Cisco Blog » The Platform

2016年1月1日星期五

Cisco Notification Alert -Nexus 9000 Series Switch-01-Jan-2016 18:18 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.5a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Release Version:
99.0(9)

Alert Type:
Obsolete File
File Name:
testI89a.ear
File Description:

test

Obsolete Date:
16-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2a.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(5a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.5a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(5a)

File Release Date:
10-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2a)

File Release Date:
15-DEC-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1i)
Alert Type:
Software Advisory
File Name:
aci-n9000-dk9.11.2.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1i)

Software Advisory Date:
18-DEC-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(1k)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.1k.iso
File Description:

APIC image for 1.2(1k) release

File Release Date:
23-DEC-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.2.1k.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.2(1k)

File Release Date:
23-DEC-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 9000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuv91905
Title:
N9k / ipfib crash may occur on primary vPC if secondary is reloaded
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
N9k configured as primary vPC reloads after reporting in the log:
%IPFIB-2-FIB_HW_ECMP_ADJ_CREATE_FAILURE: ECMP hardware programming failed.
last message repeated 2 times
%SYSMGR-2-SERVICE_CRASHED: Service "ipfib" (PID 7728) hasn't caught signal 11 (core will be saved).
%VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain 81, VPC peer keep-alive receive has failed

Conditions:
N9k configured as the secondary vPC peer is reloaded.

Workaround:
None

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(0.559)
Known Fixed Releases: *
7.0(3)I2(0.586), 7.0(3)I2(0.592), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.37), 7.0(3)IVI2(1), 7.0(3)IVI2(1.3), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCuv46792
Title:
N9K - Loops DHCP Packet on Spanning-tree Blocked Port
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
A vulnerability in the Spanning Tree Protocol (STP) handling of Dynamic Host
Configuration Protocol (DHCP) packets in the Cisco Nexus 9000 (N9K) Series Switch
software could allow an unauthenticated, adjacent attacker to cause a partial
denial of service (DoS) condition due to high CPU. The high CPU is due to a the
DHCP packet looping on the STP blocked port.

The vulnerability is due to a DHCP broadcast packet being forwarded out a STP port
in the state ''Alternate Blocking State''. An attacker could exploit this vulnerability
by flooding DHCP broadcast packets to the affected device. An exploit could allow the
attacker to cause the CPU utilization of the device to be abnormally high due to the
DHCP broadcasts being mis-handled and incorrectly looped on the STP blocked port.

Conditions:
The N9K configured as DHCP Relay agent with a link in STP ''Alternate Blocking State''.

Workaround:
The user can shutdown down the STP which is in ''Alternate Blocking State'' or prune the
VLAN which the loop is occurring in from this interface

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/2.7:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I3(2), 6.1(2)I3(4b), 7.0(3)I1(0.206), 7.0(3)I1(2)
Known Fixed Releases: *
6.1(2)I3(4.10), 6.1(2)I3(4.12), 6.1(2)I3(5), 7.0(3)I1(2.7), 7.0(3)I1(3), 7.0(3)I2(0.568), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1)
Alert Type:
Updated *
Bug Id:
CSCuw61081
Title:
Migration of uSeg EPG VM failed
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Live migration of a VM initiated from SCVMM might fail, if there is a compliance check failure on the VM Network

Conditions:
VM network is showing compliance check failure at SCVMM

Workaround:
Perform the live migration using HyperV Cluster manager, or deploy Microsoft UR9 release.

Further Problem Description:
This issue is planned to be addressed in Microsoft UR9 release. A modified Microsoft ACI agent package will be released to support the Microsoft UR9 release expected in Q1'2016.

Last Modified:
11-DEC-2015
Known Affected Releases:
1.2(0.139k)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv94180
Title:
N9KEVPN VTEP Unknown Punt Reason
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
UDP / TFTP packet punted to CPU for unknown reason.

Conditions:
- Seen on a N9K running 7.0(3)I1(2)

Workaround:
N/A

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases: *
7.0(3)I2(0.593), 7.0(3)I2(0.598), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1.37), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCuw46401
Title:
N9k NTP monlist vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms:
Cisco Nexus 9000 Series Switches includes a version of Network Time Protocol (NTP)
that is affected by the vulnerabilities identified by the following Common
Vulnerability and Exposures (CVE) IDs:

CVE-2013-5211

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html
and https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are 5/5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:U/RC:C&version=2.0
CVE ID CVE-2013-5211 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
12-DEC-2015
Known Affected Releases:
7.0(3)I2(1.21)
Known Fixed Releases: *
6.1(2)I3(5a), 7.0(3)I2(1.39), 7.0(3)I2(2), 7.0(3)IDP3(1.12), 7.0(3)IDP3(2), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCux52825
Title:
one of the vPC vtep peers fails to respond to IPv6 NS packets from host
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:IPv6 NS packets from host are dropped by VTEP on some SVIs. ND packets to not get send via inband to the switch CPU, and gateway resolution to fail. A ethanalyzer capture will show ND packet not received by CPU.
Conditions:Vlan/SVI class id should be set to 0xc0 when SVI is up. However, when performing negative test cases, and other reload/upgrade test cases with ARP suppression enabled, it has been observed some SVIs may not have this set correctly.
Workaround:Shut/no-shut of the SVI interface will recover from this condition.
Also, this issue is not seen when ARP suppression is disabled to begin with.

Last Modified:
18-DEC-2015
Known Affected Releases:
7.0(3)I2(2a)
Known Fixed Releases: *
7.0(3)I2(2a), 7.0(3)I3(0.194), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCux19425
Title:
sh install all impact nxos causes all EVPN VNI down with VLAN/BD is down
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
sh install all impact nxos causes all EVPN VNI down with VLAN/BD is down

Conditions:
affects all N9K platforms running EVPN VNI

Workaround:
shut and no shut all l2/l3 VNI SVI

Further Problem Description:

Last Modified:
18-DEC-2015
Known Affected Releases:
7.0(3)I2(1), 7.0(3)I2(2)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.32), 7.0(3)I2(2a), 7.0(3)I2(3), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux52950
Title:
ipv6 NS failing for vip gateway resolution from host thru lacp vpc-po
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
1. Vpc-vtep, with pkts landing on lacp-po
2. The lacp-po having more than one members, with flows hashing non-FOP of the po gets impacted
3. If we shut that member, forcing all to hash onto FOP, they get resolved or work fine
4. No-shut the member to bring it back results in the same issue, for flows hashing back to that member
5. Flapping the lacp-vpc-po on the landing vpc-peer side help recover and works fine
6. So we tried to convert the lacp-po to static po and we did not see the issue. Verified across reloads too.
7. When the NS resolution fails, we see pkts coming in with 0::0 srp address which we cannot answer why.
8. We also reloaded the fanout N5K to avoid it being the cause.

Continuing to look further to figure out the cause as we do not have exact cause yet..

Thanks,
Hema.

Conditions:
The issue is after the trigger of reloading both the vpcs together, NS resolution from the host for the VIP fails. This is because, host first sends out NS for its own ipv6 to figure out if its a duplicate address. The ipmc index has one entry with encap_id -1, which is causing this NS request to come back to the host and it declares duplicate address and host doesn't send the NS for the gw.

Workaround:
* Flap admin shut/noshut the vpc-lacp-po, thru which the v6 NS fails. It can be one or multiple po's depending on where the flows land and fail.

Further Problem Description:

Last Modified:
18-DEC-2015
Known Affected Releases:
7.0(3)I2(2a)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.32), 7.0(3)I2(2a), 7.0(3)I2(3), 7.0(3)I3(0.194), 7.0(3)I3(1), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux57168
Title:
SSTE: After shut and no shut for nve int, BGP EVPN routes are gone
Status:
Other
Severity:
2 Severe
Description:

Symptom:
On a VTEP node 9396PX running Dublin 188 image, after shut and no shut for nve interface, BGP EVPN routes are gone, and then not re-learned.

Conditions:
After shut and no shut for nve interface.

Workaround:
clear bgp all x.x.x.x soft in

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
7.0(3)I3(1)
Known Fixed Releases: *
7.0(3)I3(0.195), 7.0(3)I3(1)
Alert Type:
New
Bug Id:
CSCux62371
Title:
SSTE: [N9504]multiple nginx cores on install upg nxos <> non-disruptive
Status:
Open
Severity:
2 Severe
Description:

Symptom:
multiple nginx cores

Conditions:
install upg nxos <> non-disruptive

Workaround:
NA

Further Problem Description:

Last Modified:
20-DEC-2015
Known Affected Releases:
7.0(3)I3(0.197)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux62381
Title:
SSTE: snmpd cores on SNMP walks with VXLAN OIDs+config loss
Status:
Open
Severity:
2 Severe
Description:

Symptom:
snmpd cores

Conditions:
SNMP Walks

Workaround:
NA

Further Problem Description:

Last Modified:
21-DEC-2015
Known Affected Releases:
7.0(3)I3(0.197)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux07377
Title:
VxLAN encap packets carry inner dot1q tag for NS access ports
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Packet loss for VxLAN encapsulated packets received on the NVE and destined for an end hosts connected to 40G uplink port.

Conditions:
VxLAN encapsulated packets are being dropped on the destination North Star ASIC, 40G uplink port when received over the Network Virtualized Edge (NVE) interface. This only happens when the 40G uplink interface is configured as an classical 802.1Q trunk interface.

Workaround:
none

Further Problem Description:

Last Modified:
22-DEC-2015
Known Affected Releases:
7.0(3)I2(1), 7.0(3)I2(2), 7.0(3)IMK2(1.125)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.16), 7.0(3)I2(2a), 7.0(3)I3(0.170), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IMK2(1), 7.0(3)IMK2(1.133), command
Alert Type:
Updated *
Bug Id:
CSCux25491
Title:
SSTE: On 9396PX VTEP Node, VXLAN Local MACs are missing
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With Dublin 140 image, on 9396PX VTEP Node, local MACs are missing after shut and no shut on a physical interface.

Conditions:
It happens after shut and no shut on a physical interface.

Workaround:
Clear MAC address table

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I3(1)
Known Fixed Releases: *
7.0(3)I3(0.164), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCux36201
Title:
SSTE: "hardware qos ns-buffer-profile burst" Service not responding
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
"hardware qos ns-buffer-profile burst" Service not responding

Conditions:
wr er + reload + config apply

Workaround:
NA

Further Problem Description:
CLI config IPC message was not handled correctly.

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I3(0.158)
Known Fixed Releases: *
7.0(3)I3(0.173), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCuw57140
Title:
vtpVlanTable populates partial values with wrong vlanId.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vtpVlanTable populates only one entry for vlan 1 with incorrect vlanId.

Conditions:
Mibwalk vtpVlanTable.

Workaround:
Use the command "show vlan" to retrieve equivalent information from CLI.

Further Problem Description:
The issue exists in NXOS software release 7.0(3)I2(1),7.0(3)IX1(1).

The fix exists in 7.0(3)I2(2), 7.0(3)IX1(2) and all the later releases.

Last Modified:
23-DEC-2015
Known Affected Releases:
7.1(0)I3(0.44)
Known Fixed Releases: *
<7.1(0)I>, 7.0(3)I2(1.33), 7.0(3)I2(2), 7.0(3)IX1(1.256), 7.0(3)IX1(2), 7.1(0)I3(0.52), 7.1(0)I3(1), 8.3(0)CV(0.248), 8.3(0)KMS(0.31), Bad
Alert Type:
Updated *
Bug Id:
CSCuv69713
Title:
Cisco NX-OS IGMP Malformed Packet DoS Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in the Internet Group Management Protocol (IGMP) Version 3 (IGMPv3) input
packet processing of the Nexus Operating System (NX-OS) could allow an unauthenticated,
adjacent attacker to cause the IGMP process to restart due to a malformed IGMP packet.
This can cause a denial of service (DoS) condition on the device.

The vulnerability is due to improper input validation when ensuring that the memory allocated
is large enough for the number of included sources in the IGMPv3 packet. An attacker could
exploit this vulnerability by sending a crafted IGMPv3 packet to the device. An exploit could
allow the attacker to cause the IGMP process to restart due to a buffer overflow which causes
the DoS condition. If the malformed IGMPv3 packet is continuously sent the device the DoS
condition will remain and the device is unavailable.

Conditions:
IGMP Version 3 snooping is configured on one or more Virtual Local Area Networks (VLANs).

Workaround:
The IGMP Version 3 snooping configuration has to be removed.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4324 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
23-DEC-2015
Known Affected Releases:
7.3(0)ZN(0.81)
Known Fixed Releases: *
7.0(3)I2(0.546), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw65317
Title:
Nexus 9k memory leak when running SNMP
Status:
Fixed
Severity:
2 Severe
Description:

A nexus 9k will leak memory when running SNMP OID MIB walk on IFMIB, leading to an eventually reload due to a kernel panic. A kernel core will not be written. The following logs will be shown:

2015 Sep 29 20:17:06 Core-199-B %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : CRITICAL. Usage 91% of Available Memory
2015 Sep 29 20:17:15 Core-199-B %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT_RECOVERED: Memory Status Alert : CRITICAL ALERT RECOVERED
2015 Sep 29 20:17:16 Core-199-B %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : SEVERE. Usage 91% of Available Memory
2015 Sep 29 23:17:07 Core-199-B %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : CRITICAL. Usage 91% of Available Memory

2015 Oct 1 04:11:04 Core-199-B %$ VDC-1 %$ Oct 1 04:11:04 %KERN-0-SYSTEM_MSG: [982247.800000] [1443690664] Kernel panic - not syncing: Out of memory: system-wide panic_on_oom is enabled - kernel
2015 Oct 1 04:11:04 Core-199-B %$ VDC-1 %$ Oct 1 04:11:04 %KERN-0-SYSTEM_MSG: [982247.800001] [1443690664] - kernel
2015 Oct 1 04:11:10 Core-199-B %$ VDC-1 %$ Oct 1 04:11:09 %KERN-0-SYSTEM_MSG: [982249.398446] [1443690665] Dumping interrupt statistics ? kernel

Symptom:
A nexus 9k will leak memory when running SNMP OID MIB walk on IFMIB, leading to an eventually reload due to a kernel panic. A kernel core will not be written. The following logs will be shown:

2015 Sep 29 20:17:06 N9K-1 %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : CRITICAL. Usage 91% of Available Memory
2015 Sep 29 20:17:15 N9K-1 %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT_RECOVERED: Memory Status Alert : CRITICAL ALERT RECOVERED
2015 Sep 29 20:17:16 N9K-1 %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : SEVERE. Usage 91% of Available Memory
2015 Sep 29 23:17:07 N9K-1 %$ VDC-1 %$ %PLATFORM-2-MEMORY_ALERT: Memory Status Alert : CRITICAL. Usage 91% of Available Memory

2015 Oct 1 04:11:04 N9K-1 %$ VDC-1 %$ Oct 1 04:11:04 %KERN-0-SYSTEM_MSG: [982247.800000] [1443690664] Kernel panic - not syncing: Out of memory: system-wide panic_on_oom is enabled - kernel
2015 Oct 1 04:11:04 N9K-1 %$ VDC-1 %$ Oct 1 04:11:04 %KERN-0-SYSTEM_MSG: [982247.800001] [1443690664] - kernel
2015 Oct 1 04:11:10 N9K-1 %$ VDC-1 %$ Oct 1 04:11:09 %KERN-0-SYSTEM_MSG: [982249.398446] [1443690665] Dumping interrupt statistics ? kernel

Conditions:
SNMP is enabled and MIB walk for IFMIB is done frequently. The extent of the leak depends on how frequently IFMIB is being polled.

Workaround:
Disable SNMP on the switch
no snmp-server protocol enable

or you can disable just polling of IFMIB, but continue with other SNMP functions (like SNMP traps)

and do not execute any bash CLIs. To be safe bash access can also be disabled using:

no feature bash (if feature bash is enabled)

Further Problem Description:
Fix for this is present in 7.0(3)I2(1a). Both N9K and Nexus 3K running 7.0(3)I2(1) are affected.
Only this specific release 7.0(3)I2(1) is affected. No other release prior to this version or after, is affected.

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.52), 7.0(3)I2(1a), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw44272
Title:
POAP-2-POAP_FAILURE: POAP Powerup Phase timedout
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
POAP on 9312x switches fail with below syslog message:

POAP-2-POAP_FAILURE: POAP Powerup Phase timedout

Conditions:
POAP DHCP discover phase never kicks in as we never see this syslog
OAP-2-POAP_DHCP_DISCOVER_START: POAP DHCP Discover phase started

Issue is not seen with 7.0(3)I2(1). Issue seen only with 7.0(3)I1(2)/7.0(3)I1(3) so far.

Workaround:
still unknown/investigating

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(3)
Known Fixed Releases: *
<7.1(0)I>, .0(3)I1(3b, .0(3)I1(3b(3b.1), .0(3)I1(3b(3b.2), 7.0(3)I1(3b), 7.0(3)I2(1.27), 7.0(3)I2(2), 7.1(0)I3(0.41), 7.1(0)I3(1), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCun34482
Title:
Xbar needs to be down if a higig link goes down/recovers multiple times
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Fabric Module or Linecard Module Internal link flaps can cause
- traffic drops during the time the link is down.
- excessive and frequent internal link flaps can cause additional processing overhead on xbar manager and cause problem getting the Line cards in other slots to come online in rare scenarios.


Fix is, as part of a default EEM policy, bring down Fabric module if a link flaps exceed link_flap threshold in any specified time interval. Also provide capability to modify linkflap threshold interval and policy action.
Conditions:It is a very rare excessive error handling condition for the case in case there is a bad internal link on the Fabric Module.

Workaround:More Info:Following are the messages logged when the issue happens.

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I1(1)
Known Fixed Releases: *
6.1(2)I3(5a), 7.0(3)I2(1.36), 7.0(3)I2(1.71), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw47106
Title:
aclqos crashed @ aclqos_get_port_speed
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
aclqos crashed repeatedly. might trigger shut down the line card N9K-X9408PC-CFP2

Conditions:
issue was initially observed during normal operation without admin interfering. subsequently happened multiple times when tried replacement the CFP2 card with new card.

Workaround:
block snmp from polling ciscoSwitchQosMIB/csqIfQosGroupInfoTable

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(3), 7.0(3)I2(1)
Known Fixed Releases: *
<7.1(0)I>, 7.0(3)I1(3b), 7.0(3)I2(1.29), 7.0(3)I2(2), 7.1(0)I3(0.47), 7.1(0)I3(0.59), 7.1(0)I3(1), 8.3(0)CV(0.248), 8.3(0)KMS(0.31), Bad
Alert Type:
Updated *
Bug Id:
CSCuw40773
Title:
Copy R S failed due to "eth_port_channel"
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
copy r s failing on nexus 9508.

switch# copy r s
[########################################] 98% Configuration update aborted: timed out

Following errors seen in logs:

2015 Sep 22 20:37:44 MDFLD-MVD1 %SYSMGR-2-CFGWRITE_ABORTED_CONFELEMENT_RETRIES: Copy R S failed as config-failure retries are ongoing. Type "show nxapi retries" for checking the ongoing retries.
2015 Sep 22 20:37:44 MDFLD-MVD1 %SYSMGR-3-CFGWRITE_SRVFAILED: Service "confelem" failed to store its configuration (error-id 0x00000079).
2015 Sep 22 20:38:14 MDFLD-MVD1 %SYSMGR-3-BASIC_TRACE: process_show_running_req: PID 11354 with message rvcd on vdc 1 .
2015 Sep 22 20:38:14 MDFLD-MVD1 %SYSMGR-3-BASIC_TRACE: process_show_running_req: PID 11354 with message last vdc = 1 .
2015 Sep 22 20:38:14 MDFLD-MVD1 %SYSMGR-2-CFGWRITE_USER_ABORT: Configuration copy aborted by the user.
2015 Sep 22 20:38:44 MDFLD-MVD1 %SYSMGR-3-CFGWRITE_SRVFAILED: Service "ethpm" failed to store its configuration (error-id 0x0000007C).
2015 Sep 22 20:42:44 MDFLD-MVD1 %SYSMGR-3-CFGWRITE_SRVTIMEOUT: Service "eth_port_channel" failed to store its configuration in the timeout period
2015 Sep 22 20:42:44 MDFLD-MVD1 %SYSMGR-2-CFGWRITE_ABORTED: Configuration copy aborted.
2015 Sep 22 20:42:45 MDFLD-MVD1 %SYSMGR-3-CFGWRITE_FAILED: Configuration copy failed (error-id 0x401E0045).

Conditions:
configuring switchport on an L3 port-channel with sub-interfaces

Workaround:
1) to recover, we need to reload the box
2) to avoid hitting the bug, please do not change the L3 port-channel to switchport with sub-interfaces configured. If needed, delete sub-interfaces first and then change it.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.21), 7.0(3)I2(1a), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw30453
Title:
L3 interface attributes lost after upgrade to Camden
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When switch is upgraded from Bronte+ to Camden, layer 3 configs are lost at the interface level, including ip address, PIM configuration, and ISIS configuration.

Conditions:
When customer performs ISSU from 7.0.3.I1.3a to 7.0.3.I2.1, and has layer3 configuration on interfaces.

Workaround:
Performing a reload ASCII with new image boot variable may prevent this behavior.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.24), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw13560
Title:
Cisco Nexus 9000 (N9K) Series Switch Reserved VLAN Tag Vulnerability
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in the handling of incoming Layer 2 (L2) packets tagged with a reserved VLAN number from the
Cisco Nexus 9000 (N9K) Series Switch could allow an unauthenticated, adjacent attacker to cause a partial denial
of service (DoS) condition due to increased CPU and possible control plan instability. In addition L2 packets which
should be dropped by the switch can be incorrectly forwarded on the connected interfaces.

The vulnerability is due to lack of input validation of the VLAN number in the L2 packet. An attacker could exploit this
vulnerability by sending a crafted L2 packet tagged with a N9K reserved VLAN number. An exploit could allow the
attacker to cause a partial DoS condition due to increased CPU and possible control plan instability. In addition this
packet should be dropped by the N9K and instead can be forwarded on the attached networks.

Conditions:
Device running with default configuration running an affected version of software.

Workaround:
The reserved VLAN range can be changed to not conflict with the incoming traffic.

To review the current reserved VLAN range and reconfigure the follow commands are used:

> show vlan internal usage
> system vlan #### reserve
> copy running-config startup-config
> reload

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.8/4.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:P/I:N/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2015-6295 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I3(4), 7.0(3)I1(1)
Known Fixed Releases: *
7.0(3)I2(1.22), 7.0(3)I2(1.29), 7.0(3)I2(1.43), 7.0(3)I2(2), 7.0(3)IX1(1.242), 7.0(3)IX1(1.244), 7.0(3)IX1(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw20223
Title:
[Camden][N9K] Flows fail to install if port-channel used as output port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When user tries to install a flow low installation fail if the monitor device is connected to port channel that consists of 40G interface ports

Conditions:
For NDB 2.2 when connected to a Openflow device of N9K platform of Camden image

Workaround:
Wait for Camden MR1 release and update the N9K device the image with Camden MR1

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.16), 7.0(3)I2(2), 7.1(0)I3(0.48), 7.1(0)I3(1), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw07942
Title:
Bud Node: Mcast encap packets duplicated with VPC leg down scenarios
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Duplicate VxLAN encapsulated packets are received on certain ports

Conditions:
When an IGMP join is present on a local vPC or orphan port from a VTEP, duplicate packets will be sent when a native frame is received and encapsulated with a multicast VxLAN header.

This behavior is observed for vPC ports with remote leg down, or for orphan ports when the native frame is received on the vPC peer switch.

Workaround:
There is no workaround

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(0.598)
Known Fixed Releases: *
.0(3)I1(3b, .0(3)I1(3b(3b.1), 7.0(3)I1(3a), 7.0(3)I1(3b), 7.0(3)I2(0.601), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.37), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCux37668
Title:
PTP multicast packets are not being leaked to the CPU
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PTP multicast traffic in a routed N9k environment is not creating multicast state, no (s,g) is created

Conditions:
N9K is not configured for PTP and is only being used to be multicast router for PTP multicast stream

Workaround:
none

Further Problem Description:

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I2(2), 7.0(3)I3(0.165)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.193), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), command, convert_version.pl:, found, not
Alert Type:
New
Bug Id:
CSCux69872
Title:
Copy run start fails due to /var/sysmgr/ folder being full
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Copy run start fails due to /var/sysmgr folder being 100%. /var/sysmgr/ folder was full due to uncollect debug files. If the system fails to zip the core file, it should delete the uncollect file to avoid this issue.

ucf-mdf1-rtr-9(standby)# show system internal flash
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/root 2097152 791520 1305632 38% /
proc 0 0 0 - /proc
sysfs 0 0 0 - /sys
none 40960 1388 39572 4% /nxos/tmp
none 3670016 3670016 0 100% /var/sysmgr

Conditions:

Workaround:
Delete the file manually.

ucf-mdf1-rtr-9(standby)# run bash
bash-4.2$ du /var/sysmgr/tmp_logs
3669840 /var/sysmgr/tmp_logs

bash-4.2$ cd /var/sysmgr/tmp_logs
bash-4.2$ ls
0x1c01_nginx-7259_uncollect stripcl_20151114_053544_8574_init.log

bash-4.2$ sudo su -
root@ucf-mdf1-rtr-9#pwd
/root
root@ucf-mdf1-rtr-9#cd /var/sysmgr/tmp_logs
root@ucf-mdf1-rtr-9#ls
0x1c01_nginx-7259_uncollect stripcl_20151114_053544_8574_init.log
if_index_log.7425
root@ucf-mdf1-rtr-9#rm 0x1c01_nginx-7259_uncollect

Further Problem Description:

Last Modified:
29-DEC-2015
Known Affected Releases:
7.0(3)I2(1a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux44648
Title:
Arp reply not sent when received on LACP port-channel in (I) mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
N9K does not respond to ARP request for its IP if the ARP request comes in on a port which is in LACP (I) state.

Conditions:
ARP request must come in on individual port which is configured as lacp port-channel

Workaround:
none
delayed lacp can help

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.32), 7.0(3)I2(2a), 7.0(3)I2(3), 7.0(3)I3(0.193), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.62), 7.0(3)IDP3(2), command
Alert Type:
Updated *
Bug Id:
CSCuw87620
Title:
N9K Kernel Panic watchdog timeout - issue seen on CPU2
Status:
Open
Severity:
2 Severe
Description:

Symptom:
A Nexus 9k switch may experience a kernel panic due to a high volume of interrupt events, and the device is overwhelmed with processing interrupts.

Conditions:
High amount of interrupts are being sent to one of the switch's CPUs.

Workaround:
NA

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
7.0(3)I1(1a)
Known Fixed Releases: *
7.0(3)I2(1.83), 7.0(3)I2(2), 7.0(3)I3(0.205), 7.0(3)I3(1), 7.0(3)IDP3(1.62), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCux43453
Title:
SSTE: On VTEP N9396PX Node, vPC Active VLANs are incorrect
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On N9396PX, after the upgrade from Dublin 165 image to Dublin 170 image for vPC pair that are two N9396PX, or after the reload of the vPC pair, vPC Active VLANs are incorrect.

Conditions:
After the upgrade or reload of vPC pair that are two N9396PX.

Workaround:
Shut and no shut under vPC domain.

Further Problem Description:

Last Modified:
01-JAN-2016
Known Affected Releases:
7.0(3)I3(1)
Known Fixed Releases: *
7.0(3)I3(0.223), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCuw82627
Title:
after multiple fail issu/impact check, free space error thrown
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Unable to upgrade code on Nexus 9000 using "install all" command.
The following error will be seen
Pre-upgrade check failed. Return code 0x40930062 (free space in the filesystem is below threshold)

Check "show system internal flash"

/var/tmp/volatile utilization will exceed 70%

Conditions:
Seen when
show install all impact check is done

Workaround:
(1) Check and see if tmp directory is over 50% usage

Show system internal flash

none 307200 286972 306972 77% /var/volatile/tmp

(2) Enable feature bash to be able to get into the bash shell

9396-2-38B(config)# feature bash
9396-2-38B(config)# end
9396-2-38B# run bash
bash-4.2$
bash-4.2$ cd /var/volatile/tmp

bash-4.2$ ls -lSh
total 188M
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-np.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-np-cr.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qc.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qg.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qi2.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qi2-cr.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qi2-cr-ivy.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qi2-ivy.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qi.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qs.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qz2.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 8 23:19 bios-x86n-qz.bin.gz
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 calgary.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 keystone.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 kirkwood.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 nagano.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 oslo.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 placid.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 redmond2.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 sapporo.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 sochi.bin
-rw-rw-rw- 1 root root 8.0M Nov 17 23:49 sqvly.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 alta.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 apache.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 blackcomb.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 chicopee.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 cypress.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 honeycomb.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 moena.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 mtrose.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 seymour.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 shasta.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 sierra.bin
-rw-rw-rw- 1 root root 929K Nov 17 23:49 sunridge.bin

Remove these files

bash-4.2$ rm bios*
bash-4.2$ rm *.bin

Please do not delete any other files. Only files in TMP folder is ok to delete.
Call TAC if you see other directory full.

bash-4.2$ exit

Further Problem Description:

Last Modified:
09-DEC-2015
Known Affected Releases:
7.0(3)I2(2), 7.0(3)I3(0.123), 7.0(3)I3(0.143), 7.0(3)I3(0.76)
Known Fixed Releases:
7.0(3)I3(0.171), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCux22173
Title:
NVRAM Error causing system crash
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When the nvram is getting corrupted repeatedly - due to bad nvram battery etc. The nvram driver gets into a deadlock. This is very rare.

Conditions:
The CMOS/NVRAM battery was in a bad state. Essentially bad hardware

Workaround:
Replace the CMOS battery or replace the hardware.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.182), 7.0(3)I3(1), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux11108
Title:
Bidir BSR RP prefix grp change failed to propagate through the network
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
BSR RP to grp-range mappings are out-of sync in network.

Conditions:
change in BSR PR prefix list.

Workaround:
Remove RP config on RP-candidate and re-apply.

Further Problem Description:

Last Modified:
03-DEC-2015
Known Affected Releases:
7.0(3)I3(0.123)
Known Fixed Releases:
7.0(3)I3(0.153), 7.0(3)I3(1), 7.0(3)IDP3(1.24), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCuv72655
Title:
ACI: Leaf drops udp destination port 48879
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
udp packet to port 48879 is discarded at leaf's ingress port

Conditions:
version 1.1(1j)
ingress traffic is tagged(for untagged traffic , this issue doesn't happen

Workaround:
none

Further Problem Description:

Last Modified:
04-DEC-2015
Known Affected Releases:
11.1(1j)
Known Fixed Releases:
11.1(2.287), 11.2(0.45), 11.2(0.46)
Alert Type:
New
Bug Id:
CSCux41281
Title:
APIC configured with 2 NTP servers w/ 1 prefer does not sync to either
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
An APIC configured with 2 NTP servers where 1 NTP server is preferred does not sync with either NTP server.

Conditions:
Version 1.1(4e)

Workaround:
configure an odd number of NTP servers (1 or 3 or more).

you should configure one, three, or four or more NTP servers. All NTP servers return the time together with an estimate of the current error. When using multiple time servers, NTP also wants these servers to agree on some time, meaning there must be one error interval where the correct time must be. When there are just two NTP servers, there might be an issue if both sources do not fall into the small common range because the NTP client will be unable to determine which source is more correct.

Further Problem Description:
When the fabric switches are presented with 2 NTP servers where each NTP server is more than 1 second different from the system clock, the switch will not sync with either NTP server even if one of the NTP servers is preferred. This is because the preferred concept only comes into consideration when the switch is presented with 2 NTP servers that fall with the dispersion range and must choose one of them to sync with. When both NTP servers are outside a dispersion range resulting in incrementing bad dispersion, the switch will not select either of them to sync with.

Last Modified:
04-DEC-2015
Known Affected Releases:
11.1(4e)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux43284
Title:
Properties removed during profile create/edit are still applied anyway
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Properties that the user did not intend to include become part of the profile

Conditions:
When creating or editing a profile, if the user adds and then removes a property, that property will still be applied to the profile

Workaround:
Edit the profile again and remove the property

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
1.0(0.513)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux42988
Title:
Disabling a port channel shows an incorrect explanation for its state
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
A port channel disabled by user shows as explanation for being inactive "No active member in the port-channel".

Conditions:
A port channel has been disabled by the user.

Workaround:
No workaround. Cosmetic issue.

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
1.0(0.618)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux46855
Title:
vpc ext-svi: del/add vrf cfg from a leaf also need switchport cfg on vpc
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Deleting and adding vrf on a Leaf may not deploy ext-svi on vpc.

Conditions:
1) SVI over VPC deployed on nodes A and B
2) Suppose, VRF on node A is removed using "no vrf context ..." command
3) This ends up cleaning up VPC + SVI interfaces from Node B for that tenant+VRF
4) However, the L2 VPC interface still holds the SVI information on node A. But without Node B (that got deleted in #3 above), there will be no ext-svi deployment over VPC
5) Even if the VRF is added back on node A and the SVI interface re-created, there will be no ext-svi deployment over VPC.

Workaround:
The only way to get back ext-svi deployment is to re-associate SVI to L2 VPC interface using "switchport { trunk allowed | native allowed | access } vlan tenant external-svi"

Further Problem Description:

Last Modified:
09-DEC-2015
Known Affected Releases:
1.2(1c)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw65466
Title:
ACI: inappropriate I/Fs on APIC GUI Tenants>EPG>Operational>Client EP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Unnecessary interfaces show up on Interface section under APIC GUI Tenants > EPG > Operational tab > Client End-Points.

Node-102/tunnel12(learned)
Node-101-102/vPC1(vmm)
Node-101-102/TEMP_vPC1(vmm) <---- I/F not connected to vmm domain devices
Node-101-102/TEMP_vPC2(vmm) <---- I/F not connected to vmm domain devices
Node-101-102/TEMP_PC1(vmm) <---- I/F not connected to vmm domain devices
Node-101-102/TEMP_PC2(vmm) <---- I/F not connected to vmm domain devices

Conditions:
This happens for endpoints with opflex such as AVS or Openstack with opflex.
These unnecessary interfaces are the one included in the same AEP associated to VMM domain, however not connected to vmm domain devices with that end-point.
These interfaces are only PC or vPC. This didn't somehow happen on individual ports.
They show up on GUI even if they are not UP.

Workaround:
No functional impacts have been observed. This impacts only for ease of operations.
Please remove unnecessary I/Fs from AEP for VMM domain with opflex.

Further Problem Description:

Last Modified:
09-DEC-2015
Known Affected Releases:
1.1(2h), 1.1(3f), 1.2(0.139k)
Known Fixed Releases: *
1.2(0.239a), 1.2(1i)
Alert Type:
Updated *
Bug Id:
CSCuv29468
Title:
Need a way to collect more information on PHY issues during linkscan
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Enhancement request for better event logging of PHY level issues in SDK event history

Conditions:
This is an enhancement to show mdio log which will show the mdio registers that are being accessed by the PHY driver to debug any problem with the PHY>

Workaround:
Enhancement.

Further Problem Description:
Enhancement.

Last Modified:
11-DEC-2015
Known Affected Releases:
6.1(2)I3(4b)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.161), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux42547
Title:
adding first prefix in route-map overrites import-security flag
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
For a external-l3 (l3extOut object) configuration created through API(say out1) and if that l3extOut has a external-l3 epg (say out1:p1 where out1 is the l3extOut and p1 is the external-l3 epg), on creating a prefix-list with the same name through CLI (prefix-list p1 in route-map out1_out), the external-l3 epg (out1:p1) gets deleted.

Conditions:
1. There is an API created l3out.
2. This l3out has an l3extInstP that has all its subnets with scope set to 'import-security'.
3. A prefix-list with a prefix that is same as one of l3extInstP's subnets is added to the route-map _{in|out|shared}.

Workaround:
The prefix that got deleted from prefix EPG after prefix-list addition can be manually added back to the external-l3 EPG.

Further Problem Description:

Last Modified:
10-DEC-2015
Known Affected Releases:
1.2(1c)
Known Fixed Releases: *
1.2(1.79a), 1.2(1.81)
Alert Type:
Updated *
Bug Id:
CSCux27456
Title:
should be able to reset bgp password from simple gui
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
no way to reset bgp password

Conditions:
no way to reset bgp password

Workaround:

Further Problem Description:
no way to reset bgp password

Last Modified:
11-DEC-2015
Known Affected Releases:
1.2(0.270b)
Known Fixed Releases: *
1.2(0.280), 1.2(1.74), 1.2(1i)
Alert Type:
Updated *
Bug Id:
CSCuw31368
Title:
N9K: shut down for PC memeber interfaces not working
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Not able to shut down physical interfaces part of port-channel

Conditions:
NX-OS upgrade to 7.0(3)I2(1)

Workaround:
Configure "switchport" (or "no switchport" - depending on what the correct layer of the PC interface should be) under PC interface, then member physical interface can be shut down.
Also, please check the output of "show running-config po all" and get the value of MTU configured on the PC.
Configure that also on the PC.

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.19), 7.0(3)I2(1a), 7.0(3)I2(2), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCuw12835
Title:
Unable to delete username with privilege feature enabled
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cannot delete username.

Conditions:
When feature privilege is enabled, unable to delete the username.

Workaround:
None.

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.41), 7.0(3)I2(2), 8.3(0)CV(0.248)
Alert Type:
Updated *
Bug Id:
CSCux43098
Title:
ACI : LACP/BGP or other control plane protocols should be prioritized
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
High CPU on Leaf caused loss of LACP PDUs

Conditions:

Workaround:
Ensure EP configuration, teaming configuration is in-line with switch config.

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
11.0(4k)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw77598
Title:
show install packages crashes VSH
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
VSH cores when 'show install package' cli is executed.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.52), 7.0(3)I2(2), 8.3(0)CV(0.248)
Alert Type:
New
Bug Id:
CSCux52183
Title:
after failed issu/impact check, run out of free space /var/volatile/tmp
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
sys03-eor1(config)# install all nxos bootflash:nxos.7.0.3.I2.2a.bin parallel
Installer will perform compatibility check first. Please wait.
Installer is forced disruptive

Verifying image bootflash:/nxos.7.0.3.I2.2a.bin for boot variable "nxos".
[####################] 100% -- SUCCESS

....
Do you want to continue with the installation (y/n)? [n]
sys03-eor1(config)# 2015 Dec 11 12:16:48 sys03-eor1 %$ VDC-1 %$ %VMAN-2-ACTIVATION_STATE: Successfully activated virtual service 'guestshell+'

sys03-eor1(config)#
sys03-eor1(config)#
sys03-eor1(config)# show system inter flash | grep volatile
none 51200 4768 46432 10% /var/volatile/log
none 307200 222300 84900 73% /var/volatile/tmp
none 614400 0 614400 0% /volatile
sys03-eor1(config)#
sys03-eor1(config)# install all nxos bootflash:nxos.7.0.3.I2.2a.bin parallel
Installer will perform compatibility check first. Please wait.
Installer is forced disruptive
Pre-upgrade check failed. Return code 0x40930062 (free space in the filesystem is below threshold).
sys03-eor1(config)#
sys03-eor1(config)#

Conditions:
Hi Vishal/Ganesh/Linda,
This is the bug and is in V state. Linda has fixed it.
Can you confirm if this is same and if the below diff can help. As the diff shows handling or rmving files from /var/volatile/tmp in addition to /var/sysmgr that was existing before..

sysmgr_system_cmd("/bin/rm /var/volatile/tmp/bios-x86n*.bin.gz",

CSCuw82627 after multiple fail issu/impact check, free space error thrown

If this is a trivial point fix guess we can take it. Others pls let know otherwise..

Thanks,
Hema.

Diff shows


*************** static void cleanup_single_img_tmp()
*** 2344,2355 ****
ret = sysmgr_system_cmd("/bin/rm -rf /var/sysmgr/tmp/sys_img", NULL,
installer_info.dbg_log_fp, installer_info.log_fp);
if (ret != 0) {
DEBUG_PRINT("system(rm) failed: %d: pid %d\n", ret, getpid());
}
- }


void fsm_action_srv_installer_done(installer_state_t old_state)
{
syserr_t syserr;

--- 2344,2367 ----
ret = sysmgr_system_cmd("/bin/rm -rf /var/sysmgr/tmp/sys_img", NULL,
installer_info.dbg_log_fp, installer_info.log_fp);
if (ret != 0) {
DEBUG_PRINT("system(rm) failed: %d: pid %d\n", ret, getpid());
}

+ ret = sysmgr_system_cmd("/bin/rm /var/volatile/tmp/bios-x86n*.bin.gz", NULL,
+ installer_info.dbg_log_fp, installer_info.log_fp);
+ if (ret != 0) {
+ DEBUG_PRINT("system(rm bios-x86n) failed: %d: pid %d\n", ret, getpid());
+ }
+
+ ret = sysmgr_system_cmd("/bin/rm /var/volatile/tmp/*.bin", NULL,
+ installer_info.dbg_log_fp, installer_info.log_fp);
+ if (ret != 0) {
+ DEBUG_PRINT("system(rm bin) failed: %d: pid %d\n", ret, getpid());
+ }
+
+ }

void fsm_action_srv_installer_done(installer_state_t old_state)
{
syserr_t syserr;



From: Vishal Jain (vishalja)
Sent: Thursday, December 10, 2015 9:26 PM
To: Hema Subash (hsubash); Ganesh Narayanaswamy (ganesnar); Venkatesh Srinivasan (venksrin); Umesh Mahindra (umahindr); Alok Rathore (arathore); Natarajan ManthiraMoorthy (

Last Modified:
14-DEC-2015
Known Affected Releases:
7.0(3)I2(2), 7.0(3)I2(2a), 7.0(3)I3(0.123), 7.0(3)I3(0.143), 7.0(3)I3(0.76)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux04368
Title:
NIF ports missing in vlan flood table on switchover & fex reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Flooded/broadcast traffic may be dropped on some FEX interface after a sup switchover followed by a FEX reload.

Conditions:
After a sup switchover (or) a specific (ELTM) process crashes, and then FEX is reloaded,
some FEX NIFs may not have the flood table programmed properly.

Workaround:
Deleting/adding of the vlan can recover from the condition.

Further Problem Description:

Last Modified:
15-DEC-2015
Known Affected Releases:
7.0(3)I2(1.81)
Known Fixed Releases:
7.0(3)I2(1.88), 7.0(3)I2(2), 7.0(3)I2(2.22), 7.0(3)I2(2a), 7.0(3)I2(2x), 7.0(3)I2(3)
Alert Type:
Updated *
Bug Id:
CSCuw57032
Title:
ifc-svc:deleting one AVI SE causes deleting shared LIFs of other SEs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
all vNIC of AVI service engine VMs are put into quarantine portgroup after one of SEs being removed in AVI controller.

Conditions:
one of several service engine VM is deleted from services.

Workaround:
Manually assign the right port-group back to those remaining service engine VMs.

Further Problem Description:
Debug log showing the deletion....












807||15-10-06 15:25:24.953+00:00||aaa||DBG4||co=doer:3:1:0x180000000038c5e4:1,dn=uni||Skip RBAC writeability checks because no props changed||../common/src/framework/./core/mo/Mo.cc||278
807||15-10-06 15:25:24.953+00:00||aaa||DBG4||co=doer:3:1:0x180000000038c5e4:1,dn=uni||Skip RBAC writeability checks because no props changed||../common/src/framework/./core/mo/Mo.cc||278
807||15-10-06 15:25:24.953+00:00||aaa||DBG4||co=doer:3:1:0x180000000038c5e4:1,dn=||Skip RBAC writeability checks because no props changed||../common/src/framework/./core/mo/Mo.cc||278
@

Last Modified:
17-DEC-2015
Known Affected Releases:
1.1(1r)
Known Fixed Releases: *
1.1(3.4), 1.2(0.155), 1.2(1.17), 1.2(1i), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCux55114
Title:
SSTE: On VTEP N9396PX, remote VTEPs MACs are missing in H/W mac table
Status: *
Other
Severity: *
3 Moderate
Description:

Symptom:
On VTEP N9396PX running Dublin 184 image, some remote VTEPs MACs are missing in H/W mac table when 90K remote MACs are learned.

Conditions:
When 90K remote MACs are learned from remote 90 VTEPs.

Workaround:
None

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
7.0(3)I3(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux01970
Title:
Duplicated IPv6 PKT when PING to vPC VTEP's loopback in VRF
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Duplicate ping6 reply is seen when pinging vPC vtep's loopback in VRF

Conditions:
ICMPv6 Echo is received on vPC VTEP and routed to vPC peer VTEP.

Workaround:
None

Further Problem Description:
Duplicated IPv6 PKT when PING to vPC VTEP's loopback in VRF
ICMPv6 request/reply coming from vxlan overlay, the packet is copied
twice to Sup.

Last Modified:
18-DEC-2015
Known Affected Releases:
7.0(3)I2(1a)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.32), 7.0(3)I2(2a), 7.0(3)I2(3), 7.0(3)I3(0.166), 7.0(3)I3(1), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux18677
Title:
Reset reason shows 'Unknown' on system reload after EPLD
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On system reload after EPLD upgrade Reset reason from 'show version' and 'show system reset-reason'
would show 'Unknown'. This is a cosmetic issue and will be fixed in later releases.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
18-DEC-2015
Known Affected Releases:
6.1(2)I3(4b), 7.0(3)I2(2)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(2.32), 7.0(3)I2(2a), 7.0(3)I2(3), 7.0(3)I3(0.145), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.11), 7.0(3)IDP3(1.19), 7.0(3)IDP3(2)
Alert Type:
New
Bug Id:
CSCux61740
Title:
Need better SW handling for NMI due to FPGA CRC Error
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Enhancement request to better handle FPGA CRC errors

Conditions:

Workaround:

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
7.0(3)I1(3), 7.0(3)I2(2a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu26485
Title:
router bgp <x> and no router bgp <x> causes CLI timeout
Status:
Fixed
Severity:
3 Moderate
Description:

It eventually recoversafter this msg is seen:FEATURE-MGR-2-FM_FEATURE_OP_TIMEOUT_ERROR: feature bgp operation failed on response timeout from service: bgp with uuid (0x11b)2015 May 8 16:16:08 spine-1 clis[5549]: FM enable feature "bgp" error : (0x40aa0008 == operation timeout == T-0x1/F-0x0550/E-0x0008)

Symptom:
router bgp x
no router bgp x

may cause CLI to timeout

Conditions:
It eventually recovers

after this msg is seen:

FEATURE-MGR-2-FM_FEATURE_OP_TIMEOUT_ERROR: feature bgp operation failed on response timeout from service: bgp with uuid (0x11b)
2015 May 8 16:16:08 spine-1 clis[5549]: FM enable feature "bgp" error : (0x40aa0008 == operation timeout == T-0x1/F-0x0550/E-0x0008)

Workaround:
If user wants to cut-n-paste router bgp.. multiple times (not sure what the use case is here), pls use the following workaround of adding sleep.



router bgp 100
sleep 60
no router bgp 100
sleep 60
router bgp 100
sleep 60
etc...

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
7.0(3)I1(1), 7.0(3)I1(1.233)
Known Fixed Releases: *
7.0(3)I1(1.243), 7.0(3)I1(2), 7.3(0)D1(0.187), 7.3(0)ZD(0.205)
Alert Type:
New
Bug Id:
CSCux63394
Title:
N9k-Evpn-Ping fails from BL in act/standby static route scenario
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
N9k1
|
N9k2???evpn???N9K4
\ /
3750
|
216.129.219.41 (loopback)

N9k2 and N9k4 are the Border Leaf (non-vpc) connected to CE(3750) in same vlan and both have a static route to 3750's loopback.

vrf context 11099
vni 40599
ip route 216.129.219.41/32 216.129.21.26

N9k2 link to 3750 is standby/suspended state and N9k4 is active.

Ping fails from N9k2 to the loopback of 3750 but works from N9k1(another leaf) transiting through it or from devices directly connected to N9k2.

Conditions:
N9k configured as Border leafs running 7.0(3)I2(2) code.

Workaround:
Use HMM tracking with static route or source the ping from device behind N9k2 or another leaf in fabric.

track 1 ip route 216.129.21.26/32 reachability hmm

vrf context 11099
vni 40599
ip route 216.129.219.41/32 216.129.21.26

Further Problem Description:

Last Modified:
21-DEC-2015
Known Affected Releases:
7.3(0)ZN(0.99)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCur38739
Title:
Mismatch Between dhcp:Pool:freeIPs and DHCP Leases
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The dhcp:Pool:freeIPs property is reported as 0 (zero) even though there are less than 32 leases for IP addresses within the pool.

Conditions:

Workaround:
Unknown at this time.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
1.0(1k)
Known Fixed Releases:
1.0(3.15), 1.1(1j)
Alert Type:
Updated *
Bug Id:
CSCux43024
Title:
Configure vrf filter for fabrc SPAN source errors out in CLI
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Configuration of VRF or context filter for SPAN-ing fabric ports via CLI is not successful.

Conditions:
None.

Workaround:
Configure either a BD-filter or configure the context filter via GUI or REST API.

Further Problem Description:

Last Modified:
22-DEC-2015
Known Affected Releases:
1.2(1e)
Known Fixed Releases: *
1.2(1.109), 1.2(1.84)
Alert Type:
Updated *
Bug Id:
CSCuw53430
Title:
XML/JSON o/p of show lldp dxbx interface shows wrong value
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
invalid value of tlv in XML/JSON output of show lldp dcbx interface

Conditions:
Take XML/ JSON output of show lldp dcbx interface

Workaround:
NA

Further Problem Description:
NA

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)IFD1(0.17)
Known Fixed Releases: *
7.0(3)I3(0.173), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCuw41065
Title:
Redistribute static is interpreted as redistribute direct and vice versa
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Upon negate of ?redistribute static xxx?, CLIServer is mapping incorrectly to ?no redistribute direct xxx? command, and vice versa.

Conditions:
This problem/issue happens when both the redistribute 'static' and 'direct' are configured.

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(1.24), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw34696
Title:
SNMPwalk - OID not incrementing for rip2IfStatAddress w/ multiple IP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Mibwalk rip2IfStatAddres, observed OID not incrementing, keep looping.

Conditions:
when HSRP or multiple IP's are configured under RIP enabled interface.

Workaround:
None.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)IX1(1.229)
Known Fixed Releases: *
7.0(3)I2(1.19), 7.0(3)I2(2), 7.1(0)I3(0.19), 7.1(0)I3(1), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuv02994
Title:
cieIfUtilTable is always return 0, instead cli value.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
cieIfUtilTable still showing 0 values instead actual Packet Rate.

Problem exists in 6.1.2.I1.1.
Fix had been integrated into 7.0.(3).I2.1.

Conditions:
Always.

Workaround:
Use "show interface ..." CLI to get the equivalent information

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(0.418)
Known Fixed Releases: *
7.0(3)I2(0.491), 7.0(3)I2(0.500), 7.0(3)I2(0.524), 7.0(3)I2(0.527), 7.0(3)I2(0.577), 7.0(3)I2(0.579), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.15), 7.0(3)IMK2(1.65)
Alert Type:
Updated *
Bug Id:
CSCuv88252
Title:
Crash @ qosmgr_dce_print_cos2q_maps
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Nexus 9K crashes with ipqosmgr on running the command show class-map type queuing c-out-8q-q-default

Conditions:
When running the command show class-map type queuing c-out-8q-q-default

Workaround:
None

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(2), 7.0(3)IND2(1.64)
Known Fixed Releases: *
6.1(2)I3(4.25), 6.1(2)I3(5), 7.0(3)I1(2.21), 7.0(3)I1(3), 7.0(3)I2(0.576), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36)
Alert Type:
Updated *
Bug Id:
CSCuv32523
Title:
syslogd hap reset when invoking /dev/log for syslogd through python
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Syslogd crashes when python script is invoked to log syslog

Conditions:
pyhton script is loaded on n9k and run to log syslog on the switch

Workaround:
modified python script to add date and timestamp before writing message to /dev/log for logging syslog. If message is passed in proper format, then syslog is getting logged on the console and syslogd doesn't crash

Further Problem Description:
Syslog expects message in a particular format and continues with the processing. Unformatted message was causing the crash.

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases: *
7.0(3)I2(0.565), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw50298
Title:
Pause Frame not dropped on HIF without LLFC on
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
HIF port on FEX connected to Nexus9300 will forward pause frame to fabric port channel.
By default LLFC is "OFF" on HIF. Which means if it receives "pause" for device connected to HIF it should consume and not forward.

Conditions:
This is only for HIF ports on FEX.

Workaround:
Enable 'receive flow-control' on FEX ports result of this FEX port 'absorbs' pause frames instead of flooding them to parent device.

Transmit flow-control is enabled on FEX ports by defaul.


interface Ethernet102/1/4
flowcontrol receive on
switch(config)# int et 102/1/4
switch(config-if)# flowcontrol receive on
switch(config-if)# sh interface ethernet 102/1/4 flowcontro

--------------------------------------------------------------------------------
Port Send FlowControl Receive FlowControl RxPause TxPause
admin oper admin oper
--------------------------------------------------------------------------------
Eth102/1/4 on off on on 0 0
switch(config-if)#

Further Problem Description:












Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(3)
Known Fixed Releases: *
7.0(3)I2(1.38), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCup35239
Title:
Packets egressing via Northstar port not seen with ethanalyzer
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Ethanalyzer does not show captured packets going out L3 interfaces attached to northstar ports.

Conditions:
Nexus 9k with L3 ports on northstar asic
Version: 6.1(2)I1(2a) or later

Workaround:
None.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I2(2a)
Known Fixed Releases: *
7.0(3)I2(1.38), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuv24927
Title:
N9K - DHCP Traffic Punted to Control Plan w/o SVI
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DHCP packets are seen at the control plane of a Nexus 9000 Series Switch

Conditions:
No SVI for the vlan the DHCP traffic is traversing the switch in
DHCP Feature not enabled
DHCP Snooping not configured
DHCP Relay not configured

Workaround:
Contact Cisco TAC

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I3(3a), 6.1(2)I3(4b), 7.0(3)I1(2)
Known Fixed Releases: *
7.0(3)I2(0.568), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCux07629
Title:
SSTE: n9k- Error message & password validation inconsistency
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Error message & password validation inconsistency

Conditions:
config

Workaround:
NA

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I3(0.62)
Known Fixed Releases: *
7.0(3)I3(0.155), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCut48218
Title:
ISIS: forwarding adjacency next-hops unresolved after reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After reload or power-cycle, ISIS next-hop forwarding adjacencies remain unresolved.

Conditions:
This is seen with configurations in which BFD is NOT present, since BFD masks
the issue.

Workaround:
1. The issue can be resolved by pinging the next-hop
2. If bfd is enabled, the issue will not be seen

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(1)
Known Fixed Releases: *
7.0(3)I2(0.542), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw74970
Title:
n9k doesn't count input error, but count Symbol Error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
n9k doesn't count input error, but count Symbol Error

Conditions:
- n9k count "Symbol-Err" on "show interface counter error"
- but n9k doesn't count "input error" on "show interface"

Workaround:
none

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I3(3a)
Known Fixed Releases: *
7.0(3)I2(1.51), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCur86374
Title:
Load interval set-to random high value after port breakout
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Running "show interface" may show very high load-interval value on some interfaces.

Ex:

503316480 seconds input rate 0 bits/sec, 0 packets/sec
503316480 seconds output rate 0 bits/sec, 0 packets/sec

Conditions:
Issue was noticed when MTS stats timeout occurred. This could be due some other process running in the background causing MTS stats process to timeout.
"show interface" command execution could be slow when this happens.

Workaround:
This is a cosmetic bug. When MTS stats timeout occurs, software is incorrectly returning 503316480 for load-interval.
Issue is seen at random. There is no functional impact due to high load-interval value.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(0.157)
Known Fixed Releases: *
7.0(3)I2(1.51), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw01873
Title:
sh tech plcmgr detail return mts_print traceback on console
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
With a large OpenFlow configuration (32,000 L2 flows and 3,000 L3 flows) applied, attempts to run the command "show tech plcmgr detail" may result in the following failure:

%KERN-2-SYSTEM_MSG: [19232.955952] "show tech plcmgr detail" in sap 6907, uuid 0 send_opc 7679, pid 7741, proc_name plcmgr - kernel
mts_acquire_q_space() failing - no space in sap ... - kernel
mts_is_q_space_available_haslock_old(): NO SPACE ...

Conditions:
Only occurs when a large OpenFlow configuration is applied.

Workaround:
Save the log/show_tech to a file in bootflash:
show tech plcmgr detail > xxx.txt
In this way, CLI no crash.

Further Problem Description:
After installing 35,000 flows, the switch will have many PPF nodes. The "show tech plcmgr detail" command was simply trying to print all thesey PPF nodes at once and this fills up the MTS buffers and fails the command.

Our fix is to print the nodes in multiple loops.

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I2(0.568), 7.0(3)I2(0.585)
Known Fixed Releases: *
7.0(3)I2(1.7), 7.0(3)I2(2), 7.0(3)I3(0.128), 7.0(3)I3(1), 7.0(3)IDP3(1.12), 7.0(3)IDP3(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw67332
Title:
Mac Address flapp in Vlan 1 between Admin Shut down ports -Nexus9000
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MAC address flapping only in Vlan 1 between random ports and some of the ports are in "Admin shut"

Conditions:
vPC and system configured to operate in spanning tree MST mode and receiving FcOE FIP Vlan request frame.

Workaround:
None

Further Problem Description:
No production impact

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases: *
7.0(3)I2(1.52), 7.0(3)I2(2), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCux27489
Title:
BFD timer configuration change is not getting applied to running config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When non-default BFD timers are configured they are not inserted into running config.

Default BFD timers don't have any issues.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
7.0(3)I3(0.144)
Known Fixed Releases: *
7.0(3)I2(2.15), 7.0(3)I2(2a), 7.0(3)I2(2x), 7.0(3)I2(3), 7.0(3)I3(0.159), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCun26341
Title:
Enhancement Request: Send hostname in SYSLOG message
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
No hostname (or ipaddr for that matter) in SYSLOG msg content.

tcpdump
-----------------------------------------------------------------

Raw message received from 'v6-n9508-agg1' (192.168.10.191):

root@avr-lubuntu[~]# tcpdump -nXli eth1 host 192.168.10.191 and port 514
16:15:23.043290 IP 192.168.10.191.514 > 192.168.12.220.514: SYSLOG local7.notice, length: 115
0x0000: 4500 008f 3227 0000 3f11 b04b c0a8 0abf E...2'..?..K....
0x0010: c0a8 0cdc 0202 0202 007b 1346 3c31 3839 .........{.F<189
0x0020: 3e3a 2032 3031 3420 4665 6220 3139 2031 >:.2014.Feb.19.1
0x0030: 393a 3134 3a35 3920 4553 543a 2025 5653 9:14:59.EST:.%VS
0x0040: 4844 2d35 2d56 5348 445f 5359 534c 4f47 HD-5-VSHD_SYSLOG
0x0050: 5f43 4f4e 4649 475f 493a 2043 6f6e 6669 _CONFIG_I:.Confi
0x0060: 6775 7265 6420 6672 6f6d 2076 7479 2062 gured.from.vty.b
0x0070: 7920 6164 6d69 6e20 6f6e 2031 3932 2e31 y.admin.on.192.1
0x0080: 3638 2e31 322e 3232 3040 7074 732f 31 68.12.220@pts/1

Note above there is no information in the actual msg indicating where the msg came from. This is in contrast to messages received from ASR1Ks. Here is an example from 'v6-asr1k-pe1' (192.168.10.195) in response to a 'conf t' and 'ctrl-z':

root@avr-lubuntu[~]# tcpdump -nXli eth1 host 192.168.10.195 and port 514
16:31:51.719438 IP 192.168.10.195.57055 > 192.168.12.220.514: SYSLOG local7.notice, length: 121
0x0000: 4500 0095 0a73 0000 fe11 18f5 c0a8 0ac3 E....s..........
0x0010: c0a8 0cdc dedf 0202 0081 5798 3c31 3839 ..........W.<189
0x0020: 3e33 3135 353a 2076 362d 6173 7231 6b2d >3155:.v6-asr1k-
0x0030: 7065 313a 202a 4665 6220 3139 2031 373a pe1:.*Feb.19.17:
0x0040: 3330 3a31 322e 3934 303a 2025 5359 532d 30:12.940:.%SYS-
0x0050: 352d 434f 4e46 4947 5f49 3a20 436f 6e66 5-CONFIG_I:.Conf
0x0060: 6967 7572 6564 2066 726f 6d20 636f 6e73 igured.from.cons
0x0070: 6f6c 6520 6279 2061 646d 696e 206f 6e20 ole.by.admin.on.
0x0080: 7674 7931 2028 3139 322e 3136 382e 3132 vty1.(192.168.12
0x0090: 2e32 3230 29 .220)

You can clearly see in the dump above (ASCII interpreted column on the right) that the hostname is part of the syslog message.

On ASR1K we can specify "logging origin_id hostname". Something similar to this would be great on N9K, or maybe better put, in NX-OS (I'm not sure if this is a limitation of all NX-OS devices or just N9K).

Conditions:
Here is how the environment was configured:

Unlike the ASR1Ks, since the Nexus 9Ks do not appear send hostname, nor provide any configuration knobs to specify an "origin-id", we had to key off ipaddr:

root@avr-lubuntu[~]# cat /etc/rsyslog.d/40-network.conf
:fromhost-ip, startswith, "192.168" /var/log/network/all.log
:msg, contains, "v6-asr1k-pe1" /var/log/network/v6-asr1k-pe1.log
& ~
:msg, contains, "v6-asr1k-pe2" /var/log/network/v6-asr1k-pe2.log
& ~
:msg, contains, "v6-asr1k-pe3" /var/log/network/v6-asr1k-pe3.log
& ~
:fromhost-ip, isequal, "192.168.10.191" /var/log/network/v6-n9508-agg1.log
& ~
:fromhost-ip, isequal, "192.168.10.192" /var/log/network/v6-n9508-agg2.log
& ~
:fromhost-ip, isequal, "192.168.10.193" /var/log/network/v6-n9396-p1a.log
& ~
:fromhost-ip, isequal, "192.168.10.194" /var/log/network/v6-n9396-p1b.log
& ~
:fromhost-ip, isequal, "192.168.10.198" /var/log/network/v6-n6001-trsw1.log
& ~
:fromhost-ip, isequal, "192.168.10.199" /var/log/network/v6-n6001-trsw2.log
& ~
:fromhost-ip, isequal, "192.168.100.51" /var/log/network/v6-gold101-csr1
& ~
:fromhost-ip, isequal, "192.168.101.51" /var/log/network/v6-gold101-csr2
& ~
:fromhost-ip, isequal, "192.168.112.51" /var/log/network

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I2(0.159)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.166), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.28), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2), command, convert_version.pl:, found
Alert Type:
Updated *
Bug Id:
CSCux39834
Title:
N9K Vxlan Remote mac not relearned after vlan is deleted re-added on vpc
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Remote MAC address is not learned on a VPC primary.

Conditions:
The conditions and triggers for this defect are very specific
1) Vlan needs to be removed on the VPC secondary
2) Vlan needs to be added back on the VPC secondary
3) This will result in:
- VPC secondary learning remote MAC address
- VPC secondary learning local MAC address
- VPC Primary learning local MAC

Workaround:
Either
- remove/readd the vlan on the VPC primary
- clear mac add dynamic on the VPC primary

Further Problem Description:

Last Modified:
24-DEC-2015
Known Affected Releases:
7.0(3)I2(2)
Known Fixed Releases: *
7.0(3)I2(2.39), 7.0(3)I2(2a), 7.0(3)I2(3)
Alert Type:
Updated *
Bug Id:
CSCuv96212
Title:
"[FSM:FAILED]:Task for updating FNV(TASK:ifc:dhcpd:DhcpClientUpdateFnv)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ACI 1.1(1j), A major fault against DHCP client with the description "[FSM:FAILED]:Task for updating FNV(TASK:ifc:dhcpd:DhcpClientUpdateFnv)

Conditions:

Workaround:

Further Problem Description:

Last Modified:
24-DEC-2015
Known Affected Releases: *
1.1(1j), 1.1(1r)
Known Fixed Releases:
1.1(2.53), 1.1(3f), 1.2(0.104a), 1.2(0.107), 1.2(0.94), 1.2(1.17), 1.2(1i), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCuw03670
Title:
Agent trying to delete vmmDomain after it came online again.
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The APIC will have a connect-failed Fault Code F1676 to the SCVMM and the SCVMM logs will indicate an exception 12/17/2015 3:03:41 PM-23596-14||UpdateVmmDomains|| Failed: Cleanup
vmmDomain failed to update new cloud from old
cloud

Conditions:
Version 1.1(4e)

Workaround:

Further Problem Description:

Last Modified:
24-DEC-2015
Known Affected Releases:
1.2(0.80a)
Known Fixed Releases:
1.2(0.104a), 1.2(0.107), 1.2(1.17), 1.2(1i), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCux52079
Title:
N9k:No separation b/w context name and protocol inst in Sh snmp context
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show snmp context

Conditions:
show command on SNMP

Workaround:
NA

Further Problem Description:

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I3(0.140)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.189), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2), command, convert_version.pl:, found
Alert Type:
Updated *
Bug Id:
CSCux44737
Title:
Python: cli_execution_error when executing commands on module
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When using the Python API to retrieve the output of commands from a module a cli_exec_error will be reported>>> output = cli('slot 1 quoted \"show clock\"')
Traceback (most recent call last):
File "", line 1, in
File "/isan/python/scripts/cli.py", line 38, in cli
raise cmd_exec_error(msg)
errors.cmd_exec_error: 'non-option ARGV-elements: clock \n'

Conditions:
Use Python API to retrieve commands from a Nexus 9500 Module.

Workaround:
Retrieve the output of the commands via console, telnet or ssh

Further Problem Description:

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I2(1a)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.178), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2), command, convert_version.pl:, found
Alert Type:
Updated *
Bug Id:
CSCux50198
Title:
switch logs tech support contains db and cli tech support
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The tech support that contains ACI Switch logs also contains ACI switch database and CLI tech supports.

Conditions:
This occurs on 11.1 version of ACI Switch software when a non-local tech support is collected.

Workaround:
None

Further Problem Description:
None

Last Modified:
26-DEC-2015
Known Affected Releases:
11.1(3f)
Known Fixed Releases: *
1.2(1.117)
Alert Type:
Updated *
Bug Id:
CSCux38308
Title:
ifTableLastChange is not updating after add/remove nve interface.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ifTableLastChange is not updating after add/remove nve interface.

Conditions:
Add or remove nve interface with command "[no] interface nve 1" and mibwalk ifTableLastChange object.

Workaround:
None.

Further Problem Description:
The fix exists in NXOS software release 7.0(3)I3(1)

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I3(0.163)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.177), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux41327
Title:
Evaluation of n9k-standalone-sw for OpenSSL December 2015 vulnerabilitie
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

Cisco Nexus 9000 Series (standalone, running NxOS) includes a version of OpenSSL that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 and CVE-2015-1794

And disclosed in http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl

This bug has been opened to address the potential impact on this product.

Conditions:

Exposure is not configuration dependent.

Cisco has reviewed and concluded that this product is affected by one or more of these vulnerabilities.


Cisco Nexus 9000 Series (standalone, running NxOS) is affected by:

CVE-2015-3195

Cisco Nexus 9000 Series (standalone, running NxOS) is not affected by:


CVE-2015-3193, CVE-2015-3194, CVE-2015-3196 and CVE-2015-1794

Workaround:
Not available.

Further Problem Description:

Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.4

http://tools.cisco.com/security/center/cvssCalculator.x?version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Last Modified:
27-DEC-2015
Known Affected Releases:
6.1(2)I3(5), 7.0(3)I2(2)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.182), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), command, convert_version.pl:, found, not
Alert Type:
Updated *
Bug Id:
CSCux56499
Title:
Same VRF tag gets displayed repeatedly on XML of sh bgp all summary|xml
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Same VRF tag gets displayed repeatedly on XML of "sh bgp all summary | xml"

nxos-pe1(config-evpn-evi)# show bgp all summary | xml







<__readonly__>


default
1.1.1.1
100


1


1






default
1.1.1.1
100


2


1

Conditions:
No conditions.

Workaround:
Take XML for a specific AFI SAFI you are interested, such as "show bgp ipv4 unicast summary | xml "

Further Problem Description:
None

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I3(0.180)
Known Fixed Releases: *
7.0(3)I3(0.195), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.3(0)D1(0.190), 7.3(0)N1(0.246), 7.3(0)N1(1), 7.3(0)ZD(0.208), 7.3(0)ZN(0.222)
Alert Type:
Updated *
Bug Id:
CSCuw66057
Title:
Interop issue with Intel NIC causes 10G to link up @ 1G
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Interop issue with Intel NIC running on certain server vendor links up at 1 G instead of 10G

Conditions:

Workaround:

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
7.0(3)I1(3)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I2(1.56), 7.0(3)I2(1.74), 7.0(3)I2(2.14), 7.0(3)I2(2a), 7.0(3)I2(3), 7.0(3)I3(0.132), 7.0(3)I3(0.197), 7.0(3)I3(0.87), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCux52707
Title:
BFD timer not able to change in some sequence - CSCux27489 patch
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When using "bfd interval min_rx multiplier " on 2.2 image, under some scenarios, the config does not go thru.

Conditions:
After reloading the box with 2.2 image which had the above mentioned config, changing it to some other values does not take effect.
Also, when config is not taking effect and customer tries to upgrade to 2.2a or to 2.2x image, then also the above config might not take effect.

Workaround:
Workaround is to first load 2.2a or 2.2x image or apply released patch on top of 2.2 image and then undo the "bfd interval config" and then reconfigure.

Further Problem Description:
Issue happens because sometimes stale config gets persisted but not applied. To get out of the problem, user can undo/change the config to some other value and then try to reconfigure. From then onwards, one can use the system as usual without having to worry about this. The issue can potentially be seen one time only until the user tries the workaround steps.

Last Modified:
30-DEC-2015
Known Affected Releases:
7.0(3)I2(2)
Known Fixed Releases: *
7.0(3)I2(2.29), 7.0(3)I2(3), 7.0(3)I3(0.191), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.62), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCuv43018
Title:
aclqos crash after heartbeat failure
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"aclqos" crashed following a heartbeat failure

Conditions:
When an application makes an RPC call (request), a lock is held, and if for any reason the response does not have the right RPC sequence number, the lock is not released, potentially leading to heartbeat miss. To prevent this, the lock is held for a small finite time instead of holding lock infinitely.


Workaround:
To prevent this, the lock is held for a small finite time instead of holding lock infinitely.

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
6.1(2)I1(3.4)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.197), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.62), 7.0(3)IDP3(2), command, convert_version.pl:, found
Alert Type:
Updated *
Bug Id:
CSCux52085
Title:
N9k: Invalid help while configuring snmp host
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
configuring snmp host

Conditions:
config/SNMP

Workaround:
NA

Further Problem Description:

Last Modified:
27-DEC-2015
Known Affected Releases:
7.0(3)I3(0.140)
Known Fixed Releases: *
/bin/sh:, 7.0(3)I3(0.189), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.50), 7.0(3)IDP3(2), command, convert_version.pl:, found
Alert Type:
Updated *
Bug Id:
CSCux43297
Title:
A closed summary pane cannot be reopened by clicking on the same tile
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
The summary pane is closed and clicking the same tile does not reopen it

Conditions:
This issue will happen after closing the summary pane for any tile

Workaround:
Click on any other tile to open the summary pane, and then click the original tile again. If there are no other tiles available, refresh the web browser page.

Further Problem Description:

Last Modified:
07-DEC-2015
Known Affected Releases:
1.0(0.398)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux43296
Title:
Tasks for adding members appear to show the object itself being created
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
The task summary shows that an object was created instead of members being added

Conditions:
This issue will be seen for any action that adds members to an object

Workaround:
There is no workaround for this issue, but it is purely cosmetic in nature

Further Problem Description:

Last Modified:
07-DEC-2015
Known Affected Releases:
1.0(0.442)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux43282
Title:
Selected VRFs appear to be unselected after a failed deletion
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
The VRFs selected for deletion are no longer selected

Conditions:
This issue will occur if the VRF deletion fails

Workaround:
Refresh the web browser page

Further Problem Description:

Last Modified:
08-DEC-2015
Known Affected Releases:
1.0(0.531)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw11807
Title:
openssl ciphers list still includes non-working ciphers
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The NGINX cipher list includes ciphers that do not actually work.

Conditions:
This is a follow-up to CSCuv94846 which removed explicit support for the ciphers but the ciphers are still included implicitly. The ciphers also need to explicitly remove from the cipher list.

Workaround:

Further Problem Description:
There are only ten supported ciphers:

ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256

Last Modified:
09-DEC-2015
Known Affected Releases:
1.2(0.89)
Known Fixed Releases: *
1.2(0.101), 1.2(1.17), 1.2(1i)
Alert Type:
New
Bug Id:
CSCux60574
Title:
OSPF Timers Show Sub-Second, Negative or Offset Timestamps
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
In the Leaf CLI, OSPF timers show as sub-second, negative or not matching system time.

Leaf# show ip ospf neighbors vrf all
OSPF Process ID default VRF L3Test2:L3Out2_VPC
Total number of neighbors: 3
Neighbor ID Pri State Up Time Address Interface
100.0.0.1 1 TWO-WAY/DROTHER 0.756030 10.0.0.1 Vlan22 <--- Sub-second Up Time
100.0.0.5 1 FULL/BDR 0.252539 10.0.0.4 Vlan22 <--- Sub-second Up Time
100.0.0.8 1 FULL/DR 0.163662 10.0.0.2 Vlan22 <--- Sub-second Up Time

Leaf# show ip route vrf L3:L3Test
IP Route Table for VRF "L3:L3Test"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]

*via 10.0.0.1, vlan22, [110/5], -07:32:50, ospf-default, intra <--- Negative timer
100.0.0.8/32, ubest/mbest: 1/0
*via 10.0.0.2, vlan22, [110/5], -07:32:50, ospf-default, intra <--- Negative timer

Leaf# date
Thu Dec 17 18:49:06 UTC 2015 <--- Not matching event-history entries
Leaf# show ip ospf event-history adj
Adjacency events for OSPF Process "ospf-default"
2015 Dec 17 10:49:02.695349 ospf default [5042]: TID 5153:ospfv2_send_nbr_ddesc:535:(L3:L3Test-base) mtu 9000, opts: 0x42, ddbits: 0, seq: 0x7270265c
2015 Dec 17 10:49:02.695339 ospf default [5042]: TID 5153:ospfv2_send_nbr_ddesc:531:(L3:L3Test-base) Sent DBD with 0 entries to 10.0.0.4 on Vlan22

Conditions:
Command output for OSPF on Leaf switches show timers that exhibit the same issues described in Symptoms.

Workaround:
Ensuring the Time Zone and Display Format in Fabric Pod Policies match. For example, use the following settings for PDT or PST time zones:

Time Zone: America/Los Angeles
Display Format: Local

This workaround has shown to resolve time stamp issues only in some cases.

Further Problem Description:

Last Modified:
19-DEC-2015
Known Affected Releases:
11.1(3f), 11.2(1i)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux69901
Title:
pinning max-links does not show under FEX config tree
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
pinning max-links does not show under FEX configuration tree but can still be configured

Conditions:
fex configuration

Workaround:
none, the configuration can still be applied

Further Problem Description:

Last Modified:
30-DEC-2015
Known Affected Releases:
7.0(3)I2(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv78766
Title:
"%ETHPORT-3-IF_UNSUPPORTED_TRANSCEIVER:" for LOROM twiax cable
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Syslog message

%ETHPORT-3-IF_UNSUPPORTED_TRANSCEIVER: Transceiver on interface Ethernet1/5 is not supported
%ETHPORT-4-IF_NON_QUALIFIED_TRANSCEIVER: Non-qualified transceiver on interface Ethernet1/5 was detected

Conditions:
When following Twiax cable/SFP is inserted into Nexus N9K-C9396PX running 6.1(2)I3(4b)

Ethernet1/5
transceiver is present
type is SFP-H10GB-CU5M
name is CISCO-LOROM
part number is LRHSPB54A050
revision is B0
serial number is XXXXXXX
nominal bitrate is 10300 MBit/sec
Link length supported for copper is 5 m
cisco id is --
cisco extended id number is 4

DOM is not supported

Workaround:
Issue is cosmetic in nature as switch detects the SFP okay and interface also comes up okay.

Further Problem Description:

Last Modified:
23-DEC-2015
Known Affected Releases:
6.1(2)I3(4b)
Known Fixed Releases: *
7.0(3)I2(0.568), 7.0(3)I2(0.587), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 7.0(3)ITI2(1.37), 7.0(3)IX1(1.257), 7.0(3)IX1(2)
Alert Type:
New
Bug Id:
CSCux52554
Title:
L4-7 Device Package Supported Protocols not displaying in APIC GUI
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
The correct Rest HTTP get is being sent and the "supportedProtocols" response is correctly received however the browser does not display the contents. Expecting to see "bgp,bgpv6,ospf,ospfv3" in the GUI for the below example as a result of this call.

method: GET
url: https://10.66.80.242/api/node/mo/uni/infra/mDev-CISCO-ASA-1.2/mClusterCfg.json?query-target=children&target-subtree-class=vnsRoutingCfg&subscription=yes
response: {"totalCount":"1","subscriptionId":"72057628415557641","imdata":[{"vnsRoutingCfg":{"attributes":{"childAction":"","dn":"uni/infra/mDev-CISCO-ASA-1.2/mClusterCfg/mRoutingCfg","lcOwn":"local","modTs":"2015-12-12T16:11:48.091+11:00","name":"","status":"","supportedProtocols":"bgp,bgpv6,ospf,ospfv3"}}}]}

Conditions:

Workaround:

Further Problem Description:

Last Modified:
14-DEC-2015
Known Affected Releases:
1.2(1i)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv65994
Title:
PortChannel Memeber Policy is difficult to configure in GUI
Status:
Terminated
Severity:
6 Enhancement
Description: *

Symptom:
Enhancement Request for the way LACP fast Timeout is currently implemented

Conditions:
version 1.1(1j)

Workaround:

Further Problem Description:

Last Modified:
15-DEC-2015
Known Affected Releases:
1.1(1j)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux56191
Title:
BCM Adj fails when static route prefix is the same as BD subnet
Status: *
Other
Severity: *
6 Enhancement
Description:

Symptom:
Some routes are not working in a static route. You do not see these packets leave the switch and do not see them received on the other end of the l3 connection.

Conditions:
You had a BD SVI, then added a static route for that subnet pointing to a next hop IP in an L3 Out. You then deleted the BD SVI.

Look at the routing table and verify that the route is in the Routing Information Base (RIB) and points to the next hop of the L3Out:

leaf1# show ip route vrf Joey-Tenant:Joey-Internal2
IP Route Table for VRF "Joey-Tenant:Joey-Internal2"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF
192.168.2.0/24, ubest/mbest: 2/0, attached, direct, pervasive
*via 27.27.27.11, vlan63, [1/0], 02:58:12, static <-------------
192.168.2.1/32, ubest/mbest: 1/0, attached
*via 192.168.2.1, vlan65, [1/0], 02:58:42, local, local

Find the BCM VRF ID for that VRF. on the leaf, run the following:

vsh_lc

module-1# show system internal eltmc info vrf
VRF-TABLE: Joey-Tenant:Joey-Internal2
vrf_type: tenant ::: context_id: 23
overlay_index: 0 ::: vnid: 2949121
scope: 23 ::: sclass: 32770
v4_table_id: 0x16 ::: v6_table_id: 0x80000016
intf_count: 3 ::: intrn_vlan_id: 0
VRF Intf: Vlan63 ::: src_plcy_incomp: 1
vnid_hex: 0x2d0001 ::: policy_mode: Egress
vrf_intf_list: loopback10,Vlan65,Vlan63,
vrf_bd_list: 63,65,

BCM Info:
bcm_vrf_id: 22 <---------- ::: bcm_l3_intf_id: 0

NorthStar Info:
qq_tbl_id: 1102 ::: seg_state_tbl_id: 61
::::

exit out of the "vsh_lc" shell:

exit

Find the subnet in the L3 table of the BCM:

bcm-shell-hw "l3 defip show" | grep

leaf1# bcm-shell-hw "l3 defip show" | grep 192.168.2.0
2320 22 192.168.2.0/24 00:00:00:00:00:00 100006 0 0 0 0 n <---- The second column in is the VRF. This matches ELTMC so we know this in the Route. The fifth column in is the "INTF" which will map to the destination. Validate that the destination is incorrect:

leaf1# bcm-shell-hw "l3 egress show

leaf1# bcm-shell-hw "l3 egress show 100006"
unit is 0
Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop RefCount
100006 00:00:00:00:00:00 0 0 0 0 -1 yes no 40 <---- CPU bit is set.

If the entry points to the CPU, the forwarding decision is incorrect. It should point to the next how MAC of the L3 router. The mac in this case is all 0's.

Workaround:
reload the leaf

Further Problem Description:

Last Modified:
17-DEC-2015
Known Affected Releases:
11.2(1i)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux70460
Title:
APIC initial setup script should be automated
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
When adding a new APIC into an existing fabric, users need to make sure to enter the exact fabric domain name, cluster size, tep ip pool and infrastructure for the new APIC to join the cluster.

Conditions:
When running the initial set up script

Workaround:
none

Further Problem Description:

Last Modified:
31-DEC-2015
Known Affected Releases:
1.2(1i)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv80422
Title:
Per Bridge Domain level MTU setting
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
An administrator wishes to change the MTU for a particular Bridge Domain (BD) but can only change it fabric-wide.

Conditions:
MTU needs to be changed at the BD level.

Workaround:
Use QoS Levels in Fabric Access Policies to set the MTU and then apply the QoS Level in an EPG.

Further Problem Description:

Last Modified:
20-DEC-2015
Known Affected Releases:
11.1(1j), 11.1(3f)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux52176
Title:
Changing LooseNode Mgmt IP address causes blackhole of traffic
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
After changing UCS FI OOB management address, VMM connectivity is broken. When checking "moquery -c fvDyPathAtt" you will see the entries as zero.

Conditions:
UCS FI
ACI

Workaround:
"Trigger inventory sync" on APIC for corresponding vCenter controller.

Further Problem Description:

Last Modified:
21-DEC-2015
Known Affected Releases:
1.1(3f), 1.2(1i)
Known Fixed Releases: *
1.2(1.102a), 1.2(1.105a), 1.2(1.107), 1.2(1.97c), 1.2(1j)
Alert Type:
Updated *
Bug Id:
CSCuv46733
Title:
Enhancement: need to set BGP attrib. when redist. route from OSPF on ACI
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The routes from other protocols on layer 3 out (OSPF, and EIGRP) should have a way to be identified during redistribution and being mark with certain BGP attribute (i.e. community).
The current implementation, the only way to add community to OSPF learned routes on BGP is to specify the exact subnet prefix on BGP outbound policy.

Conditions:
N/A

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
23-DEC-2015
Known Affected Releases:
1.1(1n)
Known Fixed Releases: *
1.2(1.111), 1.2(1.38), 1.2(1.51a), 1.2(1.53a), 1.2(1.55a), 1.2(1.57a), 1.2(1.65), 1.2(1.84), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCux06308
Title:
Import check for Route Control Enforcement should be disabled by default
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
When configuring an External Routed Network (L3 Out) and selecting BGP as the protocol, Import option will be selected by default on GUI

Conditions:
BGP is the L3 Out Protocol

Workaround:
uncheck Import for Route Control Enforcement

Further Problem Description:

Last Modified:
12-DEC-2015
Known Affected Releases:
1.1(3f), 1.2(0.139i)
Known Fixed Releases: *
1.2(1.78), 1.2(1.84), 1.2(1b), 1.2(1i)
Alert Type:
Updated *
Bug Id:
CSCuu03257
Title:
EPM and EPMC changes for MAC/IP based EPG feature
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
- IP/MAC Ckt EP configuration not supported in combination with static EP configurations
- IP/MAC Ckt EP configuration not supported with L2-only BDs (config will not be blocked, it just won't take effect as there is
no L3 learning in these BDs)
- IP/MAC Ckt EP configuration not supported with external and Infra BDs (again because there is no L3 learning in these BDs)
- IP/MAC Ckt EP configuration not supported with shared services provider config (same or overlapping prefix cannot be used for shared services provider and IP Ckt EP). However, this config can be applied in BDs having shared services consumer EPGs.
- IP/MAC Ckt EP configuration not supported with dynamic EPGs. Only static EPGs are supported
- No fault will be raised if the IP/MAC Ckt EP prefix configured is outside BD subnet range. This is because user can configure BD subnet and IP/MAC Ckt EP in any order and so this is not error condition. If the final configuration is such that IP/MAC Ckt EP prefix configured is outside all BD subnets, the config has no impact and is not an error condition.
- Dynamic deployment of contracts based on instrImmedcy set to onDemand/lazy not supported, only immediate mode is supported.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
24-DEC-2015
Known Affected Releases: *
11.0(3.928), 12.0(0.1)
Known Fixed Releases:
1.2(0.31), 1.2(1.17), 1.2(1.48), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCus39418
Title:
Need kernel panic logs from standby sup included in techsupport
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Cisco C9508 running in ACI mode does not include kernel panic log files from the standby supervisor module.

Conditions:
If a kernel panic occurs, an "oops" kernel panic file is generated to provide critical information about the source of the crash. This information normally is present in the techsupport output but if after the crash the supervisor which was active during the crash becomes the standby supervisor, these files will not be present.

Workaround:
Access the standby supervisor via console and gather the file content output from the /mnt/pstore directory.

Further Problem Description:

Last Modified:
26-DEC-2015
Known Affected Releases:
11.0(2j)
Known Fixed Releases: *
11.2(1.170)
Alert Type:
New
Bug Id:
CSCux38542
Title:
Subnet not deleted in Broadcom even if subnet is not in use anymore
Status:
Other
Severity:
6 Enhancement
Description:

Symptom:
If you use as Layer 3 out static route a subnet that is already in use for a BD part of the same tenant.
and if then you delete the subnet from the BD.

The layer 3 out static route will never work.

Conditions:
The subnet is stuck in ASic. To verify it use the following command from the leaf:

bcm-shell-hw "l3 defip show" | egrep "subnet"
1153 11 x.x.x.x/27 00:00:00:00:00:00 100006 0 0 0 0 n

And then keep the number after the 000 mac (here 100006) and get:
leaf1# bcm-shell-hw "l3 egress show" | egrep "Entry|100006"
Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop RefCount
100006 00:00:00:00:00:00 0 0 0 0 -1 yes no 19
If the MAc address above is all 00 and not the mac of the next hop, it is likely the issue

Workaround:

Further Problem Description:

Last Modified:
03-DEC-2015
Known Affected Releases:
11.1(3f)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux69651
Title:
ACI leaf - Enh - Req to save core in different partition if full
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Enhancement request to ensure core file of a process crash are alwasy saved even if the partition is full.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
29-DEC-2015
Known Affected Releases:
11.1(2h)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux52979
Title:
APIC: Remove orphan files after failed or cancelled Firmware Upload Task
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Orphan files are left in the firmware repository directory /firmware/fwrepos/fwrepo.Uploads/ and cannot be manually deleted by admin user.

Conditions:
APIC running 1.2(1i) has an issue where the failed or cancelled firmware upload leaves orphan files in the firmware repository directory /firmware/fwrepos/fwrepo.Uploads/.

Workaround:
Orphan files in the firmware repository directory /firmware/fwrepos/fwrepo.Uploads/ can be deleted manually as "root" user only

OR

Use the "Upload Firmware to APIC" to successfully upload an image to the Firmware Repository. After completed, the janitor process will clean up any orphan files in the /firmware/fwrepos/fwrepo.Uploads/ directory

Further Problem Description:

Last Modified:
14-DEC-2015
Known Affected Releases:
1.2(1i)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut84965
Title:
Vlans are programmed on interfaces unassociated to the pool
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
You are receiving "Invalid Path Configuration faults" pointing to an IP address of a blade switch (fabric interconnect). The access policies for these paths are correct. Vlans are programmed on interfaces that are not associated to a pool that has those vlans. This is because you have a blade switch that has multiple uplinks to the fabric. Some of those uplinks are mapped to the VMM domain AEP, some are mapped to another AEP.

Conditions:
dynamic paths are associated to the wrong interface policy groups. We build and adjacency to the blade switch itself, and since other interfaces are learning CDP from that, but those interfaces are not part of the VMM domain AEP, we throw a fault.

Workaround:
Change the Resolution Immediacy of the VMM domain to "Pre-Provisioning" within the EPG. This bypasses the need for an adjacency and will push the VLAN only to interfaces that are part of the VMM AEP.

If this does not resolve it, it is because there may be some stale objects pointing t the blade switch. The 1.2(1i) code is confirmed to have the fix if you continue to use pre-provisioning.

Further Problem Description:

Last Modified:
11-DEC-2015
Known Affected Releases:
1.0(3f)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux57344
Title:
SCVMM/Hyper-V Agent should not install on non-US Windows Server
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
SCVMM Agent Set-ApicConnInfo fails with error: "The remote server returned an error: (400) Bad Request."

Conditions:
SCVMM Agent is installed on non-ASCII Windows platform

Workaround:
none

Further Problem Description:
The xml payload from the POST request sent from the Set-ApicConnInfo cmdlet to the APIC SCVMM Agent service is malformed. More specifically, it is missing the first two characters ("
................


Last Modified:
30-DEC-2015
Known Affected Releases:
1.1(4e)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论