Cisco Blog » The Platform

2015年9月1日星期二

Cisco Notification Alert -Cisco CRS Series Core Router-01-Sep-2015 16:53 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - Carrier Routing System

Title:
End-of-Sale and End-of-Life Announcement for the Cisco CRS-1 16-Slot Line Card Chassis Components and Accessories
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco CRS-1 16-Slot Line Card Chassis Components and Accessories. The last day to order the affected product(s) is December 15, 2015. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
18-AUG-2015

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for Carrier Routing System

Product Name:
CRS-1 Multishelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS Line Card Chassis Enhanced
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Multi)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Multi)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Multi)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Multi)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X 16-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 16-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-3 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Fabric Card Chassis
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Fabric Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Fabric Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Fabric Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Fabric Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 4-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X 8-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 Multishelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Line Card Chassis
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 4-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X Multishelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 4-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X 16-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-3 8-Slot Single-Shelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Multi)
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X Multishelf System
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Dual)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Dual)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Dual)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Dual)
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 Line Card Chassis (Dual)
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-X 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-X 8-Slot Single-Shelf System
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 8-Slot Line Card Chassis
Software Type:
IOS XR Software Manager
Release Version:
3.0
Alert Type:
New File
File Name:
csm-3.0.zip
File Description:

CSM 3.0

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.2.4
Alert Type:
New File
File Name:
hfr-px-4.2.4.CSCuu15375.tar
File Description:

Hitless/Optional SMU, SNMP polling failures

File Release Date:
04-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.4
Alert Type:
New File
File Name:
hfr-px-5.1.4.CSCus65267.tar
File Description:

Hitless/Recommended SMU, ICMP packets dropped on CRS FP-X

File Release Date:
26-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
hfr-px-5.1.3.CSCus62455.tar
File Description:

Reload/Recommended SMU, Umbrealla DDTS for devc-vty crash

File Release Date:
17-AUG-2015

Software Updates for Carrier Routing System

Product Name:
CRS-1 16-Slot Line Card Chassis
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.2
Alert Type:
New File
File Name:
hfr-px-4.3.2.CSCur25858.tar
File Description:

Reload/Recommended SMU,Cisco IOS XR Software Malformed SNMP Packet DoS Vulnerability

File Release Date:
26-AUG-2015
Find additional information in Software Downloads index.

Known Bugs - Carrier Routing System

Alert Type:
Updated *
Bug Id:
CSCuv00287
Title:
Fixes for mpg-dev collapse 23/06/15
Status:
Fixed
Severity:
1 Catastrophic
Description:

The bug occurred in a development lineup and so was never released to any customers.

Last Modified:
07-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv23745
Title:
nv_optical_satmgr crash seen on configuring satellite on Panini
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
RP/0/RP0/CPU0:ios#RP/0/RP0/CPU0:Jan 21 00:16:14.138 : nv_optical_satmgr[1117]: %PKT_INFRA-ICPE_OWNER_CORE-3-DLL_OPEN_FAILURE : Failed to successfully open dependent DLL and load necessary symbols. DLL name: libcontroller_otn_odu_MA.dll. DLL initialization function: icpe_ma_dll_init. Error: libeth_intf_ea_plat_api.so: cannot open shared object file: No such file or directory. Process is unable to run and will exit

Above message continuously seen

Conditions:
Configure satellite on Panini

Workaround:
none

Further Problem Description:

Last Modified:
13-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.11i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv79703
Title:
Deregistration failed after proc restart smartlicserver
Status:
Other
Severity:
2 Severe
Description: *

Symptom:
Occasionally right after proc restart smartlicserver, the license de-registration will fail, then re-registration force can work, but it still cannot bring the router back to production mode, it stays in DEMO mode (traffic limit applies).

RP/0/RP0/CPU0:ott-ss-dt-16A-uut#proc restart smartlicserver
RP/0/RP0/CPU0:Aug 13 22:04:44.372 UTC: sysmgr_control[69388]: %OS-SYSMGR-4-PROC_RESTART_NAME : User root (con0_RP0_CPU0) requested a restart of process smartlicserver at 0/RP0/CPU0
%SMART_LIC-2-PLATFORM_ERROR:Platform is Not Registered to send Event SmartAgentPlatformAgentGracefulTerminate
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#license smart deregister

Error: License command "license smart deregister " failed.
Smart Agent not registered
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#RP/0/RP0/CPU0:Aug 13 22:05:15.050 UTC: smartlicserver[125]: %HA-CHKPT_BASIC-7-WARNING : Warning: chkpt_mapkey called with invalid table id 40001e28: : 0 : smartlicserver : (PID=16191) : -Traceback= 7f186bfe143f 7f1873421d58 7f1873448317 7f187342c438 7f187342d478 7f1873424c22 7f1873424f64 7f187342560a 7f1873425821 7f1873425c0b 7f187342d047 7f187342d613 7f186bfe20a0 7f18726840e5 7f1873ae2c38 7f1873af4b3e
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#license smart register id MzQyZDk1OTQtMzJmNy00MTRjLTljZjMtYWQ0ZDRjMWM1ZDY2LTE0NDE4NTMz%0ANzM3MDB8eTE4RWNPZnM2QzhGamVIZ1NQcjZTNDY3OFFySFVJTC9QUDd5WWpD%0AZmdDaz0%3D%0A force

License command "license smart register idtoken " completed successfully.
Registration process is in progress. Use the 'show license status' command to check the progress and result
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license platform summary
Current state: DEMO

Collection: LAST: (disabled)
NEXT: (disabled)
Reporting: LAST: (disabled)
NEXT: (disabled)

Count
Feature/Area Entitlement Last Next
================ =============================================== ==== ====
System Product: Right to Use 1 0
System Foundation: IP/MPLS Premium (per 1 Gbps) 106 0
System Feature: QoS (per 1Gbps) 107 0

RP/0/RP0/CPU0:ott-ss-dt-16A-uut#

Conditions:
occasionally process restart smartlicserver

Workaround:
The fix SMU is available.

Further Problem Description:
N/A

Last Modified:
28-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv89314
Title:
pre-req needed while supersede is included
Status:
Open
Severity:
2 Severe
Description:

Symptom:
a pre-requisite is asked for during installation but its supersede is included.

Conditions:
for instance with:
CSCuv27556 needs CSCuv27376, but CSCuv27376 is superceded by CSCuv09734.

Workaround:
install the smu's you want via a tarball to pacify the prereq condition in this example scenario

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv47592
Title:
PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE error seen on Arwen Fia_driver
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE error seen on Arwen Fia_driver

Conditions:

Workaround:
None

Further Problem Description:
With following xspeed image , After sometime of successful traffic flow through L2vpn xconnect on Arwen LC , following interrupt errors are seen for Arwen fia_driver .
With this , now traffic drops are seen even though all interfaces & xconnects are up.

LC/0/LC0:Mar 19 05:56:57.672 : fia_driver[237]: %PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE : fia[2]: A config-err error has occurred causing packet drop transient. CMIC.CMIC_CMC0_IRQ_STAT4.IRE.Interrupt_Register.ErrorBadReassemblyContext
LC/0/LC0:Mar 19 06:02:03.813 : fia_driver[237]: %PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE : fia[2]: A config-err error has occurred causing packet drop transient. CMIC.CMIC_CMC0_IRQ_STAT4.IRE.Interrupt_Register.ErrorBadReassemblyContext
LC/0/LC0:Mar 19 06:07:09.955 : fia_driver[237]: %PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE : fia[2]: A config-err error has occurred causing packet drop transient. CMIC.CMIC_CMC0_IRQ_STAT4.IRE.Interrupt_Register.ErrorBadReassemblyContext
LC/0/LC0:Mar 19 06:12:16.100 : fia_driver[237]: %PLATFORM-CIH-7-ASIC_ERROR_REPROG_RESOURCE : fia[2]: A config-err error has occurred causing packet drop transient. CMIC.CMIC_CMC0_IRQ_STAT4.IRE.Interrupt_Register.ErrorBadReassemblyContext
LC/0/LC0:Mar 19 06:14:04.368 : fia_driver[237]: %PLATFORM-CIH-2-ASIC_ERROR_PON_RESET : fia[2]: A config-err error has occurred causing packet drop transient. CMIC.CMIC_CMC0_IRQ_STAT4.IRE.Interrupt_Register.ErrorBadReassemblyContext Threshold has been exceeded
0/RP0/ADMIN0:Mar 19 06:14:04.978 : sfe_driver[2827]: %PLATFORM-CIH-5-ASIC_ERROR_SPECIAL_HANDLE : sfe[1]: A link-err error has occurred causing packet drop transient. MAC_13.Interrupt_Register.MAC_13.Interrupt_Register2.RxLostOfSyncCh1 on link 0/FC0/1/53

Last Modified:
30-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv95696
Title:
Packet cross connect are in Unresolved state after router reload.
Status:
Open
Severity:
2 Severe
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
Observed PCIE fatal error & FIA driver crash after router reload . OTN traffic resumed after restoring the configuration but all packet cross connects are down even though interfaces are up.

RP/0/RP0:ios#show l2vpn xconnect
Wed Aug 26 23:05:42.411 IST
Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved,
SB = Standby, SR = Standby Ready, (PP) = Partially Programmed

XConnect Segment 1 Segment 2
Group Name ST Description ST Description ST
------------------------ ----------------------------- -----------------------------
1 1 UR Te0/5/0/5 UR Te0/8/0/5 UR
----------------------------------------------------------------------------------------
2 2 UR Te0/5/0/8 UR Te0/8/0/8 UR
----------------------------------------------------------------------------------------
3 3 UR Te0/5/0/6 UR Te0/8/0/6 UR
----------------------------------------------------------------------------------------
4 4 UR Te0/5/0/7 UR Te0/8/0/7 UR
----------------------------------------------------------------------------------------
5 5 UR Te0/5/0/9 UR Te0/8/0/9 UR
----------------------------------------------------------------------------------------
6 6 UR Hu0/5/0/0 UR Hu0/8/0/0 UR
----------------------------------------------------------------------------------------
RP/0/RP0:ios#show interfaces brief
Wed Aug 26 23:05:37.370 IST

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Hu0/5/0/0 up up ARPA 1514 100000
Te0/5/0/5 up up ARPA 1514 10000000
Te0/5/0/6 up up ARPA 1514 10000000
Te0/5/0/7 up up ARPA 1514 10000000
Te0/5/0/8 up up ARPA 1514 10000
Te0/5/0/9 up up ARPA 1514 10000
Hu0/8/0/0 up up ARPA 1514 100000
Te0/8/0/5 up up ARPA 1514 10000
Te0/8/0/6 up up ARPA 1514 10000000
Te0/8/0/7 up up ARPA 1514 10000000
Te0/8/0/8 up up ARPA 1514 10000000
Te0/8/0/9 up up ARPA 1514 10000
Mg0/RP0/CPU0/0 admin-down admin-down ARPA 1514 1000000

Last Modified:
30-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv43544
Title:
Forwarding Performance Degardation seen on 531 - FCS Image
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Performance drop on Topaz to 110 MPPS

Conditions:
531 FCS image, slice 1 on Topaz connected to 20 ports of Traffic Generator

Workaround:
None

Further Problem Description:

Last Modified:
30-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.3.7i.BASE, 5.3.3.7i.FWDG
Alert Type:
New
Bug Id:
CSCuv79759
Title:
After xr reload licensce entitlement accounting not working
Status:
Other
Severity:
2 Severe
Description:

Symptom:
Before xr reload:
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license plat sum
Current state: PRODUCTION

Collection: LAST: Fri Aug 14 09:48:47 2015
NEXT: Fri Aug 14 09:49:47 2015
Reporting: LAST: Fri Aug 14 09:48:47 2015
NEXT: Fri Aug 14 09:49:47 2015

Count
Feature/Area Entitlement Last Next
================ =============================================== ==== ====
System Product: Right to Use 1 0
System Foundation: IP/MPLS Premium (per 1 Gbps) 105 0
System Feature: QoS (per 1Gbps) 108 0

RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license sum

Smart Licensing is ENABLED

Registration:
Status: REGISTERED
Smart Account: BU Production Test
Virtual Account: IOS-XRv 9000
Last Renewal Attempt: None

License Authorization:
Status: AUTHORIZED on Fri Aug 14 2015 09:49:22 UTC
Last Communication Attempt: SUCCEEDED
Next Communication Attempt: Sun Sep 13 2015 09:49:22 UTC

License Usage:
License Entitlement tag Count Status
---------------------------------------------------------------
IOS XRv 9000 License for 1 vRouter Instantiation(IOS-XRv-9000-vRouter-VM) 1 AUTHORIZED
IOS XRv 9000 1G throughput License for IP MPLS Premium package(IOS-XRv-9000-vRouter-IPMPLS-Premium-1G) 105 AUTHORIZED
IOS XRv 9000 1G Advance SW License for HQoS(IOS-XRv-9000-vRouter-QoS-1G) 108 AUTHORIZED
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#

Do the xr reload:
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#reload

Standby card not present or not Ready for failover. Proceed? [confirm]

Preparing system for backup. This may take a few minutes especially for large configurations.
Status report: node0_RP0_CPU0: START TO BACKUP
Status report: node0_RP0_CPU0: BACKUP HAS COMPLETED SUCCESSFULLY
[Done]

Proceed with reload? [confirm]

After reload:
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license plat sum
Current state: PRODUCTION

Collection: LAST: Fri Aug 14 09:53:50 2015
NEXT: Fri Aug 14 09:58:50 2015
Reporting: LAST: Fri Aug 14 09:53:50 2015
NEXT: Fri Aug 14 09:55:50 2015

Count
Feature/Area Entitlement Last Next
================ =============================================== ==== ====
System Product: Right to Use 1 0
System Foundation: IP/MPLS Premium (per 1 Gbps) 1 0

RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license plat sum
Current state: PRODUCTION

Collection: LAST: Fri Aug 14 09:58:50 2015
NEXT: Fri Aug 14 10:58:50 2015
Reporting: LAST: Fri Aug 14 09:59:47 2015
NEXT: Fri Aug 14 10:01:47 2015

Count
Feature/Area Entitlement Last Next
================ =============================================== ==== ====

RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show license plat sum
Current state: PRODUCTION

Collection: LAST: Fri Aug 14 09:58:50 2015
NEXT: Fri Aug 14 10:58:50 2015
Reporting: LAST: Fri Aug 14 09:59:47 2015
NEXT: Fri Aug 14 10:01:47 2015

Count
Feature/Area Entitlement

Last Modified:
31-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv54832
Title:
Invalid bucket not displayed in yellow for PRBS pm current counters
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Invalid bucket not displayed in yellow for PRBS pm current counters

Conditions:
Invalid bucket not displayed in yellow for PRBS pm current counters

Workaround:
NA

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv53616
Title:
OSPF crash on show ospf routes backup-path with > 255 ecmp paths
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OSPF process crashes when giving "show ospf route ... backup-path" CLI show command (or its equivalent XML request).

Conditions:
When the above command is given the there is any route which has more than 255 ECMP paths (actual ECMP paths would be either 64 or 128 based on the platform), but the topology has more than 255 candidate ECMP paths.

Workaround:
avoid using this show command when having such a topology.

Further Problem Description:
Code issue was there since when the LFA feature was introduced. Very very low probability of being hit since we support only maximum 128 ECMP paths so there is unlikely a topology which has more than these many links or ECMP paths in deployment.

Last Modified:
31-AUG-2015
Known Affected Releases:
4.2.0.ROUT
Known Fixed Releases: *
6.0.0.10i.ROUT
Alert Type:
Updated *
Bug Id:
CSCun09273
Title:
NG:MLD Restart -Transient traffic loss. Premature route deletion in mrib
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Transient IPv6 traffic loss

Conditions:
MLD Restart

Workaround:
NA

Further Problem Description:
NA

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2.11i.MCAST, 5.2.2.2i.MCAST, 5.3.0.1i.MCAST
Alert Type:
Updated *
Bug Id:
CSCun20056
Title:
NG - mrib crash on standby @ mrib_encap_db_id_tree_insert
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
MRIB Crash

Conditions:
SMU activation

Workaround:
NA

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2.11i.MCAST, 5.2.2.2i.MCAST, 5.3.0.1i.MCAST
Alert Type:
New
Bug Id:
CSCuw02017
Title:
New stats FPGA to be integrated into XR image for EDVT.
Status:
Open
Severity:
2 Severe
Description:

Symptom:
There is no XR support for the stats fpga hence need stats FPGA to be integrated into XR image for EDVT.

Conditions:

Workaround:

Further Problem Description:
There is no XR support for the stats fpga hence need stats FPGA to be integrated into XR image for EDVT.

Last Modified:
31-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv92635
Title: *
complete traffic drop through l2vpn xconnect , ovf drops are seen on FIA
Status:
Open
Severity:
2 Severe
Description:

Symptom:
complete traffic drop through l2vpn xconnect with EDVT2 image.

Conditions:

Workaround:

Further Problem Description:
I power cycled the chassis after cleaning all configuration. Now there was no issue is LANPHY interface creation & they came up even if it took some time to come up.
But now there is complete traffic drop through l2vpn xconnect.

With further debugging , I could see there are OVF traffic drop in FIA

RP/0/RP1:ios#show controllers fia statistics instance 3 location 0/lc1 | i drop
Mon Aug 24 16:33:38.387 IST
Rx pkt discard drops(IQM) : 2195202407 4771736697(ovf)

Last Modified:
31-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw02231
Title:
FIA is in Down state for Arwen LC post router relaod/PC.
Status:
Open
Severity:
2 Severe
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
| 0/0/0 | 0| 0| NA | NA | DN | NA |NONE |NORST | 0| 0|Fabric|
| 0/4/0 | 4| 1| NA | fia| UP | UP |NRML |PON | 1| 0|Fabric|
| 0/5/0 | 5| 0| NA | NA | UP | DN |NONE |Node Dn| 1| 0|Fabric|

sysadmin-vm:0_RP0# show controller fabric fsdb-pla rack all
Sun Aug 30 14:48:56.774 UTC
Description:
planes : p0-p(3|5)
plane mask : Asic # 0-5
Asic value 1: destination reachable via asic
.: destination unreachable via asic
x: asic not connected to LC (for S3)
-: plane not configured (for S2) or asic missing
Rack: 0, Stage: s123
=============================
Destination p0 p1 p2 p3 Reach-mask Oper Up
Address mask mask mask mask links/asic links/asic
Fabid(R/S/A) 012345 012345 012345 012345 Mn/Mx Total Mn/Mx Total
-------------------------------------------------------------------
8(0/8/0) 111 111 111 111 3/3 36 15/15 180
5(0/5/0) down

Sun Aug 30 20:19:30 IST 2015 Compressing show tech output
Show tech output available at 0/RP0 : /harddisk:/showtech/showtech-fabric-2015-Aug-30.201551.IST.tgz
++ Show tech end time: 2015-Aug-30.201931.IST ++
RP/0/RP0:ios#

Compressing show tech output
Show tech output available at /misc/disk1//showtech/showtech-fabric-admin-2015-Aug-30.144917.UTC.tgz
Please collect show tech-support ctrace in addition to any sysadmin show-tech-support collection
++ Show tech end time: 2015-Aug-30.145142.UTC ++
aiting for gathering to complete
.tar: /opt/cisco/calvados/etc/calvados/hostos_pkg/hostos_pkg: Cannot stat: No such file or directory
tar: Error exit delayed from previous errors

Compressing show tech output
Show tech output available at /misc/disk1//showtech/showtech-ctrace-admin-2015-Aug-30.145150.UTC.tgz
++ Show tech end time: 2015-Aug-30.145316.UTC ++
sysadmin-vm:0_RP0#

Last Modified:
31-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw02136
Title:
Cannot ping IPv6 Global Address but can ping Link-Local ;
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Link-Local ping Passes to the peer. Global pings fail. Once link-local pings pass then we are able to ping the global.

Conditions:
Interop between XR and IOS or IOS---L2 device--XR ; not seen on XR-XR so far

Workaround:
Ping Link-local adress of the peer to get the global pings working.

Further Problem Description:
CRS 5.1.3 cannot ping IPv6 peer's Global address. This can only ping the link-local address of the peer. However once we ping the link-local address of the peer; then we can initiate the pings to the global address.

Also other possible scenario is when we execute extended pings with src and destination as peer's global address. THis ping fails however the global v6 ping will work right after this ping.

Current topology:
---------------------

GSR------TDM circuit-------ALU---------Ethernet----------CRS

Might be seen on other Interop's as well.

On the CRS debug it looks like there is no issue as we send the NS and NA messages with link-local info.

Bottom line Issue":
----------------------
Node does not send Link-Local info in a Neighbor Advertisement packet.

There is a problem in the 513 code base because of which ND is not sending NA with Link-local information when ipv6 on the link comes up. This was changed in 510 during bundle scale change in ND.


ALU Debug:
=========

When CRS is on 5.1.3 failed case:

1 2015/08/27 08:29:42.84 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT (DAD)
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101010355 Sap 10/1/2:355
:: -> ff02::1:ff9f:e1a6
Type: Neighbor Solicitation (135)
Code: No Code (0)
Tgt Addr: fe80::ca4c:75ff:fe9f:e1a6
"

2 2015/08/27 08:29:43.84 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT (DAD)
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101010355 Sap 10/1/2:355
:: -> ff02::1:ff00:2
Type: Neighbor Solicitation (135)
Code: No Code (0)
Tgt Addr: 28:2:2::2
"

3 2015/08/27 08:29:43.84 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT *******RA sequence before NA"****
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101010355 Sap 10/1/2:355
fe80::ca4c:75ff:fe9f:e1a6 -> ff02::1
Type: Router Advertisement (134)
Code: No Code (0)
"

4 2015/08/27 08:29:44.85 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101010355 Sap 10/1/2:355
28:2:2::2 -> ff02::1
Type: Neighbor Advertisement (136)
Code: No Code (0)
Tgt Addr: 28:2:2::2
Flags : Router Override
Option : Tgt Link Layer Addr c8:4c:75:9f:e1:a6
"

5 2015/08/27 08:29:59.85 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101010355 Sap 10/1/2:355
fe80::ca4c:75ff:fe9f:e1a6 -> ff02::1
Type: Router Advertisement (134)
Code: No Code (0)

When CRS is On 4.1.0:

77 2015/08/27 11:56:18.19 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101020355 Sap 10/1/2:553
fe80::ca4c:75ff:fe9f:e1a6 -> ff02::1 <<< expected
Type: Neighbor Advertisement (136) <<<< NA from CRS to ALU.
Code: No Code (0)
Tgt Addr: fe80::ca4c:75ff:fe9f:e1a6 <<< to be sent to CRS's own
Flags : Router Override
Option : Tgt Link Layer Addr c8:4c:75:9f:e1:a6
"

78 2015/08/27 11:56:18.19 EDT MINOR: DEBUG #2001 Base IPIPE: ICMP6_PKT
"IPIPE: ICMP6_PKT:
ICMP6 ingressing on Svc 1101020355 Sap 10/1/2:553
:: -> ff02::1:ff00:2
Type: Neighbor Solicitation (135)
Code: No Code (0)
Tgt A

Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv79851
Title:
Resource state is not updated for ODG members.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Resource state of ODU member of odu-group controller is always displayed as open-connected after successful cross connection.

Conditions:
Create an odu-group controller and cross connect it with any client odu. Check its state using show cli "show controllers odu r/s/i/p xc. Also delete the cross connection and then check resource state using above CLI.

Workaround:
None

Further Problem Description:
After successful creation of cross connection, Resource state is still open-connected. Also after deleting the cross connection, resource state is displayed as odu resource free which is wrong.

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv62976
Title:
GR helper reconnect fails because CRS sends TCP FIN to GR helper
Status:
Open
Severity:
2 Severe
Description:

Symptom:
CRS is connected to XRS(ALU) through L2VPN.
CRS sends TCP FIN to the other after process restart and CRS sends LDP initi message.
There was no packet drop between CRS and CRS in our test bed because CRS doesn't reset LDP session after receiving TCP FIN.
But in the customer site, XRS(ALU is always GR helper) sends RST and reset the ssesion after receiving FIN.
So the packete drops happens.

Conditions:
NSR/Graceful restart of OSPF/NSR is on.

Workaround:
none

Further Problem Description:

1. GR was disconnected after process mpls_ldp restart.
2. rcv_buffer_full was seen.

RP/0/RP0/CPU0:NER5#process restart mpls_ldp
Tue Aug 4 16:02:07.586 JST

RP/0/RP0/CPU0:Aug 4 16:02:09.916 JST: mpls_ldp[1035]: DBG-GR[1], Nbr(2.2.2.2:0): INIT msg towards peer (Reconnect:180000 msec, Recovery:358194 msec)
RP/0/RP0/CPU0:Aug 4 16:02:11.885 JST: mpls_ldp[1035]: %ROUTING-LDP-5-NBR_CHANGE : Neighbor 2.2.2.2:0, DOWN (AToM requested targeted session to existing non-AToM peer)
RP/0/RP0/CPU0:Aug 4 16:02:11.885 JST: mpls_ldp[1035]: DBG-GR[1], Nbr(2.2.2.2:0): ldp_gr_process_nbr_disconnected
RP/0/RP0/CPU0:Aug 4 16:02:11.886 JST: syslog_dev[91]: tcp[403]: S 1706 ms -FA--- SEQ 2032638904 ACK 2200226975 LEN 0 WIN 15962 URG 0
RP/0/RP0/CPU0:Aug 4 16:02:11.887 JST: tcp[403]: [t18] Failed at queuing packet to socket's rcv buffer for pcb 0x102276cc (so: 0x10203e20), socket type 1, rcv_buffer_full ts is updated to 67080
RP/0/RP0/CPU0:Aug 4 16:02:11.888 JST: tcp[403]: [t18] tcp_update_rcv_queue_full_ts: pcb 0x102276cc, (so: 0x10203e20), rcv_buffer_full ts 67080 is kept unchanged

RP/0/RP0/CPU0:NER5#sho mpls ldp graceful-restart
Tue Aug 4 15:16:40.038 JST

Forwarding State Hold timer : Running (329 sec remaining)
GR Neighbors : 2

Neighbor ID Up Connect Count Liveness Timer Recovery Timer
--------------- -- ------------- ------------------ ------------------
2.2.2.2 Y 2 Not running 336 sec remaining
4.4.4.4 Y 1 -

Last Modified:
05-AUG-2015
Known Affected Releases:
4.2.4.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh15325
Title:
LDP GR helper interop: Non-zero Recovery time be sent on local triggers
Status:
Fixed
Severity: *
2 Severe
Description:

Symptom:
Traffic loss is seen when LDP GR session is reset under different triggers. The loss occuring on either direction (inbound and outbound of the router of trigger)

Conditions:
The GR peer is operating in helper-mode. There are two reasons/conditions for the traffic hit:
a) Outbound loss: IOSXR LDP is cleaning up the GR state of the "helper" peer immediately even for locally triggered resets.
b) Inbound loss: Due to (a), IOSXR treats the reconnecting session as NEW GR session and sends recovery time of ZERO, which forces the helper peer to delete ALL our state immediately post reconnection.

This behavior exists since early days of LDP GR implementation in IOS-XR.

Workaround:
None.

Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.1.MPLS
Known Fixed Releases:
4.3.2.26i.MPLS, 4.3.2.99i.BASE, 5.0.1.99i.BASE, 5.1.0.16i.FWDG, 5.1.0.16i.MPLS
Alert Type:
Updated *
Bug Id:
CSCtx03546
Title:
Cisco IOS XR Software Crafted IPv6 Packet DoS Vulnerability
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet.

The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition.

Cisco has released free software updates that address this vulnerability. There is no workaround that mitigates this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150611-iosxr

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2015-0769 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.1.LC
Known Fixed Releases:
4.2.1.15i.FWDG, 4.3.0.2i.FWDG, 5.1.1, 5.1.11, 5.1.12, 5.1.2, 5.1.3, 5.1.4, 5.2.0, 5.2.1
Alert Type:
Updated *
Bug Id:
CSCth44147
Title:
NetIO Process crashes when generating specific IP packet
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

Cisco IOS XR Software Releases 3.8.3, 3.8.4, and 3.9.1 are affected by a
vulnerability that an unauthenticated, remote user can trigger by
sending specific IP version 4 (IPv4) packets to or through an affected device.

Successful exploitation could cause the NetIO process to restart. Under a
sustained attack, the Cisco CRS Modular Services Card (MSC) on a Cisco
Carrier Routing System (CRS) or a Line Card on a Cisco 12000 Series Router or
Cisco ASR 9000 Series Aggregation Services Router will reload.

Cisco has released free Software Maintenance Units (SMU) that address this
vulnerability.

There are no workarounds for this vulnerability.

This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20110525-iosxr.shtml

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The
Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2011-0943 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at
the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
06-AUG-2015
Known Affected Releases:
3.8.3.BASE, 3.8.4.BASE, 3.9.1.BASE, 3.9.2.BASE, 4.0.0.BASE
Known Fixed Releases:
3.9.2.19i.BASE, 3.9.3, 4.0.0.23i.BASE, 4.0.1, 4.0.1.3i.BASE, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.1.0.4i.BASE
Alert Type:
Updated *
Bug Id:
CSCtn40586
Title:
Utility Find Command Issue
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
It is possible for an unprivileged authenticated user to invoke a root-privileged system shell via the
utility find command.

Conditions:
Attacker needs to be authenticated in order to successfully invoke root-privileged system shell.

Workaround:
Use command authorization to only allow authorized users to invoke certain commands. The AAA authorization feature is used to determine what a
user can and cannot do. When AAA authorization is enabled, the network access server uses information retrieved from the user's profile, which is
located either in the local user database or on the security server, to configure the user's session. Once this is done, the user is granted
access to a requested service only if the information in the user profile allows it.

The aaa authorization command with the keyword commands attempts authorization for all EXEC mode commands, including global configuration
commands, associated with a specific privilege level. Because there are configuration commands that are identical to some EXEC-level commands,
there can be some confusion in the authorization process. Using no aaa authorization config-commands stops the network access server from
attempting configuration command authorization.

For more information about command authorization visit:
http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_cfg_authorizatn_ps6441_TSD_Products_Configuration_Guide_Chapter.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/6.5:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2011-2069 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.1.BASE
Known Fixed Releases:
4.1.1.18i.BASE, 4.1.1.19i.BASE, 4.2.0.3i.BASE
Alert Type:
Updated *
Bug Id:
CSCtr62456
Title:
Path Traversal possible to filesystem of other SDR nodes
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
Cisco IOS XR contains a directory traversal vulnerability that allows for arbitrary file access.
An authenticated attacker may be able to exploit this issue to access sensitive information which could be leveraged to launch subsequent attacks.

Conditions:
Default configuration.

Workaround:
There are no workarounds to mitigate this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/6.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2012-1343 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.1.BASE, 5.0.0.BASE
Known Fixed Releases:
4.2.1, 4.2.1.8i.BASE, 4.2.2, 4.3.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCts14887
Title:
ingress fragmented GRE packet cause metro/pogo crash
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Metro crash, generating CRC errors reported via ingressQ and cpuctrl:
%FABRIC-INGRESSQ_DLL-4-ERR_ASIC_CRC
%PLATFORM-CPUCTRL-3-HW_DETECTED_ERROR_PORT
Asic-scan will generate dumps for the metro crash.

Conditions:
Fragmented GRE packets are received on a netflow enabled interface. The GRE packets must match
an existing and configured tunnel.

Workaround:
avoid GRE frag with ip mtu on tunnel interface on remote hand.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/5.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2011-3283 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.9.1.FWDG
Known Fixed Releases:
4.0.4.15i.FWDG, 4.1.2.11i.FWDG, 4.2.0.15i.FWDG
Alert Type:
Updated *
Bug Id:
CSCty50126
Title:
Privilege escalation through exec pipeline commands
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
Cisco IOS XR contains a vulnerability that may allow a local, authenticated
unprivileged attacker to access
administrative resources and elevate privileges.

Conditions:
Default configuration. This can only be triggered by a local authenticated
user. The attacker must have an account on the system.

Workaround:
There are no workarounds that mitigate this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The
Base and Temporal CVSS scores as of the time of evaluation are 6.6/5.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:U/RC:C&version=2.0

CVE ID CVE-2012-1347 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at
the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases:
4.2.3.29i.BASE, 4.2.4.1i.BASE, 4.3.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCtj77748
Title:
RSVP stop process packets after receive specific malformed RSVP packets
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
MPLS Traffic Engineering fails with RSVP and TE_Control processes consuming high CPU.

Conditions:
Device configured with MPLS Traffic Engineering receive a specially crafted RSVP-TE packet.

Existing TE Tunnels will remain active with TE LSP state remaining.

However if there is a failure, teardown or re-route, to an existing TE LSP, the TE LSP will remain in an
UP state, potentially causing traffic black holing.

New TE tunnels will fail to establish.

CPU for RSVP and TE_Control could jump to high % usage, however this will not affect other processes on
the device.

Workaround:
If this is a one off occurance restart the RSVP process.

If this is due to crafted packets being sent at the device, configure RSVP prefix filtering, and then
restart the RSVP process.

Further Problem Description:

In IOS XR Versions 3.9.x and prior once the device has been affected, cli show commands for TE will not
work as expected.

In IOS XR Versions 4.0.0 and later, whilst the same problems exists as highlighted in the conditions
section, the cli show commands for traffic engineering will work correctly.

AV:N/AC:L/Au:N/C:N/I:P/A:P/E:F/RL:OF/RC:C

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS
scores as of the time of evaluation are 6.4/5.3:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2011-0927 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.0.MPLS
Known Fixed Releases: *
3.9.3.9i.MPLS, 4.0.2, 4.0.2.7i.MPLS, 4.0.3, 4.0.4, 4.1.0, 4.1.0.20i.MPLS, 4.1.1, 4.1.2, 4.2.0
Alert Type:
Updated *
Bug Id:
CSCtd64417
Title:
SSHv1 may leave /tmp/sshd_lock files
Status:
Fixed
Severity:
2 Severe
Description: *

Summary
Cisco IOS XR Software contains a vulnerability in the SSH application that may result in a denial of service condition when the SSH version 1 (SSHv1)
protocol is used. The vulnerability is a result of unremoved sshd_lock files consuming all available space in the /tmp filesystem.

Cisco has released free software updates that address this vulnerability.

A security advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20110525-iosxr-ssh.shtml
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2011-0949 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.6.2.BASE, 3.6.2.K9SEC
Known Fixed Releases:
3.8.3, 3.8.3.17i.K9SEC, 3.8.4, 3.9.1.16i.K9SEC, 4.0.0.3i.BASE, 5.1.1, 5.1.11, 5.1.12, 5.1.2, 5.1.3
Alert Type:
Updated *
Bug Id:
CSCuv09371
Title:
OIL is missing when Bundle-ether interface is shutdown
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OIL is missing in Outgoing List in mrib and pim topology table, which result in mcast traffic loss.

Conditions:
When PIM fragment packet is coming in other Bundle-Ether interfaces and Bundle-ether interface with no PIM Join is shutdown.

Workaround:
No shut Bundle-ether interface or process restart pifibm_server_rp

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
4.2.4.BASE
Known Fixed Releases: *
5.3.2.16i.BASE, 5.3.3.3i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCur25840
Title:
Traffic drop on link recovery with PSE drops in the egress direction
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic drop on bundle link restoration from a backup link

Conditions:
unshut of the primary link

Workaround:
None

Further Problem Description:
For ipv4 traffic outage, drops are reported as "MPLS remote next hop" and for ipv6 outage, drops are reported as "IPv6 L3LI drop".

Node 0/4/CPU0 Egress PSE Stats
--------------------------------

Punt Stats Punted Policed & Dropped
---------- ------ -----------------
Diagnostic 180 0
IPv6 L2LI punt 16 0

Drop Stats Dropped
---------- -------
IPv6 L3LI drop 1
MPLS remote next hop 317568

Debug Stats Count
----------- -----
IPv6 link-local packets 29
Pre route IPV6 pkt 19

RP/0/RP1/CPU0:DCMAR2#

Last Modified:
07-AUG-2015
Known Affected Releases:
4.3.3.BASE
Known Fixed Releases: *
5.3.2.13i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCut99726
Title:
continuous barrier error seen of Topaz S13 after upgrade to 29I
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Some fabric planes stayed in MCAST_DOWN state after image upgrade

Conditions:
As part of image upgrade, the router got reloaded. Once the router is boot-up, one of the LCC racks went for reload more than one time due to a continuous CCSQ ASIC reset in RP. After the 2nd reload, due to barrier errors the fabric bundle links started flapping but came up. However some of the S2 -> S3 stage links stayed down towards one of the CRS-X LCC racks. Hence the fabric planes stayed in MCAST_DOWN state.

It is observed that all the down links belong to a particular S2 ASICs which has all the S2 -> S3 links down to the affected rack S3. This led to the number of UP fabric bundle links being below the threshold, so the fabric bundle could not be declared as UP and hence the plane is MCAST_DOWN. The S13 fabric cards, where the fabric bundle links (S2 -> S3) are down, were continuously reporting the barrier errors.

Workaround:
Shutdown the fabric plane(s) which stayed in MCAST_DOWN state and reload the S2 cards belonging to that plane. Once the S2 cards are boot-up after reload, un-shut the corresponding fabric plane(s).

If more than one plane stayed in MCAST_DOWN state then follow the above step and recover the planes one by one.

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2.12i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv10275
Title:
SSTE: Traffic loss in l2vpn stream after switchover to transit router
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
During an NSR switchover, ISIS may originate an LSP that is missing the segment-routing adj-sid and prefix-sid sub-TLVs. This can cause a fallback to IP forwarding rather than segment routing.

Conditions:
The problem has only been seen when the ISIS lsp-gen-interval initial-wait is configured to a low value. It has not been observed with the default (50ms) initial delay value.

Workaround:
Remove the ISIS lsp-gen-interval line from the configuration to allow the default values to be used.

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
5.3.2.18i.ROUT, 5.3.3.3i.ROUT, 6.0.0.10i.ROUT
Alert Type:
Updated *
Bug Id:
CSCuv39537
Title:
(533-SSR3) sysbd_svr_local and ipv4_ma traceback seen on applying config
Status: *
Terminated
Severity:
2 Severe
Description:

Symptom:
sysdb and ipv4_ma traceback seen on config commit

Conditions:
not sure, last ran suite reload and did config after commit replace

Workaround:
may be reloading rtr, not sure

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu55051
Title:
lib replicator makes unnecessary message buffer copies
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
crash in sysdb_shared_sc during configuration

Conditions:
large config changes (example, extremely large RPL)

Workaround:
chunk config changes and commit individually

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
5.3.2.14i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu79258
Title:
dhcpd process crash when checkpointing data
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
dhcpd process crash.

Conditions:
The crash was seen on an IOS XR router running 5.2.2 and configured for dhcp proxy but it may apply to other IOS XR releases and other dhcp features than proxy.
The conditions will be revised once the root cause has been identified.
--
Issue is applicable from 511 onwards, but the severity will be seen only when 'lease-proxy' is enabled in dhcp proxy profile.
From 522 onwards, severity is high and seen in normal dhcp-proxy functionality itself.

Workaround:
None at this point.

Further Problem Description:
Root-cause : Memory leak in 'dhcpd' process.

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.3.2.14i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCus49973
Title:
All SFE link for Hy-phy LC are in operational down state.
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Line card fabric links might stay operationally down after router reload or LC reload.

Conditions:
You may see on one or more fabric links. Triggers include

1. Physical removal/insertion of line card.
2. Reload the router
3 Soft reload of line card.

Workaround:
Expected Resolution: This issue is under investigation.

Reproducibility (%): 5%

Further Problem Description:

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur69192
Title:
CSDL: Standby RSP rsvp process crashed after receiving malformed pkts
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:

A vulnerability in RSVP processing of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a reload of the RSVP process on an affected
device.

The vulnerability is due to improper parsing of a malformed RSVP packet. An attacker could exploit this vulnerability by sending a malformed RSVP packet to be
processed by an affected device. A successful exploit could allow the attacker to cause a reload of the RSVP process on the affected device.

Conditions:

Device configured for RSVP.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-0657 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
5.3.0.BASE
Known Fixed Releases:
5.2.2.SP1, 5.2.3.13i.MPLS, 5.2.4.1i.MPLS, 5.2.4.2i.MPLS, 5.3.0.16i.MPLS
Alert Type:
Updated *
Bug Id:
CSCur25763
Title:
FP-400G/4-100GbE LC Crash Dump when OIR
Status: *
Terminated
Severity:
2 Severe
Description:

Symptom:
OIR of FP-X (FP-400G) system crash dumps and does not restart LC.

Conditions:
OIR of FP-X

Workaround:
OIR of LC seemed to help restore the LC to operational condition, but not a viable workaround

Further Problem Description:

Last Modified:
11-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq42336
Title:
NCS6000 User passwords exposed from Shell via ssh
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A vulnerability in the command line interface (CLI) of the Cisco Network Convergence System (NCS) could allow an authenticated, remote attacker
to access sensitive information.

The vulnerability is due to insufficient data protection of sensitive information . An attacker could exploit this vulnerability by issuing
specific system commands on the affected device.

Conditions:
A user authenticated to an affected system running IOS-XR operating system.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.9/4.7:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2014-3342 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
5.0.1.BASE, 5.0.1.CE, 5.1.0.BASE, 5.2.0.BASE, 5.2.1.CE, 5.3.0.BASE, 5.4.0.ADMIN, 5.4.0.BASE, 6.0.0.BASE
Known Fixed Releases:
5.2.1.BASE, 5.2.2.24i.BASE, 5.2.3.8i.BASE, 5.3.0.8i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu98480
Title:
DWDM-XFP-C V02 wavelength not programmed on 14x10G linecard
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When configuring the wavelength on a tunable DWDM-XFP-C V02 on a 14x10GBE-WL-XFP, the configured wavelength is not always applied on the XFP, which is using the default lambda:

RP/0/RP0/CPU0:75TH2-CRSXX-01-CR#sh controllers dwdm 0/8/0/5 optics
WaveChannelNumber GMPLS = 0Configured = 71 Default = 84

Optics Status

Optics Type: 10G-TUNABLE-by-CHANNEL,
Wavelength Info: C-Band, MSA ITU Channel=84, Frequency=191.95THz, Wavelength=1561.826nm <<<< incorrect wavelength
Wavelength Owner: Hardware Default, ITU Channel: GMPLS Signaled=None, Configured=71, Hardware Default=84
TX Power = 1.49 dBm
RX Power = -21.19 dBm
RP/0/RP0/CPU0:75TH2-CRSXX-01-CR#

Conditions:
DWDM-XFP-C V02
14x10GBE-WL-XFP
IOS-XR 5.1.3

Workaround:
Restart the plim_xge process on the linecard carrying the optic:

process restart plim_xge location 0/x/CPU0

Linecard reload is another workaround. The wavelength is correctly applied.

However, new DWDM-XFP-C V02 insertion may not work.

Further Problem Description:

Last Modified:
13-AUG-2015
Known Affected Releases:
5.1.3.LC
Known Fixed Releases: *
5.3.2.19i.FWDG, 5.3.3.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCul63127
Title:
Cisco IOS XR SSH Disconnect Error Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in Cisco IOS XR Software could allow an "authenticated", remote attacker to cause a denial of service (DoS) condition.

The vulnerability is due to an error that could occur in the affected software when an SSH connection is disconnected from an affected device. An authenticated, remote attacker could exploit the vulnerability to cause the vty to become unreachable and cause further SSH or Telnet connections to the device to fail, resulting in a DoS condition.

Conditions:
Device running with default configuration running an affected version of software with
frequent access via SSH to the Cisco IOS XR router.

Workaround:
To restore SSH and TELNET access restart the ''devc-vty'' process from

Cisco IOS XR device console
.

Further Problem Description:
>
The Cisco IOS XR device console access is not affected.



PSIRT Evaluation:>
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are

4/3.3
:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:&version=2.0
C
CVE ID CVE-2015-4195 has been assigned to document this issue
.
Additional information on Cisco's security vulnerability policy can be found at the following URL
:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.ht


Last Modified:
13-AUG-2015
Known Affected Releases:
5.1.1.K9SEC
Known Fixed Releases: *
5.1.12, 5.1.12.1i.BASE, 5.1.2, 5.1.2.24i.BASE, 5.1.3.5i.BASE, 5.2.0, 5.2.0.22i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv38925
Title:
show operational MPLS_TE segmentRouting ... xml error if no igp area
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Will see an error in "show operational MPLS_TE segmentRouting ... xml" commands if
config for "router isis ring" is removed.
To use SRTE the router config is required so this error will not be hit very often

Conditions:
Need to remove all config for "router isis ring"

Workaround:
Do not remove the router config - it is required for SRTE

Further Problem Description:

Last Modified:
13-AUG-2015
Known Affected Releases: *
5.3.2.BASE, 5.3.3.MPLS
Known Fixed Releases:
6.0.0.10i.MPLS
Alert Type:
Updated *
Bug Id:
CSCut76127
Title:
[NCS4K] Memory leak in shelf_mgr on an idle testbed
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Shelf mgr process leaks memory continously in idle state

Conditions:
524 image on NCS6K

Workaround:
No workaround. Fixed in 525. 524 production smu available.

Further Problem Description:

Last Modified:
16-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.4.0.BASE
Known Fixed Releases: *
5.2.5.13i.BASE, 5.4.0.17i.BASE, 6.0.0.7i.BASE
Alert Type:
New
Bug Id:
CSCuv67312
Title:
(533-SSR3) few ospf neighbor went down after router reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Router reload, ospf few neibhors went down

Conditions:
router reload,rack oir

Workaround:
process restart ospf

Further Problem Description:

Last Modified:
17-AUG-2015
Known Affected Releases:
5.3.2.BASE, 5.3.3.BASE
Known Fixed Releases:
5.3.2.20i.FWDG
Alert Type:
New
Bug Id:
CSCuv71510
Title:
OTN terminated interface stays in DOWN state in back to back connection.
Status:
Open
Severity:
2 Severe
Description:

Symptom:
OTN terminated interface stays in DOWN state in back to back connection.

Conditions:
When OTN termination is configured across ports of two different LC

Workaround:
none

Further Problem Description:
When OTN termination is configured across ports of two different LC , on one side created interface stays in "DOWN" state.

RP/0/RP0:ios#show interfaces brief
Mon Aug 10 04:40:25.588 UTC

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Te0/3/0/2 down down ARPA 1514 10000 >>>>> in Down state
Te0/6/0/11 up up ARPA 1514 10000
Mg0/RP0/CPU0/0 up up ARPA 1514 1000000

P/0/RP0:ios#show running-config
Mon Aug 10 04:40:47.980 UTC
Building configuration...
!! IOS XR Configuration version = 6.0.0.06I
!! Last configuration change at Mon Aug 10 01:20:13 2015 by root
!
username root
group root-lr
group cisco-support
secret 5 $1$PHSU$oGi.V1n73x6Uj4WBnH0GH0
arp vrf default 10.77.136.1 0000.0c9f.f0e5 ARPA
interface MgmtEth0/RP0/CPU0/0
ipv4 address 10.77.136.61 255.255.255.0
interface TenGigE0/3/0/2
interface TenGigE0/6/0/11
controller Optics0/3/0/2
port-mode Otn framing opu2
controller Optics0/6/0/11
port-mode Otn framing opu2
controller ODU20/3/0/2
terminate ether mapping GfpF
controller ODU20/6/0/11
terminate ether mapping GfpF
router static
address-family ipv4 unicast
0.0.0.0/0 10.77.136.1
RP/0/RP0:ios# show version
Mon Aug 10 04:41:20.910 UTC

Cisco IOS XR Software, Version 6.0.0.06I
Copyright (c) 2013-2015 by Cisco Systems, Inc.

Build Information:
Built By : abhharih
Built On : Thu Jul 30 15:46:45 IST 2015
Build Host : bgl-ads-2296
Workspace : /nobackup/abhharih/xspeed-EFR-00000309666
Version : 6.0.0.06I
Location : /opt/cisco/XR/packages/

Last Modified:
17-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv81992
Title:
EDVT- 10G OTN traffic is not working
Status:
Open
Severity:
2 Severe
Description:

Symptom:
10G OTN traffic is not working

Conditions:
10G OTN traffic is not working

Workaround:
Power Cycle

Further Problem Description:

Last Modified:
18-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv62805
Title:
No stats support for L2-Subinterface of Arwen LC.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
No stats support for L2-Subinterface of Arwen LC.

Conditions:
When traffic flowing through the sub interface.

Workaround:

Further Problem Description:
We don't get input/output stats on L2subinterface & there are "0 " stats for all field , even though there is traffic flowing through.

RP/0/RP0:ios#show interfaces tenGigE 0/6/0/6.100 | i pac
Sun Aug 2 06:10:51.507 UTC
0 packets input, 0 bytes, 0 total input drops
Received 0 broadcast packets, 0 multicast packets
0 packets output, 0 bytes, 0 total output drops
Output 0 broadcast packets, 0 multicast packets

RP/0/RP0:ios#show interfaces tenGigE 0/6/0/6 | i pac
Sun Aug 2 06:11:10.728 UTC
30 second input rate 9275561000 bits/sec, 4529083 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec
30852238044 packets input, 7898172939416 bytes, 0 total input drops
Received 0 broadcast packets, 0 multicast packets
1121919058 packets output, 160641210756 bytes, 0 total output drops
Output 0 broadcast packets, 560953326 multicast packets

P/0/RP0:ios#show version
Sun Aug 2 06:18:58.413 UTC

Cisco IOS XR Software, Version 6.0.0.06I
Copyright (c) 2013-2015 by Cisco Systems, Inc.

Build Information:
Built By : abhharih
Built On : Thu Jul 30 15:46:45 IST 2015
Build Host : bgl-ads-2296
Workspace : /nobackup/abhharih/xspeed-EFR-00000309666
Version : 6.0.0.06I
Location : /opt/cisco/XR/packages/

cisco NCS-4000 () processor
cisco NCS-4000 () processor
System uptime is 2 hours, 16 minutes

Last Modified:
19-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv40032
Title:
IPv6 umbrella for BNG deployments on XR release 5.2.4
Status: *
Fixed
Severity:
2 Severe
Description:

Symptom:
This is an umbrella SMU for the following bug fixes:

CSCut40941 Sev2 [ipv6-ma ] SSTE:IPv6_ma crash with scale IPoE V6 session
CSCut42484 Sev2 [ipv6-nd ] After Rpfo seeing high CPU 25% for ipv6_nd while bringing up v4 sess
CSCus33478 Sev3 [ipv6-nd ] Router send bogus ipv6 address in IPV6 NA message to peer side
CSCuu74580 Sev2 [ipv6-nd ] Geo 532-9I:seeing dual partial-up on SLAVE with RPFOs

These fixes are highly recommended for BNG deployments on IOS XR release 5.2.4.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCek72920
Title:
When binding an existing leaf to existing PL, we always bind to tail
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

Cannot ping an address, which is reachable via recursion.
Getting HW/SW TLU1 mismatch under cef hardware detail

Conditions:

ECMP, recursion cef entry which is modified through specific steps.

Workaround:

clear cef linecard.
clear route doesn't work.


Further Problem Description:
This is introduced 3.3 for CRS and 3.5 for XR12000.

Last Modified:
20-AUG-2015
Known Affected Releases:
3.5.0.BASE
Known Fixed Releases:
3.3.4.3i.FWDG, 3.4.2.1i.FWDG, 3.5.0.11i.FWDG, 3.8.3, 3.8.4, 3.9.0, 3.9.1, 3.9.2, 3.9.3, 4.0.0
Alert Type:
New
Bug Id:
CSCuv71459
Title:
OTN terminated interface in DOWN state when connection is between LC.
Status:
Other
Severity:
2 Severe
Description:

Symptom:
OTN terminated interface in DOWN state when connection is between LC.

Conditions:
When OTN termination interfaces are connected between two diffrent LC ports.

Workaround:
none

Further Problem Description:
With following configuration , created OTN terminated interface stays in "DOWN" state .

RP/0/RP0:ios#show running-config
Mon Aug 10 02:57:09.468 UTC
Building configuration...
!! IOS XR Configuration version = 6.0.0.06I
!! Last configuration change at Mon Aug 10 01:20:13 2015 by root
username root
group root-lr
group cisco-support
secret 5 $1$PHSU$oGi.V1n73x6Uj4WBnH0GH0
arp vrf default 10.77.136.1 0000.0c9f.f0e5 ARPA
interface MgmtEth0/RP0/CPU0/0
ipv4 address 10.77.136.61 255.255.255.0
interface TenGigE0/3/0/2
interface TenGigE0/6/0/11
controller Optics0/3/0/2
port-mode Otn framing opu2
controller Optics0/6/0/11
port-mode Otn framing opu2
controller ODU20/3/0/2
terminate ether mapping GfpF
controller ODU20/6/0/11
terminate ether mapping GfpF
router static
address-family ipv4 unicast
0.0.0.0/0 10.77.136.1
end

RP/0/RP0:ios#show interfaces brief
Mon Aug 10 02:58:50.192 UTC

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Te0/3/0/2 down down ARPA 1514 10000 >>>>Interface in Down state.
Te0/6/0/11 up up ARPA 1514 10000
Mg0/RP0/CPU0/0 up up ARPA 1514 1000000

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv57687
Title:
Idle ssh passwd prompt caused kernel tracebk after 2min -sshd_child_hand
Status:
Open
Severity:
2 Severe
Description:

Symptom:
kernel traces printed on console when ssh client timeout (w/o entering password).

Conditions:
when ssh client opens connection and remains idle

Workaround:
None

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv46238
Title:
PM counters not reset after changing PRBS pattern
Status:
Open
Severity:
2 Severe
Description:

Symptom:
PM counters not reset after changing PRBS pattern

Conditions:
PM counters not reset after changing PRBS pattern on source-sink configured odu controller.
Works fine on source and sink odu controllers.

Workaround:
NA

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv81989
Title:
EDVT- 100G Ethernet traffic is not working
Status:
Open
Severity:
2 Severe
Description:

Symptom:
100G Ethernet traffic not working

Conditions:
100G Ethernet traffic not working

Workaround:
None

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv71322
Title:
RDM barrier design fix
Status:
Open
Severity:
2 Severe
Description:

Symptom:
After a hard reset of pat asic on CRS-X LC, we see that all v6 packets are dropped on ingress PSE if ACL if applied on interfacen

Conditions:
IPv6 ACL should be applied on the interface/subinterface

Workaround:
Reload the LC.

Further Problem Description:
This bug is not applicable to 53x lineup as the feature RDM Barrier Replay is not in this lineup.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCur10816
Title:
admin install verify package sync - errors reported ( USB Hang issue )
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
while running install operations like install verify packages, install operations failed on taiko LCs due to USB hang issue on taiko card

Conditions:
USB driver unable to receive interrupts from EHCI controller. It seems the driver misses the interrupt and hence failed to
ack the controller by clearing the status register.

Workaround:
self recovery

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
5.3.2.8i.BASE, 6.0.0.5i.BASE
Alert Type:
New
Bug Id:
CSCuh71374
Title:
Encap PE creates replicord for egress PE which is not sending join
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Leaf A-D is not removed by Egress-PE, when S-PMSI is removed from Ingress-PE

Conditions:
This issue happens when there are multiple S-PMSIs are announced by an Ingress-PE, with the same PMSI Tunnel Attribute (core-tree info). If all of them are withdrawn by the Ingress-PE, then the Egress-PE needs to remove the Leaf A-D routes for all of them. Whereas only one of them is withdrawn.

Workaround:
None

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
4.3.0.MCAST, 5.1.1.BASE
Known Fixed Releases:
5.1.1, 5.1.1.1i.MCAST, 5.1.11, 5.1.12, 5.1.2, 5.1.3, 5.1.4, 5.2.0, 5.2.0.1i.MCAST, 5.2.1
Alert Type:
New
Bug Id:
CSCuv46174
Title:
Call-home unable to download certificates
Status:
Open
Severity:
2 Severe
Description:

Symptom:
1. Call-home will not attempt to download certificates unless the URL begins with tools or some form of that. That is well understood. But even with a change made in a private image (added alpha server to the list). It was still not working because of 2.

2. The function PKI_trustpool_import_bundle is not getting overloaded in K9 image. Therefore, we also call the stub function instead and the cert is never downloaded, even with a fix to #1 above.

Conditions:

Workaround:
N/A

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv76318
Title:
ema_server_sdr leaks memory due to capi connection handling
Status:
Open
Severity:
2 Severe
Description:

Symptom:
ema_server_sdr leaks 2.5MB/hour w/o any trigger

Conditions:
router is idle

Workaround:
NA

Further Problem Description:
RP/0/RP0/CPU0:Aug 12 14:01:09.106 : ema-svr-sdr[213]: UPS: Connection open callback
RP/0/RP0/CPU0:Aug 12 14:01:09.106 : ema-svr-sdr[213]: AAL: EMA register request
RP/0/RP0/CPU0:Aug 12 14:01:09.108 : ema-svr-sdr[213]: AAL: Connect callback received
RP/0/RP0/CPU0:Aug 12 14:01:09.108 : ema-svr-sdr[213]: AAL: EMA thread unblocked successfully by semaphore after 1 ms
RP/0/RP0/CPU0:Aug 12 14:01:09.109 : ema-svr-sdr[213]: AAL: Resync callback received
RP/0/RP0/CPU0:Aug 12 14:01:09.110 : ema-svr-sdr[213]: AAL: Error from CAPI in resync MAC response callback:1
RP/0/RP0/CPU0:Aug 12 14:01:09.110 : ema-svr-sdr[213]: AAL: EMA thread unblocked successfully by semaphore after 1 ms
RP/0/RP0/CPU0:Aug 12 14:01:09.110 : ema-svr-sdr[213]: AAL: Cleaning up CAPI thread
RP/0/RP0/CPU0:Aug 12 14:01:09.110 : ema-svr-sdr[213]: AAL: Disconnect callback received
RP/0/RP0/CPU0:Aug 12 14:01:09.110 : ema-svr-sdr[213]: UPS: AAL registration failed: 'EMA AAL' detected the 'warning' condition 'An error occurred sending, receiving, or interpretting a message'

There is no mac-config, or interfaces. No config activity is done on the router as well.

Looking at the call flow, looks like below API is returning non-zero return code in file in spirit_xr/src/ema_aal_lib_capi.c

if (return_code == CAPI_SUCCESS) {
return_code = cidl_sm_resync_mac_addr_msg_get_status(msg);
}

Need input from shelfmgr team regarding this API and reason for this failure.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCua04401
Title:
unable to login after parser_server crash at parser_history_file_refresh
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
parser_server is not getting ready, blocked on hd_drv after crash
this prevents login via console or vty

Conditions:
undetermined yet

Workaround:
RP reload or RP switchover




Last Modified:
20-AUG-2015
Known Affected Releases:
4.0.3.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv68637
Title:
TOPAZ HQ:SFE ASIC reset on fabric card leading to card reload
Status:
Open
Severity:
2 Severe
Description:

Symptom:
One time SFE ASIC reset on Topaz HQ system is reloading the fabric card.
Expected: card should not go for reload in one time.

Conditions:
One time SFE ASIC reset on topaz HQ system.

Workaround:
NA

Further Problem Description:
One time SFE ASIC reset on Topaz HQ system is reloading the fabric card.
Expected: card should not go for reload in one time.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv77762
Title:
L2 Subinterface stat is not working on slot 6 due to available range 0-5
Status:
Open
Severity:
2 Severe
Description:

Symptom:
L2 Sub interface stat is not working on slot 6 due to available range 0-5

Conditions:
When LC is in slot 6.

Workaround:

Further Problem Description:
L2 Sub interface stats is not working on slot 6 due to available range 0-5.

RP/0/RP0:ios#show interfaces tenGigE 0/6/0/2.1 | i pac
0 packets input, 0 bytes, 0 total input drops
Received 0 broadcast packets, 0 multicast packets
0 packets output, 0 bytes, 0 total output drops
Output 0 broadcast packets, 0 multicast packets

RP/0/RP0:ios#show interfaces tenGigE 0/6/0/2.2 | i pac
0 packets input, 0 bytes, 0 total input drops
Received 0 broadcast packets, 0 multicast packets
0 packets output, 0 bytes, 0 total output drops
Output 0 broadcast packets, 0 multicast packets

RP/0/RP0:ios#show version
Thu Aug 13 05:12:26.150 UTC

Cisco IOS XR Software, Version 6.0.0.06I
Copyright (c) 2013-2015 by Cisco Systems, Inc.

Build Information:
Built By : abhharih
Built On : Tue Aug 11 14:28:58 IST 2015
Build Host : bgl-ads-2296
Workspace : /nobackup/abhharih/xspeed-EFR-00000309666
Version : 6.0.0.06I
Location : /opt/cisco/XR/packages/

cisco NCS-4000 () processor
cisco NCS-4000 () processor
System uptime is 31 minutes

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv61639
Title:
5.1.3+SP2: HSRP VIP ping fails after few minutes
Status:
Open
Severity:
2 Severe
Description:

Symptom:
ping to HSRP virtual IP fails after few min

Conditions:
This is observed in 5.1.3

Workaround:
None

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
5.1.3.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCue18938
Title:
G-Ether should always propagate link down events
Status:
Fixed
Severity:
2 Severe
Description:








Symptom:
Protected tunnel traffic may get transitioned onto a backup path even through no link flap of the interface associated with the primary path has been reported in the system.







Conditions:
This issue can very rarely be seen if the link flaps down then up for a very short time interval.





Workaround:
Configuring "carrier delay up 250" on the linecard Ethernet interfaces ensures that any link up events are delayed long enough to ensure that the link down flap will always be seen by the system but without affecting the time taken for FRR protection.




Further Problem Description:













Last Modified:
21-AUG-2015
Known Affected Releases:
3.7.0.BASE, 4.1.2.FWDG
Known Fixed Releases: *
5.1.3, 5.1.3.11i.BASE, 5.1.3.11i.FWDG, 5.1.4, 5.2.1.20i.BASE, 5.2.1.20i.FWDG, 5.2.2.8i.BASE, 5.2.2.8i.FWDG, 5.3.0.1i.BASE, 5.3.0.1i.FWDG
Alert Type:
New
Bug Id:
CSCuv37017
Title:
PCE created SRTE up when midpoint router is down
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Mid point node failure is not resulting in path failure . The tunnel remains remains up even with mid point router failure.

Conditions:
Mid point node or link failure of a multi-hop Segment routing TE tunnel

Workaround:

Further Problem Description:
Path validation fails for a PCE initiated tunnel

Last Modified:
22-AUG-2015
Known Affected Releases:
5.3.2.MPLS
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut47784
Title:
[NCS4K-2H-W] RTRV-OTL show OPR values in wrong way
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When RTRV-OTL command is executed, OPR values were being displayed improperly, with next lane data merging with the one before. Also rtrv-otl for specific fac was displaying invalid aid response.

Conditions:
On scapa node with DWDM LC and traffic up and running, execute RTRV-OTL command to retrieve optics lane data.

Workaround:
None

Expected Resolution: Will be given in later release after 5.2.4.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv34536
Title:
Issue in creating tengig port with GFPF termination on odu2 controller
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Issue in creating tengig port with GFPF termination on odu2 controller

Conditions:
Issue in creating tengig port with GFPF termination on odu2 controller

Workaround:

Further Problem Description:
For GFPF termination scenario ,we are facing following issue while bringing up the interface with ODU2 controller.

Ten gig gfpf terminated interfaces are not coming up whereas same is working for odu4 . We tried all possible workaround like commit replace followed by router reload & fresh config. Changed the port / pluggable on router but no result.

RP/0/RP0:ios#show interfaces brief
Wed Jul 15 04:54:24.047 UTC

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Hu0/6/0/0 up up ARPA 1514 100000
Hu0/6/0/0.100 up up 802.1Q 1518 100000
Hu0/6/0/0.200 up up 802.1Q 1518 100000
Te0/6/0/2 up up ARPA 1514 10000
Te0/6/0/2.10 up up 802.1Q 1518 10000
Te0/6/0/3 up up ARPA 1514 10000
Te0/6/0/3.20 up up 802.1Q 1518 10000
Te0/6/0/6 down down ARPA 1514 10000
Mg0/RP0/CPU0/0 admin-down admin-down ARPA 1514 1000000

controller ODU20/6/0/6
terminate ether mapping GfpF
!
controller Optics0/6/0/6
port-mode Otn framing opu2
!

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv69047
Title:
Version number is not Correct For xspeed lineup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Version number is not Correct Forxspeed lineup

Conditions:
Version number is not Correct

Workaround:
Correct Version

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.1.3.CE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu08526
Title:
NCS4K:TIM not getting cleared on NCS4K-24LR-O-S after removing SAPI.
Status:
Fixed
Severity:
2 Severe
Description:

NCS4K:TIM not getting cleared on NCS4K-24LR-O-S after removing SAPI.

Symptom:
TIM not getting cleared on NCS4K-24LR-O-S after removing SAPI TTI

Conditions:
OTU2 controller on NCS4K-24LR-O-S LC with 2-stage channelization with SAPI TTI as well as OS TTI on OTU2 controller.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv92836
Title:
LANPHY interface got deleted post power cycle with packet & otn config
Status:
Open
Severity:
2 Severe
Description:

Symptom:
LANPHY interface got deleted post power cycle with packet & otn config

Conditions:

Workaround:

Further Problem Description:
LANPHY interface got deleted post power cycle with packet & otn config on EDVT2 image.

ontroller Optics0/3/0/0
port-mode Ethernet-packet
!
controller Optics0/3/0/2
port-mode Ethernet-packet
!
controller Optics0/3/0/3
port-mode Ethernet-packet
!
controller Optics0/3/0/4
port-mode Ethernet-packet

RP/0/RP1:ios#show interfaces brief
Tue Aug 25 13:19:21.394 IST

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Hu0/5/0/0 up up ARPA 1514 100000
Te0/5/0/2 up up ARPA 1514 10000
Te0/5/0/3 up up ARPA 1514 10000
Te0/5/0/4 up up ARPA 1514 10000000
Te0/5/0/10 up up ARPA 1514 10000
Te0/5/0/11 up up ARPA 1514 10000
Mg0/RP1/CPU0/0 admin-down admin-down ARPA 1514 1000000

Last Modified:
26-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv65365
Title: *
Console stuck for almost 10 mins after XR reload
Status: *
Fixed
Severity:
2 Severe
Description: *

Symptom:Console may get stuck and take approximately 10 minutes to recover after IOS XR reload.

Conditions:Executing reload command at IOS XR console.

Workaround:N/A

More Info:



Last Modified:
26-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv13818
Title:
[NCS4K-2H-W] scapa_otn_dwdm_sanity dwdm_odu4_tti_send and expected
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

scapa_otn_dwdm_sanity dwdm_odu4_tti_send and expected

Conditions:

Configure TTI on ODU controller.
Execute show command

Workaround:

NO

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.12i.BASE, 6.0.0.12i.FWDG, 6.0.0.12i.MPLS
Alert Type:
New
Bug Id:
CSCuv67370
Title:
fabio_svr crashed on FP-140G
Status:
Open
Severity:
2 Severe
Description:

Symptom:
FP-140G gets reloaded.

Conditions:
Have a CRS chassis with FP-140G line card for any of the Line card slots.

Workaround:
None.

Further Problem Description:
fabio_svr process crash is also observed.

Below error logs also observed.

LC/3/3/CPU0:Jul 31 11:48:54.686 EST: pciesvr[69]:%PLATFORM-PCIE-2-ROOT_DEVICE_BUS_CRITICAL : PCI/PCIe Device:
bus/device/function 0/2/0 - Uncorrectable Fatal Error: Surprise Link Down
LC/3/3/CPU0:Jul 3111:48:54.686 EST: pciesvr[69]: %PLATFORM-PCIE-3-ERROR: Bringing down the board via Platform Fault Manager.
LC/3/3/CPU0:Jul 31 11:48:54.686 EST: pciesvr[69]:%PLATFORM-PCIE-6-ROOT_DEVICE_BUS_INFO :PCI/PCIe Device: bus/device/function 0/2/0 - Uncorrectable Non-Fatal Error: Unsupported Request
LC/3/3/CPU0:Jul 31 11:48:54.686 EST: pciesvr[69]: %PLATFORM-PCIE-3-PCI_BUS_ERROR : PCI/PCIe Device: bus/device/function 0/30/0 - PCI Baseline Error:Signaled Target Abort

Last Modified:
26-AUG-2015
Known Affected Releases:
5.1.3.CE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus24551
Title:
parser_server crash on 521
Status:
Fixed
Severity:
2 Severe
Description: *

Seeing parser_server crash on 5.2.1 while executing show running-config prefix-set prefix-setname | be?.
Issue is PI and easily reproducible on all XR platforms.

Symptom:
With the crash, other show commands with respect to bgp, cef were not available to be performed.
For Eg.
show cef, show bgp

Conditions:
show running-config prefix-set OPTION_C_PREFIX_SET | file tftp://223.255.254.254/vidgurur/exec_out_607197941/show_running-config_prefix-set_OPTION_C_PREFIX_SET

Workaround:
N/A

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
5.2.1.BASE, 5.2.3.BASE
Known Fixed Releases:
5.2.5.22i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu15375
Title:
SNMP polling failures in Release 4.2.4
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Slow response from MPLS TE MIBS

Conditions:
MPLS TE MIB Polling

Workaround:
Exclude MIBS from SNMP view, although this might not be applicable for most scenarios. Using a wildcard will block other MIBS as well.

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
4.2.4.BASE
Known Fixed Releases: *
5.3.2.21i.MPLS, 5.3.3.6i.MPLS, 6.0.0.12i.MPLS
Alert Type:
Updated *
Bug Id:
CSCun76735
Title: *
interface counters and ifmib stats on CHOCX spas delayed
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Serial and Multilink interfaces counters on channelized OC12 and OC48 SPAs are not updated with the expected frequency. In the failed state, the interface counters are updated once every 248 seconds.
In the working case interface statistics are are updated every 30 seconds.
The frequency of the SNMP IFMIB updates are also affected with the IFMIB statistics only being updated once every 248 seconds.

Conditions:
This issue affects interfaces hosted on the channelized SPAs (SPA-1XCHOC12/DS0, SPA-2XCHOC12/DS0 and SPA-1XCHOC48/DS3) on the XR12K and ASR 9000.
The trigger for the issue is not known.

Workaround:
None
Recovery Action: After the statistics collector is in the failed state a reload of the SPA will temporarily recover from the problem.

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
4.1.2.LC
Known Fixed Releases:
5.1.3.9i.BASE, 5.2.2.19i.BASE, 5.2.3.6i.BASE, 5.3.0.5i.BASE
Alert Type:
New
Bug Id:
CSCuv58313
Title:
Interfaces get invalid MAC addr if BP EEPROM has MAC addr blk size val 0
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Physical interfaces of PLIM gets assigned with invalid MAC address.

Conditions:
Have CRS with Backplane EEPROM which has MAC Address block size value as zero.

Workaround:
Interfaces can be assigned with manual unique MAC address to bring up.

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.1.4.BASE
Known Fixed Releases:
5.3.2.20i.BASE, 5.3.3.6i.BASE, 6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuo44710
Title:
Esd Process killed by SIGTERM when TGEN injects UNIcast pax w/ bad SA/DA
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
XR VM reload due to SDR HBLOSS.

The following error message is seen before the reload:

0/RP0/ADMIN0:Aug 11 11:53:42.174 GMT: esd[1880]: %INFRA-ESD-3-SWITCH_FDB_FAILURE : A forwarding database (FDB) operation failure was detected on the RP-SW control ethernet switch. In order to recover, the switch will be reset and the Ethernet Switch Driver process will restart
Conditions:
IOS-XR 5.2.1 is running on NCS6K

Workaround:
Not available.
Check the external devices connected to the MgmtEthernet if they are sending improper traffic.

More Info:
In IOS-XR 5.2.1 if 5 consecutive mac learning errors are received in a 10 second interval on the internal Ethernet switch it will be reset. This is causing the RP reboot.

Last Modified:
27-AUG-2015
Known Affected Releases:
5.2.1.BASE
Known Fixed Releases:
5.2.4.6i.BASE, 5.3.1.15i.BASE, 6.0.0.5i.BASE
Alert Type:
New
Bug Id:
CSCuv75608
Title:
VZ LE1A - unexpected GCC after deleting them and performing RP OIR
Status:
Open
Severity:
2 Severe
Description:

Symptom:
unexpected GCC after deleting them and performing RP OIR

Conditions:
GCC interfaces still visible in IM which is deleted and does not exist

Workaround:
NA

Further Problem Description:
EVEN after deleting GCC interfaces , it is visble in IM database

Last Modified:
27-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCus30041
Title:
Standby node is not ready, RPFO failed
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
->After bring up, show redundancy will show no Active partner
RP/0/RP0/CPU0:campbeltown-2r-1#sh red
Redundancy information for node 0/RP0/CPU0:
==========================================
Node 0/RP0/CPU0 is in ACTIVE role
Node 0/RP0/CPU0 has no valid partner

Reload and boot info
----------------------
RP reloaded Fri Dec 19 16:47:52 2014: 6 hours, 24 minutes ago
Active node booted Fri Dec 19 16:47:52 2014: 6 hours, 24 minutes ago
Standby node lost Fri Dec 19 17:46:03 2014: 5 hours, 26 minutes ago

Active node reload ""
Standby node reload "

Conditions:
issue (show redundancy shows no valid partner) could happen
-> multiple restarts of processmgr

Workaround:
Restarting the system lead CM (often on 0/RP0) should recover.

Next step to try is to restart processmgr on all RP's.

Further Problem Description:
->Information regarding case where redundancy will show no partner
CM sends an out-of-order EOOU msg, which should have been removed from txlist upon client disconnect. Because of this, RP Active assumes node down for its partner and takes it from its inventory causing redundancy to show no valid partner

Last Modified:
27-AUG-2015
Known Affected Releases:
5.2.3.BASE
Known Fixed Releases:
5.2.5.8i.BASE, 6.0.0.6i.BASE
Alert Type:
New
Bug Id:
CSCuv95821
Title:
XR vm crash after router reload , after wiping out configuration.
Status:
Open
Severity:
2 Severe
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
Enter root-system username: [ 288.961465] SysRq : Emergency Sync
[ 288.961799] SysRq : Trigger a crash
[ 288.962006] BUG: unable to handle kernel NULL pointer dereference at (null)
[ 288.962006] IP:
[ 288.962006] [] sysrq_handle_crash+0x16/0x20
[ 288.962006] PGD 333ace067 PUD 333a97067 PMD 0
[ 288.962006] Oops: 0002 [#1] SMP
[ 288.962006] Modules linked in: fuse ccc_reset iptable_filter ip_tables lowmemorykiller(C) ext3 jbd 8021q mrp garp stp llc sg sd_mod crc_t10dif ixgbevf mdio cisco_nb lcndklm lpc_ich crc32_pclmul mfd_core i2c_i801 ext4 usb_storage jbd2 uhci_hcd virtio_console i2c_core ahci libahci virtio_blkstats fails
virtio_pci
Enter root-system username: virtio_ring virtio dm_mod
[ 288.962006] CPU: 2 PID: 2513 Comm: sh Tainted: G C 3.10.19 #1
[ 288.962006] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 288.962006] task: ffff880342a92480 ti: ffff880335bd8000 task.ti: ffff880335bd8000
[ 288.962006] RIP: 0010:[]
[ 288.962006] [] sysrq_handle_crash+0x16/0x20
[ 288.962006] RSP: 0018:ffff880335bd9e48 EFLAGS: 00010096
[ 288.962006] RAX: 000000000000000f RBX: 0000000000000063 RCX: 0000000000000006
[ 288.962006] RDX: 0000000000000007 RSI: 0000000000000007 RDI: 0000000000000063
[ 288.962006] RBP: ffff880335bd9e48 R08: 0000000000000003 R09: 0000000000028ce0
[ 288.962006] R10: 0000000000000688 R11: 0000000000000ca8 R12: ffffffff81a9b740
[ 288.962006] R13: 0000000000000282 R14: 0000000000000004 R15: 0000000000000000
[ 288.962006] FS: 00007f19a8dcf700(0000) GS:ffff88034fd00000(0000) knlGS:0000000000000000
[ 288.962006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 288.962006] CR2: 0000000000000000 CR3: 0000000333a6f000 CR4: 00000000001407e0
[ 288.962006] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 288.962006] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 288.962006] Stack:
9 288.962006] ffff880335bd9e88 ffffffff8131b05stats fails
ffff880335bd9e7
8 Enter root-system username: 0000000000000002
[ 288.962006] fffffffffffffffb 00007f19a8dcd000 ffff880335bd9f40 ffff880335bd9f40
[ 288.962006] ffff880335bd9eb8 ffffffff8131b10a ffff8802b2c7fb80 00007f19a8dcd000
[ 288.962006] Call Trace:
[ 288.962006] [] __handle_sysrq+0x129/0x190
[ 288.962006] [] write_sysrq_trigger+0x4a/0x50
[ 288.962006] [] proc_reg_write+0x43/0x70
[ 288.962006] [] vfs_write+0xdf/0x1e0
[ 288.962006] [] SyS_write+0x5f/0xa0
[ 288.962006] [] tracesys+0xdd/0xe2
90 288.962006] Code: d1 c2 22 00 31 c0 eb ac 90 90 90 90 90 90 90 90 stats fails

Enter root-system username: 90 90 90 55 48 89 e5 0f 1f 44 00 00 c7 05 8d da a1 00 01 00 00 00 0f ae f8 stats fails

Enter root-system username: 04 stats fails
25
Enter root-system username: 00 00 00 00 01 c9 c3 55 48 89 e5 0f 1f 44 00 00 8d 47
[ 289.001908] RIP
[ 289.001908] [] sysrq_handle_crash+0x16/0x20
[ 289.001908] RSP
[ 289.001908] CR2: 0000000000000000
[ 289.001908] ---[ end trace 925f79c4837ef34c ]---
ernel panic

Last Modified:
27-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuo00153
Title:
Umbrella DDTS for CGSE Oversubscription reload issue
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
See release notes for constituent DDTSs
CSCun46334 Oversubscription on CGSE reloads the card when in tandem with CGSE plus
CSCun93688 Remove reset of IngressQ ASIC for OOR condition

Conditions:

Workaround:

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
4.3.3.BASE
Known Fixed Releases: *
3.8.3, 3.8.4, 3.9.0, 3.9.1, 3.9.2, 3.9.3, 4.0.0, 4.0.1, 4.0.2, 4.0.3
Alert Type:
New
Bug Id:
CSCuv96661
Title:
6.0 ODFC : Degradations in many areas when compared with 531 FCS image
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Forwarding degradations in 6.0

Conditions:
Starting 7I DT image with Topaz

Workaround:
None

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh04021
Title:
XR 12000 which installed SMU CSCtz82638 also send SonetMib Timeout
Status:
Fixed
Severity:
3 Moderate
Description:


Symptom:C12K platform takes more than 5 seconds to respond to an SNMP query for sonet medium type OID which leads to the SNMP query to timeout.

Conditions:1.3.6.1.2.1.10.39 related MIB query from the SNMP manager to the SNMP agent (C12k Router)

Workaround:Exclude the specific MIB in the query list.

More Info:


Last Modified:
03-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.3.0, 4.3.2, 4.3.2.29i.BASE, 4.3.3, 4.3.31
Alert Type:
Updated *
Bug Id:
CSCui97479
Title:
ipv4_mfwd_partner error messages after reload SMU activation
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Got the ipv4_mfwd_partner/ipv6_mfwd_partner error messages/tracebeck after install act any reload SMU

RP/0/RP0/CPU0:r2#RP/0/RP0/CPU0:Aug 30 20:59:17.069 : ipv4_mfwd_partner[181]: %INSTALL-LIBNOTIFY-7-INTERNAL : Internal error : ipv4_mfwd_partner : (PID=3277) : -Traceback= 7fdfdbfe3469 7fdfdbfe7883 7fdfdbfe516c 452cb9 7fdfdbfe2bbf 7fdfde2075c6 7fdfde20a3f3 7fdfdfb24d11 7fdfdfb221fe 7fdfdfb305bc 4138dd 7fdfd8eaecce

Conditions:
this behavior was observed by install act a reload SMU. It is reproducible

Workaround:
No function impact. The router will be immediately reloaded


Reproducibility (%): 100%

Further Problem Description:

Last Modified:
05-AUG-2015
Known Affected Releases:
5.0.0.BASE
Known Fixed Releases:
5.0.1.14i.BASE
Alert Type:
Updated *
Bug Id:
CSCty22429
Title:
Shared secrets logged to debug
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
Secret keys and other sensitive data is logged to debug output.

Conditions:
An administrative user needs to be logged in to the device to enable the debugs that will display this information.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.1/2:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.3.BASE
Known Fixed Releases:
4.2.1.21i.BASE, 4.2.1.21i.FWDG, 4.2.3.3i.BASE, 4.2.3.3i.FWDG, 4.3.0.5i.BASE, 4.3.0.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCtd58417
Title:
Ping with zero retry timeout compromises network security
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
When executing a time with a retry timeout of zero, the line cards in the router may become unresponsive
Conditions:
None
Workaround:
Use command authorization to prevent unprivileged users from using the ping command
Further Problem Description:
None
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:W/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.8.0.BASE, 3.9.0
Known Fixed Releases:
4.2.3.99i.BASE, 4.3.0.25i.BASE, 4.3.0.25i.FWDG
Alert Type:
Updated *
Bug Id:
CSCts71096
Title:
Sending crafted TCP packet may block SSH access
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

Sending crafted TCP packets may result in the blocking SSH access to the
router.

Conditions:
All other management access mode will continue to work. This issue is
affecting only SSH

Workaround:

restart sshd or tcp processes can workaround this situation
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2011-3306 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.2.BASE, 4.2.0.BASE
Known Fixed Releases: *
4.0.11.3i.BASE, 4.0.4, 4.0.4.17i.BASE, 4.1.2, 4.1.2.16i.BASE, 4.2.0, 4.2.0.20i.BASE, 4.2.1, 4.2.2, 4.2.3
Alert Type:
Updated *
Bug Id:
CSCtz84369
Title:
l2fib_mgr memory leak at l2fib_bdxc_add_peers during security attack
Status:
Fixed
Severity:
3 Moderate
Description:

Symptoms:
Memory leak may occur under certain tcpv6 vulnerability scans.
Conditions:
Workaround:
Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/3.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
CVE ID CVE-2012-3892 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.3.0.BASE
Known Fixed Releases: *
4.3.0, 4.3.0.12i.BASE, 4.3.0.12i.FWDG, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0
Alert Type:
Updated *
Bug Id:
CSCtu17021
Title:
Externally-controlled format strings in parser/src/shell_parser.c
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.
Conditions:
Device configured with default configuration.
Workaround:
Not applicable or available.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.6/5.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:U/RC:C&version=2.0
CVE ID CVE-2012-0350 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.1.BASE
Known Fixed Releases:
4.3.0, 4.3.0.9i.BASE, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0, 5.1.1
Alert Type:
Updated *
Bug Id:
CSCtb65503
Title:
IPv6 ACL: L4 info may be ignored in ACEs in hw match
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

If an IPv6 ACL with ACEs containing L4 operands is configured and applied on an interface, L4 information in the ACL may be ignored resulting in
incorrect operation of the ACL

Conditions:

If an IPv6 ACL with L4 operands is configured on an interface, traffic passing across the interface which is supposed to be filtered by a
corresponding ACE might incorrectly be pass or traffic intended to pass the ACL might be dropped incorrectly.

Example (1):

The IPv6 ACL contains a L4 ACE which filters tcp src port 21.

90 deny tcp host 2000:1000:50:0:0:0:0:9 eq 21 host 2000:1000:51:0:0:0:0:9

If traffic is send with src port 110 to the IPv6 src/dst address pair
2000:1000:50:0:0:0:0:9/2000:1000:51:0:0:0:0:9 it MAY be blocked by ACE 90 because the TCP src port is masked out and erroneously ignored.

Example (2):

40 permit icmp host 2000:1000:60:0:0:0:0:6 host 2000:1000:51:0:0:0:0:3

Because the L4 information is ignored, all traffic matching the src/dst address pair will pass this ACL.

The problem can be observed on IPv6 ACLs with ACEs containing L4 keywords like tcp,udp, icmp etc.

Examples:
30 deny tcp host 2000:1000:50:0:0:0:0:3 eq 3 host 2000:1000:51:0:0:0:0:3
40 permit icmp host 2000:1000:60:0:0:0:0:6 host 2000:1000:51:0:0:0:0:3
50 permit udp host 2000:1000:50:0:0:0:0:3 eq 43 host 2000:1000:51:0:0:0:0:3

The problem is independent of the number of ACEs because the issue is due to the ACL compression algorithm that applied. If L4 information is
configured in the ACE, it MAY get masked during the packet lookup operation as a result of certain bit positions being filled in the source address.

Workaround:

None.

Further Problem Description:

This vulnerability is not seen on IPv4 ACLs.

An attacker has no control over what would be or not be permitted through the ACL (when it should be denied), as the vulnerability is caused by
the ACL compression algorithm, that is applied, so not all ACL entries are affected.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.8/4.8:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2011-2065 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.8.1.BASE
Known Fixed Releases:
3.8.2.11i.LC, 3.9.0.22i.LC, 4.1.0.2i.FWDG, 4.1.0.4i.FWDG
Alert Type:
Updated *
Bug Id:
CSCtr62428
Title:
infralibxml2 libraries must be upgraded or patched
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
Cisco IOS-XR may include a version of infralibxml2 that may be vulnerable to published vulnerabilities that are documented in the following CVE
IDs:
CVE-2010-4008, CVE-2009-2416, CVE-2009-2414, CVE-2008-4226, CVE-2008-4225, CVE-2008-3529, CVE-2008-3281

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional information about the specific vulnerabilities listed above including condition and possible workarounds can be found by looking at
the description of each CVE at :
http://cve.mitre.org/cve


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 9/8.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2010-4008, CVE-2009-2416, CVE-2009-2414, CVE-2008-4226, CVE-2008-4225, CVE-2008-3529, CVE-2008-3281 has been assigned to document this
issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.1.BASE
Known Fixed Releases:
4.3.0.17i.BASE
Alert Type:
Updated *
Bug Id:
CSCtx34345
Title:
Traversal of path possible outside of node's filesystem
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
User can access files outside of local nodes file-system and hence can perform path traversal attacks.

Conditions:
Default configuration.

Workaround:
No workarounds are available.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2012-1356 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.1.BASE, 4.1.2.BASE, 4.2.1.BASE
Known Fixed Releases: *
4.2.3, 4.2.3.28i.BASE, 4.2.4, 4.3.0, 4.3.0.19i.BASE, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4
Alert Type:
Updated *
Bug Id:
CSCty50102
Title:
Unprivileged users can set system time
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
User with basic-services (EXECUTE), e.g. operator, in excess of their authority can set the system time.

Conditions:
Default configuration.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases:
4.2.3.28i.BASE, 4.3.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCty50104
Title:
Arbitrary file read through certain CLI commands
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
User with basic-services can read arbitrary files by invoking certain commands on the system.

Conditions:
Default configuration.

Workaround:
There are no workarounds available to mitigate this issue.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.4/3.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:C/I:N/A:N/E:POC/RL:OF/RC:C&version=2.0
CVE ID CVE-2012-3046 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases:
4.2.3.99i.BASE, 4.3.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCts77740
Title:
Netio crash while deactivating packages
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
NETIO crashes when deactivating security package even when there is no ACL configured on RP.

Conditions:
Deactivating security package.

Workaround:
The crash was called by wdsysmon due to NETIO main thread and acl thread deadlock. It shall
recover by itself after NETIO restarts.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.4/1.2:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:M/C:N/I:N/A:P/E:U/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCty50123
Title:
CLI sftp command can be leveraged to clobber local files
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
CLI sftp command can be leveraged to clobber local files

Conditions:
User invoking the sftp command.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.3:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases: *
4.2.1, 4.2.1.24i.BASE, 4.2.2, 4.2.3, 4.2.3.7i.BASE, 4.2.4, 4.3.0, 4.3.0.6i.BASE, 4.3.1, 4.3.2
Alert Type:
Updated *
Bug Id:
CSCtz35275
Title:
ISIS - IOS-XR Accepts and Forwards 255.255.255.255/32
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
A device running Cisco IOS XR configured for ISIS accepts a broadcast address (255.255.255.255/32) as a route and places the route in its route
table. When this route is accepted from a routing update, a partial denial of service condition for broadcast traffic may be experienced. Unicast
and/or multicast traffic is not affected. These are the same symptoms as described in CSCty20493.

Conditions:
This issue has been confirmed in Cisco ASR 9000 Series and Cisco CRS devices configured for ISIS.

Note: Cisco IOS Software and Cisco IOS-XE Software are not affected.

Workaround:
A valid workaround is to filter all incoming route advertisements that include 255.255.255.255/32.

This route is also part of the Bogon list and should be blocked by most service providers. A bogon prefix is a route that should never appear in
the Internet routing table. A packet routed over the public Internet (not including over VPNs or other tunnels) should never have a source
address in a bogon range. These are commonly found as the source addresses of DDoS attacks.

Bogons are defined as Martians (private and reserved addresses defined by RFC 1918 and RFC 5735) and netblocks that have not been allocated to a
regional internet registry (RIR) by the Internet Assigned Numbers Authority. Fullbogons are a larger set which also includes IP space that has
been allocated to an RIR, but not assigned by that RIR to an actual ISP or other end-user. IANA maintains a convenient IPv4 summary page listing
allocated and reserved netblocks, and each RIR maintains a list of all prefixes that they have assigned to end-users.

More information about Bogons is posted at Team Cymru's website at:
http://www.team-cymru.org/Services/Bogons/http.html


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:W/RC:C&version=2.0

CVE ID CVE-2012-0379 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.1.BASE
Known Fixed Releases: *
4.3.0, 4.3.0.17i.ROUT, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0, 5.1.1
Alert Type:
Updated *
Bug Id:
CSCti59888
Title:
CRS-1, 3.8.4, 100% CPU due to NETIO and IPV4_IO
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

100% CPU consumption by Netio and ipv4_io processes. No evidence of high amount of any
exception traffic entering the router or leaving the router.

Conditions:

IPv4 subnet broadcast packet with options (RA, timestamp, etc), generated from the router or
received on an interface, can cause this problem.

Possible triggers are extended ping with options or a mtrace command (which uses RA option), if
they specify a subnet broadcast address as destination.

Workaround:

Restart the netio and ipv4_io processes.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 5.0/4.1:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2011-3295 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.8.4.BASE, 3.9.1.BASE
Known Fixed Releases: *
3.9.3, 3.9.3.5i.BASE, 4.0.1, 4.0.1.20i.BASE, 4.0.2, 4.0.2.2i.BASE, 4.0.3, 4.0.4, 4.1.0, 4.1.0.17i.BASE
Alert Type:
Updated *
Bug Id:
CSCue04000
Title:
te_control process crash
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptom:

Dump request for process pkg/bin/te_control.


Conditions:

Affects Cisco IOS XR versions Release 3.9.0 to releases prior to 4.3.0.
The affected code path becomes obsolete in 4.3.0 due to a code
re-organization (which is why this bug is in C state).

A device receiving specific types of RSVP messages, will cause the TE
Control process to restart, if the TE process exists.

These RSVP messages are to signal GMPLS tunnel. TE process will restart
only if the tail-end of the GMPLS tunnel is not the receiving node.

The TE process is created when either of the following commands exist on
the device:
- interface tunnel-te, tunnel-mte, tunnel-gte, tunnel-tp
- mpls-traffic-eng and/or any submode config under mpls traffic-eng


Workaround:

If the device is not requiring TE packets to traverse, admin can
configure an ACL to drop these packets:

Configure an ACL to deny any TE tunnel create request coming from
specific source address. Then attach this ACL to RSVP.

e.g.
ipv4 access-list block_host
100 deny ipv4 host A.B.C.D any
rsvp signalling prefix-filtering access-list block_host

This will block any TE tunnel request coming from host A.B.C.D on any
interface. This is done by blocking RSVP Path message that carries tunnel
create request. Messages will be dropped in the RSVP process.

Please note that packets denied by the ACL will not get to the RSVP process.


More Info:

The affected code path becomes obsolete in 4.3.0 due to a code re-organization.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2013-1162 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1162

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html






Last Modified:
06-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases:
4.3.0.36i.MPLS, 4.3.1.32i.MPLS
Alert Type:
Updated *
Bug Id:
CSCtz35272
Title:
OSPF - IOS-XR Accepts and Forwards 255.255.255.255/32
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
A device running Cisco IOS XR configured for OSPF accepts a broadcast address (255.255.255.255/32) as a route and places the route in its route
table. When this route is accepted from a routing update, a partial denial of service condition for broadcast traffic may be experienced. Unicast
and/or multicast traffic is not affected. These are the same symptoms as described in CSCty20493.

Conditions:
This issue has been confirmed in Cisco ASR 9000 Series and Cisco CRS devices configured for OSPF.

Note: Cisco IOS Software and Cisco IOS-XE Software are not affected.

Workaround:
A valid workaround is to filter all incoming route advertisements that include 255.255.255.255/32.

This route is also part of the Bogon list and should be blocked by most service providers. A bogon prefix is a route that should never appear in
the Internet routing table. A packet routed over the public Internet (not including over VPNs or other tunnels) should never have a source
address in a bogon range. These are commonly found as the source addresses of DDoS attacks.

Bogons are defined as Martians (private and reserved addresses defined by RFC 1918 and RFC 5735) and netblocks that have not been allocated to a
regional internet registry (RIR) by the Internet Assigned Numbers Authority. Fullbogons are a larger set which also includes IP space that has
been allocated to an RIR, but not assigned by that RIR to an actual ISP or other end-user. IANA maintains a convenient IPv4 summary page listing
allocated and reserved netblocks, and each RIR maintains a list of all prefixes that they have assigned to end-users.

More information about Bogons is posted at Team Cymru's website at:
http://www.team-cymru.org/Services/Bogons/http.html


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:W/RC:C&version=2.0

CVE ID CVE-2012-0379 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.1.1.BASE
Known Fixed Releases: *
4.3.0, 4.3.0.25i.ROUT, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0, 5.1.1
Alert Type:
Updated *
Bug Id:
CSCuu28453
Title:
No XML Schema for Config RAW-Dir,NumThread,RecvQ
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
No XML Schema for Config RAW Dir,NumThread,RecvQ

Conditions:
When RAW_IP xml schema is applied

Workaround:
None

Further Problem Description:
NA

Last Modified:
07-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCut91822
Title:
sh mpls label table should only show SRGB start label entry
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show mpls label table" shows a line for each label in the SRGB. This is only cosmetic and has no impact on the functionality

Conditions:

Workaround:

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.1.MPLS
Known Fixed Releases: *
5.3.2.17i.FWDG, 5.3.3.3i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCut68234
Title:
No XML Schema for Config TCP-AcceptRate,Dir,NumThread,RecvQ,Throttle
Status:
Fixed
Severity:
3 Moderate
Description:


Symptom:
No XML Schema for Config TCP-AcceptRate,Dir,NumThread,RecvQ,Throttle etc

Conditions:
When tcp xml schema is applied
Workaround:
No work around
Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCut68312
Title:
No XML Schema for Config UDP - Directory,Num-Thread,ReceiveQ
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
No XML Schema for Config UDP Dir,NumThread,RecvQ

Conditions:
When udp xml schema is applied

Workaround:
None

Further Problem Description:
NA

Last Modified:
07-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu87899
Title:
clear tcp pcb 0x unexpectedly clears all tcp connexions
Status:
Fixed
Severity:
3 Moderate
Description:



Symptom:
clear tcp pcb 0x unexpectedly clears all established tcp connections
Conditions:
All time when clear tcp pcb 0x0 is applied
Workaround:
Not applicable


Last Modified:
07-AUG-2015
Known Affected Releases:
3.4.2.BASE, 5.3.1.BASE
Known Fixed Releases: *
5.3.2.15i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCun28108
Title:
%MGBL-NVGEN-3-ERR_SYSDB_BIND message seen after upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A log message similar to that shown below is displayed after ISSU and chassis reload:

RP/0/RP0/CPU0:Feb 21 08:55:28.259 : nvgen[342]: %MGBL-NVGEN-3-ERR_SYSDB_BIND : sysdb_bind: /cfg/gl/a/nvgen/maskformat/cidr 'Subsystem(259)' detected the 'try again' condition 'Code(33)'

Conditions:

Workaround:
None known

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.0.BASE, 5.2.2.BASE, 5.3.0.BASE
Known Fixed Releases: *
5.3.2.15i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuh61065
Title:
"show LLDP neighbors" trunck the device name if the device name has "."
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show LLDP neighbors" truncates the device name if the device name has "."

Conditions:
if the neighbor device has "." in the name, the "show LLDP neighbors" only shows the characters before the "." and the characters after "." will be ignored.

Workaround:
None

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
4.2.3.BASE, 4.3.3.BASE, 6.0.0.BASE
Known Fixed Releases: *
5.1.0, 5.1.0.13i.FWDG, 5.1.1, 5.1.11, 5.1.12, 5.1.2, 5.1.3, 5.1.4, 5.2.0, 5.2.1
Alert Type:
Updated *
Bug Id:
CSCut42822
Title:
Issue with ipv6-nd operational data representation in sysdb
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
sysdbcon:[m]/> ls oper/ipv6-nd/node/1/cache/interfaces
[bag] 'BVI22'
[bag] 'Bundle-Ether61'
[bag] 'Bundle-Ether62'
[bag] 'Bundle-Ether71'
[bag] 'Bundle-Ether72'

Conditions:
Having interfaces ipv6 enabled.

Workaround:
None

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2.12i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu68362
Title:
532 tunnel remain up after change invalidation drop to default tear
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
srte tunnel remain up even invalidation timer expired

Conditions:
only happen if transit invalidation drop configure to default tear configure

Workaround:
none

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.2.MPLS
Known Fixed Releases: *
5.3.2.17i.MPLS, 5.3.3.3i.MPLS, 6.0.0.10i.MPLS
Alert Type:
Updated *
Bug Id:
CSCue48578
Title:
Unable to telnet in VRF with a 32 characters name
Status:
Fixed
Severity:
3 Moderate
Description:

The supported character length of a vrf name is 32, however this is not accepted by telnet.

RP/0/RSP0/CPU0:router#telnet vrf here__my_length_is_32_characters 1.2.3.4
telnet: Invalid vrf table name

Working fine with 31 characters:
RP/0/RSP0/CPU0:router#telnet vrf here_my_length_is_31_characters 1.2.3.4
Trying 1.2.3.4...

Symptom:
VRF name of 32 characters is not accepted and given error as "Invalid VRF table name"

Conditions:
VRF name of 32 char length

Workaround:
No workarounds

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
5.2.5.3i.FWDG, 5.3.2.17i.FWDG, 5.3.3.3i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu30641
Title:
SSTE: %PKT_INFRA-HFR_PFI-3-INFRA_ERROR seen after OIR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PKT_INFRA-HFR_PFI-3-INFRA_ERROR messge seen.

Conditions:
Issue seen after LC OIR

Workaround:
This is a transient condition during LC bootup. During bootup, while interface is getting created, process like fib_mgr/mrib process query information about the interface. Since the interface is in the process of getting created, the error messages are logged. There is no impact on functionality and the messages stop once the interfaces are created.

Further Problem Description:
NA

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.1.BASE, 5.3.2.BASE
Known Fixed Releases: *
5.3.2.12i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu41542
Title:
The ARP process running on a line card did not signal EOI after a reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The ARP process running on a line card may not signal EOI after router reload.

Conditions:
This issue is seen on a NCS6K router booted with Cisco IOS XR version 5.3.2-09i.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.5.BASE
Known Fixed Releases: *
5.3.2.17i.FWDG, 5.3.3.3i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv02627
Title:
clear tcp nsr pcb 0x unexpectedly clears NSR for TCP all sessions
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
clear tcp nsr pcb 0x0 unexpectedly clears NSR for already established tcp connections.
Conditions:
All time when clear tcp nsr pcb 0x0 is applied
Workaround:
Not applicable

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.2.15i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu17145
Title:
Constant disconnects between lsd and ldp
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
User will see that system takes a long time to get NSR ready. Also, there will be high number of disconnects/reconnects between active+standby LDP and LSD. This can be reviewed using "show mpls lsd applications private" command.

Conditions:
The issue occurs in multi-chasis setup where LSD and LDP reside on different chasis e.g. LSD running on 0/RP0/CPU0 and LDP running 7/RP0/CPU0. Also the issue occurs when LDP is running on a very high scale of 20K to 30K local labels or more, which is much higher than the scale supported by LDP.

Workaround:
Reduce the LDP scale to bring it within supported numbers.

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.0.MPLS, 5.3.1.MPLS, 5.3.2.BASE
Known Fixed Releases: *
5.3.2.14i.FWDG, 5.3.2.14i.MPLS, 6.0.0.10i.FWDG, 6.0.0.10i.MPLS
Alert Type:
Updated *
Bug Id:
CSCuu99173
Title:
LDP Interface Re-Ordering seen in show run after upgrade to 5.3.1
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
LDP Interface Re-Ordering seen in show run after upgrade to 5.3.1

Conditions:
After upgrade to R5.3.1

Workaround:
None. There is no impact

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2.15i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu58510
Title:
G8032: Handle PFI Protect and missing state notifications better
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
G8032 Ports can be stuck in Blocked/inconsistent state

Conditions:
This issue can affect G.8032 ethernet ring protection in IOS-XR releases from 5.2.0 until 5.3.1. It is fixed in 5.3.2 & beyond.

The issue may occur following rapid interface flapping which causes the erp_ctrl process to get out of sync with the interface state & believe an interface is still down when it should be up.

This has been observed in the following scenario:
- Ethernet OAM is configured along with G8032
- Ethernet CCM packets being dropped causing interface flaps

Workaround:
The user can work around the issue by configuring a non-zero hold-off time:

RP/0/0/CPU0:ios(config-g8032-ring-profile)#timer hold-off ?
<0-10> seconds

If the user does not wish to use a hold-off time, the user can resolve the issue (but not work around it) by restarting the erp_ctrl process if they encounter the issue.

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
5.2.0.CE
Known Fixed Releases: *
5.3.2.12i.BASE, 5.3.2.12i.FWDG, 6.0.0.10i.BASE, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCus98825
Title:
Around 300msec of transient traffic drop is seen in ASIC reset.
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When the ASIC power on reset happens on fabric card, it is taking traffic drop for 300 ms which is not expected
Conditions:The ASIC power on reset on fabric card, trigger the traffic drop for 300 ms.
Workaround:The issue is under investigation.

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut59867
Title:
fpd upgrade fails when active admin reloaded and released after 20 mins.
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Power Module FPD upgrade times out and these FPDs go into 'UPGD FAIL' state, when 'upgrade hw-module location 0/PT0 fpd all force' is issued.

Conditions:
The RP node, where the upgrade command goes for a reload during the upgrade process.

Workaround:
Upgrade power modules one by one would help alleviate this issue.

Further Problem Description:
An upgrade of individual Power Module FPDs should be attempted to perform the FPD upgrade.

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu21661
Title:
Show hw-module FPD shows only entries for First Line card
Status:
Open
Severity:
3 Moderate
Description:

Symptom:'show hw-module fpd' command displays FPD information of only a few line cards when executed for the first time after system boot up.
But displays the information for all the line cards for subsequent runs.
Conditions:When the 'show hw-module fpd' command is executed for the very first time upon system bootup.
Workaround:None.
More Info:Sometimes, there is a slight delay in the updation of internal cache of FPD information at the FPD server, for all line cards/ancillary after the system boots up.
Subsequeny runs of this command would display the complete information.

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu24228
Title:
CTC stuck and memory full
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Memory bar in CTC will fluctuate and sometimes goes to red resulting slow response of CTC.

Conditions:
This is intermittent and occurs when more than 4 nodes are connected and CTC has been launched for sometime.

Workaround:
To manually configure garbage collector as java option:
-XX:+UseParallelGC
-XX:+UseParallelOldGC
and restart CTC

Further Problem Description:
Expected Resolution : This will be fixed in 6.0.0 release

Reproducibility (%) : 25%

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur61928
Title:
FIA show CLIs accept and give o/p for location in LC card slot format
Status:
Open
Severity:
3 Moderate
Description:

Symptom:FIA CLIs accept physical slot number instead of LC VM and also accepts non existing LC VM locations.

Conditions:while executing "show controller fia xxx" commands

Workaround:Expected Resolution: Please check with the support engineer for information on which release(s) this bug is expected to be fixed.

This issue can only be fixed after getting the fix for one other issue.

Reproducibility (%):100%

More Info:


Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.3.BASE, 5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut69687
Title:
[NCS4K-20T-O-S] sub controller in preconfig after XR VM kill - single RP
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
After killing XR-VM at host-OS Level, Traffic is not restored even after XR_VM comes UP again.

Conditions:
1. In a single RP system, Set up EW configuration
using NCS4K-2H-W, NCS4K-20T-O-S line cards.
2. Pass 10GE+OTU+1GE traffic through EW configuration as channelized traffic.
3. From Calvados console ,execute the following commands:
ps -x | grep sdr--1
kill
4. Wait for XR-VM to come up again

Workaround:
Workaround:Power Cycle

Expected Resolution: This issue will be fixed in next release.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.ADMIN, 5.2.4.BASE, 5.2.4.FWDG, 5.2.4.K9SEC, 5.2.4.LC, 5.2.4.MCAST, 5.2.4.MGBL, 5.2.4.MPLS, 5.2.4.ROUT, 5.2.4.TOOLS
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut50868
Title:
Storing Bulk profile from CTC to Node getting failed
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The issue occurs when user tries to store path protection profile on a node having no MPLS traffic

Conditions:
Create a path protection profile on a node having no MPLS traffic. Store the profile on same node.

Workaround:
First enable the MPLS traffic and then create and store path protection profile on the node

Expected Resolution :- Fix shall be available in 6.0 release

Reproducibility(%) - 100%

Further Problem Description:

Last Modified:
10-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus43778
Title:
sonet/sdh bandwidth checks are incorrect for hyphy
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
when ever there is no bandwidth available for controllers creation.

Conditions:
Configurations should be present on port 0,3, 9 on card.
Create otu2 on port 10 will throw an xml exception

Workaround:
Workaround: Error message can be seen thorugh CLI, do configuration through CLI.Bandwidth exceeded msg will be shown.

Further Problem Description:
Expected Resolution:Fix will be available in next release 6.0.0

Reproducibility (100%):

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut48001
Title:
[NCS4K-2H-W] stuck LOS alarm
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Stuck LOS alarm

Conditions:
1) Configure 2x TXP at DWDM with 100GE payload.
2) Traffic is error free
3) Delete 2x TXP
4) Configure 2x TXP at DWDM with OTU4 payload.
5) Traffic is error free
6) unexpected stuck LOS alarm reported at Client1

Workaround:
Process restart

Reproducibility (%): Seen once

Further Problem Description:

Last Modified:
10-AUG-2015
Known Affected Releases: *
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun67791
Title:
IOS XR Software Malformed SNMPv2 Packet Denial of Service Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A vulnerability in SNMP version 2 processing of Cisco IOS XR could allow an authenticated, remote attacker to cause a reload of the SNMPd process on the affected device.

The vulnerability is due to improper parsing of a malformed SNMP version 2 packet. An attacker could exploit this vulnerability by sending a malformed RSVP packet to be processed by an
affected device. An exploit could allow the attacker to cause a reload of the SNMPd process on the affected device.

Conditions:
SNMPd configured.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.3:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2014-3377 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3377

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
5.2.0.BASE, 5.2.1.BASE
Known Fixed Releases:
5.1.3.8i.BASE, 5.2.2.7i.BASE, 5.3.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq95565
Title:
ipv6_io crash with malformed IPv6 packet
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A vulnerability in ipv6 processing of Cisco IOS XR could allow an unauthenticated, remote attacker to cause a reload of the ipv6_io service.

The vulnerability is due to improper processing of malformed IPv6 packet by a device configured to process such packets. An attacker could exploit this vulnerability
by sending a malformed IPv6 packet to be processed by a device that is configured for IPv6. An exploit could allow the attacker to cause a reload of the ipv6_io
service.

Conditions:
Cisco IOS XR device is configured to process IPv6 protocol packets.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4191 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:


Last Modified:
11-AUG-2015
Known Affected Releases:
5.2.1.BASE
Known Fixed Releases:
5.2.21.1i.FWDG, 5.2.3.13i.FWDG, 5.2.4.1i.FWDG, 5.3.0.20i.FWDG
Alert Type:
Updated *
Bug Id:
CSCus96976
Title:
CRS sends wrong NetFlow template corrupting Peakflow statistics
Status: *
Terminated
Severity:
3 Moderate
Description:

Symptom:
Netflow collector experience traffic peaks

Conditions:
Netflow for MPLS traffic deployment

Workaround:
None

Further Problem Description:

Last Modified:
11-AUG-2015
Known Affected Releases:
4.1.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun75294
Title:
Cisco IOS XR SSH Login Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A vulnerability in OpenSSH module of the Cisco IOS XR Software could allow an "authenticated",
remote attacker to cause the SSH login process to reset unexpectedly.

The vulnerability is due to improperly input validation of the channel identifier with the SSH
handshake negotiation . An attacker could exploit this vulnerability by initiating a SSH session with
the device and sending a crafted SSH packet in the negotiation with an invalid channel identified.
An exploit could allow the attacker to reset the SSH login process causing a partial denial of service
(DoS) condition.

Conditions:
Device running with SSH in the configuration running an affected version of software.

Workaround:
None.

Further Problem Description:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4/3.3:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4193 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
11-AUG-2015
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases:
5.1.3.15i.BASE, 5.2.0.20i.BASE, 5.2.2.8i.BASE
Alert Type:
Updated *
Bug Id:
CSCth96816
Title:
TCP process crashed after receiving a malformed packet
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
Cisco IOS XR TCP process may crash when receiving a specially crafted TCP packet.

Conditions:
This vulnerability has been observed once only and has not been able to be consistently reproduced.
The vulnerability was found by further code inspection.

Workaround:
None.

Further Problem Description:
Vulnerability has not been able to be recreated after first observed. Should more information become
available about exact conditions for exploitation, Cisco PSIRT will review the vulnerability and
associated CVSS Scoring. Currently it is believed that this depends on several conditions, that are not
controllable to be exploited.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS
scores as of the time of evaluation are 2.6/2.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
12-AUG-2015
Known Affected Releases:
3.9.2.BASE
Known Fixed Releases:
3.9.2, 3.9.2.19i.BASE, 3.9.3, 4.0.1, 4.0.1.11i.BASE, 4.0.1.11i.FWDG, 4.0.2, 4.0.3, 4.0.4, 4.1.0
Alert Type:
Updated *
Bug Id:
CSCus75859
Title:
Tomahawk: Add IPv6 MPLS LER TE-FRR Ready fix
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IPv6 Tomahawk MPLS FRR ready performance fix

Conditions:
IPv6 Tomahawk MPLS FRR ready performance impact

Workaround:
no workarounds

Further Problem Description:

Last Modified:
13-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.1.20i.BASE, 5.3.1.20i.FWDG, 5.3.3.5i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCut05055
Title:
mibd_entity crash on upgrade from 424 to 531-18I
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
mibd_entity process crash

Conditions:
doing Tap2Mib set operations & polling mempoolmib.

Workaround:
process will recover by itself within mins

Further Problem Description:
This is purely timing issue, where mempool OID gets timeout & same handle used for tap2mib set operation. This is very corner case to hit.

Last Modified:
13-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2.19i.BASE, 5.3.3.5i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCut80237
Title:
After DPA OIR (stop/start uvf) the acl ipv6 match counters not hit
Status: *
Terminated
Severity:
3 Moderate
Description:

Symptom:
I have one tc to do the DPA OIR. I used stop and start uvf:
[uvf:~]$ ./stopmucode.sh
uvf stop/waiting
[uvf:~]$ ./startmucode.sh

After restarting uvf, the traffic can recover, and I can see acl ipv4 hardware counter matches. But ipv6 acl seems not there (Vnc: ott2lab-as3:5/spirit)
P/0/RP0/CPU0:ott-ss-dt-08A-uut#sh run int TenGigE0/RP0/CPU0/2
interface TenGigE0/RP0/CPU0/2
description interface7 -> ott-ss-dt-08A-r1:Te0/0/0/0
mtu 1514
service-policy input BFI1_1_in
service-policy output BFI1_1_out
ipv4 address 91.1.0.1 255.255.255.0
ipv4 verify unicast source reachable-via any allow-self-ping
ipv6 verify unicast source reachable-via any allow-self-ping
ipv6 address 901:a01:1::1/112
load-interval 30
ipv4 access-group passv4inBFI1_2 ingress hardware-count
ipv4 access-group passv4outBFI1_2 egress hardware-count
ipv6 access-group passv6inBFI1_2 ingress
ipv6 access-group passv6outBFI1_2 egress
!

RP/0/RP0/CPU0:ott-ss-dt-08A-uut#show access-lists ipv6 passv6outBFI1_2 hardware egress location 0/RP0/CPU0
ipv6 access-list passv6outBFI1_2
10 permit ipv6 host 1009:a01:1::2 host ff06::e100:2 fragments
20 permit tcp host 1009:a01:1::2 gt 2000 host ff06::e100:2 eq 800
30 permit tcp host 1009:a01:1::2 gt 2001 host ff06::e100:2 eq 801
40 permit tcp 2000::5:0/112 lt 1000 any eq 802
50 permit tcp host 1009:a01:1::2 lt 2002 host ff06::e100:2 eq 803 ack
60 permit tcp host 1009:a01:1::2 lt 2003 host ff06::e100:2 eq 804 psh
70 permit tcp host 1009:a01:1::2 lt 2004 host ff06::e100:2 eq 805 rst
80 permit tcp host 1009:a01:1::2 lt 2005 host ff06::e100:2 eq 806 syn
90 permit tcp host 1009:a01:1::2 lt 2006 host ff06::e100:2 neq 807 established
100 permit tcp host 1009:a01:1::2 lt 2007 host ff06::e100:2 range 8000 9000 fin
110 deny tcp host 1009:a01:1::2 lt 2008 host ff06::e100:2 eq 809 syn
120 permit tcp host 1009:a01:1::2 lt 3002 host ff06::e100:2 eq 903 ack authen
130 permit tcp host 1009:a01:1::2 lt 3003 host 2000::58:7 eq 904 ack routing
140 deny tcp host 1009:a01:1::2 lt 3004 host 2000::58:7 eq 905 ack dscp cs4 log
150 permit tcp host 1009:a01:1::2 lt 3005 host ff06::e100:2 eq 906 ack dscp cs3
160 permit tcp host 1009:a01:1::2 lt 3006 host ff06::e100:2 eq 907 ack
170 permit ipv6 host 1009:a01:1::1:3 host ff06::e100:2 routing
180 permit ipv6 host 1009:a01:1::2:3 host ff06::e100:2 authen
190 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 routing authen fragments
200 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 routing authen
210 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 authen fragments
220 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 routing fragments
230 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 authen
240 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 routing
250 permit ipv6 host 1009:a01:1::3:3 host ff06::e100:2 fragments
260 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 routing authen fragments
270 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 routing authen
280 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 authen fragments
290 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 routing fragments
300 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 authen
310 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 routing
320 deny ipv6 host 1009:a01:1::3:3 host ff06::e103:3 fragments
330 permit ipv6 host 1009:a01:1::4:3 host ff06::e104:3 authen fragments
340 permit ipv6 host 1009:a01:1::4:3 host ff06::e104:3 routing fragments
350 permit ipv6 host 1009:a01:1::4:3 host ff06::e104:3 routing authen
360 permit ipv6 host 1009:a01:1::4:3 host ff06::e104:3 dscp cs1
370 permit ipv6 host 1009:a01:1::5:3 host ff06::e104:3 routing authen fragments
380 permit ipv6 host 1009:a01:1::5:3 host ff06::e104:3 dscp cs2
390 permit ipv6 host 1009:a01:1::4:3 host ff06::e104:3 dscp default
40

Last Modified:
13-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv11184
Title:
PIM S,G join not sent when PIM neighbor IP changes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PIM S,G joins may not be sent to the PIM neighbor

Conditions:
The problem may be observed when the PIM neighbor IP address changes

Workaround:
Reducing the PIM hello timers may help reduce the impact of this particular problem

Further Problem Description:

Last Modified:
13-AUG-2015
Known Affected Releases:
4.3.4.CE
Known Fixed Releases: *
5.3.2.18i.MCAST, 5.3.3.3i.MCAST, 6.0.0.11i.MCAST
Alert Type:
Updated *
Bug Id:
CSCur57918
Title:
CSDL: ospfv3 process crashed by running CLI show ospfv3 database
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ospfv3 process crash during the execution of the command 'show ospfv3 database

Conditions:
This is a day 0 vulnerability affecting all platforms running IOS XR.

Workaround:
Display only the required or known LSAs by giving the command
show ospfv3 database
show ospfv3 database adv-router
show ospfv3 database



The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
1.5/1.2:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:


Last Modified:
13-AUG-2015
Known Affected Releases:
5.3.0.BASE
Known Fixed Releases:
5.2.4.10i.ROUT, 5.2.5.4i.ROUT, 5.3.1.10i.ROUT, 6.0.0.5i.ROUT
Alert Type:
Updated *
Bug Id:
CSCus76562
Title:
High LC CPU in netio and ipv6_io
Status:
Fixed
Severity:
3 Moderate
Description: *

<B>Symptom:</B>
High CPU on LC CPU caused by netio and ipv6_io
RP/0/RSP0/CPU0:Tugela#top dumbtty lo 0/0/cpu0
Tue Feb 3 10:09:01.024 CET
Computing times...176 processes; 808 threads;
CPU states: 67.5% idle, 32.0% user, 0.4% kernel
Memory: 8192M total, 5688M avail, page size 4K
Time: Tue Feb 03 10:09:03.904 CET

JID TID LAST_CPU PRI STATE HH:MM:SS CPU COMMAND
272 3 3 10 Run 12:40:22 14.23% netio
243 1 2 10 Rcv 0:45:01 12.91% ipv6_io

<B>Conditions:</B>
ipv6 enabled on interface and specific packet received

This is generic to all IOS-XR systems. Especially ASR9k and CRS

<B>Workaround:</B>
Restart process ipv6_io
or can be prevented by ipv6 unreachable disable

proc restart ipv6 will not impact current ipv6 peerings. by proc restart, we could get rid of the current packet being looped in the system, however, if we are keep
getting the same/similar packet, the cpu usage will keep high.
In that case we need to dig into the system to figure out the source of the packet, and shut the source.
Or find out the packet being looped, write up a ACL to block this certain type of packet.


<B>Further Problem Description:</B>

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/2.7:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
14-AUG-2015
Known Affected Releases:
5.1.3.BASE, 5.2.1.BASE
Known Fixed Releases:
5.3.2.11i.FWDG, 6.0.0.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu80195
Title:
Spurious interrupts getting raised from ELM for SEU and prog_err
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Spurious interrupt error log messages for elm_seu_intr and elm_prog_err_interrupt on the console.

Conditions:
Have CRS router with PRP cards for RP slots. This issue is observed for random PRP boards.

Workaround:
None.
Expected Resolution: 6.0 release version.

Further Problem Description:

Last Modified:
16-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.0.11i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu11949
Title:
BGP GR stale entry not purged on getting BFD down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BGP receives a GR reset, as part of that event, it retains the stale routes. Immediately following the GR reset BGP also receives a non-GR reset (BFD Down) in this case & the stale routes are not purged.

Conditions:
Peer needs to be GR capable and BGP on the UUT needs to get back 2 back reset, first one being GR reset and second one being non-GR reset.

This has been only seen when ACL is applied to simulate the condition of link going down & has not otherwise been reported.

Workaround:
none

Further Problem Description:

Last Modified:
17-AUG-2015
Known Affected Releases:
4.3.2.ROUT, 5.1.3.ROUT
Known Fixed Releases: *
5.2.5.22i.ROUT, 5.3.2.13i.ROUT, 6.0.0.6i.ROUT
Alert Type:
Updated *
Bug Id:
CSCuu34060
Title:
sfe register-dump doesn't work as expected for 'location all'
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
You won't get the output for one instance of each location for "show controller sfe register-dump" command for location "all".

Conditions:
In all conditions

Workaround:
NA

Reproducibility (%): 100

Further Problem Description:

Last Modified:
17-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases: *
5.2.5.22i.BASE, 6.0.0.11i.BASE
Alert Type:
Updated *
Bug Id:
CSCus64351
Title:
Wrong info for "Oper up link/asic max & total" after router reload.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Wrong info for "Oper up link/asic max & total" after router reload in show controller fabric fsdb-pla cmd.

Conditions:
Router Reload

Workaround:
Expected Resolution: NA

Reproducibility (%):Not always

It is a cosmetic issue and there is no functionality impact.

Further Problem Description:
sometimes after router reload, actual link states are not delivered correctly to fabric manager. i.e even though SFE links are oper_up, fabric manager shows them as oper_down. This is a cosmetic issue.

Last Modified:
17-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases: *
5.2.5.22i.BASE
Alert Type:
Updated *
Bug Id:
CSCud80345
Title:
debug_client crashed in ctrace when trying to free invalid pointer
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
debug_client crashed in ctrace when trying to free invalid pointer

Conditions:
On NCS-6k , we have seen this issue on images where issu and/or admin VM reload is supported and it is seen intermittently on admin VM reload of that VM where active confd is placed

Workaround:

Further Problem Description:

Last Modified:
17-AUG-2015
Known Affected Releases: *
5.0.0.BASE, 5.2.4.ADMIN, 5.2.4.BASE
Known Fixed Releases:
5.2.5.9i.BASE, 6.0.0.7i.BASE
Alert Type:
New
Bug Id:
CSCuv81888
Title:
(60-SSR1) fabricq_mgr process crash on satori
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Fabricq_mgr crash seen without any trigger

Conditions:
not sure

Workaround:

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv56767
Title:
Loading saved configuration leads to incosistency in L2 functionality.
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
L2subinterfaces are not getting created properly

Conditions:
When Configuration is loaded from the Disk.

Workaround:

Further Problem Description:
When we load following L2 configuration from harddisk , L2 subinterfaces are not getting created .

RP/0/RP0:ios(config)#do show interfaces brief
Thu Jul 30 06:01:14.484 UTC

Intf Intf LineP Encap MTU BW
Name State State Type (byte) (Kbps)
--------------------------------------------------------------------------------
Nu0 up up Null 1500 0
Te0/6/0/2 up up ARPA 1514 10000000
Te0/6/0/3 up up ARPA 1514 10000000
Te0/6/0/6 up up ARPA 1514 10000000
Mg0/RP0/CPU0/0 admin-down admin-down ARPA 1514 1000000


RP/0/RP0:ios(config)#do show l2vpn xconnect
Thu Jul 30 06:01:43.961 UTC
Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved,
SB = Standby, SR = Standby Ready, (PP) = Partially Programmed

XConnect Segment 1 Segment 2
Group Name ST Description ST Description ST
------------------------ ----------------------------- -----------------------------
c1 c1 UR Te0/6/0/2.10 UR Te0/6/0/6.100 UR
----------------------------------------------------------------------------------------
c2 c2 UR Te0/6/0/3.20 UR Te0/6/0/6.200 UR
----------------------------------------------------------------------------------------

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv54510
Title:
PRBS status toggle issue is observed for ODU-Flex controllers in CTC.
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
PRBS status toggle issue is observed for ODU-Flex controllers in CTC.

Conditions:
PRBS is enabled. PRBS status toggle issue is observed for ODU-Flex controllers.

Workaround:
None

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv30078
Title:
tams_proc crashed after sysadmin lxc destroy
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
tams_proc crash

Conditions:
after sysadmin lxc destroy

Workaround:
Reload

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv09593
Title:
30 ports high power optics support for emerald
Status:
Fixed
Severity:
3 Moderate
Description:



Symptom:High powers not supported in port 0 to 29 of Emerald card
Conditions:In CRS router with Emerald card, high power optics won't come up in ports 0 to 29.
Workaround:Insert high power optics in port 30 to 39
More Info:Fix is done through this DDTS such a way 15 ports per slice can accept high power optics.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.CE
Known Fixed Releases: *
5.3.2.20i.FWDG, 5.3.3.6i.FWDG, 6.0.0.7i.FWDG
Alert Type:
New
Bug Id:
CSCuv86808
Title:
Getting "error while loading shared libraries with l2vpn trace command.
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Getting "error while loading shared libraries with l2vpn trace command.

Conditions:
l2vpn trace command.

Workaround:
None

Further Problem Description:
While executing l2vpn trace command , following error is seen .

RP/0/RP0:ios#show l2vpn platform trace all all reverse
Wed Aug 19 06:10:12.531 UTC
show_dnx_l2fib_ltrace: error while loading shared libraries: libdnx_l2fib_exports_lc.so: cannot open shared object file: No such file or directory

RP/0/RP0:ios(config)#do show version
Wed Aug 19 22:21:24.162 UTC

Cisco IOS XR Software, Version 6.0.0.06I
Copyright (c) 2013-2015 by Cisco Systems, Inc.

Build Information:
Built By : abhharih
Built On : Fri Aug 14 17:22:03 IST 2015
Build Host : bgl-ads-2296
Workspace : /nobackup/abhharih/xspeed-EFR-00000309666
Version : 6.0.0.06I
Location : /opt/cisco/XR/packages/

cisco NCS-4000 () processor
cisco NCS-4000 () processor
System uptime is 24 minutes

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv33131
Title:
BGP to support SYSDB_ACCESS_OPTION_LIST_NEXT for Neighbor EDM
Status:
Fixed
Severity:
3 Moderate
Description:








Symptom:
XML requests to a BGP EDM for more than 25 neighbors return a 'not supported' error.

Conditions:
This issue will be seen when there is BGP configuration with more than 25 neighbors & data is requested via XML. It is not version or platform specific.

Workaround:

There is no easy workaround - the user can either remove configuration to reduce the number of neighbors, or obtain the data via the equivalent show command, which works correctly for more than 25 neighbors.

Further Problem Description:

If you have already seen this issue during an ISSU upgrade, then on-demand SLA operations and related historical statistics are likely to be no longer available.








Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE, 5.3.2.MGBL, 6.0.0.BASE
Known Fixed Releases:
5.3.2.20i.ROUT, 5.3.3.6i.ROUT
Alert Type:
New
Bug Id:
CSCuu41637
Title:
show tech fabric does not collect asic errors
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show tech fabric does not collect some of the asic error details.

Conditions:
No specific trigger, issue with show-tech scripts

Workaround:
None

Further Problem Description:
show tech fabric does not collect some of the asic error details.
1. show asic errors for ingressq 1,2,3 for TOPAZ LC does not gets collected.
2. show asic-err fabricq 0 summary does not gets collected from RP.
3. show asic-err ccsq 0 all location 0/RP0/CPU0.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
5.3.2.12i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv31661
Title:
CRS-X LC QoS Ref_rate for priority class is slice bw instead of intf.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The QoS Config commit will fail with an error described earlier whereby a high queue-limit value if applied to member's of a bundle within the same slice of the CRS-X LC will overflow the 32 bit value since the reference_rate calculated is the slice bw instead of Per Member BW.

Conditions:
100G bundle member's residing on the same slice & high queue-limit configured in a priority class.

Workaround:
Reduce the value of the queue-limit given that the max buffering that can be done @200G is ~30ms

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.1.3.CE
Known Fixed Releases: *
5.3.2.20i.BASE, 5.3.3.6i.BASE
Alert Type:
New
Bug Id:
CSCuv80225
Title:
ISIS: memory leak in SR-TE code
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When configured for SR-TE isis is leaking 8-byte memory blocks containing an isis sysid.

Conditions:
Only occurs when segment routing is used in conjunction with MPLS traffic engineering.

Workaround:

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
5.3.3.6i.ROUT
Alert Type:
New
Bug Id:
CSCuv51541
Title:
calv_alarm_mgr abnormally terminated in xr after sysadmin destroy
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
calv_alarm_mgr abnormally terminated in xr after sysadmin destroy

Conditions:
after sysadmin destroy

Workaround:
none

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut48567
Title:
egrep -A not working on post 5.2.2,5.2.3, and 5.3.0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
egrep -A doesn't work after the feature was added in 5.2.2,5.2.3, and 5.3.0

Conditions:

Workaround:

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.0.BASE, 5.3.2.BASE
Known Fixed Releases: *
5.2.5.22i.BASE, 5.3.2.20i.BASE, 5.3.3.6i.BASE
Alert Type:
New
Bug Id:
CSCuv54865
Title:
ISIS SRTE: PCE callbacks trigger unneeded SR updates
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When configured for SR-TE, updates received from a PCE can trigger unnecessary updates to TE.

Conditions:
MPLS-TE with segment-routing.

Workaround:
None.

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv39663
Title:
Commit replace feature fails with policy-global config
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When we delete policy global, the policy which used policy global and replace with a new policy in a single commit, commit fails. RPL stops working after that. The only way to recover is restart policy_repository

Conditions:

Workaround:
Restart policy_repository

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuo57380
Title:
BFC single member shut results in >50msec loss
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
This issue seen only when the bundle interface flaps.more than 50ms time delay during switchover when the traffic switches between bundle interfaces.

Conditions:
bundle has interfaces with different bandwidth

Workaround:
no work-around.

Further Problem Description:
This issue seen only when the bundle interface flaps.more than 50ms time delay during switchover when the traffic switches between bundle interfaces.

Last Modified:
20-AUG-2015
Known Affected Releases:
4.2.4.MPLS
Known Fixed Releases:
5.3.2.15i.FWDG, 5.3.3.3i.FWDG, 6.0.0.10i.FWDG
Alert Type:
New
Bug Id:
CSCuv62382
Title:
ospfv3 max paths 32 configuration failure
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
OSPFv3 maximum-paths config cannot be changed back to a higher number.

Conditions:
Once the maximum-paths config under router ospfv3 is changed to a value lower than the default value (say 8), then it cannot be subsequently changed back to a higher value (say 9).

Workaround:
workaround is to remove the maximum-path config so it changes back to the default value (i.e. 32) and then set the desired value

Further Problem Description:
This is a day 1 issue with verification of the configuration in OSPFv3

Last Modified:
20-AUG-2015
Known Affected Releases:
4.1.0.ROUT
Known Fixed Releases:
6.0.0.11i.ROUT
Alert Type:
New
Bug Id:
CSCuv43818
Title:
kernel and process core by l2vpn_mgr with 60 8I
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The symptom of the issue is node dumping kernel core while loading the image.

Conditions:
The issue is seen with normal traffic.

Workaround:
none

Further Problem Description:
non

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu54544
Title:
Syslog Cleanup for TOPAZ PLIM
Status:
Fixed
Severity:
3 Moderate
Description:

syslog cleanup for topaz plim

Symptom:syslogs are getting printed on the console when the breakout is configured.
Conditions:When the breakout is configured on CRS-X plim, syslog is getting displayed on the console.
Workaround:none

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
5.3.2.13i.FWDG, 6.0.0.10i.FWDG
Alert Type:
New
Bug Id:
CSCuv84124
Title:
NETCONF-YANG: prevent logical interface flapped with replace operation
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When a customer sends a netconf edit-config request with replace option to replace logical interface config, the interface is flapped (it goes down and up).

Conditions:
Sending netconf edit-config with replace option for logical interface (such as Loopback, Tunnel, etc.)

Workaround:
Instead of sending edit-config with replace option, conform a mixture of edit-config with delete option and edit-config with merge option to do the same config change as edit-config with replace option would do.

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
6.0.0.MGBL
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv05725
Title:
SR TE : traceroute not displaying MPLS labels
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Trace-route is not working for SR-TE tunnel destination.

Conditions:
Executing trace-route command

Workaround:
None

Further Problem Description:

Last Modified:
22-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtu17011
Title:
Privilege escalation through utility script command
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
An authenticated user with basic-services (EXECUTE) privileges, e.g. operator, can escalate privileges using the ''utility script'' command.
Conditions:
Default system configuration.
Workaround:
None at this time.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.6/5.6: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:U/RC:C
CVE ID CVE-2012-0348 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL
:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.ht




Last Modified:
23-AUG-2015
Known Affected Releases:
4.1.1.BASE
Known Fixed Releases:
4.2.3.28i.BASE, 4.3.0.17i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu05562
Title:
IPSLA config apply failures upon router reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After router reload when the router configuration includes a permanent port defined for ipsla responder feature, the following output may be seen as the result of "show configuration failed startup" command:
'Event Manager' detected the 'informational' condition 'Operation scheduled for later retry'

Conditions:
While router is coming up during reload or upgrade, the IPSLA responder CLI command to create a permanent port fails if socket cannot be open/bound successfully, but the record for the permanent port is always created in IPSLA database, and regular retries are scheduled to open the socket for the permanent port. So the CLI command is applied, the IPSLA responder database is updated, and the port will become usable by ipsla once the system is fully up and operational after reload.

Therefore for such a case, the ?show configuration failed startup? command will indicate the status at startup with a message of alert level 'informational' as shown above. This message is persistent until the next reload.

The "show configuration failed startup" command shows messages of all alert levels ('failed', 'warning', 'informational'), and in this particular case the message is 'informational', which means it can be safely ignored because it is due to a transient state at startup, and eventual retries will succeed

Workaround:
Ignore the informational message related to IP SLA responder under ?show configuration failed startup".
"show ipsla responder statistics all ports" command can be used to detect when the ports become fully operational after startup

Further Problem Description:

Last Modified:
24-AUG-2015
Known Affected Releases: *
5.3.1.MGBL, 6.0.0.BASE
Known Fixed Releases:
5.3.2.11i.MGBL, 6.0.0.5i.BASE
Alert Type:
New
Bug Id:
CSCuv58057
Title:
"No L2vpn" on xconnect of LANPHY interface leads to fia_driver crash.
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
"No Interface" on created LANPHY interface leads to fia_driver crash.

Conditions:

Workaround:

Further Problem Description:
fia_driver crash is again seen with following step.

1. Configure LAN PHY interface.
2. Configure the XConnect on it
3. Unconfigure the L2vpn Xconnect
4. Do ?no interface? to the created LAN PHY interface.

With step 4 , commit failure is seen with below commit error & fia_driver get crashed.


RP/0/RP0:frodo(config)#show configuration f
failed formal
RP/0/RP0:frodo(config)#show configuration failed
!! SEMANTIC ERRORS: This configuration was rejected by
!! the system due to semantic errors. The individual
!! errors with each failed configuration command can be
!! found below.


interface TenGigE0/6/0/3
no l2transport
!!% The process 'ether_caps_partner' took too long to respond to a verification request and was timed out
!

Backtrace for Thread 3706
#0 0x00007f92aba28ec7 in key_cmp+0x7a from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa_db.so
#1 0x00007f92dab5ac12 in avl_search+0x33 from /opt/cisco/XR/packages/iosxr-os.rp_lc-6.0.0.06I/lib/libcalvados_ios.so.0.0.1
#2 0x00007f92aba29026 in bcmdpa_db_get+0x66 from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa_db.so
#3 0x00007f92b562f938 in bcmdpa_server_api_dnx_l2_cross_connect_delete+0x3d from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa_dnx_table_server.so
#4 0x00007f92b55de96b in dnx_table_server_dispatcher+0xa6ae from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa_dnx_table_server.so
#5 0x00007f92c2ce223d in bcmdpa_msg_dispatcher+0x31 from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa.so
#6 0x00007f92c2ce2469 in bcmdpa_zmq_main+0x1e5 from /opt/cisco/XR/packages/dpa.lc-6.0.0.06I/lib/libbcmdpa.so
#7 0x00007f92c0e579bc in start_thread+0xdc from /lib64/libpthread-2.12.so
#8 0x00000004000001a9 in ?? ()

Last Modified:
24-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut24724
Title:
[NCS4K] Unqualified PPM reported as MEA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The alarm unqualified PPM is reported as MEA alarm, as it does not support unqualified PPM

Conditions:
The alarm unqualified PPM is inserted on a port of LC
AIS-PM is injected on same port
Unqualified PPM is reported as MEA and thus it masks the transport alarm AIS on same port

Workaround:
None

Reproducibility (%):100%

Expected Resolution:This issue will be fixed in a future release.

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE, 5.2.4.FWDG, 5.2.4.K9SEC, 5.2.4.LC, 5.2.4.MCAST, 5.2.4.MGBL, 5.2.4.MPLS, 5.2.4.ROUT, 5.2.4.TOOLS
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCup32037
Title:
NCS4K-24LR-O-S: OC192 and OTU2 jitter generation test failed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Observed higher error rate on running traffic.

Conditions:
Setup traffic and monitor error rate

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.3.BASE, 5.2.41.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut29336
Title:
NCS4k:Wrong Wavelength Value in Netconf o/p for Optics Interfaces.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
NCS4k:Wrong Wavelength Value is displayed in Netconf output for Optics Controller.

Conditions:
When wavelength value of optics controller is viewed via Netconf Interface.

Workaround:
Workaround- None

Reproducibility (%):- 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.3.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCus88864
Title:
NCS4K Sonet wrong alarm propagation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On [NCS4K-24LR-O-S] Sonet traffic may see wrong alarm propagation when the Sonet client port receives Loss Of Signal Alarm

Conditions:
Loss Of Signal on Sonet client port.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE, 5.2.4.LC
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut48167
Title:
[nCS4K-2H-W] RTRV-OPTICS doesn't show TX pwr set point on Trunk ports
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If value of transmit-power is set by the user, this value will be not visible to the user, rather current transmit power measured by drivers will be visible.

Conditions:
Retrieve Optics TL1 command rtrv-optics will not show the set point of TX power.

Workaround:
Expected Resolution:Will be given in later release after 5.2.4.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut69236
Title:
Delete Alarm profile from the NODE but behavior still persist.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On deleting a alarm profile behavior still persist and continue shows last active alarm profile values on reproducing alarm rather than showing default values.

Conditions:
This might occur due to Software conditions like when alarm profile has been actively applied for system level and then deleted.

Workaround:
NONE

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv49651
Title:
Detailed attribute pane is opening two times.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Detail attribute pane is opening two times. First when Basic attribute pane is open and secondly when source and destination controller are selected.

Conditions:
when user select source and destination controller in Basic attribute pane, detail attribute pane is opening two times.

Workaround:
Reproducibility :100%
Expected Resolution: Release 6.0

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut66413
Title:
MEM Leak:RTRV commands leaking high memory
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
TL1 retrieve commands may leak memory

Conditions:
TL1 process leaks some bytes of memory for every RTRV command that gets executed.

Workaround:
Workaround: restart the tl1 process

Expected Resolution: Under analysis.

Reproducibility (%): The output of "show memory compare report" is different for same rtrv command executed, several times.

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv15157
Title:
To Support new feature "Fast Circuit Creation" for release 6.0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
To introduce feature of fast circuit creation in 6.0 release.

Conditions:
now user can create the circuit through fast circuit creation wizard also.

Workaround:
circuit can also be created through Network view > OTN > Create circuit.

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCul99389
Title:
IPSLA Umbrella SMU
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:This is an Umbrella DDTS for IPSLA related fixes. Please check the individual DDTS list for details.
CSCul33732 Packet MIA calculation is wrong
CSCul64125 XR: IP-SLA interval timer event isn't triggered

Conditions:
Workaround:

Last Modified:
25-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
5.1.1, 5.1.11, 5.1.12, 5.1.2, 5.1.2.99i.BASE, 5.1.3, 5.1.4, 5.2.0, 5.2.1, 5.2.2
Alert Type:
Updated *
Bug Id:
CSCut81908
Title:
TL1 help not working for ed-odu4
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Command format help for ED-ODU4 is not visible to the user.

Conditions:
User trying to seek help as "ED-ODU4 ?" in TL1 command prompt will be impacted.

Workaround:
Expected Resolution: Will be given in later release after 5.2.4.
Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCus70578
Title:
[NCS4K-2H-W] Default for Optics PM Thresholds wrong
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The default thresholds of parameters for optics controllers is wrong

Conditions:
Incorrect thresholds of parameters of optics controllers are seen on CLI,CTC and TL1

Workaround:
Config the correct values using config CLI/CTC options

Reproducibility (%):100%

Expected Resolution: The issue is yet to be committed in next release

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut86949
Title:
OCI alarm is not removed on Hyphy ASIC reset
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On doing PM5450 device ASIC reset, ODU-OCI alarms was not getting removed by x-connected ODU interfaces on that respective PM5450 device

Conditions:
On PM5450 device reset of NCS4K-24LR-O-S

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu17320
Title:
Manual switch clear automatically after LCVM Switch-over
Status:
Fixed
Severity:
3 Moderate
Description:

Manual switch clear automatically after LCVM Switch-over

Symptom:
Manual Switch is getting clear after LCVM Switchover.

Conditions:
Apply Manual switch on tunnels and then apply LCVM switchover

Workaround:
No workaround

Further Problem Description:
NA

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv91684
Title:
call-home messages flood on the console after XRv9k bring up
Status:
Open
Severity:
3 Moderate
Description:

Symptom:After initial boot, the console is flooded with messages

%HA-HA_CALL_HOME-3-NO_HOSTNAME : Failed to send call-home message due to no hostname configured.
tty_exec_launcher[67161]: %MGBL-TTY-3-OPEN_OR_DUP_DEVICE : Failed to open device file '/dev/pts/4': 'No such file or directory'
tty_exec_launcher[67161]: %MGBL-TTY-3-SET_PROCESS_GROUP : Failed to set '/dev/pts/4' as the controlling terminal for the process: 'No such file or directory'

Conditions:This occurs When we bring up XRV9k without hostname configured
A condition is created when we fail to send call-home message


Workaround:
Configure hostname in XR

Last Modified:
25-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut81555
Title:
[SBT]ccc_driver crash observd on insertion RP followed by OIR of CPAK
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
CCC Driver Crash

Conditions:
Insert RP Card, OIR CPAK Card

Workaround:
None

Further Problem Description:
1. The system is running DT-20.
2. Did Insertion of the RP card , followed by OIR of CPAK card.
3. Observing ccc_driver crash.

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut82878
Title:
[NCS4K-20T-O-S] digi extraction in EW triggers otn-framer-digi crash
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Process otn_framer_digi crash is seen while performing OIR of line card NCS4K-20T-O-S.

Conditions:
1. Configure traffic in EW configuration using NCS4K-20T-O-S+NCS4K-2H-O-W line card.
2. Perform Line card OIR of NCS4K-20T-O-S card multiple times.
3. otn_framer_digi crash is seen after Line Card OIR.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE, 5.2.4.FWDG, 5.2.4.K9SEC, 5.2.4.LC, 5.2.4.MCAST, 5.2.4.MGBL, 5.2.4.MPLS, 5.2.4.ROUT, 5.2.4.TOOLS
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut47181
Title:
RTRV-TADRMAP not able to show the information of IPV6 ADDRESS.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In RTRV-TADRMAP command with MODE=PROV(it will give all configuration both ipv4 and ipv6 ,if there is no configuration then it will return COMPLD), it first goes for retrieving ipv4 and then ipv6, in the code if it failed to retrieve ipv4 then it returned without trying to retrieve ipv6.

If only IPV6 is configure and we will trying to retrieve with MODE=PROV then it will faile.

Conditions:
To reproduce the bug...
1. Configure Only IPV6 ADDRESS through ENT-TADRMAP command
2. Retrieve the information through RTRV-TADRMAP:::1:::MODE=PROV;

Workaround:
Expected Resolution: Will be given in later release after 5.2.4.

No workaround.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv49650
Title:
UIT FCC: controller present on the slot 11 is not coming in src text box
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
controllers present on slot 11 was not coming on source text box.

Conditions:
If any controller is present on slot with two digits, it was not coming in source text box.

Workaround:
Reproducibility : 100%
Expected resolution : release 6.0

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut50029
Title:
SET-ATTR-SECUDFLT showing failing and also showing invalid sysdb logs.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SET-ATTR-SECUDFLT shows "Config Manager Error" and not able able to set the timeout values and maximum invalid attempts allowed.

Conditions:
Open TL1 session on Scapa chassis and execute SET-ATTR-SECUDFLT command.

Workaround:
None

Expected Resolution: Will be given in later release after 5.2.4.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.MGBL
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu38731
Title:
Traffic resume late on Tunnel deletion/recreation after stdby RP plugout
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traffic recovered late on tunnel deletion/recreation

Conditions:
After standby RP plugged out

Workaround:
No workarounds

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut57842
Title:
[NCS4K-20T-O-S] wrong loopback behavior
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On Configuring Line Loopback or Internal Loopback individually, incorrect loopback behaviour is seen (ie. Both Internal and Line loopback are detected)

Conditions:
Configure Line Loopback or Internal Loopback at ODU2e

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut59420
Title:
ENT-TADRMAP is not returning any information.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ENT-TADRMAP is not displaying any success/failure response to the user.

Conditions:
Execute TL1 command ENT-TADRMAP on Scapa chassis. No response is given to the user.

Workaround:
None

Expected Resolution: Will be given in a later release after 5.2.4.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut92473
Title:
AID count to be increased for TL1 RTRV commands
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RTRV commands in TL1 do not display controller information if number of controllers on Scapa chassis exceed 255.
Not able to retrieve data with 'all' aid when huge number (>255) of controllers/invenotory/tunnels configured.

Conditions:
Create more than 255 ODU controllers on the Scapa chassis. Execute RTRV-ODUk command on TL1 interface.
No controller information would be displayed.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut93103
Title:
otn_framer_hyphy crash observed on series of RP OIR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Otn_framer_hyphy process crash observed on LC VM when RP-OIR is performed

Conditions:
PRocess crash on LC VM on RP-OIR when node is in READY state.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.ADMIN, 5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv56274
Title:
FCC UIT : Issue found in opening detail Attribute Pane.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Detailed attribute pane is not opening according to the requirement. In NNI , source and destination controller are shown.

Conditions:
when basic attribute pane is opening for NNI, source and destination controller are shown and when user select one controller in case of UNI, detail attribute pane is getting open.

Workaround:
Reproducibility : 100%
Expected Resolution : Release 6.0

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu12524
Title:
TCA sent 1 second before for UAS mode.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
TCA is raised one second before entering into UAS mode.

Conditions:
UAS threshold is configured and alarms are triggered.

Workaround:
Workaround: None

Reproducibility: 100%

Expected resolution:
To be fix in next release

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuo55977
Title:
NCS4K-24LR-O-S: OC48&OTU1 jitter generation test failed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Observed higher error rate on running traffic.

Conditions:
Setup traffic and monitor error rate

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut53463
Title:
SigLOS (Ethernet) not suppressed by optics-mea alarm
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SigLOS alarm is not suppressed by optics MEA alarm for Ethernet controller

Conditions:
1. Create Ethernet controller.
2. Replace 10 gig pluggable with 2.5 gig pluggable
3. MEA, SigLOS and OPUK-CSF are visible in show alarm CLI output

Workaround:
NONE

Reproducibility (%):100

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut58001
Title:
Enable TCE[NCS4K-24LR-O-S] unexpected OPTICS LASER-BIAS-MAX(NE) PM TCA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Unexpected TCA is raised for OPTICS LASER-BIAS-MAX(NE)

Conditions:
Enable TCA for LBC(mA), and commit the configuration
TCA is raised even if LBC is not supported on LC card

Workaround:
None

Reproducibility (%):100%

Expected Resolution: The fix is yet to be committed in next release

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu08413
Title:
NCS4K: otn_framer_digi crashed on CPAK NNI Physical OIR on stdby LC vm
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
otn_framer_digi process crashed

Conditions:
CPAK NNI physical OIR

Workaround:
No workarounds

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
5.2.4.BASE, 6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu39182
Title:
Xconnect created via TL1 is not displayed in "show running config"
Status:
Fixed
Severity:
3 Moderate
Description:

Xconnect created via TL1 is not displayed in ?show running config?

Symptom:
Xconnects created via TL1 on Cisco NCS4016 router are not visible in "sh running" output.

Conditions:
1. Open a TL1 session
2. Activate a user using ACT-USER command.
3. Create a cross connect between any ODU controllers.
4. Do " show running"

Workaround:
Workaround: NA
Expected Resolution: In later releases of Cisco NCS4016.
Reproducibility (%): 100%

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut40965
Title:
N4K : LEPTON New image version is not comming in-effect after upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Upgrade the LEPTON fpd on NCS4K-2H-O-K card, the device still runs on the older fpd image version.

Conditions:
After the completion of LEPTON FPD upgrade, Running FPD Version and packaged SW Ver are not same i.e. lepton still runs on older fpd version.

Workaround:
Reload (software/physical OIR) the LC after FPD upgrade then New FPD image version comes in effect.

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv51694
Title:
UIT FCC : Value of service type is not correct.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Service state on basic attribute pane is not correct shown.

Conditions:
When Basic attribute pane is opened after selecting source and destination node, service state is not shown correctly.

Workaround:
Reproducibility : 100%
Expected Resolution : Release 6.0

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu43956
Title:
Remote state is not updating at other end for exercise in uni profile
Status:
Fixed
Severity:
3 Moderate
Description:

Remote state is not updating at other end for exercise in uni profile

Symptom:
Far end Remote state does not update on applying exercise command.

Conditions:
Apply Exercise command on one end on 1+1 UNIDIR-APS protection type tunnel.

Workaround:
No Workaround

Further Problem Description:
NA

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu23593
Title:
RTRV-ALM-ALL command not working with AID FAC-ALL
Status:
Fixed
Severity:
3 Moderate
Description:

RTRV-ALM-ALL command not working with AID FAC-ALL

Symptom:
Execute TL1 command, RTRV-ALM-ALL with aid as "FAC-ALL" , "Config Manager Error" is shown in response.

Conditions:
On a Scapa node having alarms, execute TL1 command RTRV-ALM-ALL with aid as "FAC-ALL" . Error is shown to the user instead or displaying proper filtered alarms.

Workaround:
None

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv83159
Title:
li_ea process respawning multiple time during MC bootup
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
li_ea process getting abnormally terminated multiple times during Router

Conditions:
This issue is seen only on CRS MULTICHASSIS 8+2 system during bootup.

Workaround:
NA

Further Problem Description:
No functionality impact as the process gets into RUN state after getting terminated abnormally multiple times.

Last Modified:
26-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu76002
Title:
memleak in fib_mgr @ fib_bcdl_io_rcc_handle_route_label_verify_msg
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Memory utilization by process fib_mgr increases continuously.

Conditions:
Hitting this issue during MPLS tunnel flapping in core network.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
26-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
5.3.2.13i.FWDG, 6.0.0.10i.FWDG
Alert Type:
New
Bug Id:
CSCuv75924
Title:
SYSLOG CLEANUP - client showd_lc attempted duplicate registration
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Unwanted syslog messages generated during bootup.

Conditions:
These syslog messages are seen on CRS MULTI- CHASSIS and BACK2BACK routers every time while booting.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
26-AUG-2015
Known Affected Releases:
5.3.2.BASE, 5.3.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu79592
Title:
FABRIC-FIA-3-ERR_CHANNEL_DOWN during fabric upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%FABRIC-FIA-3-ERR_CHANNEL_DOWN syslog errors during fabric upgrade on multi chassis

Conditions:
Upgrade from 140G to 400G fabric

Workaround:
None

Further Problem Description:
Fabric upgrade was being performed on Rack 6 and 7 (both Taiko). Half the fabric was upgraded to 400G and is still unpowered but the errors started getting generated on Racks 4 and 5 (only).

RP/0/RP1/CPU0:PHLCRS1(admin)#sh controllers fabric plane all

Plane Admin Oper up->dn up->mcast
Id State State counter counter
---------------------------------------------
0 UP UP 0 0
1 UP UP 0 0
2 UP UP 0 0
3 UP UP 0 0
4 DOWN DOWN 1 0
5 DOWN DOWN 1 0
6 DOWN DOWN 1 0
7 DOWN DOWN 1 0
RP/0/RP1/CPU0:PHLCRS1(admin)#
RP/0/RP1/CPU0:PHLCRS1(admin)#sh plat | inc 400
Wed Jun 10 16:11:09.358 EDT
6/SM4/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
6/SM5/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
6/SM6/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
6/SM7/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
7/SM4/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
7/SM5/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
7/SM6/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
7/SM7/SP FC-400G/M(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM12/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM13/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM14/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM15/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM16/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM17/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM18/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM19/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM20/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM21/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM22/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
F0/SM23/SP FCC-SFC-400G(SP) N/A UNPOWERED NPWR,NSHUT,MON
RP/0/RP1/CPU0:PHLCRS1(admin)#

Last Modified:
26-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2.18i.BASE, 5.3.3.3i.BASE, 6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq15057
Title:
Possible delete hw-module for regen with trunk ports in service
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Traffic remains up and running even after deleting hardware-module for NCS4K-2H-W card in regeneration operating mode,
when the trunk-ports are in-service.

Conditions:
1. Equip an NCS4k(4016) node with two 2x100 GE NCS4K-2H-W cards in slot 2 and 5.
2. Configure NCS4K-2H-W in slot 2 with TXP(transponder) card mode (all trunks ports in-service)
3. Configure NCS4K-2H-W in slot 5 with Regen (regeneration) card mode (port 2 and 3 OTU4 in Service).
4. Connect Port 0 and 1 of NCS4K-2H-W in slot 2 with OTU4 sources.
5. Connect Port 2 of NCS4K-2H-W in slot 2 to port 2 of NCS4K-2H-W in slot 5,Port 3 of NCS4K-2H-W in slot 2 to port 3 of NCS4K-2H-W in slot 5.
6. Verify that the Traffic OUT4 is up and running.
7. Delete hw-module on NCS4K-2H-W in slot 5 through CLI (no hw-module)
8. commit

Workaround:
None

Expected Resolution: This issuw will be fixed in a future release.

Reproducibility (%): 100%

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
5.2.1.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuo34571
Title:
HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT for locald_DSC and drp_pairing
Status:
Fixed
Severity:
3 Moderate
Description:

The following message floods in syslog after upgrade form 4.0.1 to 4.2.3
RP/0/RP0/CPU0:Apr 7 10:13:29.889 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:23:30.541 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:23:30.541 : drp_pairing[181]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/drp_pairing_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:33:31.155 : drp_pairing[181]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/drp_pairing_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:33:31.155 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing



Restart the affected process using $admin processes restart pid (PiD of drp_pairing or local_DSC)

Symptom:
The following message floods in syslog after upgrade form 4.0.1 to 4.2.3
RP/0/RP0/CPU0:Apr 7 10:13:29.889 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:23:30.541 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:23:30.541 : drp_pairing[181]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/drp_pairing_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:33:31.155 : drp_pairing[181]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/drp_pairing_001.d/node0_RP1_CPU0 failed after 60 retries - continuing
RP/0/RP0/CPU0:Apr 7 10:33:31.155 : locald_DSC[311]: %HA-CHKPT_MESSAGING-7-STANDBY_OPEN_TIMEOUT : Attempts to open standby channel /dev/chkpt_procs/locald_DSC_001.d/node0_RP1_CPU0 failed after 60 retries - continuing

Conditions:
Single Chassis or Multi chassis CRS. Upgrade from upgrading from

Workaround:
Restart the affected process using $admin processes restart pid (PiD of drp_pairing or local_DSC)

or

Relaod of Standby RP

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
5.3.0, 5.3.0.15i.BASE, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCuu29968
Title: *
IOS XRv9000 sho cef vrf ipv6 exact-route not working correctly
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:show cef vrf ipv6 exact-route does not give the correct outgoing path for the packet.

Conditions:When the route is via 6pe or 6vpe

Workaround:None

More Info:


Last Modified:
26-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv53766
Title:
ATT-CERT: mac_err_txmac_SpaTimeOut interrupt on JP5 on 1-100GbE PLIM
Status:
Open
Severity:
3 Moderate
Description:

ATT-CERT: mac_err_txmac_SpaTimeOut interrupt on JP5 on 1-100GbE PLIM
Symptom:The below error message is seen while doing plim OIR
%L2-PLIM-2-ERR_HW_HARD_RESET : Device: JP5 Tx MAC. Error: mac_err_txmac_SpaTimeOut. Software action: Hard reset JP5 FPGA
Conditions:Perform 1-100GbE PLIM physical OIR.
Workaround:No impact. No workaround available.



Last Modified:
27-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus28869
Title:
traffic drop for 1minuter after RP FO with 64k pwhe ipoeds session
Status:
Fixed
Severity:
3 Moderate
Description:

This issue needs to be on the caveat list for 5.3.0. It was found just before longevity testing and the fix for it involves very important changes to the way PE-HE replication process is performed upon RP-FO triggers and are very risky in nature + will require extensive testing.

Symptom:
With 64,000+ PW-HE IPoE sessions, traffic may be lost for up to one (1) minute upon RP failover events.

Conditions:
This problem only manifests itself in very high (64K+) PW-HE scalability scenarios where traffic may be lost for up to 60 seconds, but does recover.

Workaround:
There is no workaround for this problem.

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.3.0.ADMIN
Known Fixed Releases: *
5.3.2.18i.FWDG, 5.3.3.3i.FWDG, 6.0.0.12i.FWDG
Alert Type:
New
Bug Id:
CSCuv90517
Title:
ipsec_mp crash at bootup after router upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ipsec_mp crash is seen during bootup

Conditions:
software image upgrade to 532 to CRS MULTI CHASSIS System

Workaround:
NA

Further Problem Description:
NA

Last Modified:
27-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv54912
Title:
show controller cli failed after cpak oir followed by arwen oir
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Optics not up after LC reload on CPAK

Conditions:
Optics not up after LC reload on CPAK

Workaround:
NA

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.2.41.BASE, 6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv71161
Title:
Continuous shmwin_svr crashes on PE/P routers during longevity
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
process shmwin_svr crashes continuously on reloading peer router

Conditions:
Observed on CRS single and multi-chassis router while testing 532. This issue is consistently seen when router is forwarding IP/MPLS traffic for more than 24 hours.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
27-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup68651
Title:
Enhancement of software scrubbing the pse memory for SBE interrupts-
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
In certain conditions the PSE memory gets stuck with single bit errors (SBE) and a message is logged
similar to:
pse_pogo_driver[244]: %PLATFORM-CIH-5-ASIC_ERROR_SCRUB_THRESH : pse[1]: A sbe error has occurred
causing data corrected. 0x12470009 Threshold has been exceeded

Conditions:
When SBE interupts cross a threshold they start logging these messages. An SBE is totally benign since it
will be corrected by the HW whenever the memory is ready. This error is single bit error and hardware
corrects it itself without any user intervention required.

Workaround:

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.1.3.LC
Known Fixed Releases: *
5.2.3.99i.BASE, 5.3.0, 5.3.0.15i.FWDG, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCuv94859
Title:
no-export routes being advertised to eBGP nei after upgrade 4.1.1->4.3.2
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
After CRS upgrade from 4.1.1 to 4.3.2 routes with no-export community set were advertised to eBGP neighbors.

Conditions:
TBD, but definitely upgrade from 4.1.1 to 4.3.2 is one of the triggers.

Workaround:
BGP neighbors reset after leak is being observed.

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
4.3.2.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui18170
Title:
isis process crash after polling isisMIB
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ISIS process may unexpectedly restart

Conditions:
The problem may happen when ISIS is polled via SNMP for adjacency table (isisISAdjTable in ISIS MIB), and there are no adjacencies established at any level.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.0.0.BASE
Known Fixed Releases: *
5.0.0, 5.0.0.36i.ADMIN, 5.0.0.36i.ROUT
Alert Type:
New
Bug Id:
CSCuv83272
Title:
MPLS s/w switch is dropping traffic for local-labels assigned to interf.
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
FIB does not treat correctly the local-labels allocated for the interface's addresses. Hence, the incoming traffic with these labels is dropped in MPLS s/w switch. As a result input drops counter on interfaces where traffic is being received is incrementing.

Conditions:
Traffic destined to local interface /32 prefix which has assigned label, but FIB is not awared of it.

Issue could be seen by output like:

show route vrf {vrf_name} {/32 prefix for local interface} detail
<...>
Known via "local", distance 0, metric 0 (connected)
<...>
Route metric is 0
Label: None <--- FIB has no label
Tunnel ID: None
Extended communities count: 0
Route version is 0x2 (2)
Local Label: 0xfffcf (1048527) <--- traffic is coming with additional label assigned by BGP for /32 prefix, but there is no outgoing label in FIB, so it is dropped

Workaround:
None yet known.

Further Problem Description:
tbd

Last Modified:
28-AUG-2015
Known Affected Releases:
4.2.4.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv97450
Title:
Arwen asking fresh usrname n pwd to config are powercycle/idletime out
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Arwen asking fresh usrname n pwd to config are powercycle/idletime out

Conditions:

Workaround:

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv62348
Title:
OSPF crash on rolling back ospf config with SR and TI-LFA with ASBR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
OSPFv2 process crash in certain conditions

Conditions:
When OSPF is configured with SR and using TI-LFA. There are multiple ECMP paths (i.e. candidate backups) towards the ASBR.

Workaround:
None

Further Problem Description:
This is a code issue which could hit in certain conditions. It was introduced in 5.3.0 as part of the Segment Routing TI-LFA feature.

Last Modified:
28-AUG-2015
Known Affected Releases:
5.3.0.ROUT
Known Fixed Releases:
5.3.2.20i.ROUT, 5.3.3.6i.ROUT, 6.0.0.10i.ROUT
Alert Type:
New
Bug Id:
CSCuv61018
Title:
ctc: Warning msg should be displayed for disabling flooding on WRK link
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ctc: Warning msg should be displayed for disabling flooding on WRK link

Conditions:
If there is any live traffic running on the link where flooding is being disabled, warning message should be displayed stating that "This operation might be traffic impacting"

Workaround:
ctc

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv99911
Title:
BGP sessions take 30 to 45 mins for NSR Ready after RPFO
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
After RPFO , delay of 30 to 45 mins seen for BGP to come to NSR Ready state.

Conditions:
Route scale approx 500K
Seen with IOX-XR 5.3.1

Workaround:
None

Further Problem Description:

Last Modified:
29-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv44324
Title:
ATT-CERT: spa_oc48 assert @ im_attr_owner on bringup post router reload
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Process spa_oc48 crash seen on router reload

Conditions:
4XOC48-POS SPA

Workaround:
N/A

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu69561
Title:
IPv4,v6 Traffic drop as NH PUNT on proc restart fib_mgr on LC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IPv4 and IPv6 Traffic drops in the network for short interval.

Conditions:
Process fib_mgr getting restarted

Workaround:
NA

Further Problem Description:
NA

Last Modified:
29-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
5.3.2.13i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv33193
Title:
[CTC]Correction for NET layer operating on Delegate
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
[CTC]Correction for NET layer operating on Delegate

Conditions:
removed the delegate method for net layer

Workaround:
CTC NET Layer

Further Problem Description:

Last Modified:
29-AUG-2015
Known Affected Releases:
6.0.0.MGBL
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv44502
Title:
member-stats for qos-mib not showing up after int-bundle changes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SNMP unable to poll cbQosIFPolicyIndex

snmpwalk -c public -v 2c xxxx 1.3.6.1.4.1.9.9.166.1.2.1.1.1.1502
iso.3.6.1.4.1.9.9.166.1.2.1.1.1.1502 = No Such Instance currently exists at this OID

Conditions:
Configure interfaces under bundle
Configure snmp-server qos mib member-stats
Query qos-mib for bundle and member interface

Workaround:
Remove and re-add snmp-server qos mib member-stats

Further Problem Description:
Issue can get triggered anytime when Bundle members are added or removed.

Last Modified:
29-AUG-2015
Known Affected Releases:
5.2.0.BASE, 5.3.0.LC, 5.3.0.MGBL, 5.3.0.TOOLS
Known Fixed Releases:
5.3.2.19i.BASE, 5.3.3.5i.FWDG, 6.0.0.11i.FWDG
Alert Type:
New
Bug Id:
CSCuv58195
Title:
qos_ea crash @ plwkr_pmap_get_max_hierarchy on Topaz
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
qos_ea process crash on CRS-X

Conditions:
Crash happens while there are bundles flapping on the router

Workaround:
NA

Further Problem Description:
NA

Last Modified:
30-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv83310
Title:
MPLS s/w switch is dropping traffic for local-labels assigned to interf.
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
FIB does not treat correctly the local-labels allocated for the interface's addresses. Hence, the incoming traffic with these labels is dropped in MPLS s/w switch. As a result input drops counter on interfaces where traffic is being received is incrementing.

Conditions:
Traffic destined to local interface /32 prefix which has assigned label, but FIB is not awared of it.

Issue could be seen by output like:

show route vrf {vrf_name} {/32 prefix for local interface} detail
<...>
Known via "local", distance 0, metric 0 (connected)
<...>
Route metric is 0
Label: None <--- FIB has no label
Tunnel ID: None
Extended communities count: 0
Route version is 0x2 (2)
Local Label: 0xfffcf (1048527) <--- traffic is coming with additional label assigned by BGP for /32 prefix, but there is no outgoing label in FIB, so it is dropped
<...>

Workaround:
None yet known.

Further Problem Description:
tbd

Last Modified:
30-AUG-2015
Known Affected Releases:
4.2.4.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv77729
Title:
Inconsistency in the Time slot of UNI and NNI controller.(10gig-FLEX)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Incorrect values of time-slots are seen for uni controller always and flex bandwidth is displayed always zero.


Conditions:
When a tunnel is created, nni controller shows correct values of time-slots used but uni controller always shows time-slots values as 8(Default). Values of time-slots are not being updated after tunnel creation using lower number of time-slots.


Workaround:
None

Further Problem Description:

The values of time-slots are not being updated for uni controller by dll-sb when tunnel is created or deleted

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv73389
Title:
Umbrella ddts to commit CSCuq72480 & CSCuu98459 to 514
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

Conditions:

Workaround:

More Info:
Umbrella DDTS for CSCuq72480 & CSCuu98459.

Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.4.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv73930
Title:
proc restart plat_sl_client takes longer to increment the respawn count
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show process plat_sl_client
Job Id: 391
PID: 18665
Executable path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/bin/plat_sl_client
Instance #: 1
Version ID: 00.00.0000
Respawn: ON
Respawn count: 4
Last started: Tue Aug 11 09:51:19 2015
Process state: Run (last exit due to SIGKILL)
Package state: Normal
Process group: dsc
core: MAINMEM
Max. core: 0
Level: 250
Placement: DSC Tracker
startup_path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/startup/plat_sl_client.startup
Ready: 2.436s
Process cpu time: 0.000 user, 0.000 kernel, 0.000 total
JID TID Stack pri state NAME rt_pri
391 18665 0K 20 Sleeping Plat SL Client 0
391 18666 0K 20 Sleeping lwm_debug_threa 0
391 18667 0K 20 Sleeping plat_sl_client 0
391 18668 0K 20 Sleeping lwm_service_thr 0
391 18669 0K 20 Sleeping qsm_service_thr 0
391 18670 0K 20 Sleeping plat_sl_client 0
391 18672 0K 20 Sleeping plat_sl_client 0
391 18673 0K 20 Sleeping Plat SL Client 0
391 18689 0K 20 Sleeping Plat SL Client 0
391 18697 0K 20 Sleeping Plat SL Client 0
-------------------------------------------------------------------------------
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#process restart plat_sl_client
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show process plat_sl_client
Job Id: 391
PID: 18665
Executable path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/bin/plat_sl_client
Instance #: 1
Version ID: 00.00.0000
Respawn: ON
Respawn count: 4
Last started: Tue Aug 11 09:51:19 2015
Process state: Terminating (last exit due to SIGKILL)
Package state: Normal
Process group: dsc
core: MAINMEM
Max. core: 0
Level: 250
Placement: DSC Tracker
startup_path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/startup/plat_sl_client.startup
Ready: 2.436s
-------------------------------------------------------------------------------
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show process plat_sl_client
Job Id: 391
PID: 18665
Executable path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/bin/plat_sl_client
Instance #: 1
Version ID: 00.00.0000
Respawn: ON
Respawn count: 4
Last started: Tue Aug 11 09:51:19 2015
Process state: Terminating (last exit due to SIGKILL)
Package state: Normal
Process group: dsc
core: MAINMEM
Max. core: 0
Level: 250
Placement: DSC Tracker
startup_path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/startup/plat_sl_client.startup
Ready: 2.436s
-------------------------------------------------------------------------------
RP/0/RP0/CPU0:ott-ss-dt-16A-uut#show process plat_sl_client
Job Id: 391
PID: 18665
Executable path: /opt/cisco/XR/packages/xrv9k-base.rp-5.4.0.88I/bin/plat_sl_client<

Last Modified:
31-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
5.4.0.17i.BASE
Alert Type:
Updated *
Bug Id:
CSCum82798
Title:
Suppress %ROUTING-MRIB_API-3-LWM_ERR messages in steady state
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%ROUTING-MRIB_API-3-LWM_ERR messages are seen on router in steady state.

The messages was reported on P2MP-TE mid node label with two egress legs.

If the P2MP-TE mid node label only has one egress leg, then the message will not be reported.

Conditions:
Log message will appear if mcast pie is activated. IP multicast-routing config does not need to be enabled.

Workaround:
No action is required. This log message is for informational purposes only and does not affect functionality.

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.0.MCAST, 5.1.1.MCAST
Known Fixed Releases: *
5.1.1, 5.1.1.MCAST, 5.1.11, 5.1.11.18i.MCAST, 5.1.12, 5.1.2, 5.1.2.14i.MCAST, 5.1.3, 5.1.4, 5.2.0
Alert Type:
New
Bug Id:
CSCuv95494
Title:
SYSLOG CLEANUP: pse_pogo_driver - L2-PSE-7-DEBUG_MSG
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Debug message generated during boot up. No functional impact.

Conditions:
Seen on CRS Multi chassis router

Workaround:
NA

Further Problem Description:
NA

Last Modified:
31-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv75888
Title:
PKT_INFRA-NETIO-7-DELETE_IDB_SUBINTF_ASSOC_FAILED log msgs during bootup
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
NETIO related error messages generated from multiple bundle interface on CRS-1 Line cards during boot up. No functionality impacted.

Conditions:
Seen on CRS multi-chassis 8+2 system

Workaround:
NA

Further Problem Description:
Netio is giving errors because Bundle sub-interfaces were not deleted and bundle deletion operation was sent to netio.

Last Modified:
31-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv53911
Title:
Fragmented MPLS packets injected with MPLS label 4
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
MPLS packets are forwarded with outer MPLS label 4.

Conditions:
MPLS packets punted to LC CPU for fragmentation. Label operation should be pop.

Workaround:
No known workarounds

Further Problem Description:
Fragmentation in MPLS core should be avoided through network design.

Some bad consequences of fragmentation are:
- Packets may be delivered out of order. If packet 1 is large, it's delayed on the router because of fragmentation (depending on the platform implementation it may be punted to process level or looped through normal forwarding path). If packet 2 of the same flow is received immediately after the packet 1, it will be forwarded before the two fragments 1a and 1b are forwarded.
- Higher performance strain on the router. Regardless of which fragmentation method is implemented, at minimum a loop through the internal forwarding path is required, if not a punt to process level.
- On ASR9000 packets requiring fragmentation are policed on the punt path towards LC CPU.

Last Modified:
31-AUG-2015
Known Affected Releases: *
5.2.2.BASE, 5.2.4.MPLS, 5.4.0.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv79859
Title:
Arwen card view not opening after OIR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On OIR of Arwen card, user is not able to open card view in CTC.
It is happening for the current session of the CTC.

Conditions:
On OIR of Arwen card .

Workaround:
Close the current session and open new session.

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh56527
Title:
cIpMRoutePkts is not showing correct packet count for some of the groups
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
cIpMRoutePkts is not showing correct packet count for some of the groups.

Conditions:
No specific conditions needed.

Workaround:
None.

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.0.MCAST
Known Fixed Releases: *
4.3.2, 4.3.2.26i.MCAST, 4.3.3, 4.3.31, 4.3.4, 5.1.0, 5.1.0.15i.MCAST, 5.1.1, 5.1.11, 5.1.12
Alert Type:
Updated *
Bug Id:
CSCuf79122
Title:
CRS PLIMs and Optics version info
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:






Enhancement for CFP/XFP version support for future version changes
Conditions:




Future version CFP/XFP released
Workaround:



No workaround
More Info:












Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.1, 5.1.1.1i.FWDG, 5.1.11, 5.1.12, 5.1.2, 5.1.3, 5.1.4, 5.2.0, 5.2.1, 5.2.2
Alert Type:
New
Bug Id:
CSCut91048
Title:
Layer1 failure in SRP interfaces in 532.02I image
Status:
Open
Severity:
3 Moderate
Description:

Seeing Layer1 Failures in SRP interfaces. Due to this the link quality is in Unknown state.

Symptom:

Conditions:
After configuring SRP interfaces and making UP Layer1 Is in UNKOWN and FAILED state, which throws the link quality to Unknown state.

Workaround:
No Workaround

Further Problem Description:
No

Last Modified:
31-AUG-2015
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv79222
Title:
VZ LE1A - unexpected data at "show controller optics"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
For every port below parameters are visible in show controller optics output
Remove following lines (unless show controller optics refer to NCS4K-2H-W trunk ports 2 and 3):

"Configured Tx Power = 0.00 dBm"
"Configured CD-MIN 0 ps/nm CD-MAX 0 ps/nm"

Conditions:
So TX-Power, CD-MIN and MAX are part of show optics cli only when these are configurable, otherwise this filed is not visible to user.

Workaround : None

Expected Resolution: This issue will be fixed in a future release.

Reproducibility (%):100%

Workaround:

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv50132
Title:
vm_manager crash after admin reload in calvados
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
vm_manager crash

Conditions:
after admin reload in calvados

Workaround:

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw01715
Title:
Wrong entitymib entry under the port slot for GigabitEthernet0/0/0/0
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Wrong entitymib entry under the port slot for gig0/0/0/0.

Conditions:
when the GSR has 4GE-SFP-LC .

Workaround:
none.

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases: *
4.1.1.TOOLS
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtj87433
Title:
SSHD logs session disconnect messages without logging enabled
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
An ASR9K running 4.0.0 logs the following message every time and ssh session is disconnected

RP/0/RSP1/CPU0:Nov 2 13:04:46.328 : SSHD_[65837]: disconnect_session: sshd.state:10

ssh server logging is not configured

Conditions: ssh server is configured.

Workaround:
None

Last Modified:
02-AUG-2015
Known Affected Releases:
4.0.0.K9SEC
Known Fixed Releases: *
3.8.3, 3.8.4, 3.9.0, 3.9.1, 3.9.2, 3.9.3, 4.0.4, 4.1.1, 4.1.1.22i.BASE, 4.1.2
Alert Type:
Updated *
Bug Id:
CSCuu73965
Title:
Install add pkgs when no space left in root directory and repositories.
Status:
Other
Severity: *
4 Minor
Description:

Symptom:correct message is not displayed while doing install add from xr or calvados. Instead messages like these are shown:
Package "ncs4k-mini-x.iso" is invalid: Package has an unknown type or is corrupt"
Failed to distribute packages
Failed to deposit packages
ERROR! Unable to download package
Conditions:This happens in case there is not enough space in root partition of cavados, or xr or in xr install repository or calvados install repository which is present in /install_repo/gl/xr and /install_repo/gl/calvados
Workaround:
None

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.5.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCth01206
Title:
fr_lmi process crash observed with scaled frame-relay config
Status:
Open
Severity:
4 Minor
Description: *

Symptom:

fr_lmi process crash observed sometimes with scaled frame-realy pvc configuration.

Conditions:

Crash occured when 4000 frame relay pvcs were configured.

Workaround:

None.

Last Modified:
03-AUG-2015
Known Affected Releases:
4.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut29773
Title: *
Enhance PMengine ltraces
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Ltraces for PM ui and local port add delete mising

Conditions:
Ltraces for PM ui and local port add delete mising

Workaround:
NA

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut77824
Title:
LDP interfaces limited to 800
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
LDP interfaces currently limited to 800

Conditions:
800 ldp interfaces conifgured

Workaround:
none

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.1.3.MPLS
Known Fixed Releases: *
5.3.2.21i.MPLS, 5.3.3.6i.MPLS, 6.0.0.12i.MPLS
Alert Type:
New
Bug Id:
CSCuv79384
Title:
5.2.4 Umbrella SMU for GMPLS with backout of CSCuu32035
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Umbrella SMU for 5.2.4 for the following DDTS of GMPLS

CSCuu10254 After RP OIR on tail node 1GE and STM16 traffic down(DT22+SMU)
CSCuu11993 After Mid node power cycle OCI observed on HO ODU controller
CSCuu24010 LSP taking 6 sec to 3.5mins to signal restore path.
CSCuu28839 GMPLS Error handling for LAbel mismtach
CSCuu29035 Traffic glitch on RPVM switchover and traffic loss on RPVM switchback
CSCuu34619 After Mid node power cycle Traffic down on few tunnels.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtd25917
Title:
parser_server syslog on executing oper infra from aux
Status:
Open
Severity:
4 Minor
Description: *








Symptom:
Unable to execute oper infra CLI's from admin prompt and paser_server syslog floods the console

Conditions:

You may see this issue when show opertioanal CLI is executed from AUX port

Workaround:

unknown

Further Problem Description:












Last Modified:
28-AUG-2015
Known Affected Releases:
3.9.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtj31126
Title:
CLI 'Show operational XML' missing schema when executed from aux port
Status:
Open
Severity:
4 Minor
Description:

Symptom
========

CLI 'Show operational XML' missing schema's when executed from aux port or from any other console port if you used the backdoor of /pkg/bin/exec -a which is an internal debugging way of logging through Standby Console port

Conditions:
=========

CLI 'Show operational XML' missing schema's when executed from aux port.

Workaround:
===========

Not to use Aux ports for show operational or shells which are started using /pkg/bin/exec -a

Last Modified:
28-AUG-2015
Known Affected Releases: *
4.0.1.BASE, 4.1.0.MGBL
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsq83881
Title:
describe sh oper <>" cli in admin mode is throwing an error msg
Status:
Open
Severity:
4 Minor
Description: *

RELEASE NOTE TEMPLATE
=====================

Symptom:
=======
parser_server-Error: Following error encountered while processing class(get children)
''MDA'' detected the ''warning'' condition ''A client requested information for a non-existent object class handle'' The command is defined in show_operational_admin.parser

Conditions:
=======
you may see the above error message while describe sh oper <>" cli in admin mode

Workaround:
==========
None Needed

Last Modified:
28-AUG-2015
Known Affected Releases:
3.7.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui25206
Title:
sysdb_mc[406]: %SYSDB-SMC-7-PARSE_FAILED : Unable to parse node from int
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
Getting below SYSDB error while executing " Sh run interface Serial(WRONG INTERFACE FORMAT)" in 4.3.1 node.This behavior is different from 4.1.2 node in which there is no SYSDB error.Getting error only on Serial interfaces of 4.3.1 node.


RP/0/7/CPU0:SFCHXRPE4#sh run interface serial 0/9/0/0/1/:0
Wed Jul 17 11:17:47.491 EDT
% No such configuratiRP/0/7/CPU0:Jul 17 11:17:47.688 : sysdb_mc[406]: %SYSDB-SMC-7-PARSE_FAILED : Unable to parse node from interface name. Check interface name entered. ('Serial0_9_0_0_1_:0' from 'cfg/if/act/Serial0o_9_0_0_1_:0/') ('ifmgr' detected the 'warning' condition 'One of the arguments is invalid')
n item(s)
RP/0/7/CPU0:Jul 17 11:17:47.688 : nvgen[349]: %MGBL-NVGEN-3-SYSDBOPERATION : sysdb_operation of sysdb_event_find : 'cfg/if/act/Serial0_9_0_0_1_:0/': 'sysdb' detected the 'fatal' condition 'Operation attempted with an unsupported pathname'


Conditions:
giving wrong serial interface to "sh run int serial"

Workaround:

Last Modified:
28-AUG-2015
Known Affected Releases:
4.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtn96452
Title:
Duplicate month list on scheduling diag test using absolute schedule
Status:
Open
Severity:
4 Minor
Description: *

Symptoms: Duplicate month list on scheduling diagnostig test using absolute
schedule

Conditions: This is a dual RSP3 setup. While schedule the diagnostic test to a
node using absolute schedule follow by "?" to get help, duplicate month list
showing from the output

Workaround: Issue command "diag schedule location 0/7/CPU0 test 3 on ?"

Recovery: No




Last Modified:
28-AUG-2015
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsx13819
Title:
38_CRS_SIT_IP:ctrl+c doesnt terminate the cmd execution
Status:
Open
Severity:
4 Minor
Description: *








Symptom:

ctrl+c doesnt terminate the cmd execution

Conditions:

you will see this issue while executing show controller gig < > all

Workaround:
none

Further Problem Description:












Last Modified:
28-AUG-2015
Known Affected Releases:
3.8.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun59998
Title:
add an interactive help example for IPv6 BGP neighbor for Flex CLI group
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
when trying to create a regexp for ipv6 neighbor with "\:" as the pattern, it didn't allow.

Conditions:
just create a flexible configuration group, and after "neighbor", try to have "[0-9|A-F]*\:.*\:.*", it failed to commit

Workaround:
For V6 BGP neighbor regexp, it should be "neighbor '[0-9|A-F]*:.*:.*:.*::.*'", without the back slash (\).

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCts98081
Title:
show tacacs not shown configured tacacs-server host
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
show tacacs CLI not shown thw configured tacacs-server host and
also router not contacting any of these server host when user aaa request .

Conditions:
you may see this issue when multiple tacacs server host configured in MC router ..
No specific condition other than this observed

Workaround:
not known

Last Modified:
28-AUG-2015
Known Affected Releases:
4.0.4.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtw47325
Title:
Sh controller dwdm not displayed when given DWDM permissions
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
show controller dwdm does not display the output, even when the user has
access for dwdm taskgroup.

Conditions:
When the user is part of a group having access dwdm and try "show controllers
dwdm"

Workaround:
Allow also the "interface" taskgroup.


Last Modified:
28-AUG-2015
Known Affected Releases:
4.1.0.BASE, 4.2.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus12437
Title:
On setting time(tod) throgh Tl1, bucket doesnt becomes invalid inCTC/CLI
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
PM buckets don't get invalidated once system time is changed via TL1 but after 15-20 minutes. According to gr.253 , PM buckets shall be invalidated immediately.

Conditions:
-> Execute RTRV-PM tl1 command to check if PM buckets are valid.
-> Execute SET-TOD for changing system time.

Workaround:
Expected Resolution: This issue will be resolved in future release after CISCO 5.2.4.

Reproducibility (%): 100

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.2.4.BASE, 5.2.41.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsx94103
Title:
Inconssitencey in Cli and Xml Delete for Service policy interface No-Op
Status:
Open
Severity:
4 Minor
Description: *

-- Release-note --
Symptom:

Under interface, could not able to delete policy-map with invalid policy name in XML request; But working fine in CLI output.

Conditions:

Need to give invalid policy name in the XML request.

Workaround:

Could able to delete policy-name with right and existing one using xml request.

Last Modified:
26-AUG-2015
Known Affected Releases:
3.8.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum18574
Title:
ARP and LLDP flow should get rejected in 131 and 132 pipeline
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
ARP and LLDP flow should get rejected

Conditions:
131 and 132 pipeline must reject arp and lldp flows because It is L3 Openflow switch

Workaround:
None

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases: *
5.1.1.BASE, 5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup06644
Title:
flowpsec_mgr process shutdown behavior
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
show flowspec ipv4/ipv6 display output even the process is Killed.

Conditions:
process shut flowspec_mgr

Workaround:
NIL

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup05835
Title:
Python PSS: QOS GROUP values > 63 should not be allowed on XR520
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
When configuring action set qos group via a Python onep app on an XR device, invalid values > 63 can be configured on the ASR9K. No error is observed.

Conditions:
The CLI shows that the valid range for acceptable qos-group values is 0-63:

RP/0/RSP0/CPU0:onep-asr9k-1(config-pmap-c)#set qos-group ?
(0-63) QoS group value

However values as high as 512 can be configured on the ASR9K.

SDK version: rel-1.2.1.229
ASR9K image: asr9k-mini-px-5.2.0.23I

Workaround:
None

Further Problem Description:

Last Modified:
26-AUG-2015
Known Affected Releases:
5.2.2.2i.K9SEC
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv83402
Title:
Broadcast & Multicast fileds to be removed from subinterface stats.
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Broadcast & Multicast traffic are not getting accounted in L2 sub interface though corresponding field are available.

Conditions:
For L2Subinterfaces.

Workaround:

Further Problem Description:
On Arwen LC , for L2 sub interface though there are filed for broadcast & multicast but corresponding traffic does not get accounted appropriately .

RP/0/RP0:ios#show interfaces tenGigE 0/3/0/4.1 | i pac
Tue Aug 18 00:51:05.706 UTC
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
306211065 packets input, 64115742557 bytes, 0 total input drops
Received 0 broadcast packets, 0 multicast packets
306209245 packets output, 64117942263 bytes, 0 total output drops
Output 0 broadcast packets, 0 multicast packets

In case of ASR9k , there is no packet type differentiator under sub interface & all gets accounted as packet input/output like below

RP/0/RSP0/CPU0:ios(config)#do show interfaces tenGigE 0/0/1/2.1 | i pac
Tue Aug 18 08:07:53.107 UTC
13753474 packets input, 10878128066 bytes
4091494875 packets output, 3236325031996 bytes

So for Arwen if adding broadcast & multicast field are intentional to match corresponding packet then it should work or else lets remove those section from o/p & make it same as ASR9k.

Last Modified:
25-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCue99169
Title:
show cef detail displaying incorrect address/interface data
Status: *
Terminated
Severity:
4 Minor
Description: *

Symptom:
Missing or incorrect nexthop address displayed on "show cef xxx detail" for a prefix which has a Fast Reroute Backup path.
Forwarding is unaffected. It is a cosmetic display issue.

Conditions:
The condition is transient inasmuch as the trigger is not clear.

Workaround:
None.
The issue is cosmetic. Forwarding is not affected.

Further Problem Description:












Last Modified:
21-AUG-2015
Known Affected Releases:
4.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu21976
Title:
PLATFORM-CIH-1-ASIC_ERROR_SCRUB_THRESH egressq 531
Status: *
Other
Severity: *
4 Minor
Description:

Symptom:
Getting egress link error on router reload and LC reload.

Conditions:
Router reload and LC reload.

Workaround:
None

Further Problem Description:
This error is displayed when the error register is set in hardware. If the error occurs only one time there is no impact. If it happens beyond the threshold HARD RESET of the card might occur. In this case the error occurs only once.

Last Modified:
21-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur08314
Title: *
Magic Number Corrupted during router boot/ after FO followed by B2B ISSU
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Magic Number Corrupted from devc-conaux seen

Conditions:
after FO followed by B2B ISSU

Workaround:
none

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
5.2.3.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu68584
Title:
prefix sid ranges are wrong in CLI
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Out of range prefix SID index or absolute values are accepted by the configuration. Ranges in CLI help are incorrect for both index and prefix configurations.

Allowed ranges should be:
index - 0-65535 (currently supporting single SRGB with max 65536 labels)
absolute - 16000-1048575

When the prefix sid is configured outside currently active SRGB, the config is accepted silently.
The following warning message is being added by this DDTS if such situation is detected:
isis[1010]: %ROUTING-ISIS-6-PREFIX_SID_INFO : Prefix SID info: 'absolute SID value 999999 on Loopback0 outside current SRGB range (90000-99000)'

Conditions:

Workaround:
No workaround is needed.

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
6.0.0.ROUT
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCut88321
Title:
Topaz line card reload - pciesvr %PLATFORM-PCIE-3-BUS_ERROR on 5.3.2 1i
Status:
Open
Severity:
4 Minor
Description:

Symptom:Seeing pciesvr %PLATFORM-PCIE-3-BUS_ERROR error messages on topaz card reload in 5.3.2 1i image.

Conditions:Reload CRS-X PLIM
Workaround:No impact. No workaround.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.2.BASE, 5.3.2.LC
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtl56081
Title:
XML output for "show adjacency *" command doesn't display all the fields
Status: *
Terminated
Severity:
4 Minor
Description: *

Symptoms:
For crs-1, XML responses fail to provide some of the fields of the output, when query is done at any level.

Conditions:
This condition is observed on a crs-1 running 4.1.0 image when XML request is queried at any level.

Workaround:
The output is diaplyed correctly with all the fields when query is done using CLI.

Last Modified:
14-AUG-2015
Known Affected Releases:
4.1.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCse53108
Title:
IPv4 & IPv6 PD API for BGP-PA config hardware verification
Status: *
Terminated
Severity:
4 Minor
Description: *


Symptom: The IPv6 BGP prefix accounting feature appears to be configured on an
interface however the necessary interface flags and statistics memory. As a
result no IPv6 BGP prefix accounting data can be displayed for the interface.

Conditions: This condition occurs when more than 256 interfaces (i.e. VLAN
interfaces) are configured on a linecard with the IPv6 BGP prefix accounting
feature.

Workaround: Do not configure more than 256 logical or physical interfaces on a
specific line card


Last Modified:
14-AUG-2015
Known Affected Releases:
3.4.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtb04314
Title:
CFM producers have garbage char following the end of proto name for LWM
Status: *
Terminated
Severity:
4 Minor
Description:

Symptom:

While adding CFM configuration to the interface, console log message generated saying failed in creating CFM hardware due to Aib process failure

Conditions:

issue seen with ci-39 3.9.0.14I image

Workaround:

Remove and reattach the CFM configuration. check "show ethernet cfm local mep interface gig <>". Check CCM's are sending and receiving without any issue after configuring.

Last Modified:
14-AUG-2015
Known Affected Releases:
3.9.0.LC
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup03920
Title:
513-SIT: tcp crash on show tcp dump-file all location 0/rp0/cpu0
Status:
Open
Severity:
4 Minor
Description:

Symptom:
tcp process crashes when show tcp dump-file all location 0/rp0/cpu0 is issued.

Conditions:
Configuration for dump-files number should be high (10k).

Workaround:

Further Problem Description:

Last Modified:
03-AUG-2015
Known Affected Releases: *
5.1.3.BASE, 5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuc37508
Title:
Suppress %L2-SPA_ETHER-4-SPA_WARN_RX_PWR on shut and uncofig interfaces
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Power alarms generated for interface in shutdown state (Admin down).

LC/0/0/CPU0:Sep 27 09:55:45.988 : spa_ge_v2(0)[315]: %L2-SPA_ETHER-4-SPA_WARN_RX_PWR : spa_ge_alarm_warn_thread:Port 7, RX Low power warning occurred

interface GigabitEthernet0/0/0/7
!shutdown

Conditions:
When the system is booted or a card with these interfaces is booted there are two log messages per interface regardless of whether the interface is in use. As a result there is no way to tell which active interfaces really have low power and which ones are warning because they are not configured and is nothing connected.

Workaround:
NA

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
4.2.3.BASE, 5.1.3.BASE
Known Fixed Releases: *
5.3.2.15i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCtf52638
Title:
[MC4] show memory summary location all has duplicate headers
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Two headers seen on display

Conditions:
sh memory summary location all

Workaround:
none

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
3.9.1.BASE, 3.9.2.BASE, 4.0.0.BASE
Known Fixed Releases: *
5.3.2.13i.BASE, 6.0.0.10i.BASE
Alert Type:
New
Bug Id:
CSCuv74388
Title:
ATT-CERT: g709 controller configs lost on 4-40G int after router reload
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:After router reload, "fec standard" configuration is lost under controller.
Conditions:Router reload with FEC config on 4-40GbE-OTN PLIM
Workaround:Even though config is not present, It is applied in hardware properly. Hence no functional impact.
remove/re-apply the config once again.

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv97266
Title:
CRS FP-X: FIB tracebacks
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
FIB traceback:

LC/0/1/CPU0:Aug 19 04:38:20.505 : fib_mgr[169]: %ROUTING-FIB-3-PLATF_UPD_FAIL : FIB platform update failed: Obj=DATA_TYPE_LOADINFO[ptr=61c04968,refc=0x1,flags=0x400a9] Action=MODIFY Proto=ipv6. Cerr='nh_compr' detected the 'fatal' condition 'Not found' : pkg/bin/fib_mgr : (PID=127075) : -Traceback= c1ed187 42fc5f3 42fd519 42f991e 42a6514 42a1658 427f71b 4333d2c 4335afa 427f8e2 428aa68 428f410 42a1fd0 42a4f50 4333d2c 4335afa

LC/0/1/CPU0:Aug 19 04:38:20.505 : fib_mgr[169]: %ROUTING-FIB-3-PD_FAIL : FIB platform error: fib_ldi_platform_update 1815: PD action MODIFY failed for passed_ldi 0x61c04968 type DATA_TYPE_LOADINFO flags 0x400a9. Shared LDI 0x61c04968 num_slots 1 num_buckets 1 depth 2 ldi type 3 ldi protocol ipv6 flags 0x400a9 : 0xa82a0800 'nh_compr' detected the 'fatal' condition 'Not found' : pkg/bin/fib_mgr : (PID=127075) : -Traceback= 42fc74b 42fd519 42f991e 42a6514 42a1658 427f71b 4333d2c 4335afa 427f8e2 428aa68 428f410 42a1fd0 42a4f50 4(TRUNCATED)

Conditions:
-running 5.3.1
-using IPv6

Workaround:
fib_mgr restart on affected LC

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.3.1.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCul89131
Title:
duplicate error line when issue "show config failed"
Status:
Open
Severity:
5 Cosmetic
Description: *

Symptom:
duplicate error line displaying when any config failed to apply

Conditions:
when we issue "show config failed" after any config failed

Workaround:
None needed

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsq83917
Title:
show oper help command should not be case sensitive
Status:
Open
Severity:
5 Cosmetic
Description: *


RELEASE NOTE TEMPLATE
=====================

Symptom:
========
"show operational " CLI with lower case letters will fail

Conditions:
========
This issue will be seen when entering the show operational command with lower
case letters.

Workaround:
=========
Execute the command with upper case alphabets

Last Modified:
28-AUG-2015
Known Affected Releases:
3.7.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuc46263
Title:
PWD command shows incorrect info on XR CLI
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
In NG/Panini, the file media like disk0:, harddisk: available in root directory are symbolic of the path like misc,
misc/disk1 respectively. Since it is a symbolic link it is used to resolve and display the absolute path for "pwd".
For Example:

RP/0/RP0/CPU0:ios#cd disk0:
RP/0/RP0/CPU0:ios#pwd
Mon Feb 2 23:50:54.091 UTC
misc

RP/0/RP0/CPU0:ios#cd harddisk:
RP/0/RP0/CPU0:ios#pwd
Mon Feb 2 23:51:54.211 UTC
misc/disk1

Conditions:

Workaround:
none

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.0.0.BASE, 5.2.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui65176
Title:
voltage information for SPA-OC192POS-XFP shows 0 mV
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:

The voltage information for SPA-OC192POS-XFP shows 0 mV.

Conditions:

CRS running IOS XR 4.2.1

Workaround:

reload of the SPA or router may be the workaround

Last Modified:
28-AUG-2015
Known Affected Releases: *
4.2.1.BASE, 4.3.1.BASE, 5.3.1.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCur22156
Title:
Increase preemption events in "show mpls traffic preemption log" to 2000
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
This DDTS tracks 2 enhancements to MPLS TE's preeemption log:
- Increase the number of events to 2,000 entries (increase from 10 currently)
- Increase the number of tracked LSPs to 10,000 (increase from 1,000 currently)

Conditions:
Monitoring preempted MPLS TE LSPs

Workaround:
None - beyond the current preemption log stated limits

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases:
5.3.2.20i.MPLS, 5.3.3.6i.MPLS
Alert Type:
New
Bug Id:
CSCuv73921
Title:
FAPID changes for Jericho on NCS4k
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
FAPID changes for Jericho on NCS4k

Conditions:
Change number of AMBAs on LC for Jericho on NCS4k from 1 to 4

Workaround:
NA

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsl08544
Title:
Add 'location' option to command outputs redirected to pipe file
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

On ios-xr 352, it is not pssible to redirect the output of a show command to a storage device on another target node.

Current syntax:
show xxx | file

Requesting support for :
show xxx | file : location



Conditions:

no specific condition.

Workaround:

The same result can be achieved in 2 steps:
show xxx | file
copy location 0/x/CPU0 location 0/y/CPU0

Last Modified:
19-AUG-2015
Known Affected Releases:
3.5.2.BASE
Known Fixed Releases: *
3.8.0.6i.BASE, 3.8.0.6i.OSMBI, 3.8.3, 3.8.4
Alert Type:
New
Bug Id:
CSCuv53819
Title:
Breakout feature support from TL1
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
TL1 does not support configuration of individual lanes.

Conditions:
Breakout feature not supported from TL1

Workaround:
NA

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui84063
Title:
Increase bgp rlimit to accommodate higher scale
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
BGP RLIMIT is currently set to 2GB. To increase BGP RLIMIT to accommodate higher BGP scale, each platform should return the supported maximum scale.

Conditions:
Currently rlimit of bgp is 2G , if the mem taken by bgp exceeds this number , it may be crashed down by Resmon

Workaround:
Workaround is to reduce scale

Recovery : it recovers after crash but if the scale is the same , it may be taken down by resmon again

Further Problem Description:

Last Modified:
18-AUG-2015
Known Affected Releases:
5.0.0.BASE, 5.3.2.BASE
Known Fixed Releases: *
5.3.2.16i.BASE, 5.3.2.16i.ROUT, 5.3.3.3i.BASE, 5.3.3.3i.ROUT, 6.0.0.10i.BASE, 6.0.0.10i.ROUT
Alert Type:
Updated *
Bug Id:
CSCuv22503
Title:
hw-module reload command failure message does not have enough info
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
Failure message on the "hw-module location reload" command doesn't indicate detail failure reason

Conditions:
When "hw-module location reload" command returns failure.

Workaround:
Dump shelf_mgr traces to find out the reason of the failure.

Further Problem Description:

Last Modified:
18-AUG-2015
Known Affected Releases:
5.0.1.ADMIN
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv63002
Title:
Wrong check in fsdbagg component
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
No functional impact.
Code is Tested, but need to correct.

Last Modified:
31-AUG-2015
Known Affected Releases:
5.2.5.BASE
Known Fixed Releases:
5.2.5.22i.BASE, 6.0.0.12i.BASE
Alert Type:
New
Bug Id:
CSCuv63353
Title:
Request for on-demand per-interface per-client drop accounting in StatsD
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Enhancement request for on-demand per-interface per-client drop accounting in StatsD

Conditions:

Workaround:

Further Problem Description:

Last Modified:
30-AUG-2015
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui82933
Title:
need provide xml support for "sh processes memory"
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Enhancement to add XML/Netconf support for per process memory monitoring

Conditions:
Per process memory monitoring is not supported in XR today

Workaround:
There is no workaround

Further Problem Description:

Last Modified:
07-AUG-2015
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
5.3.2.17i.BASE, 5.3.3.3i.BASE, 6.0.0.10i.BASE
Alert Type:
New
Bug Id:
CSCuv94750
Title:
ENH: IOS-XR Filtering of IP addresses from the LDP Address Message
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
By default IOS-XR will announce all his interface IP's in the LDP Address Message - including those which don't have LDP enabled (for example loopbacks used for satellite management)

In current IOS-XR versions we don't have possibility to filter unwanted IP addresses from the Address List TLV in the LDP Address Message.

This is an enhancement request to add possibility of the filtering.

Conditions:

Workaround:
Move local interfaces (for example for satellites management) into the vrf.

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.1.3.MPLS
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtw80254
Title:
Memory leak on XML agents while rollback
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
Seeing memmory leak on xml agents

Conditions:
Bulk config of object and schema list and rollback through XML

Workaround:
N/A

Last Modified:
28-AUG-2015
Known Affected Releases:
4.2.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtn50422
Title:
XR AAA read-only user allowed access to config mode
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptoms:
When a read-only taskgroup is configured and a user is using that taskgroup, the user should not be able to access config mode.

Conditions:
Cisco CRS with default configuration.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.6/5.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.8.2.2i.BASE
Known Fixed Releases:
4.0.11.1i.BASE, 4.0.4.11i.BASE, 4.1.1.23i.BASE, 4.2.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCsu62728
Title:
IPv6: Packets addressed to unused addresses in P2P links are pingponged
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
Packets sent to addresses that are not used in p2p links (such as serial, tunnel or POS links) will be forwarded
out the receiving interface and back on the link, resulting in these packets looping between both ends of the link until the packet TTL expires.

Conditions:
Packets are sent to an unused address in the subnet used for the p2p link.

Workaround:
Install filters to prevent traffic to be sent to unused addresses within the link subnet.

Alternatively, use a /127 prefix for the P2P link. Please be aware that while this can be implemented and eliminates the problem, using a /127
network is against RFC-3627 and RFC-5375.

Further Problem Description:
This behaviour is non-compliant with RFC 4443.

RFC 4443 sec 3.1 excerpt:

One specific case in which a Destination Unreachable message is sent
with a code 3 is in response to a packet received by a router from a
point-to-point link, destined to an address within a subnet assigned
to that same link (other than one of the receiving router's own
addresses). In such a case, the packet MUST NOT be forwarded back
onto the arrival link.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:W/RC:C&version=2.0

CVE ID CVE-2011-0952 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.4.1.BASE
Known Fixed Releases:
4.2.1.16i.BASE, 4.2.1.16i.FWDG, 4.2.3.1i.BASE, 4.2.3.1i.FWDG, 4.3.0.2i.BASE, 4.3.0.2i.FWDG
Alert Type:
Updated *
Bug Id:
CSCtq06088
Title:
Command aliases can lead to privilege escalation
Status:
Open
Severity:
6 Enhancement
Description: *

Symptoms:
The ''alias'' command can be used by any user to create or modify aliases. There is a potential privilege escalation within the alias command
that could allow an authenticated user to elevate their privileges.

Conditions:
User must be authenticated to the device.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.6/5.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
4.0.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtf64077
Title:
IPv6: Packets addressed to unused addresses in P2P links are pingponged
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
Packets sent to addresses that are not used in p2p links (such as serial, tunnel or POS links) will be forwarded
out the receiving interface and back on the link, resulting in these packets looping between both ends of the link until the packet TTL expires.

Conditions:
Packets are sent to an unused address in the subnet used for the p2p link.

Workaround:
Install filters to prevent traffic to be sent to unused addresses within the link subnet.

Alternatively, use a /127 prefix for the P2P link. Please be aware that while this can be implemented and eliminates the problem, using a /127
network is against RFC-3627 and RFC-5375.

Further Problem Description:
This behaviour is non-compliant with RFC 4443.

RFC 4443 sec 3.1 excerpt:

One specific case in which a Destination Unreachable message is sent
with a code 3 is in response to a packet received by a router from a
point-to-point link, destined to an address within a subnet assigned
to that same link (other than one of the receiving router's own
addresses). In such a case, the packet MUST NOT be forwarded back
onto the arrival link.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:W/RC:C&version=2.0

CVE ID CVE-2011-0952 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
3.4.1.BASE
Known Fixed Releases:
4.2.0.15i.FWDG
Alert Type:
Updated *
Bug Id:
CSCun82485
Title:
ability to remove all config related to a particular (sub)interface
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
ability to remove interface references when the parent/main subinterface is removed.

Conditions:
an interface used for different services.
ability to remove that interface from mpls, bd's etc.

Workaround:
do it manually. not a real workaround I know.

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCta97984
Title:
syslog must generate evenif user login via dedicated agent
Status:
Open
Severity:
6 Enhancement
Description: *


-->

Symptom:
there is no visibility to console user about xmlagent user since there is no syslog and show user output info

Conditions:
you may see this issue while login user via xmlagent

Workaround:
none

Last Modified:
28-AUG-2015
Known Affected Releases:
3.8.1.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv98942
Title:
Enhance UIDB consistency: UIDB retrieved from buffer-header and Tx ADJ
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
'Nested alternate path found' counter was increased due to mismatch detected between the UIDB retrieved from buffer-header and Tx ADJ (NH2)

Conditions:

Workaround:

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.0.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuo58538
Title:
ANR should be enabled by default
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Some customers have reported issues where traffic through the router was affected triggered by an isolated hardware issue on the RP or linecards. The hardware failure condition may have been caused by a transient issue or a condition where the forwarding ASICs or the RP CPU complex had a hard fault resulting in data path outage. However, the isolated failure of a LC or an RP should not affect any transit traffic through the router, especially when the remaining linecards or the fabric sub-system does not show any error conditions.

The identification of the bad hardware is a time consuming effort and at times it is not clear whether multiple nodes might have been affected. The stability is restored when the bad hardware is shut down or removed from the system but this is usually after a prolonged outage where end-customer traffic is dropped. Often times, focus on service restoration implies that troubleshooting information is not collected and the root cause remains elusive or unknown. Very rarely, we have been able to recreate the problems during EFA but the success rate is low. Customers expect the CRS to be a carrier class product and therefore do not accept isolated hardware failure as an excuse for the single point of failure event.

Conditions:
Faulty HW

Workaround:
Enable ANR

Further Problem Description:

Last Modified:
03-AUG-2015
Known Affected Releases: *
4.2.4.BASE, 5.1.3.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu25231
Title:
Syslog Logging local-file destination with discriminators
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
local file logging storage functionality

Conditions:
syslog functionality

Workaround:

Further Problem Description:

Last Modified:
30-AUG-2015
Known Affected Releases:
4.1.0.BASE, 4.3.4.BASE, 5.1.1.BASE
Known Fixed Releases:
5.3.3.2i.BASE, 6.0.0.8i.BASE
Alert Type:
Updated *
Bug Id:
CSCuc85085
Title:
v6-ND distribution and scale project tracking ddts
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
DDTS providing enhancements for ipv6 ND and scale

Conditions:
IPV6 ND

Workaround:
Not applicable

Further Problem Description:
This fixes amongst others the problem of ipv6 mtu on dynamic template is not used on outgoing ipv6 nd

Last Modified:
31-AUG-2015
Known Affected Releases: *
4.2.3.BASE, 5.1.0.BASE
Known Fixed Releases:
5.1.0.2i.FWDG

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论