Cisco Blog » The Platform

2016年7月3日星期日

Cisco Notification Alert -Nexus 9000 Series Switch-04-Jul-2016 05:39 GMT

 

 

 

 

 

 

 


Security Advisories & Responses - Nexus 9000 Series Switches

Title:
Cisco IOS Software Network Address Translation Denial of Service Vulnerability
Description:

A vulnerability in the Network Address Translation (NAT) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper translation of IP version 4 (IPv4) packets.

Cisco has released software updates that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat

Note: The September 24, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep14.html

Date:
01-JUN-2016
Title:
Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability
Description:

A vulnerability in the IP Version 6 (IPv6) packet processing functions of multiple Cisco products could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device.

The vulnerability is due to insufficient processing logic for crafted IPv6 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 Neighbor Discovery (ND) packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to stop processing IPv6 traffic, leading to a DoS condition on the device.

This vulnerability is not Cisco specific: any IPv6 processing unit not capable of dropping such packets early in the processing path or in hardware is affected by this vulnerability.

Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6

Date:
01-JUL-2016

Find additional information in Cisco Security Advisories & Responses

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 92160YC-X Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 92160YC-X Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX-E Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9272Q Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9272Q Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX-E Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2d)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2d.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2d)

File Release Date:
22-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I2(2c)
Alert Type:
New File
File Name:
nxos.CSCuz65185-n9k_EOR-1.0.0-7.0.3.I2.2c.lib32_n9000.rpm
File Description:

SMU image for 7.0(3)I2(2c)

File Release Date:
22-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
nxos.7.0.3.I2.2e.bin
File Description:

Cisco Nexus 9000/3000 Standalone Switch

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93120TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I2(2e)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I2.2e.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I2(2e)

File Release Date:
19-JUN-2016
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1g)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1g.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1g)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.2(3h)
Alert Type:
New File
File Name:
aci-apic-dk9.1.2.3h.iso
File Description:

APIC Release Image for 1.2(3h) Release

File Release Date:
17-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1h)
Alert Type:
Deferral Notice
File Name:
aci-n9000-dk9.11.3.1h.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1h)

Deferral Notice Date:
07-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(1i)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.1i.iso
File Description:

APIC Release image for 1.3(1i) release

File Release Date:
02-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.1i.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(1i)

File Release Date:
02-JUN-2016

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.3(2f)
Alert Type:
New File
File Name:
aci-apic-dk9.1.3.2f.iso
File Description:

APIC Release Image for 1.3(2f) Release

File Release Date:
07-JUN-2016
Alert Type:
New File
File Name:
aci-n9000-dk9.11.3.2f.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.3(2f)

File Release Date:
07-JUN-2016
Find additional information in Software Downloads index.

Known Bugs - Nexus 9000 Series Switches

Alert Type:
Updated *
Bug Id:
CSCuy54378
Title:
port-channel core after copy r s
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
The port-channel will be cored after ascii replay config and copy r s

Conditions:
The save-config is ascii-replay and copy r s. The save-config has FCOE config and fex config

Workaround:
None. Should not done ascii replay and copy r s.

Further Problem Description:

Last Modified:
01-JUL-2016
Known Affected Releases:
7.0(3)IDP3(1.150)
Known Fixed Releases: *
7.0(3)I3(1.6), 7.0(3)I3(2), 7.0(3)I4(0.42), 7.0(3)I4(1), 7.0(3)IED5(0), 7.0(3)IED5(0.145)
Alert Type:
New
Bug Id:
CSCva31498
Title:
EPM/COOP failed to sync EP, md5 mismatch
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Traffic loss is seen after clean reboot of spines.

Conditions:
COOP is configured in strict mode and all spines in fabric are reloaded at the same time. This leads to fabric partition briefly where all APIC nodes are not able to talk to each other until reload is complete.

Workaround:
There are couple of workarounds.

1. Do not reload ALL spines at the same time i.e. that makes sure fabric is not partitioned.
2. Configure COOP is compatible mode.

Further Problem Description:
When fabric gets partitioned, it is possible that all nodes do not have same key used for authenticating COOP messages between nodes. The nodes can continue to be in that state up to 1hr even after partition is healed.
Every 1hr, new key generated and then all nodes will end up having same key and COOP communication between
spines and leaf nodes is established again and traffic is restored.

Last Modified:
02-JUL-2016
Known Affected Releases:
12.0(1l)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy37092
Title:
dublin_bel: 50g link btwn StMoritz nd Havasu comes up with fec off on TH
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
50G links on N9K-C9232C or N9K-C9236C connected to N3K-C3232C or N9K-X9732C-EX or any FEC capable 100G peer for that matter, will not come up with FEC enabled.

Conditions:
If ToR N9K-C9232C or N9K-C9236C is connected to N3K-C3232C or N9K-X9732C-EX or any FEC capable 100G peer for that matter, 50G links (in breakout mode) will not come up if FEC is enabled on both the peers.

Workaround:
Workaround is to disable FEC on both peers. This is the only and permanent workaround for this limitation.

Further Problem Description:

Last Modified:
15-JUN-2016
Known Affected Releases: *
7.0(3)I4(1), 7.0(3)IBL3(1.29), 7.0(3)IM3(2.49), 7.0(3)IM3(2.54)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz46848
Title:
Special FIB adjacency of drop route is incorrect
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Drop adjacency handling in FIB is incorrect

Conditions:
This should have no functional impact on its own but with certain sequences of routes being programmed can cause process crash in tahusd

Workaround:

Further Problem Description:

Last Modified:
17-JUN-2016
Known Affected Releases:
7.0(3)IM3(1.74)
Known Fixed Releases:
7.0(3)I4(0.121), 7.0(3)I4(1), 7.0(3)IM3(2.2)
Alert Type:
Updated *
Bug Id:
CSCuy99125
Title:
Stale gst-l3-tcam entries after deleting l3extOut or l3extInstP
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
There is a connectivity loss for traffic leaving and/or entering the ACI fabric through an L3 Out, due to a policy drop caused by stale IP prefix entries in GST-L3-TCAM of Border Leafs.

Conditions:
After one of the following two conditions:

1. An L3 Out policy (l3extOut) has been deleted in the VRF.

2. Some (but not all) of the External Network Instance Profiles (l3extInstP) under the L3 Out have been deleted.

Workaround:
Note: Reloading doesn't clear the entries.

(1) Remove all of the External Network Instance Profiles (l3extInstP's) from the L3 Out, after last one is removed the entries should clear. If the entire L3 Out (l3extOut) was deleted, use #2.

(2) Clean and reboot the leaf using the following commands:

acidiag touch clean
acidiag touch setup
acidiag reboot

Further Problem Description:

Last Modified:
23-JUN-2016
Known Affected Releases:
11.2(2g)
Known Fixed Releases:
11.2(3a)
Alert Type:
Updated *
Bug Id:
CSCva18685
Title:
Ports moving to err-disable state after adding few other vlans to pvlan
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Ports moving to err-disable state after adding few other vlans to pvlan configs

Conditions:
Ports moving to err-disable state after adding few other vlans to pvlan configs

Workaround:
Ports moving to err-disable state after adding few other vlans to pvlan configs

Further Problem Description:
Ports moving to err-disable state after adding few other vlans to pvlan configs

Last Modified:
24-JUN-2016
Known Affected Releases: *
7.0(3)IPV2(1.9)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz79293
Title:
OpFlex SDK timer doesn't start or starts multiple times after timing out
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
The OpFlex connection fails because its timer isn't created on the Cisco AVS host. In this case, the TOR ages out the ODev. Or, the OpFlex connection flaps continuously because its timer is created multiple times on the Cisco AVS host. In this case, the Cisco AVS host sends many redundant IDEp attaches to the TOR. In either case, the result is complete or significant loss of OpFlex control traffic.

Conditions:
This problem occurs under the following conditions:

- Link flaps

- ESXi reboots

- TOR reloads

- Policy upgrades

Workaround:
On the Cisco AVS host, enter the vem restart command.

Further Problem Description:

Last Modified:
24-JUN-2016
Known Affected Releases:
1.3(2a), 2.0(0.331)
Known Fixed Releases:
1.2(3f), 2.0(0.337d), 2.0(0.340), 2.1(0.32), 5.2(1)SV3(1.25)
Alert Type:
Updated *
Bug Id:
CSCuy62136
Title:
vCenter Hypervisors disappear
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Faults indicate DVS was deleted and port groups were deleted from vCenter on the APIC

During normal operations, some of the API calls from APIC to vCenter started to fail. As a result, the inventory fetched from vCenter was not successful and EPGs experienced a connectivity issue.

Conditions:

Workaround:
Workaround:
1. A delete/re-add of vCenter controller configuration as noted in the Fault description. OR
2. Restart of VMM service

Further Problem Description:

Last Modified:
24-JUN-2016
Known Affected Releases:
1.1(1r)
Known Fixed Releases: *
1.1(4j), 1.1(4k), 1.2(2i), 1.2(3a), 1.2(3c), 1.3(0.79), 1.3(0.85a), 1.3(0.87a), 1.3(0.88), 1.3(1g)
Alert Type:
Updated *
Bug Id:
CSCuy43013
Title:
in-band managment ip address is deleted when arpflood is enabled
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In-band IP address becomes 0.0.0.0 in show switch command.
ip addresses are actually deleted from the node and in-band management does not work.

Conditions:
Unknown L2 uni-cast (arpFlood) is changed from proxy to flood for in-band management BD.

Workaround:
The best way to resolve this is to change the BD for the in-band EPG to 'default', wait for a few seconds, and move it back to 'inb' (or original) BD. This will re-trigger a programming of the BD configuration including the in-band management IP addresses for the nodes.

Further Problem Description:

Last Modified:
24-JUN-2016
Known Affected Releases:
11.2(1k)
Known Fixed Releases: *
1.2(2g), 1.3(0.36), 1.3(1g), 1.3(2f), 2.0(0.202a), 2.0(0.203)
Alert Type:
Updated *
Bug Id:
CSCuz67594
Title:
ACI - Leaf diagmgr crash
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ACI Leaf Crash with the following reason:
show system reset-reason
*************** module reset reason (1) *************
Reason: reset-triggered-due-to-ha-policy-of-reset
Service:diagmgr hap reset

Conditions:

Workaround:
Not available at the moment.

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
11.0(3f)
Known Fixed Releases: *
12.0(0.134), 12.0(0.138), 12.0(0.139), 12.0(1.5), 12.0(1.6)
Alert Type:
Updated *
Bug Id:
CSCuu66580
Title:
Fabric Module unrecoverable-error caused by /var/sysmgr/ fully used
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
All fabric modules of customer become unrecoverable-error. It could happen one by one and eventually all of them get failed.

dmesg from fabric module shows

[ 155.835722] last reset at 1432590112.707548, reason: pcie switch error, code 63
[ 175.562666] unable to detect the device knet0
[ 185.582673] unable to detect the device knet0

df -h on fabric module shows /var/sysmgr are being filled up, the file /var/sysmgr/tmp_logs/eltmc_trace_dump.txt are continuely growing.

bash# df -h
Filesystem Size Used Available Use% Mounted on
devpts 1.5G 116.0K 1.5G 0% /dev/pts
shmfs 1.5G 116.0K 1.5G 0% /dev/shm
tmpfs 128.0M 34.6M 93.4M 27% /var/volatile/tmp
none 1.5G 116.0K 1.5G 0% /dev
/dev/ubi8_0 14.3M 252.0K 13.3M 2% /mnt/plog
/dev/ubi0_0 86.6M 24.0K 86.5M 0% /mnt/bootflash
tmpfs 200.0M 4.0K 200.0M 0% /mnt/pss
none 1.0G 1.0G 0 100% /var/sysmgr
none 25.0M 0 25.0M 0% /var/sysmgr/srv_logs

Conditions:
Interface flapping are seen by looking the eltmc log, as a result the eltmc dump trace are increasing and get filled till the /var/sysmgr is fully utilised.

Workaround:
ssh to all the LC and FC by root/root

ssh root@fc21
cd /var/sysmgr/tmp_logs/
echo 0 > eltmc_trace_dump.txt

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
11.0(3k), 11.0(4)
Known Fixed Releases: *
11.0(4k), 11.1(0.235), 11.1(0.236), 12.0(1e)
Alert Type:
Updated *
Bug Id:
CSCva18519
Title:
NGINX crashing when using TACACS authentication
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
NGINX coring on APIC every few days

Conditions:
Large number of login requests per day to APIC (in this case, 22k per day)
Device logging in this way is not reusing their token as they should be

Workaround:
Reconfigure login device to use webtoken instead of requesting new one every time

Further Problem Description:

Last Modified:
28-JUN-2016
Known Affected Releases:
1.1(4f)
Known Fixed Releases: *
2.0(1j)
Alert Type:
New
Bug Id:
CSCva21169
Title:
Traffic between Enforced & UnEnforced EPG will not work with N9k as IPN
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Traffic between Enforced EPG in POD 1 and UnEnforced EPG in POD 2 in a MultiPOD setup will not work if standalone N9k is used as IPN.

Conditions:
N9k as IPN connecting POD1 and POD2.
EPG in POD1 in intra-EPG deny mode. ( EPG as Enforced)
EPG in POD2. ( Normal UnEnforced Mode)


Send any traffic between them and they wont work.

Workaround:
None

Further Problem Description:

Last Modified:
29-JUN-2016
Known Affected Releases:
12.0(1b)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva23187
Title:
epmc crash due to mac and ip independent moves
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
epmc process crash

Conditions:
MAC and IP are moving independently and very rapidly.
When MAC moves from remote to local and IP moves from local to local and these MAC and IP move to the same EP, the crash happens.

Before crash
EP-1, Mac-A and IP-B, remote
EP-2, Mac-B and IP-A, local port-x

When Mac-A and IP-A are moving as follows, epmc process is aborted.
EP-3, Mac-A and IP-A, local port-y

Workaround:
Moving MAC and IP independently and rapidly could be caused by design issue or cabling issue. By resolving this kind issues and making EP moving less frequently, this problem is prevented.

Further Problem Description:

Last Modified:
29-JUN-2016
Known Affected Releases:
11.2(3c)
Known Fixed Releases: *
12.0(1.8)
Alert Type:
Updated *
Bug Id:
CSCuz86494
Title:
ifav41: Not able to deploy EPGs on ToRs
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
EPG deployment fails due to insufficient VLANs available

Conditions:
This can happen when isolated EPGs (for intra-EPG deny) are configured and then deleted. The internal ID for these remain in use on the leaf.

Workaround:
Clean reboot the leaf

Further Problem Description:

Last Modified:
06-JUN-2016
Known Affected Releases:
2.0(0.335b)
Known Fixed Releases: *
2.0(0.337g), 2.0(0.345a), 2.0(0.347a), 2.0(0.349a), 2.0(0.351), 2.0(0.357a), 2.0(0.360a), 2.0(0.364a), 2.0(1.6)
Alert Type:
Updated *
Bug Id:
CSCuz98754
Title:
Mac Entry missing from Mac Address table with Inconsistant Port State
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
DUT IP: 172.28.82.9
login: admin/Cisco12345

Traffic is running on all 48 ports, however the mac entry is missing on port e1/17,no issues with the cable and setup:

Turin# show mac add co
MAC Entries for all vlans :
Dynamic Address Count: 47
Overlay Address Count: 0
Static Address (User-defined) Count: 0
Secure Address Count: 0

Conditions:
With the lates tbuild 7.0(3)I4(1.38), the Inconsistantport state issue went away, however, traffic forwarding issue still there. detail in attachment "Turin-Traffic-Problem-Detail"

Workaround:

Further Problem Description:

Last Modified:
14-JUN-2016
Known Affected Releases:
7.0(3)I4(1.26)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy93241
Title:
epmc core on SB TOR on scale1-leaf112
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:A leaf node is reloaded due to epmc crash which is following to epmc process infinite loop.

Conditions:- A BD with ARP Flood mode
- One of leaf nodes having the BD receives one ARP or GARP packet whose source mac address is all zeros
- Other remote leaf nodes with the BD would be reloaded

Workaround:- Stop GARP/ARP with all zeros source mac address
or
- Turn off ARP Flood mode of the BD

More Info:In case of epmc process crash, following message is repeated a lot of times in epmc-trace log before crash

2016 May 21 13:03:21.328955762:5005:epmc_proc_lrn_inline_get_l2_key:6265:E] MAC learn coming with 0 mac

Just before the above repeated messages, following message about an end point is also recorded in epmc-trace.
mac should be 0x0 and add64_0:1 shows the ip address in hex of the EP to cause this problem.

Notify: valid=1 key-type=L3 V4 oidx=0 seg_vrf=0xf8ffa7
addr64_0:1=0xac1c3b74:0x0 mac=0x0 mode=1
smod/sport=0x4/0x63 vp=0x0 port=0x25f
sclass=0xc009 nd_ow=0 learn_from=1
prio=0 chg=0 spare=0 source=2 location=0
rsvd_0/1/2/3=0/0/0/0



Last Modified:
01-JUN-2016
Known Affected Releases:
11.3(0.229)
Known Fixed Releases: *
11.2(3f), 11.2(3g), 11.3(0.236)
Alert Type:
New
Bug Id:
CSCuz90976
Title:
L3out SVI encap vlan not removed after deleted logical interface profile
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
After deleting svi under the logical interface profile of an l3out the encap vlan with this svi never gets deleted.

Conditions:
Stale VLAN resolved model can be found in leaf switches:

leaf-101# moquery -c fvIfConn -f 'fv.IfConn.encap=="vlan-270"'

# fv.IfConn
encap : vlan-270
addr : 10.8.0.254/24
auto : no
bcastP : 225.1.117.32
childAction :
classPref : encap
descr :
dn : uni/epp/rtd-[uni/tn-common/out-L3out/instP-0.0.0.0]/node-101/stpathatt-[101-102-3]/conndef/conn-[vlan-270]-[10.8.0.254/24]
extEncap : vxlan-14876649
gw : 0.0.0.0
ifInstT : ext-svi
lcOwn : resolveOnBehalf
llAddr : ::
mac : 00:22:BD:F8:19:FF
mcastAddr : 0.0.0.0
modTs : 2016-05-18T01:36:28.921+02:00

mode : regular
monPolDn : uni/tn-common/monepg-default
mtu : inherit
name :
resImedcy : lazy
rn : conn-[vlan-270]-[10.8.0.254/24]
status :
validState : not-validated

Workaround:
1. Collect full tech_support logs for all APICs and leaves that are affected.
2. Login to the affected leaf switches.( Make sure your production network has redundancy or arrange maintenance window for the below steps)
3. leaf-101#acidiag touch clean or setup-clean-config.sh
4. leaf-101#reload

Further Problem Description:

Last Modified:
02-JUN-2016
Known Affected Releases:
1.2(2h)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz72895
Title:
Congo: Artesyn PSU shows shut
Status:
Other
Severity:
3 Moderate
Description:

Symptom:
N9K-PAC-3000w-B HW revision 2.2 shows 'shut' in 'show environment power'

Conditions:
ARTxxxxxx PSU Serial Number

Workaround:
Use PSU normally - cosmetic reporting error

Further Problem Description:

Last Modified:
02-JUN-2016
Known Affected Releases:
12.0(0.121)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz90970
Title:
PolicyElem: Validation Failed when trying to deploy EPG
Status:
Other
Severity:
3 Moderate
Description: *

Symptom:
VPC configuration doesn't work on the Leaf.

Conditions:
After changing the ports on the Interface Selector's port block associated to the VPC Interface Policy Group.

Workaround:
Delete and recreate the Interface Policy Group.

Further Problem Description:

Last Modified:
03-JUN-2016
Known Affected Releases:
11.2(3b)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz96337
Title:
On the border leaf, EP not updated by traffic going to an L3 out.
Status: *
Other
Severity: *
3 Moderate
Description:

Symptom:
On the border leaf, for traffic from an EP (so on the fabric) to an L3 out, EP interface won't be update if the EP moves from a leaf to another.

Conditions:
EPG not instantiated on the border leaf so we have actually only the IP EP (and not the mac EP).

Workaround:

Further Problem Description:

Last Modified:
07-JUN-2016
Known Affected Releases:
11.2(3b)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv34286
Title:
many acidiag options are not documented
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
Cisco APIC CLI acidiag command documentation missing several arguments.

Conditions:
Numerous options for the APIC CLI command acidiag allow for checking and impacting system performance. Several of these options are not documented and should not be run unless while working with the TAC.

Workaround:

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.1(1j)
Known Fixed Releases: *
1.3(0.62a), 1.3(1g), 1.3(2f)
Alert Type:
Updated *
Bug Id:
CSCuy09939
Title:
Exporting/reimporting a snapshot seems to break the diff
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A snapshot that was imported and used as the base for a diff reports "Failed to get diff".

Conditions:
A json snapshot was initially exported to a remote location then imported for use. In this release, json diff is not supported.

Workaround:
Generate snapshot locally onto apic so that it shows in the left pane, THEN right click and export to remote location. This seems to get past whatever is causing the diff to fail.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1.192b), 1.2(1.206), 1.2(1k)
Known Fixed Releases: *
1.2(1.200), 1.2(2g), 1.3(0.11a), 1.3(0.16), 1.3(0.19), 1.3(0.6a), 1.3(0.9), 1.3(1g), 1.3(2f), 2.0(0.191)
Alert Type:
Updated *
Bug Id:
CSCus63206
Title:
fvns:UcastAddrBlk To and From Addresses Should Not Use Mask Bits
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The From and To IP addresses under Management IP Address Pools (vnsAddrInst) require IP addresses in the format:

x.x.x.x/y

and do not perform input validation to restrict entries in an invalid format.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.0(2m)
Known Fixed Releases: *
1.0(2.145a), 1.0(2.146), 1.0(3f), 1.1(0.647), 1.1(1j), 1.3(0.94), 1.3(1g), 1.3(2f), 2.0(0.260), 2.0(1.6)
Alert Type:
Updated *
Bug Id:
CSCuy20938
Title:
Opflex in Send functionality for more than 12 minutes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
AVS opflex hand-shake is delayed for upto 5 mins after VIB upgrade when there is an high-load of VMotions in progress.

Conditions:
AVS VIB upgraded before VMotion events (due to host being put in maintenance mode) get soaked by APIC/fabric.

Workaround:
- opflex communication will recover and state will be 'active' once VMotion events are soaked by APIC/fabric.

- to avoid this delay, wait for 10 minutes between putting the host in maintenance mode and starting the VIB update.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1.192)
Known Fixed Releases: *
1.3(0.32a), 1.3(0.34), 1.3(1g), 1.3(2f), 2.0(0.202a), 2.0(0.203)
Alert Type:
Updated *
Bug Id:
CSCut21435
Title:
DHCP Relay address not removed after removing dhcpRelayPolicy and label
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
dhcp relay policy continues to work even after the dhcp relay label and policy are deleted from the tenant.

Conditions:
After a dhcp relay policy and label are created and applied, dhcp relay works as expected. But if the dhcp relay label and\or the dhcp relay policy is deleted, the dhcp relay policy continues to work. The dhcp relay policy remains programmed in hardware.

Workaround:
erase the switch configuration and reboot. The switch will reload and reconfigure without the deleted dhcp relay policy. Note: If you reconfigure a dhcp relay policy and dhcp relay label, the same symptoms and conditions will reappear if you delete the dhcp relay configuration.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.0(3f)
Known Fixed Releases: *
1.0(3.15), 1.0(3.34), 1.1(0.764), 1.3(1.19), 1.3(2f), 2.0(0.345a), 2.0(0.347a), 2.0(0.349a), 2.0(0.351), 2.0(1.6)
Alert Type:
Updated *
Bug Id:
CSCux74601
Title:
spine decommission/commission raised fault for policy deployment
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:You are seeing fault "F1371" and it says "Failed to deploy policy uni/userext to service 5 on node with id X". It references some dn pointing to a directory in "/uni/userext". Example:

registry/class-1491/instdn-[uni/userext]/ra-[uni/fabric/secRelnHolder]-5-104-1-0-Subtree-mo/fault-F1371


Conditions:A new switch was added and the fault never cleared after adding this switch.
Workaround:Upgrade to version 1.2(2g) or greater and the fault should clear after the upgrade.

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1.120)
Known Fixed Releases:
1.2(1.138), 1.2(2g), 2.0(0.172)
Alert Type:
New
Bug Id:
CSCuv78244
Title:
APIC shows fault for decommissioned switch
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Faults of decommissioned nodes stayed.
Cosmetic

Conditions:

Workaround:
Reload apics one at a time (waiting for fully fit cluster before reloading next)

Further Problem Description:

Last Modified:
09-JUN-2016
Known Affected Releases:
7.2(99)ZZ(99.1)
Known Fixed Releases:
1.2(0.56b), 1.2(0.58a), 1.2(0.60), 1.2(1.17), 1.2(1i), 2.0(0.95)
Alert Type:
Updated *
Bug Id:
CSCuz47165
Title:
APIC upgrade - File checksum validation
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When attempting to copy a presumed good file (a checksum was not performed after the download completes) into the repository via the command line, if the file fails its checksum, no error will be given in response to the "firmware repository add " command. The command line will return in the same manner as if a valid file were moved into the repository. However, the file will never appear in the repository via the GUI and the available space in the 'firmware-repository' partition decrements will each failed attempt. So the file is being moved into the partition but not added to the catalog. The partition fills up and there is no way to delete the corrupted files.

Conditions:
Copying a file to the /home/admin directory via SCP using either an application such as WinSCP or SCP via the command line. After the file is copied to the listed directory, the "firmware repository add " command is used to add the file to the firmware repository.

Workaround:
None

Further Problem Description:
The customer would like a message that says that the file has failed it's checksum validation.

Last Modified:
10-JUN-2016
Known Affected Releases:
1.2(2h), 1.2(3c)
Known Fixed Releases: *
1.3(1.20a), 1.3(1.21a), 1.3(1.22), 1.3(2f), 2.0(0.295a), 2.0(0.300), 2.0(0.345a), 2.0(0.347a), 2.0(0.349a), 2.0(0.351)
Alert Type:
Updated *
Bug Id:
CSCuz27965
Title:
File size of iso image displayed incorrectly in the backend.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
GUI/moquery is showing incorrect file size although file on FS is with the proper file size

Conditions:
When viewing the files size in the APIC repository when the APIC image is greater than 4G; for example 1.2(3c) or 1.3(1g).

To view the files in the repository, this can be done through the GUI through the Admin->Firmware tab or through ssh with the "show firmware repository" command.

The incorrect file does in this particular case does not impact functionality.

Workaround:
To see the correct size, view the file through ssh with the command "ls -l /firmware/fwrepo/fwrepo/"

Further Problem Description:

Last Modified:
10-JUN-2016
Known Affected Releases:
1.3(0.137), 1.3(0.91a)
Known Fixed Releases: *
1.3(1.20a), 1.3(1.21a), 1.3(1.22), 1.3(2f), 2.0(0.276), 2.0(0.277), 2.0(0.345a), 2.0(0.347a), 2.0(0.349a), 2.0(0.351)
Alert Type:
New
Bug Id:
CSCva02321
Title:
Configure infra vrf using API and tenant using cli is not supported
Status:
Terminated
Severity:
3 Moderate
Description:


Not a common usecase. Also, difficult to implement.Symptom:For BGP EVPN scenario, if the External-L3 provider configuration in tenant Infra is configured using the API/Advanced UI or through CLI Named/Explicit L3Out Mode, external-l3 configuration for Tenants which use the BGP EVPN has to be in CLI Named/Explicit L3Out Mode. The external-l3 configuration for Tenants, which need to be in the Named/Explicit L3Out mode include the "external-l3 epg" and the "route-map" configuration.
Conditions:
For the above scenario i.e if there is a named L3Out configuration for tenant infra BGP evpn sessions, when the user configures the consumer tenant configuration on the spine using the CLI implicit mode, the configuration will not be accepted. As a example,
spine 201
vrf context tenant infra vrf overlay-1 l3out providerOut --> Named L3Out

Now, when the user configures
spine 201
vrf context tenant t1 vrf v1 -> Implicit L3Out
the configuration will be rejected.
Workaround:Tenant external-l3 configuration using BGP EVPN should be in Named Mode, if the provider L3Out is in named mode.

Last Modified:
10-JUN-2016
Known Affected Releases:
2.0(0.355)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva03160
Title:
Config restore does not verify fvSubnet on infra vlan
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
An incorrect fvSubnet range is imported

Conditions:
ACI 1.2(2h)
Performing a backup restore on an APIC with a different TEP address pool then the source system

Workaround:
na

Further Problem Description:

Last Modified:
11-JUN-2016
Known Affected Releases:
1.2(2h)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz70931
Title:
COS is not preserved across multi pod
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
The cos preservation feature is not supported in multipod setup. However we can still make sure of cos preservation of inside the POD but across the POD it is not supported. However when you user is configuring CLASS to DSCP marking for multipod qos then this feature is not supported even inside the POD.

Conditions:
Cos preservation feature is supported only inside the POD, it is not supported across the POD.
CLASS to DSCP marking for multipod qos policy is not supported with cos preservation.

Workaround:
class to dscp and cos preservation features are not supported simultaneously.

Further Problem Description:

Last Modified:
13-JUN-2016
Known Affected Releases:
12.0(0.121)
Known Fixed Releases:
12.0(0.137)
Alert Type:
Updated *
Bug Id:
CSCuz77146
Title:
In Eigrpv6 0::0/0 advertised when no defaultRtLeak policy configured.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Even After Removing Default RtLeak policy for IPv6, EIGRP advertises IPv6 default route.

Conditions:
EIGRP is running on IPv6, and Default route leak policy has been configured and de-configured.

Workaround:
clear ipv6 eigrp topology 0::/0 vrf

Further Problem Description:

Last Modified:
13-JUN-2016
Known Affected Releases: *
11.3(1.280), 12.0(0.138)
Known Fixed Releases:
11.3(1.285), 11.3(1.286)
Alert Type:
New
Bug Id:
CSCva04315
Title:
N92304 : Support for LPM heavy mode
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Support LPM heavy mode to support more than 2048 v6 prefixes (/64)

Conditions:

Workaround:

Further Problem Description:

Last Modified:
14-JUN-2016
Known Affected Releases:
7.0(3)IM3(2)
Known Fixed Releases:
7.0(3)IM3(2a)
Alert Type:
Updated *
Bug Id:
CSCuz14680
Title:
switch is returning wrongValue for a GET on vlanTrunkPortVlansEnabled2k
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
User not able to enable the last vlan (vlan 2047) of vlanTrunkPortVlansEnabled2K and system return wrongValue.
setany -v2c 172.28.84.97 private vlanTrunkPortVlansEnabled2k.436237824 -o 0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff:0xff
Error code set in packet - WRONG_VALUE_ERROR: 1.

Conditions:

Workaround:
Using CLI instead.

Further Problem Description:
Problem exists in 7.03(I1)1 and later.

Last Modified:
14-JUN-2016
Known Affected Releases:
7.0(3)I4(0.72)
Known Fixed Releases: *
7.0(3)I2(3.7), 7.0(3)I2(4), 7.0(3)I4(0.81), 7.0(3)I4(1)
Alert Type:
Updated *
Bug Id:
CSCuz66604
Title:
ACI: RARP is not controlled as expected
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
RARP is flooded in the BD. Customer is unable to control RARP in the BD.

Conditions:
ARP Flooding lever does not affect RARP.
Flood in Encapsulation mode for Multi Destination Flooding also does not affect RARP.

Workaround:
RARP can only be contained within 1 encapsulation at most by putting 1 encapsulation per BD; however, flooding cannot be controlled.

Further Problem Description:

Last Modified:
14-JUN-2016
Known Affected Releases:
11.2(1k), 11.3(1g)
Known Fixed Releases: *
2.0(0.381a)
Alert Type:
Updated *
Bug Id:
CSCuv65927
Title:
ACI: PortChannel Member Policy for fast LACP timeout not working
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
LACP fast timeout on PortChannel Member Policy does not take effect when added as an Override policy on the Interface Policy Group

Conditions:
Version 1.1(1j)

Workaround:
None

Further Problem Description:
To change the priority or timeout for LACP on a port-channel or vPC, you create a PortChannel Member Policy setting the timeout to Fast and apply the policy on the Interface Group Policy for the vPC or port-channel. The PortChannel Member Policy is applied as an Override Policy Group. After applying the policy, the other side still sees the fabric switches using a "slow" [30 second] timeout for the port-channel.

Last Modified:
14-JUN-2016
Known Affected Releases: *
1.1(1j), 2.0(0.374c)
Known Fixed Releases:
1.1(2.17), 1.1(2a), 1.1(2h), 1.2(0.49), 1.2(0.76a), 1.2(0.77b), 1.2(0.80a), 1.2(0.83), 1.2(1.17), 1.2(1i)
Alert Type:
Updated *
Bug Id:
CSCup63288
Title:
APIC GUI online help - Cluster
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Click on System tab then click on Controllers and select one of the APIC clusters on the left then expand cluster.

Information should be easy to read and should give proper context. For example: Target size table has 2 state:

undefined and local - what are they ?

Health State: what all these type means to user ?

Conditions:
APIC GUI URL:
http://172.23.96.10/#a:b|topology/pod-1/node-1|infraControllerCluster

Online help URL:
http://172.23.96.10/help/content/index.html#infra_infoControllerCluster.html

Workaround:
None

Further Problem Description:

Last Modified:
15-JUN-2016
Known Affected Releases:
1.0(0.840)T
Known Fixed Releases: *
7.2(0)ZN(99.99)
Alert Type:
Updated *
Bug Id:
CSCva07273
Title:
LACP Fast not applied onto the switch
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
LACP Fast does not take effect on a switch

Conditions:

Workaround:
Misconfig. Two step process:

-From interface policy group, need to create an override for LACP fast
-From access port selector. need to apply the override.

Further Problem Description:

Last Modified:
16-JUN-2016
Known Affected Releases:
12.0(0.140)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz77449
Title:
Contract export to common tenant failed with error message
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Contract export to common tenant failed with error message

Conditions:
This can happen when the configuration contains an EPG associated with to a contract interface and also there is a vzAny (and the Epg is behind this) to contract interface . This configuration is not needed

Workaround:
Remove one of the redundant contract interface associations.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.1(4k)
Known Fixed Releases: *
1.3(2d), 1.3(2f), 2.0(0.340), 2.0(0.347a), 2.0(0.349a), 2.0(0.351), 2.0(0.370a), 2.0(0.372), 2.0(1.21), 2.0(1.6)
Alert Type:
Updated *
Bug Id:
CSCut21401
Title:
Add note about default /32 to l3extLifP and l3extLp
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
User deploys /32 route unknowingly

Conditions:
User did not enter a subnet mask when creating SVI Interface or Secondary IP Address on an External Routed Network's Logical Interface Profile

Workaround:
Delete and reconfigure the SVI with a subnet mask defined

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.0(2m), 1.0(3f)
Known Fixed Releases: *
1.0(3.34), 1.1(0.737a), 1.3(0.67c), 1.3(0.70a), 1.3(0.72b), 1.3(0.74), 1.3(1.19), 1.3(1g), 1.3(2f), 2.0(0.222)
Alert Type:
Updated *
Bug Id:
CSCuw11670
Title:
Queries for fault counts return wrong results or broken responses
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Fault counts queries for controller fabric node and fault class queries using rsp-subtree-include for fabricNode class return incomplete fault count information..

Conditions:
This occurs on all versions of APIC software.

Workaround:
There is no workaround for the issue with the mo query for a controllers fault count.

Rather than doing a class query for fabric nodes and asking for a fault-count, do a mo query for the node but include the fltCnts relative name at the end so you are querying the switches fault count instead.

Further Problem Description:
Queries for fault counts for the controller fabric nodes returns a totalcount in the response of 1 but then the imdata is empty.

Class queries for fault counts using rsp-subtree-include against the fabricNode class returns an incomplete fault count subtree and the counters are all zero.

Last Modified:
20-JUN-2016
Known Affected Releases:
1.1(2h)
Known Fixed Releases: *
1.1(3.4), 1.2(0.113b), 1.2(0.115a), 1.2(0.116), 1.2(1.17), 1.2(1i), 1.3(0.49), 1.3(0.67c), 1.3(0.70a), 1.3(0.72b)
Alert Type:
Updated *
Bug Id:
CSCuy11992
Title:
L4-7 Device subnet doesn't immediately deploy and advertise after submit
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Any subnets added under Device Selection Policy after the service graph is rendered are not pushed to the leaf.

Conditions:
This happens when there is a VRF split in the fabric and operator has to configure subnets to leak between VRF.

Workaround:
Detach and re-attach contract/graph association.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(1k)
Known Fixed Releases: *
1.2(1.200), 1.2(1.210b), 1.2(1.214), 1.2(2g), 1.3(0.11a), 1.3(0.16), 1.3(1.3), 1.3(1f), 1.3(1g), 1.3(2f)
Alert Type:
Updated *
Bug Id:
CSCuz87828
Title:
High CPU on APIC after deploying FEX vPC to VMM Domain
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
While using the APIC, you notice the GUI is very slow and some policy is not being deployed on the switches. When you SSH to the APIC, and run "top", you see very high CPU utilization on "policymgr" and "eventmgr"

Conditions:
This happens after configuring a FEX vPC and tying it to an AEP using a vmm domain.

Workaround:
use a static path binding instead of VMM< domain for FEX VPC

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(2h), 1.2(3c)
Known Fixed Releases: *
2.0(0.357a), 2.0(0.360a), 2.0(0.364a), 2.0(0.366a), 2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuz73973
Title:
Stale endpoint after EP moves outside of fabric
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Endpoint becomes unreachable from inside the fabric. This endpoint was previously located inside the fabric and then was migrated/ moved to outside of the fabric

Conditions:
Traffic flow to the endpoint now takes a routed path through the Border Leaf

Workaround:
1) Clear the endpoint from the affected border leaf using the following command:
vsh -c 'clear system internal epm endpoint key vrf [vrf] ip [Host B IP]'

Note, if the border leafs is in a vPC, then the endpoint will needed to be cleared from the peer leaf as well.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
11.2(2h)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva02805
Title:
DMEization of set nssa-only
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DMEization of set nssa-only

Conditions:
DMEization of set nssa-only

Workaround:
NA

Further Problem Description:
NA

Last Modified:
22-JUN-2016
Known Affected Releases:
7.0(3)IED5(0.90)
Known Fixed Releases: *
7.0(3)IED5(0), 7.0(3)IED5(0.118), 7.0(3)IED5(0.119), 7.0(3)IED5(1), 7.0(3)IPV2(1.7)
Alert Type:
Updated *
Bug Id:
CSCuz99114
Title:
PFC Watchdog : Counter for packets dropped egress need to be cumulative
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Request to show aggregate packets dropped due to watchdog condition

Conditions:

Workaround:

Further Problem Description:

Last Modified:
22-JUN-2016
Known Affected Releases:
7.0(3)IM3(2)
Known Fixed Releases: *
7.0(3)IM3(2.63), 7.0(3)IM3(2.64), 7.0(3)IM3(3)
Alert Type:
Updated *
Bug Id:
CSCva15076
Title:
Spine dropping class selector 6 packets arriving on IPN links
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
In Multipod where a L2-only BD which spans across two PODs, the ARP response packet (In response to ARP request) does not make it across the PODs (Over IPN)

Conditions:
This was confirmed when N7K is used for IPN. N7K IPN router set the outer COS bits of ivxlan frame carring the ARP-response packet to tc=6 (COS=6) when forwarding it to the spine.

The spine drops such packets where tc=6. This causes perpetual incomplete ARP issues in DC.

Workaround:
Configure QoS on N7K IPN router to implement COS marking set to something lower than 6. OR configure the "DSCP class-cos translation policy" on Cisco ACI under Infra tenant -> Networking -> Protocol Policies.

Further Problem Description:

Last Modified:
22-JUN-2016
Known Affected Releases:
12.0(0.141)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz60713
Title: *
Policy drops after upgrade of vPC pair to 1.2(3c)
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
After upgrading a vPC pair of leafs, when a switch came back online, there was a disruption for a period of time.

Conditions:
You have 2 vPC leafs and you upgrade them 1 at a time.

YOnce a switch is reloaded and comes back up, you will see drops on the border leafs for specific traffic flows by running this command on the CLI of the leafs after it comes back up:

"show logging ip access-list internal packet-log deny"

This happens if you are using vzAny to deploy contracts on the VRF instead of on the EPG's themselves. You verify this by going to the VRF --> EPG Collection for VRF and check if you have contracts applied.

Workaround:
n/a

Further Problem Description:

Last Modified:
23-JUN-2016
Known Affected Releases:
1.2(3d)
Known Fixed Releases: *
2.0(0.324), 2.1(0.26)
Alert Type:
Updated *
Bug Id:
CSCuz88373
Title:
QoS marking on T2 interface not working
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
On Nexus9332PQ(7.0.3.I2.3) , when try to apply QoS marking policy-map base on COS&DSCP value class (T2 interface), traffic can not be assigned into different qos-group.
Traffic pattern : L3 traffic which needs to be routed by Nexus 9332PQ.
AQ6-PT-9332PQ-02# show policy-map interface port-channel 1002 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!Service-policy qos applied correctly on T2 L3 port-channel


Global statistics status : enabled

port-channel1002

Service-policy (qos) input: trust_dscp

Class-map (qos): Q1 (match-all)
Aggregate forwarded :
0 packets
Match: cos 4,6
Match: dscp 32-39,48-55
set qos-group 1

Class-map (qos): Q3 (match-all)
Aggregate forwarded :
0 packets
Match: cos 5,7
Match: dscp 40-47,56-63
set qos-group 3

Class-map (qos): Q2 (match-all)
Aggregate forwarded :
0 packets
Match: cos 2-3
Match: dscp 16-31
set qos-group 2

Class-map (qos): class-default (match-any)
Aggregate forwarded :
0 packets
set qos-group 0
AQ6-PT-9332PQ-02# show queuing interface ethernet 1/31

slot 1
=======


Egress Queuing for Ethernet1/31 [Interface]
------------------------------------------------------------------------------
QoS-Group# Bandwidth% PrioLevel Shape QLimit
Min Max Units
------------------------------------------------------------------------------
3 - 1 - - - 6(D)
2 20 - - - - 6(D)
1 45 - - - - 6(D)
0 35 - - - - 6(D)

Port Egress Statistics
--------------------------------------------------------
Pause Flush Drop Pkts 0

+-------------------------------------------------------------------+
| QOS GROUP 0 |
+-------------------------------------------------------------------+
| Tx Pkts | 106995070| Dropped Pkts | 0| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!all packets enter QoS group 0

Conditions:
Hardware:Nexus 9332PQ
Software version:7.0.3.I2.3
Traffic pattern: Brideged/routed packets and pure L3 routed packets.
Example
Briedged/routed:South-----P201(FEX)--N9K01(Bridged/routed:SVI 20/P1001.20)--P1001.20(T2)------North
Routed : South-----P1000.20(ALE)--N9K02(routed)--P1002.20(T2)------North

Workaround:
No workaround

Further Problem Description:

Last Modified:
22-JUN-2016
Known Affected Releases:
7.0(3)I2(3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva17151
Title:
Out-Of-Service policy deployed to node with unmatched pod ID
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Out of Service policy is deployed to node even if POD ID does not match

Conditions:
It a node or interface is added to Out of Service Policy, APIC will honor the policy whenever node ID matches, ignoring POD ID in this case.

Workaround:
Ensure that node ID is correct when marking a node or interface out of service.

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
2.0(1a)
Known Fixed Releases: *
2.0(1.23), 2.0(1.27)
Alert Type:
Updated *
Bug Id:
CSCva04411
Title:
Config vfc-po failed when VPC config under "vpc context"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After configuring vPC, user cannot enter into individual port-channel mode:
apic1(config)# vpc context leaf 101 102
apic1(config-vpc)# interface vpc vpc1
apic1(config-vpc-if)# vlan-domain member vdom100
apic1(config)# leaf 101
apic1(config-leaf)# interface vfc-po vpc19
Error: Validation failed: There is an override for both PC and VPC: topology/pod-1/paths-101/pathep-[vpc19] topology/pod-1/protpaths-101-102/pathep-[vpc19]Rn=node-101,

Conditions:
In vPC, each leg cannot be in different port vsan.

Workaround:
There is not workaround from CLI. Please use GUI for this.

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
2.0(0.357c)
Known Fixed Releases: *
2.0(1.24), 2.0(1.27)
Alert Type:
Updated *
Bug Id:
CSCva02619
Title:
Stale faults exist in the ifc for failing to deploy epg
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
the ifc did not clear the faults after the epg deploy get delivered

Conditions:
the fault was not cleared when the policymgr and eventmgr were on the same apic, and the leadership was changed. both send the faultcleanup and redelegate to other shards.

Workaround:
removing the redelegate in case of cleanup message will solve the problem of creating the fault delegate again.

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
2.0(0.366a)
Known Fixed Releases: *
2.0(1.27)
Alert Type:
Updated *
Bug Id:
CSCur59482
Title:
QoS policer with CIR as percentage is not supported with no-stats
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Policer action with CIR as percentage is not supported when QoS policy of type "qos" is applied with "no-stats" keyword.

Conditions:
When QoS classification policy having policing action is applied with "no-stats" keyword, it is rejected.
Similarly while the policy is active with "no-stats" keyword, adding policing action is rejected.

Workaround:
There is no workaround. When policing action with CIR as percentage is desired, apply the QoS policy without "no-stats" keyword.

Further Problem Description:

Last Modified:
26-JUN-2016
Known Affected Releases:
6.1(2)I3(1.46)
Known Fixed Releases: *
7.0(3)I4(1.69), 7.0(3)I4(2)
Alert Type:
Updated *
Bug Id:
CSCuz96719
Title:
Opflex state shown as Send functionality after upgrading to 1.3(2f)
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

Conditions:

Workaround:
After doing VEM restart Opflex state is Active

Further Problem Description:

Last Modified:
28-JUN-2016
Known Affected Releases:
1.3(2f)
Known Fixed Releases: *
1.1(4m), 1.2(3h), 1.3(2h), 2.0(0.378a), 2.0(0.381a), 2.0(0.384), 2.0(1.21), 2.0(1.31), 2.1(0.36)
Alert Type:
Updated *
Bug Id:
CSCva16881
Title:
Doc:BD toggle for FCOE EPG MUST wait 30-35 seconds
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
We need to document the following:

"When toggling BD in an FCOE EPG, one must wait 30-35 seconds between each toggle. If toggle is performed in a quick succession, VFC interfaces will fail to come up and switch reload will be needed to recover."

Conditions:

Workaround:

Further Problem Description:

Last Modified:
28-JUN-2016
Known Affected Releases:
2.0(1a)
Known Fixed Releases: *
2.0(1a)
Alert Type:
Updated *
Bug Id:
CSCuz16424
Title:
Nexus 9504 Device is not generating CefcFRUInserted trap while OIR
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
While Performing OIR for Supervisor Card the Nexus 9k -9504 device after performing the Card In , device is not generating the CefcFRUInserted trap with OID (1.3.6.1.4.1.9.9.117.2.0.3) .

Conditions:
While performing Card In OIR for Supervisor card of Nexus 9504 .

Workaround:
NA

Further Problem Description:

Last Modified:
28-JUN-2016
Known Affected Releases:
7.0(3)I2(2), 7.0(3)I2(2a)
Known Fixed Releases: *
7.0(3)I4(1.72), 7.0(3)I4(2)
Alert Type:
New
Bug Id:
CSCva27106
Title:
Port-channel consistency failure on nexus 9500
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Port-channel consistency failed due to SDK resource failure. This bug is filed to enhance the logging to find the reason for the resource failure.

SWITCH# sh consistency-checker membership port-channels interface port-channel 217
Checks: Trunk group and trunk membership table.
Consistency Check: FAILED

Found inconsistencies for port-channel217:
Module:16, Unit:1
['Ethernet16/26']
Module:14, Unit:0
['Ethernet16/26']
Module:26, Unit:1


Found hardware missing inconsistencies for:port-channel217
Module:8, Unit:0, Size:1
['Ethernet16/26']

Module:8, Unit:1, Size:1
['Ethernet16/26']


show hardware internal bcm-usd event-history api

21278) Event:E_STRING, length:97, at 625398 usecs after Wed Apr 20 14:38:26 2016
API: bcm_trunk_member_add(0,714,...) -> -14 No resources for operation
uuid:324 took 1241 usec

21279) Event:E_STRING, length:96, at 624820 usecs after Wed Apr 20 14:38:26 2016
API: bcm_trunk_member_add(1,202,...) -> -14 No resources for operation
uuid:324 took 662 usec

21280) Event:E_STRING, length:96, at 624801 usecs after Wed Apr 20 14:38:26 2016
API: bcm_trunk_member_add(0,202,...) -> -14 No resources for operation
uuid:324 took 644 usec

Conditions:
None

Workaround:
Reload the affected switch/module

Further Problem Description:

Last Modified:
29-JUN-2016
Known Affected Releases:
6.1(2)I3(5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva01339
Title:
N9k Port-channel MTU not set correctly if configured on members first
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If MTU is configured on the member interfaces of the port-channel, and then the port-channel is created, then the port-channel is not assigned the correct MTU value.

Conditions:
.

Workaround:
reapply MTU

Further Problem Description:

Last Modified:
30-JUN-2016
Known Affected Releases:
7.0(3)I1(3)
Known Fixed Releases: *
7.0(3)I4(1.43), 7.0(3)I4(2), 7.0(3)IPM4(0), 7.0(3)IPM4(0.38)
Alert Type:
New
Bug Id:
CSCva28796
Title:
IGMPDom not present on 2nd L3-out in GUI created tenant
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
igmpIf is missing on leaf when multicast is enabled on a L3Out

Conditions:
Very rare and should only occur when posting multicast related configuration. Should not occur when using CLI or GUI to configure multicast.

Workaround:
#1
Create an identical IGMP policy as the policy presently use by the affected L3Out interface group and update the L3Out interface group to use this new policy. If no policy is use by the affected L3Out interface group then create a new default IGMP policy and update the L3Out interface group to use this new policy.

#2
Change a configuration parameter (e.g. 'Group Timeout') in the IGMP policy associated with the problematic L3Out interface group. This should trigger the creation of the missing igmpIf on the leaf. Restore the configuration parameter.

Further Problem Description:

Last Modified:
30-JUN-2016
Known Affected Releases:
2.0(1k)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva29027
Title:
N9K: Power supply shows as Shutdown even if the switch is operational
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Power supply shows as shutdown and switch is operational

NX9372A# Show environment
Power Supply:
Voltage: 12 Volts
Power Actual Actual Total
Supply Model Output Input Capacity Status
(Watts ) (Watts ) (Watts )
------- ------------------- ---------- ---------- ---------- --------------
1 UCS-PSU-6332-DC 0 W 0 W 0 W Shutdown
2 UCS-PSU-6332-DC 0 W 0 W 0 W Shutdown

The below syslog is also seen
2016 Jun 8 20:18:06 NX9372A %PLATFORM-2-PS_FAIL: Power supply 1 failed or shut down (Serial number xxxxxxxxx)

Conditions:
None

Workaround:
None

Further Problem Description:
The is purely cosmetic

Last Modified:
30-JUN-2016
Known Affected Releases:
7.0(3)I2(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva22795
Title:
l1RsFcIfPolCons not cleared when fcIfPol is removed
Status:
Fixed
Severity:
3 Moderate
Description:

This happens because the l1RsFcIfPolConsMo is not updated to the newly created policy.

Symptom:
The port mode on the l2VfcIf does not reflect the portMode set by the recreated fcIfPolMo

Conditions:
l2VfcIf is already deployed with fcIfPolMo confgured.
fcIfPol is then deleted and re-added

Workaround:
1. delete the infraAccPortGrp and recreate it
2. create another fcIfPol and toggle it with the already created and attached one

Further Problem Description:

Last Modified:
30-JUN-2016
Known Affected Releases:
2.0(1d)
Known Fixed Releases: *
2.0(1.33a), 2.0(1.35)
Alert Type:
Updated *
Bug Id:
CSCva28421
Title:
Stale endpoint after changing VRF from egress to ingress enforcement
Status:
Open
Severity:
3 Moderate
Description: *

Symptom:
Stale endpoint on a border leaf after changing the VRF from egress policy enforcement to ingress policy enforcement

Conditions:
- A border leaf (BL) learns a remote endpoint (EP) while running in egress policy enforcement mode.
- the VRF is changed to ingress policy enforcement mode
- the EP learned on the BL moves to a new leaf.

The BL maintains endpoint database continues to point to the old leaf location creating a 'stale EP'. Traffic received on the border leaf to the stale EP is dropped.

Workaround:
After changing from egress to ingress policy enforcement, manually clear any stale endpoints in the fabric. Alternatively, a window can be scheduled to manually clear all endpoints in the VRF on each border at the time the VRF policy enforcement direction is changed.

On the APIC, endpoints can be cleared on a per-VLAN/BD basis or on a per-VRF basis:
fab-apic1# clear endpoints leaf tenant bridge-domain vlan
fab-apic1# clear endpoints leaf tenant vrf

Leaf CLI, clear an individual endpoint via MAC lookup or IP lookup:
fab2-leaf101# clear system internal epm endpoint key vrf vlan mac
fab2-leaf101# vsh -c 'clear system internal epm endpoint key vrf ip '

Note clearing multiple endpoints may cause a traffic impact until the endpoints are relearned in the fabric.

Further Problem Description:
In egress policy enforcement, a border leaf will learn all endpoints on that are sending traffic out the corresponding L3Out (allowing it to apply policy for traffic received on the L3Out). When changing the VRF to ingress policy enforcement, the previous remote learns on the border leaf are maintained.

Traffic egressing the L3out are marked with DL (don't learn) bit. This bit updates the hit-bit in hardware preventing the border leaf from timing out the entry. If the remote learn moves to a different leaf, all traffic continues to be sent with DL bit preventing the move from generating a new learn but also updating hardware hit bit. As a result, the border leaf maintains the old incorrect stale endpoint.

Last Modified:
30-JUN-2016
Known Affected Releases:
11.2(3h)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva24993
Title:
L3-Mcast: Need to wait for PIM routes to expire between config trigger
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Even though the switch has IGMP membership or fabric interest for particular groups, the traffic is not flowing. MRIB does not have the these interfaces in outgoing interface list for those groups.

Conditions:
This problem will happen when on a particular vrf PIM is disabled and enabled before the control planes states in PIM and MRIB are removed.

Workaround:
Once VRF is PIM disabled, make sure to wait for at least 5 minutes before re-configuring PIM on that vrf. This delay will allow the entries to expire or are removed on the box.

Re-configure PIM on vrf only when all entries have been removed from PIM and MRIB.

Further Problem Description:












Last Modified:
01-JUL-2016
Known Affected Releases:
12.0(1i)
Known Fixed Releases: *
12.0(1.9)
Alert Type:
Updated *
Bug Id:
CSCut21286
Title:
port-in CSCup66113 to N9k insuff perm to conf login user in enable mode
Status:
Open
Severity: *
3 Moderate
Description:

Symptom:
can't make user account of network admin when they are in enable mode

Conditions:
Attempt to configure via CLI in enable mode a user with network-admin role after authenticating with a priv15 user.

Workaround:
Don't use enable mode to make network admin user role

Further Problem Description:

Last Modified:
01-JUL-2016
Known Affected Releases:
6.1(2)I3(3a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva31194
Title:
Nexus 9k Device not sending ospfNbrStateChange trap related OId
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
While performing OSPF interface down , device is not sending 1.3.6.1.2.1.14.16.2.2.2 OID related to ospfNbrStateChange trap.

Conditions:
While performing OSPF interface down

Workaround:

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)I2(2), 7.0(3)I2(2a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva29084
Title:
Fabric recovery is not happening even after bootstrap.xml is processed
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Pod2 spine does not join and get configuration changes after doing stateful reboot of spine

Conditions:
In case change in policy allowing connectivity between pods sometimes pod may not.converge and may require clean reboot of spine to reestablish connectivity. In case of multipod second pod policies are downloaded when spine is clean reloaded via DHCP. In case of issues which breaks connectivity in between pods stateful reload of spine may not recover connectivity.

Workaround:
Clean reboot of one the spine connecting to ipn network

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
2.0(1k)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva15774
Title:
Non-breakout ports are missing in ciscoL2L3IfConfigMIB
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
When eth1/1 is configured as breakout port, the non-breakout interfaces will not be populated in cL2L3IfTable.

Conditions:
When eth1/1 is configured as breakout ports

Workaround:
Avoid enabling breakout on eth1/1 or use CLI "show inter status" to get the same info.

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)I4(1.42)
Known Fixed Releases:
7.0(3)I4(1.60), 7.0(3)I4(2), 7.0(3)IM3(2.67), 7.0(3)IM3(3)
Alert Type:
New
Bug Id:
CSCva28658
Title:
scale1: BGP session is stuck in CLOSING as peer structure being locked
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
BGP session is stuck in "CLOSING" state and doesn't reset back to "IDLE" state.

This can potentially cause the tenant VRF deletion to fail.

Conditions:

Workaround:
Possible workaround/recovery:

- Reload of the specific node (leaf/spine) is required.

Caveat:

Reloading the node can possibly cause BGP sessions to flap multiple times (especially in a scale setup with large number of BGP peers).

Further Problem Description:
In the example below, BGP peer 10.0.24.82 is stuck in closing (C) state.

scale2-spine6# show bgp sessions vrf overlay-1

State: I-Idle, A-Active, O-Open, E-Established, C-Closing, S-Shutdown

Neighbor ASN Flaps LastUpDn|LastRead|LastWrit St Port(L/R) Notif(S/R)
10.0.24.82 100 1 11:49:47|never |never C 0/0 1/0

>>> Peer is stuck in "CLOSING" and doesn't reset to "IDLE" state.

Last Modified:
02-JUL-2016
Known Affected Releases:
12.0(1i)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCux72712
Title:
smon-mib: snmpwalk with v1, Process did not respond within the expected
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When issuing snmpwalk with v1 against SMON-MIB (64 bits counters), slow response would happen.
The slowness could depend on the # of vlans configured on the setup.

Conditions:
issuing snmpwalk with SNMP v1 requests.

Workaround:
issuing snmpwalk with SNMP v2c requests

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)I3(0.229)
Known Fixed Releases:
7.0(3)I2(2.121), 7.0(3)I2(3), 7.0(3)I3(0.236), 7.0(3)I3(0.237), 7.0(3)I3(1)
Alert Type:
New
Bug Id:
CSCva32528
Title:
Chamonix - adj mgr core after power reset
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
After adj mgr core power cycle causing addition traffic loss

Conditions:
Traffic loss, impacts convergence time with adj manager core

Workaround:
none

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)I4(1.71)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva32564
Title:
Chamonix - tahusd core after power reset
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
tahusd core after power reset

Conditions:
continuous reload, system not stable

Workaround:
use "system no hap-reset" to recover

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)I4(1.62)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva32534
Title:
fabricSetupP once added, should not allowed to be deleted
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
After create delete of fabricSetupP policy results in inconsistent state

Conditions:
After create/delete of fabricSetupP policy for multipod

Workaround:
do not create /delete policies which includes tep pool configuration for pods. Nodes can be decommissioned and wiped to remove pods.

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
2.0(1l)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuz80416
Title:
Preprovision mode with AVS VMM domain lead to fault F607861
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Fault F607861 is raised with description:
"[FSM:FAILED]: Send Endpoint Profile for pre-provision in AEP for domain (TASK:ifc:policymgr:VmmRsAEPSendPreProv)"

Conditions:
The problem occurs when resolution immediacy of "pre-provision" type is used for EPGs in VMM domains of AVS type

Workaround:
The use of pre-provision with AVS VMM domains is not supported. This issue has no workaround

Further Problem Description:
The current fault is not clear. A new fault will be defined to notify of this unsupported configuration in a more clear way.

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(2h)
Known Fixed Releases: *
2.0(0.357a), 2.0(0.360a), 2.0(0.364a), 2.0(0.366a), 2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuw86747
Title:
N9K: downgrade 7.0 to 6.1 add un-deletable acl for copp in sh run all
Status:
Terminated
Severity:
4 Minor
Description: *

Symptom:
On Nexus9000 , downgrading from NXOS7.0 to NXOS6.1 cause addition of un-deletable acl for copp in sh run all.

following copp acl are added

ip access-list copp-system-p-acl-ptp
10 permit udp any 224.0.1.129/32 eq 319
20 permit udp any 224.0.1.129/32 eq 320
ipv6 access-list copp-system-p-acl-vrrp6
10 permit ipv6 any ff02::12/128

these are added to class-map for copp too.
class-map type control-plane match-any copp-system-p-class-redirect
match access-group name copp-system-p-acl-ptp
class-map type control-plane match-any copp-system-p-class-important
match access-group name copp-system-p-acl-vrrp6

Conditions:
Nexus9000
downgrade from 7.0(3)I1(1a) to 6.1(2)I3(3a)

Workaround:
- enable the copp profile again
- write erase and reboot after downgrade


Further Problem Description:
copp configuration is not changed during downgrade and when restoring in lower version, the new added ACLs in higher version is there.
And in the lower version , this new added ACLs are not there , so no way to delete.
This is expected. To recover from this , do one of above workaround.

Last Modified:
02-JUL-2016
Known Affected Releases:
6.1(2)I3(3a), 7.0(3)I1(1a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva28754
Title:
Fex Profile Table sort issue
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
In ACI GUI Fabric->Access Policies->Profiles- >fex profile -> Interface selectors for fex.
There is an option to sort but it is not working correctly.
GUI is showing unexpected behavior and does not match the sorting function as in other portions of the GUI.

Conditions:
When creating interface selectors under fex profile in 1.2(3c)
Software Configuration

Workaround:

Further Problem Description:

Last Modified:
30-JUN-2016
Known Affected Releases:
1.2(3c)
Known Fixed Releases:
2.1(0.38)
Alert Type:
Updated *
Bug Id:
CSCva18590
Title:
EPLD upgrade script throws error on N9300 series
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
The EPLD upgrade script (/bin/check-fpga.sh FpGaDoWnGrAdE) does not detect whether it is a N9300 or N9500 series switch. The script will attempt to upgrade all modules which throws an error on the N9300 series switch. The upgrade will complete successfully after a 10 minute timeout and error message.

Conditions:
After running the command "/bin/check-fpga.sh FpGaDoWnGrAdE" on a N9300 series switch, the upgrade script will hang for ten minutes and then throw the following error message:

"
Could not perform switchover.
VDC config has not been synced on Standby Supervisor.
A manual switchover is required to complete the upgrade of the Active Supervisor.

Unable to communicate with the EPLD Process
Module Type Upgrade-Result
------ ---- --------------
1 SUP Success


Reseting Active SUP (Module 1) FPGAs. Please wait...

EPLD Upgrade Completed.
"

The upgrade will complete successfully.

Workaround:
Perform the upgrade manually (requires TAC assistance).

Further Problem Description:

Last Modified:
29-JUN-2016
Known Affected Releases:
11.2(1k)
Known Fixed Releases: *
12.0(1.8)
Alert Type:
Updated *
Bug Id:
CSCuz94684
Title:
APICs GUI responses very slowly.
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Sluggish APIC GUI on specific tab.
1. When customer open the tab for /class/infraAccGrp, the APIC responsed very slow and even hung. Customer configured 1700 interfaces so there're 1700 policy-group.
2. On browser we get error of "A script on this page may be busy, or i may have stoopped responding. .....?
3. On other tab configured less items, the problem does not exist.

Conditions:
Customer configured 1700 interfaces so there're 1700 policy-group.

Workaround:
Reduce the number of policy-group.

Further Problem Description:
N/A

Last Modified:
20-JUN-2016
Known Affected Releases:
1.3(1h)
Known Fixed Releases: *
2.0(0.360a), 2.0(0.364a), 2.0(0.366a), 2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCva00084
Title:
EP Tracker / Visibility & Troubleshooting displays incorrect IPs
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
User searches for an IP address in the EP Tracker or Visibility & Troubleshooting tool and sees multiple instances of the IP address that are not expected.

Conditions:
There is a "shorter" IP address (e.g. x.x.x.2) and at least one "longer" IP address (e.g. x.x.x.20).

Workaround:
None.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(3c)
Known Fixed Releases: *
2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuz88101
Title:
Not-connected link triggers link down trap upon reboot
Status:
Fixed
Severity:
4 Minor
Description: *

Symptom:
Link down fault raised on not-connected links.
Traps are sent on reboot.

Conditions:

Workaround:
Ignore the fault.
Will be fixed in future release.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.1(3f)
Known Fixed Releases: *
2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuz88083
Title:
invalid fault for LACP hot standby link
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
When a leaf port goes into LACP Hot-standby state, a fault will be raised:
F0601 - fltPcAggrMbrIfPortHotStandby

Conditions:
When number of member link exceed LACP max link limit, some interfaces will be placed into hotstandby state.

Workaround:
Can be igored.
This fault will be categorized as event in future release.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.1(3f)
Known Fixed Releases: *
2.0(0.364a), 2.0(0.366a), 2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCux84433
Title:
Missing log directory in var/log/dme
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
No 'log' directory is found in /var/log/dme directory.

Conditions:
This issue occurs when the switch default authentication is set to a non-local value such as tacacs.

Workaround:
View current logs in /var/sysmgr/tmp_logs. The 'oldlog' directory in /var/log/dme will still contain older logs.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(1h)
Known Fixed Releases: *
2.0(0.366a), 2.0(0.370a), 2.0(0.372), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuz67044
Title:
Doc: TEP Subnet line is misleading as defined
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Customer reads the following upgrade/downrade doc:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/apic_upgrade_downgrade/b_APIC_Software_Upgrade_Downgrade_Guide/b_APIC_Software_Upgrade_Downgrade_Guide_chapter_010.html

Conditions:
Customer sees the following:
There is a line that is repeated a few times:
The TEP subnet size must be /22 or lower.

which has potential to be interpreted incorrectly

Workaround:
The proposed update is to instead have it say the following:
"The TEP subnet mask should be in the range of /8 to /22. The recommended minimum mask is /19."

Further Problem Description:

Last Modified:
17-JUN-2016
Known Affected Releases:
1.3(1g)
Known Fixed Releases: *
1.3(1g), 1.3(2f)
Alert Type:
Updated *
Bug Id:
CSCuz72867
Title:
APIC Online Help for OSPF Interface Policy is wrong
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
OSPF Interface Policy Online Help doc has incorrect URL

Conditions:
When viewing the online help documentation for OSPF Interface Policies in the APIC GUI

Workaround:
Navigate to https:///help/content/index.html#ospf_intfPolicyInfo.html instead.

Further Problem Description:

Last Modified:
13-JUN-2016
Known Affected Releases:
1.2(3c)
Known Fixed Releases: *
2.0(0.372)
Alert Type:
Updated *
Bug Id:
CSCuz98239
Title:
F1853 Fault raised on fvAEP after upgrade 1.1(2h) to 1.2(3e)
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Fault F1853 was raised after an upgrade from 1.1(2h) to 1.2(3e), stating that the fvAEP limit was exceeded. However the total number of fvAEP was much smaller than the scale.

external@CARDC-APIC11:~> moquery -d globalPolCounts-[uni/fabric]/count-fvAEPg
Total Objects shown: 1

# pol.GCount
oCl : fvAEPg
childAction :
curr : 4294967295
dn : globalPolCounts-[uni/fabric]/count-fvAEPg
exceeded : yes
lcOwn : local
limit : 15000
modTs : 2016-06-06T05:39:32.217-05:00
rn : count-fvAEPg
status :

Conditions:
Upgrade from 1.1(2h) to 1.2(3e)

Workaround:
Delete the object using TestAPI. Root access needed in order to interact with TestAPI.

Further Problem Description:

Last Modified:
20-JUN-2016
Known Affected Releases:
1.2(3c)
Known Fixed Releases: *
2.0(0.372), 2.0(0.374a), 2.0(0.378a), 2.0(0.381a), 2.0(0.384), 2.0(1.21)
Alert Type:
Updated *
Bug Id:
CSCuz47137
Title:
Primary encap should be optional is allow-micro-seg is not checked
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
APIC GUI requires to specify both Primary VLAN and Port Encap when Static VLAN Mode is selected in VMM Domain Association

Conditions:
Static VLAN Mode is selected in VMM Domain Association

Workaround:
Specify some valid value for Primary VLAN and then update/delete that value in Domains table.

Further Problem Description:

Last Modified:
06-JUN-2016
Known Affected Releases:
1.2(3c), 1.3(1g)
Known Fixed Releases: *
1.3(1.12a), 1.3(1.14a), 1.3(1.15a), 1.3(1.17), 1.3(1.6a), 1.3(1.7a), 1.3(1h), 2.0(0.300), 2.1(0.26)
Alert Type:
Updated *
Bug Id:
CSCux60574
Title:
OSPF Timers Show Sub-Second, Negative or Offset Timestamps
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
In the Leaf CLI, OSPF timers show as sub-second, negative or not matching system time.

Leaf# show ip ospf neighbors vrf all
OSPF Process ID default VRF L3Test2:L3Out2_VPC
Total number of neighbors: 3
Neighbor ID Pri State Up Time Address Interface
100.0.0.1 1 TWO-WAY/DROTHER 0.756030 10.0.0.1 Vlan22 <--- Sub-second Up Time
100.0.0.5 1 FULL/BDR 0.252539 10.0.0.4 Vlan22 <--- Sub-second Up Time
100.0.0.8 1 FULL/DR 0.163662 10.0.0.2 Vlan22 <--- Sub-second Up Time

Leaf# show ip route vrf L3:L3Test
IP Route Table for VRF "L3:L3Test"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]

*via 10.0.0.1, vlan22, [110/5], -07:32:50, ospf-default, intra <--- Negative timer
100.0.0.8/32, ubest/mbest: 1/0
*via 10.0.0.2, vlan22, [110/5], -07:32:50, ospf-default, intra <--- Negative timer

Leaf# date
Thu Dec 17 18:49:06 UTC 2015 <--- Not matching event-history entries
Leaf# show ip ospf event-history adj
Adjacency events for OSPF Process "ospf-default"
2015 Dec 17 10:49:02.695349 ospf default [5042]: TID 5153:ospfv2_send_nbr_ddesc:535:(L3:L3Test-base) mtu 9000, opts: 0x42, ddbits: 0, seq: 0x7270265c
2015 Dec 17 10:49:02.695339 ospf default [5042]: TID 5153:ospfv2_send_nbr_ddesc:531:(L3:L3Test-base) Sent DBD with 0 entries to 10.0.0.4 on Vlan22

Conditions:
Command output for OSPF on Leaf switches show timers that exhibit the same issues described in Symptoms.

Workaround:
Ensuring the Time Zone and Display Format in Fabric Pod Policies match. For example, use the following settings for PDT or PST time zones:

Time Zone: America/Los Angeles
Display Format: Local

This workaround has shown to resolve time stamp issues only in some cases.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
11.1(3f), 11.2(1i)
Known Fixed Releases: *
1.2(2e), 1.3(0.24a), 1.3(0.26), 1.3(0.32a), 1.3(0.34), 1.3(1g), 1.3(2f), 2.0(0.202a), 2.0(0.203)
Alert Type:
Updated *
Bug Id:
CSCuy71757
Title:
F1371 policy-deployment-failed for nonexistent node 4
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Fault F1371 policy-deployment-failed is raised for nonexistent node 4

Conditions:
This occurs anytime we modify one of the default policies here:
Fabric -> Fabric Policies -> Pod policies
Fabric -> Fabric Policies -> Global policies

Workaround:
none

Further Problem Description:
code : F1371
escr : Failed to deploy policy uni/fabric/dnsp-default to service 8 on node with id 4
lc : raised

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1m)
Known Fixed Releases: *
1.3(0.94), 1.3(1g), 1.3(2f), 2.0(0.243), 2.0(0.260), 2.0(1.6), 2.1(0.26)
Alert Type:
Updated *
Bug Id:
CSCuz95120
Title:
GUI BUG when creating Private Network
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
Unable to create VRF by going to Tenant > VRF > Create "private network" without seeing error message that it exists already under tenant common.

Conditions:
Occurs when creating a new VRF by itself instead of along with BD. Seems cosmetic.

Workaround:
Create a BD first and under Private Network section > Click "Create New VRF" and proceed to create VRF from there > Finish will create both BD and VRF simultaneously.

Further Problem Description:

Last Modified:
09-JUN-2016
Known Affected Releases:
1.1(4l)
Known Fixed Releases: *
2.0(0.370a)
Alert Type:
Updated *
Bug Id:
CSCva09448
Title:
ACI DOC: Transit Routing and Shared L3OUT is actually not supported yet
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
As of June 2016, Fundamentals guide has below statement which sounds like that transit routing with shared L3OUTs is not supported "only" when this particular condition is meet.

Cisco Application Centric Infrastructure Fundamentals
- Chapter: Networking and Management Connectivity
- WAN and Other External Networks
- Shared Layer 3 Out
A l3extInstP EPG behind vzAny and a Layer 3 Out EPG provider is not supported for shared services. Also, transit routing is not supported with a shared Layer 3 Out when a consumer l3extInstP EPG is behina vzAny and a Layer 3 Out EPG is a provider with a direct contract.

(http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/aci-fundamentals/b_ACI-Fundamentals/b_ACI-Fundamentals_chapter_010100.html#concept_A3828485EE594C37B2D5E5DA7765EC53)


However Transit Routing with shared L3OUTs (in other words across VRF) is not supported at all yet.

Conditions:
none

Workaround:
none

Further Problem Description:

Last Modified:
21-JUN-2016
Known Affected Releases:
1.2(3e)
Known Fixed Releases: *
2.0(1a)
Alert Type:
Updated *
Bug Id:
CSCuy65173
Title:
APIC GUI: i-help has no info about packet Drops filter
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
under Fabric-->Inventory --> History--> Events

There is an option of Packet drops filter. i-help has no mention of it.

Conditions:
na

Workaround:
na

Further Problem Description:

Last Modified:
02-JUN-2016
Known Affected Releases:
1.2(2h)
Known Fixed Releases: *
2.0(0.342)
Alert Type:
Updated *
Bug Id:
CSCur72541
Title:
N9K-M12PQ: Incrementing IntMacRx-Er Errors
Status:
Fixed
Severity:
5 Cosmetic
Description: *

Rcv-Err and IntMacRx-Er errors incrementing:

N9K# show interface counters errors | exclude "\ 0\ *0\ *0\ *0\ *0\ *0"| ex "\ 0\ *--\ *0\ *0\ *0"

--------------------------------------------------------------------------------
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
--------------------------------------------------------------------------------
Eth2/1 0 0 0 12118 0 0

--------------------------------------------------------------------------------
Port Single-Col Multi-Col Late-Col Exces-Col Carri-Sen Runts
--------------------------------------------------------------------------------

--------------------------------------------------------------------------------
Port Giants SQETest-Err Deferred-Tx IntMacTx-Er IntMacRx-Er Symbol-Err
--------------------------------------------------------------------------------
Eth2/1 0 -- 0 0 12118 0

Symptom:Rcv-Err and IntMacRx-Er errors incrementing:

N9K# show interface counters errors | exclude "\ 0\ *0\ *0\ *0\ *0\ *0"| ex "\ 0\ *--\ *0\ *0\ *0"

--------------------------------------------------------------------------------
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
--------------------------------------------------------------------------------
Eth2/1 0 0 0 12118 0 0

--------------------------------------------------------------------------------
Port Single-Col Multi-Col Late-Col Exces-Col Carri-Sen Runts
--------------------------------------------------------------------------------

--------------------------------------------------------------------------------
Port Giants SQETest-Err Deferred-Tx IntMacTx-Er IntMacRx-Er Symbol-Err
--------------------------------------------------------------------------------
Eth2/1 0 -- 0 0 12118 0

Conditions:N9K-M12PQ (Slot 2) in N9K-C9396
also seen on 40G interfaces on 9372PX switches.

Workaround:None.

More Info:This is a non-impacting cosmetic issue. It is due to the port receiving packets where the actual number of bytes in the payload are not equal to type length field.



Last Modified:
16-JUN-2016
Known Affected Releases:
6.1(2)I3(1)
Known Fixed Releases:
7.0(3)I1(0.148), 7.0(3)I1(1), 7.0(3)I1(1.8), 7.0(3)I1(2)
Alert Type:
Updated *
Bug Id:
CSCup70625
Title:
Stats export mouseover for export frequency mentions non-stream options
Status:
Fixed
Severity:
5 Cosmetic
Description:

Symptom:
The Stats export policies mouse over for export frequency displays configuration options that are not available.

Conditions:
This occurs in 1.0(1*) versions of APIC software.

Workaround:
None

Further Problem Description:
Other export frequencies were considered before the product was released and removed prior to release for various reasons. The mouse over/help was not updated to match the product functionality until after the product was released though.

Last Modified:
15-JUN-2016
Known Affected Releases:
1.0(0.367a)
Known Fixed Releases: *
1.0(1.294a)
Alert Type:
Updated *
Bug Id:
CSCuy14271
Title:
Add a filter for Application Profile EPGs under AP Topology
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Application Profile Topology will display all the EPGs that are linked via contract to the existing EPGs in the Application Profile.

Conditions:
EPGs under a single AP linked to other EPGs via contract

Workaround:
none

Further Problem Description:
none

Last Modified:
01-JUL-2016
Known Affected Releases: *
1.2(1k), 1.2(1m), 1.3(2f)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva06126
Title:
FHS StaleLifeTime attribute and Entity/Inst MO permission issue
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Config error

Conditions:

Workaround:

Further Problem Description:

Last Modified:
14-JUN-2016
Known Affected Releases:
2.2(0.39)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz96843
Title:
Use router-id for loopback needs to be allowed for all L3Outs w/o F1425
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Enhancement request to allow multiple L3Outs to use the same router-id and have all of them check the "use router-id as loopback" box without getting the F1425 fault.

Conditions:
version 1.3(1g)

Workaround:
Currently, only a single L3Out can have the "use router-id as loopback" checked even if multiple L3Outs are using the same router-id.

Further Problem Description:

Last Modified:
07-JUN-2016
Known Affected Releases:
1.3(1g)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy18060
Title:
Remove WAP portal dependency on Cloud Cruiser extensions
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
* In WAP Admin Portal navigate to ACI -> Networks or ACI -> Shared Services
* Result: No content is shown, not even the table header and no refresh button.

Conditions:
WAP Cloud Cruiser extensions not installed on the WAP Admin Portal server

Workaround:
Install WAP Cloud Cruiser extensions on the WAP Admin Portal server

Further Problem Description:
none

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1k)
Known Fixed Releases: *
1.3(0.28), 1.3(1g), 1.3(2f), 2.0(0.197a), 2.0(0.198a), 2.0(0.202a), 2.0(0.203)
Alert Type:
Updated *
Bug Id:
CSCuz71133
Title:
Lacrosse: Enable Per queue Per port Rx/Tx stats
Status:
Open
Severity: *
6 Enhancement
Description: *

Symptom:
Lacrosse: Enable Per queue Per port Rx/Tx stats

Conditions:
Show queue

Workaround:
n/a

Further Problem Description:

Last Modified:
24-JUN-2016
Known Affected Releases:
7.2(0)IMP(0.9)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCup94070
Title:
option to Export Device Package and have package part of config export
Status: *
Other
Severity: *
6 Enhancement
Description: *

Symptom:
After import of exported config, graph instances are not created and l4l7 packages are missing in the system

Conditions:
Config including l4l7 policies are exported from one system and imported to same or another system

Workaround:
Upload the package again after the config import

Further Problem Description:
When config is exported, the l4l7 device packages are not exported as part of config export.

Last Modified:
24-JUN-2016
Known Affected Releases:
1.0(0.422a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva02247
Title:
Periodically Remove Stale Files in /firmware/tmp on APIC
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
When attempting to upload a firmware files to an APIC, an error indicating the "repository [is] over 80% full" appears. Even deleting previously uploaded firmware files does not clear out enough space.

Conditions:
Firmware image uploads have previously failed, but repository space is still consumed.

Running "ls -lah /firmware/tmp/" on the affected APIC shows temporary files accumulating and not clearing out. Files are named in the following format:

firmware-iso-*

These directories are not cleared out and take up space in the APIC firmware repository.

Workaround:
Rebooting the affected APIC removes stale files from the /firmware/tmp/ directory.

Further Problem Description:

Last Modified:
10-JUN-2016
Known Affected Releases:
1.3(1g)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCva30176
Title:
Application Profile visual representation is inconsistent
Status:
Other
Severity:
6 Enhancement
Description: *

Symptom:
Visual representation of Application Profile shows EPGs and contracts from other Application profiles

Conditions:
Contracts are tied to an L3Out

Workaround:
None, cosmetic issue

Further Problem Description:

Last Modified:
01-JUL-2016
Known Affected Releases:
1.3(2f)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCva24984
Title:
N9k 10 second power fluctuation
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
After power outage of 10 seconds, even after power is supplied, the N9k does not boot and instead is stuck with power LED blinking green

Conditions:
Remove power for 10 seconds and plug it back

Workaround:
Unplug power until the LED stops blinking green and power it back on. The chassis will boot successfully.

Further Problem Description:

Last Modified:
28-JUN-2016
Known Affected Releases:
11.2(3c)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu45286
Title:
MSFT:D++ Provide SNMP MIB for Err-Disable State - CISCO-ERR-DISABLE-MIB
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
A user cannot poll the Interface Err-Disable state via SNMP (OID

Conditions:
This is only an issue when polling the data via SNMP

Workaround:
Use the CLI or XML to collect the data.

Further Problem Description:

Last Modified:
02-JUL-2016
Known Affected Releases:
7.0(3)
Known Fixed Releases: *
7.0(3)I4(1.64), 7.0(3)I4(1.7), 7.0(3)I4(1.8), 7.0(3)I4(1.86), 7.0(3)I4(2), 7.0(3)IED5(0), 7.0(3)IED5(0.101), 7.0(3)IED5(0.145), 7.0(3)IED5(0.98), 7.0(3)IPM4(0)
Alert Type:
Updated *
Bug Id:
CSCuz80389
Title:
Add vPC and PC Load Balancing field to Policy Groups
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
Either Fabric Wide, Per vPC domain, or as a Switch Policy Group, there is no method to change the LACP load balancing hashing.

Documented as MAC/MAC only, firewalls, and IP SAN replication benefits strongly from src IP dst IP L4 Port. Congo PBR will not satisfy the L2 Requirements of iSCSI vPC symmetric transparent firewall inspection via cluster.

Please unlock LACP hash adjustment. Preferred location would be under Fabric > Access Policies > Switch > Switch Policy Group.

Per multiple customer request to adjust LACP Hashing and no ability to do so.

Conditions:
Firewall Clusters, non-optimal load balancing

Workaround:
None known

Further Problem Description:

Last Modified:
27-JUN-2016
Known Affected Releases:
1.3(2a)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuq90291
Title:
Need filter for Even/Odd Nodes in APIC GUI for Firmware Upgrades
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
This is an enhancement that would allow a user to check a single box that would select all of the even or odd nodes at once rather than having to select them one at a time.

Conditions:
Normal Use

Workaround:
None

Further Problem Description:

Last Modified:
17-JUN-2016
Known Affected Releases:
1.0(1h)
Known Fixed Releases:
1.0(3.34), 1.1(0.584), 1.1(1j)
Alert Type:
Updated *
Bug Id:
CSCuz80347
Title:
Enhancement Request: Add Clone function to Interface Policy Groups.
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
No Clone function exists for Interface Policy Groups.

Conditions:
I recommend that BU adds a right click ?> clone, and then it prompts you for a name.
It then creates an object with that name with the identical attributes of the original.

Workaround:
None

Further Problem Description:

Last Modified:
27-JUN-2016
Known Affected Releases:
1.3(2a)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz98469
Title:
ACI : Clean-up issue with BD subnet, route stuck in routing table
Status:
Other
Severity:
6 Enhancement
Description:

Symptom:
If you have an existing static route defined towards an L3out. and you configure the same subnet as a BD subnet.
and realize that the subnet was not to be configured and delete the BD subnet, the BD subnet route gets stuck in routing table.


order of operation :
it doesnot matter which one you configured first ( BD subnet or static route).
only the BD subnet that has this clean-up issue.

Conditions:
same subnet configured as Static route out to L3out and also now configured as BD subnet in same vrf.

Workaround:
Delete the static route and add it back in. this will clear the stale route.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(3c)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy16419
Title:
APIC CLI: Terminal length command missing to control output display
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
APIC CLI available in version 1.2 allows for additional NXOS-like CLI options. However, there is no way in the native output to control the length of the output similar to "terminal length" command in NXOS.

Conditions:
APIC CLI running version 1.2 and attempting to control the output length of show commands.

Workaround:
User can use the following:
- 'show | cat' to dump the output
- 'show | more -' to set the number of lines forwarded.

Further Problem Description:

Last Modified:
08-JUN-2016
Known Affected Releases:
1.2(1m)
Known Fixed Releases: *
1.2(1.208), 1.2(2g), 1.3(0.11a), 1.3(0.16), 1.3(1g), 1.3(2f), 2.0(0.191)
Alert Type:
Updated *
Bug Id:
CSCuz69394
Title:
Share service is not working for inband management on Spine
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Configure inter-vrf leaking between normal EPG and mgmt:inb. subnet is leaked properly on leaf in vrf mgmt:inb but not leafed to spine:

120-Spine1# show ip route vrf mgmt:inb
IP Route Table for VRF "mgmt:inb"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

10.2.2.201/32, ubest/mbest: 2/0, attached, direct
*via 10.2.2.201, lo7, [1/0], 01:46:20, local, local
*via 10.2.2.201, lo7, [1/0], 01:46:20, direct
120-Spine1# show ip route vrf mgmt:inb
IP Route Table for VRF "mgmt:inb"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

10.2.2.201/32, ubest/mbest: 2/0, attached, direct
*via 10.2.2.201, lo7, [1/0], 01:49:14, local, local
*via 10.2.2.201, lo7, [1/0], 01:49:14, direct


120-Leaf1# show ip route vrf mgmt:inb
IP Route Table for VRF "mgmt:inb"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%' in via output denotes VRF

10.2.2.0/24, ubest/mbest: 1/0, attached, direct, pervasive
*via 10.0.160.64%overlay-1, [1/0], 00:49:31, static
10.2.2.1/32, ubest/mbest: 1/0, attached, pervasive
*via 10.2.2.1, vlan18, [1/0], 00:49:31, local, local
10.2.2.3/32, ubest/mbest: 1/0, attached
*via 10.2.2.3, vlan18, [1/0], 01:48:20, local, local
192.168.15.0/24, ubest/mbest: 1/0, attached, direct, pervasive
*via 10.0.160.64%overlay-1, [1/0], 00:05:45, static

Conditions:
Share service is not working for inband management on Spine.
Configure share service between normal EPG and inband EPG on mgmt tenant, subnet on internal EPG is not leaked to vrf mgmt:inb on spine.

Workaround:
if you are about using share service, then there is no workaround.

Further Problem Description:

Last Modified:
01-JUL-2016
Known Affected Releases:
11.2(2g)
Known Fixed Releases: *
12.0(0.145), 12.0(0.150), 12.0(1.8), 12.0(1d), 12.1(0.8)

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论