Cisco Blog » The Platform

2015年10月1日星期四

Cisco Notification Alert -Cisco 3900 Series Router-01-Oct-2015 16:50 GMT

 

 

 

 

 

 

 


Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M8
Alert Type:
Software Advisory
File Name:
c3900e-universalk9_npe-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
28-SEP-2015
Alert Type:
Software Advisory
File Name:
c3900e-universalk9-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL

Software Advisory Date:
28-SEP-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M9
Release Date:
15-SEP-2015
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M9
Release Date:
15-SEP-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M8
Alert Type:
Software Advisory
File Name:
c3900e-universalk9-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL

Software Advisory Date:
28-SEP-2015
Alert Type:
Software Advisory
File Name:
c3900e-universalk9_npe-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
28-SEP-2015
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M9
Release Date:
15-SEP-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M8
Alert Type:
Software Advisory
File Name:
c3900-universalk9-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL

Software Advisory Date:
28-SEP-2015
Alert Type:
Software Advisory
File Name:
c3900-universalk9_npe-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
28-SEP-2015
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M9
Release Date:
15-SEP-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.2.4M8
Alert Type:
Software Advisory
File Name:
c3900-universalk9_npe-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
28-SEP-2015
Alert Type:
Software Advisory
File Name:
c3900-universalk9-mz.SPA.152-4.M8.bin
File Description:

UNIVERSAL

Software Advisory Date:
28-SEP-2015
Find additional information in Software Downloads index.

Known Bugs - 3900 Series Integrated Services Routers

Alert Type:
Updated *
Bug Id:
CSCuv37210
Title:
SM-X-1T3/E3 show controller serial x/y crashes 3900e
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Issuing show controller Serial command of the Serial
interface created by SM-X-1T3/E3 card causes router to crash.

Conditions:
Issue is seen only on 3900e router platform with SM-X-1T3/E3

Workaround:
None.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
15.6(0.6)T
Known Fixed Releases: *
15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.8)T
Alert Type:
Updated *
Bug Id:
CSCus63558
Title:
IOS crashed @qos_cac_flow_compare after sending scaled flows
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IOS crashed with scaled flows when LCAC feature is configured.

Conditions:
IOS might crash when LCAC QoS feature is configured, and send thousands of flow over this interface.

Workaround:
N/A

Further Problem Description:

Last Modified:
02-SEP-2015
Known Affected Releases:
15.4(2)T1, 15.5(1)T
Known Fixed Releases: *
15.5(2.13)T, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28, 15.5(2.20)S, 15.5(3)S, 16.1(0.237)
Alert Type:
Updated *
Bug Id:
CSCut84146
Title:
On ISM qos not applied to all frags through VTI having qos-pre-classify
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:





QoS pre-classify is not working for cef switched (passthrough) packets with ISM. All the packets are getting classified as default QoS policy map.

Conditions:



VTI configured with pre-classify and with ISM. Passthrough traffic fails to get classified.

Workaround:


No workaround. Process switched packets work.

Further Problem Description:












Last Modified:
07-SEP-2015
Known Affected Releases:
15.5(3)M
Known Fixed Releases:
15.3(3)M5.2, 15.3(3)M6, 15.4(3)M3.2
Alert Type:
Updated *
Bug Id:
CSCur66298
Title:
WAAS + WCCP + ZBPF causing inspection issues for FTP
Status: *
Other
Severity:
3 Moderate
Description:

Symptom:
Issues for inspecting FTP traffic through the router, the FTP traffic is being dropped when ZBPF , WAAS and WCCP are configured at the same time in the router.

Conditions:
Just seen when ZBPF , WAAS and WCCP are configured at the same time in the router and we are using the 'inspect' rule for the FTP traffic passing through the router.

(This issue could be related to BUG CSCun86650: WAAS + ZBFW : Sessions not seen with inspect action)

Workaround:
1.- Remove the WCCP configuration while using the FTP 'inspect' rule in the class-map defined for the FTP traffic.

OR

2.- Keep WAAS, WCCP and ZBPF but instead of using the 'inspect' rule for the FTP traffic change it for 'pass' in all the zone-pairs required for allowing the FTP to flow without being dropped.

Further Problem Description:
1. Everything works fine for FTP through the ZBPF if we remove the WCCP configuration, here is the related configuration :

policy-map type inspect FLUX_KIRUNA_VERS_LAN
class type inspect FTP
inspect
class class-default
drop log

policy-map type inspect FLUX_LAN_VERS_KIRUNA
class type inspect ADMIN_WAAS_SSH
inspect
class type inspect ADMIN_WAAS_HTTPS_8443
inspect
class class-default
drop log

2. It is working fine with WCCP just if we change the FTP rule from inspect to pass, here is the related configuration :

policy-map type inspect FLUX_KIRUNA_VERS_LAN
class type inspect FTP
pass log
class class-default
drop log

policy-map type inspect FLUX_LAN_VERS_KIRUNA
class type inspect ADMIN_WAAS_SSH
inspect
class type inspect ADMIN_WAAS_HTTPS_8443
inspect
class type inspect FTP
pass log
class class-default
drop log

policy-map type inspect FLUX_KIRUNA_VERS_WAAS
class type inspect FTP
pass log
class type inspect ICMP
inspect param_cnes
class type inspect ECHANGES-WAAS-KIRUNA-CST
inspect
class class-default
drop log

policy-map type inspect FLUX_WAAS_VERS_KIRUNA
class type inspect FTP
pass log
class type inspect ECHANGES-WAAS-KIRUNA-CST
inspect
class class-default
drop log

policy-map type inspect FLUX_LAN_VERS_WAAS
class type inspect ADMIN_WAAS_SSH
inspect
class type inspect ADMIN_WAAS_HTTPS_8443
inspect
class type inspect ICMP
inspect
class class-default
drop log

policy-map type inspect FLUX_WAAS_VERS_LAN
! class type inspect NETFLOW
! inspect
class type inspect FTP
pass log
class class-default
drop log

3. Then, when Cu try to optimize the session using WAAS, it doesn't work anymore.

Here are the related logs :

Sep 18 08:24:43.512: %FW-6-PASS_PKT: (target:class)-(KIRUNA_VERS_LAN:FTP) Passing ftp pkt 192.168.10.4:49957 => 192.168.60.4:21 with ip ident 0
Sep 18 08:24:43.512: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(WAAS_VERS_LAN:FTP):Start ftp session: initiator (192.168.10.4:49957) -- responder (192.168.60.4:21)
Sep 18 08:25:06.269: %FW-6-SESS_AUDIT_TRAIL_START: (target:class)-(WAAS_VERS_LAN:FTP):Start ftp-data session: initiator (192.168.10.4:46240) -- responder (192.168.60.4:26791)
Sep 18 08:25:13.871: %FW-6-PASS_PKT: (target:class)-(LAN_VERS_KIRUNA:FTP) Passing tcp pkt 192.168.60.4:26791 => 192.168.10.4:46240 with ip ident 0
Sep 18 08:25:15.513: %FW-6-DROP_PKT: Dropping tcp session 192.168.10.4:46240 192.168.60.4:26791 on zone-pair WAAS_VERS_LAN class FTP due to Invalid Seq# with ip ident 0
Sep 18 08:25:36.399: %FW-6-SESS_AUDIT_TRAIL: (target:class)-(WAAS_VERS_LAN:FTP):Stop ftp-data session: initiator (192.168.10.4:46240) sent 0 bytes -- responder (192.168.60.4:26791) sent 0 bytes



Last Modified:
29-SEP-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv01746
Title:
DLEP VRF aware support request
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Physical interface configured under a certain VRF, breaks DLEP adjacency with radio device.

For instance:

interface GigabitEthernet0/0.99
ip address 192.168.1.25 255.255.255.0
vrf forwarding VRF-TEST <<< If we add this line, the DLEP adjacency goes down.
!
interface Virtual-Template99
!
interface vmi99
ip unnumbered GigabitEthernet0/0.99
vrf forwarding VRF-TEST <<< DLEP works fine with VMI interface configured with a VRF. However since it uses IP unnumbered, the IP address is not considered part of the VRF Routing table and remains in Global Routing table.
!

Conditions:
VRF configured under a physical interface which we intend to use for DLEP adjacency.

Workaround:
Do not configure a physical interface intended to be used for DLEP under any VRF.

Further Problem Description:
VMI interface used by DLEP is going down and neighbor getting deleted when physical interfaces is configured under a VRF (not in Global Routing table).

Last Modified:
24-SEP-2015
Known Affected Releases:
15.4(3)M
Known Fixed Releases: *
15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.9)T
Alert Type:
Updated *
Bug Id:
CSCuu77844
Title:
3945E with EHWIC-1GE-SFP-CU/ GLC-LH-SMD= not suppport DOM
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
3945E with EHWIC-1GE-SFP-CU/ GLC-LH-SMD=
when use 155.2.T will got below:
show int tran detail:
Module 0 doesn't support DOM

Conditions:
HW:3945E/EHWIC-1GE-SFP-CU/ GLC-LH-SMD=
SW:c3900e-universalk9-mz.SPA.155-2.T.bin

Workaround:
no workaround

Further Problem Description:
first time the software is c3900e-universalk9-mz.SPA.153-3.M5.bin<<<
second time the software is c3900e-universalk9-mz.SPA.155-2.T.bin<<<
no other change.

when the cu first time use show interface tran detail got below :
first time
Transmit Power Threshold Threshold Threshold Threshold

Port (dBm) (dBm) (dBm) (dBm) (dBm)

---------- ----------------- ---------- --------- --------- ---------

Gi0/0/0 --2147483648.-2 -0.0 --2147483648.-2 --2147483648.-2 --2147483648.-2 <<<<<< this number is

second time got below :
3F-N5-20-C3945-A#show interfaces Gi0/0/0 transceiver
Module 0 doesn't support DOM

Last Modified:
24-SEP-2015
Known Affected Releases:
15.5(2)T
Known Fixed Releases: *
15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.4)T
Alert Type:
Updated *
Bug Id:
CSCur71700
Title:
Fine tuning of Tx interrupt coalescing in c3900 when tx-ring 4
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Performance drop observed with ping packet when QoS configured on c3900 onboard GigabitEthernet interface.

Conditions:
When both QoS and speed 10 MB is set on c3900 onboard GigabitEthernet interface

Workaround:
None

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
15.5(1.8)T
Known Fixed Releases: *
15.3(3)M6, 15.4(3)M3.2
Alert Type:
New
Bug Id:
CSCuu93528
Title:
channel-bank cannot come back up without shut/no shut after E1 flap
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Channel bank configured on a router with E1 on one side stays in the down state when E1 flaps.
This channel will not come up automatically even after the E1 is back up.

Conditions:
E1 flap

Workaround:
Shut and no shut the port

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
15.3(3)M6, 15.3(3)S5.20, 15.3(3)S6, 15.6(0.5)T, 15.6(0.7)S
Alert Type:
Updated *
Bug Id:
CSCut15147
Title:
Spurious access produces invalid traceback and show align rework
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
1) The traceback that is printed as part of ALIGN-3-SPURIOUS is not a valid traceback
2) The output of "show align" is not populated with spurious access information after a spurious access occurs

Conditions:
seen on c2951 and c3900

Workaround:
no workaround

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
15.4(3), 15.5(2)T, 15.5(2.5)T
Known Fixed Releases: *
15.3(3)M6, 15.4(3)M3.1, 15.5(3)M0.2, 15.6(0.5)T
Alert Type:
Updated *
Bug Id:
CSCuv09635
Title:
H320 gateway strips rtp marker bits
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Choppy or pixelated video

Conditions:
H320 call flow when newer mcu code or dx endpoints are used.

Workaround:
run older mcu code, no workaround for dx endpoints

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
15.4(3)
Known Fixed Releases: *
15.2(4)M9, 15.4(3)M3.2, 15.5(3)M0.2, 15.6(0.18)T, 15.6(0.19)T
Alert Type:
Updated *
Bug Id:
CSCus52771
Title:
ISR G2:PA-3-PA_INIT_FAILED appears when bootup if securityk9 intsalled
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
The below msg shows up when the box boot up;

%PA-3-PA_INIT_FAILED: Performance Agent failed to initialize (Missing Data and APPX License)

Conditions:
1. securityk9 license is installed AND
2. 15.4T/M is used
3.Also seen on 15.5(3)M
If 15.3T/M or older is used, this doesn't happen.

Workaround:
Activate datak9 license

Further Problem Description:
This is just a cosmetic issue and no impact onto system.

Last Modified:
24-SEP-2015
Known Affected Releases:
15.4(1)T1, 15.4(3)M, 15.5(1)T
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw10370
Title:
Router with ISM module crash when crypto enabled interface goes down
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
Router with ISM module crash when crypto enabled interface goes down

Conditions:
Routers with ISM modules installed

Workaround:
No Workaround Available

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
15.2(4)M
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论