Cisco Blog » The Platform

2016年2月1日星期一

Cisco Notification Alert -Nexus 6000 Series Switch-01-Feb-2016 18:18 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6004 Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6004 Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6001 Switch
Software Type:
NX-OS System Software
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000-uk9.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) System Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 6000 Series Switches

Product Name:
Nexus 6001 Switch
Software Type:
NX-OS Kick Start
Release Version:
7.1(3)N1(2)
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.py
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000_poap_script.7.1.3.N1.2.tcl
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
22-JAN-2016
Alert Type:
New File
File Name:
n6000-uk9-kickstart.7.1.3.N1.2.bin
File Description:

Cisco Nexus 6000/5600 Series Switches 7.1(3)N1(2) Kick Start Image

File Release Date:
22-JAN-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 6000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCux92689
Title:
VMM_TIMEOUT: Service SAP 175 for slot 33 timed out in UPGRADE_READY_SEQ
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Observed %VMM-2-VMM_TIMEOUT: Service SAP 175 for slot 33 timed out in UPGRADE_READY_SEQ during ISSU

Conditions:
On a scaled vpc setup with 24 fexes, observed that ND-ISSU from 7.1(3)N1(2) to .upg image is consistently failing during upgrading first fex due to vmm timeout in upgrade_ready sequence.

Workaround:
None

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
7.1(3)N1(1.5)
Known Fixed Releases: *
7.1(3)N1(1.6), 7.1(3)N1(2), 7.3(0)N1(0.272), 7.3(0)N1(1), 7.3(0)ZN(0.249)
Alert Type:
New
Bug Id:
CSCux40515
Title:
fwm core seen in VINCI N6K
Status:
Open
Severity:
2 Severe
Description:

Symptom:Switch got reload due to FWM process crash
Conditions:In VINCI N6K setup, the fwm process crash was seen after issuing trigger triggerDisableEnableFabricpathWithTftp

Workaround:
NA

More Info:

Last Modified:
04-JAN-2016
Known Affected Releases:
7.1(3)ZN(0.116)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux23707
Title:
FWM hap reset with uplink-FO cfg on Maywood HIFs connctd to UCS VIC1225T
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
If we enable uplink-failover option on vNICs created in UCS VIC1225T, and configure corresponding veths bound to FEX HIFs on N6K VPC switches, then fwm hap reset happens once the veths come up.

Conditions:
1. Create Veths on FEX HIFs
2. Bind the first physical interface to the veth
3. For uplink failover configuration the second interface is bound to the veth, l
4. No shut the veth interface, when the veth comes up, FWM hap reset happens.

Workaround:
No workaround available

Further Problem Description:
As of now, the issue is known to be seen with FEX HIFs of specific FEXs which use tiburon asic i.e N2348UPQ, N2348TQ, N2332TQ & N2348TQ-E, connected to any UCS server with VIC adapter card. When issue is hit, FWM hap reset is seen on both VPC switches.

Last Modified:
21-JAN-2016
Known Affected Releases:
7.3(0)N1(0.208)
Known Fixed Releases: *
7.1(3)ZN(0.163), 7.1(4)N1(0.717), 7.1(4)N1(1), 7.2(2)N1(0.376), 7.2(2)N1(1), 7.2(2)ZN(0.59), 7.3(0)N1(0.255), 7.3(0)N1(1), 7.3(0)ZN(0.231)
Alert Type:
Updated *
Bug Id:
CSCuw93085
Title:
After shutting down an i/f , it takes long time to get to shut state
Status:
Open
Severity: *
2 Severe
Description:

Symptom:The reason is the port-channel is in adminCfgChange state for that much time.



Conditions:In vPC setup scale setup, It is seen that on shutdown of port-channel interface, there is a traffic drop for around 8-10 seconds. After it is completely down , the routes are removed from the adjacent routers... after which the traffic converges.
Workaround:None

Last Modified:
31-JAN-2016
Known Affected Releases:
7.3(0)N1(0.177)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur37987
Title:
nx-os crash in "show system internal im info module "non existing slot "
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Reason: Reset triggered due to HA policy of Reset
Service: ifmgr hap reset

Conditions:
Executing the command "sh system internal im event-history module" or "show system internal im info module x"

Workaround:
do not use "show system internal im info module x" with any non existing, non initialized module number

Further Problem Description:
none

Last Modified:
31-JAN-2016
Known Affected Releases:
7.0(4)N1(1), 7.1(3)N1(0.647)
Known Fixed Releases: *
7.0(3)I3(0.292), 7.0(3)I3(1), 7.1(3)ZN(0.138), 7.1(4)N1(0.703), 7.1(4)N1(1), 7.2(2)N1(0.357), 7.2(2)N1(1), 7.2(2)ZN(0.41), 7.3(0)IZN(0.13), 7.3(0)N1(0.201)
Alert Type:
Updated *
Bug Id:
CSCux32552
Title: *
N5K/6K ascii-cfg hap reset
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch reloads due to crash of process ascii-cfg.

Conditions:
When a checkpoint of the configuration is taken, under rare conditions, this issue can happen.

Workaround:

Further Problem Description:

Last Modified:
31-JAN-2016
Known Affected Releases: *
7.0(7)N1(1), 7.3(0)N1(0.208)
Known Fixed Releases:
7.1(3)ZN(0.156), 7.1(4)N1(0.711), 7.1(4)N1(1), 7.2(2)N1(0.367), 7.2(2)N1(1), 7.2(2)ZN(0.50), 7.3(1)N1(0.12), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCut60043
Title:
N5K/6K - 40G transceivers have delay for link-up on module boot/reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On Nexus 6004 chassis or module reload 40g interfaces can take up to 50 minutes to come online and forward traffic.

Conditions:
Reloading a chassis or LEM module that contains at least one 40g transceiver in a 6004 chassis

Workaround:
None. The interfaces do come up after a while

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(2)N1(1), 7.1(0)N1(1)
Known Fixed Releases: *
7.1(3)ZN(0.175), 7.1(4)N1(0.725), 7.1(4)N1(1), 7.3(0)BZN(0.47), 7.3(0)N1(0.102), 7.3(0)N1(1), 7.3(0)ZN(0.95)
Alert Type:
Updated *
Bug Id:
CSCux27565
Title:
Crash seen in eth_port-channel on BL node during scale
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
eth_port_channel crash is seen on a border leaf node upon reload

Conditions:
This scale setup has around 1000 sub-interfaces and 500 VRFs in the config.

Workaround:
No workaround exists.

Further Problem Description:
The config for the 500 vrfs is not saved [ no copy r s] but it is instantiated using node recovery when the BL boots up

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.216)
Known Fixed Releases: *
7.1(3)ZN(0.110), 7.1(4)N1(0.689), 7.1(4)N1(1), 7.2(2)N1(0.337), 7.2(2)N1(1), 7.2(2)ZN(0.20), 7.3(0)IZN(0.13), 7.3(0)N1(0.220), 7.3(0)N1(1), 7.3(0)ZN(0.197)
Alert Type:
Updated *
Bug Id:
CSCuw60905
Title:
KOkomo158(FP): DHCP DISCOVERs in same vlan do not cause MAC learn in FWM
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Multiple DISCOVERs in same vlan do not co-exist.

Conditions:
After the first DISCOVER causes auto-config, subsequent DISCOVERs do not cause MAC learn in FWM.

Workaround:

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.158)
Known Fixed Releases: *
7.1(3)ZN(0.163), 7.1(4)N1(0.717), 7.1(4)N1(1), 7.2(2)N1(0.372), 7.2(2)N1(1), 7.2(2)ZN(0.55), 7.3(0)IZN(0.13), 7.3(0)N1(0.237), 7.3(0)N1(1), 7.3(0)ZN(0.214)
Alert Type:
Updated *
Bug Id:
CSCuw95767
Title:
KK144:FWM Crashed while executing "show tech-support fwm" in scale setup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Fwm crash while Executing "show tech-support fwm" in the scale test bed

Conditions:
scale test bed with portchannels having more than 3k vlan configured.

Workaround:
No workaround

Further Problem Description:
Buffer overrun happens while trying to print the lif/pif of the switch in the "show plaform fwm info lif all verbose" which is part of "show tech-support fwm"
the buffer allocation is hardcoded to 48512bytes in the code. and we are crossing that allocation and creating buffer overrun situation . while freeing the buffer back the mem track tool captures this and asserts the fwm process.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.204), 7.3(0)ZN(0.144)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.215), 7.3(0)N1(1), 7.3(0)ZN(0.192)
Alert Type:
Updated *
Bug Id:
CSCuw51800
Title:
unable to delete param-list from config file
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When using auto-config, the param-list of a profile are not removed when a profile is un-applied.

Conditions:
This happens after "copy r s" and reload reload with param-list / applied configs present in startup config.

Workaround:
Use no param-list xyz cross-check command to force remove the param-list if it is not actually being used.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.150)
Known Fixed Releases: *
7.0(3)I3(0.276), 7.0(3)I3(1), 7.1(3)ZN(0.131), 7.1(4)N1(0.696), 7.1(4)N1(1), 7.2(2)N1(0.379), 7.2(2)N1(1), 7.2(2)ZN(0.62), 7.3(0)IZN(0.13), 7.3(0)N1(0.234)
Alert Type:
Updated *
Bug Id:
CSCux03218
Title:
Kernel reload during ISSU/ISSD from KK-191 bin to upg image
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ISSU failure while ISSU with the following error:-

Saving mts state.
[###############[ 1480.449005] writing reset reason 88,

#####] 100% -- SUCCESS
Reloading the kernel to proceed with the upgrade.
All telnet and ssh connections will now be temporarily terminated.
[ 1484.883321] Starting new kernel
[ 1484.920850] Calling kexec callback
[ 1484.930002] Moving to new kernel
[ 1484.930002] Calling into reboot_code_buffer code
??[ 7.776667] RAMDISK: incomplete write (-28 != 51) 134217728
[ 7.843203] crc error
[ 8.044987] EXT2-fs error (device ram0): ext2_check_page: bad entry in director
y #1492: : rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, name_le
n=0
[ 8.220824] EXT2-fs error (device ram0): ext2_check_page: bad entry in director
y #373: : rec_len is smaller than minimal - offset=1024, inode=0, rec_len=0, name_
len=0
[ 8.398679] EXT2-fs error (device ram0): ext2_check_page: bad entry in director
y #1899: : rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, name_le
n=0
[ 8.574519] KGDB: Waiting for remote debugger
[ 8.581876] wdt_log_buf: No logging buffer available, use local buffer
[ 8.581876] platform_type=3, hwclock time: 09:40:51, 08/09/2001
[ 8.581876]
0997350050:619999998 process swapper (1), jiffies 0xffff8e2e
[ 8.581876] invalid opcode

Conditions:
ISSU

Workaround:
None

Further Problem Description:
While doing KEXEC for the new kernel , the root file system if for some reason gets corrupted, then the unzipping of the File system would be an invalid rootfs , thus INIT task will not get started and generates a Kernel Panic.

In NC72UP-8G , IO use the SEGMENT received from NBI headers in kickstart image and it seems the calculation of RFS segment was done wrongly due to which, the RFS was getting corrupted.

So now NBI script will hard coded to an appropriate correct value.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.191)
Known Fixed Releases: *
7.1(3)N1(1.4), 7.1(3)N1(2), 7.1(3)ZN(0.136), 7.1(4)N1(0.701), 7.1(4)N1(1), 7.2(2)N1(0.356), 7.2(2)N1(1), 7.2(2)ZN(0.40), 7.3(0)IZN(0.13), 7.3(0)N1(0.215)
Alert Type:
Updated *
Bug Id:
CSCuv88346
Title:
EVPN: FWM crash at fwm_mtlite_enable_dynamic_vlan_detection
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
System crash while apply config when modules were coming up.

Conditions:
After system bringup and applying the breakout config, modules were powered off and powered on and simultaneously configs were applied.

Workaround:
Let the system come up fully. After that only apply the config.

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.94)
Known Fixed Releases: *
7.1(3)ZN(0.160), 7.1(4)N1(0.715), 7.1(4)N1(1), 7.3(0)IZN(0.13), 7.3(0)N1(0.236), 7.3(0)N1(1), 7.3(0)ZN(0.212)
Alert Type:
Updated *
Bug Id:
CSCue99559
Title:
N5K/6K: FWM hap reset during ISSU upgrade
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Nexus 5K/6K can crash in FWM process during a non disruptive ISSU

Conditions:
Seen during non disruptive ISSU upgrade

Workaround:
None

Further Problem Description:
The crash is due to stale entries in PSS which could have occurred in the past. Trigger for this is VLAN deletion/addition and execution of 'no feature-set fabricpath" and re-adding it in older code.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases: *
7.0(7)N1(0.307), 7.0(7)ZN(0.266), 7.0(8)N1(1), 7.1(3)ZN(0.133), 7.1(4)N1(0.698), 7.1(4)N1(1), 7.2(2)N1(0.355), 7.2(2)N1(1), 7.2(2)ZN(0.39), 7.3(0)IZN(0.13)
Alert Type:
Updated *
Bug Id:
CSCut49092
Title:
[comm:ethpm] WARNING: possible memory leak is detected on pers queue
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Switch will be throwing continuous errors about ethpm leak as
"2015 Mar 20 23:45:06 SPINE11 %$ VDC-1 %$ Mar 20 23:45:06 %KERN-2-SYSTEM_MSG: [29216.124753] [sap 175][pid 3942][comm:ethpm] WARNING: possible memory leak is detected on pers queue (len=3122,bytes=32760206) - kernel"

Conditions:
Issue is seen after a write erase, reload,copy bootflash:config to running config.

Workaround:
None

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(6)N1(0.258)
Known Fixed Releases: *
7.2(2)N1(0.360), 7.2(2)N1(1), 7.2(2)ZN(0.44), 7.3(0)IZN(0.13), 7.3(0)N1(0.208), 7.3(0)N1(1), 7.3(0)ZN(0.188)
Alert Type:
New
Bug Id:
CSCux85832
Title:
pvlan traffic blackholed after GIR on n5k fabricpath leaf
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Traffic Loss .

Conditions:
When GIR is done on fabric path leaf

Workaround:
vpc shutdown to be used.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.3(0.215)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCur72846
Title:
Multi mobility domain and FCOE coexistance does not work
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
FCoE VFC doesn't come up, when Multi Mobility Domain feature is enabled.

Conditions:
The issue happens in following sequence:
1. FCoE VLAN is created first.
2. Then, "system fabric global-mobility-domain detectable-vlans " is configured with FCoE VLAN in detectable vlan range.

Workaround:
There are 2 workarounds:

1. Ensure that FCoE VLAN is created *after* "system fabric global-mobility-domain detectable-vlans" is configured.
2. If the issue is already hit due to the execution of sequence mentioned in "conditions" section, then delete and re-add FCoE VLAN to recover from the issue.

Further Problem Description:

Last Modified:
29-JAN-2016
Known Affected Releases:
7.1(0)N1(0.401), 7.1(2)N1(0.575)
Known Fixed Releases:
7.1(3)ZN(0.159), 7.1(4)N1(0.714), 7.1(4)N1(1), 7.2(2)N1(0.364), 7.2(2)N1(1), 7.2(2)ZN(0.47), 7.3(0)N1(0.118), 7.3(0)N1(1), 7.3(0)ZN(0.109)
Alert Type:
Updated *
Bug Id:
CSCuu37102
Title:
N5K kernel Panic on AIPC driver causing crash
Status:
Fixed
Severity:
2 Severe
Description: *

A Nexus 5K/6K could reload due to a kernel panic

Symptom:

Conditions:
This has been seen on Nexus running 7.1(1)N1(1) and 7.0(6)N1(1)

Workaround:
Software fix is currently available in NX-OS 7.1(2)N1(1).
A debug plugin based workaround also exists. Please contact TAC to obtain the workaround.

Further Problem Description:

Last Modified:
28-JAN-2016
Known Affected Releases:
6.0(2)N2(7), 7.1(1)N1(1), 7.3(0)N1(0.104)
Known Fixed Releases:
7.0(6)N1(1.4), 7.0(6)N1(2s), 7.0(7)N1(0.65), 7.0(7)N1(1), 7.0(7)ZN(0.141), 7.1(2)N1(0.575), 7.1(2)N1(1), 7.1(2)ZN(0.36), 7.2(1)N1(0.246), 7.2(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCur26244
Title:
Nexus 6000/5600 packet drops with no drop traffic
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Slow FC or FCOE Performance with Nexus 5600/6000
Selective Retransmission Request (SRR) may be logged on host or storage.

Drops on the egress on a Nexus 5600/6000, for a no-drop class of traffic.
Note: TAC will confirm packet loss

Conditions:Applies only when all of the following are true:
1. Running 10g OR 40g fabric mode
2. Nexus 5600/6000 platform
3. Running NX-OS version 7.0(6)N1(1) or prior.

This is seen with 10G fabric mode when traffic flow is high for a single class of traffic, and multiple ingress ports send data to the same egress port


Workaround:Contact TAC for a workaround.
Since it is a register change, recommend only experienced folks do these register changes.

More Info:Issue is not seen with Nexus 5000/5500. After upgrading to fixed release a reload is required to fully resolve this issue.

Resolution Summary:
A change was made to set no-drop pool buffer allocation to the maximum value.
The fix is available in 7.0(7)N1(1), 7.1(0)N1(1), 7.2(0)N1(1) and all later releases.



Last Modified:
25-JAN-2016
Known Affected Releases:
7.0(6)N1(0.272), 7.1(0)N1(0.368)
Known Fixed Releases: *
7.0(7)N1(1), 7.0(7)ZN(0.156), 7.1(0)N1(1), 7.2(0)N1(1), 7.2(0)ZN(0.91)
Alert Type:
Updated *
Bug Id:
CSCux60138
Title: *
PPM core during auto-configure
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
port-profile cored during a scale bld-dci auto-config.

Conditions:
Seen once. No specific condition.

Workaround:
None

Further Problem Description:

Last Modified:
22-JAN-2016
Known Affected Releases:
7.3(0)N1(0.238)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup10367
Title:
N6K/N5K Crashed @MRIB
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
nexus switch might crash unexpectedly with mrib hap reset

2010 Nov 3 09:49:40 AOB-5k-1 %$ VDC-1 %$ %VDC_MGR-2-VDC_ONLINE: vdc 1 has come online
2015 Dec 10 18:08:35 AOB-5k-1 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "mrib" (PID 3496) hasn't caught signal 11 (core will be saved).
2015 Dec 10 18:08:35 AOB-5k-1 %$ VDC-1 %$ %SYSMGR-2-HAP_FAILURE_SUP_RESET: System reset due to service "mrib" in vdc 1 has had a hap failure

Conditions:
normal operation

Workaround:
there is no workaround. issue not seen in new code

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
7.0(2)N1(1)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.314), 7.0(8)N1(1)
Alert Type:
New
Bug Id:
CSCux95418
Title:
2348TQ: N2H traffic is dropped due to sending it to the wrong port
Status:
Open
Severity:
2 Severe
Description:

Symptom:
In enhanced vPC environment, traffic from a parent switch to a server via FEX could be dropped. The traffic could be sent out from the wrong HIF port on the FEX.

Conditions:
Still unknown. Reload a parent switch, HIF flapping or vPC peer-link flapping might trigger the problem.

Workaround:
The problem is not self recovered. By executing shut and no shut FEX HIF, it is restored.

Further Problem Description:
This defect is still under investigation.

Last Modified:
01-FEB-2016
Known Affected Releases:
7.1(2)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu92452
Title:
Too many MTS flush generated when connecting VPC+ MST to legacy RPVST
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Too many MTS flush messages generated when connecting VPC+ MST to legacy RPVST, if multiple switches are connected at the same this can lead to instabilities of the VPC+ pair

Conditions:
Connecting VPC+ MST to legacy RPVST switches

Workaround:
Use RPVST on VPC+ instead of MST

Further Problem Description:

Last Modified:
21-JAN-2016
Known Affected Releases:
7.0(5)N1(1a)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.321), 7.0(8)N1(1), 7.1(3)N1(0.623), 7.1(3)N1(1), 7.1(3)ZN(0.30), 7.3(0)BZN(0.47), 7.3(0)N1(0.95), 7.3(0)N1(1), 7.3(0)ZN(0.89)
Alert Type:
Updated *
Bug Id:
CSCuw66815
Title:
Nexus 5k/6k may reload with "fex hap reset" when FEX is not supported.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Device reloads with "fex hap reset" after "show fex" or "show fex # transceiver".

Conditions:
FEX is not supported in used NX-OS version.

Workaround:
Upgrade to NX-OS which supports this FEX.

Further Problem Description:
N/A

Last Modified:
21-JAN-2016
Known Affected Releases:
7.0(7)N1(1)
Known Fixed Releases: *
7.0(3)I3(0.272), 7.0(3)I3(1), 7.3(0)IZN(0.7), 7.3(0)N1(0.169), 7.3(0)N1(1), 7.3(0)ZN(0.157)
Alert Type:
New
Bug Id:
CSCux91530
Title:
Hitting "Fowarding ASIC Failure" after ISSU from KK268 bin to upg
Status:
Open
Severity:
2 Severe
Description:

Symptom:
module is not coming up. showing as hardware failure

Conditions:
performing upgrade from bin to upg

Workaround:
reload the switch

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.268)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux80611
Title:
Vlan to vni mapping incorrect on the border leaf VPC system
Status:
Open
Severity:
2 Severe
Description:

Symptom:
%FWM-2-VLAN_VNI_MAPPING_INCORRECT: VLAN to VNI mapping is incorrect syslog is seen.

Conditions:
1. Applicable at EDGE or Border Leaf when feature nv overlay and nv overlay evpn is enabled:
2. VNI is associated under nve interface for a vlan, routed interfaces or sub interfaces are present in the system.
3. routed interface or sub interface is deleted prior to vni is removed under nve interface or respective vlan (mapped with vni) is deleted.


Workaround:
None.

Further Problem Description:
Routed interfaces and sub interfaces uses a L3 vdc VLAN internally in the range of 4-4094 and if this vlan is getting used as core VLAN with L3 VNI under NVE interface then deleting the sub interfaces deletes L3 vdc VLAN mappings.

Now if a core VLAN-VNI is also removed, which is same as L3 vdc VLAN picked up randomly for routed or sub interfaces then VLAN residual states might present in the switch even after deleting the VLAN.

Using the same VLAN but different VNI mapping may cause the VLAN_VNI_MAPPING_INCORRECT and forwarding might not work.

Even after this fix.
Please ensure to shut the routed and sub interfaces before changing the core VLAN range.

Last Modified:
21-JAN-2016
Known Affected Releases:
7.3(0)N1(0.254)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux54950
Title:
Traffic drop with 'hardware profile fast-port-channel-bringup'& hif flap
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Seen traffic drops for north to south trafic (eth port to hif port channel) on submitter setup when HIF port channel has single port and "hardware profile fast-port-channel-bringup" feature is enabled.

Conditions:
hardware fast-port-channel-bringup feature is enabled and HIF port channel has single member port.

Workaround:
no hardware fast-port-channel-bringup, pc flap brings up the traffic.

Further Problem Description:
Seen traffic drops for north to south trafic (eth port to hif port channel) on submitter setup when HIF port channel has single port and "hardware profile fast-port-channel-bringup" feature is enabled. Found interface counters are incremented more than as expected. no hardware fast-port-channel-bringup, pc flap brings up the traffic.

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.220)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq81648
Title:
N5K: Po configured as fex-fabric does not work as normal VPC trunk port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On a Nexus 5K switch if we configure ports as a fex-fabric port-channel, and then configure the prots as regular VPC trunk port the links stop passing traffic.

Conditions:
Sequence of events
a) The physical interface needs to be configured as part of a fex-fabric port channel.
b) Configure the port-channel as a regular VPC trunk interface

Workaround:
The workaround is to use a different port-channel interface ID when configuring the VPC trunk port. For example, if you were using port-channel 2 as a fex-fabric interface, and want to use the same physical ports for creating a regular VPC, use port-channel 10.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
5.2(1)N1(8a), 7.0(3)N1(0.99)
Known Fixed Releases: *
7.1(3)N1(0.647), 7.1(3)N1(1), 7.1(3)ZN(0.55), 7.2(2)N1(0.357), 7.2(2)N1(1), 7.2(2)ZN(0.41), 7.3(1)N1(0.4), 7.3(1)N1(1)
Alert Type:
Updated *
Bug Id:
CSCuw28452
Title:
Dot1q Port shudown (with 4k vlans) time increased to 9sec in kokomo
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Dot1q Port shudown (with 4k vlans) time increased to 9sec

Conditions:

Workaround:
no workaround

Further Problem Description:
STP is taking ~3.5 sconds to respond to LOGICAL BRINGUP message
FWM is taking around ~3.5 Seconds.

Last Modified:
13-JAN-2016
Known Affected Releases: *
7.3(0)N1(0.100), 7.3(0)N1(0.80)
Known Fixed Releases:
7.3(0)N1(0.243), 7.3(0)N1(1), 7.3(0)ZN(0.220)
Alert Type:
Updated *
Bug Id:
CSCuw61635
Title:
vpc crash at fu_fsm_engine_post_event_processing on 48 AA fex bringup
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
vpc core

Conditions:
copying bootflash file to running-config with 600+po

Workaround:
issue is fixed

Further Problem Description:

Last Modified:
13-JAN-2016
Known Affected Releases:
7.3(0)N1(0.150)
Known Fixed Releases: *
7.1(3)ZN(0.158), 7.1(4)N1(0.713), 7.1(4)N1(1), 7.3(0)IZN(0.7), 7.3(0)N1(0.171), 7.3(0)N1(1), 7.3(0)ZN(0.158)
Alert Type:
New
Bug Id:
CSCuw15815
Title:
FLD_REQ(TO): Validation fail after device wr + reload (vtp pwd is ON)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VLANS/MST configs are not getting updated properly on N6k and getting FLD_REQ(TO): Validation fail(MD5 mismatch) message

Conditions:
VTP v3 is configured on the topology mentioned in Description with VTP password enabled.

Workaround:

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.104)
Known Fixed Releases:
7.3(0)IZN(0.7), 7.3(0)N1(0.167), 7.3(0)N1(1), 7.3(0)ZN(0.155)
Alert Type:
Updated *
Bug Id:
CSCux88309
Title:
KK260:maint mode runn is added to "show runn int <name>" cmd output
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"show runn mmode" command output is getting added with ""show running-config interface " command output

Conditions:
maintenance mode profile should be configured.

Workaround:
need to remove maintenance mode profile

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.260)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.269), 7.3(0)N1(1), 7.3(0)ZN(0.246)
Alert Type:
New
Bug Id:
CSCux30836
Title:
NIV: Static Veth deletion taking long time on VPC primary switch
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When static veths are deleted on VPC primary switch, it takes a long time for the veths to actually get deleted. The corresponding veths on secondary switch get deleted instantly.

Conditions:
Static veth deletion on VPC switches

Workaround:
NA

Further Problem Description:
When we shut and delete the veth interfaces on VPC primary switch, it takes a significant amount of time for the interfaces to get deleted:

First, the veth shut CLI takes about 70-90 secs to get executed:
48q-npv(config-if-range)# no interface vethernet 1-2
^[[A^[[B ^
<Invalid range at '^' marker.
48q-npv(config-if-range)# sh run interface vethernet 1-2

48q-npv(config-if-range)#


But veths are still not deleted. They get struck in this state for atleast 3-5 mins:

48q-npv(config-if-range)# sh interface virtual status
Interface VIF-index Bound If Chan Vlan Status Mode Vntag
-------------------------------------------------------------------------
Veth1 VIF-16 Eth101/1/9 1 1 Deleting Unknown 2
Veth1 VIF-21 Eth102/1/9 1 1 Init Unknown 2
Veth2 VIF-20 Eth102/1/9 2 1 Init Unknown 3
Veth2 VIF-19 Eth101/1/9 2 1 Deleting Unknown 3

Last Modified:
05-JAN-2016
Known Affected Releases:
7.1(2)N1(1), 7.3(0)N1(0.177), 7.3(0)N1(0.208)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux64958
Title:
Documentation-Netflow missing BGP ASN and next hop IP detail
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Documentation update is required to mention the restriction software imposes currently for Netflow collection of BGP ASN and next hop IP details.
Enhancement CSCuw66497 is currently pending for development for FIB to assist Netflow collection.

Conditions:
Netflow collection of BGP ASN and next hop IP details.

Workaround:
None. This is a documentation bug to outline the restrictions on config guides and release notes.

Further Problem Description:

Last Modified:
04-JAN-2016
Known Affected Releases:
7.0(1)N1(1), 7.1(1)N1(1), 7.2(1)N1(1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux77664
Title:
Qos counters not working for Acl based classification
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
class-map with a match acl upon the show policy-map interface
Service-policy (qos) input: pmap_in
policy statistics status: enabled

Class-map (qos): class_in (match-all)
0 packets
Match: access-group qos_in
set qos-group 4
set dscp af11

Class-map (qos): class-default (match-any)
0 packets
Match: any
set qos-group 0

Conditions:
Class-map with an ACL as a criteria

Workaround:
"show ip access-list " shows the counters for ACL

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.245)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw83023
Title:
%STP-2-VLAN_PORT_LIMIT_EXCEEDED on ISSU even when spanning-tree disabled
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When upgrading software by In-Service Software Upgrade(ISSU), following error messages are shown,
although vlan-port instances are not exceeded before upgrade since spanning-tree for all vlans are disabled.
xxxx indicates current vlan-port, yyyy indicates system limit number.

%STP-2-VLAN_PORT_LIMIT_EXCEEDED: The number of vlan-port instances (xxxx) exceeded [Rapid-PVST mode] recommended limit of yyyy

Conditions:
Nexus 5672 series running with 7.0(5)N1(1) and vPC is configured.
Configuring trunk ports and total of allowed vlan exceeds the limit, and all spanning-tree for these vlans are disabled.
Upgrading software from 7.0(5)N1(1) to 7.1(1)N1(1) by ISSU.
Also observed upgrading software from 7.1(1)N1(1) to 7.2(1)N1(1) by ISSU.

Workaround:
Upgrading software by disruptive upgrade.

Further Problem Description:
This issue is under investigation.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.1(4)N1(0.718), 7.1(4)N1(1), 7.2(2)N1(0.361), 7.2(2)N1(1), 7.2(2)ZN(0.45), 7.3(0)IZN(0.13), 7.3(0)N1(0.195), 7.3(0)N1(1), 7.3(0)ZN(0.178)
Alert Type:
Updated *
Bug Id:
CSCuv91507
Title:
Migrating Fex from N7K to N6K/N5K may result in the FEX failing to boot
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A FEX which is attached to an N7K running 6.2(12) or 7.2(0)D1(1) may fail to boot when moved to a Nexus 6K or Nexus 5K:

08/21/2015 00:51:59.593386: Module register received
08/21/2015 00:51:59.594388: Image Version Mismatch
08/21/2015 00:51:59.595438: Registration response sent
08/21/2015 00:51:59.595794: Requesting satellite to download image
08/21/2015 00:53:52.981356: Image preload failed.
08/21/2015 00:54:00.132452: Deleting route to FEX
08/21/2015 00:54:00.141675: Module disconnected
08/21/2015 00:54:00.143718: Module Offline
08/21/2015 00:54:00.152157: Deleting route to FEX
08/21/2015 00:54:00.159062: Module disconnected
08/21/2015 00:54:00.161167: Offlining Module

Conditions:
Issue has been observed on 2248TP-E FEX conencted to F3 line card on N7K.

Workaround:
On 5K/6K running 7.2, the issue can be corrected by unplugging and plugging the cable back in at the FEX uplink.

Further Problem Description:
Migrating Fex from N7K to N6K/N5K may result in the FEX failing to boot

Last Modified:
30-JAN-2016
Known Affected Releases:
6.2(12), 7.2(0)D1(1)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.208), 7.3(0)N1(1), 7.3(0)ZN(0.188)
Alert Type:
Updated *
Bug Id:
CSCus42592
Title:
Potential Buffer Overflow in Nexus 6k Bios
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
This product includes a version of third-party software that is affected by the vulnerabilities identified by the following Common Vulnerability
and Exposures (CVE) IDs:

CVE-2014-8271

Cisco has analyzed these vulnerabilities and concluded that the product is not impacted

Conditions:
Not applicable

Workaround:
Not applicable

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.3:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2014-8271 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
20-JAN-2016
Known Affected Releases:
7.2(0.1)PR(0.1)
Known Fixed Releases: *
7.3(0)IZN(0.7), 7.3(0)N1(0.180), 7.3(0)N1(0.210), 7.3(0)N1(1), 7.3(0)ZN(0.162), 7.3(0)ZN(0.190)
Alert Type:
New
Bug Id:
CSCuu21983
Title:
mts leak between Mcecm SAP and CFS after mct flap followed by reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
observed MTS leak between Mcecm SAP and CFS services.

Conditions:
These MTS leaks are observed after mct flap on primary followed by reload.

Workaround:
none

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.2(0)N1(0.186)
Known Fixed Releases:
7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.3(0)IZN(0.7), 7.3(0)N1(0.150), 7.3(0)N1(1), 7.3(0)ZN(0.138)
Alert Type:
Updated *
Bug Id:
CSCuw99897
Title:
kokomo_190 : PC member links are suspended by vPC
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
There are scenarios where command doesn't get rejected when explicit configuration of VPC id for HIF Port-channel when the FEX is in Active-Active mode.

Conditions:
FEX is in AA mode.

Workaround:
None

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.190)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux25186
Title:
[KK_208]: vPC-Mgr SAP timed out on unconfiguring MCT on vPC Primary
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
2015 Nov 17 15:10:10 Classical-Ethernet-Layer-3-Nexus-56128P--Pod--Left--vPC-Primary %ETH_PORT_CHANNEL-3-ALL_DROP_TIMEOUT: Some component(s) (sap:unknown) timed out on dropping
notif:MTS_OPC_IM_IF_REMOVED (for:port-channel999); Please collect

Conditions:
Issue is triggered on a vPC setup with HSRP scale

Workaround:
returns after few minutes with no functional impact.

Further Problem Description:

Last Modified:
20-JAN-2016
Known Affected Releases:
7.3(0)N1(0.150), 7.3(0)N1(0.208), 7.3(0)N1(0.213)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCug84860
Title:
N6K/N56K sends wrong FCF-MAC causing N4K server adapter ports to go down
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
For any configured vFC interfaces using "bind mac-address" the N6K/N56K uses the interface FCF for FIP negotiation and for FLOGI.

When the CNA sends a PLOGI to the name server, the N6K/N56k sends PLOGI_ACC using the VSAN global FCF MAC address as a source which breaks the FCoE virtual link.

As a result the CNA ignores this reply since it is not coming from the correct virtual link mac address and the FC4 feature type is missing in the FCNS database.

Conditions:
All conditions below must be met to hit the bug.

- This can apply to the following platforms: N600X, N56XX
- NX-OS 7.x
- vFC is configured to bind by MAC address

Workaround:
Bind the vFC by the interface instead of the MAC address.

Further Problem Description:
The CNA does not register its name server information:

Switch# show fcns database

VSAN 60:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x8d0000 N 10:00:00:00:a5:50:f3:55 scsi-fcp:target
0xcd0000 N 10:00:00:00:a5:50:f3:58 << missing fc4 data type

Total number of entries = 2

VSAN 61:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x590000 N 10:00:00:00:13:13:00:00 scsi-fcp:target
0x590020 N 10:00:00:00:13:13:00:01 scsi-fcp:target
0x590100 N 10:00:00:00:13:13:00:07 scsi-fcp:target
0x590120 N 10:00:00:00:13:13:00:08 scsi-fcp:target
0x590140 N 10:00:00:00:13:13:00:09 scsi-fcp:target
0xed0000 N 10:00:00:61:16:16:00:00 << missing fc4 data type
0xed0020 N 10:00:00:61:16:16:00:01 scsi-fcp:target
0xed0040 N 10:00:00:61:16:16:00:02 scsi-fcp:target
0xed0060 N 10:00:00:61:16:16:00:03 scsi-fcp:target

Last Modified:
30-JAN-2016
Known Affected Releases:
7.0(5)N1(1), 7.1(0)N1(1)
Known Fixed Releases: *
7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.2(2)N1(0.368), 7.2(2)N1(1), 7.2(2)ZN(0.51), 7.3(0)IZN(0.13), 7.3(0)N1(0.215), 7.3(0)N1(1), 7.3(0)ZN(0.192)
Alert Type:
New
Bug Id:
CSCuv87316
Title:
"show interfaces" takes 6-7 min to complete
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
'show interface' CLI output takes longer time.

Conditions:
This issue is seen on L2 scale testbed with 24 fexs. There are 1780 interfaces.

Workaround:
None.

Further Problem Description:
This seems to be the expected performance for a command like 'show interface' to fetch the data for so many interfaces. I have verified that there is NO high CPU utilization and NO MTS queue buildup while running this command for 1800 interfaces. 'Show interface' fetches the required information to be displayed from the various components / modules involved. And fetching the such bulk information for large number of interfaces would take time. In case of 'show interface status' , we are fetching only single attribute - the status of the interface and hence it is faster.

Last Modified:
20-JAN-2016
Known Affected Releases:
7.0(3)N1(0.93)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw09193
Title:
%CDP-4-NATIVE_VLAN_MISMATCH message not logged on N5600
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
%CDP-4-NATIVE_VLAN_MISMATCH message not logged on N5600 when it happens

Conditions:
Native vlan mismatch

Workaround:
N/A

Further Problem Description:
%CDP-4-NATIVE_VLAN_MISMATCH message not logged on N5600 when it happens

Last Modified:
19-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.1(4)N1(0.718), 7.1(4)N1(1), 7.3(0)N1(1), 7.3(0)ZN(0.123)
Alert Type:
Updated *
Bug Id:
CSCuu62888
Title:
N5K/N6K ISIS Neighbor with network type p2p adjacency not coming up
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On a nexus 5000/6000 series switch, ISIS Neighbor with network type p2p is not coming up with routers running IOS-XR

Conditions:
None

Workaround:
None

Further Problem Description:
None

Last Modified:
18-JAN-2016
Known Affected Releases:
7.1(1)N1(1)
Known Fixed Releases: *
7.1(3)ZN(0.163), 7.1(4)N1(0.717), 7.1(4)N1(1), 7.3(0)BZN(0.47), 7.3(0)ZN(0.103)
Alert Type:
Updated *
Bug Id:
CSCux59653
Title:
fwm core is observed while Disable/enable lacp with TFTP
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
FWM process crash

Conditions:
Disable/enable lacp with TFTP on N6K switch running images 7.3.0.ZN.0.218.

Workaround:
NA

Further Problem Description:

Last Modified:
18-JAN-2016
Known Affected Releases:
7.3(0)ZN(0.218)
Known Fixed Releases: *
7.3(0)N1(0.264), 7.3(0)N1(1), 7.3(0)ZN(0.240)
Alert Type:
Updated *
Bug Id:
CSCuv96234
Title:
match datalink mac destination-address use field id 57 for ingress flow
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"match datalink mac destination-address" use PostDestinationMacAddress for ingress flow

Conditions:
- configure flow record for ingress source/destination mac.
- nx-os use field id 56 (sourceMacAddress) for source mac
- nx-os use field id 57 (PostDestinationMacAddress) for destination mac.
- nx-os shoud use field id 80 (destinationMacAddress).

http://www.cisco.com/c/en/us/td/docs/routers/access/ISRG2/AVC/api/guide/AVC_Metric_Definition_Guide/avc_app_exported_fields.html

Workaround:
none

Further Problem Description:
This behavior seen on N7K.
- 7.2(1)D1(1)
- 6.2(12)

Last Modified:
14-JAN-2016
Known Affected Releases:
7.0(3)N1(1), 7.2(0)N1(1)
Known Fixed Releases: *
7.1(3)ZN(0.159), 7.1(4)N1(0.714), 7.1(4)N1(1), 7.2(2)N1(0.346), 7.2(2)N1(1), 7.2(2)ZN(0.29), 7.3(0)N1(0.140), 7.3(0)N1(1), 7.3(0)ZN(0.128)
Alert Type:
Updated *
Bug Id:
CSCux71610
Title:
Multiple VPC sections are seen after maintenance-mode is configured
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DCNM is not discovering the interfaces due to multiple sections of the vpc domain

Conditions:
router ospf 100
isolate
router ospfv3 100
isolate
fabricpath domain default
isolate
vpc domain 100 <<<< this section is seen in "show runn | sec vpc"
shutdown

N6K_P1#

Workaround:
remove the "vpc domain " configuration from maintenance-mode

Further Problem Description:

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.245)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.259), 7.3(0)N1(1), 7.3(0)ZN(0.235)
Alert Type:
Updated *
Bug Id:
CSCux41730
Title:
NXOS changes wrt BIOS change for CSCuw58510
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A Nexus 600x switch might hang with no response via console, mgmt0 or inband interfaces. In certain NX-OS error messages such as following are printed prior to switch being impacted.
%USER-0-SYSTEM_MSG: 452: PCIe critical FAILURE DETECTED, contact Cisco TAC - pfm
%USER-0-SYSTEM_MSG: 453: PCIe critical FAILURE DETECTED, contact Cisco TAC - pfm
%USER-0-SYSTEM_MSG: 454: PCIe critical FAILURE DETECTED, contact Cisco TAC - pfm
%USER-0-SYSTEM_MSG: 455: PCIe critical FAILURE DETECTED, contact Cisco TAC - pfm

Conditions:
Seen in Nexus 600x platforms

Workaround:
A debug plugin based workaround exists. Contact Cisco TAC to obtain the workaround.

Further Problem Description:
We are updating BIOS as the final solution for this

Last Modified:
30-JAN-2016
Known Affected Releases:
7.2(0)N1(1)
Known Fixed Releases: *
7.0(7)ZN(0.266), 7.0(8)N1(0.313), 7.0(8)N1(1), 7.1(3)ZN(0.157), 7.1(4)N1(0.712), 7.1(4)N1(1), 7.3(0)IZN(0.13), 7.3(0)N1(0.247), 7.3(0)N1(0.252), 7.3(0)N1(1)
Alert Type:
Updated *
Bug Id:
CSCtc36397
Title:
vPC role switchover doesn't happen when vPC role is operational primary
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Changing the role-priority and flapping the peer-link does not change the roles of the vPC peers.

Conditions:
This happens when one of the switch has its role as "Operational primary" due to an earlier reload of the primary switch.

Workaround:
None.

Further Problem Description:

Last Modified:
12-JAN-2016
Known Affected Releases:
4.1(3)N2(0.80), 4.1(3)N2(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu22403
Title:
N5K/6K Cosmetic Message: Mac registration with L2FM failed for mac...
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In a Nexus 5K/6K running NX-OS 7.0(6)N1(1), following messages can be seen

5596A# show logg logfile | inc L2FM
2015 May 6 13:04:55 5596A %ADJMGR-3-MAC_REG_FAILED: adjmgr [3568] Mac registration with L2FM failed for mac 0022.55e9.b53f, iod Vlan15, phy iod: Ethernet115/1/38
2015 May 6 13:07:21 5596A %ADJMGR-3-MAC_REG_FAILED: adjmgr [3568] Mac registration with L2FM failed for mac 0000.0c07.ac0f, iod Vlan15, phy iod: Vlan15
2015 May 6 13:10:04 5596A %ADJMGR-3-MAC_REG_FAILED: adjmgr [3568] Mac registration with L2FM failed for mac 002a.6a1f.2341, iod Vlan15, phy iod: Ethernet130/1/48
2015 May 6 13:11:43 5596A %ADJMGR-3-MAC_REG_FAILED: adjmgr [3568] Mac registration with L2FM failed for mac 547f.ee7e.1441, iod Vlan15, phy iod: Vlan15
5596A#

Conditions:
Seen when the switch sees ARP request packets.

Workaround:
These messages are cosmetic. To suppress them configure 'logging level adjmgr 2'.

Further Problem Description:

Last Modified:
11-JAN-2016
Known Affected Releases:
7.0(6)N1(0.272), 7.1(0)N1(0.401), 7.2(0)N1(1)
Known Fixed Releases: *
7.0(7)N1(0.291), 7.0(7)N1(1), 7.0(7)ZN(0.186), 7.1(3)N1(0.612), 7.1(3)N1(1), 7.1(3)ZN(0.17), 7.2(2)N1(0.357), 7.2(2)N1(1), 7.2(2)ZN(0.41), 7.3(1)N1(0.4)
Alert Type:
Updated *
Bug Id:
CSCur11793
Title:
Host entries for member-links not cleaned up once portchannel is up
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
The port channel member links are shown as data-snooping ports.
However, the baseline behaviour is such that For packets coming in on the PC, the Port-channel should be the only the data snooping port displayed and not its member links.
The issue is that the member links of Port-channel are also reported as associated ports.


Conditions:
This occurs during switch reload, when the member ports come up before the port-channel is applied.



Workaround:
No Workaround






More Info:




Last Modified:
11-JAN-2016
Known Affected Releases:
7.1(0)N1(0.349)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw83505
Title:
kk-150 : fwm hap reset while bringup the 2248PQ fex
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:FWM crash during FEX bringup on N6K switches
Conditions:FWM crashed during fabric port channel bringup on N6K Switches, which is not consistently reproducible.
Workaround:No Workaround, switch recovers properly after crash.


More Info:Issue in fwmpd_rsrc_program_MIDXT API for reserved multicast index, issue fixed in kokomo, fix need to checked in other branches as well.

Last Modified:
30-JAN-2016
Known Affected Releases:
7.3(0)N1(0.150)
Known Fixed Releases: *
7.3(0)IZN(0.13), 7.3(0)N1(0.224), 7.3(0)N1(1), 7.3(0)ZN(0.201)
Alert Type:
Updated *
Bug Id:
CSCut07639
Title:
N56: BIG_DROP_HIT_DROP_PORT_MAP_IDX increased when AA-FEX
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
PING to dest from host in the below topology fails when PING to N5672-1 from host is being done as well.

Conditions:
Topology:
[dest]
| vPC
[N5672-1]=====[N5672-2]
\ /
[N2248TP]
|
[host]

This issue was seen only when both traffic from FEX goes through vPC peer-link.
This issue was seen only on N5600 platform not on N5500 platform.

Workaround:
none

Further Problem Description:

Last Modified:
08-JAN-2016
Known Affected Releases:
7.1(0)N1(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut92989
Title:
EVPC+ peer drops FTAG2 traffic while other VPC peer initializes the FEX
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Layer 2 multicast that traverses the FabriPath domain and belongs to FTAG2 MDT is black holed while the FEX is initialized.

Layer 2 multicast coming in from VPC+ port-channels connected to OTV Edge is also impacted, since some multicast flows are hashed by upstream N7K towards the secondary VPC+ N6K which is initializing the FEX.

Conditions:
Peer-Link restore or VPC+ peer restore after power off.

Workaround:
A simple combination of EEM and Python scripts was developed by AS Solutions Architect and SVS engineer that automatically detects when the peer-link port-channel is up and admin shuts all of the FEX VPC POs if the peer is VPC secondary. The FEXs can the be manually brought up by the network operations engineer one by one.


1.) EEM Script

event manager applet FEX_SHUT
event syslog pattern "%ETH_PORT_CHANNEL-5-PORT_UP: port-channel10:"
action 1.0 cli conf t
action 1.1 cli source vpcfailshut_final.py
action 1.2 syslog priority notifications msg FEX Ports Shut Down Post Peer-Link Recovery. Require Manual Enablement

2.) Python Script

#!/usr/bin/env python
import sys
import ConfigParser
import cisco
import time
# time is there to try for 100 seconds in the case of switch reload
for attempt in range(10):
shVpc = cli("show vpc")
shVpcLines = shVpc.splitlines()
stateList = shVpcLines[11].split()
vpcState = stateList[3:]
# If the VPC is secondary, shut the specific interface
if (vpcState == ["secondary"] or vpcState == ['primary,', 'operational', 'secondary']):
print("shutdown fp interface")
cli("conf t ; int po101-122 ; shut")
cli("conf t ; int po150-151 ; shut")
time.sleep(80)
cli("conf t ; int po101 ; no shut")
time.sleep(60)
cli("conf t ; int po102 ; no shut")
time.sleep(60)
cli("conf t ; int po103 ; no shut")
time.sleep(60)
cli("conf t ; int po104 ; no shut")
time.sleep(60)
cli("conf t ; int po105 ; no shut")
time.sleep(60)
cli("conf t ; int po106 ; no shut")
time.sleep(60)
cli("conf t ; int po107 ; no shut")
time.sleep(60)
cli("conf t ; int po108 ; no shut")
time.sleep(60)
cli("conf t ; int po109 ; no shut")
time.sleep(60)
cli("conf t ; int po110 ; no shut")
time.sleep(60)
cli("conf t ; int po111 ; no shut")
time.sleep(60)
cli("conf t ; int po112 ; no shut")
time.sleep(60)
cli("conf t ; int po113 ; no shut")
time.sleep(60)
cli("conf t ; int po114 ; no shut")
time.sleep(60)
cli("conf t ; int po115 ; no shut")
time.sleep(60)
cli("conf t ; int po116 ; no shut")
time.sleep(60)
cli("conf t ; int po117 ; no shut")
time.sleep(60)
cli("conf t ; int po118 ; no shut")
time.sleep(60)
cli("conf t ; int po119 ; no shut")
time.sleep(60)
cli("conf

Last Modified:
07-JAN-2016
Known Affected Releases:
7.2(360)NX(0.5)
Known Fixed Releases: *
7.1(3)N1(0.659), 7.1(3)N1(1), 7.1(3)ZN(0.67), 7.2(2)N1(0.363), 7.2(2)N1(1), 7.2(2)ZN(0.46)
Alert Type:
Updated *
Bug Id:
CSCut87698
Title:
Nexus: Option 82 circuit-id same for all host when using relay
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
When a nexus switch acts as a relay agent, configured to insert option-82, the circuit-id is same for all host even when they are connected to different ports.

This behavior is different when using dhcp snooping. VLAN, module and port information is added in this case

Conditions:
Nexus switch acting as a relay agent, configured to insert option-82

Workaround:

Further Problem Description:
This bug is filed as an enhancement request
"ip dhcp relay sub-option circuit-id customized " will be available to make the behavior identical when using dhcp snooping and dhcp relay to insert option-82

Last Modified:
28-JAN-2016
Known Affected Releases:
6.2(10)
Known Fixed Releases:
7.0(3)I3(0.239), 7.0(3)I3(1), 7.3(0)BZN(0.47), 7.3(0)N1(0.105), 7.3(0)N1(1), 7.3(0)ZN(0.98)

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论