Cisco Blog » The Platform

2015年11月1日星期日

Cisco Notification Alert -4500 Series Switch-01-Nov-2015 17:49 GMT

 

 

 

 

 

 

 


Known Bugs - Catalyst 4500 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuu40317
Title:
Applying Medianet to interface bypasses SA Miss queue on 4500
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Using Medianet on L2 trunks, we see unknown unicast flooding because MACs are not being learned on interfaces that medianet is configured. When medianet is applied, the SA MISS CPU queue does not increment but medianet CPU queue does.

Conditions:
3.6.0 4500 Sup8 using medianet on the interface, where the medianetMonitor has a match-all criteria specified

Workaround:
For medianet configure a policy with a criteria other than a match-all. Preferably the MediaMonitor policy should match specific flows , that are of interest.

Further Problem Description:
Impacts 4500e and 4500es8 switches

Last Modified:
12-OCT-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases: *
15.2(2)E3, 15.2(3)E2, 15.2(4)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(4.10.62)PI5, 3.6(3)E, 3.7(2)E
Alert Type:
Updated *
Bug Id:
CSCuv22441
Title:
Cannot match cos in 3.7.0 Lanbase
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch(config-cmap)#match ?
access-group Access group
any Any packets
ip IP specific values
not Negate this match result
protocol Protocol

Conditions:
4500 Running 3.7.X with LANBASE license

Workaround:
Downgrade to 3.6.X or upgrade license

Further Problem Description:

Last Modified:
08-OCT-2015
Known Affected Releases:
3.7(0)
Known Fixed Releases: *
15.2(4)E, 15.2(4.0.61)E, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCuu42267
Title:
vstack status shows duplicate entries for a single PID
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Switch#sh vsta group custom detail
No custom group configured
ESC-HUB304#sh vsta status
SmartInstall: ENABLED

Status: Device_type Health_status Join-window_status Upgrade_status
Device_type: S - Smart install N - Non smart install P - Pending
Health_status: A - Active I - Inactive
Join-window_Status: a - Allowed h - On-hold d - Denied
Image Upgrade: i - in progress I - done X - failed
Config Upgrade: c - in progress C - done x - failed
Script Upgrade: p - in progress P - done F - failed
Director Database:
DevNo MAC Address Product-ID IP_addr Hostname Status
===== ============== ================= =============== ========== =========
0 7426.aca4.8e40 WS-C4507R+E 10.1.22.1 3560-CG Director
1 04c5.a442.8300 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S A a C <--- duplicate
2 04c5.a442.9b00 WS-C3560CG-8PC-S 10.1.22.5 3560-CGS A a C
3 04c5.a442.8380 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S I a <---- duplicate

Conditions:
4500 running 3.7.2 as the director switch for smart-install

Workaround:

Further Problem Description:

Last Modified:
28-OCT-2015
Known Affected Releases:
3.6(2)
Known Fixed Releases: *
15.2(4)E, 15.2(4.1.5a)E, 15.2(4.1.6)E, 15.2(5.0.42)E, 3.8(0)E
Alert Type:
Updated *
Bug Id:
CSCuv15639
Title:
4500 sup8 dot1x unauthorized state during reauthentication due to macro
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On c4510RE with SUP8 switch if we have cisco-av-pair=autosmartport attribute sent in the Radius Access-Accept packet and re-authentication is enable attached computers are losing network access. The port that the host is connected to goes into the 'Unauthotized' state. The issue does not happen every time, however, after 2 to 3 attempts it has been seen.

The smart port macro mentioned in this av-pair does not need to exist on the switch (it can be a dummy 'do nothing' macro as well), sending the attribute is the triggering of this behavior.

The same configuration on a 4500 switch with SUP7 does not trigger the issue.

Conditions:
Radius Access-Accept packet includes the cisco-av-pair=autosmartport attribute.

Workaround:
None

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
08-OCT-2015
Known Affected Releases:
15.2(2.0.0), 3.6(0)
Known Fixed Releases: *
15.2(2)E3, 15.2(4)E, 15.2(4.0.53)E, 15.2(4.0.64a)E, 3.6(3)E
Alert Type:
Updated *
Bug Id:
CSCut87080
Title:
Frequent Fan Alarm: Fan of power supply 1 has failed
Status:
Fixed
Severity:
4 Minor
Description: *

Symptom:
Following messages seen on the device.

Dec 25 19:43:14.004 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 1 has failed
Dec 25 19:43:19.004 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 1 is okay
Mar 5 17:23:12.972 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed
Mar 5 17:23:17.972 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay
Mar 11 17:55:33.340 HKG: %C4K_IOSMODPORTMAN-4-POWERSUPPLYFANBAD: Fan of power supply 2 has failed
Mar 11 17:55:38.340 HKG: %C4K_IOSMODPORTMAN-6-POWERSUPPLYFANGOOD: Fan of power supply 2 is okay

Conditions:
None

Workaround:
None

Further Problem Description:
These messages are cosmetic

Last Modified:
23-OCT-2015
Known Affected Releases:
15.1(2)SG4
Known Fixed Releases:
15.2(4)E, 15.2(4.0.72)E, 15.2(4.0.75a)E, 15.2(5.0.10)E, 3.8(0)E

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论