| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu40317 | Title: | Applying Medianet to interface bypasses SA Miss queue on 4500 |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Using Medianet on L2 trunks, we see unknown unicast flooding because MACs are not being learned on interfaces that medianet is configured. When medianet is applied, the SA MISS CPU queue does not increment but medianet CPU queue does.
Conditions: 3.6.0 4500 Sup8 using medianet on the interface, where the medianetMonitor has a match-all criteria specified
Workaround: For medianet configure a policy with a criteria other than a match-all. Preferably the MediaMonitor policy should match specific flows , that are of interest.
Further Problem Description: Impacts 4500e and 4500es8 switches
|
|
Last Modified: | 12-OCT-2015 |
|
Known Affected Releases: | 3.6(0) |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(3)E2, 15.2(4)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(4.10.62)PI5, 3.6(3)E, 3.7(2)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv22441 | Title: | Cannot match cos in 3.7.0 Lanbase |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Switch(config-cmap)#match ? access-group Access group any Any packets ip IP specific values not Negate this match result protocol Protocol
Conditions: 4500 Running 3.7.X with LANBASE license
Workaround: Downgrade to 3.6.X or upgrade license
Further Problem Description:
|
|
Last Modified: | 08-OCT-2015 |
|
Known Affected Releases: | 3.7(0) |
|
Known Fixed Releases: * | 15.2(4)E, 15.2(4.0.61)E, 15.2(4.0.64a)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu42267 | Title: | vstack status shows duplicate entries for a single PID |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Switch#sh vsta group custom detail No custom group configured ESC-HUB304#sh vsta status SmartInstall: ENABLED
Status: Device_type Health_status Join-window_status Upgrade_status Device_type: S - Smart install N - Non smart install P - Pending Health_status: A - Active I - Inactive Join-window_Status: a - Allowed h - On-hold d - Denied Image Upgrade: i - in progress I - done X - failed Config Upgrade: c - in progress C - done x - failed Script Upgrade: p - in progress P - done F - failed Director Database: DevNo MAC Address Product-ID IP_addr Hostname Status ===== ============== ================= =============== ========== ========= 0 7426.aca4.8e40 WS-C4507R+E 10.1.22.1 3560-CG Director 1 04c5.a442.8300 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S A a C <--- duplicate 2 04c5.a442.9b00 WS-C3560CG-8PC-S 10.1.22.5 3560-CGS A a C 3 04c5.a442.8380 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S I a <---- duplicate
Conditions: 4500 running 3.7.2 as the director switch for smart-install
Workaround:
Further Problem Description:
|
|
Last Modified: | 28-OCT-2015 |
|
Known Affected Releases: | 3.6(2) |
|
Known Fixed Releases: * | 15.2(4)E, 15.2(4.1.5a)E, 15.2(4.1.6)E, 15.2(5.0.42)E, 3.8(0)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv15639 | Title: | 4500 sup8 dot1x unauthorized state during reauthentication due to macro |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: On c4510RE with SUP8 switch if we have cisco-av-pair=autosmartport attribute sent in the Radius Access-Accept packet and re-authentication is enable attached computers are losing network access. The port that the host is connected to goes into the 'Unauthotized' state. The issue does not happen every time, however, after 2 to 3 attempts it has been seen.
The smart port macro mentioned in this av-pair does not need to exist on the switch (it can be a dummy 'do nothing' macro as well), sending the attribute is the triggering of this behavior.
The same configuration on a 4500 switch with SUP7 does not trigger the issue.
Conditions: Radius Access-Accept packet includes the cisco-av-pair=autosmartport attribute.
Workaround: None
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Last Modified: | 08-OCT-2015 |
|
Known Affected Releases: | 15.2(2.0.0), 3.6(0) |
|
Known Fixed Releases: * | 15.2(2)E3, 15.2(4)E, 15.2(4.0.53)E, 15.2(4.0.64a)E, 3.6(3)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut87080 | Title: | Frequent Fan Alarm: Fan of power supply 1 has failed |
|
Status: | Fixed |
|
Severity: | 4 Minor |
Description: * | Symptom: Following messages seen on the device.
Dec 25 19:43:14.004 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 1 has failed Dec 25 19:43:19.004 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 1 is okay Mar 5 17:23:12.972 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed Mar 5 17:23:17.972 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay Mar 11 17:55:33.340 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed Mar 11 17:55:38.340 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay
Conditions: None
Workaround: None
Further Problem Description: These messages are cosmetic
|
|
Last Modified: | 23-OCT-2015 |
|
Known Affected Releases: | 15.1(2)SG4 |
|
Known Fixed Releases: | 15.2(4)E, 15.2(4.0.72)E, 15.2(4.0.75a)E, 15.2(5.0.10)E, 3.8(0)E |
|
|
| |
没有评论:
发表评论