Cisco Blog » The Platform

2016年1月1日星期五

Cisco Notification Alert -3850 Series Switch-01-Jan-2016 18:21 GMT

 

 

 

 

 

 

 


Field Notice - Catalyst 3850 Series Switches

Title:
Field Notice: FN - 64065 - Catalyst 3850 Switches Might Falsely Log Power Device Connect/Disconnect Messages - Workaround Available
Description:

Some Catalyst 3850 switches might log power device detected/removed log messages when there is no device connected. The logs might appear continuously.

Date:
18-DEC-2015

Find additional information in Field Notices

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48T-S Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-L Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-E Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24T-S Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-E Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-L Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-L Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-E Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48F-S Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-S Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24P-E Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48U-E Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-24U-S Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Catalyst 3850 Series Switches

Product Name:
Catalyst 3850-48P-L Switch
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Known Bugs - Catalyst 3850 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuw89782
Title:
WebUI: System UP time does not get displayed in webui
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On the controller GUI, the system UP time is not displayed

Conditions:
Login to controller GUI and go to the dashboard.
There is no way to see the system UP in the GUI

Workaround:
Use CLI 'show ver' to see the system UP time.

Further Problem Description:

Last Modified:
26-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases: *
16.2(0.218), 16.2(0.227)
Alert Type:
Updated *
Bug Id:
CSCuw55669
Title:
Crash is seen in iosd on switch and auth-mgr
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch with IOSD crashes in auth-manager with this symptom:

IOSD-EXT-SIGNAL: Segmentation fault(11), Process = EPM MAIN PROCESS

Conditions:
The system crashed due to stack overflow caused by loop calls between PI sanet and vlan group plugin on switch platform while dumping sanet trace messages in the case when handling dynamic vlan updates for a given vlan on standby switch.

Workaround:
None

Further Problem Description:

Last Modified:
24-DEC-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases: *
15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(5.0.38)E, 16.1(1.20), 16.2(0.217)
Alert Type:
Updated *
Bug Id:
CSCuw91252
Title:
Only 10 domain names supported in domain list for FQDN ACL DNS snooping
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Currently Only 10 domain names are supported in domain list for FQDN ACL DNS snooping but GUI is allowing 25 domain names.

There is no functional impact but traffic would be allowed for 10 domains only.

Conditions:
More than 10 Domain Names/URLs Configured through GUI.

Workaround:
Use 10 or less domain names through GUI configuration

Further Problem Description:

Last Modified:
20-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases: *
16.1(1.21)
Alert Type:
Updated *
Bug Id:
CSCua72199
Title:
NG3K-7.65: IPv6 (internal)RAs forwarded as mcast RAs to Wireless clients
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: Unsolicited RAs from the switch is forwarded as mcast RAs over the
air to the wireless clients. It should be a unicast packet. CAPWAP packet
header from the switch is populated with L2 MGID and not IPv6 RA MGID (L3)
and forwarded as multicast over air.

Conditions: This symptom is seen with Standalone Newton 48 with a couple of
APs and a couple of wireless clients with IPv6 enabled. IPv6 unicast routing
is enabled on the switch.

Workaround: There is no workaround.

Last Modified:
19-DEC-2015
Known Affected Releases:
15.0(7.65)EMP
Known Fixed Releases: *
15.0(1.0)UCT, 15.0(10.16)EMW, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EX, 15.0(2)EX1, 15.0(2)EX3, 15.0(2)EX4, 15.0(2)EX5, 15.0(2)EZ
Alert Type:
Updated *
Bug Id:
CSCus99367
Title:
3850 re-writes mobility capwap data packets with TTL 9
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
3850 re-writes mobility capwap data packets with TTL 9

Conditions:
3850 re-writes mobility capwap data packets with TTL 9. As a result any capwap data packets(DHCP/ARP etc) sent via mobility tunnel will have a TTL set to 9 which means these packets will not be able to make more than 9 hops.

In an environment where 3850 wlan is anchored to another WLC/Switch >9 hops away, clients will not be able to get DHCP IP.

Hardware affected: 3850/3650
Software versions impacted: 3.3.x, 3.6.0, 3.6.1, 3.6.2, 3.7.0, 3.7.1

5760 is not impacted by this issue

Workaround:
Shorten the path between the foreign and anchor or upgrade to fixed image(IOS-xe 3.7.2 or 3.6.3).

Further Problem Description:
None.

Last Modified:
17-DEC-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases: *
15.2(2)E3, 15.2(3)E2, 16.1.1, 3.6(3)E, 3.7(2)E, Denali-16.1.1
Alert Type:
Updated *
Bug Id:
CSCuw49457
Title:
SGT still present for client's STALE state after removing client IP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After configuring an IP-SGT mapping on the client, If connection to the peer device (with an interface with IP as in the mapping) is lost (STALE interface wrt to client), we still see the IP-SGT mapping on the client.

Conditions:

Workaround:
None

Further Problem Description:

Last Modified:
22-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases: *
16.1(1.23), 16.3(0.6)
Alert Type:
New
Bug Id:
CSCux26399
Title:
CWA config: Client gets disconnected when roaming b/w same subnet cntrlr
Status:
Open
Severity:
2 Severe
Description:

Symptom:
With CWA config client get disconnect when roaming b/w same subnet controller

Conditions:
When the client connected to a WLAN configured for central web-auth, and roams to another controller which is in same subnet. Then it goes to webauth-pending state.
Hence, credentials again need to be entered.

Workaround:
Change the controller to a different VLAN or change the WLAN client VLAN to a different VLAN than the other controller.

Further Problem Description:

Last Modified:
07-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut87285
Title:
MAC address being learnt on an individual Port-channel member interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
*MAC addresses flapping messages are being displayed on a 3850 stack of five switches running IOS 03.06.00SE.

* Some of the MAC addresses are seen on the port-channel interface and some other MAC addresses are seen on the port-channel member interfaces.

* Issue seems to be cosmetic at this point.

%SW_MATM-4-MACFLAP_NOTIF: Host 54ee.753a.4112 in vlan 999 is flapping between port Te1/1/3 and port Po32
%SW_MATM-4-MACFLAP_NOTIF: Host 54ee.753a.4112 in vlan 999 is flapping between port Te1/1/3 and port Po32
%SW_MATM-4-MACFLAP_NOTIF: Host a0a8.cd60.2944 in vlan 883 is flapping between port Te1/1/3 and port Po3

Conditions:
* 3850 stack of 5 switches.
* Switches version 03.06.00E
* On previous versions this behavior was not seen.

Workaround:
Disabling IPDT on trunk interface helped to decrease the number of MAC flaps being logged and increased the time it will take for a particular MAC to flap.

However, the flapping still occurs approximately every 15 minutes.

Further Problem Description:

Last Modified:
20-DEC-2015
Known Affected Releases:
15.2(2)E
Known Fixed Releases: *
16.1(1.21), 16.3(0.4)
Alert Type:
Updated *
Bug Id:
CSCuw94595
Title:
Tracebacks on bootup at "epm_vlan_name_insert_or_delete" w/200+ VLANs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Tracebacks are seen at the time of reload .

Conditions:
if more than 200 vlans are configured on the box, and box is brought up then these tracebacks are seen. They have no functionality impact.

Workaround:
Currently there is no way to disable these tracebacks if above scenario is run.

Further Problem Description:

Last Modified:
21-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases: *
16.1(1.21), 16.3(0.5)
Alert Type:
New
Bug Id:
CSCuw99028
Title:
Traceback@eedge_ial_vlan_load_balance_info_destroy_internal w/200 VLANs
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
Tracebacks are seen at the time of bootup .

Conditions:
if more than 200 vlans are configured on the box, and box is brought up then these tracebacks are seen. They have no functionality impact.

Workaround:
Currently there is no way to disable these tracebacks if above scenario is run.

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw38480
Title:
Intermittent CDP and traffic issue for random 10G SFPs upon OIR
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Hot swap of 10G SFPs will result in no traffic pass through even though link is up. Also, there is CDP neighbor data available.

Conditions:
Hot swap or OIR of 10G SFPs.

Workaround:
Shut/No shut on the interface will fix the problem.

Further Problem Description:
This issue is intermittent and is not specific to a 10G SFP type.

Last Modified:
08-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux16381
Title:
Tracebacks (%EVENTLIB-3-CPUHOG:Switch 1 R0/0:SMD:) seen intermittently
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
CPUHOG tracebacks "%EVENTLIB-3-CPUHOG:Switch 1 R0/0: smd: undefined:" observed in Security profiles scaled setup
No functionality impact observed

Conditions:
Security profile loaded on a 5-member 3850 stack

Workaround:
None

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux01125
Title:
MAC address once aged due to port-security ageing is not re-learnt
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
MAC address is not re-learnt after it gets removed when the aging timer expires.

Conditions:
switchport port-security aging <> needs to be configured. And the port should be enabled for port security and dot1x authentication.

Workaround:
none other than not configuring the aging command,

Further Problem Description:

Last Modified:
07-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw94006
Title:
Packet drop seen when IP source guard configured on trunk ports
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Packet drop seen when ip source guard configured on trunk ports.

Conditions:
when ip verify source is configured on trunk ports with dhcp snooping enabled on vlan.

Workaround:
No workaround. Condition observed when running automated scripts. Not observed when configured manually.

Further Problem Description:

Last Modified:
06-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw97933
Title:
Client should not associate to wlan mapped in ap-group when static ip configured
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When "dhcp required" attribute is configured under WLAN, client goes to RUN state with "static" ip address.

Conditions:
This happens if both ipv4 and ipv6 addresses are "Statically" configured on the client.

Workaround:
Remove "static" ipv6 address from Client config. Feature works fine for ipv4 address handling.

Further Problem Description:

Last Modified:
06-DEC-2015
Known Affected Releases:
Denali-16.1.1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw29304
Title: *
Cat3850: IFM-3-LE_ERROR/IFM-3-IFB_ERROR after switch reload/failover
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Catalyst 3850 (stack or standalone) may report following errors with tracebacks during boot up after failover/reload:
%IFM-3-LE_ERROR: 1 fed: IFM encountered a LE error. Client LE allocation failed.
%IFM-3-IFB_ERROR: 1 fed: IFM encountered an IFB error. Interface block init failed.

Conditions:
Catalyst 3850 or 3650 running 3.6.x or 3.7.x releases.
AND
Interfaces are enabled with Dot1x authentication

Workaround:
None

Further Problem Description:

Last Modified:
29-DEC-2015
Known Affected Releases: *
15.2(2)E1, 15.2(3)E
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw65143
Title:
Cannot capture egress traffic on interface when ACL/SPAN are on same int
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Cannot capture egress traffic on an interface using embedded wireshark feature when there is a SPAN source port already configured

Conditions:
The problem is seen where there is a SPAN source port already configured on the interface, and the embedded wireshark feature is being used.

Workaround:
Do not have a SPAN source port configured for the same port as in use for embedded wireshark monitoring

Further Problem Description:

Last Modified:
06-DEC-2015
Known Affected Releases:
16.1(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui36124
Title:
3850 switch Input Queue size exceeds max threshold
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The Input queue size counter may exceed the max defined.

Switch#show int gi1/0/1
Input queue: 2227/10/0/0 (size/max/drops/flushes); Total output drops: 0

Conditions:
Cisco 3850 switch with processed switched traffic exceeding the input queue max threshold.

Workaround:
None.

Further Problem Description:

Last Modified:
28-DEC-2015
Known Affected Releases:
15.0(1.1)EX
Known Fixed Releases: *
15.2(1.1)PSR, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E
Alert Type:
Updated *
Bug Id:
CSCun58159
Title:
Enabling FIPS mode in CiscoSSL
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Security vulnerability for license related library usage needs to be enhanced

Conditions:
Customers facing security vulnerability focused around encryption/decryption needs to be further strengthened

Workaround:
CiscoSSL library APIs are used in 3.3x releases, which is updated to FIPS mode for further strengthening license related security, encryption and decryption.

Further Problem Description:
FIPS Feature has been added to 3.6x releases as a part of security enhancement.
Earlier versions were using MD5 which has been uplifted in 3.6x releases.

Last Modified:
24-DEC-2015
Known Affected Releases:
15.2(2.2.2)S
Known Fixed Releases:
15.2(2)E, 3.6(0)E
Alert Type:
Updated *
Bug Id:
CSCux05372
Title:
QoS - class-map counters not updating for each AP
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Customer adjusted the child qos values used on the PORT target to meet their site QoS need. But looking at the policy-map out, we noticed that "class VIDEO_SIGNALLING" conformed byte count is same for all the APs. But "class VOIP byte count increases/differs on each AP as expected.

class-map match-any VOIP
match dscp ef
class-map match-any VIDEO_SIGNALLING
match dscp af31
match dscp af41
match dscp cs3
!
policy-map port_child_policy
class VOIP
priority level 1
police rate percent 10
conform-action transmit
exceed-action drop
class VIDEO_SIGNALLING
priority level 2
police rate percent 20
conform-action transmit
exceed-action drop
class class-default
bandwidth remaining ratio 90

But from the output of "show policy-map interface wireless ap" we noticed that "class VIDEO_SIGNALLING" conformed byte count is same for all the APs. But "class VOIP byte count increases/differs on each AP as expected.
!
SW01BPTA10#show policy-map interface wireless ap
AP AP01BPTA10 iifid: 0x010137C000000009

Class-map: VIDEO_SIGNALLING (match-any)
police:
rate 20 %
rate 200000000 bps, burst 6250000 bytes
conformed 53915 bytes; actions:
transmit
exceeded 0 bytes; actions:
drop
conformed 0000 bps, exceeded 0000 bps
AP AP06BPTA10 iifid: 0x0102B3400000000F

Class-map: VIDEO_SIGNALLING (match-any)
police:
rate 20 %
rate 200000000 bps, burst 6250000 bytes
conformed 53915 bytes; actions:
transmit
exceeded 0 bytes; actions:
drop
conformed 0000 bps, exceeded 0000 bps

AP AP04BPTA10 iifid: 0x0104DBC00000000D

Class-map: VIDEO_SIGNALLING (match-any)
Priority Level: 2
police:
rate 20 %
rate 200000000 bps, burst 6250000 bytes
conformed 53915 bytes; actions:
transmit
exceeded 0 bytes; actions:
drop
conformed 0000 bps, exceeded 0000 bps
AP AP02BPTA10 iifid: 0x010779400000000B

Class-map: VIDEO_SIGNALLING (match-any)
police:
rate 20 %
rate 200000000 bps, burst 6250000 bytes
conformed 53915 bytes; actions:
transmit
exceeded 0 bytes; actions:
drop
conformed 0000 bps, exceeded 0000 bps

AP APWIPS01BPTA10 iifid: 0x0108F14000000016

Class-map: VIDEO_SIGNALLING (match-any)
police:
rate 20 %
rate 200000000 bps, burst 6250000 bytes
conformed 53915 bytes; actions:
transmit
exceeded 0 bytes; actions:
drop
conformed 0000 bps, exceeded 0000 bps

Conditions:
HW and SW:
WS-C3850-24U
03.06.02aE

class VIDEO_SIGNALLING conformed byte count is same for all the APs.

Workaround:
none

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux13746
Title:
Cat3850-24/48XS switches recognize transceivers wrongly upon bootup/OIR
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
Cat3850 XS switches (24 or 48 port) upon bootup or OIR would recognize transceivers incorrectly, or put them into err-disable mode.

Example: a GLC-SX-MMD would either be recognized as SFP-10G-SR.

Conditions:
The problem has been observed on version of code 03.07.02.E but could also be observed in other releases.

Workaround:
Restart the switch to clear this wrong condition.

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
15.2(3.7.2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw82382
Title:
3850 Not Honoring Netflow Cache Timeout Values
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
Netflow exporter is sending flows higher than configured flow timeouts.

Conditions:
flow record FlowRecordIn
match ipv4 tos
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
match interface input
match flow direction
collect transport tcp flags
collect counter bytes long
collect counter packets long
collect timestamp absolute first
collect timestamp absolute last
!
!
flow record FlowRecordOut
match ipv4 tos
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
match interface output
match flow direction
collect transport tcp flags
collect counter bytes long
collect counter packets long
collect timestamp absolute first
collect timestamp absolute last
!
!
flow exporter SEV1
destination 10.152.194.72
source Vlan240
transport udp 9996
!
!
flow monitor FlowMonitorIn
description Flexible Netflow Monitor Input
exporter SEV1
cache timeout inactive 900
cache timeout active 60
record FlowRecordIn
!
!
flow monitor FlowMonitorOut
description Flexible Netflow Monitor Output
exporter SEV1
cache timeout inactive 900
cache timeout active 60
record FlowRecordOut

Workaround:
None

Further Problem Description:
Customer reporting the problem with flows sent, because their tool request flows not larger than 60 seconds, otherwise the packets are dropped.

I tried to reproduce the issue on a CALO lab but I don't have any collector to receive the traffic on the customer's setup configuration.

Now they have this configuration on two devices:

flow monitor FlowMonitorIn
description Flexible Netflow Monitor Input exporter SEV1 cache timeout inactive 900 cache timeout active 60 record FlowRecordIn !
!
flow monitor FlowMonitorOut
description Flexible Netflow Monitor Output exporter SEV1 cache timeout inactive 900 cache timeout active 60 record FlowRecordOut

One 3850 and one 2911. The Cisco 2911 is working as desired the 3850 is sending up to 120 seconds active flows, hence their Collector is dropping the packets as they need to use no more than 60 seconds flow for the application to work.

I have captures that I can share with you for further assistance.

What is the TAC case number? 636523857.
Is there any plan to change for a more up-to-date version? Not sure, is the current one too old or not supported? The one is 03.03.02SE compiled around year and a half.
Is the problem caused by that records are exported after more than 60 sec? They are exported on time, but the duration within the flow entry is more than 60 seconds (up to 118sec seen on the capture) Did the customer try to tune active and inactive timers, especially change the inactive timer to 60? I will request this for testing propouses.

Last Modified:
05-DEC-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux14199
Title:
error "Command rejected: Bad VLAN list" when default interface config
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
unable to default the interface with port-security and interface mode in trunk.

Switch(config)#default interface gi3/0/48
Command rejected: Bad VLAN list - character #1 is a non-numeric
character ('a').
Interface GigabitEthernet3/0/48 set to default configuration

Conditions:
interface is configured for trunk mode along with port-security access mode configured.

interface GigabitEthernet3/0/48
switchport mode trunk <<<<<<<<<<<<<<<<<<<<<<<<<<<<<
switchport port-security maximum 3
switchport port-security maximum 2 vlan access <<<<<<<<<<<<
switchport port-security maximum 2 vlan 1

Workaround:
change the switchport mode to access and they delete the configuration one by one on the interface.

Further Problem Description:

Last Modified:
09-DEC-2015
Known Affected Releases:
15.2(3)E
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论