Cisco Blog » The Platform

2016年1月1日星期五

Cisco Notification Alert -Cisco 2900 Series Router-01-Jan-2016 18:21 GMT

 

 

 

 

 

 

 


Software Updates for 2900 Series Integrated Services Routers

Alert Type:
Obsolete Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T
Obsolete Date:
01-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T0a
Release Date:
07-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T3
Release Date:
16-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
Obsolete Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T
Obsolete Date:
01-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T0a
Release Date:
07-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T3
Release Date:
16-DEC-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T0a
Release Date:
07-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T3
Release Date:
16-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
Obsolete Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T
Obsolete Date:
01-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.5(3)M1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-isrg2-154-3.M2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.4(3)M2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T0a
Release Date:
07-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T3
Release Date:
16-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
Obsolete Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.6.1T
Obsolete Date:
01-DEC-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.5(3)M1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-isrg2-154-3.M2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.4(3)M2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2901 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.5(3)M1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-isrg2-154-3.M2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.4(3)M2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-154-3.M2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.4(3)M2

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS Version 15.5(3)M1

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Known Bugs - 2900 Series Integrated Services Routers

Alert Type:
Updated *
Bug Id:
CSCtz27137
Title: *
Installing S639 or later Signature Package Causes Crash Loop
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptom:
An upgrade to the S639 or later signature package may cause a Cisco IOS router to crash.

Conditions:
This symptom is observed in a Cisco 1841, 1941, and 2911 router
running one of the following Cisco IOS versions:

- Cisco IOS Release 12.4(24)T4
- Cisco IOS Release 15.0(1)M4
- Cisco IOS Release 15.0(1)M8
- Cisco IOS Release 15.2(3)T

Workaround:
Update the signature package to anything less than S639. If already
updated with any package larger than or equal to S639, follow the
below steps to disable IPS:

- Access the router via the console
- Enter break sequence to access ROMmon mode.
- Change the config-register value to 0x2412.
- Boot the router to bypass the startup-configuration.
- Configure the basic IP parameters.
- TFTP a modified configuration to the router's running-configuration with
Cisco IOS IPS disabled.
- Reset the config-register to 0x2102.
- Enter the write memory command and reload.

Further Problem Description:

Last Modified:
29-DEC-2015
Known Affected Releases:
12.4(24)T4, 15.0(1)M3, 15.0(1)M4, 15.0(1)M8, 15.2(3)T
Known Fixed Releases:
12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T8, 12.4(24)T9, 15.0(1)M10, 15.0(1)M8.11, 15.0(1)M9, 15.1(3)T4, 15.1(4)GC1
Alert Type:
Updated *
Bug Id:
CSCuv02280
Title:
Crash seen 2900 with ism with traffic through GRE and cryptomap traffic
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
router crashed while sending traffic through tunnel

Conditions:
bi-directional high rate Ipv4 and Ipv6 traffic through tunnel

Workaround:
nil

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.3(3)M
Known Fixed Releases: *
15.3(3)M6, 15.5(2.25)M0.6, 15.5(2.25)M0.7, 15.5(3)M, 15.6(0.7)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuq82122
Title:
SSTE: Router crashed @mace_dp_remove_feature_object_for_cli
Status:
Fixed
Severity:
2 Severe
Description:

Making external as the bug is observed in customer's network environment

Symptom:
The device may unexpectedly reload

Conditions:
while putting the following config:
no mace monitor waas all mace-flow
it will not happen all the times

Workaround:
None at this time

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.4(1)T1, 15.5(0.20)T, 15.5(0.25)T0.1
Known Fixed Releases: *
15.3(3)M6.2, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.8)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuu73697
Title:
ISM drops fragmented traffic if virtual-reassembly configured
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ISM-VPN drops fragmented IPsec packets when decrypting

Conditions:
o ISM-VPN module enabled
o ip virtual-reassembly enabled on the crypto interface

Workaround:
o disable virtual-reassembly
o disable ISM module

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.2(4)M, 15.3(3)M4
Known Fixed Releases: *
15.4(3)M3.2, 15.4(3)M4, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.10)T, 15.6(1.9)T0.1
Alert Type:
New
Bug Id:
CSCux68490
Title:
Invaild response code error While configuring no voice service voip
Status:
Open
Severity:
2 Severe
Description:

Symptom:
While configuring no voice service voip command, I am getting invalid response code error.

Conditions:
I am getting this error with image c2900-universalk9-mz.SSA.156-1.8.T.

Workaround:

Further Problem Description:
N/A

Last Modified:
26-DEC-2015
Known Affected Releases:
15.6(1.11)T, 15.6(1.8)T, 15.6(1.9)T0.2
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv87098
Title:
Connected number not populated in RPID correctly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Incorrect connected name appears on the calling phone and RPID header of the SIP message.

Conditions:
Call flow:
IP phone -- CUCM -- sip - GW -- PRI qsig -- PBX

The Connect should arrive with both the Connected number info and facility message like the following:

Mar 30 14:28:16.559: ISDN Se0/0/1:15 Q931: RX <- CONNECT pd = 8 callref = 0x8081
Facility i = 0x91AA068001008201008B0100A11402022EE206042B0C09028008414C432037393833
Connected Number i = '!', 0x81, '7983'
Locking Shift to Codeset 5
Codeset 5 IE 0x32 i = 0x81

Workaround:
None

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.1(4)M9, 15.3(3)M4.2, 15.4(3)M2.2
Known Fixed Releases: *
15.6(0.27)T, 15.6(1.3)T, 15.6(1.9)S, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCux02108
Title:
Process watchdog at 'OER Master Controller'
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Process watchdog crash seen with OER Master controller:
%SYS-2-WATCHDOG: Process aborted on watchdog timeout, process = OER Master Controller.

Conditions:
When PfR master controller is configured with target-discovery, and when learn-lists for Internet TCs are configured with "mode monitor passive", and when too many unused learned echo active-probes are shown, PfR master controller seems to generate CPUHOG, when it traverses this long echo active-probe list.

Workaround:
No work-around

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
15.4(3)M3.2
Known Fixed Releases: *
15.6(1.12)T, 15.6(1.17)S0.5
Alert Type:
Updated *
Bug Id:
CSCuu05497
Title:
Address Error (load or instruction fetch) exception, CPU signal 10
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Router crashed when trying to change the SIM pin
#cellu 0 lte sim change-pin ...

Conditions:
When changing the SIM pin, router crash observed.

Workaround:
Do not change the SIM pin

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.5(2.10.2)PIH28, 15.5(2.10.3)PIH28
Known Fixed Releases: *
15.5(2)T1, 15.5(3)M0.1, 15.5(3)M1, 15.6(0.3)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuw86293
Title:
ISM: GRE over IPsec double account packets input on Tunnel interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cosmetic issue:

IOS router with ISM-VPN module and GRE over IPSec tunnel configured.

The "packets input" counter in "show interface tunnel 10" output is double the amount of packets decrypted.

For example:

Router#show crypto ipsec sa int tunnel 10 | i caps|spi|ident|peer
local ident (addr/mask/prot/port): (172.18.124.149/255.255.255.255/47/0)
remote ident (addr/mask/prot/port): (10.150.175.43/255.255.255.255/47/0)
current_peer 10.150.175.43 port 500
#pkts encaps: 10, #pkts encrypt: 10, #pkts digest: 10
#pkts decaps: 10, #pkts decrypt: 10, #pkts verify: 10
current outbound spi: 0x1F00C2A4(520143524)
spi: 0x1917C146(420987206)
spi: 0x1F00C2A4(520143524)

Router#show int tun 10 | i packets
Checksumming of packets disabled
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
20 packets input, 1240 bytes, 0 no buffer
10 packets output, 1240 bytes, 0 underruns

Conditions:
IOS router 15.5(3)M

GRE over IPsec tunnel.

ISM-VPN module is installed

Workaround:
No workaround need as this is cosmetic.
Switch tunnel to IPsec IPv4 mode (sVTI)

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.5(3)M0.3
Known Fixed Releases: *
15.3(3)M6.2, 15.6(1.9)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuu90182
Title:
c2900 ciscoEnvMonSupplyStatusTable cannot get correct status of RPS.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ciscoEnvMonSupplyStatusTable cannot get correct status of RPS.
As long as RPS is connected with router, the status will be "normal",
no matter RPS status is not available or not supported.

Conditions:
Get RPS status with ciscoEnvMonSupplyStatusTable.

Workaround:
Get RPS status with the following show commands on console:
-show env rps
-show env table
-show env all

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.4(3)M2.2
Known Fixed Releases: *
15.4(3)M3.2, 15.4(3)M4, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.8)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCup34846
Title:
Alignment errors in sslvpn_handle_common_aaa_reply
Status:
Fixed
Severity:
3 Moderate
Description: *

-

Symptom:
The following alignment errors appear regarding SSLVPN:

000522: *Jun 6 07:38:53.876 CDT: ALIGN-3-SPURIOUS Spurious memory access made at 0x35DC3350z reading 0xF08
000523: *Jun 6 07:38:53.880 CDT: ALIGN-3-TRACE -Traceback= 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz
000524: *Jun 6 07:38:53.880 CDT: ALIGN-3-TRACE -Traceback= 0x35DC3350z 0x318C120Cz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz
rsym -t 0x3000C29C c2900-universalk9-mz.152-4.M6a.symbols.gz
Text start address has been supplied: 0x3000C29C
Uncompressing and reading c2900-universalk9-mz.152-4.M6a.symbols.gz via /router/bin/zcat
c2900-universalk9-mz.152-4.M6a.symbols.gz read in



#sh align
Alignment data for:
C2900 Software (C2900-UNIVERSALK9-M), Version 15.2(4)M6a, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Compiled Tue 15-Apr-14 09:45 by prod_rel_team

No alignment data has been recorded.

Total Spurious Accesses 2, Recorded 2

Address Count Traceback
F08 1 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz
0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz
F08 1 0x35DC3350z 0x318C120Cz 0x35A7ABD8z 0x35A7B17Cz
0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz
nter hex value: 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x 35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz

Conditions:
Enabled webvpn

Workaround:
-

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
15.5(1.14)T
Alert Type:
Updated *
Bug Id:
CSCuw61375
Title:
CME software not updating xmit info and destination call id
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
CME software not updating xmit info and destination call id

Conditions:
c2900-universalk9-mz.SPA.154-3.M.bin

Workaround:
n/a

Further Problem Description:
CME software not updating xmit info and destination call id

Last Modified:
05-DEC-2015
Known Affected Releases:
n/a
Known Fixed Releases: *
15.6(1.11)S, 15.6(1.5)T, 15.6(1.9)T0.1, 16.2(0.179)
Alert Type:
Updated *
Bug Id:
CSCuv32874
Title:
ISM EZVPN client/server traffic fails when using VRF, NAT
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
VPN client connected to EZVPN server which is EZVPN client at the same time.
Cannot ping inside the iVRF

Conditions:
The traffic fails to pass when all the following conditions are met:

o Use of iVRF
o Use of NAT
o Cisco VPN client connected
o Router connected to second EZVPN server
o ISM module enabled

Workaround:
Use SVTI , instead of EZVPN
Disable VRF
Disable ISM
Disable NAT

Further Problem Description:

Last Modified:
05-DEC-2015
Known Affected Releases:
15.4(3)M, 15.5(2.25)T
Known Fixed Releases: *
15.6(0.11)T, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuw96558
Title:
EHWIC-4ESG leaked mac address table entries
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
EHWIC-4ESG mac address table keeps growing:


Routershow mac-address-table count

EHWIC: 0
--------------
Dynamic Address Count: 139022
Secure Address (User-defined) Count: 0
Static Address (User-defined) Count: 0
System Self Address Count: 2
Total MAC addresses: 139024
Maximum MAC addresses: 4096


We can see that the mac address table has duplicated entries:

Router#show mac-address-table address 0002.555b.94f4

EHWIC: 0
Destination Address Address Type VLAN Destination Port
------------------- ------------ ---- -----------------
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Last Modified:
10-DEC-2015
Known Affected Releases:
15.4(3.0m)M3, 15.4(3.0p)M3
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

1 条评论:

  1. Success in 350-501 Exam Syllabus is within the reach of DumpsPass4Sure. Comprehensive content and easy navigation make the learning process easy. Regular updates reflect their commitment to excellence. I recommend it to anyone serious about excelling in certification. Highly recommend DumpsPass4Sure 350-501 Practice Test to anyone.

    回复删除