Cisco Blog » The Platform

2015年10月1日星期四

Cisco Notification Alert -Nexus 7000 Series Switch-01-Oct-2015 16:50 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9.6.2.6a.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s1-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 1 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7000-s2-dk9.6.2.6a.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9.6.2.6a.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
6.2(6a)
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9-npe.6.2.6a.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Alert Type:
Deferral Notice
File Name:
n7700-s2-dk9.6.2.6a.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 6.2(6a)

Deferral Notice Date:
07-SEP-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
Data Center Network Manager
Release Version:
7.2(2)
Alert Type:
New File
File Name:
dcnm-va.7.2.2.iso
File Description:

DCNM 7.2.2 ISO Virtual Appliance for VMWare, KVM and Bare-metal servers

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-san-client.7.2.2.zip
File Description:

DCNM 7.2.2 San Client Package

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va.7.2.2.ova
File Description:

DCNM 7.2.2 Open Virtual Appliance for VMWare

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-silent-installer-properties.7.2.2.zip
File Description:

DCNM 7.2.2 Silent Installer Property Files

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-va-templates.7.2.2.zip
File Description:

DCNM 7.2.2 Virtual Appliance templates for VMWare (.ovf) and KVM (domain XMLs) environments

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-windows.7.2.2.exe
File Description:

DCNM 7.2.2 Installer for Windows (64-bit)

File Release Date:
30-SEP-2015
Alert Type:
New File
File Name:
dcnm-installer-x64-linux.7.2.2.bin
File Description:

DCNM 7.2.2 Installer for Linux (64-bit)

File Release Date:
30-SEP-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCud96571
Title:
pf_dev1 UIT: hmm cpu busy when launch 8 spines+96 leafs with 132 image
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:

Conditions:

Workaround:

Last Modified:
14-SEP-2015
Known Affected Releases:
6.2(0.99)
Known Fixed Releases: *
6.2(0)PF(0.144), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 8.3(0)CV(0.142)
Alert Type:
Updated *
Bug Id:
CSCus66218
Title:
Deleted vlans are still showing in show fabricpath output
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Delete the vlan from the global database, but still it be present in the Fb database.

Conditions:
if the vlan is part of the Port-channel

Workaround:

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
7.2(0)ZN(99.81)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.0(1)ZN(0.744), 7.0(6)N1(0.244), 7.0(6)N1(0.4), 7.0(6)N1(0.5), 7.0(6)N1(1), 7.1(0)AV(0.38), 7.1(0)SIB(99.92), 7.1(1)N1(0.454)
Alert Type:
Updated *
Bug Id:
CSCuh04650
Title:
N7K aclqos service crash causing linecards to stay in powered down state
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
The N7K was operating normally when it unexpectedly wrote out an ACLQOS core which also caused the line cards to go into power down state.

Conditions:
This has been seen on N7K running 5.2(5) code which was previously operating normally.

Workaround:
Not known at this time.

More Info:
To Be Determined (TBD).

Last Modified:
09-SEP-2015
Known Affected Releases:
5.2(5)
Known Fixed Releases: *
5.2(9.192)S0, 6.2(1.156)S0, 6.2(2), 8.3(0)CV(0.134)
Alert Type:
New
Bug Id:
CSCuw13529
Title:
Runts, short packet errors etc not reported by F2e port with CTS config
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Line errors for small packets, runts, align/symbol errors etc are not displayed when a F2e module port is configured with CTS.

Conditions:

Workaround:
none

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
6.2(14)S25
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuo02430
Title:
SSTE: hsrp process crashed with SSO trigger
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
HSRP process on the standby sup becomes unresponsive and eventually crashes with heartbeat timeout when system switchover is performed. HSRP process is then restarted by sysmgr.

Conditions:
HSRP groups are configured on interfaces with invalid VRFs (i.e. where the VRF is shutdown or not defined). Switch is booted up with saved startup config. System switchover is performed.

Workaround:
Ensure VRFs are valid before system switchover, i.e. if the VRF is shutdown then "no shut" the VRF, and if VRF is not defined then define it.

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
6.2(8)S11, 6.2(8)S19, 6.2(8)S9, 7.0(3)I2(0.375)
Known Fixed Releases: *
6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.18), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(3)I2(0.390), 7.0(3)I2(1), 7.0(3)ITI2(1)
Alert Type:
Updated *
Bug Id:
CSCub27429
Title:
N7K snmpwalk OID not increasing for ifTable on some Tunnel interfaces
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
look:~$ snmpwalk -v2c -c public 10.86.206.103 ifName
ifMIB.ifMIBObjects.ifXTable.ifXEntry.ifName.402718720 = Tunnel0
ifMIB.ifMIBObjects.ifXTable.ifXEntry.ifName.402719232 = Tunnel512
ifMIB.ifMIBObjects.ifXTable.ifXEntry.ifName.402718723 = Tunnel3
Error: OID not increasing: ifMIB.ifMIBObjects.ifXTable.ifXEntry.ifName.402719232 >= ifMIB.ifMIBObjects.ifXTable.ifXEntry.ifName.402718723


Conditions:
Config a small tunnel number, big tunnel number interface, then small tunnel number.
e.g. tunnel0, tunnel512, tunnel3

Workaround:
Add -Cc to avoid the warnings
look:~$ snmpwalk -v2c -Cc -c public 10.86.206.103 ifName -Cc

Last Modified:
09-SEP-2015
Known Affected Releases:
5.2(6.16), 6.1(1)S42, 6.2(0.217)
Known Fixed Releases: *
5.2(6.23)S0, 5.2(7), 6.1(1.52)S0, 6.1(1.69), 6.1(2), 6.2(0.226)S0, 6.2(0.285), 6.2(2), 7.1(0)RTG(0.50), 7.1(0)SIB(99.52)
Alert Type:
Updated *
Bug Id:
CSCsq66001
Title:
SNMP:mibwalk not detecting tunnel interface
Status:
Fixed
Severity:
2 Severe
Description:

In SNMP mibwalk tunnel interface is not detected.

Under all conditions


There is no work around for this issue. Issue doesn't have any functional impact.

Last Modified:
09-SEP-2015
Known Affected Releases:
4.0(2)
Known Fixed Releases: *
4.2(0.158), 4.2(1), 5.0(0.129), 5.0(1), 7.1(0)RTG(0.50), 7.1(0)SIB(99.52), 7.1(0)ZD(0.331), 8.3(0)CV(0.134)
Alert Type:
Updated *
Bug Id:
CSCuj17755
Title:
SNMPd process crash
Status: *
Other
Severity:
2 Severe
Description:

Symptom:
the SNMPd process may restart unexpectedly

Conditions:
SNMP active on the switch. The specific conditions are not known at this time. Aggressive snmp polling of the switch and periodically high cpu is observed. The debug info collected is not sufficient to root cause the problem, but it shows several thousand mts messages which were not getting freed.

Workaround:
None at this time.

Further Problem Description:

Last Modified:
09-SEP-2015
Known Affected Releases:
6.1(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut34478
Title:
unicast route for the NVE peer loopback IP is missing on some ASIC inst
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
This issue is specific to Vxlan - Flood and Learn. When the peer LC goes down and it is the only core facing LC on the peer switch, the peer route is not programmed properly on all the instances and hence the traffic fails.

Conditions:
This issue is specific to Vxlan - Flood and Learn.

The peer route must be programmed on the VDC instances. This is achieved through the following two updates -
a. URIB route update for programming the route on core vrf instances.
b. NVE Manager peer add updates for programming the route on the VDC instances.

This issue is observed when the peer LC goes down and it is the only core facing LC on the peer switch. In such a scenario, when OSPF timeouts, URIB triggers an unlearn for the peer route.

However, the MAC Table timeout is longer than the OSPF timeout. Hence, the MAC table still has the Remote host MAC entry - thus the NVE peer is still seen in NVE Manager.

When the peer LC is up again, OSPF sends an update for the peer route. However, NVE manager doesn't resend the peer route update since it already has the peer update. As a result, we end up with the peer route programmed only on the URIB notified VRF instances and not the other instances in the VDC.

Workaround:
clear ip route vrf all
shut / no shut on the nve interface.

Further Problem Description:

Last Modified:
09-SEP-2015
Known Affected Releases:
7.2(0)D1(0.424)
Known Fixed Releases: *
7.2(1)D1(0.75), 7.2(1)ZD(0.67)
Alert Type:
Updated *
Bug Id:
CSCug81339
Title:
Service "Security Daemon" crashes with heartbeat failure
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Security Daemon crashes with heardbeat failure with the following output in logs

%SYSMGR-3-HEARTBEAT_FAILURE: Service "Security Daemon" sent SIGABRT for not setting heartbeat for last 6 periods. Last heartbeat 3
88.97 secs ago.
%SYSMGR-2-SERVICE_CRASHED: Service "Security Daemon" (PID 6144) hasn't caught signal 6 (core will be saved).?

Note, this bug applies to Nexus 1000V switch also for 5.2(1)SM1, and 4.2(1)SV2

Conditions:
No specific conditions, can occurr randomly

Workaround:
Unknown

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases: *
6.2(3), 6.2(8)
Alert Type:
Updated *
Bug Id:
CSCuv40883
Title:
F3 unexpected reload after span session config
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After enable a span session for a Port-channel source in vPC with N77-F348XP-23 physical port in module 1 and destination port in module 6 (both modules N77-F348XP-23) a core crash is created for both modules. they are restored after reload crash reload.

Conditions:
I saw this problem by the very first time during a customer network troubleshooting.

I reproduced problem on CALO with the next conditions:
HW:
1 x N77-SUP2E
2 x N77-F348XP-23
1 x N77-C7706-FAB-2
1 x N77-C7709

2 VDCs were created , 1 for SPINE Fabric Path VDC 1 for LEAF Fabric Path VDC
Problem occurs on LEAF VDC just after we do 'no shut' under the monitor session config mode

problem was reproduced on 6.2(8a) and 6.2(10)

Workaround:

Further Problem Description:
Cores from 6.2(10)
http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437208662_0x102_fln_fwd_usd_log.1178.tar.gz

http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437208661_0x802_fln_fwd_usd_log.1178.tar.gz

Cores from 6.2(8a)
http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437203676_0x102_fln_fwd_usd_log.1160.tar.gz

http://www-tac.cisco.com/Teams/ks/c3/getLargeFile.php?srId=635507347&fileName=1437203675_0x802_fln_fwd_usd_log.1160.tar.gz


|
| Severity: error
| lcfln_n77 - Nexus 7700 platform running 6.2(10)S102 experienced a crash
| at 2015-07-18 08:37:42.
| The decoded stack traces are:
| 0x0ff4a4b0 usd_sse_process_msg
| 0x0ff4a4b0 usd_sse_process_msg ---> usd_sse.c:826
| 0x100673e8 fln_fwd_sse_hdlr ---> fln_fwd_services.c:9067
| 0x0ff5bf48 usd_handle_event ---> usdw_main.c:344
| 0x0ff5c4cc usd_loop ---> usdw_main.c:466

Last Modified:
11-SEP-2015
Known Affected Releases: *
6.2(10), 6.2(12), 6.2(8a)
Known Fixed Releases:
6.2(14)S1, 7.2(1)D1(0.41), 7.2(1)ZD(0.36)
Alert Type:
New
Bug Id:
CSCuv99892
Title:
nvt: Mcast traffic loss on vpc primary on reloading secondary vdc
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
Transient traffic lose experienced

Conditions:
With disruptive network configuration changes, large amount of l2 route will be sent to H/W in very short time. If the same route is sent back-to-back repeatedly with different information, h/w state might not be able to keep up the change,

Workaround(s): None.

Workaround:

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
7.2(1)D1(0.49)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuc23279
Title:
SYSTEST:FCoE:core detected due to hwclock crash on standby sup
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Core detected due to hwclock crash on standby sup.

Conditions:
None

Workaround(s):

No impact reported.

Workaround:

Further Problem Description:

Last Modified:
14-SEP-2015
Known Affected Releases:
6.1(2), 6.1(2)S11, 6.1(2)S41, 6.1(4a)S14, 6.2(1.42), 6.2(1.59)S2, 6.2(1.59)S5, 6.2(1.69), 6.2(1.69)S5, 6.2(1.83)S5
Known Fixed Releases:
6.1(4.97)S0, 6.1(5.9)S0, 6.2(0.304), 6.2(1.72)S0, 6.2(1.84)S0, 6.2(2), 7.0(0.7), 7.1(0)D1(0.14)
Alert Type:
New
Bug Id:
CSCuw23407
Title:
iftmc cores at at iftmc_pd_verify while reapply of pvlan communityconf
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
iftmc cores at at iftmc_pd_verify while reapply of pvlan communityconf

Conditions:
iftmc cores at at iftmc_pd_verify while reapply of pvlan communityconf

Workaround:
iftmc cores at at iftmc_pd_verify while reapply of pvlan communityconf

Further Problem Description:
iftmc cores at at iftmc_pd_verify while reapply of pvlan communityconf

Last Modified:
14-SEP-2015
Known Affected Releases:
7.2(1)D1(0.57)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCud14484
Title:
BGP crash with 1K EBGP , with multi dimensional scale
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

Conditions:

Workaround:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.2(0.257)
Known Fixed Releases: *
6.2(0.287)S0, 6.2(2), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCug88160
Title:
Vinci MT-FULL: topo/vni notification not sent to ISIS
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
DATA-UP is not sent to ISSI by RTM.

Conditions:

Workaround:
Use "fabricpath isis data-up"

More Info:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.2(0)PF(0.210)
Known Fixed Releases: *
6.0(2)N3(1), 7.0(0)BNZ(0.23), 7.0(0)ZD(0.7), 7.0(1)N1(0.47), 7.0(1)N1(1), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCur03059
Title:
VPC+ peer link not part of a topology
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
While configuring VPC+ with 8 topologies, we observe that the peer link is not included as part of one of the topologies.

Conditions:
Configure topologies while the switch is in transient busy state.

Workaround:
Repeat the same topology config

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.2(10)S68
Known Fixed Releases: *
6.2(10), 6.2(10)S91, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.357), 7.1(0)AV(0.38), 7.1(0)D1(0.332), 7.1(0)OTT(0.47), 7.1(0)PDB(0.283), 7.1(0)SIB(99.68)
Alert Type:
Updated *
Bug Id:
CSCum13338
Title:
SSTE: L3VM Hap-Reset on Leaf
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
.

Conditions:
.

Workaround:
.

Further Problem Description:
.

Last Modified:
16-SEP-2015
Known Affected Releases:
6.0(2)N3(1), 7.0(1)ZN(0.35)
Known Fixed Releases: *
7.0(0)BNZ(0.23), 7.0(0)FVX(0.109), 7.0(0)N1(0.452), 7.0(0)N1(1), 7.0(0)ZD(0.190), 7.0(0)ZN(0.165), 7.1(0)D1(0.104), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.60)
Alert Type:
Updated *
Bug Id:
CSCue28836
Title:
Interface down (VRF Unusable)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
interface become vrf-unusable.

Conditions:
Do switchover immediately after module reload.

Workaround:
Do not do switchover immediately after module reload.

Last Modified:
16-SEP-2015
Known Affected Releases:
6.1(3)S41
Known Fixed Releases: *
6.2(1.69)S0, 6.2(2), 7.0(0.7), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCud45447
Title:
Freetown:Service"ldp" is cored
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

Service "ldp"is cored .
Conditions:
LDP service is cored.
Workaround:
NA

Last Modified:
16-SEP-2015
Known Affected Releases: *
6.2(0.284)S8, 6.2(0.304), 6.2(0.304)S12, 6.2(0.304)S16, 6.2(1.5)S2
Known Fixed Releases: *
6.2(1.7)S0, 6.2(2), 7.0(0.5), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCul87609
Title:
I:392:FP non-default topo doesn't works after ISSU downgrade I to H+
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
I:392:FP non-default topo doesn't works after ISSU downgrade I to H+

Conditions:

Workaround:

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases: *
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)N1(0.433), 7.0(0)N1(1), 7.0(0)ZD(0.183), 7.0(0)ZN(0.150), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCul78703
Title:
i-379: l3vm hap reset
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
i-379: l3vm hap reset

Conditions:

Workaround:

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases: *
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)N1(0.399), 7.0(0)N1(1), 7.0(0)ZD(0.172), 7.0(0)ZN(0.124), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCup77035
Title:
[GBR performance] ospf process command execution takes huge time
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With GBR release 179, 193 and within vdc scale

Conditions:
scaled vdc

Workaround:
Unknown still

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
7.1(0)D1(0.179), 7.1(0)D1(0.188), 7.1(0)D1(0.196)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.232), 7.1(0)N1(0.287), 7.1(0)N1(0.288), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)RTG(0.22)
Alert Type:
Updated *
Bug Id:
CSCuv50831
Title:
BGP is installing route with AD 255 in URIB
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Routes with an AD of 255 are permitted for redistribution.

Conditions:
When using the [distance # # #] command for BGP to set summarized/local routes to an administrative distance of 255. The summary routes remain in the routing table, but marked with an AD of 255 from its default of 220 and also permitted to be redistributed into other protocols.


10.10.0.0/16, ubest/mbest: 1/0
*via Null0, [255/0], 00:00:11, bgp-65545, discard, tag 65012 ---------------->Route remained in routing table but AD did adjust to 255.
r12.7k-VDC3(config-router-af)#


############Redistributing BGP into OSPF############################
##Route shouldn't be redistributed as it is within the RIB with an AD of 255.
version 6.2(12)

feature ospf

router ospf 1
router-id 172.16.0.1
redistribute bgp 65545 route-map test ----------------------->Sending route to OSPF

ip prefix-list bgp seq 5 permit 0.0.0.0/0 le 32
route-map test permit 10
match ip address prefix-list bgp


r12.7k(config)# sho ip ospf database | b Ex
Type-5 AS External Link States

Link ID ADV Router Age Seq# Checksum Tag
0.0.0.0 172.16.0.1 14 0x80000002 0xea3c 65005
10.10.0.0 172.16.0.1 14 0x80000002 0x50cd 65012 ---------->Summary is installed within OSPF database and advertised to OSPF peers. Which shouldn't happen as AD is 255

Workaround:

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
5.1(4), 6.2(12)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66)
Alert Type:
Updated *
Bug Id:
CSCus97380
Title:
plcmgr crash during OpenFlow extended sanity
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Crash in plcmgr.

Conditions:
Occurs sometimes during addition of OpenFlow matches to end of policy.

Workaround:
None known.

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.2(0)D1(0.402)
Known Fixed Releases: *
7.1(0)ES(0.5), 7.3(0)D1(0.86), 7.3(0)DHB(0.32), 7.3(0)EG(0.3), 7.3(0)OTT(0.37), 7.3(0)PDB(0.57)
Alert Type:
Updated *
Bug Id:
CSCuo86388
Title:
NXOS-VPC-VPLS Scale-after Core LC OIR,subset of PW Remain in Down state
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In a setup with scaled VFI's & PW's, some PW's may not come up.

Conditions:
Line Card OIR

Workaround:
clear l2vpn service all

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.1(0)ZD(0.181)
Known Fixed Releases: *
15.4(3)M2.1, 15.4(3)M3, 15.4(3)M3.1, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.8, 15.5(1)S, 15.5(1)SN
Alert Type:
Updated *
Bug Id:
CSCuv37216
Title:
Callhome messages via HTTP transport is not sent due to L3VM error
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Callhome messages vis HTTP transport not sent due to l3vm_get_context_id failing.

Conditions:
Try sending any call home message thru http transport.

Workaround(s):
None.

Workaround:
None.

Further Problem Description:
None.

Last Modified:
18-SEP-2015
Known Affected Releases:
7.3(0)SLN(0.28)
Known Fixed Releases: *
7.3(0)D1(0.98), 7.3(0)PDB(0.57), 7.3(0)SL(0.109), 7.3(0)SL(0.85)
Alert Type:
Updated *
Bug Id:
CSCuu09287
Title:
SSTE: pixm critical message on 'no feature-set fabric'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
error message seen when no feature-set fabric is issued.

Conditions:
configure several feature sets and multiple VDCs.

Workaround:
none

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases: *
7.2(1)D1(0.51), 7.2(1)N1(0.283), 7.2(1)N1(1), 7.2(1)ZD(0.45), 7.2(1)ZN(0.47), 7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.53)
Alert Type:
Updated *
Bug Id:
CSCus96272
Title:
pvlan Channel-group members add/remove fails .
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
pvlan Channel-group members add/remove fails .

Conditions:
pvlan Channel-group members add/remove fails .

Workaround:
pvlan Channel-group members add/remove fails .

Further Problem Description:
pvlan Channel-group members add/remove fails .

Last Modified:
23-SEP-2015
Known Affected Releases:
7.2(0.8)
Known Fixed Releases: *
6.2(13.6)S0, 6.2(14), 7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.469), 7.2(0)D1(1), 7.2(0)PDB(0.390), 7.2(0)VZD(0.26)
Alert Type:
Updated *
Bug Id:
CSCut08818
Title:
SNMPD crashes with role with only deny OIDs
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
If the SNMP community name is associated with a role which has only a deny OID will cause SMNP to unexpectedly write out a core file when polled with a SNMP bulk request. If multiple SNMP crashes occur then the SUP will switchover and the SNMP configuration will be lost.

Conditions:
The N7K is configured with SNMP and a role which only denies OIDs.

Workaround:
For the configured role add in a permit OID.

Further Problem Description:

Last Modified:
23-SEP-2015
Known Affected Releases:
6.2(10), 6.2(12), 6.2(8a), 6.2(9a)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.63), 7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.1(2)N1(0.548), 7.1(2)N1(1), 7.1(2)ZD(0.6)
Alert Type:
Updated *
Bug Id:
CSCup22563
Title:
Vulnerabilities in OpenSSL: LDAP over SSL
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The following Cisco products

Cisco Nexus 7000 series switches
Cisco MDS 9000 series switches

running software versions:
7.1(0), 6.2(8), 6.2(7), 5.2(8d)

are affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-0076 - Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
CVE-2014-0195 - DTLS invalid fragment vulnerability
CVE-2014-0221 - DTLS recursion flaw
CVE-2014-0224 - SSL/TLS MITM vulnerability
CVE-2014-3470 - Anonymous ECDH denial of service

This bug has been opened to address the potential impact on this product. The above list of versions are not exhaustive.

Conditions:
Devices using LDAP in SSL mode, say, the ones with the following command may be vulnerable:

ldap-server host {ipv4-address | ipv6-address | host-name} [enable-ssl]

All versions prior to the first fixed version of a train are affected by one or more of the above CVE's.

Workaround:
Not available. Either a patch has to be applied or the entire package has to be upgraded.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 10/9.5:

https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Last Modified:
24-SEP-2015
Known Affected Releases:
5.2(8d), 6.2(7), 6.2(8)
Known Fixed Releases: *
5.2(8e), 5.2(8e)S4, 6.2(10), 6.2(10)S79, 6.2(10)S80, 6.2(10.16)S0, 6.2(12)BFP(0.8), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97)
Alert Type:
Updated *
Bug Id:
CSCus42713
Title:
2014 and 2015 OpenSSL Vulnerabilities
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Cisco NX-OS (Covering Nexus 5K, N6K and N7K and Cisco MDS) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE)
IDs:

CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275,
CVE-2015-0204, CVE-2015-0205, CVE-2015-0206

This bug has been opened to address the potential impact on this product.

Conditions:This device has a vulnerable version of OpenSSL, this bug is being used to update the OpenSSL package used on the product.


Product doesn't support DTLS so is not affected by either:
CVE-2014-3571
CVE-2015-0206

The LDAP SSL authentication feature may be configured to use OpenSSL. This feature is disabled by default. Hence, this vulnerability only exists if the LDAP SSL Authentication feature is enabled.

Workaround:1. Nexus 5000 (N5K) : The following features can use SSL and would need to
be disabled.

a) Avoid any "fabric database" configuration with keyword "enable-ssl".

For example:
fabric database type network
server protocol ldap ip 172.29.21.2 enable-ssl
b) Make sure the 'secure LDAP' option is unchecked when defining POAP
template on DCNM.
c) Do not use Cisco's One Platform Kit (OnePK) with the transport type tls
..." open.
d) Remove the VM Tracker Configuration.

2. Nexus 7000 (N7K) : The LDAP feature uses Open SSL. To disable the LDAP
SSL Authentication feature. LDAP can be disabled or used without SSL
Authentication.

More Info:PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.6

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from
multiple sources. This includes the CVSS score assigned by the third-party
vendor when available. The CVSS score assigned may not reflect the actual
impact on the Cisco Product.

Additional information on Ciscos security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Last Modified:
24-SEP-2015
Known Affected Releases:
5.2(8f), 6.2(10), 6.2(11), 6.2(7), 6.2(8)S3, 6.2(8a), 7.2(0)VX(0.9), 7.2(0.1)PR(0.1), 7.3(0.9), 9.9(0)XS(0.1)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.52), 7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25)
Alert Type:
Updated *
Bug Id:
CSCui61230
Title:
after reloading box when new pw is added under vfi it stays down
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When a new PW is added under vfi context, it does not come UP

Conditions:
Seen for manual PWs (i.e config of the type "member 1.2.3.4 encapsulation mpls" under the vpls context)

Workaround:
"clear l2vpn service vfi name ", or deleting and reconfiguring the PW fixes the issue.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
6.2(2)S33
Known Fixed Releases: *
15.3(3)M1.5, 15.3(3)M2, 15.3(3)S0.4, 15.3(3)S1, 15.3(3)S2, 15.4(0.12.6)PIH23, 15.4(0.19)S, 15.4(0.20)PI24d, 15.4(0.22)T, 15.4(0.22.1)PIH23
Alert Type:
Updated *
Bug Id:
CSCuu63346
Title:
vPC leg no BD after multiple link flaps
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vPC leg (on one side) ended up without BD after a particular sequence of link flap. The other side, vPC leg is in STP BLK state.

vPC status
---------------------------------------------------------------------
id Port Status Consistency Active VLANs Active BDs
----- ------------ ------ ----------- ---------------- --------------
100 Po100 up success - - <<< No BD
200 Po200 up success - 100-107
A#

Conditions:
Happens with below particular sequence:

vPC Peerlink down -> A vPC leg(100) down -> vPc peerlink up -> A vPC leg(100)up

Workaround:
The sequence of recovery steps that will avoid the system coming into this unrecoverable bad state is to bring up the primary vpc leg up first followed by the peer link. This will ensure consistency and correctness in the final state.

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases: *
7.2(1)D1(0.44), 7.2(1)ZD(0.38), 7.3(0)D1(0.45), 7.3(0)D1(0.64), 7.3(0)D1(0.73), 7.3(0)D1(1A), 7.3(0)EG(0.3), 7.3(0)IB(0.67), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30)
Alert Type:
Updated *
Bug Id:
CSCus93974
Title:
NVE peer is not learned later, if the NVE peer delete happens LC ISSU
Status:
Open
Severity:
2 Severe
Description:

This defect is not applicable to current GBR release since vxlan configs were not a part of the previous release which is freetown. Hence there is no issue on issu.

Symptom:
There exists an issue with vxlan peer learning on ISSU from gbr to gbr upgrade. When a line card upgrade is in progress and the SUP is already up and ready to learn peers, line card components reject a peer-add and we end up having inconsistent peer information in PI components and line card which causes an issue when the peer needs to be re-learned.

This issue is not currently applicable to gbr since freetown -> gbr ISSU will not suffer from this because vxlan wil be first introduced in gbr.

Conditions:
Occurs only during ISSU.

Workaround:

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
7.2(0)D1(0.392)
Known Fixed Releases: *
7.3(0)D1(0.99), 7.3(0)IB(0.72), 7.3(0)N1(0.136), 7.3(0)N1(1), 7.3(0)ZD(0.113), 7.3(0)ZN(0.124)
Alert Type:
Updated *
Bug Id:
CSCut84904
Title:
Process "mtm" Cores on F3 Cards Shortly After Boot
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Repeated "mtm" cores on an F3 linecard

Conditions:
The issue is not specific to any line card type.
The issue happens in a vpc complex, when one Peer has a version >= 6.2.10 and the other peer has a version < 6.2.10
If port-security with aging time is configured on a vpc leg, then the issue could be seen.
The issue is also seen if port-security with aging time is configured on an orphan port

Workaround:
None.

Further Problem Description:

Last Modified:
27-SEP-2015
Known Affected Releases:
6.2(10), 6.2(10)S1
Known Fixed Releases: *
6.2(14), 6.2(14)S2, 7.2(1)D1(0.66), 7.2(1)ZD(0.58)
Alert Type:
Updated *
Bug Id:
CSCuw39946
Title: *
MAC learnt on non existent F2e port
Status:
Open
Severity:
2 Severe
Description:

Symptom:
MAC address learnt on a non existent port

Conditions:
Seen when a loop occurs and multiple mac flaps were seen. While this happens, if the port-channel is deleted, the process responsible for mac learning still believes the interface exist

Workaround:
create the port-channel again and issue clear mac address-table and then delete the port-channel

Further Problem Description:

Last Modified:
27-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur57124
Title:
can not ping OTV extended VLAN SVI although OTV adjcancy is UP
Status: *
Terminated
Severity:
2 Severe
Description:

Symptom:
OTV Adjacency is up but can not ping between extended VLAN SVI

Conditions:
N/A

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
28-SEP-2015
Known Affected Releases:
6.2(10)VIK(0.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw18366
Title:
OTV core while bringing up 42+ OTV adjacency
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OTV process crash.

Conditions:
While add more than 42 OTV adjacency are added for on N7k.

Workaround:
None

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(12)S33
Known Fixed Releases: *
7.3(0)RTG(0.80)
Alert Type:
Updated *
Bug Id:
CSCuv90456
Title:
pimxc timeout happening on removing VSI channel-group
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
pixm timeout syslog when the VSI channel group is removed in an auto config setup

Conditions:
this doesn't happen always. has been seen rarely only in scale scenarios when close to 500 profiles are deleted at the same time

Workaround:
VSI port channel deletion can be re-attempted

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
7.3(0)D1(1A)
Known Fixed Releases: *
7.3(0)D1(0.107), 7.3(0)PDB(0.43)
Alert Type:
Updated *
Bug Id:
CSCup05138
Title:
CPU generated traffic being sent to DEST INDEX:0 and dropped after ISSU
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
CPU generated traffic such as HSRP and ARP getting dropped and not making to the forwarding egress line card.

When capturing the HSRP or ARP packets via ethanalyzer, we can see it is has set the NXOS DEST INDEX: 0 as follows.

METMXC2(config)# ethanalyzer local interface inband decode-internal capture-fi "host 10.47.25.4 and host 224.0.0.102" det Capturing on inband NXOS Protocol
NXOS VLAN: 247
NXOS SOURCE INDEX: 1054
NXOS DEST INDEX: 0

Conditions:
HSRP state is Unknown and ARP is incomplete .

Workaround:
In order to resolve the issue, we needed to remove the vlan from the configuration and re-configure it only for the affected vlans.

no vlan X

vlan x

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(10), 6.2(6a)
Known Fixed Releases: *
6.2(10)S18, 6.2(10)S94, 6.2(10.16)S0, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.238), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.173), 7.2(1)D1(0.95)
Alert Type:
Updated *
Bug Id:
CSCuw16411
Title:
HSRP state Active/Active after removing Anycast
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Nexus 5600 VPC+ peers will show Active/unknown for HSRP Active/standby states on both peers

N5k-1# sh hsrp br
*:IPv6 group #:group belongs to a bundle
P indicates configured to preempt.
|
Interface Grp Prio P State Active addr Standby addr Group addr
# Vlan10 10 100 Active local 10.10.10.67 10.10.10.1 (conf)
Vlan20 2 100 Active local unknown 20.20.20.1 (conf) <<<<<<<<<<

Conditions:
Rolling back from HSRP Anycast to legacy HSRP on VPC+ peers. Seen only under following conditions

1)Bug is only seen if hsrp anycast <> ipv4 is configured and subsequently removed.
2)In addition ,one SVI on one vPC peer has to be shut after removing anycast configuration
2)Bug is not seen with same steps if "hsrp anycast <> both? is configured
3)Even if bug is seen, configuration for the group/vlan can be changed to "hsrp anycast <> both? and migrated to legacy HSRP without hitting the problem.
4)Problem not seen after migrating to legacy HSRP

Workaround:
Change HSRP anycast configuration to include both IPv6 and IPv4 using command hsrp anycast <> both and then remove the anycast configuration.

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
7.0(7)ZN(0.215)
Known Fixed Releases: *
7.3(0)D1(0.112), 7.3(0)N1(0.150), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuu84449
Title:
IGMP snooping entries ageout in AA FEX topologies
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IGMP snooping entries are expiring after 5 seconds on one of the two vPC switches, while the entries are stable on the other vPC switch, which might cause traffic loss for 15-16 seconds (depending on the port-channel hashing result).

Conditions:
Issue can be seen in a vPC topology with AA FEX without having configured the IGMP snooping switch-querier (under "vlan configuration XYZ"), but when having PIM enabled SVI interfaces.

Workaround:
Configure IGMP snooping querier under the "vlan configuration XYZ" configuration mode.

or

Configure "ip igmp query-interval 30" under the SVI configuration mode.

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.1(0)N1
Known Fixed Releases: *
7.2(1)D1(0.7), 7.2(1)N1(0.240), 7.2(1)N1(1), 7.2(1)ZD(0.6), 7.2(1)ZN(0.6), 7.3(0)D1(0.72), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.27)
Alert Type:
Updated *
Bug Id:
CSCuw03410
Title:
Nexus 6.2.x OSPF taking long time in LSA generation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
- Customer reported that there was a delay in LSA generation.
- The cost was increased at 03:42:36 but the LSA was generated at 03:43:20 which caused an impact for the customer as all the traffic moved to this router and cause congestion on the port-channel causing an impact for nearly 45 seconds.
- The first LSA was generated at the same time for the first port-channel but for the next 3 port-channels it throttled and took over 40+ seconds

Conditions:
> Info:

1. OSPF maintains a wheel with 600 slots in which LSAs will be inserted if they are to be generated and also tracks the current slot which is being processed. Lets say an LSA is to be generated after 100 msec, then it will be inserted in (current + 2) slot (1 slot equals 50 msec).
2. There is a common throttle timer which fires every 50 msec and increments the current slot. This is done by timer thread.
3. The flooding thread picks the LSA's from the current slot and generates the LSA's. Both these happen independently.

> Sequence of steps leading to problem:

In the customer's case, an LSA was to be generated after 5000 msec and hence was inserted at (current + 100) slot. Looks like the timer thread incremented the current slot before the flooding thread could process the LSA's in current slot.
This could happen if the order of thread execution is:

Lets say that the current slot is 199 and there is an LSA at 200.
Timer thread executes and increments current slot to 200.
Scheduler schedules some other OSPF thread for the next 50 msec or more. This means the throttle timer would have fired.
Scheduler schedules timer thread which will increment the current slot to 201.

Now, OSPF will have to wait for the current slot to reach 600, then cycle back, and then from 1 to 200 again. This will take 50 * 600 = 30000 msec or 30 sec.

Workaround:
Though the issue is timing related, using interface range command seems to not lead to the problem.

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(12)E6, 6.2(14.3)S0, 7.0(3)I2(1.19), 7.0(3)I2(2), 7.2(1)D1(0.79), 7.2(1)N1(0.307), 7.2(1)N1(1), 7.2(1)ZD(0.71), 7.2(1)ZN(0.70), 7.3(0)D1(0.96)
Alert Type:
Updated *
Bug Id:
CSCtu28085
Title: *
M1 Line Card: MAC Moves Cause Out-of-Sync Forwarding Engine
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Following a MAC Flap, the hardware MAC address table may not have the same consistent entry across all the forwarding engines (FEs)

Conditions:
Issue is seen on M1 modules

Rapid mac move that happen between two FEs and there is a Flood to bd / flood to fabric miss in hardware

Workaround:
Clearing the affected mac address from the L2 table will restore connectivity (address will be learned on the correct interface).

clear mac address-table dynamic [address

]

Further Problem Description:
Fix is present in 5.2(4), 6.1(1), and later.

Refer to CSCud01394 for fix to F modules for the same issue.

Last Modified:
01-SEP-2015
Known Affected Releases: *
5.2(3a), 6.0(4)
Known Fixed Releases: *
5.2(3.59)S0, 5.2(4)
Alert Type:
New
Bug Id:
CSCuw10951
Title:
NXOS/F3: Multicast convergence improvement
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Slow multicast convergence on F3 cards during RPF/OIF changes in high scale scenario

Conditions:
It happen only in high scale 20+ S,G routes

Workaround:
none

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuj54486
Title:
multicast packets drop for certain flows after fex reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
multicast packets drop for certain flows after fex reload

Current set of m2rib logs seem to be indicating that IGMP did not clean up Ethernet107/1/42 OIF, when IGMP received IM delete for Ethernet107/1/42 . Later that IOD was assigned to Eth101/1/42. Since IGMP already had iod 1366, it would have considered that it had already sent update to m2rib. That would have resulted the OIF mismatch in this case.

Conditions:
I am running fex reload 8 hr script and after fexes are reloaded certain flow groups are dropped.

Workaround:
no

Further Problem Description:

Last Modified:
02-SEP-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(2)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.257), 7.1(0)N1(0.319), 7.1(0)N1(1), 7.1(0)OTT(0.34), 7.1(0)PDB(0.205), 7.1(0)SIB(99.24), 7.1(0)ZD(0.305)
Alert Type:
Updated *
Bug Id:
CSCuv34380
Title:
vPC switch keeps sending (S, G) joins even after (*, G) entry gone.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PIM (S, G) joins are sent upstream even when corrosponding (*, G) entry has expired.

Conditions:
vpc-peers with "ip pim pre-built spt" configured. Active source but receivers are expired.

Workaround:
clear ip mroute will remove the unwanted (S, G) entry.

Further Problem Description:

Last Modified:
02-SEP-2015
Known Affected Releases:
7.2(0)ZD(0.99)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)DHB(0.31), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.43), 7.3(0)ZD(0.85), 7.3(0)ZN(0.92)
Alert Type:
New
Bug Id:
CSCur59789
Title:
while configuring vrf Unrecognized IP message minor type 33
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
while configuring vrf Unrecognized IP message minor type 33

Conditions:
This failure message is seen by every DFA customer when they deploy a new VRF via auto-config.

Workaround:

Further Problem Description:

Last Modified:
02-SEP-2015
Known Affected Releases:
7.1(0)D1(0.299), 7.1(0)N1
Known Fixed Releases:
7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(122), 7.1(0)SIB(99.109), 7.1(1)N1(0.500), 7.1(1)N1(1), 7.1(1)ZD(0.31), 7.1(1)ZN(0.54), 7.2(0)AB(9), 7.2(0)BA(0.12)
Alert Type:
Updated *
Bug Id:
CSCuv69813
Title:
En/Dis LLDP cause "Error in sending MTS message to dcx: (Broken pipe)"
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
with a few back to back changes on
1) "no feature lldp"
2) "feature lldp"
3) "no feature lldp"
4) "feature lldp"
5) "no feature lldp"
6) "feature lldp"

and large number of active ports (tried with 768) following message can be seen
VDC-1 %$ %IPQOSMGR-2-QOSMGR_MTS_FAILURE: Failed to do MTS operation: Error in sending MTS message to dcx: (Broken pipe)

Conditions:
Large number of active ports
back to back change of LLDP feature

Workaround:

Further Problem Description:
Message is harmless

Last Modified:
02-SEP-2015
Known Affected Releases:
6.2(14)S4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum10680
Title:
BUG0438791:Wrong next hop for APBR entry, next hop is NSIP instead SNIP
Status: *
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Some APBR entries next hop is NSIP instead SNIP in show rise output

Conditions:
This happens when default route is define is NS IP sub net. When specific route to realer server subnet is removed, NetScaler use default route to reach realer server and install APBR entry with NS IP address as next hop. This is an issue when NetScaler is configured in HA pair, since NS IP is unique to each NetScaler

Workaround:
Not to configure default gateway address in NS IP subnet , In future NS release APBR entry with next hop as NS IP address will be prevented

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
6.2(6)S4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu99291
Title:
Cisco Nexus 7000 VDC Authenticated Privilege Escalation Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A vulnerability in Command Line Interface (CLI) parser of the Cisco Nexus Operating
System (NX-OS) devices could allow an authenticated, local attacker to perform a
privilege escalation at the CLI.

The vulnerability is due to improper input validation of special characters within
filenames. An attacker could exploit this vulnerability by authenticating at the local
shell and writing a file to disk with certain special characters. The attacker could then
use that file with other CLI commands to obtain an shell prompt at their current
privilege level. An exploit could allowthe attacker to read/write files and perform
other privileged commands.

Conditions:
Device running with default configuration running an affected version of
software.

Workaround:
The user has to be authenticated so use care when distributing ''admin''
credentials to only trusted sources.

Further Problem Description:
Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.3/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2015-4237 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
03-SEP-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(13.4)S0, 7.2(1)D1(0.51), 7.2(1)ZD(0.45)
Alert Type:
New
Bug Id:
CSCur86210
Title:
Iplus: motd banner not displayed upon login..
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MOTD banner is not printed upon login

Conditions:
After the reload banner is not working.

Workaround:
No

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
7.1(0)N1(0.413)
Known Fixed Releases:
7.1(0)N1(0.415), 7.1(0)N1(1), 7.1(0)ZN(0.490), 7.1(1)N1(0.34), 7.1(1)N1(1), 7.2(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuu76369
Title:
Random characters in show ip igmp policy statistics reports vlan
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Random characters are observed in the output of 'show ip igmp policy statistics vlan <>
Nexus9k# show ip igmp policy statistics reports vlan 100
Interface \6?? doesn't exist
Nexus 9k# show ip igmp policy statistics reports vlan 100
Interface tN?? doesn't exist

Conditions:
If a SVI is not deployed on Nexus 9k and , show ip igmp policy statistics reports vlan <> is executed for the VLAN ,

Workaround:
None

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.20), 7.3(0)ZD(0.85), 7.3(0)ZN(0.92)
Alert Type:
Updated *
Bug Id:
CSCuu11282
Title:
N7k: ITD probe with frequency config less than 5s seconds reverts to 60s
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ITD probes are only sent every 60 seconds when probe frequency is configured less than 5 seconds

Conditions:
ITD probe configured on Nexus 7000 running 6.2(10)

Workaround:
Configure probe frequency with at least 5 seconds frequency

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14)FB(0.52), 7.2(0)D1(1), 7.2(0)D1(1.8), 7.2(0)ZD(0.216), 7.2(1)PIB(0.14), 7.3(0)D1(0.69), 7.3(0)DHB(0.31), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30)
Alert Type:
Updated *
Bug Id:
CSCuu66267
Title:
LISP: implicit iid 0 does not get assigned with proxy-itr configuration
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
LISP traffic encapsulated with no Instance-ID may fail to be forwarded on the eTR/PeTR

Conditions:
The problem depends on configuration sequence and timing, i.e. is a race condition.

Workaround:
Configure explicitly "lisp instance-id 0" in the VRF that receives LISP-encapsulated packet with no Instance-ID

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.2(0.70), 7.3(0)ZD(0.10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)DHB(0.31), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.21), 7.3(0)ZD(0.85), 7.3(0)ZN(0.92)
Alert Type:
Updated *
Bug Id:
CSCuu36071
Title:
Packets encaped with wrong VNI after addition of new link to Peerlink PC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Receivers at remote vxlan L2 gateway may experience traffic lose. This is because the packets at vPC L3 gateway is encapped with wrong VNI value. This can be confirmed by examine the VNI field of the vxlan encapped packet received at remote L2 gateway.

Conditions:
The condition to hit the issue is to configure new vPC peer-link in a new hardware instance. This may cause timing issue when program the encap route in the new peer-link instance.

Workaround:
unconfig, then reconfig the multicast encap for this bridge-domain under nve interface will clear the wrong encap route and reprogram with correct information.

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.2(0)D1(0.490), 7.2(0)VZD(0.33)
Known Fixed Releases: *
7.1(0)ES(0.24), 7.2(1)D1(0.36), 7.2(1)ZD(0.31), 7.3(0)D1(0.34), 7.3(0)D1(0.45), 7.3(0)D1(0.52), 7.3(0)D1(0.53), 7.3(0)DHB(0.14), 7.3(0)HM(0.47), 7.3(0)IB(0.35)
Alert Type:
Updated *
Bug Id:
CSCuu39555
Title:
Sometimes few HSRPVIP removed ISSU 6.0.2.N2(7)>7.0.6.N1(1)>7.2.0.N1(1)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IP address with be removed after we do ISSU from "H+MR6 [6.0(2)N2(7)] to IMR5[7.0(6)N1(1)] then to JJ[7.2(0)N1(1)]"

Conditions:
Need to perform 2step ISSU from H+MR6 [6.0(2)N2(7)] to IMR5[7.0(6)N1(1)] then to JJ[7.2(0)N1(1)] with virtual ip configured in HSRP.
After doing ISSU from H+MR6 to IMR5 ISSU will succeed, then when we do ISSU from IMR5 to JJ, will get below error

<<<%NETSTACK-2-CRIT_FAILURE: netstack [4007] Failed to configure IP address on Vlan834. IP address overlaps with one of the address configured on Vlan833. Vlan834 has been shutdown.Please change the IP address to avoid overlap and perform a "no shutdown">>>
and ip address will be removed on the vlan or vlan interface will be shutdown.

Workaround:
Need to reconfigure the ip address after correcting the network mask of HSRP ip in the vlan.

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.2(0)N1(0.206)
Known Fixed Releases: *
7.0(0)FHS(0.23), 7.3(0)D1(0.45), 7.3(0)DHB(0.14), 7.3(0)HM(0.47), 7.3(0)IB(0.35), 7.3(0)MMD(0.9), 7.3(0)N1(0.61), 7.3(0)N1(1), 7.3(0)OTT(0.14), 7.3(0)PDB(0.15)
Alert Type:
Updated *
Bug Id:
CSCuu06829
Title:
SUP switchover causes duplicate connection on switchover device
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On sup switchover or BGP process restart, duplicate connection request error is seen on switchover device.

Conditions:
1. Multiple sessions between switchover peer and helper peer.
2. High route scale


Workaround(s):


Workaround:
If multiple sessions are to be run between two boxes, configure one peer to be a passive listener always.

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
5.2(5), 7.0(3)I1(1.206), 7.0(3)I1(1.233)
Known Fixed Releases: *
7.0(3)I2(0.365), 7.0(3)I2(0.367), 7.0(3)I2(0.381), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.72)
Alert Type:
Updated *
Bug Id:
CSCuu22255
Title:
LL shouldn't be installed in u6rib by ospfv3
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
from "show routing ipv6 internal event-history general" we see there were some link local prefixes been advertised by ospfv3

Conditions:

Workaround:

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
6.2(0.304)S10, 6.2(12)
Known Fixed Releases: *
7.0(3)I2(0.469), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.15), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.3(0)IB(0.12), 8.3(0)CV(0.123)
Alert Type:
Updated *
Bug Id:
CSCut98635
Title:
Eigrp Traceback @ dual_unstick_dndb on Sochi Tor on bootup
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
EIGRP internal errors seen

Conditions:

Workaround:
No functionality impact, just a warning message

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
7.0(3)I1(1.205)
Known Fixed Releases: *
7.0(3)I2(0.406), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.72)
Alert Type:
Updated *
Bug Id:
CSCuv56604
Title:
N7K:ospf pushing BFD into admin down state
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
All BFD/OSPF sessions flap on the local chassis.

Conditions:
This happens when sup switchover through physical removal or through CLI "system switchover" command with OSPF having passive-interface default in SR mode and no ip ospf passive-interface in certain interfaces.

Workaround:
The following workaround solved the issue
- no bfd echo
- bfd timers 150 min-rx 150 interval 3

Further Problem Description:

Last Modified:
07-SEP-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
7.1(3)N1(0.611), 7.1(3)N1(1), 7.1(3)ZD(0.9), 7.1(3)ZN(0.16), 7.3(0)IB(0.41)
Alert Type:
Updated *
Bug Id:
CSCut22695
Title:
"mts_drop:2265 proc(/isan/bin/acllog) errno(22)" msg seen in 7.2.0.D1
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show logging ip access-list internal event-history errors throws errors"

Conditions:
Configure access list (RACL/VACL/PACL) on any interface. Pump traffic through that interface so that there is a hit on the packet because of configured access-list. Then run "show logging ip access-list internal event-history errors throws errors"

Workaround:
This is not breaking any functionality. Its just reported in event-history debug message

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases: *
7.2(0)D1(0.409), 7.2(0)D1(0.437), 7.2(1)D1(0.54), 7.3(0)ZD(0.23), 7.3(0)ZD(0.49)
Known Fixed Releases:
7.3(0)IB(0.8)
Alert Type:
New
Bug Id:
CSCuo93802
Title:
RISE service in vPC direct mode showing as admin down
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
There are two vPC peers directly connected to an MPX. One peer has an active RISE service, while the other has a RISE service showing as "admin down". The MPX itself lists only one RISE connection.

Conditions:
1. Configure vPC between two switches
2. Create active RISE service on both
3. Delete configuration and reload MPX with -warm flag

Workaround:
Reboot MPX and peer with "admin down" service.

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases:
6.2(8)E1
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuq48097
Title:
vsh errors due to bootvar after switch reload and NAM online
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Port-channels 4091 and 4092 are created and have "unknown enum" as their status in "show port-channel summary" after the agni-NAM module comes online.

The error "eth_pcm: unknown enum:0, tid(hex):2c00004, comp:191, cid(hex):0" appears after the "show port-channel summary" is issued.

Conditions:
The switch is reloaded under the following conditions:
1. There is only one supervisor module inserted
2. The configuration specifies a kickstart boot string for sup-2. e.g:
sup-1: kickstart
sup-1: system
sup-2: kickstart



Workaround:
Clear the sup-2 kickstart boot variable and reload.

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases:
7.1(1)SP(0.15)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCus26803
Title:
RISE up after removing vPC configuration from port-channel.
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
RISE is up for an indirect mode service, even though vPC configuration is missing from one of the two vPC peers.

Conditions:
vPC configuration is missing from one of the two vPC peers for a RISE indirect mode service.

Workaround:
Disable the non-desired vPC peer connection directly.

Further Problem Description:

Last Modified:
08-SEP-2015
Known Affected Releases:
6.2(12)S13
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCue28131
Title:
NXOS/OTV: OTV adj down due to tunnel creation failure
Status:
Fixed
Severity:
3 Moderate
Description: *

B>Symptom:
Continuous overlay flap could result in OTV adjacency down.

Conditions:
Continuous overlay flap for more than 2.5k times could result in tunnel hardware programming failure.

Workaround:
Reload vdc

Last Modified:
09-SEP-2015
Known Affected Releases:
5.2(4)
Known Fixed Releases: *
5.2(9), 5.2(9)S49, 5.2(9.95)S0, 6.1(4.23)S0, 6.1(5), 6.2(1.72)S0, 6.2(1.93), 6.2(2), 7.0(0)ZD(0.53), 7.0(0)ZD(0.55)
Alert Type:
Updated *
Bug Id:
CSCso22558
Title:
SYSTEST:mts_sys_drop(): invalid input q_entry 0xc8ad2920
Status:
Fixed
Severity:
3 Moderate
Description:


"2008 Mar 14 19:32:05 qadc3-ind06 %$ VDC-1 %$ %KERN-2-SYSTEM_MSG: mts_sys_drop(): invalid input q_entry 0xc8ad2920 for PID 6435 (tm). - kernel" error message gets printed on screen.



This message gets printed ocationally during tunnel interface bringup or when linecard is coming online.



This issue does not have any functional impact. There is no work around


Last Modified:
09-SEP-2015
Known Affected Releases:
4.0(1)
Known Fixed Releases: *
4.0(1.39), 8.3(0)CV(0.134)
Alert Type:
Updated *
Bug Id:
CSCup44154
Title:
OTV Unicast : TM_MEM_fu_gwrap_t Memory Leak 6.2.6.S23
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%SYSMGR-2-SERVICE_CRASHED syslog error message may be triggered by the 'tunnel' process in OTV unicast transport configuration. The core file generated by the 'tunnel' process should be visible under 'show core' command output.

Conditions:
OTV unicast transport configuration is configured on Nexus 7000 running 6.2(6) release.

Workaround:
None

Further Problem Description:

Last Modified:
09-SEP-2015
Known Affected Releases:
6.2(6)S23
Known Fixed Releases: *
6.2(10), 6.2(10)S39, 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)AV(0.38), 7.1(0)D1(0.232), 7.1(0)D1(0.303), 7.1(0)EV(0.116), 7.1(0)NF(0.32), 7.1(0)OTT(0.27)
Alert Type:
New
Bug Id:
CSCuw13014
Title:
MTS buffer exhaustion in mcecm/vpc
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
MTS buffer exhaustion in ethpm and vpc, "vlan not responding" errors, or log messages indicating MTS buffer exhaustion.

Conditions:
A bulk delete of vlans is conducted without using the range command

Workaround:
reload the switch or use a vlan range statement to delete multiple vlans at once.

Further Problem Description:

Last Modified:
09-SEP-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui15592
Title:
Nexus 7k unable to add spanning-tree commands to current interface
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Cannot add spanning-tree commands to current interface

Conditions:
any previously configured interface

Workaround:
default interface

Further Problem Description:

Last Modified:
09-SEP-2015
Known Affected Releases:
5.1(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu73084
Title:
HSRP Bundle in INIT state after reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
HSRP Anycast bundle goes to INIT state after reload.

Conditions:
HSRP Anycast bundle may go to INIT state after reload. This can happen if some interfaces come up later in the initialisation sequence after reload and makes the bundle in down state.

Workaround:
Shut and no shut the hsrp Anycast bundle to recover.

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases: *
6.2(10), 7.2(0)D1(0.484)
Known Fixed Releases:
6.2(13.3)S0, 6.2(14)FB(0.75), 7.1(2)N1(0.558), 7.1(2)N1(1), 7.1(2)ZD(0.14), 7.1(2)ZN(0.17), 7.2(0)D1(1), 7.2(1)D1(0.1), 7.2(1)PIB(0.8)
Alert Type:
Updated *
Bug Id:
CSCuw09891
Title:
BGP peers flap continuously
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
BGP peers will flap continuously and not stabilize even after several hours have passed.

Conditions:
Outbound policy with multiple AS Path regex matches that deny the route, coupled with non-default holdtimers (4/12, 10/30).

Workaround:
Change holdtimer to default values. Simplify the regex is possible and match the access-list *after* the prefix list in the route-map sequence.

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
6.2(10)S102
Known Fixed Releases: *
7.3(0)RTG(0.71)
Alert Type:
Updated *
Bug Id:
CSCur68883
Title:
RISE: APBR adds on single SVI very slow at large scale
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Adding APBR's belonging to a single SVI takes a long time.

Conditions:
Configuring many APBR's ( > 1,000)

Workaround:
Follow RISE scale guidelines for the release in question. Ensure TCAM usage is within acceptable boundaries.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
6.2(10)S102
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut94161
Title:
EEM: Configuration failed with: 0x412c000d validation timed out
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Configuring EEM with syslog as trigger is not accepted in a Nexus 5500/5600/6000

esc-5648-left(config)# event manager applet ntp
esc-5648-left(config-applet)# event syslog pattern "%PFMA-5-MOD_STATUS: Module 1 current-status is MOD_STATUS_ONLINE"
Configuration failed with: 0x412c000d validation timed out

Conditions:
Configuring EEM

Workaround:
Restart of evmc process can be done. Please open a TAC case for this since it needs to be done from the linux prompt.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.0(3)I2(0.528), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.1(2)N1(0.556), 7.1(2)N1(1), 7.1(2)ZD(0.11), 7.1(2)ZN(0.15)
Alert Type:
Updated *
Bug Id:
CSCup39948
Title:
maximum routes X warning-only starts dropping routes after reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After reload with maximum routes X warning-only devices stops installing routes into routing table saying it has reached the limit configured.

Even after the command stays the same in running config. after reload device ignores warning-only and set the number as actual limit for the routing table.

And you will see following msg says configured limit reached even though the running config will say warning only.

URIB-4-ROUTELIMIT_EXCEEDED urib [5997] (test-base) Number of routes (4) reached or exceeds configured limit (4); dropped (1)


vrf context test
address-family ipv4 unicast
maximum routes 4 warning-only >>>>>>>>>>> warning only

after reload

show routing vrf test internal

SUP state: ACTIVE
Clean Restart: YES
Ksink: PSS URI: volatile:/dev/shm/urib_runtime_pss
Servers ; CLIS: Up ; L3VM: Up ; RPM: Up ; LISP: Down; UFDM: Up ;
Registered; CLIS: Yes ; L3VM: Yes ; RPM: Yes ; LISP: No ; UFDM: Yes ;
SHM Min: 96; Size: 96
MPLS VPN MIB Trap Threshold: disabled by default
debug-filter vrf: default (0x1)
client: all (index 0x0) (mask 0x1)
prefix-list: none

VRF "test" (0x00000003) State: UP (Up) UFDM Enabled: Yes
TIB converged: Yes
Route limit 4, warning limit 100% (4)>>>>>>>>>>>>> set the number as an actual limit
Reinstall at 0% (4), pending: Yes
Last MIB trap 00:05:49 ago; Max reset: No; Warn reset: Yes
Current count 4, added 4, deleted 0, dropped 5

Conditions:
When maximum routes X command configured for a routing table with warning-only option.

Workaround:
putting the same command ?maximum routes X warning-only? again fixes the issue.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
6.2(2a), 6.2(6a), 7.0(3)I2(0.562)
Known Fixed Releases: *
6.2(10.21)S0, 6.2(12), 6.2(12)FT(0.11), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(3)I2(0.572), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.1(0)D1(0.189)
Alert Type:
Updated *
Bug Id:
CSCuv44967
Title:
Unable to modify access-list using config session
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Unable to modify ACL using config session
Following error is shown

N7K# conf session impulse
Config Session started, Session ID is 1
Enter configuration commands, one per line. End with CNTL/Z.
N7K(config-s)# ip access-list test
N7K(config-s-acl)# permit ip host 1.1.1.1 any
N7K(config-s-acl)# commit
Failed to start Verification: Checkpoint Name already exists
N7K(config-s)#



N7K# conf session test
Config Session started, Session ID is 1
Enter configuration commands, one per line. End with CNTL/Z.
N7K(config-s)# ip access-list test
Maximum number of commands reached
N7K(config-s)#

Conditions:
This problem was observed on 6.2.10 code after using config session for couple of days.

Workaround:
None

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
6.2(10)S92
Known Fixed Releases: *
7.3(0)D1(0.87), 7.3(0)OTT(0.37), 7.3(0)SL(0.115), 7.3(0)ZD(0.102)
Alert Type:
Updated *
Bug Id:
CSCuu78729
Title:
EIGRP can install non-successor to RIB in case of ECMP paths
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In N7K1 , N7K2 is being installed as a successor for 2001:420:1411::/48 even though it doesn't meet the Dual FC condition.


fe80::224:f7ff:fe19:2e41 metric 19968/19456
fe80::226:98ff:fe0c:6bc1 metric 19968/19712

Conditions:
If there's another path with same metric which passes Dual FC condition and during installation to RIB, the 2 paths are considered to be ECMP

Workaround:
Increase the total metric of the path which fails the FC condition using "ip delay eigrp" or distribute-list command

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
5.2(7)
Known Fixed Releases: *
6.2(13.11)S0, 7.0(3)I2(0.542), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.2(1)D1(0.51), 7.2(1)N1(0.283), 7.2(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCus59622
Title:
N5K - NS stuck on "ISSU : InProgress" after ISSU completed
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
APBR's from the HA secondary are missing. "Show rise profile" CLI on the MPX shows "ISSU : InProgress", though ISSU has completed.

Conditions:
A RISE vPC direct service is configured with MPX in an HA cluster. "NS mode RISE_APBR" and/or "NS mode RISE_RHI" is disabled on the NetScaler HA primary. One of the two switches in the vPC undergoes ISSU. NS mode RISE_APBR and/or RISE_RHI are then re-enabled on the NetScaler HA primary.

Workaround:
Disable the affected RISE service on N5K, and confirm that the service is torn down on the NetScaler. Then, re-enable the RISE service.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
7.1(1)N1(0.71)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu35062
Title:
n7k hsrp error with more than 255 secondary ip on an interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
an interface with more than 255 secondary addresses configured will not allow you to configure hsrp ip address. the following error is seen

(config-if-hsrp)# ip x.x.x.x
ERROR: Invalid IP address((Mismatch with IP subnet))

Conditions:
when more than 255 secondary addresses are configured on the interface

Workaround:
use less than 255 secondary addresses per interface

Further Problem Description:

Last Modified:
14-SEP-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
6.2(12)E1, 6.2(13.3)S0, 6.2(14)FB(0.56), 7.0(3)I2(0.461), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.2(1)D1(0.26), 7.2(1)N1(0.261), 7.2(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCud51189
Title:
HMM support to get all AM adjacencies for the given SVI
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

Conditions:

Workaround:

Last Modified:
14-SEP-2015
Known Affected Releases:
6.2(0)PF(0.82)
Known Fixed Releases: *
6.2(0)PF(0.105), 7.0(0)BNZ(0.23), 7.0(0)KM(0.37), 8.3(0)CV(0.142)
Alert Type:
Updated *
Bug Id:
CSCuq23138
Title:
first collapse of pi71-sjc-l2o-bnb
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
B&B collapse, not applicable

Conditions:
B&B collapse, not applicable

Workaround:
B&B collapse, not applicable

Further Problem Description:

Last Modified:
14-SEP-2015
Known Affected Releases:
7.1(0)ZD(0.272)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.228), 7.1(0)N1(0.281), 7.1(0)N1(0.321), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)ZD(0.281)
Alert Type:
Updated *
Bug Id:
CSCud31278
Title:
Wrong o/p for "show vrf vpn detail" on freetown
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Wrong o/p for "show vrf vpn detail"
Conditions:
router configured with vrf vpn
Workaround:
none

Last Modified:
16-SEP-2015
Known Affected Releases:
6.2(0.265)S4, 6.2(0.269)S11, 6.2(0.278)S6
Known Fixed Releases: *
6.2(0.293)S0, 6.2(2), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCum49090
Title:
vrf_tenant_profile is not being applied
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
vrf_tenant_profile is not being applied

Conditions:

Workaround:

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
7.0(1)FVL(0.25)
Known Fixed Releases: *
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)GI(0.5), 7.0(1)FVL(0.61), 7.1(0)D1(0.55), 7.1(0)PDB(0.13), 7.2(0)D1(1), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCul67163
Title:
L3VM core file is truncated
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
L3VM core file is truncated

Conditions:
When L3VM Crashes.

Workaround:
Not known

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.0(2)N3(1)
Known Fixed Releases: *
7.0(0)BNZ(0.23), 7.0(0)FVX(0.66), 7.0(0)N1(0.399), 7.0(0)N1(1), 7.0(0)ZD(0.172), 7.0(0)ZN(0.124), 7.1(0)ARP(0.2), 7.1(0)D1(0.43), 7.2(0)D1(1), 8.3(0)CV(0.144)
Alert Type:
Updated *
Bug Id:
CSCuu53397
Title:
[VxLAN EVPN] clear bgp * results in assert failed msgs with Traceback
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traceback seen-
%BGP-3-ASSERT: bgp-65001 [6952] ../routing-sw/routing/bgp/bgp_util.c:3338: Assertion `def_tbl_ctx->first_bestpath_done' failed.

Conditions:
Shut one of the VRFs and do - clear bgp all * vrf all

No functional impact seen with the traceback.

Workaround:
Issue not seen without vrf shut.

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.0(3)I2(0.484), 7.2(0)D1(1)
Known Fixed Releases: *
7.0(3)I2(0.513), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66), 8.3(0)CV(0.123)
Alert Type:
Updated *
Bug Id:
CSCut71442
Title:
"PIM Data Register" debug message missing after receiving data packets
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When the FHR receives the data packets, a data register is sent to the RP. As part of the conformance test, the script expects following debug msg -
2014 Dec 2 00:58:13.070567 mcastfwd: libpim [6339] Sent PIM Data Register for (10.10.2.201, 239.23.23.23) to RP 10.10.10.1, ttl 254 (1 registers in last sec)

But the above debug is not observed on the console

Conditions:
There is no functionality impact here. Only when we enable mcastfwd debugs, we expect the debugs to show up on the console but for some reason the debugs are not showing up on the console.

Workaround:
No workaround. The bug is purely for development purpose.

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.2(0)D1(0.475), 7.2(0)D1(0.499), 7.2(1)D1(0.54)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.54)
Alert Type:
Updated *
Bug Id:
CSCus87414
Title:
N7K: ascii replay loses IP SLA / obj tracking config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When applying an existing config to a device via 'copy run', routing statements used in object tracking are not created. The same behavior is seen when the file is copied to either startup, or scheduled-config, and the device is reloaded. 'copy start' , or 'copy schedule' will trigger this on reload.
In the same way we may also lose the vrf membership for the 'ip sla' configuration.

Conditions:
The device has a blank configuration - ie, has just been issued a 'write erase' or minimal configuration

Workaround:
The routes will need to be added manually once the configuration is loaded entirely. If a 'copy run start' is performed the issue will not occur again on the next reload.

Further Problem Description:

Last Modified:
23-SEP-2015
Known Affected Releases:
6.1(5a), 6.2(10), 6.2(2a), 6.2(8a)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.21), 7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)SIB(99.109)
Alert Type:
Updated *
Bug Id:
CSCup86423
Title:
MIB: MPLS-LSR-STD-MIB issues found by MPLS xOS automation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The MPLS-LSR-STD-MIB (mplsLsrStdMIB) content may be erroneous or incomplete

Conditions:
none

Workaround:
none

Further Problem Description:

Last Modified:
23-SEP-2015
Known Affected Releases:
7.1(0)D1(0.113)
Known Fixed Releases: *
7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)D1(0.487), 7.2(0)D1(1), 7.2(0)N1(0.183)
Alert Type:
Updated *
Bug Id:
CSCus40095
Title:
Memory leak at dual_sia_active
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Memory leak when gone into SIA state.

Conditions:
Under certain topology conditions at high scale when gone into SIA state.

Workaround:
no work around

Further Problem Description:

Last Modified:
23-SEP-2015
Known Affected Releases:
7.2(0)ZD(0.6)
Known Fixed Releases: *
7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(120), 7.2(0)D1(0.481), 7.2(0)D1(1), 7.2(0)VZD(0.26)
Alert Type:
Updated *
Bug Id:
CSCus45517
Title:
BGP MED not used with LOCAL AS Neighbors.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
BGP MED not used in path selection for paths with LOCAL AS Neighbors.

Conditions:
Device running NX-OS

Workaround:
configure :
bestpath always-compare-med

Further Problem Description:
Example :

ON NXOS:
--------

sh bgp vpnv4 un 10.4.50.4/30

BGP routing table information for VRF default, address family VPNv4 Unicast
Route Distinguisher: 42961:300
BGP routing table entry for 10.4.50.4/30, version 1223249
Paths: (2 available, best #1)
Flags: (0x000002) on xmit-list, is not in urib

Advertised path-id 1
Path type: internal, path is valid, is best path
AS-Path: NONE, path sourced internal to AS
10.75.39.1 (metric 83) from 10.75.40.1 (10.75.40.1)
Origin incomplete, MED 103, localpref 100, weight 0
Received label 34354
Extcommunity:
RT:42961:42
RT:42961:301
Originator: 10.75.39.180 Cluster list: 0.0.0.100 10.75.39.1

Path type: internal, path is valid, not best reason: NH metric
AS-Path: NONE, path sourced internal to AS
10.75.39.2 (metric 93) from 10.75.40.2 (10.75.40.2)
Origin incomplete, MED 203, localpref 100, weight 0
Received label 156518
Extcommunity:
RT:42961:42
RT:42961:301
Originator: 10.75.39.180 Cluster list: 0.0.0.100 10.75.39.2

Path-id 1 not advertised to any peer


ON IOS:
--------

R1#sh bgp vpnv4 un all 10.10.10.10
BGP routing table entry for 1:1:10.10.10.10/32, version 4
Paths: (2 available, best #2, table A)
Not advertised to any peer
Refresh Epoch 1
Local
2.2.2.2 (metric 156160) from 2.2.2.2 (2.2.2.2)
Origin incomplete, metric 21, localpref 100, valid, internal
Extended Community: RT:1:1
mpls labels in/out nolabel/19
Refresh Epoch 1
Local
3.3.3.3 (metric 15388160) from 3.3.3.3 (3.3.3.3)
Origin incomplete, metric 20, localpref 100, valid, internal, best
Extended Community: RT:1:1
mpls labels in/out nolabel/18

Last Modified:
23-SEP-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases: *
7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(3)I1(1.211), 7.0(3)I1(2), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)D1(0.473), 7.2(0)D1(1), 7.2(0)N1(1), 7.2(0)PDB(0.408)
Alert Type:
Updated *
Bug Id:
CSCuo80764
Title:
N5K - ISSU upgrade to 7.0.1.N1.1 changing config vrf name to unknown
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
upgrade to 7.0.1.N1.1 using ISSU can result in change in config where vrf name would show as unknown.

Conditions:
ISSU upgrade

Workaround:
reload the switch

Further Problem Description:

Last Modified:
23-SEP-2015
Known Affected Releases:
7.0(1)N1(1), 7.0(3)I2(0.529)
Known Fixed Releases: *
7.0(0)BZ(0.71), 7.0(0)HSK(0.433), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(2)N1(0.552), 7.1(2)N1(1), 7.1(2)ZD(0.8), 7.1(2)ZN(0.11)
Alert Type:
Updated *
Bug Id:
CSCut77072
Title:
N7K-F248XP-25E 6.1(5) link flaps with no cable
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When interface with SFP inserted without any connection or with connection (but the link partner is in disabled state) is now enabled (no shutdown), interface flaps too many times and goes into Error Disabled state or Port goes into False Link up state for a brief period.

F2 interface + SFP <== No cable
F2 interface + SFP <========cable=======> Peer Port disabled

Conditions:
In a very rare case where the link is very noisy.

Workaround:
1. If the port is not physically connected through a cable or the Link partner is disabled, then shutdown the local port also.

2. With the fix of this DDTS, apply a large debounce timer (for ex: 1000ms).
Note that this fix takes effect only when the link debounce timer of port is > 300 ms,

conf t
interface Ethernet4/46
link debounce time 1000 <===

Further Problem Description:
Please note that this fix will help reduce the number of occurrences of this to a great extent along with large debounce timer.

Here is the example log below
=======================
N01CRSRV-3-TEST(config-if)# no sh
2015 Mar 6 12:12:39 N01CRSRV-3-TEST %ETHPORT-5-IF_ADMIN_UP: Interface Ethernet3/14 is admin up .
N01CRSRV-3-TEST(config-if)# 2015 Mar 6 12:12:40 N01CRSRV-3-TEST %ETHPORT-5-SPEED: Interface Ethernet3/14, operational speed changed to 10 Gbps
2015 Mar 6 12:12:40 N01CRSRV-3-TEST %ETHPORT-5-IF_DUPLEX: Interface Ethernet3/14, operational duplex mode changed to Full
2015 Mar 6 12:12:40 N01CRSRV-3-TEST %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet3/14, operational Receive Flow Control state changed to off
2015 Mar 6 12:12:40 N01CRSRV-3-TEST %ETHPORT-5-IF_UP: Interface Ethernet3/14 (description:) is up in Layer3
2015 Mar 6 12:12:40 N01CRSRV-3-TEST %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet3/14 (description:) is down (Link failure)
2015 Mar 6 12:12:50 N01CRSRV-3-TEST %ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet3/14 (description:) is down (Error disabled. Reason:Too many link flaps)

Last Modified:
24-SEP-2015
Known Affected Releases:
6.1(5)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.75), 7.2(1)D1(0.13), 7.2(1)ZD(0.9)
Alert Type:
Updated *
Bug Id:
CSCuv51488
Title:
N77-F348 Linecard misreports reset reason
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
An N77-F348 linecard could unexpectedly reload due to a high-CPU condition. Following the reload, the reset reason may be misreported as a disruptive upgrade:

1) At 709401 usecs after Mon May 18 20:42:50 2015
Reason: Disruptive upgrade
Service: SAP:37185
Version: 6.2(10)
2) At 670422 usecs after Mon May 18 20:42:40 2015
Reason: Unknown
Service:
Version: 6.2(10)

Conditions:
High CPU affecting the System Manager (sysmgr) process, followed by a reload of the linecard

Workaround:
Not known

Further Problem Description:
None known

Last Modified:
24-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.2(1)D1(0.90), 7.2(1)ZD(0.81)
Alert Type:
Updated *
Bug Id:
CSCun80488
Title: *
Ingress CRC/Runts on FEX HIF (N2K-C2232TM-10GE)
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
There are increasing ingress CRC/Runts on FEX disabled Host Interfaces On N2K-C2232TM-10GE

Conditions:
6.1(30 s50, N2K-C2232TM-10GE

Workaround:
NA

Further Problem Description:
NA

Last Modified:
25-SEP-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu20867
Title:
F3 does not check control plane flag to skip RPF check
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:Multicast control traffic is subject to RPF rate-limiters on F2/F3 cards.
Conditions:There is no trigger for this issue. Multicast control packets will be dropped due to RPF check. But should only affect LISP deployments.
Workaround:No workaround

Last Modified:
25-SEP-2015
Known Affected Releases:
7.2(0)D1(0.484)
Known Fixed Releases: *
6.2(12)E6, 6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.79), 7.1(0)AV(0.81), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)CF(0.11), 7.2(0)D1(0.506), 7.2(0)D1(0.508)
Alert Type:
Updated *
Bug Id:
CSCuw03144
Title:
OpenSSH: Evaluation of Multiple OpenSSH CVEs for NX-OS
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cisco Nexus Operation System (NX-OS) includes a version of Open Secure Shell (OpenSSH)
software that is affected by the vulnerabilities identified by the following Common
Vulnerability and Exposures (CVE) IDs:

CVE-2015-5600, CVE-2015-6563, CVE-2015-6564, CVE-2015-5352 and CVE-2015-6565

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at

http://cve.mitre.org/cve/cve.html

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.9/6.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C&version=2.0
CVE ID CVE-2015-5600, CVE-2015-6563, CVE-2015-6564, CVE-2015-6565, CVE-2015-5352 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
25-SEP-2015
Known Affected Releases:
6.2(12), 7.3(0)ZN(0.89)
Known Fixed Releases: *
7.3(0)D1(0.90), 7.3(0)EG(0.3), 7.3(0)IB(0.72), 7.3(0)N1(0.125), 7.3(0)N1(1), 7.3(0)PDB(0.57), 7.3(0)RTG(0.78), 7.3(0)SL(0.115), 7.3(0)ZD(0.105), 7.3(0)ZN(0.114)
Alert Type:
Updated *
Bug Id:
CSCtw81451
Title:
Changing member priority is not reflected properly in PWRED mbackup
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
1. set up PWRED with multiple backup.

l2vpn xconnect context foo
member e1/1.1
member pseudowire 100 group blue priority 1
member pseudowire 101 group blue priority 3
member pseudowire 102 group blue priority 5
member pseudowire 103 group blue priority 7

where the pseudowire 100 is the highest priority PW and currently active,

change the configuration such that member pseudowire 102 has priority 0, and it should become the active PW, but it is not.

Conditions:
When set up is PWRED with multiple backup, and trying to change the priority of the PW in the configuration to change the active PW.

Workaround:
There is no work around

Last Modified:
25-SEP-2015
Known Affected Releases:
5.2(0)LV1(0.150)
Known Fixed Releases: *
15.2(2.9)S, 15.2(4)S, 15.3(0.15)PI21b, 15.3(1.1)T, 7.3(0)IB(0.72), 7.3(0)RTG(0.78), 7.3(0)ZD(0.114), 7.3(0)ZN(0.125)
Alert Type:
Updated *
Bug Id:
CSCuv61896
Title:
show mac address-table should not fill up mtm debug logs
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
mtm debugs are filled up with mtm_get_pi_entry_from_pd_entry logs for each mac

Conditions:
when show hardware mac address-table X CLI is executed
OR
sh mac address-table hardware-age

Workaround:
none

Further Problem Description:
To RCA mac inconsistency issues like the ones documented in CSCut03392, we need this logging improvement in l2fm.

Last Modified:
27-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
6.2(14), 6.2(14)S4, 7.2(1)D1(0.45), 7.2(1)ZD(0.39)
Alert Type:
Updated *
Bug Id:
CSCuv57578
Title:
L2FM-M3-IT:VPC Peer link is blocked due to Bridge asurance inconsistency
Status:
Terminated
Severity:
3 Moderate
Description: *

$$IGNORE

Symptom:
PFA the config

Conditions:

Workaround:

Further Problem Description:

Last Modified:
28-SEP-2015
Known Affected Releases:
7.0(0)HSK(0.475)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu22117
Title:
N7k F3 IPv4 FIB misprogramming
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:Route installed by both AM and LISP is in the RIB but not the FIB
Conditions:Route was installed by both AM and LISP, and AM installed before LISP.
Workaround:Clear the host route from the RIB "clear ip route"

More Info:


Last Modified:
29-SEP-2015
Known Affected Releases: *
6.2(10), 6.2(12)
Known Fixed Releases:
6.2(12)E1, 6.2(12)E6, 6.2(13.3)S0, 6.2(14), 6.2(14)FB(0.59), 7.2(1)D1(0.48), 7.2(1)N1(0.280), 7.2(1)N1(1), 7.2(1)ZD(0.42), 7.2(1)ZN(0.44)
Alert Type:
Updated *
Bug Id:
CSCul13180
Title:
Nexus 7K Crashes in PIM Process Due to mdt_route->refererQ->head
Status: *
Other
Severity:
4 Minor
Description:

Symptom:
Nexus 7k may experience a crash in the "PIM" process when trying to access an invalid memory address in software while trying to delete an MVPN route that has an expired timer.

SYSMGR-2-SERVICE_CRASHED Service "pim" (PID 5860) hasn't caught signal 11 (core will be saved).

Conditions:
MVPN is being used, and a route is being deleted in software due to an expired aging timer.

Workaround:
None known.

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
6.1(4a)S20
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtu60214
Title:
Release-note for traffic loss on restart bgp w/ route-import among vrfs
Status:
Terminated
Severity:
4 Minor
Description: *

Symptom:
Traffic loss occurs during BGP restart

Conditions:
When there is mutual route import amongst VRFs, traffic loss can occur when BGP is restarted. This happens because the import in the target VRF happens only after the source VRF's bestpath has run. When there is mutual import between 2 or more VRFs, some VRFs will end up running their bestpath before importing routes from the target VRFs. As a result, imported routes will get
prematurely flushed leading to traffic loss.

Workaround:
None, unless the mutual import can be resolved be reconfiguration.

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
6.0(1), 6.2(1.139)S0
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum77376
Title:
Need to Supress Pim Message PIM-6-ROUTE_LOOKUP
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
2014 Jan 13 15:08:35 nexus2 PIM-6-ROUTE_LOOKUP pim [5984] Couldn't find PIM route (*, 224.0.0.0/4) in pim_process_mfdm_stats_msg()
2014 Jan 13 15:08:45 nexus2 PIM-4-SYSLOG_SL_MSG_WARNING PIM-6-ROUTE_LOOKUP: message repeated 3 times in last 78 sec
2014 Jan 13 15:09:26 nexus2 PIM-6-ROUTE_LOOKUP pim [5984] Couldn't find PIM route (*, 224.0.0.0/4) in pim_process_mfdm_stats_msg()

Conditions:
When upgraded to 6.2(x) code

Workaround:
reduce the pim logging severity to 4 or 5.

Further Problem Description:

Last Modified:
02-SEP-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)DHB(0.31), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.43), 7.3(0)ZD(0.85), 7.3(0)ZN(0.92)
Alert Type:
Updated *
Bug Id:
CSCua73297
Title:
L2MCAST_HW_INSTALL_FAIL with Private VLAN Feature
Status: *
Terminated
Severity:
4 Minor
Description:

Symptom:
A Nexus switch may fail to install layer 2 multicast entries into hardware following a reload/module bring up. The following errors are observed:

%L2MCAST-SLOT1-3-L2MCAST_HW_INSTALL_FAIL: Hw install failed for vlan 802 (74, *, *) entry!
%L2MCAST-SLOT9-3-L2MCAST_HW_INSTALL_FAIL: Hw install failed for vlan 806 (74, *, *) entry!

Conditions:
When private-vlan is in use.

Workaround:
None.

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
6.1(1), 6.2(1.136)S5, 6.2(10)S89
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut80582
Title:
logging level spm6 missing after non-ISSU from 6.0.4 to 6.2.10
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
After upgrade from 6.0(4) to 6.2(10), customer lost the config: 'logging level spm6'

Conditions:

Workaround:

Further Problem Description:

Last Modified:
13-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)RTG(0.72)
Alert Type:
Updated *
Bug Id:
CSCut12411
Title:
transceiver power read incorrectly on FEX from 6.1.3 to 6.2.8a
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The "Detail Diagnostics Information" section in CLI "show inter transceiver details" contains incorrectly scaled information.

Conditions:
Transceiver with diagnostic information

Workaround:
No workaround

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases: *
6.2(13.3)S0, 6.2(14)FB(0.9), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.2(0)CF(0.11), 7.2(0)D1(0.439), 7.2(0)D1(1), 7.2(0)FM(0.3), 7.2(0)PDB(0.362), 7.2(0)VOF(0.2)
Alert Type:
Updated *
Bug Id:
CSCtr47838
Title:
idle-timeout in tacacs-server test has different range
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
idle-timeout in "tacacs-server test" has the range as 0 to 1440, while "tacacs-server host test" has the range as 1 to 1440.

Conditions:
Always.

Workaround:
None.

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
5.2(1)
Known Fixed Releases: *
7.3(0)IB(0.54)
Alert Type:
Updated *
Bug Id:
CSCtu33370
Title:
Need "show snmp" command in "show tech snmp" in NX-OS
Status:
Fixed
Severity:
4 Minor
Description:

Need to include the output of "show snmp" command in "show tech snmp" in NX-OS

Symptom:
"sh tech snmp" doesnt include new show commands.

Conditions:
"sh tech snmp" doesnt include new show commands.

Workaround:
Execute different CLIs one by one.

Further Problem Description:
Need to include the output of "show snmp" command in "show tech snmp" in NX-OS

Last Modified:
04-SEP-2015
Known Affected Releases:
4.2(8), 5.2(1)
Known Fixed Releases: *
7.3(0)IB(0.54)
Alert Type:
Updated *
Bug Id:
CSCue35705
Title:
Getting password prompt even when entering password in copy ftp command
Status:
Fixed
Severity:
4 Minor
Description: *

Symptom:
When specifying the user password in the copy ftp command, the password prompt is still popped:

nexus# copy ftp://test:test@ftpserver/file bootflash:
Enter vrf (If no input, current vrf 'default' is considered): management
Password: <<<<<<<<<<<

Conditions:
Nexus switch

Workaround:
- Use the "terminal password" command to set the password to be used for the password prompts on this terminal session:

nexus# terminal password test
nexus# copy ftp://test@ftpserver/file bootflash:
Enter vrf (If no input, current vrf 'default' is considered): management
***** Transfer of file Completed Successfully *****
Copy complete, now saving to disk (please wait)...
nexus#

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
5.2(3a), 6.1(2), 6.2(10)S53
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj28897
Title:
N7k logging level all # does not change logging facility pim or pim6
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The bug I see is that pim/pim6 do not go to ?6? but stay at their previous values when the ?logging level all 6? command is issued. This is a minor bug.

B16u1-DC1-Agg1-vdc1(config)# logging level all 6

Then via ?show logging?:

Facility Default Severity Current Session Severity
-------- ---------------- ------------------------
pim 5 7
pim6 5 5

Conditions:
B16u1-DC1-Agg1-vdc1(config)# no logging logfile
B16u1-DC1-Agg1-vdc1(config)# clear logging logfile
B16u1-DC1-Agg1-vdc1(config)# logging logfile log 7 size 2000000
B16u1-DC1-Agg1-vdc1(config)# logging level all 6
B16u1-DC1-Agg1-vdc1(config)# logging level sysmgr 1
B16u1-DC1-Agg1-vdc1(config)# clear logging logfile

Workaround:
User can try changing the pim and pim6 levels individually by logging level ip pim <> " and "logging level ipv6 pim "

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)RTG(0.53)
Alert Type:
Updated *
Bug Id:
CSCuo02299
Title:
Overlay1 Last link flapped timer is flushed after 24 hours
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
In "show interface Overlay1" output , counter "Last link flapped" never goes above 24 hours. It is reseted to 00:00:00 every 24 hours , so it can't be used to access how long interface was UP.
sh int o1
Overlay1 is up
Last link flapped 23:59:59
Last clearing of "show interface" counters 07:45:30

zixu-PE2# sh int o1
Overlay1 is up
Last link flapped 00:00:00
Last clearing of "show interface" counters 07:45:31

Conditions:
Normal operations

Workaround:
None. It' just a cosmetic issue it doesn't affect OTV communications. To check liveliness of OTV connections please use "show otv isis adjacency detail" and check for how long ISIS sessions has been stable.

show otv isis adjacency detail
OTV-IS-IS process: default VPN: Overlay1
OTV-IS-IS adjacency database:
System ID SNPA Level State Hold Time Interface Site-ID
nexus-OTV1 001b.54c2.4242 1 UP 00:00:12 Overlay1 0000.0000.0001
Up/Down transitions: 1, Last transition: 20:23:22 ago <---------------- last transition 20 hours ago
...
nexus-OTV2 001b.54c2.4244 1 UP 00:00:12 Overlay1 0000.0000.0002
Up/Down transitions: 1, Last transition: 20:19:26 ago <---------------- last transition 20 hours ago

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.57)
Alert Type:
Updated *
Bug Id:
CSCuo45167
Title:
Multicast v6 Vinci: src type is still named "ngmvpn" not "fabric_mcast"
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
OIF name is listed as ngmvpn instead of fabric_mcast in the show ipv6 mroute output when fabric_mcast process has added the OIF.

Conditions:
All conditions

Workaround:
no workaround

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
7.0(0)FVX(0.114)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66)
Alert Type:
Updated *
Bug Id:
CSCum22663
Title:
Missing description for parameter under show lisp internal event-history
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
miss description for parameter under show lisp internal event-history

Conditions:

Workaround:

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.66)
Alert Type:
New
Bug Id:
CSCus06608
Title:
N7K: NETSTACK-3-LOCK_STACK_FULL messages in log
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
Nexus 7000 platform running 6.2(10) which is configured with IPv6 addressing might print following messages in the log.

%NETSTACK-3-TSP_LOCK_STACK_FULL: Lock stack full
%NETSTACK-3-LOCK_RELEASE_ORDER: -Traceback: l
ibrsw.so+0xe6d4d librsw.so+0xe6f4e liburib.so+0x1070a liburib.so+0x15ec8 liburib.so+0x1
5f8c liburib.so+0xb021 libu6rib.so+0x8aab libu6rib.so+0x973a 0x8277115 0x8406e2f 0x840a
cbc 0x83f5e28 0x83f9fb4 0x8390*

Conditions:
%NETSTACK-3-LOCK_RELEASE_ORDER: -Traceback: l
ibrsw.so+0xe6d4d librsw.so+0xe6f4e liburib.so+0x1070a liburib.so+0x15ec8 liburib.so+0x1
5f8c liburib.so+0xb021 libu6rib.so+0x8aab libu6rib.so+0x973a 0x8277115 0x8406e2f 0x840a
cbc 0x83f5e28 0x83f9fb4 0x8390*

Workaround:
no operational impact. Messages can be suppressed by changing logging level for netstack temporarily to 2 which would avoid logs from getting filled up with these messages by issuing following command.

logging level netstack 2

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv45421
Title:
Multicast source address inverted in igmpv3 event-history log message
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Incorrect SRC address in log IGMP event-history message:
#show ip igmp snooping event-history vlan
2015 Jul 15 15:00:48.128938 igmp [1663]: [1676]: SN: <405> Received v3 Group-source-specific query for 239.195.1.3 from 10.21.25.252 on Vlan405 (mrt 1 sec)
2015 Jul 15 15:00:48.128928 igmp [1663]: [1676]: SN: <405> Received a v3 GSS-Query for group 239.195.1.3 (source-count 1) on Vlan405 (mrt 1 sec) src0:225.253.203.91, srcN:225.253.203.91

Conditions:
N7k + IGMPv3 + IGMP snooping

Workaround:
none

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)D1(0.72), 7.3(0)MMD(0.9), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)RTG(0.50), 7.3(0)ZD(0.85), 7.3(0)ZN(0.92)
Alert Type:
Updated *
Bug Id:
CSCto33777
Title:
No check in vPC for STP pathcost method
Status:
Terminated
Severity:
5 Cosmetic
Description: *

Symptom:
The STP cost on vPC peers may differs. This might be result in inconsistency of STP topology

Conditions:
The STP pathcost method (long or short) is currently not checked in vPC global consistency check. If
this parameter is configured in different way on two vPC peers, it could result in different STP path cost
values.

Workaround:
Avoid different configuration of STP pathcost method on vPC peers.

Further Problem Description:
It is recommend to have the same STP pathcost method in the STP domain. Currently the
recommended STP pathcost method is long for environments which using 10GE links in the STP
domain.

Last Modified:
09-SEP-2015
Known Affected Releases:
4.2(6), 5.1(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq49889
Title:
OTV - Interface overlay counters incorrect.
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
counters for the overlay interface shows incorrect values

Stos-OTV1# show int ov 1 | i bits
24224647 bytes 15653205936 bits/sec 2468907 packets/sec <---

Conditions:
noticed running 6.2.8

Workaround:
none

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(8)
Known Fixed Releases: *
7.3(0)RTG(0.80)
Alert Type:
Updated *
Bug Id:
CSCup34431
Title:
Build breakage for CSCui89702
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Doing XML code changes for "show routing-context" ,"show privilege" clis

Conditions:
No conditions

Workaround:
no

Further Problem Description:

Last Modified:
16-SEP-2015
Known Affected Releases:
7.0(99.1)ZD
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.1(0)D1(0.228), 7.1(0)N1(0.280), 7.1(0)N1(0.286), 7.1(0)N1(1), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.179), 7.1(0)ZD(0.281)
Alert Type:
Updated *
Bug Id:
CSCug64700
Title:
NX-OS parser: auto-complete functionality for certain QoS commands
Status:
Fixed
Severity:
6 Enhancement
Description:

Ability to auto-complete for certain commands

class-map

Symptom:
auto complete of acl names was not happening.

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
18-SEP-2015
Known Affected Releases:
5.2(3a)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)PDB(0.57), 7.3(0)RTG(0.64)
Alert Type:
Updated *
Bug Id:
CSCuo63753
Title:
"system fabric forwarding vni" command - follow-up fix
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
"system fabric forwarding vni" command - follow-up fix

Conditions:

Workaround:

Further Problem Description:

Last Modified:
24-SEP-2015
Known Affected Releases:
9.9(9.9)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum52148
Title:
Distributed reflective denial-of-service vulnerability on NTP server
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
A vulnerability in Network Time Protocol (NTP) package of Cisco NX-OS Software and Cisco Multilayer Director Switch (MDS) could allow an unauthenticated, remote attacker to cause a Denial of Service (DoS) condition on an affected device.

The vulnerability is due to processing of MODE_PRIVATE (Mode 7) NTP control messages which have a large amplification vector. An attacker could exploit this vulnerability by sending Mode 7 control requests to NTP servers and observing responses amplified up to 5500 times in size. An exploit could allow the attacker to cause a Denial of Service (DoS) condition where the affected NTP server is forced to process and respond with large response data.

Conditions:
This is a day 1 issue and all versions of NX-OS and MDS with support for NTP are vulnerable.

Fixed Software:

This bug will apply to the Cisco Nexus 7000 (N7K), Cisco Nexus 6000 (N6K), Cisco Nexus 5000 (N5K)
and Cisco Multilayer Director Switch (MDS) and the fix is currently targeted for a release towards the end of
CY2015.

Cisco NX-OS Software and Cisco MDS switches are vulnerable to attacks utilizing Mode 7 NTP requests. Mode 7 requests can have amplification vector up to 5500.

To see if a device is configured with NTP, log into the device and issue the CLI command
"show running-config | include ntp". If the output returnseither of the following commands
listed then the device is vulnerable:

ntp master
ntp peer
ntp server
ntp broadcast client
ntp multicast client

The following example identifies a Cisco device that is configured with NTP:

router#show running-config | include ntp
ntp peer 192.168.0.12

The following example identifies a Cisco device that is not configured with NTP:

router#show running-config | include ntp
router#

Information about Cisco NX-OS and MDS Software release naming conventions is available in
''White Paper: Cisco IOS and NX-OS Software Reference Guide'' at the following link:
http://www.cisco.com/web/about/security/intelligence/ios-ref.html

Workaround:
There are no solid workarounds other than disabling NTP on the device via the "no feature ntp" command. The following mitigations have been identified for this vulnerability; only packets destined for any configured IP address on the device can exploit this vulnerability. Transit traffic will not exploit this vulnerability.

Note: NTP peer authentication is not a workaround and is still a vulnerable configuration.

* NTP Access Group

Warning: Because the feature in this vulnerability utilizes UDP as a transport, it is possible to spoof the
sender's IP address, which may defeat access control lists (ACLs) that permit communication to these ports
from trusted IP addresses. Unicast Reverse Path Forwarding (Unicast RPF) should be considered to be used in conjunction to offer a better mitigation solution.

Additionally, "serve-only" keyword added to the NTP access-group will limit the exposure of the server to
only respond to valid queries.

Note: NTP Access Group groups are not supported by the Cisco MDS switch.

For additional information on NTP access control groups, consult the document titled ''Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 4.x'' at the following link:

http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/system_management/configuration/guide/sm_3ntp.html

* Infrastructure Access Control Lists

Warning: Because the

Last Modified:
25-SEP-2015
Known Affected Releases:
6.0(2), 6.2(9a), 7.2(1)ZN(0.30)
Known Fixed Releases: *
6.2(13.12)S0, 6.2(14), 7.2(1)D1(0.51), 7.2(1)N1(0.283), 7.2(1)N1(1), 7.2(1)ZD(0.45), 7.2(1)ZN(0.47), 7.2(1)ZN(0.48), 7.3(0)D1(0.107), 7.3(0)D1(0.96)
Alert Type:
Updated *
Bug Id:
CSCus92802
Title:
VPC role election and auto-recovery : sticky bit
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
Impact of sticky bit and auto-recovery feature in vpc role decision should be documented for NX-OS platforms.

Conditions:
VPC secondary switch isolated during upgrade or for any other reason, when attached back into vPC domain and after auto-recovery timer expires may cause outage.
Outage occurs as VPC roles change and vPC secondary switch takes over as Operational Primary due to sticky bit set, this leads to vPC legs to go down on Primary switch which changes to vPC operational secondary.

Workaround:
Disable auto-recovery prior upgrade/isolation on both vPC peers. Please note auto-recovery is by default enabled since NX-OS 6.2.x for N7k and 7.x for N5k/6k switches. Please use this command to check for sticky bit and auto-recovery status:
show system internal vpcm info global | i Sticky|Reload

If sticky bit is set (True) on the isolated switch, re-configuring same VPC role priority on this switch under vPC domain potentially unsets (False) the sticky bit.
Only once sticky bit is false attach the isolated switch back in vPC.

Further Problem Description:
NX-OS(config)# show system internal vpcm info global | i Sticky|Reload

Sticky Master: TRUE >>>>> Sticky bit is set
Reload timer started: FALSE
Reload restore configured: TRUE, timer :240 >>> Auto-recovery enabled

NX-OS(config)# show vpc role

vPC Role status
----------------------------------------------------
vPC role : secondary, operational primary
Dual Active Detection Status : 0
vPC system-mac :
vPC system-priority : 32667
vPC local system-mac :
vPC local role-priority : 200

NX-OS(config)# vpc domain 1

NX-OS(config-vpc-domain)# role priority 200

Warning:
!!:: vPCs will be flapped on current primary vPC switch while attempting role change ::!!

Note:
--------:: Change will take effect after user has re-initd the vPC peer-link ::--------
NX-OS(config-vpc-domain)# exit
NX-OS(config)# show system internal vpcm info global | i Sticky|Reload

Sticky Master: FALSE >>>>>>>>>>>>>>>>> Set to False, good now to attach in vPC
Reload timer started: FALSE
Reload restore configured: TRUE, timer :240

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtu21704
Title:
Config time push
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
%IPQOSMGR-4-QOSMGR_PPF_WARNING log message is seen.

Conditions:
- High VLAN scale
- Configuration push caused by either a port bring up or large scale modification (i.e., ACL programming on multiple ports)

Workaround:
Upgrade to 6.2(x)

Further Problem Description:
This is an enhancement to decrease the amount of time it takes to push changes in configuration. Part of it includes removing PPF from the process.

Last Modified:
16-SEP-2015
Known Affected Releases:
5.0(3.1), 6.1(1)S11, 6.1(3)
Known Fixed Releases: *
6.2(0.138)S0, 6.2(0.142)S0, 6.2(0.269c)S1, 6.2(0.269c)S2, 6.2(0.29)S0, 6.2(0.298)S0, 6.2(0.82)S0, 6.2(2), 7.0(1)ZD(0.3), 7.0(3)I1(0.2)
Alert Type:
Updated *
Bug Id:
CSCuu96175
Title:
L2FM/MCEM/CFS need more robust registration & retry infra
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
This is to address possible timeouts between L2FM and CFS under failure condition (CFS crash, control plane congestion) that could cause registration issues between applications.

Conditions:
This may occur under high control plane load.

Workaround:
Perform Supervisor Switchover or reload device

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
6.2(6b)
Known Fixed Releases:
6.2(13.7)S0, 7.2(1)D1(0.20), 7.2(1)ZD(0.16)
Alert Type:
Updated *
Bug Id:
CSCuj20960
Title:
Improve serviceability of show tech xml
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
This bug requests to add these commands in show tech xml:
show xml server internal exec-info all
show xml server internal history errors
show xml server internal history commands

Conditions:
this bug affects software up to 6.2(2)

Workaround:
none

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases:
6.2(2)
Known Fixed Releases: *
6.2(10), 6.2(10)FM(0.28), 6.2(10)NO(0.17), 6.2(8)KR(0.8), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(3)I2(0.524), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65)
Alert Type:
Updated *
Bug Id:
CSCth56943
Title:
elam remains armed even after trigger causing packets to hit acl log rl
Status: *
Terminated
Severity:
6 Enhancement
Description: *

Symptom:
When using elam on M! series linecards on Nexus 7000 with the 'rbi-corelate' keyword, after the trigger subsequent packets that match the email will leak to software through the access-list-log hardware rate-limiter.

Conditions:

Workaround:
After troubleshooting is complete be sure to type 'release' before exiting elam applet.

Further Problem Description:

Last Modified:
11-SEP-2015
Known Affected Releases: *
4.2(4), 5.0(2a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut63393
Title:
Border Leaf needs to advertise hash-len for BSR
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
Border Leaf doesn't advertise the correct hash-len as advertised by PIM running @ the Border-Leafs for BSR in Vinci Asti Multicast.

Conditions:
BSRs listen and accumulate candidate RP announcements. For every group range known, the BSR builds a set of candidate RPs, including all routers that advertised their willingness to service this range. This is called group range to RP set mapping. The resulting array of group range to RP set mappings is distributed by the BSR. Ultimately, the bootstrap messages containing Group to RP-set mappings are received by every multicast router in the domain and used to populate their RP caches. It's up to the routers to select the best matching RP from the sets advertised by the BSR router. It is important that all routers select the same RP for the same group, otherwise the multicast sources might miss receivers. Based on a consistent hash-len information sent from the BL's the routers will ensure they pick the same RP for the same group.
In the present Janjuc image, although PIM advertises a hash-len to be chosen for BSR, this communication doesn't get sent to NGMVPN @ Border-leaf node which results in PIM @ all leaf nodes using a default hash-len of 0 to calculate the RP for the group. This causes mismatch in hash-len information between PIM @ Border-Leaf vs PIM @ Leaf node.

Workaround:
Work-around is not to configure the candidate-RP's in the RP-set for BSR case with the same priority.

Further Problem Description:

Last Modified:
10-SEP-2015
Known Affected Releases:
7.2(0.1)
Known Fixed Releases: *
7.0(0)HSK(0.433), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.2(0)BA(0.25), 7.2(0)CF(0.11), 7.2(0)D1(0.473), 7.2(0)N1(0.166), 7.2(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCum21014
Title:
LISP should notify when unsupported hardware in use
Status: *
Terminated
Severity:
6 Enhancement
Description:

Symptom:
When using modules on the Nexus 7000 that are not M132 or using M132 modules running EPLD versions less than 186.008 LISP does not work.

Conditions:
Nexus 7000 LISP without M132 or with EPLD version less than 186.008

Workaround:
LISP is only supported on the Nexus 7000 on M132 modules running EPLD versions 186.008 or higher.

Further Problem Description:

Last Modified:
29-SEP-2015
Known Affected Releases:
6.2(3)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCup74957
Title:
Enhancement to Support Type 8 and Type 9 Encoding for Enable Secret NXOS
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:NA

Conditions:Enable secrete is used to temporarily escalate the privilege level of user using enable secret password.

if admin use the CLI command "enable secrete" then he has configure the enable secrete password.
Workaround:
Dont use this enable secret CLI command.
it is not enabled by default also.
More Info:Attacker should have valid user name and password and they should be able login to the box then only this issue can be exploited.
They should get access to the encrypted enable secret password and if they can decrypt this then only this issue can happen.


if admin has enabled the ENABLE SECRET option in the NXOS box and he has configured the password for enable secret, we store then encrypted enable secret password.
Encryption method used here is MD5 which is considered to be week encryption. Hence plan is to support TYPE 8 and TYPE 9 encryption methods.

Last Modified:
07-SEP-2015
Known Affected Releases:
7.1(0.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCug55348
Title:
Enable ability to change syslog destination port
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Needs changes for logging port for syslog.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
06-SEP-2015
Known Affected Releases:
5.2(2a), 6.1(2), 6.1(3)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(3)I2(0.496), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.15), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.1(0)BF(0.99)
Alert Type:
New
Bug Id:
CSCum47496
Title:
Invalid Hostname or address for mailhost - SCH message
Status:
Other
Severity:
6 Enhancement
Description:

Symptom:
observed that N7K displaying "Invalid hostname or address for mailhost" message when SMTP server sends timeout message.

Conditions:
We were performing callhome test using smtp method.

Workaround:
None.

Further Problem Description:
clear error message has to be displayed for each of the error cases

Last Modified:
05-SEP-2015
Known Affected Releases:
6.1(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq63391
Title:
clear ip mroute for NXOS routers.
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
No single CLI to clear multicast state information from all multicast components.

Conditions:
The problem that exists with the current implementation may remove the state from MRIB but not essentially from other components which are MRIB clients.

Workaround:
Currently, we may be need to issue all the following CLIs to completely remove the multicast state entries:
1. clear ip igmp group vrf [do this only if you don't need traffic from any sources for this group]
2. clear ip pim route vrf
3. clear ip mroute data-created vrf
4. clear ip mroute vrf

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
4.2(6), 6.2(0.278)S10, 6.2(8)
Known Fixed Releases: *
7.3(0)BZN(0.47), 7.3(0)D1(0.76), 7.3(0)MMD(0.9), 7.3(0)N1(0.103), 7.3(0)N1(1), 7.3(0)OTT(0.30), 7.3(0)PDB(0.45), 7.3(0)ZD(0.89), 7.3(0)ZN(0.96)
Alert Type:
Updated *
Bug Id:
CSCtu54802
Title:
Syslog server cannot see origin-id from Nexus 5000
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
This is an enhancement bug to add a configurable option to make the Nexus 5k to send origin-id to syslog server similar to IOS's command "logging origin-id ?". For example, having this option would allow the Nexus 5K to send syslogs messages with the hostname of the Nexus 5K at the beginning so it would be easy for the network administrator to identify which device the syslog came from.

Conditions:
n/a

Workaround:
n/a

Further Problem Description:

Last Modified:
05-SEP-2015
Known Affected Releases:
7.2(0.9)
Known Fixed Releases: *
7.2(1)N1(0.293), 7.2(1)N1(1), 7.2(1)ZN(0.57), 7.3(0)BZN(0.47), 7.3(0)N1(0.108), 7.3(0)N1(1), 7.3(0)ZN(0.101)
Alert Type:
Updated *
Bug Id:
CSCuh34065
Title:
F2E: BFD flap on M/F2E VDC in vpc setup with peer-gateway configured
Status: *
Other
Severity:
6 Enhancement
Description: *

Symptom:
BFD neighbor relationship fails to come up when BFD packets need to traverse peer-link. Typically this would be FHRPs as well as any routing protocols that have L3 peering over the peer-link.

Conditions:
All of these have to be present:
1) VPC peer-gateway is enabled
2) BFD echo is enabled

Workaround:
1) Remove VPC peer-gateway
AND/OR
2) Disable BFD echo

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
6.2(1.125)S4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui15096
Title: *
MDS :NX-OS does not allow special characters for username
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Unable to use spaces on username for nexus authentication accounts

Conditions:
When using spaces on the usersname like "Cisco user"

Workaround:
Use usernames with no spaces.

More Info:

Last Modified:
04-SEP-2015
Known Affected Releases:
5.0(2a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuh94514
Title:
N7K FIPS: Integrity test feature
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
FIPS requires a integrity test feature which ensure that the switch is not tampered with. This feature will be designed around the FIPS CLI configs. A hash of the CLI config will be stored and verified with a new generated hash to ensure that the switch's integrity is not tampered.

Conditions:

Workaround:
FIPS requires a integrity test feature which ensure that the switch is not tampered with. This feature will be designed around the FIPS CLI configs. A hash of the CLI config will be stored and verified with a new generated hash to ensure that the switch's integrity is not tampered.

Further Problem Description:

Last Modified:
04-SEP-2015
Known Affected Releases:
6.2(1.148), 6.2(5)
Known Fixed Releases:
6.2(0)FPS(0.2), 6.2(0)FPS(0.4), 6.2(0)FPS(0.9)
Alert Type:
Updated *
Bug Id:
CSCtx81322
Title:
NXOS: "show ip interface" Enhancement To Add Applied ACLs
Status: *
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
The "show ip interface" and "show ipv6 interface" commands do not include applied inbound and outbound ACL's for IPV4 and IPv6 in the CLI or XML tags.

Conditions:
This only occurs when a user expects to see applied ACL inbound and outbound ACL's when using the "show ip interface" or "show ipv6 interface" CLI commands like in Cisco IOS Software.

Workaround:
None

Further Problem Description:

Last Modified:
03-SEP-2015
Known Affected Releases:
6.0(1)
Known Fixed Releases:
6.2(0.178)S0
Alert Type:
Updated *
Bug Id:
CSCta17153
Title:
Max password lenhgt should allow 80 characters string
Status: *
Other
Severity: *
6 Enhancement
Description:

Symptoms:
User or Administrator can not set a password that is greater than 64 characters.

Conditions:
Systems running an affected version of Cisco Unified Computing System software.

Workaround:
None.

Further Problem Description:
Cisco policy states that Cisco devices should accept passwords from 0 to 80 characters in length.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
01-SEP-2015
Known Affected Releases:
1.0(0.176a), 1.2(0.88)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun18186
Title:
ISSU to detect NX-OS compatability during upgrade
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
An impact check or pre-upgrade check between non supported images comes with no warning.

Conditions:
ISSU between non-supported images not meeting compatibility requirements

Workaround:
Release notes should be read carefully before upgrade. Compatibility matrix for ISSU should be followed.

Further Problem Description:

Last Modified:
01-SEP-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsq95595
Title:
NxOS: clear counters not clearing tunnel interface counters
Status:
Fixed
Severity:
6 Enhancement
Description:


"clear counters" command doesn't clears up tunnel interface counters.
switch# show int tunnel 0
Tunnel0 is up
Internet address is 10.0.0.2/24
MTU 1476 bytes
Transport protocol is in VRF "default"
Tunnel protocol/transport GRE/IP
Tunnel source 10.0.0.2, destination 10.0.0.1
Tx
0 packets output, 5 minute output rate 0 packets/sec
Rx
7 packets input, 5 minute input rate 0 packets/sec

switch# clear counters
switch# show int tunnel 0
Tunnel0 is up
Internet address is 10.0.0.2/24
MTU 1476 bytes
Transport protocol is in VRF "default"
Tunnel protocol/transport GRE/IP
Tunnel source 10.0.0.2, destination 10.0.0.1

Tx
0 packets output, 5 minute output rate 0 packets/sec
Rx
7 packets input, 5 minute input rate 0 packets/sec


Under all conditions

There is no workaround.

Last Modified:
09-SEP-2015
Known Affected Releases:
4.0(2.44)
Known Fixed Releases: *
4.1(1.61), 7.0(0)KM(0.97), 7.1(0)D1(0.283), 7.1(0)OTT(0.39), 7.1(0)PDB(0.235), 8.3(0)CV(0.134)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论