| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv35094 | Title: | SAT - L3 IP SLA Traffic Generation is not working |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: L3 IP SLA Traffic will not egress out of interface. only Tx stats are getting incremented in SLA o/p but actual traffic is not egressing out of the router.
Conditions: Seen only on L3 IP SLA targets.
Workaround: NONE
Further Problem Description:
|
|
Last Modified: | 15-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.5(3)S1.5, 15.5(3)S2 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw14558 | Title: | Storm control being triggered on wrong port |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Storm control being triggered on the Gig0/20 port even if this port is admin down.
Conditions: Storm control being triggered on the Gig0/20 port even if this port is admin down.
Workaround: None
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: * | 15.5(3)S1.10, 15.5(3)S2, 15.6(1.17)SP |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw31489 | Title: | ME3600 ciscoEnvMonSupplyState value is wrong after reload |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: When the second power supply is connected to the power source , Input state is ok and output sate state is fault, SNMP returns "6" for ciscoEnvMonSupplyState OID. The expected value is 3:
Conditions: after reload when secondary power supply not connected.
Workaround: na
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.4(3)S4.1, 15.4(3)S5, 15.5(1)S2.17, 15.5(1)S3, 15.5(2)S2.11, 15.5(3)S0.13, 15.5(3)S1, 15.5(3)S1a, 15.6(0.21)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw62168 | Title: | MAC ACL does not work on ME3600X |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Following MAC ACL is applied on Gi0/2. This ACL does not block UDLD/CDP/PAgP PDUs coming from far end. mac access-list extended udld deny any host 0100.0ccc.cccc permit any any ! interface GigabitEthernet0/2 description sms/vOD1a-vUA2/trunk/sms-vua-2 switchport trunk native vlan 100 switchport trunk allowed vlan 1902,2002,2022,2042 switchport mode trunk mtu 9216 logging event link-status load-interval 60 udld port aggressive mac access-group udld in << service-policy output pm_att_queuing
This issue is seen when native vlan on trunk is non default. Once issue happens, changing just the native vlan back to 1 does not help, entire interafce must be defaulted and reconfigured with native vlan = 1.
A non default native vlan does not work in any case, unless this bug is fixed.
Conditions:
Workaround: Defaulting the interface and reapplying the ACL works,
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: * | 15.6(1.17)SP |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCud74670 | Title: | Remote LFA FRR Convergence fails with 3000 prefixes |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom:
When using RLFA repair paths traffic loss may occur during reconvergence following a link failure.
Conditions:
RLFA tunnel is used as a repair path. The greater the number of prefixes affected by the topology change the more likely the traffic loss is to be seen.
Workaround: No workaround.
|
|
Last Modified: | 03-FEB-2016 |
|
Known Affected Releases: | 15.2(2)SNI, 15.2(4)S, 15.3(1)S, 15.3(2)S |
|
Known Fixed Releases: * | 15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB40.1, 15.2(2)E, 15.2(2b)E, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.3(1.17)S0.14, 15.3(2)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCue59189 | Title: | ERPS G.8032 compatibility failure |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptoms: Cisco ME-3600X-24FS-M switch drops R-APS PDU packets and the following error messages are seen in the debug:
ERR: Packet with wrong version 0 or opcode 40 Failed to decode packet, Invalid argument
Conditions: The symptom is observed when used with devices that support only G.8032 (2008) for ERPS.
Workaround: There is no workaround.
|
|
Last Modified: | 03-FEB-2016 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: * | 15.3(1)S1.4, 15.3(1)S2, 15.3(2)S0.4, 15.3(2)S1, 15.3(2.14)S, 15.3(2.15.1)XEB, 15.6(1)SN |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuo93299 | Title: | AN:Zero Touch Bootstrap not working |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ZTB does not work. Conditions: This symptom occurs when the image is loaded and left without aborting the setup dialogue box. Workaround: This issue has been fixed.
|
|
Last Modified: | 05-FEB-2016 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: * | 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.5(0.11)S, 15.6(0.17)PI30e, 15.6(0.19)T, 15.6(1)SN, 15.6(1.9)T0.1 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuo98907 | Title: | Platform build issue post rel1.0.2 |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Platform-specific images do not build. Conditions: This symptom occurs when any platform-specific image is built. Workaround: This issue is fixed.
|
|
Last Modified: | 05-FEB-2016 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: * | 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(5.0)ST, 15.4(2.17)S0.5, 15.4(3)S, 15.4(3)SN1, 15.5(0.11)S, 15.6(0.17)PI30e, 15.6(0.19)T, 15.6(1)SN |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuq20912 | Title: | cfm error using wrong local mep id |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: cfm using wrong local mep id to report this error
Conditions: you may see this issue when there is a remote side link failure
Workaround: none
Further Problem Description: none
|
|
Last Modified: | 06-FEB-2016 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: * | 15.4(3)M0.4, 15.4(3)M1, 15.4(3)S0.8, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.5, 15.5(0.20)PI27a, 15.5(0.20)T, 15.5(1)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu76064 | Title: | AN: Whales establishing ACP to non directly connected devices |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Whales is establishing neighborship and ACP to devices which are not directly connected.
Conditions: Default scenario
Workaround: N/A
Further Problem Description: Whales is establishing neighborship and ACP to devices which are not directly connected even tough there is no active L2 channel to the non directly connected devices.
|
|
Last Modified: | 06-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.5(2.21)S0.12, 15.5(2.21)S0.9, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1, 15.5(3)S1a, 15.5(3)SN, 15.6(0.10)S, 15.6(0.17)PI30e, 15.6(0.19)T |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuu71516 | Title: | AN: Channel not getting formed in Whales. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: CD channel is not getting formed in whales platform.
Conditions: With default interface config.
Workaround: N/A
Further Problem Description: Continuous channel creation and deletion observed and hence neighborship, ACP etc won't get established.
|
|
Last Modified: | 06-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.4(1)S, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1)S4, 15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.5(3)S, 15.5(3)S0a, 15.5(3)S1 |
|
|
| |
| |
|
Alert Type: | New |
Bug Id: | CSCuy51315 | Title: | Mac sec blacklist address traffic is blocked in egress for all ports |
|
Status: | Open |
|
Severity: | 2 Severe |
Description: | Symptom: Traffic is dropped while egressing in any port if blacklist address (deny) is configured in MAC SEC and traffic contains blacklisted mac in destination mac address field.
Conditions: 1. Configure EFP in all the ports as per the topology. 2. Configure EFP based MAC sec with blacklist for mac address "X" in one of the port between ME3600-1 and ME3600-2 3. Observe ingress traffic is getting dropped properly if mac "X" is present in the source address field of the traffic. 4. Send traffic from Ixia with MAC "X" in destination address field. 5. Observe traffic is dropped forever in all the ports including the port where no mac sec is configured. Traffic is only forwarding after removing the address "X" from blacklist.
Workaround:
Further Problem Description: |
|
Last Modified: | 29-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S1.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv34896 | Title: | VPLS autodiscovery PW failed to comeup when BGP recovers from failure |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: A Virtual Private LAN Service (VPLS) Virtual Circuit (VC) which is created using BGP Autodiscovery goes down and stays down when it is reprovisioned due to a BGP route change. The output of show l2vpn vfi or show vfi shows that the pseudowire was not created.
Conditions: This symptom has been observed when multiple BGP NLRI messages are received from the same BGP peer with the same route information. All IOS/IOS-XE versions and platforms are affected.
Workaround: Perform the exec command clear ip bgp.
Further Problem Description:
|
|
Last Modified: | 18-FEB-2016 |
|
Known Affected Releases: | 15.4(3)S2.1 |
|
Known Fixed Releases: * | 15.4(3)S3.8, 15.4(3)S4, 15.5(1)S2.15, 15.5(1)S2.9, 15.5(1)S3, 15.5(2)S1.5, 15.5(2)S2, 15.5(3)S0.2, 15.5(3)S1, 15.5(3)S1a |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuy09827 | Title: | ME 3600 crash when adding static MAC address |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ME 3600 crash when adding static MAC address
Conditions: The MAC address is already learnt as Dynamic entry
Workaround: None
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.5(1.2) |
|
Known Fixed Releases: * | 15.6(1.17)SP |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw23745 | Title: | ME 3600X / SVI VRF Routing problem with Access-Port |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: VRF routing is broken when "switch port access vlan <>" is configured to reach host in a vrf. Issue happens only with latest image 15.5. Same is working fine with 15.4 image.
Conditions: when "switch port access vlan <>" is configured to reach host in a vrf
Workaround: Use EFP method instead of "switch port access vlan" for host connectivity
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.4(3)S4.1, 15.4(3)S5, 15.5(1)S2.21, 15.5(1)S3, 15.5(3)S0.11, 15.5(3)S1, 15.5(3)S1a, 15.6(0.20)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuw10281 | Title: | Traffic drop on mac movement when mac sec is enabled under EFP |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: Traffic drop is observed for MAC which is moved from one MAC sec port to another mac sec enabled port
even after the expiry of mac sec inactivity time and mac aging time periods.
Conditions:
Workaround: Disable and re-enable the mac security starts traffic forwarding again
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.3(1)S1.1, 15.4(3)S, 15.5(3)S |
|
Known Fixed Releases: * | 15.4(3)S4.2, 15.4(3)S5, 15.5(1)S2.21, 15.5(1)S3, 15.5(3)S1.1, 15.5(3)S2, 15.6(1.10)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuv99903 | Title: | ME3600 drops traffic thro' EVC port when EFPs for BD in 1G and 10G ports |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ME3600 drops traffic through EVC port when EFPs for same bridge-domain configured in 1G and 10G ports
Conditions:
Workaround: Shutdown 10G link and unshutdown the 1G link solves this problem. The problem will again occur if the node is reloaded again.
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: * | 15.4(3)S4.3, 15.4(3)S5, 15.5(1)S2.22, 15.5(1)S3, 15.5(3)S1.8, 15.5(3)S2, 15.6(0.19)S, 15.6(1.6)S |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux86273 | Title: | ME3600 drop traffic: REP LB and Static MAC address without vlan created |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Description: | Symptom: ME3600 hangs and stops forwarding control traffic to and from CPU when enabling REP with load-balancing.
Conditions: This condition occurs under a particular config scenario.
1. There is an EEM script to configure static MAC address of system MAC to point to an Exit interface. 2. There should be a Vlan present in the EEM script which shouldn't exist in the Vlan database. 3. REP needs to be enabled with load-balancing.
Workaround: 1. Add the missing Vlan to the Vlan database. 2. Configure REP without load balancing.
Further Problem Description:
|
|
Last Modified: | 23-FEB-2016 |
|
Known Affected Releases: | 15.4(3) |
|
Known Fixed Releases: * | 15.6(1.17)SP |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCuf03889 | Title: | ethernet loopback causes crash |
|
Status: | Fixed |
|
Severity: | 3 Moderate |
Description: | Symptom:
System reload
Conditions:
Starting loopback with "ethernet loopback start local interface" command for port configured with EFPs.
Workaround:
none |
|
Last Modified: | 03-FEB-2016 |
|
Known Affected Releases: | 15.3(1)S1 |
|
Known Fixed Releases: * | 15.2(1.2.42)PI22, 15.3(1)S1.10, 15.3(1)S2, 15.3(1)T1.1, 15.3(1)T2, 15.3(1)T3, 15.3(1)T4, 15.3(2)S0.5, 15.3(2)S1, 15.3(2)S1b |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCux31993 | Title: | Traffic is not passing even after removal from MAC deny list |
|
Status: | Open |
|
Severity: | 3 Moderate |
Description: * | Symptom: Traffic is not passing for the mac address, even after removing the mac from MAC SEC deny list.
Conditions: 1. Configure mac-sec deny list with MAC "0000.0400.010b" and send traffic from that source mac address. 2. Traffic is dropped for that and getting the MAC SEC console log for this. 3. Unconfigure the mac "0000.0400.010b" from the mac-sec deny list. 4. However, permit address traffic is passing. It means, the traffic is not fully blocked for the port. 5. Observe the traffic is dropped forever.
Workaround:
Further Problem Description:
|
|
Last Modified: | 03-FEB-2016 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCtz28446 | Title: | ME3600X:cfm AIS continue |
|
Status: | Fixed |
|
Severity: | 4 Minor |
Description: | Symptom:
After sh/no shut the port it works as cfm MEP on ME3600X,AIS co ntinues on the port.
Since it happens every one minute,it is never recoverd from error.
Similarly,CCM with RDI is sent to peer from the MEP continuously,which keeps peer(set EFD) l2 down.
It is not seen in case line-protocol down on physical interface is logged.
Conditions:
-15.1(2)EY -15.2(2)S
Workaround:
-to get line-protocol of physical interface down again by shut and then no shut
-"clear ethernet cfm ais link-status interface " can stop detecting AIS every one minute (it will be recovered 210sec after automatically)
-With "carrier-delay msec 0",logging line-protocol down on physical interface can output sooner
|
|
Last Modified: | 02-FEB-2016 |
|
Known Affected Releases: | 15.2(2)S |
|
Known Fixed Releases: * | 15.3(0.12)S, 15.3(0.8)T, 15.3(1)S, 15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.3(1)T, 15.3(1)T1, 15.3(1)T2, 15.3(1)T3 |
|
|
| |
| |
|
Alert Type: | Updated * |
Bug Id: | CSCud87859 | Title: | L2PDU rate limiting over EFP for ME3600 |
|
Status: | Open |
|
Severity: | 6 Enhancement |
Description: * | $$IGNORE-PSIRT
CISCO HIGHLY CONFIDENTIAL - CONTROLLED ACCESS
This issue is under review by the Cisco Product Security Incident Response team (PSIRT).
The defect describes a product security vulnerability. Its contents must be protected from unauthorized disclosure, both internal and external to Cisco. Do not forward this information to mailing lists or newsgroups.
Documentation writers: it is prohibited to publish this Release-note Enclosure (RNE) until the content has been approved by PSIRT. PSIRT may publish a Security Advisory regarding this defect, and the current text of this RNE will be replaced with appropriate information. In the event that a Security Advisory is not published, PSIRT will replace this text with an appropriate explanation.
More information on PSIRT is available at <http//psirt.cisco.com/>. Cisco's public policy on security vulnerability handling can be reviewed at <http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html>. For further information, send a message to psirt@cisco.com.
(yspiner-02/16/16)<B>Symptom:</B> Customer observed spanning tree instability between ME3600 and backbone due to STP packets received over EFP from connected customer.
<B>Conditions:</B> Sending 5000 pps of STP packets (Traffic Generator)to the ME3600, on a EVC with xconnect and l2protocol forward (same behavior with l2protocol tunnel) causes spanning-tree instability (Block/forward) between ME3600 and backbone.
<B>Workaround:</B> With l2protocol forward, for STP BPDU's to be properly forwarded, policy-map rate-limiting STP should be applied on the control-plane. In such case, if we increase the policer rate to 6 mbps,(for 5000pps) that solves the issue. REP stops flapping and no protocol drops were observed. Please find the control-plane policy used, policy-map stp class stp police cir 6000000 conform-action transmit exceed-action drop class-map match-all stp match access-group name stp mac access-list extended stp permit any host 0180.c200.0000
or apply the below policy to the EVC in which stp flood is expected.
Policy-map stp Class stp police cir 512000 conform-action transmit exceed-action drop class-map match-all stp match access-group name stp mac access-list extended stp permit any host 0180.c200.0000 |
|
Last Modified: | 16-FEB-2016 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论