| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu40317 | Title: | Applying Medianet to interface bypasses SA Miss queue on 4500 |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Using Medianet on L2 trunks, we see unknown unicast flooding because MACs are not being learned on interfaces that medianet is configured. When medianet is applied, the SA MISS CPU queue does not increment but medianet CPU queue does.
Conditions: 3.6.0 4500 Sup8 using medianet on the interface, where the medianetMonitor has a match-all criteria specified
Workaround: For medianet configure a policy with a criteria other than a match-all. Preferably the MediaMonitor policy should match specific flows , that are of interest.
Further Problem Description: Impacts 4500e and 4500es8 switches
|
|
Last Modified: | 04-SEP-2015 |
|
Known Affected Releases: | 3.6(0) |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(3)E2, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(4.10.62)PI5, 3.6(3)E, 3.7(2)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut64189 | Title: | Device TELNET can enter Privileged Mode without Enable Password |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom:
Under some conditions, users logged in to the device over telnet or SSH are able to enter privileged command mode without being asked for a password even when "enable password" and/or "enable secret" is configured.
Access to non-privileged command mode is not affected by this defect.
Conditions:
The defect is specific to Catalyst 4500.
The defect is observed on all Catalyst 4500 redundant systems (VSS as well as dual-supervisor chassis). The defect is observed only after a HA switchover, when a supervisor that used to operate in a Standby role takes over as the Active.
Workaround: After a switchover, execute:
clear line vty
for all the configured VTY lines on the new Active supervisor.
The following EEM script can be used to automate this action:
-------------------------------------------------------------------------------- event manager applet CSCut64189-Workaround event rf event RF_PROG_ACTIVE_FAST action 1 cli command "enable" action 2 cli command "show line vty 0 16" action 3 set show_line_vty_op "$_cli_result" action 4 foreach this_line "$show_line_vty_op" "\n" action 4.1 regexp "^(.) *([0-9]+) VTY" $this_line match this_line_flag this_line_num action 4.2 if "$_regexp_result" ne "0" action 4.2.1 subtract $this_line_num 1 action 4.2.2 set actual_vty_line_to_clear "$_result" action 4.2.3 string equal "$this_line_flag" "*" action 4.2.4 if "$_string_result" ne "1" action 4.2.4.1 cli command "clear line vty $actual_vty_line_to_clear" pattern "[confirm]" action 4.2.4.2 cli command "y" action 4.2.4.3 syslog msg "VTY $actual_vty_line_to_clear cleared" action 4.2.5 else action 4.2.5.1 syslog msg "Not clearing vty $actual_vty_line_to_clear because it is in use (probably by this applet)" action 4.2.6 end action 4.3 end action 5 end action 6 cli command "disable" action 7 exit -------------------------------------------------------------------------------- |
|
Last Modified: | 04-SEP-2015 |
|
Known Affected Releases: | 15.2(3.7.1E) |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(3)E2, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(3)E, 3.7(2)E |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCdk22815 | Title: | Bisync tests over frame-relay with pass-through fails. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Release Note ============
This problem occurs because of incorrect group numbers defined on the two BSTUN peers.
Group numbers defined on the two peers need to match.
Example ------- If one peer has the following definition ... bstun protocol-group 3 bsc (passthru) then the other peer also needs to be defined for group 3 (passthru) |
|
Last Modified: | 08-SEP-2015 |
|
Known Affected Releases: | 11.3(4.1), 12.0(0.10) |
|
Known Fixed Releases: | 11.3(5.1), 11.3(5.1)AA, 11.3(5.1)NA, 11.3(5.1)T, 12.0(0.16) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuq54573 | Title: | Service Policy disappears from Running Configuration of the interface |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Service Policy disappears when link flaps or when negotiate for the speed. Log is seen " Strict priority cannot be guaranteed" Happens on both the port connected PC / Phone / switch which negotiate the speed lesser than 1Gig
Conditions: Speed is lesser than 1Gig
and
Bandwidth remaining command used in the class example:
policy-map Test class Class1 priority class Class2 bandwidth remaining percent 40 class Class3 bandwidth remaining percent 40
Workaround: configure Police under Priority class
or
Configure Speed on the switch port
Further Problem Description:
|
|
Last Modified: | 04-SEP-2015 |
|
Known Affected Releases: | 3.6(0) |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(3)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuc25596 | Title: | WS-C4510R-E---log warning about mask table consistency check failure |
|
Status: | Terminated |
|
Severity: | 3 Moderate |
Description: * | Symptom: A message starting with C4K_L3HWFORWARDING-3-MASKTABLECONSISTENCYCHECKFAILED is logged. Conditions: None. Workaround: See the system message guide regarding this message. This is a transient condition that is auto-corrected.
Error Message C4K_L3HWFORWARDING-3-MASKTABLECONSISTENCYCHECKFAILED: MaskTable Consistency Check Failed: block [dec] index [dec] Explanation There was a mask table consistency check failure. More Info:
|
|
Last Modified: | 08-SEP-2015 |
|
Known Affected Releases: | 12.2(53)SG5 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu38664 | Title: | Switch 4k shouldn't forward multicast MAC for authentication to radius |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: switch authenticate flow control packets (multicast mac address as a source mac) from a Cisco un-managed switch (Linksys).
switch 4k is forwarding the 802.1 well defined Spanning multicast MAC address to radius server as it's a reserved MAC address switch shouldn't consider this MAC address as a normal MAC address and should never forward to radius server for authentication.
Conditions: switch authenticate multicast mac address - 01-80-C2-00-00-01 from a Cisco un-managed switch (Linksys)
Workaround: put a mac address filter on a switch-port and block the mac address.
Further Problem Description:
|
|
Last Modified: | 08-SEP-2015 |
|
Known Affected Releases: | 15.1(1)SG2, 15.1(2)SG |
|
Known Fixed Releases: * | 15.2(4.0.87)E, 15.2(5.0.10)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuo59641 | Title: | wireshark does not work when file location is usb0: |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: wireshark does not work when file location is usb0:
Conditions: NA
Workaround: NA
Further Problem Description:
|
|
Last Modified: | 04-SEP-2015 |
|
Known Affected Releases: | 15.2(1)E |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(3)E1, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(3)E, 3.7(1)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut87080 | Title: | Frequent Fan Alarm: Fan of power supply 1 has failed |
|
Status: | Fixed |
|
Severity: | 4 Minor |
Description: | Symptom: Following messages seen on the device.
Dec 25 19:43:14.004 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 1 has failed Dec 25 19:43:19.004 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 1 is okay Mar 5 17:23:12.972 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed Mar 5 17:23:17.972 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay Mar 11 17:55:33.340 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed Mar 11 17:55:38.340 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay
Conditions: None
Workaround: None
Further Problem Description: These messages are cosmetic
|
|
Last Modified: | 08-SEP-2015 |
|
Known Affected Releases: | 15.1(2)SG4 |
|
Known Fixed Releases: * | 15.2(4.0.72)E, 15.2(4.0.75a)E, 15.2(5.0.10)E |
|
|
| |
没有评论:
发表评论