Cisco Blog » The Platform

2016年2月1日星期一

Cisco Notification Alert -Nexus 3000 Series Switch-01-Feb-2016 18:18 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3264Q Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)IX1(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.IX1.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)IX1(2a)

File Release Date:
19-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3232C Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)IX1(2a)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.IX1.2a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
19-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3264Q Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)IX1(2a)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.IX1.2a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
19-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3232C Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)IX1(2a)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.IX1.2a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)IX1(2a)

File Release Date:
19-JAN-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 3000 Series Switches

Alert Type:
New
Bug Id:
CSCuv54592
Title:
Additional secondary IPv6 addresses removed on upgrade to Camden
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
In 6.X and previous NXOS versions the "secondary" keyword is required to add multiple IPv6 addresses to an interface as with the IPv4 behavior. In 7.X NXOS versions, the "secondary" keyword is no longer needed to match RFC. When upgrading from 6.X to 7.X code, the IPv6 secondary keywords will be removed correctly in order to maintain all IPv6 addresses configured on interfaces.

Conditions:
In 6.X and previous NXOS versions the "secondary" keyword is required to add multiple IPv6 addresses to an interface as with the IPv4 behavior. In 7.X NXOS versions, the "secondary" keyword is no longer needed to match RFC. When upgrading from 6.X to 7.X code, the IPv6 secondary keywords will be removed correctly in order to maintain all IPv6 addresses configured on interfaces.

Workaround:
In 6.X and previous NXOS versions the"secondary" keyword is required to configure multiple IPv6 address on an interface. Starting in 7.X NXOS code, the secondary keyword is no longer needed.

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
7.0(3)I2(0.495)
Known Fixed Releases:
7.0(3)I2(0.546), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCui77564
Title:
N3K Netstack Crash at pthread_create() When Adding/Removing "feaure nat"
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A Nexus 3k switch may crash due to the "Netstack" process when adding or removing the command "feature nat"

Conditions:
The odds of hitting the conditions for the crash increase as "feature nat" is added and removed more frequently. However, this is not to say it can't be seen on a first attempt in rare cases.

Workaround:
None

Further Problem Description:
The "Netstack" process was crashing when generating a new thread due to address overlap between stack space and shared memory. This is a more general problem due to an un-intentional 2G/2G userspace/kernelspace split in memory. This bug was fixed by reverting back to 3G/1G split.

Last Modified:
06-JAN-2016
Known Affected Releases:
6.0(2)A2(2)
Known Fixed Releases:
6.0(2)A1(1c), 6.0(2)U1(3)
Alert Type:
New
Bug Id:
CSCuy05940
Title:
mac inconsistency on N3K-C3048TP
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Mac address on N3K-C3048TP-1GE showing inconsistent entries in software and broadcom on N3k.

Software says it is learning from uplink po1 (which is correct) but broadcom says it is learning from vpc peer-link po2 (incorrect). As a result packet travels peer-link and is dropped by facing vpc peer.
tor1.fc19.l8# show consistency-checker l2 module 1 | in "0025.9078.0980|Extra|Missing|VLAN"
Missing entries in the HW MAC Table
VLAN MAC Address Type age Secure NTFY Ports
* 178 0025.9078.0980 dynamic 0 F F Po1
* 181 0025.9078.0980 dynamic 0 F F Po1
* 808 0025.9078.0980 dynamic 0 F F Po1
Extra and Discrepant entries in the HW MAC Table
VLAN MAC Address Type age Secure NTFY Ports
808 0025.9078.0980 dynamic 0 F F vPC Peer-Link
178 0025.9078.0980 dynamic 0 F F vPC Peer-Link
181 0025.9078.0980 dynamic 0 F F vPC Peer-Link

Conditions:

Workaround:
If there are no inconsistencies seen on other vpc peer switch, shift the traffic to this box by shutting down the vpc leg going to affected switch.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux82174
Title:
Dynamic buffer alloc failure when congestion on port1,5,9,13,33,37,41,45
Status:
Terminated
Severity:
2 Severe
Description: *

Symptom:
dynamic buffer allocation failure lead to packet drops in under utilized ports as well.

Conditions:
when any one of the following ports get congested 1,5,9,13,33,37,41,45

Workaround:

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U2(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus74195
Title:
Incorrect parity handling for certain tables on T2
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Nexus 3132/3172 switches (T2-based switches) may experience an incorrect soft parity error recovery that can result in packet loss for one or more affected traffic flows. This is the result of a Broadcom SDK defect impacting Software Error Recovery (SER) functionality, which automates the recovery of soft memory parity errors. Known affected memory tables are the L2_ENTRY and L3 LPM tables. Software releases prior to 6.0(2)U3(4) may also experience an unexpected reload due to plog_sup process crash.

A syslog message with the following format is associated with incorrect parity error recovery and can be used to identify the presence of this defect on a device (though there are certain conditions where this defect can be triggered without generation of such as syslog event):

%USER-3-SYSTEM_MSG: bcm_usd_isr_switch_event_cb_log:: slot_num 0, event , memory error type: (0xaddress), table name:

(
), index: - bcm_usd

Sample messages:

%USER-3-SYSTEM_MSG: bcm_usd_isr_switch_event_cb_log:805: slot_num 0, event 2, memory error type: Correction(0x5), table name: L2 table(0x7d6), index: 62432 bcm_usd

%USER-3-SYSTEM_MSG: bcm_usd_isr_switch_event_cb_log_new_fmt:805: slot_num 0, event 2, memory error type: Correction(0x9), table name: L3 LPM table(0x7fe), index: 2685

Conditions:
Nexus 3132/3172 switches (T2-based switches)

Workaround:
1) reload should recover from the condition temporarily.
2) Software upgrade.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A4(3.41), 6.0(2)A4(3.42), 6.0(2)A4(4), 6.0(2)U4(3.41), 6.0(2)U4(3.42), 6.0(2)U4(4), 6.0(2)U5(1)
Alert Type:
Updated *
Bug Id:
CSCus43770
Title:
BSR RP information lost for more than 67 group
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When we have a RP for 67 multicast group we see RP information for all of these one . When we add 68 group rest of 67 group RP information is lost

Conditions:
issue occurs only when there are more than 67 groups .

Workaround:
NA

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.2(0)VX(0.60)
Known Fixed Releases: *
6.0(2)A6(0.62), 6.0(2)A6(1), 6.0(2)U6(0.62), 6.0(2)U6(1), 7.0(3)F1(0.168), 7.0(3)I2(1.66), 7.0(3)I2(2), 7.0(3)I3(0.153), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCux68642
Title: *
LH 1G transceiver is not coming up in 7.0(3)I2(2.70)
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
When front portmode is changed to sfp plus and we insert a 1g fiber sfp the link stays in not connected state

Conditions:
When customer tries to use the sfp plus ports on 3132 boxes with 1g fiber sfps after running speed 1000 command

Workaround:
none

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.0(3)I2(2.34)
Known Fixed Releases:
7.0(3)I2(2.78), 7.0(3)I2(3)
Alert Type:
Updated *
Bug Id:
CSCuv29193
Title:
ECMP route installed with single NH in certain scenario
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In certain conditions a prefix that is ECMP is installed with single NH

Conditions:
This is seen in the following conditions

ECMP table usage crosses and comes below maximum group usage (64)
There are 16 SVI over which ECMP adjacencies are learnt
These 16 SVI ride on a single physical link
All 16 SVI are flapped aggressively

Workaround:
Clear the entire v4 and v6 routing table

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases: *
6.0(2)U6(1), 6.0(2)U6(1.72)
Known Fixed Releases:
6.0(2)A6(3.74), 6.0(2)A6(4), 6.0(2)U3(7.106), 6.0(2)U3(8), 6.0(2)U3(9), 6.0(2)U6(1.74), 6.0(2)U6(2)
Alert Type:
Updated *
Bug Id:
CSCux98881
Title:
Neptune: packet loss due to runts and CRC errors after reload or upgrade
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
Packet loss due to runts and CRC errors after reload or upgrade. BGP Keepalives are dropped, causing route churn and trafficis black holed.

Conditions:
When a 3132 running 6.0(2)U6(4) is connected to another 3132 running 6.0(2)U3(3) . Triggers on normal reload or regular Upgrade to 6.0(2)U3(4) and above. Takes about 3 to 4 reloads to trigger the issue.
Not applicable to Fast-reload cases

Workaround:
Workaround:
Admin shut and unshut the ports

Preventive methods:
1) Move ports to "shut" mode on connected peer switchs running 6.0(2)U3(3) and below.
2) After upgrade or regular reload is fully complete, unshut the ports on peer switches




Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U3(2), 6.0(2)U3(8), 6.0(2)U5(3), 6.0(2)U6(4)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux99853
Title:
bcm_usd service crash
Status:
Other
Severity:
2 Severe
Description:

Symptom:
A Nexus3000 switch may reload unexpectedly, a bcm_usd core will be generated.

`show cores`
VDC Module Instance Process-name PID Date(Year-Month-Day Time)
--- ------ -------- --------------- -------- -------------------------
1 1 1 bcm_usd 1234

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
7.0(3)I1(1.251)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu78074
Title: *
Cisco Nexus 3000 / Nexus 9000 ARP Denial of Service (DoS) Vulnerability
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in the Address Resolution Protocol (ARP) input packet
processing of the Cisco Nexus Operating System (NX-OS) devices
unauthenticated, adjacent attacker to cause a denial of service (DoS)
condition.

The vulnerability is due to improper input validation of the ARP packet and
the Maximum Transmission Unit (MTU) size which results in a buffer overflow
which can cause the DoS condition. An attacker could exploit this vulnerability
by sending a crafted ARP packet to the device. An exploit could allow the attacker
to cause the device to be unavailable due to a DoS condition of the ARP module.

Conditions:
Device running with default configuration running an affected version of software.

Workaround:
The MTU size should be configured lower.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4323 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
16-JAN-2016
Known Affected Releases:
7.0(3)I2(0.373), 7.3(0)ZN(0.9)
Known Fixed Releases:
7.0(3)I1(2.15), 7.0(3)I1(3), 7.0(3)I2(0.377), 7.0(3)I2(1), 7.0(3)ITI2(1), 7.0(3)ITI2(1.36), 8.3(0)CV(0.72)
Alert Type:
Updated *
Bug Id:
CSCui63140
Title:
Duplicates seen when IIF for (S,G) is different from that of (*,G)
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Duplicate multicast traffic seen periodically in a network with N3K platform.

Conditions:
In a network with N3K where (S,G) and (*,G) entries have different incoming interface, if multicast traffic comes down the (*,G) tree, the traffic wont be dropped, instead will be forwarded out all the interfaces in the OIFL of (*,G) entry.

Workaround:
Use the 'hardware profile multicast prefer-source-tree eternity' command to drop any traffic coming in on the (*,G) incoming interface, a new 'limit ' is added to this CLI to specify the number of (S,G)s for which this duplication should be prevented.

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
6.0(2)U1(1.122)
Known Fixed Releases:
6.0(2)A2(1), 6.0(2)U1(2), 6.0(2)U2(1), 6.0(2)U3(0.22), 6.0(2)U3(1)
Alert Type:
Updated *
Bug Id:
CSCun82427
Title:
Nexus 3000: Multicast feed not flooded out mrouter port to PIM DR
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
A multicast source feed is received on a Nexus 3000 from a directly connected server does not get flooded out the mrouter port to the PIM-DR. It gets silently dropped.

Conditions:
Issue occurs when the mrouter port is a port channel with "hardware multicast hw-hash" added under the interface config and the switch is then upgraded to 6.0(2)U2(2). After the upgrade that line will be missing from the running config.

Workaround:
Workaround 1:
- Remove "hardware multicast hw-hash" from all port-channels prior to upgrade
- After upgrade is complete re-add "hardware multicast hw-hash" back to all port channels

Workaround 2:
If the upgrade is performed without removing "hardware multicast hw-hash" follow these steps:
- backup the config
- erase the config (write erase and reload)
- re-apply the config
- add "hardware multicast hw-hash" back to the port channels

Workaround 3:
If the upgrade is performed without removing "hardware multicast hw-hash" follow these steps:
- Roll back to 5.0(3)U3(X)
- Remove "hardware multicast hw-hash"
- Save config
- Upgrade to 6.0(2)U2(2)
- Add "hardware multicast hw-hash" back to the port channels after upgrade

Workaround 4:
The "multicast hardware hw-hash" command is not needed in Nexus 3000/3100/3500 platforms as the hardware hashing is done by default and please do NOT use this command.

Further Problem Description:
Refer CSCuo24740 where change in documentation is requested.

Last Modified:
14-JAN-2016
Known Affected Releases:
6.0(2)U2(2)
Known Fixed Releases:
6.0(2)U3(0.685), 6.0(2)U3(1)
Alert Type:
Updated *
Bug Id:
CSCux33013
Title:
Nexus 3k crash with "mtc_usd hap reset".
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Device can crash with "mtc_usd hap reset" as interrupt for virtual-time rate shaping is triggered.

Conditions:
Suspicious control plane traffic is flooded to mgmt0 interface.

Workaround:
Potential Workarounds:
- disconnect mgmt0 interface.
- find the source of excessive PDUs that are flooded to mgmt0 interface.

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
6.0(2)A7(1)
Known Fixed Releases:
6.0(2)A6(5.187), 6.0(2)A6(5.188), 6.0(2)A6(6), 6.0(2)A7(0.17), 6.0(2)A7(1), 6.0(2)U7(0.17), 6.0(2)U7(1)
Alert Type:
Updated *
Bug Id:
CSCut86141
Title:
SFP-H10GB-CU2.255M, hardware type changed to No-Transceiver on N3k
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
SFP not detected on the ports. The same SFP works on other ports

Conditions:
interface remain down with following error
%ETHPORT-5-IF_HARDWARE: Interface Ethernet1/30, hardware type changed to No-Transceiver

in the bcm_shell interface shows FAUTL remote

bcm-shell.0> port 8
PORT: Status (* indicates PHY link up)
xe7 LS(SW) Forced(10GFD) STP(Disable) Lrn(ARL,FWD) UtPri(0) Pfm(FloodNone) IF(SFI) Max_frame(1518) MDIX(ForcedNormal, Normal) Medium(Copper) Fault(Remote) VLANFILTER(3)

Workaround:
power drain of the switch seems to be recovering the issue some times

Further Problem Description:
In the problem state it seems that the driver is saturated due to larger value of idrv, predrv SI values. Updating the new set of SI setting solves the issue.

Last Modified:
12-JAN-2016
Known Affected Releases:
6.0(2)U5(0.37)
Known Fixed Releases:
6.0(2)A6(2.45), 6.0(2)A6(2.61), 6.0(2)A6(3), 6.0(2)A6(3.76), 6.0(2)A6(4), 6.0(2)U6(1.45), 6.0(2)U6(1.61), 6.0(2)U6(1.76), 6.0(2)U6(2)
Alert Type:
Updated *
Bug Id:
CSCuv48722
Title:
3048T : After upgrade to 6.0(2)U3(8), 100 M links are down.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
100 m links stay down after upgrade to 6.0(2)U3(8).

Conditions:
100 M links peer configured in HD

Workaround:
configure AN and set the speed or set the other end of the peer with FD

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U3(7.99)
Known Fixed Releases: *
6.0(2)A6(5), 6.0(2)U6(3.123), 6.0(2)U6(4), 7.0(3)F1(0.168), 7.0(3)I2(1.82), 7.0(3)I2(2)
Alert Type:
Updated *
Bug Id:
CSCux89481
Title:
Removed FRUs are not listed as absent or not-present in N3K comp to N5K
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When customer removes one of the powersupplies show environment power will not display any information about that powersupply. Ideally it should display that the powersupply is absent.

Conditions:
remove one of the power supplies

Workaround:
none

Further Problem Description:
With this fix the cli will display that the power supply is absent

Last Modified:
31-JAN-2016
Known Affected Releases:
7.0(3)I2(2.70)
Known Fixed Releases:
7.0(3)I2(2.75), 7.0(3)I2(3), 7.0(3)I3(0.281), 7.0(3)I3(1)
Alert Type:
New
Bug Id:
CSCux87710
Title:
NX-OS 3500 Distributed reflective denial-of-service vulnerability NTP
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
A vulnerability in Network Time Protocol (NTP) package of Cisco NX-OS Software and Cisco Multilayer Director Switch (MDS) could allow an unauthenticated, remote attacker to
cause a Denial of Service (DoS) condition on an affected device.

The vulnerability is due to processing of MODE_PRIVATE (Mode 7) NTP control messages which have a large amplification vector. An attacker could exploit this vulnerability by
sending Mode 7 control requests to NTP servers and observing responses amplified up to 5500 times in size. An exploit could allow the attacker to cause a Denial of Service (DoS)
condition where the affected NTP server is forced to process and respond with large response data.

Conditions:
This is a day 1 issue and all versions of NX-OS and MDS with support for NTP are vulnerable.

Fixed Software:

This bug will apply to the Cisco Nexus 7000 (N7K), Cisco Nexus 6000 (N6K), Cisco Nexus 5000 (N5K)
and Cisco Multilayer Director Switch (MDS) and the fix is currently targeted for a release towards the end of
CY2015.

Cisco NX-OS Software and Cisco MDS switches are vulnerable to attacks utilizing Mode 7 NTP requests. Mode 7 requests can have amplification vector up to 5500.

To see if a device is configured with NTP, log into the device and issue the CLI command
''show running-config | include ntp''. If the output returns either of the following commands
listed then the device is vulnerable:

ntp master
ntp peer
ntp server
ntp broadcast client
ntp multicast client

For a Cisco MDS switch to confirm the NTP feature is disabled:

# show running-config | include ''no feature ntp
no feature ntp

Information about Cisco NX-OS and MDS Software release naming conventions is available in
''White Paper: Cisco IOS and NX-OS Software Reference Guide'' at the following link:
http://www.cisco.com/web/about/security/intelligence/ios-ref.html

Workaround:
There are no solid workarounds other than disabling NTP on the device via the ''no feature ntp'' command. The following mitigations have been identified for this vulnerability; only
packets destined for any configured IP address on the device can exploit this vulnerability. Transit traffic will not exploit this vulnerability.

Note: NTP peer authentication is not a workaround and is still a vulnerable configuration.

* NTP Access Group

Warning: Because the feature in this vulnerability utilizes UDP as a transport, it is possible to spoof the
sender's IP address, which may defeat access control lists (ACLs) that permit communication to these ports
from trusted IP addresses. Unicast Reverse Path Forwarding (Unicast RPF) should be considered to be used in conjunction to offer a better mitigation solution.

Additionally, ''serve-only'' keyword added to the NTP access-group will limit the exposure of the server to
only respond to valid queries.

Note: NTP Access Group groups are not supported by the Cisco MDS switch.

For additional information on NTP access control groups, consult the document titled ''Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 4.x'' at
the following link:

http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/system_management/configuration/guide/sm_3ntp.html

* Infrastructure Access Control Lists

Warning: Because the feature in this vulnerability utilizes UDP as a transport, it is possible to spoof the
sender

Last Modified:
19-JAN-2016
Known Affected Releases:
7.3(0)ZN(0.98)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw20837
Title:
PO delete fails with "port-channel membership is being updated" error
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Po delete attempt fails with error "failed to delete port-channel1: port-channel membership is being updated"

Conditions:
1) When one of the member port is in "suspended" state. AND 2) po members belong to 2 separate channel groups OR 3) PO is connect to 2 separate switches

Workaround:
Remove the member port in 'S' state before deleting the PO

Further Problem Description:
Allowed deletion of port-channel members in Suspended state also

Last Modified:
22-JAN-2016
Known Affected Releases:
6.0(2)U3(5.95)
Known Fixed Releases: *
6.0(2)A6(5.209), 6.0(2)A6(6), 6.0(2)U6(5.209), 6.0(2)U6(6)
Alert Type:
Updated *
Bug Id:
CSCuv95675
Title:
Fast-reload upgrade from U6 to Camden delayed in applying qos config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On N3064 device when executing a fast-reload upgrade from U6 to Camden, the network qos config gets delayed in being applied which causes long convergence time.

Conditions:
On N3064 device when executing a fast-reload upgrade from U6 to Camden, the network qos config gets delayed in being applied which causes long convergence time.

Workaround:
None

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
7.0(3)I2(0.580), 7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(0.596), 7.0(3)I2(0.597), 7.0(3)I2(1), 7.0(3)IMK2(1), 7.0(3)IMK2(1.65), 7.0(3)ITI2(1), 7.0(3)ITI2(1.37), 8.3(0)CV(0.248), 8.3(0)KMS(0.31)
Alert Type:
Updated *
Bug Id:
CSCuw40975
Title:
GRE tunnel terminating on N3K drops OSPF packets with ttl not 1 in hw
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Establishing an OSPF neighbor over a tunnel interface terminating on a Nexus 3100 switch will fail if the sending device is transmitting the OSPF packets with a TTL value greater than 1.

These OSPF packets will be dropped in hardware and not sent to the cpu for further processing.

Conditions:
The GRE tunnel must be terminating on the Nexus 3100 switch, and the GRE payload must be an ip OSPF packet with the TTL set to a value other than 1.

Workaround:
This configuration will work on other Cisco devices, however, RFC 2328 - OSPF Version 2 states the following:

Use of IP multicast. Some OSPF messages are multicast, when
sent over broadcast networks. Two distinct IP multicast
addresses are used. Packets sent to these multicast addresses
should never be forwarded; they are meant to travel a single hop
only. To ensure that these packets will not travel multiple
hops, their IP TTL must be set to 1.

The only workaround is to correct the OSPF implementation on the sending device.

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(2.60), 7.0(3)I2(3), 7.0(3)I3(0.141), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.10)
Alert Type:
New
Bug Id:
CSCux99069
Title:
No syslog messages for DOM thresholds overrruns
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
You can observe persistent FCS-err on eth interface in case of significant optical attenuation. Despite DOM is able to detect the high/low threshold overruns, it will not generate a message to syslog:

show interface e1/52 counters errors

--------------------------------------------------------------------------------
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
--------------------------------------------------------------------------------
Eth1/52 0 51 0 51 0 0

--------------------------------------------------------------------------------
Port Single-Col Multi-Col Late-Col Exces-Col Carri-Sen Runts
--------------------------------------------------------------------------------
Eth1/52 0 0 0 0 0 0

--------------------------------------------------------------------------------
Port Giants SQETest-Err Deferred-Tx IntMacTx-Er IntMacRx-Er Symbol-Err
--------------------------------------------------------------------------------
Eth1/52 0 -- 0 0 0 0

Conditions:
show interface e1/52 transceiver details
Ethernet1/52
transceiver is present
type is 10Gbase-LR
name is CISCO-FINISAR
part number is FTLX1474D3BCL-C1
revision is A
serial number is FNS18120RW4
nominal bitrate is 10300 MBit/sec
Link length supported for 9/125um fiber is 10 km
cisco id is --
cisco extended id number is 4

SFP Detail Diagnostics Information (internal calibration)
----------------------------------------------------------------------------
Current Alarms Warnings
Measurement High Low High Low
----------------------------------------------------------------------------
Temperature 23.68 C 75.00 C -5.00 C 70.00 C 0.00 C
Voltage 3.27 V 3.63 V 2.97 V 3.46 V 3.13 V
Current 38.19 mA 70.00 mA 1.00 mA 68.00 mA 2.00 mA
Tx Power -2.22 dBm 3.49 dBm -12.21 dBm 0.49 dBm -8.21 dBm
Rx Power -20.00 dBm -- 3.49 dBm -18.53 dBm 0.49 dBm -14.43 dBm
----------------------------------------------------------------------------
Note: ++ high-alarm; + high-warning; -- low-alarm; - low-warning

Workaround:
NONE

Only manual monitoring of DOM statistics through the "show interface <> transceiver details"

Further Problem Description:
show logging logfile
2015 Aug 13 16:47:33 sh122-mgt-a1 %SYSLOG-1-SYSTEM_MSG : Logging logfile (log.text) cleared by user
2015 Aug 13 16:50:20 sh122-mgt-a1 %ETHPORT-5-IF_ADMIN_UP: Interface Ethernet1/52 is admin up .
2015 Aug 13 16:50:21 sh122-mgt-a1 %ETHPORT-5-SPEED: Interface Ethernet1/52, operational speed changed to 10 Gbps
2015 Aug 13 16:50:21 sh122-mgt-a1 %ETHPORT-5-IF_DUPLEX: Interface Ethernet1/52, operational duplex mode changed to Full
2015 Aug 13 16:50:21 sh122-mgt-a1 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/52, operational Receive Flow Control state changed to off
2015 Aug 13 16:50:21 sh122-mgt-a1 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/52, operational Transmit Flow Control state changed to off
2015 Aug 13 16:50:21 sh122-mgt-a1 %CDP-5-NEIGHBOR_ADDED: Device d42-mgt-c6.ftc.ru(FOC1837R1BS) discovered of type N3K-C3048TP-1GE with port Ethernet1/52 on incoming port Ethernet1/52 with ip addr 192.168.78.2
11 and mgmt ip 192.168.78.211
2015 Aug 13 16:50:24 sh122-mgt-a1 %ETH_PORT_CHANNEL-5-PORT_UP: port-channel3048: Ethernet1/52 is up<

Last Modified:
26-JAN-2016
Known Affected Releases:
6.2(5)MD
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux38660
Title:
Encoder error on executing `show lldp neighbor | xml`
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When running `show lldp neighbor | xml` or `show lldp neighbor | json` chassis may response with `encoder error` message

Conditions:
So far issue was observed on N3K-C3164PQ running 7.0(3)I1(2). Please note, other NX-OS version may also be affected.

Workaround:
As temporary workaround, you may use `show lldp neighbor detail | xml` or `show lldp neighbor detail | json`

Further Problem Description:
True cause is under investigation

Last Modified:
26-JAN-2016
Known Affected Releases:
7.0(3)I1(1.251)
Known Fixed Releases: *
7.0(3)I2(2.55), 7.0(3)I2(3), 7.0(3)I3(0.191), 7.0(3)I3(0.192), 7.0(3)I3(1), 7.0(3)IAB3(0), 7.0(3)IAB3(0.53), 7.0(3)IDP3(1.62), 7.0(3)IDP3(2)
Alert Type:
Updated *
Bug Id:
CSCuv17837
Title: *
NX-OS N3K Distributed reflective denial-of-service vulnerability NTP
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
A vulnerability in Network Time Protocol (NTP) package of Cisco NX-OS Software and Cisco Multilayer Director Switch (MDS) could allow an unauthenticated, remote attacker to
cause a Denial of Service (DoS) condition on an affected device.

The vulnerability is due to processing of MODE_PRIVATE (Mode 7) NTP control messages which have a large amplification vector. An attacker could exploit this vulnerability by
sending Mode 7 control requests to NTP servers and observing responses amplified up to 5500 times in size. An exploit could allow the attacker to cause a Denial of Service (DoS)
condition where the affected NTP server is forced to process and respond with large response data.

Conditions:
This is a day 1 issue and all versions of NX-OS and MDS with support for NTP are vulnerable.

Fixed Software:

This bug will apply to the Cisco Nexus 7000 (N7K), Cisco Nexus 6000 (N6K), Cisco Nexus 5000 (N5K)
and Cisco Multilayer Director Switch (MDS) and the fix is currently targeted for a release towards the end of
CY2015.

Cisco NX-OS Software and Cisco MDS switches are vulnerable to attacks utilizing Mode 7 NTP requests. Mode 7 requests can have amplification vector up to 5500.

To see if a device is configured with NTP, log into the device and issue the CLI command
''show running-config | include ntp''. If the output returns either of the following commands
listed then the device is vulnerable:

ntp master
ntp peer
ntp server
ntp broadcast client
ntp multicast client

For a Cisco MDS switch to confirm the NTP feature is disabled:

# show running-config | include ''no feature ntp
no feature ntp

Information about Cisco NX-OS and MDS Software release naming conventions is available in
''White Paper: Cisco IOS and NX-OS Software Reference Guide'' at the following link:
http://www.cisco.com/web/about/security/intelligence/ios-ref.html

Workaround:
There are no solid workarounds other than disabling NTP on the device via the ''no feature ntp'' command. The following mitigations have been identified for this vulnerability; only
packets destined for any configured IP address on the device can exploit this vulnerability. Transit traffic will not exploit this vulnerability.

Note: NTP peer authentication is not a workaround and is still a vulnerable configuration.

* NTP Access Group

Warning: Because the feature in this vulnerability utilizes UDP as a transport, it is possible to spoof the
sender's IP address, which may defeat access control lists (ACLs) that permit communication to these ports
from trusted IP addresses. Unicast Reverse Path Forwarding (Unicast RPF) should be considered to be used in conjunction to offer a better mitigation solution.

Additionally, ''serve-only'' keyword added to the NTP access-group will limit the exposure of the server to
only respond to valid queries.

Note: NTP Access Group groups are not supported by the Cisco MDS switch.

For additional information on NTP access control groups, consult the document titled ''Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 4.x'' at
the following link:

http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/system_management/configuration/guide/sm_3ntp.html

* Infrastructure Access Control Lists

Warning: Because the feature in this vulnerability utilizes UDP as a transport, it is possible to spoof the
sender

Last Modified:
18-JAN-2016
Known Affected Releases:
5.0(3)U5(1b)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux75065
Title:
N3K - Unable to remove flowcontrol config on interfaces
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Box locks up often. All ports stop working but appear to be OK.
At a closer look, notice that the TX unicast counters do not increase on the interfaces we were testing with meaning we were not putting the packets in the line.

Conditions:
"flowcontrol receive on" configured
and/or "flowcontrol send on" configured.

Workaround:
Copy the running-config to bootflash. Export from bootflash, open with notepad++ or similar, and remove all the flowcontrol lines from the interfaces config. Write erase the box, then re-add the configurations after removing all flowcontrol config from the interfaces.

Further Problem Description:

Last Modified:
06-JAN-2016
Known Affected Releases:
6.0(2)U6(3.114)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw02037
Title:
Cisco NX-OS Malformed ARP Header Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A vulnerability in Address Resolution Protocol (ARP) feature of the Cisco Nexus Operating System (NX-OS) could allow an
unauthenticated, adjacent attacker to cause a partial denial of service (DoS) condition due to the ARP process unexpectedly
restarting.

The vulnerability is due to improper input validation of the fields in the ARP packet header. An attacker could exploit this
vulnerability by sending a crafted ARP packet from an adjacent network to the affected device. An exploit could allow the
attacker to cause a partial DoS condition because the ARP process could unexpectedly restart when processing the
crafted ARP packet.

Conditions:
Device running with default configuration running an affected version of software.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2015-6277 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-JAN-2016
Known Affected Releases:
7.3(0)ZD(0.47)
Known Fixed Releases: *
6.0(2)A6(5.193), 6.0(2)A6(6), 6.0(2)A7(0.228), 6.0(2)A7(1), 6.0(2)U6(4.193), 6.0(2)U6(5), 6.0(2)U7(0.228), 6.0(2)U7(1)
Alert Type:
New
Bug Id:
CSCuw17399
Title:
EPMR8:N3K:Active optical cable does not show up transceiver details.
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When you check the transceiver details after an active optical cable of length seven meters is connected from the Cisco UCS VIC 1387 adapter to a Nexus 3016Q switch, it fails to detect the QSFP type. When we check the transceiver details, it does not detect the QSFP type of connector.

Conditions:

Workaround:
None.

Further Problem Description:

Last Modified:
07-JAN-2016
Known Affected Releases:
5.0(3)U5(1g)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux40831
Title:
Packets not sent out of interfaces when priority level config is applied
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
N3k might stop transmitting packets on some interfaces, during the issue the affected interfaces remain in "Up" state.

Conditions:
The issue might happen when priority level command is applied for 'qos-group 7' in global output queuing policy;
This issue is specific to 40G ports on N3172 switches

Workaround:
Remove priority level command from 'qos-group 7' and reload the device

Further Problem Description:

Last Modified:
07-JAN-2016
Known Affected Releases:
6.0(2)U5(2), 6.0(2)U6(1), 6.0(2)U6(4)
Known Fixed Releases:
6.0(2)A6(5.184), 6.0(2)A6(6), 6.0(2)U6(4.184), 6.0(2)U6(5)
Alert Type:
Updated *
Bug Id:
CSCuj59318
Title:
Show platform fwm info mac only logs the first and last operation
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
show platform info mac is supposed to log the last 35 operations for MAC address insertion or removal. The command only log the last operation and the first operation in Mac history. Below is a sample output:
N3K#show platform fwm inf mac EEEE.EEEE.EEEE 112:
mac vlan 1.112 mac EEEE.EEEE.EEEE: vlan 1.112
mac vlan 1.112 mac EEEE.EEEE.EEEE: learned-on Eth1/3 age 10 ref_map = 'vlan if' <--- last operation
mac vlan 1.112 mac EEEE.EEEE.EEEE: nohit_count 0 hw_programmed 1 mac_clone 1, hw
_leant 0
mac vlan 1.112 mac EEEE.EEEE.EEEE: clone from VLAN: 0
mac vlan 1.112 mac EEEE.EEEE.EEEE: old_if_index 'null'
mac vlan 1.112 mac EEEE.EEEE.EEEE: pss_flags 0
mac vlan 1.112 mac EEEE.EEEE.EEEE cfg attrs - not-cli-cfg not-static movable no-
drop no-regmac non-netstack-learnt not-secure not-src-drop
mac vlan 1.112 mac EEEE.EEEE.EEEE: mcec_flags 0x1, mac_info_flags 0, rem_if 0, s
ync_count 0 rcv_count 0
mac vlan 1.112 mac EEEE.EEEE.EEEE: CDCE Address 0:0:0:0:0:0


Mac history (Last 35 operations): <--- suppose to log the last 35 operations. Only one is logged
Total operations: 1:
Operation: Mac create (9)
(flags: Loc (0x1) mac_info_flags (0x200) if: 0x1a004000 hint: 0)
at Wed Oct 2 23:27:14 2013

N3K# sh interface snmp-ifindex | in 1a004000
Eth1/5 436224000 (0x1a004000)

Conditions:
this bug is verified exists in 6.0(2)U1(2)

Workaround:
None

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U1(2)
Known Fixed Releases:
6.0(2)U2(0.30), 6.0(2)U2(1)
Alert Type:
Updated *
Bug Id:
CSCux05817
Title:
CR4 cables are not displaying PID
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
CR4 cables not displaying PID QSFP-H40G-CUXM and displaying type as QSFP-40G-CR4

Conditions:
CR4 cables only

Workaround:
Added the pid for CR4 cable as QSFP-H40G-CUXM whose type is QSFP-40G-CR4. The pid information will be displayed in a new field called "Cisco product id" at the bottom.

Further Problem Description:

Last Modified:
27-JAN-2016
Known Affected Releases:
7.0(3)I2(1)
Known Fixed Releases: *
7.0(3)I2(2.81), 7.0(3)I2(3)
Alert Type:
Updated *
Bug Id:
CSCup42948
Title:
IPv6 ping fail after configuring correct add in a duplicate add scenario
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When we have same ipv6 address configured on both the SVIs (on either side of a L2 ether channel link) and then if we configure the correct ipv6 address on one side, ping6 fails.
this is seen if N3064 has 6.0(2)U3(1) or 6.0(2)U3(2) image

Conditions:
N3064 has the above images and SVIs are configured with duplicate IPv6 address and then the peer switch is configured with the correct ipv6 address

Workaround:
flap the SVI on the N3064 switch

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases: *
6.0(2)U4(1)
Alert Type:
Updated *
Bug Id:
CSCuq83575
Title:
Improve serviceability of message neutron_usd - failed to set mux addr
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
This is not a software bug. It is an enhancement request to improve the serviceability of the following error message:
%KERN-3-SYSTEM_MSG: [2654954.489403] neutron_usd - failed to set mux addr 0xYY ch Y err Y -
kernel

Conditions:
This bug applies to software up to 6.0(2)U3(3)

Workaround:
none

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases: *
6.0(2)A5(1.38), 6.0(2)A5(2), 6.0(2)A6(1.90), 6.0(2)A6(2), 6.0(2)U5(1.38), 6.0(2)U5(2), 6.0(2)U6(0.90), 6.0(2)U6(1), 7.0(3)F1(0.168), 7.0(3)I2(1.69)
Alert Type:
New
Bug Id:
CSCui93304
Title:
Nexus 3000 Kernel NVRAM traces are not saved every time
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Kernel NVRAM traces may not be saved following a kernel panic

Conditions:
Unknown

Workaround:
None

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
5.0(3)U3(2b)
Known Fixed Releases:
6.0(2)U3(0.688), 6.0(2)U3(1)
Alert Type:
Updated *
Bug Id:
CSCux41329
Title:
Evaluation of nexus-3500 for OpenSSL December 2015 vulnerabilities
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Cisco Nexus 3X00 Series Switches includes a version of OpenSSL that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 and CVE-2015-1794

And disclosed in http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Cisco has reviewed and concluded that this product is affected by one or more of these vulnerabilities.


Cisco Nexus 3X00 Series Switches is affected by:

CVE-2015-3195

Cisco Nexus 3X00 Series Switches is not affected by:


CVE-2015-3193, CVE-2015-3194, CVE-2015-3196 and CVE-2015-1794

Workaround:
Not available.

Further Problem Description:
Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.4

http://tools.cisco.com/security/center/cvssCalculator.x?version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)A7(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq59586
Title:
back space hits 73rd character will "blank" out all characters
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
when entering long CLI command that exceeded 73 characters, if back space was used, when back space hits the 73rd character, all characters then disappeared from the command line.

Conditions:
CLI command exceeds 72 characters long and back space bar was used

Workaround:
set the terminal width to a bigger number. By default terminal width is set at 72. This can the set to a maximum number of 511.

BLR-SCL-QI2-28# terminal width ?
<24-511> Number of characters on a screen line

BLR-SCL-QI2-28# terminal width 511

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
5.0(3)U5(1h)
Known Fixed Releases: *
6.0(2)A6(0.74), 6.0(2)A6(1), 6.0(2)U6(0.74), 6.0(2)U6(1), 7.0(3)F1(0.168), 7.0(3)I2(1.66), 7.0(3)I2(2), 7.0(3)I3(0.128), 7.0(3)I3(1), 7.0(3)IDP3(1.12)
Alert Type:
Updated *
Bug Id:
CSCuv56748
Title:
N3172TQ - "no negotiation auto" fails to bring port in 100Mbps
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
N3172TQ switch may fail to bring port UP with speed 100Mbps when Auto negotiation is disabled.

Conditions:
linking N3172TQ port to a switch with speed/duplex hardcoded

Workaround:
Enabled Auto-negotiation on N3100 and restrict peer side to only negotiate at 100Mbps to have a successful connection. On Catalyst switches something like this is required:
speed auto 100

If connection is between two N3100 switches, then using this configuration will work:
speed 100
duplex full
negotiate auto

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U5(3.53)
Known Fixed Releases: *
6.0(2)A6(4.119), 6.0(2)A6(5), 6.0(2)U6(3.119), 6.0(2)U6(4), 7.0(3)F1(0.168), 7.0(3)I2(1.82), 7.0(3)I2(2)
Alert Type:
Updated *
Bug Id:
CSCux74951
Title:
cant read the bootflash from the switch(boot) prompt mode
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
switch(boot) prompt, dir command not listing contents.

Conditions:
when the switch enters in the switch(boot) prompt

Workaround:
None. Only way to see the dir contents is either go to the Loader>prompt or load NXOS image and check from NXOS prompt.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.0(3)I2(3)
Known Fixed Releases: *
7.0(3)I2(2.76), 7.0(3)I2(3), 7.0(3)I3(0.288), 7.0(3)I3(1)
Alert Type:
Updated *
Bug Id:
CSCuu69356
Title:
VPC peer-link between Camden & Prev releases
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
For Cisco Nexus 3000 vPC topologies, a non-disruptive upgrade from Cisco NX-OS Release 6.0(2)U6(X) to 7.0(3)I2(1) is not supported as the upgrade will cause a traffic disruption. An upcoming maintenance release will support non-disruptive upgrades for vPC topologies.

Conditions:
For Cisco Nexus 3000 vPC topologies, a non-disruptive upgrade from Cisco NX-OS Release 6.0(2)U6(X) to 7.0(3)I2(1) is not supported as the upgrade will cause a traffic disruption. An upcoming maintenance release will support non-disruptive upgrades for vPC topologies.

Workaround:

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.3(0)ZN(0.14)
Known Fixed Releases: *
6.0(2)A6(4.108), 6.0(2)A6(4.109), 6.0(2)A6(5), 6.0(2)U6(2.108), 6.0(2)U6(2.109), 6.0(2)U6(4), 7.0(3)F1(0.168), 7.0(3)I2(0.599), 7.0(3)I2(0.600), 7.0(3)I2(0.601)
Alert Type:
Updated *
Bug Id:
CSCux05949
Title:
Multipath unmarked when an update with different AS_PATH is received
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When BGP multipath is enabled only a single path is installed to a destination even though the multipath flag should be set. In other words, you will only see one path in the routing table even though there should be more then one paths. BGP table will show no paths marked with the multipath flag


Nexus-1# show ip bgp 10.8.67.0/24

Path type: external, path is valid, received and used AS-Path: 65000 65001 65002 , path sourced external to AS
10.10.10.1 (metric 0) from 10.1.1.1 (10.173.253.71)
Origin IGP, MED 0, localpref 100, weight 0

Path type: external, path is valid, received and used <== this path update, with different AS_PATH, triggered the unmarking of the other paths
AS-Path: 65000 65005 65002 , path sourced external to AS
10.10.10.2 (metric 0) from 10.1.1.2 (10.173.253.64)
Origin IGP, MED 0, localpref 100, weight 0

Path type: external, path is valid, received and used, is best path
AS-Path: 65000 65001 65002 , path sourced external to AS
10.10.10.3 (metric 0) from 10.1.1.3 (10.173.253.66)
Origin IGP, MED 0, localpref 100, weight 0

Conditions:
Issue occurs after a path is introduced with different AS_PATH as the best path but the same length.

Workaround:
Configure the following under the BGP process to avoid this issue.

bestpath as-path multipath-relax

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
6.0(2)U4(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup28346
Title:
Increase Frequency of Hash Display in install all
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When upgrading a N3K from 6.0(2)U2(10Z) to 6.0(2)U3(5) using install all, it takes around 120 seconds to complete from

Verifying image type.
[########### ] 50%

to

Verifying image type.
[########### ] 100%

Conditions:
Upgrade a Nexus 3000 using install all command

Workaround:

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
6.0(2)U3(2)
Known Fixed Releases: *
6.0(2)A6(0.55), 6.0(2)A6(1), 6.0(2)U6(0.55), 6.0(2)U6(1), 7.0(3)F1(0.168), 7.0(3)I2(1.76), 7.0(3)I2(2)
Alert Type:
Updated *
Bug Id:
CSCuo31623
Title:
SVI interface unreachable, if "management" feature configured
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When "management" feature configured for particular SVI interfaces, it may become unreachable.

Conditions:
SVI interface needs to be configured as "management":

# show running-config interface VlanABC
version 6.0(2)U1(1a)

interface VlanABC
no shutdown
management
ip address a.b.c.d/z

Workaround:
Remove "management" feature from the interface.

Further Problem Description:
N/A

Last Modified:
12-JAN-2016
Known Affected Releases:
6.0(2)U1(1a)
Known Fixed Releases:
6.0(2)A3(0.15), 6.0(2)A3(1), 6.0(2)U3(0.15), 6.0(2)U3(1)
Alert Type:
New
Bug Id:
CSCus71682
Title:
Two 10/100/1000-Mbps management ports (only mgmt0 functional)
Status:
Terminated
Severity:
5 Cosmetic
Description:

Symptom:
On Nexus 3048/Nexus 3500 switches, online datasheets shows that it has two mgmt ports available. Data-sheet says 'Two 10/100/1000-Mbps management ports'

User can also see two mgmt ports on back side of the switch.

Conditions:
n/A

Workaround:
In reality , Only mgmt0 port is available to use. There are no plans to fix this issue as its HW limitation. Online information will be updated soon.

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
6.0(2)U1(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux37181
Title:
N3k - wrong syslog when creating another user using tacacs+
Status:
Open
Severity:
5 Cosmetic
Description: *

Symptom:
"Secure password mode is enabled. Please use "change-passwd" CLI to change the password is printed by switch when user with network-operator role tries to create another new user

Conditions:
user with network-operator role logs into switch

Workaround:
none

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
6.0(2)U3(4.92), 6.0(2)U4(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus11180
Title:
N3K: Enable Copy File Start capabilities with Fast-Reload
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The "copy file start" command cannot be executed immediately before a fast-reload is instantiated.

This is known unsupported combination.

The data-plane will not meet the =<30 second outage windows originally required for the fast-reload outage window.

Conditions:
This issue occurs when the "copy file start" command right before executing "fast-reload"

Workaround:
Alternative configuration methods and/or sequences should be be used to prevent extended fast-reload downtimes.

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases: *
6.0(2)U6(1)
Alert Type:
Updated *
Bug Id:
CSCul19094
Title:
Non-ECN capable behavior enhancement
Status:
Fixed
Severity:
6 Enhancement
Description: *

Problem:
When ECN and non-ECN capable traffic is present on the same egress queue, non-ECN-capable traffic gets dropped on exceeding the MAX threshold configured.

Requirement:
Under low congestion / queue build scenario, allow low rate non-ECN capable traffic to go through without drops, even if the ECN thresholds are exceeded. To keep the solution generic for any traffic stream with ECN bits set, avoid a stream type based classification.

Symptom:
ECT = 0 packets are dropped based on WRED thresholds applied on ECN enabled traffic classes.

Conditions:
Packets having ECT=0 and classfied to traffic classes where ECN is enabled.

Workaround:
NA

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
6.0(2)U2(1)
Known Fixed Releases: *
7.0(3)IDP3(1.40), 7.0(3)IDP3(1.76), 7.0(3)IDP3(1.79), 7.0(3)IDP3(2), 7.0(3)ITM3(0), 7.0(3)ITM3(0.7)
Alert Type:
Updated *
Bug Id:
CSCuu91387
Title:
PFC - Enable configurable actions when egress queue is stuck for no-drop
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
PFC enhancement for stuck no-drop queue

Conditions:

Workaround:

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
6.0(2)U3(7.99)
Known Fixed Releases: *
7.0(3)IDP3(1.71), 7.0(3)IDP3(1.72), 7.0(3)IDP3(1.73), 7.0(3)IDP3(1.76), 7.0(3)IDP3(2), 7.0(3)ITM3(0), 7.0(3)ITM3(0.7)

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论