| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw05651 | Title: | EzPM causes STACKLOW message and a subsequent crash |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: %SYS-6-STACKLOW: Stack for process PA Export running low, 4/6000 ..... %SYS-6-STACKLOW: Stack for process Flow Exporter Timer Admin running low, 0/6000
%Software-forced reload
Conditions: Easy Performance Monitor is configured and the corresponding context is applied to overlay and underlay interfaces with NAT configured.
The same problem might be observed with FNF utilization (should be checked in advance)
Workaround: Disable EzPM or FNF Use 15.3M train IOS which is not affected by this issue
Further Problem Description: The initial problem analysis exposures the potential issue with NAT and EzPM interoperability
|
|
Last Modified: | 06-FEB-2016 |
|
Known Affected Releases: | 15.5(3)M |
|
Known Fixed Releases: * | 15.5(3)M0.2, 15.5(3)M1, 15.5(3)S0.9, 15.5(3)S1, 15.5(3)S1a, 15.6(0.17)PI30e, 15.6(0.19)S, 15.6(0.19)T, 15.6(1)SN, 15.6(1.6)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux43630 | Title: | Packet drops 1941 hangs without logging error messages |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: packet drop after few weeks in network
Conditions: packet buffers are all used and never freed
Workaround: router reboot needed
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.3(3)M |
|
Known Fixed Releases: * | 15.3(3)M7, 15.6(1.12)T, 15.6(1.22.1a)T0 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy42770 | Title: | "HTTP ACS Response code 401" is received for cwmp_session_response_data |
|
Status: | Open |
|
Severity: | 2 Severe |
Description: * | Symptom: "HTTP ACS Response code 401" error is received for cwmp_session_response_data
Conditions: "HTTP ACS Response code 401" error is received for cwmp_session_response_data
While enabling cwmp agent, HTTP error code 401 is recieived.
Workaround: Don't know
Further Problem Description:
|
|
Last Modified: | 24-FEB-2016 |
|
Known Affected Releases: | 15.6(1.16)T, 15.6(1.22)T0.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw79748 | Title: | Cannot ping own tunnel interface |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: -After doing a trace route to a network on a different spoke we are not able to ping to our own int tun
- on the spokes the nhrp mappings for itself and the other spokes will keep changing to the NBMA address of the hub by mistake
Conditions: DMVPN phase 3 on Version 15.3(3)M6,
Workaround: without Crypto issue not seen clearing the nhrp solves the problem momentarily
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.3(3.0b)M6 |
|
Known Fixed Releases: * | 15.4(3)S4.16, 15.6(1.20)T, 15.6(1.22.1a)T0, 16.2(1) |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCtt05586 | Title: | SCHED-3-THRASHING in crypto ctcp process |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom:
*Sep 29 18:36:44.392: %SCHED-3-THRASHING: Process thrashing on watched message event. -Process= "Crypto cTCP process", ipl= 4, pid= 270 -Traceback= 0x2353DE60z 0x246CEB64z 0x234D8984z 0x234D8968z
Conditions:
Large file transfers over EZVPN connection with cTCP option enabled
Workaround:
NA |
|
Last Modified: | 01-FEB-2016 |
|
Known Affected Releases: | 15.2(2.1) |
|
Known Fixed Releases: * | 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EX, 15.0(2)EX1, 15.0(2)EX3, 15.0(2)EX4, 15.0(2)EX5, 15.0(2)EZ, 15.0(2)SE1, 15.0(2)SE2 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuh88408 | Title: | High CPU due to dx_flush_dynamic |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: Router with an etherswitch module sees high CPU under "dx_flush_dynamic" process.
Conditions: This may occur due to a manual shutdown of the interface or any of the etherswitch ports/links going down.
Workaround: Unknown
Further Problem Description:
|
|
Last Modified: | 01-FEB-2016 |
|
Known Affected Releases: | 15.1(4)M, 15.3(2.1)T |
|
Known Fixed Releases: * | 15.0(1)M, 15.0(1)M1, 15.0(1)M10, 15.0(1)M2, 15.0(1)M4, 15.0(1)M7, 15.0(1)M8, 15.0(1)M9, 15.0(1)XA, 15.0(1)XA1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv92742 | Title: | QoS(match precedence) is causing alignment errors on MLPPP E1 interfaces |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom: QoS feature (service-policy input) is causing alignment errors that can be appreciated using 'show alignment' command.
Router#show alignment C1900 Software (C1900-UNIVERSALK9-M), Version 15.4(3)M, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Compiled Mon 21-Jul-14 17:38 by prod_rel_team
Total Corrections 223306, Recorded 1, Reads 223306, Writes 0
Initial Initial Address Count Access Type Traceback C1C6849 26698 16bit read 0x211588A0z 0x2113EB80z 0x21161800z 0x21146C70z 0x21149E30z 0x210D3B90z 0x23CE0600z 0x214A76B4z
Conditions: The trigger seems to be QoS applied in MLPPP E1 interface.
Workaround: Disable QoS (service-policy command) on the interface.
Further Problem Description:
|
|
Last Modified: | 15-FEB-2016 |
|
Known Affected Releases: | 15.5(2.25)T |
|
Known Fixed Releases: * | 15.4(3)M4.1, 15.4(3)M5, 15.5(3)M0.2, 15.5(3)M1, 15.6(0.17)PI30e, 15.6(0.18)T, 15.6(1.9)T0.1, 15.6(1.9)T0.2 |
|
|
| |
没有评论:
发表评论