| |
|
Alert Type: | Updated * |
Bug Id: | CSCux11592 | Title: | VLAN ID gets changed and causes crash because of watchdog on SUP7L-E |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Description: | B>
Symptom: Crash is seen on WS-X45-SUP7L-E when using 03.07.02.E
Conditions: private VLANs with IPV6 features are configured on trunk interface:
nd raguard snooping dhcp guard source-guard dhcp-ldra traffic-filter
Workaround: None
Further Problem Description: trigger is not known yet. Crash may happen at any time
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 3.7(0) |
|
Known Fixed Releases: * | 15.2(5.0.74)E, 15.2(5.5.63)E, 15.2(5.5.64)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuj94250 | Title: | Traffic drop on receivers in same BD after sending leave from other host |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom:Traffic drop on receivers in same BD after sending leave from other host Conditions:when leave is sent from some host (on compo copper), other receivers in same BD also getting affected. Workaround:no workaround
|
|
Last Modified: | 04-FEB-2016 |
|
Known Affected Releases: | 15.1(2)SG3, 15.4(2)S |
|
Known Fixed Releases: * | 15.1(1)IC66.54, 15.1(1)ICB29.36, 15.2(1.24)PSR, 15.2(2)E, 15.2(2)E1, 15.2(2)E2, 15.2(2.2.70)ST, 15.2(2a)E1, 15.2(2b)E, 15.2(3)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy42704 | Title: | Regarding ARP gleaning udp broadcast packet action |
|
Status: | Open |
|
Severity: | 2 Severe |
Description: * | Symptom: Based on description from the EDCS-189230 Rev 16, found that ARP gleaning affect tftp and udp broadcast packet.
- ip arp gleaning tftp - ip arp gleaning udp
Conditions: After testing in lab, found that how ARP gleaning affect tftp. But, didn't confirm how arp gleaning affect udp broadcast packet.
So need to be clarified if the description in the document is right. If it is right, want to know the details about how arp gleaning affects udp broadcast packet.
Workaround: none
Further Problem Description:
|
|
Last Modified: | 24-FEB-2016 |
|
Known Affected Releases: | 15.2(4)E1 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw21115 | Title: | 4500/WS-X4724-SFP-E port flaps when GLC-GE-100FX is inserted |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Consider 4-port groups on WS-X4724-SFP-E as {1,2,3,4},{5,6,7,8},{9,10,11,12}, etc
When GLC-GE-100FX transceiver is inserted, other ports in the same 4-port group having GLC-LH-SMD only, will flap.
Conditions: This problem is seen on WS-X4724-SFP-E only
Workaround: Use only same kind of SFPs in the 4-port groups. Do not mix GLC-GE-100FX and GLC-LH-SMD in the 4-port groups. Example : The following combination will work without issues on same linecard {1,2,3,4} - having GLC-GE-100FX only {5,6,7,8} - having GLC-LH-SMD only
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.2(3.7.1E) |
|
Known Fixed Releases: * | 15.2(2)E4, 15.2(3)E3, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(5.0.18)E, 15.2(5.5.36)E, 15.2(5.6.1)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw19907 | Title: | FB Crash while config ACL on C4500X |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: A Catalyst 4500X running 15.2(3)E2 may crash while configuring access-lists.
Conditions: Scale setup (10K) for configuring/unconfiguring OGACLs with ACEs having log keyword and traffic flowing.
Workaround: Avoiding Log Keyword in the ACE.
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.2(3)E |
|
Known Fixed Releases: * | 15.2(3)E3, 15.2(4)E, 15.2(4)E1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(4.1.9)E, 15.2(5.0.62)E, 15.2(5.5.36)E, 15.2(5.5.46)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu21997 | Title: | BOOTP Reply packets flooded when wireless module is installed on sup8 |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: BOOTP Reply packets flooded when wireless module is installed on sup8
Conditions: - DHCP snooping enabled - WS-UA-SUP8E installed on Sup8 - It is enough to receive on switch one DHCP BOOTP Reply packet - Problem is seen with 3.7.0E and 3.7.1E release
Workaround: Disable IP DHCP Snooping for vlan in which DHCP packet is received or delete vlan.
Disable wireless card - hw-module daughtercard disable (reuqires reload)
Further Problem Description:
|
|
Last Modified: | 17-FEB-2016 |
|
Known Affected Releases: | 3.7(0)E |
|
Known Fixed Releases: * | 15.2(5.5.63)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy19527 | Title: | Random ports go down and PoE does not work on LC WS-X4748-RJ45V+E |
|
Status: | Open |
|
Severity: | 2 Severe |
Description: * | Symptom: Randomly some ports are going down/down state. IP Phones which are connected to the ports experiencing the failure cannot boot properly
Conditions: The issue is seen on linecard WS-X4748-RJ45V+E
Workaround: Reseat of the card OR recabling the affected device on different ports helps for some time but issue comes back again.
Further Problem Description: -NA-
|
|
Last Modified: | 16-FEB-2016 |
|
Known Affected Releases: | 15.2(3)E |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCut93424 | Title: | CAT4500 - Flexible Netflow start/end time inaccuracy |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Incorrect Netflow timestamp
Conditions: Endtime timestamp is lower than the StartTime.
Workaround: N/A
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.1(2)SG4 |
|
Known Fixed Releases: * | 15.2(4)E1, 15.2(5.0.82)E, 15.2(5.5.63)E, 15.2(5.5.64)E, 3.8(1)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux81234 | Title: | C4500 VSS port mapped to Drop aggport when the Aggregate port id 656 |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: The switchport which is mapped to Drop aggregate port in the VSS standby will have no Layer 3 connectivity , layer 2 connectivity works fine
Conditions: This issue is observed on Sup 8-E VSS running 03.06.03.E. Only one port in the chassis mapping the port ID to a reserved port id of 656 will have the issue.
Workaround: to plug the line card to any other free slot in the chassis, so that the port gets a different aggport
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | none |
|
Known Fixed Releases: * | 15.2(5.0.92)E, 15.2(5.5.63)E, 15.2(5.5.64)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuo18099 | Title: | Duplex becomes half when 100Mbps/duplex are configured at both side |
|
Status: | Terminated |
|
Severity: | 3 Moderate |
Description: * | Symptom: Duplex becomes half when 100/full are configured on sup7 MGMT port.
Conditions: -SUP7 management port(F1 port) -configuration 100M/FULL without auto-negotiation
Workaround: auto-negotiation use
Further Problem Description:
|
|
Last Modified: | 29-FEB-2016 |
|
Known Affected Releases: | 15.2(1)E |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw21594 | Title: | VSS crash from 'sh sw virtual link counters' after removalofchannelgroup |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Primary switch configured in VSS may crash within IOSd when using 'show switch virtual link counters' after the port channel goes down. The following maybe seen from the terminal:
>> Moving an interface from vsl to non-vsl, while system is running, might cause loop in the network. So, interface is being put to admin down state. Please execute `no shutdown` on the interface to remove admin down state >>
Conditions: This is seen in a VSS setup with etherchannel manually configured on both sides of the port channel. Using 'show switch virtual link counters' following removal of the channel-group from all ports in the bundle can trigger this crash.
Workaround: This can be seen while making modifications to an active port channel carrying traffic over the VSL. To avoid running into this situation, shutdown the links that are bundled in the port channel and ensure that there is at least an active link in the port channel before making modifications to the port.
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.1(2)SG3.0.19 |
|
Known Fixed Releases: * | 11.0(2)HEA10, 15.2(5.5.46)E, 15.2(5.6.1)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv11054 | Title: | mac address entry does not flush and re-learn after IF status change |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: mac address entry does not flush and re-learn after IF status change at 4K VSS
Conditions: 1.4K VSS 2.IF status change
Workaround: 1.clear mac address table 2.waiting for mac address table aging out
Further Problem Description:
|
|
Last Modified: | 01-FEB-2016 |
|
Known Affected Releases: | 15.1(2.12) |
|
Known Fixed Releases: * | 15.2(4)E, 15.2(4)E1, 15.2(4.0.95a)E, 15.2(4.0.99)E, 15.2(4.1.5a)E, 3.8(0)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy50099 | Title: | Incomplete STP debugs output when CTS enabled |
|
Status: | Open |
|
Severity: | 3 Moderate |
Description: * | Symptom: Run STP debugs, for instance these listed below, and check generated logs. They are incomplete. debug spanning-tree bpdu debug spanning-tree mstp bpdu receive debug spanning-tree mstp bpdu transmit
Conditions: CTS enabled.
Workaround: Disable CTS.
Further Problem Description: None.
|
|
Last Modified: | 29-FEB-2016 |
|
Known Affected Releases: | 15.2(2)E4 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux42167 | Title: | 4506|SUP8-E |3.8.0.E- Storm control multicast is removed after a reload |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: After configuring 'storm-control broadcast include multicast', on the interfaces, once the configuration is saved, and the switch is reloaded, the command disappears.
Conditions: Only seen with command 'storm-control broadcast include multicast' on sup8E running 03.08.00.E
Workaround: No workaround
Further Problem Description:
|
|
Last Modified: | 17-FEB-2016 |
|
Known Affected Releases: | 3.8(0) |
|
Known Fixed Releases: * | 15.2(5.0.74)E, 15.2(5.5.63)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux18867 | Title: | 4500 3.6.0 False port-security alarms on standby supervisor |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: switchport port-security maximum 2 is configured and only access vlan X is configured with no voice vlan. With a phone and a pc behind it you notice that when you remove the PC and plug in another you get a port-security violation on the standby supervisor.
Conditions: With this configuration applied and an IP phone and PC connected behind it.
interface GigabitEthernet1/22 description TEST BENJAMIN switchport access vlan X switchport mode access switchport port-security maximum 2 switchport port-security violation restrict switchport port-security aging time 5 switchport port-security aging type inactivity switchport port-security end
Workaround: Configure
switchport port-security maximum 50
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.2(22.22) |
|
Known Fixed Releases: * | 15.2(2)E4, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.1.25)EA1, 15.2(5.0.67)E, 15.2(5.5.36)E, 15.2(5.5.46)E, 15.2(5.5.64)E, 15.2(5.6.1)E, 16.1(1.21) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy41711 | Title: | Private-vlan mapping config is lost from running config on reload. |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Private-vlan mapping config is lost from running config on reload.
Conditions: Switch should be running VTP version 3
Switch should be configured to be VTP client.
The below config need to be applied on a SVI and saved. private-vlan mapping
Check if the command is present on both the running-config and start-up config.
Reload the switch and the command is missing on the running-config.
Workaround: No work around. The command need to be configured again if the switch is reloaded.
Further Problem Description:
|
|
Last Modified: | 25-FEB-2016 |
|
Known Affected Releases: | 15.2(2.0.0) |
|
Known Fixed Releases: * | 15.2(5.1.22i)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu42267 | Title: | vstack status shows duplicate entries for a single PID |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Switch#sh vsta group custom detail No custom group configured ESC-HUB304#sh vsta status SmartInstall: ENABLED
Status: Device_type Health_status Join-window_status Upgrade_status Device_type: S - Smart install N - Non smart install P - Pending Health_status: A - Active I - Inactive Join-window_Status: a - Allowed h - On-hold d - Denied Image Upgrade: i - in progress I - done X - failed Config Upgrade: c - in progress C - done x - failed Script Upgrade: p - in progress P - done F - failed Director Database: DevNo MAC Address Product-ID IP_addr Hostname Status ===== ============== ================= =============== ========== ========= 0 7426.aca4.8e40 WS-C4507R+E 10.1.22.1 3560-CG Director 1 04c5.a442.8300 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S A a C <--- duplicate 2 04c5.a442.9b00 WS-C3560CG-8PC-S 10.1.22.5 3560-CGS A a C 3 04c5.a442.8380 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S I a <---- duplicate
Conditions: 4500 running 3.7.2 as the director switch for smart-install
Workaround:
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 3.6(2) |
|
Known Fixed Releases: * | 15.2(2)E4, 15.2(3)E3, 15.2(4)E, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(4.1.6)E, 15.2(5.0.42)E |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu72699 | Title: | C4500-X: MACsec Switch to Switch MKA support |
|
Status: | Open |
|
Severity: | 6 Enhancement |
Description: * | Symptom: Feature Request: C4500-X: MACsec Switch to Switch MKA support Product: C4500-X Version: IOS-XE 3.7.1E Please describe how the current limitation(s) impact your business: Without the support for MKA with MACsec, the product cannot interoperate with other vendors which hinders deployment of Cisco MACsec capable devices into multi-vendor environment.
What features would be changed or added? MKA support for MACsec switch to switch. Current implementation only supports SAP switch to switch.
Status Update: 1/25 - On track with customer expectations.
Conditions:
Workaround:
Further Problem Description: |
|
Last Modified: | 08-FEB-2016 |
|
Known Affected Releases: | 15.0(2)SE |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCui23396 | Title: | 4500 nova crashinfos should include more iosd memory related outputs |
|
Status: | Open |
|
Severity: | 6 Enhancement |
Description: * | Symptom: 4500 running IOS-XE software should have more IOSd related outputs in the crashinfo files.
Conditions: 4500 nova platforms.
Workaround: None.
More Info:
|
|
Last Modified: | 10-FEB-2016 |
|
Known Affected Releases: | 15.1(2)SG |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论