Cisco Blog » The Platform

2016年1月1日星期五

Cisco Notification Alert -Cisco Cloud Service Router CSR 1000v-01-Jan-2016 18:21 GMT

 

 

 

 

 

 

 


Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Release Version:
3.14.3S
Alert Type:
New File
File Name:
csr1000v-universalk9.03.14.03.S.155-1.S3-std.iso
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - ISO

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.14.03.S.155-1.S3-std.qcow2
File Description:

Cisco CSR 1000V Series Advanced Enterprise Services - QCOW2

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.14.03.S.155-1.S3-std.SPA.bin
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - BIN

File Release Date:
16-DEC-2015
Alert Type:
New File
File Name:
csr1000v-universalk9.03.14.03.S.155-1.S3-std.ova
File Description:

Cisco CSR 1000V Series ADVANCED ENTERPRISE SERVICES - OVA

File Release Date:
16-DEC-2015

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Software Updates for Cloud Services Router 1000V Series

Product Name:
Cloud Services Router 1000V
Software Type:
NBAR2 Protocol Packs
Release Version:
15.0.0
Alert Type:
New File
File Name:
pp-adv-csr1000v-155-3.S1-23-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.16.1S Version 15.5(3)S1

File Release Date:
10-DEC-2015
Alert Type:
New File
File Name:
pp-adv-csr1000v-154-3.S2-20-15.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 15.0.0 for IOS-XE 3.13.2S Version 15.4(3)S2

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Known Bugs - Cloud Services Router 1000V Series

Alert Type:
Updated *
Bug Id:
CSCuj69596
Title:
fman crash at cpp_l2mcast_lib with VPLS on CSR
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

fman and ucode crash on CSR

Conditions:

Configuration and use of VPLS

Workaround:

None

Last Modified:
11-DEC-2015
Known Affected Releases: *
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCuw02238
Title:
CSR1KV, AVC: csr1kv crash when "show run | format" is run
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
router crash

Conditions:
AVC is configured.

AVC related config:
performance monitor context APIC-EM profile application-experience
traffic-monitor application-response-time
traffic-monitor media

Workaround:
N/A

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
15.5(3)S0.5
Known Fixed Releases: *
15.5(3)S1.1, 15.6(0.22)S0.9, 15.6(1.10)T, 15.6(1.10)T0.1
Alert Type:
Updated *
Bug Id:
CSCuq12347
Title:
CSR1000v/ASR1001-x - Memory leak in CPP HA due to Throughput Monitor
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A CSR1000v router may experience a memory leak. This will generally first manifest itself as syslog warnings:

Jan 01 02:34:56.789: %PLATFORM-4-ELEMENT_WARNING: F0: smand: RP/0: Committed Memory value 97% exceeds warning level 95%

The cpp_ha_top_level_server process is found to be consuming a slowly incrementing quantity of memory.

CSR1000v#show platform software process list RP active sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 15401 15105 15401 S 20 2352599040
fman_fp_image 20166 19684 20166 S 20 1558065152
cpp_cp_svr 18962 18243 18962 S 20 1271418880
cpp_ha_top_leve 19612 19071 19612 S 20 1180131328 <-----------
fman_rp 14687 13973 14687 S 20 876077056
qfp-ucode-csr 20659 20224 20659 S 20 764862464

"CPP HA", which is a subset of the cpp_ha_top_level_server process, shows a large difference between "Allocations" and "Frees" which increases over time.

CSR1000v#show platform software memory qfp-ha-server qfp active | begin CPP HA
Module: CPP HA
allocated: 507327220, requested: 501167108, overhead: 6160112 <-------------- "Allocated" slowly increases over time
Allocations: 781851, failed: 0, frees: 396844 <-------------- Note large delta between "Allocations" and "frees"

Conditions:
Platform throughput monitor is enabled.

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: enabled <---------------

Workaround:
Once memory is leaked, the device must be reloaded to recover it. In order to stop any additional memory from leaking, disable platform throughput monitor. This is not service impacting, but the device will no longer produce a syslog alert should the aggregate device throughput approach the licensed limit.

CSR1000V#set platform hardware throughput-monitor disable

CSR1000v#show platform hardware throughput-monitor parameters
Throughput monitor parameters

Throughput monitor threshold: 95 percent
Throughput monitor interval: 300 seconds
Throughput monitor status: disabled <---------------

Note that this command will not persist across a reload, so it will be necessary to re-apply the command each time the device is rebooted.

Further Problem Description:

Last Modified:
29-DEC-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
15.4(3)S1, 15.5(1)S
Alert Type:
Updated *
Bug Id:
CSCuh49807
Title:
Ipsec tunnel does not pass traffic with MD5 hashing
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
IPsec transform set with esp-md5-hmac is not supported in this release.
When esp-md5-hmac is used, though the IPsec tunnel is established, traffic
can not pass through the tunnel. Inbound traffic will be dropped with HMAC
error. Outbound traffic will reach to the peer, but will be dropped by the peer
with HMAC error.

Error message : %IOSXE-3-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:000 TS:00000002356612773534 %IPSEC-3-HMAC_ERROR: IPSec SA receives HMAC error, DP Handle 5, src_addr 60.0.0.2, dest_addr 60.0.0.1, SPI 0xb98e9ee1

Conditions:
Whenever esp-md5-hmac is used in an IPsec transform set.

Workaround:
Use esp-sha-hmac, not use esp-md5-hmac.

More Info:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCui61450
Title:
Ucode crash on CSR with NAT64 config
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
CSR crashes on configuring nat64 under vrf with ipsec tunnel protection

Conditions:
Crash on configuring nat64 under vrf with ipsec tunnel protection

Workaround:
do not configure nat64 under vrf with ipsec tunnel protection

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.4(1)S
Alert Type:
Updated *
Bug Id:
CSCux36807
Title:
csr_mgmt container outgoing traffic evaluated by incorrect ACL
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
Outgoing traffic from csr_mgmt container is not leaving the CSR

Conditions:
There is an inbound ACL applied on the Gigabitethernet interface used to route the outgoing traffic.

Workaround:
- allow the traffic on the inbound ACL also

Further Problem Description:
The outgoing traffic is evaluated by both inbound and outbound ACL on the Gigabitethernet interface instead of only outbound ACL.

Last Modified:
10-DEC-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论