Cisco Blog » The Platform

2016年2月1日星期一

Cisco Notification Alert -ASR 9000 Series Router-01-Feb-2016 18:18 GMT

 

 

 

 

 

 

 


Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-hp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Half Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-fp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Full Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.4
Alert Type:
New File
File Name:
asr9k-px-4.3.4.CSCuw75546.tar
File Description:

Hitless/Optional SMU,DR/BDR changes on switchover with NSR enabled in LAN segment

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software Manager
Release Version:
3.2
Alert Type:
New File
File Name:
csm-3.2.zip
File Description:

CSM 3.2

File Release Date:
08-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.4
Alert Type:
New File
File Name:
asr9k-px-4.3.4.CSCuw75546.tar
File Description:

Hitless/Optional SMU,DR/BDR changes on switchover with NSR enabled in LAN segment

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
DDoS Mitigation Software
Release Version:
TMS 7.6
Alert Type:
New File
File Name:
Peakflow-TMS-7.6-FKIJ-x86_64.ova
File Description:

TMS 7.6 image for ASR 9K VSM DDoS Solution

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
DDoS Mitigation Software
Release Version:
SP 7.6
Alert Type:
New File
File Name:
Peakflow-SP-7.6-vm-FKCG-B.iso
File Description:

Arbor Peakflow SP 7.6 Image for virtualized SP running on a server as collector for an ASR 9K DDoS router.

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
DDoS Mitigation Software
Release Version:
TMS 7.6
Alert Type:
New File
File Name:
Peakflow-TMS-7.6-FKIJ-x86_64.ova
File Description:

TMS 7.6 image for ASR 9K VSM DDoS Solution

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
DDoS Mitigation Software
Release Version:
SP 7.6
Alert Type:
New File
File Name:
Peakflow-SP-7.6-vm-FKCG-B.iso
File Description:

Arbor Peakflow SP 7.6 Image for virtualized SP running on a server as collector for an ASR 9K DDoS router.

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
Carrier Grade IPv6 (CGv6) and NAT (CGN)
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-vsm-cgv6-5.3.3.00.ova
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) ova package for VSM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.4
Alert Type:
New File
File Name:
asr9k-px-4.3.4.CSCuw75546.tar
File Description:

Hitless/Optional SMU,DR/BDR changes on switchover with NSR enabled in LAN segment

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-hp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Half Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-fp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Full Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
DDoS Mitigation Software
Release Version:
TMS 7.6
Alert Type:
New File
File Name:
Peakflow-TMS-7.6-FKIJ-x86_64.ova
File Description:

TMS 7.6 image for ASR 9K VSM DDoS Solution

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
DDoS Mitigation Software
Release Version:
SP 7.6
Alert Type:
New File
File Name:
Peakflow-SP-7.6-vm-FKCG-B.iso
File Description:

Arbor Peakflow SP 7.6 Image for virtualized SP running on a server as collector for an ASR 9K DDoS router.

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.4
Alert Type:
New File
File Name:
asr9k-px-4.3.4.CSCuw75546.tar
File Description:

Hitless/Optional SMU,DR/BDR changes on switchover with NSR enabled in LAN segment

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-hp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Half Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-fp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Full Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
Carrier Grade IPv6 (CGv6) and NAT (CGN)
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-ism-cgv6-install-kit.5.3.3.00.sh
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) install kit for ISM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-cgv6-5.3.3.00.ova
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) ova package for VSM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
4.3.4
Alert Type:
New File
File Name:
asr9k-px-4.3.4.CSCuw75546.tar
File Description:

Hitless/Optional SMU,DR/BDR changes on switchover with NSR enabled in LAN segment

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
DDoS Mitigation Software
Release Version:
SP 7.6
Alert Type:
New File
File Name:
Peakflow-SP-7.6-vm-FKCG-B.iso
File Description:

Arbor Peakflow SP 7.6 Image for virtualized SP running on a server as collector for an ASR 9K DDoS router.

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
DDoS Mitigation Software
Release Version:
TMS 7.6
Alert Type:
New File
File Name:
Peakflow-TMS-7.6-FKIJ-x86_64.ova
File Description:

TMS 7.6 image for ASR 9K VSM DDoS Solution

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
Carrier Grade IPv6 (CGv6) and NAT (CGN)
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-ism-cgv6-install-kit.5.3.3.00.sh
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) install kit for ISM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-cgv6-5.3.3.00.ova
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) ova package for VSM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR XML Schemas
Release Version:
5.3.3
Alert Type:
New File
File Name:
All_schemas-ASR9K-PX-5.3.3.tar.gz
File Description:

Cisco IOS XR XML Schemas

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
perl_toolkit_ASR9K-PX_5.3.3.tar.gz
File Description:

Cisco IOS XR Perl Scripting Toolkit and Data Objects

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR XML Schemas
Release Version:
5.3.3
Alert Type:
New File
File Name:
All_schemas-ASR9K-PX-5.3.3.tar.gz
File Description:

Cisco IOS XR XML Schemas

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
perl_toolkit_ASR9K-PX_5.3.3.tar.gz
File Description:

Cisco IOS XR Perl Scripting Toolkit and Data Objects

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
Carrier Grade IPv6 (CGv6) and NAT (CGN)
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-vsm-cgv6-5.3.3.00.ova
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) ova package for VSM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR XML Schemas
Release Version:
5.3.3
Alert Type:
New File
File Name:
perl_toolkit_ASR9K-PX_5.3.3.tar.gz
File Description:

Cisco IOS XR Perl Scripting Toolkit and Data Objects

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
All_schemas-ASR9K-PX-5.3.3.tar.gz
File Description:

Cisco IOS XR XML Schemas

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9912 Router
Software Type:
IOS XR Software Manager
Release Version:
3.2
Alert Type:
New File
File Name:
csm-3.2.zip
File Description:

CSM 3.2

File Release Date:
08-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
DDoS Mitigation Software
Release Version:
TMS 7.6
Alert Type:
New File
File Name:
Peakflow-TMS-7.6-FKIJ-x86_64.ova
File Description:

TMS 7.6 image for ASR 9K VSM DDoS Solution

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
DDoS Mitigation Software
Release Version:
SP 7.6
Alert Type:
New File
File Name:
Peakflow-SP-7.6-vm-FKCG-B.iso
File Description:

Arbor Peakflow SP 7.6 Image for virtualized SP running on a server as collector for an ASR 9K DDoS router.

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
Carrier Grade IPv6 (CGv6) and NAT (CGN)
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-vsm-cgv6-5.3.3.00.ova
File Description:

Carrier Grade IPv6 (CGv6) and NAT (CGN) ova package for VSM LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
28-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-hp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Half Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-fp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Full Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software
Release Version:
5.3.3
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-hp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Half Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
New File
File Name:
ASR9K-iosxr-px-K9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-vsm-mb-ipsec-fp-CCO-5.3.3.00.ova
File Description:

VSM Site-to-Site/GetVPN IPSec Full Profile OVA Package for VSM-500 LC on ASR9000 series router with IOS-XR 5.3.3

File Release Date:
30-JAN-2016
Alert Type:
Obsolete File
File Name:
ASR9K-iosxr-px-k9-5.3.3.tar
File Description:

Cisco ASR 9000 IOS XR Software 3DES

Obsolete Date:
30-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9922 Router
Software Type:
IOS XR Software Manager
Release Version:
3.2
Alert Type:
New File
File Name:
csm-3.2.zip
File Description:

CSM 3.2

File Release Date:
08-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9010 Router
Software Type:
IOS XR Software Manager
Release Version:
3.2
Alert Type:
New File
File Name:
csm-3.2.zip
File Description:

CSM 3.2

File Release Date:
08-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Software Manager
Release Version:
3.2
Alert Type:
New File
File Name:
csm-3.2.zip
File Description:

CSM 3.2

File Release Date:
08-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9006 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.2
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCuw81641.tar
File Description:

Hitless/Optional SMU, New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.1.2.CSCux53294.tar
File Description:

Hitless/Optional SMU, invmgr: New 40 gig QSFP-40G-LR4-S support for ASR9k

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.1
Alert Type:
New File
File Name:
asr9k-px-5.3.1.CSCux08668.tar
File Description:

Hitless/Optional SMU,Framed IP not sent in accounting stop record

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.2
Alert Type:
New File
File Name:
asr9k-px-5.2.2.CSCux28209.tar
File Description:

Reboot/Optional SMU, Umbrella DDTS for HDD access failures on VSM

File Release Date:
07-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.1.3
Alert Type:
New File
File Name:
asr9k-px-5.1.3.CSCux19443.tar
File Description:

Hitless/Optional SMU,Hitless/Optional SMU, BNG not offering new address per DHCP

File Release Date:
28-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.2
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux78263.tar
File Description:

Hitless/Optional SMU, Incorrect path when LSP switchover with path-protection

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCuw19968.tar
File Description:

Hitless/Optional SMU, OSPF lost some summary prefixes

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
asr9k-px-5.3.2.CSCux86979.tar
File Description:

Traffic Loss/Recommended SMU, BGP Umbrella SMU for 5.3.2

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.CSCux76794.tar
File Description:

Reboot/Optional SMU, Umbrella SMU to fix trace back issues

File Release Date:
29-JAN-2016

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Software Maintenance Upgrades (SMU)
Release Version:
5.3.0
Alert Type:
New File
File Name:
asr9k-px-5.3.0.CSCux63693.tar
File Description:

Hitless/Optional SMU, Umbrella DDTS for FRR interop issue

File Release Date:
25-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9904 Router
Software Type:
IOS XR Service Packs
Release Version:
5.2.4
Alert Type:
New File
File Name:
asr9k-px-5.2.4.sp2.tar
File Description:

IOS XR 5.2.4 Service Pack 2 for ASR9K-PX Platform

File Release Date:
11-JAN-2016
Find additional information in Software Downloads index.

Software Updates for ASR 9000 Series Aggregation Services Routers

Product Name:
ASR 9001 Router
Software Type:
IOS XR XML Schemas
Release Version:
5.3.3
Alert Type:
New File
File Name:
perl_toolkit_ASR9K-PX_5.3.3.tar.gz
File Description:

Cisco IOS XR Perl Scripting Toolkit and Data Objects

File Release Date:
29-JAN-2016
Alert Type:
New File
File Name:
All_schemas-ASR9K-PX-5.3.3.tar.gz
File Description:

Cisco IOS XR XML Schemas

File Release Date:
29-JAN-2016
Find additional information in Software Downloads index.

Known Bugs - ASR 9000 Series Aggregation Services Routers

Alert Type:
Updated *
Bug Id:
CSCuj80945
Title:
ASR9k disconnects satellite during normal operation
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
ASR9k host disconnects satellite during normal operation causing traffic impact

All ICL links go down during the event


In most cases we will see the ICL link go down followed by satellite access ports going down and an inventory message indicating 'node removed'

LC/0/7/CPU0:Sep 22 09:35:07.605 UTC: ifmgr[201]: %PKT_INFRA-LINEPROTO-5-UPDOWN : Line protocol on Interface TenGigE0/7/0/20, changed state to Down
LC/0/7/CPU0:Sep 22 09:35:07.606 UTC: ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet111/0/0/2, changed state to Down
LC/0/7/CPU0:Sep 22 09:35:07.606 UTC: ifmgr[201]: %PKT_INFRA-LINEPROTO-5-UPDOWN : Line protocol on Interface GigabitEthernet111/0/0/2, changed state to Down
LC/0/7/CPU0:Sep 22 09:35:07.608 UTC: ifmgr[201]: %PKT_INFRA-LINEPROTO-5-UPDOWN : Line protocol on Interface TenGigE0/7/0/21, changed state to Down
LC/0/7/CPU0:Sep 22 09:35:07.609 UTC: ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet111/0/0/13, changed state to Down
RP/0/RSP0/CPU0:Sep 22 09:35:07.617 UTC: invmgr[259]: %PLATFORM-INV-6-OIROUT : OIR: Node 111 removed

Conditions:
Occurs during normal operation

Workaround:
NA

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
4.2(1), 5.2(2)
Known Fixed Releases: *
15.1(3)SVF04c, 15.1(3)SVF04d, 15.1(3)SVF04f, 15.1(3)SVG01c, 15.1(3)SVG02, 15.1(3)SVG03, 15.1(3)SVG03a, 15.1(3)SVH02, 15.1(3)SVH04
Alert Type:
Updated *
Bug Id:
CSCuu00818
Title:
sysdb_shared_sc crash
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
sysdb_shared_sc crash

Conditions:
after upgrade 5.1.3

Workaround:
n/a

Further Problem Description:
This issue happens multiple times. The trigger could be the way router's config is updated. They do commit replace everytime update the config.

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.3.BASE, 5.3.2.BASE
Known Fixed Releases: *
5.2.5.41i.BASE, 5.3.2, 5.3.2.12i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCux74155
Title:
RJIL : ASR9k - Multicast RPF failure on 5.3.3.23I
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
We are unable to see RPF neighbor in the show mrib ipv6 route and show pim ipv6 rpf <>, but we have routing entry in show route ipv6.

RP/0/RSP0/CPU0:AG2-2#sh mrib ipv6 route
Thu Dec 24 11:26:11.029 IST


(2405:200:8001:101::2,ff33:4001::3)
RPF nbr: :: Flags: RPF
Up: 01:34:56
Outgoing Interface List
TenGigE0/0/0/4 Flags: F NS, Up: 01:34:56

RP/0/RSP0/CPU0:AG2-2#sh route ipv6 2405:200:8001:101::3
Thu Dec 24 11:26:33.301 IST

Routing entry for 2405:200:8001:101::/64
Known via "bgp 55836", distance 200, metric 0
Tag 65000
Number of pic paths 1 , type internal
Installed Dec 24 09:49:11.692 for 01:37:21
Routing Descriptor Blocks
2405:200:1410:32:4000::, from 2405:200:1410:32:4000::
Route metric is 0
2405:200:1410:32:4000::1, from 2405:200:1410:32:4000::1, BGP backup path
Route metric is 0
No advertising protos.

RP/0/RSP0/CPU0:AG2-2#sh pim ipv6 rpf 2405:200:8001:101::3
Thu Dec 24 11:26:54.193 IST
Table: IPv6-Multicast-default
2405:200:8001:101::3/128 [200/10]
via fe80::5287:89ff:fe2b:f8c8, Null
RP/0/RSP0/CPU0:AG2-2#

Conditions:
IPv6 multicast is present in global-table. The RPF reachability to the Source/RP/BSR should be, using a BGP route.

Workaround:
None

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.3.21i.MCAST
Known Fixed Releases: *
5.3.3.26i.FWDG, 5.3.3.26i.MCAST, 6.0.1.15i.BASE, 6.0.1.15i.FWDG, 6.0.1.15i.MCAST
Alert Type:
Updated *
Bug Id:
CSCup67926
Title:
Satellite does not detect ICL link down on Tx cable removal
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Expected Behavior: When the Tx cable is plugged out from ICL port of satellite, the respective port on host stops receiving laser which in turn will go down and notifies satellite port on Remote fault. As satellite receives a Remote fault it should make the ICL port (from which tx is plugged out) down and at the same time as the ICL is down on host, satellites goes down.

But contrary to above mentioned the satellite port is up when we plug out tx cable.

Conditions:
We see this issue if we unplug tx cable from satellite ICL port when connected to host.

9k---------------------satellite
ICL interface


Workaround:
No Work around.

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
5.2(2)
Known Fixed Releases: *
15.1(3)SVF04f, 15.1(3)SVG03b
Alert Type:
Updated *
Bug Id:
CSCur71262
Title:
PWHE L3 sub-interface: Incoming CE ARP RSV_DROP_MPLS_NRLDI_NO_MATCH
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PWHE ARP responses from CE are dropped by ASR9K which is acting as the SPE.

Conditions:
ASR9K is running one of the following IOS-XR releases:
4.3.0
4.3.1
4.3.2
4.3.4
5.1.0
5.1.1
5.1.2
5.1.3
5.2.0
5.2.2
5.2.4

This issue may not be seen all the time and is applicable in theory to the above releases.

Workaround:
Flap the PWHE interface associated with problem scenario.
Or
Restart fib_mgr process on the LC where the ARP packets are dropped with reason RSV_DROP_MPLS_NRLDI_NO_MATCH.
(this drop reason will be known to be ARP related only after some debugging is done).

Further Problem Description:

Last Modified:
07-JAN-2016
Known Affected Releases: *
4.3.0.FWDG, 4.3.1.FWDG, 4.3.2.FWDG, 4.3.4.FWDG, 5.0.0.FWDG, 5.1.1.FWDG, 5.1.2.FWDG, 5.1.3.FWDG, 5.2.2.FWDG, 5.2.4.FWDG
Known Fixed Releases:
5.3.0.18i.BASE, 5.3.0.18i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux26791
Title:
SPP buffer leak on reciveing of too large packets
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
1) Punt path traffic impacted i.e. punt l3 services including l3 protocols + TCP services impact including telnet/SSH
2) Log :-

RP/0/RSP0/CPU0:Nov 21 18:54:02.479 IST: netio[342]: %PKT_INFRA-spp-4-PKT_ALLOC_FAIL : Failed to allocate 1 packets for sending

Conditions:
Invalid (too large) packets getting injected from ASR-9001 RP.

Internet Protocol Version 4, Src: 172.17.3.254 (172.17.3.254), Dst: 192.168.192.73 (192.168.192.73)
Total Length: 14986 (1508 bytes including L2 encap)
User Datagram Protocol, Src Port: 55039 (55039), Dst Port: 9 (9)

Issue is specific to ASR-9001

Workaround:
1) Blocking source of packet though ACL which is sending such invalid packets.
2) If signature is same and every time same dst port is used then Blocking dst port using ACL
3) set fragment 0 on LPTS. The impact would be global and this will no allow ip fragment marked packet on punt path (static punt path is also included)
4) Immediate recovery can be achieved through "process restart spp"

Further Problem Description:
Below Commands can help in further debugging:-
------------------------------------------------------------------
show netio drops location
run fwd_netio_debug <== Execute from affected RP IOS prompt
show spp node-counters location
show spp buffer location
show spp platform logged-contexts location

Last Modified:
11-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
5.3.3.22i.BASE, 6.0.0.26i.BASE
Alert Type:
Updated *
Bug Id:
CSCux44521
Title:
533.19i: Snoop with local DHCP server not working
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Session not coming up with local DHCP ipv4 server and snoop enabled

Conditions:
Snoop and Server config

Workaround:
NA.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases: *
6.0.1.13i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuw47244
Title:
Slingshot EDVT: Erroneous BIP errors on PHY PCS Receive-Side from optics
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
'show controller hundredGigE 0/0/0/0 phy' reports BIP Errors

Conditions:
Board in IOS-XR RUN state. Aproximately 85% of interface power-ons/config

If once interface have few BIP Error, then as PHY is not clearing the error register conters and XR logic expects only delta from the PHY during read is performed. BIP Error in XR display will keep on incrementing (although these are bogus, there is no real problem), no functionality impact is expected with this.

Workaround:
None

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
5.3.3.24i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux32151
Title:
bvi_ma %L2-VIF_MA_MSG-4-REPL_FAIL : interfaces failed to replicate.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
bvi ma L2-VIF_MA_MSG-4-REPL_FAIL ios messages is being printed on console which may create unnecessary confusion to customer.

Conditions:
bvi_ma failed to create/replicate on some of the linecards.

Workaround:
No workaround is required. bvi_ma will retry if it failed to create/replicate bvi interfaces until it succeeds.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.1.13i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux45308
Title:
cgn_ma process crash continuously , after reloading the router
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Process cgn_ma on RSP crashes continuously after a router reload with 6.0.0-25i image. None of the CGN configurations would be successfully saved as the cgn_ma crashes continuously.

Conditions:
VSM with NAT44 Service configured and one or more pairs of ServiceApp SVI interfaces. Router reload may trigger the cgn_ma crash.

Workaround:
Shutdown the process
Remove the CGN and ServiceApp SVI configurations
Start the process
Configure only CGN service and commit
Add relevant inside-vrfs to the saved CGN instance and commit.
Later configure all related ServiceApp SVIs and commit.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux46731
Title:
Second level recursion broken upon IGP level ECMP change.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
RP/0/RSP0/CPU0:ASR9904-D#show cef 8.8.8.8 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:41:27.164 UTC
leaf_ptr: 0x3466(LE) bgp_next_hop: 0x7070707 <<< leaf doesn't match with index
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3408 (BE)] <<<

Conditions:
Upon changing number of nexthops/ECMP count, the second level recursion doesn't back walk completely which causes leaf to point to old NRLDI pointer.

This issue will happen only when you have global BGP, no LDP and all the IGP paths are only tunnels.

Workaround:
Clear route ipv4

or

clear cef ipv4 linecard location <>

Further Problem Description:
RP/0/RSP0/CPU0:ASR9904-D#show cef 6.6.6.6 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:39:37.077 UTC
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3466 (BE)]
fastNR-LDI H/W Result for path 1 [Common to all NPs: index: 0x3467 (BE)]
RP/0/RSP0/CPU0:ASR9904-D#
RP/0/RSP0/CPU0:ASR9904-D#show cef 7.7.7.7 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:39:39.192 UTC
leaf_ptr: 0x3466(LE) bgp_next_hop: 0x6060606
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3466 (BE)]
fastNR-LDI H/W Result for path 1 [Common to all NPs: index: 0x3467 (BE)]
RP/0/RSP0/CPU0:ASR9904-D#
RP/0/RSP0/CPU0:ASR9904-D#show cef 8.8.8.8 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:39:52.494 UTC
leaf_ptr: 0x3466(LE) bgp_next_hop: 0x7070707
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3466 (BE)] <<<<<<< Matches
fastNR-LDI H/W Result for path 1 [Common to all NPs: index: 0x3467 (BE)]




Upon changing number of nexthops/ECMP count, the second level recursion doesn't back walk completely which causes leaf to point to old NRLDI pointer

RP/0/RSP0/CPU0:ASR9904-D(config)#router static
RP/0/RSP0/CPU0:ASR9904-D(config-static)# address-family ipv4 unicast
RP/0/RSP0/CPU0:ASR9904-D(config-static-afi)# 0.0.0.0/0 172.18.120.129
RP/0/RSP0/CPU0:ASR9904-D(config-static-afi)#no 6.6.6.6/32 tunnel-te8110 permanent <<< removed
RP/0/RSP0/CPU0:ASR9904-D(config-static-afi)#commit
RP/0/RSP0/CPU0:ASR9904-D#


RP/0/RSP0/CPU0:ASR9904-D#show cef 6.6.6.6 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:41:16.111 UTC
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3408 (BE)]
RP/0/RSP0/CPU0:ASR9904-D#show cef 7.7.7.7 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:41:20.575 UTC
leaf_ptr: 0x3408(LE) bgp_next_hop: 0x6060606
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3408 (BE)]
RP/0/RSP0/CPU0:ASR9904-D#show cef 8.8.8.8 hardware ingress detail location 0/0/CPU0 | include "leaf_ptr|fastNR-LDI"
Tue Dec 8 13:41:27.164 UTC
leaf_ptr: 0x3466(LE) bgp_next_hop: 0x7070707 <<<< leaf doesn't match with index
fastNR-LDI H/W Result for path 0 [Common to all NPs: index: 0x3408 (BE)] <<<<

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.0.BASE
Known Fixed Releases: *
5.3.3.24i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux48433
Title:
Stats are leaked due to mishandled create events for PW in created state
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Stats are leaked due to mishandled create events for PW in created state. When Stats are exhausted, new PW will not be able to come up properly and can not forward traffic. The following output can be used as a signature of Stats exhaustion:

RP/0/RSP0/CPU0:R4#sh l2vpn trace wrapping reverse location 0/0/cpu0
Wed Dec 9 12:01:10.739 EST
214618 wrapping entries (244224 possible, 215296 allocated, 0 filtered, 28165270 total)
Dec 9 12:01:01.440 l2vpn/err 0/0/CPU0 t1 FWD_ERR|ERR:1042: CREATE: XC(0xc000fa00) PW(200.0.3.1:65530:40000) 1 1 failed: 'vkg-fwd-l2vpn-trident' detected the 'warning' condition 'Error in allocating PW stat pointer'

Conditions:
PW flap. This leak issue is seen only for incoming stats types from fib/l2fib.

Workaround:
None

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
5.3.3.25i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux43464
Title:
Sureshot EDVT: FIA drops at >60% Linerate on 1x100GE MPA
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Large number of packet loss at FIA when sending traffic 60GE of traffic on 1x100GE MPA + MOD200 Sureshot

Conditions:
SLOT4_RSP0 | 2015/12/01 19:21:09 | RP/0/RSP0/CPU0:ios#admin show platform
SLOT4_RSP0 | 2015/12/01 19:21:09 | Tue Dec 1 19:21:09.378 UTC
SLOT4_RSP0 | 2015/12/01 19:21:09 | Node Type State Config State
SLOT4_RSP0 | 2015/12/01 19:21:09 | -----------------------------------------------------------------------------
SLOT4_RSP0 | 2015/12/01 19:21:09 | 0/0/CPU0 A9K-MOD200-SE IOS XR RUN PWR,NSHUT,NMON
SLOT4_RSP0 | 2015/12/01 19:21:09 | 0/0/0 A9K-MPA-1X100GE OK PWR,NSHUT,MON
SLOT4_RSP0 | 2015/12/01 19:21:09 | 0/0/1 A9K-MPA-1X100GE OK PWR,NSHUT,MON

Workaround:

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux46652
Title:
NSR ISIS fails - neighborship restarted on switchover
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ISIS sessions are restarted on RP switchover

Conditions:
NSR isis activated
On switchover

Workaround:
Use "NSF Cisco" which seems to be working fine

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.3.ROUT
Known Fixed Releases: *
5.2.5.39i.ROUT, 5.3.3.24i.ROUT, 6.0.1.13i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux13344
Title:
VPLS GREoMPLS: Traffic loss seen on having ECMP for the IP tunnel
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic loss is seen on having more than one path for GREoMPLS.

Conditions:
On having ECMP path for the PW going over GRE o MPLS, the traffic loss is seen.

Workaround:
For this to work as a workaround have only one path either physical or bundle for the PW going over GREoMPLS.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCuh43478
Title:
"unclassified-source per-vlan" issue for IPOE by packets triger
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:when config "unclassified-source per-vlan" to 1 for IPsub, found session only establish one time, if session was be clear, will couldn't setup again.

Conditions:ASR9k + 4.3.1 + IPOE by packets trigger

Workaround:only remove "unclassified-source per-vlan".
session limited should limit client number under one VLAN, but that shouldn't limit one VLAN trigger times.

More Info:Vlan session counters not correctly incremented/decremented due to incorrect usage of flags. Flag removed.


Last Modified:
12-JAN-2016
Known Affected Releases:
4.3.1.BASE
Known Fixed Releases: *
4.3.2.23i.BASE, 5.1.0.14i.BASE, 5.3.0, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCuv88809
Title:
On RPFO - Continuous bundlemgr_distrib process Crash
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On RPFO - Continuous bundlemgr_distrib process Crash

Conditions:
RP Failover

Workaround:
Router Reload

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.FWDG, 5.3.3.8i.FWDG, 6.0.0.14i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv35166
Title:
ASR9K/BNG/5.3.1 iedge process block because of xml queries
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IPoE subscribers are not able to connect with BNG.

Conditions:
Initiate 25-30 XML sessions with BNG to get the subscriber information and state.

Workaround:
Disable the XML agent on ASR9K.

-- Example --

RP/0/RSP0/CPU0:acdc-asr9000-4(config)#no xml agent
RP/0/RSP0/CPU0:acdc-asr9000-4(config)#commit

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.1.3.BASE, 5.2.2.BASE, 5.3.1.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.19i.BASE, 5.3.3.5i.BASE, 6.0.0.11i.BASE
Alert Type:
Updated *
Bug Id:
CSCut91896
Title:
domain_services request for core dump
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
core dump of domain_services, aka DNS server

Conditions:
Requests for DNS not closing the application socket. FD counts increase until it reaches the hard limit.
1. domain lookup vrf source-interface is configured
2. interface1 is not in VRF1

ie the VRF of domain source interface command and the actual interface VRF mismatch.

Workaround:
Correct the configuration so that domain source interface VRF is consistent with the configuration on the interface.

Further Problem Description:
This is a case configuration error.

Last Modified:
14-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.5i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCux07488
Title:
A9K-MPA-4X10GE not boot after OIR or soft reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On the ASR9K with version 5.3.2 is observed that the A9K-MPA-4X10GE does not boot after performed an OIR/reload to the MPA.

Conditions:
Have Satellite configured on a interface which belongs to the MPA card,

!
interface TenGigE0/0/0/2
description ***** DESCO01-SADv-101 *****
mtu 9216
load-interval 30
nv
satellite-fabric-link network
redundancy
iccp-group 1
!
satellite 101
remote-ports GigabitEthernet 0/0/0-1,42-43
!
satellite 102
remote-ports GigabitEthernet 0/0/0-1,22,10
!
satellite 103
remote-ports GigabitEthernet 0/0/0-1
!
satellite 104
remote-ports GigabitEthernet 0/0/0-1,43
!

Workaround:
There are to posible Work arounds.

1.- Remove the Satellite configuration from the MPA and boot the MPA.

2.- Reboot the entire SIP (A9K-MOD80-SE) card.

Further Problem Description:

Last Modified:
15-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.3.26i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCuc53683
Title:
Intermittent prmserver, fialc crash on A9K-24X10GE-TR due to pcie access
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
multiple process crashes on prmserverty, fab_xbar, fialc which resulted in reloading the 24*10GE linecard

Conditions:
Normal operation or linecard bootup.

Workaround:
none

Further Problem Description:
This is a transient HW issue in PCIe switch which gets stuck in very rare scenario. This results in read & write access failure to the south bound devices attached to PCIe. So, prm_server_ty, fialc process crashes which evenly result in linecard reload.

This issue happened only at 10 different occurrences in the past 4 years after FCS.

Recommended action is to monitor the system during the first occurrence. We have never seen second occurrence of this issue on the same linecard. But if it happens, RMA the board.

Last Modified:
15-JAN-2016
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw80979
Title:
snmpd memory leak in <N/A>
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The snmpd process may start leaking memory

Conditions:
This problem can be seen during normal polling of the router when running 5.3.1

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.2.5.38i.BASE, 6.0.0.27i.BASE, 6.1.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu62902
Title:
DHCP relay fails after RSP switchover
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
DHCP relay and proxy with access interface as LC and server facing interface as bundle [RP based] drops server packets after redundancy switchover.

Conditions:
Access interface should be LC and server facing interface should be bundle

Workaround:
DHCP process restart will resolve the issue.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.14i.FWDG, 6.0.0.10i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuo04219
Title:
5.1.2.19I - sessions are not recovered after RPFO
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
iedged process may crash or sessions may be lost after rpfo or restart of policymgr_rp or iedged processes.

Conditions:
subscriber sessions with pqos attributes

Workaround:
none

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.2.BASE
Known Fixed Releases: *
5.1.2.22i.BASE
Alert Type:
Updated *
Bug Id:
CSCum35555
Title:
511-SIT: ppp_ma continuously crashing
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ppp_ma continuously restarts

Conditions:
After applying ICSSO Configs

Workaround:
NA

Expected Resolution: Please check with the support engineer for information on which release(s) this bug is expected to be fixed.


Reproducibility (%):

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE, 5.1.2.BASE
Known Fixed Releases: *
5.1.1, 5.1.1.20i.FWDG, 5.1.11, 5.1.11.16i.FWDG, 5.1.12, 5.1.2, 5.1.2.12i.FWDG, 5.1.3, 5.1.4, 5.2.0
Alert Type:
Updated *
Bug Id:
CSCuq15659
Title:
Resource leakage fib in constrained mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
FIB operates in resource constraint mode.after bringing up & bringing down IPoE V6 sessions multiple times.

Conditions:
Issue only happens with IPoE V6 subscriber sessions.

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.0.BASE
Known Fixed Releases: *
5.2.2.21i.BASE, 5.2.3.8i.BASE, 5.3.0, 5.3.0.4i.BASE, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCum45585
Title:
[511]-Ipsub_ma process restarted after BNG pie activation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After activate bng pie could see ipsub_ma process is restarted.

Conditions:
In 19I Image, could see ipsub_ma process is restarted after activated bng pie.

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.1.20i.BASE, 5.1.11.16i.BASE, 5.1.2.12i.BASE, 5.2.0.14i.BASE
Alert Type:
Updated *
Bug Id:
CSCum24221
Title:
511.17I: iedged process crashed after RPFO
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Memory leak and eventual Memory depletion for iedged process.
iedged process crash after RPFO or process restart of poilcymgr_rp .


Conditions:
This was observed with 128k scale IPoE subscribers
There are sessions with PQoS (parameterized QoS) attributes. Creation each such session can contribute to memory leak. On process restarts (of client processes like policymgr_rp) also, these sessions contribute to leaks.

Workaround:
None
Process restart of iedged (iedged restart will remove the leaks and sessions will be intact)

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.2, 5.1.2.16i.BASE, 5.1.3, 5.1.4, 5.2.0, 5.2.0.15i.BASE, 5.2.1, 5.2.2, 5.2.21, 5.3.0
Alert Type:
Updated *
Bug Id:
CSCuu24041
Title:
[531] iedged crashes with invalid pqos string
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
iedged crashes on RSP

Conditions:
While applying an invalid CoA with bad pqos string could see iedged is crashing

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.1, 5.3.1.BASE, 5.3.2, 5.3.2.9i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCup23781
Title:
522 RTDSUB: iedged Memory leak observed with subscriber bringup/down
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Memleak observed with iedged process

Conditions:
64k Scale bringup and bringdown.

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2.14i.BASE, 5.3.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCux80640
Title:
ISIS process crash when "show isis ipv6 route" command is entered
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Depending on the network topology, the ISIS process may crash and restart when the command:

show isis ipv6 route

is entered, or when an equivalent XML request is made.

Conditions:
IPv6 routes in the ISIS rib have lower-priority backups.

Workaround:
Do not use the "show isis ipv6 route" command.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
6.0.1.ROUT
Known Fixed Releases: *
5.3.3.27i.ROUT, 6.0.1.14i.ROUT
Alert Type:
Updated *
Bug Id:
CSCut67156
Title:
[524] Interim accounting update failed for few sessions
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Interim accounting update failed for few sessions

Conditions:
While sending dynamic template activate service CoA

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 5.2.4.15i.BASE, 5.2.5.8i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCul09400
Title:
[434] Invalid CoA requests are getting acknowledged
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Invalid CoA requests are getting acknowledged

Conditions:
CoA request with only 4 arguments are Acked

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
4.3.4.BASE
Known Fixed Releases: *
4.3.4, 4.3.4.10i.BASE, 5.1.1.16i.BASE, 5.1.2.7i.BASE, 5.2.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCup82270
Title:
[522] Duplicate entries created in radius server for PPPOE Sessions
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Duplicate entries created in radius server for PPPOE Sessions.

Conditions:
With dualstack PPPOE Sessions. This issue occurs specifically when 1st AF comes up, acct start is sent to radius and the second AF comes up before the accounting response for the first acct start message is received.

Workaround:
Configure dual-stack-delay for session accounting as below. This will make sure that acct start messages are sent when both the AFs are up and hence preventing duplicates.

Example:
"accounting aaa list default type session dual-stack-delay 5"

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2.18i.BASE, 5.2.3.3i.BASE, 5.2.3.6i.BASE, 5.3.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu84081
Title:
SSTE:VM is exhausted or totally fragmented after longevity IPv6 session
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VM is exhausted or totally fragmented

Conditions:
longevity scale IPv6 sessions cycle

Workaround:
restart process

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.19i.BASE, 5.3.2.19i.FWDG, 5.3.3.5i.BASE, 5.3.3.5i.FWDG, 6.0.0.11i.BASE, 6.0.0.11i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuw66111
Title:
eXR: standby RP stuck in Unknown Band after back-to-back RPFO
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Standby RP stuck in Unknown Band after back-to-back RPFO for multiple times.

Conditions:
Run script to trigger back-to-back RPFO for multiple times on a 9904 router with dual RSPs..

Workaround:
Unknown.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
5.2.5.41i.BASE
Alert Type:
Updated *
Bug Id:
CSCut59790
Title:
[5.3.1-23I] iedged crashed upon receiving access-reject
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Iedge process on LC

Conditions:
"debug subscriber manager all" enabled and when access reject is received for service logon request.

Workaround:
Disable "debug subscriber manager all"

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.2.5.19i.BASE, 5.2.5.5i.BASE, 5.3.2, 5.3.2.9i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCuf77118
Title:
Serial DS3 - stays up when looped in HDLC - down-when-looped configured
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The command: "down-when-looped" unavailable in the Cisco IOS XR router.
The command is used to bring down the serial interface on the remote router especially in the following scenario:
The remote router is configured to loopback mode; the XR router should identify the remote loopback and bring the serial interface down.
Conditions:Currently the remote interface is identified and displayed as part of the "show interface serial" command. The issue occurs when the interface has to be brought down using a CLI command.
Workaround:No known workaround exists. The code to bring down the remote interface is currently under implementation.

More Info:NA



Last Modified:
20-JAN-2016
Known Affected Releases:
4.3.0.BASE
Known Fixed Releases: *
4.3.2.22i.BASE, 4.3.2.22i.FWDG, 5.0.1.8i.FWDG, 5.1.0.13i.BASE, 5.1.0.13i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux76208
Title:
[533] flow monitor fmm2 cache not showing BGPNextHopV6 entries
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
show flow monitor fmm2 cache is not showing entries under the v6 next hop field BGPNextHopV6 as expected,

Conditions:
after configuring flow monitor,and while sending v4 and v6 traffic streams.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases: *
5.3.3.26i.BASE, 6.0.1.14i.BASE
Alert Type:
New
Bug Id:
CSCuw76004
Title:
coa service de-activate fails to remove the service[533 12i]
Status:
Fixed
Severity:
2 Severe
Description:



Symptom:coa service deactivation fails to remove the service even though the radclient gets ACK
Conditions:create subscriber session with service activate(cisco-avpair += ?subscriber:sa=256_S) and perform COA to deactivate the service , it is failing. service is still exists on the subscriber.
Workaround:NA



Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
5.3.3.16i.BASE, 6.0.0.22i.BASE
Alert Type:
Updated *
Bug Id:
CSCuc32974
Title:
during fast_reset, eCPU stop must be performed before configuration
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
fast_reset of network processor does not always clear issues relating to traffic forwarding.

Conditions:
fast_reset is part of a health monitoring process where when problem is detected in the network processor that can cause traffic related issue, a fast reset of the network processor is performed.

Work around: There is no workaround except to reload of line card.

Workaround:

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
4.2.1.BASE
Known Fixed Releases: *
4.3.0, 4.3.0.28i.BASE, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0, 5.1.1
Alert Type:
Updated *
Bug Id:
CSCud65815
Title:
qos-ea is blocked by prm_server_ty after QoS in-place modification
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
InPlace modification fails for Typhoon -TR card when modifying a policy with more than 4 queuing classes while queue is not empty.

Conditions:
This problem occurs because the Typhoon -TR card has a queue limit of 8 per port.
When the policy is being modified while traffic running, we need to wait for the queues to be completely drained before allocating queues from the modified policy. Currently we attempt to allocate the queues for the changed policy while the old queues are still being drained. This can cause queue limit to be reached (for typhoon -TR LCs) which would fail the policy modification.

Workaround:
Workaround is to either remove policy from port first, modify policy, then apply modified policy to interface.
Alternatively, stop traffic before modifying the policy.

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
4.2.3.BASE, 4.3.0.BASE, 4.3.1.BASE, 5.1.0.BASE
Known Fixed Releases: *
4.3.0.39i.BASE, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 5.1.0, 5.1.1, 5.1.11, 5.1.12
Alert Type:
Updated *
Bug Id:
CSCux04919
Title:
BGP crash at bgp_table_post_bestpath() while flap/bringing up neighbor
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
BGP crash after neighbor flap and receiving multiple paths for the same prefix at the same time.

Conditions:
- add-path or best-external or both,
- bring up or down a neighbor or modifying neighbor configurations,
- routes to be received by the router for the same prefix from multiple neighbors at the same time, CE and PE.
- next-hop changes, such as metric or reachability will also contribute.
- The problem occurs with VPN routes, although other route types cannot be ruled out.

Workaround:
none

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
4.1.2.ROUT, 5.3.1.ROUT, 5.3.2.ROUT
Known Fixed Releases: *
5.2.5.41i.ROUT, 6.0.1.14i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux46286
Title:
ICCP redundancy configuration affects existing MPLS LDP based services
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When a Redundancy Group is configured on a router, MPLS LDP based services are affected and a significant traffic outage is seen on IPv4 over OSPFv2, IPv4 over BGP and IPv4 over IS-IS.

In presence of the Redundancy Group, RSP failovers will also trigger teh same traffic outage.

Conditions:
Redundancy Group must be present in the configuration of the router.

Workaround:
Do not configure a Redundancy Group and avoid configuring 9000v Satellites in a RING topology. Instead, use Hub and Spoke for the 9000v satellites.

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
5.3.3.27i.BASE, 6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux27300
Title:
IPv6 valid lifetime not expiring when set to 0
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
IPv6 valid lifetime not expiring when set to 0 for prefix 2001:xxxx:e8:xxx1::/64

Customer has been trying to move gracefully move to a new IPV6 subnet by setting the IPv6 lifetime to 0 on the existing subnet. However its not honoring the configured lifetime of 0 on 2001:xxxx:e8:xxx1::/64

Conditions:
IPv6 valid lifetime not expiring when set to 0 for prefix 2001:xxxx:xx:x1011::/64

Workaround:
none

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.1.15i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux26950
Title:
RADIUS source interface config stops working when i/f removed from ISIS
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Configured RADIUS source interface not used as source IP for outgoing RADIUS packets. Outbound interface IP is used as source instead.

- AAA transactions configured to use radius as remote authentication/authorisation/accounting method.

- Radius is configured to use a fixed source interface
(radius source-interface <>, configuration present)

- Radius server will fail transactions as its not able to identify the source interface/client ip address.
(as this is selected based on best local ip look up)



Conditions:
The configured source interface has been removed from ISIS configuration.

- AAA transactions configured to use radius as remote authentication/authorisation/accounting method.

- Radius is configured to use a fixed source interface
(radius source-interface <>, configuration present)

- If the same interface is configured as source interface for protocol ISIS.
- And there is explicit "no source interface" executed for ISIS configuration.



Workaround:
Reapply RADIUS source interface configuration.

Further Problem Description:
Issue may persists when interface is added back into the ISIS configuration.

Issue may also be seen on router reload.

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCul53390
Title:
'sh snmp traps deatail' cmd not working from standby RSP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
show snmp traps command does not work from 'standby' RSP

Conditions:
No specific trigger. This happens at steady state

Workaround:
Use show snmp traps on 'active' RP which is where the output of the command makes sense

Further Problem Description:
This command is NOT required on standby RP. The output of the same command in active RP works as expected

Last Modified:
23-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.2.2.5i.BASE, 6.0.1.12i.BASE, 6.1.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCuc64988
Title:
ppp_ma crash due to large aaa attr buffer.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
PPP MA process may crash with corrupted stack

Conditions:
One of the following three conditions can cause the crash

1. Large number of tagged attributes for a session
2. Circuit ID attribute is greater than 63 bytes
3. Tunnel-Password IETF attribute is used in the system

Workaround:
workarounds for the above conditions in order

1. Use less number of tagged attributes. Reduce the possible number of LNS destinations to less than 10.
2. Check if it is possible to change the circuit-id length to less than 63.
3. Use l2tp-tunnel-password Cisco VSA instead of IETF tunnel-password attribute

More Info:

Last Modified:
22-JAN-2016
Known Affected Releases:
4.3.1.BASE
Known Fixed Releases: *
4.3.1.10i.BASE, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 5.0.1, 5.0.1.8i.FWDG, 5.1.0, 5.1.1, 5.1.11
Alert Type:
Updated *
Bug Id:
CSCux43034
Title:
PTP with ARB mode - Slave port stays unqualified after RSP switchover
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After a reload or RSP switchover, it can be observed that PTP slave port stays unqualified.
This behavior can be seen independently of the timescale that is being used (PTP or ARB)

Conditions:
This behavior can be seen after a router reload or RSP switchover

Workaround:
There is no workaround

Further Problem Description:

Last Modified:
24-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.3.3.23i.BASE, 6.0.1.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCux34074
Title:
533.19I: dhcpv6 database feature does not work as expected
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With DHCPv6 SRPB [database command], when the full-write-interval is a multiple of incremental-write-interval, the full write file is not carrying the all the binding information.

dhcp ipv6
database full-write-interval 10 incremental-write-interval 5

Conditions:
dhcpv6 database command is configured
full-write-interval is a multiple of incremental-write-interval

Workaround:
full-write-interval should not be multiple of incremental-write-interval

Further Problem Description:

Last Modified:
24-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases: *
5.3.3.23i.BASE, 5.3.3.23i.FWDG, 6.0.1.12i.BASE, 6.0.1.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuw95895
Title:
Ingress FIA drops packets with priority 3 when ingress policy sets EXP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An ASR 9000 Tomahawk linecard experiences poor fabric forwarding performance and FIA tail drops for ingress MPLS packets.
FIA classifies the packets as priority 3, when ingress policy sets EXP bit.

Conditions:
This may occur when an MQC service-policy with set mpls experimental topmost action is applied in the ingress direction on the Tomahawk LC.

Issue is only applicable to Tomahawk LC (ingress)

Workaround:
It may be possible to achieve the desired mpls marking behavior without ingress exp topmost marking, by using ingress exp imposition marking, ingress qos-group marking, and/or egress exp topmost marking. These actions will not trigger the bug.

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.3.19i.BASE, 6.0.0.24i.BASE, 6.0.1.12i.BASE, 6.1.0.7i.BASE
Alert Type:
Updated *
Bug Id:
CSCux59453
Title:
Image downgrade aborted because a removed LC encountered errors
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
Image downgrade aborted because a removed LC encountered errors

Conditions:
swap LC on different slots

Workaround:
process restart inst_mgr

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
6.1.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw75546
Title:
DR/BDR changes on switchover with NSR enabled in LAN segment
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Even though OSPF NSR is enabled, neighbor DR/BDR status change after the NSR enabled node undergoes RP switchover/failover in a LAN scenario where more than 2 routers are there on a LAN segment and the node being switched over is a DR.

Neighbor DR/BDR changes because the NSR node send the Hello packet which shows the that both of DR and BDR are the old BDR neighbor.

Conditions:
If the NSR enabled node was DR and it has BDR as the neighbor, there are multiple (more than 2) routers on the LAN and the NSR enabled DR node undergoes RP switchover/failover.

Workaround:
There is no 100% reliable way to detect whether this error condition exists on the standby. One way is to check for any discrepancy for DR/BDR between the "show ospf neighbor" and "show ospf standby neighbor" command outputs - but there may be a cosmetic discrepancy even after this fix due to CSCux85138

Following workarounds are possible:
1) Before doing switchover do process restart for the standby OSPF process and wait for it to come up again and become NSR ready before doing switchover.
2) Disable and then enable of NSR at OSPF config and then wait for NSR ready before doing switchover.
3) The DR change will not happen if the router undergoing switchover is not the DR and NSR is not enabled on it

Further Problem Description:
The issue is because OSPF on standby does not setup the DR and BDR state correctly when it is the DR in certain states. So if there is any interface event (or if another NBR goes down after initially being up), then the state stored on the standby gets messed up.

If there is a switchover after this state, then the DR would flap.

This is a day 1 issue since NSR was introduced on XR for OSPFv2 onwards and is applicable to all XR platforms. However, the likelyhood of hiting this issue is only when there is a LAN (i.e. more than 2 routers on the LAN).

Last Modified:
27-JAN-2016
Known Affected Releases:
4.3.4.BASE
Known Fixed Releases:
5.2.5.31i.ROUT, 5.3.3.16i.ROUT, 6.0.0.20i.ROUT
Alert Type:
Updated *
Bug Id:
CSCut19959
Title:
Pause-frame injection stuck in IDMA cause Tomahawk NP reset for 10G int
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms:
A vulnerability in flow control processing of Cisco IOS XR for Cisco ASR 9000 Series Routers could allow an unauthenticated, adjacent attacker to cause a NP chip
reset and potentially a reload of the affected line card.

The vulnerability is due to improper processing of crafted IEEE 802.3x flow control pause frames. An attacker could exploit this vulnerability by sending a number of
crafted IEEE 802.3x flow control pause frames to an affected device. An exploit could allow the attacker to cause a NP chip reset and potentially a reload of the
affected line card.


Conditions:
- Cisco ASR9000 with Tomahawk based line card running post 5.3.0 software.
- Cisco IOS XR device does NOT have to be configured to process IEEE 802.3x flow control frames from an adjacent L2 device. Apart from an ethernet interface in
enabled state reachable by a L2 adjacent neighbor, no configuration is required for this vulnerability to be exploited.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4205 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
27-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.2.0, 5.2.1, 5.2.2, 5.2.21, 5.3.1, 5.3.1.28i.BASE, 5.3.2.6i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCuw80087
Title:
VPLS routes withdrawn after adding new bridge-domain with VFI
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VPLS routes withdrawn are withdrawn and PW are down.

Conditions:
when "soft-reconfiguration inbound always" is configured under "address-family l2vpn vpls" and a new "Bridge-Domain" is configured, we replay the rcvd-routes and some how end up removing the existing paths too.

Workaround:
remove the soft-reconfiguration inbound always under address-family l2vpn vpls.

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.2.4.ROUT
Known Fixed Releases: *
6.0.1.16i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux85576
Title:
RSP reload interrupted upon detection of unresponsive HD
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ahci_mon detected unresponsive SSD.
To clear unresponsive state of disk, process initiated RSP reload call but it could not get mature.

Conditions:
Disk unresponsive or hang detected by ahci_mon process.

ahci.log content in RSP hang case:

AHCI: failure /dev/hd0: npass=21, sector=0x13c50400, fail count=16/16
AHCI: My Nodeid=0x11, Partner Nodeid=0x21, Primary=1 devb-ahci_pid=45079
AHCI: redundancy_state=REDUNDANCY_ACTIVE, standby_state=STANDBY_STATE_DOWN, boot_protocol=10
AHCI(1): device not responding, reloading 0x11

ahci.log content in RSP error case:
AHCI: failure /dev/hd0: npass=29, sector=0x30e6a200, fail count=16/16
AHCI: My Nodeid=0x11, Partner Nodeid=0x21, Primary=1 devb-ahci_pid=45079
AHCI: redundancy_state=REDUNDANCY_ACTIVE, standby_state=STANDBY_STATE_DOWN, boot_protocol=10
AHCI(2): device not responding, reloading 0x11

Workaround:
NA

Further Problem Description:
AHCI_MON detected RSP not responding and triggers reload but reload call could not mature. This resulted in other processes i.e. watchdog detected wedge and crashed with core resulting RSP reload.

Jan 14 2016 02:26:08.182469 10.207.93.1 local7.critical 13278: RP/0/RSP1/CPU0:Jan 14 02:26:08.168 BKK: pfm_node_rp[356]: %PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING : Set|ahci-mon[36889]|SATA Disk(0x1000000)|HD0 device not responding
Jan 14 2016 02:28:38.452033 10.207.93.1 local7.error 13279: RP/0/RSP1/CPU0:Jan 14 02:28:38.439 BKK: ahci-mon[65561]: AHCI: failure /dev/hd0: npass=492687, sector=0x2bd71200, fail count=16/16
Jan 14 2016 02:28:38.466985 10.207.93.1 local7.error 13280: RP/0/RSP1/CPU0:Jan 14 02:28:38.445 BKK: ahci-mon[65561]: AHCI: My Nodeid=0x51, Partner Nodeid=0x41, Primary=1 devb-ahci_pid=36887
Jan 14 2016 02:28:38.481979 10.207.93.1 local7.error 13281: RP/0/RSP1/CPU0:Jan 14 02:28:38.447 BKK: ahci-mon[65561]: AHCI: redundancy_state=REDUNDANCY_ACTIVE, standby_state=STANDBY_STATE_READY, boot_protocol=10
Jan 14 2016 02:28:38.496963 10.207.93.1 local7.emergency 13282: RP/0/RSP1/CPU0:Jan 14 02:28:38.449 BKK: ahci-mon[65561]: AHCI(1): device not responding, reloading 0x51
Seen this behavior with UNIGEN disk

Last Modified:
28-JAN-2016
Known Affected Releases:
5.3.3.24i.BASE
Known Fixed Releases: *
6.0.1.16i.BASE
Alert Type:
Updated *
Bug Id:
CSCuw48958
Title:
NP / LC Resets after CFM enabled on the SAT ICL Links
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When CFM enabled on Satellite ICL links and with CFM up MEPS on Satellite access ports, after LC/Satellite reload, CFM DMR packets going through VPLS PW causes NP resets.

Conditions:
All following conditions to be met:
- CFM enabled on Satellite ICL links.
- CFM Up MEPS on Satellite access ports.
- CFM DMR packets should go through VPLS PW path.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.1.16i.BASE
Alert Type:
New
Bug Id:
CSCux92606
Title:
BGP RR does not advertise rt-routes to non RRC without cluster-id config
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When the best path is from a router reflector client neighbor, bgp may block the update. if debug bgp update is turned you, you will see following in the debug: "Deny 1 UPDATE to filter-group 0.3 (regular, pelem regular) for ... ... reason cluster id not set for RR client: 1.1.1.1"

Conditions:
This will only happen on router reflector. cluster id is not configured under router bgp.

Workaround:
restart of process bgp

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
6.0.1.16i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux19443
Title:
BNG not offering new address per DHCP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Two unexpected behaviors:

1. DHCP server will continue to offer a particular address for approximately 4 minutes, on 2s intervals, then it will begin to offer a different one. At the point that it begins to offer a different address is when the BNG proxy bind state goes to from OFFER_SENT to SELECTING. However the BNG continues to record the initially offered address in the bindings table, not the new one(s) that DHCP server has switched to.

Expected behavior is to forward the new-IP OFFER if the 'server-ip' is same.


2. The beginning of the BNG selecting state coincides with the moment that the DHCP server starts offering a different address. Once the BNG goes to selecting state, it stops proxying the subsequent addresses that the DHCP server tries to offer. If the BNG is forced to clear the selecting state proxy record, then it resumes offering whatever the DHCP server is offering, until the DHCP server changes again, at which time the BNG returns to selecting state. In some cases the client accepts during the BNG offer state and the session is built. We don't know why some leases are accepted by the clients/modems and some are not. However it is evident that as long as the BNG remains stuck in selecting state, the session does not get built.

Expected: Newly offered IP from 'same' server has to be forwarded. 'Selecting' state means, either OFFER didn't reach or dropped for some reason.

Conditions:

Workaround:
Clear the older binding. New DISCOVER from client should bring-up the client properly.

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.1.12i.FWDG, 6.1.0.11i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuw35524
Title:
ASR 9001 ipv4_rib crash @ rib_route_copy_to_client_route
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ipv4_rib process crash on ASR9001

Conditions:
The problem was reported on ASR9001 running 5.2.2

Workaround:
NA

Further Problem Description:
RC: This happens when there is lookup on a route, where the resolving route has backup paths (P/Q nodes).
There is an improper calculation of expected buffer size (buffer for the route to be packed on a lookup). This results in the assert and crash.

Platforms: Affects all platforms.

Last Modified:
28-JAN-2016
Known Affected Releases:
5.2.2.ROUT, 5.2.4.ROUT
Known Fixed Releases: *
4.1.0, 4.1.1, 4.1.2, 5.3.3.21i.BASE, 6.0.1.12i.BASE, 6.1.0.1i.BASE
Alert Type:
New
Bug Id:
CSCuy04355
Title:
[601]-Sconbkup traceback and Router reload fails after triggered reload
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Sconbkup traceback and Router reload fails after triggered reload

Conditions:
while running satellite regression could see Sconbkup error while triggering router reload and router reload never gets triggered. Issue is inconsistent and it occurs very randomly.
Once we hit the problem, our testing is blocked, only way to recover the chassis is to perform "reload location all force".

Workaround:
NA

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux08668
Title:
Framed IP not sent in accounting stop record
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
With BNG as dhcpv4 proxy , observing framed ip is missing in the accounting stop message.
Also circuit-id is not present in accounting stop message.

Conditions:
This is seen in 5.3.2

Workaround:
There is no workaround.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.1.1.BASE
Known Fixed Releases: *
5.3.3.26i.BASE, 6.0.1.12i.BASE, 6.1.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCux79329
Title:
OSPF process running for instance removed from config
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
The show commands ('show ospf...') are displaying info for ospf instances that were removed from configuration earlier.
Also, removed ospf instances are still running on both RSPs (in "show placement program ospf"output).

Conditions:
ASR9k running 5.3.2, with very frequent OSPF configuraton changes.

Workaround:
Not known at this time

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui95985
Title:
CISCO-SUBSCRIBER-SESSION-MIB doesnt work after RSP FO in ASR9010 Cluster
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In the event of ASR9010 Cluster Switchover from Active to Backup or vice-versa, the CISCO-SUBSCRIBER-SESSION-MIB MIBS fail to function or respond

Conditions:
ASR9010 Cluster Switchover from Active to Backup or vice-versa

Workaround:
process restart session_mon

Further Problem Description:
CISCO-SUBSCRIBER-SESSION-MIB MIBS fail to function or respond when ASR9010 Cluster Switchover happens. Network Management Station will not be able to monitor PPPoE Subscriber sessions.

Last Modified:
29-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
4.3.4.5i.BASE, 4.3.4.5i.FWDG, 5.1.1.11i.BASE, 5.1.1.11i.FWDG, 5.1.11.4i.BASE, 5.1.11.4i.FWDG, 5.1.2.1i.BASE, 5.1.2.1i.FWDG, 5.2.0.7i.BASE, 5.2.0.7i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv34748
Title:
BGP process heap corruption crash on vrf removal
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
bgp process crash could happen on vrf removal under router BGP

Conditions:
VRF is configured under BGP

Workaround:
Do not have more than 7 BGP sessions with vpn address families configured with default-originate while creating VRFs.
This is not really possible in all cases in production networks and depends on network design, topo and scale

Further Problem Description:

Last Modified:
31-JAN-2016
Known Affected Releases:
4.3.4.ROUT
Known Fixed Releases: *
5.3.3.22i.ROUT, 6.0.1.12i.ROUT, 6.1.0.7i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux59517
Title:
te_control traceback @te_lmrib_process_results
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
te_control trackback pop few min

Conditions:
while core lc reload or core interface flap

Workaround:
none needed

Further Problem Description:

Last Modified:
01-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj22280
Title:
eem maxrun timer not handled properly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In event manager script, maxrun timer is expiring sooner than expected when set to maximum value.

Conditions:

Workaround:
Use a watchdog of 180 seconds as trigger so if it expires the script automatically restarts immediately after expiry.

Further Problem Description:

Last Modified:
04-JAN-2016
Known Affected Releases:
4.2.3.MGBL
Known Fixed Releases: *
5.1.1, 5.1.1.13i.BASE, 5.1.11, 5.1.11.8i.BASE, 5.1.12, 5.1.2, 5.1.2.5i.BASE, 5.1.3, 5.1.4, 5.2.0
Alert Type:
Updated *
Bug Id:
CSCui40703
Title:
PW notification msg sending different encap types (vlan,Ethernet)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Due to the different encapsulation types included in notification messages, 3rd party remote end is unable to process the notification due to encapsulation mismatch. The PW does not come up.

Conditions:
The PW transport-mode must be configured as vlan.
The Notification and MAC withdrawal messages are impacted.
These messages are issued when the interface is shutdown and no shutdown for example.
IOS-XR does not enforce the VC type received in the Notification and MAC withdrawal messages.
3rd party Huawei brings down the PW if VC type differs in the Notification message.

Workaround:
No workaround with Huawei.
The issue is not present for IOS-XR to IOS-XR.

Further Problem Description:

Last Modified:
04-JAN-2016
Known Affected Releases:
4.2.3.MPLS
Known Fixed Releases: *
4.3.4, 4.3.4.5i.FWDG, 5.0.1.99i.BASE, 5.1.1, 5.1.1.12i.FWDG, 5.1.11, 5.1.11.4i.FWDG, 5.1.12, 5.1.2, 5.1.2.2i.FWDG
Alert Type:
New
Bug Id:
CSCux22560
Title:
Standby RP goes NOT ready state when new SFC is installed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Standby RP goes "NOT ready" briefly during the FC OIR

Conditions:
FC OIR

Workaround:
None

Further Problem Description:

Last Modified:
05-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
5.3.3.23i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq89694
Title:
Link is not comingup with hardcoded speed/duplex on pre-provisioned port
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Copper sfp link is not coming up with hard coded speed & duplex configured on port

Conditions:
1. Configure speed 100 & duplex on pre-provisioned port
2. Insert copper sfp
3. Link will not come up

Workaround:
Default the interface config and re-apply the config.

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
5.1(3)
Known Fixed Releases: *
15.1(3)SVF04f, 15.1(3)SVG01c, 15.1(3)SVG03, 15.1(3)SVG03a, 15.1(3)SVH02
Alert Type:
Updated *
Bug Id:
CSCui95665
Title:
Remote link unexpectedly comes up for asr9000v admin-down link
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A link comes up unexpectedly on a remote switch/router even though a local link is in admn-down state on asr9000v.

Conditions:
When an SFP is removed and then inserted again.

Workaround:
No shutting down and shutting down a satellite interface or reloading an asr9000v.

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
4.3(1)
Known Fixed Releases: *
15.1(3)SVF04b, 15.1(3)SVF04c, 15.1(3)SVF04f, 15.1(3)SVG02, 15.1(3)SVH
Alert Type:
Updated *
Bug Id:
CSCuw33091
Title:
ASR9K netconf_agent_tty process crash
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
ASR9K experienced a netconf_agent_tty process crash.

From 'show log' see the following:
RP/0/RP0/CPU0:Aug 25 04:14:04 PST: dumper[60]: %OS-DUMPER-4-SIGSEGV_INFO : Accessed BadAddr 0xffffffff at PC 0x82a9083. Signal code 2 - SEGV_ACCERR. No permission."",,null,457"

Conditions:
ASR9922
RP redundancy; ASR-9922-RP-TR
Software: 5.3.1

Netconf is configured on router and used to poll data.

Workaround:
None. Process restarts and resumes working on its own.

Further Problem Description:
Only seen one time on router running 5.3.1.


If this process crash is seen, along with other outputs, can collect the following commands:
show mda trace
show xml trace

show management netconf mda trace
show management netconf client trace
show management netconf tty trace
show management netconf trace

show management xml mda trace
show management xml trace
show management xml client trace
show management xml tty trace

Last Modified:
07-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux20093
Title:
Drop @PARSE_FAST_DISCARD_LOW_PRIORITY_DROP for NAT44 Performance Test
Status:
Open
Severity: *
3 Moderate
Description: *

Drop @PARSE_FAST_DISCARD_LOW_PRIORITY_DROP for NAT44 Performance Test

Symptom:
Drop @PARSE_FAST_DISCARD_LOW_PRIORITY_DROP for NAT44 Performance Test
- Problem seen in the ingress LC (Typhoon)

Conditions:
Drop @PARSE_FAST_DISCARD_LOW_PRIORITY_DROP for NAT44 Performance Test

Reported in the following
- increased line rate
- certain packet lengths as mentioned in the description - on higher packet lenghts, problem is not seen.
- in the ingress LC

Workaround:
- Different packets lengths.
- Not seen in regular traffic tests.

Further Problem Description:
np_perf_;log command shows higher average utilization on the ingress LC's NP1. And less utilization on the VSM.

These drops are part of FAST_DISCARD drops in the NP code. Reasons to be ascertained on why such FAST_DISCARD drops are happening. and hence checking ucode team.

Last Modified:
08-JAN-2016
Known Affected Releases:
6.0.0.LC, 6.0.1.LC
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuc18645
Title:
'invalid/unused user index in db' err msgs on clearing nat64 stats
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
invalid/unused user index in db' err msgs on clearing nat64 stats

Conditions:
invalid/unused user index in db' err msgs on clearing nat64 stats

Workaround:
None

Further Problem Description:

Last Modified:
08-JAN-2016
Known Affected Releases: *
4.3.0.BASE, 5.2.2.LC, 5.3.1.BASE, 6.0.1.LC
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw79889
Title:
LBK: show run with dwdm PM configured displays garbled log messages
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
'Show running- config' displays garbled messages when PM (Performance Monitoring) configurations exists on controller dwdm on A9K-400G-DWDM-TR line card.

RP/0/RP0/CPU0:Oct 19 12:31:40.312 : nvgen[353]: %MGBL-NVGEN-3-TOKENTYPE : nvgen_token_replace: token 1, old type:9, new:8 cmd:'controller dwdm0/7/0/0^Z201,37^C^Z202,37^C^Z203,37^C^Z204,37^C ^Z\n!if/<199>/<200>/aza=\n^C^Gpm 15-min optics threshold ^DB1^Elbc ^DB2^Emin ^Z10002,FAILSET^C50 ^DN2^Emax ^Z10002,FAILSET^C50 ^DE2,s^E ^DN1^Eopt ^DB2^Emin 50 ^DN2^Emax ^Z10002,FAILSET^C50 ^DE2,s^E ^DN1^Eopr ^DB2^Emin ^Z10002,FAILSET^C50 ^DN2^Emax ^Z10002,FAILSET^C50 ^DE2,s^E ^DN1^Ecd ^DB2^Emin ^Z10002,FAILSET^C^B1,8,-,11170,+,11170^C ^DN2^Emax ^B2,

If the PM configurations are removed, garbled messages are not shown.

Conditions:
SW image used : asr9k-mini-px-5.3.3.14I, asr9k-optic-px-5.3.3.14I
HW used : A9K-RSP880-SE or A99-RP2-SE and A9K-400G-DWDM-TR
Config : PM configs applied on controller DWDM A9K-400G-DWDM-TR line card.

Workaround:
None

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux08474
Title:
L2fab-multiple ICL-14i-traffic dropped in between and not restoring back
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Access port drops the traffic, if ICL and nv satellite configuration is removed and readded.

Conditions:
Removing ICL configuration followed by global nv satellite configuration and reapplying in same order lead traffic drop at access port in Multiple ICL feature.

Workaround:
Satellite Reload

Further Problem Description:
none

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0(0)
Known Fixed Releases: *
15.1(3)SVJ
Alert Type:
Updated *
Bug Id:
CSCux24587
Title:
eXR: sh using "ssh rsp0" hangs - ssh rsCould not determine IOFPGA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
sh using "ssh rsp0" hangs.

Conditions:
Execute "ssh rsp0" command.

Workaround:
Unknown.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux15779
Title:
mbi-hello crash after "reload location all"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MBI-Hello process crash is observed on ASR9k router running 5.3.3. code

Conditions:
The crash is observed when reloading the router using the CLI command "reload location all" from the admin prompt

Workaround:
This is a rare condition and is not consistently reproducible. It occured only once after 10 retries on the system. The node recovers without any other issues after the crash and all traffic resumes completely.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCuw46460
Title:
ROUTING-FIB-3-PD_FAIL FIB Cannot insert leaf for pfx pointing to Null0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Following syslog might be seen if route resolves through Null0 on ASR9K 3rd generation Ethernet line card.

fib_mgr[185]: %ROUTING-FIB-3-PD_FAIL : FIB platform error: fib_leaf_insert 5193 Cannot insert leaf

Conditions:
/32 route updated with next hop recursing through Null0

Workaround:
Disable BGP PA.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.1.FWDG
Known Fixed Releases: *
5.3.3.18i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux25782
Title:
ASR9K: TS_FBL TABLE message during boot.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
TS_FBL Table message appears during IOS-XR Boot.

Conditions:
This behavior is observed when IOS-XR boots during card reload.

So, TS_FBL Table message appears every time during IOS-XR boot.

Workaround:
The print statement displaying TS_FBL TABLE message during IOS-XR boot has to be removed.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.3.3.BASE, 6.1.1.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCuw65230
Title:
Failed to show o/p of specific transient pbr policy & oper schema issues
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show policy-map transient type pbr pmap-name

Conditions:
Not displaying when the transient policy-map is available

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux54800
Title:
Unable to Remove ACL in Global mode on IOX-XR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Customer receives the below message when trying to remove an ACL from Global mode eventhough the ACL has been removed from all interfaces on the line cards.

no 10 permit icmp host 10.10.10.1 host 10..10.20.105 echo
!!% File exists: ACL is being used by the following clients,Detach the access list from all the clients and then remove ACL
process : pkg/bin/pal_pfilter_ea pid : 184424 node : node1_0_CPU0

Conditions:
Running IOS-XR. Seen on line card with POS interfaces and SIP-700.
Also the hardware-count option within an ACL was attempted to be committed (applied)
to the POS interface. For example. please see hardware-count option below

RP/0/RSP0/CPU0:Router(config)#int pos 1/0/0/3
RP/0/RSP0/CPU0:Router(config-if)#ipv4 access-group icmp egress hardware-count interface-statistics
RP/0/RSP0/CPU0:Router(config-if)#ipv4 access-group icmp ingress hardware-count interface-statistics
RP/0/RSP0/CPU0:Router(config-if)#commit

Workaround:
Two different Recoveries

1) process pal_pfilter_ea location

2) Reset the line card (hw-module location

WorkAround:

Do not try to commit an ACL with the hardware-count option to a POS interface. Please see conditions.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
5.3.3.25i.BASE, 6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCux45006
Title:
eXR: IPU FPDs on fabric card stuck in "RLOAD REQ" after upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IPU FPDs on fabric card stuck in "RLOAD REQ" after upgrade.

Conditions:
Triggered fallback to Golden version during IPU-FPGA upgrade on the fabric card.
After recovering IPU-FPGA to normal version, performed IPU-Linux upgrade on
the fabric card.

Workaround:
restart fpd_agent process

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.13i.BASE
Alert Type:
Updated *
Bug Id:
CSCup47120
Title:
ASR9k BNG-subscriber route not withdrawn from RIB upon initiator change
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In a IPoE dual-initiator environment (initiator dhcp + unclassified source on same access interface), if a subscriber with an established packet-trigger session suddenly changes to a DHCP client, the original /32 subscriber route from the packet-trigger session is never withdrawn, leaving a stale route in the RIB pointing to Unknown:

Routing entry for 10.1.1.5/32
Known via "subscriber", distance 2, metric 0 (connected)
Installed Jun 13 17:33:39.561 for 00:01:39
Routing Descriptor Blocks
directly connected, via Unknown
Route metric is 0
No advertising protos.

Conditions:
This occurs on ASR 9000 BNG deployments with both DHCP and unclassified source initiators on subscriber access interfaces, through XR 4.3.4 and 5.1.2.

Workaround:
None. To recover the stale subscriber is by manually clearing the stale route with "clear route ipv4 unicast x.x.x.x/32"

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.1.2.BASE
Known Fixed Releases: *
5.1.3.15i.BASE, 5.2.2.15i.BASE, 5.2.3.1i.BASE, 5.3.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq07098
Title:
ASR9k: iedge process crash on re-authorization failure
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
iedge process crash

Conditions:
if re-authorization fails (reject from Radius)

Workaround:
none

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.2.2.20i.BASE, 5.2.3.8i.BASE, 5.3.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCuo55811
Title:
show pool vrf fails with 8k DAPS pool
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show pool vrf", "show pool ipv4" and "show pool ipv6" commands produce incorrect output.

Conditions:
Issue happens only when there are more than 100 address-range entries configured on the system.

Workaround:
Use "show pool ipv4 name " and "show pool ipv6 name " commands to retrieve the required address pool information.

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.2.0, 5.2.0.25i.BASE, 5.2.1, 5.2.2, 5.2.21, 5.3.0, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCur76163
Title:
DHCP crash observed in 5.2.0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The DHCP process may crash on the Cisco ASR9000 platform.

Conditions:
With the binding in bound state, if the client tries to rebind the address without \
setting ci-addr, when receiving ACK with different IP address than the already \
bound IP address, the current BNG session is sent for disconnect and while reinit \
fetching the profile from the interface fails as it is an ACK packet from the \
server facing interface(which does not have any profile attached), hence the packet \
is enqueued and freed. When the disconnect response is received from iedge,
dequeuing and accessing the packet leads to this crash.

Workaround:
None.

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.2.2.SP1, 5.2.4.4i.FWDG, 5.3.0.17i.FWDG, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCuf52825
Title:
Fake pfm alarms against CFP-SR10, unsupported phy fields
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
======
LOW_POWER & LOW temp pfm alarm is raised for CFP-SR10 optics for which DOM feature is not supported.

Condition:
======
4.3.x release. No impact to traffic or 100G functionality.

Workaround:
=======
This is a fake pfm alarm.

Last Modified:
12-JAN-2016
Known Affected Releases:
4.3.1.BASE, 5.1.0.BASE, 5.1.1.BASE
Known Fixed Releases: *
4.3.2, 4.3.2.17i.BASE, 4.3.3, 4.3.31, 4.3.4, 5.1.0, 5.1.0.17i.BASE, 5.1.1, 5.1.11, 5.1.12
Alert Type:
Updated *
Bug Id:
CSCuu95934
Title:
Sessions not syncing to slave post vpdn_mgr restart on master
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
All 16k sessions not coming up on slave, after vpdn restart on master.

Conditions:
vpdn_mgr restart on master

Workaround:

Further Problem Description:
It is SRG issues and negative test case.

Last Modified:
13-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu76866
Title:
debug subscriber manager session with filter-id does not work
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Debug command 'debug subscriber manager session next-subscriber filter-id mac-address xxxx.xxxx.xxxx' does not generate any logs

Conditions:
None. All the time the command does not generate any log

Workaround:
debug command without filter id can be used:
"debug subscriber manager session all"

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.1.3.TOOLS
Known Fixed Releases: *
5.3.2, 5.3.2.14i.BASE, 6.0.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCus88647
Title:
ASR9K/5.2.2 dhcp vendor class information is not send in radius packets
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR9K does not send the dhcp vendor class information in radius request packets.

Conditions:
ASR9K running 5.2.2.

Workaround:
None

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.4.6i.FWDG, 5.3.1, 5.3.1.21i.FWDG, 6.0.0.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCus14705
Title:
In-place modification of pools create duplicate entries in DAPS database
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Checkpoint deletion failures, DUPLICATE-ADDRESS errors and incorrect show pool output are side effects of this problem.

Conditions:
Issue will happen only if customer deletes/shrinks in-service address pool and reconfigures the deleted addresses under same/different pool.

Workaround:
Do not delete/shrink address pools when they are in use.

Further Problem Description:
If the issue occurs, the only way (other than reload) to recover the system is to restart 'daps' process after bringing down all existing sessions. New session requests should not be allowed when the workaround is being applied.

Last Modified:
14-JAN-2016
Known Affected Releases:
4.3.2.FWDG
Known Fixed Releases: *
5.2.4.3i.BASE, 5.3.1, 5.3.1.15i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCus25426
Title:
Request for chaddr 0000.0000.0000 clients support in IOS-XR dhcp-relay
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASR9k/5.2.0 configured for dhcp-relay
DHCP Discover CU sends over MLPPP being dropped

Conditions:
DHCP Discover chaddr set to 0000.0000.0000
that packet gonna be dropped as invalid with the following log
dhcpd[164]: DHCPD: TP4809: Packet Validation failed: BAD MAC address received 0000.0000.0000

Workaround:
unknown yet

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.3.1, 5.3.1.17i.FWDG, 6.0.0.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuv54038
Title:
[513] Some sessions are stuck in disconnecting even after CSCul82895
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
sessions are stuck with "SvcAcct-Final>StatsD" in Pending Callbacks (sh subs sess all det inter)

Conditions:
generally seen with high churn of sessions with large number of services enabled with interim accountin

Workaround:
not available

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases: *
5.3.2.20i.BASE, 5.3.3.8i.BASE, 6.0.0.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCur02566
Title:
Failed in envmon_edm_sensors_get_value on polling entitySensorMIB
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
I am observing following error messages 4/5 times on console every time I poll entitySensorMIB

%PLATFORM-ENVMON-3-OPERATION_FAIL : Failed in envmon_edm_sensors_get_value.10678, error code incorrect sensor name, quitting EDM

Conditions:
Polling entitySensorMIB

Workaround:
none

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.3.0, 5.3.0.12i.BASE, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCux74719
Title:
when use FC4, only one link btw FIA and XBAR on MOD400 is used
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Only one link out of 4 between FIA and XBAR on 400MOD card is used while any FC and FC4 are present only.

Conditions:
the problem only happens when you use FC4 and any other one FCs

Workaround:
if you only use two FC in the ASR9912/ASR9922 chassis, just don't let FC4 be one of them

Further Problem Description:

Last Modified:
15-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.3.26i.BASE
Alert Type:
Updated *
Bug Id:
CSCuu46234
Title:
[532]iedged traceback while sending CoA for already disconnected session
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
iedged Traceback seen while sending CoA

Conditions:
While sending CoA for an already disconnected session

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.11i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCun59675
Title:
show subscriber session all adjustment/addition
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show subscriber session to provide an option to print username, interface and address

Conditions:
bng

Workaround:
use show subscriber session all and show subscriber session all user to derive the desired info.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
4.3.4.BASE, 5.1.1.BASE
Known Fixed Releases: *
5.1.3, 5.1.4, 5.2.0, 5.2.0.19i.BASE, 5.2.1, 5.2.2, 5.2.21, 5.3.0, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCut69809
Title:
SSTE: DHCPv6d crash by Wdsysomn due to FD leak on Trident LC.
Status:
Fixed
Severity:
3 Moderate
Description:


Symptom:dhcpv6d process may crash by Wdsysmon due to FD exceed 95% threshold.

Conditions:The FD leak are triggered by dhcpv6d process try to write to harddisk and failed. Failure is caused by harddisk access issue.
Once the number of FD opened reached 85% of Wdsysmon limit of 1000, warning message from Wdsysmon will be printed. Once number FD reach 95% of Wdsysmon limit ( 1000), process will be restarted.

Workaround:Process restart dhcpv6d to free up FD.

More Info:The issue is caused by harddisk access issue. Need to ensure harddisk is not full so files can be written to harddisk.



Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
5.3.2, 5.3.2.5i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCun26500
Title:
pos subinterface removal failing due to fr-uv error subinterface exists
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When removing a Serial/POS/FR interface the commit will fail

Conditions:
Normal operation

Workaround:
-- Restart fr_uv process on the affected node



The workaround has no impact on data switching

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.3, 5.1.3.12i.FWDG, 5.1.4, 5.2.1, 5.2.1.25i.FWDG, 5.2.2, 5.2.2.13i.FWDG, 5.2.21, 5.3.0, 5.3.0.1i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuq76508
Title:
[522] CoA Nack'ed for SPI and policy-map name change
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
CoA NACK for policy name change

Conditions:
Policy name change

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2, 5.2.2.25i.BASE, 5.2.21, 5.2.3.12i.BASE, 5.2.4.1i.BASE, 5.3.0, 5.3.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCus66426
Title:
SSTE: DHCPv6 shoudl free memory after VRF unconfigured.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
dhcpv6d process may continue holding memory after vrf unconfigured.

Conditions:
Configuring & un-configuring VRF on the system, with DHCPv6 enabled.

Workaround:
Memory will be freed after reload.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.3.0.BASE, 5.3.1.BASE
Known Fixed Releases: *
5.3.1, 5.3.1.18i.FWDG, 6.0.0.5i.FWDG
Alert Type:
Updated *
Bug Id:
CSCur17492
Title:
522-No aaa config CoA is not returning administratively-prohibited error
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Incorrect CoA reply

Conditions:
with no aaa config could see incorrect CoA reply

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2.29i.BASE, 5.2.3.12i.BASE, 5.2.4.1i.BASE, 5.3.0.14i.BASE
Alert Type:
Updated *
Bug Id:
CSCul18900
Title:
Crash seen while trying to commit a specific set of IPv6 pools twice
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DAPS process crashes while trying to commit a set of ipv6 pool prefix-length configuration twice.

Conditions:
Issue is not consistent. The problem only happens with ipv6 prefix pool.

Workaround:
If there is a requirement to re-apply a configuration, remove the prefix pool configuration and reconfigure it, once the other configuration is commited.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.1, 5.1.1.15i.BASE, 5.1.11, 5.1.12, 5.1.2, 5.1.2.7i.BASE, 5.1.3, 5.1.4, 5.2.0, 5.2.0.10i.BASE
Alert Type:
New
Bug Id:
CSCuv92521
Title:
iedged attribute leak at policy_format_author_username
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
iedged heap memory consumption will increase periodically. iedged process will crash after heap memory consumption reaches to around 800MB.

Conditions:
periodically reauth user.

Workaround:
restart iedged process from exec command prompt.
example: process restart iedged

Further Problem Description:
this issue will be hit if we reauth user periodically. For example if we configure to reauth user every 5mins, Please check the heap memory consumption after evry 5 mins. heap memory consumption will increase same number of bytes every 5mins depending on the user profile contents. after heap memory consumption reaches around 800MB, iedged process will crash.

Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
5.3.3.9i.BASE, 6.0.0.17i.BASE
Alert Type:
Updated *
Bug Id:
CSCuj00903
Title:
acct-stop for IPv6 l2 session with IA_NA&IA_PD does'nt have v6addr
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
IPv6 address not included in the account-stop record.

Conditions:
Client sends a release message on an IPv6 l2connected session with both IA_NA and IA_PD.

Workaround:
No known workarounds.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.1.1.BASE
Known Fixed Releases: *
5.1.1, 5.1.1.14i.BASE, 5.1.11, 5.1.11.8i.BASE, 5.1.12, 5.1.2, 5.1.2.5i.BASE, 5.1.3, 5.1.4, 5.2.0
Alert Type:
Updated *
Bug Id:
CSCup66694
Title:
522:rtdsub: Few sessions remain in disconnecting state out of 64k
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Few sessions remain in disconnecting state out of 64k, during idle-timeout disconnection of 64k routed v6 subscriber sessions.

Conditions:
Idle timeout disconnection of 64k pkt triggerd routed sessions

Workaround:
Disconnection happens after 30 min

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.31, 4.3.4
Alert Type:
Updated *
Bug Id:
CSCuo59655
Title:
COA error cause/string add to Resp failed when previous COA in progress
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
when a coa request is received previous coa request was already in progress, hence it supposed to send NAK with "internal error? cause and error
String as "Previous COA request on subscriber still pending to complete.? but looks like there is a bug in code due to which error cause/string addition to
Response failed

Conditions:
when a coa request is received previous coa request was already in progress

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.1.3, 5.1.3.13i.BASE, 5.1.4, 5.2.0, 5.2.0.25i.BASE, 5.2.1, 5.2.2, 5.2.21, 5.3.0, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCup20354
Title:
ipsub_ma crash @ ipsub_ma_vrf_table_rib_add_callback during RPFO
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ipsub_ma process crashes during RP failover

Conditions:
This is a timing issue and occurs only in a rare scenario. Issue is usually triggered by access interface flap during RP swithover

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.2.2, 5.2.2.14i.BASE, 5.2.21, 5.3.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCur17509
Title:
[522] PPPoE sessions are not going down after changing the service-type
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PPPoE sessions are not going down

Conditions:
After Service-type change, sessions are not going down

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.2.BASE, 5.3.0.BASE
Known Fixed Releases: *
5.2.2.29i.FWDG, 5.2.3.12i.FWDG, 5.2.4.1i.FWDG, 5.3.0.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCun56013
Title:
[520] iedged crashes after incorrect framed route CoA request
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Iedged crash after CoA request

Conditions:
After sending incorrect CoA request could see iedged is crashing

Workaround:
NA

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
5.2.0.BASE
Known Fixed Releases: *
5.2.0, 5.2.0.17i.BASE, 5.2.0.17i.FWDG, 5.2.0.17i.MCAST, 5.2.0.17i.MPLS, 5.2.1, 5.2.2, 5.2.21, 5.3.0, 5.3.1
Alert Type:
Updated *
Bug Id:
CSCuv86795
Title:
ipsub does not provide next hop info for v6 framed routes [533 DT]
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
show ipsubscriber interface dynamic-routes location will not show next hop route for framed subscribers

Conditions:
Seen for v6 framed routes.

Workaround:
none

Further Problem Description:
Bring up ds ipoe LC session with v4 & v6 framed routes from radius .
Observing the framed routes are installed .
Here ipsub does not provide the next hop info ,whereus the rib routes provides next hop LL address.

Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
5.3.3.10i.FWDG, 6.0.0.14i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux41064
Title:
CISCO-CONFIG-MAN-MIB timing out; slow oid's are seen
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
CISCO-CONFIG-MAN-MIB timing out; slow oid's are seen. "show snmp trace request" also confirms this.

Conditions:

Workaround:
block the impacting MIB ( CISCO-CONFIG-MAN-MIB) for NOT processing in snapped process. This can be achieved though snmp

views and you need to apply the View "CISCO" to all their SNMP communities Setup a snmp-view to exclude the below mibs. and process restart snmpd

snmp-server view CISCO 1.3 included
snmp-server view CISCO 1.3.6.1.4.1.9.9.43 excluded
snmp-server view CISCO 1.3.6.1.4.1.9.9.91 excluded
snmp-server view CISCO 1.3.6.1.4.1.9.10.106 excluded
snmp-server view CISCO 1.3.6.1.2.1.10.7.2.1 excluded
snmp-server view CISCO 1.3.6.1.4.1.9.9.84.1 excluded
snmp-server view CISCO 1.3.6.1.4.1.9.9.249.1 excluded
snmp-server view CISCO 1.3.6.1.2.1.10.166.2.1 excluded
snmp-server view CISCO 1.3.6.1.2.1.47.1.1.1 excluded
snmp-server view CISCO 1.3.6.1.4.1.9.9.109.1 excluded

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
4.3.4.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux52913
Title:
IPv6 prefix over IPv4 SRTE via static route: no cef entry on LC
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
IPv6 prefix over IPv4 SRTE via static route: no cef entry on LC, and see the following continuous error:

LC/0/0/CPU0:Dec 13 07:56:28.948 : fib_mgr[185]: %ROUTING-FIB-3-PLATF_UPD_FAIL : FIB platform update failed: Obj=DATA_TYPE_LABEL_INFO[ptr=8ad6a988,refc=0x1,flags=0x8001930] Action=CREATE Proto=mpls. Cerr='FIB' detected the 'warning' condition 'Invalid argument' : pkg/bin/fib_mgr : (PID=376949) : -Traceback= 4ce69140 4ed9a714 4ed9af5c 401f3790 401f3d10 401f3eb0 400c6280 400c6f74 4018cbdc 4018e49c 400bdbd8 400bfc60 400c0ba4 400dba34 400dc640 40192bcc

Conditions:
ASR9K XR 6.0.0

The problem happens when destination IPv6 prefix has local label allocated by LDPv6 or BGP.

Workaround:
Use route-policy to make LDPv6/BGP not allocate local label for destination IPv6 prefix

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases: *
6.0.0.FWDG, 6.1.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux88135
Title:
dot1p cos field not set for locally generated DHCP traffic
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Vlan cos is not updated in the injected DHCP packets towards the PWHE subscribers when ambiguous vlan DHCP configuration is applied.


Conditions:
DHCP configured on PWHE subinterfaces.
Ambiguous vlan configuration is applied.


Workaround:
No workaround as such




Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux18150
Title:
LCC scan shows label inconsistency after tomahawk LC reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The issue occurs on ASR9K chassis having Tomahawk Linecard. Label consistency checker background scan shows some inconsistent labels after reloading the Tomahawk LC.

Conditions:
On a stable router when the Tomahawk LC is reloaded, once the linecard comes back online completely, the label consistency scan shows certain labels as inconsistent between the FIB and LSD on this linecard. These labels are related to prefixes being advertised by both Segment routing and MPLS LDP.

Workaround:
There is no impact on traffic due to this inconsistency message on console. In order to stop these label inconsistency messages on console, the router needs to be reloaded.

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.3.MCAST
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux78689
Title: *
Restore NP fast-reset upon monitor NP counter capture
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Unexpected behavior after "monitor np counter <> <> location <>" which may include NP reset or unwanted counter increments.

Conditions:
"monitor np counter" command execution.

Workaround:
Use monitor command with reset option - "monitor np counter <> location <> reset"

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.3.BASE, 6.0.0.BASE
Known Fixed Releases:
5.3.3.27i.BASE
Alert Type:
Updated *
Bug Id:
CSCuw99907
Title:
config process blocked on sysdb_mc after snmp config changes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The config process may get blocked on the sysdb_mc process resulting in commit failures.

Conditions:
This problem may be triggered by changing the snmp configuration

Workaround:
Restarting the snmpd process may clear the problem

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux59969
Title:
ASR9K DHCPv6 Proxy replies to both IAIDs with the same XID field
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Client sends a RELEASE for both IAIDs, the ASR9K(Proxy) forwards it to the server then get the reply to the server proceeds to delete both bindings and sends back to the client 2 REPLYs but with the same XID so it will be successful for one prefix but not for the other. As a result of this the Client will send out another RELEASE for the failed prefix and this time the ASR9K will reply back with a "no binding" so it will be released.

Conditions:
ASR9K running DHCP as Proxy for IPv6

Workaround:
Though it doesn't cause any functional impact (follow-up release is responded with no-binding properly)

Further Problem Description:
Two separate release packets are received from client for each IAID, both are forwarded to server and wait for responses; server's release-relay-reply didn't contain the IAID info in it, hence proxy treats first reply as response for both IAIDs and same is forwarded (ignoring the xid field). Second reply from server is consumed.

Last Modified:
22-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.1.15i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux62822
Title:
standby rsp880 fpd info are not shown
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
sby rsp880 fpd version info is not shown

Conditions:
asr9k router running 600 interim image

Workaround:
none

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
5.3.3.27i.BASE, 6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux80366
Title:
VIDMON Counter Disc JUMP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Vidmon reports sequence errors while monitoring RTP traffic.

Conditions:
Traffic must contain enough jitter that packets arrive within nanoseconds of each other, instead of milliseconds.

Workaround:
none

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
4.3.4.BASE, 5.3.2.BASE
Known Fixed Releases: *
5.3.3.27i.BASE, 6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux83008
Title:
Policer ID in show lpts pifib hardware police location <> is not unique
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
policer ID is not unique

Conditions:
policer ID is not unique

Workaround:
n/a

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
6.1.2.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux60253
Title:
csubAggStatsAuthSessions not supported in ASR9k
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The snmpwalk of 1.3.6.1.4.1.9.9.786.1.2.1.1.6 gives a ??No Such Instance currently exists at this OID?? message.

Conditions:
ASR9k with 5.1.3 IOX version

Workaround:
none

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.1.3.BASE, 5.1.3.FWDG
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq88828
Title:
clear logging onboard corrupted-file automatically
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A ASR 9000 reports %OS-OBFLMGR-7-RECORD_TYPE_UNKNOWN unknown record type errors continuously.
In addition, with obfl file corruption the obflmgr manager process may crash due to CSCui12736.

Evaluate the reasons for obfl file corruption and eliminate. In cases it occurs have system clear the obfl corrupted files automatically without user intervention and alarm.

Conditions:

Workaround:
1. Clear the corrupted files:
The system will generate new obfl files and there is no impact.

admin clear logging onboard corrupted-files location 0/RSP0/CPU0
admin clear logging onboard corrupted-files location 0/RSP1/CPU0

2. If the issue persists, remove obfl files manually.
Use "admin show logging onboard raw | in file" CLI to get the location of the files and remove the files from ksh using the rm command.

Or
3. Try to restart the obflmgr process:
process restart obflmgr location 0/RSP0/CPU0
process restart obflmgr location 0/RSP1/CPU0

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
4.3.4.BASE, 5.1.1.BASE, 5.1.3.BASE
Known Fixed Releases:
5.3.1, 5.3.1.12i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCus47582
Title:
eem-failed to execute cli:error reading channel:error reading "file32":
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:EEM TCL script may fail with this :

script.tcl: failed to execute cli command: error reading the channel: error reading "file32": bad file number error reading the channel: error reading "file32":

Conditions:timing condition causing router prompt to be split on 2 lines when tcl match patterns

Workaround:replace cli_read_pattern tcl lib with the fixed one in the EEM tcl script


proc ::cisco::eem::cli_read_pattern {fd ptn} {
set result ""
set is_end 0
set str1 ""
set str2 ""
set trim_last_line ""
set i 1
set last_line ""
set line2 ""
# lets not spin forever. try for maximum 50000 times
while {$is_end == 0 && $i<=50000 } {
set str [read $fd]
if {$str == ""} {
after 50
incr i;
continue
} else {
#sometimes read returns router prompt partially.
#we hope in at least 2 read() calls we get full router prompt
set last_line $line2
append last_line $str
set line2 $str
}
# double quotes (don't change to curly braces!)
set is_end [regexp "(.*)?($ptn)" $last_line str1]
if {$is_end} {
#remove last line containing routername
set trim_last_line [regexp "(.*)\n" $str1 str2]
if {$trim_last_line} {
append result $str2
}
} else {
append result $str
}
after 60
}
return $result
}

More Info:


Last Modified:
22-JAN-2016
Known Affected Releases:
5.1.3.ROUT
Known Fixed Releases:
5.3.1, 5.3.1.20i.BASE, 6.0.0.5i.BASE
Alert Type:
Updated *
Bug Id:
CSCua57513
Title:
[asr9k-ipiw]:Serial Interface flap once after ppp_ma process restart
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ppp_ma restart events (e.g. SMU activation) will result in any PPP ACs in IP interworking mode being renegotiated. i.e. this may result in traffic loss for a short period (seconds) but only on the affected PPP ACs where IP interworking is configured following the process restart.

Conditions:

This will only happen when ppp_ma is restarted *and* PPP ACs with IP interworking is configured. So only restricted to customers that use l2vpn IP interworking with PPP ACs.

Workaround:

Either avoid the restart, or allow for the fact that traffic may be dropped for in the order of seconds on PPP IP Inteworking ACs following the process restart.

Last Modified:
22-JAN-2016
Known Affected Releases:
4.2.0.BASE
Known Fixed Releases: *
4.3.0, 4.3.1, 4.3.1.1i.FWDG, 4.3.2, 4.3.3, 4.3.31, 4.3.4, 4.3.91, 5.1.0, 5.1.1
Alert Type:
Updated *
Bug Id:
CSCuu99198
Title:
Traffic not get forwarded to GRE tunnel by ABF next-hop
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ABF not working on GRE tunnels on Ingress side, for those paks that were punted to netio from the egress NP.

Conditions:
Configure ABF in Ingress ACL to redirect paks into GRE tunnels.
On the tunnel, have an egress ACL to deny the above paks.

Paks get punted to netio as expected.
In netio, they don't get ABF'd into the tunnel !!

Workaround:
Fixed

Further Problem Description:

Last Modified:
23-JAN-2016
Known Affected Releases:
4.3.4.ROUT
Known Fixed Releases: *
5.3.3.19i.BASE, 6.0.0.26i.BASE, 6.0.1.12i.BASE, 6.1.0.9i.BASE
Alert Type:
Updated *
Bug Id:
CSCut09995
Title:
apply-group verifier returns ipv4-ma error while removing apply-group
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Apply failed on ipv4-ma when removing the apply-group config

Conditions:
'ipv4-ma' detected the 'fatal' condition 'Helper address apply failed, when removing apply-group

Workaround:
N/A

Further Problem Description:
N/A

Last Modified:
23-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases: *
6.0.0.23i.FWDG, 6.0.1.12i.FWDG, 6.1.0.3i.FWDG
Alert Type:
Updated *
Bug Id:
CSCut53168
Title:
dwdm-ui-cfg_02: returned value out of range
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When trying to remove leaf wave-channel using XML . The edit-config operation results in a bad-element error. The message is constructed from the output of get-config, which returned the value 19580 and that does not conform to schema (which says that the type of this leaf is uint32 with range 1..100

Conditions:
When wavelength Freq is configured out of range for 1-100 and tried to edit using XML ,this error is recieved.

Workaround:
None.

Further Problem Description:

Last Modified:
23-JAN-2016
Known Affected Releases:
5.3.1.MGBL
Known Fixed Releases: *
6.0.1.12i.BASE, 6.1.0.10i.BASE
Alert Type:
Updated *
Bug Id:
CSCux01391
Title:
ASR9k Wrong bfd echo latency counter
Status:
Fixed
Severity:
3 Moderate
Description:

Wrong values in output. - cosmetic

Symptom:
#show bfd session agent detail interface location
The latency value is calculated in wrong way.

Desired echo tx interval: 300 ms, local negotiated echo tx interval: 300 ms
Latency of echo packets (time between tx and rx):
Number of packets: 2, min=2 ms, max=302 ms, avg=152 ms

Conditions:
BFD on BOB:
bfd
multipath include location 0/4/CPU0

interface TenGigE0/4/0/3
bundle id 13 mode active

interface Bundle-Ether13
bfd address-family ipv4 multiplier 3
bfd address-family ipv4 destination 1.1.1.2
bfd address-family ipv4 fast-detect
bfd address-family ipv4 minimum-interval 50
ipv4 address 1.1.1.1 255.255.255.252

Workaround:
none

Further Problem Description:
Currently the for BOB Echo packets the SeqNum associated with packet is not being considered while updating timestamp table hence the confusion happens.

This needs correction in finding correct tx/rx packet and update the timestamp table, which can help in getting proper latency for BOB echo packets.

Last Modified:
24-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
5.3.3.24i.FWDG, 6.0.1.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux12450
Title:
eXR: No OBFL fpd record is seen on the board for CBC upgrade
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
No OBFL fpd record is seen on the board for CBC upgrade.

Conditions:
Execute "upgrade hw loc fpd cbc force" to upgrade CBC on a board.

Workaround:
Unknown.

Further Problem Description:

Last Modified:
24-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCuv10653
Title:
RPL parameter issue with 4-byte ASN values
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Customer is using RPL with parameters to set RT extended community for prefixes. They call this RPL within another RPL and when they pass 4-byte format ASN to the RPL, RPL will apply the 4-byte number in IP based format. See below:
route-policy RP-VRF-EXTNET-ACTIVE-EXPORT($PrefixSet, $Global, $Local)
if destination in $PrefixSet then
set extcommunity rt ($Global:$Local) additive
set med 100
endif
end-policy
route-policy RP-TEST-1
apply RP-VRF-EXTNET-ACTIVE-EXPORT(PS-1, 133931, 2)
end-policy

In this case RT would be:
RT:0.2.11.43:2

Now the issue is, when we want to use RT 133931:2 as a match for import route-target on a VRF, it doesn't match while RT value "0.2.11.43:2? will match.

Conditions:
You will hit this only when use parameter based RPL and pass 4-byte number as a parameter to the RPL

Workaround:
We can confirm that this is RPL behavior only. if try to eliminate use of nested RPL and parameters and use RPL to set the RT directly, It will set the RT value in the correct way (4-byte number)

Further Problem Description:

Last Modified:
24-JAN-2016
Known Affected Releases:
5.1.3.BASE, 5.1.3.MPLS, 5.1.3.ROUT
Known Fixed Releases: *
6.0.1.12i.ROUT
Alert Type:
Updated *
Bug Id:
CSCux41857
Title:
far-end port has double flap right after no shutdown on near-end port
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When near-end has no shutdown, extra interface flap happen on far-end.

Conditions:
With Typhoon and Tomahawk LC, the issue can happen

Workaround:
None. carrier-delay on far-end could be help to prevent.

Further Problem Description:
Due to this bug, instantaneous laser shutdown will be inserted into middle of sequence of no shutdown operation

Last Modified:
24-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
5.3.3.24i.BASE, 6.0.1.12i.BASE
Alert Type:
Updated *
Bug Id:
CSCut70604
Title:
Interface counter are getting doubled after enabling URPF
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Interface counters are getting doubled

Conditions:
This problem may be observed after configuring uRPF or a monitor-session under the interface

Workaround:
None

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases:
5.1.3.BASE, 5.3.1.BASE, 5.3.1.LC, 5.3.1.ROUT
Known Fixed Releases:
5.3.2, 5.3.2.9i.BASE, 6.0.0.5i.BASE
Alert Type:
New
Bug Id:
CSCux67492
Title:
netio traceback @c_regcomp.c:507 after RPFO
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Traceback just appears once after RPFO. It has no identified functional impact.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases:
5.3.3.ADMIN
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur19923
Title:
Optics not detected when interface is in shutdown state
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Optics not detected when interface is in shutdown state. show inventory will not show the optics PID and syslog message regarding optics insertion or removal will not be displayed when optics is pulled in or removed respectively.

Conditions:
Interface in shutdown condition.

A9K-24X10GE, A9K-36X10GE, A9K-8X100GE-L-SE/TR, A9K-8X100-SE/TR

Workaround:
Under interface config, do "no shutdown".

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases: *
5.3.0.BASE, 5.3.2.BASE, 5.3.2.LC, 5.3.3.BASE
Known Fixed Releases:
5.3.3.11i.BASE
Alert Type:
Updated *
Bug Id:
CSCux87138
Title:
PBTS fallback CLI not accepting multiple FC values
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Fallback to CLI not accepting multiple FC values

Conditions:
Configure multiple FC values to cef pbts class x fallback-to y command

Workaround:
Use 1 value per fallback-to line

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
5.3.3.24i.BASE
Known Fixed Releases: *
5.3.3.FWDG, 6.0.1.15i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux44754
Title:
Console Clean-up - cfgmgr_cfs_check[65900]: wd_set_rlimit:rlimit
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
During the reload/OIR of a line card or during the reboot of the router, these messages may show up on the User console.These messages are harmless and are just a nuisance for the users.

Conditions:

Workaround:
None.

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases: *
5.3.3.BASE, 6.0.0.BASE
Known Fixed Releases:
6.0.1.13i.BASE
Alert Type:
New
Bug Id:
CSCux99139
Title:
OSPFv3 go down with ipsec authentication sha1
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
OSPFv3 neighborship goes down when configured for ipsec authentication

Conditions:
Routers connected via bundle of hundredgig interfaces

Workaround:
disable authentication and ospfv3 peering comes up

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
5.2.4.K9SEC
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux08992
Title:
Incorrect prefix received after l2vpn_mgr restart
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Incorrect Local L2VPN VPLS prefix may be observed in BGP's table after restart l2vpn_mgr process

Conditions:
Restart of l2vpn_mgr process

Workaround:
None

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
5.3.3.ROUT
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw17040
Title:
devb-umass process crash on mod80
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
devb-umass process crash on mod80.

Conditions:
Router reload/upgrade with 13J image

Workaround:

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
5.3.3.10i.BASE, 6.0.0.18i.BASE, 6.0.1.12i.BASE, 6.1.0.1i.BASE
Alert Type:
New
Bug Id:
CSCux77775
Title:
ASR9K: Fantrays to be used in all the FT slots when Tomahawk LC present
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
If 9k is reloaded with single Fan Tray, Tomahawk LineCard stays down.
Following console logs were reported:

RP/0/RSP0/CPU0:Jan 7 19:21:56.437 : shelfmgr[410]: %PLATFORM-SHELFMGR-3-INCOMPATIBLE_FT_FOR_LC : All the Fantrays must be V2 in order to provide cooling for the A9K-NP300-LC. Chassis has incompatible Fantray for Node 0/5/CPU0.

RP/0/RSP1/CPU0:Jan 7 14:24:20.451 : canb-server[153]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/5/CPU0 , Power Cycle (0x05000000)
RP/0/RSP0/CPU0:Jan 7 14:24:20.475 : canb-server[153]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/5/CPU0 , Power Cycle (0x05000000)

RP/0/RSP1/CPU0:Jan 7 14:24:24.025 : canb-server[153]: %PLATFORM-CANB_SERVER-7-CBC_POST_RESET_NOTIFICATION : Node 0/5/CPU0 , Power Cycle (0x05000000)re

Conditions:
If ASR9k is reloaded with single Fan Tray, Tomahawk LineCard stays down.
Following console logs were reported:

RP/0/RSP0/CPU0:Jan 7 19:21:56.437 : shelfmgr[410]: %PLATFORM-SHELFMGR-3-INCOMPATIBLE_FT_FOR_LC : All the Fantrays must be V2 in order to provide cooling for the A9K-NP300-LC. Chassis has incompatible Fantray for Node 0/5/CPU0.

RP/0/RSP1/CPU0:Jan 7 14:24:20.451 : canb-server[153]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/5/CPU0 , Power Cycle (0x05000000)

Workaround:
To have Fan Trays installed in all the FT slots when Tomahawk LC is present in the chassis.

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux92476
Title:
eXR: "Error: FPGA didnt complete cfg" is seen in Meldun / Dalla fallback
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Meldun / Dalla Golden FPD version can not become the running version after the FPD primary version is corrupted.
"Error : FPGA did not complete configuration." is seen.

Conditions:
Perform FPD fallback testing for Meldun / Dalla FPD.

Workaround:
Primary is get corrupted here and do upgrade of primary will recover it.

Further Problem Description:
There is an erratum with the muliboot mechanism on the Artix FPGA devices. The first 1K bytes of the image contains the sync word. If a valid sync word is present, then even if the rest of the image is corrupted, the multiboot mechanism will not switch over to the golden image due to the erratum. To work around this classic FPD erases the first 1K bytes of the image first and programs it last for the upgrade image.

Last Modified:
27-JAN-2016
Known Affected Releases:
6.1.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux27591
Title:
Token $(line) substitution does not work for ssh telnet
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
When using banner motd or 'banner exec' command with $(line) substitution around various network devices it was found it works on Cisco 7600 but does not work on ASR9000 in 4.2.3

Conditions:
banner motd or 'banner exec' command with $(line) substitution

Workaround:
if using 4.2.3 upgrade to 5.1.3 for telnet.
For ssh there is no workaround. You have to see the line then please configure the $(line) as a part of exec banner. Since before authentication in XR we dont allocate VTY.

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy00751
Title:
ASR9001: tty_mgmt_terminal_cmd crash after 'terminal length 0'
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
tty_mgmt_terminal_cmd process may crash after 'terminal length 0' command is issued.

Conditions:
Issue 'terminal length 0' command.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
4.3.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux90513
Title:
533 26I - ipv4_mfwd_partner crash @ rn_delete during interface down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
MFIB crashes on a Linecard after a SMU installation + interface down event.

Conditions:
Multicast should be running over BVI interfaces. If a SMU that involves changes in certain MFIB DLLs is installed, we may run into a crash during subsequent flap of BVI group membership info.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
4.1.1.MCAST, 5.3.3.MCAST
Known Fixed Releases: *
5.3.3.MCAST, 6.0.1.16i.MCAST
Alert Type:
Updated *
Bug Id:
CSCux89263
Title:
prm_ezhal 'Not enough TM resources to satisfyrequest' error on typhoon.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On TR card, after removing a queuing policy. Reconfigure the same policy back is rejected due to the following error

!!% 'prm_ezhal' detected the 'warning' condition 'Not enough TM resources to satisfyrequest'

Conditions:
The following sequence could trigger this issue when line card is Typhoon or Tomahawk -TR card
1. Apply the queuing policy on multiple interfaces hosted by the same NP (This will succeed)
2. prm_server_ty (for Typhoon) or prm_server_to (for Tomahawk) process restart due to restart SMU installation or crash or manual restart from CLI
3. Remove policy-map from multiple interfaces applied in step 1
4. Apply the same or any other queuing policy on the interfaces involved in step 3. Configuration may be rejected with "Not enough TM resources to satisfyrequest"

Workaround:
Reload the line card

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
6.1.1.BASE
Known Fixed Releases: *
5.3.3.BASE, 6.0.1.16i.BASE
Alert Type:
New
Bug Id:
CSCuy03455
Title:
Excessive punt flow trap not recognizing-reporting DHCP correctly
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
On ASR9000 device running Excessive punt flow trap feature on subscriber interfaces, malicious DHCP traffic will be penalized, but in log following message could be seen:


LC/0/1/CPU0:Jan 25 02:48:53.838 : flowtrap[197]: %OS-FLOWTRAP-4-BAD_ACTOR_INTF_DETECTED : Excessive ?^?sX?^?s^H flow detected on interface Bundle-Ether32.99990.ip107926. The interface will be penalty-policed at 10 pps for 15 minutes.

Conditions:
ASR9000 device running 5.2.2 with BNG and Excessive punt flow trap feature enabled for subscriber interfaces.

Workaround:
None known at this time.

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun01818
Title:
snmpwalk timeout after ospfv3 process deleted
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ospfv3 mib guery may take long time to timeout

Conditions:
- ospfv3 process was configured and later unconfigured

Workaround:
process restart snmpd

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
4.2.3.BASE
Known Fixed Releases: *
5.1.2, 5.1.2.20i.ROUT, 5.1.3, 5.1.3.1i.ROUT, 5.1.4, 5.2.0, 5.2.0.15i.ROUT, 5.2.1, 5.2.2, 5.2.21
Alert Type:
Updated *
Bug Id:
CSCux46204
Title:
SNMP trap on power feed down event - umbrella SMU
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
SNMP traps are not raised when a single power feed is removed or added.

Conditions:
ASR9k power feed is turned off

Workaround:
N/A

Further Problem Description:
None

Last Modified:
29-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw10253
Title:
show bgp policy neighbor <> commands are not working properly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Few nbr commands are not working:

show bgp neighbor x.x.x.x advertise/receive route returns error
% Neighbor not found

show bgp policy neighbor x.x.x.x commands return error

Conditions:
This issue happens for the last neighbor shown under show bgp summary. For example in show bgp summary if x.x.x.x is last entry, then if you issue show bgp policy neighbor x.x.x.x the error will be seen.

Workaround:
1. Create a dummy neighbor with higher IP address so that it becomes the last entry under show bgp summary.

2. Execute these commands without neighbor option and filter the resulting output based on the neighbor. If there are too many number of routes advertised, then this will take some time to display. output.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
5.3.2.ROUT, 6.0.0.ROUT
Known Fixed Releases: *
5.3.3.15i.ROUT, 6.0.0.19i.ROUT, 6.0.1.12i.ROUT, 6.1.0.2i.ROUT
Alert Type:
Updated *
Bug Id:
CSCuw97473
Title:
False alarm "PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING" on VSM blade
Status:
Fixed
Severity:
3 Moderate
Description:

%PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING : Set|ahci-mon[32789]|0x1000000|HD0 device not responding

then (typically 30 sec later)

%PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING : Clear|ahci-mon[32789]|0x1000000|HD0 device not responding

Symptom:
%PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING : Set|ahci-mon[32789]|0x1000000|HD0 device not responding

then (typically 30 sec later)

%PLATFORM-AHCI-2-DEV_HD0_NOT_RESPONDING : Clear|ahci-mon[32789]|0x1000000|HD0 device not responding

Conditions:
- seen with A9K-VSM-500
- messages do not start immediately after reload of VSM, typically takes several days/weeks before it starts

Workaround:
Reload VSM blade

Further Problem Description:
As long as alrm is cleared at next read test, these messages are false alarms and do not have any impact.

Last Modified:
30-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases: *
5.3.3.18i.BASE, 6.0.0.23i.BASE, 6.0.1.12i.BASE, 6.1.0.7i.BASE
Alert Type:
Updated *
Bug Id:
CSCux20499
Title:
Tomahawk:Improve the time to notify shelfmgr after non-recoverable error
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When a tomahawk linecard has to reload due to a non-recoverable error, it takes around 4-5 seconds to to notify shelf manager.

Conditions:
non-recoverable error (parity error)

Workaround:
none

Further Problem Description:
This behaviour affects recovery mechanisms like BFD, FRR. For instance, FRR is not being triggered until shelf manger gets the notification that the card has been brought down.

Last Modified:
01-FEB-2016
Known Affected Releases:
5.3.3.BASE, 6.0.1.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCut22497
Title:
ASR9k qos transmit statistics be N/A from command and mib
Status:
Open
Severity:
4 Minor
Description:

Symptom:
1.configuration:
policy-map test_for_qos
class test_for_qos
police rate 8000000 bps
!
!
class class-default
RP/0/RSP0/CPU0:nmtgs9010a#sh run interface gigabitEthernet 0/2/0/6
Thu Mar 5 16:44:29.174 CHINA
interface GigabitEthernet0/2/0/6
service-policy input test_for_qos

2.show interface to check traffic

5 minute input rate 9243000 bits/sec, 1434 packets/sec

3.show policy statistics
RP/0/RSP0/CPU0:nmtgs9010a#show policy-map interface gigabitEthernet 0/2/0/6
Thu Mar 5 16:45:23.627 CHINA

GigabitEthernet0/2/0/6 input: test_for_qos

Class test_for_qos
Classification statistics (packets/bytes) (rate - kbps)
Matched : 14655941/11871312210 9285
Transmitted : N/A
Total Dropped : 2025970/1641035700 1281
Policing statistics (packets/bytes) (rate - kbps)
Policed(conform) : 12629971/10230276510 8004
Policed(exceed) : 2025970/1641035700 1281
Policed(violate) : 0/0 0
Policed and dropped : 2025970/1641035700

we can see that transmit packets no is zero.. that's not true..

Conditions:

Workaround:

Further Problem Description:

Last Modified:
09-JAN-2016
Known Affected Releases:
5.2.2.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy03335
Title:
Optic vendor name not displayed for 3rd party optics
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Behavior change in inventory for 533, Description fields (DESCR: in inventory) for 3rd party optics are displayed as "Unknown or Unsupported SFP Module". Previous behavior was to display the Vendor Name when Product ID is missing:

Port 1 IDPROM Data:
Product Id :
Product Name : 1GE/1FC/2FC
Version ID :
CLEI Code :
Top Assembly Part No. :
Serial Number : xxxxxxx
PCB Revision : A
Vendor Name : FINISAR CORP.

Port 2 IDPROM Data:
Product Id :
Product Name : 1GE/1FC/2FC
Version ID :
CLEI Code :
Top Assembly Part No. :
Serial Number : xxxxxx
PCB Revision : A
Vendor Name : CHAMPION ONE


Example of inventory output:
NAME: "module mau GigabitEthernet101/0/CPU0/14", DESCR: "Unknown or Unsupported SFP Module"

Conditions:
intended results after after CSCux18672

Workaround:
no workarounds

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.3.3.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw49047
Title:
locald_DSC on standby RP
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
A locald_DSC process crash was observed on the standby RP

Conditions:
This was observed after the cable connected to the MgmtEth interface and the Aux port was unintentionally swapped on the standby RP.

Workaround:

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux97736
Title:
HSRPv1 hellos processed when HSRPv2 enabled on interface
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
Interface configured with HSRPv2 listen to HSRPv1 hellos

Conditions:
HSRPv2 is enabled on interface or sub-interface

Workaround:
Apply inbound access-list to filter HSRPv1 hello (224.0.0.2/udp port 1985)

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw66872
Title:
Show CLI for frequency synchronization on sat acces int is not working
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Show CLI for frequency synchronization on sat acces int is not working

Conditions:
With 6.0.0-17i image on satellite interface

Workaround:

Further Problem Description:

Last Modified:
24-JAN-2016
Known Affected Releases:
6.0.0.BASE
Known Fixed Releases: *
6.0.1.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux38055
Title:
ASR9K as GM should set utcOffsetValid flag to TRUE
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
ASR 9K acting as PTP Grandmaster sets utcOffsetValid flag to FALSE in announce messages sent to downstream slaves.

Conditions:
ASR 9K acting as PTP Grandmaster.

Workaround:
The slave can use the current leapseconds (36 after Jun 30, 2015) as the offset between PTP and UTC timescale is not implementation dependent.

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
New
Bug Id:
CSCux01983
Title:
5.3.1 Umbrella SMU for sysdb
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
This is an Umbrella DDTS for sysdb related fixes.
[r60x] MCSAT sysdb_svr_local crashed at sms_respq_handle_resp_msg
Big verification messages crash sysdb_shared_sc

Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.1.BASE, 5.3.3.BASE
Known Fixed Releases:
3.8.3, 3.8.4, 3.9.0, 3.9.1, 3.9.2, 3.9.3
Alert Type:
New
Bug Id:
CSCux88095
Title:
commit fails when macsec-service config is overwritten when intf scale
Status:
Open
Severity:
4 Minor
Description:

Symptom:
Commit failure

Conditions:
No functionality issue

Workaround:
None

Further Problem Description:

Last Modified:
18-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux78596
Title:
Suspect Flag always set to Yes in "sh ethernet sla statistics brief"
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Suspect Flag is always set to Yes in the output of sh ethernet sla statistics brief.

Conditions:
Y.1731 SLM/LMM/DMM probes generated by an ASR9k sender.

Workaround:
Omit the brief keyword from the command.

Further Problem Description:
It's a cosmetic issue. Only the brief" version (sh ethernet sla statistics brief) of output is affected. No other operational impact.

Last Modified:
15-JAN-2016
Known Affected Releases:
5.2.0.CE
Known Fixed Releases: *
5.3.3.26i.BASE
Alert Type:
New
Bug Id:
CSCux83178
Title:
Umbrella Defect to address some critical BGP issues in 5.2.4
Status:
Open
Severity:
4 Minor
Description:

Symptom:
BGP instability

Conditions:
CSCuw98437 ASR9K L3VPN Dynamic Load-share btw local and remote VRF fix
CSCut02575 BGP crash after RPFO due to wrong fragmentation handling during NPL rtx
CSCux07255 BGP route withdrawal issue

Workaround:
none

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
5.2.4.BASE
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux43977
Title:
Downgrade from 6.0.1 Image throws Inconsistent config error
Status:
Terminated
Severity:
4 Minor
Description:

Symptom:
Configuration inconsistency alarms being raised during downgrade from 6.0.1 image to older images due to
interface PTP related configuration.
RP/0/RP0/CPU0:Sep 17 19:25:40.819 : cfgmgr-rp[162]: %MGBL-CONFIG-3-INCONSISTENCY_ALARM : A configuration inconsistency alarm has been raised. Configuration commits will be blocked until 'clear configuration inconsistency' command has been run to synchronize persistent configuration with running configuration.

Conditions:
Downgrade from XR 6.0.1 or later release to older ones on ASR9000 routers with A9K-RSP440-SE/TR or A9K-RP-SE/TR RSPs.

Workaround:
Do "clear configuration inconsistency" before proceeding with further configuration after the downgrade.

Further Problem Description:
This error message is expected as interface PTP is not supported on A9K-RSP-440 and A9K-RP RSPs in releases older than 6.0.1. Users can do clear configuration inconsistency safely to continue with the configuration.

Last Modified:
13-JAN-2016
Known Affected Releases:
6.0.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCto99989
Title:
SNMP bulk config, or load from saved config, or rollback will show error
Status:
Open
Severity:
5 Cosmetic
Description: *

Symptom:
SNMP bulk configuration, or load from saved configuration, or rollback (which include multiple SNMP commands) can cause following messages to print on console.
RP/0/RSP0/CPU0:Apr 27 19:26:59.446 : snmpd[1112]: %SNMP-SNMP-4-VIEWOID_NOT_FOUND : The command "snmp view li-view ifMIB included" could not be applied at this time because the oid "ifMIB" does not belong to a known MIB module.
RP/0/RSP0/CPU0:Apr 27 19:26:59.481 : snmpd[1112]: %SNMP-SNMP-4-VIEWOID_NOT_FOUND : The command "snmp view li-view ciscoTap2MIB included" could not be applied at this time because the oid "ciscoTap2MIB" does not belong to a known MIB module.
RP/0/RSP0/CPU0:Apr 27 19:26:59.495 : snmpd[1112]: %SNMP-SNMP-4-VIEWOID_NOT_FOUND : The command "snmp view li-view ciscoIpTapMIB included" could not be applied at this time because the oid "ciscoIpTapMIB" does not belong to a known MIB module.

Conditions:
SNMP bulk configuration, or load from saved configuration, or rollback (which include multiple SNMP commands) can cause the error messages.
This behaviour is observed since MIB is not loaded and the OID translation is not in place.
After few seconds, this get resolved and you could query the MIB successfully.

Workaround:
None. When this behavior observed during SNMP configuration for lawful intercept; it still allowed adding taps and lawful intercept functionality did not impact in any manner.

Recovery:
None. These are harmless messages and does not impact any functionality

Last Modified:
25-JAN-2016
Known Affected Releases:
4.1.0.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux88549
Title:
Replace the unknown Icon
Status:
Open
Severity:
5 Cosmetic
Description: *

Symptom:
to see the relevant icon

Conditions:
when node connected correct icon has to be display

Workaround:
no

Further Problem Description:
no

Last Modified:
20-JAN-2016
Known Affected Releases:
99.99.99.MPLS
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy00237
Title:
Rquest to add nodeID for ether-ctrl CLOG messages
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
CLOG message for the corresponding SYSLOG does not contain any LC info only the PORT info. Not able to identify on which LC the SFP port is experiencing an issue from just the CLOG message.

LC/0/0/CPU0:Nov 9 18:04:16.157 : ETHER_CTRL[161]: %PLATFORM-ETHER_CTRL-4-XCVR_WARNING : SFP for port 6 is disabled - Auto-Neg is not supported

enterprises.cisco.ciscoMgmt.ciscoSyslogMIB.ciscoSyslogMIBObjects.clogHistory.clogHistoryTable.clogHistoryEntry.clogHistMsgText.0 = SFP for port 6 is disabled - Auto-Neg is not supported
.1.3.6.1.4.1.9.9.41.1.2.3.1.6.0

Conditions:
Normal conditions

Workaround:
Syslog message will indicate the LC and specific Port

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
5.1.11.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux23668
Title:
ASR9k BNG. DHCPv6 VLAN ID lost when using geo red vMAC + ambiguous vlan
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
VLAN id is changed to 1 for DHCPv6 ADVERTISE packets

Conditions:
when doing IPoE for dual-stack or IPv6 sessions and using geo redundancy vMAC together with ambiguous VLAN on access interface

Workaround:
issue does not occur if vMAC is not used

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases: *
6.0.1.15i.BASE
Alert Type:
Updated *
Bug Id:
CSCux92100
Title:
SSTE: SRTE tunnel w/ BGP LU label conflict: ROUTING-RIB-3-LABEL_ERR_ADD
Status: *
Other
Severity: *
6 Enhancement
Description:

Symptom:
A traceroute to an SRTE tunnel destination follows a path other than the configured path

Conditions:
If the router has learned a label from BGP Labeled-Unicast in addition to the ISIS segment-routing label a "local-label conflict" can occur leaving the forwarding table out of sync with the routing table for the tunnel destination prefix.

Workaround:
This is not seen when the IBGP routers aren't advertising labeled-unicast for prefixes configured as SRTE tunnel destinations.

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
5.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv10167
Title:
ASR9K(9000v) LLDP dot1ad nni doesn't work with 3750-ME
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
SR9K(9000v) sends and expects dest MAC address 01-80-C2-00-00-0E regardless dot1d nni is configured or not. This causes interworking issue with Cisco 3750-ME device which sends and expects 01-80-C2-00-00-03 when dot1ad nni is configured. There is no problem when dot1ad nni is not configured, ethertype 0x8100.

Conditions:
3750-ME ethernet dot1ad nni is configured

Workaround:
None.

Further Problem Description:

Last Modified:
23-JAN-2016
Known Affected Releases:
5.1.3.BASE
Known Fixed Releases: *
6.0.1.12i.FWDG, 6.1.0.6i.FWDG
Alert Type:
Updated *
Bug Id:
CSCtf25353
Title:
3.9.1:20K:MSTAG/MSTP Need to clear STP/Topology-change Flush counters
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

There is no way to clear the statistics displayed the show spanning-tree ... commands.

Conditions:

No clear commands exist. This may be a problem if spanning-tree is configured and it is necessary to clear some of the recorded counters.

Workaround:

None.

Last Modified:
22-JAN-2016
Known Affected Releases:
3.9.1.BASE
Known Fixed Releases: *
6.0.1.12i.BASE, 6.1.0.1i.BASE
Alert Type:
Updated *
Bug Id:
CSCuq98340
Title:
Fix syslog format for low power alarms
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
Port_1/00 not following traditional r/s/s/i format

Conditions:
Rx power warning / alarm on optical interfaces

Workaround:
Use EEM TCL script

Further Problem Description:

Last Modified:
19-JAN-2016
Known Affected Releases:
4.3.2.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux95760
Title:
Need a mechanism to prevent all l2vpn pw-class from being removed
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
All l2vpn pw-class configuration may be deleted from the router configuration without warning

Conditions:
This problem would occur when committing "no pw-class" without specifying a pseudo-wire class name under the IOS-XR l2vpn configuration

Workaround:
None

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases:
5.3.1.BASE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux83936
Title:
MPLS LSD NSR sync taking almost 45mins after RPFO with 64 ECMP paths
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
MPLS LSD takes 45mins for NSR sync after RPFO with around 12k IGP 64 ECMP routes

Conditions:
It is due to the 64ECMP paths for 12K IGP routes. This adds up lots of memory that needs to be synced from active LSD to standby LSD before it could declare NSR ready. Due to the slowness of underneath AIPC transport layer, it takes LSD around 40 mins to finish all the message sync.

This behaviour has been there since 5.2.0, and so far we only see it with massive 64 ECMP IGP routes. Do not see it on other testbed, even with over 20K IGP routes(not 64 ECMP for every route).

Workaround:
no workaround. Just need to wait for 45 mins to trigger RPFO. The NSR sync could eventually be done, and no functional impact.

Further Problem Description:

Last Modified:
25-JAN-2016
Known Affected Releases:
5.3.3.ADMIN
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCua88441
Title:
Config DB enhancements for handling multiple AVpairs of the same type
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
On a IOS-XR platform it is only possible to push one per-user static route via radius.
Multiple AVpairs of the same type are not supported.

This includes Framed-Route or cisco-avpair "ipv4:route" or "ip:route" radius AVpairs.

The debug ppp negotiation will show the an error similar to the following:

PPP-MA[365]: %L2-PPP_MA-4-ERR_AAA_SESSION_IF : Bundle-Ether1.49.pppoe17167: Unexpected error encountered whilst receiving an activate response: 'TmplMgr' detected the 'fatal' condition 'Duplicate AAA attribute enum in attribute list'

Conditions:
This issue is seen in all versions of IOS-XR.

Workaround:
If you need multiple routes for the interface you can push one via radius and any additional ones must be configured on the router.

Last Modified:
13-JAN-2016
Known Affected Releases:
4.3.1.ROUT
Known Fixed Releases: *
5.1.0.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCuu47149
Title:
Need netflow export to be smaller than 1500bytes
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Netflow PDU's are packed into a UDP packet until the frame is 1500 bytes, this can cause fragmentation or drops when the path to the collector has a lower MTU ceiling.

Conditions:
Netflow component is able to pack PDU's all the way to 1500 bytes, this generally happens with ipv4 packets, not generally with MPLS or IPv6.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
5.1.11.BASE
Known Fixed Releases: *
5.3.3.27i.FWDG, 6.0.1.16i.FWDG
Alert Type:
Updated *
Bug Id:
CSCui20038
Title:
implement MRU ignore for PPP sessions
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
When the client signals a low MRU we honor that value and apply that as MTU on the subscriber interface.
This can lead to a need for fragmentation, for which XR has no support in general.

Conditions:
client signaling low MRU

Workaround:
fix the MTU config statically (has limtiations).

Further Problem Description:
Need the ability to override and ignore the client signaled MRU and use the BNG lcoally defined MRU/MTU value.

Last Modified:
12-JAN-2016
Known Affected Releases:
4.3.1.BASE
Known Fixed Releases: *
4.3.4.13i.FWDG, 5.1.1.9i.FWDG, 5.1.11.4i.FWDG, 5.1.2.1i.FWDG, 5.2.0.2i.FWDG
Alert Type:
Updated *
Bug Id:
CSCup73586
Title:
Support for default route installation via Framed-IPv6-Route on BNG
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Currently, on ASR9k platform it is impossible to install default route through Framed-IPv6-Route attribute sent from Radius.

Conditions:
ASR9k with BNG

Workaround:
Configure static default route manually on device.

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
5.1.2.BASE
Known Fixed Releases: *
5.3.0.12i.FWDG
Alert Type:
Updated *
Bug Id:
CSCux81504
Title:
No PPPoE subscribers authentication and accounting info in BNG Syslog
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
No PPPoE subscribers authentication and accounting info in Syslog

Conditions:
using BNG

Workaround:
No workaround

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
5.3.2.ROUT
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux98447
Title:
ASR9K: Remove L2 padding for incoming ipv6 packets
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
BFD v6 fails to come up on Typhoon and Tomahawk Line cards if the peer sends BFD v6 packets with unwanted L2 padding

Conditions:
The BFD v6 peer is sending packets with around 100 bytes of additional L2 padding.
It is applicable to Tomahawk and Typhoon Line cards.
All IOS-XR versions are impacted.

Workaround:
None

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
5.3.2.FWDG
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论