Release Notes for the Catalyst 4500-X Series Switches, Cisco IOS XE Release 3.4.xSG
Supported Hardware on the Catalyst 4500-X Series Switches
Features Not Supported on the Cisco Catalyst 4500-X Series Switches
New Software Features in Release IOS XE 3.4.2SG
New Hardware Features in Release IOS XE 3.4.2SG
New Software Features in Release IOS XE 3.4.0SG
New Hardware Features in Release IOS XE 3.4.0SG
Cisco IOS XE to Cisco IOS Version Number Mapping
Resolved Caveats for Cisco IOS XE Release 3.4.8SG
Open Caveats for Cisco IOS XE Release 3.4.7SG
Resolved Caveats for Cisco IOS XE Release 3.4.7SG
Open Caveats for Cisco IOS XE Release 3.4.6SG
Resolved Caveats for Cisco IOS XE Release 3.4.6SG
Open Caveats for Cisco IOS XE Release 3.4.5SG
Resolved Caveats for Cisco IOS XE Release 3.4.5SG
Open Caveats for Cisco IOS XE Release 3.4.4SG
Resolved Caveats for Cisco IOS XE Release 3.4.4SG
Open Caveats for Cisco IOS XE Release 3.4.3SG
Resolved Caveats for Cisco IOS XE Release 3.4.3SG
Open Caveats for Cisco IOS XE Release 3.4.2SG
Resolved Caveats for Cisco IOS XE Release 3.4.2SG
Open Caveats for Cisco IOS XE Release 3.4.1SG
Resolved Caveats for Cisco IOS XE Release 3.4.1SG
Open Caveats for Cisco IOS XE Release 3.4.0SG
Resolved Caveats for Cisco IOS XE Release 3.4.0SG
Obtaining Documentation and Submitting a Service Request
Current release
IOS XE 3.4.8 SG—Nov 11, 2016
Prior release
IOS XE 3.4.7 SG, IOS XE 3.4.6SG, IOS XE 3.4.5SG, IOS XE 3.4.4SG, IOS OS XE 3.4.3SG, XE 3.4.2SG, XE 3.4.1SG, XE 3.4.0SG
This release note describes the features, modifications, and caveats for the Cisco IOS XE 3.4.xSG software on the Catalyst 4500-X Series switch
Cisco IOS XE Software Release 3.4.2SG introduces the Permanent Right-to-Use (PRTU) license feature.
Cisco IOS XE Software Release 3.4.0SG delivers new software and hardware innovations in campus access and aggregation deployments that span across many technologies including Security, Video, HighAvailability, NetworkVirtualization, IPMulticast and Lower TCO as following:
– Layer 2 Multichassis EtherChannel (MEC)
– Enhanced Port Aggregation Protocol (ePAgP) split brain detection method
– Cross-chassis Nonstop Forwarding with Stateful Switchover (NSF/SSO)
– Cross-chassis in-service software upgrade (ISSU)
– Support for virtual switch link (VSL) on 1 Gigabit and 10 Gigabit links
– All four ports on quad supervisor scenario may be used for uplink
– Lightweight DHCPv6 Relay Agent (LDRA)
– IPv6 Neighbor Discovery Multicast Suppression
– IPv6 Router Advertisement (RA) Guard
– Secure Shell SSH Version 2 Client Support
– Secure Shell SSH Version 2 Server Support
– SSH Keyboard Interactive Authentication
– SSHv2 Enhancements for RSA Keys
Lower Total Cost of Ownership and Ease of Use
Routing and Multicast Enhancements
Support for Cisco IOS XE Release 3.4.0SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
For more information on the Catalyst 4500-X switch, visit the following URL:
http://www.cisco.com//en/US/products/ps12332/index.html
Note Although their Release Notes are unique, the platforms Catalyst 4500E and Catalyst 4500-X use the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
The Enterprise Services image supports all Cisco Catalyst 4500-X Series software features based on Cisco IOS Software, including enhanced routing.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access, Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and RIPv1/v2. The IP Base image does not support enhanced routing features such as BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), and policy-based routing (PBR).
Starting with Cisco IOS Release (3.3.0SG or 15.1(1)SG, support for IP SLAs and NSF have been extended from Enterprise Services to IP Base.
Customers with Catalyst 4500-X Series Switches who need the latest hardware and software features should migrate to Cisco IOS Release XE 3.4.0SG.
IOS XE 3.4.xSG is a maintenance train supporting Sup7E, Sup7L-E and 4500-X.
Figure 1 displays the one active train, 3.4.0SG.
Figure 1 Software Release Strategy for the Catalyst 4500-X Series Switch
Support for Cisco IOS Software Release XE 3.4.0SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
For information on the minimum supported release for each pluggable module please refer to:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 1 lists the hardware supported on the Catalyst 4500-X Series switches.
1000BASE-BX10-D small form-factor pluggable module |
|
1000BASE-BX10-U small form-factor pluggable module |
|
1000BASE-LX/LH small form-factor pluggable module with DOM support |
|
1000BASE-EX small form-factor pluggable module with DOM support |
|
1000BASE-ZX small form-factor pluggable module with DOM support |
|
CWDM small form-factor pluggable module (See Table 2 for a list of supported wavelengths.) |
|
Cisco 10GBASE-ZR SFP+ Module for SMF Note This module is only supported on the uplink module in the back-to-front airflow configuration. |
Table 2 briefly describes the supported CWDM wavelengths in the Catalyst 4500-X Series switch.
Table 3 briefly describes the supported DWDM wavelengths on the Catalyst 4500-X Series Switches.
For a complete list of Cisco Gigabit Ethernet Transceiver Modules, please refer to the URL:
http://www.cisco.com//c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/OL_6981.html#38544
Table 4 briefly describes the DOM support on the Catalyst 4500-X Series switches.
Table 5 is a detailed list of features supported on Catalyst 4500-X Series switches running Cisco IOS Software Release 3.4.0SG categorized by image type. Please visit Feature Navigator for package details:
http://tools.cisco.com/ITDIT/CFN/
BGP Increased Support of Numbered as-path Access Lists to 500 |
||
CFM/IEEE 802.1ag - D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
||
Class Based Ethernet CoS Matching & Marking (802.1p & ISL CoS) |
||
FHRP - Enhanced Object Tracking of IP SLAs1 |
||
IEEE 802.1s Multiple Spanning Tree (MST) Standard Compliance |
||
IEEE 802.1t2 |
||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
||
IGMP Version 3 - Explicit Tracking of Hosts, Groups, and Channels |
||
IP Multicast Load Splitting - Equal Cost Multipath (ECMP) using S, G and Next-hop |
||
IPv6 First Hop Security (FHS): Lightweight DHCPv6 Relay Agent |
||
Yes 3 |
||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
||
IPv6 Multicast: RPF Flooding of Bootstrap Router (BSR) Packets |
||
Yes 3 |
||
Yes3 |
||
IPv6 Services: Cisco Discovery Protocol (CDP) - IPv6 Address Family Support for Neighbor Information |
||
IPv6 Switching: CEFv6 Switched Automatic IPv4-compatible Tunnels (in software) |
||
IPv6 Switching: CEFv6 Switched Configured IPv6 over IPv4 Tunnels (in software) |
||
IPv6 Tunneling: Automatic IPv4-compatible Tunnels (in software) |
||
IPv6 Tunneling: Manually Configured IPv6 over IPv4 Tunnels (in software) |
||
Medianet 2.0: Integrated Video Traffic Simulator (hardware-assisted IP SLA); IPSLA generator and responder |
||
Medianet 2.0: Media Monitoring (Performance Monitoring and Mediatrace) |
||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
Yes 3 |
||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
||
Smart Install Director Support4 |
||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
||
2.EEE 802.1t—An IEEE amendment to IEEE 802.1D that includes extended system ID, long path cost, and PortFast. |
For information on MIB support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
The following features are not supported on a Catalyst 4500-X Series switches:
With some exceptions, the VSS maintains “feature parity” with the standalone Catalyst 4500 or 4500-X series switches. Major exceptions include:
Note Smart Install Director is not supported with VSS.
These sections describe the new and changed information for the Catalyst 4500-X Series switch running Cisco IOS XE software:
Release IOS XE 3.4.2SG provides the following new software on Catalyst 4500 Series switches:
Release IOS XE 3.4.0SG provides no new hardware on Catalyst 4500 Series switches.
Release IOS XE 3.4.0SG provides the following new software features on the Catalyst 4500-X Series switch.
– Lightweight DHCPv6 Relay Agent (LDRA)
– IPv6 Neighbor Discovery Multicast Suppression
– IPv6 Router Advertisement (RA) Guard
– Secure Shell SSH Version 2 Client Support
– Secure Shell SSH Version 2 Server Support
– SSH Keyboard Interactive Authentication
– SSHv2 Enhancements for RSA Keys
Lower Total Cost of Ownership and Ease of Use
As Table 7 shows, each version of Cisco IOS XE has an associated Cisco IOS version:
If you are upgrading to IOS XE Version 3.4.0SG and are planning on using VSS, you must upgrade your ROMMON to IOS Version 15.0(1r)SG7. Else, leave the ROMMON at its default level.
You can upgrade a ROMMON image either through a console or telnet.
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4500-X Series switches.
TFTP numbers its datagrams with a 16 bit field, resulting in a maximum of 65,536 datagrams. Because each TFTP datagram is 512 bytes long, the maximum transferable file is 65536 x 512 = 32 MB. If both the TFTP client (ROMMON) and the TFTP server support block number wraparound, no size limitation exists.
Cisco has modified the TFTP client to support block number wraparound. So, if you encounter a transfer failure, use a TFTP server that supports TFTP block number wraparound. Because most implementations of TFTP support block number wraparound, updating the TFTP daemon should fix the issue.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
Workaround: Define a policy-map with a different name and then reattach. CSCti26172
– Decrease the number of monitors.
– Attach the same monitor to multiple targets. CSCti43798
Workaround: Use the dir device command (for example, dir bootflash:) to obtain the correct file count. CSCti74130
– At least 10K groups and roughly 20K mroutes exist.
– IGMP joins with source traffic transit to all the multicast groups.
This is caused by the large number of updates generating SPI messages that must be processed by the CPU to ensure that the platform is updated with the changes in all the entries.
You cannot clear a large number of mroutes at one time when traffic is still running.
Workaround: Do not clear all mroutes at once.
Workaround: Use the show version command. CSCtr30294
Workaround: Select an alternate destination or source port. CSCty05405
Workaround: Configure both dead-criteria and deadtime.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
You will not experience this behavior with IPv4 access lists.
Workaround: During IPv6 access-list configuration, configure at least one IPv6 ACE before the "hardware statistics" statement. CSCuc53234
This applies to QoS policing only. QoS marking, shaping and sharing behave as expected.
Workaround: Apply FHS policies on a non EtherChannel port rather than a VLAN. CSCua53148
Because the Catalyst 4500-X is a “fixed” configuration device, in a VSS, you would expect the two systems to be labeled 'Module 1' and 'Module 2.’ However, because of software implementation similarities with the modular Catalyst 4500E series switches, the Standby switch is labeled 'Module 11.’
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
The Bug Search Tool (BST) is the online successor to Bug Toolkit and is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input. You can access the tool at: https://tools.cisco.com/bugsearch/.
To view the details of a caveat listed in this document:
This section lists the open caveats for Cisco IOS XE Release 3.4.4SG:
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
These messages are typically observed during SSO, bootup, or when a PIM-enabled interface undergoes a state transition on a switch containing Bidir PIM state entries.
Workaround: Enable MLD snooping. CSCtx82176
Workaround: Use the show spi-fc all command to dump all SPI channel information. CSCuc81286
Workaround: Default the VSL member ports and detach the input QoS policy. CSCuc49150
Workaround: Remove the Catalyst 4500-X module by first pressing the Ejector button for 10 seconds until the light turns green. CSCty67871
Caution: If you remove the module without following this procedure, the system always shuts down (or fails). Always use the Ejector button.
The exact triggers are unknown.
Workaround: Reapply the configuration when the switch reboots. CSCum71764
Workaround: Do a switchover. CSCuo18934
Workaround: Disable netflow sampling. CSCtg00542
Upon reload, the config errors out
Workaround: After a reload, manually re-add the static entry into the running config. CSCuo60703
This section lists the resolved caveats for Cisco IOS XE Release 3.4.4SG:
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
For example, if the pulse interval is 250 ms and the debounce interval is 500 ms, then the delta is 250 ms and the debouce will be ineffective.
Workaround: Define a debounce interval that is at least 1 second greater than the incoming pulse interval. CSCtx75188
This section lists the open caveats for Cisco IOS XE Release 3.4.3SG:
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After a switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Stale dynamic access lists force the system to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator, and reschedule the session after the new active supervisor engine boots on the responder.
– After the new active supervisor engine boots, and provided the Mediatrace responder SSO is not planned, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Enable MLD snooping. CSCtx82176
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Remove the Catalyst 4500-X module by first pressing the Ejector button for 10 seconds until the light turns green. CSCty67871
Caution: If you remove the module without following this procedure, the system always shuts down (or fails). Always use the Ejector button.
For example, if the pulse interval is 250 ms and the debounce interval is 500 ms, then the delta is 250 ms and the debouce will be ineffective.
Workaround: Define a debounce interval that is at least 1 second greater than the incoming pulse interval. CSCtx75188
Workaround: Use the show spi-fc all command to dump all SPI channel information. CSCuc81286
Workaround: None. The ip pim register-rate-limit command does not function. CSCub32679
Workaround: Enter shut, then no shut to bring up the links. CSCuc37676
Workaround: Default the VSL member ports and detach the input QoS policy. CSCuc49150
Workaround: None. You might try reducing the the number of VLANs created at one time.
Workaround: Turn off ICMP redirect with the ip redirect command. CSCua71929
– Incoming packets on the VSS standby port are directed to the CPU for host learning.
– Layer 3 exceptions occur for packets arriving on the VSS standby port.
– ACL logging occurs on the VSS standby port.
These messages are typically observed during SSO, bootup, or when a PIM-enabled interface undergoes a state transition on a switch containing Bidir PIM state entries.
This section lists the resolved caveats for Cisco IOS XE Release 3.4.3SG:
Workaround: Clear the MAC table. CSCuh50329
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the open caveats for Cisco IOS XE Release 3.4.2SG:
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After a switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Stale dynamic access lists force the system to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator, and reschedule the session after the new active supervisor engine boots on the responder.
– After the new active supervisor engine boots, and provided the Mediatrace responder SSO is not planned, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Enable MLD snooping. CSCtx82176
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Remove the Catalyst 4500-X module by first pressing the Ejector button for 10 seconds until the light turns green. CSCty67871
Caution: If you remove the module without following this procedure, the system always shuts down (or fails). Always use the Ejector button.
For example, if the pulse interval is 250 ms and the debounce interval is 500 ms, then the delta is 250 ms and the debouce will be ineffective.
Workaround: Define a debounce interval that is at least 1 second greater than the incoming pulse interval. CSCtx75188
Workaround: Use the show spi-fc all command to dump all SPI channel information. CSCuc81286
Workaround: None. The ip pim register-rate-limit command does not function. CSCub32679
Workaround: Enter shut, then no shut to bring up the links. CSCuc37676
Workaround: Default the VSL member ports and detach the input QoS policy. CSCuc49150
Workaround: None. You might try reducing the the number of VLANs created at one time.
Workaround: Turn off ICMP redirect with the ip redirect command. CSCua71929
– Incoming packets on the VSS standby port are directed to the CPU for host learning.
– Layer 3 exceptions occur for packets arriving on the VSS standby port.
– ACL logging occurs on the VSS standby port.
These messages are typically observed during SSO, bootup, or when a PIM-enabled interface undergoes a state transition on a switch containing Bidir PIM state entries.
Workaround: Clear the MAC table. CSCuh50329
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the resolved caveats for Cisco IOS XE Release 3.4.2SG:
Workaround: Enter either the no ip http server or the no ip http secure-server command. This disables the http/s server. CSCui14525
Workaround; Reload the switch.
To avoid this condition, use EEM with the timer event to schedule the required task.
This section lists the open caveats for Cisco IOS XE Release 3.4.1SG:
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After a switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Stale dynamic access lists force the system to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator, and reschedule the session after the new active supervisor engine boots on the responder.
– After the new active supervisor engine boots, and provided the Mediatrace responder SSO is not planned, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Enable MLD snooping. CSCtx82176
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Remove the Catalyst 4500-X module by first pressing the Ejector button for 10 seconds until the light turns green. CSCty67871
Caution: If you remove the module without following this procedure, the system always shuts down (or fails). Always use the Ejector button.
For example, if the pulse interval is 250 ms and the debounce interval is 500 ms, then the delta is 250 ms and the debouce will be ineffective.
Workaround: Define a debounce interval that is at least 1 second greater than the incoming pulse interval. CSCtx75188
Workaround: Use the show spi-fc all command to dump all SPI channel information. CSCuc81286
Workaround: None. The ip pim register-rate-limit command does not function. CSCub32679
Workaround: Enter shut, then no shut to bring up the links. CSCuc37676
Workaround: Default the VSL member ports and detach the input QoS policy. CSCuc49150
Workaround: None. You might try reducing the the number of VLANs created at one time.
Workaround: Turn off ICMP redirect with the ip redirect command. CSCua71929
– Incoming packets on the VSS standby port are directed to the CPU for host learning.
– Layer 3 exceptions occur for packets arriving on the VSS standby port.
– ACL logging occurs on the VSS standby port.
These messages are typically observed during SSO, bootup, or when a PIM-enabled interface undergoes a state transition on a switch containing Bidir PIM state entries.
Workaround: Enter either the no ip http server or the no ip http secure-server command. This disables the http/s server. CSCui14525
Workaround: Clear the MAC table. CSCuh50329
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the resolved caveats for Cisco IOS XE Release 3.4.1SG:
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable these protocols on interfaces that might flap frequently. CSCub85948
Workaround: Ensure that the spanning-tree root is configured in the network. This avoids a topology change. CSCud94151.
Workaround: Enter the show idprom muxbuffer command to display the missing information. CSCuc79728
Workaround: Do not configure LACP independent mode. Because the PAgP does not have a workaround, it may cause a traffic loss of several seconds until the ports are bundled. This situation occurs only when a switch is booting; it does not apply to a port going down and coming up after bootup. CSCud94258.
Workaround: Retain the trunk native VLAN as 1. CSCud05521
Workaround: Clear sessions manually with the clear authentication sessions command. CSCtg15739
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– a fast stream of traffic matches the URL redirect ACL as IPDT clears an address,
– a traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address,
If this occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Exclude polling of the CISCO-PROCESS-MIB using an SNMP view:
Workaround: Minimize leak by avoiding S,G deletion events:
– Extend the receiver-less S,G duration (e.g. ip pim sparse sg-expiry-timer <big value>).
– If sources are varied, try to minimize them.
– If some static sources send infrequently, extend the expiry timer to cover the gaps in the packet stream.
– If some receivers are unreliable, consider static joins.
– Minimize Layer 2 or Layer 3 topology changes that would require multicast reconvergence.
– Avoid manually clearing mroutes. CSCua62262
Workaround: Once the problem occurs, reboot the switch.
Disabling Fa1 prevents the problem. CSCue76243
Workaround: Use SNMPWALK. CSCtz67068
Workaround: Avoid scripted CLI. CSCtz19897
Workaround: Shorten the dACL name. CSCug78653
Workaround: Clear sessions manually with the clear authentication sessions command. CSCtg15739
This section lists the open caveats for Cisco IOS XE Release 3.4.0SG:
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After a switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Stale dynamic access lists force the system to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator, and reschedule the session after the new active supervisor engine boots on the responder.
– After the new active supervisor engine boots, and provided the Mediatrace responder SSO is not planned, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Enable MLD snooping. CSCtx82176
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Remove the Catalyst 4500-X module by first pressing the Ejector button for 10 seconds until the light turns green. CSCty67871
Caution: If you remove the module without following this procedure, the system always shuts down (or fails). Always use the Ejector button.
For example, if the pulse interval is 250 ms and the debounce interval is 500 ms, then the delta is 250 ms and the debounce is ineffective.
Workaround: Define a debounce interval that is at least 1 second greater than the incoming pulse interval. CSCtx75188
Workaround: Use the show spi-fc all command to dump all SPI channel information. CSCuc81286
Workaround: None. The ip pim register-rate-limit command does not function. CSCub32679
Workaround: Enter shut, then no shut to bring up the links. CSCuc37676
Workaround: Default the VSL member ports and detach the input QoS policy. CSCuc49150
Workaround: None. Reduce the number of VLANs created at one time.
Workaround: Turn off ICMP redirect with the ip redirect command. CSCua71929
– Incoming packets on the VSS standby port are directed to the CPU for host learning.
– Layer 3 exceptions occur for packets arriving on the VSS standby port.
– ACL logging occurs on the VSS standby port.
Workaround: Enter the show idprom muxbuffer command to display the missing information. CSCuc79728
These messages are typically observed during SSO, bootup, or when a PIM-enabled interface undergoes a state transition on a switch containing Bidir PIM state entries.
Workaround: Disable these protocols on interfaces that might flap frequently. CSCub85948
Workaround: Ensure that the spanning-tree root is configured in the network. This avoids a topology change. CSCud94151.
Workaround: Do not configure LACP independent mode. Because the PAgP does not have a workaround, it may cause a traffic loss of several seconds until the ports are bundled. This situation occurs only when a switch is booting; it does not apply to a port going down and coming up after bootup. CSCud94258.
Workaround: Retain the trunk native VLAN as 1. CSCud05521
Workaround: Clear sessions manually with the clear authentication sessions command. CSCtg15739
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– a fast stream of traffic matches the URL redirect ACL as IPDT clears an address,
– a traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address,
If this occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Shorten the dACL name. CSCug78653
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Exclude polling of the CISCO-PROCESS-MIB using an SNMP view:
Workaround: Minimize leak by avoiding S,G deletion events:
– Extend the receiver-less S,G duration (e.g. ip pim sparse sg-expiry-timer <big value>).
– If sources are varied, try to minimize them.
– If some static sources send infrequently, extend the expiry timer to cover the gaps in the packet stream.
– If some receivers are unreliable, consider static joins.
– Minimize Layer 2 or Layer 3 topology changes that would require multicast reconvergence.
– Avoid manually clearing mroutes. CSCua62262
Workaround: Once the problem occurs, reboot the switch.
Disabling Fa1 prevents the problem. CSCue76243
Workaround: Use SNMPWALK. CSCtz67068
Workaround: Avoid scripted CLI. CSCtz19897
Workaround: Clear the MAC table. CSCuh50329
This section lists the resolved caveats for Cisco IOS XE Release 3.4.0SG:
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Enter shut, then no shut on the port. CSCts29515
Workaround: Enter the default interface te command in global configuration mode before you enter the switchport command. CSCty52629
Workaround: Avoid running both commands simultaneously. CSCty27680
Refer to the following documents for additional Catalyst 4500-X series information:
http://www.cisco.com//en/US/products/ps12332/index.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps12332/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/ps12332/prod_release_notes_list.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900 Series, and Catalyst 4500-X Series switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform- independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.