Cisco Blog » The Platform

2016年2月1日星期一

Cisco Notification Alert -Nexus 5000 Series Switch-01-Feb-2016 18:18 GMT

 

 

 

 

 

 

 


Field Notice - Nexus 5000 Series Switches

Title:
Field Notice: FN - 64094 - Nexus 5596/UCS FI 6296 - System Fails to Boot After a Power Cycle, Microcode Upgrade Required
Description:

Some Nexus 5596 and UCS FI 6296 systems fail to boot after a software upgrade, reload, or power cycle. This problem is rare in occurrence but has been seen in the field.

Date:
13-JAN-2016

Find additional information in Field Notices

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5624Q Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5648Q Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5696Q Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5696Q Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5596UP Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5596T Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5624Q Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5548P Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5548UP Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5596T Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5648Q Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5548UP Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5672UP Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5596UP Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 56128P Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 56128P Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5548P Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n5000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n5000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 5000 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 5000 Series Switches

Product Name:
Nexus 5672UP Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 5000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCus64364
Title:
N5K: carmelusd component got cored on O2 switch
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Nexus 5000 can experience crash 'carmelusd' process:

----- reset reason for Supervisor-module 1 (from Supervisor in slot 1) ---
1) At 986420 usecs after Sat Dec 27 23:24:13 2014
Reason: Reset triggered due to HA policy of Reset
Service: carmelusd hap reset
Version: 5.2(1)N1(6)

Conditions:
N/A

Workaround:
N/A

Further Problem Description:
During the Carmel log display, Current log pointer got exceeded over End log pointer by one thread and at the same time another thread accessed current pointer for log wrapping scenario and tried memory set on left over memory. For memory set operation size is determined using End pointer subtracting Current pointer. This operation generated the negative size value for memset call, resulting memory crash. Due to this Carmel got Core.

Last Modified:
06-JAN-2016
Known Affected Releases: *
5.2(1)N1(6), 7.1(1)N1(1)
Known Fixed Releases:
7.0(7)N1(0.65), 7.0(7)N1(1), 7.0(7)ZN(0.141), 7.1(2)N1(0.565), 7.1(2)N1(1), 7.1(2)ZN(0.25), 7.2(1)N1(0.245), 7.2(1)N1(1), 7.2(1)ZN(0.11), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCur11599
Title:
Nexus 5k/6k - Memory leak in pfstat process causing hap reset
Status:
Fixed
Severity:
2 Severe
Description: *

Polling SVI If-Index to collect packet statistics via SNMP.
Or,
using CLI "show interface [vlan #] counter [detail]"

The above results in memory leak in pfstat process. Once process runs out of its designated memory space, leads to crash/hap reset.

Symptom:
Memory leak in pfstat process results in HAP reset.
Reason: Reset triggered due to HA policy of Reset
Service: pfstat hap reset

Conditions:
Polling SVI If-Index to collect packet statistics via SNMP.
Or,
using CLI "show interface [vlan #] counter [detail]"

The above results in memory leak in pfstat process. Once process runs out of its designated memory space, leads to crash/hap reset.

Switch should be operating in L2 mode (no L3 license) to hit the issue.

Workaround:
Excluding SVI if_indexes from SNMP polling for interface statistics collection. Avoiding running "show interface counter" globally or for SVI.

The ifindex OID is 1.3.6.1.2.1.2.2.1.1. So excluding this OID should prevent the issue (although it has not yet been confirmed).

Further Problem Description:

Last Modified:
01-FEB-2016
Known Affected Releases:
6.0(2)N2(6), 7.0(3)N1(0.125)
Known Fixed Releases:
7.0(1)ZN(0.684), 7.0(6)N1(0.194), 7.0(6)N1(1), 7.1(0)EVN(0.18), 7.1(0)N1(0.372), 7.1(0)N1(1), 7.1(0)ZN(0.445), 7.1(2)N1(0.2), 7.1(2)N1(1), 7.2(0)N1(0.2)
Alert Type:
Updated *
Bug Id:
CSCuv32204
Title:
SNMPd Memory Leak in libport_mgr_common
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Memory held by SNMPd increases over time, eventually resulting in an snmpd hap reset, with memory held under the "libport_mgr_common" process:

show system internal snmp mem-stats detail


Private Mem stats for UUID : Non mtrack users(0) Max types: 304
--------------------------------------------------------------------------------
TYPE NAME ALLOCS BYTES
CURR MAX CURR MAX

88 [r-xp]/isan/plugin/0/isan/lib/libnetsnm 1443 1446 362088 501842
102 [r-xp]/isan/plugin/0/isan/lib/libport_m 372760 372765 186007240 186009916 <<<<<<<<

Conditions:
doing continuous snmpget on entSensorThresholdSeverity [1.3.6.1.4.1.9.9.91.1.2.1.1.2]

Workaround:
Instead use snmpwalk

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
7.1(3)ZN(0.136), 7.1(4)N1(0.701), 7.1(4)N1(1), 7.2(2)N1(0.355), 7.2(2)N1(1), 7.2(2)ZN(0.39), 7.3(0)IZN(0.7), 7.3(0)N1(0.152), 7.3(0)N1(1), 7.3(0)ZN(0.140)
Alert Type:
Updated *
Bug Id:
CSCui34757
Title:
Nexus 5k acting as an NTP Client does not sync with an NTP server
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Nexus 5k acting as an NTP Client can't sync with any NTP server(s).
when issuing a "show ntp peer-status" or a "show ntp peers" it does not display any of the servers/peers configured.

Conditions:
Nexus 5500/5000 running 5.2(1)N1(5).

Workaround:
Proactive workaround to prevent from this issue is none.
Reactive workaround to recover this issue is below. However, after reloading system, same issue may happen again.
#conf t
#clock protocol none
#clock protocol ntp
#copy run start

Further Problem Description:

Last Modified:
19-JAN-2016
Known Affected Releases:
5.1(3)N2(1), 5.2(1)N1(5)
Known Fixed Releases:
5.2(1)N1(6)
Alert Type:
Updated *
Bug Id:
CSCuv20660
Title:
NetApp: Response to VLAN Request seen after vfc port was shut
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Response to VLAN Request seen even after vfc port was shut.

Conditions:
Shut the VFC and send VLAN request from the host.

Workaround:
if VFC is not required, then we can delete the VFC instead of just shutting it down.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(0)N1(1), 7.3(0)N1(0.208)
Known Fixed Releases: *
7.1(3)ZN(0.158), 7.1(4)N1(0.713), 7.1(4)N1(1), 7.2(2)N1(0.369), 7.2(2)N1(1), 7.2(2)ZN(0.52), 7.3(0)IZN(0.13), 7.3(0)N1(0.264), 7.3(0)N1(1), 7.3(0)ZN(0.240)
Alert Type:
Updated *
Bug Id:
CSCul85203
Title:
N5K Port in Internal-Fail errDisable : fu ha standby message queued
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
N5k Port connected to N1110X goes to "Internal-Fail errDisable" state if the N1110 Appliance is powered off for HA Testing.

-----
this symptom will also happen when partner device is nexus.

Conditions:
Nexus 5000 ( 5548 )
Ver : 6.0(2)N2(1)
Feature LLDP is turned off
Feature FCoE is turn on

Workaround:
Turn on LLDP

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
6.0(2)N2(1), 7.3(0)N1(0.141)
Known Fixed Releases: *
7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.2(2)N1(0.368), 7.2(2)N1(1), 7.2(2)ZN(0.51), 7.3(0)IZN(0.13), 7.3(0)N1(0.242), 7.3(0)N1(0.262), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCus89236
Title:
Nexus 5672UP unable to ping other side ip after link flap
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When Nexus 5672UP connected to any catalyst switch using 1gig link, it is unable to ping opposite side ip after link flap.The link will be shown up but unable to ping.Nexus will be able to see opposite side as cdp neighbor but opposite side will not.

Conditions:
1. This problem is only seen on unified port of Nexus 5696UP
2. This problem is seen with 1Gig link only with "no negotiate auto" command configured

Workaround:
Remove the command "no negotiate auto" and re-apply it.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.0(5)N1(1)
Known Fixed Releases: *
7.2(1)N1(0.319), 7.2(1)N1(1), 7.2(1)ZN(0.81), 7.3(0)N1(1)
Alert Type:
New
Bug Id:
CSCuy03675
Title:
Nexus crash in FCS process
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Crash on nexus device due to FCS process

Conditions:
Customer is using fabric channel

Workaround:
Unknown

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
7.1(3)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw53377
Title:
Nexus5672 WCCP process crash
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
WCCP process crash when wccp appliance disconnected and core generated

Conditions:
when wccp appliance disconnected/ reconnected

Workaround:
none

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases: *
7.0(7)N1(0.307), 7.0(7)ZN(0.266), 7.0(8)N1(1), 7.1(3)ZN(0.115), 7.1(4)N1(0.689), 7.1(4)N1(1), 7.2(2)N1(0.339), 7.2(2)N1(1), 7.2(2)ZN(0.22), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCuw48786
Title:
Kernel crash
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
N6K running 6.0(2)N2(4) crashing due to kernel panic.

Conditions:
Trigger not known.

Workaround:
None.

Further Problem Description:

Last Modified:
14-JAN-2016
Known Affected Releases:
6.0(2)N2(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux46009
Title:
Nexus 802.1x: suffix delimited with @ is not sent in RADIUS request
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Username suffix delimited by '@' is stripped off in RADIUS acces-request.

Conditions:
Dot1x authentication on N5k, username contains domain name.

Workaround:
N/A

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.2(2)N1(0.1)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.311), 7.0(8)N1(1), 7.1(3)ZN(0.136), 7.1(4)N1(0.701), 7.1(4)N1(1), 7.2(2)N1(0.355), 7.2(2)N1(1), 7.2(2)ZN(0.39), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCuo66649
Title:
bigsurusd core on adding member port to portchannel
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
add a member port to port channel may trigger a bigsurusd hap reset.

Conditions:
port channel was being configured including force option

Workaround:
try without force option

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
7.0(3)N1(0.47), 7.0(6)N1(0.272)
Known Fixed Releases: *
7.1(3)ZN(0.156), 7.1(4)N1(0.711), 7.1(4)N1(1), 7.2(2)N1(0.369), 7.2(2)N1(1), 7.2(2)ZN(0.52)
Alert Type:
New
Bug Id:
CSCup76173
Title:
240/249 ERROR: Timer expired on replay config cfs hap reset at syscall()
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The Cisco Fabric Services (cfs) process could unexpectedly crash following a port-profile crash due to CSCuv58843:

%SYSMGR-2-SERVICE_CRASHED: Service "port-profile" (PID 3709) hasn't caught signal 11 (core will be saved).
%SYSMGR-2-SERVICE_CRASHED: Service "cfs" (PID 3952) hasn't caught signal 6 (core will be saved).

Conditions:
A port-profile crash occurs after a config-sync switchport trunk config change (as outlined in CSCuv58843). CFS then crashes ~1-2 minutes later.

Workaround:
Avoid the conditions that trigger CSCuv58843.

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
7.1(0)N1(0.240)
Known Fixed Releases:
7.1(3)ZN(0.136), 7.1(4)N1(0.701), 7.1(4)N1(1), 7.2(2)N1(0.356), 7.2(2)N1(1), 7.2(2)ZN(0.40)
Alert Type:
New
Bug Id:
CSCuw28001
Title:
Switch reloads while ND ISSU with Lacp failure-maximum downtime exceeded
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ISSU failure on N5672-8G switch during ISSU with error of LACP failure of "maximum downtime exceeded"

The below string will be displayed to the user:-

"Upgrade has failed. Return code 0x40930085 (lacp failure - maximum downtime exceeded)"
Rebooting the switch to recover.
[ 230.307510] Shutdown Ports..
[ 230.342086] writing reset reason 3, ISSU failure: 0x40930085

Conditions:
During ISSU on 5672-8G switch.

Workaround:
None

Further Problem Description:
The LACP failure in this case was happening due to microcontrollers(these microcontrollers are used to access SFPs, only the control(LED status, SPROM data of SFP etc..) not the LOS/Datapath- datapath is controlled by bigsur) getting timedout during ISSU just after kexec of new kernel. These controllers are enumerated as USB devices in the kernel and need to re-probe and sync with the new kernel, some times these devices fail to get initialized and as the timeout for USB operations was 45 secs and in 5672 there are 3 microcontrollers and hence was causing a delay of more than 80 secs which is the maximum downtime for LACP.

The reason for USB devices not responding is not clear and the failure is not consistent and as of now its reproduced more often on 5672UP platform only.

Fix
====================================
There are 2 approaches taken for fixing the issue completely.
1. USB timeout is being reduced from 45 secs to around 2 sec.
2. If any of the device fails to respond, the a list of these devices is maintained in the kernel which will be fetched by the PFMA module during te system image bootup which will perform the reset of the device to bring it to operational state.
These USB devices (microcontrollers used to access SFP) dont impact the datapath of the interface, hence wont have any impact on the interface functionality. This fix is applicable only for 5672-8G

Last Modified:
26-JAN-2016
Known Affected Releases:
7.3(0)N1(0.131)
Known Fixed Releases:
7.1(3)N1(1.5), 7.1(3)N1(2), 7.3(0)N1(0.221), 7.3(0)N1(1), 7.3(0)ZN(0.198)
Alert Type:
New
Bug Id:
CSCuw24211
Title:
DHCP offer pkt getting dropped post ISSU frm 6.0.2.N2.7 to 7.0.6.N1.1
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
DHCP Offer Broadcast packet getting dropped post ISSU

Conditions:
ISSU to 7.0 branch from earlier branch

Workaround:
remove and apply ip dhcp relay

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.113)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv68534
Title:
WCCP crashing in the steady state w/o any user induced trigger
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
WCCP with multiple clients crashing WCCP in nexus

Conditions:
WCCP running with multiple clients crashing if left for long time

Workaround:
No workaround

Further Problem Description:
Due to Wave server not updating the correct receive id, wccp session was flapping.

Here_I_Am packet from 10.10.10.2 w/bad recive_id 0x0. Expected 0x94

FSM states are save for future recovery.

Last Modified:
20-JAN-2016
Known Affected Releases:
7.2(0)N1(0.97)
Known Fixed Releases:
7.0(7)N1(0.306), 7.0(8)N1(1), 7.1(3)N1(0.642), 7.1(3)N1(1), 7.1(3)ZN(0.50), 7.2(2)N1(0.356), 7.2(2)N1(1), 7.2(2)ZN(0.40), 7.3(0)N1(0.130), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuw51093
Title:
WCCP redirection should be applied for layer 3 routed packets
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Whenever the client side SVI on the nexus switches is active on the switch 1A the client (Router 1B)'s packets do not get redirected to the wccp recipient.

Conditions:
NEXUS 5600 running on 7.1.1

Workaround:
N/A

Further Problem Description:
WCCP redirection happens incorrectly on layer 2 switched packets whereas it has to be applied only for layer 3 routed packets.

WCCP should be applied for routed packets in HSRP active switch. When packets are received by a standby switch, it shall L2 forward the packets and HSRP active shall apply the WCCP redirection.

While applying wccp redirection, both in active and standby hsrp switch, redirection is applied to all matching packets whether the packet is destined to be L2 switched or routed.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(1)N1(0.8)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.313), 7.0(8)N1(1), 7.1(3)ZN(0.138), 7.1(4)N1(0.703), 7.1(4)N1(1), 7.2(2)N1(0.357), 7.2(2)N1(1), 7.2(2)ZN(0.41), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCux33230
Title:
"ipqosmgr hap reset" during ISSU 7.1(2)N1(1)->7.1(3)N1(1)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch crash:
Reason: Reset triggered due to HA policy of Reset
System version: 7.1(3)N1(1)
Service: ipqosmgr hap reset

Conditions:
ISSU 7.1(2)N1(1)->7.1(3)N1(1)

Workaround:
None

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(3)N1(1)
Known Fixed Releases: *
7.1(3)N1(1.3), 7.1(3)N1(2), 7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.3(0)IZN(0.13), 7.3(0)N1(0.246), 7.3(0)N1(1), 7.3(0)ZN(0.222)
Alert Type:
Updated *
Bug Id:
CSCuw73332
Title:
VTPv3 mode changes from client to transparent after PVLAN creation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VTPv3 mode changes from client to transparent:
2015 Oct 14 17:27:22 Nexus5500 %VTP-2-VTP_MODE_TRANSPARENT_CREATE_SEQ_FAILED: VTP Mode changed to transparent since VTP vlan create/update failed.

Conditions:
VTPv3 Primary Server is configured on Catalyst 4900M switch.
Nexus switches have at least one port with the following configuration:
* switchport mode private-vlan trunk promiscuous
* switchport private-vlan trunk allowed vlan A,B-C,D
* switchport private-vlan mapping trunk X Y-Z

Workaround:
None at the moment.

Further Problem Description:
After the PVLAN is added on the VTPv3 Primary Server, we can see that PVLAN resources are locked on the Nexus 5500 switches until eventually there is a timeout and the VTPv3 mode changes from client to transparent.


Nexus5500# show system internal private-vlan info
System info:
------------
Global LOCKED
Private VLANs
------------
private-vlan 1:1800 vlan-type is "unknown(8)" LOCKED primary=0, otxns=1
state: PVLAN_VLAN_STATE_NORMAL_TO_PRIMARY_VLAN_MGR
associations(0):


Last Modified:
30-JAN-2016
Known Affected Releases:
7.2(0)N1(1)
Known Fixed Releases: *
7.2(2)N1(0.341), 7.2(2)N1(1), 7.2(2)ZN(0.24), 7.3(0)IZN(0.13), 7.3(0)N1(0.219), 7.3(0)N1(1), 7.3(0)ZN(0.196)
Alert Type:
Updated *
Bug Id:
CSCux10337
Title:
N2348TQ tiburon fex devices crash repeatedly
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
N2348TQ fex device resets unexpected.

Conditions:
No additional symptoms are known at this point in time.

Workaround:
None

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(1)N1(1), 7.3(0)N1(0.46), 7.3(0)N1(0.47), 7.3(0)N1(0.50)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.313), 7.0(8)N1(1), 7.1(3)ZN(0.128), 7.1(4)N1(0.693), 7.1(4)N1(1), 7.2(2)N1(0.345), 7.2(2)N1(1), 7.2(2)ZN(0.28), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCun34005
Title:
Nexus2k/5k/6k: Continuous memory leak messages seen for ethpm
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Possible memory leak messages for ethpm are observed.
Exemplary logs:

%$ VDC-1 %$ Feb 25 06:32:17 %KERN-2-SYSTEM_MSG: [20640.784304] [sap 175][pid 3969][comm:ethpm] WARNING: possible memory leak is detected on pers queue (len=649,bytes=15825069) - kernel
%$ VDC-1 %$ Feb 25 06:32:27 %KERN-2-SYSTEM_MSG: [20650.122663] [sap 175][pid 3969][comm:ethpm] WARNING: possible memory leak is detected on pers queue (len=647,bytes=15773045) - kernel

Conditions:
This problem was observed on the Nexus 5000 after pasting the configuration with 500+ vlans to the running-config.

Also config replay of these vlans are extremely slow (might take a few hours to complete).

Workaround:
copy the config from a temporary file to startup config and reload the switch for the configs to take effect.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.0(1)N1(0.106), 7.0(6)N1(0.185), 7.1(3)N1(0.647), 7.1(3)N1(0.662), 7.2(0)N1(0.111), 7.2(0)N1(0.180), 7.2(1)N1(0.313)
Known Fixed Releases: *
7.1(3)ZN(0.155), 7.1(4)N1(0.710), 7.1(4)N1(1), 7.2(2)N1(0.382), 7.2(2)N1(1), 7.2(2)ZN(0.64), 7.3(0)N1(0.221), 7.3(0)N1(1), 7.3(0)ZN(0.198)
Alert Type:
New
Bug Id:
CSCuy03620
Title:
NTP is not syncronize with remote server
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
MZ-DC-SW-410A# show ntp peer-status

Total peers : 2
* - selected for sync, + - peer mode(active),
- - peer mode(passive), = - polled in client mode
remote local st poll reach delay
----------------------------------------------------------------------
=10.195.3.1 0.0.0.0 1 16 377 0.00117
=10.199.9.129 0.0.0.0 1 16 377 0.00093

MZ-DC-SW-410A# show ntp statistics peer ipaddr 10.199.9.129
remote host: 10.199.9.129
local interface: Unresolved
time last received: 13s
time until next send: 16s
reachability change: 8421s
packets sent: 96565
packets received: 107096
bad authentication: 0
bogus origin: 0
duplicate: 0
bad dispersion: 0
bad reference time: 0
candidate order: 6
Source interface: 10.197.202.1
MZ-DC-SW-410A#
MZ-DC-SW-410A#

MZ-DC-SW-410A# show ntp statistics peer ipaddr 10.195.3.1
remote host: 10.195.3.1
local interface: Unresolved
time last received: 48s
time until next send: 2s
reachability change: 8440s
packets sent: 96658
packets received: 107174
bad authentication: 0
bogus origin: 0
duplicate: 0
bad dispersion: 0
bad reference time: 0
candidate order: 4
Source interface: 10.197.202.1

Conditions:
Z-DC-SW-410A# 2016 Jan 27 14:40:10.242594 ntp: Sending cmi response with return_code = 0x0
2016 Jan 27 14:40:10.242919 ntp: setting global CMI msg req to NULL
2016 Jan 27 14:41:38.862624 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88063574, tv_nsec=257696214)
2016 Jan 27 14:41:38.863151 ntp: Sending Time of day upd to standby
2016 Jan 27 14:43:08.880709 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88063664, tv_nsec=275781895)
2016 Jan 27 14:43:08.881239 ntp: Sending Time of day upd to standby
2016 Jan 27 14:47:38.929061 ntp: Sending Time of day upd to standby
2016 Jan 27 14:49:08.944329 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88064024, tv_nsec=339401699)
2016 Jan 27 14:49:08.944846 ntp: Sending Time of day upd to standby
MZ-DC-SW-410A# 2016 Jan 27 14:47:38.928538 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88063934, tv_nsec=323610039)
2016 Jan 27 14:47:38.929061 ntp: Sending Time of day upd to standby
2016 Jan 27 14:49:08.944329 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88064024, tv_nsec=339401699)
2016 Jan 27 14:49:08.944846 ntp: Sending Time of day upd to standby
2016 Jan 27 14:50:38.960177 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88064114, tv_nsec=355249620)
2016 Jan 27 14:50:38.960702 ntp: Sending Time of day upd to standby
2016 Jan 27 14:52:08.976150 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88064204, tv_nsec=371222489)
2016 Jan 27 14:52:08.976679 ntp: Sending Time of day upd to standby
2016 Jan 27 14:53:38.992665 ntp: SYS-MCLOCK-GET-TSPEC(tv_sec=88064294, tv_nsec=387737888)
2016 Jan 27 14:53:38.993190 ntp: Sending Time of day upd to standby

Workaround:
1 Workaround but not solve the problem.
1. Type "no ntp peer"
2. Reenter complete configuration of "ntp peer use-vrf management"

2 Change the configurantions.
Before:
ntp distribute
ntp server 10.195.3.1 use-vrf management
ntp server 10.199.9.129 prefer use-vrf management
ntp source-interface mgmt0
ntp commit

After:
ntp distribute
ntp server 10.195.3.1
ntp server 10.199.9.129 prefer
ntp source-interface mgmt0
ntp commit

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
4.2(1)N2(1a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCun45981
Title:
L3 N5K: Inbound and output ICMP frames on different ports
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
ICMP Echo Request and Reply using different Inband ports.
For N5k/N6k this is observed since 7.x releases. While for N6k this may be observed in 6.x releases as well.

Conditions:
Ethanalyzer capture shows ICMP Requests coming from network are seen in Inband-Low Q, while reply is seen in Inband-Hi Q

Workaround:
ICMP flows might now have to be tracked on both Inband ports till this is fixed. There is no impact in respect to handling of traffic.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.0(0)N1(1)
Known Fixed Releases:
7.0(7)N1(0.287), 7.0(7)N1(1), 7.0(7)ZN(0.166), 7.0(7)ZN(0.167), 7.1(0)AV(0.38), 7.1(0)PDB(0.317), 7.1(0)SIB(99.82), 7.1(2)N1(0.549), 7.1(2)N1(1), 7.1(2)ZD(0.6)
Alert Type:
Updated *
Bug Id:
CSCux56823
Title:
Wrong default warntime and gracetime on upgrading from 7.2.1 to 7.3.0
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Existing users are assigned warntime of 7 instead of 14 and no default gracetime instead of 3 days.

Conditions:
While upgrading or reloading from 7.2(1) to 7.3(0), the default warntime and default gracetime is set incorrectly for existing users. Default warntime is set to 7 instead of 14 and no gractime instead of 3 days.

Workaround:
Change the default wartime and gracetime manually and update the same for all existing users.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.3(0)N1(0.238)
Known Fixed Releases: *
7.3(1)N1(0.15), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCus71581
Title:
need to copy cores from show cores into bootflash by default
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
N5K switch cannot save more than 1 core dump under show cores command. Cores may be lost when reloading.

Conditions:
When device crashes more than once and/or a reload occurs.

Workaround:
no workaround

Further Problem Description:
This defect is to add a 'system core bootflash:' command similar to N3K and enable it by default. This will automatically copy the core to bootflash when crashing so it will not be lost.

Last Modified:
28-JAN-2016
Known Affected Releases:
6.0(2)N2(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw31547
Title:
N5k/N6k stale param-lists in config which user cannot
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Unable to delete stale param-list manually with the no command:

Leaf11(config)# no param-list param_list_name_instance_vni_30000_205
ERROR: Parameter instance being used cannot be deleted
Leaf11(config)# no param-list param_list_name_instance_vni_30004_4
ERROR: Parameter instance being used cannot be deleted
Leaf11(config)# no param-list param_list_name_instance_vn

Conditions:
This error was seen after copy run start and reload of leaf nodes, it is possible that stale \
param-lists remain and cause the issues with future instantiations of vlans.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases:
7.1(3)N1(0.671), 7.1(3)N1(1), 7.1(3)ZN(0.83), 7.3(0)IZN(0.7), 7.3(0)N1(0.151), 7.3(0)N1(1), 7.3(0)ZN(0.139)
Alert Type:
Updated *
Bug Id:
CSCuw83308
Title:
Need to support leading underscore as username in N5k/N6k
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Can not create a username starting with _ (underscore)

Conditions:
When a username is created starting with _ (underscore) it throws an exrror,
and the user is not created

Workaround:
None

Further Problem Description:
Usernames with leading "_" are being allowed from 7.3 release onwards on Nexus 5k/6k. Any downgrade to previous releases (like 7.2 or 7.1) would lead to such user names getting deleted.

Last Modified:
27-JAN-2016
Known Affected Releases:
7.3(0)N1(0.177)
Known Fixed Releases:
7.3(0)IZN(0.7), 7.3(0)N1(0.183), 7.3(0)N1(1), 7.3(0)ZN(0.165)
Alert Type:
New
Bug Id:
CSCux98910
Title:
Descriptions on FEX port corrupt when FEX become online
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Descriptions on FEX port corrupt when FEX become online

## When FEX offline

interface Ethernet100/1/1
description % ABCDEFGHIJ %
switchport access vlan 1111
spanning-tree port type edge

## After FEX become online

interface Ethernet100/1/1
description 0X1.F16E4080A2F15P-890BCDEFGHIJ %
switchport access vlan 1111
spanning-tree port type edge

Conditions:

Workaround:
Not using "%" in description

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
7.2(0)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCue33391
Title:
PF_DEV1: Vinci: Some enhancements in L2/FP switching for Titanium
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
test

Conditions:

Workaround:

Further Problem Description:

Last Modified:
26-JAN-2016
Known Affected Releases:
0.1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut87111
Title:
Cisco NX-OS Arbitrary File Read Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description: *

Summary
Cisco NX-OS software contains a directory traversal vulnerability within
the command line interface that could allow a local, authenticated
attacker to disclose the contents of arbitrary files on the affected device.
An attacker could leverage the NX-OS ''copy'' command to duplicate
the contents of arbitrary files on the device to a user writable area of the
filesystem. As the new file will be owned by the authenticated user, the
attacker will be able to view the contents.

This vulnerability affects the following platforms which are based on Cisco NX-OS:

Cisco Nexus 7000
Cisco MDS 9000
Cisco Nexus 6000
Cisco Nexus 5500
Cisco Nexus 5000
Cisco Nexus 4000
Cisco Nexus 3500
Cisco Nexus 3000
Cisco Nexus 1000V
Cisco Connected Grid Router 1000 Series
Cisco Unified Computing System Fabric Interconnect 6200
Cisco Unified Computing System Fabric Interconnect 6100

Conditions
Device is running an affected version of Cisco NX-OS software; An authenticated user
with the privileges to run the copy command.

Symptom:

Conditions:

Workaround:

Further Problem Description:
This issue was discovered during internal testing by Cisco.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.6/3.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:L/AC:L/Au:S/C:C/I:N/A:N/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2013-6975 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
25-JAN-2016
Known Affected Releases:
7.2(0)N1(0.165)
Known Fixed Releases:
7.0(7)N1(1), 7.0(7)ZN(0.108), 7.1(2)N1(0.540), 7.1(2)N1(1), 7.2(0)N1(0.187), 7.2(0)N1(1), 7.2(0)VZN(0.34), 7.2(0)ZN(0.189), 7.3(0)N1(0.31), 7.3(0)N1(1)
Alert Type:
New
Bug Id:
CSCux95822
Title:
N5K - Link stuck in notconnect following reload
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
Following a reload of a chassis or shut/no shut using interface range command some ports remain in notconnect state.

Conditions:
reload or shut/no shut via interface range.

Workaround:
shut/no shut the ports stuck in this state.

Further Problem Description:
Thisis issue is due to asic driver sending multiple up/down triggers for multiple interfaces to software driver simultaneously. This results on software driver not processing the events, thus leaving the interface in this state.

Last Modified:
23-JAN-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus89196
Title:
Trunk ports move to BKN state for native vlan
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:Native vlan on trunk links will move into a BKN spanning-tree state on the 5000 side

Conditions:5000 running 7.1(0)N1 code, and BPDUs sent on the trunk for vlans that do not exist on the 5000

Workaround:Prune off vlans on the remote end that are not needed on the 5000

If you are adding a new VLAN to a link between another switch and a N5K, add the VLAN to the N5K side trunk first.

More Info:


Last Modified:
21-JAN-2016
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
7.1(1)N1(0.468), 7.1(1)N1(1), 7.1(1)ZN(0.20), 7.2(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCum73187
Title:
N5K the Output of "show run track" broken
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:When you configure track-list and tracks on N5K, the Output of "show run track" broken.
This is the cosmetic issue.

Conditions:This issue is seen on NXOS5.2.x or earlier version,
But this issue doesn't happen NXOS6.0(2)N1(1) or later.

Case 1,
1.Create track list
2.Create some tracks
3.Add objects to track list

In this condition, when you configure seventh objects the Output of "show run track" broken.

Case 2,
1.Create some tracks
2.Create track list
3.Add objects to track list
4.Create new tracks (not yet add to track list)

In this condition, if you add less than 8 objects on step 3, the Output of "show run track" is no problem.
But if you add more than 8 objects on step 3, the Output of "show run track" broken.

Workaround:Create track list after all of tracks you need is created.
If you need to create new track, you must clear track configuration and configure again.

More Info:N7K has similar issue.( CSCty02268)
If you reload the device with this issue, the broken objects are bundled with track list.



Last Modified:
13-JAN-2016
Known Affected Releases:
5.2(1)N1(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur20769
Title:
BBC:sh fex 'fex num' transceiver -shows sfp is present but not supported
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show fex 1xx transceiver" shows "sfp information is not available"

Conditions:
FEX Type is N2K-C2348TQ-10GE

Workaround:
None

Further Problem Description:

Last Modified:
07-JAN-2016
Known Affected Releases:
7.1(0)N1(0.364), 7.3(0)N1(0.114)
Known Fixed Releases: *
7.1(3)ZN(0.152), 7.1(4)N1(0.707), 7.1(4)N1(1), 7.3(0)IZN(0.7), 7.3(0)N1(0.152), 7.3(0)N1(1), 7.3(0)ZN(0.140)
Alert Type:
Updated *
Bug Id:
CSCus52683
Title:
Port-channel on FEX down when fex-fabric up
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:Port-channel interface configured on FEX down when connecting fex-fabric port.

Conditions:FEX is connected to 2 Nexus 5000 series via vPC(Daul-home).
shutdown the one of fex-fabric port, then no shutdown on that port.

Port-channel on FEX is configured as LACP, however connected device has no LACP capability, which leads port on FEX into Individual(I) state.
Workaround:Use LACP and form port-channel properly on FEX.
This problem does not happen when port-channel on FEX is correctly formed by LACP.

More Info:Problem is identified and fix has been provided by software.



Last Modified:
07-JAN-2016
Known Affected Releases:
6.0(2)N2(4)
Known Fixed Releases: *
7.1(3)N1(0.621), 7.1(3)N1(1), 7.1(3)ZN(0.28), 7.2(2)N1(0.363), 7.2(2)N1(1), 7.2(2)ZN(0.46), 7.3(0)BZN(0.41), 7.3(0)N1(0.75), 7.3(0)N1(1), 7.3(0)ZN(0.73)
Alert Type:
Updated *
Bug Id:
CSCus02686
Title:
N5K switchport NP mode causes FCoE outage
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
vFCs go into an errdisabled state due to PRTOV Timer Expiry.
Check show logging log' for the following:

%PORT-5-IF_PORT_QUIESCE_FAILED: Interface vfcX port quiesce failed due to failure reason: PRTOV Timer Expiry (0xe1)

Conditions:
N5K with feature NPV enabled
Note: Feature fcoe-npv is not enabled
CNA facing vFC has switchport mode changed from F to NP

Workaround:
Change the CNA facing interface back to switchport mode F<./b>
Save the configuration. copy running-config startup-config
Reload the switch. reload

Further Problem Description:
It is not recommended to configure a vFC in NP mode, unless fcoe-npv is enabled.
Host/CNA facing vFCs should always be in F/TF switchport mode, if fcoe-npv is disabled.

Last Modified:
31-JAN-2016
Known Affected Releases:
5.2(1)N1(7)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq75453
Title:
Nexus 50x0 - vPC peer is not reachable between 5.0(3) and 5.2(1)N1(8)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
VPC peer link is down (vPC peer is not reachable over cfs) between 5.0(3) and 5.2(1)N1(8) image.

Conditions:
Pair of Nexus 50x0's in VPC domain. This bug is seen if one switch is running 5.0(3) and the other is running 5.2(1)N1(8) or (8a) or 5.2(1)N1(9)

Workaround:
Do an intermediate upgrade to anything prior to 5.1(3) or earlier 5.2(1).

Further Problem Description:
This bug is applicable only to Nexus 5010/5020 and does not apply to Nexus 55xx

Last Modified:
31-JAN-2016
Known Affected Releases:
5.2(1)N1(8a)
Known Fixed Releases: *
5.2(1)N1(10), 5.2(1)N1(8.173)
Alert Type:
Updated *
Bug Id:
CSCux40246
Title:
Nexus5672 WCCP service not responding when new client connected
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
when new client connected to the box, wccp process usage become high for 5 min and
at that time , cpu usage was very high . then wcccp process not responding and we can't check
config or setting of WCCP.

Conditions:
numbers of SVIs are configured

Workaround:
reduce the number of SVIs

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(6)N1(0.249)
Known Fixed Releases: *
7.0(8)N1(1), 7.1(3)ZN(0.132), 7.1(4)N1(0.697), 7.1(4)N1(1), 7.2(2)N1(0.351), 7.2(2)N1(1), 7.2(2)ZN(0.36), 7.3(0)IZN(0.13), 7.3(0)N1(0.243), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCux06997
Title:
inherit port-profile fails due to vpc orphan-port suspend
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Trying to inherit a port-profile on an interface throws the following error:
Nexus5500(config-if)# inherit port-profile PORT-PROFILE-NAME
Message reported by command :: vpc orphan-port suspend
ERROR: Configuration exists for some interfaces
ERROR: Failed to write VSH commands

Conditions:
"vpc orphan-port suspend" configured under the interface in question.

Workaround:
Remove "vpc orphan-port suspend" from the interface, inherit the port-profile and then add "vpc orphan-port suspend" configuration back on the interface.

Further Problem Description:
This issue does not apply when both the port-profile and the interface have "vpc orphan-port suspend" configured, where the error is expected due to mutual exclusion.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.219), 7.3(0)N1(1), 7.3(0)ZN(0.196)
Alert Type:
Updated *
Bug Id:
CSCuw48559
Title:
Nexus 5K: Change fan detection logic
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In Nexus 55xx switches, fans stop getting detected by the switch even though the fans are present in the system and spinning. if this condition is hit, messages such as following will be printed and the switch will shut down even though the fans are present and spinning.

2015 Mar 19 22:13:44.791 Nexus5548UP %$ VDC-1 %$ %NOHMS-2-NOHMS_ENV_ERR_FAN_DOWN: System minor alarm on fans: One fan missing or failed
2015 Mar 19 22:13:44.792 Nexus5548UP %$ VDC-1 %$ %PFMA-2-PFMA_FAN_REMOVED: Fan module 1 N5548P-FAN removed
2015 Mar 19 22:13:45.015 Nexus5548UP %$ VDC-1 %$ %PFMA-0-SYS_SHUTDOWN_FAN_REMOVAL: System shutdown in 60 seconds due to fan removal
2015 Mar 19 22:13:45.015 Nexus5548UP %$ VDC-1 %$ %NOHMS-2-NOHMS_ENV_ERR_FANS_DOWN: System major alarm on fans: Multiple fans missing or failed
2015 Mar 19 22:13:45.017 Nexus5548UP %$ VDC-1 %$ %PFMA-2-PFMA_FAN_REMOVED: Fan module 2 N5548P-FAN removed
2015 Mar 19 22:13:50.012 Nexus5548UP %$ VDC-1 %$ %PFMA-0-SYS_SHUTDOWN_FAN_REMOVAL: System shutdown in 55 seconds due to fan removal
2015 Mar 19 22:13:55.013 Nexus5548UP %$ VDC-1 %$ %PFMA-0-SYS_SHUTDOWN_FAN_REMOVAL: System shutdown in 50 seconds due to fan removal


Conditions:
Unknown

Workaround:
None

Further Problem Description:
The problem is seen due to system micro-controller not seeing fans even though it records the fan speed RPM. As part of this bug fix, the fan detection logic has been made more robust by also looking at RPM readings.

Last Modified:
30-JAN-2016
Known Affected Releases:
5.2(1)N1(7)
Known Fixed Releases: *
7.0(7)N1(0.307), 7.0(7)ZN(0.266), 7.0(8)N1(1), 7.1(3)N1(0.656), 7.1(3)N1(1), 7.1(3)ZN(0.64), 7.2(2)N1(0.5), 7.2(2)N1(1), 7.3(0)IZN(0.13), 7.3(0)N1(0.195)
Alert Type:
Updated *
Bug Id:
CSCuv46411
Title:
HIF ports go down and don't come back up when host reloads
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
10G CU HIF ports go down and don't come back up when connected host gets Reloaded

Conditions:
End Host Getting Reloaded

TESTSWITCH# sh int eth 109/1/21
Ethernet109/1/21 is down (Link not connected)

56XX
6000

Workaround:
Shut/No shut will not work, Removing the cable + SFP would reinitialize and would bring the port back up

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(6)N1(0.1)
Known Fixed Releases: *
7.0(7)N1(0.306), 7.0(7)ZN(0.263), 7.0(8)N1(1), 7.1(3)ZN(0.151), 7.1(4)N1(0.706), 7.1(4)N1(1), 7.2(2)N1(0.334), 7.2(2)N1(1), 7.2(2)ZN(0.4), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCux11097
Title:
N5k / N6k- ssh login-attempts 3 results in no ssh login-attempts
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ssh login-attempts 3 results in no ssh login-attempts in show run security all configuration on N6k / N5k.


N5K-EB5(config)# sh run security all | i ssh
feature ssh
ssh login-attempts 2
ssh key rsa 1024
no ssh key dsa
N5K-EB5(config)# conf ter

N5K-EB5(config)# ssh login-attempts 3
N5K-EB5(config)# sh run security all | i ssh
feature ssh
no ssh login-attempts
ssh key rsa 1024
no ssh key dsa
N5K-EB5(config)#


N5K-EB5(config)# ssh login-attempts 4
N5K-EB5(config)# sh run security all | i ssh
feature ssh
ssh login-attempts 4
ssh key rsa 1024
no ssh key dsa
N5K-EB5(config)#

Conditions:
only ssh login-attempts 3

Workaround:
use ssh login-attempts 1-2 , 4-10

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.2(1)N1(0.1)
Known Fixed Releases: *
7.1(3)ZN(0.115), 7.1(4)N1(0.689), 7.1(4)N1(1), 7.2(2)N1(0.334), 7.2(2)N1(1), 7.2(2)ZN(0.13), 7.3(0)IZN(0.13), 7.3(0)N1(0.209), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCug92414
Title:
SVI can go down corresponding vlan active on FlexLink only
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
SVI interface can go down when corresponding VLAN is active (forwarded by) on FlexLink only.

Conditions:
This issue can happen only if you have FlexLinks and regular STP ports (trunk/access) which are allowing VLAN X.
When last non-FlexLink port belonging to VLAN X goes down, SVI interfaces goes down as well.
This happens despite on fact that FlexLink is active and VLAN X forwarded by it.

Workaround:
In order to restore SVI state, you will need to shutdown/no shutdown it.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
5.1(3)N2(1), 5.2(1)N1(2)
Known Fixed Releases: *
7.3(0)D1(0.148), 7.3(0)GLF(0.43), 7.3(0)IB(0.122), 7.3(0)IZN(0.13), 7.3(0)N1(0.197), 7.3(0)N1(0.199), 7.3(0)N1(1), 7.3(0)PDB(0.112), 7.3(0)SC(0.14), 7.3(0)ZD(0.165)
Alert Type:
Updated *
Bug Id:
CSCuw89463
Title:
MTS buffer leaks for mcecm on the peer device with MCT flap
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Observed MTS buffer leaks on vPC secondary device with MCT flap

Conditions:
On a vPC setup, mts buffer leaks for vPC SAP (450) are seen after flapping MCT on vPC primary repeatedly around 20 times.

Workaround:
No workaround exists.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.177)
Known Fixed Releases: *
7.1(3)ZN(0.137), 7.1(4)N1(0.702), 7.1(4)N1(1), 7.2(2)N1(0.356), 7.2(2)N1(1), 7.2(2)ZN(0.40), 7.3(0)IZN(0.13), 7.3(0)N1(0.211), 7.3(0)N1(1), 7.3(0)ZN(0.190)
Alert Type:
Updated *
Bug Id:
CSCud96475
Title:
Inconsistent running and startup config on Nexus 5596
Status:
Terminated
Severity:
4 Minor
Description: *

Symptom:
Different order of the way the commands are shown between running and startup config .

Conditions:
None

Workaround:
Attached the file wokaround.txt

Further Problem Description:
Please read the Eng-notes attached

Last Modified:
13-JAN-2016
Known Affected Releases:
5.1(3)N2(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux76712
Title:
FC interface disabled due to 'bit error rate too high' when rate is low
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
A Fibre Channel interface is disabled and has the following status even though the bit error rate of the interface is below the threshold specified in the Fibre Channel standards:


show interface
fcx/y is down (Error disabled - bit error rate too high)


The following type of syslog messages are logged for the interface:


show logging log

%PORT-5-IF_DOWN_BIT_ERR_RT_THRES_EXCEEDED: %$VSAN v%$ Interface fcx/y is down (Error disabled - bit error rate too high)





Conditions:
This issue applies to all FC interfaces on the Nexus 5000 and Nexus 6000 models.

show platform software fcpc event-history errors
Event:E_DEBUG, length:102, at 571407 usecs after Tue Jan 5 05:33:02 2016
[102] CREDITMON_EVENT_ERR_COUNT, if_index 1105000: cur=0x2acfd01e76de prev=0x2acfd01e76dd occurances=3


If the time between occurances=1 to occurances=15 for the interface if_index is greater than 5 minutes, then this bug has been hit.

Workaround:
shut and then no shut the fc interface to recover.

Further Problem Description:
Even though the rate of bit errors on the affected link may not have been at as high as the rate specified in the Fibre Channel standards, there were still bit errors occurring. This causes the interface to be error disabled prematurely. However, persistent bit errors on a link are undesirable and the problem should still be corrected.

To find the fc interface, use the if_index

show system internal fcfwd idxmap interface-to-port | i 1105000
01105000 fc3/6 | 105| 0| 05| 01 | 02 | 05 | 0101| 00 | 00


Resolution Summary:
To be completed when the bug is resolved.

Last Modified:
12-JAN-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv29358
Title:
Interface counters on a Nexus 2348 may be erroneous
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
HIF interfaces on a Nexus 2348 may report incorrect counters.

Conditions:
This has been observed with a Nexus 2348.

Workaround:
No known workarounds at this time.

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
7.1(1)N1(1), 7.3(0)N1(0.117)
Known Fixed Releases: *
7.0(7)N1(0.307), 7.0(7)ZN(0.266), 7.0(8)N1(1), 7.1(3)N1(0.646), 7.1(3)N1(1), 7.1(3)ZN(0.54), 7.2(1)N1(0.318), 7.2(1)N1(1), 7.2(1)ZN(0.80), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCtz94196
Title:
Need capability to clear QoS statistics per interface.
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Cannot clear QoS statistics per interface.

Conditions:

Workaround:
Clear QoS statistics for the entire switch.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
5.2(1)N1(0.174)
Known Fixed Releases: *
7.1(3)ZN(0.175), 7.1(4)N1(0.725), 7.1(4)N1(1), 7.3(0)IZN(0.7), 7.3(0)N1(0.157), 7.3(0)N1(1), 7.3(0)ZN(0.145)
Alert Type:
New
Bug Id:
CSCux83991
Title:
hwclock crashes if system time set before Unix epoch
Status:
Open
Severity:
4 Minor
Description:

Symptom:
The hwclock process may repeatedly crash.

Conditions:
This was seen on a N5K switch where the system clock was set to October 1957, which is prior to the Unix epoch (time "0" or January 1, 1970). It's not know how the system got into that state as it seems to reject all attempts to set the time prior to that value manually.

When the time is corrected, crashes stop

Workaround:
Set system clock to a date/time after Unix epoch.

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
5.2(1)N1(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh12794
Title:
syslog message when max port-channel binded vFCs of 48 is reached.
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Port-binded vfc interface will not come up.

Conditions:
Over 48 vfc interfaces are configured that are binded (or bound) to a port-channel.

Workaround:
Bind the vfc to the physical ethernet interface.

Further Problem Description:
The max port-channel binded vFCs is 48 for N5K and N6K (except 6001)


# sh platform software fcoe_mgr info pcfcfmac

FCoE port-channel FCF-MAC allocation info
--------------------------------------------
Base MAC : 00:2a:6a:68:xx:xx
MAC Range : 48 <---------- max 48
Allocated : 0


From a 6001

# sh platform software fcoe_mgr info pcfcfmac

FCoE port-channel FCF-MAC allocation info
--------------------------------------------
Base MAC : 00:2a:6a:cd:6d:08
MAC Range : 24 <-------- max is 24 for nexus 6001
Allocated : 0

Last Modified:
04-JAN-2016
Known Affected Releases: *
5.2(1)N1(4), 7.0(6)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCua16886
Title:
Enh: Add a Note indicating restart needed for port type change.
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Currently Nexus 5548UP and 5596UP switches do not print a warning message indicating users that
the switch/module needs to be restarted for a port type change(Ethernet <->FC) to take effect.
This is an enhancement request so that the switch will have a message indicating so to the user.

Conditions:

Workaround:

Further Problem Description:
Fix is available in all recent versions.
7.0(8)N1(0.xx)
7.3.(0)N1(0.)
7.1(3)N1(1))


Last Modified:
28-JAN-2016
Known Affected Releases:
5.1(3)N2(1)
Known Fixed Releases: *
7.1(3)N1(1), n5000-uk9.7.0.8.N1.0.323.bin, n6000-uk9.7.3.0.N1.0.265.bin
Alert Type:
New
Bug Id:
CSCux86708
Title:
ENH: N5K needs commands to rebuild switch-profile DB
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Request for additional commands available from normal CLI to delete and recreate switch-profile DB, based on the existing configurations.

Conditions:
To be used when global-db and cfgd-db don't match with the global and switch-profile configs.

Workaround:
There are no simple procedures to recover from a situation like this.

Further Problem Description:
This is a serviceability enhancement to facilitate the recovery of config-sync issues (without requiring shell access), when DBs and running-configs differ.

Last Modified:
15-JAN-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux88771
Title:
Nexus5k FEX monitoring using CISCO-ENTITY-FRU-CONTROL-MIB
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Need to monitor the status of FEX module on N5K (same as shown using 'show fex' CLI).

Conditions:
FEX module installed on N5k Chassis

Workaround:
Use OID : cefcModuleTable

In the following output you can see there are two FEX, numbered 101 and 102, both of which are online.

ocs5548-2# sh fex

FEX FEX FEX FEX
Number Description State Model Serial
------------------------------------------------------------------------
101 FEX0101 Online N2K-C2232PP-10GE SSI155001QZ
102 FEX0102 Online N2K-C2232PP-10GE SSI15460AT7

When we browse the cefcModuleTable from this MIB we can see the two FEX, numbered 101000022 and 102000022, with an AdminStatus of enabled and an OperStatus of ok.

[sfuller@rhel8 ~]$ snmpwalk ocs5548-2 cefcMIBObjects.2
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.2 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.24 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.101000022 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.102000022 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.22 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.24 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.101000022 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.102000022 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.22 = INTEGER: 0
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.24 = INTEGER: 0
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.101000022 = INTEGER: 0
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.102000022 = INTEGER: 0

If we then take one of the FEX offline (by shutting the port-channel on the Nexus) I can see the FEX offline from the CLI as expected:

ocs5548-2(config-if)# sh fex

FEX FEX FEX FEX
Number Description State Model Serial
------------------------------------------------------------------------
101 FEX0101 Offline N2K-C2232PP-10GE SSI155001QZ
102 FEX0102 Online N2K-C2232PP-10GE SSI15460AT7

And the entry in the cefcModuleTable has now been removed.

[sfuller@rhel8 ~]$ snmpwalk ocs5548-2 cefcMIBObjects.2
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.22 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.24 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleAdminStatus.102000022 = INTEGER: enabled(1)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.22 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.24 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleOperStatus.102000022 = INTEGER: ok(2)
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.22 = INTEGER: 0
CISCO-ENTITY-FRU-CONTROL-MIB::cefcModuleResetReason.24 = INTEGER: 0

Further Problem Description:

Last Modified:
19-JAN-2016
Known Affected Releases:
7.1(3)ZN(0.99)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论