Cisco Blog » The Platform

2016年3月1日星期二

Cisco Notification Alert -ME 3600X Series Switch-01-Mar-2016 17:49 GMT

 

 

 

 

 

 

 


Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S7
Release Date:
22-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S2
Release Date:
12-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Release Version:
15.4.3S5
Release Date:
02-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24FS-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S2
Release Date:
12-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.4.3S5
Release Date:
02-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S7
Release Date:
22-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24TS-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.3.3S7
Release Date:
22-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.5.3S2
Release Date:
12-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Alert Type:
New Release
Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Release Version:
15.4.3S5
Release Date:
02-FEB-2016

Software Updates for ME 3600X Series Ethernet Access Switches

Product Name:
ME 3600X-24CX-M Switch
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Known Bugs - ME 3600X Series Ethernet Access Switches

Alert Type:
Updated *
Bug Id:
CSCuv35094
Title:
SAT - L3 IP SLA Traffic Generation is not working
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
L3 IP SLA Traffic will not egress out of interface. only Tx stats are getting incremented in SLA o/p but actual traffic is not egressing out of the router.

Conditions:
Seen only on L3 IP SLA targets.

Workaround:
NONE

Further Problem Description:

Last Modified:
15-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(3)S1.5, 15.5(3)S2
Alert Type:
Updated *
Bug Id:
CSCuw14558
Title:
Storm control being triggered on wrong port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Storm control being triggered on the Gig0/20 port even if this port is admin down.

Conditions:
Storm control being triggered on the Gig0/20 port even if this port is admin down.

Workaround:
None

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.5(3)S1.10, 15.5(3)S2, 15.6(1.17)SP
Alert Type:
Updated *
Bug Id:
CSCuw31489
Title:
ME3600 ciscoEnvMonSupplyState value is wrong after reload
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When the second power supply is connected to the power source , Input state is ok and output sate state is fault, SNMP returns "6" for ciscoEnvMonSupplyState OID. The expected value is 3:

Conditions:
after reload when secondary power supply not connected.

Workaround:
na

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(3)S4.1, 15.4(3)S5, 15.5(1)S2.17, 15.5(1)S3, 15.5(2)S2.11, 15.5(3)S0.13, 15.5(3)S1, 15.5(3)S1a, 15.6(0.21)S
Alert Type:
Updated *
Bug Id:
CSCuw62168
Title:
MAC ACL does not work on ME3600X
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Following MAC ACL is applied on Gi0/2. This ACL does not block UDLD/CDP/PAgP PDUs coming from far end.

mac access-list extended udld
deny any host 0100.0ccc.cccc
permit any any
!
interface GigabitEthernet0/2
description sms/vOD1a-vUA2/trunk/sms-vua-2
switchport trunk native vlan 100
switchport trunk allowed vlan 1902,2002,2022,2042
switchport mode trunk
mtu 9216
logging event link-status
load-interval 60
udld port aggressive
mac access-group udld in <<
service-policy output pm_att_queuing

This issue is seen when native vlan on trunk is non default. Once issue happens, changing just the native vlan back to 1 does not help, entire interafce must be defaulted and reconfigured with native vlan = 1.

A non default native vlan does not work in any case, unless this bug is fixed.

Conditions:

Workaround:
Defaulting the interface and reapplying the ACL works,

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.6(1.17)SP
Alert Type:
Updated *
Bug Id:
CSCud74670
Title:
Remote LFA FRR Convergence fails with 3000 prefixes
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:

When using RLFA repair paths traffic loss may occur during reconvergence following a link failure.

Conditions:

RLFA tunnel is used as a repair path.
The greater the number of prefixes affected by the topology change the more likely the traffic loss
is to be seen.

Workaround:
No workaround.


Last Modified:
03-FEB-2016
Known Affected Releases:
15.2(2)SNI, 15.2(4)S, 15.3(1)S, 15.3(2)S
Known Fixed Releases: *
15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB40.1, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1.17)S0.14, 15.3(2)S
Alert Type:
Updated *
Bug Id:
CSCue59189
Title:
ERPS G.8032 compatibility failure
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: Cisco ME-3600X-24FS-M switch drops R-APS PDU packets and the
following error messages are seen in the debug:

ERR: Packet with wrong version 0 or opcode 40
Failed to decode packet, Invalid argument

Conditions: The symptom is observed when used with devices that support only
G.8032 (2008) for ERPS.

Workaround: There is no workaround.




Last Modified:
03-FEB-2016
Known Affected Releases:
15.3(1)S
Known Fixed Releases: *
15.3(1)S1.4, 15.3(1)S2, 15.3(2)S0.4, 15.3(2)S1, 15.3(2.14)S, 15.3(2.15.1)XEB, 15.6(1)SN
Alert Type:
Updated *
Bug Id:
CSCuo93299
Title:
AN:Zero Touch Bootstrap not working
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: ZTB does not work.
Conditions: This symptom occurs when the image is loaded and left without aborting the setup dialogue box.
Workaround: This issue has been fixed.

Last Modified:
05-FEB-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.5(0.11)S, 15.6(0.17)PI30e, 15.6(0.19)T, 15.6(1)SN, 15.6(1.9)T0.1
Alert Type:
Updated *
Bug Id:
CSCuo98907
Title:
Platform build issue post rel1.0.2
Status:
Fixed
Severity:
2 Severe
Description:

Symptom: Platform-specific images do not build.
Conditions: This symptom occurs when any platform-specific image is built.
Workaround: This issue is fixed.

Last Modified:
05-FEB-2016
Known Affected Releases:
15.4(3)S
Known Fixed Releases: *
15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.4(3)SN1, 15.5(0.11)S, 15.6(0.17)PI30e, 15.6(0.19)T, 15.6(1)SN
Alert Type:
Updated *
Bug Id:
CSCuq20912
Title:
cfm error using wrong local mep id
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
cfm using wrong local mep id to report this error

Conditions:
you may see this issue when there is a remote side link failure

Workaround:
none

Further Problem Description:
none

Last Modified:
06-FEB-2016
Known Affected Releases:
15.5(1)S
Known Fixed Releases: *
15.4(3)M0.4, 15.4(3)M1, 15.4(3)S0.8, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.5, 15.5(0.20)PI27a, 15.5(0.20)T, 15.5(1)S
Alert Type:
Updated *
Bug Id:
CSCuu76064
Title:
AN: Whales establishing ACP to non directly connected devices
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Whales is establishing neighborship and ACP to devices which are not directly connected.

Conditions:
Default scenario

Workaround:
N/A

Further Problem Description:
Whales is establishing neighborship and ACP to devices which are not directly connected even tough there is no active L2 channel to the non directly connected devices.

Last Modified:
06-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1, 15.5(3)S1a, 15.5(3)SN, 15.6(0.10)S, 15.6(0.17)PI30e, 15.6(0.19)T
Alert Type:
Updated *
Bug Id:
CSCuu71516
Title:
AN: Channel not getting formed in Whales.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CD channel is not getting formed in whales platform.

Conditions:
With default interface config.

Workaround:
N/A

Further Problem Description:
Continuous channel creation and deletion observed and hence neighborship, ACP etc won't get established.

Last Modified:
06-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(1)S, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1)S4, 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1
Alert Type:
New
Bug Id:
CSCuy51315
Title:
Mac sec blacklist address traffic is blocked in egress for all ports
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Traffic is dropped while egressing in any port if blacklist address (deny) is configured in MAC SEC and traffic contains blacklisted mac in destination mac address field.

Conditions:
1. Configure EFP in all the ports as per the topology.
2. Configure EFP based MAC sec with blacklist for mac address "X" in one of the port between ME3600-1 and ME3600-2
3. Observe ingress traffic is getting dropped properly if mac "X" is present in the source address field of the traffic.
4. Send traffic from Ixia with MAC "X" in destination address field.
5. Observe traffic is dropped forever in all the ports including the port where no mac sec is configured. Traffic is only forwarding after removing the address "X" from blacklist.

Workaround:

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
15.5(3)S1.1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv34896
Title:
VPLS autodiscovery PW failed to comeup when BGP recovers from failure
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A Virtual Private LAN Service (VPLS) Virtual Circuit (VC) which is created
using BGP Autodiscovery goes down and stays down when it is reprovisioned
due to a BGP route change. The output of show l2vpn vfi
or show vfi shows that the pseudowire was not created.

Conditions:
This symptom has been observed when multiple BGP NLRI messages are received
from the same BGP peer with the same route information. All IOS/IOS-XE
versions and platforms are affected.

Workaround:
Perform the exec command clear ip bgp.

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases: *
15.4(3)S3.8, 15.4(3)S4, 15.5(1)S2.15, 15.5(1)S2.9, 15.5(1)S3, 15.5(2)S1.5, 15.5(2)S2, 15.5(3)S0.2, 15.5(3)S1, 15.5(3)S1a
Alert Type:
Updated *
Bug Id:
CSCuy09827
Title:
ME 3600 crash when adding static MAC address
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ME 3600 crash when adding static MAC address

Conditions:
The MAC address is already learnt as Dynamic entry

Workaround:
None

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.5(1.2)
Known Fixed Releases: *
15.6(1.17)SP
Alert Type:
Updated *
Bug Id:
CSCuw23745
Title:
ME 3600X / SVI VRF Routing problem with Access-Port
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
VRF routing is broken when "switch port access vlan <>" is configured to reach host in a vrf. Issue happens only with latest image 15.5.
Same is working fine with 15.4 image.

Conditions:
when "switch port access vlan <>" is configured to reach host in a vrf

Workaround:
Use EFP method instead of "switch port access vlan" for host connectivity

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(3)S4.1, 15.4(3)S5, 15.5(1)S2.21, 15.5(1)S3, 15.5(3)S0.11, 15.5(3)S1, 15.5(3)S1a, 15.6(0.20)S
Alert Type:
Updated *
Bug Id:
CSCuw10281
Title:
Traffic drop on mac movement when mac sec is enabled under EFP
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic drop is observed for MAC which is moved from one MAC sec port to another mac sec enabled port

even after the expiry of mac sec inactivity time and mac aging time periods.

Conditions:

Workaround:
Disable and re-enable the mac security starts traffic forwarding again

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.3(1)S1.1, 15.4(3)S, 15.5(3)S
Known Fixed Releases: *
15.4(3)S4.2, 15.4(3)S5, 15.5(1)S2.21, 15.5(1)S3, 15.5(3)S1.1, 15.5(3)S2, 15.6(1.10)S
Alert Type:
Updated *
Bug Id:
CSCuv99903
Title:
ME3600 drops traffic thro' EVC port when EFPs for BD in 1G and 10G ports
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ME3600 drops traffic through EVC port when EFPs for same bridge-domain configured in 1G and 10G ports

Conditions:

Workaround:
Shutdown 10G link and unshutdown the 1G link solves this problem. The problem will again occur if the node is reloaded again.

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases: *
15.4(3)S4.3, 15.4(3)S5, 15.5(1)S2.22, 15.5(1)S3, 15.5(3)S1.8, 15.5(3)S2, 15.6(0.19)S, 15.6(1.6)S
Alert Type:
Updated *
Bug Id:
CSCux86273
Title:
ME3600 drop traffic: REP LB and Static MAC address without vlan created
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ME3600 hangs and stops forwarding control traffic to and from CPU when enabling REP with load-balancing.

Conditions:
This condition occurs under a particular config scenario.

1. There is an EEM script to configure static MAC address of system MAC to point to an Exit interface.
2. There should be a Vlan present in the EEM script which shouldn't exist in the Vlan database.
3. REP needs to be enabled with load-balancing.

Workaround:
1. Add the missing Vlan to the Vlan database.
2. Configure REP without load balancing.

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
15.4(3)
Known Fixed Releases: *
15.6(1.17)SP
Alert Type:
Updated *
Bug Id:
CSCuf03889
Title:
ethernet loopback causes crash
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

System reload


Conditions:

Starting loopback with "ethernet loopback start local interface" command for port configured with EFPs.


Workaround:

none

Last Modified:
03-FEB-2016
Known Affected Releases:
15.3(1)S1
Known Fixed Releases: *
15.2(1.2.42)PI22, 15.3(1)S1.10, 15.3(1)S2, 15.3(1)T1.1, 15.3(1)T2, 15.3(1)T3, 15.3(1)T4, 15.3(2)S0.5, 15.3(2)S1, 15.3(2)S1b
Alert Type:
Updated *
Bug Id:
CSCux31993
Title:
Traffic is not passing even after removal from MAC deny list
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Traffic is not passing for the mac address, even after removing the mac from MAC SEC deny list.

Conditions:
1. Configure mac-sec deny list with MAC "0000.0400.010b" and send traffic from that source mac address.
2. Traffic is dropped for that and getting the MAC SEC console log for this.
3. Unconfigure the mac "0000.0400.010b" from the mac-sec deny list.
4. However, permit address traffic is passing. It means, the traffic is not fully blocked for the port.
5. Observe the traffic is dropped forever.

Workaround:

Further Problem Description:

Last Modified:
03-FEB-2016
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCtz28446
Title:
ME3600X:cfm AIS continue
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:

After sh/no shut the port it works as cfm MEP on ME3600X,AIS co
ntinues on the port.

Since it happens every one minute,it is never recoverd from error.

Similarly,CCM with RDI is sent to peer from the MEP continuously,which
keeps peer(set EFD) l2 down.

It is not seen in case line-protocol down on physical interface is logged.

Conditions:

-15.1(2)EY
-15.2(2)S

Workaround:

-to get line-protocol of physical interface down again by shut and then no
shut

-"clear ethernet cfm ais link-status interface " can stop
detecting AIS every one minute
(it will be recovered 210sec after automatically)

-With "carrier-delay msec 0",logging line-protocol down on physical interface
can output sooner

Last Modified:
02-FEB-2016
Known Affected Releases:
15.2(2)S
Known Fixed Releases: *
15.3(0.12)S, 15.3(0.8)T, 15.3(1)S, 15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.3(1)T, 15.3(1)T1, 15.3(1)T2, 15.3(1)T3
Alert Type:
Updated *
Bug Id:
CSCud87859
Title:
L2PDU rate limiting over EFP for ME3600
Status:
Open
Severity:
6 Enhancement
Description: *

$$IGNORE-PSIRT

CISCO HIGHLY CONFIDENTIAL - CONTROLLED ACCESS

This issue is under review by the Cisco Product Security Incident Response
team (PSIRT).

The defect describes a product security vulnerability. Its contents must
be protected from unauthorized disclosure, both internal and external to
Cisco. Do not forward this information to mailing lists or newsgroups.

Documentation writers: it is prohibited to publish this Release-note
Enclosure (RNE) until the content has been approved by PSIRT. PSIRT may
publish a Security Advisory regarding this defect, and the current text of
this RNE will be replaced with appropriate information. In the event that
a Security Advisory is not published, PSIRT will replace this text with an
appropriate explanation.

More information on PSIRT is available at <http//psirt.cisco.com/>.
Cisco's public policy on security vulnerability handling can be reviewed at
<http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html>.
For further information, send a message to psirt@cisco.com.

(yspiner-02/16/16)<B>Symptom:</B>
Customer observed spanning tree instability between ME3600 and backbone due to STP packets
received over EFP from connected customer.

<B>Conditions:</B>
Sending 5000 pps of STP packets (Traffic Generator)to the ME3600, on a EVC with xconnect and
l2protocol forward (same behavior with l2protocol tunnel) causes spanning-tree instability
(Block/forward) between ME3600 and backbone.

<B>Workaround:</B>
With l2protocol forward, for STP BPDU's to be properly forwarded, policy-map rate-limiting
STP should be applied on the control-plane.
In such case, if we increase the policer rate to 6 mbps,(for 5000pps) that solves the issue.
REP stops flapping and no protocol drops were observed.

Please find the control-plane policy used,
policy-map stp
class stp
police cir 6000000 conform-action transmit exceed-action drop
class-map match-all stp
match access-group name stp
mac access-list extended stp
permit any host 0180.c200.0000

or apply the below policy to the EVC in which stp flood is expected.

Policy-map stp
Class stp
police cir 512000 conform-action transmit exceed-action drop

class-map match-all stp
match access-group name stp

mac access-list extended stp
permit any host 0180.c200.0000

Last Modified:
16-FEB-2016
Known Affected Releases:
15.4(1)S
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论