(1)D1(0.23), 7.2(1)N1(0.248), 7.2(1)N1(0.255), 7.2(1)N1(1), 7.2(1)ZD(0.13), 7.2(1)ZD(0.17), 7.2(1)ZD(0.18)
Bug Id:
CSCuv29391
Title:
SNMPD crash on n5k
Description:

Symptom:
SNMPD crashes on N5K switches.

Conditions:
With..
Hardware: N5K-C5548UP-B-S32
Software: 7.1(0)N1(1b)

Workaround:
na

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
7.2(1)D1(0.28), 7.2(1)N1(0.263), 7.2(1)N1(1), 7.2(1)ZD(0.23), 7.2(1)ZN(0.27)
Bug Id:
CSCus76724
Title:
NVT-DC1:PVLAN traffic block-hole upon Primary VLAN remove/add
Description:

Symptom:
On M1XL linecards, when some vlan config causes a private-vlan association to be non-operational , private-vlan trunk secondary port sees traffic loss. Similarly, when the trunk association is unconfigured and re-configured on private-vlan trunk-secondary port, the issue might be observed.

Conditions:
This issue is seen on M1XL linecards. Will not be seen with M1 and F-series line cards

Example config and trigger:
Config:
switch(config-if)# show running-config interface e3/3

!Command: show running-config interface Ethernet3/3
!Time: Wed Feb 4 00:38:51 2015

version 6.2(12)

interface Ethernet3/3
switchport
switchport mode private-vlan trunk secondary
switchport private-vlan association trunk 2 3
no shutdown


The issue will be seen after any of the following triggers

1. Delete and recreate of primary vlan
switch(config-if)# no vlan 2
switch(config)# vlan 2
switch(config-vlan)# private-vlan primary
switch(config-vlan)# private-vlan association 3
switch(config-vlan)# ex

2. Delete and recreate secondary vlan
switch(config-if)# no vlan 3
switch(config)# vlan 3
switch(config-vlan)# private-vlan isolated
switch(config-vlan)# ex

3. Delete and re-add trunk association on the port
switch(config)# int e3/3
switch(config-if)# no switchport private-vlan association trunk 2 3
switch(config-if)# switchport private-vlan association trunk 2 3

Workaround:
Workaround is to do a shut no-shut on the port or PC or VPC leg where the issue is observed

switch(config)# int e3/3
switch(config-if)# shutdown
switch(config-if)# no shutdown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.2(12)S32
Known Fixed Releases:
6.2(13.11)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.395), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.364), 7.2(0)VOF(0.2)
Bug Id:
CSCuc23279
Title:
SYSTEST:FCoE:core detected due to hwclock crash on standby sup
Description:

Symptom:
Core detected due to hwclock crash on standby sup.

Conditions:
None

Workaround(s):

No impact reported.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.1(2), 6.1(2)S11, 6.1(2)S41, 6.1(4a)S14, 6.2(1.42), 6.2(1.59)S2, 6.2(1.59)S5, 6.2(1.69), 6.2(1.69)S5, 6.2(1.83)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5.9)S0, 6.2(0.304), 6.2(1.72)S0, 6.2(1.84)S0, 6.2(2), 7.0(0.7), 7.1(0)D1(0.14)
Bug Id:
CSCuv37216
Title:
Callhome messages via HTTP transport is not sent due to L3VM error
Description:

Symptom:
Callhome messages vis HTTP transport not sent due to l3vm_get_context_id failing.

Conditions:
Try sending any call home message thru http transport.

Workaround(s):
None.

Workaround:
None.

Further Problem Description:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
7.3(0)SLN(0.28)
Known Fixed Releases:
Bug Id:
CSCtw72949
Title:
Slow drain of udp sock mts buffers for some bulk requests in bridge-mib
Description:

Symptom:
On nexus 7000 series switch, polling at a sustained rate certain objects from
bridge-mib may cause a relatively high cpu for snmpd for some time after polling and new requests to time out.

On pre 5.2 NX-OS versions, this polling may cause internal messages for inter
process communications to be queued and affect other services.

This problem is also observed on Nexus 5xxx switch running 5.2 release. The fix
for this issue is in 5.2(1)N1(4) release of the 5k and 6.0(2)N1(2a) and later releases.

Conditions:
A large amount of SNMP access to the device against BRIDGE-MIB

Workaround:
Reduce the amount of SNMP traffic to a acceptable level.

If using Orion or Solarwinds Network Management Server uncheck option
Topology: L2.

Further Problem Description:
Problem exists in 5.2(1-3), 6.0(x) and earlier releases on Nexus 7000 switch.
Fixes had been integrated in 5.2(4), 6.1(1), 6.2(2) and later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
5.1(4), 5.2(1), 6.2(0.1)
Known Fixed Releases:
5.2(1)N1(4), 5.2(4)S3, 5.2(4.10)S0, 5.2(4.4)S0, 6.0(2)N1(2a), 6.0(2)N2(1), 6.0(2)U3(0.599), 6.0(2)U3(1), 6.1(0.205)S0, 6.1(0.209)S0
Bug Id:
CSCuo73479
Title:
F348XP:1Gig interface remain up with copper SFP and cable pulled out
Description:

Symptom:
Interface is remaining in "up/up" state when there is an SFP inserted into an F348XP line card running 6.2(8), even when the opposite end is admin down or the cable is removed from the SFP.
This was duplicated using an Avago??, GLC-T, and GE-T SFP.
Support for gig transceiver was introduced in 6.2.8

Conditions:
Issue seen for 1gig SFP on N77-F348XP-23 module.
Seen on 6.2.8
Issue seen when speed on interface is hardcoded to 1gig.

Workaround:
Admin down local interface.

configure speed auto on the interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.13), 6.2(8)E5, 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.12)S0, 6.2(9)FM(0.75)
Bug Id:
CSCuu89065
Title:
Activating L2 netflow causes mac flap on F2
Description:

Symptom:
Activating L2 netflow causes mac flap on F2

Conditions:
Activating L2 netflow on F2 card

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuv50202
Title:
PBR does not redirect traffic that comes from SNF configured interface
Description:

Symptom:
PBR next-hop does not effect if traffic comes from L2 netflow configured interface.

Conditions:
Traffic must comes from L2 netflow configured interface.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
Bug Id:
CSCut17599
Title:
N7K-F248XT-25E: Periodic PortLoopback Failures for Unknown Reason
Description:

Symptom:
PortLoopback test failure with failure reason 'Loopback test failed. Unable to analyze the reason for failure'

Conditions:
- Unused port
- N7K-F248XT-25E

Workaround:
1. If diagnostic test is error-disabled (DIAG TEST ERR DISABLE) due to this reason, you can reset the diagnostic by doing the following:

# diagnostic clear result module all
(config)# no diagnostic monitor module test 6
(config)# diagnostic monitor module test 6
# diagnostic start module test 6

2. If the Port loopback test is failing (DIAG TEST FAIL) even after resetting the condition, then see if you are hitting CSCuq34116. If yes, please the attachment - Workaround

3. If the fix of CSCuq34116 in step 2 is not helping recover, it is most likely a hw issue.

4. Reloading the module might recover the ports (Secure a maintenance window and reload the module)



Further Problem Description:
If this is not a CSCuq34116, then its very likely a hw issue. Recommend an RMA.

Status:
Terminated
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(5), 6.2(10)
Known Fixed Releases:
Bug Id:
CSCut99084
Title:
Expecting egress queue mismatched on F2E card of Crossbow(6.2.10)
Description:

Symptom:
When sending traffic with COS3 ( port trust COS , and no DSCP rewrite) or sending traffic with ip precedence 3
( have DSCP rewrite) , then issue show policy-map interface "F2E port" command.
Checking egress queue match , streams hit incorrect queue "8e-4q8q-out-q2". The correct queue for COS3 should be "8e-4q8q-out-q5".
Hardware and OS version: Crossbow N77XX (6.2.10) , F2E linecard.

Conditions:
When apply the following service-policy on F2E card of N77XX , and send traffic with COS 3 and IP precedence 3.

Class-map:
class-map type queuing match-any 8e-4q8q-in-q1

match cos 5-7
match dscp 40-63
class-map type queuing match-any 8e-4q8q-in-q-default

match cos 0-1
match dscp 0-8
class-map type queuing match-any 8e-4q8q-in-q3

match cos 3-4
match dscp 24-39
class-map type queuing match-any 8e-4q8q-in-q4

match cos 2
match dscp 9-23

class-map type queuing match-any 8e-4q8q-out-q1

match cos 5
class-map type queuing match-any 8e-4q8q-out-q2

match cos 7
class-map type queuing match-any 8e-4q8q-out-q3

match cos 6
class-map type queuing match-any 8e-4q8q-out-q4

match cos 4
class-map type queuing match-any 8e-4q8q-out-q5

match cos 3
class-map type queuing match-any 8e-4q8q-out-q6

match cos 2
class-map type queuing match-any 8e-4q8q-out-q7

match cos 1
class-map type queuing match-any 8e-4q8q-out-q-default

match cos 0

Policy-map:
policy-map type queuing NAC_TEST_IN8e-4q8q-in

class type queuing 8e-4q8q-in-q1
queue-limit percent 10
bandwidth percent 80
class type queuing 8e-4q8q-in-q-default
queue-limit percent 40
bandwidth remaining percent 35
class type queuing 8e-4q8q-in-q3
queue-limit percent 30
bandwidth remaining percent 45
class type queuing 8e-4q8q-in-q4
queue-limit percent 20
bandwidth remaining percent 20

policy-map type queuing NAC_Eg8e-4q8q-out
class type queuing 8e-4q8q-out-q1
priority level 1
shape average percent 50
class type queuing 8e-4q8q-out-q2
bandwidth remaining percent 1
class type queuing 8e-4q8q-out-q3
bandwidth remaining percent 25
class type queuing 8e-4q8q-out-q4
bandwidth remaining percent 15
class type queuing 8e-4q8q-out-q5
bandwidth remaining percent 10
class type queuing 8e-4q8q-out-q6
bandwidth remaining percent 10
class type queuing 8e-4q8q-out-q7
bandwidth remaining percent 4
class type queuing 8e-4q8q-out-q-default
bandwidth remaining percent 35

Workaround:
no workarounds

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCuu24710
Title:
ISSU failed 6.2(10) to 6.2(12) on a non-existing FEX
Description:

Symptom:
ISSU from 6.2(10) to 6.2(12) failed on a no longer existing FEX 110.

This physical device - N2K [fex 110] - was reused in another vdc and had a new fex number there.

Module 10:
Upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
-- SUCCESS


FEX image downloading in progress.
-- SUCCESS


Non-disruptive upgrading.


Module 161 upgrade completed successfully.


Non-disruptive upgrading.
-- SUCCESS


Non-disruptive upgrading.


Module 110 upgrade failed. >>>>>>>>>>>>>>>module 110 is not existing.


Non-disruptive upgrading.
-- FAIL.

Conditions:
Fex was present in one vdc and then later was moved to another VDC with a different fex number.

Workaround:
TBD

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.2(12), 7.2(0)D1(0.490)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.50), 7.1(0)AV(0.81), 7.2(0)D1(0.504), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184), 7.2(1)PIB(0.14), 7.3(0)IB(0.19), 7.3(0)RTG(0.17)
Bug Id:
CSCtz10762
Title:
Core-client on fex module does not send MTS to default vdc
Description:

Symptom:
Nexus 2000 may fail to copy the core file to the Nexus 7000 during a crash but continues to try over and over.

N7k-2 SYSMGR-FEX101-3-CORE_OP_FAILED Core operation failed: send_msg_to_ccdmon: Could not send to CORE_DMON return -1 errno 32
N7k-2 SYSMGR-FEX101-5-SUBPROC_TERMINATED "System Manager (core-client)" (PID 1903) has finished with error code SYSMGR_EXITCODE_CORE_CLIENT_ERR (11).

Conditions:
When the Nexus 2000 connected to a non default vdc crashes.

Workaround:
Contact TAC to manually copy the core files.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(0.249)S7, 6.2(1.121)S0, 6.2(1.83)S7, 6.2(7.23)S0, 7.1(0)D1(0.308), 7.1(0)D1(0.64)
Known Fixed Releases:
Bug Id:
CSCut50838
Title:
M2 VLAN Translation Not Translating Non-Native VLAN BPDUs
Description:

Symptom:
Ingress non local VLAN BPDUs are dropped as "igr ifc: total pkts dropped due to cbl? and egress BPDUs are not tagged with translated VLAN causing both devices to see them self as spanning-tree root for translated VLAN

Conditions:
When VLAN translation is configured on N7K-M224XP-23L

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.65)
Bug Id:
CSCur57243
Title:
F3: OTV not Encapsulating Unicast Traffic with ARP ND Cache Disabled
Description:

Symptom:
Unicast traffic over OTV is black-holed

Conditions:
- F3 OTV
- 'no otv suppress-arp-nd' configured

Workaround:
Enable the 'otv suppress-arp-nd' feature

Further Problem Description:
Issue is seen after one of the following:

- Switch reload
- VDC reload
- System switchover
- Adding an extended vlan
- Issuing 'clear ip route' in the OTV VDC
- shut/not shut on overlay interface in OTV VDC

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
28-JUL-2015
Known Affected Releases:
6.2(10), 6.2(8a)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.14), 7.1(0)AV(0.38), 7.1(0)D1(0.343), 7.1(0)OTT(0.47), 7.1(0)PDB(0.282), 7.2(0)D1(1)
Bug Id:
CSCuu86315
Title:
iscm cores for scale configs service flap
Description:

Symptom:
iscm cores for scale configs service flap

Conditions:
iscm cores for scale configs service flap

Workaround:
iscm cores for scale configs service flap

Further Problem Description:
iscm cores for scale configs service flap

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.2(14)FB(0.79), 7.2(0)D1(1), 7.2(0)D1(1.20)
Known Fixed Releases:
Bug Id:
CSCuv50831
Title:
Route Redistributed for Routes with Administrative Distance of 255.
Description:

Symptom:
Routes with an AD of 255 are permitted for redistribution.

Conditions:
When using the [distance # # #] command for BGP to set summarized/local routes to an administrative distance of 255. The summary routes remain in the routing table, but marked with an AD of 255 from its default of 220 and also permitted to be redistributed into other protocols.


10.10.0.0/16, ubest/mbest: 1/0
*via Null0, [255/0], 00:00:11, bgp-65545, discard, tag 65012 ---------------->Route remained in routing table but AD did adjust to 255.
r12.7k-VDC3(config-router-af)#


####################################################################Redistributing BGP into OSPF############################
##Route shouldn't be redistributed as it is within the RIB with an AD of 255.
version 6.2(12)

feature ospf

router ospf 1
router-id 172.16.0.1
redistribute bgp 65545 route-map test ----------------------->Sending route to OSPF

ip prefix-list bgp seq 5 permit 0.0.0.0/0 le 32
route-map test permit 10
match ip address prefix-list bgp


r12.7k(config)# sho ip ospf database | b Ex
Type-5 AS External Link States

Link ID ADV Router Age Seq# Checksum Tag
0.0.0.0 172.16.0.1 14 0x80000002 0xea3c 65005
10.10.0.0 172.16.0.1 14 0x80000002 0x50cd 65012 ---------->Summary is installed within OSPF database and advertised to OSPF peers. Which shouldn't happen as AD is 255

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
5.1(4), 6.2(12)
Known Fixed Releases:
Bug Id:
CSCue79881
Title:
SNMP crashes on SNMP bulk get query
Description:

Symptom:
The SNMP process may crash with the following messages displayed in the output of show logging log


%KERN-2-SYSTEM_MSG: mts_is_q_space_available_new():1416:Total mtsbuf size 10070872 for sap 28, exceeds limit 15 perc of 67108864 - kernel
%KERN-2-SYSTEM_MSG: mts_acquire_q_space() failing - no space in sap 28, uuid 26 send_opc 3176, pid 3616, proc_name sctpt_rx_thr - kernel
%KERN-2-SYSTEM_MSG: [sap 28][pid 4406][comm:snmpd] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 4406) hasn't caught signal 6 (core will be saved).


Conditions:
This bug affects both Nexus 7000 and MDS switches. It has been observed when a monitoring device is using snmp-bulk-get requests on the entity-MIB for multiple FEX modules at one time, or if there is continuous polling from multiple polling stations on slow mibs.

Some examples of mibs that may be affected by contiuous snmp bulk walk are qos mib, entity mib, entity-fru mib, bridge mib.


Workaround:
A possible workaround is configuring the no snmp-server counter cache enable command. This command prevents SNMP bulk gets from getting cached via the use of MTS buffers. This will prevent the MTS buffers from getting consumed and resulting in a process crash. The result of the command is that the interface table might be slower to update the statistics (since caching is disabled).

Note: This workaround is only available on Nexus 7000 switches.

This defect is fixed in NX-OS releases 5.2.9, 6.1.4 (Nexus 7000), 5.2.8g (MDS), and 6.2.1 (Nexus 7000 and MDS).

Further Problem Description:
A possible way of verifying if you are affected by this bug is to issue the command show system internal mts buffers summary and check if notifications for sap 28 are increasing.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
5.2(7), 5.2(7)S20, 6.1(1.66)S0, 6.1(3), 6.1(4)S17, 6.2(0.294)S11, 6.2(0.294)S12, 6.2(1.23)
Known Fixed Releases:
5.2(1)N1(5), 5.2(8g), 5.2(8g)S11, 5.2(9), 5.2(9)S53, 5.2(9.98)S0, 6.0(2)N1(2a), 6.0(2)U1(1)
Bug Id:
CSCuj70143
Title:
PPF out of sync between SUP and LCs
Description:

Symptom:
The following error can be seen when applying ACL changes:

"Failed to complete Verification: Link exists" or
"Database Internal error"

Conditions:
Applying a large amount of config change.

Workaround:
Reload the module, or change the name of the ACL/object-group

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
5.2(9)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)BF(0.96), 7.1(0)BNB(0.1), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.153)
Bug Id:
CSCtg90112
Title:
N7k Linecard is reset due to "Metro fatal interrupt in device 79"
Description:

Symptom:Linecards, in Nexus 7000 systems
may be reset with the following messages.

Nexus 7000
%MODULE-2-MOD_DIAG_FAIL: Module reported failure on ports 8/2-8/2
(Ethernet) due to Metro fatal
interrupt in device 79 (device error 0xc4f00202)


Conditions:This issue can occur when an n7k linecard is responsible for
SPAN and multiple packet replication of the same packets.

1) Overlapping SPAN sessions can increase the chance of running into the issue
as shown below.

- Overlapping source vlan/interface, configured in tx or both directions, in 2
separate SPAN sessions.
Example:
monitor session 1 source vlan 11 - 20
monitor session 2 source vlan 11 - 20 (or any vlans that are in the session 1)

2) High # of OIFs for a specific multicast group with SPAN configured for any
of these OIFs. This has been observed with approx 60+ OIFs.

To determine if a linecard is susceptible, use the following commands.

Nexus7000# attach mod 2

module-2# sh hardware internal version
-------------------------------------------------
Name InstanceNum Version
-------------------------------------------------
Octopus 1 0.4
Octopus 2 0.4
Sotra 1 186.3
Sotra 2 186.3
Metropolis 1 0.3 <<<<<< version is irrelevent
Metropolis 2 0.3
Metropolis 3 0.3
Metropolis 4 0.3

Workaround:The only true workaround if you are hitting the described conditions, is to not have tx SPAN of multicast. You can do this by only using the "rx" option for the span source, or you can use the multicast best-effort command which disables tx span for mcast.
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_14span.html#pgfId-1309359

You may decrease the chances of running into the issue (if you're hitting the scenario with 2 SPAN sessions) via the following
respectively:
- Do not use overlapping SPAN sessions
or
- Use Virtual SPAN session
http://www.cisco.com/en/US/partner/docs/switches/datacenter/sw/4_2/nx-os/system_management/configuration/guide/sm_14span.html#wp1214731









Status:
Terminated
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
4.2(4)
Known Fixed Releases:
Bug Id:
CSCuu54461
Title:
Traffic loss seen after BGP Autodiscovery triggers
Description:

Symptom:
In VPLS BGP auto-discovery, if L2VPN changes the route-target configs for a VFI, the config changes may not be reflected in outgoing routes until a route refresh is done in BGP.

Conditions:
Changing route-target configs like in the following condition.
l2vpn vfi context test7
vpn id 7
autodiscovery bgp signaling ldp
route-target import 1.2.3.4:7 <<<<<<
route-target export 1.2.3.4:7 <<<<<<
no auto-route-target <<<<<<

Workaround:
Route-target changes are typically done across the network, not just limited to one router. So, it is cautious to do a "clear bgp l2vpn vpls * soft" in routers that will see its effect percolate across the whole network, after all config changes are completed.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuc94570
Title:
N7k: Fabricpath traffic loss for unicast flooded traffic
Description:

Symptom:
Unidirectional North-South traffic does not flow through VPC+ ports in F2 modules

Conditions:
When the core ports and vpc+ edge ports are part of the same F2 ASIC instance, the unknown unicast flood may be incorrectly pruned and not make it out of the vpc+ ports

Workaround(s):
Locate the vpc+ ports in a separate ASIC instance than the core ports.
The ports and the corresponding ASIC instances in a F2 card are as follows
--------------------
ASIC | ports
---------+---------
1 : 1-4
2 : 5-8
3 : 9-12
4 : 13-16
5 : 17-20
6 : 21-24
7 : 25-28
8 : 29-32
9 : 33-36
10 : 37-40
11 : 41-44
12 : 45-48

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(2), 6.2(5.27)S0
Known Fixed Releases:
Bug Id:
CSCut26755
Title:
L3 SVI BFD ACL remove failed on reload of F2 module
Description:

This issue may be exposed to customer.

Symptom:
Reloading of F3 module followed by F2 module reload; brings the fabricpath bfd sessions on l3 svi to down state, due to ACL install failed on F3 modules.

Conditions:
Configure IPv4/IPv6 Fabricpath BFD sessions on L3 SVI with fabricpath member ports on F3 and F2E modules. With this configuration - issue occurs in the following conditions,

* Reload the F3 module where BFD was hosted. Once the F3 goes down, BFD session is moved to F2 LC. Once the F3 is back online, BFD sessions moves back to F3.
* Now reload the module F2. Upon reloading the F2 module ACL entries on F3 module are getting deleted and never creates back, as a result fabricpath bfd sessions will never come up again.

Workaround:
Reload the F3 module again to bring up the fabricpath bfd sessions on l3 SVI.
(or)
Reload the F2 module after sometime once the F3 is UP.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
7.2(0)ZD(0.106)
Known Fixed Releases:
Bug Id:
CSCuu13344
Title:
Rackspace - pixmc crash and M2 LC - communication failure
Description:

Symptom:
During the HA switch over of the supervisors, the neighbor switch crashed with pixmc core.

Conditions:
have a M2 LC and more than 128 interfaces within a BD LTL.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(12)E5, 6.2(13.3)S0, 6.2(14)FB(0.46), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.496), 7.2(0)D1(1), 7.2(0)ZD(0.178), 7.3(0)IB(0.19)
Bug Id:
CSCut49944
Title:
sw reload would put range of private-vlan are STP blocked state
Description:

Symptom:
sw reload its observed that range of private-vlan are STP blocked state

Conditions:
sw reload its observed that range of private-vlan are STP blocked state

Workaround:
workaround : realod of LC

Further Problem Description:
sw reload its observed that range of private-vlan are STP blocked state

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(14)FB(0.72), 7.2(0)D1(0.444)
Known Fixed Releases:
6.2(13.3)S0, 6.2(13.4)S0, 6.2(14)FB(0.65), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.504), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.184)
Bug Id:
CSCut34478
Title:
unicast route for the NVE peer loopback IP is missing on some ASIC inst
Description:

Symptom:
This issue is specific to Vxlan - Flood and Learn. When the peer LC goes down and it is the only core facing LC on the peer switch, the peer route is not programmed properly on all the instances and hence the traffic fails.

Conditions:
This issue is specific to Vxlan - Flood and Learn.

The peer route must be programmed on the VDC instances. This is achieved through the following two updates -
a. URIB route update for programming the route on core vrf instances.
b. NVE Manager peer add updates for programming the route on the VDC instances.

This issue is observed when the peer LC goes down and it is the only core facing LC on the peer switch. In such a scenario, when OSPF timeouts, URIB triggers an unlearn for the peer route.

However, the MAC Table timeout is longer than the OSPF timeout. Hence, the MAC table still has the Remote host MAC entry - thus the NVE peer is still seen in NVE Manager.

When the peer LC is up again, OSPF sends an update for the peer route. However, NVE manager doesn't resend the peer route update since it already has the peer update. As a result, we end up with the peer route programmed only on the URIB notified VRF instances and not the other instances in the VDC.

Workaround:
clear ip route vrf all
shut / no shut on the nve interface.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.424)
Known Fixed Releases:
Bug Id:
CSCuu88922
Title:
partial configuration applied after configuring fabric-control on pvlan
Description:

Symptom:
Trying to configure/unconfigure a vlan as fabric-control which is initially configured as a private-vlan irrespective of primary or isolated or community. Such a config is not supported and ideally vlan_mgr needs to log an error or warning on the console. If such a config is applied then pixm_vl crashes.

Conditions:
vlan need to be private vlan and configure it as fabric-control and then again remove fabric-control.

vlan 10
fabric-control
exit
vlan 10
no fabric-control
exit

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.14), 7.2(0)ZD(0.221), 7.2(1)PIB(0.14), 7.3(0)SL(0.73)
Bug Id:
CSCut75759
Title:
ACL change fail "hardware resource allocation failure"
Description:

Symptom:
unable to modify/remove ACL from SVI. getting the following error: "ERROR: Module 1 returned status: hardware resource allocation failure"

Conditions:
Issue is seen when modification is done to ACL attached to SVI. This is due to memory leak in policer being allocated by qos. With each modification to ACL number of policer in QOS keeps on increasing. It reaches a point where there are not sufficient quantity of policers free and error is generated.

Workaround:
Remove the QOS policy from VLAN config, this results in deallocation of all allocated policers for that vlan.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.42), 7.2(0)BA(0.25), 7.2(0)D1(0.495), 7.2(0)D1(1), 7.2(0)ZD(0.177), 7.3(0)IB(0.19), 7.3(0)RTG(0.17), 7.3(0)SL(0.73)
Bug Id:
CSCuu10618
Title:
Traffic loss on some vlans after line card reload
Description:

Symptom:
after reload there is 100% packet drop on a few vlans

Conditions:
LC reload on scaled setup

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.471), 7.2(0)D1(0.475)
Known Fixed Releases:
15.5(1)S2.7, 15.5(2.20)T, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.6(0.2)S, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25)
Bug Id:
CSCuu05012
Title:
Post ISSU : EXP based classification is not working
Description:

Symptom:
Before fixing the issue ISSU from 6.2.x to 7.2, qos was not working properly.

Conditions:
The hardware initialization is modified in 7.2 and if did ISSU from 6.2.x to 7.2 with flanker card, hardware is with still old 6.2.x programming and in some qos cases may not work properly in 7.2, since ISSU do not touch the hardware.

To fix this qos tables are reprogrammed at the time of ISSU when moved to 7.2.

Workaround:
Reload LC.

Further Problem Description:
There may be some packet drops while doing ISSU from 6.2.x to 7.2 till qos tables get reprogrammed in the hardware.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
7.2(0)BA(0.25), 7.2(0)D1(0.496), 7.2(0)D1(1), 7.2(0)ZD(0.178), 7.3(0)IB(0.19), 7.3(0)RTG(0.17), 7.3(0)SL(0.73)
Bug Id:
CSCuv29907
Title:
N7K supervisor reload due to 'monitor' service crash
Description:

Symptom:
Supervisor reload or VDC restart may occur due to a crash in the 'monitor' service. Service crashes with names such as 'm5on' may also be observed.

2015 Jul 7 10:03:29.557 N7K %$ VDC-5 %$ %SYSMGR-2-SERVICE_CRASHED: Service "monitor" (PID 5207) hasn't caught signal 11 (core will be saved).

2015 Jul 7 10:03:31.445 N7K %$ VDC-5 %$ %SYSMGR-2-SERVICE_CRASHED: Service "monitor" (PID 9567) hasn't caught signal 6 (core will be saved).

2015 Jul 7 10:03:10 N7K %SYSMGR-2-LAST_CORE_BASIC_TRACE: : PID 13032 with message m5on(non-sysmgr) crashed, core will be saved .

----- reset reason for module 6 (from Supervisor in slot 6) ---

1) At 158164 usecs after Tue Jul 7 10:13:15 2015
Reason: Reset triggered due to HA policy of Reset
Service: Service "monitor" in vdc 5 hap reset
Version: 6.2(10)

Conditions:
This was observed on a Nexus 7000 running 6.2(10).

Exact conditions are unknown. It is suspected that the affected code path can be invoked either via 'show' commands or via SNMP polling, but the exact commands or OIDs are currently not known.

This will be updated with additional information as the investigation into this issue progresses.

Workaround:
Do not run the SNMP SPAN MIB Query.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Bug Id:
CSCur12364
Title:
N5K:ISSU fails 5.1(3)Nx(x)/5.2(1)N1(x) -> 6.0(2)Nx(x)/5.2 -> 7.0(x)N1(1)
Description:

Symptom:
When performing ISSU with this path: 5.1(3)N1(1) / 5.1(3)N1(1a) => 6.0(2)N2(5) => 7.0(3)N1(1)
This issue is hit with ISSU upgrade path of 5.1.x->5.2.x->7.x as well. Not necessary that 6.0 should be interim.

We can see that 1st step is fine. But when switch is rebooted on the second step for upgrade 6.0(2)N2(5) => 7.0(3)N1(1) switch is crashing at boot at URIB process.

And this error is shown:

show install all status

This is the log of last installation.
Need to perform cleanup of failed upgrade.
Install has failed. Return code 0x40930039 (aborting due to failed upgrade).

Conditions:
Issue seen with these conditions:
- N5K VPC pair with AA FEX
- perform ISSU: 5.1(3)N1(1) -> 6.0(2)N2(5) -> 7.0(3)N1(1) or 5.1.x->5.2.x->7.x (without reload between after intermediate upgrade)

Workaround:
Issue is not seen when N5K pair booted 6.0(2)N2(5) and configured from clear config.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
5.1(3)N1(1a), 6.0(2)N2(5), 7.0(3)N1(0.125)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(3)I2(0.489), 7.0(3)I2(1), 7.0(6)N1(0.276), 7.0(6)N1(1b), 7.0(7)ZN(0.112), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.1(2)N1(0.549), 7.1(2)ZD(0.6)
Bug Id:
CSCuu09005
Title:
vinci prefixes on BL node not sent to local FP neighbors-trig sys reload
Description:

Symptom:
In a Vinci BL-DCI topology, after box reload, BL may not be advertise fabric external BGP route to fabric internal BGP peer.

Conditions:
1. Border Leaf is reloaded.
2. More specific fabric external route is received before less specific fabric internal route.

Workaround:
clear bgp vpnv4 unicast * soft out on the Border Leaf.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.475)
Known Fixed Releases:
Bug Id:
CSCuu49365
Title:
Wrong set of bd's are sent in TMC when no bridge-domain is done
Description:

Symptom:
Here proper set of bd's or vlan's are not sent in port affected notif to ethpm for bringing them down.
This will lead to inconsistency in peer-link i.e. vpc_mgr, ethpm and vlan components.
This only pertains to vxlan setup and not vinci/autoconfig.

Conditions:
Only on "no bridge-domain " and vxlan setup.
This is not seen in vinci and autoconfig setup.

Workaround:
For peerlink do shut/no shut i.e. flap the port.
For normal ports aswell do the same flap them.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.512), 7.2(0)D1(1), 7.3(0)D1(0.34)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.14), 7.2(0)ZD(0.221), 7.2(1)PIB(0.14), 7.3(0)SL(0.73)
Bug Id:
CSCue11653
Title:
LC Reset due to LM_INT_CL1_TCAM_B_PARITY_ERR or LM_INT_L3_TCAM_PARITY
Description:

Symptom

All the below three symptoms should be seen.

1. SYSMGR-SLOT8-2-SERVICE_CRASHED: Service "lamira_usd" (PID 1944) hasn't caught signal 6 (core will be saved).

2. In "show logging onboard mod 2 exception-log"

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <----- this should be 1
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description : LM_INT_CL1_TCAM_B_PARITY_ERR <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)


or

----------------------------
Module: 2
----------------------------

Exception Log Record : Mon Mar 4 11:25:32 2013 (602696 us)

Device Id : 81
Device Name : Lamira
Device Error Code : c5101210(H)
Device Error Type : ERR_TYPE_HW
Device Error Name : NULL
Device Instance : 1 <---------- this should be '1'
Sys Error : Generic failure
Errtype : INFORMATIONAL
PhyPortLayer : Ethernet
Port(s) Affected :
Error Description :LM_INT_L3_TCAM_PARITY <---------!
DSAP : 211
UUID : 382
Time : Mon Mar 4 11:25:32 2013
(602696 usecs 513484AC(H) jiffies)

3. Attach to linecard, and check this.

show logging onboard internal lamira

You will see something like this below.


ACLQOS: STAT Register Scan - No Correctable Error Found

or

IPFIB: STAT Register Scan - No Correctable Error Found


If all the above are seen the issue is that software reset the linecard due to an error in handling parity interrupt.

Symptom:

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
5.1(5), 6.0(4), 6.1(2)
Known Fixed Releases:
5.2(9), 5.2(9)S59, 5.2(9)S60, 5.2(9)S66, 5.2(9.107)S0, 5.2(9.115)S0, 5.2(91.1)S0, 6.1(4), 6.1(4)S3, 6.1(4)S5
Bug Id:
CSCtz59702
Title:
N7k - Memory leak due to wccp
Description:

Symptom:
WCCP process crashes and creates a core file running on Nexus 7k.

Conditions:
WCCP must be configured with http/https traffic.

Workaround:
Unknown

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
5.1(5)
Known Fixed Releases:
5.2(3a)E2, 5.2(7), 5.2(7)E1.1, 5.2(7)S6, 5.2(7.11)S0, 6.1(1.66)S0, 6.1(2), 6.1(2.27), 6.2(0.285), 6.2(2)
Bug Id:
CSCup19405
Title:
targeted ldp session fails when frr is in use
Description:

Symptom:
Targeted ldp session is up when the primary tunnel is up, but goes down when frr goes active.

Conditions:
"In the scenarios where the MPLS core interface is a SVI or a sub-interface, packets coming in with two or more NULL labels and bound to the Supervisor card will be dropped"

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.1(0)D1(0.151), 7.2(0)D1(0.456)
Known Fixed Releases:
7.1(0)AV(0.81), 7.2(0)BA(0.25), 7.2(0)D1(0.475), 7.2(0)D1(0.507), 7.2(0)D1(0.510), 7.2(0)ZD(0.186), 7.2(0)ZD(0.190), 7.2(1)D1(0.20), 7.2(1)PIB(0.14), 7.2(1)ZD(0.16)
Bug Id:
CSCus22805
Title:
N7K-SUP2/E: Compact Flash Failure or Unable to Save Configuration
Description:

Symptom:The following symptoms have been seen:
- Compact flash diagnostic failure
- Unable to perform a 'copy run start'

To display the current status of the RAID devices, please run the following commands:

switch# show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xf0

Where x is the standby supervisor slot number:

switch# slot x show system internal raid | grep -A 1 "Current RAID status info"
Current RAID status info:
RAID data from CMOS = 0xa5 0xd2

Last number in the RAID data indicate the number of disks failed:

0xf0 ==>> No failures reported
0xe1 ==>> Primary flash failed
0xd2 ==>> Alternate (or mirror) flash failed
0xc3 ==>> Both primary and alternate failed

Conditions:- N7K-SUP2 or N7K-SUP2E
- N77k-SUP2 and N77K-SUP2E are NOT effected
- Several months or years of uptime

Workaround:While system can operate with only one flash device, its highly recommended to recover and add the removed flash back into RAID configuration. Second flash device can also get into this condition over time triggering the read-only mode.

Flash Recovery Tool:
n7000-s2-flash-recovery-tool.10.0.2.tar.gz is available to be downloaded from Cisco support site. This works as a custom plug-in that can be run using the 'load' CLI.

- To run the tool, download and copy it to bootflash/volatile/slot0.
extract it
#tar extract bootflash:n7000-s2-flash-recovery-tool.10.0.2.tar.gz
run with the load command
#load bootflash:n7000-s2-flash-recovery-tool.10.0.2.gbin
- Tool automatically fixes any single flash errors when present.
- If a standby available, it will copy itself to standby and run there.
- No side effects if there are no errors reported at the time.
- Tool will not attempt dual flash recovery either on active or standby.

Single flash failure on active or standby:
Systems running with single flash failure can be repaired while in service using the flash recovery tool.

Dual flash failure on the standby:
This is a recoverable situation by reloading the standby and making sure that the flashes are healthy once it comes back online. Flash recovery tool should be run after reload to put both flashes back into service.

Dual flash failures on Active:
This is not a recoverable situation, unless there is at least one working flash on the standby. Otherwise, switch need to be reloaded during next maintenance window. If the standby is healthy a switchover can be attempted and then recover the old active. Latest running configurations need to be saved external to the switch to be restored after reload. Flash recovery tool should be run after reload to make sure flashes back into service.

Additional verification steps and further information can be found in the Read Me file with the recovery tool.

More Info:Fix is available in 6.2(14), 7.2(x), and later.

Each Nexus 7000 Supervisor board are equipped with 2 identical eUSB flash devices in a RAID1 mirror configuration. Called primary and mirror, they together provide for non-volatile repositories for storing boot images, startup configuration and other persistent application data.

Over years in service, one of these devices may get disconnected from the USB bus. This causes the RAID software to drop the affected device to be removed from its configuration. System still can function normally with the remaining working device.

However, if the second device also experiences similar issue and drops out of the RAID array, boot flash devices will re-mounted as read-only preventing configuration copying. Even though there is no operational impact on systems running in this state, a reload of the affected supervisor is needed to recover f

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(5a), 6.2(12)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.26), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(122), 7.2(0)AB(9), 7.2(0)BA(0.12), 7.2(0)D1(0.456), 7.2(0)D1(1)
Bug Id:
CSCut08818
Title:
SNMPD crashes with role with only deny OIDs
Description:

Symptom:
If the SNMP community name is associated with a role which has only a deny OID will cause SMNP to unexpectedly write out a core file when polled with a SNMP bulk request. If multiple SNMP crashes occur then the SUP will switchover and the SNMP configuration will be lost.

Conditions:
The N7K is configured with SNMP and a role which only denies OIDs.

Workaround:
For the configured role add in a permit OID.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a), 6.2(9a)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.63), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.1(2)N1(0.548), 7.1(2)ZD(0.6), 7.1(2)ZN(0.7), 7.2(0)BA(0.25), 7.2(0)D1(0.492)
Bug Id:
CSCut13349
Title:
EIGRP hap reset seen on primary vpc+ switch with Janjuc build 111
Description:

Symptom:
This issue is seen on L3 over Fabricpath testbed. N64P switches are vpc+ peers. P2 is primary and P1 is secondary.

Fwm reset happened on P1 (vpc secondary) and switch went for a reload. All the L3 protocols between P1 and P2 went down. Around 3 minutes later primary vpc switch (P2) went down due to eigrp hap reset.

No triggers executed this time. Switch was left idle with traffic on for around 12 hours. Then the fwm crash was seen on secondary switch and few minutes later eigrp hap reset was seen on primary vpc+ switch.

Conditions:
Eigrp hap reset seen

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.409), 7.2(0)N1(0.111)
Known Fixed Releases:
7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)N1(0.213), 7.2(0)N1(1), 7.2(0)ZD(0.194), 7.2(0)ZN(0.213), 7.2(1)PIB(0.14), 7.3(0)N1(1)
Bug Id:
CSCut67131
Title:
ACL_Deny misprogrammed on F1 when creating a new VDC
Description:

Symptom:
When creating a new VDC,
Broadcast packets may loop from one VPC member, across the peer link, and out the other VPC member.

Conditions:
Only seen on a Nexus 7000 switch using F1 Linecards running 6.2

Workaround:
To recover from this state after shut/no shut the VPC member on the F1 modules which is looping the broadcast.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases:
Bug Id:
CSCur17440
Title:
snmpwalk on cpmCPUTotalTable(1.3.6.1.4.1.9.9.109.1.1.1) failing
Description:

Symptom:
On nexus 5500/6000 series switches, snmpwalk on 1.3.6.1.4.1.9.9.109.1.1.1( cpmCPUTotalTable) does not return the expected objects.

Conditions:
This is seen with 7.1 train, the issue does not exist with previous trains such as 7.0

Workaround:
An snmpget to the object will work, for instance to 1.3.6.1.4.1.9.9.109.1.1.1.1.8.1 for cpmCPUTotal5minRev

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.1(0)N1(1), 7.1(1)N1(0.8)
Known Fixed Releases:
7.3(0)BZN(0.7), 7.3(0)D1(0.33), 7.3(0)DHB(0.2), 7.3(0)OTT(0.8), 7.3(0)PDB(0.15), 7.3(0)RTG(0.39), 7.3(0)ZD(0.50), 7.3(0)ZN(0.55)
Bug Id:
CSCuu29773
Title:
Crash in the pim process after exceeding 32K multicast routes
Description:

Symptom:
Multiple pim process crashes seen resulting in a hap-reset that restarts the system

Conditions:
This issue occurs after exceeding the limit of 32K multicast routes and PIM assert message for a new S,G arrives.

show ip mroute detail vrf all`
IP Multicast Routing Table for VRF "default"

Total number of routes: 44037
Total number of (*,G) routes: 141
Total number of (S,G) routes: 43895
Total number of (*,G-prefix) routes: 1

Also saw many SLAB memory errors which could potentially be the result of a memory leak:

2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:09 CVC-1-1761C-BR-0-2 %PIM-3-CREATE_ROUTE: pim [15748] Couldn't create PIM route for (141.214.83.211/32, 239.255
.255.253/32) in join notification
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: PIM-3-SLAB_ALLOC: message repeated 1349 times in last 7710408
sec
2015 May 6 18:11:19 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro
ute()
2015 May 6 18:11:29 CVC-1-1761C-BR-0-2 %PIM-4-SYSLOG_SL_MSG_WARNING: SYSLOG-4-SL_MSG_WARNING: message repeated 1 times in last 7710
418 sec
2015 May 6 18:11:30 CVC-1-1761C-BR-0-2 %PIM-3-SLAB_ALLOC: pim [15748] Slab alloc of type pim_routetype failed in pim_build_pim_ro

Workaround:
Reduce the total mulitciast routes to less than 32K

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.58), 7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.0(0)KM(0.138), 7.1(2)N1(0.574), 7.1(2)ZD(0.23), 7.1(2)ZN(0.35), 7.2(0)D1(1), 7.2(0)D1(1.1)
Bug Id:
CSCuu58892
Title:
Traffic loss observed after changing VPLS-id
Description:

Symptom:
After changing the VPLS-id, Traffic loss is being observed over the PW's.

Conditions:
# Change VPLS-ID on PE-a
# Change VPLS-ID on PE-b & PE-c
# Revert VPLS-ID to default on all Pes

Workaround:
clear l2vpn service

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCus98916
Title:
BGP Vinci: For 0.0.0.0/0, BGP installs non-best/multi paths in URIB
Description:

Symptom:
In a vinci setup, customer is not able to chose one out of two Border Leaf because URIB is doing ECMP for both paths learnt via BGP.

Conditions:
1. Two paths in BGP vrf table for 0.0.0.0/0 from two Border Leaf.
2. First path is marked as best-path.
3. Second path is not marked as multi-path or best-path
4. BGP installs both paths in URIB vrf table.
5. URIB sees both paths having exact same metrics and interprets ECMP.

Workaround:
Config can be reworked in a way that the Leaf only receives one path via BGP.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.1(1)N1(0.481), 7.1(1)N1(1), 7.1(1)ZD(0.18), 7.1(1)ZN(0.33), 7.2(0)BA(0.25), 7.2(0)D1(0.487), 7.2(0)D1(1)
Bug Id:
CSCuu27816
Title:
IPv6 prefixes of OSPFv3 interfaces not present in intra-area-prefix LSA
Description:

Symptom:
IPv6 prefixes of interfaces part of OSPFv3 not present in intra-area-prefix LSA.

Conditions:
Interfaces without adjacency can run into this problem after interface flap or VDC reload

Workaround:
Use "redistribute direct" instead of configuring the interfaces in OSPFv3 if possible.

Further Problem Description:
Recovery is via clear ospfv3 neighbors.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.499)
Known Fixed Releases:
7.0(0)FFW(0.7), 7.0(0)HSK(0.474), 7.0(0)KM(0.138), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)D1(0.511), 7.2(0)D1(1), 7.2(0)N1(0.209), 7.2(0)N1(1), 7.2(0)ZD(0.191)
Bug Id:
CSCuo80937
Title:
Nexus 7000 Stuck Sending TCNs Every 2 Seconds
Description:

Symptom:
If there is any TC after upgrade to 6.2.(6), 6.2.(6a) or 6.2.(8), then after approximately 90 days of active supervisor uptime, STP TC BPDUs are sent out every 2 seconds for a long period of time.

Conditions:
Nexus 7000 or 7700 running 6.2(6), 6.2.(6a), or 6.2(8).

Workaround:
In order to circumvent this issue until an upgrade to fixed code can be performed,
execute the appropriate workaround depending on whether you have a dual-supervisor or single-supervisor
configuration before each 90 days of Active supervisor uptime.

For dual-supervisor setups:
1. Reload the standby supervisor using cli "reload module x" where x is standby supervisor slot number.
2. Use the 'show module' command to confirm that the standby supervisor is up and in the ha-standby mode.
3. Use the 'system switchover' command to switch to the standby supervisor.

For single-supervisor setups:
1. Upgrade to 6.2.6b or 6.2.8a, depending on your business requirements.
2. Reload the switch.

Further Problem Description:
Active Supervisor Uptime can be found from "show system uptime":
N7K-7009-3# show system uptime
System start time: Fri Oct 25 09:40:58 2013
System uptime: 236 days, 8 hours, 56 minutes, 59 seconds
Kernel uptime: 110 days, 23 hours, 7 minutes, 49 seconds
Active supervisor uptime: 110 days, 23 hours, 2 minutes, 23 seconds <<<<<<<<<<<

-----------------

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)E1, 6.2(6)
Known Fixed Releases:
6.1(2)I3(1), 6.2(10), 6.2(10)S5, 6.2(10.5), 6.2(6)E2, 6.2(6b), 6.2(6b)S1, 6.2(8)E1, 6.2(8)E2, 6.2(8)E5
Bug Id:
CSCuu59073
Title:
UIN-1::Seeing ifmgr core @ ethpm_get_max_port_speed
Description:



Symptom:

User triggered command for sub-interface causing ifmgr core

Conditions:

Using invalid data for the sub-interface with uninitialized value.

Workaround:

None

Further Problem Description:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.2(0)D1(1), 7.2(0)D1(1.1), 7.2(0)ZD(0.209), 7.2(1)PIB(0.14), 7.3(0)SL(0.73)
Bug Id:
CSCuu59408
Title:
Gibraltor:post ISSU, reload F2 -fex uplink results in DCBX ACK lost
Description:

Symptom:
On Nexus 7018 switch with software 7.2.0 release, where Fabric Extender N2232PP uplink is connected to the only one F2 Module ports and the host interface connected to the physical host UCS is shared with the storage virtual device (VDC).

If reload of F2 module is performed post module up the host interface connected to the UCS host will see that DCBX PDU ACK gets lost.

Conditions:
Nexus 7000 series switch F2 only one module having uplink of fabric extender FEX N2232PP and host interface of FEX is shared with the storage VDC.

Workaround:
To resolve the issue, in the owner virtual device ( vdc) of nexus 7018 switch ,flap the host interface (HIF) port of Fabric extender FEX, So that the DCBX exchange will get reinitialized.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(1), 7.3(0)D1(0.54)
Known Fixed Releases:
Bug Id:
CSCus97711
Title:
Unable to delete files from /tmp directory using filesys delete
Description:

Symptom:
Can not delete files from /tmp/var directory on Line cards using filesys delete cli

Conditions:
n/a

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.37), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.492), 7.2(0)D1(1), 7.2(0)VZD(0.26), 7.2(0)ZD(0.174), 7.3(0)IB(0.19)
Bug Id:
CSCup20959
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:NXOS versions prior to 6.2(10)

Workaround:None

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(4), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10), 6.2(10)S84, 6.2(10.16)S0, 6.2(8)E10, 7.1(0)AV(0.38), 7.1(0)D1(0.306), 7.1(0)EV(0.116), 7.1(0)OTT(0.45), 7.1(0)PDB(0.241), 7.2(0)D1(1)
Bug Id:
CSCut72659
Title:
SSH connection failure with 'no matching cipher found ' syslog
Description:

Symptom:
SSH connections initiated form the device fails with the below syslog

switch# ssh admin@10.196.98.73 vrf management
no matching cipher found: client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server aes128-ctr,aes192-ctr,aes256-ctr
switch#


Upon failed ssh connections connection, similar syslog is reported at the server also.

switch(config)# e2015 Mar 9 10:03:55 $ VDC-1 %$ %DAEMON-2-SYSTEM_MSG: fatal: no matching cipher found: client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server aes128-ctr,aes192-ctr,aes256-ctr - dcos_sshd[18259]

Conditions:
The issue occurs only if the server does not support any CBC ciphers.

Workaround:
The workaround is to add the client CBC ciphers in sshd_config/dcos_sshd_config file of the server to re-enable them, so that there will be matching ciphers.
Edit the following files in the server from Linux prompt:
/isan/etc/dcos_sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

/isan/etc/sshd_config
+ # Secure Ciphers and MACs
+ Ciphers aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

Further Problem Description:
Fix Description
=================
As per openssh6.7 code, FIPS-approved ciphers are the following:
aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

For NXOS SSH client, ctr ciphers were not enabled by default on FIPs mode.
Fixed the issue by setting the FIPS mode flag for ctr ciphers.

On Nexus 7000 this problem can manifest itself also in the following way:
can not attach to rise nam from sup

N7K-6# attach rise slot 332
Attaching to RISE 332 ...

Username:root
no matching cipher found: client \
aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc server \
aes128-ctr,aes192-ctr,aes256-ctr
N7K-6#

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(13)FM(0.66), 6.2(13)S12, 7.2(0)D1(0.430), 7.2(0)D1(0.451)
Known Fixed Releases:
5.2(8g), 5.2(8g)S9, 6.2(13)S15, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.487), 7.2(0)D1(0.489)
Bug Id:
CSCut17793
Title:
SSTE:Traffic loss observed after flapp mpls interf with 7.2(0)D1(0.422)
Description:

Symptom:
Few VPLS PWs are down

Conditions:
Flap MPLS interface used by PWs

Workaround:
clear l2vpn service all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.484)
Known Fixed Releases:
15.5(1)S2.7, 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.503), 7.2(0)D1(1), 7.2(0)N1(0.196), 7.2(0)N1(1)
Bug Id:
CSCuv48908
Title:
N6K IGMP v3 snooping hap reset
Description:

Symptom:
Nexus 6000 may crash due to igmp snooping.

%SYSMGR-2-SERVICE_CRASHED: Service "igmp" (PID XXXX) hasn't caught signal 11 (core will be saved).
%SYSMGR-2-HAP_FAILURE_SUP_RESET: System reset due to service "igmp" in vdc 1 has had a hap failure

Conditions:
Infrastructure has ip IGMP version 3 configured. This crash is seen due to incorrect handling of very large IGMPv3 Group-and-Source-Specific Query by the Nexus. Usually seen with a malformed packet with a large number of source address which could be bogus.

Workaround:
Find the source of the large IGMP Group-and-Source-Specific Query packet and stop it if it is malformed packet. Using IGMPv2 everywhere will be a workaround.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
7.2(0)N1(0.1)
Known Fixed Releases:
Bug Id:
CSCur21785
Title:
N7K - M1/M2 Egress Queuing behavior post 6.2(x) for control plane packet
Description:

Symptom:
Control plane packet ( marked with DSCP value for Example PIM etc ) received on ACCESS port, and then get bridged into same VLAN do not queued in priority Queue on Egress port. The issue is not seen after doing "no ip igmp snooping"

Conditions:
- Nexus 7000 running 6.2(x) image; Earlier images like 5.2(x) do not see the same condition.
- Packet is coming in ACCESS port and getting bridged into same VLAN via ACCESS or Trunk port.
- M series Line cards

Workaround:
Not available yet

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases:
Bug Id:
CSCuu53575
Title:
sh vlan id 1 shows incorrect ports after doing ASCII replay twice
Description:

Symptom:
Any port which is not in mode trunk should not have config for trunk allowed vlan's under it. For exmaple

int po10
switchport
switchport mode fabricpath
switchport trunk allowed vlan 11-20
no shutdown

Conditions:
Only happens when "switchport trunk allowed vlan " is done after the mode is changed to no trunk mode.

Workaround:
Do no switchport trunk allowed vlan in case of fabricpath/pvlan mode as this config is of no use.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Bug Id:
CSCuo13444
Title:
IP Packets are dropped at LC when one sub interface is deleted
Description:

Symptom:
Traffic breaks for all sub-interfaces under a parent interface when we remove a sub-interface under that parent interface.

Conditions:
Sub-interfaces configured on F2 linecard

Workaround:
shut/no shut another configured sub-interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
7.1(0)D1(0.85), 7.1(0)ZD(0.193)
Known Fixed Releases:
6.2(10), 6.2(10)CM(0.19), 6.2(8)TS(0.28), 6.2(9.1)S0, 7.1(0)D1(0.153), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)ZD(0.204), 7.1(1)SP(0.4), 7.2(0)D1(1)
Bug Id:
CSCud91672
Title:
Nexus7000: DEV_LOCAL_SAC_ASIC (device error 0xc910026d) [Sup2+M2]
Description:

Symptom:
Nexus7000 module reports:
%MODULE-4-MOD_WARNING: Module (Serial number: ) reported warning on ports
due to SAC sync lost in device DEV_LOCAL_SAC_ASIC (device error 0xc910026d)

Conditions:
Issue is seen only with M2 modules in Nexus7000 with SUP1 or SUP2 engines running 6.x releases

Workaround:
None

Issue is fixed in 6.1(4) and 6.2(2) or later releases.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(3)S32
Known Fixed Releases:
5.2(9.95)S0, 6.1(4), 6.1(4)S3, 6.1(4.25)S0, 6.2(1.41)S0, 6.2(1.93), 6.2(2), 7.0(0.6)
Bug Id:
CSCuq25337
Title:
Broadcast & multicast fail after multiple ISSU, no port select for LTL
Description:

Symptom:Broadcast / multicast traffic may not egress out port channel members and/or physical ports.
pixm pss has duplicate entries for BD LTLs after multiple ISSU

slot 4 show hardware intern ltl start-index 0x802b end-index 0x802b egress-port 6
----------------------------------------------------------------
|fp ports|inst| ltl | rbh| vqi |mi(v5)|mi(v4)|drop|eg ports|
|--------------------------------------------------------------|
| 5- 8 | 1| 802b| 0| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 1| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 2| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 3| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 4| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 5| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 6| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 7| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 8| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 9| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 10| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 11| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 12| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 13| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 14| | c9| ca| 0|no port selects
| 5- 8 | 1| 802b| 15| | c9| ca| 0|no port selects
Conditions:Multiple ISSUs causing incorrect setting of the port bitmaps due to pss key corruption.
For example, lets take a 2 ISSUs case from 6.2.8 to 6.2.8a to 6.2.10

- Switch loaded with 6.2.8 image.
- On a BD ltl operation if any, upon updation of the pss entry in the pss file, there is a mismatch between the pixmc internal data structure and the pss entry.
- After ISSU from 6.2.8 to 6.2.8a, the restoration of BD LTL is done based on the mismatched state. This results in inconsistency between pixmc internal sw state and its pss file only without affected the hardware programming.
- Now, any BD ltl operation on the above affected BD LTL will result in creation of a duplicate key in the pss file.
- Another ISSU from 6.2.8a to 6.2.10 will result in restoration of an invalid PSS entry (because of duplicate pss key) which has stale port bitmaps set for that BD LTL.
Workaround:Bounce the port channel members which do not have the port selects set properly to cause reprogramming of the affected BD LTL due to the port-channel membership change.
OR
Flap the affected vlan to cause reprogramming of the BD LTL with the right port selects.
OR
Resetting the affected module(s)
More Info:Double ISSU is a commonly seen condition. This issue can also be seen after an ISSU followed by M1-to-M2 replacement (which involves port-channels flap)

The fix for this is in 6.2(10). This means that:
a) ISSU from any prior release to 6.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(2), 6.2(10)S38, 6.2(2a), 6.2(6a), 6.2(8), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S45, 7.1(0)AV(0.38), 7.1(0)D1(0.267), 7.1(0)OTT(0.36), 7.1(0)PDB(0.206), 7.2(0)D1(1)
Bug Id:
CSCus73066
Title:
M2 linecard reset due to EOBC heartbeat failure
Description:

Symptom:
A M2 linecard may be reset by the supervisor due to EOBC heartbeat being missed by the linecard

Conditions:
Unknown

Workaround:
None

Further Problem Description:
The defect is similar to CSCup20959 which should be fixed in 6.2(10) code but still seen in 6.2(10)

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(4), 6.2(10), 6.2(12), 6.2(6), 6.2(8)
Known Fixed Releases:
6.2(10)E5, 6.2(10)E8, 6.2(12)E2, 6.2(13.3)S0, 6.2(14)FB(0.14), 6.2(8)E10, 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.469), 7.2(0)D1(1)
Bug Id:
CSCuu09287
Title:
SSTE: pixm critical message on 'no feature-set fabric'
Description:

Symptom:
error message seen when no feature-set fabric is issued.

Conditions:
configure several feature sets and multiple VDCs.

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases:
Bug Id:
CSCuj16682
Title:
acl applied on mgmt interface only works when remove/apply after reload.
Description:

Symptom:
acl applied on mgmt interfaces fail to act, after realod

Conditions:
Once the n7k is reloaded, acl applied on mgmt interface wont work,
checked for acl that blocks telnet to mgmt ip,
telnet seens to be sucessfull after realod, though acl was there to block tcp connections

Workaround:
remove and apply the acl on the mgmt interface after relaod.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.2(3), 6.2(8a)
Known Fixed Releases:
6.2(10), 6.2(10)S56, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.228), 7.1(0)EB(99.2), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCui72592
Title:
N7k: F3 module reloads due to Kernel Panic
Description:

N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE/
OK

(2) The output of 'show logging onboard module internal reset-reason' will indicate that the reload reason was due to a kernel panic.

Reset Reason for this card:
Image Version : 6.2(8a)
Reset Reason (LCM): Line card not responding (60) at time Thu Aug 21 20:21:59 2014
Reset Reason (SW): Kernel Panic (19) at time Thu Aug 21 20:19:28 2014
Service (Additional Info): Kernel Panic
Reset Reason (HW): System reset by active sup (by writing to PMFPGA regs) (100) at time Thu Aug 2
1 20:21:59 2014
Last log in OBFL was written at time Thu Aug 21 19:32:39 2014

(3) The output of 'show logging onboard module stack-trace' will provide the kernel stack trace. The top function on this stack will be 'InstructionTLBError47x'. The running process and the rest of the stack are not relevant.

Example:

---------------------------------
Module: 2 stack-trace
---------------------------------

------------------ LOG 01 -------------------

Logging time: Thu Aug 21 20:19:28 2014
1408670368:500000000 process xxxxxxxx (1219), jiffies 0xb79c1f6
Machine Check in kernel mode : Process xxxxxxxxx (1219)
MCSR: 0x0 MCAR: 0x0 MCSSR0: 0xc040100c MCSSR1: 0x21000


STACK

CPU 1 Call Trace:

[]InstructionTLBError47x+0x6c/0xa8 <------------- HERE



Symptom:N7K / F3 module may reload unexpectedly due to a kernel panic at 'InstructionTLBError47x'. The following symptoms will be observed:

(1) Syslogs will indicate the module was unresponsive, and was reset.

2014 Aug 21 20:20:08 NEXUS7K %MODULE-2-MOD_NOT_ALIVE: Module 2 not responding... resetting (Serial
number: XXXXXXXXXXX)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number XXXXXXXXXXX)
Module-Type 10/40 Gbps Ethernet Module Model N77-F324FQ-25
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-2-MOD_PWRUP: Module 2 powered up (Serial number XXXXXXXXXXX
)
2014 Aug 21 20:20:19 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_POWERED
_UP
2014 Aug 21 20:21:57 NEXUS7K %BIOS_DAEMON-SLOT2-5-BIOS_DAEMON_LC_PRI_BOOT: System booted from Pri
mary BIOS Flash
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to updating
2014 Aug 21 20:24:03 NEXUS7K %VDC_MGR-5-VDC_STATE_CHANGE: vdc 1 state changed to active
2014 Aug 21 20:24:32 NEXUS7K %PLATFORM-5-MOD_STATUS: Module 2 current-status is MOD_STATUS_ONLINE

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.2(5.41)S0, 6.2(5.41)S1, 6.2(5.41)S2, 6.2(5.41)S3, 6.2(5.7), 6.2(8a), 7.0(0.33)S0, 7.1(0)D1(0.169)
Known Fixed Releases:
6.2(10), 6.2(10)S32, 6.2(10)S9, 6.2(10.5), 6.2(6b)E2, 6.2(8)E4, 6.2(8)E5, 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Bug Id:
CSCuv37478
Title:
Unable to clear SNMP intf counters for Input Discards in M2
Description:

Symptom:
clear snmp counter cmds has no effect on clearing "Input discard errors" counter on M2 cards. For other counters, this command works.

Conditions:
When Input Discards are incremented for an Ethernet interfaces of M2 line cards.

Workaround:
Reload the line card clears the snmp counters.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.2(13.8)
Known Fixed Releases:
6.2(14)S0
Bug Id:
CSCtz71765
Title:
NF configuration is retained when the config is not supported in HW
Description:

Symptom:
Nexus 7000 switches have several restrictions in terms of hardware support for ACL based features being configured on the same L3 interface. For example Netflow and DHCP relay are not supported on the same interface at the same time.

The N7K may accept netflow configuration on the CLI and save it to the start-up configuration even though this configuration is not supported on the interface in question due to a conflict with some other ACL based feature. Upon reloading the N7K the start-up process discovers this problem and will suspend the VLAN interfaces in question. You may see errors like this:


2013 Sep 25 22:04:13 2JUA_SDS-7K-DATA ETHPORT-3-IF_ERROR_VLANS_SUSPENDED VLANs
2-999 on Interface port-channel610 are being suspended. (Reason: Tcam Allocatio
n Failure)

Conditions:
N7K with Netflow and other ACL based feature configured on the same interface. For example DHCP relay and ingress Netflow. Save config and reload the box. the bug has two parts:

1. It should reject the command
2. It should give you an error every time you configure it

r12.7k-VDC2(config-if)# no ip flow monitor standard-monitor input sampler nf-sampler r12.7k-VDC2(config-if)# ip access-group test1 in r12.7k-VDC2(config-if)# ip flow monitor standard-monitor input sampler nf-sampler Verify failed - Client 0x83000146, Reason: Tcam Allocation Failure, : RACL, Netflow Sampler (SVI), Interface: Vlan145 r12.7k-VDC2(config-if)# 2013 Sep 26 16:51:48 r12.7k-VDC2 %$ VDC-2 %$ %NFM-2-VERIFY_FAIL: Verify failed - Client 0x83000146, Reason: Tcam Allocation Failure, : RACL, Netflow Sampler (SVI), Interface: Vlan145

r12.7k-VDC2(config-if)# show run int vlan 145

!Command: show running-config interface Vlan145
!Time: Thu Sep 26 16:51:59 2013

version 6.1(4)

interface Vlan145
ip access-group test1 in
ip flow monitor standard-monitor input sampler nf-sampler
ip address 10.13.169.2/24
no shutdown

r12.7k-VDC2(config-if)# ip flow monitor standard-monitor input sampler nf-sampler r12.7k-VDC2(config-if)#

Workaround:
Remove the conflicting configuration before you save your config and reload the box.

Or you can try to upgrade to 6.2.2 and issue this command:

hardware access-list resource feature bank-mapping

The above command adds more flexibility in how various ACL based features are mapped to the 4 different TCAM banks. It doesn't make every feature combination work but it greatly reduces the amount of combinations that are not supported.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
5.2(7), 5.2(9)S50, 6.1(0.277), 6.1(2), 6.1(4.9), 6.2(10)S12, 6.2(10)S38, 6.2(2)S42, 6.2(2)S6, 6.2(5.38)
Known Fixed Releases:
Bug Id:
CSCuq39448
Title:
Nexus EIGRP crash when distribute list is configured under interface
Description:

Symptom:
A Nexus 5000, 6000, or 7000 switch may reload unexpectedly due to an EIGRP process crash. Reset reason will look similar to the following:

`show system reset-reason`
----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 306358 usecs after Wed Sep 3 04:32:21 2014
Reason: Reset triggered due to HA policy of Reset
Service: __inst_001__eigrp hap reset
Version: 7.0(2)N1(1)

Conditions:
This crash can be hit when a distribute-list is configured on a physical interface or SVI. It will occur when a new neighborship is formed on that interface.

Workaround:
No known workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.17), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(1)ZN(0.693), 7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.414), 7.0(3)I2(1), 7.0(6)N1(0.202)
Bug Id:
CSCuv02037
Title:
L2 SVI to L3 Port to be driven by DSCP
Description:

Symptom:In some cases, egress queuing behavior for F2E/F3 modules (both on Nexus 7000 & Nexus 7700) is incorrect - either the traffic selects the wrong egress queue, or the final COS of the traffic is not remarked, or both.
Conditions:Workaround:You can apply a 'type qos' policy on the ingress port(s) or VLAN(s) that explicitly copies dscp to dscp using a table-map.

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.2(10)S102
Known Fixed Releases:
6.2(12)E1, 6.2(13.7)S0

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论