Cisco Blog » The Platform

2015年10月1日星期四

Cisco Notification Alert -4500 Series Switch-01-Oct-2015 16:50 GMT

 

 

 

 

 

 

 


Known Bugs - Catalyst 4500 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuu40317
Title:
Applying Medianet to interface bypasses SA Miss queue on 4500
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Using Medianet on L2 trunks, we see unknown unicast flooding because MACs are not being learned on interfaces that medianet is configured. When medianet is applied, the SA MISS CPU queue does not increment but medianet CPU queue does.

Conditions:
3.6.0 4500 Sup8 using medianet on the interface, where the medianetMonitor has a match-all criteria specified

Workaround:
For medianet configure a policy with a criteria other than a match-all. Preferably the MediaMonitor policy should match specific flows , that are of interest.

Further Problem Description:
Impacts 4500e and 4500es8 switches

Last Modified:
04-SEP-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases: *
15.2(2)E3, 15.2(3)E2, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(4.10.62)PI5, 3.6(3)E, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCut64189
Title:
Device TELNET can enter Privileged Mode without Enable Password
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

Under some conditions, users logged in to the device over telnet or
SSH are able to enter privileged command mode without being asked
for a password even when "enable password" and/or "enable secret" is
configured.

Access to non-privileged command mode is not affected by this defect.

Conditions:

The defect is specific to Catalyst 4500.

The defect is observed on all Catalyst 4500 redundant systems (VSS as
well as dual-supervisor chassis). The defect is observed only after a
HA switchover, when a supervisor that used to operate in a Standby
role takes over as the Active.

Workaround:
After a switchover, execute:

clear line vty

for all the configured VTY lines on the new Active supervisor.

The following EEM script can be used to automate this action:

--------------------------------------------------------------------------------
event manager applet CSCut64189-Workaround
event rf event RF_PROG_ACTIVE_FAST
action 1 cli command "enable"
action 2 cli command "show line vty 0 16"
action 3 set show_line_vty_op "$_cli_result"
action 4 foreach this_line "$show_line_vty_op" "\n"
action 4.1 regexp "^(.) *([0-9]+) VTY" $this_line match this_line_flag this_line_num
action 4.2 if "$_regexp_result" ne "0"
action 4.2.1 subtract $this_line_num 1
action 4.2.2 set actual_vty_line_to_clear "$_result"
action 4.2.3 string equal "$this_line_flag" "*"
action 4.2.4 if "$_string_result" ne "1"
action 4.2.4.1 cli command "clear line vty $actual_vty_line_to_clear" pattern "[confirm]"
action 4.2.4.2 cli command "y"
action 4.2.4.3 syslog msg "VTY $actual_vty_line_to_clear cleared"
action 4.2.5 else
action 4.2.5.1 syslog msg "Not clearing vty $actual_vty_line_to_clear because it is in use (probably by this applet)"
action 4.2.6 end
action 4.3 end
action 5 end
action 6 cli command "disable"
action 7 exit
--------------------------------------------------------------------------------

Last Modified:
04-SEP-2015
Known Affected Releases:
15.2(3.7.1E)
Known Fixed Releases: *
15.2(2)E3, 15.2(3)E2, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(3)E, 3.7(2)E
Alert Type:
New
Bug Id:
CSCdk22815
Title:
Bisync tests over frame-relay with pass-through fails.
Status:
Fixed
Severity:
2 Severe
Description:

Release Note
============

This problem occurs because of incorrect group numbers
defined on the two BSTUN peers.

Group numbers defined on the two peers need to match.



Example
-------
If one peer has the following definition ...
bstun protocol-group 3 bsc (passthru)
then the other peer also needs to be defined for
group 3 (passthru)

Last Modified:
08-SEP-2015
Known Affected Releases:
11.3(4.1), 12.0(0.10)
Known Fixed Releases:
11.3(5.1), 11.3(5.1)AA, 11.3(5.1)NA, 11.3(5.1)T, 12.0(0.16)
Alert Type:
Updated *
Bug Id:
CSCuq54573
Title:
Service Policy disappears from Running Configuration of the interface
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Service Policy disappears when link flaps or when negotiate for the speed.
Log is seen " Strict priority cannot be guaranteed"
Happens on both the port connected PC / Phone / switch which negotiate the speed lesser than 1Gig

Conditions:
Speed is lesser than 1Gig

and

Bandwidth remaining command used in the class
example:

policy-map Test
class Class1
priority
class Class2
bandwidth remaining percent 40
class Class3
bandwidth remaining percent 40

Workaround:
configure Police under Priority class

or

Configure Speed on the switch port

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases: *
15.2(2)E3, 15.2(4.0)ST, 15.2(4.0.64a)E, 3.6(3)E
Alert Type:
Updated *
Bug Id:
CSCuc25596
Title:
WS-C4510R-E---log warning about mask table consistency check failure
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
A message starting with C4K_L3HWFORWARDING-3-MASKTABLECONSISTENCYCHECKFAILED is logged.
Conditions:
None.
Workaround:
See the system message guide regarding this message. This is a transient condition that is auto-corrected.

Error Message C4K_L3HWFORWARDING-3-MASKTABLECONSISTENCYCHECKFAILED: MaskTable Consistency Check Failed: block [dec] index [dec]
Explanation There was a mask table consistency check failure.
More Info:

Last Modified:
08-SEP-2015
Known Affected Releases:
12.2(53)SG5
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu38664
Title:
Switch 4k shouldn't forward multicast MAC for authentication to radius
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
switch authenticate flow control packets (multicast mac address as a source mac) from a Cisco un-managed switch (Linksys).

switch 4k is forwarding the 802.1 well defined Spanning multicast MAC address to radius server as it's a reserved MAC address switch shouldn't consider this MAC address as a normal MAC address and should never forward to radius server for authentication.

Conditions:
switch authenticate multicast mac address - 01-80-C2-00-00-01 from a Cisco un-managed switch (Linksys)

Workaround:
put a mac address filter on a switch-port and block the mac address.

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases:
15.1(1)SG2, 15.1(2)SG
Known Fixed Releases: *
15.2(4.0.87)E, 15.2(5.0.10)E
Alert Type:
Updated *
Bug Id:
CSCuo59641
Title:
wireshark does not work when file location is usb0:
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
wireshark does not work when file location is usb0:

Conditions:
NA

Workaround:
NA

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
15.2(1)E
Known Fixed Releases: *
15.2(2)E3, 15.2(3)E1, 15.2(4.0.64a)E, 15.2(5.0)ST, 3.6(3)E, 3.7(1)E
Alert Type:
Updated *
Bug Id:
CSCut87080
Title:
Frequent Fan Alarm: Fan of power supply 1 has failed
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Following messages seen on the device.

Dec 25 19:43:14.004 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 1 has failed
Dec 25 19:43:19.004 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 1 is okay
Mar 5 17:23:12.972 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed
Mar 5 17:23:17.972 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay
Mar 11 17:55:33.340 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed
Mar 11 17:55:38.340 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay

Conditions:
None

Workaround:
None

Further Problem Description:
These messages are cosmetic

Last Modified:
08-SEP-2015
Known Affected Releases:
15.1(2)SG4
Known Fixed Releases: *
15.2(4.0.72)E, 15.2(4.0.75a)E, 15.2(5.0.10)E

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论