| |
|
Alert Type: | Updated * |
Bug Id: | CSCtz27137 | Title: * | Installing S639 or later Signature Package Causes Crash Loop |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Description: * | Symptom: An upgrade to the S639 or later signature package may cause a Cisco IOS router to crash.
Conditions: This symptom is observed in a Cisco 1841, 1941, and 2911 router running one of the following Cisco IOS versions:
- Cisco IOS Release 12.4(24)T4 - Cisco IOS Release 15.0(1)M4 - Cisco IOS Release 15.0(1)M8 - Cisco IOS Release 15.2(3)T
Workaround: Update the signature package to anything less than S639. If already updated with any package larger than or equal to S639, follow the below steps to disable IPS:
- Access the router via the console - Enter break sequence to access ROMmon mode. - Change the config-register value to 0x2412. - Boot the router to bypass the startup-configuration. - Configure the basic IP parameters. - TFTP a modified configuration to the router's running-configuration with Cisco IOS IPS disabled. - Reset the config-register to 0x2102. - Enter the write memory command and reload.
Further Problem Description:
|
|
Last Modified: | 29-DEC-2015 |
|
Known Affected Releases: | 12.4(24)T4, 15.0(1)M3, 15.0(1)M4, 15.0(1)M8, 15.2(3)T |
|
Known Fixed Releases: | 12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T8, 12.4(24)T9, 15.0(1)M10, 15.0(1)M8.11, 15.0(1)M9, 15.1(3)T4, 15.1(4)GC1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv02280 | Title: | Crash seen 2900 with ism with traffic through GRE and cryptomap traffic |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Description: | Symptom: router crashed while sending traffic through tunnel
Conditions: bi-directional high rate Ipv4 and Ipv6 traffic through tunnel
Workaround: nil
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.3(3)M |
|
Known Fixed Releases: * | 15.3(3)M6, 15.5(2.25)M0.6, 15.5(2.25)M0.7, 15.5(3)M, 15.6(0.7)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuq82122 | Title: | SSTE: Router crashed @mace_dp_remove_feature_object_for_cli |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Making external as the bug is observed in customer's network environment
Symptom: The device may unexpectedly reload
Conditions: while putting the following config: no mace monitor waas all mace-flow it will not happen all the times
Workaround: None at this time
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.4(1)T1, 15.5(0.20)T, 15.5(0.25)T0.1 |
|
Known Fixed Releases: * | 15.3(3)M6.2, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.8)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu73697 | Title: | ISM drops fragmented traffic if virtual-reassembly configured |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ISM-VPN drops fragmented IPsec packets when decrypting
Conditions: o ISM-VPN module enabled o ip virtual-reassembly enabled on the crypto interface
Workaround: o disable virtual-reassembly o disable ISM module
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.2(4)M, 15.3(3)M4 |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.4(3)M4, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.10)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCux68490 | Title: | Invaild response code error While configuring no voice service voip |
|
Status: | Open |
|
Severity: | 2 Severe |
Description: | Symptom: While configuring no voice service voip command, I am getting invalid response code error.
Conditions: I am getting this error with image c2900-universalk9-mz.SSA.156-1.8.T.
Workaround:
Further Problem Description: N/A
|
|
Last Modified: | 26-DEC-2015 |
|
Known Affected Releases: | 15.6(1.11)T, 15.6(1.8)T, 15.6(1.9)T0.2 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv87098 | Title: | Connected number not populated in RPID correctly |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Incorrect connected name appears on the calling phone and RPID header of the SIP message.
Conditions: Call flow: IP phone -- CUCM -- sip - GW -- PRI qsig -- PBX
The Connect should arrive with both the Connected number info and facility message like the following:
Mar 30 14:28:16.559: ISDN Se0/0/1:15 Q931: RX <- CONNECT pd = 8 callref = 0x8081 Facility i = 0x91AA068001008201008B0100A11402022EE206042B0C09028008414C432037393833 Connected Number i = '!', 0x81, '7983' Locking Shift to Codeset 5 Codeset 5 IE 0x32 i = 0x81
Workaround: None
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.1(4)M9, 15.3(3)M4.2, 15.4(3)M2.2 |
|
Known Fixed Releases: * | 15.6(0.27)T, 15.6(1.3)T, 15.6(1.9)S, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux02108 | Title: | Process watchdog at 'OER Master Controller' |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Process watchdog crash seen with OER Master controller: %SYS-2-WATCHDOG: Process aborted on watchdog timeout, process = OER Master Controller.
Conditions: When PfR master controller is configured with target-discovery, and when learn-lists for Internet TCs are configured with "mode monitor passive", and when too many unused learned echo active-probes are shown, PfR master controller seems to generate CPUHOG, when it traverses this long echo active-probe list.
Workaround: No work-around
Further Problem Description:
|
|
Last Modified: | 30-DEC-2015 |
|
Known Affected Releases: | 15.4(3)M3.2 |
|
Known Fixed Releases: * | 15.6(1.12)T, 15.6(1.17)S0.5 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu05497 | Title: | Address Error (load or instruction fetch) exception, CPU signal 10 |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Router crashed when trying to change the SIM pin #cellu 0 lte sim change-pin ...
Conditions: When changing the SIM pin, router crash observed.
Workaround: Do not change the SIM pin
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.5(2.10.2)PIH28, 15.5(2.10.3)PIH28 |
|
Known Fixed Releases: * | 15.5(2)T1, 15.5(3)M0.1, 15.5(3)M1, 15.6(0.3)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw86293 | Title: | ISM: GRE over IPsec double account packets input on Tunnel interface |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Cosmetic issue:
IOS router with ISM-VPN module and GRE over IPSec tunnel configured.
The "packets input" counter in "show interface tunnel 10" output is double the amount of packets decrypted.
For example:
Router#show crypto ipsec sa int tunnel 10 | i caps|spi|ident|peer local ident (addr/mask/prot/port): (172.18.124.149/255.255.255.255/47/0) remote ident (addr/mask/prot/port): (10.150.175.43/255.255.255.255/47/0) current_peer 10.150.175.43 port 500 #pkts encaps: 10, #pkts encrypt: 10, #pkts digest: 10 #pkts decaps: 10, #pkts decrypt: 10, #pkts verify: 10 current outbound spi: 0x1F00C2A4(520143524) spi: 0x1917C146(420987206) spi: 0x1F00C2A4(520143524)
Router#show int tun 10 | i packets Checksumming of packets disabled 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 20 packets input, 1240 bytes, 0 no buffer 10 packets output, 1240 bytes, 0 underruns
Conditions: IOS router 15.5(3)M
GRE over IPsec tunnel.
ISM-VPN module is installed
Workaround: No workaround need as this is cosmetic. Switch tunnel to IPsec IPv4 mode (sVTI)
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.5(3)M0.3 |
|
Known Fixed Releases: * | 15.3(3)M6.2, 15.6(1.9)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu90182 | Title: | c2900 ciscoEnvMonSupplyStatusTable cannot get correct status of RPS. |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: ciscoEnvMonSupplyStatusTable cannot get correct status of RPS. As long as RPS is connected with router, the status will be "normal", no matter RPS status is not available or not supported.
Conditions: Get RPS status with ciscoEnvMonSupplyStatusTable.
Workaround: Get RPS status with the following show commands on console: -show env rps -show env table -show env all
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.4(3)M2.2 |
|
Known Fixed Releases: * | 15.4(3)M3.2, 15.4(3)M4, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.8)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCup34846 | Title: | Alignment errors in sslvpn_handle_common_aaa_reply |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: * | -
Symptom: The following alignment errors appear regarding SSLVPN:
000522: *Jun 6 07:38:53.876 CDT: ALIGN-3-SPURIOUS Spurious memory access made at 0x35DC3350z reading 0xF08 000523: *Jun 6 07:38:53.880 CDT: ALIGN-3-TRACE -Traceback= 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz 000524: *Jun 6 07:38:53.880 CDT: ALIGN-3-TRACE -Traceback= 0x35DC3350z 0x318C120Cz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz rsym -t 0x3000C29C c2900-universalk9-mz.152-4.M6a.symbols.gz Text start address has been supplied: 0x3000C29C Uncompressing and reading c2900-universalk9-mz.152-4.M6a.symbols.gz via /router/bin/zcat c2900-universalk9-mz.152-4.M6a.symbols.gz read in
#sh align Alignment data for: C2900 Software (C2900-UNIVERSALK9-M), Version 15.2(4)M6a, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Compiled Tue 15-Apr-14 09:45 by prod_rel_team
No alignment data has been recorded.
Total Spurious Accesses 2, Recorded 2
Address Count Traceback F08 1 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz F08 1 0x35DC3350z 0x318C120Cz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz nter hex value: 0x35DC3350z 0x318C11ECz 0x35A7ABD8z 0x35A7B17Cz 0x35A7C670z 0x 35A14B9Cz 0x32CCB8F8z 0x32CCB8DCz
Conditions: Enabled webvpn
Workaround: -
Further Problem Description:
|
|
Last Modified: | 08-DEC-2015 |
|
Known Affected Releases: | 15.2(4)M6 |
|
Known Fixed Releases: | 15.5(1.14)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw61375 | Title: | CME software not updating xmit info and destination call id |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: CME software not updating xmit info and destination call id
Conditions: c2900-universalk9-mz.SPA.154-3.M.bin
Workaround: n/a
Further Problem Description: CME software not updating xmit info and destination call id
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: * | 15.6(1.11)S, 15.6(1.5)T, 15.6(1.9)T0.1, 16.2(0.179) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv32874 | Title: | ISM EZVPN client/server traffic fails when using VRF, NAT |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: VPN client connected to EZVPN server which is EZVPN client at the same time. Cannot ping inside the iVRF
Conditions: The traffic fails to pass when all the following conditions are met:
o Use of iVRF o Use of NAT o Cisco VPN client connected o Router connected to second EZVPN server o ISM module enabled
Workaround: Use SVTI , instead of EZVPN Disable VRF Disable ISM Disable NAT
Further Problem Description:
|
|
Last Modified: | 05-DEC-2015 |
|
Known Affected Releases: | 15.4(3)M, 15.5(2.25)T |
|
Known Fixed Releases: * | 15.6(0.11)T, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw96558 | Title: | EHWIC-4ESG leaked mac address table entries |
|
Status: | Open |
|
Severity: * | 4 Minor |
Description: | Symptom: EHWIC-4ESG mac address table keeps growing:
Routershow mac-address-table count
EHWIC: 0 -------------- Dynamic Address Count: 139022 Secure Address (User-defined) Count: 0 Static Address (User-defined) Count: 0 System Self Address Count: 2 Total MAC addresses: 139024 Maximum MAC addresses: 4096
We can see that the mac address table has duplicated entries:
Router#show mac-address-table address 0002.555b.94f4
EHWIC: 0 Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- ----------------- 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0 0002.555b.94f4 Dynamic 100 GigabitEthernet0/0/0
Conditions: Unknown
Workaround: Unknown
Further Problem Description:
|
|
Last Modified: | 10-DEC-2015 |
|
Known Affected Releases: | 15.4(3.0m)M3, 15.4(3.0p)M3 |
|
Known Fixed Releases: | |
|
|
| |
Success in 350-501 Exam Syllabus is within the reach of DumpsPass4Sure. Comprehensive content and easy navigation make the learning process easy. Regular updates reflect their commitment to excellence. I recommend it to anyone serious about excelling in certification. Highly recommend DumpsPass4Sure 350-501 Practice Test to anyone.
回复删除