Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -ASR 1000 Series Router-01-Jun-2015 17:10 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements for ASR 1000 Series Aggregation Services Routers

Title:
End-of-Sale and End-of-Life Announcement for the Cisco ASR 1000 Series 5- and 10-Gbps Embedded Services Processors, ASR 1000 Series Route Processor (RP1), ASR 1000 Series 10Gbps SPA Interface Processor, and ASR 1001 and 1002 Routers
Description:

Cisco announces the end-of-sale and end-of-life dates for the Cisco ASR 1000 Series 5- and 10-Gbps Embedded Services Processors, ASR 1000 Series Route Processor (RP1), ASR 1000 Series 10Gbps SPA Interface Processor, and ASR 1001 and 1002 Routers. The last day to order the affected product(s) is April 29, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.

Date:
20-MAY-2015

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1013 Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
29-MAY-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1004 Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
29-MAY-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1006 Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP2 WebEx Node

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp2-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP2 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
29-MAY-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1001-universal.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001-universalk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001-universalk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR1001 IOSXE UNIVERSAL - NO PAYLOAD ENCRYPT.

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001-universalk9_npe_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1001 IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION W/O LI

File Release Date:
29-MAY-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001 Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002-X Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1002x-universalk9_npe_noli.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1002-X IOSXE UNIVERSAL - NO PAYLOAD ENCRYPT. W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_noli.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1002-X IOSXE UNIVERSAL W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1002x-universalk9.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1002-X IOSXE - ENCRYPT. UNIVERSAL

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1002x-universal.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1002-X IOSXE UNIVERSAL

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1002x-universalk9_npe.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1002-X IOSXE UNIVERSAL - NO PAYLOAD ENCRYPT.

File Release Date:
29-MAY-2015
Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1000rp1-ipbasek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprise.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-sipspawmak9.03.13.03.S.154-3.S3-ext.pkg
File Description:

Cisco ASR 1000 Series RP1 WebEx Node

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservices.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O CRYPTO

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-adventerprisek9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED ENTERPRISE SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-advipservicesk9_noli.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 ADVANCED IP SERVICES W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1000rp1-ipbase.03.13.03.S.154-3.S3-ext.bin
File Description:

Cisco ASR 1000 Series RP1 IP BASE W/O CRYPTO

File Release Date:
29-MAY-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1002 Fixed Router
Software Type:
IOS XE Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Release Version:
3.13.3S
Alert Type:
New File
File Name:
asr1001x-universalk9.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO PAYLOAD ENCRYPTION

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001x-universal.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL - NO ENCRYPTION

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_npe_noli.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1001-X IOSXE UNIVERSAL - NO PAYLOAD ENCRYPT. W/O LI

File Release Date:
29-MAY-2015
Alert Type:
New File
File Name:
asr1001x-universalk9_noli.03.13.03.S.154-3.S3-ext.SPA.bin
File Description:

Cisco ASR1001-X IOS XE UNIVERSAL W/O LI

File Release Date:
29-MAY-2015

Software Updates for ASR 1000 Series Aggregation Services Routers

Product Name:
ASR 1001-X Router
Software Type:
IOS XE Software
Alert Type:
 
 
Previously Suggested:
 

Find additional information in Software Downloads index.

Known Bugs - ASR 1000 Series Aggregation Services Routers

Bug Id:
CSCut01314
Title:
Uncheckout commits after DT ES3 image
Description:

Symptom:
Engineering Special image "ES3" was given to DT for deployment from on DT ES branch.
Post ES3 image some DDTS were committed to DT ES branch which were found in local testing.
In production DT observed and raised the DDTS for "Parent shape rate set to default value instead of ANCP."
Since customer don't want any changes other than ES3 + above mentioned DDTS, other DDTS which were comitted post ES3 were unchecked out form DT ES branch, new ES4 image is generated and shared to DT.

Conditions:
Other not required DDTS were removed from DT ES branch

Workaround:
no work around

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-MAY-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases:
Bug Id:
CSCuq03915
Title:
Sessions are not getting Sync after manual failover : HA fails on ASR1K
Description:

Symptom:







Session lost on standby after RPFO with 28k session.
Conditions:





PPP session with qos policies
Workaround:



No workaround
More Info:












Status:
Fixed
Severity:
2 Severe
Last Modified:
03-MAY-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.3(3)S3.9, 15.3(3)S4
Bug Id:
CSCum22612
Title:
ASR1k IKE SA Stuck in MM_KEY_EXCH with RSA-SIG blocking new SAs with CAC
Description:

Symptom:
Since the ASR fails to send MM6 [being a responder] in the absence of a valid certificate, IKE SAs start leaking and hence get stuck in MM_KEY_EXCH state. Multiple MM_KEY_EXCH exist for a single Peer on the ASR, however the Peer does not retain any SAs for ASR in this case.
Along with CAC for in-negotiation IKE SAs, these stuck SAs block any new SAs or IKE rekeys even after renewing the certificates on the ASR.

Conditions:
This symptom is observed under the following conditions:
- ASR acting as IKEv1 termination point [sVTI for example] and is a responder.
- IKE authentication mode is RSA-SIG [Certificates].
- On the ASR, the ID-Certificate is either Expired or Not-present for a given sVTI tunnel
- The ASR also has a IKE in-negotiation CAC of a certain value.
Example:
crypto call admission limit ike in-negotiation-sa 30

Workaround:
Perform the following workarounds:
a) Manually delete stuck SAs by using:
clear crypto isakmp 12345
.. where 12345 is conn_id of a stuck SA.
Repeat this for each stuck SA

b) Temporarily increase CAC to accommodate new SA requests:
crypto call admission limit ike in-negotiation-sa 60

Further Problem Description:
Found and Tested in Cisco Release XE 3.7.4/Cisco IOS Release 15.2(4)S4.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(1)IC273.175, 15.2(1)IC273.8, 15.2(2)EA1, 15.2(2.0)EA, 15.2(2.2.75)ST, 15.2(2.6.68)EA, 15.2(2.7.9)EA, 15.2(2.8.1)EA1, 15.2(4)GC1, 15.2(4)GC2
Bug Id:
CSCut33087
Title:
ASR1K:fman_fp and ucode crash seen with Flexvpn-systest profile
Description:

Symptom:
ucode crash occurs with Flexvpn-systest profile

Conditions:
after configuring zone based firewall

Workaround:
Problem is not observed with fresh XE3.15 image

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCup38743
Title:
ASR: NAT FTP ALG breaks the payload translation
Description:

Symptom:
FTP signalling goes through fine across the ASR in the broken state, but the FTP Data session ( for both active/passive) does not get established .

Conditions:
ASR running any of the recent IOS XE code after 3.7.3 with CGN shows this problem after normal operations for about every 2-5 hours.

Workaround:
1. either clear all the NAT translations ( clear ip nat trans * )
2. Reload the ESP
3. Issue is not seen on the IOS versions before XE 3.7.3 ( including)

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
15.2(4)S3
Known Fixed Releases:
Bug Id:
CSCur42966
Title:
HW offload cfm up mep will timeout
Description:

Symptom:
HW offload cfm up mep can not work
after timeout it will down
ethernet cfm ieee
ethernet cfm global
ethernet cfm alarm notification all
ethernet cfm domain same_domain level 2
service ser_2 evc evc_2 vlan 2
continuity-check
continuity-check interval 10ms
offload sampling 1000
*Oct 28 11:00:04.328 CST: %E_CFM-3-REMOTE_MEP_DOWN: Remote MEP mpid 4001 evc evc_2 vlan 2 MA name ser_2 in domain same_domain changed state to down with event code TimeOut.
*Oct 28 11:00:04.333 CST: %E_CFM-6-REMOTE_MEP_UP: Continuity Check message is received from a remote MEP with mpid 4001 evc evc_2 vlan 2 MA name ser_2 domain same_domain interface status Up event code Returning

Conditions:
*Oct 28 11:00:04.328 CST: %E_CFM-3-REMOTE_MEP_DOWN: Remote MEP mpid 4001 evc evc_2 vlan 2 MA name ser_2 in domain same_domain changed state to down with event code TimeOut.
*Oct 28 11:00:04.333 CST: %E_CFM-6-REMOTE_MEP_UP: Continuity Check message is received from a remote MEP with mpid 4001 evc evc_2 vlan 2 MA name ser_2 domain same_domain interface status Up event code Returning

Workaround:
none

Further Problem Description:
Not exposed to customer as this is only possible with up mep over VPLS feature.

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(1.15)S, 15.5(1.9)T, 15.5(2)S
Bug Id:
CSCuq85115
Title:
ASR1K enable "ip cef accounting non-recursive" cause fman_rp crash
Description:

Symptom:
ASR1K may reload unexpectedly due to fman_rp crash

Conditions:
When "ip cef accounting non-recursive" was enabled

Workaround:
Disable "ip cef accounting non-recursive"

Further Problem Description:
Day 1 issue, exists in all releases. A imperfect internal logic will cause fman_rp database to generate un-used arrays while updating. And after a huge number of updates (which may take 10 days or even more, depend on your network stability), the number of un-used array will exceed hard coded limit hence causing the crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.2(2)S1
Known Fixed Releases:
15.3(3)S5, 15.4(1)S3, 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCuj39789
Title:
EDVT: normal cond: Error resolving active FRU: BINOS_FRU_RP
Description:

Symptom:

Conditions:
normal, intermittent, occurs in some (very rare) Cylon lc power-cycling.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.1(0.1)S, 15.2(2)S, 15.3(3)S, 15.3(3.3)S3, 15.4(2)S, 15.5(1)S, 15.5(2)S
Known Fixed Releases:
15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCun88636
Title:
Kingpin crashes on issuing "show plat hard slot 0 plim status int"
Description:

Symptom:
Kingpin crashes @ cmcc_2kp_cli_show_plim_status_cb

Conditions:
Kingpin crashes while issuing "show plat hard slot 0 plim status int"

Workaround:
-

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.4(2)S1, 15.4(3)S
Bug Id:
CSCur17225
Title:
Memory leak on ASR1k leads to a watchdog crash
Description:

Symptom:
Error messages pointing to a memory leak:
%PLATFORM-3-ELEMENT_CRITICAL: SIP0: smand: RP/0: Committed Memory value 128% exceeds critical level 100%
lead to a watchdog crash (in various functions - ARP, CDP)

Conditions:
ASR 1001 running 3.13.0S

Workaround:
Downgrade to 3.7.2S

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCur76019
Title:
Router reloads when deleting a VLAN MEP with CFM diag debug on
Description:

Symptom:
delete a subinterface crash when there is a down mep session
TAAS_1006_1#show ethernet cfm maintenance-points remote
--------------------------------------------------------------------------------
MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
--------------------------------------------------------------------------------
4001 same_domain 503d.e534.11bf Up Up
2 same_domain Gi0/1/3.2
- ser_1 BD-V 2 N/A
evc_1 0s
MPID: 8001 Domain: same_domain MA: ser_1

Total Remote MEPs: 1
TAAS_1006_1(config)#no interface gigabitEthernet 0/1/3.2

Conditions:
Exception to IOS Thread:
Frame pointer 0x46DA2328, PC = 0x17545238

UNIX-EXT-SIGNAL: Segmentation fault(11), Process = Virtual Exec
-Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa :10000000+7545238 :10000000+7545B50 :10000000+7C4220 :10000000+43D7E28 :10000000+43BCF20 :10000000+435B198 :10000000+42CECAC :10000000+298CBE0 :10000000+2989640 :10000000+684048C :10000000+68406EC :10000000+683DCA4 :10000000+6846598 :10000000+6836F68 :10000000+6D8504 :10000000+6DF3C0

Fastpath Thread backtrace:
-Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa c:638B000+DA078 c:638B000+DA058 iosd_unix:6539000+178FC prelib:FFD8000+31F4 pthread:5DBA000+5A4C

Auxiliary Thread backtrace:
-Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa pthread:5DBA000+B598 pthread:5DBA000+B578 c:638B000+EFB74 iosd_unix:6539000+25090 prelib:FFD8000+31F4 pthread:5DBA000+5A4C

PC = 0x17545238 LR = 0x17545B50 MSR = 0x0002D000
CTR = 0x17545AF4 XER = 0x00000000
R0 = 0x00000000 R1 = 0x46DA2328 R2 = 0x300A7C50 R3 = 0x00000000
R4 = 0x00000001 R5 = 0x00000100 R6 = 0x00000001 R7 = 0x00000000
R8 = 0x00000000 R9 = 0x18D30000 R10 = 0x00000009 R11 = 0x17545AF4
R12 = 0x42022422 R13 = 0x1AC851B0 R14 = 0x00000000 R15 = 0x00000000
R16 = 0x00000000 R17 = 0x1AC830F0 R18 = 0x00000000 R19 = 0x00000000
R20 = 0x1AC80000 R21 = 0x1AC80000 R22 = 0x00000001 R23 = 0x1A270000
R24 = 0x00000100 R25 = 0x00000000 R26 = 0x46DA24C8 R27 = 0x46DA23A0
R28 = 0x18D37A7C R29 = 0x18D37AD0 R30 = 0x00000000 R31 = 0x46DA23A0

Writing crashinfo to bootflash:crashinfo_RP_00_00_20141118-143235-CST

Workaround:
make session down then delete the subinterface

Further Problem Description:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.5(1.12)T, 15.5(1.18)S, 15.5(2)S
Bug Id:
CSCuq86513
Title:
ASR 1k: Crash in packet classification
Description:

Symptom:
ASR1k running IOS 15.4(2)S1 crashed.

Conditions:
NBAR configured

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
06-MAY-2015
Known Affected Releases:
15.4(2)S1.4
Known Fixed Releases:
15.4(2)S2, 15.4(3)S1, 15.5(1)S, 15.5(1)T, 15.5(1.4)T, 15.5(2)S, 15.5(2)T
Bug Id:
CSCuo85191
Title:
Satnby asr1k running CUBE application crashes at cc_free_feature_vsa
Description:

Symptom: Crash is observed on ASR1000.
Conditions: This symptom is observed when memory allocation fails.
Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.3(60.1)S
Known Fixed Releases:
15.3(3)M3.2, 15.3(3)M4, 15.3(3)S3.3, 15.3(3)S4, 15.4(2)S1.5, 15.4(2)S2, 15.4(2)T1.1, 15.4(2)T2, 15.4(3)M0.3, 15.4(3)M1
Bug Id:
CSCui88245
Title:
cpp_cp_svr crash @ cpp_bqs_srt_yoda_destroy_tree while adding Fair Queue
Description:

Symptom:
The CPP process on an ASR 1000 Series Aggregation Services Router could crash while adding fair-queue on the fly. This will result in a reboot of the active ESP within the chassis. In systems with integrated ESPs (such as the ASR 1002-X) this may result in a reload of the chassis.

Conditions:
This crash occurs due to a timing issue when QoS configuration involving fair-queue is modified. This can occur when the configuration is being actively modified by a user, but has also been observed when a suspended policy is applied to an interface after boot.

Workaround:
There is no workaround.

Further Problem Description:
This issue is most likely to be seen when adding fair-queue to an existing QoS policy.

However, it has also been observed on boot when a suspended policy is applied to an interface. In this case, messages similar to the following may be observed shortly after system bring-up:

*Mar 27 11:59:07: %QOS-6-TUN_INSTALL: Installing suspended policy on Tunnel0.
*Mar 27 11:59:07: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#14ecdc91603b412e20039f6a927a9163 errmsg:7FE881875000+11E5 cpp_common_os:7FE884851000+D2C5 cpp_common_os:7FE884851000+D20E cpp_common_os:7FE884851000+1909E cpp_bqs_mgr_lib:7FE894E7F000+8FBCA cpp_bqs_mgr_lib:7FE894E7F000+8F448 cpp_bqs_mgr_lib:7FE894E7F000+717B6 cpp_bqs_mgr_lib:7FE894E7F000+7377E cpp_bqs_mgr_lib:7FE894E7F000+7F5EE cpp_bqs_mgr_lib:7FE894E7F000+71C8B cpp_common_os:7FE884851000+1681A cpp_clienti
*Mar 27 11:59:07: %IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0
*Mar 27 11:59:25: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:CPP Client process failed: cpp_cp det:HA class:CLIENT_SW sev:FATAL id:1 cppstate:RUNNING res:UNKNOWN flags:0x0 cdmflags:0x0



Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Bug Id:
CSCum18039
Title:
Incorrect traffic rates follow by pend-ack while deleteing QoS classes
Description:

Symptom:
Traffic not flowing on a queue following QoS reconfiguration or new interface creation. Also possible inability to change QoS configuration on any interface or create new interfaces/sessions following occurrence of this condition.

Conditions:
Queue was previously being over subscribed when it was deleted leaving it in a flowed off congested state such that it would never drain.

This issue affects ASR1K using ESP100 or ESP200, ASR1002X, and ASR1001X platforms only.

ASR1K using ESP5/10/20/40 and the ASR1001 and ASR1002 are unaffected by this issue/change.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCun10918
Title:
ASR1k: unable to bring up ppp session due to object pending in hqf cce
Description:

Symptom:
Issue
PPP subscribers cannot be terminated in ASR1K, due to object locked

Conditions:
EVSI Delete Errors: Out-of-Order 0, No dpidb 0, Underrun 0, VAI Recycle Timeouts 90215 =======> large number of VAI recycle timeouts
EVSI wrong dpidb type errors 0
EVSI Async Events: Total 92754, HW error 88050 =======> large number of HW errors as well

Workaround:
remove QOS of the ppp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
15.3(3)S2
Known Fixed Releases:
15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCus22393
Title:
ASR 1001- fman_fp_image crash in DMVPN environment
Description:

Symptom:
hw sw
asr1001-universalk9.03.11.00.S.154-1.S-std
ASR1001

Last reload reason: LocalSoft

IP0: cpp_ha: CPP:0.0 desc:CPP Client process failed: FMAN-FP det:HA class:CLIENT_SW sev:FATAL id:1 cppstate:RUNNING res:UNKNOWN flags:0x0 cdmflags:0x0
Dec 04 2014 02:30:08
SIP0: pvp.sh: A critical process fman_fp_image has failed (rc 134)
Dec 04 2014 02:29:03
SIP0: cpp_cp: cpp_ipsec_get_new_offset failed freelist get - Cannot allocate memory
Dec 04 2014 02:29:03
Card (fp) offline in slot F0
Dec 04 2014 02:29:03
SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#52aa951580f021601c28ee288b053647 errmsg:7F7E30CE4000+121D cpp_common_os:7F7E33D15000+E005 cpp_common_os:7F7E33D15000+DF04 cpp_common_os:7F7E33D15000+1A02E cpp_ipsec_svr_lib:7F7E44C8F000+24318 cpp_ipsec_svr_lib:7F7E44C8F000+2D37F cpp_ipsec_svr_lib:7F7E44C8F000+14118 cpp_common_os:7F7E33D15000+124B8 cpp_common_os:7F7E33D15000+11F15 cpp_common_os:7F7E33D15000+11D5B evlib:7F7E32CDE000+B8E7 evlib:7F7E32CDE000+E
Dec 04 2014 02:28:43
Packet dropped due to input queue full
Dec 04 2014 02:27:43
Packet dropped due to input queue full

You see these kind of issues on a asr platform running asr1001-universalk9.03.11.00.S.154-1.S, being particular this is seen in a DMVPN environment, with a process crash .

Conditions:
none

Workaround:
none right now

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
Bug Id:
CSCth57929
Title:
ASR:FP reloads w/ abort in chunk_prepare_data when incr nat bindmib stat
Description:


Conditions Under Which the Problem Occurs:
On ASR1k series routers having NAT configurations and SNMP.

Symptoms:
If we have lots of NAT related configurations and when we try to poll the
MIBS, we may see the following exceptions, when forwarding processor(FP) reloads:

CPPHA-3-FAULT:
F0: cpp_ha: CPP:0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0
det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING
res:UNKNOWN flags:0x7 cdmflags:0x0

%CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0 unresolved fault detected,
initiating crash dump.

Workaround:
1.Remove SNMP related configuration from the router, so that we don't poll the
router.
2.Another possible Workaround is changing ip nat translation timeout 60
to ip nat translation timeout 90.We can have some race conditions seen,
when bind timeout is same as session default timeout.










Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
12.2(33)XNE2
Known Fixed Releases:
15.0(1)S
Bug Id:
CSCun41391
Title:
FP crash on ASR1k after upgrade from 3.7.2S to 3.11.0S
Description:

Symptom:
FP crash after the IOS-XE upgrade to 3.11.0S

Conditions:
ASR1k router running 3.11.0S
Crypto map is configured on one of the interfaces.
NBAR is configured via ip nbar protocol discovery on one or more interfaces.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.2(2)E, 15.2(2)E1, 15.2(2)SA, 15.2(2)SA1, 15.2(2)SA2, 15.2(2)SNI, 15.2(2a)E1, 15.2(2b)E, 15.2(3)E, 15.2(4)GC
Bug Id:
CSCuq14700
Title:
TDL message buffers memory leak
Description:

Symptom:
memory leaking in mcp_dev - cpp_packet_drop_count_entry TDL message buffers.

Conditions:
normal

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.2(4)S4.9
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCus43594
Title:
rp crash when cleanup vpls scale configuration
Description:

RP crashed when doing config replace with a cleanup config.

Symptom:

Conditions:
Scale vpls bgp signaling config.

Workaround:
No.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.3(3)S5.1, 15.4(3)M2.1, 15.4(3)S2.1, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1)T1.1, 15.5(1.18)S0.9, 15.5(1.21)PI28d, 15.5(2)S
Bug Id:
CSCut06783
Title:
Fortitude NIM does not come up on ASR1001x
Description:

Symptom:
NIM not coming up on XE315 boot up

Conditions:
While booting the Nightster router with XE315 image, NIM not coming up.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.5(2)S
Bug Id:
CSCty83335
Title:
PPPoGEC: FP crashes when SPA reload on LNS
Description:

Symptom:

ESP reload on an ASR1000 Series Router

Conditions:

This has been seen with QoS configured on a Tunnel interface. Then the
interface flaps between two GigE interfaces.

Workaround:

None at this time.


Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.2(1)S2, 15.2(4)S
Known Fixed Releases:
15.2(4)S
Bug Id:
CSCuc65437
Title:
XE38: FP80: cpp_cp_svr crash @ cpp_qm_event_delete_check_parent
Description:

Symptom:
cpp_cp_svr crash seen
Conditions:
on removing service-policy from main int
Workaround:
n/a

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.3(1)S
Bug Id:
CSCun09640
Title:
cpp_cp and fman_fp crash when applying child policy to parent QoS
Description:

Symptom:
The following errors are seen when adding a child policy to a parent policy while configuring hierarchical QoS.

%CPPOSLIB-3-ERROR_NOTIFY: F0: cpp_cp: cpp_cp encountered an error
%CPPOSLIB-3-ERROR_NOTIFY: F0: fman_fp_image: fman-fp encountered an error
%PMAN-3-PROCHOLDDOWN: F0: pman.sh: The process cpp_ha_top_level_server has been helddown (rc 69)
%PMAN-3-PROCHOLDDOWN: F0: pman.sh: The process cpp_cp_svr has been helddown (rc 134)

This can result in a ESP (F Fabric) reload, causing a traffic outage

*Feb 13 07:39:05.829: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0

Conditions:
1. An interface with a service-policy applied.
2. Replacing the child policy on the parent hierarchical policy applied to the interface.

Workaround:
Remove the policy from the interface before making the changes to the child/parent policy then reapply the policy to the parent.

OR

If you issue the no command to remove the child policy from the parent and then query for pending configuration obects using the "show platform software object-manager fp active statistics" command to make sure there are no pending objects, then issue the service-policy to add the new child policy to the parent, you will not see the ESP crash.

Further Problem Description:
When replacing the child policy configured on a parent policy applied to an interface, the ESP may crash.

conf t
policy-map parent
class class-default
no service-policy child_A
service-policy child_B
end

Using a file, that replace a child policy, copied from the harddisk of the router to the running configuration will almost always cause the ESP to crash. If file is copied from tftp, it is less likely. If using CLI to replace the child policy, crash has not been experienced, but can not be completely ruled out. The issue is heavily based on timing and how fast the "no service-policy child_A" and "service-policy child_b" are processed together.

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S1, 15.4(1)S
Known Fixed Releases:
15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S
Bug Id:
CSCus32530
Title:
ASR1K ESP crash in internal L4R removal feature routine
Description:

Symptom:
This crash is caused by Layer 4 redirect service removal on an IP or PPP sessions and is triggered by an internal race condition.

Conditions:
The crash can be caused by a normal session deletion scenario but it is most easily reproduced when a subscriber template is deleted.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.3(3)S3.9
Known Fixed Releases:
15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCuu25883
Title:
%FMANRP_ESS-3-ERREVENT: No TC classifcation feature installed yet on...
Description:

Symptom:
Customer after IOS upgrade observes a lot of messages and complains from pppoe subscribers:
001473: May 5 07:14:34: %FMANRP_ESS-3-ERREVENT: No TC classifcation feature installed yet on the session can't install features until then, feature id (0x1AF7A83)
-Traceback= 1#2e6a96687e66331b863fd4fedb6e3c93 :10000000+7488AC :10000000+748C5C :10000000+5BDC7C0 :10000000+5BFBA04 :10000000+5BDAF20 :10000000+22232A4 :10000000+22353D4 :10000000+66B10CC :10000000+66B1194 :10000000+2235674 :10000000+2235C8C :10000000+221C608 :10000000+221D02C :10000000+22119A4 :10000000+2213714

Conditions:
configured ISG (pppoe) on ASR1000, version of IOS-XE is 3.10.5.S

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-MAY-2015
Known Affected Releases:
15.3(0.1)
Known Fixed Releases:
Bug Id:
CSCut43318
Title:
QoS on VA - TCAM leak on remote interface flap
Description:

Symptom:
Initial symptoms are hardware TCAM being exhaust, given sufficient time, all available memory is used and the router crashes.

Conditions:
Currently reproduced by flapping the remote end of the link attached to the device experience the TCAM leak.

Workaround:
None currently identified

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
15.4(3)S1.1
Known Fixed Releases:
Bug Id:
CSCuj25418
Title:
ASR1K: cpp_cp_svr crash@cpp_bqs_rm_yoda_unplace_and_destroy_srt_obj
Description:

Symptom:
The ESP-100 and ASR1K-2X crash when flat policies are applied on both the tunnel and the destination sub-interface. This issue is observed when QOS is applied first on the tunnel then on the sub-interface as follows:

policy-map tunnel-shaper
class class-default
shape aver per 20

policy-map sub-int-shaper
class class-default
shape ave per 90

Be sure the tunnel is active and pointing to the sub-interface with QoS applied before applying the sub-interface policy. See the attached repro-steps for details.

int tunnel1
service-policy out tunnel-shaper

int g2/3/0.100
service-policy out sub-int-shaper

Conditions:
When a sub-interface policy is applied after QoS is active on a tunnel, the tunnel is reparented from the current aggregation node to the sub-interface node. Since reparenting a leaf node requires adding a temporary node in the hierarchy to be able to move flow-control gracefully, the logic to detach the source leaf node from the temporary node was missing. As a result, the code generated a fatal error while attempting to free the temporary node before it is empty.

Workaround:
No known workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S
Known Fixed Releases:
15.2(4)S5, 15.3(3)S1, 15.4(1)S
Bug Id:
CSCur57035
Title:
ASR 1k crash on __be_bfd_fib_nh_change_cb
Description:

Symptom:
IOS crash

Conditions:
ASR running 15.3(1)S1 with bfd

Workaround:
none at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
15.3(1)S1
Known Fixed Releases:
15.3(3)S4.16, 15.3(3)S5, 15.4(3)M2.2, 15.4(3)S2.14, 15.5(1)S1.1, 15.5(1)SN1, 15.5(1.21)PI28a, 15.5(1.21)T, 15.5(2)S, 15.5(2.5)S
Bug Id:
CSCuo95313
Title:
Duplicate Lcookies in every Access-Request
Description:

Symptom: Duplicate cookies are observed in every access request.
Conditions: This symptom occurs when multilogon or logoff is performed on the same session.
Workaround: Tear down the session during the logoff event. Do not configure any delay on the account logoff event.



Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
15.3(3)S2.9
Known Fixed Releases:
15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.95)EZD, 15.0(14.1)TSR, 15.0(14.18)TTT, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1)IC273.113, 15.2(2)DB101.101, 15.2(2)DB101.112
Bug Id:
CSCus76560
Title:
ASR1k port-channel down when doing "redundancy force-switchover"
Description:

Symptom:
when doing "redundancy force-switchover", Port-channel brings down instantaneously.

Conditions:
If the port-channel has the config, "lacp rate fast"

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
15.2(4)S3.1
Known Fixed Releases:
Bug Id:
CSCut68598
Title:
ASR1k BFD randomly down at NAT configured interface
Description:

Symptom:
ASR1k BFD randomly down at NAT configured interface

Conditions:
At ASR1k's BFD interface, NAT is also configured

Workaround:
None at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
15.3(3)S2.1, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCus72566
Title:
ASR1K:Continuous RP crash on booting with no startup config.
Description:

Symptom:
RP1 images crashes during booting due to watchdog timeout with the following log:

IOSXE-WATCHDOG: Process = Wait on Autoinstall
-Traceback= 1#8ddf415bfca308ca6e02c2f05e77ec5d :10000000+3910624 :10000000+39112BC :10000000+39112BC :10000000+390CE30 :10000000+390D25C :10000000+2C8F5AC
Writing crashinfo to bootflash:crashinfo_RP_00_00_20150130-001106-UTCJan 30 00:12:18.427 R0/0: %PMAN-3-PROCHOLDDOWN: The process linux_iosd-image has been helddown (rc 142)
Jan 30 00:12:18.770 R0/0: %PMAN-0-PROCFAILCRIT: A critical process linux_iosd_image has failed (rc 142)
Jan 30 00:12:19.101 R0/0: %PMAN-3-RELOAD_RP_SB_NOT_READY: Reloading: Fault on Active RP bay but Standby RP bay is not ready
Jan 30 00:17:28.043 R0/0: %PMAN-0-PROCESS_NOTIFICATION: The process lifecycle notification component failed because remote core dump timeout
Jan 30 00:17:28.340 R0/0: %PMAN-5-EXITACTION: Process

Conditions:
This is observed on ASR RP1 running 15.4(3)S2 while booting the image after a 'erase startup'.

Workaround:
change the config register to 0x2142 and boot

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
Bug Id:
CSCun06260
Title:
XE3.13 Gatekeeper Hardening
Description:

Symptom:
High latency observed in customer network.

Conditions:
Under certain conditions, particularly under forced test conditions, it is possible to create scenarios where flow lock contention will be very high because of NAT gatekeeper failures. This happens when a large amount of traffic that does not need to be NAT'd is sent through an interface that has NAT configured. Most traffic hitting a NAT interface should be sent through NAT. If not, it will cause issues around 1Gb of traffic.

Workaround:
ASR1000(config)#ip nat service gatekeeper

After this, we can manually configure the size of the cache. The recommended starting point is 64K for now. Here is the command to configure the cache to be 64K:

ASR1000(config)#ip nat settings gatekeeper-size 64000

From here we can monitor the latency using the ping as before. We can monitor the actual entries in the cache using the following commands:

Show platform hardware qfp active feature nat datapath gatein activity
Show platform hardware qfp active feature nat datapath gateout activity

If needed we can clear the statistics by adding clear to the end of the two commands above to get a better idea of where we are at. Depending on what we are seeing with latency, we can fine tune the cache size later as well to try to reach optimum performance. Changing the cache size should not be service impacting. However, we recommend doing it during a maintenance window to be safe.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
13-MAY-2015
Known Affected Releases:
15.3(2)S, 15.3(3)S, 15.4(3)S, 15.5(2)S
Known Fixed Releases:
15.3(3)S3.6, 15.3(3)S4, 15.4(1)S2.18, 15.4(1)S3, 15.4(2)S2, 15.4(2.1.2)S, 15.4(2.15)S, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Bug Id:
CSCtu47871
Title:
ASR crashes without crashinfo , and last reload reason :watchdog
Description:

Symptom:
ASR crashes without crashinfo and last reload reason as watchdog.

Conditions:
Happened once and not been reproducible.

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
13-MAY-2015
Known Affected Releases:
15.1(2)S
Known Fixed Releases:
Bug Id:
CSCur31425
Title:
ASRNAT: PPTP ALG: Incorrect UNNAT of Peer-Call-ID in Outgoing-Call-Reply
Description:

Symptom:
ASR1k PAT may not function properly for PPTP. PPTP control connection is not established.

Conditions:
This was first found in XE3.10.3. The sequence of events which can lead to this failure:

- PPTP ALG is disabled;
- PPTP clients try to connect, but fail;
- PPTP ALG is enabled with "ip nat service pptp";
- PPTP clients are still unable to connect to PPTP server.

Workaround:
Use "clear ip nat translations *" after enabling PPTP NAT ALG.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
15.3(3)S3, 15.4(2)S, 15.4(3)SS
Known Fixed Releases:
Bug Id:
CSCup48518
Title:
FTP ALG create incomplete token in case of EPSV passive
Description:

Symptom:
FTP ALG create incomplete token in case of EPSV passive

Conditions:
nat+FW+FTP EPSV

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-MAY-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCut03205
Title:
SPA modules on ASR1002-X show "missing" under show platform output
Description:

Symptom:
When a new/compatible SPA module is inserted in a ASR1002-X chassis in certain cases it may exhibit one of the following symptoms:

1) SPA module shows "missing" under "show platform" output

Slot Type State Insert time (ago)
--------- ------------------- --------------------- -----------------
0 ASR1002-X ok 12w0d
0/0 6XGE-BUILT-IN ok 12w0d
0/1 SPA-8XCHT1/E1 missing 5w4d

2) Shows as "Out Of Service". Not to be confused for an existing module which might have failed and shows "out of service".

Chassis type: ASR1002-X

Slot Type State Insert time (ago)
--------- ------------------- --------------------- -----------------
0 ASR1002-X ok 12w0d
0/0 6XGE-BUILT-IN ok 12w0d
0/1 SPA-8XCHT1/E1 out of service 5w4d

3) Does not show at all under "show platform" or "show inventory" and no logs are generated when its inserted/removed. The following command will confirm if the router sees it and its state:
# show platform hardware slot 0 spa stat

Bay SPA Type State PST POK SOK PENB RST DENB HSS
-------------------------------------------------------------------------------
0 6XGE-BUILT-IN Online 0 1 1 1 1 0 1
1 Unknown Detection 0 0 0 0 0 1 0 <<<
2 Empty Detection 1 0 0 0 0 1 0
3 Empty Detection 1 0 0 0 0 1 0

Conditions:
Has been seen only when a SPA is installed for the first time in a ASR1002-X chassis.

Workaround:
The SPA in this case should come online after a reboot.

Further Problem Description:
The same SPA modules work without any issues on other ASR1K chassis.

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
Bug Id:
CSCut46706
Title:
ASR 1K - CPP uCode Crash Due to Abort on chunk_free_part2()
Description:

Symptom:
ASR 1K may experience a CPP uCode crash due to a corrupt chunk used by SRTP.

Conditions:
None known.

Workaround:
None known.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCut17865
Title:
ASR1K:13RU IOSd crash @PnP Agent Discovery after router reload
Description:

Symptom:
IOSd crash occurs at PnP Agent Discovery

Conditions:
after doing write erase and reload

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)S2.7, 15.5(1)S1.1, 15.5(1)SN1
Bug Id:
CSCug42528
Title:
ASR1000-ESP10 stops forwarding traffic, HAL_PKTMEM-2-OUT_OF_RESOURCES
Description:

Symptom:
ESP stops forwarding traffic with following error messages:

Mar 26 17:11:38.504 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:089 TS:00006032009661609351 %HAL_PKTMEM-2-OUT_OF_RESOURCES:
Mar 26 17:12:38.536 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:019 TS:00006032069706815681 %HAL_PKTMEM-2-OUT_OF_RESOURCES:
Mar 26 17:13:38.907 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:107 TS:00006032130075669937 %HAL_PKTMEM-2-OUT_OF_RESOURCES:
Mar 26 17:14:38.987 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:103 TS:00006032190158892360 %HAL_PKTMEM-2-OUT_OF_RESOURCES:
Mar 26 17:15:43.939 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:123 TS:00006032250425485709 %HAL_PKTMEM-2-OUT_OF_RESOURCES:

Service was recovered after the router reload, however monitoring shows a stable trend in PKTMEM utilization:

stj-core-r01#sh platform hardware qfp active bqs 0 packet-buffer utilization
Packet buffer memory utilization details:
Total: 128.00 MB
Used : 87.65 MB
Free : 41322.50 KB

Utilization: 68 % <--------- rising constantly

Threshold Values:
Out of Memory (OOM) : 127.96 MB, Status: False
Vital (> 98%) : 125.44 MB, Status: False
Out of Resource (OOR) : 108.80 MB, Status: False

Conditions:
unknown

Workaround:
unknown

More Info:

Status:
Terminated
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
3.6(0)
Known Fixed Releases:
Bug Id:
CSCua27722
Title:
Netflow timestamps drifts compared to NTP
Description:

Symptom:
Netflow TimeStamp may show time drift compared to NTP time.
This effect has been judged to be equal to about 50 seconds of
lost time per day.

Conditions:
Flexible or Traditional Netflow running on either an ESP40 based
Forwarding Processor or on any ASR1000 platform.

Workaround:
There is no workaround but when the time skew exceeds 10 minutes
it should self correct.

Further Problem Description:
A complete fix for this issue is addressed in a ROMMON upgrade. ROMMONs 15.2(4r)S1 and newer contain the fix Along with an upgrade of the XE version to a release that has the fix incorporated.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
15.1(3)S1, 15.4(3)S
Known Fixed Releases:
15.2(4r)S1, 15.3(1.3)S, 15.3(2)S, 15.3(2)S1, 15.3(2)S1b, 15.3(2)S1c, 15.3(2)S2, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a
Bug Id:
CSCut65374
Title:
PTP Leap Second: ASR1002-X incorporate leap second addition 6/30/15
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time. The leap second event can be propagated via Precision Time Protocol (PTP) if configured.

When the leap second update occurs and the device is configured to use PTP as a Boundary Clock (BC) then an incorrect Coordinated Universal Time (UTC) offset and PTP Leap Indicator could propagate incorrect time downstream. This could cause the PTP network time to be off as much as thirty five seconds.

Conditions:
The leap second update is propagated from the configured PTP Grandmaster clock.

A Cisco device running the PTP protocol would have the "feature ptp" command in the running configuration.

Workaround:
For this problem of the incorrect PTP UTC offset and Leap Second update flag for Cisco devices configured as a PTP boundary clock the following workaround can be used:

1. Increase the Time To Live (TTL) on the IPV4 multicast PTP frames from the PTP Grand Master clock from the default of one (1) to something higher than the number of multicast hops the PTP packets would have to traverse in the network to reach the Cisco device.

2. Disable PTP on the affected cisco devices configured as PTP boundary clocks.

3. If the now disabled Cisco devices configured as a PTP boundary clock supports Internet Group Management Protocol (IGMP) snooping then nothing additional is required.
If the device does not support IGMP snooping then static multicast Content Addressable Memory (CAM) entries would need to be created for the devices downstream which need the PTP frames from the PTP Grand Master clock.

If this workaround cannot be implemented than an upgrade is recommended.

Further Problem Description:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuc27517
Title:
ASR1001 : Permanent license disappear after IOS upgrade
Description:

Symptom:
Permanent license disappear after IOS upgrade or downgrade.

Conditions:
ASR1001
IOS XE upgrade/downgrade

Workaround:
This is not a workaround for devices that have already been upgraded, but when doing any future upgrades do a license save from 3.4 before upgrade and re-install in 3.6+

In 3.4, save all the licenses to a file to bootflash
1RU#license save

in 3.6+, install back all the licenses from the file
1RU#license install

=======================================================================
[use below workaround from 03.05.02 (15.2(1)S2) or older]

ASR1001#license save file bootflash:1RU_34_36_ENFORCE_LICENSE_MIGRATION

========================================================================

With this commit (just provide you another way to avoid this happening):
from 03.07.03 (15.2(4)S3) or later
from 03.09.00 (15.3(2)S) or later
from 03.08.02 (15.3(1)S2) or later

To avoid this happen, you have to create a file in bootflash called
"1RU_34_36_ENFORCE_LICENSE_MIGRATION" to
enforce migration of all the licenses before the upgrade process. The file will be removed automatically
after the license migration.
example:
1RU#license save file bootflash:1RU_34_36_ENFORCE_LICENSE_MIGRATION

For the routers which already hit the issue, customers can either try to reinstall the licenses or
downgrade to 34, create the file in bootflash and upgrade with 36 or later image with this fix again.
============================================================================

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.1(3)S, 15.2(2)S1
Known Fixed Releases:
Bug Id:
CSCub62988
Title:
ASR_crash due to in aom_set_link array full
Description:

Symptom:
Consecutive crashes are occurring with the ESP.

Conditions:
Issue may be seen on an ASR1K with flapping prefixes or churn.

Workaround:
There is no workaround

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
19-MAY-2015
Known Affected Releases:
15.2(2)S, 15.3(1)S
Known Fixed Releases:
15.1(3)S5, 15.2(4)S0.1, 15.2(4)S1, 15.3(1)S, 15.3(2)S
Bug Id:
CSCtz69986
Title:
ASR 1k memory leak
Description:

Symptoms: The Cisco ASR 1000 router's ESP free memory slowly decreases over
time (~ 7MB per day).

Conditions: This symptom occurs when WCCP is configured on interfaces.

Workaround: There is no workaround, unless the WCCP interface configuration is
removed.

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.2(2)S
Known Fixed Releases:
15.1(3)S4, 15.2(2)S1, 15.2(4)S
Bug Id:
CSCuu36411
Title:
ASR1k - 16k Policy-Map - active RP crash with 10k PM
Description:

Symptom:
active RP crash when more than 10 K Policy-maps are installed

Conditions:
scale testing: 15 K ppp sessions with 10 K policy-maps

Workaround:
n/a

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCuq77051
Title:
out of ids when configuring xconnect
Description:

Symptom:
Attempting to create or modify a xconnect context using the command
l2vpn xconnect context command may fail with the
error message:

%IDMGR-3-INVALID_ID: bad id in id_get (Out of IDs!) (id: 0x0)

Conditions:
This symptom has been observed after entering and exiting xconnect
context sub-modes many times (over 65000) over an extended period of
time.

Workaround:
There is no workaround. Once this error occurs, the router must be
reloaded.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.3(3)S4.2, 15.3(3)S5, 15.4(3)M2.1, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.6, 15.5(0.22)T, 15.5(1)S
Bug Id:
CSCut22976
Title:
ASR1k crash during monitor capture export FTP
Description:

Symptom:
Crash while exporting capture to FTP server

Conditions:
-Monitor packet capture enabled.
-Two simultaneous CLI sessions exporting capture to FTP

Workaround:
Don't use two sessions to export capture

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(2)S
Known Fixed Releases:
15.4(3)S2.9, 15.5(1)S1.1, 15.5(2)S0.2, 15.5(2.18)S
Bug Id:
CSCus46259
Title:
ASR1k (ISG Radius-Proxy): Memory Leak after excessive client roaming
Description:

Symptom:
The memory leak increase slowly during client roaming. Meaning a client roams on a hotspot from Subnet A to B and receives a new IP-Address and the ISG (ASR1k with radius-proxy feature enabled) creates a new session for the client and the old session is deleted due to accounting stop.

Conditions:
Radius-Proxy feature is enabled on the ISG and clients are using EAP-SIM

Workaround:
None. Booting the ASR1k if he used up 3.5GB of memory otherwise the box won't accept any furhter new sessions.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.3(3)S3, 15.4(3)S
Known Fixed Releases:
15.4(3)S2.3, 15.5(1)S1.3, 15.5(1.18)S0.12, 15.5(2)S, 15.5(2.12)S
Bug Id:
CSCuo36917
Title:
XE3.12 DPSS : CFT returns out of memory error under load
Description:

Symptom:
When handling greater than 50000 concurrent flows, the following error is seen by dpss_mp:

src/main/onep_dpss_engine.c:1482: cft_handle_packet() returned error [2]:out of memory

Packets associated with flows greater than 50000 do not have the flow action applied and are returned to the router without being sent to the onePK application.

Conditions:
- ASR 1000 platform running IOS XE
- More than 50000 uni-directional flows established

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S
Known Fixed Releases:
15.2(1)IC273.212, 15.2(3)E1, 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.5, 15.5(1.8)T, 15.5(2)S, 15.5(2.2)S, 7.0(3)I1(0.198)
Bug Id:
CSCut68925
Title:
Crash seen in QOS when policy-map without child or turbo svc is used
Description:

Symptom:
Issue happens when there is no child policy attached to the parent policy and the get_bw api is called.

Conditions:
same as symptoms

Workaround:
no work around

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.5(2.21)S0.4, 15.5(2.22)S, 16.1(0.237)
Bug Id:
CSCub04345
Title:
Memory leak after applying ip sla path-echo and path-jitter config
Description:

Symptoms: ASR-1002-X freezes after four hours with an scaled "path-jitter"
sla probe configuration.

Conditions: The symptom is observed with scaled "path-jitter" sla probe
configuration.

Workaround: There is no workaround.





Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.2(4)M, 15.3(1)S, 15.3(1)T
Known Fixed Releases:
12.2(58)EZ, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.0(5.0)SG1, 15.0(5.0.26)SG
Bug Id:
CSCur46656
Title:
3.10.4S-UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task
Description:

Symptom:
Crash on ASR with the log :
UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task

Conditions:
All the following conditions should be met :
Code
3.10.4S and beyond
3.11.3S and beyond
3.12.2S and beyond
3.13.1S and beyond
3.14.1S and beyond
3.7.6S and beyond
SPA Module : SPA-4XT3/E3
the following configs :
snmp-server enable traps ds3

Workaround:
Booting the device without the following configs :

snmp-server enable traps ds3

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.3(3)S4
Known Fixed Releases:
15.3(3)S4.11, 15.3(3)S5, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S1.4, 15.4(3)S2, 15.5(1)S0.6, 15.5(1)S1, 15.5(1)SN1, 15.5(1.15)S
Bug Id:
CSCut50228
Title:
ASR1001-X ping loss with peer ASR1k at fixed speed 10M
Description:

Symptom:
ASR1001-X ping loss with peer ASR1k at fixed speed 10M and half-duplex

This issue is specific to ASR1001-X and will not be seen in ASR1001

Conditions:
Only half-duplex could trigger this issue when ping big packet like 1280
and could be seen at the setup below:

1)ASR1001-X (0/0) <---> other ASR1k
2)ASR1002-X (0/0) <---> ASR1002-X (0/0)
3)ASR1002-X (0/0) <---> other ASR1k

For 1) this bug will fix it.
For 2) ASR1002-X 0/0 MAC does not support half-duplex in 10/100M
3) same as 2

Workaround:
None

Further Problem Description:
This issue is specific to ASR1001-X box with half-duplex in any other 1G ports of 0/0 "only"

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(2)S, 15.4(3)S2.1
Known Fixed Releases:
15.4(3)S2.16, 15.5(1)S1.1, 15.5(2)S0.8
Bug Id:
CSCuh62266
Title:
ASR1000-WATCHDOG: Process = SNMP ENGINE - Crash
Description:

Symptom: During normal operation, the Cisco ASR 1000 router may crash after repeated SNMP related watchdog errors.

Jun 15 2013 10:43:30.325: %SCHED-0-WATCHDOG: Scheduler running for a long time, more than the maximum configured (120) secs.
-Traceback= 1#6d024ee43b83b4f5539a076aa2e8d467 :10000000+56A5348 :10000000+20F7D54 :10000000+2513910 :10000000+20F807C :10000000+20EBE84 :10000000+2119BA8 :10000000+20EBE84 :10000000+2106C24 :10000000+20EBE84 :10000000+213C9E8 :10000000+213CC34 :10000000+225B748 :10000000+222941C :10000000+2214314 :10000000+224812C
-Traceback= 1#6d024ee43b83b4f5539a076aa2e8d467 :10000000+21416F0 :10000000+2513910 :10000000+20F807C :10000000+20EBE84 :10000000+2119BA8 :10000000+20EBE84 :10000000+2106C24 :10000000+20EBE84 :10000000+213C9E8 :10000000+213CC34 :10000000+225B748 :10000000+222941C :10000000+2214314 :10000000+224812C

Conditions: This symptom occurs while trying to obtain data from IP SLAs Path-Echo (rttMonStatsCollectTable) by SNMP polling operation.
Workaround: There is no workaround other than to disable SNMP configuration from the router.
More Info: This crash occurred in a customer environment and device with a particular version of the software (Cisco IOS Release 15.1(2)S2). No other similar issue has been identified so far.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.1(2)S2
Known Fixed Releases:
12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.1(1)ICA4.122, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EX0.2, 15.2(1)EY
Bug Id:
CSCut82336
Title:
ASR1002-X: Handle leap second in ToD IN
Description:

Symptom:
Time of day variation between master and source when ASR1002-X is used as ToD IN from 30 June 2015.

There will be one second difference between ASR1002-X master and slave, with the actual UTC time.

ASR1002X#show platform software ptpd tod
PTPd ToD information:

Time: 04/21/15 09:07:02

ASR1002X#

There will be one sec difference in above time and the actual UTC time.

Conditions:
ToD input is used to synchronize time-of-day.

When ASR1002-X acts as a MASTER in ordinary clock configuration, it takes 10M or 2M for frequency synchronization and ToD input from symmetricom for ToD synchronization.

This frequency and ToD is transmitted to other PTP Boundary clocks and slave clocks for synchronization.

Due to leap second, when UTC Offset increases by one second, MASTER PTP Clock does not handle that. So, there is a difference between actual UTC time and the time transmitted by PTP Master.

Config
-----------
ptp clock ordinary domain 0
tod R0 ntp
input 1pps R0
clock-port master master
transport ipv4 unicast interface Lo0 negotiation

Workaround:
None

Further Problem Description:
See CSCut65374 for details.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCua99409
Title:
Fman crash with IPsec/Double ACL
Description:

Symptom:

ESP reload with fman-fp error.

Conditions:

unconfig crypto map from interface, when there is double ACL in the crypto map

Workaround:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.2(4)S1, 15.3(1)S
Bug Id:
CSCut68825
Title:
PFRv3: unexpected byte loss reported due to TCP packet flow out of order
Description:

Symptom:
Current TCP BYTES LOSS metric's implementation assumes there is no tcp packet reordering. Thus in case of reordering the loss is reported.

Conditions:
TCP packets' reordering.

Workaround:
Prevent TCP packets' reordering.

Further Problem Description:
Given customer's network contains the equipment from different vendors preventing reordering is not always feasible. The metric should handle the out of order cases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(3)S2.3, 15.5(2)S0.1
Known Fixed Releases:
Bug Id:
CSCto47524
Title:
Memory Leak in IP SLAs Responder
Description:

Symptoms: A Cisco ASR 1002 router that is running Cisco IOS Release 15.1(1)S1
may have a processor pool memory leak in IP SLAs responder.

A show process memory sorted command may initially show
"MallocLite" growing. By disabling malloclite with the following:

config t
no memory lite
end

One may start to see process "IP SLAs Responder" growing. In at least one
specific case, the leak rate was 80mb per day.

Conditions: This symptom is observed on a Cisco ASR 1002 router.

Workaround: Disable IP SLA on affected router, if possible.



Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.1(1)S1
Known Fixed Releases:
12.2(58)EY2, 12.2(58)EZ, 12.2(58)SE2, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6
Bug Id:
CSCud13768
Title:
RP crashed while trying to verify UDP-JITTER in IP SLAs vrf-lite
Description:

Symptom: RP crashes while trying to verify UDP-JITTER in IP SLAs VRF-lite.
Conditions: This symptom occurs while trying to verify IP SLAs UDP Jitter operation.
Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.1(1)ICA4.122, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1)IC273.5
Bug Id:
CSCuh48666
Title:
Crash and core file on ASR1k after scaling dynamic eids in LISP
Description:

Symptom: Router crashes and reloads with dynamic EID scaling.
Conditions: The symptom is observed with dynamic EID scaling.
Workaround: There is no workaround.





Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.3(2)S1, 15.3(3)S
Known Fixed Releases:
15.1(1)ICA4.122, 15.2(1)IC273.13, 15.3(2)S2, 15.3(2)T1.3, 15.3(2)T2, 15.3(2)T3, 15.3(2)T4, 15.3(2.19)S0.10, 15.3(3)M0.2, 15.3(3)M1
Bug Id:
CSCsz74246
Title:
ASR1k: CPP crashes when sending the packet with Datagram size 10000.
Description:


Symptom:

CPP crashes while sending the packet with datagram size 10000.

Conditions

This symptom is observed on a Cisco ASR 1000 , while sending the packet with datagram size 10000.

Workaround


Further Problem Description

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33)XNE, 12.2XN, 12.2XNE
Known Fixed Releases:
12.2(33)XNC2, 12.2(33)XND
Bug Id:
CSCul35389
Title:
1RU: %SERVICES-3-NORESOLVE_ACTIVE causing occasional mcpcc-lc-ms crash
Description:

Symptom:
Following error messages re observed with SPA reload
==================================================================

Nov 26 2013 15:14:31.496 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP
Nov 27 2013 17:31:42.464 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP

The process mcpcc-lc-ms is held down and the SIP is reloaded.

Logs may also be flooded with these errors:

12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0
12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0

Conditions:
Error are observed when SPA is reloaded

Workaround:
NA

Further Problem Description:
The error messages are caused due to IOS trying to establish a connection with a non-existing process on ASR1001.As a result of these error messages, we are observing a SIP reload (mcpcc).The issue is observed in XE311 (ASR1001 and possibly ASR1002-X).

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
15.4(1)S, 15.4(2)S, 15.4(3)S, 16.0(0)
Known Fixed Releases:
15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.4(1)S0.3, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1.16)S, 15.4(2)S, 15.4(2)S1
Bug Id:
CSCsv67352
Title:
ASR1004 RP1 FP Restart
Description:








Symptom:

Software forced crash observed








Conditions:

This behavior is observed on a Cisco ASR1000 series router when specific functions are enabled, and when a processing traffic destined to the device are encapsulated.





Workaround:

None




Further Problem Description:












Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33)XNB1, 12.2XN
Known Fixed Releases:
12.2(33)XNB2b, 12.2(33)XNC, 3.9.0.6i.LC
Bug Id:
CSCsv87997
Title:
DHCPv6 relay: IOSd crash on Active RP
Description:

Symptom:
DHCPv6 relay process crash on Actice RP.

Conditions:
Unknown at this time.

Workaround:
Unknown at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33)XNB
Known Fixed Releases:
12.2(32.8.11)SR179, 12.2(32.8.6)REC177, 12.2(32.8.6)REE177, 12.2(33)CX, 12.2(33)IRF, 12.2(33)IRG, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16
Bug Id:
CSCsv95601
Title:
asr1k:6RU- mplsogre & qos:CPP crash on sending traffic
Description:

None
Symptom:

Cpp crashes continuously on sending traffic

Conditions:

Traffic sent during testing with specific variables may cause Cpp crash.

Workaround:

None.

Status:
Other
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2XN
Known Fixed Releases:
Bug Id:
CSCti08179
Title:
Cody SSH test with sh ssh command crashes RP
Description:

Please see CSCth45540 release note enclosure.

Status:
Other
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33)XNF2
Known Fixed Releases:
Bug Id:
CSCti48504
Title:
Memory leaks occur during SIP stress-testing
Description:

Multiple vulnerabilities exist in the Session Initiation Protocol
(SIP) implementation in Cisco IOS Software and Cisco IOS XE Software
that could allow an unauthenticated, remote attacker to cause a
reload of an affected device or trigger memory leaks that may result
in system instabilities. Affected devices would need to be configured
to process SIP messages for these vulnerabilities to be exploitable.

Cisco has released free software updates that address these
vulnerabilities. There are no workarounds for devices that must run
SIP; however, mitigations are available to limit exposure to the
vulnerabilities.

This advisory is posted at:

http://www.cisco.com/warp/public/707/cisco-sa-20110928-sip.shtml

.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33)XNF
Known Fixed Releases:
12.4(24)MDA13, 12.4(24)MDB15, 12.4(24)MDB16, 12.4(24)MDB17, 12.4(24)MDB18, 12.4(24)MDB19, 12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T6
Bug Id:
CSCtr56576
Title:
QFP crash w *GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_REGULAR_SW_ERR* du to QOS
Description:

Symptoms:
Cisco ASR 1000 may experience a QFP crash pointing to fragmentation/reassembly of packets if a QOS input or output service policy is configured

Conditions:
QOS(service-policy), a service-policy configured with "class-default" only, or only 1 of the following match filters: "match ip precedence", "match ip dscp", "match vlan", or "match "mpls exp"

Workaround:
Remove service-policy applied to interface, or add an additional "dummy" class-map to the policy-map using a different match filter type. Example, if the policy-map has configured only "match ip prec", then add an extra "dummy" class-map that will match on an unused vlan id, or an unused qos-group.


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2011-4007 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
15.1(2)S
Known Fixed Releases:
15.1(2)S2, 15.1(3)S1, 15.2(1)S
Bug Id:
CSCtt11558
Title:
Cisco IOS XE Software BDI Denial of Service Vulnerability
Description:


Summary
Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:

Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability
Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability
Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability
Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability
Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device.
Repeated exploitation could result in a sustained Denial of Service (DoS) condition.

Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-1167 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
21-MAY-2015
Known Affected Releases:
15.1(2)S1
Known Fixed Releases:
15.1(3)S2, 15.1(3)S3, 15.2(1)S1, 15.2(2)S
Bug Id:
CSCto57786
Title:
ASR1K: FP crash on GRE codenomicon traffic
Description:

Symptom:
FP crash observed on ASR1K when enabling tunnel checksum cli under the dmvpn tunnel
interface.

Conditions:
Tunnel checksum configuration under the dmvpn tunnel interface.

Workaround:
Removing the Tunnel checksum command avoids the fp crashes.

Further Problem Description:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
12.2(33.1), 15.1(2)S
Known Fixed Releases:
Bug Id:
CSCtz19248
Title:
Commit Engineer spacial to xe33_throttle_sr619833263 for SR619833263
Description:

Symptoms:
Potential SIP issues with 3.4.0S and eralier
Conditions:
SIP processing.
Workaround:
None
Additional Information:
Resolved starting with 3.4.1S

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
15.1(2)S
Known Fixed Releases:
Bug Id:
CSCur00747
Title:
ROMMON Upgrade rolled back
Description:

Symptom:
In some cases, even after the ROMMON upgrade the device will come up with the earlier ROMMON version after a reload.

Conditions:
This issue affects all ASR1K cards in the IOS-XE releases:

3.11.x all 3.11 releases,
3.12.x all 3.12 releases,
3.13.0x , 3.13.1.x,
3.14.0.x.

Steps to reproduce the problem:
- Upgrade ROMMON.
- Reload the device once. This time, it will load new ROMMON
- Reload the device again. This time, it might load old ROMMON in some cases.
- If it loads the old ROMMON, any subsequent reload will load only old ROMMON code.

Workaround:
The workaround is to upgrade the ROMMON using IOS-XE images which doesn't have this bug or which has this bug fixed in it.

Here are the list of images which can be used to upgrade ROMMON without hitting this issue:
- XE3.10 or previous IOS-XE release images
- XE3.13.2 or later versions of XE3.13
- XE3.14.1 or later versions of XE3.14 (Target: March 3, 2015)
- Any XE3.15 release image (Target: March 30, 2015)

Steps to upgrade ROMMON:
* Use one of the above recommended IOS image to do the ROMMON upgrade (ie. Reboot the router with this image prior to starting the ROMMON upgrade steps)
-- For ROMMON upgrade to line cards and ESP cards:
---> Follow the normal ROMMON upgrade process. Upgrade ROMMON one card at a time.
--->Reload the card to complete the upgrade process.
-- For ROMMON upgrade to Router Processor (RP2/RP1) or ASR1001/ASR1001-X/ASR1002-X platforms:
---> Follow the normal ROMMON upgrade process
---> Reload the router once with the same image to complete the upgrade process.
* Now system can be reloaded with any other image. System will still come up with the newly upgraded ROMMON.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
15.3(3)S3.13, 15.4(1)S1.1, 15.4(1)S2
Known Fixed Releases:
15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCug61252
Title:
Ability to Read Uninitialized Memory
Description:

Symptoms:
The potential exists for an unauthenticated user to read the contents of uninitialized memory of a WebEx node.

Conditions:
Default installation of an affected version of the WebEx node software.

Workaround:
None.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:C
CVE ID CVE-2013-1232 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.3(1)S2, 15.3(2)S1, 15.3(3)S
Bug Id:
CSCug63564
Title:
IKEv2: Crafted IKE_SA_INIT packet causes traceback
Description:

Symptoms:
Under certain conditions, malformed IKEv2 packets may cause a traceback in the ''Crypto IKEv2'' process:
*Feb 13 21:07:15.812: %SYS-2-MALLOCFAIL: Memory allocation of 4294967078 bytes failed from 0x16A15FF8, alignment 0
Conditions:
The condition is only causing traceback message to be printed. No actual crash is happening.
Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
15.3(2)S
Known Fixed Releases:
15.4(0.1)T, 15.4(0.6)S, 15.4(1)CG, 15.4(1)CG1, 15.4(1)S, 15.4(1)S0a, 15.4(1)S0b, 15.4(1)S0c, 15.4(1)S1, 15.4(1)S2
Bug Id:
CSCui38300
Title:
ASRNAT: High latency for non-natted traffic on nat enabled interface
Description:

Symptom:
High latency observed in customer network.

Conditions:
Under certain conditions, particularly under forced test conditions, it is possible to create scenarios where flow lock contention will be very high because of NAT gatekeeper failures. This happens when a large amount of traffic that does not need to be NAT'd is sent through an interface that has NAT configured. Most traffic hitting a NAT interface should be sent through NAT. If not, it will cause issues around 1Gb of traffic.

Workaround:
ASR1000(config)#ip nat service gatekeeper

After this, we can manually configure the size of the cache. The recommended starting point is 64K for now. Here is the command to configure the cache to be 64K:

ASR1000(config)#ip nat settings gatekeeper-size 64000

From here we can monitor the latency using the ping as before. We can monitor the actual entries in the cache using the following commands:

Show platform hardware qfp active feature nat datapath gatein activity
Show platform hardware qfp active feature nat datapath gateout activity

If needed we can clear the statistics by adding clear to the end of the two commands above to get a better idea of where we are at. Depending on what we are seeing with latency, we can fine tune the cache size later as well to try to reach optimum performance. Changing the cache size should not be service impacting. However, we recommend doing it during a maintenance window to be safe.

Further Problem Description:
The fix was backed out and re-added later by the CSCun06260 bug.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(2)S1
Known Fixed Releases:
15.4(1)S
Bug Id:
CSCuu15786
Title:
ASR1k NAT Gatekeeper periodically drops ICMP packets for 10 seconds
Description:

Symptom:
Traffics which should be NATed are unexpectedly not translated if NAT gatekeeper feature is enabled.

Conditions:
-NAT gatekeeper feature is enabled.
-There are traffics of multiple destinations with the same source address.
-There are NAT and non-NATed traffics in the same NAT interface.

Workaround:
Disable NAT gatekeeper feature by the following command.

(config)# no ip nat service gatekeeper

Further Problem Description:

Status:
Other
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
15.3(2)S, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCup30335
Title:
ASR1K CPP crash due to oversized egress packet with OTV
Description:

Symptoms:

A vulnerability in OTV processing code of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a reload of the affected device.

The vulnerability is due to improper processing of oversized OTV frames passing through an affected device. An attacker could exploit this vulnerability by sending a
number of packets that are processed as oversized OTV frames that may require fragmentation and reassembly by an affected device. An exploit could allow the
attacker to cause a reload of the affected device.

Conditions:
This has been seen on two ASR1002-X's running IOS-XE 03.10.01.S. Crash was seen when passing large packets across an OTV topology.

Workaround:
Limit oversize packets across overlay topology.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0710 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCty05282
Title:
Last reload reason is seen as LocalSoft on ASR1ks
Description:

Symptoms: Last reload reason in "show version" output is seen as LocalSoft
after some reloads.

Conditions: The conditions under which these symptoms are observed is unknown.

Workaround: There is no workaround.


Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
12.2(33)XNC0d, 15.1(1)S1, 15.3(2)S
Known Fixed Releases:
15.2(4)S1, 15.3(1)S
Bug Id:
CSCtx42751
Title:
%TRANSCEIVER-3-INIT_FAILURE with XFP-10GLR-OC192SR
Description:

Symptoms: The following error message is displayed:

%TRANSCEIVER-3-INIT_FAILURE: SIP2/0: Detected for transceiver module in
TenGigabitEthernet2/0/0, module disabled
%LINK-3-UPDOWN: SIP2/0: Interface TenGigabitEthernet2/0/0, changed state to down

Conditions: This symptom is observed with the XFP-10GLR-OC192SR transceiver.

Workaround: Configure "service unsupported-transceiver".

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
15.0(1)S4a
Known Fixed Releases:
15.1(3)S3.13, 15.1(3)S4, 15.2(2)S1.5, 15.2(2)S2, 15.2(2.19)S0.9, 15.2(4)S, 15.3(0.8)S
Bug Id:
CSCus69732
Title:
IOS-XE: Evaluation of glibc GHOST vulnerability - CVE-2015-0235
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

The following IOS-XE related products are affected:
Cisco ASR 1000 Series Aggregation Services Router
Cisco ASR 920 Series Aggregation Services Router
Cisco ASR 900 Series Aggregation Services Router
Cisco 4400 Series Integrated Services Routers
Cisco 4300 Series Integrated Services Routers
Cisco Cloud Services Router 1000V Series


A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on these products.

Conditions:
Exposure is not configuration dependent.

All versions prior to the following ones are shipping with the vulnerable code:
15.5(1)S/XE3.14.S
15.4(3)S2/XE3.13.2S
15.4(2)S2/XE3.12.2S
15.4(1)S3/XE3.11.3S
15.3(3)S5/XE3.10.5S
15.2(4)S6/XE3.7.6S
15.1(3)S7/XE3.4.7S

The following are active releases and planned CCO date:
release CCO_Date
15.5(2)S/XE3.15.0S 3/31/2015
15.5(1)S1/XE3.14.1S 3/3/2015
15.4(3)S3/XE3.13.3S 5/29/2015
15.4(2)S3/XE3.12.3S 3/28/2015
15.4(1)S4/XE3.11.4S 5/29/2015
15.3(3)S6/XE3.10.6S 7/30/2015
15.2(4)S7/XE3.7.7S 3/20/2015
15.5(3)S/XE3.16.0S 7/31/2015

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.2(4)S7, 15.4(2)S3, 15.5(1)S1, 15.5(2)S
Bug Id:
CSCtq22873
Title:
TB:%SCHED-2-EDISMSCRIT:process=PuntInject Keepalive Process
Description:

Symptoms:
Router may show the following traceback (error message) after receiving certain IPv6 packets.
TB:%SCHED-2-EDISMSCRIT:process=PuntInject Keepalive Process

Conditions:
Router configured for IPv6 routing.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases:
15.1(2)S1.3, 15.1(2)S2, 15.1(2.16)S0.8, 15.1(3)MRA, 15.1(3)MRA1, 15.1(3)MRA3, 15.1(3)MRA4, 15.1(3)S, 15.1(3)S2, 15.1(3)S5
Bug Id:
CSCuu44128
Title:
GETVPN on ASR with vasi interface fail to install the Rekey
Description:

Symptom:
In GETVPN scenario ASR as Group Member where crypto map is applied on Vasi interface rekey fails to install. For registration there is no problem.

Conditions:
When ASR as GM where crypto map is applied on Vasi interface

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCty26186
Title:
Enhancement request to capture watchdog reset on asr1k
Description:

Symptom:
reset did not save any core or crashinfo file. no error log either.

under show version:
"Last reload reason: Watchdog"

under "Reset reason Power On"
watchdog reset

Conditions:
normal operation. reset did not save any core or crashinfo file. no error log either.

Workaround:
this is a code enhancement. not a bug. therefore, no workaround applicable.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
15.1(2)S, 15.1(2)S2
Known Fixed Releases:
15.5(2)S
Bug Id:
CSCtb49497
Title:
%IOSXE-3-PLATFORM: %ATTN-3-SYNC_TIME ... missing packets -1
Description:

Symptom:
%IOSXE-3-PLATFORM: %ATTN-3-SYNC_TIMEOUT observed 10 times, but no other noticeable service impact

Conditions:
No special trigger

Workaround:
No known workaround

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
12.2(33)XNC, 12.2XN
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Bug Id:
CSCut61660
Title:
ESP crashes due to UCODE.
Description:

Symptom:
UCODE and FMAN -FP crash.

tracelogs ,

03/03 01:41:10.749 [(null)]: (debug):
-Traceback=1#059ffe5d84a16f3abdb99b9d41a9ab35 cpp_common_os:7FC11D233000+10C15 cpp_dmap:7FC123FAF000+33B6F cpp_dmap:7FC123FAF000+3789F cpp_palci_svr_lib:7FC121F38000+53EF cpp_palci_svr_lib:7FC121F38000+6C89 evlib:7FC11C259000+B960 evlib:7FC11C259000+E090 cpp_common_os:7FC11D233000+13313 :400000+5A51 c:7FC10ED60000+1E514 :400000+56B9

03/03 01:41:10.750 [errmsg]: (ERR): %CPPDRV-3-LOCKDOWN: CPP10(0) CPP Driver LOCKDOWN due to fatal error.

Conditions:

Workaround:
.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
15.5(1.12)S
Known Fixed Releases:
Bug Id:
CSCut21885
Title:
fman_fp_image and cpp_cp_svr memory leak - QFP PfR MP Prefix H...
Description:

Symptom:
fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory

show platform software memory forwarding-manager FP active brief
show platform software memory qfp-control-process qfp active brief

QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578
Summary 4262097059 4221917059 81523186 79011936

AL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)

RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 3076255744
cpp_cp_svr 28858 28431 28858 S 20 1849511936
fman_rp 21120 20336 21120 S 20 1452556288

4+ weeks later:

RAL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)


RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 4294967295
cpp_cp_svr 28858 28431 28858 S 20 2942447616
fman_rp 21120 20336 21120 S 20 1462714368

Conditions:
normal operation

Workaround:
unknown at this point

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
15.4(2)S1
Known Fixed Releases:
Bug Id:
CSCud33610
Title:
NAT CGN : crash when clearing translations using ALG
Description:

Symptom:
QFP crash

Conditions:
NAT CGN configuration
'clear ip nat translations *' is executed.

Workaround:
Don't clear translations.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(4)S3, 15.3(1)S1, 15.3(2)S
Bug Id:
CSCut03813
Title:
ASR1K ucode crash seen at mpls_icmp_create
Description:

<B>Symptom:</B>
ASR 1000 may experience an ESP ucode crash causing network outage in non-redundant setup

<B>Conditions:</B>
currently observed on ESP100 and ASR1002-X with deployments having MPLS, IPv6 and NAT configured.

<B>Workaround:</B>
None at this point.

<B>Further Problem Description:</B>
On ESP40, instead of crash, you may see following error message-
%NAT-6-ADDR_ALLOC_FAILURE:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S5.1, 15.4(3)S
Known Fixed Releases:
Bug Id:
CSCtx03171
Title:
ASR1k NAT/ALG Processing improvements
Description:

<B>Symptom:</B>
Improvements to NAT VRF Processing on IOS-XE.


<B>Workaround:</B>
None

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(3)S2
Known Fixed Releases:
15.1(3)S3, 15.2(1)S1, 15.2(2)S
Bug Id:
CSCub34945
Title:
Fragmented MVPNv6 Traffic Denial of Service Vulnerability
Description:


Summary
Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:

Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability
Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability
Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability
Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability
Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device.
Repeated exploitation could result in a sustained Denial of Service (DoS) condition.

Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-1164 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.1(3)S5, 15.2(4)S1, 15.3(1)S
Bug Id:
CSCub82727
Title:
wrongly formatted errmsgs in webex SPA's IOSCC driver
Description:

Symptom:
The IOSCC will be crashing with the print of some particualr error messages, if they get hit.

Conditions:
The errors messages are malformed and the IOSCC will crash only if those
error messages get hit

Workaround:
No work around.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.1(3)S5.14, 15.1(3)S6, 15.2(4)S3.3, 15.2(4)S4, 15.2(4)S4a, 15.3(0.20)S0.2, 15.3(1)S, 15.3(1.3)S
Bug Id:
CSCuo53622
Title:
IOS XE Crafted TCP Packet Remote Code Execution Vulnerability
Description:


Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud
Services Routers (CSR) 1000v Series contains the following vulnerabilities:
Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability
Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability
Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability
Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability
Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an
interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.

Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to
execute malicious code on the affected device.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address
vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software
Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(3)S2
Known Fixed Releases:
15.3(3)S3, 15.4(1)S3, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCua79665
Title:
IOS Common Flow Table Crafted Packet Denial of Service Vulnerability
Description:


Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud
Services Routers (CSR) 1000v Series contains the following vulnerabilities:
Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability
Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability
Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability
Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability
Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an
interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.

Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to
execute malicious code on the affected device.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address
vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software
Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(1)S
Known Fixed Releases:
15.2(4)S2, 15.3(1)S
Bug Id:
CSCtn63795
Title:
A new cef entry added does not inherit all the forwarding attributes
Description:

Symptom:
The CTS (Cisco TrustSec) feature, uses the /32 cef entries to store IP-SGT (Security Group
Tag) bindings. When a new IP-SGT binding is added for an IP address that did not exist in the
cef table, a new /32 cef entry is added to the cef table, and this cef entry does not inherit
the forwarding attributes of features such as BGPPA, from its /24 parent.
Conditions:
all
Workaround:
none
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33.7.20)SRE, 15.1(2)S1.4, 15.1(3)S
Known Fixed Releases:
12.2(58)EY2, 12.2(58)EZ, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.0(0)XJR111.173
Bug Id:
CSCsz91562
Title:
ASR:RP may crash when receiving certain IKE packets.
Description:

Symptom:

RP may crash when receiving certain IKE packets.

Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33)XNE, 12.2(33)XNE1, 12.2(33.1.20)MCP5, 15.0(2)EA, 15.0(2)EB, 15.0(2)EC, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1
Bug Id:
CSCuq59131
Title:
IOS XE L4 Redirect Crafted Packet Denial of Service Vulnerability
Description:


Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud
Services Routers (CSR) 1000v Series contains the following vulnerabilities:
Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability
Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability
Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability
Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability
Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an
interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.

Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to
execute malicious code on the affected device.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address
vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software
Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S0.1
Known Fixed Releases:
15.2(4)S7, 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCuh58209
Title:
BQS show commands may cause ESP crash when displaying internal queues
Description:

Symptoms:
ESP crashes in response to a show command.
Conditions:
This only causes an ESP crash when the 'qid' specified is an internal queue. It is
safe for interface or QoS created queue.
When issuing the following show command on a ASR1K 1002X, ESP80/100, and ESP160/200 system.

"show platform hardware qfp [active|standby] infrastructure bqs [schedule|queue] qid
<qid>"
Workaround:
Avoid use of the show command to display internal queues.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
3.8/3.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(2)S2, 15.3(3)S1, 15.4(1)S
Bug Id:
CSCtj14903
Title:
ASR1000: ESP reload at crash@ipv4_parse_options with invalid IP traffic
Description:

Symptoms:
ESP can reload, this will cause a service interruption.

Conditions:
ASR1000 with Cisco IOS XE 3.1(0)S [15.0(1)S]

Workaround:

Additional Information:

Upgrade to the following Cisco IOS XE releases or later:

3.1(2)S
3.2(0)S
3.3(0)S


Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(1)S
Known Fixed Releases:
15.0(1)S2, 15.1(1)S, 15.1(2)S
Bug Id:
CSCtz38558
Title:
Traceback @ lst_gpm_addr_handler on parsing IPv6 packets
Description:

Symptoms:
The traceback may be seen on an ASR1K when processing some IPv6 malformed packets

Conditions:
IPv6 packet is malformed

Workaround:
There is no workaround

Additional Information:
Packet will be dropped.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.1(3)S4, 15.2(2)S2, 15.2(4)S
Bug Id:
CSCtx32599
Title:
HA_PROXY-3-HA_MALFORMED_PKT && FWALL-3-HA_INVALID_MSG_RCVD
Description:

Symptoms:

Traceback messages printed on the console. Device does not experiences adverse effects.

Conditions:
Workaround:
Additional Information:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(2)S
Known Fixed Releases:
15.1(3)S4, 15.2(1)S2, 15.2(2)S
Bug Id:
CSCtc59429
Title:
Crafted GRE packet may cause FP of ASR1K series to crash.
Description:

Symptom:
Crash of the Forwarding Processor in a Cisco ASR 1000 Series Aggregation Services Routers.

Conditions:
Device is configured with at least one GRE Tunnel, and receives a specially crafted GRE packet matching the source and destination addresses of
the tunnel interface.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score.

The Base and Temporal CVSS scores as of the time of evaluation are
7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?
dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2011-1633 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33)XNC, 12.2(33)XND, 12.2(33)XNE
Known Fixed Releases:
12.2(33)XND2, 12.2(33)XNE
Bug Id:
CSCtd33567
Title:
Traceback seen when receiving crafted H.323 packets
Description:

Summary

The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version of Cisco IOS Software.

Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml.

Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier:

http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33)XNE
Known Fixed Releases:
12.2(33.2.5)XNE1, 12.4(15)T14, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ7, 12.4(22)YB8, 12.4(22)YD4, 12.4(24)MDA13, 12.4(24)MDB13, 12.4(24)MDB14
Bug Id:
CSCuo25741
Title:
IOS XE Fragmented Packet Denial of Service Vulnerability
Description:


Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud
Services Routers (CSR) 1000v Series contains the following vulnerabilities:
Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability
Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability
Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability
Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability
Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an
interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.

Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to
execute malicious code on the affected device.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address
vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software
Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(3)S, 15.4(1)S
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S
Bug Id:
CSCtz23293
Title:
Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability
Description:


Summary
Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:

Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability
Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability
Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability
Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability
Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device.
Repeated exploitation could result in a sustained Denial of Service (DoS) condition.

Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-1165 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33)XNF2
Known Fixed Releases:
15.1(3)S4.7, 15.1(3)S5, 15.1(3)S5a, 15.1(3)S6, 15.1(3)S7, 15.2(4)S0.4, 15.2(4)S1, 15.2(4)S1c, 15.2(4)S2, 15.2(4)S3
Bug Id:
CSCtl92036
Title:
FP crash observed @ ipv4_tunnel_compare_hash_bucket
Description:

Symptom:

FP crash observed on ASR1K when enabling tunnel checksum cli under the dmvpn tunnel
interface.

Conditions:

DMVPN phase 3 network protected with gdoi with hub or spoke as ASR1K
Traffic (unicast and multicast flowing)
Tunnel checksum configuration under the dmvpn tunnel interface.

Workaround:

Removing the Tunnel checksum command avoids the fp crashes.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33.1), 15.1(2)S
Known Fixed Releases:
15.0(1)S4, 15.1(2)S1, 15.1(3)S
Bug Id:
CSCsq87809
Title:
Port mapper is enabled on both Mgmt-VRFs
Description:

<B>Symptom:Management Ethernet interface has unneeded open ports</B>


<B>Conditions:</B>
A port scan of the Management Ethernet shows that TCP Port 111 (sunrpc) is open/accessible. The
security exposure is minimal as none of the RPC services are accessible, however the portmapper
(111) could be used as a DoS vector if the Management Ethernet port was physically accessible
to an attacker.

<B>Workaround:</B>
Add an ACL to GigabitEthernet0 to deny external access to TCP port 111.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
12.2(33)XN1
Known Fixed Releases:
12.2(33)XNB
Bug Id:
CSCto16298
Title:
NAT44 FP reset seen on doing "clear ip nat translation *"
Description:

Symptom:
Forwarding Processor reset seen on sending malformed packets and doing ''clear ip nat trans *''

Conditions:
Receiving multiple malformed packets

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.6/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C

CVE ID CVE-2012-5989 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases:
15.1(3)S
Bug Id:
CSCuf17466
Title:
Ability to Read Uninitialized Memory
Description:

Symptoms:
The potential exists for an unauthenticated user to read the contents of uninitialized memory of a WebEx node.

Conditions:
Default installation of an affected version of the WebEx node software.

Workaround:
None.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:C
CVE ID CVE-2013-1232 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Terminated
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
Bug Id:
CSCtr44535
Title:
ASR1K RBUF OOH exception in FNF ager thread in presence of PFR
Description:

Symptom:

On the ASR1K, the ESP has been observed to reload with configurations
combining Netflow, Pfr and Netflow export.

Error messages like

May 22 10:27:47.268 BST: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0
desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121
cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x0


are seen.

Conditions:

Configurations where this defect has been seen have had Netflow configured
on an interface
ip flow ingress
ip flow egress

as well as Pfr Border Controller

pfr border

as well as Netflow export

ip flow-export destination 192.168.10.10 9999

Workaround:

Unconfiguring netflow export should eliminate the ESP reload. If this is not possible,
decreasing the number of configured Netflow exporters from 2 to 1, may be of
some benefit.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal
resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.0(1)S
Known Fixed Releases:
15.1(2)S2, 15.1(3)S1, 15.2(1)S
Bug Id:
CSCtz97563
Title:
Fragmented IPv6 Multicast Traffic Denial of Service Vulnerability
Description:


Summary
Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:

Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability
Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability
Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability
Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability
Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device.
Repeated exploitation could result in a sustained Denial of Service (DoS) condition.

Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-1164 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S
Known Fixed Releases:
15.1(3)S4, 15.2(4)S
Bug Id:
CSCud72509
Title:
IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability
Description:

Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities:

Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability
Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability
Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability
Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services
processors (ESP) card or the route processor (RP) card, causing an interruption of services.
Repeated exploitation could result in a sustained DoS condition.

Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5546 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Symptom:

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S1
Known Fixed Releases:
15.2(4)S3, 15.3(1)S1, 15.3(2)S
Bug Id:
CSCur02734
Title:
IOS-XE evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
The following Cisco products running IOS-XE software

Cisco ASR 1000 Series Aggregation Services Router
Cisco ASR 920 Series Aggregation Services Router
Cisco ASR 900 Series Aggregation Services Router
Cisco 4400 Series Integrated Services Routers
Cisco 4300 Series Integrated Services Routers
Cisco Cloud Services Router 1000V Series

include a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-6277
CVE-2014-6278
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187

This bug has been opened to address the potential impact on this product.

Conditions:
In all version before the Known Fixed Releases with either

The Persistent SSH feature enabled
The Persistent telnet feature enabled

Information on the Persistent SSH & persistent telnet feature is available on :

http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Console_Telnet_SSH_Handling.html#pgfId-1057023

The Persistent SSH or Persistent telnet feature is only available on the Management interface (GigabitEthernet0) in the VRF Mgmt-intf.

With Persistent SSH, a user must first successfully log in and authenticate via SSH to trigger this vulnerability.
With Persistent telnet, an unauthenticated user can exploit this vulnerability

Other conditions may exist. This release note will be updated if other attack vectors are discovered.

Workaround:
Disable the Persistent SSH feature. Disable the Persistent telnet feature.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S, 15.2(4)S6, 15.3(3)S, 15.3(3)S4, 15.4(1)S, 15.4(1)S2, 15.4(2)S, 15.4(2)S1, 15.4(3)S
Known Fixed Releases:
15.2(4)S7, 15.3(3)S5, 15.4(1)S3, 15.4(2)S2, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCuh19936
Title:
IOS XE Software PPTP Traffic Denial of Service Vulnerability
Description:

Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities:

Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability
Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability
Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability
Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services
processors (ESP) card or the route processor (RP) card, causing an interruption of services.
Repeated exploitation could result in a sustained DoS condition.

Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5545 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Symptom:

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(2)S, 15.3(2)S1
Known Fixed Releases:
15.3(2)S2, 15.3(3)S
Bug Id:
CSCuc47399
Title:
IKEv2-Accounting Wrong values in STOP Records when locally cleared
Description:

Symptoms: IKEv2 STOP Accounting records show wrong counters for packets/octets, when the sessions are locally cleared using "clear crypto sa" or "clear crypto session" on ASR1K.

Conditions: This symptom is observed with latest Cisco IOS XE Release 3.8S images when IKEV2-Accounting is enabled. This issue is easily reproducible with a single session, and may be service impacting as STOP Accounting records are usually used for billing purposes.

Workaround: The STOP records reflect the right counters when the disconnect is through the remote-end.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S, 15.3(2)S
Known Fixed Releases:
15.1(1)SY0.1, 15.1(1)SY1, 15.1(1)SY1.32, 15.1(1)SY1.55, 15.1(1)SY1.57, 15.1(1)SY2, 15.1(1)SY3, 15.1(1)SY4, 15.1(2)SY, 15.1(2)SY1
Bug Id:
CSCuu19310
Title:
ASR1K:UCODE and RP @PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_STEM_CB_SEL_I
Description:

Symptom:
observing ucode followed by fman_fp and RP crash

Conditions:
on verifying MLFR-FRF12 Bundle Interface working after RP Switch-over in SSO Mode

Workaround:
n/a

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuq90913
Title:
OTV: CPP ucode crash in l2bd_forward on BD cond. debug enable
Description:

Symptom:






CPP ucode crash when bridge-domain (BD) conditional debug enabled with OTV feature configured.

Conditions:




Seen only with bridge-domain debug enabled and OTV feature config.

Workaround:



No work around. (just don't enable BD debug)

Further Problem Description:












Any new MAC learned with BD debug enabled will trigger this issue. If there are no MAC's while debug enabled, then no issues.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.4(2)S2, 15.4(3)S1, 15.5(1)S
Bug Id:
CSCtz61014
Title:
f Linux 2.6.27 kernel NTP leap second handling could cause deadlock
Description:

Symptom:
There are periodic leap second events which can add or delete a second to global time.

When the leap second update occurs the system will crash when adding or deleting NTP leap second in NTP
master mode.

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
To prevent an issue when the leap second update is received do not configure the system as NTP master.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.0(1)S
Known Fixed Releases:
15.1(3)S4, 15.2(2)S1
Bug Id:
CSCul00709
Title:
ASR router crash with malformed packets during fragment/defragmentation
Description:

Symptom:
Cisco IOS XE Cisco Packet Processor (CPP) crashes on a device configured with MPLS IP.

Conditions:
Device configured with mpls ip

Workaround:
None.

Further Problem Description:
A crafted MPLS IP packet may cause the Cisco IOS XE Cisco Packet Processor (CPP) to crash.

This can be triggered with a crafted MPLS IP packet when the packet requires MPLS fragmentation.

NOTE: It is difficult to inject this crafted packet into the network outside the label switch domain, since routers would/should drop the packet with
basic IP Sanity checks that are done with IP CEF code.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.4/4.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-6981 has been assigned to document this issue.

Additional information about this vulnerability can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6981

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(4)S4.1
Known Fixed Releases:
15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1
Bug Id:
CSCts82752
Title:
ASR1K crashes with a ping done on packet size higher than 10000
Description:

<B>Symptom:</B>

ASR1K crashes with a ping done on packet size higher than 10000

<B>Conditions:</B>

When ping is done from ASR1k with a packet size of more than 10000 bytes

<B>Workaround:</B>

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases:
15.1(3)S2, 15.1(3)S3, 15.2(1)S, 15.2(2)S
Bug Id:
CSCuj55363
Title:
lispgetVpn traffic is dropped when getvpn profile is applied in wan intf
Description:

Symptom:
In the lisp getVpn solution test, when the getvpn profile is applied in physical interface in
the data path flow (such as interface between GM1 to core), the traffic got dropped with qfp error of "IpsecIkeIndicate"/"OUT_V4_PKT_HIT_IKE_START_SP"

when the getvpn profile is applied to the LISP0 interface, Encrypted traffic flows in the LISP setup properly

Conditions:
getvpn profile is applied to the physical interface instead of lisp interface.


Workaround:
apply getvpn profile in lisp interface.

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.4(1)S
Known Fixed Releases:
Bug Id:
CSCtl87590
Title:
ASR1K-XE34:cpp-mcplo-ucode crash under jumbo fragment traffic
Description:

Symptom:
ASR crashed when sending jumbo fragments(>9k)and VFR enabled
Conditions:
fragments(>9k) received and VFR enabled,or packets need to be processed by RP and VFR enabled in that interface
Workaround:
none

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(3)S
Known Fixed Releases:
15.1(2)S1, 15.1(3)S
Bug Id:
CSCus78987
Title:
UDP port 2152 (GPRS) is open by default and can't be manually closed
Description:

<B>Symptom:</B>
UDP port 2152 is open by default, without additional configuration.

<B>Conditions:</B>
UDP port 2152 is associated with GPRS Tunneling Protocol. GPRS was introduced on XE3.4S.

http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-data-zbf-xe-book/conf-gprs-tunn-prot.html#GUID-6153DF03-6228-4117-8E71-
80989510E3A5

By default this port is open even without any GPRS configurations. There is currently no way to
manually close the port or disable the service if its not needed.

<B>Workaround:</B>
An extended ACL can be created and applied to the interface to block destination UDP port 2152.
You can also use control-plane policing to block UDP packets being sent with a destination port
of 2152 and being sent to the control plane. Here is the example config to do this:

ip access-list extended udp-port-2152
permit udp any any eq 2152

class-map match-all traffic-udp-port-2152
match access-group name udp-port-2152

policy-map CoPP
class traffic-udp-port-2152
police cir 32000 conform-action drop exceed-action drop

control-plane
service-policy input CoPP

Please note the previous configuration should only be applied to devices NOT configured to
process GPRS traffic.

<B>Further Problem Description:</B>

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(2)SY, 15.4(1)S
Known Fixed Releases:
Bug Id:
CSCuu12008
Title:
rework CSCut21885: chunk_destroy memory leak.
Description:

Symptom:
fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory

show platform software memory forwarding-manager FP active brief
show platform software memory qfp-control-process qfp active brief

QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578
Summary 4262097059 4221917059 81523186 79011936

AL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)

RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 3076255744
cpp_cp_svr 28858 28431 28858 S 20 1849511936
fman_rp 21120 20336 21120 S 20 1452556288

4+ weeks later:

RAL-INET-RTR02#show platform software status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)


RAL-INET-RTR02#show platform software process list r0 sort memory
Name Pid PPid Group Id Status Priority Size
------------------------------------------------------------------------------
linux_iosd-imag 23712 22710 23712 S 20 4294967295
fman_fp_image 29760 29456 29760 S 20 4294967295
cpp_cp_svr 28858 28431 28858 S 20 2942447616
fman_rp 21120 20336 21120 S 20 1462714368

Conditions:
PfR is enabled and activated.

Workaround:
Avoid using PfR

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.4(2)S1
Known Fixed Releases:
Bug Id:
CSCuj23992
Title:
Cisco IOS XE IP Header Sanity Check Denial of Service Vulnerability
Description:

A vulnerability in CEF processing module, responsible for checking the sanity of IP headers on Cisco IOS XE could allow an unauthenticated, remote attacker to cause a reload of an affected
device and lead to a Denial of Service (DoS) condition.

The vulnerability is due to improper processing of MPLS packets when certain additional features are configured. An attacker could exploit this vulnerability by sending MPLS packets to
traverse and exit an affected device as IP packets, when certain additional features are configured. An exploit could allow the attacker to cause a reload of an affected device and lead to a
Denial of Service (DoS) condition.

Conditions:
When certain configuration that includes ''ip cef accounting'' and ''tcp adjust-mss'' is present, and the MPLS packet received on the ingress is egressing as an IP packet, a crash may happen.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-6706 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6706

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.0(1)S, 15.3(2)S1, 3.9(0.0)
Known Fixed Releases:
15.3(3)S1, 15.4(1)S
Bug Id:
CSCub31873
Title:
ASR1K Crash on incomplete/glean adjacencies processing.
Description:

<B>Symptom:</B>
ASR RP/ESP crash.

<B>Conditions:</B>
If a router has to process a lot of IP packets that are either incomplete adjacencies or glean adjacencies, they will be punted for ARP processing.

A condition occurs that may prevent the ESP from processing the RP keep alive for a certain period and the RP will force the ESP to crash.

Workaround:
None. Upgrade to 15.2(04)S05-XE3.7.5 or later.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2015-0685 has been assigned to document this issue.

More information about this vulnerability is made available at: http://tools.cisco.com/security/center/viewAlert.x?alertId=38124

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S
Known Fixed Releases:
15.2(4)S5, 15.3(1)S
Bug Id:
CSCup37676
Title:
OTV jumbo packet fragmentation and reassembly causes ASR1K CPP crash
Description:

Symptoms:

A vulnerability in OTV processing code of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a reload of the affected device.

The vulnerability is due to improper processing of oversized OTV frames passing through an affected device. An attacker could exploit this vulnerability by sending a number of packets that are processed as oversized OTV frames that may require
fragmentation and reassembly by an affected device. An exploit could allow the attacker to cause a reload of the affected device.

Conditions:
This has been seen on two ASR1002-X's running IOS-XE 03.10.01.S. Crash was seen when passing large packets across an OTV topology.

Workaround:
Limit oversize packets across overlay topology.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0710 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(3)S1
Known Fixed Releases:
15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S
Bug Id:
CSCut81614
Title:
OTV non-AED wrongly replies to ARP request received from internal intf
Description:

Symptom:
non-AED will reply to ARP request which will make L2 traffic loss

How to verify if your problem hits this ddts:
For target Mac address(duplicated in otv database), check the mac table on all related switches and ASR1K(ED). If the the port of the mac address is wrong, you may meet the problem hits this ddts.

Conditions:
Multi-homing

Workaround:
disable otv arp-nd cache

Further Problem Description:
None

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
27-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuu16709
Title:
$$SS MACsec Interop between Nightster and Overlord fails.
Description:

Symptom:
MACsec encryption between ISR 4451 and ASR 1001-X may fail.

Conditions:

Workaround:
Issue macsec/no macsec on the interface

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuu04682
Title:
NAT ACL ignored on VASI interface with scale
Description:

Symptom:
WIth a large scale environment of BGP peers over VASI interfaces, some peers fail to come up or stay down due to hold timer expired.

Conditions:
This occurs when NAT is applied to one of the VASI interfaces with a large scale configuration. The NAT ACL denies BGP from being translated, but the NAT translation table indicates BGP is being translated.

Workaround:
Removing NAT from the interface is the only known workaround.

Further Problem Description:
BGP peer failure is random and changes when the "clear ip nat translation" command is issued.

Status:
Terminated
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Bug Id:
CSCus85852
Title:
CPP DRV: Disable IIC Interrupts (Revert CSCuq05197)
Description:

Symptom:
ESP crash occurs after one of the following interrupts are reported (can be seen on the IOS console):
HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED64
HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED65

Conditions:
Router configuration or traffic pattern does not affect this problem. This issue occurs if a data parity error is reported in the QFP L2 instruction cache controller, and impacts all CPP10-based ESPs (asr1001, asr1002, ESP5, ESP10, ESP20, ESP40). This issue does not impact Yoda (asr1002-x, ESP100, ESP200) or Luke (asr1001-x) based ESPs.

Workaround:
None. Almost all data parity errors are random events that can not be fixed by replacing hardware.

Further Problem Description:
The exception handler for the L2 instruction cache handler is restored / fixed in the following releases:
XE310 / 15.3(3)S6
XE312 / 15.4(2)S3
XE313 / 15.4(3)S3
XE314 / 15.5(1)S2

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
15.4(2)S3, 15.5(2)S
Bug Id:
CSCuq85985
Title:
ASR1K:ESP80, 100, 200 crash on SSO when FRF.12 enabled on MFR bundle
Description:

Symptom:
Crash of both active and standby ESP. Applies to ESP80, 100, and 200.

Conditions:
Updating the bandwidth of an active MFR bundle member-link. A bandwidth update will be sent from the RP to the FP if the FMAN-RP and FMAN-FP have different bandwidth values for the same link. This occurs immediately after boot if the startup-config has MFR member-links configured with FRF.12 fragmentation (active RP and standby RP will boot with different bandwidths, so that on switchover the standby RP will send a bandwidth update to the FP). Other situations that can lead to the bandwidth mismatch include adding/removing links to an MFR bundle with FRF.12 enabled and adding/removing FRF.12 from a main MFR interface prior to performing a switchover.

Workaround:
None. Normal router operation and configuration can lead to this crash such that there are no viable workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.5(1)S0.3, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S, 15.5(2)S
Bug Id:
CSCuu09050
Title:
asr1001x may crash when unconfiguring large QoS policy
Description:

Symptom:
asr1001x may reload when unconfiguring large QoS policy

Conditions:
A very large QoS policy with hundreds of class-maps is used on the router and removed.

Workaround:
Do not unconfigure large QoS policy.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCto03123
Title:
cman-fp/cman-cc slow memory leak is seen
Description:

Symptom:1. A slow memory leak is seen on cman_fp process on FP and cmcc process on
a SIP. This is seen on all the flavors for FPs and CCs. Leak is of the order of
less than 100-122K bytes per day.
2. Additional memory leak can happen when there are frequent sensor value
changes take place.


Conditions:No special condition is required for first leak to happen. Second leak happens
when sensor related changes take place.

In show log OR syslog output, you can expect to see the following message:
%OOM-3-NO_MEMORY_AVAIL: SIP0: oom.sh: The system is very low on available memory. Operations will begin to fail


Workaround:None.




Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
12.2(33)XNF1, 15.0(1)S2, 15.0(1)S3, 15.1(1)S, 15.1(2)S
Known Fixed Releases:
12.2(33)XNF2e, 15.0(1)S4, 15.1(1)S2, 15.1(2)S1, 15.1(3)S
Bug Id:
CSCun13772
Title:
NHRP: CPUHOGs seen when many child entries expire simultaneously
Description:

Symptom:
CPUHOG messages and watchdog timeout crashes are observed on an ASR1000 series router running DMVPN.

Conditions:
This has been observed on a router with a very large NHRP table (10-20k individual entries) with a very high number (thousands) of child entries per parent entry.

Workaround:
Reduce the number of child entries per parent entry through the use of supernetting.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.2(4)S1
Known Fixed Releases:
15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10, 15.3(3)S5, 15.4(2.17)S0.7, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1
Bug Id:
CSCur52300
Title:
ASR1K: IOSd crash occurs on Standby RP with UWS-GETVPN profile
Description:

Symptom:
IOSd crash seen on Standby RP of GM router

Conditions:
While doing SPA_OIR with UWS-GETVPN configs

Workaround:
-

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S
Known Fixed Releases:
Bug Id:
CSCui25696
Title:
ASR 1K router - Kernel Core Crash on find_busiest_group()
Description:

Symptom:
Cisco ASR 1K router experiences a watchdog reset due to a kernel core dump triggered by a possible invalid calculation.

Conditions:
This symptom can occur under any condition.

Workaround:
There is no workaround.

Further Problem Description:
The bug mentions "watchdog". On platforms that have dedicated FP/ESPs (example would 1002, 1004, 1006 and 1013), there is no reload of the RP and so, the show version output will not reflect watchdog.

The may be as much as 10 minutes or more from the time you see
IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0
tp when you see
IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0

The interruption to network services are likely to happen close to when you see online in slot F0 message.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.2(4)S1
Known Fixed Releases:
15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S
Bug Id:
CSCto82630
Title:
CC/SPA package modification to reduce SIP 10 memory usage
Description:

Symptom:
ASR1000 with SIP module may report a low memory warning. This is a cosmetic non impacting issue.

%PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0: Committed Memory value 96% exceeds warning level 95%

Conditions:
SIP memory usage can be verified with the following command:

show platform soft status control-processor brief

Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
SIP0 Healthy 449776 445428 (99%) 4348 ( 1%) 429456 (95%)
SIP1 Warning 449776 443572 (99%) 6204 ( 1%) 431344 (96%)
SIP2 Healthy 449776 397796 (88%) 51980 (12%) 318364 (71%)

Workaround:
None. Cosmetic issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
12.2(33)XNF2, 15.1(3)S
Known Fixed Releases:
15.1(2)S1, 15.1(3)S, 15.2(1)S
Bug Id:
CSCuu24757
Title:
ASR1k QFP leak with cpp_sp_svr at module FM CACE
Description:

Symptom:
An ASR1k router will have a leak on the QFP with cpp_sp_svr. Listing the modules under this service, FM CACE which deals with software TCAM will be holding the majority of the memory:

Router#show platform software memory qfp-service-process qfp active
.
.
Module: FM CACE
allocated: 1866346946, requested: 1857054514, overhead: 9292432
Allocations: 1161692189, failed: 0, frees: 1161111412

Conditions:
Currently, this is seen when tunnel interface is configured with IPSEC in a DMVPN environment but the exact conditions are unknown at this time.

Workaround:
None at this time

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.4(3)S2.2
Known Fixed Releases:
Bug Id:
CSCut52677
Title:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image after RP switchover
Description:

Symptom:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP. This error message is seen.

Conditions:
This issue is seen while doing sweep ping after doing RP switchover with latest MCP_DEV image.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.5(2)S, 15.5(3)S
Known Fixed Releases:
15.5(2)S0.4, 15.5(2.18)S
Bug Id:
CSCuu36031
Title:
Kernel crash is related to a GPF related to memory corruption.
Description:

Symptom:
Unexpetced reboot

Conditions:
Router rebooted itself and no changes has been made.

Workaround:
NA

Further Problem Description:
This is a MPLS router in a data center multiple connections depend on this connection. Over 12 devices paged down when this happened.

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.2(4)S5.1
Known Fixed Releases:
Bug Id:
CSCus13106
Title:
Error in generating keys:no available resources
Description:

Symptom:
After ESP Switchover SSH on ASR stops working

Conditions:
ASR 1006 RP2
15.2(4) S4
Happens after ESP switchover

Workaround:
n/a

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.2(4)S4.1
Known Fixed Releases:
Bug Id:
CSCur43882
Title:
%SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: in mcp_dev
Description:

Symptom:
*Oct 28 10:55:10.568: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP

Conditions:
This issue is seen after doing router reload with latest MCP_DEV image.

Workaround:
-

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.4(3)S, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu50414
Title:
ASR1k: %IOSXE-4-PLATFORM kernel error message
Description:

Symptom:
When huge number of HSRP interfaces become up, the following messages appear and VIPs cannot be communicated tentatively. The messages will be stopped after a while.

%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM DA Failed to find space for MAC insert region 1
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port4 ERROR: LPM DA Failed to find space for MAC insert region 1
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port5 ERROR: LPM DA Failed to find space for MAC insert region 1

Conditions:
-There are about 1000 or more HSRP interfaces in ASR1000.
-The issue may happen when these interfaces are up or down.
-The issue was found in 15.4(3)S2/ASR1001-X.

Workaround:
None at this moment.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.4(3)S2.1, 15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu14810
Title:
LNS Setup Rate takes over one hour for 58K sessions (copy of CSCut20591)
Description:

Symptom:
In high scale L2TP/LNS cases where RADIUS sends a QoS-Policy to LNS as a part of Access Accept, session setup rate might be too slow.
For 58.000 sessions, it might take up to 1 hour or even longer to establish all sessions on the LNS side.
The goal of this fix is to improve session setup rate on LNS: without outgoing shaping in RADIUS user profile, it takes only 23 minutes.

Conditions:
In high scale L2TP/LNS cases where RADIUS sends a QoS-Policy to LNS as a part of Access Accept, session setup rate might be too slow.
For 58.000 Sessions, it might take up to 1 hour or even longer to establish all sessions on the LNS side.
The goal of this fix is to improve session setup rate on LNS: without outgoing shaping in RADIUS user profile, it takes only 23 minutes.

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.3(3)S3.13
Known Fixed Releases:
Bug Id:
CSCuu56477
Title:
TenGi IF and channel down when doing "redundancy force-switchover"
Description:

Symptom:
did "redundancy force-switchover" on ASR1K (2RP) caused TenGigabitEthernet IF and port-channel down.

Conditions:
none

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCus66974
Title:
ASR1K QFP ESP 200 crashed in a B2B CGN NAT scenario with PAP+BPA
Description:

Symptom:
In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 crashed and recovered.

Conditions:
PAP+BPA configured ASR1013 with ESP200.

Workaround:
No workaround. ESP200 crashed and recovered.

Further Problem Description:
NA

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
29-MAY-2015
Known Affected Releases:
15.3(3)S, 15.6(1)S
Known Fixed Releases:
15.5(2)S
Bug Id:
CSCuu55787
Title:
ASR1001-X: Router fails to come online with No Service Password Recovery
Description:

Symptom:
Router fails to come online after attempting to return to factory defaults with "No Service Password Recovery" enabled.

Conditions:
ASR1001-X with No Service Password Recover enabled. An attempt to send a to the ROMMON followed by answer "Y" to
Do you want to reset the router to the factory default
configuration and proceed [y/n] ?

Workaround:
Do not enable No Service Password Recovery
or
Do not attempt to return router to factory defaults after having done so

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.4(3)S
Known Fixed Releases:
Bug Id:
CSCuu58443
Title:
ASR1001: SMC-2-BAD_ID_HW or SCC-3-XCVR_BAD_ID_HW with GLC-SX-MMD
Description:

Symptom:
The following error messages may be seen on an ASR1001 router and the interface stays down.

%SMC-2-BAD_ID_HW: SIP0/0: Failed Identification Test in 0/0/2
%SCC-3-XCVR_BAD_ID_HW: SIP0/0: Failed identification test in 0/0/0

Conditions:
The issue occurs when inserting a GLC-SX-MMD SFP or rebooting the router.

Workaround:
Contact TAC to check for a workaround.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu37200
Title:
SC install fails after link re-route
Description:

Symptom:
SC install fails after link re-route happens in the network

Conditions:
SC install fails after link re-route happens in the network.

Workaround:
issue no macsec/macsec to recover SC's.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.4(3)SS
Known Fixed Releases:
Bug Id:
CSCuu35388
Title:
IKEv2 - IPSec SA lifetime expires immediately after SA is established
Description:

Symptom:
SA is created within in the same instance a (lifetime_expiry) message is printed stating "SA lifetime threshold reached, expiring in 3599 seconds" this is followed by a (delete_sa).


358463: Apr 2 12:59:19.348 EDT: IPSEC:(SESSION ID = 2127) (lifetime_expiry) SA lifetime threshold reached, expiring in 3599 seconds
358464: Apr 2 12:59:48.420 EDT: IPSEC:(SESSION ID = 2127) (delete_sa) deleting SA,

Conditions:
This condition is observed in asr1002x-universalk9.03.15.00.S.155-2.S-std.SPA code.

Workaround:
Disable volume based rekey

Reduce the crypto ipsec security-association replay window-size to a value below 1024

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.5(2)S
Known Fixed Releases:
Bug Id:
CSCuu60301
Title:
ESP100 crash because of hardware interrupt
Description:

Symptom:
ESP/QFP crash on ASR1k running as LNS

Conditions:
No known trigger

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
15.4(3)S2.16
Known Fixed Releases:
Bug Id:
CSCur48133
Title:
ATM 3xOC3 SPA failed to program with IFCFG_CMD_TIMEOUT error
Description:

Symptom:
IFGTIMEOUT and ProcClient hogs message are seen after 8-10 hours of router uptime.

Conditions:
The Router is loaded with large number of ATM SPA (8 or more ATM SPAs) and very high VCs configure ( ~30K per slot ) and continuous session churns are done. After 8 - 10 hours the IGTIMEOUT continous IFGTIMEOUT message are seen, which brings the card down.

Workaround:
A shut followed by no shut on the few Interface brings the ATM card backup.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
15.3(3)S
Known Fixed Releases:
15.5(2.21)S0.2, 15.5(2.23)S
Bug Id:
CSCuu36926
Title:
XE316:IP Ping connectivity failure with atm_pmcr_pcr configs
Description:

Symptom:
While testing XE316 image with "xe35_atm_pmcr_pcr"(SPA-3XOC3-ATM-V2 & SPA-2CHT3-CE-ATM are used) feature in RP2 platform, observing IP ping failure.

Conditions:
Issue is seen in RP2 platform.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
15.5(3)S, 15.6(1)S
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论