| |
|
Alert Type: | Updated * |
Bug Id: | CSCun22238 | Title: | Router crashes with cts inline sgt cmd |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Description: * | Router crashes when cts inline sgt cmd is enabled.
Symptom:
Conditions:
Workaround: Remove cts inline sgt cli.
Further Problem Description:
|
|
Last Modified: | 08-SEP-2015 |
|
Known Affected Releases: | 15.4(3)M |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCul89896 | Title: | Ping failure seen on atm subinterfaces connected via point-to-point link |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: * | Symptom: Ping failure seen on ATM sub-interfaces connected via point-to-point link. Conditions: This symptom is observed on loading Cisco IOS image 15.4(1.13)T. Workaround: There is no workaround.
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(1.13)T, 15.4(1.14)T, 15.4(1.14.2)PIH24 |
|
Known Fixed Releases: | 15.4(1.19)T, 15.4(1.20)PI25, 15.4(2)CG, 15.4(2)T, 15.4(2)T1, 15.4(3)M |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu73697 | Title: | ISM drops fragmented traffic if virtual-reassembly configured |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ISM-VPN drops fragmented IPsec packets when decrypting
Conditions: o ISM-VPN module enabled o ip virtual-reassembly enabled on the crypto interface
Workaround: o disable virtual-reassembly o disable ISM module
Further Problem Description:
|
|
Last Modified: | 03-SEP-2015 |
|
Known Affected Releases: | 15.2(4)M, 15.3(3)M4 |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.6(0.10)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuq82122 | Title: | SSTE: Router crashed @mace_dp_remove_feature_object_for_cli |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Making external as the bug is observed in customer's network environment
Symptom: The device may unexpectedly reload
Conditions: while putting the following config: no mace monitor waas all mace-flow it will not happen all the times
Workaround: None at this time
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(1)T1, 15.5(0.20)T, 15.5(0.25)T0.1 |
|
Known Fixed Releases: * | 15.5(3)M0.2, 15.6(0.8)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuj62038 | Title: | ISM-VPN drops packets after decryption |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: * | Symptom: ISM-VPN drops packets after decryption memory leak on pak subblocks. Conditions: This symptom is observed under the following conditions: - ISM-VPN module is enabled - IP virtual reassembly configured on the crypto interface - The issue occurred on Cisco IOS version 15.2(3)T3 or later Workaround: There is no workaround.
|
|
Last Modified: | 28-SEP-2015 |
|
Known Affected Releases: | 15.3(3)M, 15.4(1.18)T |
|
Known Fixed Releases: | 15.3(2)T3, 15.3(2)T4, 15.3(3)M2.1, 15.3(3)M3, 15.3(3)M4, 15.4(1.14.12)PIH24, 15.4(1.22)T, 15.4(2)CG, 15.4(2)T, 15.4(2)T1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuh36583 | Title: | ISRG2 - DSP Crash due to Backplane Switch Lockup During T1 Errors |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: An ISR G2 router using a PVDM3 may experience simultaneous failure on several DSPs. Eg:
DSPRM-3-DSPALARMINFO Device (0/1) Host GIGE ack timeout DSPRM-3-DSPALARMINFO DSP (0/7) Host keepalive timeout
Conditions: May be seen when T1 errors cause the router's backplane switch to hang, preventing proper function of the DSPs.
Workaround: Attempt to fix any T1 clock source misconfig.
Further Problem Description:
|
|
Last Modified: | 23-SEP-2015 |
|
Known Affected Releases: | 15.1(4)M4 |
|
Known Fixed Releases: * | 15.1(4)M10, 15.2(4)M9, 15.3(3)M6, 15.4(3)M3, 15.4(3)M3.1, 15.5(2.10)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu90182 | Title: | c2900 ciscoEnvMonSupplyStatusTable cannot get correct status of RPS. |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: ciscoEnvMonSupplyStatusTable cannot get correct status of RPS. As long as RPS is connected with router, the status will be "normal", no matter RPS status is not available or not supported.
Conditions: Get RPS status with ciscoEnvMonSupplyStatusTable.
Workaround: Get RPS status with the following show commands on console: -show env rps -show env table -show env all
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(3)M2.2 |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.8)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv61505 | Title: | CME SNR calls get no ringback when active for PRI calls |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: no ringback when snr is enable. Second call to snr dn gives no ringback until the snr destination is ringing
Conditions: for sip phones with CME
Workaround: none
Further Problem Description:
|
|
Last Modified: | 03-SEP-2015 |
|
Known Affected Releases: | 15.4(3.0l)M2 |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.4(3)S3.12, 15.6(0.11)T, 15.6(0.14)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCus89639 | Title: | Pbx unable to recognize the signal CLR backward signal |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Pbx unable to recognize the signal CLR backward signal
Clear Backward signal is equal to to seize-ack, since there is no change on binary pbx is unable to detect the clear back.
Conditions: 15.4(3)M1
Workaround: None
Further Problem Description:
|
|
Last Modified: | 02-SEP-2015 |
|
Known Affected Releases: | 15.4(3)M1 |
|
Known Fixed Releases: * | 15.4(3)M2.1, 15.4(3)M3, 15.4(3)M3.1, 15.4(3)S2.4, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)T1.1, 15.5(1)T2 |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuw19716 | Title: | IOS TLS Hanshake Failure Rcvd request to end PKI session |
|
Status: | Open |
|
Severity: | 3 Moderate |
Description: | Symptom: IOS TLS Handshake Failure unable to get AAA attribute with no AAA configured Received request to end PKI session with no information, loops through unlocking trust point, sessions start, and then Recvd request to end with no peer information
15.0(1r)M16, RELEASE SOFTWARE (fc1)
IOS looks for AA validation without having any AA configrued, TLS handhsake validates certificates, keys, and then recieves a
Conditions: 15.0(1r)M16, RELEASE SOFTWARE (fc1)
Workaround: None known
Further Problem Description:
|
|
Last Modified: | 11-SEP-2015 |
|
Known Affected Releases: | 15.1(0.0.16) |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论