Cisco Blog » The Platform

2016年1月1日星期五

Cisco Notification Alert -ASR 1000 Series Router-01-Jan-2016 18:21 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - ASR 1000 Series Aggregation Services Routers

Title:
End-of-Sale and End-of-Life Announcement for the Cisco IOS XE 3.17S
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco IOS XE 3.17S. The last day to order the affected product(s) is June 14, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract. Click here for the French Version of this Bulletin.

Date:
15-DEC-2015

Find additional information in End-of-Sale and End-of-Life Products

Field Notice - ASR 1000 Series Aggregation Services Routers

Title:
Field Notice: FN - 64014 - ASR1006-X, ASR1009-X, and ASR1000-RP2 - RP2 CPLD Incompatible with New Chassis - RP2 CPLD Upgrade Required
Description:

An ASR1000-RP2 with an old Complex Programmable Logic Device (CPLD) (version earlier than 14111801) is not compatible with the new ASR1006-X or ASR1009-X chassis.

Date:
10-DEC-2015

Find additional information in Field Notices

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1001-universalk9_npe_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001-universalk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001-universal.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001-universalk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1002x-universal.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1002x-universalk9.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1002-X IOS XE UNIVERSAL

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.14.03.S.155-1.S3-std.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.14.03.S.155-1.S3-std.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
16-DEC-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
asr1001x-universalk9_npe_noli.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001x-universalk9.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_noli.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL W/O LI

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
asr1001x-universal.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
16-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-asr1k-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-asr1k-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Known Bugs - ASR 1000 Series Aggregation Services Routers

Alert Type:
Updated *
Bug Id:
CSCuj81174
Title:
unable to view pap information while debugging with customer
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
Show commands for pools are incomplete leading to inability to debug pool related issues in the field

Conditions:
This is a NAT related issue and only relevant with dynamic translations involving pools

Workaround:
This DDTS is needed in order to view complete pool state

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCuh91563
Title:
ucode crash on unconfiguting nat in cgn mode with nbar
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
ucode crash seen on unconifugring nat with nbar

Conditions:
Seen during a script run

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCtb25758
Title:
QPPB: Classification does not work
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
On the ASR1000 series, using QPPB to set qos-group and later match on qos-group does not work.

Conditions:
Using QPPB to set qos-group and later match on qos-group does not work.

Workaround:
None.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtg65016
Title:
CoPP causes drops of control packets (LCP echo request/reply) on ESP
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:

Control Plane Policy configuration prevents ASR-1k to process LCP Echo Request on the ESP. As a result, no LCP echo reply is sent back to the dialin customer .

Conditions:

Now this problem is only observed for PPPoEoA session.

Workaround:

No

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XNF2, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCsy96761
Title:
Netfow: ESP reload during toggling of egress netflow with large config
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
Removing netflow from the last/only interface may cause
the ASR1000 series ESP board to reload.

Conditions:
The defect is due to a race condition between the QFP ager logic vs. the
code which processes the ager shutdown administrative action.
If the ager shutdown code executes while the periodic ager function is
executing, the ager function may reuse the timer structure which is
subsequently freed as part of the ager shutdown.

Workaround:
The timing window can be reduced to near 0 by taking the
following steps:
- Configure netflow on an interface X with no traffic
- Deconfigure netflow from all other interfaces
- Wait for all entries in the netflow cache to be aged out
- Then deconfigure netflow from the inactive interface X

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCta04880
Title:
CPP crashes on removal of tunnel protection profile from GRE interface
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Basic Description
On the ASR1000 when running EoMPLSoGREoIPSec using an IPsec
protection profile on the GRE tunnel. If we unconfigure the IPsec profile from
the GRE tunnel interface and it is the last IPsec tunnel configured in the box,
ESP may reload.

Symptoms
This issue will cause all traffic being forwarded by ESP to be dropped and
the box will need to be reloaded for services to recover

Conditions
The problem can be seen if EoMPLS over GRE tunnel traffic is being
encrypted or decrypted on the ASR1000 with ESP20 with RP1.
The issue can also be seen with other type of config such as IPv6
IPsec SVTI config, EIGRP over DMVPN config.
This a pervasive issue and occurs frequently under common conditions
and configurations

Workaround
Configure a dummy IPsec tunnel with no peer. This way the in-use
IPsec tunnel will not be the last one to be removed in the box.




Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsx63929
Title:
FP reloads due to hardware Interrupt GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_V
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:

ASR1000 FP reloads with a QFP fatal interrupt: GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_VITAL_SW_ERR .

Conditions:

ASR1000 FP reloads when IP virtual fragment reassembly (VFR) is enabled on interface(s) and fragmented packets are relatively large. This is normally caused by MTU of the VFR enabled interface in the range of 4608 to 9216. A ping to/from the above interface may cause the issue.

Workaround:

Configure VFR enabled interface's MTU value to be 4470 or less.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(33)XNB3, 12.2(33)XNC
Alert Type:
Updated *
Bug Id:
CSCuv86324
Title:
IOS-XE voice gateway may crash while disabling SCCP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An IOS-XE running gateway may reload unexpectedly while disabling SCCP. The output of the "show version" command may display "Critical software exception" as the reload reason.

***Output shortened for brevity

------------------ show version ------------------

Cisco IOS XE Software, Version XX.XX.XX.S - Extended Support Release
Cisco IOS Software, ASR1000 Software (PPC_LINUX_IOSD-ADVENTERPRISEK9-M), Version XX.X(X)S, RELEASE
...
System returned to ROM by reload at --Timestamp--
System restarted at --Timestamp--
System image file is "bootflash:IOS_XE_filename.bin"
Last reload reason: Critical software exception, check bootflash:crashinfo_RP_00_00_20XXXXXX-XXXXXX-XXX
....

A core.gz and IOSd crashinfo file will be stored on the "bootflash" or "harddisk" depending on the model of the ASR.

Conditions:
The ASR must be running SCCP. Issuing the "no sccp" command will trigger the crash.

Workaround:
None.

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases: *
15.6(0.17)PI30e, 15.6(0.19)S, 15.6(0.19)T, 15.6(1.6)S, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCui17100
Title:
ASR1K : Ucode Crash seen with cc_oir in EVC-EoMPLS setup
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
FP reloads with the corefile reporting a GIF_CSR32_GIF_LOGIC_ERR_LEAF_INT__INT_FBLK_CNT_LOW interrupt.

Conditions:
This issue only applies to ASR1002-X, ESP100 and ESP200. This crash occurs when the the amount of available
QFP packet buffer memory falls below 3% of the total available. This can only happen if there is a combination
of heavy traffic and a flood of control packets. An example action that could cause a flood of control packets
is an OIR of the carrier card when using a scaled EVC-EOMPLS configuration.

Workaround:
No workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCui42826
Title:
ASR1K: fman_fp crash while sending traffic with 1K tunnels and routemaps
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
fman_fp crash seen with 1K tunnels and routemaps

Conditions:
while sending traffic with 1K tunnels and routemaps with ipv6 ACL

Workaround:
No workaround

More Info:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(2)S2, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh27266
Title:
ASR1K: No CPP core generated when FP crash
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
CPP core not generated when FP crash happen

Conditions:
Perform SPA OIR with Unicast/Multicast/Broadcast storm control on 32k EFPs

Workaround:
n/a

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj46330
Title:
ucode crash seen on disabling nat64 flow entry
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Both ESP may crash

Conditions:
while disabling flow entries with running traffic

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCul64664
Title:
packets are leaked when VC goes down
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
After VC goes down, that packets are received on xconnect interface are leaked.

Conditions:
-when VC goes down
-Unicast packet with TTL>=2 are received on that xconnect interface
-When having the route for the destination of the unicast packets

Workaround:
-remove the route from the routing table
-apply an ACL to deny these leaked packets

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(2)S1, 15.3(2)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuh87919
Title:
PuntPerCausePolicerDrops seen on LISP router
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Seeing PuntPerCausePolicerDrops on sending traffic through LISP router.

Conditions:
No traffic drops associated

Workaround:
none

Further Problem Description:
none

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh88723
Title:
Kingpin: PLIM Ingress classification doesn't work on Clearchannel-SPAs
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Plim Ingress classification doesn't work on Clearchannel-SPAs. High priority traffic will continue to be treated as normal traffic and flows in Low Priority queue.

Conditions:
With PLIM ingress classification, despite assigning "map ip dscp 16 - 31 queue strict-priority" traffic flows in Low Priority queue.

Workaround:
No work around

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj11722
Title:
ESP Crash when executing 'show platform packet-trace packet all'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ESP reload using packet-trace tool.

Conditions:
debug platform packet-trace enable
debug platform packet-trace packet 16
show platform packet-trace packet all

Workaround:
Display packets individually rather than all at once:
show platform packet-trace packet <0-8191>

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh80492
Title:
RP2: kernel_rp_RP2 crash found on XE-310 image (06/27)
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom: The system crashes and it causes a reload. Messages that can be seen on the console indicate there is a "NULL pointer dereference". For example:

BUG: unable to handle kernel NULL pointer dereference

This is followed by a stack trace.
Conditions: This symptom occurs due to lack of proper locking semantics on the variables controlling the IPC namespace.This crash is unlikely to occur in normal situations. The user will need to have shell access and then access a task file under /proc (for example: /proc/29208/ns/ipc) which gives stats on the IPC namespace.
Workaround: There is no workaround.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCul67310
Title:
SOR_CSR32_SOR_ERR_LEAF_INT__INT_SOR_OPF_GRANT_PTCL_UVFcauses ucode crash
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ASR1K microde crash with either of the following errors
SOR_CSR32_SOR_ERR_LEAF_INT__INT_SOR_OPF_GRANT_PTCL_UVF
OPF_CSR32_OPF_LOGIC_ERR_LEAF_INT__INT_START_OF_BURST_MARKER_ERR

Conditions:
This issue ONLY affects on ASR1002x and ASR1K RP2/ESP100 based platforms
running 15.2(4)S, 15.3(1)S, 15.3(2)S, 15.3(3)S, and 15.4(1)S based images.

This issue can occur on platforms with scaled sub-interface or broadband
session configurations when the number of sub-interfaces or sessions on a
interface is reduced from > 4000 to less than 4000 and moderate to heavy
traffic flow is occurring at the time that the sub-interface or session
count is reduced. If the the ASR1K is operating below this threshold or
above this threshold this issue is not seen.

Workaround:
None

Further Problem Description:
This issue is a result of a scheduling hierarchy restructuring issue when
the number of sessions is reduce such that we drop below this 4000
sub-interface or broadband session threshold on a interface. As indicated
above, if the sub-interface or broadband session count is below 4000 or
consistently above 4000 this issue should not be seen.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S1
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCul02786
Title:
QoS traffic rate is off with fair-queue used in the child policy
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The original issue fails silently and it is only detected via traffic or inspecting the hierarchy via the CLI, show plat hard qfp act feat qos que out int hier detail. The QoS rates are in accurate due to a bad hierarchy. Subsequent crashes and the issue that is documented in this DDTS were regression from the original fix intended to build the hierarchy on ESP-100 correctly.

All issues involved fair-queue in a flat or hierarchical policy when applied on the fly.

Conditions:
Applying fair-queue on the fly resulted in the bad hierarchy. As a result the provisioned services could not be guaranteed.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCum49940
Title:
ASR1k crash in H323v6 ALG NAT+FW with h323 debug command enabled
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
router is crashing while sending testing H323v6 ALG with NAT+FW configuration by enabling h323 debug commands

Conditions:
Crash is happening only when h323 debug commands applied

Workaround:
no workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCul50570
Title:
Ucode crash followed by cpp crash while scaling to 500 MLPoA bundles PTA
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A hardware interrupt causes service outage and a micro-code core will be generated. This condition puts the router in an inoperable state.

This issue would affect bundle interfaces such as MLPPP and GEC aggregate mode.

Conditions:
While processing dynamic reconfiguration events, one of the scheduling node is left in a committed but not forward state. When a flush packet is injected in a flush queue to complete the reconfiguration process, it causes a hardware interrupt when it traverses the node that was left in a non-forwarding state.

Workaround:
There is no known work around.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuo02558
Title:
Crash Executing 'show platform packet-trace packet all'
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Crash in cpp_cp_svr when executing 'show platform packet-trace packet all'.

Conditions:
Crash can only occur when executing 'show platform packet-trace packet all'.

Workaround:
Display a single packet at a time using 'show platform packet-trace packet ' instead of using 'all'.

Further Problem Description:
Problem is very difficult to reproduce as probability of hitting the issue is less than 0.1%.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui80961
Title:
asr1K error message CPPDRV-4-ADRSPC_LIMIT
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:The output of the following command shows that the QM CPP DRAM increases but does not decrease when fair-queue is removed from a class before it is active in HW.

show plat hard qfp act inf exmem stat user | incl QM

Over time the system runs out resource DRAM causing subsequent configuration events that require CPP DRAM objects to fail.

The impact could be the system being unable to process new configuration events or the data plane being unable to allocate resource DRAM during packet processing.

Conditions:When fair-queue is removed from a class before it is activated in the hardware, the BQS RM was not freeing the WRED DRAM object used to store the fair-queue configuration. Over time, the system runs out of CPP resource DRAM. The error message described in the description is displayed and all configurations start failing.

This conditions impacts the whole system as opposed to just queueing features.

Workaround:None

More Info:


Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S2
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCum90841
Title:
RSTP and MSTP looping issue on ASR1k
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Loop when running MST or RSTP on ASR1k

Conditions:
ASR1k running XE 3.10 with MST or RSTP configured.
Releases prior XE 3.10 are not affected.

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuj77998
Title:
ESP200: All packets dropped after sequence number overflow
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom: All packets that need to be encrypted may be dropped.
Conditions: This symptom occurs when traffic is flowing on an IPSec tunnel for a long duration without any rekey and the crypto sequence number overflows. It is observed only on Cisco ASR 1000 Series ESP 200.
Workaround: Have a shorter rekey interval.





Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCui14753
Title:
XE310: Named IP ACL does not work for Hash assignment.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Named IP ACL does not work for Hash assignment

Conditions:
Apply ip and acl configs on UUT

Workaround:
none

More Info:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCum75385
Title:
"sh platform hard qfp active datapath util" displays wrong data
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
"show platform hardware qfp active datapath utilization" displays wrong data.
When high priority traffic (ip precedence 6,7) is sent, the counters against "Input Non-Priority" rows increment.
When low priority traffic (ip precedence 0,1,2,3,4,5) is sent, the counters against "Input Priority" rows increment.

Conditions:
This can occur when using esp100.

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S1, 15.4(1)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuq09004
Title:
RP crashed with cpp_cp_svr crash in cpp_qm_event_insert_leaf_node
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
After upgrading the ASR to the latest 15.2(04)S and later 15.X releases the ASR1K started crashing. The trigger for this crash is when a flat QoS policy with fair-queue is applied to a frame-relay interface.

Conditions:
The trigger for this crash is the flat QoS policy with fair-queue applied to the frame-relay interface. In this case the two key components that together triggered this failure was the frame-relay plus the flat policy with fair-queue.

Workaround:
The workaround is a cosmetic change that will cause NO functional impact. The workaround is to convert this flat policy to a hierarchical policy with a parent shaper set to 100%.

policy-map PM_POS_PARENT
class class-default
shape average percent 100
service-policy PM_POS
!
interface POS0/1/0
no ip address
encapsulation frame-relay
load-interval 30
crc 32
pos scramble-atm
frame-relay lmi-type ansi
service-policy output PM_POS_PARENT hold-queue 4096 out

Further Problem Description:
This issue is specic to the ASR1K X platforms (ASR1002x, ASR1001x) and ASR1K with ESP100/ESP200.

This issue is not applicable to the older ASR1K platforms using ESP5/10/20/40 or non-X series ASR1002/1001 platforms.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S2.1
Known Fixed Releases:
15.2(4)S6, 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Alert Type:
Updated *
Bug Id:
CSCuj52287
Title:
ASR1k: ESP crash caused by BFD code defect in RLS3.10.0
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ESP crashed with error message:
%CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8

Conditions:
The crash is caused by a defect in BFD though no BFD is configured on any interface

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj39901
Title:
ASR Crash with CGN in the config
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Crash with "ip nat settings mode cgn" in teh config

Conditions:
None specifically

Workaround:
Reload after changing settings.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh85883
Title:
MPLSSETVRF: BGP routes are not coming up and so the common_setup fails
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
mplssetvrf bgp routes are not coming up along with multi-vrf PBR

Conditions:
The destination address of the packet is ASR local address. Say, the packet is for us packet.

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(2)S1
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(2)S2, 15.3(3)S
Alert Type:
Updated *
Bug Id:
CSCuj46180
Title:
XE310 GTP: echo request without private extension IE is dropped.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
echo request is dropped.

Conditions:
echo request without private extension IE

Workaround:
no

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.3(3)S7
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuo11035
Title:
One way audio on some outgoing calls to PSTN across CUBE-SP.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
One way audio on some outgoing calls to PSTN across CUBE-SP.. This is seen for call flow scenarios involving forking and with multiple call legs for the same call going through the SBC

Conditions:
asr1k configured as CUBE SP SBC running IOS XE 3.10.1

Workaround:
none

Further Problem Description:
CUBE SP drops RTP stream in one direction for some call flow scenarios involving forking with the SBC terminating multiple call legs of the same call.

Call flow is following:

Signaling:
PBX-client --- PBX ---- SBC ---- Proxy -two forked calls---- SBC --- Cisco PGW2200 ----- SBC ----- Proxy ---- SBC --- PSTN operator

Media:
PBX-client - SBC - PSTN operator

Issue is that SBC forward the RTP to the PBX-Client, and PBX-Client sends RTP to the SBC, but SBC does not forward that RTP to the PSTN operator.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun79934
Title:
IN/OUT_UNEXP_OCT_EXCEPTION debug message need incluse error cause
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
qfp ipsec debug message format changed

Conditions:
none

Workaround:
none

Further Problem Description:
none

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuj19293
Title:
Binds are seen after removing Static NAT mapping with route-map
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Bindings are present after inconfiguring Static NAT mappings

Conditions:
static NAT mappings with route-map

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun99766
Title:
ASR 1002-X crashed while changing appnav WAAS configuration
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A router crashes while making changes to an AppNav policy map or a class map.

Conditions:
This symptom occurs under the following conditions:

- Multiple AppNav controllers are used.
- Sessions are created and can be seen using show service-insertion statistics sessions.
- AppNav policy map and class map is modified when live traffic is redirected by AppNav.
- Policy map or class map change results in a mismatch between AppNav controllers.

Workaround:
When using AppNav Controller Group with multiple ACs, avoid changing the policy map or class map when there are active sessions present (use show service-insertion statistics sessions).

Further Problem Description:
A crash occurs after a policy map or class map change results in changes to the existing session and subsequently a new connection matching this session is synced to the other ACs which are not aware of the new policy map or class map.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S0.3
Known Fixed Releases:
15.3(3)S3, 15.4(1)S3, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui77173
Title:
PPP Keepalives on MLPPPOA session are dropped during congestion
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Under certain traffic conditions, an MLPPPoA session may flap; causing traffic drops.

Conditions:
On a router running IOSXE, such as an ASR1000, a PVC that is congested in the egress direction may cause a link in an MLPPPoA bundle to flap. The reason for the flap may be due to missing Keepalives.

Workaround:
There are no known workarounds.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuw57225
Title:
PFRv2 not work well for 10% inbound load-balance
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Even if 10% inbound load-balance is configured, sometimes, inbound load difference becomes bigger than 10% for some period, say 30 min. And, if traffic load pattern is changed, sometimes inbound load oscillation and overshoot are observed.

Causing major impact in pfrv2 ingress and egress load-balancing.

Conditions:
"This symptoms were observed, when "max-range-utilization percent 10" or "max range receive percent 10" was configured with PfRv2.

Workaround:
no workaround

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
15.2(2)S
Known Fixed Releases: *
15.6(1.17)S
Alert Type:
Updated *
Bug Id:
CSCuj58272
Title:
BQS RM proc reparent crash during PPP eth session bring up in 1002x
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The CP process crashes when reparenting more than 128 entries from one tree to the other. A reparenting event could be stimulated by either an internal or external event but this issue is more likely to caused by an internal reparenting.

An internal reparenting could occur when a leaf node is transformed into a hierarchy layer node or when de-aggregating an aggregation node after the schedule size is below the 4000 threshold.

Conditions:
When reparenting either a leaf or hierarchy layer entries, the resource manager was not clearing the counter that tracks the number of entries that need to be flushed after processing the first batch. This caused the code to run incorrectly to a point of completing the request prior to reprogramming the HW correctly. As a result some entries may be left in the source parent which cause a crash when the tree is freed before it is empty.

Workaround:
No workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh73422
Title:
ASR1k Crashes with MAP-T Configs
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ASR1k With MAP-T Configs crashes.

Conditions:
When Ping Initiated to public IPV4 Address, ASR1K crashes with Core dump, and the packet was translated but the packet causes an ICMP error message to be generated, and in some cases of ICMP error generation, the box could crash.

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj72342
Title:
FP crash while running ppp sessions with CGN enabled
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
FP crash occurs with PPP sessions

Conditions:
On applying nat settings to CGN mode

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.4(1)S2
Alert Type:
Updated *
Bug Id:
CSCui47819
Title:
AOR doesn't work on all traffic monitor with application name
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Configure url tool ezpm and run traffic. Following fields have wrong values: connection to server netw delay sum, connection to client netw delay sum, connection client, server netw delay sum, connection application delay sum, connection application delay max,
connection client server resp delay sum, connection server packets counter, connection initiator octets, connection client packets counter

Conditions:
When url tool is configured alone.

Workaround:
Enable other ezpm tool additionally.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S, 15.4(3)M, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCui13781
Title:
FP crash with NAT +NBAR + APPNAV
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
FP may crash with HTTP and FTP traffic

Conditions:
Configured NAT , NBAR and appnav over gre tunnel and HTTP

Workaround:
none

More Info:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S, 15.4(3)M, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCul27083
Title:
ASR1K: Ucode crash seen while doing RP swo with 1000 ipv6_ipsec tunnels
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Ucode crash seen

Conditions:
Ucode crash seen while doing RP switchover with 1000 ipv6_ipsec tunnels and acls with traffic.

Workaround:
No workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCun78318
Title:
Access-list is not functional on management int after RP switchover
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ACLs applied to the mgmte do not work on the new active RP after a RP switch over.

Conditions:
After a RP switch over as the old standby RP becomes the new active RP.

Workaround:
Remove then reapply the ACLs to the mgmte on the new active RP.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S2
Known Fixed Releases:
15.2(4)S5.15, 15.2(4)S6, 15.3(3)S2.10, 15.3(3)S3, 15.3(3)S4, 15.4(1)S2, 15.4(1)S3, 15.4(2)S0.3, 15.4(2)S1, 15.4(2)S2
Alert Type:
Updated *
Bug Id:
CSCul93292
Title:
ucode crash with alg traffic
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Ucode crash with alg traffic when there are flow passing through

pysical interface with nat configuration
vasi interface with nat configuration in the same box

Conditions:
Ucode crash with alg traffic

Workaround:
disable all the algs

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCun08855
Title:
ASR crash with iosd punting packet to port-channel with ERSPAN
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ASR router crash with iosd punting packet to port-channel with ERSPAN configured on the router

Conditions:
port-channel and ERSPAN configured on the router

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuo55508
Title:
CPP crash encountered with packet tracing enabled
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A cpp-ucode crash is encountered.

Conditions:
Using packet-trace to trace packets in a feature environment where packets are replicated using egress conditions.
debug platform packet-trace enable
debug platform packet-trace packet 16 fia-trace
debug platform condition egress
debug platform condition start

Workaround:
Do not use fia-trace.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCue30831
Title:
ISR4450:Crash in some show commands for IOMD
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
"Process held down" message and reboot/reinitialization of a module will occur, possibly causing a short-term loss of traffic to the module.

Conditions:
When entering the

show plat software iomd conn statistic

command before the module is fully up.

Workaround:
Make sure the module is shown as 'up' in

'show plat'

before executing the command

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun13999
Title:
After adding QoS w/ 'fair-queue' see PLIM driver informational error msg
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Under interface superscription condition we might see the following error message on router console:

%CMCC-3-PLIM_STATUS: SIP0: cmcc: A PLIM driver informational error TXMC0 - txmcBufferOverflow, block 1f count c8

Conditions:
When "fair-queue" is used in QoS policy-map, under interface subscription condition the flow-control between BQS and SPA might excommunicate, hence the error message is printed.

%CMCC-3-PLIM_STATUS: SIP0: cmcc: A PLIM driver informational error TXMC0 - txmcBufferOverflow, block 1f count c8

Workaround:
No workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuj35345
Title:
ISSU XE312<->XE311: FP crash@sbc_init_req_handler after FP upgrade
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
sbc_init_req_handler seen after FP Upgrade

Conditions:
After FP upgrade

Workaround:
No

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(1.5)S, 15.4(1.9.1)XEB, 15.4(2)S, 15.4(2)S1, 15.4(2)S2, 15.4(2)SN, 15.4(2)SN1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCun04952
Title:
Shutdown tunnel causes AppNav-XE traffic loss
Status:
Fixed
Severity:
2 Severe
Description: *

customer seen defect

Symptom:
Traffic which needs to be send between appnav-controllers will get lost.

Received inter-appnav-controller packets will get assigned to the shutdown tunnel interface.

As a result, no flows will be synchronized between this appnav-controller and appnav-controllers in the same appnav-controller-group. Asymmetrically routed packet will also fail due to lack of flow and unable to query flow from other appnav-controller.

Conditions:
Having a shutdown tunnel interface configured with tunnel source equals to the local appnav-controller IP and tunnel destination equals to the IP of another appnav-controller in the appnav-controller-group (i.e. another ASR router).

To detect this problem the following counter will go up for every dropped packet:

show platform hardware qfp active statistics drop | i Disabled

alternatively you can use a packet-trace feature on 3.10.2 and above to check for the dropped reply getting send to the shutdown tunnel interface.

Workaround:
Remove the shutdown tunnel from configuration or un-shutdown it.

Further Problem Description:
The received packet shares the same source and destination IP of an existing GRE tunnel before matching AppNav tunnel. And since the tunnel interface is disabled, the packet is dropped before reaching AppNav's handler.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S1, 15.3(3)S2, 15.4(1)S
Known Fixed Releases:
15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui05425
Title:
FP160: randomly FP not able to be brought up due to Octeon DRAM init
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
FP160 is not able to be brought up after router reload, randomly.

Conditions:
Using latest development branch image, occasionally will see FP160 fails to be brought up. On my current ASR1003 router with dual FP160 setup, if I try reload the box 10-20 times, there will be 2-5 times I will FP is stuck at init state.

Workaround:
No workaround. But since this is random event. Reload another time will have good change to bring up the FP160.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun24965
Title:
XE3.7.5:FP100:Issue with model4 QoS shaping
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
On the ASR1000 series router hen configuring a QoS service policy using the service-fragment type, the shaping value is not correct.

Conditions:
A QoS Service Policy is applied using the service-fragment keyword, the shaped value is not correct.

Workaround:
one

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCul81725
Title:
FP crash during MLPoEoPTA
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
cpp_cp_svr on ESP crashes.

Conditions:
When configuring MLPoEoPTA, the control plane events generated to the data plane cause the data plane to crash if the events are generated in a certain order. This is highly dependent upon timing between the control plane and data plane.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCun26943
Title:
HA IPC not robust
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
In an INTRA-box redundancy configuration, the STANDBY FP and ACTIVE FP may not be syncing dplane HA records robustly.

The easiest way for the customer to recognize if this *might* be happening is by examining the output of the
show platform hardware qfp active system intra and the show platform hardware qfp standby system intra CLIs.

If the output shows the counters " rx dropped" and/or "retx" continuously incrementing, then this problem may have been encountered.

Conditions:
DUAL FP systems with stateful HA features such as NAT configured.

Workaround:
NONE

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuj51538
Title:
standby fp continuosly crashes on confg pap with NAT,NAT64 on same box
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Standby FP crashes

Conditions:
standby fp continuosly crashes on configuring pap with NAT,NAT64 on same box

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCue27980
Title:
ASR1k crash in CFT code while NBAR processes a packet
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: A CPP crash triggered by NBAR may occur on Cisco ASR 1000 Series routers, Cisco 4000 Series ISR routers, and Cisco CSR 1000V routers.
Conditions: This symptom may occur under rare conditions of traffic mixture and rate when NBAR and NAT are both enabled.
Workaround: There is no workaround.



Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S, 15.3(3)S1
Known Fixed Releases: *
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)M, 15.4(3)M1, 15.4(3)M2, 15.4(3)M3, 15.4(3)M4, 15.4(3)S, 15.4(3)S1
Alert Type:
Updated *
Bug Id:
CSCui97685
Title:
Firewall and PBR interworking regression issue after CSCuh98033
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
While testing "default_zone_basic_vrf_lite.tcl" script with latest mcp_dev "BLD-BLD_MCP_DEV_LATEST_20130821_003026" iam observing connectivity failure

Conditions:
Firewall and PBR interworking after CSCuh98033

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh24911
Title:
asr1k MFR: MFR client should cleanup DLCI DB after DLCI disabled
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Unable to reuse a DLCI value for an MFR sub-interface.

Conditions:
This behaviour may be seen on ASR1000 routers using MFR with DLCI and FRF12 fragmentation. It may not be possible to reuse any of the formerly configured DLCI values if FRF12 was configured when they were changed to another value.

For example, given the following configuration under an MFR interface.

interface MFR11
...
frame-relay fragment 80 end-to-end


And the following configuration under an MFR sub-interface:

interface MFR11.1 point-to-point
...
frame-relay interface-dlci 16


The following change to the MFR sub-interface may render the previous value (16) unusable.

interface MFR11.1 point-to-point
...
frame-relay interface-dlci 32

Workaround:
It may be possible to avoid this behaviour by removing the FRF12 configuration from the MFR interface prior to changing the DLCIs of any of the sub-interfaces.

For example, on the MFR interface, remove the fragmentation configuration line:

interface MFR11
no frame-relay fragment 80 end-to-end


Then change any DLCI values, and re-configure fragmentation, as in the following example:

interface MFR11.1 point-to-point
frame-relay interface-dlci 32

interface MFR11
frame-relay fragment 80 end-to-end

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj42585
Title:
GEC:QoS: cpp_cp_svr crash @pp_qm_event_get_parent_event when mem join
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
When a flat policy is applied to a MLPPP, MFR or GEC aggregation bundle, the current leaf schedule object is replaced with a new one. The code was not updating the cached object which resulted in accessing invalid memory when the bundle bandwidth is updated. The bandwidth is updated when a member link is added to or removed from the bundle.

Configuration example:

policy-map foo
class prec1
bandwidth percent 10

interface Port-channel1 aggregate
ip address 8.0.0.1 255.255.255.0
no negotiation auto
lacp min-bundle 2
service-policy output foo

Conditions:
When a bundle schedule is replaced, the cached object was not being updated leading to interface bandwidth update event to access invalid memory.

The problem is not easy to recreate as would require the QOS event for processing the flat policy to be interleaved with an interface bandwidth update event.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj56505
Title:
SCCP phone registration on CCM not happening via ASR1k
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
SCCM phone registration on CCM via ASR1k is not happening

Conditions:
ASR1k is configured with NAT configuration

Workaround:
no workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCug53310
Title:
Traffic drops in "ZBF register failed"
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ICMP v6 traffic is observed to drop

Conditions:
ICMP v6 traffic is observed to drop with cxsc configured under the zbfw policy-map. Drops are observed the zone is applied on a DMVPN tunnel.

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun83231
Title:
ISSU XE310->XE311:ELC is not coming up after CC/SPA upgrade
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:After sub package ISSU operation is performed, ELC does not come up and following error messages are seen.

*Mar 19 23:10:10.607 PDT: %PMAN-0-PROCFAILCRIT: SIP1: pvp.sh: A critical process mcpcc_lc_ms has failed (rc 127)
*Mar 19 23:10:10.865 PDT: %PMAN-5-EXITACTION: SIP1: pvp.sh: Process manager is exiting: critical process fault, mcpcc_lc_ms, cc_1_0, rc=127

Conditions:Issue is specific to ELC.
Issue is specific to sub package upgrade.
Issue is seen across all releases that support ELC.
ELC means ASR1000 Ethernet Line Cards - These are: ASR1000-2T+20X1GE and ASR1000-6TGE line cards.
Workaround:Consolidated upgrade can be performed.

More Info:


Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCum73445
Title:
ASR1K: cpp_cp_svr crash @ cpp_bqs_rm_update_rate_profile
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
cpp_cp_svr crash.

Conditions:
Problem has been intermittently seen when tearing down bundle type interfaces such as MLPPP and MLFR.

Workaround:
None

Further Problem Description:
This is a timing sensitive issue and is not seen consistently when these bundle type interfaces are being torn down.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuh76624
Title:
Pending objects with large scale configurations
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The "show platform software object-manager f0 statistics" command shows pending-objects that do not clear after making configuration changes (or potentially on system boot).

Conditions:
Can occur on the CSR1000V or ISR4400X platforms with large scale configurations.

Workaround:
No workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S, 15.4(1)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun37698
Title:
ESP crashes with NAT and WCCP configured
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
An ESP might crash

Conditions:
The device has NAT and WCCP configured. It looks like WCCP fails to setup the output interface correctly. This leads to NAT accessing a bad location in memory which causes a crash. The exact conditions are still being looked at.

Workaround:
None Known.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui41298
Title:
For IP UDP tunnel, udp header udp_len is zero for vxlan multcase traffic
Status:
Fixed
Severity:
2 Severe
Description: *

this issue potentially exist in xe3.10 the frist build. just not exposed in pmip udp case.

Symptom:
udp tunnel header udp_len is definitely 0, not correctly fixedup

Conditions:
the tunnel intf is changed from un-udp tunnel to udp tunnel mode.
(1) vxlan case, the nve will auto create a udp tunnel. the tunnel interface also have the processing with tunnel mode updation, so cause the tun_mode is wrong saved in the uidb subblock

(2) pmip udp tunnel case, the tunnel is created with udp mode, not changed from other tunnel mode. so the tunnel mode saved in the uidb subblock is correct. this is the reason why pmip udp case not expose this issue.

Workaround:
none

More Info:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun85761
Title:
L2 frame check failure when payload length increase with ldap alg
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
L2 frame check failure when payload length increase with ldap alg

Conditions:
Steps:
======
translate sipAddress into longer address length

Workaround:
n/a

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCum40363
Title:
H323v6 ALG NAT+FW: End-points not receiving audio packets
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
while making h323 call ,audio packets which are passing via ASR router not receiving at the endpoints.

Conditions:
ASR router is configured with NAT+Firewall

Workaround:
no workaround

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCuh80368
Title:
erspan performance downgrade in FP160
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
erspan performance downgrade in FP160

Conditions:
erspan under FP160

Workaround:
none

Further Problem Description:
enable erspan , then send 64 bytes traffic, the issue happened

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCul43587
Title:
ucode crash@on removing cgn mode
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ucode crash

Conditions:
on removing at cgn mode

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCum04528
Title:
ASR1002-X crash at ipv4_nat_destroy_door
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom: A Cisco ASR 1002-X router might crash and reload writing a core file in the process.
Conditions: This symptom occurs with a Cisco ASR1002-X router running NAT with ALG traffic.
Workaround: There is no workaround.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun67171
Title:
NAT: QFP crash max entry is changed
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
QFP crash

Conditions:
max entry is less than nat translation number

Workaround:

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun49087
Title:
ASR1002x crash post %CPP_FM-3-CPP_FM_FIPS_BYPASS_TEST fail
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom: A Cisco ASR 1002x router crashes.
Conditions: This symptom occurs during duty cycle testing with a lot of negative events in the DMVPN setup.
Workaround: There is no workaround.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun48994
Title:
ESP100 crash while running traffic with 8K mlp bundles
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The CP process crashes while collapsing a hierarchy layer node that had once exceeded 4000 entries. The collapse occurs when the number entries falls below 4000.

Conditions:
This problem occurs while collapsing a node that had once exceeded 400 entries. The problem is specific to MLPPP, MFR and GEC aggregate because these features require notification when a schedule ID changes. The schedule ID changes when a scheduling node is reconstructed. The issue hit when the operation involves both the flushing and SID notification.

Workaround:
None.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun04417
Title:
XE310, GTP: GTPU performance in 1 firewall session is downgraded.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
GTP U packet forwarding capability is downgraded.

Conditions:
1 firewall session

Workaround:
No.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S, 15.3(3)S7
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCui95380
Title:
isis pkt failure in v6GRE tunnel when MTU is higher than default value
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
sis neigh can not be setup and stuck at "init" status

Conditions:
when configured the MTU bigger than default value

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCux42411
Title:
ASR1001-X Frame Relay with Fortitude NIM fails due to LMI packet padding
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Serial interfaces with Frame Relay or HDLC encapsulation remain down. Frame Relay LMI timeouts.

Conditions:
NIM-1CE1T1-PRI or NIM-2MFT-T1/E1 in ASR1001-X chassis.

Workaround:
None.

Further Problem Description:
Customers can use SPA-8XCHT1/E1-V2 as an alternative on ASR1001-X.

Last Modified:
12-DEC-2015
Known Affected Releases:
15.4(3)SS
Known Fixed Releases: *
16.2(0.213)
Alert Type:
Updated *
Bug Id:
CSCto89613
Title:
fman fp crash observed @ cpp_mem_handle_2_ppe_mem
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ESP crash observed. When Peer PE router is reloaded
Conditions:
3K Xconnects scaled condition
Workaround:
None

Last Modified:
13-DEC-2015
Known Affected Releases:
15.1(3)S, 15.1(3)S3
Known Fixed Releases:
15.1(3)S5, 15.2(1)S
Alert Type:
Updated *
Bug Id:
CSCux44780
Title:
ASR1K/ISR4K crashes after removing tunnel interface
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Removing a DMVPN tunnel interface with shared tunnel protection from the configuration using the 'no interface tunnel X' command, can cause an ASR1K (or ISR4K) platform to crash

Conditions:
Two or more DMVPN tunnels (using shared tunnel protection) are configured between the same two devices, sourced from the same interface and are separated by having one of the tunnels in an I-VRF (inside vrf)

Workaround:
None

Further Problem Description:

Last Modified:
14-DEC-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCua79516
Title:
SYN packets for ftp-data sessions are sporadically dropped
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms: SYN packets to establish ftp-data connections are sporadically
dropped at the Cisco ASR router.

Conditions: This symptom is observed under the following conditions:

- Using the active mode FTP.
- Using PAT.
- The symptom is observed on ASR1K.

Workaround 1: Use the passive mode FTP.
Workaround 2: Use the static NAT/dynamic NAT configuration.

Last Modified:
17-DEC-2015
Known Affected Releases: *
15.2(2)S, 15.2(2)S1
Known Fixed Releases:
15.2(2)S2, 15.2(4)S1, 15.3(1)S
Alert Type:
Updated *
Bug Id:
CSCut79286
Title:
ASR1K QoS feature doesn't work fine with RP2/Rls3.x
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
For functionality
The queuing/scheduling is fail to function.
When the issue is observed, see dropped the high priority packets.
The remark is function normally.

For Counter of show commands
The physical I/F of output counter is fail to function.
The sub I/F of output counter is fail to function to class-default only.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.5(1)S2.14, 15.5(1)S2.15, 15.5(1)S3, 15.5(2)S1.7, 15.5(2)S2, 15.5(3)S0.8, 15.5(3)S1, 15.5(3)S1a, 15.6(0.16)S, 15.6(1.4)S
Alert Type:
Updated *
Bug Id:
CSCut77070
Title:
SPA-1xCHOC12/DS0 not supporting Framed E1 connections.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Framed E1 on SPA-1xCHOC12/DS0 is not coming up. The device is sending AIS to the remote node.

Conditions:
The issue is with Framed E1's. When we configure unframed E1, the link is coming up.

Workaround:
No workaround

Further Problem Description:
NA

Last Modified:
17-DEC-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases: *
15.3(3)S6.6, 15.4(3)S3.3, 15.4(3)S4, 15.5(1)S2.15, 15.5(1)S2.2, 15.5(1)S3, 15.5(2)S0.8, 15.5(2)S1, 15.5(2)SN, 15.5(2.21)S
Alert Type:
Updated *
Bug Id:
CSCur24793
Title:
l2protocol forward not work for STP, LLDP, PPTPv2 and E-LMI in EVC
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
STP, LLDP, PPTPv2 and E-LMI keep being punted/forward regardless of the l2protocol forward CLI

Conditions:
Config l2protocol forward stp elmi lldp under EVC

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
17-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.3(3)S5.11, 15.3(3)S6, 15.4(3)S3.3, 15.4(3)S4, 15.5(1)S2.15, 15.5(1)S2.7, 15.5(1)S3, 15.5(1.18)S0.9, 15.5(2)S, 15.5(2)SN
Alert Type:
Updated *
Bug Id:
CSCsq43261
Title:
ASR1000: NAT Crashes when scaling concurrent SIP NAT sessions beyond 900
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:







ASR 1000 running NAT might experience a ucode crash when SIP calls are going through the
box and getting NATted.

Conditions:





When SIP calls are NATTed on the ASR1000, the box could crash mostly
at a high volume of calls.


Workaround:




There is no workaround known at this time.

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsy23039
Title:
cpp crashed on sending malformed packets at "rbuf_ooh_handler"
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
FP reset seen while sending the malformed packets using ISIC tool.
The bug is mainly coming when you've NAT configured on ASR.







Conditions:
The FP reset will happen only when ASR is configured with NAT and lot's of Malformed packets are getting natted.





Workaround:
Inspect the malformed packet before they hit the NAT on ASR.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsu52265
Title:
ISG ASR L4Redirect: L4 redirct feature broken in ISG DM4 test
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
In ISG IP session aggregator with VRF transfer test ( ISG Deployment Model 4), L4 redirect didn't not happen with access external website from client PC.






Conditions:
Using Client Real PC to do L4 Redirect trasnsfer with VRF to broadhop SME portal




Workaround:
None



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNB1, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso24702
Title:
cpp crash at cpp_fia_free testing NAT and NBAR
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A crash of the ESP may occur when NBAR or NAT configuration is removed.

Conditions:
Service policies are applied to the interfaces.

Workaround:
Avoid unconfigure of NAT/NBAR when using QoS.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2S, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso91092
Title:
MCP: TCP sessions are not closed after Idle timer expires
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

TCP sessions are not closed after Idle timer expires

Conditions:

This symptom is observed on a Cisco ASR1000 router while sending the telnet traffic with one or two times

Workaround:

Make sure that idle timer is not equal to syn or fin idle time.
(i.e. syn idle time and fin idle time default to 30 seconds. Set the tcp idle time to 29 or 31 seconds.)

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsy15577
Title:
Stuck threads on cpp reuse sw_lock
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:







SWASSIST interrupt indicating stuck threads

Conditions:





Race conditions that may happen during normal operation with no specific
catalyst.

Workaround:




Further Problem Description:













Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCtb12223
Title:
ASRNAT: forced removal of pool currently broken for dynamic configurat
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
ASRNAT: forced removal of pool currently broken for dynamic configuration







Conditions:
ASRNAT: forced removal of pool currently broken for dynamic configuration





Workaround:
Use 'clear ip nat trans' and then remove pool (unforced) OR
Do a forced removal of the mapping and them remove the pool (unforced)




Further Problem Description:
Currently targeting 2.4.1 for fix












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCut06783
Title:
Fortitude NIM does not come up on ASR1001x
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
NIM not coming up on XE315 boot up

Conditions:
While booting the Nightster router with XE315 image, NIM not coming up.

Workaround:
None

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
15.5(2)S, 15.5(3)S
Known Fixed Releases: *
15.5(2)S, 16.1.1, Denali-16.1.1
Alert Type:
Updated *
Bug Id:
CSCsw90645
Title:
QOS misclassification of NBAR protocols
Status:
Fixed
Severity:
2 Severe
Description: *


Symptom:
Class map statistics show wrong results for NBAR classification.

Conditions:
This issue happens only when NBAR classification is enabled via MQC CLI (e.g. match protocol bgp, etc) . This issue is not seen when NBAR is enabled via protocol discovery on an interface (via ip nbar protocol-discovery CLI). This bug is fixed in 2.3. This bug has no impact on previous releases.

Workaround:
None.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNA, 12.2(33.1.19)REM
Known Fixed Releases:
12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtb63894
Title:
VRF AWARE ALG H323 Crash during Scale Test
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ESP Crash is observed while doing VRF AWARE H323 ALG Scale test

Conditions:
Scale level of 900 Concurrent H323 Calls

Workaround:
No workaround

Further Problem Description:
Scenario VRF to GLobal , Dynamic NAT with Firewall ALG configuration is used
Hardware used ASR 1006 ESP 10 ,RP1

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsy68955
Title:
multicast packets are not treated as high priority with service-policy
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
When ASR has an interface which has input service-policy, and multicast
packets with DSCP EF are received by that interface, ASR incorrectly treats
them as Low priority packets.

Conditions:
This happens only when input service-policy is applied on ingress
interface.

Workaround:
No work around.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases: *
12.2(33)XNC0a, 12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsu04554
Title:
IPHC: Cisco format not supporting Context-State pkt
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The Cisco ASR1000 Series Router may experience an unexpected reload when IPHC is configured in IPHC is configured in "original/Cisco" format

Conditions:
IPHC is configured in the "IPHC is configured in "original/Cisco" format.


Workaround:
None

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNA2, 12.2(33)XNB1, 12.2(33)XNC, 3.9.0.6i.BASE, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsx39647
Title:
Static NAT with Port Translation failed with ALG
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
With static configurations for ALGs, applications might not work correctly behind a device that performs Network Address Translation.







Conditions:





If there are customer configurations like ip nat inside source static or outside source static and the intention is to match the static translation for the ALG embedded address and ports, then the match will not happen correctly.

Workaround:




Workaround is to use PAT/Dynamic pool configuration for the ALG address and ports.

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCux11291
Title:
OTV adjacency does not come-up with VRF
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OTV adjacency does not come-up with VRF

Conditions:
join-interface and lan interfaces configured in vrf

Workaround:
No Workaround

Further Problem Description:
NA

Last Modified:
17-DEC-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.4(3)S4.5, 15.5(1)S2.25, 15.5(1)S3, 15.5(2)S2.1, 15.5(3)S1.1
Alert Type:
Updated *
Bug Id:
CSCut41815
Title:
Unable linkup on opposing unit of ASR1k built in port after "no shut"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Opposing unit's ports sometimes is not link-up after entering "shut" "no shut" on ASR1001X built in ports.

Conditions:
ASR1001X running with 3.13.2S or 3.14.1S.

Workaround:
Sometimes the issue is improved by input "shut" "no shut" again on ASR1001X built in ports
This issue is always improved by ASR1001X reload.

Further Problem Description:
none

Last Modified:
17-DEC-2015
Known Affected Releases:
15.4(3)S, 15.5(1)S
Known Fixed Releases: *
15.4(3)S2.15, 15.4(3)S3, 15.5(1)S2.14, 15.5(1)S2.15, 15.5(1)S3, 15.5(2)S0.6, 15.5(2)S1, 15.5(2)SN, 15.5(2.21)S0.12, 15.5(2.21)S0.6
Alert Type:
Updated *
Bug Id:
CSCsy09503
Title:
CPP crashed on sending malformed packet using ISIC.
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
Fp reset seen when sending malformed packets with NAT enabled.
Specially the bug was coming while doing FP switchover.







Conditions:
FP switchover with malformed packet sent from ISIC tool.





Workaround:
Now the bug is fixed but the workaround is inspect the malformed packet so that they wont' hit an ASR configured with NAT.



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCtb63555
Title:
FRR on ASR stitch point causes OCE counter stack exceed
Status:
Fixed
Severity:
2 Severe
Description: *


Symptom:
OCE counter stack exceeds and the following message is seen continuously
"CE_FORWARDING-3-CAUSE_OCE_COUNTER_EXCEED_STACK:OCE counter stack exceed -Traceback:"

Conditions:
FRR switchover with ATOM configuration

Workaround:
None

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCuu03930
Title:
RPcrash while booting with 3.13.2IOSXE after SPA-4XCT3/DS0-V2 insertion
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
RPcrash and core dump.

Conditions:
Post SPA-4XCT3/DS0-V2 insertion with 3.13.2IOSXE image.

Workaround:
None

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.4(3)S3.2, 15.4(3)S4, 15.5(1)S2.14, 15.5(1)S2.15, 15.5(1)S3, 15.5(2)S0.9, 15.5(2)S1, 15.5(2)SN, 15.5(2.21)S0.12, 15.5(2.21)S0.5
Alert Type:
Updated *
Bug Id:
CSCsz57480
Title:
VRF NAT: %FMFP-3-OBJ_DWNLD_TO_CPP_FAILED: F1: fman_fp_image: ADDR-RANGE
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
ASR reload may occur in rare timing cases.







Conditions:
ASR reload may occur in rare timing cases when PAT is configured.





Workaround:
There is no workaround.




Further Problem Description:
Fix should be available with 2.4.1 and later releases.












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtb87468
Title:
Qfp-Nbar: Cpp Ucode crash @ stile_release_link
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
CPP Ucode crash encountered with features like FPM, IPSec, NAT, ALG configured on the box
Conditions:
When traffic consisting of P2P protocols, HTTP, FIX, CITRIX, FTP, RTP is kept running for overnight with the box configured for all the features mentioned above, the CPP UCODE crash can be seen
Workaround:
None

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE, 15.4(3)M, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCsu91513
Title:
QFP crashes with core when nbr router goes down with ALG
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

ASR1000 series router has a software crash in its QFP. The traceback shows a generated ICMP packet causes an abort.

Conditions:

Application Layer Gateway (ALG) features run in the QFP and the manipulated packets becomes segmented. Such packets trigger route unreachable ICMP packet generated due to route going down.

Workaround:

No.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN1
Known Fixed Releases:
12.2(33)XNB2, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq20024
Title:
NBAR with unknown protocol shoots PPE usage to 99%
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
When NBAR is configured, with traffic running through interface with NBAR configuration. QFP utilization is at 99%.







Conditions:
This happens when there are a bunch of traffic with protocols not recognized by NBAR.





Workaround:
No workaround.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2SR, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso63066
Title:
move interface_id out of NAT_KEY1; this is broken with fragmented pkts
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
On the ASR1000 FP when NAT is configured with a routemap with match interface, fragmented packets may falsely match.







Conditions:





Workaround:
None, a fix is provide in Release 1.1.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN, all
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq34647
Title:
MCP: alg_fw_common_inspection_handler () at logger.h:133 seen with alert
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

Core file was genarated in HDD

B>Conditions:

This occurs only on the ASR1000 wihile running the feature audit and alert features.

Workaround:

No work around

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtd17398
Title:
ASR1k as BSR RP on NAT outside interface reports natted RP to outside
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom: when the pim bsr-router is on a NAT outside interface the RP gets natted correctly for the inside interfaces, but also gets incorrectly natted for the outside interfaces.

Conditions: This only occurs when BSR is configured on an outside interface.

Workaround: a possible workaround may be to configure this 2nd inside transltion, however this may cause unintended consequences like OSPF neighbor failures.

ip nat outside source static [Outside global IP address] [Outside local IP address] <- translation
ip nat inside source static [Outside local IP address] [Outside global IP address] <- workaround

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsu79433
Title:
ASR1000-NAT crash under very high session rate (dynamic NAT)
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
ASR1000 experience a ucode crash.







Conditions:
Problem is a corner cases which is very unlikely to occur, but happens with TCP traffic which is timing out and having sessions created frequently.





Workaround:
None. Problem fixed in 2.2.2.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNB1, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsz72973
Title:
CPP crashed with chunk_malloc for h323 ALG.
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
ESP might reload with malformed H.323 packets running through the system and in the same time ESP failover is performed.








Conditions:
The malformed H.323 packets should be coming with a high rate and doing a ESP switchover in the same time.





Workaround:

There is no workaround for this as of now, but this problem is not happening everytime.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtb89767
Title:
IPSECv6:Delete/reconfig of IPsec config cannot be done while using FP20
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:Problem happens on an FP20.On configuring the ipsec part of the svti topology the delete and reconfig of IPsec does not happen







Conditions: In a FP20 svti ipsec setup with 1 tunnel





Workaround: Reload the router.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCso99425
Title:
ucode crash with FW/SIP traffic on 4RU when neighbor goes down
Status:
Fixed
Severity:
2 Severe
Description:








Symptom:
FP reload







Conditions:
When too many(>254) subchannel are created under the same SIP control channel.





Workaround:
None.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsw72162
Title:
BGP sessions flapping due to PMTU discovery failure on CPP
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
BGP sessions flap on the ASR1000 series platform

Conditions:
This issue can be seen when the links between the Peer are load balanced and have different MTU values. This results in the need to fragment BGP protocol packets,which can cause drops of these packets under certain scenarios.

Workaround:
By default Path MTU discovery is enabled for BGP. Disable this PMTU discovery with following command; " neighbor X.X.X.X transport path-mtu-discovery disable" to avoid this issue.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNA
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsy30685
Title:
mVPN related code changers
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
mcast feature won't work when VRF configured.


Conditions:
When mVPN is configured, mcast is expected to work on not just on global table,
but, also VRFs.


Workaround:



Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2(33)XN, 12.2(33)XNC, 12.2XN
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsq43921
Title:
Ucode crashes in reassembly code with GRE frag
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

QFP microcode of ASR1000 series router may crash while doing reassembly on fragmented packets.

Conditions:

Fragmentation is based on GRE tunnel outer header and reassembly is performed on the tunnel end point under stress and packet dropping.

Workaround:

Configure IP MTU of the tunnel interface to be smaller than the physical interface's MTU, so that fragmentation occurs only on inner IP packet.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsx06012
Title:
ucode crash @ stile_input () with ISIC negative test
Status:
Fixed
Severity:
2 Severe
Description: *


Symptom:
Router crashes when malicious IP packet is seen and NBAR is enabled on the interface receiving the traffic.

Conditions:
Applies to malicious IP packets with zero L4 payload (TCP or UDP) and a fake IP layer 3 header with length field that suggests a non zero L4 payload. This bug is fixed in release 2.3. It affects releases 2.2 and prior

Workaround:
Disable NBAR on the interface

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsu21589
Title:
ucode crash when mapping configured with no pool configured
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
On the ASR1000 Series Router, with NAT configured, when a IP NAT inside mapping is configured and no pool is configured yet, and the traffic is flowing through the box that matches the mapping, an unepected reload of the Embedded Systems Router may occur.



Conditions:
NAT inside mapping is configured with an ACL and no NAT pool is configured.


Workaround:
Configure the IP NAT pool configured before configuring the NAT inside mapping.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNB1, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsv14986
Title:
ISG ASR DM4 Scale:CPP reload with L4Redirect VRF weblogon/staticIP,noQoS
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
MCP CPP reloads under IP session as aggregator with Static IP without MQC, sending
traffic with Spirent Avalanche 40 CPS.






Conditions:
L4Redirect with VRF weblogon, 40 CPS with Spirent avalanche traffic tool




Workaround:
None



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNB3, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsr74264
Title:
Fix fragmentation related issues
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

IP packets larger then 1500 not passing through IPSec tunnel.

Conditions:

Observed on ASR1000 Series Routers with IPSec tunnels.

Workaround:

There are no workarounds.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN, all
Known Fixed Releases:
12.2(33)XNA2, 12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsz77684
Title:
Fman FP/CPP crash observed when FW sessions are cleared
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
FP reloads when fw sessions are cleared using "clear zone-pair inspect sessions" in the scaling scenarios







Conditions:

SIP ALG request too many levels of sub-channels.
When a SIP control channel receives an Invite message, it creates a sub channel.
Only the root control channel is allowed to recieve Invites, but the SIP ALG does not enforce this.
This is actually an attack on SIP. Subchannels are not allowed to accept Invites.
FIrewall now prevents extranious levels of subchannels from being created.





Workaround:
This problem is only associated with SIP sessions. Before clearing firewall sessions (explicit clear, delete zone pair, etc.) Set up ACLs on interfaces where the SIP flows traverse. The ACL should deny SIP control packets (port 5060). The sessions will timeout in idle time configured by the firewall parameter maps.



Further Problem Description:
Firewall sessions are kept in a hierarchy. The numbers of levels in this hierarchy are limited.
SIP violated this by requesting a hierarchy of sessions hundreds of levels deep. Firewall was not protecting itself from this condition.
When the sessions are cleared, FW recursively walks the hierarchy of a given session to tear down all the children and sibling sessions. Because there were hundreds of levels, firewall exhausted the stack.












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtd67034
Title:
Various %CPPHA-3-FAULT errors with FRF.12 or MLP fragment reassembly
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:

ASR1K "%CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:..." and accompanying crash dump
of the CPP QFP complex.

The various errors which have been seen in association with this problem include:

"%CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:..."

where desc: could be any of the following errors:
Desc: ETC_ETC_LOGIC1_LEAF_INT_INT_ETC_LKUP_DATA_ERR
Desc: ETC_ETC_LOGIC2_LEAF_INT_INT_GPM_ENQ_VTL_DROP_ERR
Desc: GAL_GAL_CSR_IPM_IF_GAL_IPM_IF_LEAF_INT_INT_IPM_ERR
Desc: GRW_GPM_GRW_CSR_RDWR_UNIT_0_GPM_RW_LEAF_INT_INT_REQUEST_ERROR
Desc: GRW_GPM_GRW_CSR_RDWR_UNIT_1_GPM_RW_LEAF_INT_INT_REQUEST_ERROR
Desc: GRW_GPM_GRW_CSR_RDWR_UNIT_2_GPM_RW_LEAF_INT_INT_REQUEST_ERROR
Desc: GRW_GPM_GRW_CSR_REQ_TOP_GPM_REQ_LEAF_INT_INT_MAP_ICREQ0_NO_CONTEXT
Desc: OPM_OPM_INT_REGS_OPM_META_LEAF_INT_INT_UNDEF_DESC
Desc: PQS_PQS_LOGIC1_INTR_LEAF_INT_INT_OUT_OF_RANGE_Q_ERR
Desc: SRT_SRT_PAR_ERR_LEAF_INT_INT_STEM_0







Conditions:

A corner case issue was discovered where the FRF.12 (Frame Relay Fragmentation)
and MLP (Multilink PPP) features were susceptible to various hardware detected error
conditions when performing fragment reassembly for cases where the last fragment
was a few bytes in length (approx. 4-8 bytes of payload after the protocol headers).

This condition has only been seen with high traffic rates in conjunction with the small
end fragment condition.





Workaround:

None




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE1, 12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsq77151
Title:
ALG-H323: INFO-Sanity code: H323_SANITY_NOK
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:
H.323 calls will be dropped by ALG when H.225 packets contain TCP options

Conditions:.
In general H.323 packets,specifically H.225 packets do not contain TCP options.
If H.225 packets contain TCP options, then these packets are dropped. This issue is observed when test equipment is used to generate H.323 calls with TCP options. But the same issue is not seen with physical phones

Workaround:
Generate H.323 calls without TCP options

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2S, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCta03362
Title:
NBAR : FP crashes while configuring the class-map with multiple protocol
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:

FR crashes while configuring class-map with nbar

Conditions:

The above symptom is observered in ASR1000 while configuring with multiple match protocol statement

Workaround:

No Work around

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCte84990
Title:
ipsec svti to mpls: down stream traffic from mpls core not label switch
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
ipsec svti to mpls: down stream traffic from mpls core not label switch. It might be just counter broken because there is no traffic drop

Conditions:
sh mpls forwarding-table Bytes Label Switched counter display 0

Workaround:
none

Last Modified:
17-DEC-2015
Known Affected Releases:
15.0(1)S
Known Fixed Releases:
12.2(33)XND4, 12.2(33)XNE2, 12.2(33)XNF1, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCtb31378
Title:
asr1k:multicast:ucode crash on increasing ipv6 mcast group from 1 to 100
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
Affter reconfiguring MPLS, forwarding plane unable to forward ipv6 multicast packets.







Conditions:
MPLS reconfiguration while ipv6 multicast traffics increase from 1 to 100 group.





Workaround:
None




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsq61649
Title:
ALG:NAT with Route-Map:H323 in-to-out failed
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
NAT with Route-Map:H323 in-to-out fails


Conditions:
When NAT is configured with route-map or ACL, h323 in-to-out calls might fail

Workaround:
There is no workaround

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq64636
Title:
sh ip nat trans missing a session entry when translations 32 or greater
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
On the ASR1000 FP when sh ip nat trans is issued when 32 or more translation exist, not all the sessions will be displayed and counted.







Conditions:
This problem occurs when sh ip nat trans is issued when 32 or more translation exist.





Workaround:
show platform hardware cpp act feature nat datapath sess-dump, but this debug command does not have very nice formatting.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso48780
Title:
CPP-FW+NAT:when TCP session idle timeout, FW used incorrect add for RST
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

When a session timesout due to Firewall idle time timed out, ASR1000 firewall may send out TCP reset packet with un-translated IP destination address when a out NAT is also configured. This could result in TCP reset packets not reaching the proper TCP end users and TCP on end users will not be terminated. Any subsequent TCP packet sent from end users after the configured Firewall idle time-out window will be dropped by ASR1000.

Conditions:

When a session timesout due to Firewall idle time timed out, ASR1000 firewall may send out TCP reset packet with un-translated IP destination address when a out NAT is also configured. This issue doesn't exist when out NAT is not configured.

Workaround:

configure ASR1000 Firewall idle time out value to be bigger than TCP idle time out value on end users

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2XN, all
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq07760
Title:
FW drops more than 500ms of traffic on FP switchover
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom: when SSO, the traffic over fwall session can not be recovered within 50ms







Conditions:regular FP switch over with fwall sessions created





Workaround: N/A




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq84722
Title:
ucode crash in 4RU with IP frag/reassembly
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

QFP may go down and reload if IP re-assmebly is going on at ten gig rate.

Conditions:

If reassembly is reauired of fragments of IP packet encapsulated in GRE, then this condition might be encountered.

Workaround:

None

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN1
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCuu97977
Title:
Pfrv2 load-balance not working with passive mode.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic is not load-balancing in Outbound /Inbound direction while running PFRv2 with Internet Edge Solution.

Conditions:
while running PFRv2 with Internet Edge Solution and load-balance with passive mode.

Workaround:

Further Problem Description:
Customer is running Pfrv2 Internet Edge solution to load-balance Outbound and Inbound Traffic.

Seems like the new link-group algorithms not work well for load-balance with passive mode.

Last Modified:
17-DEC-2015
Known Affected Releases:
15.4(3)S2.2
Known Fixed Releases: *
15.4(3)M3.2, 15.4(3)M4, 15.4(3)S3.10, 15.4(3)S4, 15.5(1)S2.12, 15.5(1)S2.15, 15.5(1)S3, 15.5(2)S1.7, 15.5(2)S2, 15.5(2)T2
Alert Type:
Updated *
Bug Id:
CSCsz35479
Title:
QOS:FP reset with hardware interrupt @ipv4_output_drop_policy_dbg
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:-

On a Cisco ASR1k series, an FP reset is observed when a soft OIR or shut/no shut is made on the ATM interface which has QOS configured.

Conditions:-
This happens when traffic is passing throught the ATM interfaces at the time of the shut/no shut sequence (or soft OIR) is performed.

Workaround:-
None

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsx61701
Title:
ucode crash on RP switch with config that has HSL enabled for ZBFW/NAT
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
A reload may occur after NAT high speed logger has been unconfigured and later reconfigured.







Conditions:
After NAT high speed logger has been unconfigured and later reconfigured.





Workaround:
If you unconfigured NAT's high speed logging (v9), reset the box to prevent risk of future problems.
Fix expected in 2.3.1.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtc62212
Title:
ASR NF/ IPSEC: GETVPN crypto freezes after applying netflow aggregation
Status:
Fixed
Severity:
2 Severe
Description: *


None







Symptom:

If ingress Netflow is applied to the same interface to which a crypto map
has been applied and 2 or more Netflow aggregation caches are configured
and enabled, then incoming traffic to the interface will be dropped.

Under interface config this would require

ip flow ingress
crypto map my-crypto-map

Under global config this would require something similar to


ip flow-aggregation cache destination-prefix
enabled
!
ip flow-aggregation cache protocol-port-tos
enabled
!








Conditions:

This issue is not confined to any particular software release. For this
to occur there has to be a crypto map applied to an interface as well as
ingress netflow as well as 2 or more aggregation caches both configured
and enabled.





Workaround:

The most reasonable workaround is to configure fewer than 2 aggregation caches
and to use the Netflow collector to perform the necesssary aggregation.
Configuring egress Netflow is not a very attractive workaround. While egress
Netflow does not show the behavior described here - it does not support
aggregation caches.




Further Problem Description:















Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND1
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsy53831
Title:
Ingress packets should not have flag to check for fragmentation
Status:
Fixed
Severity:
2 Severe
Description: *




Symptom:

Pinging with packets sizes of 1400 bytes and above does not go through the tunnel
Conditions:
When packet sizes of 1400 bytes and above are used.

Workaround:
None.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCso90965
Title:
MCP:cpp ucode crash while copying serial intf config to mcp
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

Fragmented packets destined for a Cisco ASR 1000 Series Router for which some fragments are lost in the network may under some circumstances lead to an unexpected reload of the Embedded Services Processor (ESP).

Workaround:
There are no workarounds.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2SRE, 12.2XN
Known Fixed Releases:
12.2(33)XNA, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsu89822
Title:
ASR1000:VFR+NAT:ucode crash at ipv4_vfr_refrag with skinny traffic
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:

ASR 1000 ucode may crash when there is SCCP (Skinny) traffic flowing through the box
and NAT is configured to translate the SCCP packets.







Conditions:

The crash is seen only when there is SCCP traffic flowing through the NAT
box and NAT is configured to translate the SCCP traffic.





Workaround:

The workaround is to disable SCCP NAT translation on the box
by configuring

no ip nat service skinny tcp port 2000




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNA, 12.2XN
Known Fixed Releases:
12.2(33)XNB2, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso91607
Title:
ucode crash due to CPP block interrupt after RP SO
Status:
Fixed
Severity:
2 Severe
Description: *

-- Release-note --


Symptoms: System may be out of service.

Conditions: This symptom is observed on an ASR1000 when the system functions
as a L2TP Network Server (LNS) and when a Route Processor (RP) switch-over
was performed.

Workaround: This is no workaround.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsx27977
Title:
BGP routes are not advertised or learnt after router reload / SSO
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In an IPSEC network, BGP routes may not be advertised through GRE tunnels..

Conditions:
This may happen after a RP switchover or when both IPSEC peers are brought up about the same time.

Workaround:
The workaround is to enable "crypto ipsec frag after-encryption" in the configuration.

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2(33)XN, 12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsx96929
Title:
NAT:- FP reset observed with hardare interrupt along with traffic
Status:
Fixed
Severity:
2 Severe
Description: *



Symptom:-
A Cisco Series ASR1k routers its FP reset is observed when an command "ip nat outside" is configured on the interface.

Conditions:-
This condition is observed when UDP packet length is bogus and the port is 1719.

Workaround:-
N/A

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCta42509
Title:
FP reset with hardware interupt @ETC_ETC_LOGIC1_LEAF_INT_INT_ETC_LKUP_DA
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:- A FP reset is observed on a Cisco ASR1k series router,when a QOS is configured/unconfigured.

Conditions:-
A ucode crash is observed with hardware interrupt pointing @ETC_ETC_LOGIC1_LEAF_INT_INT_ETC_LKUP_DATA_ERR when QOS is configured/unconfigured along with traffic.

Workaround:-
N/A

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC2
Alert Type:
Updated *
Bug Id:
CSCtc41030
Title:
ZBFW: CPP crashed @ fw_log_stop_fmt_msg with "log dropped packet on"
Status:
Fixed
Severity:
2 Severe
Description: *








Symptom:
System crashes when HSL logging is enabled







Conditions:
When inmprecise channels is dupliated, we attempt to delete the old before adding the new. The problem occurs when attempting to create a stop audit hsl record. The imprecise channel is not fully filled out and when accessing fields the hsl logic crashes. These types of sessions should not create a stop record to start with (they haven't yet created a start record)





Workaround:
Disable High speed logging or don't use logging on SIP or H323 protocols.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCte56627
Title:
Outside NAT sessions not getting synced between active & standby
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
1) sessions may not be sync properly to standby
OR
2) session deletes may not be sync properly to standby (session that would be deleted on standby, will not be deleted)

Conditions:
Condition 1) may occur on ASRNAT when there is an inside mapping and outside static mapping configuration.
Condition 2) may occur when there is a very high burst of session aging occurs.

Workaround:
None.

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2XN, 15.0(1)S
Known Fixed Releases:
12.2(33)XND4, 12.2(33)XNE2, 12.2(33)XNF1, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCuw24373
Title:
Called-station-id and NAS-ID via account profile satus query
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
sending extra attributes "called-station-id" and "NAS-ID" in accout-status-query for Webauth unauthenticated sessions

Conditions:
NA

Workaround:
NA

Further Problem Description:

Last Modified:
18-DEC-2015
Known Affected Releases: *
15.4(3)S, 15.6(1)S
Known Fixed Releases: *
15.6(1.12)S
Alert Type:
Updated *
Bug Id:
CSCuo36917
Title:
XE3.12 DPSS : CFT returns out of memory error under load
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When handling greater than 50000 concurrent flows, the following error is seen by dpss_mp:

src/main/onep_dpss_engine.c:1482: cft_handle_packet() returned error [2]:out of memory

Packets associated with flows greater than 50000 do not have the flow action applied and are returned to the router without being sent to the onePK application.

Conditions:
- ASR 1000 platform running IOS XE
- More than 50000 uni-directional flows established

Workaround:
None

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S
Known Fixed Releases: *
15.2(1)IC273.212, 15.2(3)E1, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.5, 15.5(1.8)T
Alert Type:
Updated *
Bug Id:
CSCuq77051
Title:
out of ids when configuring xconnect
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Attempting to create or modify a xconnect context using the command
l2vpn xconnect context command may fail with the
error message:

%IDMGR-3-INVALID_ID: bad id in id_get (Out of IDs!) (id: 0x0)

Conditions:
This symptom has been observed after entering and exiting xconnect
context sub-modes many times (over 65000) over an extended period of
time.

Workaround:
There is no workaround. Once this error occurs, the router must be
reloaded.

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.3(3)S4.2, 15.3(3)S5, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)M3.1, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.6
Alert Type:
Updated *
Bug Id:
CSCus43594
Title:
rp crash when cleanup vpls scale configuration
Status:
Fixed
Severity:
2 Severe
Description:

RP crashed when doing config replace with a cleanup config.

Symptom:

Conditions:
Scale vpls bgp signaling config.

Workaround:
No.

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.3(3)S5.1, 15.3(3)S6, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)M3.1, 15.4(3)S2.1, 15.4(3)S3, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1
Alert Type:
Updated *
Bug Id:
CSCue49808
Title:
PTA router crashes on configuring unclassifed mac-address
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback followed by IOSD crash while loading a config file from a tftp: directly into running-config
Conditions:
On applying intiator unclassifeid mac-address command
Workaround:
Copy config file to a file on a local resource (e.g. nvram:, flash:, harddisk:) and apply from the local file.

Last Modified:
19-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases: *
15.1(1)IC66.63, 15.1(1)ICA4.122, 15.1(1)ICB29.36, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1.1)PSR, 15.2(2)E
Alert Type:
Updated *
Bug Id:
CSCuv01168
Title:
SPA-2XCT3/DS0 controller is not coming up on fresh reboot.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
While testing with the mcp_ceop_t3t1_cem_func functionality the serial interface was not able to up..

Conditions:
Issue is seen with asr1k platform

Workaround:
Can Make the serial interface up by giving no shut again to the other end which was already in no shut mode
..

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S1.4, 16.2(0.195)
Alert Type:
Updated *
Bug Id:
CSCux55692
Title:
TCAM Errors in NL11k TCAM of Fixed Ethernet Linecards
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Intermittent packets loss on Fixed Ethernet Linecards[ASR1000-6TGE/ASR1000-2T+20X1GE]

Conditions:
This intermittent packet loss is due to TCAM Mismatch error counters. TCAM mismatch counters can be seen using "test hw-module subslot 0 np4c stat 1" CLI under SPA console of the linecard.

Workaround:
Reload of the linecard using "hw-module slot reload"

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases: *
15.5(3)S1.4
Alert Type:
Updated *
Bug Id:
CSCux65145
Title:
ASR1K-REST API-ACL: Portnumbers in access-lists are returned incorrectly
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
ASR1k-REST API feature, when we perform the JSON GET for the ACL, we see port number reported wrongly in the JSON.

Conditions:
Getting info about the ACL configured on the router via REST API.

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
23-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv94186
Title:
SNMPWALK crash at ipsmIPSec_policyOfTunnel
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
SNMPWALK crash at ipsmIPSec_policyOfTunnel

Conditions:
SNMPWALK crash at ipsmIPSec_policyOfTunnel

Workaround:
Workaround: Configure SNMP view to exclude

"snmp-server view iso included"
"snmp-server view ipSecPolMapTable excluded"
"snmp-server community view RO"

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.3(3)S2, 15.3(3)S4, 16.2(0)
Known Fixed Releases: *
15.5(3)S1.4, 15.6(0.22)S0.2, 15.6(0.26)T, 15.6(1)S, 15.6(1.12)S, 15.6(1.2)T, 15.6(1.9)T0.1, 15.6(1.9)T0.2
Alert Type:
Updated *
Bug Id:
CSCut96933
Title:
ASR1K ucode crash seen at mpls_icmp_create
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A vulnerability in the processing of IPv4 packets that require Network Address Translation (NAT) and Multiprotocol Label Switching (MPLS) services of Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4300 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers could allow an unauthenticated, remote attacker to cause a reload of the affected device.

The vulnerability is due to improper processing of IPv4 packets that require NAT and MPLS processing. An attacker could exploit this vulnerability by sending an IPv4 packet to be processed by a Cisco IOS XE device configured to perform NAT and MPLS services. A successful exploit could allow the attacker to cause a reload of the affected device.
Cisco has released software updates that address these vulnerabilities. There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-iosxe

Note: The September 23, 2015, release of the Cisco IOS and IOS XE Software Security Advisory bundled publication includes three Cisco Security Advisories. All the advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: September 2015 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep15.html

Conditions:
Refer to the security advisory

Workaround:
Refer to the security advisory

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2015-6282 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
29-DEC-2015
Known Affected Releases:
15.2(4)S5.1, 15.4(3)S
Known Fixed Releases:
15.2(4)S8, 15.3(3)S6, 15.4(3)S3, 15.5(2)S1, 15.5(3)S
Alert Type:
Updated *
Bug Id:
CSCuh43094
Title:
IOSd crash while configuring 'tunnel destination' on existing tunnel
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
IOSd (RP) crash with UNIX-EXT-SIGNAL: Segmentation fault(11)

Conditions:
Crash happens while configuring 'tunnel destination' on existing tunnel with QoS policy configured on that tunnel.

Workaround:
Remove the tunnel and reconfigure it completely.

More Info:

Last Modified:
30-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu75176
Title:
Multiple AN values for Rx SA observed in show macsec status
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Multiple AN values observed in show macsec status during CAK REKEY with P2MP scenario when the peers of the same Secure Connectivity Association are hosted with same keychain on a box.
Conditions:The issue is seen when the peers of the same Secure Connectivity Association are hosted with same keychain on a box and a CAK-rekey is triggered by adding a new valid key.
Workaround:Hosting the P2MP peers of a CA in different boxes.

Last Modified:
30-DEC-2015
Known Affected Releases:
15.5(3)S, 15.6(1)S
Known Fixed Releases: *
15.5(3)S1.4, 15.6(0.22)S0.10, 15.6(1.17)S0.4, 16.2(0.213)
Alert Type:
New
Bug Id:
CSCux35719
Title:
ASR1K QFP crash with SSLVPN
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An ASR1000 series router may exhibit an unexpected crash in the QFP ucode (cpp-mcplo-ucode) process.

On a modular chassis, this will result in a reload of the active ESP module and a switchover to the standby (if one is present). On an integrated chassis (ASR1001[-X], ASR1002-X) the entire chassis will reload.

Conditions:
This has been observed with the SSLVPN feature configured while running IOS-XE release 03.16.01a.S. The crash appears to occur due to a race condition between threads while processing TCP Selective ACK (SACK) messages from an SSL VPN client.

Further, exact conditions are not currently known.

Workaround:
Not known at this time.

Further Problem Description:

Last Modified:
01-JAN-2016
Known Affected Releases:
15.5(2)S, 15.5(3)S0.18
Known Fixed Releases:
16.3(0.6)
Alert Type:
Updated *
Bug Id:
CSCux37457
Title:
P1 power supply shows as "ps, fail" status on 13RU
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
P1 power supply shows as "ps, fail" status from "show platform" on 13RU chassis

Conditions:
Problem shows up w/ asr1000rp2-adventerprise.03.16.01a.S.155-3.S1a-ext.bin or asr1000rp2-advipservices.03.17.00.S.156-1.S-std.bin

Workaround:
"sh platform hardware slot P1 mcu status? or "sh platform hardware slot P1 fan status? can be used to monitor status of the PS.

Further Problem Description:

Last Modified:
26-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
16.2(0.218), 16.2(0.227)
Alert Type:
New
Bug Id:
CSCux68796
Title:
CPU usage 100% when do get-next entStateStandby on ASR1001-X
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
on ASR1001-X which running 15.6(1)S, when doing get-next on PC to consistently get value of "entStateStandby", CPU usage will go up to 100% and cause system hang.

Conditions:
platform:ASR1001-X
IOS:15.6(1)S

Workaround:
none

Further Problem Description:

Last Modified:
28-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw39062
Title:
ASR1K: temperature sensor threshold values are showing wrong
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Temperature sensor threshold values are showing wrong for CC slots.

Conditions:
Checking sensors on ASR1K

Workaround:
none

Further Problem Description:
none

Last Modified:
29-DEC-2015
Known Affected Releases: *
15.4(3)S, 16.2(0)
Known Fixed Releases:
16.2(0.166)
Alert Type:
Updated *
Bug Id:
CSCux01038
Title:
TCA cannot be reported when MMA report a loss over threshold
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
TCA cannot be reported when MMA report a loss over threshold

Conditions:
When I run the script PfRv3_Timer_and_threshold and PfRv3_verify_CSCut61094 together ,the PfRv3_verify_CSCut61094 will be failed because there is not Loss TCA reported when there is big loss reported by MMA.

Workaround:
NA

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S1.5
Alert Type:
Updated *
Bug Id:
CSCuv77117
Title:
Interface ip address change overrides policy config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The crypto policy state changes from its manually configured shutdown state to 'no shutdown' state automatically if we change the IP address of the interface linked to it

Conditions:
With crypto ssl policy in shutdown state, if I change the IP address to which the policy is linked to, the policy automatically changes to 'no shutdown' state

Workaround:
none

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S1.5, 15.6(0.15)S
Alert Type:
Updated *
Bug Id:
CSCuj28985
Title:
FP100 Crash during Multiple PPP ATM Session Flaps
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
FP Crash during Multiple PPP(PTA/LNS) Session Flaps

Conditions:
"subscriber accounting accuracy" is enabled

Workaround:
No

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S1, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj62858
Title:
NAT tables are cleared when unconfiguring unrelated NAT rule
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Active NAT tables in a VRF are cleared unexpectedly
when unconfiguring a static NAT belonged to other VRF.

Conditions:
The problem happens when following conditions are met.
- 'network' option is used in the NAT rule.
- The NAT rule which is to be unconfigured has overlapped local/global addresses
with other NAT rules.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S2.1
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCtd72416
Title:
REI: ASR1k observing VFR tracebacks during test of malformed fragments
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

An error message with a traceback is observed on router console that has the format, %FRAG-3-REASSEMBLY_DBG: Reassembly/VFR encountered an error: VFR failed at refrag:, first fragment length 370, non-first frag total length 608. The length values may change depending on the actual fragmented packets received by the router.

Conditions:

The ip virtual reassembly (VFR) feature is enabled on the interface that receives malformed fragmented packets. VFR drops such problem packets as they cannot be correctly processed and generates the error message as a warning.

Workaround:

Disable the source of the malform fragments or disable VFR feature. Otherwise there is no other workaround.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XND4, 12.2(33)XNF1, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCsq68436
Title:
ASR1K RomTelecom EFT - with QPPB ingress "match qos-group" fails
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On the ASR 1000 Series Router the 'match qos-group' applied to an input interface does not work. No traffic will actually match the qos-group.

Conditions:
'match qos-group' applied to an input interface.


Workaround:
None.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsr22845
Title:
Ping with MTU+1 bytes fails w/ MLPPP if ip virtual-reassebly enabled
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptom:

Packets generated by local RP which are largered outgoing interface's MTU may be dropped after initial 15 packets. The problem can be observed by ping out large packets.

Conditions:

IP virtual reassembly (VFR) is enabled by CLI or features such as NAT on the outgoing interface. Packets are locally generated by RP.

Workaround:

Disable VFR on the outgoing interface by "no ip virtual-reassembly".

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2XN, 2.2(0)
Known Fixed Releases:
12.2(33)XNB2, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsy96344
Title:
ucode crash @ ipv4_nat_flush_ports on doing clear ip nat translations *
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
A reload may occur.







Conditions:
When doing a 'clear ip nat trans *' when running an overload configuration with extremely high scaling.





Workaround:
There is not workaround. Fix expected with 2.3.2.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsy29599
Title:
qos pre-classify not working on V6 tunnel interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Qos Pre-classify not working on V6 tunnel interface.

Conditions:
Enabling Qos Pre-classification on IPV6 tunnel interface is not working.

Workaround:
None.

Further Problem Description:
Qos pre-classification functionaltiy will not work on Ipv6 tunnel interface.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNC0a, 12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsz34491
Title:
ASR1K:VFR crash at ipv4_vfr_egress
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
When NAT is configured on ASR and ip virtual reassembly is disabled on ingress interface - the ASR router may experience a crash with special ALG packets which have out of order fragments.







Conditions:
With invalid configuration with NAT, where ip virtual reassembly is disabled on ingress interface, ASR may crash with some special SIP ALG packets.





Workaround:
Configure IP virtual ressembly on ingress interface.




Further Problem Description:
None












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCta95969
Title:
ASRNAT: pool depletion with PAT configure and pure IP traffic
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
pool address depletion







Conditions:
ASRNAT pool address depletion occurs when running using PAT with pure IP traffic.





Workaround:
Configure ACL to drop pure IP traffic on NAT inside interfaces




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtc21343
Title:
nat service fullrange not working properly
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
ip nat serv fullrange command not working proper at all for address which were allocated previous to the configuration of the fullrange command.







Conditions:
ip nat serv fullrange command not working proper at all for address which were allocated previous to the configuration of the fullrange command.





Workaround:
Issue a 'clear ip nat trans *', will trigger the fullrange command to work properly




Further Problem Description:
Expect fix in 2.5.1












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNF
Known Fixed Releases:
12.2(33)XNE1, 12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsq01350
Title:
ATTN-SYN-TIMEOUT with IPsec tunnel mode traffic
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Some error messages, such as ATTN-SYNC-TIMEOUT may be displayed on the console while running some IPsec load tests.

Conditions:
IPsec site-to-site tunnel setup between MCP and any other IPsec peer.





Workaround:

Avoid IPSec stress/load conditions due to failure

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq56290
Title:
L2 MAC address is programmed wrong in GLBP hello packets
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom: GLBP hello packets set incorrect src MAC address







Conditions: when GLBP is used on ASR1000





Workaround: None




Further Problem Description: This bug is fix in this ddts starting in RLS1 throttle branch.












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtd72127
Title:
WCCP redirects IP packets destined to unreachable hosts (no route)
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
WCCP redirects IP packets with no routes (redirects packets irrespective of Destination is reachable or not).

Conditions:
If a WCCP service is applied on an interface, all packets that matches that service will be redirected to Cache Engiine.

Workaround:
None

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE2, 12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsx98529
Title:
Low Memory to Bind NAT-3-HA_COULD_NOT_CREATE_BIND
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
A message such as NAT-3-HA_COULD_NOT_CREATE_BIND appears or abnormally large memory usage is noticed on ASRNAT on the the standby.







Conditions:
This condition may occur when running ASRNAT with intrabox redundancy and running large amounts of traffic of non-standard IP protocols (i.e. not UDP, TCP, ICMP or ESP).





Workaround:
There is no workaround, but the problem should be resolved in 2.3.1.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCuh35033
Title:
GTP v0 update failure
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
V0 Update failed to create tunnel and can't release the pdp

Conditions:
create v0, update to v1, then update back to v0

Workaround:

More Info:

Last Modified:
17-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtb31663
Title:
Translation fails for DNS pkts with dynamic route-map+overload config
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
NAT allocates the same IP address from a pool in case of overload configuration, when several DNS replies pass through from the inside to outside interface, with different local addresses.

This means when outside DNS clients query for different hostnames, they receive the response of a DNS message with the same ip address.







Conditions:
The problem is seen with route-map + overload configuration





Workaround:
None

Further Problem Description:

The problem has been fixed in RLS 2.4.2



Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsy80662
Title:
15kOSPF pkt multicast destined recvd on GRE tun on ASR with NAT crashes
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptom:

ASR1000's FP may crash and the backtrace decode shows pbuf alloc failure. When the problem happens, error message MEM_MGR-3-MALLOC_NO_MEM, is displayed and its traceback decode points to the pbuf alloc failure.

Conditions:

Fragmented packets are destinated to the router and becomes large packets of size much lager than 9216 bytes, after reassembly. These large pacekts come in at a relatively high rate.

Workaround:

None.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsq47375
Title:
FW: runtime counters not shown
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:"show plat har qfp active fea fir run" command does not show counters correctly







Conditions:any time after FP is up and fwall is configured, run the show command





Workaround:N/A




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
1.1(0), 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCte57932
Title:
uSBC6: H323 to SIPP Calls fail no RTP pkts SIP to H323 direction
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
About 10% of the calls will fail with one way audio.

Conditions:
SIP Endpoints behind a NAT who are called from a H323 trunk can see about 10% of the call fail with one way audio.

Workaround:
no work around.

Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2(33)XNE, 12.2(33)XNF
Known Fixed Releases:
12.2(33)XNF1, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCtf40199
Title:
ASR NAT: DNS ALG TTL not changed for same pre/post static config
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A DNS response going through NAT ALG will not have the payload TTL changed 0 for same pre/post static config

Conditions:
DNS response going through ASR1K static NAT router running 12.2(33)XND02 release

Workaround:
none

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND2
Known Fixed Releases:
12.2(33)XND4, 12.2(33)XNF1, 15.0(1)S
Alert Type:
Updated *
Bug Id:
CSCsq59094
Title:
CPP-NAT:Dyn RMAP drop packets with existing sess after FP switchover
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
With ASR1000 NAT when using an routemap configuration after FP switchover packets are dropped for existing sessions. This only occurs if a NAT mapping has been removed and then added.







Conditions:
Described above.





Workaround:
If using routemap configuration and NAT HA, reset the router after you have removed and then added a the NAT rmap mapping.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNA1
Alert Type:
Updated *
Bug Id:
CSCsq82690
Title:
some pkts classified to wrong crypto queue during rekey
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptoms: Higher than expected latency may be seen for some priority packets through an interface with IPSec enabled.

Conditions: During IPSec rekey events some high priority packets may be enqueued behind low priority packets awaiting encryption.

Workaround: Increasing the rekey interval can reduce the frequency of, but not completely resolve this issue.
Increasing the rekey interval is achieved using the command 'set security-association lifetime kilobytes|seconds '


Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNA
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCta12360
Title:
ASR1K:unconfiguring max-entries during traffic does not throw error mess
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
ASRNAT Limit count may be falsely set to 0 after clear ip nat trans and then change of limit maximum value and under low traffic conditions.







Conditions:
ASRNAT Limit count can be falsely set to 0 after clear ip nat trans and then change of limit maximum value and under low traffic conditions.





Workaround:
Do not issue 'clear ip nat trans' before changing maximum count for a limit.




Further Problem Description:
fix targeted for 2.4.2 and later












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsx27429
Title:
ASR1K:NAT:interface PAT only allocating 1000 port
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:







With PAT on an interface aka Interface overload configured, the ASR NAT may only be create
1024 TCP and 1024 UDP sessions.

Conditions:





In a customer environment that uses a Interface overload the ASR NAT may be limited to 1K UDP and 1K TCP sessions.

Workaround:




The workaround is to use a PAT with a pool and not overload on Interface
address.

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso98929
Title:
Error message on IOSD switchover with NBAR
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptom:

The error messages are seen if there is NBAR configuration in place during a
RP switchover.


Conditions:
NBAR configuration in place and NBAR traffic were running while RP switch
over.


Workaround:

None.

Further Problem Description:

The error trace has no functional impact, but is only informational.



Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsx44316
Title:
CPP-NAT: 3rd party embedded addr translation failure with map overload
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:






When an inside mapping is configured with "overload" keyword, applications may fail.

Conditions:





Workaround:




Further Problem Description:












The problem exists when an embedded IP address in the application payload is different from that of source or destination IP address in the IP header during an application session setup.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtc16651
Title:
IPsec drops packets sized more than 9126 bytes
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
Packet size greater than 9126 bytes is dropped by CPP






Conditions:
Traffic with packet size greater than 9126 bytes




Workaround:
None



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsx67820
Title:
NO debug plat ha qfp act fe fir da g <> results to flooding o info cpp
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
After "no debug platform hardware qfp active feature firewall datapath global all detail" command is issued, there might be a lot of messages flooding the console.







Conditions:
When firewall is configured in the system.





Workaround:
Don't use the command to avoid message flooding.



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCta27295
Title:
ASR1K:Ucode crash@ipv4_nat_find_port when high PAT scaling
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR may reload with dyn nat overload

Conditions:
Reload may occur in rare conditions after ASR NAT overload run with extremely high scaling.

Workaround:
No Workaround

Further Problem Description:
Problem fixed in 2.4.1 and later releases


Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsx61254
Title:
QFP-NAT:ucode crashes with high rate of session add and delete
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
QFP may reload.







Conditions:
When running ASR NAT Overload with an extremely high setup and tear down rate.





Workaround:
Thus far this problem has only been seen when a time value has been set to 1; do not set timeouts
less than 60 seconds.
2.3.1 is targeted for fix.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsy60604
Title:
CPP-NAT: CPP crashed during mapping deletes
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
ASRNAT may cause a reload to occur.







Conditions:
ASRNAT may cause a reload to occur, when deleting a mapping with a routemap which has existing sessions.





Workaround:
Do a 'clear ip nat trans *' before removing NAT mappings. It would be safer to also remove NAT from the interfaces so new sessions can not be created during removal.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCtd69478
Title:
Traffic drops on clear ip nat with 50k NAT outside + 300 NAT inside trln
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
In rare circumstances frames that should be NATTed are note.







Conditions:
ASRNAT these symptoms can occur when there is a very high creation rate and the configuration requires the creation of both a inside static and outside static binding, this can lead to a full translation which is not correct.





Workaround:
Clear the translation that was created, but not correct.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNF
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE2, 12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsx53533
Title:
ASR1K:Ucode crash@chunk_free_part1with NAT pool overload configured
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

Ucode crash seen with NAT pool overload configured

Conditions:
When NAT pool overload is configured with high rate of session addition and deletion, ucode crash might be seen


Workaround:
No Workaround

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1
Alert Type:
Updated *
Bug Id:
CSCsz09147
Title:
MCP IPv6 Conformance: No Echo Reply for Request with Next Header field 0
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

If Echo Request packet having Hop-by-Hop Options header with a Next Header field of zero is sent to the router, it should respond with NS and ICMPv6 Parameter Problem message, according to RFC 2460. The router doesn't respond with either of them.







Conditions:

This is an ipv6 conformance issue, occurs with any standard ipv6 configuration. The image with which it was seen is: asr1000rp1-adventerprisek9.BLD_MCP_DEV_LATEST_20090512_072417.bin





Workaround:

No known workaround.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2(33)XNC, 12.2XN
Known Fixed Releases:
12.2(33)XNF, 12.2(33.1.1)XNF1, 12.2(33.1.2)MCP7, 15.1(1)MR6, 15.1(3)MRA, 15.1(3)MRA1, 15.1(3)MRA3, 15.1(3)MRA4, 15.1(3)S2, 15.1(3)S5
Alert Type:
Updated *
Bug Id:
CSCtb40908
Title:
MLP Priority packet latency increase when Bundle Flow Control invoked
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

During periods of MLP bundle over subscription, the latency of priority traffic becomes higher than expected.







Conditions:

During periods of sustained MLP bundle over subscription (input data rate greater than the MLP bundle available transmit bandwidth), the latency of priority traffic becomes higher than expected due to priority traffic buildup in the priority queues.





Workaround:

One possible workaround is to limit the maximum depth of the priority class queue using the "queue-limit" command.

Since sustained over subscription should not be a "normal" condition it is not likely that this workaround should be necessary.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsr12977
Title:
Ingress Netflow on Mcast traffic results into same src/dst cache entry
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Netflow on the ASR1000 series will collect and export/display multicast v4 flows with an incorrect destination interface.

Conditions:
This issue occurs when v4 ingress Netflow is processing multicast flows. The destination interface will be incorrectly reported in collected flows.

Workaround:
None.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN1
Known Fixed Releases:
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsx47291
Title:
"show ip nat statistics" not showing the "hits" properly.
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
Hit and Miss counter always zero in 'sh ip nat stat' for ASR NAT.







Conditions:
Hit and Miss counter always zero in 'sh ip nat stat' for ASR NAT.





Workaround:
No workaround. Fix scheduled for 2.3.1




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsz51243
Title:
NAT reassembled packet not fragment when VFR is off on ingress
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
When fragments entering ASR with NAT ingress and egress configured, seem to come out of ASR as reassembled packets - and ingress virtual reassembly has been manually disabled.







Conditions:
When NAT ingress and egress is configured, VFR is automatically enabled on ingress and egress interfaces. If VFR is disabled from ingress interface manually, then fragments entering the ASR router will go out as reassembled packet from egress interface instead of getting fragmented as original fragments that entered the ASR.





Workaround:
Configure VFR on ingress interface again.




Further Problem Description:
Disabling VFR on ingress interface prevents fragmentation at egress interface.












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtb06861
Title:
ATTN-3-SYNC_TIMEOUT:msecs since last timeout 742317, missing packets 2
Status:
Fixed
Severity:
3 Moderate
Description: *


Symptom:

Logging message is seen as "ATTN-3-SYNC_TIMEOUT:msecs since last timeout 742317, missing packets 2".

Conditions:

Router receives fragmented SIP packets and NAT is enabled, so that virtual reassembly feature reassembles such packets.

Workaround:

No. There has not been functional impact reported.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCta25759
Title:
non TC service accounts wrongly all packets
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
all packets, including the dropped packets which are not sent on the wire, are being accounted for.







Conditions:
this is happening for non traffic services under ISG




Workaround:
none



Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCso81631
Title:
Session count goes wrong on standby FP with high session churn rate
Status:
Fixed
Severity:
3 Moderate
Description: *



Symptom:

Firewall session count may be inaccurate on standby ESP with high session churn rate.


Conditions:

When a large amount of TCP sessions go up and down at high rate, such as 20K /sec, the session count on the standby ESP goes up. This problem does not exist on the active ESP.



Workaround:

The session count could be misleading but no service impact. Users can reference session counts on both ESPs to determine the inaccuracy.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCsq01759
Title:
ipsec on tunnel int. with NAT box in the middle doesn't work
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

When IPsec tunnel is configured between an ASR1000 and a remote peer using tunnel interface through a network address translation (NAT) device, ASR1000 drops UDP encapsulated encrypted packets

This issue is affecting the following features:

ipsec/gre with nat
dmvpn with nat
vti with nat

Conditions:

ASR1000 should decrypt the UDP encrypted packets


Workaround:

Do not configure IPsec on tunnel interfaces.






Last Modified:
17-DEC-2015
Known Affected Releases: *
12.2XN, none
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtc02014
Title:
HSL data logging stops sending data to collector after router reload
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

HSL (High speed logger) stops sending data to the collector after router reload. Rather, logs are sent to the console via syslog.

Conditions:

This symptom is observed on a 6RU(ASR1006) with HSL and Firewall configured.

Workaround:

Unconfigure and configure HSL again will fix the problem.

Further Problem Description:

The problem only occasionally happens on certain boxes because it depends on the order of events during router boot up, which is somewhat non deterministic.

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNC
Known Fixed Releases:
12.2(33)XNF
Alert Type:
Updated *
Bug Id:
CSCsr66075
Title:
SPA_CHOC_DSX-3-HDLC_CTRL_ERR running FR/FRF.12 on CT3
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
An ASR1000 series router running an FRF.12 config indicates the following error:
Jul 30 14:07:03.736 EST: %SPA_CHOC_DSX-3-HDLC_CTRL_ERR: SIP2/0: SPA 2/0: 5 TX Chnl Queue Overflow events on HDLC Controller were encountered.

Conditions:
This is seen on FR interfaces where a large percentage of the traffic being sent is fragmented, but there are also period of non-fragmented (priority) traffic. In the cases where this message is seen, packets have been dropped.

Workaround:
No workaround is required, the message is an indication that packets have been dropped due to an overrun condition. No other action is needed, the router will self recover.

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2, 12.2XN
Known Fixed Releases:
12.2(33)XNB1, 12.2(33)XNC, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtc36654
Title:
QFP-NAT:show ip nat stat counter is non-zero after all sessions timeout
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
Dynamic half entries are sometimes not appropriately aged out on ASRNAT.







Conditions:
The above condition occurs when a large number of half entries are aged out at the same time. This can most likely be seen when the following is configured: 'ip nat trans timeout '





Workaround:
If you have 'ip nat trans timeout ' configured, unconfigure it (i.e. 'no ip nat trans timeout ');




Further Problem Description:
Fixed in 2.4.2 and later












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsq67130
Title:
NAT:Active FP Crashes when bootup standby FP
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
ASR1000 active FP crashes when NAT is configured, NAT is actively using 500,000 addresses and an HA switchover occurs.







Conditions:
Described above in Symptom





Workaround:
ASR1000 NAT works best with active address scaling of 50,000 or less.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN, 2.2
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCtg97100
Title:
MLPPP Multilink interface stops forwarding traffic after link lost
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:

Traffic forwarding on a multiple member link MLPPP Multilink bundle stops after one of the member links goes down while traffic was being sent on the bundle at a high data rate.

Note that this issue only existed in the 12.2(33)XND and prior release trains. This issue did not exist in 12.2(33)XNE and beyond.

Conditions:

While forwarding data at high data rates on a MLPPP Multilink bundle, if one of the member links becomes congested and then goes down or is removed from the MLPPP Bundle before the congestion stated is cleared the congestion state of the MLPPP bundle interface may not get cleared and traffic forwarding in the egress direction stops on the bundle. When this occurs all traffic forwarding from the Multilink interface stops and eventually traffic waiting to be transmitted begins to get tail dropped by QoS.

"show interface " would indicate no output packets and "show policy-map interface " would likewise indicate tail drops as well as queue depth buildup.

In addition to the problem being seen following a MLP member link going down it has also been seen as a result of a member link going down as a result of a SIP or SPA card being removed/reinserted on which a member link resides.

Workaround:

A "clear interface

Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XND
Known Fixed Releases:
12.2(33)XND4
Alert Type:
Updated *
Bug Id:
CSCtf27981
Title:
traceback observed@ipv4_nat_add_static_cfg on changing net mask
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASRNAT static network does not work properly or traceback may be received on configuration on unconfiguration

Conditions:
This occurs only if 2 static networks are configured exactly the same except for network mask.
Eg.
ip nat inside source static network 10.1.0.0 10.2.0.0 /24 vrf vrfA
ip nat inside source static network 10.1.0.0 10.2.0.0 /16 vrf vrfA

Workaround:
Do not configure 2 static networks exactly the same except for network mask. If you do, it is recommended that you do the following:
1) remove both static network configuration
2) add back the 1 static network which is truly desirable.
3) that should work, but if it does not reload the box.

Last Modified:
17-DEC-2015
Known Affected Releases:
15.0(1)S
Known Fixed Releases:
12.2(33)XND4, 12.2(33)XNF1
Alert Type:
Updated *
Bug Id:
CSCsy30796
Title:
ASRNAT: clear ip nat trans does not clear allhost data
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
With ASRNAT 'clear ip nat trans *' does not clear the allhost limit data.







Conditions:
With ASRNAT 'clear ip nat trans *' does not clear the allhost limit data.





Workaround:
There is no workaround. Fix in 2.3.1 and later releases.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCtc61823
Title:
Ingress CPP uCode crash with MLP due to Invalid QID
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

ASR1K FP would report an error similar to the following and also restart the active FP.

%CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:ETC_ETC_LOGIC1_LEAF_INT_INT_ETC_LKUP_DATA_ERR det:DRVR(interrupt) class:OTHER sev:FATAL id:2687 cppstate:STOPPED res:UNKNOWN flags:0x7 cdmflags:0x0
%CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0 unresolved fault detected, initiating crash dump.
%CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:PQS_PQS_LOGIC1_INTR_LEAF_INT_INT_INSTALL_DISABLE_Q_ERR det:DRVR(interrupt) class:OTHER sev:FATAL id:4378 cppstate:STOPPED res:UNKNOWN flags:0x7 cdmflags:0x0
%CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0 unresolved fault detected, initiating crash dump.
%CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:RC_KEY_RC_KEY_CSR_RCS_KEY_LEAF_INT_INT_RCSKEY_QED_FIFO_UNDERFLOW det:DRVR(interrupt) class:OTHER sev:FATAL id:4311 cppstate:STOPPED res:UNKNOWN flags:0x7 cdmflags:0x0

The key error of interest being the: PQS_PQS_LOGIC1_INTR_LEAF_INT_INT_INSTALL_DISABLE_Q_ERR
error indication.







Conditions:

This problem has only been seen thus far with a large scale MLP configuration
(several hundred bundles) with over subscribed traffic to the Multilink PPP (MLP)
bundles as well as a high rate of MLP fragmented traffic on the MLP receive
interface.





Workaround:

None.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XND3, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtx59316
Title:
Punts for incomplete adjacency should bypass CoPP
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A packet punt to RP due to incomplete adjacency gets processed by CoPP. This
makes CoPP complex, because these punted packets are not directed to the system
itself and requires the CoPP to be opened up.

Conditions:
This is seen with 3.5.2S and similar release and by current design.

Workaround:
As workaround the CoPP need to be changed to allow the punted packets.

Last Modified:
17-DEC-2015
Known Affected Releases:
15.2(1)S
Known Fixed Releases:
15.2(4)S3, 15.3(1)S1, 15.3(2)S
Alert Type:
Updated *
Bug Id:
CSCsz27964
Title:
Firewall should NOT drop ICMP Dest Port Unreachable pkts for ICMP pass
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

ICMP Dest Port Unreachable packet is dropped when the firewall action for ICMP is pass

Conditions:

The ICMP Dest Port Unreachable packet will be generated if the destination port is not available. However, the current firewall inspect action would drop such ICMP packet. When the pass action is configured to workaround this limitation, the ICMP Dest Port Unreachable packet is still gets dropped

Workaround:

N/A

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsy48878
Title:
MC NAT out2in performance much worse than in2out
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
IT was observed that MC NAT one OIF out to in performance was much worse than in to out performance.







Conditions:




This performance defect has been there from day one and was due to inefficient address binding mechanism as compared to that used in in to out direction.

Workaround:



No workaround for this performance issue.

Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsx50835
Title:
Deleting more than 256 mappings causes FP reload
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:

Deleting more than 256 NAT mappings will cause FP to reload







Conditions:
NAT Configuration delete with configuration having more than 256 mappings.





Workaround:
No workaround available.Fixed in releases after RLS3.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCso38880
Title:
CPP-ALG:NAT with Route-Map:SIP and Skinny IN-to-IN call failed
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom: When Dynamic NAT Overload (PAT) or Dynamic NAT using Route-Map
is configure, SIP and Skinny Inside-to-Inside calls might fail.








Conditions: When SIP or Skinny end-points register to a Call Manager thru a NAT router using ALG, calls between inside end-points might fail if PAT or NAT using Route-Map is configured in the NAT Application Layer Gateway.





Workaround: Use Static or Dynamic 1-1 NAT (except Route-map).




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN, all
Known Fixed Releases: *
12.2(33)XNB, 3.9.0.6i.LC
Alert Type:
Updated *
Bug Id:
CSCta42491
Title:
VRF AWARE ASRNAT Ucode crash after ESP switchover during Longevity Run
Status:
Fixed
Severity:
3 Moderate
Description: *








Symptom:
ASR may reload.







Conditions:
ASR may reload after an ESP switchover in rare cases with very high session scaling in ASRNAT.





Workaround:
There is no workaround




Further Problem Description:
Problem fixed in 2.4.1 and later releases












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCuu48458
Title:
ASR1k/15.4(3)S QinQ frames are dropped under "TCAM Failure Drops"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
QinQ frames are dropped

Conditions:
QinQ accross EoMPLS pw

Workaround:
unknown yet

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
15.5(2.2)S
Known Fixed Releases: *
15.4(3)S4.7, 15.5(3)S1.2, 15.6(0.22)S0.8, 16.2(0.213)
Alert Type:
Updated *
Bug Id:
CSCue74708
Title:
destination-glean recovery not shown in show snoop policy command
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:In ipv6 snooping policy, destination-glean recovery not shown in show ipv6 snooping policy command, while the data-glean recovery is shown in show ipv6 snooping policy command

Conditions:In ipv6 snooping policy, destination-glean recovery not shown in show ipv6 snooping policy command

Workaround:user can check the destination-glean recovery use show running command.

Last Modified:
19-DEC-2015
Known Affected Releases:
15.2(1)E, 15.3(2)S
Known Fixed Releases: *
15.1(1)IC66.63, 15.1(1)ICA4.122, 15.1(1)ICB29.36, 15.2(2)E, 15.2(2)E1, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(2.13)S
Alert Type:
Updated *
Bug Id:
CSCuc43160
Title:
fhs-ask1k dynamic Binding Table number not include dhcp prefix entry
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom: dynamic binding table number wrong,dhcp iapd prefix entry not count by dynamic, but by total number

Conditions:enable prefix-glean from dhcpv6-pd,

Workaround:none

Last Modified:
19-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases: *
15.1(1)IC66.63, 15.1(1)ICA4.122, 15.1(1)ICB29.36, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(2.13)S, 15.3(2.15.1)XEB
Alert Type:
Updated *
Bug Id:
CSCuw33328
Title:
IOS-XE: ZBF + dVTI + Default Zone, IOS doesn't do VFR
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
VFR is not enabled in default zone with dynamic tunnel and ZBF (e.g. DMVPN).

A symptom of the above is packets that need reassembly due to fragmentation to get dropped with an error similar to the one below:
Dropping udp pkt from internal0/0/rp:0 10.1.1.1:161 => 192.168.0.1:41706(target:class)-(none:none)
due to Invalid L4 header with ip ident 11197

SPOKE#show policy-firewall stats platform
...
--show platform hardware qfp active feature firewall drop--
-------------------------------------------------------------------------------
Drop Reason Packets
-------------------------------------------------------------------------------
Invalid L4 header 1241 <---

Conditions:
Default zone is enabled

Workaround:
Enable "ip virtual-reassembly-out" under interface

Further Problem Description:

Last Modified:
21-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw75310
Title:
ASR1K: abnormal config for cfm offload sampling
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR1K: abnormal config for cfm offload sampling

Conditions:
1. config MEP with 100ms , 2000 offload sampling;
2. modify 100ms to 1s;
3. show cfm config.
4. offload sampling defined with 1s CCM, this is not expected behavior.

Workaround:
N/A

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.6(1)S, 16.2(0)
Known Fixed Releases: *
15.6(1.12)T, 15.6(1.17)S
Alert Type:
Updated *
Bug Id:
CSCuw41346
Title:
ESP packets discarded during re-key with static NAT on ASR1k
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Traffic loss through IPSEC tunnels (at the time of Phase-2 rekey). After the re-key, the NatIN2out drop counter is seen to increment on the router performing the ESP NAT:

BGL.I.06-ASR1000-1#sh plat hardware qfp active statistics drop
-------------------------------------------------------------------------
Global Drop Stats Packets Octets
-------------------------------------------------------------------------
NatIn2out 5 670 <<<<<<<<< NatIN2out drops

Conditions:
NAT is implemented in such a way that the Tunnel end points are not aware of it, therefore, NAT-T does not come into picture and the VPN endpoints do not encapsulate ESP into UDP\4500.

Workaround:
Deploy NAT in a way that the tunnel end points detect the NAT in between using NAT-Detection and hence encapsulate the ESP into UDP\4500 to avoid NAT ESP processing on the NAT routers.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases: *
15.5(3)S1.4, 15.6(1.10)S, 16.2(0.177)
Alert Type:
Updated *
Bug Id:
CSCuv12943
Title:
Add cli support to enable cepThroughputNotif trap
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
To enable cepThroughputNotif trap for the crypto throughput notification for exceeding the threshold and max bandwidth.

Conditions:
Trying to enable the trap using cli, cli is not available.

Workaround:
Use snmp set on cepThroughputNotifEnabled object to enable the trap.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(3)S1.4, 15.6(0.16)S, 15.6(1.4)S, 16.2(0.187)
Alert Type:
Updated *
Bug Id:
CSCuv75254
Title:
Errors observed when reloading SSL-GW with multi policies with same VRF
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Reloading a SSL-GW with multiple policies using interfaces from the same VRF results in 'ERROR: Two policies cannot have the same ip address, port and vrf configuration' message on the console post reload

Conditions:
SSLVPN headend has multiple SSL policies. Each of these policies use different interfaces, but the interfaces are part of the same VRF. With such a condition, if we reload the router, the router complains when booting up stating: '%ERROR%: Two policies cannot have the same ip address, port and vrf configuration'

Workaround:
none

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.6(1)S
Known Fixed Releases: *
15.5(3)S1.4, 15.6(0.14)S
Alert Type:
Updated *
Bug Id:
CSCuj29429
Title:
Add new FP100 FPGA image
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
FP100 test CPLD image with versioin 13012900 is added in hw-programmable package.

Conditions:
The FP100 test CPLD will be installed when the CPLD is upgraded.

Workaround:
Do not upgrade FP100 CPLD.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCui01834
Title:
FP200 crash and TB on session bringup for BNG Profile11a_58k_LNS
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
FMAN-FP crash may occur while broadband sessions are torn down

Conditions:
When a large number of broadband sessions are being torn down, there is a possibility of a crash in FMAN-FP.

Workaround:
None

Further Problem Description:
None

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCum11084
Title:
ASR1K WCCP support for MPLS VPN
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
WCCP can redirect packets to WAE correctly, but GRE return packets from WAE are droped by ASR1k.
"show platform hardware qfp active statistics drop" shows that the drop cause is TunnelUnsupportedConfig

Conditions:
1. configure WCCP on PE router of a MPLS VPN network
2. WAE is connected to WCCP router through MPLS VPN network

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCum69887
Title:
Mis-acked tcp sequence with NAT and LDAP ALG
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When there is SIP address in the message. NAT cann't handle the tcp sequence properly with LDAP ALG after pdu size changed. NAT will not handle the delta value for the right ack message but thereafter messages, which may cause mis-acked message flows between two endpoints.

currently only seen with netmeeting

Conditions:
Send LDAP traffic with empty comment item in LDAP ALG.

Workaround:

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun22771
Title:
ASR crash at pa_get_state
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
An ASR 1002-X router might crash and reload writing a core file in the process.

Conditions:
ASR1002-X running IOS XE in a NAT-HA B2B scenario

Workaround:
None so far

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuj68565
Title:
Linecard status unknown in any slot post insertion in slot4/5,13ru
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR1000-2T+20X1GE and ASR1000-6TGE Card status will remain unknown in any slot post insertion in slot4/5 of ASR1013 with ESP40.

Conditions:
Sequence of events needed:
1. Insert the ASR1000-2T+20X1GE and ASR1000-6TGE in Slot 4 or 5 of ASR1013 with ESP40
2. Remove the card
3. insert in any other slot other than slot 4 and 5.

Workaround:
Wait for minimum 1 Minute before reinserting the card in slot other than 4 and 5 ( ie 1 min wait between step 2 and 3 of Condition above)

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCun44581
Title:
XE3.13: CFT feature objects stats pending after feature eanble/disable
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
FOs of CFT features might not be released in case the featrue has unregistered from CFT before the flow aged.

Conditions:
Feature of CFT (Stile,FNF,FME,CENT..) that allocated FO in the flow and then un-registered from CFT (i.e feature has been disabled) while another feature is still registered to CFT, the FO of that feature won't be released.

Workaround:
stop traffic before disable the feature or reload.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)M, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Alert Type:
Updated *
Bug Id:
CSCul22381
Title:
CPP DRV: Close potential race condition in KIPC
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Unexpected tracebacks occur randomly at a very slow rate (i.e. once per day or even less). Normal processing will continue.

Conditions:
This issue is specific to ESP100, ESP200 or ASR1002-VE.

Workaround:
There is no known workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCul55038
Title:
PE-LNS : ICMPV6 message "too big" not sent
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
In mpls-vpn scenario, when the size of packet coming from core network is bigger than mtu set on CE facing interface, the expected ICMPv6 TOO_BIG fail to return.

Conditions:
1. packet is bigger than mtu on CE facing interface.
2. the packet come from core mpls network and try to go through CE facing interface.
3. the issue is found on PE in mpls-vpn scenario.

Workaround:
enable IPv6 on core facing interface, which is receiving the mpls packet to CE.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(0.1), 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCui65881
Title:
ASR1K MLPPPoE - Incorrect Bundle BW being applied in multilink scenario
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The MLPPP bundle bandwidth is not updated which led to non-priority packet drops when traffic exceeds the current rate. In the case documented in this DDTS, a bundle rate is supposed to be set to 12M but it was instead set to 1.5M.

Schedule specifics:
Index 1 (SID:0x0, Name: Virtual-Access339)
Software Control Info:
sid: 0x396eb, parent_sid: 0x38022, obj_id: 0x115e, parent_obj_id: 0x54
evfc_fc_id: 0xffff, fc_sid: 0x396eb, num_entries (active): 2, service_fragment: False
num_children: 2, total_children (act/inact): 2, presize_hint: 0
debug_name: Virtual-Access339
sw_flags: 0x0883034a, sw_state: 0x00000905, port_uidb: 127126
orig_min : 0 , min: 1536000
min_qos : 0 , min_dflt: 1536000
orig_max : 0 , max: 1536000
max_qos : 0 , max_dflt: 1536000
share : 1
plevel : 0, priority: 65535

It should be set to 12M.

Index 1 (SID:0x0, Name: Virtual-Access45)
Software Control Info:
sid: 0x38026, parent_sid: 0x38023, obj_id: 0x189, parent_obj_id: 0x54
evfc_fc_id: 0xffff, fc_sid: 0x38026, num_entries (active): 2, service_fragment: False
num_children: 2, total_children (act/inact): 2, presize_hint: 0
debug_name: Virtual-Access45
sw_flags: 0x0883034a, sw_state: 0x00000905, port_uidb: 130692
orig_min : 0 , min: 12288000
min_qos : 0 , min_dflt: 12288000
orig_max : 0 , max: 12288000
max_qos : 0 , max_dflt: 12288000

Conditions:
The Bundle rate was not being updated when QoS events preceded the rate update from MLPPP. If the MLP event is processed before the QoS event then there is correct behavior, however if the QoS event is processed before the MLP rate update event then the MLP event is lost and never gets processed to update the bundle bandwidth.
This results in tail drops when the interface becomes congested prematurely.

Workaround:
The workaround is to apply QoS after all member links have been successfully added to the bundle.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCui67325
Title:
ASR1k cpp crash observed in ipv4_nat_bind_find with HAL_RID_INVALID
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The ESP may crash in cpp_mcplo

%CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8

Conditions:
NAT is enabled

Workaround:
None at this time

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuo41369
Title:
Nightster: VLAN errors seen on Native GE connected to C3750G switch
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
on ASR1001-X , VLAN errors are reported on the native GE port which is connected to a C3750G GE switch.

Conditions:
The configuration of the UUT port is default and the switch port is as follows:

switchport access vlan 2
switchport mode dot1q-tunnel
no cdp enable

Workaround:
The present workaround is to implement a different GE Switch model in this environment.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun58672
Title:
VTCP not send tcp segments according adjustment mss
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
VTCP not send tcp segments according adjustment mss

Conditions:
tcp sync with mss 1460 from interface B, and Interface A sent out sync with mss 1390
tcp segments (tcp payload 1390) come from interface A
observed tcpsegments with tcp payload 1460 sent out via interface B

Workaround:
n/a

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui57866
Title:
FNF: Platform exporter config displays IPv4 addr when IPv6 configured
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
"Show plat soft flow fp active exporter name " displays invalid source and destination addresses if using IPv6.

Conditions:
This is simply a display issue. The addresses are displayed in an IPv4 format. This fix checks the address type before displaying the addresses in the correct IPv4 or IPv6 format.

Workaround:
No workaround.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.1(3)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun31285
Title:
Nightster: Hi priority traffic is redirected to low priority channel
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
a. Problem is specific to ASR1001-X Built in Bay (bay 0)
b. The issue is when default ipv4 precedence based plim classification is used.
TOS is 8 bits and its relation to ipv4 precedence is shown below.

+ * IP precedence, TOS, DSCP mapping.
+ * --------------------------------------------------------
+ * | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
+ * --------------------------------------------------------
+ * <---- Precednce ---->
+ * <-------------- DSCP -------------------->
+ * <----------------------- TOS -------------------------->
+ * ---------------------------------------------------------------
+ * | TOS (8 bit) | Prec (3 bit) | DSCP (6 bit) |
+ * ---------------------------------------------------------------
+ * | 0 - 255 | MSB 3 bits of TOS | MSB 6 bits of TOS |
+ * | | Prec 0 - TOS 0 - 31 | DSCP = n |
+ * | | Prec 1 - TOS 32 - 63 | TOS = { n*4, |
+ * | | Prec 2 - TOS 64 - 95 | n*4 + 1, |
+ * | | Prec 3 - TOS 96 - 127 | n*4 + 2, |
+ * | | Prec 4 - TOS 128 - 159 | n*4 + 3 } |
+ * | | Prec 5 - TOS 160 - 191 | |
+ * | | Prec 6 - TOS 192 - 223 | |
+ * | | Prec 7 - TOS 224 - 255 | |
+ * |--------------------------------------------------------------

This issue is seen for ipv4 traffic with a TOS value such that lower significant 5 bits of TOS field are non-zero.
e.g 255 - binary 111 11111

Conditions:
This issue is seen for ipv4 traffic with a TOS value such that lower significant 5 bits of TOS field are non-zero.
e.g 255 - binary 111 11111

Workaround:
If using ipv4 precedence based plim ingress classification, use a TOS value such that lower significant 5 bits of TOS field are ZRO.
e.g 255 (dec), 0xFF (hex) - binar 111 11111 - This won't work. (traffic will be classified as low priority in ingress direction in ASR1001X, builtin bay ports)

Modify the TOS value such that least significant 5 bits are zero.
111 00000 - TOS 224 (dec), 0xE0 (hex).

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui87023
Title:
Enlarge ALG RPC pool limitation
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Enlarge ALG pool limitation

Conditions:
sh plat har qfp ac fea alg mem | in RPC

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2
Alert Type:
Updated *
Bug Id:
CSCul34776
Title:
[AVC-ISSU] AOR not working after SW upgrade to 3.12
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
After ISSU process AOR and dependent fields are not working. Also, sampler granularity may be different from the configured.

Conditions:
Happens sometimes

Workaround:
Remove AVC configuration and apply it again after the ISSU process is finished

Further Problem Description:
Sometimes during ISSU process several flags may be not downloaded properly. These flags are AOR, dependent field flags, sampler granularity flag and enterprise number.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S1.2, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCui70820
Title:
Increase the amount of WCCP Event Logging
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
This bug is an enhancement to increase the amount of data that WCCP collects on the asr1k event tracing infrastructure. These logging enhancements will aid in troubleshooting and diagnostics.

Conditions:
No special conditions exist, as this is a enhancement to existing logging functionality.

Workaround:
No workarounds.

Further Problem Description:
This increases the number of events and the amount of data that is logged by each event within the ASR1k binary event logs that are kept for events on the ESP/QFP as well as additional information within the WCCP debug outputs.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuc47181
Title:
CFM TCAM programming takes too long
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
OneFW(official name: cxsc)'s AVC class group takes about 4 seconds to be programmed into TCAM, which is more than the average time.

Conditions:
OneFW enabled, which by default will download the AVC class group.

Workaround:
N/A

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui47798
Title:
ping the gre tunnel packets lost when enable erspan
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
packet lost over GRE tunnels

Conditions:
ERSPAN configured on the device, ping the gre tunnel address
there are packets lost

Workaround:
Disable ERSPAN

Further Problem Description:
peibyang-ASR1002#sho version
Cisco IOS XE Software, Version BLD_MCP_DEV_LATEST_20130801_040024
Cisco IOS Software, ASR1000 Software (PPC_LINUX_IOSD-ADVENTERPRISEK9-M), Experimental Version 15.4(20130801:060830) [mcp_dev-BLD-BLD_MCP_DEV_LATEST_20130801_040024-ios 170]
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Thu 01-Aug-13 02:29 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2013 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
1???configure a gre tunnel interface
2???enable erspan over the phy interface, the tunnel is passing this phy interface at the same time.
3???ping the tunnel interface each other??? there is packet lost.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCul95633
Title:
NTT XE3.10: Add changes for ESI serdes link handling
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ESI link does not come up when two RPs are running XE3.x and XE2.6.x versions

Conditions:
When two XE versions are running.

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
12.2(33)XNF, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCuj25221
Title:
CPP process crash during change in NAT source loopback IP address
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
CPP process crash during a change in the loopback ip address used as a DNS NAT source

Conditions:
change in the ip address

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4.0.1)
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuj80245
Title:
ASR1K AVC: no records created when packets get fragemented
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
No address prefix flow records get reported when packets get fragmented at Tunnel interface, which has enabled with AVC flow monitor.

Conditions:
May occur when packet are fragmented due the maximum packet length limit, called the Maximum Transmission Unit (MTU).
When packet size is bigger than the interface MTU, the packet will be fragmented and will not be monitored by AVC.

Workaround:
Increase the size of the MTU to accommodate larger packets. For example, configure an MTU of 3000 bytes with the following CLI:
Device(config)# interface Gig0/2/1
Device(config-if)# mtu 3000

Further Problem Description:
The issue may occur when UDP traffic becomes fragmented over a DMVPN tunnel interface due to a default maximum packet size (MTU) of 1500 bytes.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCun35149
Title:
traceback when enable performance monitor on local switching
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
enable performance monitor on local switching interface

Conditions:
two interfaces are connected as local switching

Workaround:
N/A

Further Problem Description:
This TB is generated when L2 interface try to install NBAR for ipv6, but there is no ipv6 NBAR for L2 switching interface implemented before the bug fix

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S, 15.3(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCul51296
Title:
Connection reset after RP switchover
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Connections timed out after RP switchover

Conditions:
Connection reset after RP switchover. Not able to establish new connections.

Workaround:
re-enable Service Context.

Further Problem Description:
Problem happens in about 1 in 10 RP switchover on ESP20. This had not been with other ESP so far.

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCum25232
Title:
ASR1K: ModExp failure with RSA key lengths that are not power of two
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR1K will fail to verify a message that is signed using a non-standard RSA key length (2024 for example). The failure is commonly seen during SCEP enrollment or when validating a peer certificate when RSA-SIG is used for phase 1 authentication.

Conditions:
The failure has been observed on ASRs using an integrated ESP

Workaround:
None

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(1)S2, 15.3(1)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCum66678
Title:
memory leak in 'CPP I/F DB' causing FP to reload
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When per-tunnel QoS is configured on a DMVPN hub, the ESP memory may become exhausted due to a memory leak. This could cause the ESP to reload.

Conditions:
If there are a large number of DMVNP spokes and the spokes flap, then memory on the ESP is allocated and not freed. This could cause the memory exhaustion on the ESP and thus case the ESP to reload.

Workaround:
One could monitor the ESP memory usage and if it is getting low, then reboot the ESP during a mainance window. The command "show platform software memory qfp-control-process qfp act brief | inc I/F" can be used to determine if memory is being consummed due to this issue. Example:

mcp6ru-14#show platform software memory qfp-control-process qfp act brief | inc CPP I/F DB
module allocated requested allocs frees
------------------------------------------------------------------------------
CPP I/F DB 128 48 5 0 <== normal condition is 5 allocs at bootup that is not freed

(one spoke flapped)

CPP I/F DB 8172 8076 6 0 <== 1 additional alloc of 8028 (2k spokes in network) - with this bug, this memory is not freed

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCun94073
Title:
SBC IPv6 traffic is not passing through hairpin pinholes
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:





when non local ip address is used for hairpin calls and hairpin calls form loop,
rtp is not forwarded by sbc.

Conditions:




when non local ip address is used for hairpin calls and hairpin calls form loop.

Workaround:


N/A

Further Problem Description:












Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui80058
Title:
IPv4 tcp adjust-mss does not work egress on crypto map interface
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
On the ASR1000 platform, if ip tcp adjust-mss is configured on an interface with a
crypto map, then the TCP MSS value is not adjusted for egress TCP flows that are
encrypted.

Conditions:
This is only a problem when there is a crypto map configured on the same interface
ip tcp adjust-mss is enabled.

Workaround:
Configure ip tcp adjust-mss on the ingress LAN interface when crypto map is
configured on the egress interface.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCui17217
Title:
RP2: %IOSXE-3-PLATFORM: F1: cpp_cp error observed on the XE-310
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A PROXY_SID_UPDATE_LOCK_ERROR message may be printed intermittently when links are being added to or removed from an MLP bundle.

Conditions:
This error message may be seen on a router running IOSXE, such as an ASR1000. It may be seen in context with an MLP bundle that has more than one link. The occurrence might be random, and hard to reproduce.

Workaround:
Add or removing links gradually may be able to reduce the likelihood of this behaviour.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum48124
Title:
[AVC]ESP crash with ESP reload observed on RP2 during config-replace
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Occasional crash/traceback and router reload when performing config-replace while both performance monitor/s (e.g. EzPM) and native FNF montor/s are assigned to the same interface.

Conditions:
Performing a config-replace to a clean config (i.e. doesn't assign performance monitors or native FNF monitors), while there are both performance monitor/s (e.g. EzPM) and native FNF montor/s assigned to the same interface in the current running config.

Workaround:
First un-assign ether or both the perfromance monitors and/or the native FNF monitors before performing the config-replace. In that case, the config-replace works ok.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S1, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCun87352
Title:
CPP crash in Flexible NetFlow due to RBUF handle exhaustion
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The ESP module in an ASR1000-series router may reload unexpectedly. In systems with an integrated ESP, such as the ASR1001 and ASR1002-X, this may result in a reload of the entire chassis.

Conditions:
This has been observed on an ASR1001 running 15.3(3)S2 (IOS-XE 3.10.2S).
Flexible NetFlow is enabled.
Exact conditions currently unknown.

Workaround:
Disabling Flexible NetFlow may prevent the crash.

Further Problem Description:
A CPP crash of this nature will produce two core files: a CPP core, and an FMAN core.

TAC may be able to examine the CPP core to determine if an RBUF out-of-handles exception has occurred.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S2, 15.4(3)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuo31667
Title:
uSBC: "Badly formed RTP" drop counter increasing
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
"Badly formed RTP" drop counter increases unexpectedly. This issue is recovered by reloading the SBC.

Conditions:
This issue is seen with tele-presence call.

Workaround:
Reload the SBC.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.1(3)S4
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCul84373
Title:
Kingpin-Disable hw-mod Bullseye upgrade proc and move to hw-programmable
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Tech pubs will need to verify that there is no current documentation referencing the FPGA upgrade process for ASR1002-X utilizing the "upgrade hw-module subslot x/y fpd" command structure. This will be replaced with the new "upgrade hw-programmable..." process.

Conditions:
This DDTS brings in the support for upgrading the board FPGA on ASR1002-X using CLI 'upgrade hw-programmable fpga filename bootflash:image.pkg r0'. FPD support for BUILT-IN SPA will no longer be required after this so FPD is no longer supported for BUILT-IN SPA.

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(0.2)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.3(3)S2.9, 15.3(3)S3, 15.3(3)S4, 15.4(1)S2, 15.4(1)S3, 15.4(2)S0.3, 15.4(2)S1, 15.4(2)S2, 15.4(2.7)S, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCue86166
Title:
ELC: Userspace code for MBFPGA & HKP interrupt handler
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The interrupt infrastructure is in place; the userspace handling of interrupt delivery to Aggregation ASIC userspace driver code is not being done correctly.

Conditions:
This fixes the userspace handling of interrupt delivery to Aggregation ASIC userspace driver code

Workaround:
none

Further Problem Description:
This is for reporting any errors that the hardware may have detected. In case the errors are critical, the code will attempt to recover by reloading the line card.

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj45298
Title:
Packet-trace reports "Packet Consumed Silently" for tunnel traffic
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
With the ASR1k packet-trace feature, a packet may be shown as "Consumed
Silently" in the packet state, where it really should be forwarded. This is only a
problem with the packet trace output, and does not impact the actual forwarding
functionality.

Conditions:
This can happen when packet-trace is tracing a tunnel encapsulated packet.

Workaround:
None.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCug15520
Title:
LISP:ucode crash @ tw_timer_stop_nl in lisp+fw scaling case
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
hit an ucode crash in lisp+zbfw scaling case, scaling number is 500 lisp instances, 50k eid table, 500 pair zone. The crash is hit in unconfigure fw data stage. it is reproducible.

Conditions:
lisp+fw, unconfig

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun17558
Title:
ASR1K : COS Markings not preserved
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
COS markings not seen proper on the dot1q interface.

Conditions:
The issue will be seen if met all of following conditions:
1, MPLS packets with fragment happened in data plane on the dot1q interface;

Workaround:
No Workaround.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui55732
Title:
ASR1k:support of ignore-dtr on 4XT-Serial spa
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:






ignore-dtr command not present with 4xt-serial spa interfaces on ASR1k
Conditions:




present in all releases from the begining of 4xt-serial spa support (RLS2 of ASR1k)
Workaround:



None
More Info:












Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 3.7(0)
Known Fixed Releases:
15.2(4)S3.16, 15.2(4)S4, 15.2(4)S4a, 15.2(4)S5, 15.2(4)S6, 15.3(3)S0.5, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a
Alert Type:
Updated *
Bug Id:
CSCuo40653
Title:
%CPPOSLIB-3-ERROR_NOTIFY: cpp_cp encountered an error
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A traceback is seen, which is not really pointing to an error.

Conditions:
The tracebacks were seen around ESP-crash.

Workaround:
No workaround needed and the messages are more misleading only.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(1)S2, 15.3(3)S2
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCuj17402
Title:
LITE VSI ID MGR reached Max. ID: 1048576
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Lite session related traceback in CPP client.

Conditions:
ESP100, very high scale.

Workaround:
Reduce number of sessions.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj04100
Title:
CPPHA-3-FAULTCRASH on ASR1k
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR1k crashed with error message CPPHA-3-FAULT F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8

Conditions:
ASR1k running 03.10.00.S with configured zone based firewall

Workaround:
none at this time

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(2)S, 15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh74635
Title:
OneFW:Syslog not generated by dataplane when ICMP connection is denied
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:Syslog not seen for ICMP connection denied

Conditions:Have a deny any any policy and send icmp traffic

Workaround:No known workaround

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCul70833
Title:
Byte-based Queue-limit does not work correctly with fair-queue
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Byte-based queue-limit does not work correctly when fair-queue is configured.

Conditions:
-Using fair-queue feature simultaneously.
-The issue can happen on ASR1k.
-The issue is found on 15.3(3)S.

Workaround:
Use packet-based queue-limit instead of byte-based queue-limit.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCul25109
Title:
AVC: Templates are not exported right after reload with RP1
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:





After RP1 reload, the templates are not sent at the first interval even if the monitor is ready.

Conditions:



Affects features that make use of the High Speed Logger to export records to a off box collector. Generally, this will only happen when the route used by the exporter is slow to be established.

Workaround:


None

Further Problem Description:












Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCuj86660
Title:
show platform hardware [slot | subslot | port] xyz plim buffer mapping
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The CLI is currently not supported.
The option 'mapping' is not available if the user types a ? after buffer keyword as below

#################################################
Router#show platform hardware slot 0 plim buffer ?
settings PLIM buffer settings

Router#show platform hardware subslot 0/0 plim buffer ?
settings PLIM buffer settings
| Output modifiers


Router#show platform hardware port 0/0/0 plim buffer ?
settings PLIM buffer settings

#####################################################
Below is the list of CLI's that points the user to use :

show platform hardware slot 0 plim qos input bandwidth

show platform hardware subslot plim qos input bandwidth

show platform hardware subslot plim qos input map counters

show platform hardware port plim qos input map counters

show platform hardware port plim qos input bandwidth

show platform hardware interface plim qos input map counters

show platform hardware interface plim qos input bandwidth

Conditions:
An error would occur if the user tries to execute the cli as below :

Router#sh platform hardware slot 0 plim buffer mapping
^
% Invalid input detected at '^' marker.

Workaround:
For SPA in Slot 0, Port 0
Plim Hardware Port # Interface Names
------------------------------------------------
Interface 0/0/0 TenGigabitEthernet0/0/0
Interface 0/0/1 TenGigabitEthernet0/0/1
Interface 0/0/2 Crypto-Engine0/0/8
Interface 0/0/3 GigabitEthernet0/0/0
Interface 0/0/4 GigabitEthernet0/0/1
Interface 0/0/5 GigabitEthernet0/0/2
Interface 0/0/6 GigabitEthernet0/0/3
Interface 0/0/7 GigabitEthernet0/0/4
Interface 0/0/8 GigabitEthernet0/0/5
------------------------------------------------

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S0.10, 15.4(2)S1, 15.4(2)S2, 15.4(2.17)S0.6, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1, 15.5(0.7)S
Alert Type:
Updated *
Bug Id:
CSCuj23603
Title:
ASR1k cpp crash observed in ipv4_nat_bind_find with HAL_RID_INVALID
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The ESP may crash in cpp_mcplo

%CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x8

Conditions:
NAT is enabled and mode has been changed between "Classic"/default and CGN

Workaround:
None at this time - reload box or at least CPP after changing mode.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCug97910
Title:
ESS Stats Offload on ESP100/ESP160
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
High CPP_CP process CPU load on ESP100 caused by session counter collection.

Conditions:
ESP100 and ISG scale

Workaround:
Reduce number of counters associated with ISG session

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCug50150
Title:
Fix the tracebacks introduced by CSCue17299
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:During MDR in a APS Setup, under certain conditions, IOSXE_APS-3-CCCONFIGFAILED, mesage is seen.
Conditions:If the MDR of Protect interface is Started first followed by a MDR of the Working, then the above TB will occur.
Workaround:
Ensure that the working Interface is the first which goes through the MDR. IF the interfaces are on the SAME SIP, the traffic must be flowing through the Working interface, to ensuzre zero traffic drops
More Info:












Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(1)S, 15.3(2)S, 15.3(3)S
Known Fixed Releases:
15.3(3)S0.6, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.4(0.19)S0.3, 15.4(1)S, 15.4(1)S0a
Alert Type:
Updated *
Bug Id:
CSCui37419
Title:
ASR1k cpp crash due to large DNS message
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR1k CPP ucode crash

Conditions:
Very big DNS packet are being processed.

Workaround:
unknown.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuh98929
Title:
AVC-SFR: Add two new metrics (byte counters)
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
IFNF support a single L3 byte counter for a connection. There are no separate counter for the connection client and server. This fix adds client and server counters

Conditions:
Current supported CLI:

flow record test
collect counter bytes long
end
With this fix, two additional counters can be collected:

flow record test
collect counter bytes long
collect connection client counter bytes network long
collect connection client counter bytes server long
end

Workaround:
None.

More Info:












Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.3(2)S0.16, 15.3(2)S2, 15.3(3)S0.1, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4, 15.4(0.14)S
Alert Type:
Updated *
Bug Id:
CSCul06682
Title:
sho qfp active datapath utilization summary displayed incorrect
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Ixia1???asr1k1---asr1k2---ixia2
Ixia1 sends 10000pps traffic to ixia2
ixia2 sends 10000pps traffic to ixia1
only normal ip traffic, without labal... and there is no packet lost
the qfp datapath utilization input and output should 20000
but the utilization summary displayed abnormal
asr1k1
shmcp-1013-1#sho platform hardware qfp active datapath utilization summary
CPP 0: 5 secs 1 min 5 min 60 min
Input: Total (pps) 10000 10000 10000 8015
(bps) 27235992 27239832 27234912 21826272
Output: Total (pps) 10009 10004 10004 8022
(bps) 26757256 26739616 26739560 21434288
Processing: Load (pct) 0 0 0 0
shmcp-1013-1#sho platform
Chassis type: ASR1013

Slot Type State Insert time (ago)
--------- ------------------- --------------------- -----------------
0 ASR1000-2T+20X1GE unknown 00:42:52
1 ASR1000-2T+20X1GE unknown 00:42:52
2 ASR1000-SIP40 ok 00:42:52
2/0 SPA-1X10GE-L-V2 ok 00:40:50
2/1 SPA-1X10GE-WL-V2 ok 00:40:50
2/2 SPA-1X10GE-L-V2 ok 00:40:50
2/3 SPA-1X10GE-L-V2 ok 00:40:50
3 ASR1000-SIP40 ok 00:42:52
3/0 SPA-1X10GE-L-V2 ok 00:40:50
3/1 SPA-1X10GE-L-V2 ok 00:40:50
3/3 SPA-1X10GE-L-V2 ok 00:40:50
4 ASR1000-SIP40 ok 00:42:52
4/0 SPA-1X10GE-L-V2 ok 00:40:50
4/1 SPA-1X10GE-WL-V2 ok 00:40:50
5 ASR1000-SIP10 unknown 00:42:52
R0 ASR1000-RP2 ok, standby 00:42:52
R1 ASR1000-RP2 ok, active 00:42:52
F0 ASR1000-ESP80 ok, active 00:42:52
P0 ASR1013/06-PWR-AC ps, fail 00:41:42
P1 ASR1013/06-PWR-AC ok 00:41:42
P2 ASR1013/06-PWR-AC ok 00:41:41
P3 ASR1013/06-PWR-AC ps, fail 00:41:41

Slot CPLD Version Firmware Version
--------- ------------------- ---------------------------------------
0 N/A N/A
1 N/A N/A
2 00200800 15.3(3r)S
3 00200800 15.3(3r)S
4 00200800 15.3(3r)S
5 N/A N/A
R0 10021901 15.3(3r)S
R1 10021901 15.3(3r)S
F0 11100400 12.2(20111018:223207) [gschnorr-mcp_...
shmcp-1013-1#shdrop
Global Drop Stats Packets Octets
----------------------------------------------------------------
The Global drop stats were all zero
shmcp-1013-1#sho version
Cisco IOS XE Software, Version BLD_V154_1_S_XE311_THROTTLE_LATEST_20131015_120615-std
Cisco IOS Software, ASR1000 Software (X86_64_LINUX_IOSD-ADVENTERPRISEK9-M), Experimental Version 15.4(20131015:142745) [v154_1_s_xe311_throttle-BLD-BLD_V154_1_S_XE311_THROTTLE_LATEST_20131015_120615-ios 174]
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Tue 15-Oct-13 10:03 by mcpre
Asr1k2
shmcp-4ru-2#sho platform
Chassis type: ASR1004

Slot Type State Insert time (ago)
--------- ------------------- --------------------- ------------

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCul08311
Title:
SIP ALG will drop NAT if FQDN is instead of IP in the "c=" line of SDP
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
SIP ALG will drop NAT traffic.

Conditions:
In a case, FQDN instead of IP address is included in the "c=" line of SDP in the 200 OK response, and SIP ALG will drop this message

Workaround:
A workaround is to turn off SIP ALG if SIP server (VCS) can support NAT traversal by itself. Another way is to let VCS fill IP address instead of FQDN in the "c=" line of SDP if possible.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.2(4)S, 15.3(3)S0.10
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Alert Type:
Updated *
Bug Id:
CSCui49644
Title:
fman fp crash @ cef_config_fp_atom_disp_cfg_message_ha
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
AToM(Ethernet over MPLS), FP get crash as below:
#0 0x092698b4 in *__GI_raise (sig=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64
#1 0x0926b384 in *__GI_abort () at abort.c:88
#2 0x0b2e55b0 in binos_crashdump (stall=0) at infra/binos/./src/bassert.c:55
#3 0x0b5a8980 in btrace_APPLICATION_FATALED_OUT_LOOK_AT_SYSLOG_OR_TRACEFILE (i=) at infra/btrace/./src/btrace.c:2121
#4 0x0b5a8970 in btrace_APPLICATION_FATALED_OUT_LOOK_AT_SYSLOG_OR_TRACEFILE (i=0x0) at infra/btrace/./src/btrace.c:2115
#5 0x0b5a8970 in btrace_APPLICATION_FATALED_OUT_LOOK_AT_SYSLOG_OR_TRACEFILE (i=0x0) at infra/btrace/./src/btrace.c:2115
#6 0x0b5a8b60 in btracev_glob (module_id=94 '^', level=112 'p', flags=BTRACE_EMIT_CHECKED, str=0xe191b44 "\n(FATAL): Uplink array full", ap=0xbfc26e48) at infra/btrace/./src/btrace.c:2210
#7 0x0b5a8d38 in btrace_glob (module_id=0 '\0', level=227 '????????', flags=6, format=0x0) at infra/btrace/./src/btrace.c:2079
#8 0x0e18c11c in aom_set_link (root_obj=0x7, link_obj=0x301339dc) at infra/aobjman/./src/aom_util.c:1763
#9 0x0e188238 in aom_link_uplink (child=0x0, parent=0x1ae3) at infra/aobjman/./src/aom_graph.c:1320
#10 0x0e180030 in aom_request_add_parent (child=0x32891698, parent=0x301339dc, flag=AOM_UPDATE_FLAG_NONE) at infra/aobjman/./src/aom_api.c:4383
#11 0x0e1804a8 in aom_add_parent (child=0x32891698, parent=0x301339dc) at infra/aobjman/./src/aom_api.c:4424
#12 0x1026bd70 in cef_config_fp_atom_disp_cfg_message_handler (h=0x10795650, tid=-1, ctx=, msg=0x13f64418, err=) at fman/fp/./src/fman_atom.c:1593
#13 0x0f3f06a0 in fp_atom_disp_cfg_message_unmarshal (h=0x0, tid=22841, context=0x13f64418, ret_msgp=0x98, mem=, avail_len=, handler=0xbfc26ff4, err=0x10795650) at infra/tdl/_gen_tdl_ppc/cef_config/./src/cef_config_message_02.c:2813
#14 0x0fa1a2a4 in fman_fp_message_dispatch_lut (lut=0xfa4fa80, h=0x10795650, tid=7, context=0x14, msg=0x10a196f4 "????1????4\017\017\017", avail_len=86, err=0xbfc271b0) at infra/tdl/_gen_tdl_ppc/fman_fp/./src/fman_fp_message.c:97445
#15 0x0fa1a494 in fman_fp_message_dispatch (h=0x1ae3, tid=250, context=0x0, msg=0x3006e430 "", avail_len=184320, err=0x3006e430) at infra/tdl/_gen_tdl_ppc/fman_fp/./src/fman_fp_message.c:97467
#16 0x10400dc0 in fman_fp_plat_message_dispatch (h=0x0, tid=6883, context=0x6, msg=0x0, avail_len=153525084, err=0x2d000) at fman/fp/./src/../mcp/src/fman_plat_asr1k.c:672
#17 0x10197440 in fman_ripc_msg_process (ctx=, arg=0x10700e20, fd=, mask=) at fman/fp/./src/fman_ipc.c:603
#18 0x0b5e88a4 in __evDispatch (opaqueCtx={opaque = 0x10700e20}, opaqueEv=Cannot access memory at address 0x1ae3
) at infra/contrib/evlib/../../../contrib/bind/lib/bind/isc/eventlib.c:1352
#19 0x0b5eafc4 in __evMainLoop (opaqueCtx=Cannot access memory at address 0x0
) at infra/contrib/evlib/../../../contrib/bind/lib/bind/isc/eventlib.c:688
#20 0x101956f4 in main (argc=52, argv=0x10471de4) at ./linkfarm/ppc/usr/binos/include/evutil/evutil.h:40


Conditions:
AToM(Ethernet over MPLS) is configured, link or protocol flapping causes timing issue. It is hard to hit.

Workaround:
None

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(1)S, 15.3(3)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S3, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuj14693
Title:
XE39 GTPV2: modify bearer request is dropped when handoff from v1Tov2
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
modify bearer request is dropped.

Conditions:
handoff from gtpv1 to gtpv2

Workaround:
SGW recreate session

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S7
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCux43213
Title:
SNMP over IPv6 link-local address does not work on IOS-XE routers
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If SNMP uses the IPv6 link-local address SNMP fails.

Conditions:
If SNMP uses the IPv6 link-local address SNMP fails.

Workaround:
None

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
15.6(3)S
Known Fixed Releases: *
15.6(1.17)S
Alert Type:
Updated *
Bug Id:
CSCum49437
Title:
ucode crash@ipv4_nat_cgn_mode_dp_rel_mem on changing nat mode
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ucode crash@ipv4_nat_cgn_mode_dp_rel_mem on changing nat mode

Conditions:
In a scaled setup on changing nat mode

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S0.1
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCum50944
Title:
Nightster:Luke YSN block interrupts need to be enabled
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
No visible functional impact. However in adverse conditions(highly unlikely) BUILT-IN SPA might stop forwarding traffic due to some hardware errors in L2 ASIC triggered by software misconfiguration.

Conditions:
In adverse conditions(highly unlikely) BUILT-IN SPA might stop forwarding traffic due to some hardware errors in L2 ASIC triggered by software misconfiguration.

Workaround:
Reload the router to make BUILT-IN SPA functioning properly.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(2)S0.8, 15.4(2)S1, 15.4(2)S2, 15.4(2.17)S0.5, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1, 15.5(0.6)S
Alert Type:
Updated *
Bug Id:
CSCul34193
Title:
show erspan sesseion summary error
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
TAAS_1002_1#sho pla hardware qfp active feature erspan session summary
% Error: ERSPAN client (show): error processing command

Conditions:
configure 1k erspan session
when sho pla hardware qfp active feature erspan session summary
some alarm error occur

Workaround:
none

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj04321
Title:
ASR1002-X with NAT configured crashes at ipv4_nat_bpa_free_port
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ASR crashed with CGN NAT configuration.

Conditions:
Seen with CGN BPA feature configured.

Workaround:
Removing the CGN BPA configuration, the router stops crashing.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCug82939
Title:
ZBF drops ICMP error message when using NAT64
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ICMP error packets having icmp message in the payload are being dropped when
NAT64 and ZBFW are configured.
Conditions:
The configuration should include nat64 and zbfw
Workaround:
none

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCun20279
Title:
ASR1K should not count symmetric flow packets as sdrop at uRPF loose
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
At uRPF loose mode, the suppress drop counter on ASR1K will count packets even in case the packets are symmetric flow.
ASR1K should not count symmetric flow packets as sdrop at uRPF loose mode.

Conditions:
uRPF loose mode

Workaround:
None.
This ddts does not have any service/traffic impact.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S3
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Alert Type:
New
Bug Id:
CSCum78930
Title:
CMCC XM:ASR1013-CB--ICMPv6 packet-too-big is dropped by ZBFW
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The ICMPv6 error packet (too-big packet) with icmpv6 echo reply as payload is dropped by ZBFW.

Conditions:
If the intermediate hosts generate icmpv6 error packets with icmpv6 echo reply as
pay load without properly fragmenting the packets as per the mtu of the v6 packet
flow, such icmpv6 errors packets will be dropped.

Workaround:
Adjust the mtu of the v6 pack flow so that packets, especially t he icmvp6 echo reply
does not generate an error (too-big message)

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, n/a
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S
Alert Type:
Updated *
Bug Id:
CSCul45015
Title:
plim statistics show command not working on ASR1002-X
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
'show platform hardware port plim statistics' command doesn't work correct. In case of ingress plim classification, the RX high counters are always shown as zero.

This observed on ASR1002-X (confirmed), most likely on other chassis too (to be checked and confirmed)

Conditions:
Plim ingress classification classifies the ingress classification intwo HIGH and LOW priority traffic. Note that this isn't about the classification not happening correctly. Traffic is classified correctly, it is just that the 'RX high priority' counters under 'show platform hardware port plim statistics' aren't displayed (always shown as 0)

Workaround:
None.
RX high counters can be checked using 'show platform hardware port plim qos input map counters'

Further Problem Description:












Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsx36672
Title:
Not able to delete a particular NAT translation on ASR.
Status:
Fixed
Severity:
4 Minor
Description: *








Symptom:
'clear ip nat translation inside outside ' does not removed requested translation in ASR NAT







Conditions:
'clear ip nat translation inside outside ' does not removed requested translation in ASR NAT





Workaround:
clear ip nat trans * does work.
Fix expected in 2.3.1.




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC1, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCsz65520
Title:
ASRNAT: couple problems with EXTENDABLE binds
Status:
Fixed
Severity:
4 Minor
Description: *








Symptom:
Incorrect EXTENDABLE bind removed.







Conditions:
Incorrect EXTENDABLE bind removed, in some cases.





Workaround:
Removal of EXENDABLE static mappings works best if removal done in revere order in which they were added. Reboot the box or the ESP should remove any strange conditions due to this problem.




Further Problem Description:
Problem fixed in 2.4.1












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XN2
Known Fixed Releases:
12.2(33)XND1, 12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCsy74888
Title:
ASRNAT: ports not always managed properly in PAT HA
Status:
Fixed
Severity:
4 Minor
Description: *








Symptom:
With ASRNAT intrabox redundancy with an overload configuration in rare cases ports for a particular address can false be handled out twice on the standby.







Conditions:
With ASRNAT intrabox redundancy with an overload configuration in rare cases ports for a particular address can false be handled out twice on the standby.





Workaround:
The only workaround it to not run overload with intrabox redundancy.
Fix is expect in 2.3.2




Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
0
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCui92410
Title:
XE39, NAT: NAT time is shown wrongly in Overlord
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
NAT time is shown wrongly in Overlord

Conditions:
n/a

Workaround:
no

Further Problem Description:
n/a

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(2)S1
Known Fixed Releases:
15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCui68757
Title:
[Enhancement Req] Protection of QFP from ICMPv4 Attack
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
Enhancement of icmp message rate-limit, for protection of QFP from ICMPv4 Attack.

Conditions:
In IPv4 ICMP, some types of ICMP packets will be generated in data plane. To protect QFP from IPv4 ICMP attack, we need a mechanism to do rate-limit of ICMP packets generated by data plane.
There is existing IPV4 ICMP rate-limit mechanism, which is only for ICMP unreachable type. In this fix, we expand this rate-limit mechanism to cover all IPv4 ICMP packets which are generated by data plane.

Workaround:
NA

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.2(4)S1
Known Fixed Releases:
15.3(3)S2.7, 15.3(3)S3, 15.4(1)S1.4, 15.4(1)S2, 15.4(1.16)S0.8, 15.4(2)S, 15.4(2.7)S, 15.4(3)S
Alert Type:
Updated *
Bug Id:
CSCux08976
Title:
ENH: ASR SSLVPN - Add Support Zone Based Firewall
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
This is an enhancement request.

Add support for Zone Based Firewall (ZBF) with ASR SSLVPN

Conditions:
** SSL VPN is enabled ASR
** ZBF is also enabled on the VPN terminating interface

Workaround:
none

Further Problem Description:

Last Modified:
13-DEC-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsz36538
Title:
Improve in2out mcast nat
Status:
Fixed
Severity:
6 Enhancement
Description: *








Symptom:






When doing performance testing it will be observed that with more than a few OIF associated with a multicast group, multicast nat performance in to out will not be nearly as good as out to in performance.
Conditions:




This condition is apparent whenever there are more than a few OIF associated with a group being tested.
Workaround:



There are no workarounds.
Further Problem Description:












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Alert Type:
Updated *
Bug Id:
CSCtb41985
Title:
ASRNAT: set default max-entries limit in data plane
Status:
Fixed
Severity:
6 Enhancement
Description: *








Symptom:
ASRNAT drops may occur on 2.5.0 release and later when running at over these values
FP5 - 128k
FP10 - 0.5M
FP20 - 1M
and max-entries is not configured.
Note that counts towards a limit start after a limit is configured. Existing translations do not count against a newly configured limit. Thus it is recommended procedure to do a 'clear ip nat trans *' after configuring a new limit so that it will be applied to all translations.







Conditions:
ASRNAT drops may occur on 2.5.0 release and later when running at over these values
FP5 - 128k
FP10 - 0.5M
FP20 - 1M
and max-entries is not configured.





Workaround:
If you want to run over these values, a 'ip nat trans max-entries ' must be configured.




Further Problem Description:
To provide better memory protection and default max-entries value is enforced at the data plane level based on ESP type. This value does not show in the CLI and is overriden by any 'ip nat trans max-entries ' configuration.












Last Modified:
17-DEC-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XNE
Alert Type:
Updated *
Bug Id:
CSCtj59520
Title:
Add more defensive and CLI enabled pkt corrupt checking for n2_l2_hdr
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
The router is reset and core decode will show the invalid memory access while doing memcpy.

Conditions:
When the packet is corrupted for some reason at the time it is come back from crypto processor, qfp may read invalid data from the packet and result in the invalid memory access.

Workaround:
None.

Last Modified:
17-DEC-2015
Known Affected Releases:
15.1(1)S
Known Fixed Releases:
15.0(1)S3, 15.1(1)S1, 15.1(2)S
Alert Type:
Updated *
Bug Id:
CSCto26907
Title:
ASR1K: mcast pkt sent out RBE has incorrect dest MAC 01-00-5e-00-00-00.
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
Mulicast packet drop with RouteBridgeEncapsulation (RBE)

Conditions:
When used RBE configuration, Multicast packets may not get forwarded.

Workaround:
none

Last Modified:
17-DEC-2015
Known Affected Releases:
15.1(1)S
Known Fixed Releases:
15.1(2)S2, 15.1(3)S, 15.2(1)S
Alert Type:
Updated *
Bug Id:
CSCuq30260
Title:
VC flaps on removing disable-fallback option from pseudowire
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Pseudowire flaps on updating config

Conditions:
Update disable-fallback option that is part of "preferred-path interface " command.

Workaround:
None

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases: *
15.4(3)M2.1, 15.4(3)M3, 15.4(3)M3.1, 15.4(3)S1.8, 15.4(3)S2, 15.5(1)S0.5, 15.5(1)S1, 15.5(1)SN1, 15.5(1)T1.1, 15.5(1)T2
Alert Type:
Updated *
Bug Id:
CSCuu39274
Title:
ENH: ASR1K support for anyconnect session reconnects
Status: *
Terminated
Severity:
6 Enhancement
Description:

Symptom:
This is an enhancement request to provide anyconnect to be able to reconnect to ASR headend, when there are TCP or other disruptions that require session to be re-established.

Conditions:
anyconnect reconnects

Workaround:
n/a

Further Problem Description:

Last Modified:
20-DEC-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论