Cisco Blog » The Platform

2015年11月1日星期日

Cisco Notification Alert -Nexus 7000 Series Switch-01-Nov-2015 17:49 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - Nexus 7000 Series Switches

Title:
End-of-Sale and End-of-Life Announcement for the Cisco Nexus 7000 M1-Series (XL Version) I/O Modules
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco Nexus 7000 M1 Series (XL Version) I/O Modules. The last day to order the affected product(s) is October 30, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
30-OCT-2015

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 10-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 4-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 18-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7700 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 6-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7700 2-Slot Switch
Software Type:
NX-OS System Software
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7700-s2-dk9-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7700-s2-dk9.7.2.1.D1.1.bin
File Description:

Nexus 7700 Supervisor 2 System Software Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 18-Slot Switch
Software Type:
NX-OS Kick Start
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-kickstart.7.2.1.D1.1.bin
File Description:

Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Alert Type:
New File
File Name:
n7000-s2-kickstart-npe.7.2.1.D1.1.bin
File Description:

No Payload Encryption (no CTS) Nexus 7000 Supervisor 2 Kick Start Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 7000 Series Switches

Product Name:
Nexus 7000 9-Slot Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.2(1)D1(1)
Alert Type:
New File
File Name:
n7000-s2-epld.7.2.1.D1.1.img
File Description:

Nexus 7000 Supervisor 2 EPLD Image for 7.2(1)D1(1)

File Release Date:
28-OCT-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 7000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuv37216
Title:
Callhome messages via HTTP transport is not sent due to L3VM error
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Callhome messages vis HTTP transport not sent due to l3vm_get_context_id failing.

Conditions:
Try sending any call home message thru http transport.

Workaround(s):
None.

Workaround:
None.

Further Problem Description:
None.

Last Modified:
02-OCT-2015
Known Affected Releases:
7.3(0)SLN(0.28)
Known Fixed Releases: *
7.3(0)D1(0.98), 7.3(0)PDB(0.57), 7.3(0)SL(0.109), 7.3(0)SL(0.85), 7.3(0)ZD(0.112)
Alert Type:
Updated *
Bug Id:
CSCut29799
Title:
Privilege escalation with o+w files and directories
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms:
Cisco NX-OS based devices contain a number of files and directories that are assigned weak file permissions. This could allow an attacker that was able to gain access to the
underlying operating system to view or modify certain files that should be restricted.

Conditions:
Nexus devices running an affected version of NX-OS Software.

Workaround:
None.

Further Problem Description:

Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.7/1.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C&version=2.0

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
30-OCT-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases: *
7.0(0)HSK(0.392), 7.3(0)D1(0.69), 7.3(0)DX(0.4), 7.3(0)PDB(0.11)
Alert Type:
Updated *
Bug Id:
CSCue06708
Title:
FEX ports in SDP timeout/SFP Mismatch 6.1.3.S35
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
SDP Timeout / SFP Mismatch error is seen on interface when trying to bring up FEX fabric ports in a port channel on N7K. This occurs only sometimes when FEX fabric port configurations are changed or re-applied to the ports on the N7K. After this bug appears the ports cannot be brought back to an "up" state. The member links of the port channel that are effected seem to be random.

Conditions:
Occurs on release 6.1(3). Has been seen using F248XP line cards with FET-10G transceivers on both the N7K and the FEX. Recommended configurations applied on the N7K ports that serve as an uplink to the FEX.

Workaround(s):
In dual-supervisor setups, a system switchover has been found to correct the problem. A reload of the entire chassis can also fix the problem. Flapping the ports, reloading the VDC, and removing and re-applying configurations has not been found to be a work-around.

Workaround:
Reload the FPC

More Info:

Last Modified:
28-OCT-2015
Known Affected Releases: *
6.1(3)S35
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw25153
Title:
Traffic loss during HSRP Recovery
Status:
Fixed
Severity:
2 Severe
Description: *

HSRP is configured on 2 Nexus 7700, one is active and the other one is standby.
When the link on the active one is down, the standby one will take over the role of the active one. However, after the link is up, when the original active one try to take back the role, there will be a traffic loss of more than 1s. This issue occurs once in 30 trials.

Symptom:
HSRP is configured on 2 Nexus 7700, one is active and the other one is standby.
When the link on the active one is down, the standby one will take over the role of the active one. However, after the link is up, when the original active one try to take back the role, there will be a traffic loss of more than 1s. This issue occurs once in 30 trials.

Conditions:
Hsrp sessions over BFD and we need to keep on doing shut and no shut

Workaround:
No workaround is there for the drop. Its random.

Further Problem Description:

Last Modified:
23-OCT-2015
Known Affected Releases:
6.2(13)S8, 7.2(0)D1(1)
Known Fixed Releases:
7.3(0)IB(0.95)
Alert Type:
Updated *
Bug Id:
CSCuw49523
Title:
6214a: VACL not h/w programmed
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When VACL is applied to VLAN which has RACL applied on same SVI, VACL could not be applied.

Conditions:
Same VLAN has RACL applied on the SVI before VACL is applied.

Workaround:
Apply VACL first, then apply RACL on SVI.

Further Problem Description:

Last Modified:
23-OCT-2015
Known Affected Releases:
6.2(14a)S2, 7.3(0.83)
Known Fixed Releases: *
6.2(14a)S7
Alert Type:
Updated *
Bug Id:
CSCut17793
Title:
SSTE:Traffic loss observed after flapp mpls interf with 7.2(0)D1(0.422)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Few VPLS PWs are down

Conditions:
Flap MPLS interface used by PWs

Workaround:
clear l2vpn service all

Further Problem Description:

Last Modified:
22-OCT-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.484)
Known Fixed Releases: *
15.5(1)S1.5, 15.5(1)S2.15, 15.5(1)S2.7, 15.6(0.16)S, 15.6(0.17)PI30d, 15.6(0.25)T, 15.6(1.1)T, 15.6(1.3)S, 7.0(0)BZ(0.71), 7.0(0)FHS(0.23)
Alert Type:
Updated *
Bug Id:
CSCut25162
Title:
VPLS VC's don't come after delete/add VFI's in EFP scale setup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Few VPLS PW's remain down

Conditions:
With L2VPN VFI's scaled, delete all VFIs and Re-add all VFI's.

Workaround:
clear l2vpn service vfi all

Further Problem Description:

Last Modified:
22-OCT-2015
Known Affected Releases:
7.2(0)D1(0.422), 7.2(0)D1(0.430)
Known Fixed Releases: *
15.5(1)S0.17, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)S2.15, 15.6(0.16)S, 15.6(0.17)PI30d, 15.6(0.25)T, 15.6(1.1)T, 15.6(1.3)S
Alert Type:
New
Bug Id:
CSCuw59604
Title:
itd: sh run service does not show nodes, when configuring 32 nodes...
Status:
Open
Severity:
2 Severe
Description:

Symptom:
with scaled nodes of 256 show command shows only partial outputs does not include all nodes for display ,
display of show running services would not show all nodes and details .

Conditions:
scaled nodes upto max per service

Workaround:
configure lesser nodes ( 2 per service) than max limit for each service .

Further Problem Description:
with scaled nodes of 256 show command shows only partial outputs does not include all nodes for display ,

Last Modified:
13-OCT-2015
Known Affected Releases:
7.2(1)D1(0.93)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw62003
Title:
doing takeover in sequence for both instance old primary is not updated
Status:
Open
Severity:
2 Severe
Description: *

Symptom:Doing takeover in sequence for both instance old primary is not updated for MST instance.

Conditions:
Apply takeover for both the instance one after another immediately.
Workaround:
Separately they are working fine. No issues.
More Info:

Last Modified:
12-OCT-2015
Known Affected Releases:
7.2(1)D1(0.68), 7.3(0)D1(0.118)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw39581
Title:
OSPF sessions flap seen when scaled upto 1000 sessions.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OSPF session flap continuously when configured in 1000 sub-interfaces between 2 routers back to back.

Conditions:
OSPF running in 1000 sub-interfaces between 2 routers back to back:

Box bring up.
Interface flap.
Reload.

Workaround:
"timers throttle lsa 50 5000 15000" in router ospf mode.

Further Problem Description:

Last Modified:
10-OCT-2015
Known Affected Releases:
7.2(1)D1(0.82), 7.3(0)D1(0.98)
Known Fixed Releases: *
7.2(1)D1(1), 7.3(0)IB(0.87)
Alert Type:
Updated *
Bug Id:
CSCuw39946
Title:
MAC learnt on non existent F2e port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
MAC address learnt on a non existent port

Conditions:
Seen when a loop occurs and multiple mac flaps were seen. While this happens, if the port-channel is deleted, the process responsible for mac learning still believes the interface exist

Workaround:
create the port-channel again and issue clear mac address-table and then delete the port-channel

Further Problem Description:

Last Modified:
10-OCT-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)PDB(0.79)
Alert Type:
Updated *
Bug Id:
CSCuw50467
Title:
F3 module drops to failure state after ISSU
Status:
Fixed
Severity:
2 Severe
Description:


Symptom:

After ISSU a LC drops to failure state. "sh system reset-reason module" lists the reason as "elo_io hap reset => [Failures < MAX] : powercycle"

Conditions:

ELOAM must be configured and running on the LC while the ISSU occurs.

Workaround:

Remove all ELOAM config before the ISSU and then reapply afterwards.

Last Modified:
08-OCT-2015
Known Affected Releases:
7.3(0)D1(0.112)
Known Fixed Releases: *
7.3(0)D1(0.122)
Alert Type:
New
Bug Id:
CSCuw51463
Title:
HSK: %SYSMGR-2-SERVICE_CRASHED: Service "vpc_config_sync"
Status:
Open
Severity:
2 Severe
Description:

Symptom:
config-sync service is crashed

Conditions:
change mode of phy vpc from active to passive

Workaround:
mode should be active

Further Problem Description:

Last Modified:
07-OCT-2015
Known Affected Releases:
7.3(0)D1(0.105), 7.3(0)D1(0.111)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv42308
Title:
MST Disputes VPC peer-switch secondary peer sending cost of 250
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
STP/MST disputes downstream from vPC domain with peer-switch

Conditions:
vpc peer-switch configured, this was noticed with MST, unaware if it also affects PVST

Workaround:
Remove "peer-switch" from secondary peer sending incorrect root cost value and re-add peer-switch

Further Problem Description:
If this is encountered, please gather the following from both N7K's and engage TAC:

# show tech detail
# show tech vpc
# show tech stp
# show tech l2fm detail

Last Modified:
07-OCT-2015
Known Affected Releases:
6.2(12)
Known Fixed Releases:
6.2(14a)S2, 6.2(14a)S3, 7.3(0)PDB(0.69)
Alert Type:
New
Bug Id:
CSCuu58533
Title:
Support to enable hw-offload on any VDc's
Status:
Fixed
Severity:
2 Severe
Description:


Symptom:BFD hw-offload cannot be enabled on switch with admin vdc

Conditions:BFD configurations are not allowed from Admin VDC

Workaround:Configure BFD hw-offload from Default VDC

More Info:


Last Modified:
07-OCT-2015
Known Affected Releases:
7.1(0)D1(0.196), 7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.30), 7.2(1)ZD(0.25)
Alert Type:
New
Bug Id:
CSCuu02335
Title:
NVT: Console stuck for 2 mins while deleting each port channel with BFD
Status:
Fixed
Severity:
2 Severe
Description:


Symptom:Console stuck for 2 mins while deleting PC interface with BFD and BGP.

Conditions:While deleting PC interface, with BFD and BGP, console stuck for 2 mins.

Workaround:Remove BFD with "no bfd" config on PC interfaces before deleting those interfaces.

More Info:


Last Modified:
07-OCT-2015
Known Affected Releases:
7.2(0)D1(0.471)
Known Fixed Releases:
7.2(1)D1(0.57), 7.2(1)ZD(0.50)
Alert Type:
Updated *
Bug Id:
CSCuo12464
Title:
Titanium: igmp packets looping within a DFA fabric
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
igmp packets looping within a DFA fabric

Conditions:
CPU 100% busy

Workaround:
no

Further Problem Description:
bgp lose connection due to cpu busy.

Last Modified:
07-OCT-2015
Known Affected Releases:
7.1(0)D1(0.43)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.0(1)ZD(0.184), 7.0(1)ZN(0.304), 7.0(3)N1(0.42), 7.0(3)N1(1), 7.1(0)BF(0.85), 7.1(0)D1(0.171), 7.1(0)FC(0.2)
Alert Type:
Updated *
Bug Id:
CSCus58902
Title:
It is possible to install a back door on a fully compromised device
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:If the admin user is able to reach the underlying OS shell, it migh be possible to create a fully functional operating system account that could
have unlimited access to the underlying operating system.

Conditions:Requires to have already full administrative access to the device and the existence of a separate bug that would allow the administrator to access the
underlying operating system shell

Workaround:None

More Info:This is a generic attack type, not a vulnerability in the software.
The proper way to prevent the attack is to prevent the conditions that allow an attacker to gain access to the device and to the unerlaying operating system shell.



Last Modified:
05-OCT-2015
Known Affected Releases:
7.2(0)ZN(0.36)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCud54797
Title:
cli enhancements for tls
Status:
Fixed
Severity:
2 Severe
Description:

This is an enhancement.

Last Modified:
04-OCT-2015
Known Affected Releases:
6.2(0)OP(0.49)
Known Fixed Releases: *
15.1(1)ICA4.122, 15.2(1)IC273.5, 15.2(2.4.11)EA, 15.2(2.6.89)EA, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1.14)PI22c, 15.3(2.2)T, 15.3(2.3.1)CG
Alert Type:
New
Bug Id:
CSCuw51522
Title:
Mac learnt on ES ID for host vpc+ port operating in individual mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On a pair of nexus 7000 series switches configured for fabricpath vpc+, the mac address for an host vpc+ operating in individual mode may point to an incorrect interface on the non-parent nexus 7000, either pointing to the local vpc+ leg that is down, or to the fabricpath address for the emulated switch (ES ID.1.65535). Traffic destined for devices behind the host vpc+ ingressing the non-parent nexus 7000 will not reach its destination.

Conditions:
- This is seen in a host vpc+ configuration, a port-channel configured for vpc made of HIF interfaces residing on seperate FEXes, each connected to a single parent nexus 7000
- The port is running in standalone mode allowed by the configuration of no lacp suspend-individual on the port-channel and the absence of lacp configuration on the attached system.

Workaround:

Further Problem Description:

Last Modified:
03-OCT-2015
Known Affected Releases:
6.2(14), 7.2(0)D1(1)
Known Fixed Releases:
7.2(1)D1(0.99), 7.2(1)ZD(0.90)
Alert Type:
Updated *
Bug Id:
CSCur57084
Title:
FEX Core Fails to Upload in Non-default VDC - No Workaround on NPE Image
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Nexus 2000 may fail to copy the core file to the Nexus 7000 during a crash but continues to try over and over:

N7k-2 SYSMGR-FEX101-3-CORE_OP_FAILED Core operation failed: send_msg_to_ccdmon: Could not send to CORE_DMON return -1 errno 32
N7k-2 SYSMGR-FEX101-5-SUBPROC_TERMINATED "System Manager (core-client)" (PID 1903) has finished with error code SYSMGR_EXITCODE_CORE_CLIENT_ERR (11).

Conditions:
When the Nexus 2000 connected to a non-default VDC crashes.

Workaround:
Contact Cisco TAC.

Further Problem Description:
Fix is present starting in 7.2. Issue exists in all releases prior to 7.2.

Last Modified:
05-OCT-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases:
7.0(0)BZ(0.46), 7.0(0)FHS(0.23), 7.0(0)HSK(0.395), 7.0(0)KM(0.119), 7.0(0)KMS(0.11), 7.0(2)FIP(0.19), 7.1(0)AV(0.74), 7.1(0)ES(0.7), 7.1(0)IB(122), 7.1(0)SIB(99.109)
Alert Type:
Updated *
Bug Id:
CSCum47367
Title:
Cisco NX-OS Software TACACS+ Command Authorization Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A vulnerability in TACACS command authorization code of Cisco NX-OS could
allow an authenticated, local attacker to execute certain commands without
being authorized by TACACS server.

The vulnerability is due to processing of certain commands when they are
executed in a sequence. An attacker could exploit this vulnerability by
executing multiple commands in a sequence. An exploit could allow the
attacker to execute certain commands without being authorized by TACACS
server.

Conditions:
The vulnerability happens when the device is configured for TACACS
command authorization.

Workaround:
Assigning the TACACS+ users to a read-only role through authorization, will block all configuration changes that bypass TACACS+ authorization.
Assigning the TACACS+ users to a role that is unable to run any commands, will block all commands the bypass TACACS+ authorization.



Only TACACS+ authorization is affected. Both authentication and accounting are unaffected.
network-operator and vdc-operator are system-generated roles with read-only permissions.
The following configuration example will create a role named remoteuser with no access to run any commands:
role name remoteuser
rule 1 deny command *


PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=&version=2.0
dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:W/RC:C
CVE ID CVE-2014-0676 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0676

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:


Last Modified:
30-OCT-2015
Known Affected Releases:
5.1(5), 6.1(4), 6.2(2)
Known Fixed Releases: *
5.2(1)N1(7.125), 5.2(1)N1(8), 6.0(2)A4(0.760), 6.0(2)A4(1), 6.0(2)U4(0.760), 6.0(2)U4(1), 6.1(2)I3(2.18), 6.1(2)I3(3), 6.2(10), 6.2(10)FM(0.28)
Alert Type:
Updated *
Bug Id:
CSCus61895
Title:
MPLS:Inconsistent routes with MPLS in 6.2.12.S26
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Routes going over mpls next-hops may be falsely reported as "inconsistent in software".

Conditions:
Routes going over mpls next-hops may be falsely reported as "inconsistent in software".

Workaround:
none

Further Problem Description:
Routes going over mpls next-hops may be falsely reported as "inconsistent in software". This does not impact traffic, rather is a false +ve that may be ignored.

Last Modified:
05-OCT-2015
Known Affected Releases:
6.2(12)S26, 7.2(1)D1(0.49)
Known Fixed Releases: *
7.3(0)PDB(0.74)
Alert Type:
New
Bug Id:
CSCuw52384
Title:
skywalker: N7K clear cores results in error message
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
with skywalker REL_8_3_0_CV_0_155_S0 on N7K, clear cores result error message

Conditions:
error message observed when doing "clear cores"

Workaround:
no workaround

Further Problem Description:

Last Modified:
04-OCT-2015
Known Affected Releases:
8.3(0)CV(0.155)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui15370
Title:
Intermittent CHASSIS-PS_INTR failure Emerson PS across all corners
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
During the diag test CHASSIS-PS_INTR test failure is seen intermittently across all corner conditions.

Conditions:
Diag Image Used:
diag-sup3dc3-el-6.2.0.238d1.046.gbin
diag-n7k-6.2.0.238d1.046.mzg

Failing Corners:
Failure seen at NT/NV, HT/NV, and LT/NV

Workaround:
Test was skipped to avoid further failure since the fix is not available at this time.

Further Problem Description:

Last Modified:
30-OCT-2015
Known Affected Releases:
6.2(0.302)S24
Known Fixed Releases: *
6.2(10)FM(0.3), 6.2(8)KR(0.8), 6.2(8)TS(0.28), 6.2(8.9)S0, 6.2(9)FM(0.73), 7.0(0)KM(0.64), 7.3(0)DX(0.4), 7.3(0)TSH(0.4)
Alert Type:
Updated *
Bug Id:
CSCty67801
Title:
SVI should not be allowed for vpls vlan
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
This is a feature request for SVI, where SVI creation has to fail if VFI is configured under a vlan, and vice-versa, VFI configuration under a vlan has to fail if corresponding SVI is created.

Conditions:
If both SVI and VFI are configured for a vlan at the sam time.

Workaround(s):
User has to be careful not to configure both SVI and VFI for a vlan at same time.

Workaround:
User has to be careful not to configure both SVI and VFI for a vlan at same time.

Further Problem Description:

Last Modified:
12-OCT-2015
Known Affected Releases:
5.2(0)LV1(0.274), 6.2(1.125)S6
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)D1(0.232), 7.1(0)NF(0.32), 7.1(0)OTT(0.27), 7.1(0)PDB(0.166), 7.3(0)PDB(0.80)
Alert Type:
Updated *
Bug Id:
CSCuw16936
Title:
N7K - Removing/Adding tunnel dest. throws %LDP-3-OIM_SDB_OPEN: Error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When removing or adding GRE tunnel destination ip address, the following error message is getting displayed.

%LDP-3-OIM_SDB_OPEN: Error opening volatile:/dev/shm/4/oim_sdb_info, error - 0x0 (ksink_sdb_open() failed) in oim_api_init()

Tue Aug 25 19:02:04 2015:type=update:id=10.110.252.121@pts/0:user=SVC-UDC-PSC:cmd=configure terminal ; interface Tunnel143 ; tunnel source 10.1.15.10 (SUCCESS)
Tue Aug 25 19:02:05 2015:type=update:id=10.110.252.121@pts/0:user=SVC-UDC-PSC:cmd=configure terminal ; interface Tunnel143 ; tunnel destination 10.110.241.155 (SUCCESS)
2015 Aug 25 19:02:05.158 m-awvpdc01-nsw-udc-n7k01-vdc03 %LDP-3-OIM_SDB_OPEN: Error opening volatile:/dev/shm/4/oim_sdb_info, error - 0x0 (ksink_sdb_open() failed) in oim_api_init()

Conditions:
The OIM service must not be running.

Workaround:

Further Problem Description:

Last Modified:
02-OCT-2015
Known Affected Releases:
6.2(10), 6.2(12)
Known Fixed Releases: *
7.3(0)OTT(0.49)
Alert Type:
New
Bug Id:
CSCuv93032
Title:
eVPC: dual-homed FEX goes offline when reloading one of the eVPC peers
Status:
Open
Severity:
3 Moderate
Description:

The behaviour is an expected behaviour when none of the hif ports are up.

Symptom:
dual-homed FEX goes offline when reloading one of the VPC peers

Conditions:
reload one of the peers

Workaround:
none

Further Problem Description:
none

Last Modified:
13-OCT-2015
Known Affected Releases:
7.2(0)D1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu41125
Title:
LSA are present after configuring "area 1 range not-advertise"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Component LSA's are present after configuring "area range not-advertise"

Conditions:
After configuring "area range not-advertise"

Workaround:
None

Further Problem Description:

Last Modified:
16-OCT-2015
Known Affected Releases: *
7.3(0)ZN(0.49), 7.3(0.1), 8.3(0)CV(0.162)
Known Fixed Releases:
7.3(0)IB(0.11)
Alert Type:
Updated *
Bug Id:
CSCup43718
Title:
EOBC link failure on Multiple Modules due to standby SUP kernel crash
Status:
Other
Severity:
3 Moderate
Description: *

Symptom:
EOBC link failure on Multiple Modules due to standby SUP kernel crash

MODULE-4-MOD_WARNING Module 2 (serial: XXXX) reported warning due to EOBC link failure in device 10 (device error 0xc0005043)

KERN-2-SYSTEM_MSG node=4 sap=2619 desc=statscl_lib3053, rq=850(751400) lq=0(0) pq=0(0) nq=0(0) sq=0(0) buf_in_transit=0, bytes_in_transit=0 - kernel
KERN-2-SYSTEM_MSG node=4 sap=1 desc=MTS Sync Thread, rq=778(649294) lq=0(0) pq=0(0) nq=1(924) sq=0(0) buf_in_transit=0, bytes_in_transit=0 ? kernel

?? and eventually standby crashed:
SYSMGR-2-SYNC_FAILURE_MSG_PAYLOAD vdc 1: Failure from active SUP

Conditions:
Sup1 kernel crash

Workaround:
none

Further Problem Description:

Last Modified:
19-OCT-2015
Known Affected Releases:
5.1(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut18591
Title:
tshark: Segmentation Violation with IP Protocol 89 Capture Filter
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Ethanalyzer crashes with the following reason:

tshark: Child dump cap process died: Segmentation violation

Conditions:
Unknown at this time

Workaround:
None.

Further Problem Description:

Last Modified:
30-OCT-2015
Known Affected Releases:
6.2(10)
Known Fixed Releases: *
7.3(0)PDB(0.89), 7.3(0)PDB(0.93)
Alert Type:
Updated *
Bug Id:
CSCud81026
Title:
Build error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom: Compilation failed

Conditions: All

Workaround: None

Last Modified:
04-OCT-2015
Known Affected Releases:
6.2(0)OP(0.49)
Known Fixed Releases: *
15.1(1)ICA4.122, 15.2(1)IC273.5, 15.2(2.4.11)EA, 15.2(2.6.89)EA, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1.14)PI22c, 15.3(2.2)T, 15.3(2.3.1)CG
Alert Type:
Updated *
Bug Id:
CSCuu78360
Title:
Vlans not getting registered properly when mvrp configured with VPC
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When mvrp is configured with vpc, sometimes vlans may not get declared or registered.

Conditions:
The issue is triggered with following known conditions.

1. Flap the MCT and vPC in a quick succession. After few tries, the issue may be seen.

2. Change the access vlan of interface to different value. After few tries, the issue may be seen.

Note that the above list may not be exhaustive.

Workaround:
Enable/Disable MVRP on both peer switches resolves the issue.

Further Problem Description:

Last Modified:
27-OCT-2015
Known Affected Releases: *
7.2(0)D1(1), 7.3(0)D1(0.86)
Known Fixed Releases:
7.2(1)D1(0.43), 7.2(1)ZD(0.38)
Alert Type:
Updated *
Bug Id:
CSCuh72503
Title: *
F1 macs do not age out properly
Status: *
Terminated
Severity:
3 Moderate
Description:

Symptom:
In F1 card with VPC+, mac doesn't age out

Conditions:
F1 should have the VPC+ Peer Link

Workaround:
clear mac address-table dynamic address

Further Problem Description:

Last Modified:
28-OCT-2015
Known Affected Releases:
6.2(1.136), 6.2(1.143), 6.2(2), 6.2(5.45)S2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut41525
Title:
Rx span not happening with vlan as source
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When 2 vlans are configured as rx sources in a span session. the rx span from one of the vlans does not reach the destination port, debugged with asiic and driver team (vinay ) as a bad vqi, which is programmed in the span copy, due to DE_bypass bit set in the asiic span_SCT register.

Conditions:
When 2 vlans are configured as rx sources in a span session. the rx span from one of the vlans does not reach the destination port, debugged with asiic and driver team (vinay ) as a bad vqi, which is programmed in the span copy, due to DE_bypass bit set in the asiic span_SCT register.

Workaround:
no workaround

Further Problem Description:

Last Modified:
30-OCT-2015
Known Affected Releases:
7.0(0)HSK(0.373)
Known Fixed Releases: *
7.0(0)BZ(0.46), 7.0(0)HSK(0.381), 7.3(0)DX(0.4), 7.3(0)TSH(0.4)
Alert Type:
Updated *
Bug Id:
CSCuq12104
Title:
Mac-flap between vpc LID and FLID with same switch ID on F1
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%L2FM-4-L2FM_MAC_MOVE: Mac 0001.d7cc.e200 in vlan 254 has moved from 103.11.4514 to 103.11.65535

4514 is the vpc LID and 65535 (0xffff) is the Flood LID

vpc LID can be see in show vpc
show vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link

vPC domain id : 56
vPC+ switch id : 103
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
vPC fabricpath status : peer is reachable through fabricpath
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 consistency status : success
vPC role : primary
Number of vPCs configured : 3
Track object : 10
Peer Gateway : Enabled
Peer gateway excluded VLANs : -
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Fabricpath load balancing : Disabled

vPC Peer-link status
---------------------------------------------------------------------
id Port Status Active vlans
-- ---- ------ --------------------------------------------------
1 Po1 up 16-17,19-21,23,28,30-41,44-50,64-70,72,74,76,81-92
,96,112,128,132,165,200-201,224-227,248,254,274,37
4,401,474,700-703,901,951-955,998

vPC status
-------------------------------------------------------------------------------
id Port Status Consistency Reason Active vlans vPC+ Attribute
-- ---- ------ ----------- ------ ------------ --------------

256 Po256 up success success 16-17,19-21,2 DF: Yes, FP
3,28,30-41,44 MAC:
-50,64-70,72, 503.11.4514
74,76,81-92,9
6,112,128,132 ....

Conditions:
This is only for F1 modules.
This happens for source mac addresses which are incoming on vpc+

When the packet needs to be snooped by the CPU, we use the Flood LID 0xffff.
For eg: packets going to 224.0.0.1, dhcp snooping, etc

Workaround:
Disable the snooping for that feature.
For eg:
If igmp snooping is enabled then packets going to 224.0.0.1 will be snooped by CPU. So disable igmp snooping on that vlan. Note this may result flooding for multicast traffic in the vlan

Further Problem Description:
The packets coming into the CE ports for vpc+ should always take vpc LID. However, if the packets need to go to the supervisor for snooping, then sup will send the packet with Flood LID of 65535.

For eg: The packets going to 224.0.0.1 will be sent to the supervisor. The supervisor does not change anything in the packet: meaning the source-mac address and source-index still remains the same however, mim lid is now 65535 instead of vpc LID

This kind of packets will cause mac flaps. This issue should not impact forwarding.

However, if there are multiple hosts then it may impact l2fm process since there would be lot of churning.

Last Modified:
07-OCT-2015
Known Affected Releases:
6.2(6)
Known Fixed Releases: *
18.0(0.57278), 18.0(0.57365), 19.0(0.57378), 7.1(0)AV(0.38), 7.1(0)PDB(0.300), 7.2(0)D1(0.362), 7.2(0)D1(1), 8.3(0)CV(0.163)
Alert Type:
Updated *
Bug Id:
CSCud13458
Title:
VRRPv3 : Feature vrrpv3 is not removed from ADMIN VDC after migration
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After admin-VDC migration "feature vrrpv3" remains in the running-configuration of the admin-vdc.

Conditions:
Only occurs when "feature vrrpv3" is configured, and admin migration has been initiated.

Workaround:
After migration, perform the command "no feature vrrpv3".

Last Modified:
04-OCT-2015
Known Affected Releases:
6.2(1)
Known Fixed Releases: *
15.1(1)IC66.5, 15.1(1)ICA4.3, 15.1(1)ICB40.1, 15.2(1.1)PSR, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(2.11)S, 15.3(2.4)T, 15.3(3)JA100
Alert Type:
New
Bug Id:
CSCuw34945
Title:
Expected output is not seen for snmp query
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
An invalid SNMP query to the router is not returned by NO_SUCH_INSTANCE_EXCEPTION, but its parent value.

For example:
iox.0/0/CPU0/ $ getone -v2c 13.13.13.2 public enterprises.9.10.106.1.2.1.10.1
cpwVcID.10 = 110
iox.0/0/CPU0/ $ getone -v2c 13.13.13.2 public enterprises.9.10.106.1.2.1.10.1.10
cpwVcID.10.10 = 110 <<< This should be NO_SUCH_INSTANCE_EXCEPTION

Conditions:
The query is an invalid child of one of the PWMIB value.

Workaround:
N/A

Further Problem Description:

Last Modified:
06-OCT-2015
Known Affected Releases:
7.2(1)D1(0.54), 7.3(0)ZD(0.98)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv76460
Title:
Multicast counters getting rolled at 32 bit for IPMCAST-MIB
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When customer tries to do SNMP get on OID (OID 1.3.6.1.2.1.168.1.5.1.18) of the
IPMCAST-MIB value for counter is getting rolled over after 32 bits .

Conditions:

Workaround:
Not applicable

Further Problem Description:
The issue is seen for all 64 bits counter values

Last Modified:
05-OCT-2015
Known Affected Releases:
5.2(3a)
Known Fixed Releases:
7.3(0)RTG(0.81)
Alert Type:
Updated *
Bug Id:
CSCuu48646
Title:
snmpwalk on ccmHistoryStartupLastChanged always returns 0
Status:
Open
Severity:
4 Minor
Description:

Symptom:
snmpwalk on OID ccmHistoryStartupLastChanged always returns a zero irrespective of startup config getting modified

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
26-OCT-2015
Known Affected Releases: *
6.2(12), 7.3(0)ZD(0.99)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus53354
Title:
N7K-OFF-DIAG:Pescara N7K 100: DSH can't start all dsps in BB
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
some dsp can't startup automatcially.
It need more time.

Conditions:
NTNV

Workaround:
init group need be refined

Further Problem Description:

Last Modified:
30-OCT-2015
Known Affected Releases:
7.2(0)ZN(0.87)
Known Fixed Releases: *
6.2(10)CR(0.35), 7.0(0)BZ(0.46), 7.0(0)HSK(0.325), 7.1(320)MQ(0.60), 7.3(0)DX(0.4), 7.3(0)TSH(0.4)
Alert Type:
New
Bug Id:
CSCum71845
Title:
The Interface CRC_TX & Output_errors counter are set to 0
Status:
Open
Severity:
4 Minor
Description:

Symptom:
The FEX port is unable to report CRC error as output under the 'show interface' statistics and consequently the ifOutErrors will show zero for CRCs.


N7K# show interface Eth140/1/20 counters detailed | grep CRC
Output CRC Errors: 9349243


N7K# sh int eth140/1/20 | begin TX
TX
2400119045 unicast packets 4113508 multicast packets 29453184 broadcast packets
2443036010 output packets 808455945693 bytes
91758 jumbo packets
0 output error 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
65198 Tx pause
11 interface resets



snmpwalk -v1 -c private 172.21.25.241 ifName | grep 140/1/20
IF-MIB::ifName.529204416 = STRING: Ethernet140/1/20
snmpget -v1 -c private 172.21.25.241 ifOutErrors.529204416
IF-MIB::ifOutErrors.529204416 = Counter32: 0

Conditions:
no known conditions at this point.

Workaround:
no workaround.

Further Problem Description:

Last Modified:
28-OCT-2015
Known Affected Releases:
6.2(2)S9
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui44948
Title:
Both vPC peers keep resetting
Status:
Terminated
Severity:
4 Minor
Description: *


Symptom:Both vPC peer switches may reload.

Conditions:This was experienced after bringing up a VDC from a suspended state.

Workaround:None.


Last Modified:
30-OCT-2015
Known Affected Releases: *
6.1(4), 6.1(4)S26, 6.2(2)S33
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCub79046
Title:
N7K-OFF-DIAG: PescaraCB-100 development
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
for new product development

Conditions:
for new product development

Workaround:
pescaraCB-100 is a new product, we create this ID for new product development

Further Problem Description:

Last Modified:
30-OCT-2015
Known Affected Releases:
6.2(0.28)
Known Fixed Releases: *
6.2(0.225)S0, 6.2(0.237)S0, 6.2(0.240)S0, 6.2(0.273)S0, 6.2(0.282)S0, 6.2(0.287)S0, 6.2(0.293)S0, 6.2(0.294)S0, 6.2(0.298)S0, 6.2(5.7)S0
Alert Type:
Updated *
Bug Id:
CSCul84967
Title:
ingress qos policy in vlan programs TCAM entries in non-member linecards
Status: *
Other
Severity: *
6 Enhancement
Description:

Symptom:
QoS policy attached to VLAN in ingress direction programs the policy on the line cards which does not have any ports allocated on the current VDC.

Conditions:
This issue is seen on all M1/M1XL,M2 cards on the Nexus 7000 switch.
TCAM resources and QoS resources are allocated on the line cards which does not have any ports allocated on the current VDC.

Workaround:
None.

Further Problem Description:

Last Modified:
04-OCT-2015
Known Affected Releases:
6.2(5.65)S6, 7.3(0)D1(1A)
Known Fixed Releases:
6.2(10.21)S0, 6.2(12)FT(0.9)
Alert Type:
Updated *
Bug Id:
CSCuh10646
Title:
gibt-mvrp project collapse into Gibraltar
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
this is an internal tracking ID for a source code merge
Conditions:
not a bug, tracking ID
Workaround:
N/A
More Info:
N/A

Last Modified:
30-OCT-2015
Known Affected Releases:
6.2(5.7), 7.0(0.7)
Known Fixed Releases: *
7.0(0)KM(0.64), 7.0(0.8)S0, 7.0(1)ZD(0.3), 7.1(0)D1(0.14), 7.1(0)D1(0.15), 7.2(0)D1(1), 7.3(0)DX(0.4)
Alert Type:
Updated *
Bug Id:
CSCug64700
Title:
NX-OS parser: auto-complete functionality for certain QoS commands
Status:
Fixed
Severity:
6 Enhancement
Description:

Ability to auto-complete for certain commands

class-map

Symptom:
auto complete of acl names was not happening.

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
08-OCT-2015
Known Affected Releases:
5.2(3a)
Known Fixed Releases: *
7.3(0)D1(0.91), 7.3(0)EG(0.3), 7.3(0)FMD(0.9), 7.3(0)PDB(0.57), 7.3(0)RTG(0.64)
Alert Type:
Updated *
Bug Id:
CSCtj61892
Title:
N7K: BFD Echo needs modification to go through transparent firewall
Status:
Fixed
Severity:
6 Enhancement
Description: *

BFD Echo packets need modification to go through transparent firewall.

Last Modified:
11-OCT-2015
Known Affected Releases:
5.0(5)
Known Fixed Releases:
5.2(0.166)S0
Alert Type:
Updated *
Bug Id:
CSCur08416
Title:
NX-OS python allows users from one VDC to delete files from another VDC
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Cisco Nexus 7000 devices that have been configured with multiple Virtual Device Context (VDC) contain a privilege escalation vulnerability within the Python scripting subsystem
that could allow an authenticated, local attacker to delete files owned by a different VDC on the device.

The vulnerability exists due to incomplete privilege separation of the python scripting engine across multiple VDC's. This could allow an attacker with administrative privileges in a
specific VDC to remove files owned by a separate VDC. This could result in a denial of service condition on the affected device.

Conditions:
Cisco Nexus 7000 devices running an affected version of Cisco NX-OS software.

Devices configured for multiple Virtual Device Contexts.

Workaround:
Restrict access to python related commands to highly trusted users only via AAA policy.

Further Problem Description:
Credit:
Cisco would like to thank Jens Krabbenhoeft for discovering and reporting this vulnerability.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.6/4.4:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:N/I:C/A:N/E:F/RL:U/RC:C&version=2.0

CVE ID CVE-2015-4231 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
28-OCT-2015
Known Affected Releases:
6.2(8a)
Known Fixed Releases: *
7.3(0)ZD(0.155)
Alert Type:
Updated *
Bug Id:
CSCuv04106
Title: *
need "MAINTENANCE" as (special) reset-reason for GIR
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
while in Maintenance Mode, if the switch reloads because of any reason that is not part of handful that are covered under mmode today ,it should come back up in Maintenance mode.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
23-OCT-2015
Known Affected Releases:
7.2(0)D1(0.507)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论