Cisco Blog » The Platform

2015年9月1日星期二

Cisco Notification Alert -3850 Series Switch-01-Sep-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-12S-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48PW-S Bundle
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-12S-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24S-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-E Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-L Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-L Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-E Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24PW-S Bundle
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24S-S Switch
Software Type:
IOS XE Software
Release Version:
3.6.3E
Alert Type:
New File
File Name:
cat3k_caa-universalk9.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL

File Release Date:
28-AUG-2015
Alert Type:
New File
File Name:
cat3k_caa-universalk9ldpe.SPA.03.06.03.E.152-2.E3.bin
File Description:

CAT3850/3650 UNIVERSAL W/O DTLS

File Release Date:
28-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-S Switch
Software Type:
Wireless Lan Controller Web Authentication Bundle
Release Version:
3.6.3
Alert Type:
New File
File Name:
CAT3850_WEBAUTH_BUNDLE_3_6_3.zip
File Description:

Bundle of sample pages for web portal authentication for WLC 3850.

File Release Date:
29-AUG-2015
Find additional information in Software Downloads index.

Known Bugs - Catalyst 3850 Series Switches

Alert Type:
Updated *
Bug Id:
CSCur09076
Title:
%SYS-4-CHUNKSIBLINGSEXCEED: No of siblings in chunk gone above threshold
Status:
Other
Severity:
1 Catastrophic
Description: *

Symptom:
3850 WLC intermittently will hang and no access allowed. Once the 3850 is reloaded, the issue goes away. The following is seen:

-Traceback= 1#048b6a8b926898a0a997138bbf4f379d :5501E000+258A31C :5501E000+3EF9114 :5501E000+EEC27C :5501E000+EEC898 :5501E000+1103900 :5501E000+1106B24 :5501E000+11070B0 :5501E000+1107688 :5501E000+3EAD28C
Sep 18 11:05:35 EDT: %DOT1X-5-FAIL: Authentication failed for client (f437.b720.88c2) on Interface Ca32 AuditSessionID 0a570a15541af4630003ee1f
Sep 18 11:05:59 EDT: %DOT1X-5-FAIL: Authentication failed for client (54ea.a882.8fc9) on Interface Ca35 AuditSessionID 0a570a15541af47a0003ee23
Sep 18 11:06:13 EDT: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:22552 Chunk:0x38157CB0 Name:AIM_ATTACH -Process= "IP Host Track Process", ipl= 0, pid= 213
-Traceback= 1#048b6a8b926898a0a997138bbf4f379d :5501E000+258A31C :5501E000+3EF9114 :5501E000+EEC27C :5501E000+EEC898 :5501E000+1103900 :5501E000+1106870 :5501E000+11070B0 :5501E000+1107688 :5501E000+3EAD28C
Sep 18 11:06:18 EDT: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:22902 Chunk:0x38EE9A74 Name:AIM_ATTACH -Process= "cpf_msg_rcvq_process", ipl= 0, pid= 129 (NC5A4-3)
-Traceback= 1#048b6a8b926898a0a997138bbf4f379d :54615000+258A31C :54615000+3EF9114 :54615000+EEC27C :54615000+EEC898 :54615000+10FE660 :54615000+1110F64 :54615000+1112198 :54615000+22A6FBC :54615000+22B3A20 :54615000+22AEA54 :54615000+3EAD28C (NC5A4-3)

Conditions:
3850 WLC running 03.06.00E

Workaround:
none

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
15.2(2.0.0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCul19814
Title:
SCHED-3-tHRASHING at fnf-rpc_context_wait_for_completion
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: After collecting "raw netflow" data, the active switch crashes. The show flow monitor v4 cache command causes the reboot of the switch with the following message:
%SCHED-3-TRASHING: Process thrashing on watched message event.
Conditions: This symptom occurs due to the show flow monitor command.
Workaround: There is no workaround.

Last Modified:
03-AUG-2015
Known Affected Releases:
15.0(1)EZ
Known Fixed Releases: *
15.0(1)EZ2, 15.0(10.37)PKD, 15.0(10.37)PKP, 15.0(12.72)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(1.1)PSR, 15.2(1.24)PSR, 15.2(2)E
Alert Type:
Updated *
Bug Id:
CSCuu35972
Title:
MCAST streams stop with more then one outgoing interfaces in the RIL
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With more then one outgoing interfaces, multicast streams do not getting forwarded to any OIL interfaces. The switch forwards multicast stream just fine as long as there is only a single interface in the OIL list.

Conditions:
The issue is seen if there are 2 or more outgoing interfaces.

Workaround:
Not known

Further Problem Description:

Last Modified:
03-AUG-2015
Known Affected Releases:
3.6(2)E, n/a
Known Fixed Releases: *
15.2(3)E2
Alert Type:
Updated *
Bug Id:
CSCuq09690
Title:
"no parameter-map" causes crash on 3.3.3 : auth_proxy_cache_redirect_url
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After hitting CSCup76410 on 3.6, customer downgraded to 3.3.3se and experiencing continuous crashes
================ Where =================

#0 0xf7060f7e in strlen [__be_strlen] (str=0xd0d0d0d

) at ../VIEW_ROOT/cisco.comp/system-infra/libc/src/string/strlen.c:42
#1 0xf5afd772 in strdup [__be_strdup] (oldstr=0xd0d0d0d
) at ../VIEW_ROOT/cisco.comp/system-infra/util/misc/src/util.c:1129
#2 0xf57d3fd5 in auth_proxy_cache_redirect_url [__be_auth_proxy_cach...] (info=0x982ada6c, url=0xd0d0d0d
) at ../inspect/auth_proxy_support.c:675
#3 0xf57f8996 in webauth_http_parse_get_request [__be_webauth_http_pa...] (state=0x96f86e88, webauth=) at ../inspect/webauth_http_parse_get.c:944
#4 0xf57f79a4 in webauth_http_parse_request [__be_webauth_http_pa...] (state=0x96f86e88, webauth=0x982ada6c) at ../inspect/webauth_http_parse.c:218
#5 0xf57ea086 in webauth_io_read_complete [__be_webauth_io_read...] (ioid=2, state=0x96f86e88) at ../inspect/webauth_httpd_authproxy.c:63
#6 0xf57e567d in webauth_httpd_socket_read_ev [__be_webauth_httpd_s...] (info=0x982ada6c, ctx=0x9332c3dc) at ../inspect/webauth_httpd.c:2174
#7 0xf57e4a36 in webauth_httpd_socket_ev [__be_webauth_httpd_s...] (io_dict=, fd=2, event_mask=1) at ../inspect/webauth_httpd.c:2376
#8 0xf57e46bb in webauth_httpd [__be_webauth_httpd] () at ../inspect/webauth_httpd.c:2837
#9 0xf6ab9620 in process_create_preemptive [__be_process_create_...] (padd=Cannot access memory at address 0x8
) at ../VIEW_ROOT/cisco.comp/kernel/mki/src/process.c:2208

Conditions:
This is seen when the parameter-map is deleted on the fly while sessions associated with are active.

Workaround:
To shut the interface to which parameter-map is attached, before deleting/changing the pmap.

Further Problem Description:

Last Modified:
05-AUG-2015
Known Affected Releases:
15.0(1)EZ, 15.2(2)E
Known Fixed Releases: *
15.0(1)EZ4, 15.0(14.1)TSR, 15.0(14.41)EZD, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1)IC273.162, 15.2(2)E1, 15.2(2.54)PSR, 15.2(2b)E, 15.2(4.0)ST
Alert Type:
Updated *
Bug Id:
CSCuj10443
Title:
Standby sw crash@crypto_engine/sw/src/keylib/lib_key_storage.c:646
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch crashes when being added to stack after switchoer

Conditions:
This occurs in switchover scenarios

Workaround:
Reload the complete stack and boot again.

Further Problem Description:

Last Modified:
05-AUG-2015
Known Affected Releases:
15.0(11.98)EMP, 15.0(12.3)EMP, 15.2(2.2.94)E
Known Fixed Releases: *
12.2(60)EZ2, 12.2(60)EZ3, 15.0(1)EZ, 15.0(1)EZ1, 15.0(12.14)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2)EX5, 15.0(2)EX7, 15.0(2)SE7
Alert Type:
Updated *
Bug Id:
CSCuu70556
Title:
stack manager crash @ dplr_pd_update_ring_status_chg
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
3850 switch running 3.7.1.E might experience a stack manager crash.

Conditions:
unknown yet

Workaround:
unknown yet

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
15.2(3.7.1E)
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut05943
Title:
3850 incorrect vlan tag once using private vlans
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
SW1 Gi1/0/1----TRUNK----Gi1/0/1 SW2 Gi1/0/2----TRUNK----Gi1/0/1 SW3
Gi1/0/48
|
|
Host (ISOLATED VLAN Y)

Each switch has SVI X (PRIMARY vlan). ISOLATED VLAN Y is mapped to PRIMARY VLAN X. We can ping from Host to SVI X of SW1 and SW2 but not SW3.

Conditions:
- 3850/3650 switches running cat3k_caa-universalk9ldpe.SPA.03.07.00.E.152-3.E.bin
- all switches configured with private vlans
- host configured in ISOLATED vlan and trying to communicate with host in PRIMARY vlan, while traffic has to pass between trunks on a device in the middle

Workaround:
- no workaround to have the setup working as expected and not loosing functionality
- we can use COMMUNITY instead of ISOLATED, however then we do not achieve the goal of having isolated hosts
- we can change interfaces from TRUNKs to PRIVATE-VLAN PROMISCOUS but then we can have only one PRIMARY vlan
- we can remove private vlan configuration from SW2, but then we are not able to use private vlan feature on SW2...

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
3.7(0)E
Known Fixed Releases: *
15.2(3)E1, 15.2(3)E2, 3.7(1)E, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCus93034
Title:
5760 segmentation fault(11) on Auth-proxy HTTP daemon
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IOS Thread backtrace:

IOSD-EXT-SIGNAL: Segmentation fault(11), Process = Auth-proxy HTTP daemon 0

5760 crashes

Conditions:
Usage of web authentication

Workaround:
none

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
10.2(100.0)
Known Fixed Releases: *
15.2(3)E2, 15.2(4.0)ST, 15.2(5.0)ST, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut26365
Title:
Packet drop on 3850 by an unrelated ACL entry
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
TCP ack packet is discarded by unrelated ACE on 3850.

Conditions:
"establish" option is used.

Workaround:
The problem happened with tcp flags which have multiple bit set. If customer cofig as separate bit, then there is no issue.

The ace: deny tcp any any eq ftp established

Configured as two aces (because the tcp flag establish means "ack or rst"

deny tcp any any eq ftp ack
deny tcp any any eq ftp rst

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
3.7(0)E
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut44425
Title:
SFP remove and crash when "show platform port-asic 0 read counters"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
SFP remove and crash occur when run "show platform port-asic 0 read counters" command

Conditions:
when "show platform port-asic 0 read counters" command is run

Workaround:
We can use the following command as workaround now.

Switch#show platform fwd-asic counters tla ?
AQM Active Queue Management
ASE Acl Search Engine
EGR Egress Global Resolution
EPF Egress Scheduler Module
EQC Egress Scheduler Module
ESM Egress Queue Controller
FPE Flexible Parser
FPS Flexible Pipe Stage
FSE Fib Search Engine
IGR Ingress Global Resolution
IPF Ingress Port FIFO
IQS Ingress Queues and Scheduler
NFL Netflow
NIF Network Interface
PBC Packet Buffer Complex
PIM Protocol Independent Multicast
PLC Policer
RMU Recirculation Multiplexer Unit
RRE Reassembly Engine
RWE Rewrite Engine
SEC Security Engine
SIF Stack Interface
SQS Stack Queues And Scheduler
SUP Supervisor Interface

Switch#show platform fwd-asic counters tla NIF detail asic 0 sw 4
Starting with asic 0

NifRxByteDestinationGroupStats on Asic 0
[0]
rxUnicastBytes1 0x00000000
rxUnicastBytes0 0x00000184
rxMulticastBytes1 0x00000000
rxMulticastBytes0 0x00000000
rxBroadcastBytes1 0x00000000
rxBroadcastBytes0 0x00000000

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
15.5(2)T
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut22611
Title:
3850 - 1 GiG 1000BaseLX negotiates to "HALF DUPLEX" after reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
1 Gig port (1000BaseLX) sometime starts operating at HALF DUPLEX mode after a reload.

Shut/no shut or plugging/unplugging the SFP does not fix the issue. Only way to fix it, is remove the SFP, hardcode the duplex to full and insert SFP back.

Conditions:
WS-C3850-24U running 3.3.5
Both ports need to be connected to C3850-NM-4-1G.
GBIC used- GLC-LH-SMD for 1000BaseLX

Workaround:
Not Available yet.

UDLD should be kicked in to stop any possible layer 2 loop due to this unidirectional situation but this is anyway not a valid workaround to stop the SFP port operating at HALF DUPLEX.

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
15.0(1)EZ5
Known Fixed Releases: *
15.2(3)E1, 15.2(3)E2, 3.7(1)E, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCua55911
Title:
active reloaded with IOSD-EXT-SIGNAL: Segmentation fault(11)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
active reloaded with IOSD-EXT-SIGNAL: Segmentation fault(11)

Conditions:
* did "no issu set rollback-timer 7200" and did wr mem and the active crashed with the error segmentation fault

Workaround:
none

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.1(2)SG1.7, 15.4(1.1)
Known Fixed Releases: *
15.0(1.5)UCT, 15.0(10.16)EMW, 15.0(8.24)EMD, 15.0(9.0)PKD, 15.1(1.40)SID, 15.1(2)SG, 15.1(2)SG1, 15.1(2)SG2, 15.1(2)SG3, 15.1(2)SG4
Alert Type:
Updated *
Bug Id:
CSCum70737
Title:
3850 :: ACL definitions not consistent between stack master and members
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
- Policy-map not programmed as indicated by output of "sh plat qos policy hw_state target tenGigabitEthernet X/Y/Z"
- As soon as the policy is re-writted using "match dscp" statements in the class-map instead of "match access-gorup" - the policy is programed correctly,
- Switch on which the policy is to be applied is not aware of nearly any ACL configured
- Output of "sh plat acl info switch X" shows different results for both switch members - at least one of the switches

Conditions:
- Stack of 2x 3850 running 03.03.01SE
- The switch has ACL applied on the management interface !!!

Workaround:
Remove the ACL from the Management interface.

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1.1)EX
Known Fixed Releases: *
15.0(1)EZ3, 15.0(13.23)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCun81556
Title:
IPDT: Standby failed to boot up after SSO due to Bulk-sync failure
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
- cannot configure "channel-group" on the channel member port

- If stack condition,
after SSO, Standby switch will fail to boot up as a result of bulk sync failure.

Conditions:
- "ip device tracking maximum" is present on an etherchannel member port
- seen with Cat3750, Cat3850 and stack ondition

Workaround:
Remove the config "ip device tracking maximum" from the chanel member ports
before configure channel-group, also before bringing up the switch in order to complete SSO.

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.2(2)E
Known Fixed Releases: *
15.2(1.41)PSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(0)E
Alert Type:
Updated *
Bug Id:
CSCuo14829
Title:
3850/03.03.02SE/Stuck Routing Control Q due to IPV6 MLD
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:BGL.D.09-3800-1#sh platform punt client
tag buffer jumbo fallback packets received failures

-----SNIP-------------

65544 0/ 96/1600 0/4 0/0 0 0 0 0 0
65545 0/ 96/1600 0/8 0/32 0 0 0 0 0
s65546 511/ 512/1600 0/32 0/512 27369 35180 2507410 0 1
65547 0/ 96/1600 0/8 0/32 0 0 0 0 0
65548 0/ 512/1600 0/32 0/256 1182 1182 70920 0 0

BGL.D.09-3800-1#show platform punt statistics port-asic 0 cpuq -1 direction rm punt statistics port-asic 0 cpuq -1 direction rx

----SNIP-----

RX (ASIC2CPU) Stats (asic 0 qn 4 lqn 4):
RXQ 4: CPU_Q_ROUTING_CONTROL
----------------------------------------
Packets received from ASIC : 27883
Send to IOSd total attempts : 27883
Send to IOSd failed count : 1
RX suspend count : 1
RX unsuspend count : 0
RX unsuspend send count : 0

------SNIP------------

Conditions:IOS-XE 3.2.xSE, 3.3.0SE, 3.3.1SE, 3.3.2SE

Caused by IPV6 MLD group specific query packets

Workaround:+ Reload of the switch brings it out of the condition

More Info:Fixed in 3.3.3SE or higher. Upgrade IOS-XE.


Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ2
Known Fixed Releases: *
15.0(1)EZ3, 15.0(13.44)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(1.41)PSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E, 15.2(4.0)ST
Alert Type:
Updated *
Bug Id:
CSCup86496
Title:
unicast ARP replies not destined to 3850 are forwarded to ARP module
Status:
Fixed
Severity:
2 Severe
Description:


Cu migrated 3750 switches to 3850 switches. and they use NAC for security.
The problem occurred with 3850 due to abnormal ARP table update.

Symptom:In 3850, we see that even the unicast ARP replies which are not destined to this box being forwarded to ARP module which will then learn and update the Src MAC for Src IP address which is creating an issue

Conditions:when the 3850 gets ARP replies which are not destined to this box

Workaround:None.

More Info:


Last Modified:
08-AUG-2015
Known Affected Releases:
15.4(2.12)CG26
Known Fixed Releases: *
15.0(1)EZ5, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.3(5)SE, 3.6(1)E
Alert Type:
Updated *
Bug Id:
CSCuu41817
Title:
3850 cts assigning multicast traffic to sgt default (65535)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Enforcement being applied to multicast traffic

Conditions:
Multicast traffic with igmp join

Workaround:
none

Further Problem Description:
NA

Last Modified:
08-AUG-2015
Known Affected Releases:
3.7(0)
Known Fixed Releases: *
15.2(1.8)SY, 15.2(3)E2, 15.2(4.0)ST, 15.2(4.0.15)E, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.6(0.7)S, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCur33133
Title:
Reboot of Standby Stack Member after configuration change.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The issue is that after a configuration is changed, the Standby member reloads and displays error messages.

Conditions:
The standby can randomly reload on different occasions, for example when applying policy on interface or modifying VLAN configuration.

Workaround:
There is no workaround.

Further Problem Description:
Software version 3.6.0 or 3.3.1 (in lab I tested 3.3.1SE)

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ1
Known Fixed Releases: *
15.2(1)SY1, 15.2(2)E2, 15.2(3)E1, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(2)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCuu31131
Title:
Memory leak under *MallocLite* / tdl code for ipv4 and l3m
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Memory leak is seen in *MallocLite* process. if MallocLite is disabled, we see the increase in memory under the TDL code for l3m and ipv4. Further investigation is going on to identify the source code involved in triggering the leak.

Conditions:
Not known

Workaround:
Not known

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
3.6(2)E
Known Fixed Releases: *
15.2(3)E2, 15.2(4.0.64a)E, 15.2(4.0.8)E, 15.2(5.0)ST, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCum41076
Title:
Wireless IPSG is broken for NG3K
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IP Source Gurad for wireless IPv4 traffic does not take effect. The feature is enabled on a wlan. It is supposed to drop traffic from a wireless client in the wlan if the source IP is not the one allocated to the client.
But, this does not happen and such traffic is forwarded normally.
Conditions:
This is issue is seen whenever IPSG is enabled for a wlan (under all conditions).

Workaround:
There is no reasonable workaround for this issue.


Last Modified:
12-AUG-2015
Known Affected Releases:
15.0(11.30)EMP
Known Fixed Releases: *
15.0(1)EZ2, 15.0(10.37)PKD, 15.0(10.37)PKP, 15.0(12.91)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(2)E, 15.2(2.2.70)ST, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCuo14901
Title:
Crash/High CPU when enabling nbar for Flexible Netflow
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
3850 switch crashes and/or experiences high cpu when adding nbar feature to FNF.

Conditions:
Device must have flexible netflow and nbar application configured.

Workaround:
This is not a supported case. We should never have this configuration.

Further Problem Description:
Need to reject the configuration on wired interface.

Last Modified:
15-AUG-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.70)EZD, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCuq89605
Title:
Switch does not show the configured duplex value
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When a down interface is configured on Catalyst switch 3850 for a fixed speed and duplex value, the "show int status" command shows the correct speed, but it shows duplex as auto.

This behavior is seen only on an unconnected port.

Example:
#######

CAT3850#show run interface gigabitEthernet 1/0/2
Building configuration...

Current configuration : 62 bytes
!
interface GigabitEthernet1/0/2
speed 100
duplex full
end

CAT3850#show interfaces status | include Gi1/0/2
Gi1/0/2 notconnect 1 auto 100 10/100/1000BaseTX

Conditions:
The problem is seen on down interface, but when the link is ?up?, it shows the correct settings.

Workaround:
There is no workaround.

Further Problem Description:
NA

Last Modified:
15-AUG-2015
Known Affected Releases:
15.2(2)E
Known Fixed Releases: *
15.2(1)SY1, 15.2(2)E2, 15.2(3)E1, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(2)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCup53338
Title:
3850 IOSD crash | Signal=SIGSEGV(11) @ pm_port_data_from_swidb
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The standby switch on a 3850 stack may reboot due to an IOSd crash following a stack-merge event.

Conditions:
Not Known

Workaround:
None

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
12.3PI4, n/a
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(14.9)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(2.23)PSR, 15.2(2.39)PSR, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCup48618
Title:
3850: Crash @ dot1x_switch_handle_vlan_removal
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
3850 member stack crashes on replacing a supplicant behind phone.

Conditions:
Cat3850 running 3.6.0E

Workaround:
None

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
15.2(3.1.22)PI4
Known Fixed Releases: *
15.2(2)E1, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(1)E, 3.7(0)E
Alert Type:
New
Bug Id:
CSCuv62794
Title:
MAC address doesn't update when flex-link switchover.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
when Flex-link switchover, ping loss happend.

Conditions:
Flex-link switchover

Workaround:
None

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
15.0(31.4.79)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv69263
Title:
3850 crashes while running 'no ip pim rp-address'
Status:
Open
Severity:
2 Severe
Description:

Symptom:
A 3850 may crash while running the command 'no ip pim rp-address'

Conditions:
Running the command 'no ip pim rp-address'

Workaround:
None at this time.

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
15.0(1)EX2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus99367
Title:
3850 re-writes mobility capwap data packets with TTL 9
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
3850 re-writes mobility capwap data packets with TTL 9

Conditions:
3850 re-writes mobility capwap data packets with TTL 9. As a result any capwap data packets(DHCP/ARP etc) sent via mobility tunnel will have a TTL set to 9 which means these packets will not be able to make more than 9 hops.

In an environment where 3850 wlan is anchored to another WLC/Switch >9 hops away, clients will not be able to get DHCP IP.

Hardware affected: 3850/3650
Software versions impacted: 3.3.x, 3.6.0, 3.6.1, 3.6.2, 3.7.0, 3.7.1

5760 is not impacted by this issue

Workaround:
Shorten the path between the foreign and anchor or upgrade to fixed image(IOS-xe 3.7.2 or 3.6.3).

Further Problem Description:
None.

Last Modified:
22-AUG-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases:
15.2(3)E2, 3.7(2)E
Alert Type:
New
Bug Id:
CSCuv78424
Title:
Unicast ARP packets are duplicated
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
3650/3850 duplicates unicast ARP request packets destined for its IP and sends back 2 replies for one ARP request packet sent by the host.

Conditions:
NA

Workaround:
NA

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu86656
Title:
2 different policies with same order of class-maps on same asic
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

traffic hits in correct class-map if we configure 2 different policies with same order of class-maps(these class-maps are port-range based acls) on same asic.
Conditions:when the policy contains L4 range match (e.g, tcp port > 100), and only reboot.
Workaround:manually reconfig after reboot.
More Info:












Last Modified:
30-AUG-2015
Known Affected Releases:
Rev
Known Fixed Releases:
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut98110
Title:
3850: ARP ACL ace log restriction should be removed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
3850 doesn't support ARP ACL log option
arp access-list DAI
deny ip host 172.28.78.1 mac any log
permit ip any mac any
Switch(config)#ip arp inspection filter DAI vlan 20-21 static
%Command rejected:arp acl with 'log' keyword is not supported.

Conditions:
cat3850

Workaround:
None

Further Problem Description:

Last Modified:
03-AUG-2015
Known Affected Releases:
16.2(0), n/a
Known Fixed Releases: *
15.2(3)E2, 15.2(4.10.60)PI5, 15.2(5.0)ST
Alert Type:
New
Bug Id:
CSCui61021
Title:
one policymap should be able to be associated with multiple access-group
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
one policymap not able to be associated with multiple access-group

Conditions:
multiple access-group with one policy map

Workaround:

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
15.0(11.65)EMP1
Known Fixed Releases:
15.2(2)E, 3.6(0)E
Alert Type:
Updated *
Bug Id:
CSCuv89877
Title:
fed crashed on removing service-policy
Status: *
Other
Severity: *
3 Moderate
Description:

Symptom:
remove service policy might trigger switches to crash

Conditions:
remove service-policy from input/output of an GE interface.

Workaround:
unknown at this point
refrain from remove service-policy during business hours

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
15.0(1)EZ5
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv19773
Title:
"nmsp attach suppress" not being added into run-config on WS-C3850-24P
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"nmsp attach suppress" disables IPDT related feature on the interface, however command is not added into run-config, hence upon a reload IPDT is still enabled and Customer has to disable it once again:

B.06-3800-8(config)#do sh ip devic tra int gi1/0/1
--------------------------------------------
Interface GigabitEthernet1/0/1 is: STAND ALONE
IP Device Tracking = Disabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 30
IPv6 Device Tracking Client Registered Handle: 98
IP Device Tracking Enabled Features:
HOST_TRACK_CLIENT_ATTACHMENT
--------------------------------------------


B.06-3800-8(config)#int gi1/0/1
B.06-3800-8(config-if)#nmsp attachment suppress

B.06-3800-8(config)#do sh run int gi1/0/1
Building configuration...
Current configuration : 38 bytes
!
interface GigabitEthernet1/0/1
end

B.06-3800-8(config)#do sh ip device track int gi1/0/1
--------------------------------------------
Interface GigabitEthernet1/0/1 is: STAND ALONE
IP Device Tracking = Disabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 30
IP Device Tracking Enabled Features:
--------------------------------------------

Conditions:
- WS-C3850-24P running 3.7.0E or 3.7.1E

Workaround:
- add manually "nmsp attach suppress" under each interface upon every single reload of the switch

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
3.7(0)E
Known Fixed Releases: *
15.2(4.0.75a)E, 15.2(4.0.80)E
Alert Type:
Updated *
Bug Id:
CSCuj17317
Title:
XE: Certain snagless cables may press on the mode button causing reload
Status:
Fixed
Severity:
3 Moderate
Description:

Request to adjust the current behavior. This bug is being considered as an enhancement to avoid future unexpected resets on existing hardware. There is a field notice to inform customers of possible hard (non-software) workarounds to the issue:
http://www.cisco.com/en/US/customer/ts/fn/636/fn63697.html

Symptom:
Express Setup is a feature that allows for quick configuration of basic features on the WS-C3850 and other IOS-XE based switches. Express Setup is invoked through holding the Mode button for 2 seconds on an unconfigured switch or for 10 seconds on a previously configured switch. When this happens the switch configuration is deleted and the switch reboots and can be configured using Express Setup or via the CLI.

Large anti-snag cable boots have the potential of coming into contact with the mode button resulting in the unexpected invocation of Express Setup. This request is for a change in the default behavior of Express Setup to avoid invocation when a switch is in production and invocation is undesirable.

Conditions:
The cable boot is making extended contact with the mode button resulting in Express Setup being invoked. The following messages are seen when this issue is encountered on the WS-3850-48 or other IOS-XE based switch:

##########################
%SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
%EXPRESS_SETUP-6-CONFIG_IS_RESET: The configuration is reset and the system will now reboot
%SYS-5-RELOAD: Reload requested by NGWC led process. Reload Reason: Reload command.
%STACKMGR-1-RELOAD_REQUEST: 1 stack-mgr: Received reload request for all switches, reason Reload command
%STACKMGR-1-RELOAD: 1 stack-mgr: Reloading due to reason Reload command
##########################

The device will then reset and the configuration will not be present when it comes back up.

Workaround:
Disable Express Setup with the following command:

no setup express

Or remove the the cable boot from the cable installed in port 1.

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
15.0(1)EX1
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.85)EZD, 15.0(14.1)TSR, 15.0(14.5)TTT, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST
Alert Type:
New
Bug Id:
CSCuv70040
Title:
Smartinstall failing when configuring custom connectivity on a 3850
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
2960x failing smartinstall when the director is 3850 running 03.06.00

Conditions:
3850 is Director and 2960X as the client

Workaround:
use custom product id and match model number of the client

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup24700
Title:
Switch reloaded on "mac address-table static mac vlan int" cmd
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Switch may reload after configuring mac address-table static vlan <#> int

Conditions:
Checking for any specific conditions related to network where this is crashing

Workaround:
None at this time

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
15.0(1)EZ3
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(14.9)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(2.23)PSR, 15.2(2.39)PSR, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCuo77295
Title:
Secondary WLC5760 crashed during reverting back from Primary
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Secondary WLC5760 crashed during reverting back from Primary

Conditions:
step1. set up HA ( WLC1 is primary and WLC2 is secondary)
step2. WLC1 goes down and WLC2 become a primary WLC
step3. when WLC1 revert back to a primary, WLC2 crashed

Workaround:
na

Further Problem Description:
na

Last Modified:
15-AUG-2015
Known Affected Releases:
15.0DPB
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.92)EZD, 15.0(14.1)TSR, 15.0(14.15)TTT, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(2.23)PSR, 15.2(2.39)PSR
Alert Type:
Updated *
Bug Id:
CSCuq39180
Title:
NGWC Webauth form cannot be submitted with enter key
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
in 3.3.x: Pressing enter key submit web auth form for computer, but not for mobile devices such as iPhone or Windows Phone.

Conditions:
WebAuth

Workaround:
Use custom HTML template.

Further Problem Description:

Last Modified:
05-AUG-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.2(1)IC273.173, 15.2(2)E1, 15.2(3)E, 15.2(4.0)ST, 15.2(5.0)ST, 15.5(0.18)S0.6, 15.5(1)S, 15.5(1)SN, 15.5(1.8)S, 16.1(0.49)
Alert Type:
Updated *
Bug Id:
CSCut21614
Title:
SR632757933:Unable to ping beyond 3850 due to same vlan id & l3ifindex
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
L2/L3 connectivity can go down when another port in a different vlan is shut/no shut.

Conditions:
The internal l3ifindex and the vlan id share the same index value.

Workaround:
Assign a different vlan id to the port so that the l3ifindex no longer shares the same index with the vlan.

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
15.2(2.0.0)
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut68387
Title:
FED Memory corruption Crash due to CGM
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
FED process crash with errors mentioning memory corruption

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
15.2(3.16)M0.7
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut49440
Title:
3850 class-map "match" doesn't work correctly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If class-map match-any has "match dscp" and "match ip precedence" as follows, traffic with dscp value doesn't hit the policy-map.

!
class-map match-any DSCP-CS5
match dscp cs5
match ip precedence 5
!
policy-map PM-PQ
class DSCP-CS5
police cir 8000 conform-action transmit exceed-action drop

Conditions:
"match ip precedence " is configured in same the class-map.

Workaround:
Either removing " match ip precedence x" or configuring "match dscp xx" after "match ip precedence x" would resolve the issue.

!
class-map match-any DSCP-CS5
match ip precedence 5
match dscp cs5

Further Problem Description:

Last Modified:
06-AUG-2015
Known Affected Releases:
3.7(0)E
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut81374
Title:
After reload, C3850-NM-4-10G/GLC-SX-MM not linkup with speed nonegotiate
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The ports using with C3850-NM-4-10G / GLC-SX-MM is not link-up after switch reload.
This issue is only seen "speed nonegotiate" setting.

Conditions:
3850 running with 3.6.0E /3.6.1E /3.7.0E.

Workaround:
Delete "speed nonegotiate" and input same configuration again.

Further Problem Description:
none

Last Modified:
06-AUG-2015
Known Affected Releases:
15.2(2)E, 15.2(2)E1, 15.2(3)E
Known Fixed Releases: *
15.2(3)E2, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCui92373
Title:
gui : click on wired express setup redirects to blank page
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
gui : click on wired express setup redirects to blank page

Conditions:
gui : click on wired express setup redirects to blank page

Workaround:
directly type the http:// and click the wired webui/wired express setup page directly instead of navigating to the other pages and coming back

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0SID
Known Fixed Releases: *
15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(0)E
Alert Type:
Updated *
Bug Id:
CSCuo55427
Title:
IP theft msg should add old/new IP for which IP-theft is being notified
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Currently when we detect IP theft we get the below syslog

*Jan 15 12:58:45 HKT: WCDB-3-WCDB_IP_CONFLICT IP theft found!! The wired client-1499.e21d.e9ae source-ARP tries to steal the IP 10.25.0.21 of the wireless host-0026.abd4.a2a7 source-ARP

If we include the interfaces of the old and new IP entry for which IP-theft is being notified then this helps us to troubleshoot the issue better

Conditions:
When IP theft is detected

Workaround:
NA

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ3, 15.2(22.22)
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.3)TTT, 15.0(1.77)ZSR, 15.0(13.77)EZD, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCun82902
Title:
ARP packet forwarded although the ports have "switchport protected'
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ARP packet is forwarded although the ports have "switchport protected' configuration

Conditions:
When IPDT is enabled and "switchport protected" configured on both incoming and outgoing port. This issue also triggers with Dyanmic Arp inspection and switchport protect configuration on incoming and outgoing port. Please note that IPDT is on by default on 3850 switch.

Workaround:
One option is to "disable IPDT"/DAI if configured provided customer does not have wireless setup and he is fine with that..
to disable IPDT, pls configure "nmsp attachment suppress" on C3850 protected port.
But igmpv2 packet will not be addressed with this work around

Further Problem Description:
This issue comes when IPDT/DAI enabled. in this case ARP packet is not going through the security port check.

Last Modified:
08-AUG-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(14.1)TSR, 15.0(14.13)EZD, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1.41)PSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(4.0)ST
Alert Type:
Updated *
Bug Id:
CSCun05898
Title:
mac aging time reset to default 300 on switch reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MAC aging timer resets to default 300 on switch reload when configured equal to Global Aging Time

Conditions:
Configured equal to Global Aging Time

Workaround:
none

Further Problem Description:
btv-vua-7#show mac address-table aging-time
Global Aging Time: 480

btv-vua-7(config)#mac address-table aging-time 480 vlan 2007

btv-vua-7#wr mem
Building configuration...
Compressed configuration from 25023 bytes to 9777 bytes[OK]

btv-vua-7#relode

Reload command is being issued on Active unit, this will reload the whole stack
Proceed with reload? [confirm]

Connection timed out

After Reload:

btv-vua-7#show mac address-table aging-time
Global Aging Time: 480
Vlan Aging Time
---- ----------
2007 300

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ, n/a
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(14.1)TSR, 15.0(14.12)EZD, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST
Alert Type:
Updated *
Bug Id:
CSCun91945
Title:
3850 returns incorrect SNMP value for cpeExtPsePortEntPhyIndex
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
3850 returns incorrect SNMP value for cpeExtPsePortEntPhyIndex.

Conditions:
3850 returns incorrect SNMP value for cpeExtPsePortEntPhyIndex.

Workaround:
none

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)S3.3, 15.2(2)E
Known Fixed Releases: *
15.2(1.41)PSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(0)E
Alert Type:
Updated *
Bug Id:
CSCui75064
Title:
3850 Power command not functional under global config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
3850 Power command not functional under global config.
witch(config)#p?
parameter-map parser passwd password
policy-map port-channel power <<< priority-list
privilege process process-max-time

However, when you try this command it says incomplete

Switch(config)#power
% Incomplete command.

Conditions:
Power option should not be there in global config mode for Edison but should be there for incredibles.

Workaround:
Cat3850 returns FALSE to reg_invoke_ilpower_consumption_supported().

Add the "inline" keyword if reg_invoke_ilpower_consumption_supported() returns TRUE.

Further Problem Description:
Under config mode power command removed.So that for 3850 it will not show any power command under config mode but for classic switches it should work.

For Edison:
=================================================================
Switch(config)#p?
parameter-map parser passthru-domain-list passwd
password pnp policy-map port-channel
priority-list privilege process process-max-time
profile

Switch(config)#po
Switch(config)#po?
policy-map port-channel

Switch(config)#power?
% Unrecognized command
Switch(config)#power ?
% Unrecognized command
Switch(config)#power
^
% Invalid input detected at '^' marker.

Switch(config)#inter g6/0/1
Switch(config-if)#p?
pagp power


For Classic (3750)
==============================================
WS-C3750X(config)#power ?
inline Inline power configuration
rps RPS port configuration
xps XPS configuration

WS-C3750X(config)#power inline ?
consumption Inline device power consumption
logging Inline power logging messages

Last Modified:
08-AUG-2015
Known Affected Releases:
3.2(2)SE
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.3)TTT, 15.0(1.77)ZSR, 15.0(13.77)EZD, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1.24)PSR, 15.2(1.30)PSR, 15.2(2)E
Alert Type:
Updated *
Bug Id:
CSCum81233
Title:
Config long vlan name cause tracback wcm_cs_debug_api + 780
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 52705290
-Traceback= 1#6a6c87117f2275246f32e67dc3e37e6a :54DF8000+1F98E0C :54DF8000+1FCB944 :54DF8000+3BB3508 :54DF8000+A9C374 :54DF8000+AA2CE4 :54DF8000+A9BEB4 :54DF8000+AA088C :54DF8000+34212EC

Conditions:
-error occurs when a vlan is configured with a long name (longer that 30 signs) and just after that we go to another vlan configuration mode with "vlan x" command
- 3850 running cat3k_caa-universalk9.SPA.03.03.01.SE.150-1.EZ1.bin
- error occurs just once on the device and to trigger the error again need to reload 3850 and once again proceed with step 1

Workaround:
none

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.0(1)EZ3, 15.0(13.46)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCum96372
Title:
3850 returns false for cswRingRedundant with provisioned switch
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When trying to pull the object cswRingRedundant from a 3850 stack, we will return false if there are any switches that are provisioned.

Conditions:
Any 3850 stack that has a provisioned switch will return false when pulling cswRingRedundant

Workaround:
Unprovison the switch when pulling cswRingRedundant

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
3.2(0.1.1)
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.6)TTT, 15.0(1.77)ZSR, 15.0(13.80)EZD, 15.0(14.1)TSR, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCun22639
Title:
ip source guard with mac-check prevents DHCP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The DHCP table is not getting populated when a new host is plugged into the port if the command "ip verify source mac-check" is enabled , the DHCP request from that host are being blocked and therefore the host does never receive an ip address.

Conditions:
3850
ip verify source mac-check is configured on the ports connecting to hosts

Workaround:
use the source-guard feature without the mac-check keyword

Further Problem Description:
As per configuration guide, "ip verify source mac-check" is supposed to create a new DHCP snooping binding entry for every new host connected to the ports on 3850, but is not.

http://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3.2_0_se/multibook/configuration_guide/b_consolidated_config_guide_3850_chapter_0110110.pdf


Symptom:
Clients fails to get DHCP when ipsg and portsecurity and enabled on the port.

Conditions;

When port security gives calls ipsg to lookinto the new mac arrived.

Workaround:
Added check to verify if maccheck is supported on the platform, which makes sure
that in case of NG3k it doesn't verify mac binding.
Now this will not cause any issue for 3k and 4k since 3k and 4k do not support
maccheck, hence will work as it is today

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ
Known Fixed Releases: *
15.0(1)EZ3, 15.0(13.22)EZD, 15.0(14.1)TSR, 15.0(14.49)EZD, 15.0(2.29)ZSR, 15.2(1.30)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCuq08184
Title:
ip cef accounting non-recursive - on 3850 causes CPU to spike
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ip cef accounting non-recursive - on 3850 causes CPU to spike for recursive and non-recursive prefixes

Conditions:
This command accounts for traffic hitting a recursive prefix against the non-recursive prefix that its next hop resolves through.
Hence, we are seeing the packets being punted to the cpu when we have accounting for non-recursive prefixes too
This issue is seen only on 3850. Tested on 6500 and none seen.

So let's take the following example

10.0.0.0/24 via 11.11.11.11
20.0.0.0/24 via 11.11.11.11
11.11.11.0/24 via 2.2.2.2, eth0

When non-recursive accounting is turned on traffic hitting 10.0.0.0/24 and 20.0.0.0/24 is accounted using a counter associated with 11.11.11.0/24

Workaround:
Remove the command

Further Problem Description:
This command is not supported on 3850, as per discussion with BU.
When we configure this command on 6500 (with the same route conditions), the CPU utilization before and after configuring this command, is the same

Last Modified:
08-AUG-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.2(2)E2, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(2)E, 3.7(0)E
Alert Type:
Updated *
Bug Id:
CSCun89248
Title:
C3850 stack does not filter broadcast traffic on the flexlink
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
if Cat3850 stack switchover,
it does not filter broadcast packet on flexlink standby port.

Conditions:
- configure a lot of flexlink
- with 3.3.0SE to 3.3.2SE, but not on 3.2.3SE.

Workaround:
reload the stack

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
3.3(2)SE
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(14.1)TSR, 15.0(14.12)EZD, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1.41)PSR, 15.2(2)E, 15.2(2.2.32)EA, 15.2(2b)E
Alert Type:
Updated *
Bug Id:
CSCus37493
Title:
Dynamic ARP inspection filtering affects DAI trusted ports
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ARP for an IP address shows as incomplete.

Conditions:
DAI filtering is configured and interfaces where ARP packets are ingressing are DAI trusted.

Workaround:
Disable DAI filtering, or remove applicable deny statement in DAI filtering ARP ACL.

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.0(1)EZ5, 15.2(2)E1
Known Fixed Releases: *
15.2(2)E2, 15.2(3)E1, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(2)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCut06428
Title:
backup flexlink with multicast fast-convergence is leaking igmp leave
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Backup flexlink port with "multicast fast-convergence" is leaking igmp leave packets causing loop

Conditions:
NG3k switch with flexlink configuration and "multicast fast-convergence" option

Workaround:
disable "multicast fast-convergence" option

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases: *
15.2(3)E2, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut29532
Title:
FlexLink and QinQ breaks communication on 3850
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
- on dot1q-tunnel interface in egress direction the outer tag (Service Provider's VLAN ID) is not stripped when forwarding traffic to Customer's equipment

Conditions:
- 3850 with 03.06.00 or 03.06.01 or 03.07.00
- QinQ is configured
- FlexLink is configured on dot1q-tunnel interface

!
interface GigabitEthernet1/0/1
switchport access vlan 1082
switchport mode dot1q-tunnel
switchport backup interface Gi1/0/3 <================= FlexLink configured
l2protocol-tunnel cdp
l2protocol-tunnel stp
no cdp enable
!

Workaround:
- remove FlexLink configuration from dot1q-tunnel interface

!
interface GigabitEthernet1/0/1
switchport access vlan 1082
switchport mode dot1q-tunnel
! switchport backup interface Gi1/0/3 <================= FlexLink configuration is commented out (removed)
l2protocol-tunnel cdp
l2protocol-tunnel stp
no cdp enable
!

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases: *
15.2(3)E2, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCur95710
Title:
interface DLY value changes after stack switchover
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
C3850 interface DLY value changes after stack switchover.

Conditions:
After reloading the active switch of stacked C3850, the interface
delay value changes on the port of new active switch.
This issue is seen when the link speed is 100Mbps or 10Mbps.


e.g.
interface GigabitEthernet2/0/24
speed 100
duplex full

(before switchover)
GigabitEthernet2/0/24 is up, line protocol is up (connected)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,

(after switchover)
GigabitEthernet2/0/24 is up, line protocol is up (connected)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 10 usec,


This condition is recovered by shut/no shut on this port.

Workaround:
Configure delay manually on the interface.

e.g.
interface GigabitEthernet2/0/24
delay 10
speed 100
duplex full

Switch#sh int g2/0/24 | i DLY
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.2(2)E1
Known Fixed Releases: *
15.2(1)SY1, 15.2(3)E1, 15.2(3)E2, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.7(1)E, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCun37216
Title:
Phones not tracked correctly/at all on chassis/stack switches
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Phones not being tracked or not showing on the correct switchport. Descriptions showing up on the wrong switch port or not at all in CER.

Conditions:
Chassis/Stack switch which switchports where new blade is added after install and switch has not been rebooted.

Chassis/Stack switch with IfIndex persistence configured.

Workaround:
If ifIndex persistence is configured on the switch, remove that configuration then reboot the stack/chassis.

If ifIndex persistence is not configured, a reboot of the stack/chassis should resolve the issue.

This should result in switchports being arranged sequentially in the SNMP response the switch sends so CER can read it in correctly.

Further Problem Description:

Last Modified:
08-AUG-2015
Known Affected Releases:
15.1(100.1)
Known Fixed Releases: *
15.2(2)E1, 15.2(2.54)PSR, 15.2(2b)E, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(1)E, 3.7(0)E
Alert Type:
Updated *
Bug Id:
CSCuo07760
Title:
03.06.00E - H/W version is not correct or showing 0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
H/W version value is incorrect on the stack if they are all not booted at the same time.

Conditions:
If the switches are booted up one by one

Workaround:
Boot all switches simultaneously

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
15.2(2.2.53)E
Known Fixed Releases: *
15.2(2)E2, 15.2(3)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(2)E, 3.7(0)E
Alert Type:
Updated *
Bug Id:
CSCuo46878
Title:
Incomplete arp issue seen as incorrect bridging for arp packet w IPDT
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ARP reply packets that are sent with switchport MAC address as destination address are flooded back to network by the switch. Ideally, such packets should be consumed by the switch.

Conditions:
The switchport MAC address is used as source MAC and sender MAC when ARP probes are sent by IPDT feature. The replies to these packets will cause this issue.

Workaround:
There is no workaround to this problem. However, the impact of this issue can reduced if IPDT feature is disabled on switch-to-switch links. This avoids such packets from being flooded to other switches.

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
15.0(1)EZ2, n/a
Known Fixed Releases: *
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.82)EZD, 15.0(14.1)TSR, 15.0(14.2)TTT, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(2)E1, 15.2(2.23)PSR, 15.2(2.39)PSR
Alert Type:
New
Bug Id:
CSCuv76831
Title:
DIAG errors on 3850 switch
Status:
Other
Severity:
4 Minor
Description:

Symptom:
Following errors seen continuously on 3850 switch :


Jul 28 15:49:19.467 JKT: **DIAG** card_detect(2,-1) (KSI-LAND-1-2)
Jul 28 15:49:19.467 JKT: **DIAG** Duplicate card in diag_insert_diag_info(switch 2) (KSI-LAND-1-2)
Jul 28 15:50:46.764 JKT: update test result card(1)/sub_card(-1)/info_type(0)/testing_type(4) (KSI-LAND-1-2)
Jul 28 15:50:46.764 JKT: update non per-port test result[4] = 2 (KSI-LAND-1-2)
Jul 28 15:50:46.764 JKT: Overall test result card(1)/sub_card(-1): 0 0 0 0 (KSI-LAND-1-2)

Conditions:
Problem persists even after configuring "no debug diagnostic all"

Workaround:
Logging discriminator can be used to stop seeing the messages

Further Problem Description:
No impact to switch performance

Last Modified:
20-AUG-2015
Known Affected Releases:
15.0(1)EZ5
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun63989
Title:
Express setup logs (express_setup.debug) should include more details
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
There is no way to tell which switch triggered the reset when the Mode button is pressed.

Conditions:
3850 switch with a Mode button.

Workaround:
None

Further Problem Description:
This enhancement will include for information in the express setup file regarding the switch number and timestamp.

Last Modified:
15-AUG-2015
Known Affected Releases:
15.0(1)EZ2
Known Fixed Releases: *
15.2(1)SY1, 15.2(3)E1, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCuu51994
Title:
vlan information not reflect when only config vlan under channel
Status: *
Open
Severity: *
4 Minor
Description:

Symptom:
when set 'switchport mode access' and 'switchport access vlan x' under port-channel and add physical interface into port-channel by 'channel-group x mode active' (not setting 'switchport access vlan x' again under physical interface again), from show run there is no 'switchport access vlan x' command under both port-channel and physical interfaces. but from show interface status, those ports are accessport for vlan x.

Conditions:
set 'switchport mode access' and 'switchport access vlan x' under port-channel and add physical interface into port-channel by 'channel-group x mode active' (not setting 'switchport access vlan x' again under physical interface again)

Workaround:
set 'switchport mode access' and 'switchport access vlan x' under both port-channel and physical interface

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
15.2(2)E2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq14913
Title:
3850 allows two level policing in hierarchical policy-map
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The switch erroneously allows two level policing in the hierarchical policy-map.

Conditions:

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
15-AUG-2015
Known Affected Releases:
3.6(0)E
Known Fixed Releases: *
15.2(1)SY1, 15.2(2)E2, 15.2(3)E1, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(2)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCuu34717
Title:
3850 cts enforcement for multicast traffic
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
3850 platform configured for trustsec will check policies for multicast traffic (we do have enforcement for multicast traffic). Multicast traffic is classified to (sgt,0) if one is defined, otherwise hits the default sgacl (0,0).

The same behavior is also for 3650 and 5760.

Most of the other platform is not using trustsec enforcement for multicast traffic.

This is platform specific behavior and bug has been created to document it.

Conditions:
cts on 3850/3650/5760 and muticast traffic

Workaround:
If the catchall is defined as a permit instead of deny, then multicast traffic is forwarded.

Further Problem Description:
The fix involves ensuring the deny acl is not applied to multicast traffic.

Last Modified:
03-AUG-2015
Known Affected Releases:
3.7(0)
Known Fixed Releases: *
15.2(3)E2
Alert Type:
Updated *
Bug Id:
CSCuu83648
Title:
Port assignment to a Vlan using SNMP not reflected on show run interfac
Status: *
Other
Severity:
5 Cosmetic
Description:

Symptom:
customer has configured a VLAN using SNMP MIBs, but when ?show interface? is run on the 3850 switch the change is not displayed. However, the change is observed on the ?show vlan? output.


port 2/0/31

interface GigabitEthernet2/0/31
switchport mode access
no snmp trap link-status
spanning-tree portfast
end

sho vlan
10 IDF-H active Gi2/0/31


Also, when using the command #sho run all | b interface GigabitEthernet2/0/31 the change is displayed:

interface GigabitEthernet2/0/31
switchport
switchport access vlan 10

The SNMP command is:

$Dsetting="1.3.6.1.4.1.9.9.68.1.2.2.1.2.$interface";
snmp2_set("$switch", "$Wcommunity", "$Dsetting" , "$type", "$_POST[DVLAN]");
$interface is the interface
And "$_POST[DVLAN] is the VLAN

Conditions:
A customer has configured a vlan and assigned a port to it using SNMP on a 3850 running 03.06.02A.

Workaround:
To verify the port has been assigned to the intended VLAN used the following commands:

show vlan
sho run all | b interface GigabitEthernet

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
15.2(2)E
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv84751
Title:
when disable IPDT of interface at 3850, ping failed
Status: *
Other
Severity: *
6 Enhancement
Description:

Symptom:
when disable IPDT of interface at 3850, ping failed.

Conditions:
1.disable IPDT of interface at 3850
2.there is QOS related config at interface of 3850

Workaround:
1.no QOS config at interface of 3850
OR
2.ip device tracking probe delay 10 at 3850

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCui42745
Title:
GUI/CLI access to Cat3850 in spite of "no wireless mgmt-via-wireless"
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Wireless client can telnet/ssh/http/https to Cat3850 even though "no wireless mgmt-via-wireless" is configured.

Conditions:
100% reproducible

Workaround:
Apply ACL policies on wlan to block ssh/telnet/http access to each of the IP interfaces defined on the switch or controller.

ip access-list extended no_mgmt
deny tcp any host X.X.X.X eq www
deny tcp any host X.X.X.X eq 22
deny tcp any host X.X.X.X eq telnet
permit ip any any

wlan JJwireless 1 JJwireless
client vlan 100
ip access-group no_mgmt
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
no shutdown

* X.X.X.X is 3850/5760's wireless management interface address.

Further Problem Description:

Last Modified:
29-AUG-2015
Known Affected Releases:
15.0SID
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论