| |
Bug Id: | CSCut01314 |
Title: | Uncheckout commits after DT ES3 image |
|
Description: | Symptom: Engineering Special image "ES3" was given to DT for deployment from on DT ES branch. Post ES3 image some DDTS were committed to DT ES branch which were found in local testing. In production DT observed and raised the DDTS for "Parent shape rate set to default value instead of ANCP." Since customer don't want any changes other than ES3 + above mentioned DDTS, other DDTS which were comitted post ES3 were unchecked out form DT ES branch, new ES4 image is generated and shared to DT.
Conditions: Other not required DDTS were removed from DT ES branch
Workaround: no work around
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S4 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq03915 |
Title: | Sessions are not getting Sync after manual failover : HA fails on ASR1K |
|
Description: | Symptom:
Session lost on standby after RPFO with 28k session. Conditions:
PPP session with qos policies Workaround:
No workaround More Info:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 03-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.3(3)S3.9, 15.3(3)S4 |
|
|
| |
| |
Bug Id: | CSCum22612 |
Title: | ASR1k IKE SA Stuck in MM_KEY_EXCH with RSA-SIG blocking new SAs with CAC |
|
Description: | Symptom: Since the ASR fails to send MM6 [being a responder] in the absence of a valid certificate, IKE SAs start leaking and hence get stuck in MM_KEY_EXCH state. Multiple MM_KEY_EXCH exist for a single Peer on the ASR, however the Peer does not retain any SAs for ASR in this case. Along with CAC for in-negotiation IKE SAs, these stuck SAs block any new SAs or IKE rekeys even after renewing the certificates on the ASR.
Conditions: This symptom is observed under the following conditions: - ASR acting as IKEv1 termination point [sVTI for example] and is a responder. - IKE authentication mode is RSA-SIG [Certificates]. - On the ASR, the ID-Certificate is either Expired or Not-present for a given sVTI tunnel - The ASR also has a IKE in-negotiation CAC of a certain value. Example: crypto call admission limit ike in-negotiation-sa 30
Workaround: Perform the following workarounds: a) Manually delete stuck SAs by using: clear crypto isakmp 12345 .. where 12345 is conn_id of a stuck SA. Repeat this for each stuck SA
b) Temporarily increase CAC to accommodate new SA requests: crypto call admission limit ike in-negotiation-sa 60
Further Problem Description: Found and Tested in Cisco Release XE 3.7.4/Cisco IOS Release 15.2(4)S4.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.2(1)IC273.175, 15.2(1)IC273.8, 15.2(2)EA1, 15.2(2.0)EA, 15.2(2.2.75)ST, 15.2(2.6.68)EA, 15.2(2.7.9)EA, 15.2(2.8.1)EA1, 15.2(4)GC1, 15.2(4)GC2 |
|
|
| |
| |
Bug Id: | CSCut33087 |
Title: | ASR1K:fman_fp and ucode crash seen with Flexvpn-systest profile |
|
Description: | Symptom: ucode crash occurs with Flexvpn-systest profile
Conditions: after configuring zone based firewall
Workaround: Problem is not observed with fresh XE3.15 image
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 04-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCup38743 |
Title: | ASR: NAT FTP ALG breaks the payload translation |
|
Description: | Symptom: FTP signalling goes through fine across the ASR in the broken state, but the FTP Data session ( for both active/passive) does not get established .
Conditions: ASR running any of the recent IOS XE code after 3.7.3 with CGN shows this problem after normal operations for about every 2-5 hours.
Workaround: 1. either clear all the NAT translations ( clear ip nat trans * ) 2. Reload the ESP 3. Issue is not seen on the IOS versions before XE 3.7.3 ( including)
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 04-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S3 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur42966 |
Title: | HW offload cfm up mep will timeout |
|
Description: | Symptom: HW offload cfm up mep can not work after timeout it will down ethernet cfm ieee ethernet cfm global ethernet cfm alarm notification all ethernet cfm domain same_domain level 2 service ser_2 evc evc_2 vlan 2 continuity-check continuity-check interval 10ms offload sampling 1000 *Oct 28 11:00:04.328 CST: %E_CFM-3-REMOTE_MEP_DOWN: Remote MEP mpid 4001 evc evc_2 vlan 2 MA name ser_2 in domain same_domain changed state to down with event code TimeOut. *Oct 28 11:00:04.333 CST: %E_CFM-6-REMOTE_MEP_UP: Continuity Check message is received from a remote MEP with mpid 4001 evc evc_2 vlan 2 MA name ser_2 domain same_domain interface status Up event code Returning
Conditions: *Oct 28 11:00:04.328 CST: %E_CFM-3-REMOTE_MEP_DOWN: Remote MEP mpid 4001 evc evc_2 vlan 2 MA name ser_2 in domain same_domain changed state to down with event code TimeOut. *Oct 28 11:00:04.333 CST: %E_CFM-6-REMOTE_MEP_UP: Continuity Check message is received from a remote MEP with mpid 4001 evc evc_2 vlan 2 MA name ser_2 domain same_domain interface status Up event code Returning
Workaround: none
Further Problem Description: Not exposed to customer as this is only possible with up mep over VPLS feature.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 05-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.5(1.15)S, 15.5(1.9)T, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuq85115 |
Title: | ASR1K enable "ip cef accounting non-recursive" cause fman_rp crash |
|
Description: | Symptom: ASR1K may reload unexpectedly due to fman_rp crash
Conditions: When "ip cef accounting non-recursive" was enabled
Workaround: Disable "ip cef accounting non-recursive"
Further Problem Description: Day 1 issue, exists in all releases. A imperfect internal logic will cause fman_rp database to generate un-used arrays while updating. And after a huge number of updates (which may take 10 days or even more, depend on your network stability), the number of un-used array will exceed hard coded limit hence causing the crash.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.2(2)S1 |
|
Known Fixed Releases: | 15.3(3)S5, 15.4(1)S3, 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuj39789 |
Title: | EDVT: normal cond: Error resolving active FRU: BINOS_FRU_RP |
|
Description: | Symptom:
Conditions: normal, intermittent, occurs in some (very rare) Cylon lc power-cycling.
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.1(0.1)S, 15.2(2)S, 15.3(3)S, 15.3(3.3)S3, 15.4(2)S, 15.5(1)S, 15.5(2)S |
|
Known Fixed Releases: | 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCun88636 |
Title: | Kingpin crashes on issuing "show plat hard slot 0 plim status int" |
|
Description: | Symptom: Kingpin crashes @ cmcc_2kp_cli_show_plim_status_cb
Conditions: Kingpin crashes while issuing "show plat hard slot 0 plim status int"
Workaround: -
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S |
|
Known Fixed Releases: | 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCur17225 |
Title: | Memory leak on ASR1k leads to a watchdog crash |
|
Description: | Symptom: Error messages pointing to a memory leak: %PLATFORM-3-ELEMENT_CRITICAL: SIP0: smand: RP/0: Committed Memory value 128% exceeds critical level 100% lead to a watchdog crash (in various functions - ARP, CDP)
Conditions: ASR 1001 running 3.13.0S
Workaround: Downgrade to 3.7.2S
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur76019 |
Title: | Router reloads when deleting a VLAN MEP with CFM diag debug on |
|
Description: | Symptom: delete a subinterface crash when there is a down mep session TAAS_1006_1#show ethernet cfm maintenance-points remote -------------------------------------------------------------------------------- MPID Domain Name MacAddress IfSt PtSt Lvl Domain ID Ingress RDI MA Name Type Id SrvcInst EVC Name Age Local MEP Info -------------------------------------------------------------------------------- 4001 same_domain 503d.e534.11bf Up Up 2 same_domain Gi0/1/3.2 - ser_1 BD-V 2 N/A evc_1 0s MPID: 8001 Domain: same_domain MA: ser_1
Total Remote MEPs: 1 TAAS_1006_1(config)#no interface gigabitEthernet 0/1/3.2
Conditions: Exception to IOS Thread: Frame pointer 0x46DA2328, PC = 0x17545238
UNIX-EXT-SIGNAL: Segmentation fault(11), Process = Virtual Exec -Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa :10000000+7545238 :10000000+7545B50 :10000000+7C4220 :10000000+43D7E28 :10000000+43BCF20 :10000000+435B198 :10000000+42CECAC :10000000+298CBE0 :10000000+2989640 :10000000+684048C :10000000+68406EC :10000000+683DCA4 :10000000+6846598 :10000000+6836F68 :10000000+6D8504 :10000000+6DF3C0
Fastpath Thread backtrace: -Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa c:638B000+DA078 c:638B000+DA058 iosd_unix:6539000+178FC prelib:FFD8000+31F4 pthread:5DBA000+5A4C
Auxiliary Thread backtrace: -Traceback= 1#6c1fea6ea742f2b52848e501595ab3aa pthread:5DBA000+B598 pthread:5DBA000+B578 c:638B000+EFB74 iosd_unix:6539000+25090 prelib:FFD8000+31F4 pthread:5DBA000+5A4C
PC = 0x17545238 LR = 0x17545B50 MSR = 0x0002D000 CTR = 0x17545AF4 XER = 0x00000000 R0 = 0x00000000 R1 = 0x46DA2328 R2 = 0x300A7C50 R3 = 0x00000000 R4 = 0x00000001 R5 = 0x00000100 R6 = 0x00000001 R7 = 0x00000000 R8 = 0x00000000 R9 = 0x18D30000 R10 = 0x00000009 R11 = 0x17545AF4 R12 = 0x42022422 R13 = 0x1AC851B0 R14 = 0x00000000 R15 = 0x00000000 R16 = 0x00000000 R17 = 0x1AC830F0 R18 = 0x00000000 R19 = 0x00000000 R20 = 0x1AC80000 R21 = 0x1AC80000 R22 = 0x00000001 R23 = 0x1A270000 R24 = 0x00000100 R25 = 0x00000000 R26 = 0x46DA24C8 R27 = 0x46DA23A0 R28 = 0x18D37A7C R29 = 0x18D37AD0 R30 = 0x00000000 R31 = 0x46DA23A0
Writing crashinfo to bootflash:crashinfo_RP_00_00_20141118-143235-CST
Workaround: make session down then delete the subinterface
Further Problem Description: none
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.5(1.12)T, 15.5(1.18)S, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuq86513 |
Title: | ASR 1k: Crash in packet classification |
|
Description: | Symptom: ASR1k running IOS 15.4(2)S1 crashed.
Conditions: NBAR configured
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S1.4 |
|
Known Fixed Releases: | 15.4(2)S2, 15.4(3)S1, 15.5(1)S, 15.5(1)T, 15.5(1.4)T, 15.5(2)S, 15.5(2)T |
|
|
| |
| |
Bug Id: | CSCuo85191 |
Title: | Satnby asr1k running CUBE application crashes at cc_free_feature_vsa |
|
Description: | Symptom: Crash is observed on ASR1000. Conditions: This symptom is observed when memory allocation fails. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.3(60.1)S |
|
Known Fixed Releases: | 15.3(3)M3.2, 15.3(3)M4, 15.3(3)S3.3, 15.3(3)S4, 15.4(2)S1.5, 15.4(2)S2, 15.4(2)T1.1, 15.4(2)T2, 15.4(3)M0.3, 15.4(3)M1 |
|
|
| |
| |
Bug Id: | CSCui88245 |
Title: | cpp_cp_svr crash @ cpp_bqs_srt_yoda_destroy_tree while adding Fair Queue |
|
Description: | Symptom: The CPP process on an ASR 1000 Series Aggregation Services Router could crash while adding fair-queue on the fly. This will result in a reboot of the active ESP within the chassis. In systems with integrated ESPs (such as the ASR 1002-X) this may result in a reload of the chassis.
Conditions: This crash occurs due to a timing issue when QoS configuration involving fair-queue is modified. This can occur when the configuration is being actively modified by a user, but has also been observed when a suspended policy is applied to an interface after boot.
Workaround: There is no workaround.
Further Problem Description: This issue is most likely to be seen when adding fair-queue to an existing QoS policy.
However, it has also been observed on boot when a suspended policy is applied to an interface. In this case, messages similar to the following may be observed shortly after system bring-up:
*Mar 27 11:59:07: %QOS-6-TUN_INSTALL: Installing suspended policy on Tunnel0. *Mar 27 11:59:07: %CPPOSLIB-3-ERROR_NOTIFY: SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#14ecdc91603b412e20039f6a927a9163 errmsg:7FE881875000+11E5 cpp_common_os:7FE884851000+D2C5 cpp_common_os:7FE884851000+D20E cpp_common_os:7FE884851000+1909E cpp_bqs_mgr_lib:7FE894E7F000+8FBCA cpp_bqs_mgr_lib:7FE894E7F000+8F448 cpp_bqs_mgr_lib:7FE894E7F000+717B6 cpp_bqs_mgr_lib:7FE894E7F000+7377E cpp_bqs_mgr_lib:7FE894E7F000+7F5EE cpp_bqs_mgr_lib:7FE894E7F000+71C8B cpp_common_os:7FE884851000+1681A cpp_clienti *Mar 27 11:59:07: %IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0 *Mar 27 11:59:25: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0.0 desc:CPP Client process failed: cpp_cp det:HA class:CLIENT_SW sev:FATAL id:1 cppstate:RUNNING res:UNKNOWN flags:0x0 cdmflags:0x0
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S |
|
Known Fixed Releases: | 15.2(4)S5, 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCum18039 |
Title: | Incorrect traffic rates follow by pend-ack while deleteing QoS classes |
|
Description: | Symptom: Traffic not flowing on a queue following QoS reconfiguration or new interface creation. Also possible inability to change QoS configuration on any interface or create new interfaces/sessions following occurrence of this condition.
Conditions: Queue was previously being over subscribed when it was deleted leaving it in a flowed off congested state such that it would never drain.
This issue affects ASR1K using ESP100 or ESP200, ASR1002X, and ASR1001X platforms only.
ASR1K using ESP5/10/20/40 and the ASR1001 and ASR1002 are unaffected by this issue/change.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 07-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S2, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCun10918 |
Title: | ASR1k: unable to bring up ppp session due to object pending in hqf cce |
|
Description: | Symptom: Issue PPP subscribers cannot be terminated in ASR1K, due to object locked
Conditions: EVSI Delete Errors: Out-of-Order 0, No dpidb 0, Underrun 0, VAI Recycle Timeouts 90215 =======> large number of VAI recycle timeouts EVSI wrong dpidb type errors 0 EVSI Async Events: Total 92754, HW error 88050 =======> large number of HW errors as well
Workaround: remove QOS of the ppp
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 07-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S2 |
|
Known Fixed Releases: | 15.3(3)S3, 15.4(1)S2, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCus22393 |
Title: | ASR 1001- fman_fp_image crash in DMVPN environment |
|
Description: | Symptom: hw sw asr1001-universalk9.03.11.00.S.154-1.S-std ASR1001
Last reload reason: LocalSoft
IP0: cpp_ha: CPP:0.0 desc:CPP Client process failed: FMAN-FP det:HA class:CLIENT_SW sev:FATAL id:1 cppstate:RUNNING res:UNKNOWN flags:0x0 cdmflags:0x0 Dec 04 2014 02:30:08 SIP0: pvp.sh: A critical process fman_fp_image has failed (rc 134) Dec 04 2014 02:29:03 SIP0: cpp_cp: cpp_ipsec_get_new_offset failed freelist get - Cannot allocate memory Dec 04 2014 02:29:03 Card (fp) offline in slot F0 Dec 04 2014 02:29:03 SIP0: cpp_cp: cpp_cp encountered an error -Traceback= 1#52aa951580f021601c28ee288b053647 errmsg:7F7E30CE4000+121D cpp_common_os:7F7E33D15000+E005 cpp_common_os:7F7E33D15000+DF04 cpp_common_os:7F7E33D15000+1A02E cpp_ipsec_svr_lib:7F7E44C8F000+24318 cpp_ipsec_svr_lib:7F7E44C8F000+2D37F cpp_ipsec_svr_lib:7F7E44C8F000+14118 cpp_common_os:7F7E33D15000+124B8 cpp_common_os:7F7E33D15000+11F15 cpp_common_os:7F7E33D15000+11D5B evlib:7F7E32CDE000+B8E7 evlib:7F7E32CDE000+E Dec 04 2014 02:28:43 Packet dropped due to input queue full Dec 04 2014 02:27:43 Packet dropped due to input queue full
You see these kind of issues on a asr platform running asr1001-universalk9.03.11.00.S.154-1.S, being particular this is seen in a DMVPN environment, with a process crash .
Conditions: none
Workaround: none right now
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 07-MAY-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCth57929 |
Title: | ASR:FP reloads w/ abort in chunk_prepare_data when incr nat bindmib stat |
|
Description: | Conditions Under Which the Problem Occurs: On ASR1k series routers having NAT configurations and SNMP.
Symptoms: If we have lots of NAT related configurations and when we try to poll the MIBS, we may see the following exceptions, when forwarding processor(FP) reloads: CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x0 %CPPHA-3-FAULTCRASH: F0: cpp_ha: CPP 0 unresolved fault detected, initiating crash dump. Workaround: 1.Remove SNMP related configuration from the router, so that we don't poll the router. 2.Another possible Workaround is changing ip nat translation timeout 60 to ip nat translation timeout 90.We can have some race conditions seen, when bind timeout is same as session default timeout.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 07-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNE2 |
|
Known Fixed Releases: | 15.0(1)S |
|
|
| |
| |
Bug Id: | CSCun41391 |
Title: | FP crash on ASR1k after upgrade from 3.7.2S to 3.11.0S |
|
Description: | Symptom: FP crash after the IOS-XE upgrade to 3.11.0S
Conditions: ASR1k router running 3.11.0S Crypto map is configured on one of the interfaces. NBAR is configured via ip nbar protocol discovery on one or more interfaces.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.2(2)E, 15.2(2)E1, 15.2(2)SA, 15.2(2)SA1, 15.2(2)SA2, 15.2(2)SNI, 15.2(2a)E1, 15.2(2b)E, 15.2(3)E, 15.2(4)GC |
|
|
| |
| |
Bug Id: | CSCuq14700 |
Title: | TDL message buffers memory leak |
|
Description: | Symptom: memory leaking in mcp_dev - cpp_packet_drop_count_entry TDL message buffers.
Conditions: normal
Workaround: none
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S4.9 |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCus43594 |
Title: | rp crash when cleanup vpls scale configuration |
|
Description: | RP crashed when doing config replace with a cleanup config.
Symptom:
Conditions: Scale vpls bgp signaling config.
Workaround: No.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.3(3)S5.1, 15.4(3)M2.1, 15.4(3)S2.1, 15.5(1)S0.10, 15.5(1)S1, 15.5(1)SN1, 15.5(1)T1.1, 15.5(1.18)S0.9, 15.5(1.21)PI28d, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCut06783 |
Title: | Fortitude NIM does not come up on ASR1001x |
|
Description: | Symptom: NIM not coming up on XE315 boot up
Conditions: While booting the Nightster router with XE315 image, NIM not coming up.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCty83335 |
Title: | PPPoGEC: FP crashes when SPA reload on LNS |
|
Description: | Symptom:
ESP reload on an ASR1000 Series Router
Conditions:
This has been seen with QoS configured on a Tunnel interface. Then the interface flaps between two GigE interfaces.
Workaround:
None at this time.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.2(1)S2, 15.2(4)S |
|
Known Fixed Releases: | 15.2(4)S |
|
|
| |
| |
Bug Id: | CSCuc65437 |
Title: | XE38: FP80: cpp_cp_svr crash @ cpp_qm_event_delete_check_parent |
|
Description: | Symptom: cpp_cp_svr crash seen Conditions: on removing service-policy from main int Workaround: n/a |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCun09640 |
Title: | cpp_cp and fman_fp crash when applying child policy to parent QoS |
|
Description: | Symptom: The following errors are seen when adding a child policy to a parent policy while configuring hierarchical QoS.
%CPPOSLIB-3-ERROR_NOTIFY: F0: cpp_cp: cpp_cp encountered an error %CPPOSLIB-3-ERROR_NOTIFY: F0: fman_fp_image: fman-fp encountered an error %PMAN-3-PROCHOLDDOWN: F0: pman.sh: The process cpp_ha_top_level_server has been helddown (rc 69) %PMAN-3-PROCHOLDDOWN: F0: pman.sh: The process cpp_cp_svr has been helddown (rc 134)
This can result in a ESP (F Fabric) reload, causing a traffic outage
*Feb 13 07:39:05.829: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
Conditions: 1. An interface with a service-policy applied. 2. Replacing the child policy on the parent hierarchical policy applied to the interface.
Workaround: Remove the policy from the interface before making the changes to the child/parent policy then reapply the policy to the parent.
OR
If you issue the no command to remove the child policy from the parent and then query for pending configuration obects using the "show platform software object-manager fp active statistics" command to make sure there are no pending objects, then issue the service-policy to add the new child policy to the parent, you will not see the ESP crash.
Further Problem Description: When replacing the child policy configured on a parent policy applied to an interface, the ESP may crash.
conf t policy-map parent class class-default no service-policy child_A service-policy child_B end
Using a file, that replace a child policy, copied from the harddisk of the router to the running configuration will almost always cause the ESP to crash. If file is copied from tftp, it is less likely. If using CLI to replace the child policy, crash has not been experienced, but can not be completely ruled out. The issue is heavily based on timing and how fast the "no service-policy child_A" and "service-policy child_b" are processed together.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S1, 15.4(1)S |
|
Known Fixed Releases: | 15.2(4)S6, 15.3(3)S3, 15.4(1)S2, 15.4(2)S |
|
|
| |
| |
Bug Id: | CSCus32530 |
Title: | ASR1K ESP crash in internal L4R removal feature routine |
|
Description: | Symptom: This crash is caused by Layer 4 redirect service removal on an IP or PPP sessions and is triggered by an internal race condition.
Conditions: The crash can be caused by a normal session deletion scenario but it is most easily reproduced when a subscriber template is deleted.
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S3.9 |
|
Known Fixed Releases: | 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuu25883 |
Title: | %FMANRP_ESS-3-ERREVENT: No TC classifcation feature installed yet on... |
|
Description: | Symptom: Customer after IOS upgrade observes a lot of messages and complains from pppoe subscribers: 001473: May 5 07:14:34: %FMANRP_ESS-3-ERREVENT: No TC classifcation feature installed yet on the session can't install features until then, feature id (0x1AF7A83) -Traceback= 1#2e6a96687e66331b863fd4fedb6e3c93 :10000000+7488AC :10000000+748C5C :10000000+5BDC7C0 :10000000+5BFBA04 :10000000+5BDAF20 :10000000+22232A4 :10000000+22353D4 :10000000+66B10CC :10000000+66B1194 :10000000+2235674 :10000000+2235C8C :10000000+221C608 :10000000+221D02C :10000000+22119A4 :10000000+2213714
Conditions: configured ISG (pppoe) on ASR1000, version of IOS-XE is 3.10.5.S
Workaround: none
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 09-MAY-2015 |
|
Known Affected Releases: | 15.3(0.1) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut43318 |
Title: | QoS on VA - TCAM leak on remote interface flap |
|
Description: | Symptom: Initial symptoms are hardware TCAM being exhaust, given sufficient time, all available memory is used and the router crashes.
Conditions: Currently reproduced by flapping the remote end of the link attached to the device experience the TCAM leak.
Workaround: None currently identified
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 11-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S1.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuj25418 |
Title: | ASR1K: cpp_cp_svr crash@cpp_bqs_rm_yoda_unplace_and_destroy_srt_obj |
|
Description: | Symptom: The ESP-100 and ASR1K-2X crash when flat policies are applied on both the tunnel and the destination sub-interface. This issue is observed when QOS is applied first on the tunnel then on the sub-interface as follows:
policy-map tunnel-shaper class class-default shape aver per 20
policy-map sub-int-shaper class class-default shape ave per 90
Be sure the tunnel is active and pointing to the sub-interface with QoS applied before applying the sub-interface policy. See the attached repro-steps for details.
int tunnel1 service-policy out tunnel-shaper
int g2/3/0.100 service-policy out sub-int-shaper
Conditions: When a sub-interface policy is applied after QoS is active on a tunnel, the tunnel is reparented from the current aggregation node to the sub-interface node. Since reparenting a leaf node requires adding a temporary node in the hierarchy to be able to move flow-control gracefully, the logic to detach the source leaf node from the temporary node was missing. As a result, the code generated a fatal error while attempting to free the temporary node before it is empty.
Workaround: No known workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 11-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S |
|
Known Fixed Releases: | 15.2(4)S5, 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCur57035 |
Title: | ASR 1k crash on __be_bfd_fib_nh_change_cb |
|
Description: | Symptom: IOS crash
Conditions: ASR running 15.3(1)S1 with bfd
Workaround: none at this time
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S1 |
|
Known Fixed Releases: | 15.3(3)S4.16, 15.3(3)S5, 15.4(3)M2.2, 15.4(3)S2.14, 15.5(1)S1.1, 15.5(1)SN1, 15.5(1.21)PI28a, 15.5(1.21)T, 15.5(2)S, 15.5(2.5)S |
|
|
| |
| |
Bug Id: | CSCuo95313 |
Title: | Duplicate Lcookies in every Access-Request |
|
Description: | Symptom: Duplicate cookies are observed in every access request. Conditions: This symptom occurs when multilogon or logoff is performed on the same session. Workaround: Tear down the session during the logoff event. Do not configure any delay on the account logoff event.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S2.9 |
|
Known Fixed Releases: | 15.0(1)EZ4, 15.0(1.77)ZSR, 15.0(13.95)EZD, 15.0(14.1)TSR, 15.0(14.18)TTT, 15.0(14.57)EZD, 15.0(2.29)ZSR, 15.2(1)IC273.113, 15.2(2)DB101.101, 15.2(2)DB101.112 |
|
|
| |
| |
Bug Id: | CSCus76560 |
Title: | ASR1k port-channel down when doing "redundancy force-switchover" |
|
Description: | Symptom: when doing "redundancy force-switchover", Port-channel brings down instantaneously.
Conditions: If the port-channel has the config, "lacp rate fast"
Workaround: None
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 12-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S3.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut68598 |
Title: | ASR1k BFD randomly down at NAT configured interface |
|
Description: | Symptom: ASR1k BFD randomly down at NAT configured interface
Conditions: At ASR1k's BFD interface, NAT is also configured
Workaround: None at this time
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 13-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S2.1, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus72566 |
Title: | ASR1K:Continuous RP crash on booting with no startup config. |
|
Description: | Symptom: RP1 images crashes during booting due to watchdog timeout with the following log:
IOSXE-WATCHDOG: Process = Wait on Autoinstall -Traceback= 1#8ddf415bfca308ca6e02c2f05e77ec5d :10000000+3910624 :10000000+39112BC :10000000+39112BC :10000000+390CE30 :10000000+390D25C :10000000+2C8F5AC Writing crashinfo to bootflash:crashinfo_RP_00_00_20150130-001106-UTCJan 30 00:12:18.427 R0/0: %PMAN-3-PROCHOLDDOWN: The process linux_iosd-image has been helddown (rc 142) Jan 30 00:12:18.770 R0/0: %PMAN-0-PROCFAILCRIT: A critical process linux_iosd_image has failed (rc 142) Jan 30 00:12:19.101 R0/0: %PMAN-3-RELOAD_RP_SB_NOT_READY: Reloading: Fault on Active RP bay but Standby RP bay is not ready Jan 30 00:17:28.043 R0/0: %PMAN-0-PROCESS_NOTIFICATION: The process lifecycle notification component failed because remote core dump timeout Jan 30 00:17:28.340 R0/0: %PMAN-5-EXITACTION: Process
Conditions: This is observed on ASR RP1 running 15.4(3)S2 while booting the image after a 'erase startup'.
Workaround: change the config register to 0x2142 and boot
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 13-MAY-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCun06260 |
Title: | XE3.13 Gatekeeper Hardening |
|
Description: | Symptom: High latency observed in customer network.
Conditions: Under certain conditions, particularly under forced test conditions, it is possible to create scenarios where flow lock contention will be very high because of NAT gatekeeper failures. This happens when a large amount of traffic that does not need to be NAT'd is sent through an interface that has NAT configured. Most traffic hitting a NAT interface should be sent through NAT. If not, it will cause issues around 1Gb of traffic.
Workaround: ASR1000(config)#ip nat service gatekeeper
After this, we can manually configure the size of the cache. The recommended starting point is 64K for now. Here is the command to configure the cache to be 64K:
ASR1000(config)#ip nat settings gatekeeper-size 64000
From here we can monitor the latency using the ping as before. We can monitor the actual entries in the cache using the following commands:
Show platform hardware qfp active feature nat datapath gatein activity Show platform hardware qfp active feature nat datapath gateout activity
If needed we can clear the statistics by adding clear to the end of the two commands above to get a better idea of where we are at. Depending on what we are seeing with latency, we can fine tune the cache size later as well to try to reach optimum performance. Changing the cache size should not be service impacting. However, we recommend doing it during a maintenance window to be safe.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 13-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S, 15.3(3)S, 15.4(3)S, 15.5(2)S |
|
Known Fixed Releases: | 15.3(3)S3.6, 15.3(3)S4, 15.4(1)S2.18, 15.4(1)S3, 15.4(2)S2, 15.4(2.1.2)S, 15.4(2.15)S, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1 |
|
|
| |
| |
Bug Id: | CSCtu47871 |
Title: | ASR crashes without crashinfo , and last reload reason :watchdog |
|
Description: | Symptom: ASR crashes without crashinfo and last reload reason as watchdog.
Conditions: Happened once and not been reproducible.
Workaround: None
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 13-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur31425 |
Title: | ASRNAT: PPTP ALG: Incorrect UNNAT of Peer-Call-ID in Outgoing-Call-Reply |
|
Description: | Symptom: ASR1k PAT may not function properly for PPTP. PPTP control connection is not established.
Conditions: This was first found in XE3.10.3. The sequence of events which can lead to this failure:
- PPTP ALG is disabled; - PPTP clients try to connect, but fail; - PPTP ALG is enabled with "ip nat service pptp"; - PPTP clients are still unable to connect to PPTP server.
Workaround: Use "clear ip nat translations *" after enabling PPTP NAT ALG.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 14-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S3, 15.4(2)S, 15.4(3)SS |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCup48518 |
Title: | FTP ALG create incomplete token in case of EPSV passive |
|
Description: | Symptom: FTP ALG create incomplete token in case of EPSV passive
Conditions: nat+FW+FTP EPSV
Workaround: n/a
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 14-MAY-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCut03205 |
Title: | SPA modules on ASR1002-X show "missing" under show platform output |
|
Description: | Symptom: When a new/compatible SPA module is inserted in a ASR1002-X chassis in certain cases it may exhibit one of the following symptoms:
1) SPA module shows "missing" under "show platform" output
Slot Type State Insert time (ago) --------- ------------------- --------------------- ----------------- 0 ASR1002-X ok 12w0d 0/0 6XGE-BUILT-IN ok 12w0d 0/1 SPA-8XCHT1/E1 missing 5w4d
2) Shows as "Out Of Service". Not to be confused for an existing module which might have failed and shows "out of service".
Chassis type: ASR1002-X
Slot Type State Insert time (ago) --------- ------------------- --------------------- ----------------- 0 ASR1002-X ok 12w0d 0/0 6XGE-BUILT-IN ok 12w0d 0/1 SPA-8XCHT1/E1 out of service 5w4d
3) Does not show at all under "show platform" or "show inventory" and no logs are generated when its inserted/removed. The following command will confirm if the router sees it and its state: # show platform hardware slot 0 spa stat
Bay SPA Type State PST POK SOK PENB RST DENB HSS ------------------------------------------------------------------------------- 0 6XGE-BUILT-IN Online 0 1 1 1 1 0 1 1 Unknown Detection 0 0 0 0 0 1 0 <<< 2 Empty Detection 1 0 0 0 0 1 0 3 Empty Detection 1 0 0 0 0 1 0
Conditions: Has been seen only when a SPA is installed for the first time in a ASR1002-X chassis.
Workaround: The SPA in this case should come online after a reboot.
Further Problem Description: The same SPA modules work without any issues on other ASR1K chassis.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 15-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut46706 |
Title: | ASR 1K - CPP uCode Crash Due to Abort on chunk_free_part2() |
|
Description: | Symptom: ASR 1K may experience a CPP uCode crash due to a corrupt chunk used by SRTP.
Conditions: None known.
Workaround: None known.
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 15-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut17865 |
Title: | ASR1K:13RU IOSd crash @PnP Agent Discovery after router reload |
|
Description: | Symptom: IOSd crash occurs at PnP Agent Discovery
Conditions: after doing write erase and reload
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 15-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.2(1)IC273.310, 15.2(1)SY0.4, 15.2(1)SY1, 15.2(2)ID101.131, 15.2(2)IE101.142, 15.2(3)E1, 15.4(3)M2.2, 15.4(3)S2.7, 15.5(1)S1.1, 15.5(1)SN1 |
|
|
| |
| |
Bug Id: | CSCug42528 |
Title: | ASR1000-ESP10 stops forwarding traffic, HAL_PKTMEM-2-OUT_OF_RESOURCES |
|
Description: | Symptom: ESP stops forwarding traffic with following error messages:
Mar 26 17:11:38.504 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:089 TS:00006032009661609351 %HAL_PKTMEM-2-OUT_OF_RESOURCES: Mar 26 17:12:38.536 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:019 TS:00006032069706815681 %HAL_PKTMEM-2-OUT_OF_RESOURCES: Mar 26 17:13:38.907 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:107 TS:00006032130075669937 %HAL_PKTMEM-2-OUT_OF_RESOURCES: Mar 26 17:14:38.987 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:103 TS:00006032190158892360 %HAL_PKTMEM-2-OUT_OF_RESOURCES: Mar 26 17:15:43.939 UTC: %IOSXE-2-PLATFORM: F0: cpp_cp: QFP:0.0 Thread:123 TS:00006032250425485709 %HAL_PKTMEM-2-OUT_OF_RESOURCES:
Service was recovered after the router reload, however monitoring shows a stable trend in PKTMEM utilization:
stj-core-r01#sh platform hardware qfp active bqs 0 packet-buffer utilization Packet buffer memory utilization details: Total: 128.00 MB Used : 87.65 MB Free : 41322.50 KB
Utilization: 68 % <--------- rising constantly
Threshold Values: Out of Memory (OOM) : 127.96 MB, Status: False Vital (> 98%) : 125.44 MB, Status: False Out of Resource (OOR) : 108.80 MB, Status: False
Conditions: unknown
Workaround: unknown
More Info:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 16-MAY-2015 |
|
Known Affected Releases: | 3.6(0) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCua27722 |
Title: | Netflow timestamps drifts compared to NTP |
|
Description: | Symptom: Netflow TimeStamp may show time drift compared to NTP time. This effect has been judged to be equal to about 50 seconds of lost time per day.
Conditions: Flexible or Traditional Netflow running on either an ESP40 based Forwarding Processor or on any ASR1000 platform.
Workaround: There is no workaround but when the time skew exceeds 10 minutes it should self correct.
Further Problem Description: A complete fix for this issue is addressed in a ROMMON upgrade. ROMMONs 15.2(4r)S1 and newer contain the fix Along with an upgrade of the XE version to a release that has the fix incorporated.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S1, 15.4(3)S |
|
Known Fixed Releases: | 15.2(4r)S1, 15.3(1.3)S, 15.3(2)S, 15.3(2)S1, 15.3(2)S1b, 15.3(2)S1c, 15.3(2)S2, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a |
|
|
| |
| |
Bug Id: | CSCut65374 |
Title: | PTP Leap Second: ASR1002-X incorporate leap second addition 6/30/15 |
|
Description: | Symptom: There are periodic leap second events which can add or delete a second to global time. The leap second event can be propagated via Precision Time Protocol (PTP) if configured.
When the leap second update occurs and the device is configured to use PTP as a Boundary Clock (BC) then an incorrect Coordinated Universal Time (UTC) offset and PTP Leap Indicator could propagate incorrect time downstream. This could cause the PTP network time to be off as much as thirty five seconds.
Conditions: The leap second update is propagated from the configured PTP Grandmaster clock.
A Cisco device running the PTP protocol would have the "feature ptp" command in the running configuration.
Workaround: For this problem of the incorrect PTP UTC offset and Leap Second update flag for Cisco devices configured as a PTP boundary clock the following workaround can be used:
1. Increase the Time To Live (TTL) on the IPV4 multicast PTP frames from the PTP Grand Master clock from the default of one (1) to something higher than the number of multicast hops the PTP packets would have to traverse in the network to reach the Cisco device.
2. Disable PTP on the affected cisco devices configured as PTP boundary clocks.
3. If the now disabled Cisco devices configured as a PTP boundary clock supports Internet Group Management Protocol (IGMP) snooping then nothing additional is required. If the device does not support IGMP snooping then static multicast Content Addressable Memory (CAM) entries would need to be created for the devices downstream which need the PTP frames from the PTP Grand Master clock.
If this workaround cannot be implemented than an upgrade is recommended.
Further Problem Description: N/A
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 18-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuc27517 |
Title: | ASR1001 : Permanent license disappear after IOS upgrade |
|
Description: | Symptom: Permanent license disappear after IOS upgrade or downgrade.
Conditions: ASR1001 IOS XE upgrade/downgrade
Workaround: This is not a workaround for devices that have already been upgraded, but when doing any future upgrades do a license save from 3.4 before upgrade and re-install in 3.6+
In 3.4, save all the licenses to a file to bootflash 1RU#license save
in 3.6+, install back all the licenses from the file 1RU#license install
======================================================================= [use below workaround from 03.05.02 (15.2(1)S2) or older]
ASR1001#license save file bootflash:1RU_34_36_ENFORCE_LICENSE_MIGRATION
========================================================================
With this commit (just provide you another way to avoid this happening): from 03.07.03 (15.2(4)S3) or later from 03.09.00 (15.3(2)S) or later from 03.08.02 (15.3(1)S2) or later
To avoid this happen, you have to create a file in bootflash called "1RU_34_36_ENFORCE_LICENSE_MIGRATION" to enforce migration of all the licenses before the upgrade process. The file will be removed automatically after the license migration. example: 1RU#license save file bootflash:1RU_34_36_ENFORCE_LICENSE_MIGRATION
For the routers which already hit the issue, customers can either try to reinstall the licenses or downgrade to 34, create the file in bootflash and upgrade with 36 or later image with this fix again. ============================================================================
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S, 15.2(2)S1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCub62988 |
Title: | ASR_crash due to in aom_set_link array full |
|
Description: | Symptom: Consecutive crashes are occurring with the ESP.
Conditions: Issue may be seen on an ASR1K with flapping prefixes or churn.
Workaround: There is no workaround
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.2(2)S, 15.3(1)S |
|
Known Fixed Releases: | 15.1(3)S5, 15.2(4)S0.1, 15.2(4)S1, 15.3(1)S, 15.3(2)S |
|
|
| |
| |
Bug Id: | CSCtz69986 |
Title: | ASR 1k memory leak |
|
Description: | Symptoms: The Cisco ASR 1000 router's ESP free memory slowly decreases over time (~ 7MB per day).
Conditions: This symptom occurs when WCCP is configured on interfaces.
Workaround: There is no workaround, unless the WCCP interface configuration is removed.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.2(2)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(2)S1, 15.2(4)S |
|
|
| |
| |
Bug Id: | CSCuu36411 |
Title: | ASR1k - 16k Policy-Map - active RP crash with 10k PM |
|
Description: | Symptom: active RP crash when more than 10 K Policy-maps are installed
Conditions: scale testing: 15 K ppp sessions with 10 K policy-maps
Workaround: n/a
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq77051 |
Title: | out of ids when configuring xconnect |
|
Description: | Symptom: Attempting to create or modify a xconnect context using the command l2vpn xconnect context command may fail with the error message:
%IDMGR-3-INVALID_ID: bad id in id_get (Out of IDs!) (id: 0x0)
Conditions: This symptom has been observed after entering and exiting xconnect context sub-modes many times (over 65000) over an extended period of time.
Workaround: There is no workaround. Once this error occurs, the router must be reloaded.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.3(3)S4.2, 15.3(3)S5, 15.4(3)M2.1, 15.4(3)S0.7, 15.4(3)S1, 15.4(3)S2, 15.4(3)SN1a, 15.5(0.18)S0.6, 15.5(0.22)T, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCut22976 |
Title: | ASR1k crash during monitor capture export FTP |
|
Description: | Symptom: Crash while exporting capture to FTP server
Conditions: -Monitor packet capture enabled. -Two simultaneous CLI sessions exporting capture to FTP
Workaround: Don't use two sessions to export capture
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S |
|
Known Fixed Releases: | 15.4(3)S2.9, 15.5(1)S1.1, 15.5(2)S0.2, 15.5(2.18)S |
|
|
| |
| |
Bug Id: | CSCus46259 |
Title: | ASR1k (ISG Radius-Proxy): Memory Leak after excessive client roaming |
|
Description: | Symptom: The memory leak increase slowly during client roaming. Meaning a client roams on a hotspot from Subnet A to B and receives a new IP-Address and the ISG (ASR1k with radius-proxy feature enabled) creates a new session for the client and the old session is deleted due to accounting stop.
Conditions: Radius-Proxy feature is enabled on the ISG and clients are using EAP-SIM
Workaround: None. Booting the ASR1k if he used up 3.5GB of memory otherwise the box won't accept any furhter new sessions.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S3, 15.4(3)S |
|
Known Fixed Releases: | 15.4(3)S2.3, 15.5(1)S1.3, 15.5(1.18)S0.12, 15.5(2)S, 15.5(2.12)S |
|
|
| |
| |
Bug Id: | CSCuo36917 |
Title: | XE3.12 DPSS : CFT returns out of memory error under load |
|
Description: | Symptom: When handling greater than 50000 concurrent flows, the following error is seen by dpss_mp:
src/main/onep_dpss_engine.c:1482: cft_handle_packet() returned error [2]:out of memory
Packets associated with flows greater than 50000 do not have the flow action applied and are returned to the router without being sent to the onePK application.
Conditions: - ASR 1000 platform running IOS XE - More than 50000 uni-directional flows established
Workaround: None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S |
|
Known Fixed Releases: | 15.2(1)IC273.212, 15.2(3)E1, 15.5(1)S0.7, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S0.5, 15.5(1.8)T, 15.5(2)S, 15.5(2.2)S, 7.0(3)I1(0.198) |
|
|
| |
| |
Bug Id: | CSCut68925 |
Title: | Crash seen in QOS when policy-map without child or turbo svc is used |
|
Description: | Symptom: Issue happens when there is no child policy attached to the parent policy and the get_bw api is called.
Conditions: same as symptoms
Workaround: no work around
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | 15.5(2.21)S0.4, 15.5(2.22)S, 16.1(0.237) |
|
|
| |
| |
Bug Id: | CSCub04345 |
Title: | Memory leak after applying ip sla path-echo and path-jitter config |
|
Description: | Symptoms: ASR-1002-X freezes after four hours with an scaled "path-jitter" sla probe configuration.
Conditions: The symptom is observed with scaled "path-jitter" sla probe configuration.
Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M, 15.3(1)S, 15.3(1)T |
|
Known Fixed Releases: | 12.2(58)EZ, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.0(5.0)SG1, 15.0(5.0.26)SG |
|
|
| |
| |
Bug Id: | CSCur46656 |
Title: | 3.10.4S-UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task |
|
Description: | Symptom: Crash on ASR with the log : UNIX-EXT-SIGNAL: Segmentation fault(11), Process = IOSD ipc task
Conditions: All the following conditions should be met : Code 3.10.4S and beyond 3.11.3S and beyond 3.12.2S and beyond 3.13.1S and beyond 3.14.1S and beyond 3.7.6S and beyond SPA Module : SPA-4XT3/E3 the following configs : snmp-server enable traps ds3
Workaround: Booting the device without the following configs :
snmp-server enable traps ds3
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S4 |
|
Known Fixed Releases: | 15.3(3)S4.11, 15.3(3)S5, 15.4(2)S2.15, 15.4(2)S3, 15.4(3)S1.4, 15.4(3)S2, 15.5(1)S0.6, 15.5(1)S1, 15.5(1)SN1, 15.5(1.15)S |
|
|
| |
| |
Bug Id: | CSCut50228 |
Title: | ASR1001-X ping loss with peer ASR1k at fixed speed 10M |
|
Description: | Symptom: ASR1001-X ping loss with peer ASR1k at fixed speed 10M and half-duplex
This issue is specific to ASR1001-X and will not be seen in ASR1001
Conditions: Only half-duplex could trigger this issue when ping big packet like 1280 and could be seen at the setup below:
1)ASR1001-X (0/0) <---> other ASR1k 2)ASR1002-X (0/0) <---> ASR1002-X (0/0) 3)ASR1002-X (0/0) <---> other ASR1k
For 1) this bug will fix it. For 2) ASR1002-X 0/0 MAC does not support half-duplex in 10/100M 3) same as 2
Workaround: None
Further Problem Description: This issue is specific to ASR1001-X box with half-duplex in any other 1G ports of 0/0 "only"
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S, 15.4(3)S2.1 |
|
Known Fixed Releases: | 15.4(3)S2.16, 15.5(1)S1.1, 15.5(2)S0.8 |
|
|
| |
| |
Bug Id: | CSCuh62266 |
Title: | ASR1000-WATCHDOG: Process = SNMP ENGINE - Crash |
|
Description: | Symptom: During normal operation, the Cisco ASR 1000 router may crash after repeated SNMP related watchdog errors.
Jun 15 2013 10:43:30.325: %SCHED-0-WATCHDOG: Scheduler running for a long time, more than the maximum configured (120) secs. -Traceback= 1#6d024ee43b83b4f5539a076aa2e8d467 :10000000+56A5348 :10000000+20F7D54 :10000000+2513910 :10000000+20F807C :10000000+20EBE84 :10000000+2119BA8 :10000000+20EBE84 :10000000+2106C24 :10000000+20EBE84 :10000000+213C9E8 :10000000+213CC34 :10000000+225B748 :10000000+222941C :10000000+2214314 :10000000+224812C -Traceback= 1#6d024ee43b83b4f5539a076aa2e8d467 :10000000+21416F0 :10000000+2513910 :10000000+20F807C :10000000+20EBE84 :10000000+2119BA8 :10000000+20EBE84 :10000000+2106C24 :10000000+20EBE84 :10000000+213C9E8 :10000000+213CC34 :10000000+225B748 :10000000+222941C :10000000+2214314 :10000000+224812C
Conditions: This symptom occurs while trying to obtain data from IP SLAs Path-Echo (rttMonStatsCollectTable) by SNMP polling operation. Workaround: There is no workaround other than to disable SNMP configuration from the router. More Info: This crash occurred in a customer environment and device with a particular version of the software (Cisco IOS Release 15.1(2)S2). No other similar issue has been identified so far.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S2 |
|
Known Fixed Releases: | 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.1(1)ICA4.122, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EX0.2, 15.2(1)EY |
|
|
| |
| |
Bug Id: | CSCut82336 |
Title: | ASR1002-X: Handle leap second in ToD IN |
|
Description: | Symptom: Time of day variation between master and source when ASR1002-X is used as ToD IN from 30 June 2015.
There will be one second difference between ASR1002-X master and slave, with the actual UTC time.
ASR1002X#show platform software ptpd tod PTPd ToD information:
Time: 04/21/15 09:07:02
ASR1002X#
There will be one sec difference in above time and the actual UTC time.
Conditions: ToD input is used to synchronize time-of-day.
When ASR1002-X acts as a MASTER in ordinary clock configuration, it takes 10M or 2M for frequency synchronization and ToD input from symmetricom for ToD synchronization.
This frequency and ToD is transmitted to other PTP Boundary clocks and slave clocks for synchronization.
Due to leap second, when UTC Offset increases by one second, MASTER PTP Clock does not handle that. So, there is a difference between actual UTC time and the time transmitted by PTP Master.
Config ----------- ptp clock ordinary domain 0 tod R0 ntp input 1pps R0 clock-port master master transport ipv4 unicast interface Lo0 negotiation
Workaround: None
Further Problem Description: See CSCut65374 for details.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCua99409 |
Title: | Fman crash with IPsec/Double ACL |
|
Description: | Symptom:
ESP reload with fman-fp error.
Conditions:
unconfig crypto map from interface, when there is double ACL in the crypto map
Workaround:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.2(4)S1, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCut68825 |
Title: | PFRv3: unexpected byte loss reported due to TCP packet flow out of order |
|
Description: | Symptom: Current TCP BYTES LOSS metric's implementation assumes there is no tcp packet reordering. Thus in case of reordering the loss is reported.
Conditions: TCP packets' reordering.
Workaround: Prevent TCP packets' reordering.
Further Problem Description: Given customer's network contains the equipment from different vendors preventing reordering is not always feasible. The metric should handle the out of order cases.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S2.3, 15.5(2)S0.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCto47524 |
Title: | Memory Leak in IP SLAs Responder |
|
Description: | Symptoms: A Cisco ASR 1002 router that is running Cisco IOS Release 15.1(1)S1 may have a processor pool memory leak in IP SLAs responder.
A show process memory sorted command may initially show "MallocLite" growing. By disabling malloclite with the following:
config t no memory lite end
One may start to see process "IP SLAs Responder" growing. In at least one specific case, the leak rate was 80mb per day.
Conditions: This symptom is observed on a Cisco ASR 1002 router.
Workaround: Disable IP SLA on affected router, if possible.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.1(1)S1 |
|
Known Fixed Releases: | 12.2(58)EY2, 12.2(58)EZ, 12.2(58)SE2, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6 |
|
|
| |
| |
Bug Id: | CSCud13768 |
Title: | RP crashed while trying to verify UDP-JITTER in IP SLAs vrf-lite |
|
Description: | Symptom: RP crashes while trying to verify UDP-JITTER in IP SLAs VRF-lite. Conditions: This symptom occurs while trying to verify IP SLAs UDP Jitter operation. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S |
|
Known Fixed Releases: | 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.1(1)ICA4.122, 15.2(1)E, 15.2(1)E1, 15.2(1)E2, 15.2(1)E3, 15.2(1)EY, 15.2(1)IC273.5 |
|
|
| |
| |
Bug Id: | CSCuh48666 |
Title: | Crash and core file on ASR1k after scaling dynamic eids in LISP |
|
Description: | Symptom: Router crashes and reloads with dynamic EID scaling. Conditions: The symptom is observed with dynamic EID scaling. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S1, 15.3(3)S |
|
Known Fixed Releases: | 15.1(1)ICA4.122, 15.2(1)IC273.13, 15.3(2)S2, 15.3(2)T1.3, 15.3(2)T2, 15.3(2)T3, 15.3(2)T4, 15.3(2.19)S0.10, 15.3(3)M0.2, 15.3(3)M1 |
|
|
| |
| |
Bug Id: | CSCsz74246 |
Title: | ASR1k: CPP crashes when sending the packet with Datagram size 10000. |
|
Description: | Symptom:
CPP crashes while sending the packet with datagram size 10000.
Conditions
This symptom is observed on a Cisco ASR 1000 , while sending the packet with datagram size 10000.
Workaround
Further Problem Description
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNE, 12.2XN, 12.2XNE |
|
Known Fixed Releases: | 12.2(33)XNC2, 12.2(33)XND |
|
|
| |
| |
Bug Id: | CSCul35389 |
Title: | 1RU: %SERVICES-3-NORESOLVE_ACTIVE causing occasional mcpcc-lc-ms crash |
|
Description: | Symptom: Following error messages re observed with SPA reload ==================================================================
Nov 26 2013 15:14:31.496 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP Nov 27 2013 17:31:42.464 EST: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: mcpcc-lc-ms: Error resolving active FRU: BINOS_FRU_RP
The process mcpcc-lc-ms is held down and the SIP is reloaded.
Logs may also be flooded with these errors:
12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.021 [bipc]: (note): Pending connection to server 10.0.1.0 12/09 08:05:49.488 [bipc]: (note): Pending connection to server 10.0.1.0
Conditions: Error are observed when SPA is reloaded
Workaround: NA
Further Problem Description: The error messages are caused due to IOS trying to establish a connection with a non-existing process on ASR1001.As a result of these error messages, we are observing a SIP reload (mcpcc).The issue is observed in XE311 (ASR1001 and possibly ASR1002-X).
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.4(1)S, 15.4(2)S, 15.4(3)S, 16.0(0) |
|
Known Fixed Releases: | 15.3(1)S1, 15.3(1)S1e, 15.3(1)S2, 15.4(1)S0.3, 15.4(1)S1, 15.4(1)S2, 15.4(1)S3, 15.4(1.16)S, 15.4(2)S, 15.4(2)S1 |
|
|
| |
| |
Bug Id: | CSCsv67352 |
Title: | ASR1004 RP1 FP Restart |
|
Description: |
Symptom:
Software forced crash observed
Conditions:
This behavior is observed on a Cisco ASR1000 series router when specific functions are enabled, and when a processing traffic destined to the device are encapsulated.
Workaround:
None
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNB1, 12.2XN |
|
Known Fixed Releases: | 12.2(33)XNB2b, 12.2(33)XNC, 3.9.0.6i.LC |
|
|
| |
| |
Bug Id: | CSCsv87997 |
Title: | DHCPv6 relay: IOSd crash on Active RP |
|
Description: | Symptom: DHCPv6 relay process crash on Actice RP.
Conditions: Unknown at this time.
Workaround: Unknown at this time. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNB |
|
Known Fixed Releases: | 12.2(32.8.11)SR179, 12.2(32.8.6)REC177, 12.2(32.8.6)REE177, 12.2(33)CX, 12.2(33)IRF, 12.2(33)IRG, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16 |
|
|
| |
| |
Bug Id: | CSCsv95601 |
Title: | asr1k:6RU- mplsogre & qos:CPP crash on sending traffic |
|
Description: | None Symptom:
Cpp crashes continuously on sending traffic
Conditions:
Traffic sent during testing with specific variables may cause Cpp crash.
Workaround:
None. |
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2XN |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCti08179 |
Title: | Cody SSH test with sh ssh command crashes RP |
|
Description: | Please see CSCth45540 release note enclosure. |
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNF2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCti48504 |
Title: | Memory leaks occur during SIP stress-testing |
|
Description: | Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or trigger memory leaks that may result in system instabilities. Affected devices would need to be configured to process SIP messages for these vulnerabilities to be exploitable.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds for devices that must run SIP; however, mitigations are available to limit exposure to the vulnerabilities.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110928-sip.shtml
. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNF |
|
Known Fixed Releases: | 12.4(24)MDA13, 12.4(24)MDB15, 12.4(24)MDB16, 12.4(24)MDB17, 12.4(24)MDB18, 12.4(24)MDB19, 12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T6 |
|
|
| |
| |
Bug Id: | CSCtr56576 |
Title: | QFP crash w *GTRMP_GTR_OTHER_LEAF_INT_INT_SDMA_REGULAR_SW_ERR* du to QOS |
|
Description: | Symptoms: Cisco ASR 1000 may experience a QFP crash pointing to fragmentation/reassembly of packets if a QOS input or output service policy is configured
Conditions: QOS(service-policy), a service-policy configured with "class-default" only, or only 1 of the following match filters: "match ip precedence", "match ip dscp", "match vlan", or "match "mpls exp"
Workaround: Remove service-policy applied to interface, or add an additional "dummy" class-map to the policy-map using a different match filter type. Example, if the policy-map has configured only "match ip prec", then add an extra "dummy" class-map that will match on an unused vlan id, or an unused qos-group.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2011-4007 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S |
|
Known Fixed Releases: | 15.1(2)S2, 15.1(3)S1, 15.2(1)S |
|
|
| |
| |
Bug Id: | CSCtt11558 |
Title: | Cisco IOS XE Software BDI Denial of Service Vulnerability |
|
Description: | Summary Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:
Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device. Repeated exploitation could result in a sustained Denial of Service (DoS) condition.
Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-1167 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S1 |
|
Known Fixed Releases: | 15.1(3)S2, 15.1(3)S3, 15.2(1)S1, 15.2(2)S |
|
|
| |
| |
Bug Id: | CSCto57786 |
Title: | ASR1K: FP crash on GRE codenomicon traffic |
|
Description: | Symptom: FP crash observed on ASR1K when enabling tunnel checksum cli under the dmvpn tunnel interface.
Conditions: Tunnel checksum configuration under the dmvpn tunnel interface.
Workaround: Removing the Tunnel checksum command avoids the fp crashes.
Further Problem Description: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 12.2(33.1), 15.1(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtz19248 |
Title: | Commit Engineer spacial to xe33_throttle_sr619833263 for SR619833263 |
|
Description: | Symptoms: Potential SIP issues with 3.4.0S and eralier Conditions: SIP processing. Workaround: None Additional Information: Resolved starting with 3.4.1S |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur00747 |
Title: | ROMMON Upgrade rolled back |
|
Description: | Symptom: In some cases, even after the ROMMON upgrade the device will come up with the earlier ROMMON version after a reload.
Conditions: This issue affects all ASR1K cards in the IOS-XE releases:
3.11.x all 3.11 releases, 3.12.x all 3.12 releases, 3.13.0x , 3.13.1.x, 3.14.0.x.
Steps to reproduce the problem: - Upgrade ROMMON. - Reload the device once. This time, it will load new ROMMON - Reload the device again. This time, it might load old ROMMON in some cases. - If it loads the old ROMMON, any subsequent reload will load only old ROMMON code.
Workaround: The workaround is to upgrade the ROMMON using IOS-XE images which doesn't have this bug or which has this bug fixed in it.
Here are the list of images which can be used to upgrade ROMMON without hitting this issue: - XE3.10 or previous IOS-XE release images - XE3.13.2 or later versions of XE3.13 - XE3.14.1 or later versions of XE3.14 (Target: March 3, 2015) - Any XE3.15 release image (Target: March 30, 2015)
Steps to upgrade ROMMON: * Use one of the above recommended IOS image to do the ROMMON upgrade (ie. Reboot the router with this image prior to starting the ROMMON upgrade steps) -- For ROMMON upgrade to line cards and ESP cards: ---> Follow the normal ROMMON upgrade process. Upgrade ROMMON one card at a time. --->Reload the card to complete the upgrade process. -- For ROMMON upgrade to Router Processor (RP2/RP1) or ASR1001/ASR1001-X/ASR1002-X platforms: ---> Follow the normal ROMMON upgrade process ---> Reload the router once with the same image to complete the upgrade process. * Now system can be reloaded with any other image. System will still come up with the newly upgraded ROMMON.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S3.13, 15.4(1)S1.1, 15.4(1)S2 |
|
Known Fixed Releases: | 15.4(2)S3, 15.4(3)S2, 15.4(3)S2a, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCug61252 |
Title: | Ability to Read Uninitialized Memory |
|
Description: | Symptoms: The potential exists for an unauthenticated user to read the contents of uninitialized memory of a WebEx node.
Conditions: Default installation of an affected version of the WebEx node software.
Workaround: None.
Additional details about the vulnerability described here can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:C CVE ID CVE-2013-1232 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.3(1)S2, 15.3(2)S1, 15.3(3)S |
|
|
| |
| |
Bug Id: | CSCug63564 |
Title: | IKEv2: Crafted IKE_SA_INIT packet causes traceback |
|
Description: | Symptoms: Under certain conditions, malformed IKEv2 packets may cause a traceback in the ''Crypto IKEv2'' process: *Feb 13 21:07:15.812: %SYS-2-MALLOCFAIL: Memory allocation of 4294967078 bytes failed from 0x16A15FF8, alignment 0 Conditions: The condition is only causing traceback message to be printed. No actual crash is happening. Workaround: None |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S |
|
Known Fixed Releases: | 15.4(0.1)T, 15.4(0.6)S, 15.4(1)CG, 15.4(1)CG1, 15.4(1)S, 15.4(1)S0a, 15.4(1)S0b, 15.4(1)S0c, 15.4(1)S1, 15.4(1)S2 |
|
|
| |
| |
Bug Id: | CSCui38300 |
Title: | ASRNAT: High latency for non-natted traffic on nat enabled interface |
|
Description: | Symptom: High latency observed in customer network.
Conditions: Under certain conditions, particularly under forced test conditions, it is possible to create scenarios where flow lock contention will be very high because of NAT gatekeeper failures. This happens when a large amount of traffic that does not need to be NAT'd is sent through an interface that has NAT configured. Most traffic hitting a NAT interface should be sent through NAT. If not, it will cause issues around 1Gb of traffic.
Workaround: ASR1000(config)#ip nat service gatekeeper
After this, we can manually configure the size of the cache. The recommended starting point is 64K for now. Here is the command to configure the cache to be 64K:
ASR1000(config)#ip nat settings gatekeeper-size 64000
From here we can monitor the latency using the ping as before. We can monitor the actual entries in the cache using the following commands:
Show platform hardware qfp active feature nat datapath gatein activity Show platform hardware qfp active feature nat datapath gateout activity
If needed we can clear the statistics by adding clear to the end of the two commands above to get a better idea of where we are at. Depending on what we are seeing with latency, we can fine tune the cache size later as well to try to reach optimum performance. Changing the cache size should not be service impacting. However, we recommend doing it during a maintenance window to be safe.
Further Problem Description: The fix was backed out and re-added later by the CSCun06260 bug.
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(2)S1 |
|
Known Fixed Releases: | 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCuu15786 |
Title: | ASR1k NAT Gatekeeper periodically drops ICMP packets for 10 seconds |
|
Description: | Symptom: Traffics which should be NATed are unexpectedly not translated if NAT gatekeeper feature is enabled.
Conditions: -NAT gatekeeper feature is enabled. -There are traffics of multiple destinations with the same source address. -There are NAT and non-NATed traffics in the same NAT interface.
Workaround: Disable NAT gatekeeper feature by the following command.
(config)# no ip nat service gatekeeper
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 1 Catastrophic |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCup30335 |
Title: | ASR1K CPP crash due to oversized egress packet with OTV |
|
Description: | Symptoms:
A vulnerability in OTV processing code of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a reload of the affected device.
The vulnerability is due to improper processing of oversized OTV frames passing through an affected device. An attacker could exploit this vulnerability by sending a number of packets that are processed as oversized OTV frames that may require fragmentation and reassembly by an affected device. An exploit could allow the attacker to cause a reload of the affected device.
Conditions: This has been seen on two ASR1002-X's running IOS-XE 03.10.01.S. Crash was seen when passing large packets across an OTV topology.
Workaround: Limit oversize packets across overlay topology.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2015-0710 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S1 |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCty05282 |
Title: | Last reload reason is seen as LocalSoft on ASR1ks |
|
Description: | Symptoms: Last reload reason in "show version" output is seen as LocalSoft after some reloads.
Conditions: The conditions under which these symptoms are observed is unknown.
Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNC0d, 15.1(1)S1, 15.3(2)S |
|
Known Fixed Releases: | 15.2(4)S1, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCtx42751 |
Title: | %TRANSCEIVER-3-INIT_FAILURE with XFP-10GLR-OC192SR |
|
Description: | Symptoms: The following error message is displayed:
%TRANSCEIVER-3-INIT_FAILURE: SIP2/0: Detected for transceiver module in TenGigabitEthernet2/0/0, module disabled %LINK-3-UPDOWN: SIP2/0: Interface TenGigabitEthernet2/0/0, changed state to down
Conditions: This symptom is observed with the XFP-10GLR-OC192SR transceiver.
Workaround: Configure "service unsupported-transceiver".
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.0(1)S4a |
|
Known Fixed Releases: | 15.1(3)S3.13, 15.1(3)S4, 15.2(2)S1.5, 15.2(2)S2, 15.2(2.19)S0.9, 15.2(4)S, 15.3(0.8)S |
|
|
| |
| |
Bug Id: | CSCus69732 |
Title: | IOS-XE: Evaluation of glibc GHOST vulnerability - CVE-2015-0235 |
|
Description: | Symptom: On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.
The following IOS-XE related products are affected: Cisco ASR 1000 Series Aggregation Services Router Cisco ASR 920 Series Aggregation Services Router Cisco ASR 900 Series Aggregation Services Router Cisco 4400 Series Integrated Services Routers Cisco 4300 Series Integrated Services Routers Cisco Cloud Services Router 1000V Series
A Cisco Security Advisory has been published to document this vulnerability at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost
This bug has been opened to address the potential impact on these products.
Conditions: Exposure is not configuration dependent.
All versions prior to the following ones are shipping with the vulnerable code: 15.5(1)S/XE3.14.S 15.4(3)S2/XE3.13.2S 15.4(2)S2/XE3.12.2S 15.4(1)S3/XE3.11.3S 15.3(3)S5/XE3.10.5S 15.2(4)S6/XE3.7.6S 15.1(3)S7/XE3.4.7S The following are active releases and planned CCO date: release CCO_Date 15.5(2)S/XE3.15.0S 3/31/2015 15.5(1)S1/XE3.14.1S 3/3/2015 15.4(3)S3/XE3.13.3S 5/29/2015 15.4(2)S3/XE3.12.3S 3/28/2015 15.4(1)S4/XE3.11.4S 5/29/2015 15.3(3)S6/XE3.10.6S 7/30/2015 15.2(4)S7/XE3.7.7S 3/20/2015 15.5(3)S/XE3.16.0S 7/31/2015
Workaround: Not available.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 23-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(3)S, 15.4(1)S, 15.4(2)S, 15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.2(4)S7, 15.4(2)S3, 15.5(1)S1, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCtq22873 |
Title: | TB:%SCHED-2-EDISMSCRIT:process=PuntInject Keepalive Process |
|
Description: | Symptoms: Router may show the following traceback (error message) after receiving certain IPv6 packets. TB:%SCHED-2-EDISMSCRIT:process=PuntInject Keepalive Process
Conditions: Router configured for IPv6 routing.
Workaround: None
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S |
|
Known Fixed Releases: | 15.1(2)S1.3, 15.1(2)S2, 15.1(2.16)S0.8, 15.1(3)MRA, 15.1(3)MRA1, 15.1(3)MRA3, 15.1(3)MRA4, 15.1(3)S, 15.1(3)S2, 15.1(3)S5 |
|
|
| |
| |
Bug Id: | CSCuu44128 |
Title: | GETVPN on ASR with vasi interface fail to install the Rekey |
|
Description: | Symptom: In GETVPN scenario ASR as Group Member where crypto map is applied on Vasi interface rekey fails to install. For registration there is no problem.
Conditions: When ASR as GM where crypto map is applied on Vasi interface
Workaround: none
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCty26186 |
Title: | Enhancement request to capture watchdog reset on asr1k |
|
Description: | Symptom: reset did not save any core or crashinfo file. no error log either.
under show version: "Last reload reason: Watchdog"
under "Reset reason Power On" watchdog reset
Conditions: normal operation. reset did not save any core or crashinfo file. no error log either.
Workaround: this is a code enhancement. not a bug. therefore, no workaround applicable.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 15.1(2)S, 15.1(2)S2 |
|
Known Fixed Releases: | 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCtb49497 |
Title: | %IOSXE-3-PLATFORM: %ATTN-3-SYNC_TIME ... missing packets -1 |
|
Description: | Symptom: %IOSXE-3-PLATFORM: %ATTN-3-SYNC_TIMEOUT observed 10 times, but no other noticeable service impact
Conditions: No special trigger
Workaround: No known workaround |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNC, 12.2XN |
|
Known Fixed Releases: | 12.2(33)XND2, 12.2(33)XNE |
|
|
| |
| |
Bug Id: | CSCut61660 |
Title: | ESP crashes due to UCODE. |
|
Description: | Symptom: UCODE and FMAN -FP crash.
tracelogs ,
03/03 01:41:10.749 [(null)]: (debug): -Traceback=1#059ffe5d84a16f3abdb99b9d41a9ab35 cpp_common_os:7FC11D233000+10C15 cpp_dmap:7FC123FAF000+33B6F cpp_dmap:7FC123FAF000+3789F cpp_palci_svr_lib:7FC121F38000+53EF cpp_palci_svr_lib:7FC121F38000+6C89 evlib:7FC11C259000+B960 evlib:7FC11C259000+E090 cpp_common_os:7FC11D233000+13313 :400000+5A51 c:7FC10ED60000+1E514 :400000+56B9
03/03 01:41:10.750 [errmsg]: (ERR): %CPPDRV-3-LOCKDOWN: CPP10(0) CPP Driver LOCKDOWN due to fatal error.
Conditions:
Workaround: .
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 15.5(1.12)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut21885 |
Title: | fman_fp_image and cpp_cp_svr memory leak - QFP PfR MP Prefix H... |
|
Description: | Symptom: fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory
show platform software memory forwarding-manager FP active brief show platform software memory qfp-control-process qfp active brief
QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578 Summary 4262097059 4221917059 81523186 79011936
AL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 3076255744 cpp_cp_svr 28858 28431 28858 S 20 1849511936 fman_rp 21120 20336 21120 S 20 1452556288
4+ weeks later:
RAL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 4294967295 cpp_cp_svr 28858 28431 28858 S 20 2942447616 fman_rp 21120 20336 21120 S 20 1462714368
Conditions: normal operation
Workaround: unknown at this point
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCud33610 |
Title: | NAT CGN : crash when clearing translations using ALG |
|
Description: | Symptom: QFP crash
Conditions: NAT CGN configuration 'clear ip nat translations *' is executed.
Workaround: Don't clear translations. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 25-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.2(4)S3, 15.3(1)S1, 15.3(2)S |
|
|
| |
| |
Bug Id: | CSCut03813 |
Title: | ASR1K ucode crash seen at mpls_icmp_create |
|
Description: | <B>Symptom:</B> ASR 1000 may experience an ESP ucode crash causing network outage in non-redundant setup
<B>Conditions:</B> currently observed on ESP100 and ASR1002-X with deployments having MPLS, IPv6 and NAT configured.
<B>Workaround:</B> None at this point.
<B>Further Problem Description:</B> On ESP40, instead of crash, you may see following error message- %NAT-6-ADDR_ALLOC_FAILURE:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S5.1, 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtx03171 |
Title: | ASR1k NAT/ALG Processing improvements |
|
Description: | <B>Symptom:</B> Improvements to NAT VRF Processing on IOS-XE.
<B>Workaround:</B> None |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S2 |
|
Known Fixed Releases: | 15.1(3)S3, 15.2(1)S1, 15.2(2)S |
|
|
| |
| |
Bug Id: | CSCub34945 |
Title: | Fragmented MVPNv6 Traffic Denial of Service Vulnerability |
|
Description: | Summary Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:
Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device. Repeated exploitation could result in a sustained Denial of Service (DoS) condition.
Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-1164 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.1(3)S5, 15.2(4)S1, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCub82727 |
Title: | wrongly formatted errmsgs in webex SPA's IOSCC driver |
|
Description: | Symptom: The IOSCC will be crashing with the print of some particualr error messages, if they get hit.
Conditions: The errors messages are malformed and the IOSCC will crash only if those error messages get hit
Workaround: No work around. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.1(3)S5.14, 15.1(3)S6, 15.2(4)S3.3, 15.2(4)S4, 15.2(4)S4a, 15.3(0.20)S0.2, 15.3(1)S, 15.3(1.3)S |
|
|
| |
| |
Bug Id: | CSCuo53622 |
Title: | IOS XE Crafted TCP Packet Remote Code Execution Vulnerability |
|
Description: | Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities: Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.
Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to execute malicious code on the affected device.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe
Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S2 |
|
Known Fixed Releases: | 15.3(3)S3, 15.4(1)S3, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCua79665 |
Title: | IOS Common Flow Table Crafted Packet Denial of Service Vulnerability |
|
Description: | Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities: Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.
Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to execute malicious code on the affected device.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe
Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(1)S |
|
Known Fixed Releases: | 15.2(4)S2, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCtn63795 |
Title: | A new cef entry added does not inherit all the forwarding attributes |
|
Description: | Symptom: The CTS (Cisco TrustSec) feature, uses the /32 cef entries to store IP-SGT (Security Group Tag) bindings. When a new IP-SGT binding is added for an IP address that did not exist in the cef table, a new /32 cef entry is added to the cef table, and this cef entry does not inherit the forwarding attributes of features such as BGPPA, from its /24 parent. Conditions: all Workaround: none PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33.7.20)SRE, 15.1(2)S1.4, 15.1(3)S |
|
Known Fixed Releases: | 12.2(58)EY2, 12.2(58)EZ, 12.2(60)EZ, 12.2(60)EZ1, 12.2(60)EZ2, 12.2(60)EZ3, 12.2(60)EZ4, 12.2(60)EZ5, 12.2(60)EZ6, 15.0(0)XJR111.173 |
|
|
| |
| |
Bug Id: | CSCsz91562 |
Title: | ASR:RP may crash when receiving certain IKE packets. |
|
Description: | Symptom:
RP may crash when receiving certain IKE packets.
Workaround: None |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNE |
|
Known Fixed Releases: | 12.2(33)XNE, 12.2(33)XNE1, 12.2(33.1.20)MCP5, 15.0(2)EA, 15.0(2)EB, 15.0(2)EC, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1 |
|
|
| |
| |
Bug Id: | CSCuq59131 |
Title: | IOS XE L4 Redirect Crafted Packet Denial of Service Vulnerability |
|
Description: | Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities: Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.
Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to execute malicious code on the affected device.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe
Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S0.1 |
|
Known Fixed Releases: | 15.2(4)S7, 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S0z, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCuh58209 |
Title: | BQS show commands may cause ESP crash when displaying internal queues |
|
Description: | Symptoms: ESP crashes in response to a show command. Conditions: This only causes an ESP crash when the 'qid' specified is an internal queue. It is safe for interface or QoS created queue. When issuing the following show command on a ASR1K 1002X, ESP80/100, and ESP160/200 system. "show platform hardware qfp [active|standby] infrastructure bqs [schedule|queue] qid <qid>" Workaround: Avoid use of the show command to display internal queues. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.8/3.1: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.2(4)S4, 15.2(4)S4a, 15.3(2)S2, 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCtj14903 |
Title: | ASR1000: ESP reload at crash@ipv4_parse_options with invalid IP traffic |
|
Description: | Symptoms: ESP can reload, this will cause a service interruption.
Conditions: ASR1000 with Cisco IOS XE 3.1(0)S [15.0(1)S]
Workaround:
Additional Information:
Upgrade to the following Cisco IOS XE releases or later:
3.1(2)S 3.2(0)S 3.3(0)S
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(1)S |
|
Known Fixed Releases: | 15.0(1)S2, 15.1(1)S, 15.1(2)S |
|
|
| |
| |
Bug Id: | CSCtz38558 |
Title: | Traceback @ lst_gpm_addr_handler on parsing IPv6 packets |
|
Description: | Symptoms: The traceback may be seen on an ASR1K when processing some IPv6 malformed packets
Conditions: IPv6 packet is malformed
Workaround: There is no workaround
Additional Information: Packet will be dropped. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(2)S2, 15.2(4)S |
|
|
| |
| |
Bug Id: | CSCtx32599 |
Title: | HA_PROXY-3-HA_MALFORMED_PKT && FWALL-3-HA_INVALID_MSG_RCVD |
|
Description: | Symptoms:
Traceback messages printed on the console. Device does not experiences adverse effects.
Conditions: Workaround: Additional Information: |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(2)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(1)S2, 15.2(2)S |
|
|
| |
| |
Bug Id: | CSCtc59429 |
Title: | Crafted GRE packet may cause FP of ASR1K series to crash. |
|
Description: | Symptom: Crash of the Forwarding Processor in a Cisco ASR 1000 Series Aggregation Services Routers.
Conditions: Device is configured with at least one GRE Tunnel, and receives a specially crafted GRE packet matching the source and destination addresses of the tunnel interface.
Workaround: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do? dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2011-1633 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNC, 12.2(33)XND, 12.2(33)XNE |
|
Known Fixed Releases: | 12.2(33)XND2, 12.2(33)XNE |
|
|
| |
| |
Bug Id: | CSCtd33567 |
Title: | Traceback seen when receiving crafted H.323 packets |
|
Description: | Summary
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version of Cisco IOS Software.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml.
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier:
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNE |
|
Known Fixed Releases: | 12.2(33.2.5)XNE1, 12.4(15)T14, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ7, 12.4(22)YB8, 12.4(22)YD4, 12.4(24)MDA13, 12.4(24)MDB13, 12.4(24)MDB14 |
|
|
| |
| |
Bug Id: | CSCuo25741 |
Title: | IOS XE Fragmented Packet Denial of Service Vulnerability |
|
Description: | Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities: Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.
Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to execute malicious code on the affected device.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe
Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S, 15.4(1)S |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S1, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCtz23293 |
Title: | Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability |
|
Description: | Summary Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:
Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device. Repeated exploitation could result in a sustained Denial of Service (DoS) condition.
Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-1165 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNF2 |
|
Known Fixed Releases: | 15.1(3)S4.7, 15.1(3)S5, 15.1(3)S5a, 15.1(3)S6, 15.1(3)S7, 15.2(4)S0.4, 15.2(4)S1, 15.2(4)S1c, 15.2(4)S2, 15.2(4)S3 |
|
|
| |
| |
Bug Id: | CSCtl92036 |
Title: | FP crash observed @ ipv4_tunnel_compare_hash_bucket |
|
Description: | Symptom:
FP crash observed on ASR1K when enabling tunnel checksum cli under the dmvpn tunnel interface.
Conditions:
DMVPN phase 3 network protected with gdoi with hub or spoke as ASR1K Traffic (unicast and multicast flowing) Tunnel checksum configuration under the dmvpn tunnel interface.
Workaround:
Removing the Tunnel checksum command avoids the fp crashes.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33.1), 15.1(2)S |
|
Known Fixed Releases: | 15.0(1)S4, 15.1(2)S1, 15.1(3)S |
|
|
| |
| |
Bug Id: | CSCsq87809 |
Title: | Port mapper is enabled on both Mgmt-VRFs |
|
Description: | <B>Symptom:Management Ethernet interface has unneeded open ports</B>
<B>Conditions:</B> A port scan of the Management Ethernet shows that TCP Port 111 (sunrpc) is open/accessible. The security exposure is minimal as none of the RPC services are accessible, however the portmapper (111) could be used as a DoS vector if the Management Ethernet port was physically accessible to an attacker.
<B>Workaround:</B> Add an ACL to GigabitEthernet0 to deny external access to TCP port 111. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XN1 |
|
Known Fixed Releases: | 12.2(33)XNB |
|
|
| |
| |
Bug Id: | CSCto16298 |
Title: | NAT44 FP reset seen on doing "clear ip nat translation *" |
|
Description: | Symptom: Forwarding Processor reset seen on sending malformed packets and doing ''clear ip nat trans *''
Conditions: Receiving multiple malformed packets
Workaround: None
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.6/3.6: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C
CVE ID CVE-2012-5989 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S |
|
Known Fixed Releases: | 15.1(3)S |
|
|
| |
| |
Bug Id: | CSCuf17466 |
Title: | Ability to Read Uninitialized Memory |
|
Description: | Symptoms: The potential exists for an unauthenticated user to read the contents of uninitialized memory of a WebEx node.
Conditions: Default installation of an affected version of the WebEx node software.
Workaround: None.
Additional details about the vulnerability described here can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:C CVE ID CVE-2013-1232 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtr44535 |
Title: | ASR1K RBUF OOH exception in FNF ager thread in presence of PFR |
|
Description: | Symptom:
On the ASR1K, the ESP has been observed to reload with configurations combining Netflow, Pfr and Netflow export.
Error messages like
May 22 10:27:47.268 BST: %CPPHA-3-FAULT: F0: cpp_ha: CPP:0 desc:INFP_INF_SWASSIST_LEAF_INT_INT_EVENT0 det:DRVR(interrupt) class:OTHER sev:FATAL id:2121 cppstate:RUNNING res:UNKNOWN flags:0x7 cdmflags:0x0
are seen.
Conditions:
Configurations where this defect has been seen have had Netflow configured on an interface ip flow ingress ip flow egress
as well as Pfr Border Controller
pfr border
as well as Netflow export
ip flow-export destination 192.168.10.10 9999
Workaround:
Unconfiguring netflow export should eliminate the ESP reload. If this is not possible, decreasing the number of configured Netflow exporters from 2 to 1, may be of some benefit.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.0(1)S |
|
Known Fixed Releases: | 15.1(2)S2, 15.1(3)S1, 15.2(1)S |
|
|
| |
| |
Bug Id: | CSCtz97563 |
Title: | Fragmented IPv6 Multicast Traffic Denial of Service Vulnerability |
|
Description: | Summary Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) may be affected by the following Denial of Service (DoS) vulnerabilities:
Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service Vulnerability Cisco IOS XE Software MVPNv6 Traffic Denial of Service Vulnerability Cisco IOS XE Software L2TP Traffic Denial of Service Vulnerability Cisco IOS XE Software Bridge Domain Interface Denial of Service Vulnerability Cisco IOS XE Software SIP Traffic Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device. Repeated exploitation could result in a sustained Denial of Service (DoS) condition.
Note: Cisco IOS or Cisco IOS-XR Software is not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-1164 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(4)S |
|
|
| |
| |
Bug Id: | CSCud72509 |
Title: | IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability |
|
Description: | Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities:
Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition.
Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-5546 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Symptom:
Conditions:
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S1 |
|
Known Fixed Releases: | 15.2(4)S3, 15.3(1)S1, 15.3(2)S |
|
|
| |
| |
Bug Id: | CSCur02734 |
Title: | IOS-XE evaluation for CVE-2014-6271 and CVE-2014-7169 |
|
Description: | Symptom: The following Cisco products running IOS-XE software
Cisco ASR 1000 Series Aggregation Services Router Cisco ASR 920 Series Aggregation Services Router Cisco ASR 900 Series Aggregation Services Router Cisco 4400 Series Integrated Services Routers Cisco 4300 Series Integrated Services Routers Cisco Cloud Services Router 1000V Series
include a version of bash that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187
This bug has been opened to address the potential impact on this product.
Conditions: In all version before the Known Fixed Releases with either
The Persistent SSH feature enabled The Persistent telnet feature enabled
Information on the Persistent SSH & persistent telnet feature is available on :
http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Console_Telnet_SSH_Handling.html#pgfId-1057023
The Persistent SSH or Persistent telnet feature is only available on the Management interface (GigabitEthernet0) in the VRF Mgmt-intf.
With Persistent SSH, a user must first successfully log in and authenticate via SSH to trigger this vulnerability. With Persistent telnet, an unauthenticated user can exploit this vulnerability
Other conditions may exist. This release note will be updated if other attack vectors are discovered.
Workaround: Disable the Persistent SSH feature. Disable the Persistent telnet feature.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.2(4)S6, 15.3(3)S, 15.3(3)S4, 15.4(1)S, 15.4(1)S2, 15.4(2)S, 15.4(2)S1, 15.4(3)S |
|
Known Fixed Releases: | 15.2(4)S7, 15.3(3)S5, 15.4(1)S3, 15.4(2)S2, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCuh19936 |
Title: | IOS XE Software PPTP Traffic Denial of Service Vulnerability |
|
Description: | Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities:
Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition.
Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-5545 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Symptom:
Conditions:
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(2)S, 15.3(2)S1 |
|
Known Fixed Releases: | 15.3(2)S2, 15.3(3)S |
|
|
| |
| |
Bug Id: | CSCuc47399 |
Title: | IKEv2-Accounting Wrong values in STOP Records when locally cleared |
|
Description: | Symptoms: IKEv2 STOP Accounting records show wrong counters for packets/octets, when the sessions are locally cleared using "clear crypto sa" or "clear crypto session" on ASR1K.
Conditions: This symptom is observed with latest Cisco IOS XE Release 3.8S images when IKEV2-Accounting is enabled. This issue is easily reproducible with a single session, and may be service impacting as STOP Accounting records are usually used for billing purposes.
Workaround: The STOP records reflect the right counters when the disconnect is through the remote-end. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S, 15.3(2)S |
|
Known Fixed Releases: | 15.1(1)SY0.1, 15.1(1)SY1, 15.1(1)SY1.32, 15.1(1)SY1.55, 15.1(1)SY1.57, 15.1(1)SY2, 15.1(1)SY3, 15.1(1)SY4, 15.1(2)SY, 15.1(2)SY1 |
|
|
| |
| |
Bug Id: | CSCuu19310 |
Title: | ASR1K:UCODE and RP @PAR1_CSR32_PAR1_ERR_LEAF_INT__INT_PAR1_STEM_CB_SEL_I |
|
Description: | Symptom: observing ucode followed by fman_fp and RP crash
Conditions: on verifying MLFR-FRF12 Bundle Interface working after RP Switch-over in SSO Mode
Workaround: n/a
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuq90913 |
Title: | OTV: CPP ucode crash in l2bd_forward on BD cond. debug enable |
|
Description: | Symptom:
CPP ucode crash when bridge-domain (BD) conditional debug enabled with OTV feature configured.
Conditions:
Seen only with bridge-domain debug enabled and OTV feature config.
Workaround:
No work around. (just don't enable BD debug)
Further Problem Description:
Any new MAC learned with BD debug enabled will trigger this issue. If there are no MAC's while debug enabled, then no issues.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.4(2)S2, 15.4(3)S1, 15.5(1)S |
|
|
| |
| |
Bug Id: | CSCtz61014 |
Title: | f Linux 2.6.27 kernel NTP leap second handling could cause deadlock |
|
Description: | Symptom: There are periodic leap second events which can add or delete a second to global time.
When the leap second update occurs the system will crash when adding or deleting NTP leap second in NTP master mode.
Conditions: The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.
Workaround: To prevent an issue when the leap second update is received do not configure the system as NTP master.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.0(1)S |
|
Known Fixed Releases: | 15.1(3)S4, 15.2(2)S1 |
|
|
| |
| |
Bug Id: | CSCul00709 |
Title: | ASR router crash with malformed packets during fragment/defragmentation |
|
Description: | Symptom: Cisco IOS XE Cisco Packet Processor (CPP) crashes on a device configured with MPLS IP.
Conditions: Device configured with mpls ip
Workaround: None.
Further Problem Description: A crafted MPLS IP packet may cause the Cisco IOS XE Cisco Packet Processor (CPP) to crash.
This can be triggered with a crafted MPLS IP packet when the packet requires MPLS fragmentation.
NOTE: It is difficult to inject this crafted packet into the network outside the label switch domain, since routers would/should drop the packet with basic IP Sanity checks that are done with IP CEF code.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-6981 has been assigned to document this issue.
Additional information about this vulnerability can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6981
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S4.1 |
|
Known Fixed Releases: | 15.2(4)S5, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S2t, 15.4(1)S1 |
|
|
| |
| |
Bug Id: | CSCts82752 |
Title: | ASR1K crashes with a ping done on packet size higher than 10000 |
|
Description: | <B>Symptom:</B>
ASR1K crashes with a ping done on packet size higher than 10000
<B>Conditions:</B>
When ping is done from ASR1k with a packet size of more than 10000 bytes
<B>Workaround:</B>
None |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S |
|
Known Fixed Releases: | 15.1(3)S2, 15.1(3)S3, 15.2(1)S, 15.2(2)S |
|
|
| |
| |
Bug Id: | CSCuj55363 |
Title: | lispgetVpn traffic is dropped when getvpn profile is applied in wan intf |
|
Description: | Symptom: In the lisp getVpn solution test, when the getvpn profile is applied in physical interface in the data path flow (such as interface between GM1 to core), the traffic got dropped with qfp error of "IpsecIkeIndicate"/"OUT_V4_PKT_HIT_IKE_START_SP"
when the getvpn profile is applied to the LISP0 interface, Encrypted traffic flows in the LISP setup properly
Conditions: getvpn profile is applied to the physical interface instead of lisp interface.
Workaround: apply getvpn profile in lisp interface.
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.4(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtl87590 |
Title: | ASR1K-XE34:cpp-mcplo-ucode crash under jumbo fragment traffic |
|
Description: | Symptom: ASR crashed when sending jumbo fragments(>9k)and VFR enabled Conditions: fragments(>9k) received and VFR enabled,or packets need to be processed by RP and VFR enabled in that interface Workaround: none |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(3)S |
|
Known Fixed Releases: | 15.1(2)S1, 15.1(3)S |
|
|
| |
| |
Bug Id: | CSCus78987 |
Title: | UDP port 2152 (GPRS) is open by default and can't be manually closed |
|
Description: | <B>Symptom:</B> UDP port 2152 is open by default, without additional configuration.
<B>Conditions:</B> UDP port 2152 is associated with GPRS Tunneling Protocol. GPRS was introduced on XE3.4S.
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-data-zbf-xe-book/conf-gprs-tunn-prot.html#GUID-6153DF03-6228-4117-8E71- 80989510E3A5
By default this port is open even without any GPRS configurations. There is currently no way to manually close the port or disable the service if its not needed.
<B>Workaround:</B> An extended ACL can be created and applied to the interface to block destination UDP port 2152. You can also use control-plane policing to block UDP packets being sent with a destination port of 2152 and being sent to the control plane. Here is the example config to do this:
ip access-list extended udp-port-2152 permit udp any any eq 2152
class-map match-all traffic-udp-port-2152 match access-group name udp-port-2152
policy-map CoPP class traffic-udp-port-2152 police cir 32000 conform-action drop exceed-action drop
control-plane service-policy input CoPP
Please note the previous configuration should only be applied to devices NOT configured to process GPRS traffic.
<B>Further Problem Description:</B>
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(2)SY, 15.4(1)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu12008 |
Title: | rework CSCut21885: chunk_destroy memory leak. |
|
Description: | Symptom: fman_fp_image and cpp_cp_svr memory leak. from both outputs - QFP PfR MP Prefix H.. holding ton of memory
show platform software memory forwarding-manager FP active brief show platform software memory qfp-control-process qfp active brief
QFP PfR MP Prefix H... 3747007512 3746855032 38108 28578 Summary 4262097059 4221917059 81523186 79011936
AL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 6469604 (40%) 9873148 (60%) 10926860 (67%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 3076255744 cpp_cp_svr 28858 28431 28858 S 20 1849511936 fman_rp 21120 20336 21120 S 20 1452556288
4+ weeks later:
RAL-INET-RTR02#show platform software status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) RP0 Healthy 16342752 10532628 (64%) 5810124 (36%) 14990352 (92%)
RAL-INET-RTR02#show platform software process list r0 sort memory Name Pid PPid Group Id Status Priority Size ------------------------------------------------------------------------------ linux_iosd-imag 23712 22710 23712 S 20 4294967295 fman_fp_image 29760 29456 29760 S 20 4294967295 cpp_cp_svr 28858 28431 28858 S 20 2942447616 fman_rp 21120 20336 21120 S 20 1462714368
Conditions: PfR is enabled and activated.
Workaround: Avoid using PfR
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.4(2)S1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuj23992 |
Title: | Cisco IOS XE IP Header Sanity Check Denial of Service Vulnerability |
|
Description: | A vulnerability in CEF processing module, responsible for checking the sanity of IP headers on Cisco IOS XE could allow an unauthenticated, remote attacker to cause a reload of an affected device and lead to a Denial of Service (DoS) condition.
The vulnerability is due to improper processing of MPLS packets when certain additional features are configured. An attacker could exploit this vulnerability by sending MPLS packets to traverse and exit an affected device as IP packets, when certain additional features are configured. An exploit could allow the attacker to cause a reload of an affected device and lead to a Denial of Service (DoS) condition. Conditions: When certain configuration that includes ''ip cef accounting'' and ''tcp adjust-mss'' is present, and the MPLS packet received on the ingress is egressing as an IP packet, a crash may happen. Workaround: None
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2013-6706 has been assigned to document this issue.
Additional details about the vulnerability described here can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6706
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.0(1)S, 15.3(2)S1, 3.9(0.0) |
|
Known Fixed Releases: | 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCub31873 |
Title: | ASR1K Crash on incomplete/glean adjacencies processing. |
|
Description: | <B>Symptom:</B> ASR RP/ESP crash.
<B>Conditions:</B> If a router has to process a lot of IP packets that are either incomplete adjacencies or glean adjacencies, they will be punted for ARP processing.
A condition occurs that may prevent the ESP from processing the RP keep alive for a certain period and the RP will force the ESP to crash.
Workaround: None. Upgrade to 15.2(04)S05-XE3.7.5 or later.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0685 has been assigned to document this issue.
More information about this vulnerability is made available at: http://tools.cisco.com/security/center/viewAlert.x?alertId=38124
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(1)S |
|
Known Fixed Releases: | 15.2(4)S5, 15.3(1)S |
|
|
| |
| |
Bug Id: | CSCup37676 |
Title: | OTV jumbo packet fragmentation and reassembly causes ASR1K CPP crash |
|
Description: | Symptoms:
A vulnerability in OTV processing code of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a reload of the affected device.
The vulnerability is due to improper processing of oversized OTV frames passing through an affected device. An attacker could exploit this vulnerability by sending a number of packets that are processed as oversized OTV frames that may require fragmentation and reassembly by an affected device. An exploit could allow the attacker to cause a reload of the affected device.
Conditions: This has been seen on two ASR1002-X's running IOS-XE 03.10.01.S. Crash was seen when passing large packets across an OTV topology.
Workaround: Limit oversize packets across overlay topology.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2015-0710 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S1 |
|
Known Fixed Releases: | 15.3(3)S4, 15.4(1)S3, 15.4(2)S2, 15.4(3)S |
|
|
| |
| |
Bug Id: | CSCut81614 |
Title: | OTV non-AED wrongly replies to ARP request received from internal intf |
|
Description: | Symptom: non-AED will reply to ARP request which will make L2 traffic loss
How to verify if your problem hits this ddts: For target Mac address(duplicated in otv database), check the mac table on all related switches and ASR1K(ED). If the the port of the mac address is wrong, you may meet the problem hits this ddts.
Conditions: Multi-homing
Workaround: disable otv arp-nd cache
Further Problem Description: None
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu16709 |
Title: | $$SS MACsec Interop between Nightster and Overlord fails. |
|
Description: | Symptom: MACsec encryption between ISR 4451 and ASR 1001-X may fail.
Conditions:
Workaround: Issue macsec/no macsec on the interface
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu04682 |
Title: | NAT ACL ignored on VASI interface with scale |
|
Description: | Symptom: WIth a large scale environment of BGP peers over VASI interfaces, some peers fail to come up or stay down due to hold timer expired.
Conditions: This occurs when NAT is applied to one of the VASI interfaces with a large scale configuration. The NAT ACL denies BGP from being translated, but the NAT translation table indicates BGP is being translated.
Workaround: Removing NAT from the interface is the only known workaround.
Further Problem Description: BGP peer failure is random and changes when the "clear ip nat translation" command is issued.
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus85852 |
Title: | CPP DRV: Disable IIC Interrupts (Revert CSCuq05197) |
|
Description: | Symptom: ESP crash occurs after one of the following interrupts are reported (can be seen on the IOS console): HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED64 HEDP_HED_HALTED_IN_127_64_LEAF_INT_INT_HALTED65
Conditions: Router configuration or traffic pattern does not affect this problem. This issue occurs if a data parity error is reported in the QFP L2 instruction cache controller, and impacts all CPP10-based ESPs (asr1001, asr1002, ESP5, ESP10, ESP20, ESP40). This issue does not impact Yoda (asr1002-x, ESP100, ESP200) or Luke (asr1001-x) based ESPs.
Workaround: None. Almost all data parity errors are random events that can not be fixed by replacing hardware.
Further Problem Description: The exception handler for the L2 instruction cache handler is restored / fixed in the following releases: XE310 / 15.3(3)S6 XE312 / 15.4(2)S3 XE313 / 15.4(3)S3 XE314 / 15.5(1)S2
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | 15.4(2)S3, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuq85985 |
Title: | ASR1K:ESP80, 100, 200 crash on SSO when FRF.12 enabled on MFR bundle |
|
Description: | Symptom: Crash of both active and standby ESP. Applies to ESP80, 100, and 200.
Conditions: Updating the bandwidth of an active MFR bundle member-link. A bandwidth update will be sent from the RP to the FP if the FMAN-RP and FMAN-FP have different bandwidth values for the same link. This occurs immediately after boot if the startup-config has MFR member-links configured with FRF.12 fragmentation (active RP and standby RP will boot with different bandwidths, so that on switchover the standby RP will send a bandwidth update to the FP). Other situations that can lead to the bandwidth mismatch include adding/removing links to an MFR bundle with FRF.12 enabled and adding/removing FRF.12 from a main MFR interface prior to performing a switchover.
Workaround: None. Normal router operation and configuration can lead to this crash such that there are no viable workarounds.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.5(1)S |
|
Known Fixed Releases: | 15.5(1)S0.3, 15.5(1)S1, 15.5(1)SN1, 15.5(1.18)S, 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuu09050 |
Title: | asr1001x may crash when unconfiguring large QoS policy |
|
Description: | Symptom: asr1001x may reload when unconfiguring large QoS policy
Conditions: A very large QoS policy with hundreds of class-maps is used on the router and removed.
Workaround: Do not unconfigure large QoS policy.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCto03123 |
Title: | cman-fp/cman-cc slow memory leak is seen |
|
Description: | Symptom:1. A slow memory leak is seen on cman_fp process on FP and cmcc process on a SIP. This is seen on all the flavors for FPs and CCs. Leak is of the order of less than 100-122K bytes per day. 2. Additional memory leak can happen when there are frequent sensor value changes take place.
Conditions:No special condition is required for first leak to happen. Second leak happens when sensor related changes take place.
In show log OR syslog output, you can expect to see the following message: %OOM-3-NO_MEMORY_AVAIL: SIP0: oom.sh: The system is very low on available memory. Operations will begin to fail
Workaround:None.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNF1, 15.0(1)S2, 15.0(1)S3, 15.1(1)S, 15.1(2)S |
|
Known Fixed Releases: | 12.2(33)XNF2e, 15.0(1)S4, 15.1(1)S2, 15.1(2)S1, 15.1(3)S |
|
|
| |
| |
Bug Id: | CSCun13772 |
Title: | NHRP: CPUHOGs seen when many child entries expire simultaneously |
|
Description: | Symptom: CPUHOG messages and watchdog timeout crashes are observed on an ASR1000 series router running DMVPN.
Conditions: This has been observed on a router with a very large NHRP table (10-20k individual entries) with a very high number (thousands) of child entries per parent entry.
Workaround: Reduce the number of child entries per parent entry through the use of supernetting.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S1 |
|
Known Fixed Releases: | 15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.10, 15.3(3)S5, 15.4(2.17)S0.7, 15.4(3)M0.3, 15.4(3)M1, 15.4(3)S, 15.4(3)S1, 15.4(3)SN1 |
|
|
| |
| |
Bug Id: | CSCur52300 |
Title: | ASR1K: IOSd crash occurs on Standby RP with UWS-GETVPN profile |
|
Description: | Symptom: IOSd crash seen on Standby RP of GM router
Conditions: While doing SPA_OIR with UWS-GETVPN configs
Workaround: -
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S, 15.5(1)S, 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCui25696 |
Title: | ASR 1K router - Kernel Core Crash on find_busiest_group() |
|
Description: | Symptom: Cisco ASR 1K router experiences a watchdog reset due to a kernel core dump triggered by a possible invalid calculation.
Conditions: This symptom can occur under any condition.
Workaround: There is no workaround.
Further Problem Description: The bug mentions "watchdog". On platforms that have dedicated FP/ESPs (example would 1002, 1004, 1006 and 1013), there is no reload of the RP and so, the show version output will not reflect watchdog.
The may be as much as 10 minutes or more from the time you see IOSXE_OIR-6-OFFLINECARD: Card (fp) offline in slot F0 tp when you see IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
The interruption to network services are likely to happen close to when you see online in slot F0 message.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S1 |
|
Known Fixed Releases: | 15.2(4)S4, 15.2(4)S4a, 15.3(3)S1, 15.4(1)S |
|
|
| |
| |
Bug Id: | CSCto82630 |
Title: | CC/SPA package modification to reduce SIP 10 memory usage |
|
Description: | Symptom: ASR1000 with SIP module may report a low memory warning. This is a cosmetic non impacting issue.
%PLATFORM-4-ELEMENT_WARNING: R0/0: smand: SIP/0: Committed Memory value 96% exceeds warning level 95%
Conditions: SIP memory usage can be verified with the following command:
show platform soft status control-processor brief
Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) SIP0 Healthy 449776 445428 (99%) 4348 ( 1%) 429456 (95%) SIP1 Warning 449776 443572 (99%) 6204 ( 1%) 431344 (96%) SIP2 Healthy 449776 397796 (88%) 51980 (12%) 318364 (71%)
Workaround: None. Cosmetic issue. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 12.2(33)XNF2, 15.1(3)S |
|
Known Fixed Releases: | 15.1(2)S1, 15.1(3)S, 15.2(1)S |
|
|
| |
| |
Bug Id: | CSCuu24757 |
Title: | ASR1k QFP leak with cpp_sp_svr at module FM CACE |
|
Description: | Symptom: An ASR1k router will have a leak on the QFP with cpp_sp_svr. Listing the modules under this service, FM CACE which deals with software TCAM will be holding the majority of the memory:
Router#show platform software memory qfp-service-process qfp active . . Module: FM CACE allocated: 1866346946, requested: 1857054514, overhead: 9292432 Allocations: 1161692189, failed: 0, frees: 1161111412
Conditions: Currently, this is seen when tunnel interface is configured with IPSEC in a DMVPN environment but the exact conditions are unknown at this time.
Workaround: None at this time
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S2.2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut52677 |
Title: | %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image after RP switchover |
|
Description: | Symptom: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP. This error message is seen.
Conditions: This issue is seen while doing sweep ping after doing RP switchover with latest MCP_DEV image.
Workaround:
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S, 15.5(3)S |
|
Known Fixed Releases: | 15.5(2)S0.4, 15.5(2.18)S |
|
|
| |
| |
Bug Id: | CSCuu36031 |
Title: | Kernel crash is related to a GPF related to memory corruption. |
|
Description: | Symptom: Unexpetced reboot
Conditions: Router rebooted itself and no changes has been made.
Workaround: NA
Further Problem Description: This is a MPLS router in a data center multiple connections depend on this connection. Over 12 devices paged down when this happened.
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S5.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus13106 |
Title: | Error in generating keys:no available resources |
|
Description: | Symptom: After ESP Switchover SSH on ASR stops working
Conditions: ASR 1006 RP2 15.2(4) S4 Happens after ESP switchover
Workaround: n/a
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.2(4)S4.1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur43882 |
Title: | %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: in mcp_dev |
|
Description: | Symptom: *Oct 28 10:55:10.568: %SERVICES-3-NORESOLVE_ACTIVE: SIP0: linux_iosd-image: Error resolving active FRU: BINOS_FRU_RP
Conditions: This issue is seen after doing router reload with latest MCP_DEV image.
Workaround: -
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu50414 |
Title: | ASR1k: %IOSXE-4-PLATFORM kernel error message |
|
Description: | Symptom: When huge number of HSRP interfaces become up, the following messages appear and VIPs cannot be communicated tentatively. The messages will be stopped after a while.
%IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM DA Failed to find space for MAC insert region 1 %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port4 ERROR: LPM DA Failed to find space for MAC insert region 1 %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert into DA TCAM %IOSXE-4-PLATFORM: R0/0: kernel: ERROR: LPM Failed to insert HSRP MAC address 0000.0cxx.xxxx on port5 ERROR: LPM DA Failed to find space for MAC insert region 1
Conditions: -There are about 1000 or more HSRP interfaces in ASR1000. -The issue may happen when these interfaces are up or down. -The issue was found in 15.4(3)S2/ASR1001-X.
Workaround: None at this moment.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S2.1, 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu14810 |
Title: | LNS Setup Rate takes over one hour for 58K sessions (copy of CSCut20591) |
|
Description: | Symptom: In high scale L2TP/LNS cases where RADIUS sends a QoS-Policy to LNS as a part of Access Accept, session setup rate might be too slow. For 58.000 sessions, it might take up to 1 hour or even longer to establish all sessions on the LNS side. The goal of this fix is to improve session setup rate on LNS: without outgoing shaping in RADIUS user profile, it takes only 23 minutes.
Conditions: In high scale L2TP/LNS cases where RADIUS sends a QoS-Policy to LNS as a part of Access Accept, session setup rate might be too slow. For 58.000 Sessions, it might take up to 1 hour or even longer to establish all sessions on the LNS side. The goal of this fix is to improve session setup rate on LNS: without outgoing shaping in RADIUS user profile, it takes only 23 minutes.
Workaround:
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S3.13 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu56477 |
Title: | TenGi IF and channel down when doing "redundancy force-switchover" |
|
Description: | Symptom: did "redundancy force-switchover" on ASR1K (2RP) caused TenGigabitEthernet IF and port-channel down.
Conditions: none
Workaround: none
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus66974 |
Title: | ASR1K QFP ESP 200 crashed in a B2B CGN NAT scenario with PAP+BPA |
|
Description: | Symptom: In a Back-to-Back Carrier Grade NAT configuration using ASR1013 chassis and PAP+BPA configured, ESP200 crashed and recovered.
Conditions: PAP+BPA configured ASR1013 with ESP200.
Workaround: No workaround. ESP200 crashed and recovered.
Further Problem Description: NA
|
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S, 15.6(1)S |
|
Known Fixed Releases: | 15.5(2)S |
|
|
| |
| |
Bug Id: | CSCuu55787 |
Title: | ASR1001-X: Router fails to come online with No Service Password Recovery |
|
Description: | Symptom: Router fails to come online after attempting to return to factory defaults with "No Service Password Recovery" enabled.
Conditions: ASR1001-X with No Service Password Recover enabled. An attempt to send a to the ROMMON followed by answer "Y" to Do you want to reset the router to the factory default configuration and proceed [y/n] ?
Workaround: Do not enable No Service Password Recovery or Do not attempt to return router to factory defaults after having done so
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu58443 |
Title: | ASR1001: SMC-2-BAD_ID_HW or SCC-3-XCVR_BAD_ID_HW with GLC-SX-MMD |
|
Description: | Symptom: The following error messages may be seen on an ASR1001 router and the interface stays down.
%SMC-2-BAD_ID_HW: SIP0/0: Failed Identification Test in 0/0/2 %SCC-3-XCVR_BAD_ID_HW: SIP0/0: Failed identification test in 0/0/0
Conditions: The issue occurs when inserting a GLC-SX-MMD SFP or rebooting the router.
Workaround: Contact TAC to check for a workaround.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu37200 |
Title: | SC install fails after link re-route |
|
Description: | Symptom: SC install fails after link re-route happens in the network
Conditions: SC install fails after link re-route happens in the network.
Workaround: issue no macsec/macsec to recover SC's.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.4(3)SS |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu35388 |
Title: | IKEv2 - IPSec SA lifetime expires immediately after SA is established |
|
Description: | Symptom: SA is created within in the same instance a (lifetime_expiry) message is printed stating "SA lifetime threshold reached, expiring in 3599 seconds" this is followed by a (delete_sa).
358463: Apr 2 12:59:19.348 EDT: IPSEC:(SESSION ID = 2127) (lifetime_expiry) SA lifetime threshold reached, expiring in 3599 seconds 358464: Apr 2 12:59:48.420 EDT: IPSEC:(SESSION ID = 2127) (delete_sa) deleting SA,
Conditions: This condition is observed in asr1002x-universalk9.03.15.00.S.155-2.S-std.SPA code.
Workaround: Disable volume based rekey
Reduce the crypto ipsec security-association replay window-size to a value below 1024
Further Problem Description: |
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.5(2)S |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu60301 |
Title: | ESP100 crash because of hardware interrupt |
|
Description: | Symptom: ESP/QFP crash on ASR1k running as LNS
Conditions: No known trigger
Workaround: None
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 30-MAY-2015 |
|
Known Affected Releases: | 15.4(3)S2.16 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCur48133 |
Title: | ATM 3xOC3 SPA failed to program with IFCFG_CMD_TIMEOUT error |
|
Description: | Symptom: IFGTIMEOUT and ProcClient hogs message are seen after 8-10 hours of router uptime.
Conditions: The Router is loaded with large number of ATM SPA (8 or more ATM SPAs) and very high VCs configure ( ~30K per slot ) and continuous session churns are done. After 8 - 10 hours the IGTIMEOUT continous IFGTIMEOUT message are seen, which brings the card down.
Workaround: A shut followed by no shut on the few Interface brings the ATM card backup.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 31-MAY-2015 |
|
Known Affected Releases: | 15.3(3)S |
|
Known Fixed Releases: | 15.5(2.21)S0.2, 15.5(2.23)S |
|
|
| |
| |
Bug Id: | CSCuu36926 |
Title: | XE316:IP Ping connectivity failure with atm_pmcr_pcr configs |
|
Description: | Symptom: While testing XE316 image with "xe35_atm_pmcr_pcr"(SPA-3XOC3-ATM-V2 & SPA-2CHT3-CE-ATM are used) feature in RP2 platform, observing IP ping failure.
Conditions: Issue is seen in RP2 platform.
Workaround: None
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 31-MAY-2015 |
|
Known Affected Releases: | 15.5(3)S, 15.6(1)S |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论