| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv37210 | Title: | SM-X-1T3/E3 show controller serial x/y crashes 3900e |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Description: | Symptom: Issuing show controller Serial command of the Serial interface created by SM-X-1T3/E3 card causes router to crash.
Conditions: Issue is seen only on 3900e router platform with SM-X-1T3/E3
Workaround: None.
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.6(0.6)T |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.8)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCus63558 | Title: | IOS crashed @qos_cac_flow_compare after sending scaled flows |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: IOS crashed with scaled flows when LCAC feature is configured.
Conditions: IOS might crash when LCAC QoS feature is configured, and send thousands of flow over this interface.
Workaround: N/A
Further Problem Description:
|
|
Last Modified: | 02-SEP-2015 |
|
Known Affected Releases: | 15.4(2)T1, 15.5(1)T |
|
Known Fixed Releases: * | 15.5(2.13)T, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28, 15.5(2.20)S, 15.5(3)S, 16.1(0.237) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut84146 | Title: | On ISM qos not applied to all frags through VTI having qos-pre-classify |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: * | Symptom:
QoS pre-classify is not working for cef switched (passthrough) packets with ISM. All the packets are getting classified as default QoS policy map.
Conditions:
VTI configured with pre-classify and with ISM. Passthrough traffic fails to get classified.
Workaround:
No workaround. Process switched packets work.
Further Problem Description:
|
|
Last Modified: | 07-SEP-2015 |
|
Known Affected Releases: | 15.5(3)M |
|
Known Fixed Releases: | 15.3(3)M5.2, 15.3(3)M6, 15.4(3)M3.2 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCur66298 | Title: | WAAS + WCCP + ZBPF causing inspection issues for FTP |
|
Status: * | Other |
|
Severity: | 3 Moderate |
Description: | Symptom: Issues for inspecting FTP traffic through the router, the FTP traffic is being dropped when ZBPF , WAAS and WCCP are configured at the same time in the router.
Conditions: Just seen when ZBPF , WAAS and WCCP are configured at the same time in the router and we are using the 'inspect' rule for the FTP traffic passing through the router.
(This issue could be related to BUG CSCun86650: WAAS + ZBFW : Sessions not seen with inspect action)
Workaround: 1.- Remove the WCCP configuration while using the FTP 'inspect' rule in the class-map defined for the FTP traffic.
OR
2.- Keep WAAS, WCCP and ZBPF but instead of using the 'inspect' rule for the FTP traffic change it for 'pass' in all the zone-pairs required for allowing the FTP to flow without being dropped.
Further Problem Description: 1. Everything works fine for FTP through the ZBPF if we remove the WCCP configuration, here is the related configuration :
policy-map type inspect FLUX_KIRUNA_VERS_LAN class type inspect FTP inspect class class-default drop log
policy-map type inspect FLUX_LAN_VERS_KIRUNA class type inspect ADMIN_WAAS_SSH inspect class type inspect ADMIN_WAAS_HTTPS_8443 inspect class class-default drop log
2. It is working fine with WCCP just if we change the FTP rule from inspect to pass, here is the related configuration :
policy-map type inspect FLUX_KIRUNA_VERS_LAN class type inspect FTP pass log class class-default drop log
policy-map type inspect FLUX_LAN_VERS_KIRUNA class type inspect ADMIN_WAAS_SSH inspect class type inspect ADMIN_WAAS_HTTPS_8443 inspect class type inspect FTP pass log class class-default drop log
policy-map type inspect FLUX_KIRUNA_VERS_WAAS class type inspect FTP pass log class type inspect ICMP inspect param_cnes class type inspect ECHANGES-WAAS-KIRUNA-CST inspect class class-default drop log
policy-map type inspect FLUX_WAAS_VERS_KIRUNA class type inspect FTP pass log class type inspect ECHANGES-WAAS-KIRUNA-CST inspect class class-default drop log
policy-map type inspect FLUX_LAN_VERS_WAAS class type inspect ADMIN_WAAS_SSH inspect class type inspect ADMIN_WAAS_HTTPS_8443 inspect class type inspect ICMP inspect class class-default drop log
policy-map type inspect FLUX_WAAS_VERS_LAN ! class type inspect NETFLOW ! inspect class type inspect FTP pass log class class-default drop log
3. Then, when Cu try to optimize the session using WAAS, it doesn't work anymore.
Here are the related logs :
Sep 18 08:24:43.512: %FW-6-PASS_PKT: (target:class)-(KIRUNA_VERS_LAN:FTP) Passing ftp pkt 192.168.10.4:49957 => 192.168.60.4:21 with ip ident 0 Sep 18 08:24:43.512: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(WAAS_VERS_LAN:FTP):Start ftp session: initiator (192.168.10.4:49957) -- responder (192.168.60.4:21) Sep 18 08:25:06.269: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(WAAS_VERS_LAN:FTP):Start ftp-data session: initiator (192.168.10.4:46240) -- responder (192.168.60.4:26791) Sep 18 08:25:13.871: %FW-6-PASS_PKT: (target:class)-(LAN_VERS_KIRUNA:FTP) Passing tcp pkt 192.168.60.4:26791 => 192.168.10.4:46240 with ip ident 0 Sep 18 08:25:15.513: %FW-6-DROP_PKT: Dropping tcp session 192.168.10.4:46240 192.168.60.4:26791 on zone-pair WAAS_VERS_LAN class FTP due to Invalid Seq# with ip ident 0 Sep 18 08:25:36.399: %FW-6-SESS_AUDIT_TRAIL: (target:class)-(WAAS_VERS_LAN:FTP):Stop ftp-data session: initiator (192.168.10.4:46240) sent 0 bytes -- responder (192.168.60.4:26791) sent 0 bytes
|
|
Last Modified: | 29-SEP-2015 |
|
Known Affected Releases: | 15.2(4)M6 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv01746 | Title: | DLEP VRF aware support request |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Physical interface configured under a certain VRF, breaks DLEP adjacency with radio device.
For instance:
interface GigabitEthernet0/0.99 ip address 192.168.1.25 255.255.255.0 vrf forwarding VRF-TEST <<< If we add this line, the DLEP adjacency goes down. ! interface Virtual-Template99 ! interface vmi99 ip unnumbered GigabitEthernet0/0.99 vrf forwarding VRF-TEST <<< DLEP works fine with VMI interface configured with a VRF. However since it uses IP unnumbered, the IP address is not considered part of the VRF Routing table and remains in Global Routing table. !
Conditions: VRF configured under a physical interface which we intend to use for DLEP adjacency.
Workaround: Do not configure a physical interface intended to be used for DLEP under any VRF.
Further Problem Description: VMI interface used by DLEP is going down and neighbor getting deleted when physical interfaces is configured under a VRF (not in Global Routing table).
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(3)M |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.9)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu77844 | Title: | 3945E with EHWIC-1GE-SFP-CU/ GLC-LH-SMD= not suppport DOM |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: 3945E with EHWIC-1GE-SFP-CU/ GLC-LH-SMD= when use 155.2.T will got below: show int tran detail: Module 0 doesn't support DOM
Conditions: HW:3945E/EHWIC-1GE-SFP-CU/ GLC-LH-SMD= SW:c3900e-universalk9-mz.SPA.155-2.T.bin
Workaround: no workaround
Further Problem Description: first time the software is c3900e-universalk9-mz.SPA.153-3.M5.bin<<< second time the software is c3900e-universalk9-mz.SPA.155-2.T.bin<<< no other change.
when the cu first time use show interface tran detail got below : first time Transmit Power Threshold Threshold Threshold Threshold Port (dBm) (dBm) (dBm) (dBm) (dBm) ---------- ----------------- ---------- --------- --------- --------- Gi0/0/0 --2147483648.-2 -0.0 --2147483648.-2 --2147483648.-2 --2147483648.-2 <<<<<< this number is
second time got below : 3F-N5-20-C3945-A#show interfaces Gi0/0/0 transceiver Module 0 doesn't support DOM
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.5(2)T |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.4)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCur71700 | Title: | Fine tuning of Tx interrupt coalescing in c3900 when tx-ring 4 |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Performance drop observed with ping packet when QoS configured on c3900 onboard GigabitEthernet interface.
Conditions: When both QoS and speed 10 MB is set on c3900 onboard GigabitEthernet interface
Workaround: None
Further Problem Description:
|
|
Last Modified: | 03-SEP-2015 |
|
Known Affected Releases: | 15.5(1.8)T |
|
Known Fixed Releases: * | 15.3(3)M6, 15.4(3)M3.2 |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuu93528 | Title: | channel-bank cannot come back up without shut/no shut after E1 flap |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Channel bank configured on a router with E1 on one side stays in the down state when E1 flaps. This channel will not come up automatically even after the E1 is back up.
Conditions: E1 flap
Workaround: Shut and no shut the port
Further Problem Description:
|
|
Last Modified: | 01-SEP-2015 |
|
Known Affected Releases: | 15.3(3)M4 |
|
Known Fixed Releases: | 15.3(3)M6, 15.3(3)S5.20, 15.3(3)S6, 15.6(0.5)T, 15.6(0.7)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut15147 | Title: | Spurious access produces invalid traceback and show align rework |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: 1) The traceback that is printed as part of ALIGN-3-SPURIOUS is not a valid traceback 2) The output of "show align" is not populated with spurious access information after a spurious access occurs
Conditions: seen on c2951 and c3900
Workaround: no workaround
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(3), 15.5(2)T, 15.5(2.5)T |
|
Known Fixed Releases: * | 15.3(3)M6, 15.4(3)M3.1, 15.5(3)M0.2, 15.6(0.5)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv09635 | Title: | H320 gateway strips rtp marker bits |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Choppy or pixelated video
Conditions: H320 call flow when newer mcu code or dx endpoints are used.
Workaround: run older mcu code, no workaround for dx endpoints
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(3) |
|
Known Fixed Releases: * | 15.2(4)M9, 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.18)T, 15.6(0.19)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCus52771 | Title: | ISR G2:PA-3-PA_INIT_FAILED appears when bootup if securityk9 intsalled |
|
Status: | Open |
|
Severity: | 4 Minor |
Description: * | Symptom: The below msg shows up when the box boot up;
%PA-3-PA_INIT_FAILED: Performance Agent failed to initialize (Missing Data and APPX License)
Conditions: 1. securityk9 license is installed AND 2. 15.4T/M is used 3.Also seen on 15.5(3)M If 15.3T/M or older is used, this doesn't happen.
Workaround: Activate datak9 license
Further Problem Description: This is just a cosmetic issue and no impact onto system.
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.4(1)T1, 15.4(3)M, 15.5(1)T |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw10370 | Title: | Router with ISM module crash when crypto enabled interface goes down |
|
Status: | Open |
|
Severity: * | 6 Enhancement |
Description: | Symptom: Router with ISM module crash when crypto enabled interface goes down
Conditions: Routers with ISM modules installed
Workaround: No Workaround Available
Further Problem Description:
|
|
Last Modified: | 24-SEP-2015 |
|
Known Affected Releases: | 15.2(4)M |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论