Cisco Blog » The Platform

2015年9月1日星期二

Cisco Notification Alert -Cisco ME 3600X Series Carrier Switch-01-Sep-2015 16:58 GMT

 

 

 

 

 

 

 


Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3-SN
Release Date:
18-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S6
Release Date:
01-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S5
Alert Type:
Software Advisory
File Name:
me360x-universal-tar.153-3.S5.tar
File Description:

UNIVERSAL W/O CRYPTO TAR

Software Advisory Date:
07-AUG-2015
Alert Type:
Software Advisory
File Name:
me360x-universalk9-tar.153-3.S5.tar
File Description:

UNIVERSAL TAR

Software Advisory Date:
07-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3-SN
Release Date:
18-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S6
Release Date:
01-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S5
Alert Type:
Software Advisory
File Name:
me360x-universalk9-tar.153-3.S5.tar
File Description:

UNIVERSAL TAR

Software Advisory Date:
07-AUG-2015
Alert Type:
Software Advisory
File Name:
me360x-universal-tar.153-3.S5.tar
File Description:

UNIVERSAL W/O CRYPTO TAR

Software Advisory Date:
07-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S5
Alert Type:
Software Advisory
File Name:
me360x_t-universal-tar.153-3.S5.tar
File Description:

UNIVERSAL W/O CRYPTO TAR

Software Advisory Date:
07-AUG-2015
Alert Type:
Software Advisory
File Name:
me360x_t-universalk9-tar.153-3.S5.tar
File Description:

UNIVERSAL TAR

Software Advisory Date:
07-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.5.3-SN
Release Date:
18-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S6
Release Date:
01-AUG-2015

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Known Bugs - ME 3600X Series Ethernet Access Switches

Alert Type:
Updated *
Bug Id:
CSCuo82355
Title:
BFD Failed to Establish when router are running on different IOS version
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A BFD session fails to come up.

Conditions:
This symptom occurs when BFD is running on Cisco IOS Release 15.4(1)S to any other lower release.

Workaround:
Upgrade the device.

Further Problem Description:

Last Modified:
24-AUG-2015
Known Affected Releases:
15.3(3)S0.5
Known Fixed Releases:
15.3(3)S3.2, 15.3(3)S4, 15.4(1)S2.2, 15.4(1)S3, 15.4(2)S0.12, 15.4(2)S1, 15.4(2.17)S0.6, 15.4(3)S, 15.4(3)SN1, 15.5(0.8)S
Alert Type:
New
Bug Id:
CSCuv81818
Title:
Rosen mVPN on ME3600 is broken for SVI in the core
Status:
Open
Severity:
2 Severe
Description:

Symptom:
ME3600 sends mVPN traffic without dot1q header if core-facing interface is SVI.

Conditions:
Core-facing interface is SVI and mVPN-Rosen is used.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
25-AUG-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu49953
Title:
Unicast Flooding is observed on a Customer routed Pseudo wire network
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Unicast Flooding is observed on a Customer routed Pseudo wire network

Conditions:
Topology
========
HostA === SW1 === SW2 === HostB

1. Configure a Routed Pseudowire between SW1 and SW2.
2.Configure a routed port between SW1 to router HostA working as NAT.
3. Create a loopback ip address on HostA router.
4. Ping the loopback ip address from SW2.
5. We could see the packets are flooded to pirent2.

customer is trying to ping the lopopback address which is located on cisco HostA router from SW2.
Ping packet are flodded to all the ports in vlan 10 .
On our topogy, It going out to HostB.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases: *
15.4(3)S3.3, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.4)S
Alert Type:
Updated *
Bug Id:
CSCuu71516
Title:
AN: Channel not getting formed in Whales.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CD channel is not getting formed in whales platform.

Conditions:
With default interface config.

Workaround:
N/A

Further Problem Description:
Continuous channel creation and deletion observed and hence neighborship, ACP etc won't get established.

Last Modified:
24-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.10)S
Alert Type:
Updated *
Bug Id:
CSCuu13846
Title:
MET resource exhaustion with IGMP Snooping
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
MET exhaustion message may be seen.

*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src-asic-nile/nile_adjmgr_utils.c: 832: adjmgr_free_met
*Apr 23 05:04:52.804: -Traceback= 776728z 263995Cz 277A9C0z 275CC7Cz 27610C4z 2EEBEC8z 2EED8ACz 20DDEB0z 20EE1E0z 20C2294z 3918E40z 391405Cz
*Apr 23 05:04:52.804: Bad adjmgr_met_free type=3 err=4

*Apr 23 05:04:52.804: platform assert failure: 0: ../src-nile/src

Conditions:
Issue is seen when IGMP snooping is enabled and IGMP join/leave messages are frequently received. MET entries are leaking on every igmp timeout/leave/ interface shut/no shut.

Workaround:
disable igmp snooping

Further Problem Description:

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases: *
15.4(3)S3.2, 15.5(1)S2.3, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.2)S
Alert Type:
Updated *
Bug Id:
CSCut84010
Title:
Lots of Rx power low and high warning messages seen for BX optics.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Lot of Rx power low warning & Rx power high warning messages occurred in ME3600X

Conditions:
After IOS Upgrade to 15.4(2)S

Workaround:
None

Further Problem Description:
After upgrading IOS version from 15.1(2)EY2a to 15.4(2)S, there have been
a lot of Rx power low warning & Rx power high warning messages occurred in ME3600X.
However, those alarms did not appear before the IOS upgrade.

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases: *
15.4(3)S3.8, 15.5(1)S2.6, 15.5(2.21)S0.12, 15.5(2.21)S0.6, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.1)S
Alert Type:
Updated *
Bug Id:
CSCus96586
Title:
Ptp clock stuck on ACQUIRING state for very long time
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PTP slave stuck on ACQUIRING state for very long time . seems to be large mean path delay and clock offset .

Conditions:
you could see this issue with ptp config .

Workaround:
not known

Further Problem Description:
none

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.4(3)S2.5, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN
Alert Type:
Updated *
Bug Id:
CSCuu76064
Title:
AN: Whales establishing ACP to non directly connected devices
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Whales is establishing neighborship and ACP to devices which are not directly connected.

Conditions:
Default scenario

Workaround:
N/A

Further Problem Description:
Whales is establishing neighborship and ACP to devices which are not directly connected even tough there is no active L2 channel to the non directly connected devices.

Last Modified:
24-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.10)S
Alert Type:
Updated *
Bug Id:
CSCur98665
Title:
ciscoipc process crashed when do swap ptp master/slave role
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ciscoipc process crashed , service disruptive

Conditions:
you can see this issue while swap the ptp role

Workaround:
The PTP processor could be reloaded to apply the configuration again through the following command:

test platform software ptp reset

Further Problem Description:
none

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases: *
15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN
Alert Type:
Updated *
Bug Id:
CSCud74670
Title:
Remote LFA FRR Convergence fails with 3000 prefixes
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

When using RLFA repair paths traffic loss may occur during reconvergence following a link failure.

Conditions:

RLFA tunnel is used as a repair path.
The greater the number of prefixes affected by the topology change the more likely the traffic loss
is to be seen.

Workaround:
No workaround.


Last Modified:
11-AUG-2015
Known Affected Releases:
15.2(2)SNI, 15.2(4)S, 15.3(1)S, 15.3(2)S
Known Fixed Releases: *
15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB40.1, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1.17)S0.14, 15.3(2)S
Alert Type:
Updated *
Bug Id:
CSCuo93299
Title:
AN:Zero Touch Bootstrap not working
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: ZTB does not work.
Conditions: This symptom occurs when the image is loaded and left without aborting the setup dialogue box.
Workaround: This issue has been fixed.

Last Modified:
12-AUG-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.5(0.11)S
Alert Type:
New
Bug Id:
CSCuv17554
Title:
Extra bytes on the CFM header in ME3600 switch
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Trailing zeros of 22 bytes got added after end TLV in CCM frames when CFM frames ingressing ME3600 through VPLS pseudowires and egressing out either on service instance or switchport.

Conditions:
1. Configure VPLS autodiscovery pseudowires between ME3600-1 and ME3600-2.
2. Configure CFM MEP in ME3600-3.
3. Enable "ethernet cfm global" command in ME3600-1
4. Observe CCM packets are received in Ixia with 145 bytes packet length. Additional 22 bytes of zeros got added after End TLV.
5. Execute command "no ethernet cfm global" in ME3600-1.
6. Now observe CCM packets are received in Ixia with 123 bytes packet length. No trailing zeros got added after End TLV.

Workaround:
Issue is not seen when "no Ethernet cfm global" command is given

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases:
15.4(3)S3.9, 15.5(1)S1.5, 15.5(1)S2.9, 15.6(0.11)S
Alert Type:
Updated *
Bug Id:
CSCuc52506
Title:
6PE and 6VPE traffic drops on shutting ECMP link
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms: 6PE and 6VPE traffic drops on shutting the ECMP link.

Conditions: This symptom occurs after configuring the 6PE/6VPE between UPE-2
and UPE-1 with ECMP paths between both nodes and then shutting the ECMP link.

Workaround: There is no workaround.

Last Modified:
21-AUG-2015
Known Affected Releases:
15.2(4)S0.4
Known Fixed Releases:
15.2(4)S1.7, 15.2(4)S2, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4, 15.2(4)S4a, 15.2(4)S5, 15.2(4)S6, 15.3(0.20)S0.11, 15.3(1)S
Alert Type:
Updated *
Bug Id:
CSCus05725
Title:
Storm control being triggered on wrong port
Status:
Open
Severity: *
2 Severe
Description:

Storm control being triggered on wrong port

Symptom:
Storm control being triggered on the Gig0/20 port even if this port is admin down.

Conditions:
Storm control being triggered on wrong port

Workaround:
None

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu51038
Title:
Traceback observed as adjmgr_l3_flood_met_config
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Traceback observed

Conditions:
service instance creation

Workaround:
na

Further Problem Description:
na

Last Modified:
20-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv85297
Title:
ME3600 ciscoEnvMonSupplyState value is wrong
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
When the second power supply is connected, but input state is ok and output state is fault, SNMP returns 6.But the expected value is 3.

When the second power supply is not connected, but input state is fault and output state is unknown, SNMP returns 6.But the expected value is 3.

When the second power supply is connected, but input state is ok and output state is not provided, SNMP returns 3.But the expected value is 2.

Conditions:
When the second power supply is not connected to the power source and When the second power supply is connected to the power source

Workaround:
na

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv66839
Title:
ME-3600X - 'not present' status for 1Gig SFP without 10GEUpgrade license
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
The status of Gigabyte interface is seen as 'not present' when 10GEUpgrade license is not active.

Jackoneill#show license
(snipped)
Index 3 Feature: 10GEUpgrade
Period left: 8 weeks 4 days
License Type: Evaluation
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None

Jackoneill#show interfaces status | in Gi0/14
Gi0/14 AbisoIP BSC Teluk1 notconnect 3071 auto auto Not Present

Conditions:
The 10GEUpgrade is not activated.

Jackoneill#show license
(snipped)
Index 3 Feature: 10GEUpgrade
Period left: 8 weeks 4 days
License Type: Evaluation
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None

Workaround:
Plug 10 Gig SFP into free slot and accept license activation.

Important note!!! Following output is only visible via console connection!

Jackoneill# Feature Name:10GEUpgrade

PLEASE READ THE FOLLOWING TERMS CAREFULLY. INSTALLING THE LICENSE OR
LICENSE KEY PROVIDED FOR ANY CISCO PRODUCT FEATURE OR USING SUCH
PRODUCT FEATURE CONSTITUTES YOUR FULL ACCEPTANCE OF THE FOLLOWING
TERMS. YOU MUST NOT PROCEED FURTHER IF YOU ARE NOT WILLING TO BE BOUND
BY ALL THE TERMS SET FORTH HEREIN.

Use of this product feature requires an additional license from Cisco,
together with an additional payment. You may use this product feature
on an evaluation basis, without payment to Cisco, for 60 days. Your use
of the product, including during the 60 day evaluation period, is
subject to the Cisco end user license agreement
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
If you use the product feature beyond the 60 day evaluation period, you
must submit the appropriate payment to Cisco for the license. After the
60 day evaluation period, your use of the product feature will be
governed solely by the Cisco end user license agreement (link above),
together with any supplements relating to such product feature. The
above applies even if the evaluation license is not automatically
terminated and you do not receive any notice of the expiration of the
evaluation period. It is your responsibility to determine when the
evaluation period is complete and you are required to make payment to
Cisco for your use of the product feature beyond the evaluation period.

Your acceptance of this agreement for the software features on one
product shall be deemed your acceptance with respect to all such
software on all Cisco products you purchase which includes the same
software. (The foregoing notwithstanding, you must purchase a license
for each software feature you use past the 60 days evaluation period,
so that if you enable a software feature on 1000 devices, you must
purchase 1000 licenses for use past the 60 day evaluation period.)

Activation of the software command line interface will be evidence of
your acceptance of this agreement.


ACCEPT? (yes/[no]): yes

*Aug 6 07:42:43.075 UTC: %LICENSE-6-EULA_ACCEPTED: EULA for feature 10GEUpgrade 1.0 has been accepted. UDI=ME-3600X-24FS-M:FOC1610V28Z; StoreIndex=1:Built-In License Storage
Jackoneill#
Jackoneill#
Jackoneill#show interfaces status | in Gi0/14
Gi0/14 AbisoIP BSC Teluk1 notconnect 3071 auto auto 1000BaseSX SFP

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
15.3(3)S1.1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus46198
Title:
ME3600-24CX: PTP clock flap observed when NTP is provisioned
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In the ME3600x-24CX units provisioned with both NTP and PTP (as slave) protocols, the PTP slave would flap non-deterministically to Holdover<->Acquiring states. The flap would have no correlation with the traffic on the transport interface. The PTP clock's current dataset monitored during the time of flap would bear huge values for mean-path-delay and offset-from-master parameters (roughly on the order of seconds).

Conditions:
This issue is only observed with NTP and PTP (as slave) provisioned on the box. When the NTP synchronizes with the master, an update is made to the timestamp engine of the front-panel ports. The PTP would update and read this timestamp engine. Due to differences in NTP and PTP timescales, the timestamp read by PTP would be huge enough to cause the clock recovery to go to holdover and start all over again.

Workaround:
Remove/re-provision NTP at regular intervals, this way the number of NTP updates could be reduced (it has a downside of keeping the system clock less accurate).

Further Problem Description:

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases: *
15.4(3)S2.2, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2.21)S0.12, 15.5(2.21)S0.5, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN
Alert Type:
Updated *
Bug Id:
CSCus90793
Title:
ME3600X temperature sensors/threshold issue
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Snmpwalk on ciscoEnvMonTemperatureStatusEntry shows incorrect data for ciscoEnvMonTemperatureStatusDescr and ciscoEnvMonTemperatureStatusValue

Conditions:
Snmpwalk on ciscoEnvMonTemperatureStatusEntry

Workaround:
Nil

Further Problem Description:
Snmpwalk on ciscoEnvMonTemperatureStatusEntry shows incorrect data for ciscoEnvMonTemperatureStatusDescr and ciscoEnvMonTemperatureStatusValue

Last Modified:
03-AUG-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.3(3)S5.4, 15.3(3)S6, 15.4(3)S2.3, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)SN1, 15.5(2.12)S
Alert Type:
Updated *
Bug Id:
CSCul61997
Title:
Mac-Security:Mac address is not cleared from the table after timeout
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms:
Cisco Metro Ethernet 3600 Series devices running an affected version of IOS are affected by a configuration dependent denial of service issue. An
adjacent attacker that has the ability to connect directly to a port configured for port security could consume all MAC entries allowed on the port. This is
an expected result; Due to an error the learned MAC addresses may not expire causing the port to be inaccessible to new MAC addresses until cleared
by an administrator.

Conditions:
Cisco Metro Ethernet 3600 Series devices running an affected version of Cisco IOS Software.

Workaround:
Clear the learned MAC address table for the affected port.

Further Problem Description:
An attacker would need to have physical access to each port they wanted to disable, this highly limits the likelihood of a an attack.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
3.3/2.7:

http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
12-AUG-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.3(3)S3.9, 15.3(3)S4, 15.4(1.16)S, 15.4(2)S, 15.4(2)S1, 15.4(2)SN, 15.4(2)SN1, 15.4(3)S, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCuu65568
Title:
Controller E1 showing 256 Line Err Secs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:E1 controller constantly shows 256 Line Err Secs errors for the summarized 15 minutes interval. This counter is displayed as part of command show controllers e1.

The current data interval for this command output is not affected. It will display the correct value of experienced errors in the current period.

me3600xb#sh controllers e1 0/1
E1 0/1 is up.
Applique type is Channelized E1 - balanced
No alarms detected.
alarm-trigger is not set
Framing is crc4, Line Code is HDB3, Clock Source is Internal.
International Bit: 1, National Bits: 11111
Data in current interval (360 seconds elapsed):
0 Line Code Violations, 0 Path Code Violations
0 Slip Secs, 0 Fr Loss Secs, 0 Line Err Secs, 0 Degraded Mins
0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs
Data in Interval 1:
0 Line Code Violations, 0 Path Code Violations
0 Slip Secs, 0 Fr Loss Secs, 256 Line Err Secs, 0 Degraded Mins
0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs
Total Data (last 1 15 minute intervals):
0 Line Code Violations, 0 Path Code Violations,
0 Slip Secs, 0 Fr Loss Secs, 256 Line Err Secs, 0 Degraded Mins,
0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs .
Conditions:Occurs when E1 controllers are active.
Workaround:There is no workaround.

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(1)S2
Known Fixed Releases: *
15.4(3)S3.4, 15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.6)S
Alert Type:
Updated *
Bug Id:
CSCua89905
Title:
error was seen after executed "clear counters"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

The following error was seen.
police burst (bc) is adjusted to 16000000 to fit the interface supported range

Conditions:

After executed "clear counters"

Workaround:

none

Last Modified:
10-AUG-2015
Known Affected Releases:
15.2(2)S1
Known Fixed Releases: *
15.1(1)ICB29.1, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1)IC273.5, 15.2(2)E, 15.2(2b)E, 15.2(4)GC
Alert Type:
Updated *
Bug Id:
CSCuu77218
Title:
AN: AN not using user configured native vlan as channel
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
AN not using user configured native vlan as channel

Conditions:
When connected to a L3 device

Workaround:
N/A

Further Problem Description:
Whales when connected to a L3 device, is not using user configured native vlan interface as channel to form neighborship.

Last Modified:
12-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论