Cisco Blog » The Platform

2016年3月1日星期二

Cisco Notification Alert -4500 Series Switch-01-Mar-2016 17:49 GMT

 

 

 

 

 

 

 


Known Bugs - Catalyst 4500 Series Switches

Alert Type:
Updated *
Bug Id:
CSCux11592
Title:
VLAN ID gets changed and causes crash because of watchdog on SUP7L-E
Status:
Fixed
Severity:
1 Catastrophic
Description:

B>

Symptom:
Crash is seen on WS-X45-SUP7L-E when using 03.07.02.E

Conditions:
private VLANs with IPV6 features are configured on trunk interface:

nd raguard
snooping
dhcp guard
source-guard
dhcp-ldra
traffic-filter

Workaround:
None

Further Problem Description:
trigger is not known yet. Crash may happen at any time

Last Modified:
18-FEB-2016
Known Affected Releases:
3.7(0)
Known Fixed Releases: *
15.2(5.0.74)E, 15.2(5.5.63)E, 15.2(5.5.64)E
Alert Type:
Updated *
Bug Id:
CSCuj94250
Title:
Traffic drop on receivers in same BD after sending leave from other host
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:Traffic drop on receivers in same BD after sending leave from other host
Conditions:when leave is sent from some host (on compo copper), other receivers in same BD also getting affected.
Workaround:no workaround

Last Modified:
04-FEB-2016
Known Affected Releases:
15.1(2)SG3, 15.4(2)S
Known Fixed Releases: *
15.1(1)IC66.54, 15.1(1)ICB29.36, 15.2(1.24)PSR, 15.2(2)E, 15.2(2)E1, 15.2(2)E2, 15.2(2.2.70)ST, 15.2(2a)E1, 15.2(2b)E, 15.2(3)E
Alert Type:
Updated *
Bug Id:
CSCuy42704
Title:
Regarding ARP gleaning udp broadcast packet action
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
Based on description from the EDCS-189230 Rev 16, found that ARP gleaning affect tftp and udp broadcast packet.

- ip arp gleaning tftp
- ip arp gleaning udp

Conditions:
After testing in lab, found that how ARP gleaning affect tftp.
But, didn't confirm how arp gleaning affect udp broadcast packet.

So need to be clarified if the description in the document is right.
If it is right, want to know the details about how arp gleaning
affects udp broadcast packet.

Workaround:
none

Further Problem Description:

Last Modified:
24-FEB-2016
Known Affected Releases:
15.2(4)E1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw21115
Title:
4500/WS-X4724-SFP-E port flaps when GLC-GE-100FX is inserted
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Consider 4-port groups on WS-X4724-SFP-E as {1,2,3,4},{5,6,7,8},{9,10,11,12}, etc

When GLC-GE-100FX transceiver is inserted, other ports in the same 4-port group having GLC-LH-SMD only, will flap.

Conditions:
This problem is seen on WS-X4724-SFP-E only

Workaround:
Use only same kind of SFPs in the 4-port groups. Do not mix GLC-GE-100FX and GLC-LH-SMD in the 4-port groups. Example : The following combination will work without issues on same linecard
{1,2,3,4} - having GLC-GE-100FX only
{5,6,7,8} - having GLC-LH-SMD only

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.2(3.7.1E)
Known Fixed Releases: *
15.2(2)E4, 15.2(3)E3, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(5.0.18)E, 15.2(5.5.36)E, 15.2(5.6.1)E
Alert Type:
Updated *
Bug Id:
CSCuw19907
Title:
FB Crash while config ACL on C4500X
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A Catalyst 4500X running 15.2(3)E2 may crash while configuring access-lists.

Conditions:
Scale setup (10K) for configuring/unconfiguring OGACLs with ACEs having log keyword and traffic flowing.

Workaround:
Avoiding Log Keyword in the ACE.

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
15.2(3)E
Known Fixed Releases: *
15.2(3)E3, 15.2(4)E, 15.2(4)E1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(4.1.9)E, 15.2(5.0.62)E, 15.2(5.5.36)E, 15.2(5.5.46)E
Alert Type:
Updated *
Bug Id:
CSCuu21997
Title:
BOOTP Reply packets flooded when wireless module is installed on sup8
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
BOOTP Reply packets flooded when wireless module is installed on sup8

Conditions:
- DHCP snooping enabled
- WS-UA-SUP8E installed on Sup8
- It is enough to receive on switch one DHCP BOOTP Reply packet
- Problem is seen with 3.7.0E and 3.7.1E release

Workaround:
Disable IP DHCP Snooping for vlan in which DHCP packet is received or delete vlan.

Disable wireless card - hw-module daughtercard disable (reuqires reload)

Further Problem Description:

Last Modified:
17-FEB-2016
Known Affected Releases:
3.7(0)E
Known Fixed Releases: *
15.2(5.5.63)E
Alert Type:
Updated *
Bug Id:
CSCuy19527
Title:
Random ports go down and PoE does not work on LC WS-X4748-RJ45V+E
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
Randomly some ports are going down/down state.
IP Phones which are connected to the ports experiencing the failure cannot boot properly

Conditions:
The issue is seen on linecard WS-X4748-RJ45V+E

Workaround:
Reseat of the card OR recabling the affected device on different ports helps for some time but issue comes back again.

Further Problem Description:
-NA-

Last Modified:
16-FEB-2016
Known Affected Releases:
15.2(3)E
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCut93424
Title:
CAT4500 - Flexible Netflow start/end time inaccuracy
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Incorrect Netflow timestamp

Conditions:
Endtime timestamp is lower than the StartTime.

Workaround:
N/A

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
15.1(2)SG4
Known Fixed Releases: *
15.2(4)E1, 15.2(5.0.82)E, 15.2(5.5.63)E, 15.2(5.5.64)E, 3.8(1)E
Alert Type:
Updated *
Bug Id:
CSCux81234
Title:
C4500 VSS port mapped to Drop aggport when the Aggregate port id 656
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The switchport which is mapped to Drop aggregate port in the VSS standby will have no Layer 3 connectivity , layer 2 connectivity works fine

Conditions:
This issue is observed on Sup 8-E VSS running 03.06.03.E.
Only one port in the chassis mapping the port ID to a reserved port id of 656 will have the issue.

Workaround:
to plug the line card to any other free slot in the chassis, so that the port gets a different aggport

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
none
Known Fixed Releases: *
15.2(5.0.92)E, 15.2(5.5.63)E, 15.2(5.5.64)E
Alert Type:
Updated *
Bug Id:
CSCuo18099
Title:
Duplex becomes half when 100Mbps/duplex are configured at both side
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Duplex becomes half when 100/full are configured on sup7 MGMT port.

Conditions:
-SUP7 management port(F1 port)
-configuration 100M/FULL without auto-negotiation

Workaround:
auto-negotiation use

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
15.2(1)E
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw21594
Title:
VSS crash from 'sh sw virtual link counters' after removalofchannelgroup
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Primary switch configured in VSS may crash within IOSd when using 'show switch virtual link counters' after the port channel goes down. The following maybe seen from the terminal:

>>
Moving an interface from vsl to non-vsl, while system is running, might cause loop in the network. So, interface is being put to admin down state. Please execute `no shutdown` on the interface to remove admin down state
>>

Conditions:
This is seen in a VSS setup with etherchannel manually configured on both sides of the port channel. Using 'show switch virtual link counters' following removal of the channel-group from all ports in the bundle can trigger this crash.

Workaround:
This can be seen while making modifications to an active port channel carrying traffic over the VSL. To avoid running into this situation, shutdown the links that are bundled in the port channel and ensure that there is at least an active link in the port channel before making modifications to the port.

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
15.1(2)SG3.0.19
Known Fixed Releases: *
11.0(2)HEA10, 15.2(5.5.46)E, 15.2(5.6.1)E
Alert Type:
Updated *
Bug Id:
CSCuv11054
Title:
mac address entry does not flush and re-learn after IF status change
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
mac address entry does not flush and re-learn after IF status change at 4K VSS

Conditions:
1.4K VSS
2.IF status change

Workaround:
1.clear mac address table
2.waiting for mac address table aging out

Further Problem Description:

Last Modified:
01-FEB-2016
Known Affected Releases:
15.1(2.12)
Known Fixed Releases: *
15.2(4)E, 15.2(4)E1, 15.2(4.0.95a)E, 15.2(4.0.99)E, 15.2(4.1.5a)E, 3.8(0)E
Alert Type:
Updated *
Bug Id:
CSCuy50099
Title:
Incomplete STP debugs output when CTS enabled
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Run STP debugs, for instance these listed below, and check generated logs. They are incomplete.
debug spanning-tree bpdu
debug spanning-tree mstp bpdu receive
debug spanning-tree mstp bpdu transmit

Conditions:
CTS enabled.

Workaround:
Disable CTS.

Further Problem Description:
None.

Last Modified:
29-FEB-2016
Known Affected Releases:
15.2(2)E4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux42167
Title:
4506|SUP8-E |3.8.0.E- Storm control multicast is removed after a reload
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After configuring 'storm-control broadcast include multicast', on the interfaces, once the configuration is saved, and the switch is reloaded, the command disappears.

Conditions:
Only seen with command 'storm-control broadcast include multicast' on sup8E running 03.08.00.E

Workaround:
No workaround

Further Problem Description:

Last Modified:
17-FEB-2016
Known Affected Releases:
3.8(0)
Known Fixed Releases: *
15.2(5.0.74)E, 15.2(5.5.63)E
Alert Type:
Updated *
Bug Id:
CSCux18867
Title:
4500 3.6.0 False port-security alarms on standby supervisor
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
switchport port-security maximum 2 is configured and only access vlan X is configured with no voice vlan. With a phone and a pc behind it you notice that when you remove the PC and plug in another you get a port-security violation on the standby supervisor.

Conditions:
With this configuration applied and an IP phone and PC connected behind it.

interface GigabitEthernet1/22
description TEST BENJAMIN
switchport access vlan X
switchport mode access
switchport port-security maximum 2
switchport port-security violation restrict
switchport port-security aging time 5
switchport port-security aging type inactivity
switchport port-security
end

Workaround:
Configure

switchport port-security maximum 50

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.2(22.22)
Known Fixed Releases: *
15.2(2)E4, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.1.25)EA1, 15.2(5.0.67)E, 15.2(5.5.36)E, 15.2(5.5.46)E, 15.2(5.5.64)E, 15.2(5.6.1)E, 16.1(1.21)
Alert Type:
Updated *
Bug Id:
CSCuy41711
Title:
Private-vlan mapping config is lost from running config on reload.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Private-vlan mapping config is lost from running config on reload.

Conditions:
Switch should be running VTP version 3

Switch should be configured to be VTP client.

The below config need to be applied on a SVI and saved.
private-vlan mapping

Check if the command is present on both the running-config and start-up config.

Reload the switch and the command is missing on the running-config.

Workaround:
No work around. The command need to be configured again if the switch is reloaded.

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
15.2(2.0.0)
Known Fixed Releases: *
15.2(5.1.22i)E
Alert Type:
Updated *
Bug Id:
CSCuu42267
Title:
vstack status shows duplicate entries for a single PID
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Switch#sh vsta group custom detail
No custom group configured
ESC-HUB304#sh vsta status
SmartInstall: ENABLED

Status: Device_type Health_status Join-window_status Upgrade_status
Device_type: S - Smart install N - Non smart install P - Pending
Health_status: A - Active I - Inactive
Join-window_Status: a - Allowed h - On-hold d - Denied
Image Upgrade: i - in progress I - done X - failed
Config Upgrade: c - in progress C - done x - failed
Script Upgrade: p - in progress P - done F - failed
Director Database:
DevNo MAC Address Product-ID IP_addr Hostname Status
===== ============== ================= =============== ========== =========
0 7426.aca4.8e40 WS-C4507R+E 10.1.22.1 3560-CG Director
1 04c5.a442.8300 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S A a C <--- duplicate
2 04c5.a442.9b00 WS-C3560CG-8PC-S 10.1.22.5 3560-CGS A a C
3 04c5.a442.8380 WS-C3560CG-8PC-S 10.1.22.7 3560-CG S I a <---- duplicate

Conditions:
4500 running 3.7.2 as the director switch for smart-install

Workaround:

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
3.6(2)
Known Fixed Releases: *
15.2(2)E4, 15.2(3)E3, 15.2(4)E, 15.2(4)E1, 15.2(4.0.95)EA1, 15.2(4.0.95a)E, 15.2(4.1.25)EA1, 15.2(4.1.5a)E, 15.2(4.1.6)E, 15.2(5.0.42)E
Alert Type:
Updated *
Bug Id:
CSCuu72699
Title:
C4500-X: MACsec Switch to Switch MKA support
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
Feature Request: C4500-X: MACsec Switch to Switch MKA support
Product: C4500-X
Version: IOS-XE 3.7.1E
Please describe how the current limitation(s) impact your business:
Without the support for MKA with MACsec, the product cannot interoperate with other vendors which hinders deployment of Cisco MACsec capable devices into multi-vendor environment.

What features would be changed or added?
MKA support for MACsec switch to switch. Current implementation only supports SAP switch to switch.

Status Update:
1/25 - On track with customer expectations.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
08-FEB-2016
Known Affected Releases:
15.0(2)SE
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCui23396
Title:
4500 nova crashinfos should include more iosd memory related outputs
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
4500 running IOS-XE software should have more IOSd related outputs in the crashinfo files.

Conditions:
4500 nova platforms.

Workaround:
None.

More Info:

Last Modified:
10-FEB-2016
Known Affected Releases:
15.1(2)SG
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论