Cisco Blog » The Platform

2015年10月1日星期四

Cisco Notification Alert -Nexus 6000 Series Switch-01-Oct-2015 16:50 GMT

 

 

 

 

 

 

 


Security Advisories & Responses - Nexus 6000 Series Switches

Title:
Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
Description:

Multiple Cisco products incorporate a version of the ntpd package. Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to bypass authentication controls or to create a denial of service (DoS) condition.

On April 7, 2015, NTP.org and US-CERT released a security advisory dealing with two issues regarding bypass of authentication controls. These vulnerabilities are referenced in this document as follows:

  • CVE-2015-1798: NTP Authentication bypass vulnerability
  • CVE-2015-1799: NTP Authentication doesn't protect symmetric associations against DoS attacks
Cisco has released software updates that address these vulnerabilities.

Workarounds that mitigate these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd

Date:
09-SEP-2015
Title:
OpenSSL Alternative Chains Certificate Forgery Vulnerability (July 2015) Affecting Cisco Products
Description:

On July 9, 2015, the OpenSSL Project released a security advisory detailing a vulnerability affecting applications that verify certificates, including SSL/Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) clients and SSL/TLS/DTLS servers using client authentication.

Multiple Cisco products incorporate a version of the OpenSSL package affected by this vulnerability that could allow an unauthenticated, remote attacker to cause certain checks on untrusted certificates to be bypassed, enabling the attacker to forge "trusted" certificates that could be used to conduct man-in-the-middle attacks.

This advisory will be updated as additional information becomes available.

Cisco will release free software updates that address this vulnerability.

Workarounds that mitigate this vulnerability may be available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150710-openssl

Date:
16-SEP-2015
Title:
Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
Description:

Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service condition or perform a man-in-the-middle attack. On January 8, 2015, the OpenSSL Project released a security advisory detailing eight distinct vulnerabilities. The vulnerabilities are referenced in this document as follows:

  • CVE-2014-3571: OpenSSL DTLS Message Processing Denial of Service Vulnerability
  • CVE-2015-0206: OpenSSL dtls1_buffer_record Function DTLS Message Processing Denial of Service Vulnerability
  • CVE-2014-3569: OpenSSL no-ssl3 Option NULL Pointer Dereference Vulnerability
  • CVE-2014-3572: OpenSSL Elliptic Curve Cryptographic Downgrade Vulnerability
  • CVE-2015-0204: OpenSSL RSA Temporary Key Cryptographic Downgrade Vulnerability
  • CVE-2015-0205: OpenSSL Diffie-Hellman Certificate Validation Authentication Bypass Vulnerability
  • CVE-2014-8275: OpenSSL Certificate Fingerprint Validation Vulnerability
  • CVE-2014-3570: OpenSSL BN_sql Function Incorrect Mathematical Results Issue
Cisco will release software updates that address these vulnerabilities.

Workarounds that mitigate these vulnerabilities may be available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

Date:
22-SEP-2015

Find additional information in Cisco Security Advisories & Responses

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6004 Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6001 Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 6000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCut74135
Title:
Fabricpath mode transit - control packets tagged with internal vlan 4041
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
On a Nexus 6000/5600 running fabricpath , when fabricpath mode transit is configured, the switch is sending control packets like CDP, LACP, ISIS tagged with internal VLAN ID 4041.

This causes a switch like N7K drop the packet. None of the protocols are able to negotiate and come up

Conditions:
Command fabricpath mode transit is configured.

Workaround:
Disable transit mode and reload the switch.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.0(6)N1(0.269), 7.1(1)N1(0.508), 7.2(0)N1(0.147)
Known Fixed Releases:
7.0(1)ZN(0.780), 7.0(6)N1(1), 7.0(7)ZN(0.156), 7.1(1)N1(0.511), 7.1(1)N1(1), 7.1(1)ZN(0.67), 7.2(0)N1(0.167), 7.2(0)N1(0.180), 7.2(0)N1(1), 7.2(0)ZN(0.170)
Alert Type:
New
Bug Id:
CSCun26512
Title:
dhcp relay support with URPF cause DROP at INGRESS using customer topo
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
dhcp relay support with URPF cause DROP at INGRESS using customer topo

Conditions:
configuring DHCP Relay and URPF on interface vlan 363 on the N6K-14a and N6K-14b switches, if the DHCP Discover (client broadcast) arrived at N6K-14b (Active HSRP), then the DHCP Relay will forward the DHCP discover packet from N6K-14b as uni-cast (using DHCP Relay) to N5K48-2 and then to the DHCP server, then the DHCP server could uni-cast a Offer back through N5K48-1 and over to N6k-14a, then these offers has to be forwarded to the N6K-14b since URPF is configured on the DHCP Discover was send from N6K-14b.
The issue is, if this is the route that was traversed for the DHCP Offer, then once the DHCP Offers are send back to N6K-14b over the MCT, the MCT (VPC10) drops the DHCP Offers.

Workaround:
no

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases:
7.0(1)N1(0.103)
Known Fixed Releases:
7.0(2)N1(1)
Alert Type:
New
Bug Id:
CSCut37784
Title:
[iluka MR5]FEX: Satmgr Module time out during the ISSU upgrade
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Straight through Fex took long time to come up after ISSU upgrade

Conditions:
Disruptive issu between illuka MR5 image.

Workaround:
no

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.0(6)N1(0.6)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq16392
Title:
DN5672UP crash due to fwm hap reset
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
N5672UP running 7.0(5)N1(1) crashed due to fwm hap rest

Conditions:
After performing ISSD to 7.0 release.

Workaround:
Before performing ISSD, run following commands on the switch. This will delete the fwm global PSS config and will forcefully do a true stateless reboot from fwm POV-

show platform fwm info pss config_global delete
copy r s

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
7.0(6)N1(1.4), 7.1(0)N1(0.266)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCur44729
Title:
mac address is out of sync on vpc peers after HSRP flap
Status:
Open
Severity:
2 Severe
Description:

Symptom:This is a timing issue while sending traffic when issuing the command "clear mac address-table dynamic" simultaneously on vpc peers creates a sync issue where one or more macs may not be deleted on both switches.

If traffic restarts on the same macs, then the switches should resync without issue.
Conditions:Appears with over 10000 macs in the system, and while traffic is running, and "clear mac address-table dynamic" is used almost simultaneously on both vpc peers.

During this period a mac might be deleted, but then gets a new learn notification from the peer, then skips deleting this mac.
Workaround:We suggest to stop traffic completely before clearing the mac tables and this issue shouldn't be seen. Also waiting about 5 seconds between issuing the clear command on peers should give them time to process the delete messages before anything goes wrong.
If hitting this issue, then using "clear mac address-table dynamic" on the switch that has extra mac should delete it properly.

Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.379)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv37294
Title:
2248: Packets getting Blackholed in the HIF VPC port-channel
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Packets will get black holed in the HIF VPC Port-channel

Conditions:
1) FEX 2248
2) 55xx based Platforms
3) Running 7.0(6)N1(1)

Workaround:
1) Keep one single HIF port in the HIF port-channel.
2) If there are more ports in port-channel, Change the hashing by shutting down ports on HIF side.

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
7.0(6)N1(0.1)
Known Fixed Releases:
7.0(7)N1(0.288), 7.0(7)N1(1), 7.0(7)ZN(0.173), 7.1(3)N1(0.619), 7.1(3)N1(1), 7.1(3)ZN(0.25), 7.2(1)N1(0.283), 7.2(1)N1(1), 7.2(1)ZN(0.48)
Alert Type:
New
Bug Id:
CSCur50810
Title:
vpc_simultaneous_reload failed due to missng flogi in npv switch
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In FCoE scale test scenario, some VFCs don't come up after simultaneous reload of both VPC peers.

Conditions:
VFCs don't come up because the eth port / PO they are bound to are in VLAN ErrDisable state.

Workaround:
None.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.379)
Known Fixed Releases:
7.0(2)FIP(0.6), 7.1(0)N1(0.419), 7.1(0)N1(1), 7.1(0)ZN(0.492), 7.1(1)N1(0.34), 7.1(1)N1(1), 7.2(0)N1(1), 7.2(0)VZN(0.31)
Alert Type:
Updated *
Bug Id:
CSCul02903
Title:
Enh: U2rib timesout on response from DCEFIB causing delayed ftag update
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:Seeing large convergence times for multicast traffic in a fabricpath topology.
Conditions:Can happen when there are changes in ftag tree. Ftag tree can change whenever a switch part of the ftag tree goes down, or if any of the L2MP core link part of the ftag tree goes down.
Workaround:None
More Info:When an ftag tree path is changing, ftag route needs to be updated on all the switches part of the ftag tree. Some times this update takes longer than 10 seconds. This long delay in ftag programming can cause traffic drops for multicast flows in the L2MP cloud. Traffic does recover once the ftag route programming is completed on all the switches.

Last Modified:
24-SEP-2015
Known Affected Releases:
6.0(2)N2(2), 6.0(2)N2(3)
Known Fixed Releases:
6.0(2)N2(5.94), 6.0(2)N2(6), 6.0(2)N3(0.73), 7.0(0)N1(0.381), 7.0(0)N1(0.73), 7.0(0)N1(1), 7.1(0)ZN(0.183)
Alert Type:
New
Bug Id:
CSCuu58776
Title:
Fwm core happened While doing ND-ISSU from IPLUS-MI-1 to Janjuc-221
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Fwm core happened While doing ND-ISSU from 7.1x or 7.0x release to 7.2(0)N1(1).

It can also happen from 7.0x to 7.1x.

Conditions:
After performing ND-ISSU if in the pre issu image -
MCT link flapped(in case of vpc+ only) .
NIF (interface connected to active-active fex)port flapped (in case of both vpc and vpc+)

Workaround:
clear multicast groups via -

clear ip igmp snooping group * all

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.2(0)N1(0.221)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu30807
Title:
FWM hap reset @ fwm_fwim_delete_lif while poweroff the module.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
FWM Crash

Conditions:
During powering off GEM module

Workaround:
No workaround

Further Problem Description:
FWM is trying to get the bigsur_asic_version during the port cleanup but the crash was due to the fact that the module was already cleaned up

Last Modified:
24-SEP-2015
Known Affected Releases:
7.2(0)N1(0.195)
Known Fixed Releases:
7.1(3)N1(0.623), 7.1(3)N1(1), 7.1(3)ZN(0.30), 7.3(0)N1(0.80), 7.3(0)N1(1), 7.3(0)ZN(0.78)
Alert Type:
New
Bug Id:
CSCur34233
Title:
100G port channels limited to 5 ports, cli blocked for more than 5
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
Observed a FWM crash when you configured port-channel with 12 member link. Each member link with 100G link.

Conditions:
Each 100G is linked 3 40G ports internally. so when its crossed more than 5 link we will hit the fwm crash. This is expected behavior. Because bigsur will support only 16 links max. This is system limitation.

Workaround:
no

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
7.1(0)N1(0.370)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq99189
Title:
N96EF: PCS not getting completed on some of the links with AOC cables
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
We are hitting the link issue with N96EF switch with ACO cable. So far the issue happened with 2 sets of ports with AOC 1m and AOC 3m

The PCS is not getting completed in both these cases. Attached is the DFE log.

Conditions:
From Iluka MR3:
- N96EF chassis will support both RevB and CR LEMs
- N96EFCR chassis will only support CR LEMs

Workaround:
No

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
7.0(4)N1(0.164)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv97386
Title:
egress traffic dropped: qinq-xlate-table missing "Ig" entry
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
Inter VLAN traffic loss, found QinQ table mis-programmed.

Conditions:
Switch is configured via DCNM, not clear on exact trigger, submitter would do frequently VRF addition/deletion operation, for deletion he would go via manually also.

Workaround:
No workaround, system came up properly after switch reload.

Further Problem Description:












Last Modified:
16-SEP-2015
Known Affected Releases:
7.3(0)N1(0.94)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCun77758
Title:
Output of ip dhcp relay statistics does not display Discover and Request
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The 'show ip dhcp relay statistics' displays incorrect values for the Discover, Request packets received.

Conditions:
In any box with DHCP relay enabled this issue will be seen

Workaround:
no work arounds.

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur78132
Title: *
N2K - Input Align-Err on FEX Host Interfaces
Status:
Open
Severity: *
2 Severe
Description:

Symptom:
Input Align-Err increases on FEX HIF ports which is not-connected.
This is a cosmetic issue.

NEXUS# show int e101/1/1-32 counters errors

--------------------------------------------------------------------------------
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
--------------------------------------------------------------------------------
Eth101/1/1 0 0 0 0 0 0
Eth101/1/2 0 0 0 0 0 0
Eth101/1/3 4 2 0 6 0 0 <--- ###
Eth101/1/4 0 0 0 0 0 0

Conditions:
using N2K-C2232TM-10GE
port is not-connected but it was up.

Workaround:
None

Further Problem Description:

Last Modified:
25-SEP-2015
Known Affected Releases:
6.0(2)N2(4)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCup70305
Title:
queuing policy on hif not working for l2 mcast traffic
Status:
Fixed
Severity:
2 Severe
Description:

happens only on output direction when multiple multicast groups congest at one hif port(N2H direction),
issue does not happen for input direction and 30g l2 mcast on a 40g link is not a common use case.

Symptom:
when issue happens traffic is flowing thru but may not follow the rate ratio from the output queuing policy.

Conditions:
when multiple multicast group traffic (30G rate here), from N2H direction over 40G NIF link, congest one HIF port.
and output queuing policy applied to this HIF port, either via system qos or via per interface qos policy.

Workaround:
avoid multiple multicast group traffic congest one hif port and apply output queuing policy on this port.

Further Problem Description:
none

Last Modified:
03-SEP-2015
Known Affected Releases:
7.0(3)N1(0.106)
Known Fixed Releases:
7.3(0)N1(0.3), 7.3(0)N1(1)
Alert Type:
New
Bug Id:
CSCur94462
Title:
IPLUS_420: Service not responding while unconfiguring vlan and vpc
Status:
Open
Severity:
2 Severe
Description:

Symptom:
FWM crash seen when FEX NIF PO is unconfigured. Subsequent config commands fail with "Service not responding"

Conditions:
From Switch to Fex, a standalone NIF is configured in addition to regular NIF PO.

Workaround:
Remove Standalone NIF between Switch and Fex.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.420)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu92452
Title:
Too many MTS flush generated when connecting VPC+ MST to legacy RPVST
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Too many MTS flush messages generated when connecting VPC+ MST to legacy RPVST, if multiple switches are connected at the same this can lead to instabilities of the VPC+ pair

Conditions:
Connecting VPC+ MST to legacy RPVST switches

Workaround:
Use RPVST on VPC+ instead of MST

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.0(5)N1(1a)
Known Fixed Releases: *
7.1(3)N1(0.623), 7.1(3)N1(1), 7.1(3)ZN(0.30), 7.3(0)BZN(0.47), 7.3(0)N1(0.95), 7.3(0)N1(1), 7.3(0)ZN(0.89)
Alert Type:
Updated *
Bug Id:
CSCun50553
Title:
Higher re-covergence time when VPC+ switch comes back after a reload.
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Higher re-covergence time when VPC+ Nexus 600x, 55xx switch comes back after a reload.

Conditions:
VPC+ and HSRP is configured on Nexus 600x, 55xx running NX-OS 7.0(0)N1(1). The re-covergence time corresponds to "delay restore interface-vlan" timer in VPC config. Default is 10 seconds and hence by default loss unto 10-12 seconds can be seen.

Workaround:
Reduce "delay restore interface-vlan" timer to 1 second.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.0(0)N1(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsv81694
Title:
Flap on dynamic-learn port removes the auto-learn static mac entry.
Status:
Open
Severity:
3 Moderate
Description: *

Problem Summary:

Auto-learn Static mac entry is removed if the port on which same mac address is dynamically learned is flapped. Static mac address is removed from software as well as hardware.


Description:

- Configure a static mac address w/ auto-learn on port1, say Ethernet 1/1
- Send packets, say from IXIA, on another port port2, say Ethernet 1/2 with same src mac address.
- Mac address is learned on port2 (Ethernet 1/2).
- shut/no shut port2 (Ethernet 1/2)
- The expected behavior is to restore the static mac address w/ src port as port1 (Ethernet 1/1).
However, the actual behavior is that the mac address is removed from both software and hardware tables (even though the show running-config shows the mac address on port1).

Workaround:

- Re-add the static mac entry (in the above example, on port Ethernet 1/1) through the CLI.

Last Modified:
24-SEP-2015
Known Affected Releases:
4.1(2)N1(0.1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq79866
Title:
Auto config is pulling random vlan for untagged traffic on trunk port
Status:
Open
Severity:
3 Moderate
Description:

Symptom:A random vlan is getting set for auto-config when during auto-configuration of the native vlan while sending untagged traffic.
Conditions:Auto-config has to be enabled, along with "switchport trunk native vlan <>" on the port. The profile for auto-config must move vlans from CE mode to Fabricpath. It is during this change to fabricpath the vlan is going down and packets come in on a random vlan, as there is not a native vlan up to be learned on.
Workaround:You can clear the unwanted profile entry with "clear fabric database host dot1q "
More Info:Once native vlan is in Fabricpath mode, this problem shouldn't be seen. It is during the transition the vlan goes down the issue will be seen.

Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.318)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsx80410
Title:
N5K System reboots when # STP instances >> 3140
Status:
Open
Severity:
3 Moderate
Description: *

Problem summary:
If the number of STP instances on an N5K system (comprising attached FEXes) exceeds the recommended limit of 3140, then N5K switch may not be able to handle the high number of STP instances and may reboot.

Workaround:
None. Just reduce the number of STP instances to not exceed the recommended limit of 3140.

Last Modified:
24-SEP-2015
Known Affected Releases:
4.0(1a)N2(0.196)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv83438
Title:
Fwm memleak: acl_install_uninstall
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Memleak

Conditions:
during init

Workaround:
none

Further Problem Description:
none

Last Modified:
24-SEP-2015
Known Affected Releases:
7.3(0.83)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw05570
Title:
fwm_trace_log file takes up disk space under /volatile
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
fwm_trace_log file takes up disk space under /volatile

Conditions:
- when execute tac-pac, but fail by "No space left on device"
N5K-A# tac-pac

gzip: stdout: No space left on device
vsh_system returned 256
- There is large fwm_trace_log in volatile:
N5K-A# dir volatile:
135790592 Aug 03 19:29:42 2015 fwm_trace_log
17417372 Aug 03 19:34:41 2015 vim_trace_log
Usage for volatile://sup-local
153374720 bytes used
3911680 bytes free
157286400 bytes total

Workaround:
1.Delete the fwm trace file from /volatile, if it is already created using
delete volatile:fwm_trace_log.tar.gz
2.Clear the trace buffer using
debug platform fwm logging clear_trace_buffer
3.Disable fwm logs using
show platform fwm info trace disable


Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
7.0(3)N1(1), 7.0(5)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut49415
Title:
Logging Levels are lost after first reload post Non-Disruptive ISSU
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
User modified logging levels will be lost after reload (manual or otherwise) post a successful ND-ISSU.

Conditions:
Reload the switch after a successful ND ISSU.

Workaround:
Issuing "copy r s" manually after successful ND-ISSU and before reload will make sure the user modified logging levels are retained post reload.

Further Problem Description:
This is happening as during the ND-ISSU process the logging levels are set to default and restored back at the end. After restoring, the logging levels are part of running config and still not copied to the start-up config.

Last Modified:
13-SEP-2015
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases: *
7.1(3)N1(0.631), 7.1(3)N1(1), 7.1(3)ZN(0.38), 7.3(0)N1(0.118), 7.3(0)N1(1), 7.3(0)ZN(0.109)
Alert Type:
Updated *
Bug Id:
CSCus97195
Title:
Nexus 5K/6k - FEX HIF port down delay when FEX Fabric member links down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
FEX Host Interfaces (HIF's) may take ~6-8 seconds to go down, while the Network Interfaces (NIF's) have already gone down.
This may cause extended packet loss as the connecting devices still have link operational with the FEX host ports which has lost it's uplink Network interfaces to parent N5k/6k switch.

Conditions:
When a shutdown for all physical member ports for the FEX Fabric Port-channel is performed.

Traffic loss happens as downlink devices in vPC or in NIC teaming (Active/Standby) would continue sending traffic towards this FEX which has no uplinks available causing blackholing of traffic. Once the host interfaces are down, neighboring device detects link down and moves traffic to redundant link.

Workaround:
If idea is to isolate the FEX, shutdown the FEX Fabric PO instead of physical members or poweroff the FEX.

Issue is not seen with reload of the switch or shutdown of FEX Fabric Port-channel.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
7.0(2)N1(1), 7.0(5)N1(1)
Known Fixed Releases: *
7.1(3)N1(0.620), 7.1(3)N1(1), 7.1(3)ZN(0.27), 7.2(1)N1(0.304), 7.2(1)N1(1), 7.2(1)ZN(0.68)
Alert Type:
Updated *
Bug Id:
CSCut55133
Title:
N5672: cant't save config after configuring vlan mapping more than 200
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
when we configure vlan mapping more than 200 vlan , we can't save config . and error output .

Nexus5672 %SYSMGR-3-CFGWRITE_SRVFAILED: Service "vlan_mgr"failed to store its configuration (error-id 0x40480005).
Nexus5672 %SYSMGR-2-CFGWRITE_ABORTED: Configuration copy aborted.
Nexus5672 %SYSMGR-3-CFGWRITE_FAILED: Configuration copy failed (error-id 0x401E0000).

Conditions:
when configure vlan mapping more than 200.

Workaround:
once copy to flash and then copy runconfig to startconfig
copy run bootflash:running-config
copy bootflash:running-config startup-config

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
7.1(2)N1(0.556), 7.1(2)N1(1), 7.1(2)ZN(0.15), 7.2(0)N1(1), 7.2(1)N1(0.17), 7.2(1)N1(1), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuu62888
Title:
N5K/N6K ISIS Neighbor with network type p2p adjacency not coming up
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On a nexus 5000/6000 series switch, ISIS Neighbor with network type p2p is not coming up with routers running IOS-XR

Conditions:
None

Workaround:
None

Further Problem Description:
None

Last Modified:
05-SEP-2015
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.3(0)BZN(0.47), 7.3(0)ZN(0.103)
Alert Type:
Updated *
Bug Id:
CSCut53085
Title:
mmap error for port-channel services
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show port-channel internal event-history all
mmap: Cannot allocate memory

show port-channel internal event-history errors
mmap: Cannot allocate memory

nexus# show tech-support details >bootflash:techfile1
mmap: Cannot allocate memory

#tac-pac bootflash:///showtech
mmap: Cannot allocate memory

Conditions:

Workaround:

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
6.0(2)N2(3)
Known Fixed Releases: *
7.1(3)N1(0.623), 7.1(3)N1(1), 7.1(3)ZN(0.30), 7.2(1)N1(0.240), 7.2(1)N1(1), 7.2(1)ZN(0.6)
Alert Type:
New
Bug Id:
CSCuw10467
Title:
need to add "no nego auto" when connecting N6K to M1 with 1000base-LH
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Continuous link flaps when connecting N6K to a M1 interface using 1000base-LH SFP

Conditions:
connecting N6K to a M1 interface using 1000base-LH SFP

Workaround:
Hardcode speed and duplex and add "no negotiate auto"

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu67017
Title:
N6K/N56xx CoPP arp/ipv6-nd policy CIR set to 8000
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
CIR for arp/ipv6-nd policy is set at 8000.
Customized arp policy does not affect this value.

Conditions:
Upgrade to 7.0(6)N1(1) or 7.1(1)N1(1)

Workaround:
To modify ARP copp policer CIR, copp-system-class-icmp-echo needs to be modified.

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.0(7)ZN(0.125), 7.1(2)N1(0.560), 7.1(2)N1(1), 7.1(2)ZN(0.21), 7.2(0)N1(1), 7.2(1)N1(0.29), 7.2(1)N1(1), 7.3(0)N1(1)
Alert Type:
New
Bug Id:
CSCuj75434
Title:
DHCP Relay do not work for secondary vlans for both IPv4 and IPv6
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DHCP relay is configured on the switch and private vlan is used. DHCP worked fine before. But after upgrade, DHCP client from secondary vlan do not get ip address. It seems from ethanalyzer the switch did receive the discover packet but did not relay it.

Conditions:
upgrade from 5.2(1)N1(4) to 6.0(2)N2(1).

Workaround:

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
6.0(2)N2(2)
Known Fixed Releases:
7.0(2)N1(1)
Alert Type:
Updated *
Bug Id:
CSCul00229
Title:
N6K - PIM Registers Misclassified as PIM Hellos by COPP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The default COPP policy on a Nexus 6K acting as a multicast RP will incorrectly
classify all incoming PIM register packets as PIM hello packets.

Conditions:
If a high rate of registers is received, PIM hellos will be dropped causing all PIM neighbors to be lost because The default COPP policy on a Nexus 6K acting as a multicast RP will incorrectly
classify all incoming PIM register packets as PIM hello packets

Workaround:
none

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
6.0(2)N2(2)
Known Fixed Releases: *
7.0(7)ZN(0.108), 7.1(2)N1(0.551), 7.1(2)N1(1), 7.1(2)ZN(0.10), 7.2(0)N1(1), 7.2(1)N1(0.3), 7.2(1)N1(1), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuv77922
Title: *
FEX 2348UPQ Fan speed constantly fluctuating
Status:
Other
Severity:
3 Moderate
Description: *

Symptom:
FEX 2348UPQ in 5600/6000 seeing subtle vibration due to fan speed fluctuation.

Conditions:
FEX 2348UPQ in 5600/6000

Workaround:
none

Further Problem Description:

Last Modified:
01-OCT-2015
Known Affected Releases:
7.2(0)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw05533
Title:
fwm_trace_log file takes up disk space under /workspace
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
fwm_trace_log file takes up disk space under /workspace

Conditions:
- when execute tac-pac, but fail by "No space left on device"
N5K-A# tac-pac

gzip: stdout: No space left on device
vsh_system returned 256
- There is large fwm_trace_log in volatile:
N5K-A# dir volatile:
135790592 Aug 03 19:29:42 2015 fwm_trace_log
17417372 Aug 03 19:34:41 2015 vim_trace_log
Usage for volatile://sup-local
153374720 bytes used
3911680 bytes free
157286400 bytes total

Workaround:
none

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
7.0(5)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv27541
Title:
N6k DFA: No Mac on BD not seen
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
profile pulled through autoconfig using data trigger not aging out after virtual machine going out of vlan.
no mac on BD is not received from FWM to HMM.

Conditions:
image - kokomo n6000-uk9.7.3.0.N1.0.43.bin
setup - 2 layer vpc of n6k switches
network - ethernet virtual private network

Workaround:

Further Problem Description:
Auto-pull was done for vlan 801 on Peer #1. The host (2LayerVPC) was on eth 103/1/31. The host MAC is long gone, but there does not seem to be a "lazy aging" timer running on that vlan on either vpc switch. And the profile is still active.BD 800 not empty.Lazy timers unable to delete profile.

Last Modified:
29-SEP-2015
Known Affected Releases:
7.3(0)N1(0.43)
Known Fixed Releases: *
7.3(0)N1(0.150), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCur39762
Title:
Nexus 5600: FWM hap reset with "sh hardware internal bigsur asic x eye"
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
A Nexus 5600 might experience an FWM hap reset when hidden command show hardware internal bigsur asic 0 eye-measurements is issued.

Conditions:
Hidden command show hardware internal bigsur asic 0 eye-measurements is issued on a Nexus 5600

Workaround:
Do not issue the hidden command show hardware internal bigsur asic 0 eye-measurements

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
7.0(4)N1(1)
Known Fixed Releases: *
7.1(3)N1(0.632), 7.1(3)N1(1), 7.1(3)ZN(0.40), 7.2(1)N1(0.318), 7.2(1)N1(1), 7.2(1)ZN(0.80), 7.3(0)N1(0.118), 7.3(0)N1(1), 7.3(0)ZN(0.110)
Alert Type:
Updated *
Bug Id:
CSCuw07732
Title:
N5k Post-7.1(0)N1(1a) BPDU Guard Triggered When Operationally Disabled.
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
BPDU Guard is not operationally enabled but continues to trigger.

Conditions:
1. Enable BPDU Guard on the port level (spanning-tree bpduguard enable) for the N5k and allow it to be triggered.
2. Remove BPDU Guard from the port level (no spanning-tree bpduguard enable).
3. BPDU Guard will continue to trigger even though it is operationally disabled:

N5k# show spanning-tree internal info all | begin Ethernet1/1 | inc oper|drop|oper | head line 12
oper_portfast 1 <-----
oper_networkport 0
oper_p2p 1
oper_bpdufilter 0
oper_bpduguard 0 <------
oper_loopguard 0
bpdufilter_drop_in 0
bpduguard_drop_in 0
err_dropped_in 0
oper_portfast =TRUE oper_p2p =TRUE
oper_loopguard =FALSE oper_bpdufilter=FALSE
oper_bpduguard =FALSE oper_networkport=FALSE <-------

!
BGL14-1.D.06-N5k-1# 2001 Sep 26 00:25:15 BGL14-1.D.06-N5k-1 %$ VDC-1 %$ %STP-2-BLOCK_BPDUGUARD: Received BPDU on port Ethernet1/1 with BPDU Guard enabled. Disabling port.

Workaround:
Workarounds:
*Reload the switch.
OR
*Configure the offending interface with "spanning-tree bpduguard disable" syntax.

Further Problem Description:
Platform tested: Nexus 5600 Post-7.1(0)N1(1a) (N5K-C56128P)

This trigger occurs in a very specific scenario where an attached device has a single VLAN allowed on the trunk that is not on the allowed list of VLAN's (or is misconfigured as an access port on the attached device).

This typically happens when a non-Cisco device such as a blade switch is connect to the N5k in a multi-tenant enviroment where service provider does not have control over the attached device.

Prior to the BPDU enhancments 7.1(0)N1(1a) a BPDU recieved on a non-allowed VLAN was ignored. However on 7.1(0)N1(1a) and later this BPDU from the disallowed VLAN should trigger BPDU Guard when it is operationally enabled either globally (and interface is operationally port-fast) or on the port level.

Last Modified:
28-SEP-2015
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw07725
Title:
N5k Post-7.1(0)N1(1a) BPDU Guard Not Triggered On Disallowed VLAN
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BPDU Guard is globally and operationally enabled but does not trigger on disallowed VLAN .

Conditions:
SW01-[Ten1/1]-----[Eth1/1]-N5600k


N5k# show spanning-tree summary
Switch is in rapid-pvst mode
Root bridge for: VLAN0100-VLAN0101
Port Type Default is disable
Edge Port [PortFast] BPDU Guard Default is enabled <----BPDU guard enabled globally.
Edge Port [PortFast] BPDU Filter Default is disabled
Bridge Assurance is enabled
Loopguard Default is disabled
Pathcost method used is short
STP-Lite is enabled


N5k# show spanning-tree internal info all | begin Ethernet1/1 | inc oper|drop|oper | head line 7
oper_portfast 1 <-----
oper_networkport 0
oper_p2p 1
oper_bpdufilter 0
oper_bpduguard 1 <-----
oper_loopguard 0
bpdufilter_drop_in 0

*Ethernet1/1 on the N5k is operationally portfast and, therefore, BPDU Guard is active.
*The attached device is sending BPDU's but these are ignored. Post Nexus 5600 7.1(0)N1(1a) the BPDU's should trigger BPDU guard.


SW01#show spanning-tree interface tenGigabitEthernet 1/1 detail
Port 1 (TenGigabitEthernet1/1) of VLAN0001 is designated forwarding <---- Note attached port is operationally forwarding.
Port path cost 2, Port priority 128, Port Identifier 128.1.
Designated root has priority 32769, address c471.feb6.f340
Designated bridge has priority 32769, address c471.feb6.f340
Designated port id is 128.1, designated path cost 0
Timers: message age 0, forward delay 0, hold 0
Number of transitions to forwarding state: 1
Link type is point-to-point by default
BPDU: sent 25, received 0 <---------Note sent 25.

Workaround:
Workarounds:
*Enabling BPDU Guard on the interface level will trigger the expected behavior.

Further Problem Description:
Nexus 5600 Post-7.1(0)N1(1a) (N5K-C56128P)

This trigger occurs in a very specific scenario where an attached device has a single native VLAN allowed on the trunk that is the only the allowed VLAN on the sending device (or is misconfigured as an access port on the attached device). This VLAN is not on the allowed VLAN list on the connected Nexus port.

This typically happens when a non-Cisco device such as a blade switch is connected to the Nexus 5600 in a multi-tenant environment where the service provider does not have operational control over the attached device. This can create a loop in the data plane.

Prior to the BPDU enhancements on Nexus 5600 7.1(0)N1(1a) a BPDU received on a non-allowed VLAN was ignored. However on 7.1(0)N1(1a) and later this BPDU should trigger BPDU Guard when it is operationally enabled either globally (and interface is operationally port-fast) or on the port level.

Last Modified:
25-SEP-2015
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases: *
7.1(3)N1(0.642), 7.1(3)N1(1), 7.1(3)ZN(0.50), 7.3(0)N1(0.131), 7.3(0)N1(1), 7.3(0)ZN(0.120)
Alert Type:
New
Bug Id:
CSCur11793
Title:
Host entries for member-links not cleaned up once portchannel is up
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
The port channel member links are shown as data-snooping ports.
However, the baseline behaviour is such that For packets coming in on the PC, the Port-channel should be the only the data snooping port displayed and not its member links.
The issue is that the member links of Port-channel are also reported as associated ports.


Conditions:
This occurs during switch reload, when the member ports come up before the port-channel is applied.



Workaround:
No Workaround






More Info:




Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.349)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur88420
Title:
iplus-408: fabric database host not aged out on vPC pair
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:Fabric database host cleanup may not happen as expected upon aging out the hosts.

Conditions:When both vpc peer has orphan host attached

Workaround:Issue following CLI to clear the host database.
- clear fabric database host


Last Modified:
24-SEP-2015
Known Affected Releases:
7.1(0)N1(0.408)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur11378
Title:
fwm hap reset with %FWM-2-FWM_ASSERT_FAILURE
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
On Nexus 5500 series, Service "fwm" hap reset with %FWM-2-FWM_ASSERT_FAILURE

Conditions:
FWM Crash happens when following sequence of events happen:
1. non-disruptive ISSU performed in VPC pair with all interfaces shut.
2. After ISSU, enable any of core interfaces.
3. Disable the core interface which was enabled in step[2]. Crash will be hit at [3].

Workaround:
Do not shut all interfaces before initiating ISSU.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
6.0(2)N2(4)
Known Fixed Releases:
7.0(1)ZN(0.768), 7.0(6)N1(0.260), 7.0(6)N1(1), 7.1(0)N1(0.1), 7.1(0)N1(0.374), 7.1(0)N1(1), 7.1(0)ZN(0.448), 7.2(0)N1(0.2), 7.2(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuj22176
Title:
traffic loss on vPC trunk with 1K vlans after the reload of vPC+ primary
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
On a Nexus 5000 vPC+ pair, reloading the primary vPC switch causes up to 4-5 seconds of traffic loss during the vPC reconvergence.

Conditions:
Nexus 5000 vPC+ pair is part of a FabricPath domain with 1000 FabricPath vlans configured in the vlan database and 1000 vlans permitted on the vPC trunk allowed vlan list.

Workaround:
Reducing the number of allowed vlan list on the vPC trunk reduces the traffic loss time.

Further Problem Description:
Problem:

MCECM will reinit all vpc's on secondary after reload because the previous_comp_check is failure. This reinit is causing some traffic loss because the remote end may have already started to pump in the traffic when the port are up for the first time.

Fix:

Since MCECM will reinit all vpc's on secondary when they are brought up for the first time after reload, we should fail the first bringup in the bundle_member_bringup sequence before the port is tx & rx enabled if there is a reinit pending. This fix only works for LACP po

Last Modified:
24-SEP-2015
Known Affected Releases:
5.2(1)N1(5), 6.0(2)N1(2a)
Known Fixed Releases:
7.0(1)ZN(0.705), 7.0(1)ZN(0.715), 7.0(1)ZN(0.719), 7.0(6)N1(0.210), 7.0(6)N1(0.218), 7.0(6)N1(0.221), 7.0(6)N1(1), 7.1(0)EVN(0.18), 7.1(0)N1(0.344), 7.1(0)N1(0.358)
Alert Type:
Updated *
Bug Id:
CSCuu14960
Title:
Static MAC configuration only allows +-1000 characters
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Configuration of a static MAC address with a long list of interfaces is cut off after approx. 1000 characters.

Conditions:
This is seen when configuring a long command for a static MAC which lists a lot of interfaces.

Workaround:
There is no known workaround at this time.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.0(6)N1(0.7), 7.1(1)N1(0.8)
Known Fixed Releases:
7.1(3)N1(0.619), 7.1(3)N1(1), 7.1(3)ZN(0.26), 7.3(0)ZN(0.68)
Alert Type:
Updated *
Bug Id:
CSCuq76685
Title:
N5K: slow convergence with lots of VLANs trunked
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
When a vPC port got shut, the time to switchover the path from vPC port to vPC peer-link increases along with the number of configured VLANs on those ports.
The same thing happens when the vPC port becomes UP again.

Conditions:
Example Topology:

[R1]
shut -> / \ <= vPC port
[ N5K-1 ] === [ N5K-2 ] <= vPC peer
|
[R2]

Traffic Flow : R2 -> N5K-1 -> R1

Workaround:
none

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.0(3)N1(0.99)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut46788
Title:
Nexus 5600: Logon prompt not correct when hostname begins with number
Status:
Fixed
Severity:
5 Cosmetic
Description:

Incorrect hostname at logon prompt when it starts with number.

Symptom:
When the hostname of the switch starts with a number, instead of alphabet the login prompt or the prompt after exiting command prompt does not reflect correct switch hostname.

For example-

change the hostname to "1TEST" and exit.

1TEST# exit

User Access Verification
H1-AA06-5672-A login: <------------- This host name was previous hostname starting with alphabet.

Conditions:
When the hostname of the switch starts with a number, instead of alphabet the login prompt or the prompt after exiting command prompt does not reflect correct switch hostname.

Workaround:
None

Further Problem Description:
None

Last Modified:
03-SEP-2015
Known Affected Releases:
7.0(5)N1(1), 7.3(0.28)
Known Fixed Releases: *
7.0(7)N1(1), 7.0(7)ZN(0.108), 7.1(1)ZN(0.107), 7.1(2)N1(0.529), 7.1(2)N1(1), 7.2(0)N1(1), 7.2(1)N1(0.5), 7.2(1)N1(1), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuh47208
Title:
Collect additional FWM debuging outputs
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:This is an enhancement bug to have additional FWM debugging capabilities to troubleshoot MAC sync issues.



Conditions:This DDTS is an enhancement, asking the business unit for help with improving the debugging capabilities with FWM.
Workaround:Not applicable to this DDTS.
More Info:Not applicable to this DDTS.

Last Modified:
24-SEP-2015
Known Affected Releases:
5.2(1)N1(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur23755
Title:
edge-port config does not work w/o mac addr-table loop-detect port-down
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
"mac address-table loop-detect port-down edge-port" does not work until "mac address-table loop-detect port-down" is configured as well.

Conditions:
loop conditions (mac-moves) seen on the host ports and one configures "mac address-table loop-detect port-down edge-port" to shut only the edge port.

Workaround:
Ensure "mac address-table loop-detect port-down" is configured in addition to "mac address-table loop-detect port-down edge-port" for the edge port to be effective.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
6.0(2)N2(5), 7.0(4)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq88206
Title:
Increase FCF MAC Allocation for Nexus 6004 Platform to 48
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Currently the FCF MAC allocation for port-channel on the Nexus 6004 is limited to 16. resulting in an FCoE port-channel not coming up.

Conditions:
AT&T reached this 16 limit resulting in an FCoE port-channel not coming up

Workaround:
No

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
7.0(1)N1(1)
Known Fixed Releases:
7.1(0)EVN(0.18), 7.1(0)N1(0.357), 7.1(0)N1(1), 7.1(0)ZN(0.433), 7.1(2)N1(0.2), 7.1(2)N1(1), 7.2(0)N1(0.2), 7.2(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCur17586
Title:
Add Show Trunk Protocol command to show tech-support output.
Status: *
Other
Severity:
6 Enhancement
Description:

Symptom:
show trunk protocol is not listed in show tech-support output.

Conditions:
issuing show tech-support

Workaround:
issue from CLI
#show trunk protocol

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
7.0(4)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu67165
Title:
pss runtime oifl not showing correct info
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
pss runtime oifl not showing correct info vi command "show platform fwm info pss runtime_oifl".

Conditions:
while running show command.

Workaround:
none.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.3(0)N1(0)
Known Fixed Releases:
7.1(3)N1(0.622), 7.1(3)N1(1), 7.1(3)ZN(0.29), 7.3(0)ZN(0.79)
Alert Type:
New
Bug Id:
CSCuv39838
Title:
CLI to dump all SGs in a system
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
None. This is an enhancement to introduce new CLI.

Conditions:
while running commands. show-tech.

Workaround:
none.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.3(0)N1(0)
Known Fixed Releases:
7.1(3)N1(0.622), 7.1(3)N1(1), 7.1(3)ZN(0.29), 7.3(0)N1(0.75), 7.3(0)N1(1), 7.3(0)ZN(0.73)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论